Mercurial > hg > rc1
comparison vendor/pear/auth_sasl/Auth/SASL/DigestMD5.php @ 0:1e000243b222
vanilla 1.3.3 distro, I hope
| author | Charlie Root |
|---|---|
| date | Thu, 04 Jan 2018 15:50:29 -0500 |
| parents | |
| children |
comparison
equal
deleted
inserted
replaced
| -1:000000000000 | 0:1e000243b222 |
|---|---|
| 1 <?php | |
| 2 // +-----------------------------------------------------------------------+ | |
| 3 // | Copyright (c) 2002-2003 Richard Heyes | | |
| 4 // | All rights reserved. | | |
| 5 // | | | |
| 6 // | Redistribution and use in source and binary forms, with or without | | |
| 7 // | modification, are permitted provided that the following conditions | | |
| 8 // | are met: | | |
| 9 // | | | |
| 10 // | o Redistributions of source code must retain the above copyright | | |
| 11 // | notice, this list of conditions and the following disclaimer. | | |
| 12 // | o Redistributions in binary form must reproduce the above copyright | | |
| 13 // | notice, this list of conditions and the following disclaimer in the | | |
| 14 // | documentation and/or other materials provided with the distribution.| | |
| 15 // | o The names of the authors may not be used to endorse or promote | | |
| 16 // | products derived from this software without specific prior written | | |
| 17 // | permission. | | |
| 18 // | | | |
| 19 // | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | | |
| 20 // | "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | | |
| 21 // | LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR | | |
| 22 // | A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT | | |
| 23 // | OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | | |
| 24 // | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT | | |
| 25 // | LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | | |
| 26 // | DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | | |
| 27 // | THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | | |
| 28 // | (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | | |
| 29 // | OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | | |
| 30 // | | | |
| 31 // +-----------------------------------------------------------------------+ | |
| 32 // | Author: Richard Heyes <richard@php.net> | | |
| 33 // +-----------------------------------------------------------------------+ | |
| 34 // | |
| 35 // $Id$ | |
| 36 | |
| 37 /** | |
| 38 * Implmentation of DIGEST-MD5 SASL mechanism | |
| 39 * | |
| 40 * @author Richard Heyes <richard@php.net> | |
| 41 * @access public | |
| 42 * @version 1.0 | |
| 43 * @package Auth_SASL | |
| 44 */ | |
| 45 | |
| 46 require_once('Auth/SASL/Common.php'); | |
| 47 | |
| 48 class Auth_SASL_DigestMD5 extends Auth_SASL_Common | |
| 49 { | |
| 50 /** | |
| 51 * Provides the (main) client response for DIGEST-MD5 | |
| 52 * requires a few extra parameters than the other | |
| 53 * mechanisms, which are unavoidable. | |
| 54 * | |
| 55 * @param string $authcid Authentication id (username) | |
| 56 * @param string $pass Password | |
| 57 * @param string $challenge The digest challenge sent by the server | |
| 58 * @param string $hostname The hostname of the machine you're connecting to | |
| 59 * @param string $service The servicename (eg. imap, pop, acap etc) | |
| 60 * @param string $authzid Authorization id (username to proxy as) | |
| 61 * @return string The digest response (NOT base64 encoded) | |
| 62 * @access public | |
| 63 */ | |
| 64 function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '') | |
| 65 { | |
| 66 $challenge = $this->_parseChallenge($challenge); | |
| 67 $authzid_string = ''; | |
| 68 if ($authzid != '') { | |
| 69 $authzid_string = ',authzid="' . $authzid . '"'; | |
| 70 } | |
| 71 | |
| 72 if (!empty($challenge)) { | |
| 73 $cnonce = $this->_getCnonce(); | |
| 74 $digest_uri = sprintf('%s/%s', $service, $hostname); | |
| 75 $response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $authzid); | |
| 76 | |
| 77 if ($challenge['realm']) { | |
| 78 return sprintf('username="%s",realm="%s"' . $authzid_string . | |
| 79 ',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $response_value, $challenge['maxbuf']); | |
| 80 } else { | |
| 81 return sprintf('username="%s"' . $authzid_string . ',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d', $authcid, $challenge['nonce'], $cnonce, $digest_uri, $response_value, $challenge['maxbuf']); | |
| 82 } | |
| 83 } else { | |
| 84 return PEAR::raiseError('Invalid digest challenge'); | |
| 85 } | |
| 86 } | |
| 87 | |
| 88 /** | |
| 89 * Parses and verifies the digest challenge* | |
| 90 * | |
| 91 * @param string $challenge The digest challenge | |
| 92 * @return array The parsed challenge as an assoc | |
| 93 * array in the form "directive => value". | |
| 94 * @access private | |
| 95 */ | |
| 96 function _parseChallenge($challenge) | |
| 97 { | |
| 98 $tokens = array(); | |
| 99 while (preg_match('/^([a-z-]+)=("[^"]+(?<!\\\)"|[^,]+)/i', $challenge, $matches)) { | |
| 100 | |
| 101 // Ignore these as per rfc2831 | |
| 102 if ($matches[1] == 'opaque' OR $matches[1] == 'domain') { | |
| 103 $challenge = substr($challenge, strlen($matches[0]) + 1); | |
| 104 continue; | |
| 105 } | |
| 106 | |
| 107 // Allowed multiple "realm" and "auth-param" | |
| 108 if (!empty($tokens[$matches[1]]) AND ($matches[1] == 'realm' OR $matches[1] == 'auth-param')) { | |
| 109 if (is_array($tokens[$matches[1]])) { | |
| 110 $tokens[$matches[1]][] = preg_replace('/^"(.*)"$/', '\\1', $matches[2]); | |
| 111 } else { | |
| 112 $tokens[$matches[1]] = array($tokens[$matches[1]], preg_replace('/^"(.*)"$/', '\\1', $matches[2])); | |
| 113 } | |
| 114 | |
| 115 // Any other multiple instance = failure | |
| 116 } elseif (!empty($tokens[$matches[1]])) { | |
| 117 $tokens = array(); | |
| 118 break; | |
| 119 | |
| 120 } else { | |
| 121 $tokens[$matches[1]] = preg_replace('/^"(.*)"$/', '\\1', $matches[2]); | |
| 122 } | |
| 123 | |
| 124 // Remove the just parsed directive from the challenge | |
| 125 $challenge = substr($challenge, strlen($matches[0]) + 1); | |
| 126 } | |
| 127 | |
| 128 /** | |
| 129 * Defaults and required directives | |
| 130 */ | |
| 131 // Realm | |
| 132 if (empty($tokens['realm'])) { | |
| 133 $tokens['realm'] = ""; | |
| 134 } | |
| 135 | |
| 136 // Maxbuf | |
| 137 if (empty($tokens['maxbuf'])) { | |
| 138 $tokens['maxbuf'] = 65536; | |
| 139 } | |
| 140 | |
| 141 // Required: nonce, algorithm | |
| 142 if (empty($tokens['nonce']) OR empty($tokens['algorithm'])) { | |
| 143 return array(); | |
| 144 } | |
| 145 | |
| 146 return $tokens; | |
| 147 } | |
| 148 | |
| 149 /** | |
| 150 * Creates the response= part of the digest response | |
| 151 * | |
| 152 * @param string $authcid Authentication id (username) | |
| 153 * @param string $pass Password | |
| 154 * @param string $realm Realm as provided by the server | |
| 155 * @param string $nonce Nonce as provided by the server | |
| 156 * @param string $cnonce Client nonce | |
| 157 * @param string $digest_uri The digest-uri= value part of the response | |
| 158 * @param string $authzid Authorization id | |
| 159 * @return string The response= part of the digest response | |
| 160 * @access private | |
| 161 */ | |
| 162 function _getResponseValue($authcid, $pass, $realm, $nonce, $cnonce, $digest_uri, $authzid = '') | |
| 163 { | |
| 164 if ($authzid == '') { | |
| 165 $A1 = sprintf('%s:%s:%s', pack('H32', md5(sprintf('%s:%s:%s', $authcid, $realm, $pass))), $nonce, $cnonce); | |
| 166 } else { | |
| 167 $A1 = sprintf('%s:%s:%s:%s', pack('H32', md5(sprintf('%s:%s:%s', $authcid, $realm, $pass))), $nonce, $cnonce, $authzid); | |
| 168 } | |
| 169 $A2 = 'AUTHENTICATE:' . $digest_uri; | |
| 170 return md5(sprintf('%s:%s:00000001:%s:auth:%s', md5($A1), $nonce, $cnonce, md5($A2))); | |
| 171 } | |
| 172 | |
| 173 /** | |
| 174 * Creates the client nonce for the response | |
| 175 * | |
| 176 * @return string The cnonce value | |
| 177 * @access private | |
| 178 */ | |
| 179 function _getCnonce() | |
| 180 { | |
| 181 if (@file_exists('/dev/urandom') && $fd = @fopen('/dev/urandom', 'r')) { | |
| 182 return base64_encode(fread($fd, 32)); | |
| 183 | |
| 184 } elseif (@file_exists('/dev/random') && $fd = @fopen('/dev/random', 'r')) { | |
| 185 return base64_encode(fread($fd, 32)); | |
| 186 | |
| 187 } else { | |
| 188 $str = ''; | |
| 189 for ($i=0; $i<32; $i++) { | |
| 190 $str .= chr(mt_rand(0, 255)); | |
| 191 } | |
| 192 | |
| 193 return base64_encode($str); | |
| 194 } | |
| 195 } | |
| 196 } | |
| 197 ?> |
