ShellBanner
System:Linux MiraNet 3.0.0-14-generic-pae #23-Ubuntu SMP Mon Nov 21 22:07:10 UTC 2011 i686
Software:Apache. PHP/5.3.6-13ubuntu3.10
ID:uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
Safe Mode:OFF
Open_Basedir:OFF
Freespace:23.63 GB of 70.42 GB (33.55%)
MySQL: ON MSSQL: OFF Oracle: OFF PostgreSQL: OFF Curl: OFF Sockets: ON Fetch: OFF Wget: ON Perl: ON
Disabled Functions: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,

/ http/ mail.1/ program/ lib/ Auth/ SASL/ - drwxr-xr-x

Directory:
Viewing file:     DigestMD5.php (8.4 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php
// +-----------------------------------------------------------------------+ 
// | Copyright (c) 2002-2003 Richard Heyes                                 | 
// | All rights reserved.                                                  | 
// |                                                                       | 
// | Redistribution and use in source and binary forms, with or without    | 
// | modification, are permitted provided that the following conditions    | 
// | are met:                                                              | 
// |                                                                       | 
// | o Redistributions of source code must retain the above copyright      | 
// |   notice, this list of conditions and the following disclaimer.       | 
// | o Redistributions in binary form must reproduce the above copyright   | 
// |   notice, this list of conditions and the following disclaimer in the | 
// |   documentation and/or other materials provided with the distribution.| 
// | o The names of the authors may not be used to endorse or promote      | 
// |   products derived from this software without specific prior written  | 
// |   permission.                                                         | 
// |                                                                       | 
// | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS   | 
// | "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT     | 
// | LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR | 
// | A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT  | 
// | OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | 
// | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT      | 
// | LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | 
// | DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | 
// | THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT   | 
// | (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | 
// | OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.  | 
// |                                                                       | 
// +-----------------------------------------------------------------------+ 
// | Author: Richard Heyes <richard@php.net>                               | 
// +-----------------------------------------------------------------------+ 
// 
// $Id: DigestMD5.php 2965 2009-09-18 08:03:20Z alec $

/**
* Implmentation of DIGEST-MD5 SASL mechanism
*
* @author  Richard Heyes <richard@php.net>
* @access  public
* @version 1.0
* @package Auth_SASL
*/

require_once('Auth/SASL/Common.php');

class 
Auth_SASL_DigestMD5 extends Auth_SASL_Common
{
    
/**
    * Provides the (main) client response for DIGEST-MD5
    * requires a few extra parameters than the other
    * mechanisms, which are unavoidable.
    * 
    * @param  string $authcid   Authentication id (username)
    * @param  string $pass      Password
    * @param  string $challenge The digest challenge sent by the server
    * @param  string $hostname  The hostname of the machine you're connecting to
    * @param  string $service   The servicename (eg. imap, pop, acap etc)
    * @param  string $authzid   Authorization id (username to proxy as)
    * @return string            The digest response (NOT base64 encoded)
    * @access public
    */
    
function getResponse($authcid$pass$challenge$hostname$service$authzid '')
    {
        
$challenge $this->_parseChallenge($challenge);
        
$authzid_string '';
        if (
$authzid != '') {
            
$authzid_string ',authzid="' $authzid '"'
        }

        if (!empty(
$challenge)) {
            
$cnonce         $this->_getCnonce();
            
$digest_uri     sprintf('%s/%s'$service$hostname);
            
$response_value $this->_getResponseValue($authcid$pass$challenge['realm'], $challenge['nonce'], $cnonce$digest_uri$authzid);

            if (
$challenge['realm']) {
                return 
sprintf('username="%s",realm="%s"' $authzid_string  .
',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d'$authcid$challenge['realm'], $challenge['nonce'], $cnonce$digest_uri$response_value$challenge['maxbuf']);
            } else {
                return 
sprintf('username="%s"' $authzid_string  ',nonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",response=%s,maxbuf=%d'$authcid$challenge['nonce'], $cnonce$digest_uri$response_value$challenge['maxbuf']);
            }
        } else {
            return 
PEAR::raiseError('Invalid digest challenge');
        }
    }
    
    
/**
    * Parses and verifies the digest challenge*
    *
    * @param  string $challenge The digest challenge
    * @return array             The parsed challenge as an assoc
    *                           array in the form "directive => value".
    * @access private
    */
    
function _parseChallenge($challenge)
    {
        
$tokens = array();
        while (
preg_match('/^([a-z-]+)=("[^"]+(?<!\\\)"|[^,]+)/i'$challenge$matches)) {

            
// Ignore these as per rfc2831
            
if ($matches[1] == 'opaque' OR $matches[1] == 'domain') {
                
$challenge substr($challengestrlen($matches[0]) + 1);
                continue;
            }

            
// Allowed multiple "realm" and "auth-param"
            
if (!empty($tokens[$matches[1]]) AND ($matches[1] == 'realm' OR $matches[1] == 'auth-param')) {
                if (
is_array($tokens[$matches[1]])) {
                    
$tokens[$matches[1]][] = preg_replace('/^"(.*)"$/''\\1'$matches[2]);
                } else {
                    
$tokens[$matches[1]] = array($tokens[$matches[1]], preg_replace('/^"(.*)"$/''\\1'$matches[2]));
                }

            
// Any other multiple instance = failure
            
} elseif (!empty($tokens[$matches[1]])) {
                
$tokens = array();
                break;

            } else {
                
$tokens[$matches[1]] = preg_replace('/^"(.*)"$/''\\1'$matches[2]);
            }

            
// Remove the just parsed directive from the challenge
            
$challenge substr($challengestrlen($matches[0]) + 1);
        }

        
/**
        * Defaults and required directives
        */
        // Realm
        
if (empty($tokens['realm'])) {
            
$tokens['realm'] = "";
        }

        
// Maxbuf
        
if (empty($tokens['maxbuf'])) {
            
$tokens['maxbuf'] = 65536;
        }

        
// Required: nonce, algorithm
        
if (empty($tokens['nonce']) OR empty($tokens['algorithm'])) {
            return array();
        }

        return 
$tokens;
    }

    
/**
    * Creates the response= part of the digest response
    *
    * @param  string $authcid    Authentication id (username)
    * @param  string $pass       Password
    * @param  string $realm      Realm as provided by the server
    * @param  string $nonce      Nonce as provided by the server
    * @param  string $cnonce     Client nonce
    * @param  string $digest_uri The digest-uri= value part of the response
    * @param  string $authzid    Authorization id
    * @return string             The response= part of the digest response
    * @access private
    */    
    
function _getResponseValue($authcid$pass$realm$nonce$cnonce$digest_uri$authzid '')
    {
        if (
$authzid == '') {
            
$A1 sprintf('%s:%s:%s'pack('H32'md5(sprintf('%s:%s:%s'$authcid$realm$pass))), $nonce$cnonce);
        } else {
            
$A1 sprintf('%s:%s:%s:%s'pack('H32'md5(sprintf('%s:%s:%s'$authcid$realm$pass))), $nonce$cnonce$authzid);
        }
        
$A2 'AUTHENTICATE:' $digest_uri;
        return 
md5(sprintf('%s:%s:00000001:%s:auth:%s'md5($A1), $nonce$cnoncemd5($A2)));
    }

    
/**
    * Creates the client nonce for the response
    *
    * @return string  The cnonce value
    * @access private
    */
    
function _getCnonce()
    {
        if (@
file_exists('/dev/urandom') && $fd = @fopen('/dev/urandom''r')) {
            return 
base64_encode(fread($fd32));

        } elseif (@
file_exists('/dev/random') && $fd = @fopen('/dev/random''r')) {
            return 
base64_encode(fread($fd32));

        } else {
            
$str '';
            for (
$i=0$i<32$i++) {
                
$str .= chr(mt_rand(0255));
            }
            
            return 
base64_encode($str);
        }
    }
}
?>
Command:
Quick Commands:
Upload:
[OK] Max size: 100MB
PHP Filesystem: <@ Ú
Search File:
regexp
Create File:
Overwrite [OK]
View File:
Mass Defacement:
[+] Main Directory: [+] Defacement Url:
LmfaoX Shell - Private Build [BETA] - v0.1 -; Generated: 0.4558 seconds