⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 httpdigestauthlogichandler.java

📁 mina是以Java实现的一个开源的网络程序框架
💻 JAVA
字号:
/* *  Licensed to the Apache Software Foundation (ASF) under one *  or more contributor license agreements.  See the NOTICE file *  distributed with this work for additional information *  regarding copyright ownership.  The ASF licenses this file *  to you under the Apache License, Version 2.0 (the *  "License"); you may not use this file except in compliance *  with the License.  You may obtain a copy of the License at * *    http://www.apache.org/licenses/LICENSE-2.0 * *  Unless required by applicable law or agreed to in writing, *  software distributed under the License is distributed on an *  "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY *  KIND, either express or implied.  See the License for the *  specific language governing permissions and limitations *  under the License. * */package org.apache.mina.proxy.handlers.http.digest;import java.io.UnsupportedEncodingException;import java.security.NoSuchAlgorithmException;import java.security.SecureRandom;import java.util.Arrays;import java.util.HashMap;import java.util.List;import java.util.Map;import java.util.StringTokenizer;import org.apache.mina.core.filterchain.IoFilter.NextFilter;import org.apache.mina.proxy.ProxyAuthException;import org.apache.mina.proxy.handlers.http.AbstractAuthLogicHandler;import org.apache.mina.proxy.handlers.http.HttpProxyConstants;import org.apache.mina.proxy.handlers.http.HttpProxyRequest;import org.apache.mina.proxy.handlers.http.HttpProxyResponse;import org.apache.mina.proxy.session.ProxyIoSession;import org.apache.mina.proxy.utils.StringUtilities;import org.apache.mina.util.Base64;import org.slf4j.Logger;import org.slf4j.LoggerFactory;/** * HttpDigestAuthLogicHandler.java - HTTP Digest authentication mechanism logic handler.  *  * @author The Apache MINA Project (dev@mina.apache.org) * @version $Rev: 759669 $, $Date: 2009-03-29 13:25:44 +0200 (Sun, 29 Mar 2009) $ * @since MINA 2.0.0-M3 */public class HttpDigestAuthLogicHandler extends AbstractAuthLogicHandler {    private final static Logger logger = LoggerFactory            .getLogger(HttpDigestAuthLogicHandler.class);    /**     * The challenge directives provided by the server.     */    private HashMap<String, String> directives = null;    /**     * The response received to the last request.     */    private HttpProxyResponse response;    private static SecureRandom rnd;    static {        // Initialize secure random generator         try {            rnd = SecureRandom.getInstance("SHA1PRNG");        } catch (NoSuchAlgorithmException e) {            throw new RuntimeException(e);        }    }    public HttpDigestAuthLogicHandler(final ProxyIoSession proxyIoSession)            throws ProxyAuthException {        super(proxyIoSession);        if (request == null || !(request instanceof HttpProxyRequest)) {            throw new IllegalArgumentException(                    "request parameter should be a non null HttpProxyRequest instance");        }        ((HttpProxyRequest) request).checkRequiredProperties(				HttpProxyConstants.USER_PROPERTY,				HttpProxyConstants.PWD_PROPERTY);    }    @Override    public void doHandshake(NextFilter nextFilter) throws ProxyAuthException {        logger.debug(" doHandshake()");        if (step > 0 && directives == null) {            throw new ProxyAuthException(                    "Authentication challenge not received");        } else {            HttpProxyRequest req = (HttpProxyRequest) request;            Map<String, List<String>> headers = req.getHeaders() != null ? req                    .getHeaders() : new HashMap<String, List<String>>();            if (step > 0) {                logger.debug("  sending DIGEST challenge response");                HashMap<String, String> map = new HashMap<String, String>();                map.put("username", req.getProperties().get(                        HttpProxyConstants.USER_PROPERTY));                StringUtilities.copyDirective(directives, map, "realm");                StringUtilities.copyDirective(directives, map, "uri");                StringUtilities.copyDirective(directives, map, "opaque");                StringUtilities.copyDirective(directives, map, "nonce");                String algorithm = StringUtilities.copyDirective(directives,                        map, "algorithm");                // Check for a supported algorithm                if (algorithm != null && !"md5".equalsIgnoreCase(algorithm)                        && !"md5-sess".equalsIgnoreCase(algorithm)) {                    throw new ProxyAuthException(                            "Unknown algorithm required by server");                }                // Check for a supported qop                String qop = directives.get("qop");                if (qop != null) {                    StringTokenizer st = new StringTokenizer(qop, ",");                    String token = null;                    while (st.hasMoreTokens()) {                        String tk = st.nextToken();                        if ("auth".equalsIgnoreCase(token)) {                            break;                        } else {                            int pos = Arrays.binarySearch(                                    DigestUtilities.SUPPORTED_QOPS, tk);                            if (pos > -1) {                                token = tk;                            }                        }                    }                    if (token != null) {                        map.put("qop", token);                        byte[] nonce = new byte[8];                        rnd.nextBytes(nonce);                        try {                            String cnonce = new String(Base64                                    .encodeBase64(nonce), proxyIoSession                                    .getCharsetName());                            map.put("cnonce", cnonce);                        } catch (UnsupportedEncodingException e) {                            throw new ProxyAuthException(                                    "Unable to encode cnonce", e);                        }                    } else {                        throw new ProxyAuthException(                                "No supported qop option available");                    }                }                map.put("nc", "00000001");                map.put("uri", req.getHttpURI());                // Compute the response                try {                    map.put("response", DigestUtilities                            .computeResponseValue(proxyIoSession.getSession(),                                    map, req.getHttpVerb().toUpperCase(),                                    req.getProperties().get(                                            HttpProxyConstants.PWD_PROPERTY),                                    proxyIoSession.getCharsetName(), response                                            .getBody()));                } catch (Exception e) {                    throw new ProxyAuthException(                            "Digest response computing failed", e);                }                // Prepare the challenge response header and add it to the request we will send                StringBuilder sb = new StringBuilder("Digest ");                boolean addSeparator = false;                for (String key : map.keySet()) {                    if (addSeparator) {                        sb.append(", ");                    } else {                        addSeparator = true;                    }                    boolean quotedValue = !"qop".equals(key)                            && !"nc".equals(key);                    sb.append(key);                    if (quotedValue) {                        sb.append("=\"").append(map.get(key)).append('\"');                    } else {                        sb.append('=').append(map.get(key));                    }                }                StringUtilities.addValueToHeader(headers,                        "Proxy-Authorization", sb.toString(), true);            }            StringUtilities.addValueToHeader(headers, "Keep-Alive",                    HttpProxyConstants.DEFAULT_KEEP_ALIVE_TIME, true);            StringUtilities.addValueToHeader(headers, "Proxy-Connection",                    "keep-Alive", true);            req.setHeaders(headers);            writeRequest(nextFilter, req);            step++;        }    }    @Override    public void handleResponse(final HttpProxyResponse response)            throws ProxyAuthException {        this.response = response;        if (step == 0) {            if (response.getStatusCode() != 401                    && response.getStatusCode() != 407) {                throw new ProxyAuthException(                        "Received unexpected response code ("                                + response.getStatusLine() + ").");            }            // Header should be like this            // Proxy-Authenticate: Digest still_some_more_stuff            List<String> values = response.getHeaders().get(                    "Proxy-Authenticate");            String challengeResponse = null;            for (String s : values) {                if (s.startsWith("Digest")) {                    challengeResponse = s;                    break;                }            }            if (challengeResponse == null) {                throw new ProxyAuthException(                        "Server doesn't support digest authentication method !");            }            try {                directives = StringUtilities.parseDirectives(challengeResponse                        .substring(7).getBytes(proxyIoSession.getCharsetName()));            } catch (Exception e) {                throw new ProxyAuthException(                        "Parsing of server digest directives failed", e);            }            step = 1;        } else {            throw new ProxyAuthException("Received unexpected response code ("                    + response.getStatusLine() + ").");        }    }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -