@@ -2,295 +2,295 @@ |
||
2 | 2 | |
3 | 3 | class OATH_OCRAParser { |
4 | 4 | |
5 | - private $key = NULL; |
|
6 | - |
|
7 | - private $OCRASuite = NULL; |
|
8 | - |
|
9 | - private $OCRAVersion = NULL; |
|
10 | - |
|
11 | - private $CryptoFunctionType = NULL; |
|
12 | - private $CryptoFunctionHash = NULL; |
|
13 | - private $CryptoFunctionHashLength = NULL; |
|
14 | - private $CryptoFunctionTruncation = NULL; |
|
15 | - |
|
16 | - private $C = FALSE; |
|
17 | - private $Q = FALSE; |
|
18 | - private $QType = 'N'; |
|
19 | - private $QLength = 8; |
|
20 | - |
|
21 | - private $P = FALSE; |
|
22 | - private $PType = 'SHA1'; |
|
23 | - private $PLength = 20; |
|
24 | - |
|
25 | - private $S = FALSE; |
|
26 | - private $SLength = 64; |
|
27 | - |
|
28 | - private $T = FALSE; |
|
29 | - private $TLength = 60; // 1M |
|
30 | - private $TPeriods = array('H' => 3600, 'M' => 60, 'S' => 1); |
|
31 | - |
|
32 | - private $supportedHashFunctions = array('SHA1' => 20, 'SHA256' => 32, 'SHA512' => 64); |
|
33 | - |
|
34 | - |
|
35 | - public function __construct($ocraSuite) { |
|
36 | - $this->parseOCRASuite($ocraSuite); |
|
37 | - } |
|
38 | - |
|
39 | - /** |
|
40 | - * Inspired by https://github.com/bdauvergne/python-oath |
|
41 | - */ |
|
42 | - private function parseOCRASuite($ocraSuite) { |
|
43 | - if (!is_string($ocraSuite)) { |
|
44 | - throw new Exception('OCRASuite not in string format: ' . var_export($ocraSuite, TRUE)); |
|
45 | - } |
|
46 | - |
|
47 | - $ocraSuite = strtoupper($ocraSuite); |
|
48 | - $this->OCRASuite = $ocraSuite; |
|
49 | - |
|
50 | - $s = explode(':', $ocraSuite); |
|
51 | - if (count($s) != 3) { |
|
52 | - throw new Exception('Invalid OCRASuite format: ' . var_export($ocraSuite, TRUE)); |
|
53 | - } |
|
54 | - |
|
55 | - $algo = explode('-', $s[0]); |
|
56 | - if (count($algo) != 2) { |
|
57 | - throw new Exception('Invalid OCRA version: ' . var_export($s[0], TRUE)); |
|
58 | - } |
|
59 | - |
|
60 | - if ($algo[0] !== 'OCRA') { |
|
61 | - throw new Exception('Unsupported OCRA algorithm: ' . var_export($algo[0], TRUE)); |
|
62 | - } |
|
63 | - |
|
64 | - if ($algo[1] !== '1') { |
|
65 | - throw new Exception('Unsupported OCRA version: ' . var_export($algo[1], TRUE)); |
|
66 | - } |
|
67 | - $this->OCRAVersion = $algo[1]; |
|
68 | - |
|
69 | - $cf = explode('-', $s[1]); |
|
70 | - if (count($cf) != 3) { |
|
71 | - throw new Exception('Invalid OCRA suite crypto function: ' . var_export($s[1], TRUE)); |
|
72 | - } |
|
73 | - |
|
74 | - if ($cf[0] !== 'HOTP') { |
|
75 | - throw new Exception('Unsupported OCRA suite crypto function: ' . var_export($cf[0], TRUE)); |
|
76 | - } |
|
77 | - $this->CryptoFunctionType = $cf[0]; |
|
78 | - |
|
79 | - if (!array_key_exists($cf[1], $this->supportedHashFunctions)) { |
|
80 | - throw new Exception('Unsupported hash function in OCRA suite crypto function: ' . var_export($cf[1], TRUE)); |
|
81 | - } |
|
82 | - $this->CryptoFunctionHash = $cf[1]; |
|
83 | - $this->CryptoFunctionHashLength = $this->supportedHashFunctions[$cf[1]]; |
|
84 | - |
|
85 | - if (!preg_match('/^\d+$/', $cf[2]) || (($cf[2] < 4 || $cf[2] > 10) && $cf[2] != 0)) { |
|
86 | - throw new Exception('Invalid OCRA suite crypto function truncation length: ' . var_export($cf[2], TRUE)); |
|
87 | - } |
|
88 | - $this->CryptoFunctionTruncation = intval($cf[2]); |
|
89 | - |
|
90 | - $di = explode('-', $s[2]); |
|
91 | - if (count($cf) == 0) { |
|
92 | - throw new Exception('Invalid OCRA suite data input: ' . var_export($s[2], TRUE)); |
|
93 | - } |
|
94 | - |
|
95 | - $data_input = array(); |
|
96 | - foreach($di as $elem) { |
|
97 | - $letter = $elem[0]; |
|
98 | - if (array_key_exists($letter, $data_input)) { |
|
99 | - throw new Exception('Duplicate field in OCRA suite data input: ' . var_export($elem, TRUE)); |
|
100 | - } |
|
101 | - $data_input[$letter] = 1; |
|
102 | - |
|
103 | - if ($letter === 'C' && strlen($elem) == 1) { |
|
104 | - $this->C = TRUE; |
|
105 | - } elseif ($letter === 'Q') { |
|
106 | - if (strlen($elem) == 1) { |
|
107 | - $this->Q = TRUE; |
|
108 | - } elseif (preg_match('/^Q([AHN])(\d+)$/', $elem, $match)) { |
|
109 | - $q_len = intval($match[2]); |
|
110 | - if ($q_len < 4 || $q_len > 64) { |
|
111 | - throw new Exception('Invalid OCRA suite data input question length: ' . var_export($q_len, TRUE)); |
|
112 | - } |
|
113 | - $this->Q = TRUE; |
|
114 | - $this->QType = $match[1]; |
|
115 | - $this->QLength = $q_len; |
|
116 | - } else { |
|
117 | - throw new Exception('Invalid OCRA suite data input question: ' . var_export($elem, TRUE)); |
|
118 | - } |
|
119 | - } elseif ($letter === 'P') { |
|
120 | - if (strlen($elem) == 1) { |
|
121 | - $this->P = TRUE; |
|
122 | - } else { |
|
123 | - $p_algo = substr($elem, 1); |
|
124 | - if (!array_key_exists($p_algo, $this->supportedHashFunctions)) { |
|
125 | - throw new Exception('Unsupported OCRA suite PIN hash function: ' . var_export($elem, TRUE)); |
|
126 | - } |
|
127 | - $this->P = TRUE; |
|
128 | - $this->PType = $p_algo; |
|
129 | - $this->PLength = $this->supportedHashFunctions[$p_algo]; |
|
130 | - } |
|
131 | - } elseif ($letter === 'S') { |
|
132 | - if (strlen($elem) == 1) { |
|
133 | - $this->S = TRUE; |
|
134 | - } elseif (preg_match('/^S(\d+)$/', $elem, $match)) { |
|
135 | - $s_len = intval($match[1]); |
|
136 | - if ($s_len <= 0 || $s_len > 512) { |
|
137 | - throw new Exception('Invalid OCRA suite data input session information length: ' . var_export($s_len, TRUE)); |
|
138 | - } |
|
139 | - |
|
140 | - $this->S = TRUE; |
|
141 | - $this->SLength = $s_len; |
|
142 | - } else { |
|
143 | - throw new Exception('Invalid OCRA suite data input session information length: ' . var_export($elem, TRUE)); |
|
144 | - } |
|
145 | - } elseif ($letter === 'T') { |
|
146 | - if (strlen($elem) == 1) { |
|
147 | - $this->T = TRUE; |
|
148 | - } elseif (preg_match('/^T(\d+[HMS])+$/', $elem)) { |
|
149 | - preg_match_all('/(\d+)([HMS])/', $elem, $match); |
|
150 | - |
|
151 | - if (count($match[1]) !== count(array_unique($match[2]))) { |
|
152 | - throw new Exception('Duplicate definitions in OCRA suite data input timestamp: ' . var_export($elem, TRUE)); |
|
153 | - } |
|
154 | - |
|
155 | - $length = 0; |
|
156 | - for ($i = 0; $i < count($match[1]); $i++) { |
|
157 | - $length += intval($match[1][$i]) * $this->TPeriods[$match[2][$i]]; |
|
158 | - } |
|
159 | - if ($length <= 0) { |
|
160 | - throw new Exception('Invalid OCRA suite data input timestamp: ' . var_export($elem, TRUE)); |
|
161 | - } |
|
162 | - |
|
163 | - $this->T = TRUE; |
|
164 | - $this->TLength = $length; |
|
165 | - } else { |
|
166 | - throw new Exception('Invalid OCRA suite data input timestamp: ' . var_export($elem, TRUE)); |
|
167 | - } |
|
168 | - } else { |
|
169 | - throw new Exception('Unsupported OCRA suite data input field: ' . var_export($elem, TRUE)); |
|
170 | - } |
|
171 | - } |
|
172 | - |
|
173 | - if (!$this->Q) { |
|
174 | - throw new Exception('OCRA suite data input question not defined: ' . var_export($s[2], TRUE)); |
|
175 | - } |
|
176 | - } |
|
177 | - |
|
178 | - public function generateChallenge() { |
|
179 | - $q_length = $this->QLength; |
|
180 | - $q_type = $this->QType; |
|
181 | - |
|
182 | - $bytes = self::generateRandomBytes($q_length); |
|
183 | - |
|
184 | - switch($q_type) { |
|
185 | - case 'A': |
|
186 | - $challenge = base64_encode($bytes); |
|
187 | - $tr = implode("", unpack('H*', $bytes)); |
|
188 | - $challenge = rtrim(strtr($challenge, '+/', $tr), '='); |
|
189 | - break; |
|
190 | - case 'H': |
|
191 | - $challenge = implode("", unpack('H*', $bytes)); |
|
192 | - break; |
|
193 | - case 'N': |
|
194 | - $challenge = implode("", unpack('N*', $bytes)); |
|
195 | - break; |
|
196 | - default: |
|
197 | - throw new Exception('Unsupported OCRASuite challenge type: ' . var_export($q_type, TRUE)); |
|
198 | - break; |
|
199 | - } |
|
200 | - |
|
201 | - $challenge = substr($challenge, 0, $q_length); |
|
202 | - |
|
203 | - return $challenge; |
|
204 | - } |
|
205 | - |
|
206 | - |
|
207 | - public function generateSessionInformation() { |
|
208 | - if (!$this->S) { |
|
209 | - throw new Exception('Session information not defined in OCRASuite: ' . var_export($this->OCRASuite, TRUE)); |
|
210 | - } |
|
211 | - |
|
212 | - $s_length = $this->SLength; |
|
213 | - $bytes = self::generateRandomBytes($s_length); |
|
214 | - |
|
215 | - // The OCRA spec doesn't specify that the session data should be hexadecimal. |
|
216 | - // However the reference implementation in the RFC does treat it as hex. |
|
217 | - $session = bin2hex($bytes); |
|
5 | + private $key = NULL; |
|
6 | + |
|
7 | + private $OCRASuite = NULL; |
|
8 | + |
|
9 | + private $OCRAVersion = NULL; |
|
10 | + |
|
11 | + private $CryptoFunctionType = NULL; |
|
12 | + private $CryptoFunctionHash = NULL; |
|
13 | + private $CryptoFunctionHashLength = NULL; |
|
14 | + private $CryptoFunctionTruncation = NULL; |
|
15 | + |
|
16 | + private $C = FALSE; |
|
17 | + private $Q = FALSE; |
|
18 | + private $QType = 'N'; |
|
19 | + private $QLength = 8; |
|
20 | + |
|
21 | + private $P = FALSE; |
|
22 | + private $PType = 'SHA1'; |
|
23 | + private $PLength = 20; |
|
24 | + |
|
25 | + private $S = FALSE; |
|
26 | + private $SLength = 64; |
|
27 | + |
|
28 | + private $T = FALSE; |
|
29 | + private $TLength = 60; // 1M |
|
30 | + private $TPeriods = array('H' => 3600, 'M' => 60, 'S' => 1); |
|
31 | + |
|
32 | + private $supportedHashFunctions = array('SHA1' => 20, 'SHA256' => 32, 'SHA512' => 64); |
|
33 | + |
|
34 | + |
|
35 | + public function __construct($ocraSuite) { |
|
36 | + $this->parseOCRASuite($ocraSuite); |
|
37 | + } |
|
38 | + |
|
39 | + /** |
|
40 | + * Inspired by https://github.com/bdauvergne/python-oath |
|
41 | + */ |
|
42 | + private function parseOCRASuite($ocraSuite) { |
|
43 | + if (!is_string($ocraSuite)) { |
|
44 | + throw new Exception('OCRASuite not in string format: ' . var_export($ocraSuite, TRUE)); |
|
45 | + } |
|
46 | + |
|
47 | + $ocraSuite = strtoupper($ocraSuite); |
|
48 | + $this->OCRASuite = $ocraSuite; |
|
49 | + |
|
50 | + $s = explode(':', $ocraSuite); |
|
51 | + if (count($s) != 3) { |
|
52 | + throw new Exception('Invalid OCRASuite format: ' . var_export($ocraSuite, TRUE)); |
|
53 | + } |
|
54 | + |
|
55 | + $algo = explode('-', $s[0]); |
|
56 | + if (count($algo) != 2) { |
|
57 | + throw new Exception('Invalid OCRA version: ' . var_export($s[0], TRUE)); |
|
58 | + } |
|
59 | + |
|
60 | + if ($algo[0] !== 'OCRA') { |
|
61 | + throw new Exception('Unsupported OCRA algorithm: ' . var_export($algo[0], TRUE)); |
|
62 | + } |
|
63 | + |
|
64 | + if ($algo[1] !== '1') { |
|
65 | + throw new Exception('Unsupported OCRA version: ' . var_export($algo[1], TRUE)); |
|
66 | + } |
|
67 | + $this->OCRAVersion = $algo[1]; |
|
68 | + |
|
69 | + $cf = explode('-', $s[1]); |
|
70 | + if (count($cf) != 3) { |
|
71 | + throw new Exception('Invalid OCRA suite crypto function: ' . var_export($s[1], TRUE)); |
|
72 | + } |
|
73 | + |
|
74 | + if ($cf[0] !== 'HOTP') { |
|
75 | + throw new Exception('Unsupported OCRA suite crypto function: ' . var_export($cf[0], TRUE)); |
|
76 | + } |
|
77 | + $this->CryptoFunctionType = $cf[0]; |
|
78 | + |
|
79 | + if (!array_key_exists($cf[1], $this->supportedHashFunctions)) { |
|
80 | + throw new Exception('Unsupported hash function in OCRA suite crypto function: ' . var_export($cf[1], TRUE)); |
|
81 | + } |
|
82 | + $this->CryptoFunctionHash = $cf[1]; |
|
83 | + $this->CryptoFunctionHashLength = $this->supportedHashFunctions[$cf[1]]; |
|
84 | + |
|
85 | + if (!preg_match('/^\d+$/', $cf[2]) || (($cf[2] < 4 || $cf[2] > 10) && $cf[2] != 0)) { |
|
86 | + throw new Exception('Invalid OCRA suite crypto function truncation length: ' . var_export($cf[2], TRUE)); |
|
87 | + } |
|
88 | + $this->CryptoFunctionTruncation = intval($cf[2]); |
|
89 | + |
|
90 | + $di = explode('-', $s[2]); |
|
91 | + if (count($cf) == 0) { |
|
92 | + throw new Exception('Invalid OCRA suite data input: ' . var_export($s[2], TRUE)); |
|
93 | + } |
|
94 | + |
|
95 | + $data_input = array(); |
|
96 | + foreach($di as $elem) { |
|
97 | + $letter = $elem[0]; |
|
98 | + if (array_key_exists($letter, $data_input)) { |
|
99 | + throw new Exception('Duplicate field in OCRA suite data input: ' . var_export($elem, TRUE)); |
|
100 | + } |
|
101 | + $data_input[$letter] = 1; |
|
102 | + |
|
103 | + if ($letter === 'C' && strlen($elem) == 1) { |
|
104 | + $this->C = TRUE; |
|
105 | + } elseif ($letter === 'Q') { |
|
106 | + if (strlen($elem) == 1) { |
|
107 | + $this->Q = TRUE; |
|
108 | + } elseif (preg_match('/^Q([AHN])(\d+)$/', $elem, $match)) { |
|
109 | + $q_len = intval($match[2]); |
|
110 | + if ($q_len < 4 || $q_len > 64) { |
|
111 | + throw new Exception('Invalid OCRA suite data input question length: ' . var_export($q_len, TRUE)); |
|
112 | + } |
|
113 | + $this->Q = TRUE; |
|
114 | + $this->QType = $match[1]; |
|
115 | + $this->QLength = $q_len; |
|
116 | + } else { |
|
117 | + throw new Exception('Invalid OCRA suite data input question: ' . var_export($elem, TRUE)); |
|
118 | + } |
|
119 | + } elseif ($letter === 'P') { |
|
120 | + if (strlen($elem) == 1) { |
|
121 | + $this->P = TRUE; |
|
122 | + } else { |
|
123 | + $p_algo = substr($elem, 1); |
|
124 | + if (!array_key_exists($p_algo, $this->supportedHashFunctions)) { |
|
125 | + throw new Exception('Unsupported OCRA suite PIN hash function: ' . var_export($elem, TRUE)); |
|
126 | + } |
|
127 | + $this->P = TRUE; |
|
128 | + $this->PType = $p_algo; |
|
129 | + $this->PLength = $this->supportedHashFunctions[$p_algo]; |
|
130 | + } |
|
131 | + } elseif ($letter === 'S') { |
|
132 | + if (strlen($elem) == 1) { |
|
133 | + $this->S = TRUE; |
|
134 | + } elseif (preg_match('/^S(\d+)$/', $elem, $match)) { |
|
135 | + $s_len = intval($match[1]); |
|
136 | + if ($s_len <= 0 || $s_len > 512) { |
|
137 | + throw new Exception('Invalid OCRA suite data input session information length: ' . var_export($s_len, TRUE)); |
|
138 | + } |
|
139 | + |
|
140 | + $this->S = TRUE; |
|
141 | + $this->SLength = $s_len; |
|
142 | + } else { |
|
143 | + throw new Exception('Invalid OCRA suite data input session information length: ' . var_export($elem, TRUE)); |
|
144 | + } |
|
145 | + } elseif ($letter === 'T') { |
|
146 | + if (strlen($elem) == 1) { |
|
147 | + $this->T = TRUE; |
|
148 | + } elseif (preg_match('/^T(\d+[HMS])+$/', $elem)) { |
|
149 | + preg_match_all('/(\d+)([HMS])/', $elem, $match); |
|
150 | + |
|
151 | + if (count($match[1]) !== count(array_unique($match[2]))) { |
|
152 | + throw new Exception('Duplicate definitions in OCRA suite data input timestamp: ' . var_export($elem, TRUE)); |
|
153 | + } |
|
154 | + |
|
155 | + $length = 0; |
|
156 | + for ($i = 0; $i < count($match[1]); $i++) { |
|
157 | + $length += intval($match[1][$i]) * $this->TPeriods[$match[2][$i]]; |
|
158 | + } |
|
159 | + if ($length <= 0) { |
|
160 | + throw new Exception('Invalid OCRA suite data input timestamp: ' . var_export($elem, TRUE)); |
|
161 | + } |
|
162 | + |
|
163 | + $this->T = TRUE; |
|
164 | + $this->TLength = $length; |
|
165 | + } else { |
|
166 | + throw new Exception('Invalid OCRA suite data input timestamp: ' . var_export($elem, TRUE)); |
|
167 | + } |
|
168 | + } else { |
|
169 | + throw new Exception('Unsupported OCRA suite data input field: ' . var_export($elem, TRUE)); |
|
170 | + } |
|
171 | + } |
|
172 | + |
|
173 | + if (!$this->Q) { |
|
174 | + throw new Exception('OCRA suite data input question not defined: ' . var_export($s[2], TRUE)); |
|
175 | + } |
|
176 | + } |
|
177 | + |
|
178 | + public function generateChallenge() { |
|
179 | + $q_length = $this->QLength; |
|
180 | + $q_type = $this->QType; |
|
181 | + |
|
182 | + $bytes = self::generateRandomBytes($q_length); |
|
183 | + |
|
184 | + switch($q_type) { |
|
185 | + case 'A': |
|
186 | + $challenge = base64_encode($bytes); |
|
187 | + $tr = implode("", unpack('H*', $bytes)); |
|
188 | + $challenge = rtrim(strtr($challenge, '+/', $tr), '='); |
|
189 | + break; |
|
190 | + case 'H': |
|
191 | + $challenge = implode("", unpack('H*', $bytes)); |
|
192 | + break; |
|
193 | + case 'N': |
|
194 | + $challenge = implode("", unpack('N*', $bytes)); |
|
195 | + break; |
|
196 | + default: |
|
197 | + throw new Exception('Unsupported OCRASuite challenge type: ' . var_export($q_type, TRUE)); |
|
198 | + break; |
|
199 | + } |
|
200 | + |
|
201 | + $challenge = substr($challenge, 0, $q_length); |
|
202 | + |
|
203 | + return $challenge; |
|
204 | + } |
|
205 | + |
|
206 | + |
|
207 | + public function generateSessionInformation() { |
|
208 | + if (!$this->S) { |
|
209 | + throw new Exception('Session information not defined in OCRASuite: ' . var_export($this->OCRASuite, TRUE)); |
|
210 | + } |
|
211 | + |
|
212 | + $s_length = $this->SLength; |
|
213 | + $bytes = self::generateRandomBytes($s_length); |
|
214 | + |
|
215 | + // The OCRA spec doesn't specify that the session data should be hexadecimal. |
|
216 | + // However the reference implementation in the RFC does treat it as hex. |
|
217 | + $session = bin2hex($bytes); |
|
218 | 218 | |
219 | - $session = substr($session, 0, $s_length); |
|
219 | + $session = substr($session, 0, $s_length); |
|
220 | 220 | |
221 | - return $session; |
|
222 | - } |
|
223 | - |
|
224 | - /** |
|
225 | - * Borrowed from SimpleSAMLPHP http://simplesamlphp.org/ |
|
226 | - */ |
|
227 | - public static function generateRandomBytesMTrand($length) { |
|
228 | - |
|
229 | - /* Use mt_rand to generate $length random bytes. */ |
|
230 | - $data = ''; |
|
231 | - for($i = 0; $i < $length; $i++) { |
|
232 | - $data .= chr(mt_rand(0, 255)); |
|
233 | - } |
|
234 | - |
|
235 | - return $data; |
|
236 | - } |
|
237 | - |
|
238 | - |
|
239 | - /** |
|
240 | - * Borrowed from SimpleSAMLPHP http://simplesamlphp.org/ |
|
241 | - */ |
|
242 | - public static function generateRandomBytes($length, $fallback = TRUE) { |
|
243 | - static $fp = NULL; |
|
244 | - |
|
245 | - if (function_exists('openssl_random_pseudo_bytes')) { |
|
246 | - return openssl_random_pseudo_bytes($length); |
|
247 | - } |
|
248 | - |
|
249 | - if($fp === NULL) { |
|
250 | - if (@file_exists('/dev/urandom')) { |
|
251 | - $fp = @fopen('/dev/urandom', 'rb'); |
|
252 | - } else { |
|
253 | - $fp = FALSE; |
|
254 | - } |
|
255 | - } |
|
256 | - |
|
257 | - if($fp !== FALSE) { |
|
258 | - /* Read random bytes from /dev/urandom. */ |
|
259 | - $data = fread($fp, $length); |
|
260 | - if($data === FALSE) { |
|
261 | - throw new Exception('Error reading random data.'); |
|
262 | - } |
|
263 | - if(strlen($data) != $length) { |
|
264 | - if ($fallback) { |
|
265 | - $data = self::generateRandomBytesMTrand($length); |
|
266 | - } else { |
|
267 | - throw new Exception('Did not get requested number of bytes from random source. Requested (' . $length . ') got (' . strlen($data) . ')'); |
|
268 | - } |
|
269 | - } |
|
270 | - } else { |
|
271 | - /* Use mt_rand to generate $length random bytes. */ |
|
272 | - $data = self::generateRandomBytesMTrand($length); |
|
273 | - } |
|
274 | - |
|
275 | - return $data; |
|
276 | - } |
|
277 | - |
|
278 | - |
|
279 | - /** |
|
280 | - * Constant time string comparison, see http://codahale.com/a-lesson-in-timing-attacks/ |
|
281 | - */ |
|
282 | - public static function constEqual($s1, $s2) { |
|
283 | - if (strlen($s1) != strlen($s2)) { |
|
284 | - return FALSE; |
|
285 | - } |
|
286 | - |
|
287 | - $result = TRUE; |
|
288 | - $length = strlen($s1); |
|
289 | - for ($i = 0; $i < $length; $i++) { |
|
290 | - $result &= ($s1[$i] == $s2[$i]); |
|
291 | - } |
|
292 | - |
|
293 | - return (boolean)$result; |
|
294 | - } |
|
221 | + return $session; |
|
222 | + } |
|
223 | + |
|
224 | + /** |
|
225 | + * Borrowed from SimpleSAMLPHP http://simplesamlphp.org/ |
|
226 | + */ |
|
227 | + public static function generateRandomBytesMTrand($length) { |
|
228 | + |
|
229 | + /* Use mt_rand to generate $length random bytes. */ |
|
230 | + $data = ''; |
|
231 | + for($i = 0; $i < $length; $i++) { |
|
232 | + $data .= chr(mt_rand(0, 255)); |
|
233 | + } |
|
234 | + |
|
235 | + return $data; |
|
236 | + } |
|
237 | + |
|
238 | + |
|
239 | + /** |
|
240 | + * Borrowed from SimpleSAMLPHP http://simplesamlphp.org/ |
|
241 | + */ |
|
242 | + public static function generateRandomBytes($length, $fallback = TRUE) { |
|
243 | + static $fp = NULL; |
|
244 | + |
|
245 | + if (function_exists('openssl_random_pseudo_bytes')) { |
|
246 | + return openssl_random_pseudo_bytes($length); |
|
247 | + } |
|
248 | + |
|
249 | + if($fp === NULL) { |
|
250 | + if (@file_exists('/dev/urandom')) { |
|
251 | + $fp = @fopen('/dev/urandom', 'rb'); |
|
252 | + } else { |
|
253 | + $fp = FALSE; |
|
254 | + } |
|
255 | + } |
|
256 | + |
|
257 | + if($fp !== FALSE) { |
|
258 | + /* Read random bytes from /dev/urandom. */ |
|
259 | + $data = fread($fp, $length); |
|
260 | + if($data === FALSE) { |
|
261 | + throw new Exception('Error reading random data.'); |
|
262 | + } |
|
263 | + if(strlen($data) != $length) { |
|
264 | + if ($fallback) { |
|
265 | + $data = self::generateRandomBytesMTrand($length); |
|
266 | + } else { |
|
267 | + throw new Exception('Did not get requested number of bytes from random source. Requested (' . $length . ') got (' . strlen($data) . ')'); |
|
268 | + } |
|
269 | + } |
|
270 | + } else { |
|
271 | + /* Use mt_rand to generate $length random bytes. */ |
|
272 | + $data = self::generateRandomBytesMTrand($length); |
|
273 | + } |
|
274 | + |
|
275 | + return $data; |
|
276 | + } |
|
277 | + |
|
278 | + |
|
279 | + /** |
|
280 | + * Constant time string comparison, see http://codahale.com/a-lesson-in-timing-attacks/ |
|
281 | + */ |
|
282 | + public static function constEqual($s1, $s2) { |
|
283 | + if (strlen($s1) != strlen($s2)) { |
|
284 | + return FALSE; |
|
285 | + } |
|
286 | + |
|
287 | + $result = TRUE; |
|
288 | + $length = strlen($s1); |
|
289 | + for ($i = 0; $i < $length; $i++) { |
|
290 | + $result &= ($s1[$i] == $s2[$i]); |
|
291 | + } |
|
292 | + |
|
293 | + return (boolean)$result; |
|
294 | + } |
|
295 | 295 | |
296 | 296 | } |
@@ -41,7 +41,7 @@ discard block |
||
41 | 41 | */ |
42 | 42 | private function parseOCRASuite($ocraSuite) { |
43 | 43 | if (!is_string($ocraSuite)) { |
44 | - throw new Exception('OCRASuite not in string format: ' . var_export($ocraSuite, TRUE)); |
|
44 | + throw new Exception('OCRASuite not in string format: '.var_export($ocraSuite, TRUE)); |
|
45 | 45 | } |
46 | 46 | |
47 | 47 | $ocraSuite = strtoupper($ocraSuite); |
@@ -49,54 +49,54 @@ discard block |
||
49 | 49 | |
50 | 50 | $s = explode(':', $ocraSuite); |
51 | 51 | if (count($s) != 3) { |
52 | - throw new Exception('Invalid OCRASuite format: ' . var_export($ocraSuite, TRUE)); |
|
52 | + throw new Exception('Invalid OCRASuite format: '.var_export($ocraSuite, TRUE)); |
|
53 | 53 | } |
54 | 54 | |
55 | 55 | $algo = explode('-', $s[0]); |
56 | 56 | if (count($algo) != 2) { |
57 | - throw new Exception('Invalid OCRA version: ' . var_export($s[0], TRUE)); |
|
57 | + throw new Exception('Invalid OCRA version: '.var_export($s[0], TRUE)); |
|
58 | 58 | } |
59 | 59 | |
60 | 60 | if ($algo[0] !== 'OCRA') { |
61 | - throw new Exception('Unsupported OCRA algorithm: ' . var_export($algo[0], TRUE)); |
|
61 | + throw new Exception('Unsupported OCRA algorithm: '.var_export($algo[0], TRUE)); |
|
62 | 62 | } |
63 | 63 | |
64 | 64 | if ($algo[1] !== '1') { |
65 | - throw new Exception('Unsupported OCRA version: ' . var_export($algo[1], TRUE)); |
|
65 | + throw new Exception('Unsupported OCRA version: '.var_export($algo[1], TRUE)); |
|
66 | 66 | } |
67 | 67 | $this->OCRAVersion = $algo[1]; |
68 | 68 | |
69 | 69 | $cf = explode('-', $s[1]); |
70 | 70 | if (count($cf) != 3) { |
71 | - throw new Exception('Invalid OCRA suite crypto function: ' . var_export($s[1], TRUE)); |
|
71 | + throw new Exception('Invalid OCRA suite crypto function: '.var_export($s[1], TRUE)); |
|
72 | 72 | } |
73 | 73 | |
74 | 74 | if ($cf[0] !== 'HOTP') { |
75 | - throw new Exception('Unsupported OCRA suite crypto function: ' . var_export($cf[0], TRUE)); |
|
75 | + throw new Exception('Unsupported OCRA suite crypto function: '.var_export($cf[0], TRUE)); |
|
76 | 76 | } |
77 | 77 | $this->CryptoFunctionType = $cf[0]; |
78 | 78 | |
79 | 79 | if (!array_key_exists($cf[1], $this->supportedHashFunctions)) { |
80 | - throw new Exception('Unsupported hash function in OCRA suite crypto function: ' . var_export($cf[1], TRUE)); |
|
80 | + throw new Exception('Unsupported hash function in OCRA suite crypto function: '.var_export($cf[1], TRUE)); |
|
81 | 81 | } |
82 | 82 | $this->CryptoFunctionHash = $cf[1]; |
83 | 83 | $this->CryptoFunctionHashLength = $this->supportedHashFunctions[$cf[1]]; |
84 | 84 | |
85 | 85 | if (!preg_match('/^\d+$/', $cf[2]) || (($cf[2] < 4 || $cf[2] > 10) && $cf[2] != 0)) { |
86 | - throw new Exception('Invalid OCRA suite crypto function truncation length: ' . var_export($cf[2], TRUE)); |
|
86 | + throw new Exception('Invalid OCRA suite crypto function truncation length: '.var_export($cf[2], TRUE)); |
|
87 | 87 | } |
88 | 88 | $this->CryptoFunctionTruncation = intval($cf[2]); |
89 | 89 | |
90 | 90 | $di = explode('-', $s[2]); |
91 | 91 | if (count($cf) == 0) { |
92 | - throw new Exception('Invalid OCRA suite data input: ' . var_export($s[2], TRUE)); |
|
92 | + throw new Exception('Invalid OCRA suite data input: '.var_export($s[2], TRUE)); |
|
93 | 93 | } |
94 | 94 | |
95 | 95 | $data_input = array(); |
96 | - foreach($di as $elem) { |
|
96 | + foreach ($di as $elem) { |
|
97 | 97 | $letter = $elem[0]; |
98 | 98 | if (array_key_exists($letter, $data_input)) { |
99 | - throw new Exception('Duplicate field in OCRA suite data input: ' . var_export($elem, TRUE)); |
|
99 | + throw new Exception('Duplicate field in OCRA suite data input: '.var_export($elem, TRUE)); |
|
100 | 100 | } |
101 | 101 | $data_input[$letter] = 1; |
102 | 102 | |
@@ -108,13 +108,13 @@ discard block |
||
108 | 108 | } elseif (preg_match('/^Q([AHN])(\d+)$/', $elem, $match)) { |
109 | 109 | $q_len = intval($match[2]); |
110 | 110 | if ($q_len < 4 || $q_len > 64) { |
111 | - throw new Exception('Invalid OCRA suite data input question length: ' . var_export($q_len, TRUE)); |
|
111 | + throw new Exception('Invalid OCRA suite data input question length: '.var_export($q_len, TRUE)); |
|
112 | 112 | } |
113 | 113 | $this->Q = TRUE; |
114 | 114 | $this->QType = $match[1]; |
115 | 115 | $this->QLength = $q_len; |
116 | 116 | } else { |
117 | - throw new Exception('Invalid OCRA suite data input question: ' . var_export($elem, TRUE)); |
|
117 | + throw new Exception('Invalid OCRA suite data input question: '.var_export($elem, TRUE)); |
|
118 | 118 | } |
119 | 119 | } elseif ($letter === 'P') { |
120 | 120 | if (strlen($elem) == 1) { |
@@ -122,7 +122,7 @@ discard block |
||
122 | 122 | } else { |
123 | 123 | $p_algo = substr($elem, 1); |
124 | 124 | if (!array_key_exists($p_algo, $this->supportedHashFunctions)) { |
125 | - throw new Exception('Unsupported OCRA suite PIN hash function: ' . var_export($elem, TRUE)); |
|
125 | + throw new Exception('Unsupported OCRA suite PIN hash function: '.var_export($elem, TRUE)); |
|
126 | 126 | } |
127 | 127 | $this->P = TRUE; |
128 | 128 | $this->PType = $p_algo; |
@@ -134,13 +134,13 @@ discard block |
||
134 | 134 | } elseif (preg_match('/^S(\d+)$/', $elem, $match)) { |
135 | 135 | $s_len = intval($match[1]); |
136 | 136 | if ($s_len <= 0 || $s_len > 512) { |
137 | - throw new Exception('Invalid OCRA suite data input session information length: ' . var_export($s_len, TRUE)); |
|
137 | + throw new Exception('Invalid OCRA suite data input session information length: '.var_export($s_len, TRUE)); |
|
138 | 138 | } |
139 | 139 | |
140 | 140 | $this->S = TRUE; |
141 | 141 | $this->SLength = $s_len; |
142 | 142 | } else { |
143 | - throw new Exception('Invalid OCRA suite data input session information length: ' . var_export($elem, TRUE)); |
|
143 | + throw new Exception('Invalid OCRA suite data input session information length: '.var_export($elem, TRUE)); |
|
144 | 144 | } |
145 | 145 | } elseif ($letter === 'T') { |
146 | 146 | if (strlen($elem) == 1) { |
@@ -149,7 +149,7 @@ discard block |
||
149 | 149 | preg_match_all('/(\d+)([HMS])/', $elem, $match); |
150 | 150 | |
151 | 151 | if (count($match[1]) !== count(array_unique($match[2]))) { |
152 | - throw new Exception('Duplicate definitions in OCRA suite data input timestamp: ' . var_export($elem, TRUE)); |
|
152 | + throw new Exception('Duplicate definitions in OCRA suite data input timestamp: '.var_export($elem, TRUE)); |
|
153 | 153 | } |
154 | 154 | |
155 | 155 | $length = 0; |
@@ -157,21 +157,21 @@ discard block |
||
157 | 157 | $length += intval($match[1][$i]) * $this->TPeriods[$match[2][$i]]; |
158 | 158 | } |
159 | 159 | if ($length <= 0) { |
160 | - throw new Exception('Invalid OCRA suite data input timestamp: ' . var_export($elem, TRUE)); |
|
160 | + throw new Exception('Invalid OCRA suite data input timestamp: '.var_export($elem, TRUE)); |
|
161 | 161 | } |
162 | 162 | |
163 | 163 | $this->T = TRUE; |
164 | 164 | $this->TLength = $length; |
165 | 165 | } else { |
166 | - throw new Exception('Invalid OCRA suite data input timestamp: ' . var_export($elem, TRUE)); |
|
166 | + throw new Exception('Invalid OCRA suite data input timestamp: '.var_export($elem, TRUE)); |
|
167 | 167 | } |
168 | 168 | } else { |
169 | - throw new Exception('Unsupported OCRA suite data input field: ' . var_export($elem, TRUE)); |
|
169 | + throw new Exception('Unsupported OCRA suite data input field: '.var_export($elem, TRUE)); |
|
170 | 170 | } |
171 | 171 | } |
172 | 172 | |
173 | 173 | if (!$this->Q) { |
174 | - throw new Exception('OCRA suite data input question not defined: ' . var_export($s[2], TRUE)); |
|
174 | + throw new Exception('OCRA suite data input question not defined: '.var_export($s[2], TRUE)); |
|
175 | 175 | } |
176 | 176 | } |
177 | 177 | |
@@ -181,7 +181,7 @@ discard block |
||
181 | 181 | |
182 | 182 | $bytes = self::generateRandomBytes($q_length); |
183 | 183 | |
184 | - switch($q_type) { |
|
184 | + switch ($q_type) { |
|
185 | 185 | case 'A': |
186 | 186 | $challenge = base64_encode($bytes); |
187 | 187 | $tr = implode("", unpack('H*', $bytes)); |
@@ -194,7 +194,7 @@ discard block |
||
194 | 194 | $challenge = implode("", unpack('N*', $bytes)); |
195 | 195 | break; |
196 | 196 | default: |
197 | - throw new Exception('Unsupported OCRASuite challenge type: ' . var_export($q_type, TRUE)); |
|
197 | + throw new Exception('Unsupported OCRASuite challenge type: '.var_export($q_type, TRUE)); |
|
198 | 198 | break; |
199 | 199 | } |
200 | 200 | |
@@ -206,7 +206,7 @@ discard block |
||
206 | 206 | |
207 | 207 | public function generateSessionInformation() { |
208 | 208 | if (!$this->S) { |
209 | - throw new Exception('Session information not defined in OCRASuite: ' . var_export($this->OCRASuite, TRUE)); |
|
209 | + throw new Exception('Session information not defined in OCRASuite: '.var_export($this->OCRASuite, TRUE)); |
|
210 | 210 | } |
211 | 211 | |
212 | 212 | $s_length = $this->SLength; |
@@ -228,7 +228,7 @@ discard block |
||
228 | 228 | |
229 | 229 | /* Use mt_rand to generate $length random bytes. */ |
230 | 230 | $data = ''; |
231 | - for($i = 0; $i < $length; $i++) { |
|
231 | + for ($i = 0; $i < $length; $i++) { |
|
232 | 232 | $data .= chr(mt_rand(0, 255)); |
233 | 233 | } |
234 | 234 | |
@@ -246,7 +246,7 @@ discard block |
||
246 | 246 | return openssl_random_pseudo_bytes($length); |
247 | 247 | } |
248 | 248 | |
249 | - if($fp === NULL) { |
|
249 | + if ($fp === NULL) { |
|
250 | 250 | if (@file_exists('/dev/urandom')) { |
251 | 251 | $fp = @fopen('/dev/urandom', 'rb'); |
252 | 252 | } else { |
@@ -254,17 +254,17 @@ discard block |
||
254 | 254 | } |
255 | 255 | } |
256 | 256 | |
257 | - if($fp !== FALSE) { |
|
257 | + if ($fp !== FALSE) { |
|
258 | 258 | /* Read random bytes from /dev/urandom. */ |
259 | 259 | $data = fread($fp, $length); |
260 | - if($data === FALSE) { |
|
260 | + if ($data === FALSE) { |
|
261 | 261 | throw new Exception('Error reading random data.'); |
262 | 262 | } |
263 | - if(strlen($data) != $length) { |
|
263 | + if (strlen($data) != $length) { |
|
264 | 264 | if ($fallback) { |
265 | 265 | $data = self::generateRandomBytesMTrand($length); |
266 | 266 | } else { |
267 | - throw new Exception('Did not get requested number of bytes from random source. Requested (' . $length . ') got (' . strlen($data) . ')'); |
|
267 | + throw new Exception('Did not get requested number of bytes from random source. Requested ('.$length.') got ('.strlen($data).')'); |
|
268 | 268 | } |
269 | 269 | } |
270 | 270 | } else { |
@@ -290,7 +290,7 @@ discard block |
||
290 | 290 | $result &= ($s1[$i] == $s2[$i]); |
291 | 291 | } |
292 | 292 | |
293 | - return (boolean)$result; |
|
293 | + return (boolean) $result; |
|
294 | 294 | } |
295 | 295 | |
296 | 296 | } |
@@ -57,7 +57,7 @@ |
||
57 | 57 | } |
58 | 58 | |
59 | 59 | /** |
60 | - * Decrypts the given data. |
|
60 | + * Decrypts the given data. |
|
61 | 61 | * |
62 | 62 | * @param String $data Data to decrypt. |
63 | 63 | * |
@@ -35,7 +35,7 @@ |
||
35 | 35 | * @param boolean $temporary temporary failure? |
36 | 36 | * @param Exception $parent parent exception |
37 | 37 | */ |
38 | - public function __construct($message, $temporary=false, Exception $parent=null) |
|
38 | + public function __construct($message, $temporary = false, Exception $parent = null) |
|
39 | 39 | { |
40 | 40 | parent::__construct($message, $parent); |
41 | 41 | $this->_temporary = $temporary; |
@@ -97,9 +97,9 @@ |
||
97 | 97 | |
98 | 98 | // Wait and retry once in case of a 502 Bad Gateway error |
99 | 99 | if ($statusCode === 502 && !($retry)) { |
100 | - sleep(2); |
|
101 | - $this->_sendFirebase($deviceToken, $alert, $challenge, $apiKey, true); |
|
102 | - return; |
|
100 | + sleep(2); |
|
101 | + $this->_sendFirebase($deviceToken, $alert, $challenge, $apiKey, true); |
|
102 | + return; |
|
103 | 103 | } |
104 | 104 | |
105 | 105 | if ($statusCode !== 200) { |
@@ -57,7 +57,7 @@ discard block |
||
57 | 57 | * |
58 | 58 | * @throws Tiqr_Message_Exception_SendFailure |
59 | 59 | */ |
60 | - private function _sendFirebase($deviceToken, $alert, $challenge, $apiKey, $retry=false) |
|
60 | + private function _sendFirebase($deviceToken, $alert, $challenge, $apiKey, $retry = false) |
|
61 | 61 | { |
62 | 62 | $msg = array( |
63 | 63 | 'challenge' => $challenge, |
@@ -71,7 +71,7 @@ discard block |
||
71 | 71 | ); |
72 | 72 | |
73 | 73 | $headers = array( |
74 | - 'Authorization: key=' . $apiKey, |
|
74 | + 'Authorization: key='.$apiKey, |
|
75 | 75 | 'Content-Type: application/json', |
76 | 76 | ); |
77 | 77 | |
@@ -84,7 +84,7 @@ discard block |
||
84 | 84 | $result = curl_exec($ch); |
85 | 85 | $errors = curl_error($ch); |
86 | 86 | $statusCode = curl_getinfo($ch, CURLINFO_HTTP_CODE); |
87 | - $remoteip = curl_getinfo($ch,CURLINFO_PRIMARY_IP); |
|
87 | + $remoteip = curl_getinfo($ch, CURLINFO_PRIMARY_IP); |
|
88 | 88 | curl_close($ch); |
89 | 89 | |
90 | 90 | if ($result === false) { |
@@ -92,7 +92,7 @@ discard block |
||
92 | 92 | } |
93 | 93 | |
94 | 94 | if (!empty($errors)) { |
95 | - throw new Tiqr_Message_Exception_SendFailure("Http error occurred: ". $errors, true); |
|
95 | + throw new Tiqr_Message_Exception_SendFailure("Http error occurred: ".$errors, true); |
|
96 | 96 | } |
97 | 97 | |
98 | 98 | // Wait and retry once in case of a 502 Bad Gateway error |
@@ -110,7 +110,7 @@ discard block |
||
110 | 110 | $response = json_decode($result, true); |
111 | 111 | foreach ($response['results'] as $k => $v) { |
112 | 112 | if (isset($v['error'])) { |
113 | - throw new Tiqr_Message_Exception_SendFailure("Error in GCM response: " . $v['error'], true); |
|
113 | + throw new Tiqr_Message_Exception_SendFailure("Error in GCM response: ".$v['error'], true); |
|
114 | 114 | } |
115 | 115 | } |
116 | 116 | } |
@@ -1,100 +1,100 @@ |
||
1 | 1 | <?php |
2 | 2 | class Tiqr_AutoLoader { |
3 | 3 | |
4 | - protected static $instance; |
|
5 | - |
|
6 | - protected $tiqrPath; |
|
7 | - protected $qrcodePath; |
|
8 | - protected $zendPath; |
|
9 | - |
|
10 | - protected function __construct($options) { |
|
11 | - if ($options !== NULL) { |
|
12 | - $this->setOptions($options); |
|
13 | - } |
|
14 | - spl_autoload_register(array(__CLASS__, 'autoload')); |
|
15 | - } |
|
16 | - |
|
17 | - public static function getInstance($options = NULL) { |
|
18 | - if (null === self::$instance) { |
|
19 | - self::$instance = new self($options); |
|
20 | - } |
|
21 | - |
|
22 | - return self::$instance; |
|
23 | - } |
|
24 | - |
|
25 | - public static function autoload($className) { |
|
26 | - if($className === NULL) { |
|
27 | - return; |
|
28 | - } |
|
29 | - |
|
30 | - $self = self::getInstance(); |
|
31 | - |
|
32 | - $substr5 = substr($className, 0, 5); |
|
33 | - |
|
34 | - if ($substr5 === 'Tiqr_' || $substr5 === 'OATH_') { |
|
35 | - $file = $self->tiqrPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php'; |
|
36 | - } elseif ($className === 'QRcode') { |
|
37 | - $file = $self->qrcodePath . DIRECTORY_SEPARATOR . 'qrlib.php'; |
|
38 | - } elseif ($substr5 === 'Zend_') { |
|
39 | - $file = $self->zendPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php'; |
|
40 | - } else { |
|
41 | - return; |
|
42 | - } |
|
43 | - |
|
44 | - if (file_exists($file)) { |
|
45 | - require_once($file); |
|
46 | - } |
|
47 | - } |
|
48 | - |
|
49 | - public function setOptions($options) { |
|
50 | - if (isset($options["tiqr.path"])) { |
|
51 | - $tiqr_dir = $options["tiqr.path"]; |
|
52 | - $tiqr_path = realpath($tiqr_dir); |
|
53 | - } else { |
|
54 | - $tiqr_dir = dirname(__FILE__); |
|
55 | - $tiqr_path = $tiqr_dir; |
|
56 | - } |
|
57 | - if (is_dir($tiqr_path)) { |
|
58 | - $this->tiqrPath = $tiqr_path; |
|
59 | - } else { |
|
60 | - throw new Exception('Directory not found: ' . var_export($tiqr_dir, TRUE)); |
|
61 | - } |
|
62 | - |
|
63 | - if (isset($options["phpqrcode.path"])) { |
|
64 | - $qrcode_dir = $options["phpqrcode.path"]; |
|
65 | - $qrcode_path = realpath($qrcode_dir); |
|
66 | - } else { |
|
67 | - $qrcode_dir = dirname(dirname(dirname(__FILE__))) . '/phpqrcode'; |
|
68 | - $qrcode_path = $qrcode_dir; |
|
69 | - } |
|
70 | - |
|
71 | - if (is_dir($qrcode_path)) { |
|
72 | - $this->qrcodePath = $qrcode_path; |
|
73 | - } else { |
|
74 | - throw new Exception('Directory not found: ' . var_export($qrcode_dir, TRUE)); |
|
75 | - } |
|
76 | - |
|
77 | - if (isset($options["zend.path"])) { |
|
78 | - $zend_dir = $options["zend.path"]; |
|
79 | - $zend_path = realpath($zend_dir); |
|
80 | - } else { |
|
81 | - $zend_dir = dirname(dirname(dirname(__FILE__))) . "/zend"; |
|
82 | - $zend_path = $zend_dir; |
|
83 | - } |
|
84 | - if (is_dir($zend_path)) { |
|
85 | - $this->zendPath = $zend_path; |
|
86 | - } else { |
|
87 | - throw new Exception('Directory not found: ' . var_export($zend_dir, TRUE)); |
|
88 | - } |
|
89 | - } |
|
90 | - |
|
91 | - |
|
92 | - public function setIncludePath() { |
|
93 | - set_include_path(implode(PATH_SEPARATOR, array( |
|
94 | - $this->tiqrPath, |
|
95 | - $this->zendPath, |
|
96 | - $this->qrcodePath, |
|
97 | - get_include_path(), |
|
98 | - ))); |
|
99 | - } |
|
4 | + protected static $instance; |
|
5 | + |
|
6 | + protected $tiqrPath; |
|
7 | + protected $qrcodePath; |
|
8 | + protected $zendPath; |
|
9 | + |
|
10 | + protected function __construct($options) { |
|
11 | + if ($options !== NULL) { |
|
12 | + $this->setOptions($options); |
|
13 | + } |
|
14 | + spl_autoload_register(array(__CLASS__, 'autoload')); |
|
15 | + } |
|
16 | + |
|
17 | + public static function getInstance($options = NULL) { |
|
18 | + if (null === self::$instance) { |
|
19 | + self::$instance = new self($options); |
|
20 | + } |
|
21 | + |
|
22 | + return self::$instance; |
|
23 | + } |
|
24 | + |
|
25 | + public static function autoload($className) { |
|
26 | + if($className === NULL) { |
|
27 | + return; |
|
28 | + } |
|
29 | + |
|
30 | + $self = self::getInstance(); |
|
31 | + |
|
32 | + $substr5 = substr($className, 0, 5); |
|
33 | + |
|
34 | + if ($substr5 === 'Tiqr_' || $substr5 === 'OATH_') { |
|
35 | + $file = $self->tiqrPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php'; |
|
36 | + } elseif ($className === 'QRcode') { |
|
37 | + $file = $self->qrcodePath . DIRECTORY_SEPARATOR . 'qrlib.php'; |
|
38 | + } elseif ($substr5 === 'Zend_') { |
|
39 | + $file = $self->zendPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php'; |
|
40 | + } else { |
|
41 | + return; |
|
42 | + } |
|
43 | + |
|
44 | + if (file_exists($file)) { |
|
45 | + require_once($file); |
|
46 | + } |
|
47 | + } |
|
48 | + |
|
49 | + public function setOptions($options) { |
|
50 | + if (isset($options["tiqr.path"])) { |
|
51 | + $tiqr_dir = $options["tiqr.path"]; |
|
52 | + $tiqr_path = realpath($tiqr_dir); |
|
53 | + } else { |
|
54 | + $tiqr_dir = dirname(__FILE__); |
|
55 | + $tiqr_path = $tiqr_dir; |
|
56 | + } |
|
57 | + if (is_dir($tiqr_path)) { |
|
58 | + $this->tiqrPath = $tiqr_path; |
|
59 | + } else { |
|
60 | + throw new Exception('Directory not found: ' . var_export($tiqr_dir, TRUE)); |
|
61 | + } |
|
62 | + |
|
63 | + if (isset($options["phpqrcode.path"])) { |
|
64 | + $qrcode_dir = $options["phpqrcode.path"]; |
|
65 | + $qrcode_path = realpath($qrcode_dir); |
|
66 | + } else { |
|
67 | + $qrcode_dir = dirname(dirname(dirname(__FILE__))) . '/phpqrcode'; |
|
68 | + $qrcode_path = $qrcode_dir; |
|
69 | + } |
|
70 | + |
|
71 | + if (is_dir($qrcode_path)) { |
|
72 | + $this->qrcodePath = $qrcode_path; |
|
73 | + } else { |
|
74 | + throw new Exception('Directory not found: ' . var_export($qrcode_dir, TRUE)); |
|
75 | + } |
|
76 | + |
|
77 | + if (isset($options["zend.path"])) { |
|
78 | + $zend_dir = $options["zend.path"]; |
|
79 | + $zend_path = realpath($zend_dir); |
|
80 | + } else { |
|
81 | + $zend_dir = dirname(dirname(dirname(__FILE__))) . "/zend"; |
|
82 | + $zend_path = $zend_dir; |
|
83 | + } |
|
84 | + if (is_dir($zend_path)) { |
|
85 | + $this->zendPath = $zend_path; |
|
86 | + } else { |
|
87 | + throw new Exception('Directory not found: ' . var_export($zend_dir, TRUE)); |
|
88 | + } |
|
89 | + } |
|
90 | + |
|
91 | + |
|
92 | + public function setIncludePath() { |
|
93 | + set_include_path(implode(PATH_SEPARATOR, array( |
|
94 | + $this->tiqrPath, |
|
95 | + $this->zendPath, |
|
96 | + $this->qrcodePath, |
|
97 | + get_include_path(), |
|
98 | + ))); |
|
99 | + } |
|
100 | 100 | } |
@@ -23,7 +23,7 @@ discard block |
||
23 | 23 | } |
24 | 24 | |
25 | 25 | public static function autoload($className) { |
26 | - if($className === NULL) { |
|
26 | + if ($className === NULL) { |
|
27 | 27 | return; |
28 | 28 | } |
29 | 29 | |
@@ -32,11 +32,11 @@ discard block |
||
32 | 32 | $substr5 = substr($className, 0, 5); |
33 | 33 | |
34 | 34 | if ($substr5 === 'Tiqr_' || $substr5 === 'OATH_') { |
35 | - $file = $self->tiqrPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php'; |
|
35 | + $file = $self->tiqrPath.DIRECTORY_SEPARATOR.str_replace('_', DIRECTORY_SEPARATOR, $className).'.php'; |
|
36 | 36 | } elseif ($className === 'QRcode') { |
37 | - $file = $self->qrcodePath . DIRECTORY_SEPARATOR . 'qrlib.php'; |
|
37 | + $file = $self->qrcodePath.DIRECTORY_SEPARATOR.'qrlib.php'; |
|
38 | 38 | } elseif ($substr5 === 'Zend_') { |
39 | - $file = $self->zendPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php'; |
|
39 | + $file = $self->zendPath.DIRECTORY_SEPARATOR.str_replace('_', DIRECTORY_SEPARATOR, $className).'.php'; |
|
40 | 40 | } else { |
41 | 41 | return; |
42 | 42 | } |
@@ -57,34 +57,34 @@ discard block |
||
57 | 57 | if (is_dir($tiqr_path)) { |
58 | 58 | $this->tiqrPath = $tiqr_path; |
59 | 59 | } else { |
60 | - throw new Exception('Directory not found: ' . var_export($tiqr_dir, TRUE)); |
|
60 | + throw new Exception('Directory not found: '.var_export($tiqr_dir, TRUE)); |
|
61 | 61 | } |
62 | 62 | |
63 | 63 | if (isset($options["phpqrcode.path"])) { |
64 | 64 | $qrcode_dir = $options["phpqrcode.path"]; |
65 | 65 | $qrcode_path = realpath($qrcode_dir); |
66 | 66 | } else { |
67 | - $qrcode_dir = dirname(dirname(dirname(__FILE__))) . '/phpqrcode'; |
|
67 | + $qrcode_dir = dirname(dirname(dirname(__FILE__))).'/phpqrcode'; |
|
68 | 68 | $qrcode_path = $qrcode_dir; |
69 | 69 | } |
70 | 70 | |
71 | 71 | if (is_dir($qrcode_path)) { |
72 | 72 | $this->qrcodePath = $qrcode_path; |
73 | 73 | } else { |
74 | - throw new Exception('Directory not found: ' . var_export($qrcode_dir, TRUE)); |
|
74 | + throw new Exception('Directory not found: '.var_export($qrcode_dir, TRUE)); |
|
75 | 75 | } |
76 | 76 | |
77 | 77 | if (isset($options["zend.path"])) { |
78 | 78 | $zend_dir = $options["zend.path"]; |
79 | 79 | $zend_path = realpath($zend_dir); |
80 | 80 | } else { |
81 | - $zend_dir = dirname(dirname(dirname(__FILE__))) . "/zend"; |
|
81 | + $zend_dir = dirname(dirname(dirname(__FILE__)))."/zend"; |
|
82 | 82 | $zend_path = $zend_dir; |
83 | 83 | } |
84 | 84 | if (is_dir($zend_path)) { |
85 | 85 | $this->zendPath = $zend_path; |
86 | 86 | } else { |
87 | - throw new Exception('Directory not found: ' . var_export($zend_dir, TRUE)); |
|
87 | + throw new Exception('Directory not found: '.var_export($zend_dir, TRUE)); |
|
88 | 88 | } |
89 | 89 | } |
90 | 90 |
@@ -40,15 +40,15 @@ discard block |
||
40 | 40 | private function initTiqrLibrary() |
41 | 41 | { |
42 | 42 | // Initialise the tiqr-server-library autoloader |
43 | - $tiqr_dir = __DIR__ . '/../library/tiqr'; |
|
44 | - $vendor_dir = __DIR__ . '/../vendor'; |
|
43 | + $tiqr_dir = __DIR__.'/../library/tiqr'; |
|
44 | + $vendor_dir = __DIR__.'/../vendor'; |
|
45 | 45 | |
46 | - require_once $tiqr_dir . '/Tiqr/AutoLoader.php'; |
|
46 | + require_once $tiqr_dir.'/Tiqr/AutoLoader.php'; |
|
47 | 47 | |
48 | 48 | $autoloader = Tiqr_AutoLoader::getInstance([ |
49 | 49 | 'tiqr.path' => $tiqr_dir, |
50 | - 'phpqrcode.path' => $vendor_dir . '/kairos/phpqrcode', |
|
51 | - 'zend.path' => $vendor_dir . '/zendframework/zendframework1/library' |
|
50 | + 'phpqrcode.path' => $vendor_dir.'/kairos/phpqrcode', |
|
51 | + 'zend.path' => $vendor_dir.'/zendframework/zendframework1/library' |
|
52 | 52 | ]); |
53 | 53 | $autoloader->setIncludePath(); |
54 | 54 | } |
@@ -58,7 +58,7 @@ discard block |
||
58 | 58 | */ |
59 | 59 | private function getStorageDir(): string |
60 | 60 | { |
61 | - $storage_dir = __DIR__ . '/storage'; |
|
61 | + $storage_dir = __DIR__.'/storage'; |
|
62 | 62 | if (!is_dir($storage_dir)) { |
63 | 63 | if (false == mkdir($storage_dir)) { |
64 | 64 | TestServerApp::error_exit(500, "Error creating storage directory: $storage_dir"); |
@@ -184,17 +184,17 @@ discard block |
||
184 | 184 | // The session ID is used for communicating enrollment status between this tiqr server and |
185 | 185 | // the web browser displaying the enrollment interface. It is not used between the tiqr client and |
186 | 186 | // this server. We do not use it. |
187 | - $session_id = 'session_id_' . time(); |
|
187 | + $session_id = 'session_id_'.time(); |
|
188 | 188 | $app::log_info("Created session $session_id"); |
189 | 189 | |
190 | 190 | // The user_id to create. Get it from the request, if it is not there use a test user ID. |
191 | - $user_id = $app->getGET()['user_id'] ?? 'test-user-' . time(); |
|
191 | + $user_id = $app->getGET()['user_id'] ?? 'test-user-'.time(); |
|
192 | 192 | |
193 | 193 | if ($this->userStorage->userExists($user_id)) { |
194 | 194 | $app::log_warning("$user_id already exists"); |
195 | 195 | } |
196 | 196 | |
197 | - $user_display_name = $user_id . '\'s display name'; |
|
197 | + $user_display_name = $user_id.'\'s display name'; |
|
198 | 198 | |
199 | 199 | // Create enrollemnt key. The display name we set here is returned in the metadata generated by |
200 | 200 | // getEnrollmentMetadata. |
@@ -202,10 +202,10 @@ discard block |
||
202 | 202 | // App differs from the user's displayname on the server. |
203 | 203 | $enrollment_key = $this->tiqrService->startEnrollmentSession($user_id, $user_display_name, $session_id); |
204 | 204 | $app::log_info("Started enrollment session $enrollment_key"); |
205 | - $metadataUrl = $this->host_url . "/metadata"; |
|
206 | - $enroll_string = $this->tiqrService->generateEnrollString($metadataUrl) . "?enrollment_key=$enrollment_key"; |
|
205 | + $metadataUrl = $this->host_url."/metadata"; |
|
206 | + $enroll_string = $this->tiqrService->generateEnrollString($metadataUrl)."?enrollment_key=$enrollment_key"; |
|
207 | 207 | $encoded_enroll_string = htmlentities(urlencode($enroll_string)); |
208 | - $image_url = "/qr?code=" . $encoded_enroll_string; |
|
208 | + $image_url = "/qr?code=".$encoded_enroll_string; |
|
209 | 209 | |
210 | 210 | $view->StartEnrollment(htmlentities($enroll_string), $image_url); |
211 | 211 | } |
@@ -247,8 +247,8 @@ discard block |
||
247 | 247 | // -----END NOTE----- |
248 | 248 | |
249 | 249 | // Add enrollment_secret to the $enrollment_url |
250 | - $enrollment_url = $this->host_url . "/finish-enrollment?enrollment_secret=$enrollment_secret"; |
|
251 | - $authentication_url = $this->host_url . '/authentication'; |
|
250 | + $enrollment_url = $this->host_url."/finish-enrollment?enrollment_secret=$enrollment_secret"; |
|
251 | + $authentication_url = $this->host_url.'/authentication'; |
|
252 | 252 | // Get the enrollment data |
253 | 253 | $enrollment_metadata = $this->tiqrService->getEnrollmentMetadata($enrollment_key, $authentication_url, $enrollment_url); |
254 | 254 | if (false == $enrollment_metadata) { |
@@ -365,10 +365,10 @@ discard block |
||
365 | 365 | private function logo(App $app) |
366 | 366 | { |
367 | 367 | // Source: https://nl.wikipedia.org/wiki/Bestand:Philips_PM5544.svg |
368 | - $name = __DIR__ . '/Philips_PM5544.jpg'; |
|
368 | + $name = __DIR__.'/Philips_PM5544.jpg'; |
|
369 | 369 | $fp = fopen($name, 'rb'); |
370 | 370 | header('Content-Type: image/jpeg'); |
371 | - header('Content-Length: ' . filesize($name)); |
|
371 | + header('Content-Length: '.filesize($name)); |
|
372 | 372 | fpassthru($fp); |
373 | 373 | fclose($fp); |
374 | 374 | } |
@@ -379,7 +379,7 @@ discard block |
||
379 | 379 | $users = array(); |
380 | 380 | foreach (scandir($storageDir) as $filename) { |
381 | 381 | if (substr($filename, -5, 5) == '.json') { |
382 | - $user = json_decode(file_get_contents($storageDir . '/' . $filename), true); |
|
382 | + $user = json_decode(file_get_contents($storageDir.'/'.$filename), true); |
|
383 | 383 | if (($user != NULL) && ($user['secret'])) { |
384 | 384 | foreach ($user as $k => $v) { |
385 | 385 | $user[$k] = htmlentities($v); |
@@ -393,7 +393,7 @@ discard block |
||
393 | 393 | |
394 | 394 | private function start_authenticate(App $app, TestServerView $view) |
395 | 395 | { |
396 | - $session_id = 'session_id_' . time(); |
|
396 | + $session_id = 'session_id_'.time(); |
|
397 | 397 | $app::log_info("Created session $session_id"); |
398 | 398 | |
399 | 399 | // The user_id to authenticate. Get it from the request, if it is not there use an empty user ID |
@@ -422,7 +422,7 @@ discard block |
||
422 | 422 | $app::log_info('Started authentication URL'); |
423 | 423 | $app::log_info("authentication_url=$authentication_URL"); |
424 | 424 | |
425 | - $image_url = "/qr?code=" . htmlentities(urlencode($authentication_URL)); |
|
425 | + $image_url = "/qr?code=".htmlentities(urlencode($authentication_URL)); |
|
426 | 426 | |
427 | 427 | $response = ''; |
428 | 428 | if (strlen($user_id) > 0) { |
@@ -432,7 +432,7 @@ discard block |
||
432 | 432 | $app::log_info("secret=$secret"); |
433 | 433 | $exploded = explode('/', $authentication_URL); |
434 | 434 | $session_key = $exploded[3]; // hex encoded session |
435 | - $challenge = $exploded[4]; // 10 digit hex challenge |
|
435 | + $challenge = $exploded[4]; // 10 digit hex challenge |
|
436 | 436 | $app::log_info("challenge=$challenge"); |
437 | 437 | $ocra = new Tiqr_OCRAWrapper('OCRA-1:HOTP-SHA1-6:QH10-S'); |
438 | 438 | $response = $ocra->calculateResponse($secret, $challenge, $session_key); |
@@ -518,7 +518,7 @@ discard block |
||
518 | 518 | } |
519 | 519 | |
520 | 520 | // Lookup the secret of the user by ID |
521 | - $userSecret = $this->userStorage->getSecret($userId); // Assume this works |
|
521 | + $userSecret = $this->userStorage->getSecret($userId); // Assume this works |
|
522 | 522 | $app::log_info("userSercret=$userSecret"); |
523 | 523 | |
524 | 524 | $app::log_info("Authenticating user"); |
@@ -261,8 +261,7 @@ |
||
261 | 261 | foreach ($value1 as $key2 => $value2) { |
262 | 262 | $app::log_info("Metadata: $key1/$key2=$value2"); |
263 | 263 | } |
264 | - } |
|
265 | - else { |
|
264 | + } else { |
|
266 | 265 | $app::log_info("Metadata: $key1=$value1"); |
267 | 266 | } |
268 | 267 | } |
@@ -76,14 +76,14 @@ |
||
76 | 76 | if ($uri[0] != '/') { |
77 | 77 | self::error_exit(500, 'REQUEST_URI must start with "/"'); |
78 | 78 | } |
79 | - self::log_info('--'); // End of the HTTP dump |
|
79 | + self::log_info('--'); // End of the HTTP dump |
|
80 | 80 | |
81 | 81 | $path = parse_url($uri, PHP_URL_PATH); |
82 | 82 | |
83 | 83 | try { |
84 | 84 | $this->router->Route($this, $path); |
85 | 85 | } catch (Exception $e) { |
86 | - self::error_exit(500, 'Exception: ' . $e->getMessage() . "\n\n" . $e->getTraceAsString()); |
|
86 | + self::error_exit(500, 'Exception: '.$e->getMessage()."\n\n".$e->getTraceAsString()); |
|
87 | 87 | } |
88 | 88 | } |
89 | 89 |
@@ -96,7 +96,7 @@ discard block |
||
96 | 96 | { |
97 | 97 | $refreshurl = '/start-authenticate'; |
98 | 98 | if (strlen($user_id) > 0) { |
99 | - $refreshurl.= "?user_id=$user_id"; |
|
99 | + $refreshurl .= "?user_id=$user_id"; |
|
100 | 100 | } |
101 | 101 | $this->begin(); |
102 | 102 | echo <<<HTML |
@@ -107,7 +107,7 @@ discard block |
||
107 | 107 | <code>$authentication_URL</code> |
108 | 108 | <br /> |
109 | 109 | HTML; |
110 | - if (strlen($response)>0) { |
|
110 | + if (strlen($response) > 0) { |
|
111 | 111 | echo <<<HTML |
112 | 112 | <p>The response (for offline validation) is: <code>$response</code></p> |
113 | 113 | HTML; |
@@ -14,18 +14,18 @@ |
||
14 | 14 | |
15 | 15 | namespace TestServer; |
16 | 16 | |
17 | -require_once __DIR__ . '/TestServerApp.php'; |
|
18 | -require_once __DIR__ . '/TestServerController.php'; |
|
19 | -require_once __DIR__ . '/TestServerView.php'; |
|
17 | +require_once __DIR__.'/TestServerApp.php'; |
|
18 | +require_once __DIR__.'/TestServerController.php'; |
|
19 | +require_once __DIR__.'/TestServerView.php'; |
|
20 | 20 | |
21 | 21 | // TODO: Update / set configuration. See readme |
22 | 22 | $config_filename = 'config'; |
23 | 23 | |
24 | -$config_dir = __DIR__ . '/config/'; |
|
24 | +$config_dir = __DIR__.'/config/'; |
|
25 | 25 | |
26 | 26 | $config = array(); |
27 | -if (file_exists($config_dir . $config_filename)) { |
|
28 | - $config = json_decode(file_get_contents($config_dir . $config_filename), true); |
|
27 | +if (file_exists($config_dir.$config_filename)) { |
|
28 | + $config = json_decode(file_get_contents($config_dir.$config_filename), true); |
|
29 | 29 | } |
30 | 30 | |
31 | 31 | $host_url = $config['host_url'] ?? 'http://localhost:8000'; |