| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295 |
- /*
- * Conditions Of Use
- *
- * This software was developed by employees of the National Institute of
- * Standards and Technology (NIST), an agency of the Federal Government.
- * Pursuant to title 15 Untied States Code Section 105, works of NIST
- * employees are not subject to copyright protection in the United States
- * and are considered to be in the public domain. As a result, a formal
- * license is not needed to use the software.
- *
- * This software is provided by NIST as a service and is expressly
- * provided "AS IS." NIST MAKES NO WARRANTY OF ANY KIND, EXPRESS, IMPLIED
- * OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTY OF
- * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT
- * AND DATA ACCURACY. NIST does not warrant or make any representations
- * regarding the use of the software or the results thereof, including but
- * not limited to the correctness, accuracy, reliability or usefulness of
- * the software.
- *
- * Permission to use this software is contingent upon your acceptance
- * of the terms of this agreement
- *
- * .
- *
- */
- package com.genersoft.iot.vmp.gb28181.auth;
- import java.security.MessageDigest;
- import java.security.NoSuchAlgorithmException;
- import java.time.Instant;
- import java.util.Random;
- import javax.sip.address.URI;
- import javax.sip.header.AuthorizationHeader;
- import javax.sip.header.HeaderFactory;
- import javax.sip.header.WWWAuthenticateHeader;
- import javax.sip.message.Request;
- import javax.sip.message.Response;
- import gov.nist.core.InternalErrorHandler;
- import org.slf4j.Logger;
- import org.slf4j.LoggerFactory;
- /**
- * Implements the HTTP digest authentication method server side functionality.
- *
- * @author M. Ranganathan
- * @author Marc Bednarek
- */
- public class DigestServerAuthenticationHelper {
- private Logger logger = LoggerFactory.getLogger(DigestServerAuthenticationHelper.class);
- private MessageDigest messageDigest;
- public static final String DEFAULT_ALGORITHM = "MD5";
- public static final String DEFAULT_SCHEME = "Digest";
- /** to hex converter */
- private static final char[] toHex = { '0', '1', '2', '3', '4', '5', '6',
- '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f' };
- /**
- * Default constructor.
- * @throws NoSuchAlgorithmException
- */
- public DigestServerAuthenticationHelper()
- throws NoSuchAlgorithmException {
- messageDigest = MessageDigest.getInstance(DEFAULT_ALGORITHM);
- }
- public static String toHexString(byte b[]) {
- int pos = 0;
- char[] c = new char[b.length * 2];
- for (int i = 0; i < b.length; i++) {
- c[pos++] = toHex[(b[i] >> 4) & 0x0F];
- c[pos++] = toHex[b[i] & 0x0f];
- }
- return new String(c);
- }
- /**
- * Generate the challenge string.
- *
- * @return a generated nonce.
- */
- private String generateNonce() {
- long time = Instant.now().toEpochMilli();
- Random rand = new Random();
- long pad = rand.nextLong();
- String nonceString = Long.valueOf(time).toString()
- + Long.valueOf(pad).toString();
- byte mdbytes[] = messageDigest.digest(nonceString.getBytes());
- return toHexString(mdbytes);
- }
- public Response generateChallenge(HeaderFactory headerFactory, Response response, String realm) {
- try {
- WWWAuthenticateHeader proxyAuthenticate = headerFactory
- .createWWWAuthenticateHeader(DEFAULT_SCHEME);
- proxyAuthenticate.setParameter("realm", realm);
- proxyAuthenticate.setParameter("qop", "auth");
- proxyAuthenticate.setParameter("nonce", generateNonce());
- proxyAuthenticate.setParameter("algorithm", DEFAULT_ALGORITHM);
- response.setHeader(proxyAuthenticate);
- } catch (Exception ex) {
- InternalErrorHandler.handleException(ex);
- }
- return response;
- }
- /**
- * Authenticate the inbound request.
- *
- * @param request - the request to authenticate.
- * @param hashedPassword -- the MD5 hashed string of username:realm:plaintext password.
- *
- * @return true if authentication succeded and false otherwise.
- */
- public boolean doAuthenticateHashedPassword(Request request, String hashedPassword) {
- AuthorizationHeader authHeader = (AuthorizationHeader) request.getHeader(AuthorizationHeader.NAME);
- if ( authHeader == null ) {
- return false;
- }
- String realm = authHeader.getRealm();
- String username = authHeader.getUsername();
- if ( username == null || realm == null ) {
- return false;
- }
- String nonce = authHeader.getNonce();
- URI uri = authHeader.getURI();
- if (uri == null) {
- return false;
- }
- String A2 = request.getMethod().toUpperCase() + ":" + uri.toString();
- String HA1 = hashedPassword;
- byte[] mdbytes = messageDigest.digest(A2.getBytes());
- String HA2 = toHexString(mdbytes);
- String cnonce = authHeader.getCNonce();
- String KD = HA1 + ":" + nonce;
- if (cnonce != null) {
- KD += ":" + cnonce;
- }
- KD += ":" + HA2;
- mdbytes = messageDigest.digest(KD.getBytes());
- String mdString = toHexString(mdbytes);
- String response = authHeader.getResponse();
- return mdString.equals(response);
- }
- /**
- * Authenticate the inbound request given plain text password.
- *
- * @param request - the request to authenticate.
- * @param pass -- the plain text password.
- *
- * @return true if authentication succeded and false otherwise.
- */
- public boolean doAuthenticatePlainTextPassword(Request request, String pass) {
- AuthorizationHeader authHeader = (AuthorizationHeader) request.getHeader(AuthorizationHeader.NAME);
- if ( authHeader == null ) {
- return false;
- }
- String realm = authHeader.getRealm().trim();
- String username = authHeader.getUsername().trim();
- if ( username == null || realm == null ) {
- return false;
- }
- String nonce = authHeader.getNonce();
- URI uri = authHeader.getURI();
- if (uri == null) {
- return false;
- }
- // qop 保护质量 包含auth(默认的)和auth-int(增加了报文完整性检测)两种策略
- String qop = authHeader.getQop();
- // 客户端随机数,这是一个不透明的字符串值,由客户端提供,并且客户端和服务器都会使用,以避免用明文文本。
- // 这使得双方都可以查验对方的身份,并对消息的完整性提供一些保护
- String cnonce = authHeader.getCNonce();
- // nonce计数器,是一个16进制的数值,表示同一nonce下客户端发送出请求的数量
- int nc = authHeader.getNonceCount();
- String ncStr = String.format("%08x", nc).toUpperCase();
- // String ncStr = new DecimalFormat("00000000").format(nc);
- // String ncStr = new DecimalFormat("00000000").format(Integer.parseInt(nc + "", 16));
- String A1 = username + ":" + realm + ":" + pass;
- String A2 = request.getMethod().toUpperCase() + ":" + uri.toString();
- byte mdbytes[] = messageDigest.digest(A1.getBytes());
- String HA1 = toHexString(mdbytes);
- logger.debug("A1: " + A1);
- logger.debug("A2: " + A2);
- mdbytes = messageDigest.digest(A2.getBytes());
- String HA2 = toHexString(mdbytes);
- logger.debug("HA1: " + HA1);
- logger.debug("HA2: " + HA2);
- // String cnonce = authHeader.getCNonce();
- logger.debug("nonce: " + nonce);
- logger.debug("nc: " + ncStr);
- logger.debug("cnonce: " + cnonce);
- logger.debug("qop: " + qop);
- String KD = HA1 + ":" + nonce;
- if (qop != null && qop.equals("auth") ) {
- if (nc != -1) {
- KD += ":" + ncStr;
- }
- if (cnonce != null) {
- KD += ":" + cnonce;
- }
- KD += ":" + qop;
- }
- KD += ":" + HA2;
- logger.debug("KD: " + KD);
- mdbytes = messageDigest.digest(KD.getBytes());
- String mdString = toHexString(mdbytes);
- logger.debug("mdString: " + mdString);
- String response = authHeader.getResponse();
- logger.debug("response: " + response);
- return mdString.equals(response);
- }
- // public static void main(String[] args) throws NoSuchAlgorithmException {
- // String realm = "3402000000";
- // String username = "44010000001180008012";
- // String nonce = "07cab60999fbf643264ace27d3b7de8b";
- // String uri = "sip:34020000002000000001@3402000000";
- // // qop 保护质量 包含auth(默认的)和auth-int(增加了报文完整性检测)两种策略
- // String qop = "auth";
- // // 客户端随机数,这是一个不透明的字符串值,由客户端提供,并且客户端和服务器都会使用,以避免用明文文本。
- // // 这使得双方都可以查验对方的身份,并对消息的完整性提供一些保护
- // //String cNonce = authHeader.getCNonce();
- // // nonce计数器,是一个16进制的数值,表示同一nonce下客户端发送出请求的数量
- // int nc = 1;
- // String ncStr = new DecimalFormat("00000000").format(nc);
- // // String ncStr = new DecimalFormat("00000000").format(Integer.parseInt(nc + "", 16));
- // MessageDigest messageDigest = MessageDigest.getInstance(DEFAULT_ALGORITHM);
- // String A1 = username + ":" + realm + ":" + "12345678";
- // String A2 = "REGISTER" + ":" + uri;
- // byte mdbytes[] = messageDigest.digest(A1.getBytes());
- // String HA1 = toHexString(mdbytes);
- // System.out.println("A1: " + A1);
- // System.out.println("A2: " + A2);
- // mdbytes = messageDigest.digest(A2.getBytes());
- // String HA2 = toHexString(mdbytes);
- // System.out.println("HA1: " + HA1);
- // System.out.println("HA2: " + HA2);
- // String cnonce = "0a4f113b";
- // System.out.println("nonce: " + nonce);
- // System.out.println("nc: " + ncStr);
- // System.out.println("cnonce: " + cnonce);
- // System.out.println("qop: " + qop);
- // String KD = HA1 + ":" + nonce;
- // if (qop != null && qop.equals("auth") ) {
- // if (nc != -1) {
- // KD += ":" + ncStr;
- // }
- // if (cnonce != null) {
- // KD += ":" + cnonce;
- // }
- // KD += ":" + qop;
- // }
- // KD += ":" + HA2;
- // System.out.println("KD: " + KD);
- // mdbytes = messageDigest.digest(KD.getBytes());
- // String mdString = toHexString(mdbytes);
- // System.out.println("mdString: " + mdString);
- // String response = "4f0507d4b87cdecff04bdaf4c96348f0";
- // System.out.println("response: " + response);
- // }
- }
|