forked from friendica/friendica-addons
227 lines
7.6 KiB
PHP
227 lines
7.6 KiB
PHP
<?php
|
|
|
|
require_once 'Sabre/HTTP/ResponseMock.php';
|
|
|
|
class Sabre_HTTP_DigestAuthTest extends PHPUnit_Framework_TestCase {
|
|
|
|
/**
|
|
* @var Sabre_HTTP_ResponseMock
|
|
*/
|
|
private $response;
|
|
/**
|
|
* @var Sabre_HTTP_DigestAuth
|
|
*/
|
|
private $auth;
|
|
|
|
const REALM = 'SabreDAV unittest';
|
|
|
|
public function setUp() {
|
|
|
|
$this->response = new Sabre_HTTP_ResponseMock();
|
|
$this->auth = new Sabre_HTTP_DigestAuth();
|
|
$this->auth->setRealm(self::REALM);
|
|
$this->auth->setHTTPResponse($this->response);
|
|
|
|
}
|
|
|
|
public function testDigest() {
|
|
|
|
list($nonce,$opaque) = $this->getServerTokens();
|
|
|
|
$username = 'admin';
|
|
$password = 12345;
|
|
$nc = '00002';
|
|
$cnonce = uniqid();
|
|
|
|
$digestHash = md5(
|
|
md5($username . ':' . self::REALM . ':' . $password) . ':' .
|
|
$nonce . ':' .
|
|
$nc . ':' .
|
|
$cnonce . ':' .
|
|
'auth:' .
|
|
md5('GET' . ':' . '/')
|
|
);
|
|
|
|
$request = new Sabre_HTTP_Request(array(
|
|
'REQUEST_METHOD' => 'GET',
|
|
'PHP_AUTH_DIGEST' => 'username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth,nc='.$nc.',cnonce="' . $cnonce . '"',
|
|
));
|
|
|
|
$this->auth->setHTTPRequest($request);
|
|
$this->auth->init();
|
|
|
|
$this->assertEquals($username,$this->auth->getUserName());
|
|
$this->assertEquals(self::REALM,$this->auth->getRealm());
|
|
$this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)),'Authentication is deemed invalid through validateA1');
|
|
$this->assertTrue($this->auth->validatePassword($password),'Authentication is deemed invalid through validatePassword');
|
|
|
|
}
|
|
|
|
public function testDigestCGIFormat() {
|
|
|
|
list($nonce,$opaque) = $this->getServerTokens();
|
|
|
|
$username = 'admin';
|
|
$password = 12345;
|
|
$nc = '00002';
|
|
$cnonce = uniqid();
|
|
|
|
$digestHash = md5(
|
|
md5($username . ':' . self::REALM . ':' . $password) . ':' .
|
|
$nonce . ':' .
|
|
$nc . ':' .
|
|
$cnonce . ':' .
|
|
'auth:' .
|
|
md5('GET' . ':' . '/')
|
|
);
|
|
|
|
$request = new Sabre_HTTP_Request(array(
|
|
'REQUEST_METHOD' => 'GET',
|
|
'HTTP_AUTHORIZATION' => 'Digest username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth,nc='.$nc.',cnonce="' . $cnonce . '"',
|
|
));
|
|
|
|
$this->auth->setHTTPRequest($request);
|
|
$this->auth->init();
|
|
|
|
$this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)),'Authentication is deemed invalid through validateA1');
|
|
$this->assertTrue($this->auth->validatePassword($password),'Authentication is deemed invalid through validatePassword');
|
|
|
|
}
|
|
|
|
public function testDigestApacheEdgeCase() {
|
|
|
|
list($nonce,$opaque) = $this->getServerTokens();
|
|
|
|
$username = 'admin';
|
|
$password = 12345;
|
|
$nc = '00002';
|
|
$cnonce = uniqid();
|
|
|
|
$digestHash = md5(
|
|
md5($username . ':' . self::REALM . ':' . $password) . ':' .
|
|
$nonce . ':' .
|
|
$nc . ':' .
|
|
$cnonce . ':' .
|
|
'auth:' .
|
|
md5('GET' . ':' . '/')
|
|
);
|
|
|
|
$request = new Sabre_HTTP_Request(array(
|
|
'REQUEST_METHOD' => 'GET',
|
|
'REDIRECT_HTTP_AUTHORIZATION' => 'Digest username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth,nc='.$nc.',cnonce="' . $cnonce . '"',
|
|
));
|
|
|
|
$this->auth->setHTTPRequest($request);
|
|
$this->auth->init();
|
|
|
|
$this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)),'Authentication is deemed invalid through validateA1');
|
|
$this->assertTrue($this->auth->validatePassword($password),'Authentication is deemed invalid through validatePassword');
|
|
|
|
}
|
|
|
|
public function testInvalidDigest() {
|
|
|
|
list($nonce,$opaque) = $this->getServerTokens();
|
|
|
|
$username = 'admin';
|
|
$password = 12345;
|
|
$nc = '00002';
|
|
$cnonce = uniqid();
|
|
|
|
$digestHash = md5(
|
|
md5($username . ':' . self::REALM . ':' . $password) . ':' .
|
|
$nonce . ':' .
|
|
$nc . ':' .
|
|
$cnonce . ':' .
|
|
'auth:' .
|
|
md5('GET' . ':' . '/')
|
|
);
|
|
|
|
$request = new Sabre_HTTP_Request(array(
|
|
'REQUEST_METHOD' => 'GET',
|
|
'PHP_AUTH_DIGEST' => 'username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth,nc='.$nc.',cnonce="' . $cnonce . '"',
|
|
));
|
|
|
|
$this->auth->setHTTPRequest($request);
|
|
$this->auth->init();
|
|
|
|
$this->assertFalse($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . ($password . 'randomness'))),'Authentication is deemed invalid through validateA1');
|
|
|
|
}
|
|
|
|
public function testInvalidDigest2() {
|
|
|
|
$request = new Sabre_HTTP_Request(array(
|
|
'REQUEST_METHOD' => 'GET',
|
|
'HTTP_AUTHORIZATION' => 'basic blablabla',
|
|
));
|
|
|
|
$this->auth->setHTTPRequest($request);
|
|
$this->auth->init();
|
|
|
|
$this->assertFalse($this->auth->validateA1(md5('user:realm:password')));
|
|
|
|
}
|
|
|
|
|
|
public function testDigestAuthInt() {
|
|
|
|
$this->auth->setQOP(Sabre_HTTP_DigestAuth::QOP_AUTHINT | Sabre_HTTP_DigestAuth::QOP_AUTH);
|
|
list($nonce,$opaque) = $this->getServerTokens(Sabre_HTTP_DigestAuth::QOP_AUTHINT| Sabre_HTTP_DigestAuth::QOP_AUTH);
|
|
|
|
$username = 'admin';
|
|
$password = 12345;
|
|
$nc = '00003';
|
|
$cnonce = uniqid();
|
|
|
|
$digestHash = md5(
|
|
md5($username . ':' . self::REALM . ':' . $password) . ':' .
|
|
$nonce . ':' .
|
|
$nc . ':' .
|
|
$cnonce . ':' .
|
|
'auth-int:' .
|
|
md5('POST' . ':' . '/' . ':' . md5('body'))
|
|
);
|
|
|
|
$request = new Sabre_HTTP_Request(array(
|
|
'REQUEST_METHOD' => 'POST',
|
|
'PHP_AUTH_DIGEST' => 'username="'.$username.'", realm="' . self::REALM . '", nonce="' . $nonce . '", uri="/", response="' . $digestHash . '", opaque="' . $opaque . '", qop=auth-int,nc='.$nc.',cnonce="' . $cnonce . '"',
|
|
));
|
|
$request->setBody('body');
|
|
|
|
$this->auth->setHTTPRequest($request);
|
|
|
|
$this->auth->init();
|
|
|
|
$this->assertTrue($this->auth->validateA1(md5($username . ':' . self::REALM . ':' . $password)),'Authentication is deemed invalid through validateA1');
|
|
|
|
}
|
|
|
|
private function getServerTokens($qop = Sabre_HTTP_DigestAuth::QOP_AUTH) {
|
|
|
|
$this->auth->requireLogin();
|
|
|
|
switch($qop) {
|
|
case Sabre_HTTP_DigestAuth::QOP_AUTH : $qopstr='auth'; break;
|
|
case Sabre_HTTP_DigestAuth::QOP_AUTHINT : $qopstr='auth-int'; break;
|
|
default : $qopstr='auth,auth-int'; break;
|
|
}
|
|
|
|
$test = preg_match('/Digest realm="'.self::REALM.'",qop="'.$qopstr.'",nonce="([0-9a-f]*)",opaque="([0-9a-f]*)"/',
|
|
$this->response->headers['WWW-Authenticate'],$matches);
|
|
|
|
$this->assertTrue($test==true,'The WWW-Authenticate response didn\'t match our pattern. We received: ' . $this->response->headers['WWW-Authenticate']);
|
|
|
|
$nonce = $matches[1];
|
|
$opaque = $matches[2];
|
|
|
|
// Reset our environment
|
|
$this->setUp();
|
|
$this->auth->setQOP($qop);
|
|
|
|
return array($nonce,$opaque);
|
|
|
|
}
|
|
|
|
}
|