Total Complexity | 44 |
Total Lines | 255 |
Duplicated Lines | 0 % |
Changes | 2 | ||
Bugs | 0 | Features | 0 |
Complex classes like OCRA often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
While breaking up the class, it is a good idea to analyze how other classes use OCRA, and based on these observations, apply Extract Interface, too.
1 | <?php |
||
20 | class OCRA { |
||
21 | |||
22 | private function __construct() { |
||
23 | |||
24 | } |
||
25 | |||
26 | /** |
||
27 | * This method uses the hmac_hash function to provide the crypto |
||
28 | * algorithm. |
||
29 | * HMAC computes a Hashed Message Authentication Code with the |
||
30 | * crypto hash algorithm as a parameter. |
||
31 | * |
||
32 | * @param String crypto the crypto algorithm (sha1, sha256 or sha512) |
||
33 | * @param String keyBytes the bytes to use for the HMAC key |
||
34 | * @param String text the message or text to be authenticated. |
||
|
|||
35 | */ |
||
36 | private static function _hmac_sha1($crypto, |
||
37 | $keyBytes, |
||
38 | $text) |
||
39 | { |
||
40 | $hash = hash_hmac ($crypto, $text, $keyBytes); |
||
41 | return $hash; |
||
42 | } |
||
43 | |||
44 | /** |
||
45 | * This method converts HEX string to Byte[] |
||
46 | * |
||
47 | * @param String hex the HEX string |
||
48 | * |
||
49 | * @return String a string with raw bytes |
||
50 | */ |
||
51 | private static function _hexStr2Bytes($hex){ |
||
53 | } |
||
54 | |||
55 | |||
56 | /** |
||
57 | * This method generates an OCRA HOTP value for the given |
||
58 | * set of parameters. |
||
59 | * |
||
60 | * @param ocraSuite the OCRA Suite |
||
61 | * @param key the shared secret, HEX encoded |
||
62 | * @param counter the counter that changes |
||
63 | * on a per use basis, |
||
64 | * HEX encoded |
||
65 | * @param question the challenge question, HEX encoded |
||
66 | * @param password a password that can be used, |
||
67 | * HEX encoded |
||
68 | * @param sessionInformation |
||
69 | * Static information that identifies the |
||
70 | * current session, Hex encoded |
||
71 | * @param timeStamp a value that reflects a time |
||
72 | * |
||
73 | * @return A numeric String in base 10 that includes |
||
74 | * {@link truncationDigits} digits |
||
75 | */ |
||
76 | static function generateOCRA($ocraSuite, |
||
77 | $key, |
||
78 | $counter, |
||
79 | $question, |
||
80 | $password, |
||
81 | $sessionInformation, |
||
82 | $timeStamp) |
||
83 | { |
||
84 | $codeDigits = 0; |
||
85 | $crypto = ""; |
||
86 | $result = null; |
||
87 | $ocraSuiteLength = strlen($ocraSuite); |
||
88 | $counterLength = 0; |
||
89 | $questionLength = 0; |
||
90 | $passwordLength = 0; |
||
91 | |||
92 | $sessionInformationLength = 0; |
||
93 | $timeStampLength = 0; |
||
94 | |||
95 | // How many digits should we return |
||
96 | $components = explode(":", $ocraSuite); |
||
97 | $cryptoFunction = $components[1]; |
||
98 | $dataInput = strtolower($components[2]); // lower here so we can do case insensitive comparisons |
||
99 | |||
100 | if(stripos($cryptoFunction, "sha1")!==false) |
||
101 | $crypto = "sha1"; |
||
102 | if(stripos($cryptoFunction, "sha256")!==false) |
||
103 | $crypto = "sha256"; |
||
104 | if(stripos($cryptoFunction, "sha512")!==false) |
||
105 | $crypto = "sha512"; |
||
106 | |||
107 | $codeDigits = substr($cryptoFunction, strrpos($cryptoFunction, "-")+1); |
||
108 | |||
109 | // The size of the byte array message to be encrypted |
||
110 | // Counter |
||
111 | if($dataInput[0] == "c" ) { |
||
112 | // Fix the length of the HEX string |
||
113 | while(strlen($counter) < 16) |
||
114 | $counter = "0" . $counter; |
||
115 | $counterLength=8; |
||
116 | } |
||
117 | // Question |
||
118 | if($dataInput[0] == "q" || |
||
119 | stripos($dataInput, "-q")!==false) { |
||
120 | while(strlen($question) < 256) |
||
121 | $question = $question . "0"; |
||
122 | $questionLength=128; |
||
123 | } |
||
124 | |||
125 | // Password |
||
126 | if(stripos($dataInput, "psha1")!==false) { |
||
127 | while(strlen($password) < 40) |
||
128 | $password = "0" . $password; |
||
129 | $passwordLength=20; |
||
130 | } |
||
131 | |||
132 | if(stripos($dataInput, "psha256")!==false) { |
||
133 | while(strlen($password) < 64) |
||
134 | $password = "0" . $password; |
||
135 | $passwordLength=32; |
||
136 | } |
||
137 | |||
138 | if(stripos($dataInput, "psha512")!==false) { |
||
139 | while(strlen($password) < 128) |
||
140 | $password = "0" . $password; |
||
141 | $passwordLength=64; |
||
142 | } |
||
143 | |||
144 | // sessionInformation |
||
145 | if(stripos($dataInput, "s064") !==false) { |
||
146 | while(strlen($sessionInformation) < 128) |
||
147 | $sessionInformation = "0" . $sessionInformation; |
||
148 | |||
149 | $sessionInformationLength=64; |
||
150 | } else if(stripos($dataInput, "s128") !==false) { |
||
151 | while(strlen($sessionInformation) < 256) |
||
152 | $sessionInformation = "0" . $sessionInformation; |
||
153 | |||
154 | $sessionInformationLength=128; |
||
155 | } else if(stripos($dataInput, "s256") !==false) { |
||
156 | while(strlen($sessionInformation) < 512) |
||
157 | $sessionInformation = "0" . $sessionInformation; |
||
158 | |||
159 | $sessionInformationLength=256; |
||
160 | } else if(stripos($dataInput, "s512") !==false) { |
||
161 | while(strlen($sessionInformation) < 128) |
||
162 | $sessionInformation = "0" . $sessionInformation; |
||
163 | |||
164 | $sessionInformationLength=64; |
||
165 | } else if (stripos($dataInput, "s") !== false ) { |
||
166 | // deviation from spec. Officially 's' without a length indicator is not in the reference implementation. |
||
167 | // RFC is ambigious. However we have supported this in Tiqr since day 1, so we continue to support it. |
||
168 | while(strlen($sessionInformation) < 128) |
||
169 | $sessionInformation = "0" . $sessionInformation; |
||
170 | |||
171 | $sessionInformationLength=64; |
||
172 | } |
||
173 | |||
174 | |||
175 | |||
176 | // TimeStamp |
||
177 | if($dataInput[0] == "t" || |
||
178 | stripos($dataInput, "-t") !== false) { |
||
179 | while(strlen($timeStamp) < 16) |
||
180 | $timeStamp = "0" . $timeStamp; |
||
181 | $timeStampLength=8; |
||
182 | } |
||
183 | |||
184 | // Put the bytes of "ocraSuite" parameters into the message |
||
185 | |||
186 | $msg = array_fill(0,$ocraSuiteLength+$counterLength+$questionLength+$passwordLength+$sessionInformationLength+$timeStampLength+1, 0); |
||
187 | |||
188 | for($i=0;$i<strlen($ocraSuite);$i++) { |
||
189 | $msg[$i] = $ocraSuite[$i]; |
||
190 | } |
||
191 | |||
192 | // Delimiter |
||
193 | $msg[strlen($ocraSuite)] = self::_hexStr2Bytes("0"); |
||
194 | |||
195 | // Put the bytes of "Counter" to the message |
||
196 | // Input is HEX encoded |
||
197 | if($counterLength > 0 ) { |
||
198 | $bArray = self::_hexStr2Bytes($counter); |
||
199 | for ($i=0;$i<strlen($bArray);$i++) { |
||
200 | $msg [$i + $ocraSuiteLength + 1] = $bArray[$i]; |
||
201 | } |
||
202 | } |
||
203 | |||
204 | |||
205 | // Put the bytes of "question" to the message |
||
206 | // Input is text encoded |
||
207 | if($questionLength > 0 ) { |
||
208 | $bArray = self::_hexStr2Bytes($question); |
||
209 | for ($i=0;$i<strlen($bArray);$i++) { |
||
210 | $msg [$i + $ocraSuiteLength + 1 + $counterLength] = $bArray[$i]; |
||
211 | } |
||
212 | } |
||
213 | |||
214 | // Put the bytes of "password" to the message |
||
215 | // Input is HEX encoded |
||
216 | if($passwordLength > 0){ |
||
217 | $bArray = self::_hexStr2Bytes($password); |
||
218 | for ($i=0;$i<strlen($bArray);$i++) { |
||
219 | $msg [$i + $ocraSuiteLength + 1 + $counterLength + $questionLength] = $bArray[$i]; |
||
220 | } |
||
221 | } |
||
222 | |||
223 | // Put the bytes of "sessionInformation" to the message |
||
224 | // Input is text encoded |
||
225 | if($sessionInformationLength > 0 ){ |
||
226 | $bArray = self::_hexStr2Bytes($sessionInformation); |
||
227 | for ($i=0;$i<strlen($bArray);$i++) { |
||
228 | $msg [$i + $ocraSuiteLength + 1 + $counterLength + $questionLength + $passwordLength] = $bArray[$i]; |
||
229 | } |
||
230 | } |
||
231 | |||
232 | // Put the bytes of "time" to the message |
||
233 | // Input is text value of minutes |
||
234 | if($timeStampLength > 0){ |
||
235 | $bArray = self::_hexStr2Bytes($timeStamp); |
||
236 | for ($i=0;$i<strlen($bArray);$i++) { |
||
237 | $msg [$i + $ocraSuiteLength + 1 + $counterLength + $questionLength + $passwordLength + $sessionInformationLength] = $bArray[$i]; |
||
238 | } |
||
239 | } |
||
240 | |||
241 | $byteKey = self::_hexStr2Bytes($key); |
||
242 | |||
243 | $msg = implode("", $msg); |
||
244 | |||
245 | $hash = self::_hmac_sha1($crypto, $byteKey, $msg); |
||
246 | |||
247 | $result = self::_oath_truncate($hash, $codeDigits); |
||
248 | |||
249 | return $result; |
||
250 | } |
||
251 | |||
252 | /** |
||
253 | * Truncate a result to a certain length |
||
254 | */ |
||
255 | static function _oath_truncate($hash, $length = 6) |
||
275 | } |
||
276 | |||
278 |
The issue could also be caused by a filter entry in the build configuration. If the path has been excluded in your configuration, e.g.
excluded_paths: ["lib/*"]
, you can move it to the dependency path list as follows:For further information see https://scrutinizer-ci.com/docs/tools/php/php-scrutinizer/#list-dependency-paths