177 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			PHP
		
	
	
	
		
		
			
		
	
	
			177 lines
		
	
	
		
			4.9 KiB
		
	
	
	
		
			PHP
		
	
	
	
|  | <?php | ||
|  | namespace Duo; | ||
|  | 
 | ||
|  | /* | ||
|  |  * https://duo.com/docs/duoweb | ||
|  |  */ | ||
|  | 
 | ||
|  | class Web | ||
|  | { | ||
|  |     const DUO_PREFIX = "TX"; | ||
|  |     const APP_PREFIX = "APP"; | ||
|  |     const AUTH_PREFIX = "AUTH"; | ||
|  | 
 | ||
|  |     const DUO_EXPIRE = 300; | ||
|  |     const APP_EXPIRE = 3600; | ||
|  |     const INIT_EXPIRE = 300; | ||
|  | 
 | ||
|  |     const IKEY_LEN = 20; | ||
|  |     const SKEY_LEN = 40; | ||
|  |     const AKEY_LEN = 40; // if this changes you have to change ERR_AKEY
 | ||
|  | 
 | ||
|  |     const ERR_USER = 'ERR|The username specified is invalid.'; | ||
|  |     const ERR_IKEY = 'ERR|The Duo integration key specified is invalid.'; | ||
|  |     const ERR_SKEY = 'ERR|The Duo secret key specified is invalid.'; | ||
|  |     const ERR_AKEY = 'ERR|The application secret key specified must be at least 40 characters.'; | ||
|  | 
 | ||
|  |     const LIBRARY_NAME = 'duo_php'; | ||
|  |     const VERSION = '1.0.0'; | ||
|  | 
 | ||
|  |     private static function signVals($key, $vals, $prefix, $expire, $time = null, $algo = "sha1") | ||
|  |     { | ||
|  |         $exp = ($time ? $time : time()) + $expire; | ||
|  |         $val = $vals . '|' . $exp; | ||
|  |         $b64 = base64_encode($val); | ||
|  |         $cookie = $prefix . '|' . $b64; | ||
|  | 
 | ||
|  |         $sig = hash_hmac($algo, $cookie, $key); | ||
|  |         return $cookie . '|' . $sig; | ||
|  |     } | ||
|  | 
 | ||
|  |     private static function parseVals($key, $val, $prefix, $ikey, $time = null, $algo = "sha1") | ||
|  |     { | ||
|  |         $ts = ($time ? $time : time()); | ||
|  | 
 | ||
|  |         $parts = explode('|', $val); | ||
|  |         if (count($parts) !== 3) { | ||
|  |             return null; | ||
|  |         } | ||
|  |         list($u_prefix, $u_b64, $u_sig) = $parts; | ||
|  | 
 | ||
|  |         $sig = hash_hmac($algo, $u_prefix . '|' . $u_b64, $key); | ||
|  |         if (hash_hmac($algo, $sig, $key) !== hash_hmac($algo, $u_sig, $key)) { | ||
|  |             return null; | ||
|  |         } | ||
|  | 
 | ||
|  |         if ($u_prefix !== $prefix) { | ||
|  |             return null; | ||
|  |         } | ||
|  | 
 | ||
|  |         $cookie_parts = explode('|', base64_decode($u_b64)); | ||
|  |         if (count($cookie_parts) !== 3) { | ||
|  |             return null; | ||
|  |         } | ||
|  |         list($user, $u_ikey, $exp) = $cookie_parts; | ||
|  | 
 | ||
|  |         if ($u_ikey !== $ikey) { | ||
|  |             return null; | ||
|  |         } | ||
|  |         if ($ts >= intval($exp)) { | ||
|  |             return null; | ||
|  |         } | ||
|  | 
 | ||
|  |         return $user; | ||
|  |     } | ||
|  | 
 | ||
|  |     public static function signRequest($ikey, $skey, $akey, $username, $time = null) | ||
|  |     { | ||
|  |         if (!isset($username) || strlen($username) === 0) { | ||
|  |             return self::ERR_USER; | ||
|  |         } | ||
|  |         if (strpos($username, '|') !== false) { | ||
|  |             return self::ERR_USER; | ||
|  |         } | ||
|  |         if (!isset($ikey) || strlen($ikey) !== self::IKEY_LEN) { | ||
|  |             return self::ERR_IKEY; | ||
|  |         } | ||
|  |         if (!isset($skey) || strlen($skey) !== self::SKEY_LEN) { | ||
|  |             return self::ERR_SKEY; | ||
|  |         } | ||
|  |         if (!isset($akey) || strlen($akey) < self::AKEY_LEN) { | ||
|  |             return self::ERR_AKEY; | ||
|  |         } | ||
|  | 
 | ||
|  |         $vals = $username . '|' . $ikey; | ||
|  | 
 | ||
|  |         $duo_sig = self::signVals($skey, $vals, self::DUO_PREFIX, self::DUO_EXPIRE, $time); | ||
|  |         $app_sig = self::signVals($akey, $vals, self::APP_PREFIX, self::APP_EXPIRE, $time); | ||
|  | 
 | ||
|  |         return $duo_sig . ':' . $app_sig; | ||
|  |     } | ||
|  | 
 | ||
|  |     public static function verifyResponse($ikey, $skey, $akey, $sig_response, $time = null) | ||
|  |     { | ||
|  |         list($auth_sig, $app_sig) = explode(':', $sig_response); | ||
|  | 
 | ||
|  |         $auth_user = self::parseVals($skey, $auth_sig, self::AUTH_PREFIX, $ikey, $time); | ||
|  |         $app_user = self::parseVals($akey, $app_sig, self::APP_PREFIX, $ikey, $time); | ||
|  | 
 | ||
|  |         if ($auth_user !== $app_user) { | ||
|  |             return null; | ||
|  |         } | ||
|  | 
 | ||
|  |         return $auth_user; | ||
|  |     } | ||
|  | 
 | ||
|  |     public static function initAuth($client, $ikey, $akey, $username, $enroll_only = false) | ||
|  |     { | ||
|  |         if (!isset($username) || strlen($username) === 0) { | ||
|  |             return self::ERR_USER; | ||
|  |         } | ||
|  |         if (strpos($username, '|') !== false) { | ||
|  |             return self::ERR_USER; | ||
|  |         } | ||
|  |         if (!isset($ikey) || strlen($ikey) !== self::IKEY_LEN) { | ||
|  |             return self::ERR_IKEY; | ||
|  |         } | ||
|  |         if (!isset($akey) || strlen($akey) < self::AKEY_LEN) { | ||
|  |             return self::ERR_AKEY; | ||
|  |         } | ||
|  | 
 | ||
|  |         $blob = $username . '|' . $ikey; | ||
|  |         $signed_blob = self::signVals( | ||
|  |             $akey, | ||
|  |             $blob, | ||
|  |             self::APP_PREFIX, | ||
|  |             self::APP_EXPIRE, | ||
|  |             null, | ||
|  |             'sha512' | ||
|  |         ); | ||
|  |         $expire = time() + self::INIT_EXPIRE; | ||
|  |         $client_version = self::LIBRARY_NAME . '/' . self::VERSION; | ||
|  | 
 | ||
|  |         $response = $client->init( | ||
|  |             $username, | ||
|  |             $signed_blob, | ||
|  |             $expire, | ||
|  |             $client_version, | ||
|  |             $enroll_only | ||
|  |         ); | ||
|  | 
 | ||
|  |         return $response['response']['response']['txid']; | ||
|  |     } | ||
|  | 
 | ||
|  |     public static function verifyAuth($client, $ikey, $akey, $response_txid) | ||
|  |     { | ||
|  |         $response = $client->auth_response($response_txid); | ||
|  | 
 | ||
|  |         $username = $response['response']['response']['uname']; | ||
|  |         $signed_blob = $response['response']['response']['app_blob']; | ||
|  | 
 | ||
|  |         $parsed_user = self::parseVals( | ||
|  |             $akey, | ||
|  |             $signed_blob, | ||
|  |             self::APP_PREFIX, | ||
|  |             $ikey, | ||
|  |             null, | ||
|  |             'sha512' | ||
|  |         ); | ||
|  | 
 | ||
|  |         if ($username !== $parsed_user) { | ||
|  |             return null; | ||
|  |         } | ||
|  | 
 | ||
|  |         return $username; | ||
|  |     } | ||
|  | } |