1 <?php echo "<?xml version=\"1.0\" encoding=\"iso-8859-1\"?>\n"; ?>
2 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
3 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
4 <html xmlns="http://www.w3.org/1999/xhtml">
6 <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
8 <title>Password Encryption Tool</title>
10 Copyright 1999, 2000, 2001, 2002 $ThePhpWikiProgrammingTeam
12 This file is part of PhpWiki.
14 PhpWiki is free software; you can redistribute it and/or modify
15 it under the terms of the GNU General Public License as published by
16 the Free Software Foundation; either version 2 of the License, or
17 (at your option) any later version.
19 PhpWiki is distributed in the hope that it will be useful,
20 but WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 GNU General Public License for more details.
24 You should have received a copy of the GNU General Public License along
25 with PhpWiki; if not, write to the Free Software Foundation, Inc.,
26 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
30 <h1>Password Encryption Tool</h1>
33 * Seed the random number generator.
35 * better_srand() ensures the randomizer is seeded only once.
37 * How random do you want it? See:
38 * http://www.php.net/manual/en/function.srand.php
39 * http://www.php.net/manual/en/function.mt-srand.php
41 function better_srand($seed = '') {
42 static $wascalled = FALSE;
45 list($usec, $sec) = explode(" ", microtime());
47 $seed = (double) $usec * $sec;
48 else // once in a while use the combined LCG entropy
49 $seed = (double) 1000000 * substr(uniqid("", true), 13);
51 if (function_exists('mt_srand')) {
52 mt_srand($seed); // mersenne twister
60 function rand_ascii($length = 1) {
63 for ($i = 1; $i <= $length; $i++) {
64 // return only typeable 7 bit ascii, avoid quotes
65 if (function_exists('mt_rand'))
66 // the usually bad glibc srand()
67 $s .= chr(mt_rand(40, 126));
69 $s .= chr(rand(40, 126));
75 // Function to create better user passwords (much larger keyspace),
76 // suitable for user passwords.
77 // Sequence of random ASCII numbers, letters and some special chars.
78 // Note: There exist other algorithms for easy-to-remember passwords.
79 function random_good_password ($minlength = 5, $maxlength = 8) {
81 // assume ASCII ordering (not valid on EBCDIC systems!)
82 $valid_chars = "!#%&+-.0123456789=@ABCDEFGHIJKLMNOPQRSTUVWXYZ_abcdefghijklmnopqrstuvwxyz";
83 $start = ord($valid_chars);
84 $end = ord(substr($valid_chars, -1));
86 if (function_exists('mt_rand')) // mersenne twister
87 $length = mt_rand($minlength, $maxlength);
88 else // the usually bad glibc rand()
89 $length = rand($minlength, $maxlength);
91 if (function_exists('mt_rand'))
92 $newchar = mt_rand($start, $end);
94 $newchar = rand($start, $end);
95 if (! strrpos($valid_chars, $newchar) )
96 continue; // skip holes
97 $newpass .= sprintf("%c", $newchar);
103 /** PHP5 deprecated old-style globals if !(bool)ini_get('register_long_arrays').
105 * We want to work with those old ones instead of the new superglobals,
108 foreach (array('SERVER','GET','POST','ENV') as $k) {
109 if (!isset($GLOBALS['HTTP_'.$k.'_VARS']) and isset($GLOBALS['_'.$k]))
110 $GLOBALS['HTTP_'.$k.'_VARS'] =& $GLOBALS['_'.$k];
114 $posted = $GLOBALS['HTTP_POST_VARS'];
115 if (!empty($posted['create'])) {
116 $new_password = random_good_password();
117 echo "<p>The newly created random password is:<br />\n<br /> \n<tt><strong>",
118 htmlentities($new_password),"</strong></tt></p>\n";
119 $posted['password'] = $new_password;
120 $posted['password2'] = $new_password;
123 if (($posted['password'] != "")
124 && ($posted['password'] == $posted['password2'])) {
125 $password = $posted['password'];
127 * http://www.php.net/manual/en/function.crypt.php
129 // Use the maximum salt length the system can handle.
130 $salt_length = max(CRYPT_SALT_LENGTH,
134 16 * CRYPT_BLOWFISH);
135 // Generate the encrypted password.
136 $encrypted_password = crypt($password, rand_ascii($salt_length));
137 $debug = $HTTP_GET_VARS['debug'];
139 echo "The password was encrypted using a salt length of: $salt_length<br />\n";
140 echo "<p>The encrypted password is:<br />\n<br /> \n<tt><strong>",
141 htmlentities($encrypted_password),"</strong></tt></p>\n";
144 else if ($posted['password'] != "") {
145 echo "The passwords did not match. Please try again.<br />\n";
147 if (empty($REQUEST_URI))
148 $REQUEST_URI = $HTTP_ENV_VARS['REQUEST_URI'];
149 if (empty($REQUEST_URI))
150 $REQUEST_URI = $HTTP_SERVER_VARS['REQUEST_URI'];
153 <form action="<?php echo $REQUEST_URI ?>" method="post">
154 <fieldset><legend accesskey="P">Encrypt</legend>
155 Enter a password twice to encrypt it:<br />
156 <input type="password" name="password" value="" /><br />
157 <input type="password" name="password2" value="" /> <input type="submit" value="Encrypt" />
162 <fieldset><legend accesskey="C">Generate </legend>
163 Create a new random password: <input type="submit" name="create" value="Create" />