digestmd5.php

来自「开源邮件管理系统」· PHP 代码 · 共 199 行

PHP
199
字号
<?php// +-----------------------------------------------------------------------+ // | Copyright (c) 2002-2003 Richard Heyes                                 | // | All rights reserved.                                                  | // |                                                                       | // | Redistribution and use in source and binary forms, with or without    | // | modification, are permitted provided that the following conditions    | // | are met:                                                              | // |                                                                       | // | o Redistributions of source code must retain the above copyright      | // |   notice, this list of conditions and the following disclaimer.       | // | o Redistributions in binary form must reproduce the above copyright   | // |   notice, this list of conditions and the following disclaimer in the | // |   documentation and/or other materials provided with the distribution.| // | o The names of the authors may not be used to endorse or promote      | // |   products derived from this software without specific prior written  | // |   permission.                                                         | // |                                                                       | // | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS   | // | "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT     | // | LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR | // | A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT  | // | OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | // | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT      | // | LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | // | DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | // | THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT   | // | (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | // | OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.  | // |                                                                       | // +-----------------------------------------------------------------------+ // | Author: Richard Heyes <richard@php.net>                               | // +-----------------------------------------------------------------------+ // // $Id: DigestMD5.php 1322 2008-04-17 08:43:42Z alec $/*** Implmentation of DIGEST-MD5 SASL mechanism** @author  Richard Heyes <richard@php.net>* @access  public* @version 1.0* @package Auth_SASL*/require_once('Auth/SASL/Common.php');class Auth_SASL_DigestMD5 extends Auth_SASL_Common{    /**    * Provides the (main) client response for DIGEST-MD5    * requires a few extra parameters than the other    * mechanisms, which are unavoidable.    *     * @param  string $authcid   Authentication id (username)    * @param  string $pass      Password    * @param  string $challenge The digest challenge sent by the server    * @param  string $hostname  The hostname of the machine you're connecting to    * @param  string $service   The servicename (eg. imap, pop, acap etc)    * @param  string $authzid   Authorization id (username to proxy as)    * @return string            The digest response (NOT base64 encoded)    * @access public    */    function getResponse($authcid, $pass, $challenge, $hostname, $service, $authzid = '')    {        $challenge = $this->_parseChallenge($challenge);        $authzid_string = '';        if ($authzid != '') {            $authzid_string = ',authzid="' . $authzid . '"';         }        if (!empty($challenge)) {            $cnonce         = $this->_getCnonce();            $digest_uri     = sprintf('%s/%s', $service, $hostname);            $response_value = $this->_getResponseValue($authcid, $pass, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $authzid);            if ($challenge['realm']) {                return sprintf('username="%s",realm="%s"' . $authzid_string  .',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d', $authcid, $challenge['realm'], $challenge['nonce'], $cnonce, $digest_uri, $response_value, $challenge['maxbuf']);            } else {                return sprintf('username="%s"' . $authzid_string  . ',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d', $authcid, $challenge['nonce'], $cnonce, $digest_uri, $response_value, $challenge['maxbuf']);            }        } else {            return PEAR::raiseError('Invalid digest challenge');        }    }        /**    * Parses and verifies the digest challenge*    *    * @param  string $challenge The digest challenge    * @return array             The parsed challenge as an assoc    *                           array in the form "directive => value".    * @access private    */    function _parseChallenge($challenge)    {        $tokens = array();        while (preg_match('/^([a-z-]+)=("[^"]+(?<!\\\)"|[^,]+)/i', $challenge, $matches)) {            // Ignore these as per rfc2831            if ($matches[1] == 'opaque' OR $matches[1] == 'domain') {                $challenge = substr($challenge, strlen($matches[0]) + 1);                continue;            }            // Allowed multiple "realm" and "auth-param"            if (!empty($tokens[$matches[1]]) AND ($matches[1] == 'realm' OR $matches[1] == 'auth-param')) {                if (is_array($tokens[$matches[1]])) {                    $tokens[$matches[1]][] = preg_replace('/^"(.*)"$/', '\\1', $matches[2]);                } else {                    $tokens[$matches[1]] = array($tokens[$matches[1]], preg_replace('/^"(.*)"$/', '\\1', $matches[2]));                }            // Any other multiple instance = failure            } elseif (!empty($tokens[$matches[1]])) {                $tokens = array();                break;            } else {                $tokens[$matches[1]] = preg_replace('/^"(.*)"$/', '\\1', $matches[2]);            }            // Remove the just parsed directive from the challenge            $challenge = substr($challenge, strlen($matches[0]) + 1);        }        /**        * Defaults and required directives        */        // Realm        if (empty($tokens['realm'])) {            $tokens['realm'] = "";        }        // Maxbuf        if (empty($tokens['maxbuf'])) {            $tokens['maxbuf'] = 65536;        }        // Required: nonce, algorithm        if (empty($tokens['nonce']) OR empty($tokens['algorithm'])) {            return array();        }        return $tokens;    }    /**    * Creates the response= part of the digest response    *    * @param  string $authcid    Authentication id (username)    * @param  string $pass       Password    * @param  string $realm      Realm as provided by the server    * @param  string $nonce      Nonce as provided by the server    * @param  string $cnonce     Client nonce    * @param  string $digest_uri The digest-uri= value part of the response    * @param  string $authzid    Authorization id    * @return string             The response= part of the digest response    * @access private    */        function _getResponseValue($authcid, $pass, $realm, $nonce, $cnonce, $digest_uri, $authzid = '')    {        if ($authzid == '') {            $A1 = sprintf('%s:%s:%s', pack('H32', md5(sprintf('%s:%s:%s', $authcid, $realm, $pass))), $nonce, $cnonce);        } else {            $A1 = sprintf('%s:%s:%s:%s', pack('H32', md5(sprintf('%s:%s:%s', $authcid, $realm, $pass))), $nonce, $cnonce, $authzid);        }        $A2 = 'AUTHENTICATE:' . $digest_uri;        return md5(sprintf('%s:%s:00000001:%s:auth:%s', md5($A1), $nonce, $cnonce, md5($A2)));    }    /**    * Creates the client nonce for the response    *    * @return string  The cnonce value    * @access private    */    function _getCnonce()    {        if (file_exists('/dev/urandom') && $fd = @fopen('/dev/urandom', 'r')) {            return base64_encode(fread($fd, 32));        } elseif (file_exists('/dev/random') && $fd = @fopen('/dev/random', 'r')) {            return base64_encode(fread($fd, 32));        } else {            $str = '';            mt_srand((double)microtime()*10000000);            for ($i=0; $i<32; $i++) {                $str .= chr(mt_rand(0, 255));            }                        return base64_encode($str);        }    }}?>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?