abstract class GoogleAuthenticator {
- function __construct() {
+ function __construct($totpskew=1, $hotpskew=10, $hotphuntvalue=200000) {
+ // the hotpskew is how many tokens forward we look to find the input
+ // code the user used
+ $this->hotpSkew = $hotpskew;
+
+ // the totpskew value is how many tokens either side of the current
+ // token we should check, based on a time skew.
+ $this->totpSkew = $totpskew;
+
+ // the hotphuntvalue is what we use to resync tokens.
+ // when a user resyncs, we search from 0 to $hutphutvalue to find
+ // the two token codes the user has entered - 200000 seems like overkill
+ // really as i cant imagine any token out there would ever make it
+ // past 200000 token code requests.
+ $this->hotpHuntValue = $hotphuntvalue;
}
+ // pure abstract functions that need to be overloaded when
+ // creating a sub class
abstract function getData($username);
abstract function putData($username, $data);
abstract function getUsers();
$data["tokentimer"] = 30; // the token timer (For totp) and not supported by ga yet
$data["tokencounter"] = 1; // the token counter for hotp
$data["tokenalgorithm"] = "SHA1"; // the token algorithm (not supported by ga yet)
- $data["user1"] = ""; // a place for implementors to store their own data
+ $data["user"] = ""; // a place for implementors to store their own data
return $data;
}
- // an internal funciton to get
+ // an internal funciton to get data from the overloaded functions
+ // and turn them into php arrays.
function internalGetData($username) {
$data = $this->getData($username);
$deco = unserialize(base64_decode($data));
return $deco;
}
-
+ // the function used inside the class to put the data into the
+ // datastore using the overloaded data saving class
function internalPutData($username, $data) {
- $enco = base64_encode(serialize($data));
+ if($data == "") $enco = "";
+ else $enco = base64_encode(serialize($data));
return $this->putData($username, $enco);
}
// so lets not be able to set that yet
function setTokenType($username, $tokentype) {
$tokentype = strtoupper($tokentype);
- if($tokentype!="HOTP" and $tokentype!="TOTP") {
+ if($tokentype!="HOTP" && $tokentype!="TOTP") {
$errorText = "Invalid Token Type";
return false;
}
$data = $this->internalGetData($username);
$data["tokentype"] = $tokentype;
- $this->internalPutData($username, $data);
+ return $this->internalPutData($username, $data);
- return true;
}
// create "user" with insert
function setUser($username, $ttype="HOTP", $key = "", $hexkey="") {
+ $ttype = strtoupper($ttype);
+ if($ttype != "HOTP" && $ttype !="TOTP") return false;
if($key == "") $key = $this->createBase32Key();
$hkey = $this->helperb322hex($key);
if($hexkey != "") $hkey = $hexkey;
$token["tokenkey"] = $hkey;
$token["tokentype"] = $ttype;
- $this->internalPutData($username, $token);
+ if(!$this->internalPutData($username, $token)) {
+ return false;
+ }
return $key;
}
-
+ // a function to determine if the user has an actual token
function hasToken($username) {
$token = $this->internalGetData($username);
// TODO: change this to a pattern match for an actual key
// consider scrapping this
$token = $this->internalGetData($username);
$token["tokenkey"] = $key;
- $this->internalPutData($username, $token);
+ $this->internalPutData($username, $token);
+
+ // TODO error checking
+ return true;
}
// self explanitory?
function deleteUser($username) {
// oh, we need to figure out how to do thi?
- $data = $this->internalGetData($username);
- $data["tokenkey"] = "";
- $this->internalPutData($username);
+ $this->internalPutData($username, "");
}
// user has input their user name and some code, authenticate
switch($ttype) {
case "HOTP":
error_log("in hotp");
- $st = $tlid;
- $en = $tlid+20;
+ $st = $tlid+1;
+ $en = $tlid+$this->hotpSkew;
for($i=$st; $i<$en; $i++) {
$stest = $this->oath_hotp($tkey, $i);
error_log("testing code: $code, $stest, $tkey, $tid");
case "TOTP":
error_log("in totp");
$t_now = time();
- $t_ear = $t_now - 45;
- $t_lat = $t_now + 60;
- $t_st = ((int)($t_ear/30));
- $t_en = ((int)($t_lat/30));
+ $t_ear = $t_now - ($this->totpSkew*$tokendata["tokentimer"]);
+ $t_lat = $t_now + ($this->totpSkew*$tokendata["tokentimer"]);
+ $t_st = ((int)($t_ear/$tokendata["tokentimer"]));
+ $t_en = ((int)($t_lat/$tokendata["tokentimer"]));
//error_log("kmac: $t_now, $t_ear, $t_lat, $t_st, $t_en");
for($i=$t_st; $i<=$t_en; $i++) {
$stest = $this->oath_hotp($tkey, $i);
}
break;
default:
- echo "how the frig did i end up here?";
+ return false;
}
return false;
switch($ttype) {
case "HOTP":
$st = 0;
- $en = 200000;
+ $en = $this->hotpHuntValue;
for($i=$st; $i<$en; $i++) {
$stest = $this->oath_hotp($tkey, $i);
//echo "code: $code, $stest, $tkey\n";
$data = $this->internalGetData($user);
$toktype = $data["tokentype"];
$key = $this->helperhex2b32($data["tokenkey"]);
- $counter = $data["tokencounter"];
+
+ // token counter should be one more then current token value, otherwise
+ // it gets confused
+ $counter = $data["tokencounter"]+1;
$toktype = strtolower($toktype);
if($toktype == "hotp") {
$url = "otpauth://$toktype/$user?secret=$key&counter=$counter";
}
+ // TODO: lots of error checking goes in here
function helperb322hex($b32) {
$alphabet = "ABCDEFGHIJKLMNOPQRSTUVWXYZ234567";
return $out2;
}
+ // TODO: lots of error checking goes in here
function helperhex2b32($hex) {
$alphabet = "ABCDEFGHIJKLMNOPQRSTUVWXYZ234567";
return $out2;
}
+ // i've put alot of faith in the code from the
+ // php site's examples for the hash_hmac algorithm
+ // i assume its mostly correct but i should do
+ // some testing to verify this is actually the case
function oath_hotp($key, $counter)
{
$key = pack("H*", $key);
return str_pad($this->oath_truncate($hash), 6, "0", STR_PAD_LEFT);
}
+
function oath_truncate($hash, $length = 6)
{
// Convert to dec
private $errorText;
private $errorCode;
+ private $hotpSkew;
+ private $totpSkew;
+
+ private $hotpHuntValue;
+
+
/*
* error codes
* 1: Auth Failed