Go to most recent revision | Blame | Compare with Previous | Last modification | View Log | RSS feed
<?php// +-----------------------------------------------------------------------+// | Copyright (c) 2002-2003 Richard Heyes |// | All rights reserved. |// | |// | Redistribution and use in source and binary forms, with or without |// | modification, are permitted provided that the following conditions |// | are met: |// | |// | o Redistributions of source code must retain the above copyright |// | notice, this list of conditions and the following disclaimer. |// | o Redistributions in binary form must reproduce the above copyright |// | notice, this list of conditions and the following disclaimer in the |// | documentation and/or other materials provided with the distribution.|// | o The names of the authors may not be used to endorse or promote |// | products derived from this software without specific prior written |// | permission. |// | |// | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |// | "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |// | LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |// | A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |// | OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |// | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |// | LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |// | DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |// | THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |// | (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |// | OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |// | |// +-----------------------------------------------------------------------+// | Author: Richard Heyes <richard@php.net> |// +-----------------------------------------------------------------------+//// $Id: DigestMD5.php,v 1.8 2006/03/22 05:20:11 amistry Exp $/*** Implmentation of DIGEST-MD5 SASL mechanism** @author Richard Heyes <richard@php.net>* @access public* @version 1.0* @package Auth_SASL*/require_once('Auth/SASL/Common.php');class Auth_SASL_DigestMD5 extends Auth_SASL_Common{/*** Provides the (main) client response for DIGEST-MD5* requires a few extra parameters than the other* mechanisms, which are unavoidable.** @param string $authcid Authentication id (username)* @param string $pass Password* @param string $challenge The digest challenge sent by the server* @param string $hostname The hostname of the machine you're connecting to* @param string $service The servicename (eg. imap, pop, acap etc)* @param string $authzid Authorization id (username to proxy as)* @return string The digest response (NOT base64 encoded)* @access public*/function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = ''){$challenge = $this->_parseChallenge($challenge);$authzid_string = '';if ($authzid != '') {$authzid_string = ',authzid="' . $authzid . '"';}if (!empty($challenge)) {$cnonce = $this->_getCnonce();$digest_uri = sprintf('%s/%s', $service, $hostname);$response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $authzid);if ($challenge['realm']) {return sprintf('username="%s",realm="%s"' . $authzid_string .',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $response_value, $challenge['maxbuf']);} else {return sprintf('username="%s"' . $authzid_string . ',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d', $authcid, $challenge['nonce'], $cnonce, $digest_uri, $response_value, $challenge['maxbuf']);}} else {return PEAR::raiseError('Invalid digest challenge');}}/*** Parses and verifies the digest challenge*** @param string $challenge The digest challenge* @return array The parsed challenge as an assoc* array in the form "directive => value".* @access private*/function _parseChallenge($challenge){$tokens = array();while (preg_match('/^([a-z-]+)=("[^"]+(?<!\\\)"|[^,]+)/i', $challenge, $matches)) {// Ignore these as per rfc2831if ($matches[1] == 'opaque' OR $matches[1] == 'domain') {$challenge = substr($challenge, strlen($matches[0]) + 1);continue;}// Allowed multiple "realm" and "auth-param"if (!empty($tokens[$matches[1]]) AND ($matches[1] == 'realm' OR $matches[1] == 'auth-param')) {if (is_array($tokens[$matches[1]])) {$tokens[$matches[1]][] = preg_replace('/^"(.*)"$/', '\\1', $matches[2]);} else {$tokens[$matches[1]] = array($tokens[$matches[1]], preg_replace('/^"(.*)"$/', '\\1', $matches[2]));}// Any other multiple instance = failure} elseif (!empty($tokens[$matches[1]])) {$tokens = array();break;} else {$tokens[$matches[1]] = preg_replace('/^"(.*)"$/', '\\1', $matches[2]);}// Remove the just parsed directive from the challenge$challenge = substr($challenge, strlen($matches[0]) + 1);}/*** Defaults and required directives*/// Realmif (empty($tokens['realm'])) {$tokens['realm'] = "";}// Maxbufif (empty($tokens['maxbuf'])) {$tokens['maxbuf'] = 65536;}// Required: nonce, algorithmif (empty($tokens['nonce']) OR empty($tokens['algorithm'])) {return array();}return $tokens;}/*** Creates the response= part of the digest response** @param string $authcid Authentication id (username)* @param string $pass Password* @param string $realm Realm as provided by the server* @param string $nonce Nonce as provided by the server* @param string $cnonce Client nonce* @param string $digest_uri The digest-uri= value part of the response* @param string $authzid Authorization id* @return string The response= part of the digest response* @access private*/function _getResponseValue($authcid, $pass, $realm, $nonce, $cnonce, $digest_uri, $authzid = ''){if ($authzid == '') {$A1 = sprintf('%s:%s:%s', pack('H32', md5(sprintf('%s:%s:%s', $authcid, $realm, $pass))), $nonce, $cnonce);} else {$A1 = sprintf('%s:%s:%s:%s', pack('H32', md5(sprintf('%s:%s:%s', $authcid, $realm, $pass))), $nonce, $cnonce, $authzid);}$A2 = 'AUTHENTICATE:' . $digest_uri;return md5(sprintf('%s:%s:00000001:%s:auth:%s', md5($A1), $nonce, $cnonce, md5($A2)));}/*** Creates the client nonce for the response** @return string The cnonce value* @access private*/function _getCnonce(){if (file_exists('/dev/urandom') && $fd = @fopen('/dev/urandom', 'r')) {return base64_encode(fread($fd, 32));} elseif (file_exists('/dev/random') && $fd = @fopen('/dev/random', 'r')) {return base64_encode(fread($fd, 32));} else {$str = '';mt_srand((double)microtime()*10000000);for ($i=0; $i<32; $i++) {$str .= chr(mt_rand(0, 255));}return base64_encode($str);}}}?>