summaryrefslogtreecommitdiff
path: root/app/Core/Security.php
blob: 126de2fd9e7d6eb39b9ae6d98f1c6e503b636f38 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
<?php

namespace Kanboard\Core;

/**
 * Security class
 *
 * @package  core
 * @author   Frederic Guillot
 */
class Security
{
     /**
     * Generate a random token with different methods: openssl or /dev/urandom or fallback to uniqid()
     *
     * @static
     * @access public
     * @return string  Random token
     */
    public static function generateToken()
    {
        if (function_exists('openssl_random_pseudo_bytes')) {
            return bin2hex(\openssl_random_pseudo_bytes(30));
        }
        else if (ini_get('open_basedir') === '' && strtoupper(substr(PHP_OS, 0, 3)) !== 'WIN') {
            return hash('sha256', file_get_contents('/dev/urandom', false, null, 0, 30));
        }

        return hash('sha256', uniqid(mt_rand(), true));
    }

    /**
     * Generate and store a CSRF token in the current session
     *
     * @static
     * @access public
     * @return string  Random token
     */
    public static function getCSRFToken()
    {
        $nonce = self::generateToken();

        if (empty($_SESSION['csrf_tokens'])) {
            $_SESSION['csrf_tokens'] = array();
        }

        $_SESSION['csrf_tokens'][$nonce] = true;

        return $nonce;
    }

    /**
     * Check if the token exists for the current session (a token can be used only one time)
     *
     * @static
     * @access public
     * @param  string   $token   CSRF token
     * @return bool
     */
    public static function validateCSRFToken($token)
    {
        if (isset($_SESSION['csrf_tokens'][$token])) {
            unset($_SESSION['csrf_tokens'][$token]);
            return true;
        }

        return false;
    }

    /**
     * Check if the token used in a form is correct and then remove the value
     *
     * @static
     * @access public
     * @param  array    $values   Form values
     * @return bool
     */
    public static function validateCSRFFormToken(array &$values)
    {
        if (! empty($values['csrf_token']) && self::validateCSRFToken($values['csrf_token'])) {
            unset($values['csrf_token']);
            return true;
        }

        return false;
    }
}