Page Menu
Home
Phorge
Search
Configure Global Search
Log In
Files
F3311812
DigestMD5.php
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Flag For Later
Award Token
Size
8 KB
Referenced Files
None
Subscribers
None
DigestMD5.php
View Options
<?php
// +-----------------------------------------------------------------------+
// | Copyright (c) 2002-2003 Richard Heyes |
// | All rights reserved. |
// | |
// | Redistribution and use in source and binary forms, with or without |
// | modification, are permitted provided that the following conditions |
// | are met: |
// | |
// | o Redistributions of source code must retain the above copyright |
// | notice, this list of conditions and the following disclaimer. |
// | o Redistributions in binary form must reproduce the above copyright |
// | notice, this list of conditions and the following disclaimer in the |
// | documentation and/or other materials provided with the distribution.|
// | o The names of the authors may not be used to endorse or promote |
// | products derived from this software without specific prior written |
// | permission. |
// | |
// | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
// | "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
// | LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
// | A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
// | OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
// | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
// | LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
// | DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
// | THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
// | (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
// | OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
// | |
// +-----------------------------------------------------------------------+
// | Author: Richard Heyes <richard@php.net> |
// +-----------------------------------------------------------------------+
//
// $Id$
/**
* Implmentation of DIGEST-MD5 SASL mechanism
*
* @author Richard Heyes <richard@php.net>
* @access public
* @version 1.0
* @package Auth_SASL
*/
require_once
(
'Auth/SASL/Common.php'
);
class
Auth_SASL_DigestMD5
extends
Auth_SASL_Common
{
/**
* Provides the (main) client response for DIGEST-MD5
* requires a few extra parameters than the other
* mechanisms, which are unavoidable.
*
* @param string $authcid Authentication id (username)
* @param string $pass Password
* @param string $challenge The digest challenge sent by the server
* @param string $hostname The hostname of the machine you're connecting to
* @param string $service The servicename (eg. imap, pop, acap etc)
* @param string $authzid Authorization id (username to proxy as)
* @return string The digest response (NOT base64 encoded)
* @access public
*/
function
getResponse
(
$authcid
,
$pass
,
$challenge
,
$hostname
,
$service
,
$authzid
=
''
)
{
$challenge
=
$this
->
_parseChallenge
(
$challenge
);
$authzid_string
=
''
;
if
(
$authzid
!=
''
)
{
$authzid_string
=
',authzid="'
.
$authzid
.
'"'
;
}
if
(!
empty
(
$challenge
))
{
$cnonce
=
$this
->
_getCnonce
();
$digest_uri
=
sprintf
(
'%s/%s'
,
$service
,
$hostname
);
$response_value
=
$this
->
_getResponseValue
(
$authcid
,
$pass
,
$challenge
[
'realm'
],
$challenge
[
'nonce'
],
$cnonce
,
$digest_uri
,
$authzid
);
if
(
$challenge
[
'realm'
])
{
return
sprintf
(
'username="%s",realm="%s"'
.
$authzid_string
.
',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d'
,
$authcid
,
$challenge
[
'realm'
],
$challenge
[
'nonce'
],
$cnonce
,
$digest_uri
,
$response_value
,
$challenge
[
'maxbuf'
]);
}
else
{
return
sprintf
(
'username="%s"'
.
$authzid_string
.
',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d'
,
$authcid
,
$challenge
[
'nonce'
],
$cnonce
,
$digest_uri
,
$response_value
,
$challenge
[
'maxbuf'
]);
}
}
else
{
return
PEAR
::
raiseError
(
'Invalid digest challenge'
);
}
}
/**
* Parses and verifies the digest challenge*
*
* @param string $challenge The digest challenge
* @return array The parsed challenge as an assoc
* array in the form "directive => value".
* @access private
*/
function
_parseChallenge
(
$challenge
)
{
$tokens
=
array
();
while
(
preg_match
(
'/^([a-z-]+)=("[^"]+(?<!
\\\)
"|[^,]+)/i'
,
$challenge
,
$matches
))
{
// Ignore these as per rfc2831
if
(
$matches
[
1
]
==
'opaque'
OR
$matches
[
1
]
==
'domain'
)
{
$challenge
=
substr
(
$challenge
,
strlen
(
$matches
[
0
])
+
1
);
continue
;
}
// Allowed multiple "realm" and "auth-param"
if
(!
empty
(
$tokens
[
$matches
[
1
]])
AND
(
$matches
[
1
]
==
'realm'
OR
$matches
[
1
]
==
'auth-param'
))
{
if
(
is_array
(
$tokens
[
$matches
[
1
]]))
{
$tokens
[
$matches
[
1
]][]
=
preg_replace
(
'/^"(.*)"$/'
,
'
\\
1'
,
$matches
[
2
]);
}
else
{
$tokens
[
$matches
[
1
]]
=
array
(
$tokens
[
$matches
[
1
]],
preg_replace
(
'/^"(.*)"$/'
,
'
\\
1'
,
$matches
[
2
]));
}
// Any other multiple instance = failure
}
elseif
(!
empty
(
$tokens
[
$matches
[
1
]]))
{
$tokens
=
array
();
break
;
}
else
{
$tokens
[
$matches
[
1
]]
=
preg_replace
(
'/^"(.*)"$/'
,
'
\\
1'
,
$matches
[
2
]);
}
// Remove the just parsed directive from the challenge
$challenge
=
substr
(
$challenge
,
strlen
(
$matches
[
0
])
+
1
);
}
/**
* Defaults and required directives
*/
// Realm
if
(
empty
(
$tokens
[
'realm'
]))
{
$tokens
[
'realm'
]
=
""
;
}
// Maxbuf
if
(
empty
(
$tokens
[
'maxbuf'
]))
{
$tokens
[
'maxbuf'
]
=
65536
;
}
// Required: nonce, algorithm
if
(
empty
(
$tokens
[
'nonce'
])
OR
empty
(
$tokens
[
'algorithm'
]))
{
return
array
();
}
return
$tokens
;
}
/**
* Creates the response= part of the digest response
*
* @param string $authcid Authentication id (username)
* @param string $pass Password
* @param string $realm Realm as provided by the server
* @param string $nonce Nonce as provided by the server
* @param string $cnonce Client nonce
* @param string $digest_uri The digest-uri= value part of the response
* @param string $authzid Authorization id
* @return string The response= part of the digest response
* @access private
*/
function
_getResponseValue
(
$authcid
,
$pass
,
$realm
,
$nonce
,
$cnonce
,
$digest_uri
,
$authzid
=
''
)
{
if
(
$authzid
==
''
)
{
$A1
=
sprintf
(
'%s:%s:%s'
,
pack
(
'H32'
,
md5
(
sprintf
(
'%s:%s:%s'
,
$authcid
,
$realm
,
$pass
))),
$nonce
,
$cnonce
);
}
else
{
$A1
=
sprintf
(
'%s:%s:%s:%s'
,
pack
(
'H32'
,
md5
(
sprintf
(
'%s:%s:%s'
,
$authcid
,
$realm
,
$pass
))),
$nonce
,
$cnonce
,
$authzid
);
}
$A2
=
'AUTHENTICATE:'
.
$digest_uri
;
return
md5
(
sprintf
(
'%s:%s:00000001:%s:auth:%s'
,
md5
(
$A1
),
$nonce
,
$cnonce
,
md5
(
$A2
)));
}
/**
* Creates the client nonce for the response
*
* @return string The cnonce value
* @access private
*/
function
_getCnonce
()
{
if
(@
file_exists
(
'/dev/urandom'
)
&&
$fd
=
@
fopen
(
'/dev/urandom'
,
'r'
))
{
return
base64_encode
(
fread
(
$fd
,
32
));
}
elseif
(@
file_exists
(
'/dev/random'
)
&&
$fd
=
@
fopen
(
'/dev/random'
,
'r'
))
{
return
base64_encode
(
fread
(
$fd
,
32
));
}
else
{
$str
=
''
;
for
(
$i
=
0
;
$i
<
32
;
$i
++)
{
$str
.=
chr
(
mt_rand
(
0
,
255
));
}
return
base64_encode
(
$str
);
}
}
}
?>
File Metadata
Details
Attached
Mime Type
text/x-php
Expires
Thu, Apr 9, 1:23 PM (1 d, 2 h)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
515060
Default Alt Text
DigestMD5.php (8 KB)
Attached To
Mode
R3 roundcubemail
Attached
Detach File
Event Timeline
Log In to Comment