line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Crypt::OdinAuth; |
2
|
|
|
|
|
|
|
|
3
|
3
|
|
|
3
|
|
40414
|
use 5.006; |
|
3
|
|
|
|
|
11
|
|
|
3
|
|
|
|
|
93
|
|
4
|
3
|
|
|
3
|
|
14
|
use strict; |
|
3
|
|
|
|
|
3
|
|
|
3
|
|
|
|
|
71
|
|
5
|
3
|
|
|
3
|
|
11
|
use warnings; |
|
3
|
|
|
|
|
13
|
|
|
3
|
|
|
|
|
101
|
|
6
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
=head1 NAME |
8
|
|
|
|
|
|
|
|
9
|
|
|
|
|
|
|
Crypt::OdinAuth - Cryptographic calculations for the OdinAuth SSO system |
10
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
=head1 VERSION |
12
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
Version 0.2.1 |
14
|
|
|
|
|
|
|
|
15
|
|
|
|
|
|
|
=cut |
16
|
|
|
|
|
|
|
|
17
|
|
|
|
|
|
|
our $VERSION = '0.2.1'; |
18
|
|
|
|
|
|
|
|
19
|
3
|
|
|
3
|
|
3676
|
use Digest; |
|
3
|
|
|
|
|
1613
|
|
|
3
|
|
|
|
|
93
|
|
20
|
3
|
|
|
3
|
|
1560
|
use Digest::HMAC; |
|
3
|
|
|
|
|
1572
|
|
|
3
|
|
|
|
|
159
|
|
21
|
3
|
|
|
3
|
|
1505
|
use Digest::SHA256; |
|
3
|
|
|
|
|
10451
|
|
|
3
|
|
|
|
|
164
|
|
22
|
3
|
|
|
3
|
|
1106
|
use MIME::Base64 qw(encode_base64url decode_base64url); |
|
3
|
|
|
|
|
1351
|
|
|
3
|
|
|
|
|
241
|
|
23
|
|
|
|
|
|
|
|
24
|
3
|
|
|
3
|
|
25
|
use constant OLD_COOKIE => 24*60*60; # cookie older than 24h is discarded |
|
3
|
|
|
|
|
4
|
|
|
3
|
|
|
|
|
1554
|
|
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
=head1 SYNOPSIS |
27
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
This module exports functions for calculating and verifying signed |
29
|
|
|
|
|
|
|
cookies for OdinAuth SSO Apache handler. |
30
|
|
|
|
|
|
|
|
31
|
|
|
|
|
|
|
use Crypt::OdinAuth; |
32
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
Crypt::OdinAuth::hmac_for('secret', 'login_name', 'role1,role2,role3', 1337357387, 'netcat') |
34
|
|
|
|
|
|
|
#=> '349b7135f43bd4c0111564960e7d9d583dde0c5c' |
35
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
Crypt::OdinAuth::cookie_for('secret', 'login_name', 'role1,role2,role3', 'netcat') |
37
|
|
|
|
|
|
|
#=> 'login_name-role1,role2,role3-1337357638-7ec415a6816c8e9dab7b788e1262769ef80af7d8' |
38
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
=head1 SUBROUTINES |
40
|
|
|
|
|
|
|
|
41
|
|
|
|
|
|
|
=head2 hmac_for(secret, user, roles, timestamp, user_agent) |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
=cut |
44
|
|
|
|
|
|
|
sub hmac_for ($$$$$) { |
45
|
16
|
|
|
16
|
1
|
541
|
my ( $secret, $user, $roles, $ts, $ua ) = @_; |
46
|
16
|
|
|
|
|
43
|
my $hmac = Digest::HMAC->new($secret, Digest->new("SHA-256")); |
47
|
|
|
|
|
|
|
|
48
|
16
|
|
|
|
|
5276
|
$hmac->add(join(',', |
49
|
|
|
|
|
|
|
encode_base64url($user), |
50
|
|
|
|
|
|
|
encode_base64url($roles), |
51
|
|
|
|
|
|
|
$ts, |
52
|
|
|
|
|
|
|
encode_base64url($ua))); |
53
|
16
|
|
|
|
|
350
|
return $hmac->hexdigest; |
54
|
|
|
|
|
|
|
} |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
=head2 cookie_for(secret, user, roles, user_agent) |
57
|
|
|
|
|
|
|
|
58
|
|
|
|
|
|
|
=cut |
59
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
sub cookie_for { |
61
|
8
|
|
|
8
|
1
|
2805
|
my ( $secret, $user, $roles, $ua, $ts ) = @_; |
62
|
8
|
100
|
|
|
|
24
|
$ts = time() unless defined($ts); |
63
|
|
|
|
|
|
|
|
64
|
8
|
|
|
|
|
17
|
my $hmac = hmac_for($secret, $user, $roles, $ts, $ua); |
65
|
8
|
|
|
|
|
183
|
return join(',', |
66
|
|
|
|
|
|
|
encode_base64url($user), |
67
|
|
|
|
|
|
|
encode_base64url($roles), |
68
|
|
|
|
|
|
|
$ts, |
69
|
|
|
|
|
|
|
$hmac); |
70
|
|
|
|
|
|
|
} |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
=head2 check_cookie(secret, cookie, user_agent) |
73
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
=cut |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
sub check_cookie ($$$) { |
77
|
6
|
|
|
6
|
1
|
125
|
my ( $secret, $cookie, $ua ) = @_; |
78
|
|
|
|
|
|
|
|
79
|
6
|
50
|
|
|
|
37
|
$cookie =~ /^\s*([a-zA-Z0-9_-]+),([a-zA-Z0-9_-]+),(\d+),([0-9a-f]+)\s*$/ |
80
|
|
|
|
|
|
|
or die "Wrong cookie format\n"; |
81
|
|
|
|
|
|
|
|
82
|
6
|
|
|
|
|
14
|
my $user = decode_base64url($1); |
83
|
6
|
|
|
|
|
57
|
my $roles = decode_base64url($2); |
84
|
6
|
|
|
|
|
34
|
my $ts = $3; |
85
|
6
|
|
|
|
|
11
|
my $hmac = $4; |
86
|
|
|
|
|
|
|
|
87
|
|
|
|
|
|
|
# Use double hmac to prevent timing attacks |
88
|
|
|
|
|
|
|
# http://codahale.com/a-lesson-in-timing-attacks/ |
89
|
|
|
|
|
|
|
# http://www.isecpartners.com/blog/2011/2/18/double-hmac-verification.html |
90
|
6
|
|
|
|
|
15
|
my $hmac_received = Digest::HMAC->new($secret, Digest->new("SHA-256")); |
91
|
6
|
|
|
|
|
257
|
my $hmac_calculated = Digest::HMAC->new($secret, Digest->new("SHA-256")); |
92
|
|
|
|
|
|
|
|
93
|
6
|
|
|
|
|
218
|
$hmac_received->add($hmac); |
94
|
6
|
|
|
|
|
28
|
$hmac_calculated->add(hmac_for($secret, $user, $roles, $ts, $ua)); |
95
|
|
|
|
|
|
|
|
96
|
6
|
100
|
|
|
|
130
|
die "Invalid signature\n" |
97
|
|
|
|
|
|
|
if ( $hmac_received->digest ne $hmac_calculated->digest ); |
98
|
|
|
|
|
|
|
|
99
|
4
|
100
|
|
|
|
147
|
die "Cookie is old\n" |
100
|
|
|
|
|
|
|
if ( $ts < time() - OLD_COOKIE ); |
101
|
|
|
|
|
|
|
|
102
|
3
|
100
|
|
|
|
11
|
die "Cookie is in future\n" |
103
|
|
|
|
|
|
|
if ( $ts > time() + 5*60 ); |
104
|
|
|
|
|
|
|
|
105
|
2
|
|
|
|
|
7
|
return $user, $roles; |
106
|
|
|
|
|
|
|
} |
107
|
|
|
|
|
|
|
|
108
|
|
|
|
|
|
|
=head1 AUTHOR |
109
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
Maciej Pasternacki, C<< >> |
111
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
=head1 BUGS |
113
|
|
|
|
|
|
|
|
114
|
|
|
|
|
|
|
Please report any bugs or feature requests to C, or through |
115
|
|
|
|
|
|
|
the web interface at L. I will be notified, and then you'll |
116
|
|
|
|
|
|
|
automatically be notified of progress on your bug as I make changes. |
117
|
|
|
|
|
|
|
|
118
|
|
|
|
|
|
|
|
119
|
|
|
|
|
|
|
|
120
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
=head1 SUPPORT |
122
|
|
|
|
|
|
|
|
123
|
|
|
|
|
|
|
You can find documentation for this module with the perldoc command. |
124
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
perldoc Crypt::OdinAuth |
126
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
|
128
|
|
|
|
|
|
|
You can also look for information at: |
129
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
=over 4 |
131
|
|
|
|
|
|
|
|
132
|
|
|
|
|
|
|
=item * RT: CPAN's request tracker (report bugs here) |
133
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
L |
135
|
|
|
|
|
|
|
|
136
|
|
|
|
|
|
|
=item * AnnoCPAN: Annotated CPAN documentation |
137
|
|
|
|
|
|
|
|
138
|
|
|
|
|
|
|
L |
139
|
|
|
|
|
|
|
|
140
|
|
|
|
|
|
|
=item * CPAN Ratings |
141
|
|
|
|
|
|
|
|
142
|
|
|
|
|
|
|
L |
143
|
|
|
|
|
|
|
|
144
|
|
|
|
|
|
|
=item * Search CPAN |
145
|
|
|
|
|
|
|
|
146
|
|
|
|
|
|
|
L |
147
|
|
|
|
|
|
|
|
148
|
|
|
|
|
|
|
=back |
149
|
|
|
|
|
|
|
|
150
|
|
|
|
|
|
|
|
151
|
|
|
|
|
|
|
=head1 ACKNOWLEDGEMENTS |
152
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
|
154
|
|
|
|
|
|
|
=head1 LICENSE AND COPYRIGHT |
155
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
Copyright 2012 Maciej Pasternacki. |
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify it |
159
|
|
|
|
|
|
|
under the terms of either: the GNU General Public License as published |
160
|
|
|
|
|
|
|
by the Free Software Foundation; or the Artistic License. |
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
See http://dev.perl.org/licenses/ for more information. |
163
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
|
165
|
|
|
|
|
|
|
=cut |
166
|
|
|
|
|
|
|
|
167
|
|
|
|
|
|
|
1; # End of Crypt::OdinAuth |