Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
/**
* Copyright 2007-2015, Kaazing Corporation. All rights reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.mina.proxy.handlers.http.digest;
import java.io.UnsupportedEncodingException;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.util.HashMap;
import javax.security.sasl.AuthenticationException;
import org.apache.mina.core.session.IoSession;
import org.apache.mina.proxy.session.ProxyIoSession;
import org.apache.mina.proxy.utils.ByteUtilities;
import org.apache.mina.proxy.utils.StringUtilities;
/**
* DigestUtilities.java - A class supporting the HTTP DIGEST authentication (see RFC 2617).
*
* @author Apache MINA Project
* @since MINA 2.0.0-M3
*/
public class DigestUtilities {
public final static String SESSION_HA1 = DigestUtilities.class
+ ".SessionHA1";
private static MessageDigest md5;
static {
// Initialize secure random generator
try {
md5 = MessageDigest.getInstance("MD5");
} catch (NoSuchAlgorithmException e) {
throw new RuntimeException(e);
}
}
/**
* The supported qualities of protections.
*/
public final static String[] SUPPORTED_QOPS = new String[] { "auth",
"auth-int" };
/**
* Computes the response to the DIGEST challenge.
*
* @param session the current session
* @param map the map holding the directives sent by the proxy
* @param method the HTTP verb
* @param pwd the password
* @param charsetName the name of the charset used for the challenge
* @param body the html body to be hashed for integrity calculations
*/
public static String computeResponseValue(IoSession session,
HashMap map, String method, String pwd,
String charsetName, String body) throws AuthenticationException,
UnsupportedEncodingException {
byte[] hA1;
StringBuilder sb;
boolean isMD5Sess = "md5-sess".equalsIgnoreCase(StringUtilities
.getDirectiveValue(map, "algorithm", false));
if (!isMD5Sess || (session.getAttribute(SESSION_HA1) == null)) {
// Build A1
sb = new StringBuilder();
sb.append(
StringUtilities.stringTo8859_1(StringUtilities
.getDirectiveValue(map, "username", true))).append(
':');
String realm = StringUtilities.stringTo8859_1(StringUtilities
.getDirectiveValue(map, "realm", false));
if (realm != null) {
sb.append(realm);
}
sb.append(':').append(pwd);
if (isMD5Sess) {
byte[] prehA1;
synchronized (md5) {
md5.reset();
prehA1 = md5.digest(sb.toString().getBytes(charsetName));
}
sb = new StringBuilder();
sb.append(ByteUtilities.asHex(prehA1));
sb.append(':').append(
StringUtilities.stringTo8859_1(StringUtilities
.getDirectiveValue(map, "nonce", true)));
sb.append(':').append(
StringUtilities.stringTo8859_1(StringUtilities
.getDirectiveValue(map, "cnonce", true)));
synchronized (md5) {
md5.reset();
hA1 = md5.digest(sb.toString().getBytes(charsetName));
}
session.setAttribute(SESSION_HA1, hA1);
} else {
synchronized (md5) {
md5.reset();
hA1 = md5.digest(sb.toString().getBytes(charsetName));
}
}
} else {
hA1 = (byte[]) session.getAttribute(SESSION_HA1);
}
sb = new StringBuilder(method);
sb.append(':');
sb.append(StringUtilities.getDirectiveValue(map, "uri", false));
String qop = StringUtilities.getDirectiveValue(map, "qop", false);
if ("auth-int".equalsIgnoreCase(qop)) {
ProxyIoSession proxyIoSession = (ProxyIoSession) session
.getAttribute(ProxyIoSession.PROXY_SESSION);
byte[] hEntity;
synchronized (md5) {
md5.reset();
hEntity = md5.digest(body.getBytes(proxyIoSession
.getCharsetName()));
}
sb.append(':').append(hEntity);
}
byte[] hA2;
synchronized (md5) {
md5.reset();
hA2 = md5.digest(sb.toString().getBytes(charsetName));
}
sb = new StringBuilder();
sb.append(ByteUtilities.asHex(hA1));
sb.append(':').append(
StringUtilities.getDirectiveValue(map, "nonce", true));
sb.append(":00000001:");
sb.append(StringUtilities.getDirectiveValue(map, "cnonce", true));
sb.append(':').append(qop).append(':');
sb.append(ByteUtilities.asHex(hA2));
byte[] hFinal;
synchronized (md5) {
md5.reset();
hFinal = md5.digest(sb.toString().getBytes(charsetName));
}
return ByteUtilities.asHex(hFinal);
}
}