All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.signalfx.shaded.jetty.client.util.DigestAuthentication Maven / Gradle / Ivy

The newest version!
//
//  ========================================================================
//  Copyright (c) 1995-2022 Mort Bay Consulting Pty Ltd and others.
//  ------------------------------------------------------------------------
//  All rights reserved. This program and the accompanying materials
//  are made available under the terms of the Eclipse Public License v1.0
//  and Apache License v2.0 which accompanies this distribution.
//
//      The Eclipse Public License is available at
//      http://www.eclipse.org/legal/epl-v10.html
//
//      The Apache License v2.0 is available at
//      http://www.opensource.org/licenses/apache2.0.php
//
//  You may elect to redistribute this code under either of these licenses.
//  ========================================================================
//

package com.signalfx.shaded.jetty.client.util;

import java.net.URI;
import java.nio.charset.StandardCharsets;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.security.SecureRandom;
import java.util.List;
import java.util.Locale;
import java.util.Map;
import java.util.Objects;
import java.util.Random;
import java.util.concurrent.atomic.AtomicInteger;

import com.signalfx.shaded.jetty.client.HttpClient;
import com.signalfx.shaded.jetty.client.api.AuthenticationStore;
import com.signalfx.shaded.jetty.client.api.ContentResponse;
import com.signalfx.shaded.jetty.client.api.Request;
import com.signalfx.shaded.jetty.http.HttpHeader;
import com.signalfx.shaded.jetty.util.Attributes;
import com.signalfx.shaded.jetty.util.StringUtil;
import com.signalfx.shaded.jetty.util.TypeUtil;

/**
 * Implementation of the HTTP "Digest" authentication defined in RFC 2617.
 * 

* Applications should create objects of this class and add them to the * {@link AuthenticationStore} retrieved from the {@link HttpClient} * via {@link HttpClient#getAuthenticationStore()}. */ public class DigestAuthentication extends AbstractAuthentication { private final Random random; private final String user; private final String password; /** Construct a DigestAuthentication with a {@link SecureRandom} nonce. * @param uri the URI to match for the authentication * @param realm the realm to match for the authentication * @param user the user that wants to authenticate * @param password the password of the user */ public DigestAuthentication(URI uri, String realm, String user, String password) { this(uri, realm, user, password, new SecureRandom()); } /** * @param uri the URI to match for the authentication * @param realm the realm to match for the authentication * @param user the user that wants to authenticate * @param password the password of the user * @param random the Random generator to use for nonces. */ public DigestAuthentication(URI uri, String realm, String user, String password, Random random) { super(uri, realm); Objects.requireNonNull(random); this.random = random; this.user = user; this.password = password; } @Override public String getType() { return "Digest"; } @Override public boolean matches(String type, URI uri, String realm) { // digest authenication requires a realm if (realm == null) return false; return super.matches(type, uri, realm); } @Override public Result authenticate(Request request, ContentResponse response, HeaderInfo headerInfo, Attributes context) { Map params = headerInfo.getParameters(); String nonce = params.get("nonce"); if (nonce == null || nonce.length() == 0) return null; String opaque = params.get("opaque"); String algorithm = params.get("algorithm"); if (algorithm == null) algorithm = "MD5"; MessageDigest digester = getMessageDigest(algorithm); if (digester == null) return null; String serverQOP = params.get("qop"); String clientQOP = null; if (serverQOP != null) { List serverQOPValues = StringUtil.csvSplit(null, serverQOP, 0, serverQOP.length()); if (serverQOPValues.contains("auth")) clientQOP = "auth"; else if (serverQOPValues.contains("auth-int")) clientQOP = "auth-int"; } String realm = getRealm(); if (ANY_REALM.equals(realm)) realm = headerInfo.getRealm(); return new DigestResult(headerInfo.getHeader(), response.getContent(), realm, user, password, algorithm, nonce, clientQOP, opaque); } private MessageDigest getMessageDigest(String algorithm) { try { return MessageDigest.getInstance(algorithm); } catch (NoSuchAlgorithmException x) { return null; } } private class DigestResult implements Result { private final AtomicInteger nonceCount = new AtomicInteger(); private final HttpHeader header; private final byte[] content; private final String realm; private final String user; private final String password; private final String algorithm; private final String nonce; private final String qop; private final String opaque; public DigestResult(HttpHeader header, byte[] content, String realm, String user, String password, String algorithm, String nonce, String qop, String opaque) { this.header = header; this.content = content; this.realm = realm; this.user = user; this.password = password; this.algorithm = algorithm; this.nonce = nonce; this.qop = qop; this.opaque = opaque; } @Override public URI getURI() { return DigestAuthentication.this.getURI(); } @Override public void apply(Request request) { MessageDigest digester = getMessageDigest(algorithm); if (digester == null) return; String a1 = user + ":" + realm + ":" + password; String hashA1 = toHexString(digester.digest(a1.getBytes(StandardCharsets.ISO_8859_1))); String query = request.getQuery(); String path = request.getPath(); String uri = (query == null) ? path : path + "?" + query; String a2 = request.getMethod() + ":" + uri; if ("auth-int".equals(qop)) a2 += ":" + toHexString(digester.digest(content)); String hashA2 = toHexString(digester.digest(a2.getBytes(StandardCharsets.ISO_8859_1))); String nonceCount; String clientNonce; String a3; if (qop != null) { nonceCount = nextNonceCount(); clientNonce = newClientNonce(); a3 = hashA1 + ":" + nonce + ":" + nonceCount + ":" + clientNonce + ":" + qop + ":" + hashA2; } else { nonceCount = null; clientNonce = null; a3 = hashA1 + ":" + nonce + ":" + hashA2; } String hashA3 = toHexString(digester.digest(a3.getBytes(StandardCharsets.ISO_8859_1))); StringBuilder value = new StringBuilder("Digest"); value.append(" username=\"").append(user).append("\""); value.append(", realm=\"").append(realm).append("\""); value.append(", nonce=\"").append(nonce).append("\""); if (opaque != null) value.append(", opaque=\"").append(opaque).append("\""); value.append(", algorithm=\"").append(algorithm).append("\""); value.append(", uri=\"").append(uri).append("\""); if (qop != null) { value.append(", qop=\"").append(qop).append("\""); value.append(", nc=\"").append(nonceCount).append("\""); value.append(", cnonce=\"").append(clientNonce).append("\""); } value.append(", response=\"").append(hashA3).append("\""); request.header(header, value.toString()); } private String nextNonceCount() { String padding = "00000000"; String next = Integer.toHexString(nonceCount.incrementAndGet()).toLowerCase(Locale.ENGLISH); return padding.substring(0, padding.length() - next.length()) + next; } private String newClientNonce() { byte[] bytes = new byte[8]; random.nextBytes(bytes); return toHexString(bytes); } private String toHexString(byte[] bytes) { return TypeUtil.toHexString(bytes).toLowerCase(Locale.ENGLISH); } } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy