gov.nist.javax.sip.clientauthutils.MessageDigestAlgorithm Maven / Gradle / Ivy
package android.gov.nist.javax.sip.clientauthutils;
import android.gov.nist.core.LogWriter;
import android.gov.nist.core.StackLogger;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
/**
* The class takes standard Http Authentication details and returns a response according to the
* MD5 algorithm
*
* @author Emil Ivov
*/
public class MessageDigestAlgorithm {
/**
* Calculates an http authentication response in accordance with rfc2617.
*
*
* @param algorithm a string indicating a pair of algorithms (MD5 (default), or MD5-sess) used
* to produce the digest and a checksum.
* @param hashUserNameRealmPasswd MD5 hash of (username:realm:password)
* @param nonce_value A server-specified data string provided in the challenge.
* @param cnonce_value an optional client-chosen value whose purpose is to foil chosen
* plaintext attacks.
* @param method the SIP method of the request being challenged.
* @param digest_uri_value the value of the "uri" directive on the Authorization header in the
* request.
* @param entity_body the entity-body
* @param qop_value Indicates what "quality of protection" the client has applied to the
* message.
* @param nc_value the hexadecimal count of the number of requests (including the current
* request) that the client has sent with the nonce value in this request.
* @return a digest response as defined in rfc2617
* @throws NullPointerException in case of incorrectly null parameters.
*/
static String calculateResponse(String algorithm, String hashUserNameRealmPasswd,
String nonce_value, String nc_value, String cnonce_value,
String method, String digest_uri_value, String entity_body, String qop_value,
StackLogger stackLogger) {
if (stackLogger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
stackLogger.logDebug("trying to authenticate using : " + algorithm + ", "+
hashUserNameRealmPasswd + ", " + nonce_value + ", "
+ nc_value + ", " + cnonce_value + ", " + method + ", " + digest_uri_value
+ ", " + entity_body + ", " + qop_value);
}
if (hashUserNameRealmPasswd == null || method == null
|| digest_uri_value == null || nonce_value == null)
throw new NullPointerException(
"Null parameter to MessageDigestAlgorithm.calculateResponse()");
// The following follows closely the algorithm for generating a response
// digest as specified by rfc2617
if (cnonce_value == null || cnonce_value.length() == 0)
throw new NullPointerException(
"cnonce_value may not be absent for MD5-Sess algorithm.");
String A2 = null;
if (qop_value == null || qop_value.trim().length() == 0
|| qop_value.trim().equalsIgnoreCase("auth")) {
A2 = method + ":" + digest_uri_value;
} else {
if (entity_body == null)
entity_body = "";
A2 = method + ":" + digest_uri_value + ":" + H(entity_body);
}
String request_digest = null;
if (cnonce_value != null && qop_value != null && nc_value != null
&& (qop_value.equalsIgnoreCase("auth") || qop_value.equalsIgnoreCase("auth-int")))
{
request_digest = KD(hashUserNameRealmPasswd, nonce_value + ":" + nc_value + ":" + cnonce_value + ":"
+ qop_value + ":" + H(A2));
} else {
request_digest = KD(hashUserNameRealmPasswd, nonce_value + ":" + H(A2));
}
return request_digest;
}
/**
* Calculates an http authentication response in accordance with rfc2617.
*
*
* @param algorithm a string indicating a pair of algorithms (MD5 (default), or MD5-sess) used
* to produce the digest and a checksum.
* @param username_value username_value (see rfc2617)
* @param realm_value A string that has been displayed to the user in order to determine the
* context of the username and password to use.
* @param passwd the password to encode in the challenge response.
* @param nonce_value A server-specified data string provided in the challenge.
* @param cnonce_value an optional client-chosen value whose purpose is to foil chosen
* plaintext attacks.
* @param method the SIP method of the request being challenged.
* @param digest_uri_value the value of the "uri" directive on the Authorization header in the
* request.
* @param entity_body the entity-body
* @param qop_value Indicates what "quality of protection" the client has applied to the
* message.
* @param nc_value the hexadecimal count of the number of requests (including the current
* request) that the client has sent with the nonce value in this request.
* @return a digest response as defined in rfc2617
* @throws NullPointerException in case of incorrectly null parameters.
*/
static String calculateResponse(String algorithm, String username_value, String realm_value,
String passwd, String nonce_value, String nc_value, String cnonce_value,
String method, String digest_uri_value, String entity_body, String qop_value,
StackLogger stackLogger) {
if (stackLogger.isLoggingEnabled(LogWriter.TRACE_DEBUG)) {
stackLogger.logDebug("trying to authenticate using : " + algorithm + ", "
+ username_value + ", " + realm_value + ", "
+ (passwd != null && passwd.trim().length() > 0) + ", " + nonce_value + ", "
+ nc_value + ", " + cnonce_value + ", " + method + ", " + digest_uri_value
+ ", " + entity_body + ", " + qop_value);
}
if (username_value == null || realm_value == null || passwd == null || method == null
|| digest_uri_value == null || nonce_value == null)
throw new NullPointerException(
"Null parameter to MessageDigestAlgorithm.calculateResponse()");
// The following follows closely the algorithm for generating a response
// digest as specified by rfc2617
String A1 = null;
if (algorithm == null || algorithm.trim().length() == 0
|| algorithm.trim().equalsIgnoreCase("MD5")) {
A1 = username_value + ":" + realm_value + ":" + passwd;
} else {
if (cnonce_value == null || cnonce_value.length() == 0)
throw new NullPointerException(
"cnonce_value may not be absent for MD5-Sess algorithm.");
A1 = H(username_value + ":" + realm_value + ":" + passwd) + ":" + nonce_value + ":"
+ cnonce_value;
}
String A2 = null;
if (qop_value == null || qop_value.trim().length() == 0
|| qop_value.trim().equalsIgnoreCase("auth")) {
A2 = method + ":" + digest_uri_value;
} else {
if (entity_body == null)
entity_body = "";
A2 = method + ":" + digest_uri_value + ":" + H(entity_body);
}
String request_digest = null;
if (cnonce_value != null && qop_value != null && nc_value != null
&& (qop_value.equalsIgnoreCase("auth") || qop_value.equalsIgnoreCase("auth-int")))
{
request_digest = KD(H(A1), nonce_value + ":" + nc_value + ":" + cnonce_value + ":"
+ qop_value + ":" + H(A2));
} else {
request_digest = KD(H(A1), nonce_value + ":" + H(A2));
}
return request_digest;
}
/**
* Defined in rfc 2617 as H(data) = MD5(data);
*
* @param data data
* @return MD5(data)
*/
private static String H(String data) {
try {
MessageDigest digest = MessageDigest.getInstance("MD5");
return toHexString(digest.digest(data.getBytes()));
} catch (NoSuchAlgorithmException ex) {
// shouldn't happen
throw new RuntimeException("Failed to instantiate an MD5 algorithm", ex);
}
}
/**
* Defined in rfc 2617 as KD(secret, data) = H(concat(secret, ":", data))
*
* @param data data
* @param secret secret
* @return H(concat(secret, ":", data));
*/
private static String KD(String secret, String data) {
return H(secret + ":" + data);
}
// the following code was copied from the NIST-SIP instant
// messenger (its author is Olivier Deruelle). Thanks for making it public!
/**
* to hex converter
*/
private static final char[] toHex = {
'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f'
};
/**
* Converts b[] to hex string.
*
* @param b the bte array to convert
* @return a Hex representation of b.
*/
private static String toHexString(byte b[]) {
int pos = 0;
char[] c = new char[b.length * 2];
for (int i = 0; i < b.length; i++) {
c[pos++] = toHex[(b[i] >> 4) & 0x0F];
c[pos++] = toHex[b[i] & 0x0f];
}
return new String(c);
}
}