roundcubemail-plugins-kolab/plugins/kolab_2fa/lib/Kolab2FA/Driver/TOTP.php
Aleksander Machniak 70810e1f88 kolab_2fa: Bump spomky-labs/otphp to version 10
Fixes various PHP8 warnings
2023-06-15 12:26:53 +02:00

137 lines
4.2 KiB
PHP

<?php
/**
* Kolab 2-Factor-Authentication TOTP driver implementation
*
* @author Thomas Bruederli <bruederli@kolabsys.com>
*
* Copyright (C) 2015, Kolab Systems AG <contact@kolabsys.com>
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
namespace Kolab2FA\Driver;
class TOTP extends Base
{
public $method = 'totp';
protected $config = array(
'digits' => 6,
'interval' => 30,
'digest' => 'sha1',
);
protected $backend;
/**
*
*/
public function init($config)
{
parent::init($config);
$this->user_settings += array(
'secret' => array(
'type' => 'text',
'private' => true,
'label' => 'secret',
'generator' => 'generate_secret',
),
);
if (!in_array($this->config['digest'], array('md5', 'sha1', 'sha256', 'sha512'))) {
throw new \Exception("'{$this->config['digest']}' digest is not supported.");
}
if (!is_numeric($this->config['digits']) || $this->config['digits'] < 1) {
throw new \Exception('Digits must be at least 1.');
}
if (!is_numeric($this->config['interval']) || $this->config['interval'] < 1) {
throw new \Exception('Interval must be at least 1.');
}
if ($this->hasSemicolon($this->config['issuer'])) {
throw new \Exception('Issuer must not contain a semi-colon.');
}
// copy config options
$this->backend = \OTPHP\TOTP::create(
null, //secret
$this->config['interval'], // period
$this->config['digest'], // digest
$this->config['digits'] // digits
);
$this->backend->setIssuer($this->config['issuer']);
$this->backend->setIssuerIncludedAsParameter(true);
}
/**
*
*/
public function verify($code, $timestamp = null)
{
// get my secret from the user storage
$secret = $this->get('secret');
if (!strlen($secret)) {
// LOG: "no secret set for user $this->username"
// rcube::console("VERIFY TOTP: no secret set for user $this->username");
return false;
}
$this->backend->setLabel($this->username);
$this->backend->setSecret($secret);
// Pass a window to indicate the maximum timeslip between client (mobile
// device) and server.
$pass = $this->backend->verify($code, (int) $timestamp, 150);
// try all codes from $timestamp till now
if (!$pass && $timestamp) {
$now = time();
while (!$pass && $timestamp < $now) {
$pass = $code === $this->backend->at($timestamp);
$timestamp += $this->config['interval'];
}
}
// rcube::console('VERIFY TOTP', $this->username, $secret, $code, $timestamp, $pass);
return $pass;
}
/**
* Get the provisioning URI.
*/
public function get_provisioning_uri()
{
// rcube::console('PROV', $this->secret);
if (!$this->secret) {
// generate new secret and store it
$this->set('secret', $this->get('secret', true));
$this->set('created', $this->get('created', true));
// rcube::console('PROV2', $this->secret);
$this->commit();
}
// TODO: deny call if already active?
$this->backend->setLabel($this->username);
$this->backend->setSecret($this->secret);
return $this->backend->getProvisioningUri();
}
}