OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
nmap
/
nselib
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
08/07/2020 12:36:00 PM
rwxr-xr-x
📄
afp.lua
71.92 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ajp.lua
16.69 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
amqp.lua
10.5 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
anyconnect.lua
4.45 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
asn1.lua
14.57 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
base32.lua
7.33 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
base64.lua
5.67 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bin.lua
12.89 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bit.lua
2.43 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bitcoin.lua
16.99 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bits.lua
1.82 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bittorrent.lua
40.77 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
bjnp.lua
9.45 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
brute.lua
50.04 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
cassandra.lua
5.78 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
citrixxml.lua
16 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
coap.lua
76.24 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
comm.lua
10.75 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
creds.lua
18.22 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
cvs.lua
3.13 KB
04/16/2018 01:11:39 AM
rw-r--r--
📁
data
-
08/07/2020 12:36:00 PM
rwxr-xr-x
📄
datafiles.lua
11.05 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
datetime.lua
1.16 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dhcp.lua
29.17 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dhcp6.lua
19.87 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dns.lua
51.44 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dnsbl.lua
19.02 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
dnssd.lua
12.57 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
drda.lua
24.2 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
eap.lua
7.64 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
eigrp.lua
14.47 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
formulas.lua
5.35 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ftp.lua
9.03 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
geoip.lua
1.71 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
giop.lua
18.44 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
gps.lua
3.05 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
http.lua
105.81 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
httpspider.lua
36.15 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
iax2.lua
9.6 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ike.lua
15.02 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
imap.lua
9.59 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
informix.lua
39.76 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ipOps.lua
26.92 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ipmi.lua
10.02 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ipp.lua
12.54 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
irc.lua
757 bytes
04/16/2018 01:11:39 AM
rw-r--r--
📄
iscsi.lua
21.45 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
isns.lua
15.34 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
jdwp.lua
43.57 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
json.lua
11.65 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ldap.lua
31.86 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
lfs.luadoc
1.68 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
libssh2-utility.lua
4.39 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
libssh2.luadoc
4.75 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
listop.lua
4.66 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
lpeg-utility.lua
5.64 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
lpeg.luadoc
351 bytes
04/16/2018 01:11:39 AM
rw-r--r--
📄
ls.lua
10.96 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
match.lua
2.05 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
membase.lua
9.88 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mobileme.lua
8.46 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mongodb.lua
21.29 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mqtt.lua
28.95 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
msrpc.lua
179.93 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
msrpcperformance.lua
29.72 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
msrpctypes.lua
167.61 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mssql.lua
110.87 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
multicast.lua
6.1 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
mysql.lua
17.09 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
natpmp.lua
5.04 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ncp.lua
36 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ndmp.lua
11.58 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
netbios.lua
13.9 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
nmap.luadoc
40.34 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
nrpc.lua
4.42 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
nsedebug.lua
3.49 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
omp2.lua
4.77 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
openssl.luadoc
7.08 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ospf.lua
15.29 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
packet.lua
36.65 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
pcre.luadoc
6.79 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
pgsql.lua
20.61 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
pop3.lua
5.7 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
pppoe.lua
29.95 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
proxy.lua
12.04 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rdp.lua
11.05 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
re.lua
8.22 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
redis.lua
3.59 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rmi.lua
47.89 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rpc.lua
106.22 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rpcap.lua
11.19 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rsync.lua
5.19 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
rtsp.lua
8.67 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
sasl.lua
16.38 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
shortport.lua
8.01 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
sip.lua
30.56 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
slaxml.lua
17.9 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
smb.lua
175.85 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
smb2.lua
16.32 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
smbauth.lua
37.53 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
smtp.lua
19.81 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
snmp.lua
15.99 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
socks.lua
8.26 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
srvloc.lua
12.25 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ssh1.lua
8.88 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
ssh2.lua
11.88 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
sslcert.lua
33.34 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
sslv2.lua
9.63 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
stdnse.lua
45.93 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
strbuf.lua
4.52 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
strict.lua
2.53 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
stun.lua
11.51 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tab.lua
3.35 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
target.lua
3.93 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tftp.lua
9.38 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tls.lua
56.16 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tn3270.lua
43.75 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
tns.lua
64.17 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
unicode.lua
14.32 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
unittest.lua
12.33 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
unpwdb.lua
10.08 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
upnp.lua
11.18 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
url.lua
12.09 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
versant.lua
8.6 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
vnc.lua
23.3 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
vulns.lua
76.29 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
vuzedht.lua
16.62 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
wsdd.lua
12.03 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
xdmcp.lua
11.9 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
xmpp.lua
15.88 KB
04/16/2018 01:11:39 AM
rw-r--r--
Editing: sasl.lua
Close
--- -- Simple Authentication and Security Layer (SASL). -- -- The library contains some low level functions and a high level class. -- -- The <code>DigestMD5</code> class contains all code necessary to calculate -- a DIGEST-MD5 response based on the servers challenge and the other -- necessary arguments. -- It can be called through the SASL helper or directly like this: -- <code> -- local dmd5 = DigestMD5:new(chall, user, pass, "AUTHENTICATE", nil, "imap") -- local digest = dmd5:calcDigest() -- </code> -- -- The <code>NTLM</code> class contains all code necessary to calculate a -- NTLM response based on the servers challenge and the other necessary -- arguments. It can be called through the SASL helper or -- directly like this: -- <code> -- local ntlm = NTLM:new(chall, user, pass) -- local response = ntlm:calcResponse() -- </code> -- -- The Helper class contains the high level methods: -- * <code>new</code>: This is the SASL object constructor. -- * <code>set_mechanism</code>: Sets the authentication mechanism to use. -- * <code>set_callback</code>: Sets the encoding function to use. -- * <code>encode</code>: Encodes the parameters according to the -- authentication mechanism. -- * <code>reset_callback</code>: Resets the authentication function. -- * <code>reset</code>: Resets the SASL object. -- -- The script writers should use the Helper class to create SASL objects, -- and they can also use the low level functions to customize their -- encoding functions. -- -- @copyright Same as Nmap--See https://nmap.org/book/man-legal.html -- Version 0.2 -- Created 07/17/2011 - v0.1 - Created by Djalal Harouni -- Revised 07/18/2011 - v0.2 - Added NTLM, DIGEST-MD5 classes local bin = require "bin" local bit = require "bit" local smbauth = require "smbauth" local stdnse = require "stdnse" local string = require "string" local unicode = require "unicode" _ENV = stdnse.module("sasl", stdnse.seeall) local HAVE_SSL, openssl = pcall(require, 'openssl') if ( not(HAVE_SSL) ) then stdnse.debug1( "sasl.lua: OpenSSL not present, SASL support limited.") end local MECHANISMS = { } if HAVE_SSL then -- Calculates a DIGEST MD5 response DigestMD5 = { --- Instantiates DigestMD5 -- -- @param chall string containing the base64 decoded challenge -- @return a new instance of DigestMD5 new = function(self, chall, username, password, method, uri, service, realm) local o = { nc = 0, chall = chall, challnvs = {}, username = username, password = password, method = method, uri = uri, service = service, realm = realm } setmetatable(o, self) self.__index = self o:parseChallenge() return o end, -- parses a challenge received from the server -- takes care of both quoted and unquoted identifiers -- regardless of what RFC says parseChallenge = function(self) local results = {} if self.chall then local start, stop = self.chall:find("^[Dd][Ii][Gg][Ee][Ss][Tt]%s+") stop = stop or 0 while(true) do local name, value start, stop, name = self.chall:find("([^=]*)=%s*", stop + 1) if ( not(start) ) then break end if ( self.chall:sub(stop + 1, stop + 1) == "\"" ) then start, stop, value = self.chall:find("(.-)\"", stop + 2) else start, stop, value = self.chall:find("([^,]*)", stop + 1) end name = name:lower() --if name == "digest realm" then name="realm" end self.challnvs[name] = value start, stop = self.chall:find("%s*,%s*", stop + 1) if ( not(start) ) then break end end end end, --- Calculates the digest calcDigest = function( self ) local uri = self.uri or ("%s/%s"):format(self.service, "localhost") local realm = self.realm or self.challnvs.realm or "" local cnonce = stdnse.tohex(openssl.rand_bytes( 8 )) local qop = "auth" local qop_not_specified if self.challnvs.qop then qop_not_specified = false else qop_not_specified = true end self.nc = self.nc + 1 local A1_part1 = openssl.md5(self.username .. ":" .. (self.challnvs.realm or "") .. ":" .. self.password) local A1 = stdnse.tohex(openssl.md5(A1_part1 .. ":" .. self.challnvs.nonce .. ':' .. cnonce)) local A2 = stdnse.tohex(openssl.md5(("%s:%s"):format(self.method, uri))) local digest = stdnse.tohex(openssl.md5(A1 .. ":" .. self.challnvs.nonce .. ":" .. ("%08d"):format(self.nc) .. ":" .. cnonce .. ":" .. qop .. ":" .. A2)) local b1 if not self.challnvs.algorithm or self.challnvs.algorithm == "MD5" then b1 = stdnse.tohex(openssl.md5(self.username..":"..(self.challnvs.realm or "")..":"..self.password)) else b1 = A1 end -- should we make it work when qop == "auth-int" (we would need entity-body here, which -- might be complicated)? local digest_http if not qop_not_specified then digest_http = stdnse.tohex(openssl.md5(b1 .. ":" .. self.challnvs.nonce .. ":" .. ("%08d"):format(self.nc) .. ":" .. cnonce .. ":" .. qop .. ":" .. A2)) else digest_http = stdnse.tohex(openssl.md5(b1 .. ":" .. self.challnvs.nonce .. ":" .. A2)) end local response = "username=\"" .. self.username .. "\"" .. (",%s=\"%s\""):format("realm", realm) .. (",%s=\"%s\""):format("nonce", self.challnvs.nonce) .. (",%s=\"%s\""):format("cnonce", cnonce) .. (",%s=%08d"):format("nc", self.nc) .. (",%s=%s"):format("qop", "auth") .. (",%s=\"%s\""):format("digest-uri", uri) .. (",%s=%s"):format("response", digest) .. (",%s=%s"):format("charset", "utf-8") -- response_table is used in http library because the request should -- be a little bit different then the string generated above local response_table = { username = self.username, realm = realm, nonce = self.challnvs.nonce, cnonce = cnonce, nc = ("%08d"):format(self.nc), qop = qop, ["digest-uri"] = uri, algorithm = self.challnvs.algorithm, response = digest_http } return response, response_table end, } -- The NTLM class handling NTLM challenge response authentication NTLM = { --- Creates a new instance of the NTLM class -- -- @param chall string containing the challenge received from the server -- @param username string containing the username -- @param password string containing the password -- @return new instance of NTML new = function(self, chall, username, password) local o = { nc = 0, chall = chall, username = username, password = password} setmetatable(o, self) self.__index = self o:parseChallenge() return o end, --- Parses the NTLM challenge as received from the server parseChallenge = function(self) local NTLM_NegotiateUnicode = 0x00000001 local NTLM_NegotiateExtendedSecurity = 0x00080000 local pos, _, message_type pos, _, message_type, _, _, _, self.flags, self.chall, _, _, _, _ = bin.unpack("<A8ISSIIA8LSSI", self.chall) if ( message_type ~= 0x02 ) then error("NTLM parseChallenge expected message type: 0x02") end self.is_extended = ( bit.band(self.flags, NTLM_NegotiateExtendedSecurity) == NTLM_NegotiateExtendedSecurity ) local is_unicode = ( bit.band(self.flags, NTLM_NegotiateUnicode) == NTLM_NegotiateUnicode ) self.workstation = "NMAP-HOST" self.domain = self.username:match("^(.-)\\(.*)$") or "DOMAIN" if ( is_unicode ) then self.workstation = unicode.utf8to16(self.workstation) self.username = unicode.utf8to16(self.username) self.domain = unicode.utf8to16(self.domain) end end, --- Calculates the response calcResponse = function(self) local ntlm, lm = smbauth.get_password_response(nil, self.username, self.domain, self.password, nil, "v1", self.chall, self.is_extended) local msg_type = 3 local response local BASE_OFFSET = 72 local offset local encrypted_random_sesskey = "" local flags = 0xa2888205 -- (NTLM_NegotiateUnicode | \ -- NTLM_RequestTarget | \ -- NTLM_NegotiateNTLM | \ -- NTLM_NegotiateAlwaysSign | \ -- NTLM_NegotiateExtendedSecurity | \ -- NTLM_NegotiateTargetInfo | \ -- NTLM_NegotiateVersion | \ -- NTLM_Negotiate128 | \ -- NTLM_Negotiate56) response = bin.pack("<AI", "NTLMSSP\0", msg_type) offset = BASE_OFFSET + #self.workstation + #self.username + #self.domain response = response .. bin.pack("<SSI", #lm, #lm, offset) offset = offset + #lm response = response .. bin.pack("<SSI", #ntlm, #ntlm, offset) offset = BASE_OFFSET response = response .. bin.pack("<SSI", #self.domain, #self.domain, offset) offset = BASE_OFFSET + #self.domain response = response .. bin.pack("<SSI", #self.username, #self.username, offset) offset = BASE_OFFSET + #self.domain + #self.username response = response .. bin.pack("<SSI", #self.workstation, #self.workstation, offset) offset = offset + #self.workstation + #lm + #ntlm response = response .. bin.pack("<SSI", #encrypted_random_sesskey, #encrypted_random_sesskey, offset) response = response .. bin.pack("<I", flags) -- add version info (major 5, minor 1, build 2600, reserved(1-3) 0, -- NTLM Revision 15) response = response .. bin.pack("<CCSCCCC", 5, 1, 2600, 0, 0, 0, 15) response = response .. self.domain .. self.username .. self.workstation .. ntlm .. lm .. encrypted_random_sesskey return response end } --- Encodes the parameters using the <code>CRAM-MD5</code> mechanism. -- -- @param username string. -- @param password string. -- @param challenge The challenge as it is returned by the server. -- @return string The encoded string on success, or nil if Nmap was -- compiled without OpenSSL. function cram_md5_enc(username, password, challenge) local encode = stdnse.tohex(openssl.hmac('md5', password, challenge)) return username.." "..encode end --- Encodes the parameters using the <code>DIGEST-MD5</code> mechanism. -- -- @param username string. -- @param password string. -- @param challenge The challenge as it is returned by the server. -- @param service string containing the service that is requesting the -- encryption (eg. POP, IMAP, STMP) -- @param uri string containing the URI -- @return string The encoded string on success, or nil if Nmap was -- compiled without OpenSSL. function digest_md5_enc(username, password, challenge, service, uri) return DigestMD5:new(challenge, username, password, "AUTHENTICATE", uri, service):calcDigest() end function ntlm_enc(username, password, challenge) return NTLM:new(challenge, username, password):calcResponse() end else function cram_md5_enc() error("cram_md5_enc not supported without OpenSSL") end function digest_md5_enc() error("digest_md5_enc not supported without OpenSSL") end function ntlm_enc() error("ntlm_enc not supported without OpenSSL") end end MECHANISMS["CRAM-MD5"] = cram_md5_enc MECHANISMS["DIGEST-MD5"] = digest_md5_enc MECHANISMS["NTLM"] = ntlm_enc --- Encodes the parameters using the <code>PLAIN</code> mechanism. -- -- @param username string. -- @param password string. -- @return string The encoded string. function plain_enc(username, password) return username.."\0"..username.."\0"..password end MECHANISMS["PLAIN"] = plain_enc --- Checks if the given mechanism is supported by this library. -- -- @param mechanism string to check. -- @return mechanism if it is supported, otherwise nil. -- @return callback The mechanism encoding function on success. function check_mechanism(mechanism) local lmech, lcallback if mechanism then mechanism = string.upper(mechanism) if MECHANISMS[mechanism] then lmech = mechanism lcallback = MECHANISMS[mechanism] else stdnse.debug3( "sasl library does not support '%s' mechanism", mechanism) end end return lmech, lcallback end --- This is the SASL Helper class, script writers should use it to create -- SASL objects. -- -- Usage of the Helper class: -- -- local sasl_enc = sasl.Helper.new("CRAM-MD5") -- local result = sasl_enc:encode(username, password, challenge) -- -- sasl_enc:set_mechanism("LOGIN") -- local user, pass = sasl_enc:encode(username, password) Helper = { --- SASL object constructor. -- -- @param mechanism The authentication mechanism to use -- (optional parameter). -- @param callback The encoding function associated with the -- mechanism (optional parameter). -- @usage -- local sasl_enc = sasl.Helper:new() -- local sasl_enc = sasl.Helper:new("CRAM-MD5") -- local sasl_enc = sasl.Helper:new("CRAM-MD5", my_cram_md5_func) -- @return sasl object. new = function(self, mechanism, callback) local o = {} setmetatable(o, self) self.__index = self if self:set_mechanism(mechanism) then self:set_callback(callback) end return o end, --- Sets the SASL mechanism to use. -- -- @param string The authentication mechanism. -- @usage -- local sasl_enc = sasl.Helper:new() -- sasl_enc:set_mechanism("CRAM-MD5") -- sasl_enc:set_mechanism("PLAIN") -- @return mechanism on success, or nil if the mechanism is not -- supported. set_mechanism = function(self, mechanism) self.mechanism, self.callback = check_mechanism(mechanism) return self.mechanism end, --- Associates A custom encoding function with the authentication -- mechanism. -- -- Note that the SASL object by default will have its own -- callback functions. -- -- @param callback The function associated with the authentication -- mechanism. -- @usage -- -- My personal CRAM-MD5 encode function -- function cram_md5_encode_func(username, password, challenge) -- ... -- end -- local sasl_enc = sasl.Helper:new("CRAM-MD5") -- sasl_enc:set_callback(cram_md5_handle_func) -- local result = sasl_enc:encode(username, password, challenge) set_callback = function(self, callback) if callback then self.callback = callback end end, --- Resets the encoding function to the default SASL -- callback function. reset_callback = function(self) self.callback = MECHANISMS[self.mechanism] end, --- Resets all the data of the SASL object. -- -- This method will clear the specified SASL mechanism. reset = function(self) self:set_mechanism() end, --- Returns the current authentication mechanism. -- -- @return mechanism on success, or nil on failures. get_mechanism = function(self) return self.mechanism end, --- Encodes the parameters according to the specified mechanism. -- -- @param ... The parameters to encode. -- @usage -- local sasl_enc = sasl.Helper:new("CRAM-MD5") -- local result = sasl_enc:encode(username, password, challenge) -- local sasl_enc = sasl.Helper:new("PLAIN") -- local result = sasl_enc:encode(username, password) -- @return string The encoded string on success, or nil on failures. encode = function(self, ...) return self.callback(...) end, } local unittest = require "unittest" if not unittest.testing() then return _ENV end test_suite = unittest.TestSuite:new() local _ = "ignored" local object = DigestMD5:new('Digest realm="test", domain="/HTTP/Digest",\z nonce="c8563a5b367e66b3693fbb07a53a30ba"', _, _, _, _) test_suite:add_test(unittest.keys_equal( object.challnvs, { nonce='c8563a5b367e66b3693fbb07a53a30ba', realm='test', domain='/HTTP/Digest', } )) object = DigestMD5:new('Digest nonce="9e4ab724d272474ab13b64d75300a47b", \z opaque="de40b82666bd5fe631a64f3b2d5a019e", \z realm="me@kennethreitz.com", qop=auth', _, _, _, _) test_suite:add_test(unittest.keys_equal( object.challnvs, { nonce='9e4ab724d272474ab13b64d75300a47b', opaque='de40b82666bd5fe631a64f3b2d5a019e', realm='me@kennethreitz.com', qop='auth', } )) object = DigestMD5:new('realm=test, domain="/HTTP/Digest",\tnonce=c8563a5b367e66b3693fbb07a53a30ba', _, _, _, _) test_suite:add_test(unittest.keys_equal( object.challnvs, { nonce='c8563a5b367e66b3693fbb07a53a30ba', realm='test', domain='/HTTP/Digest', } )) return _ENV;