using System; using System.Security.Cryptography; using System.Collections.Generic; using System.Text; using System.Web; // Base oAuth Class for Twitter and LinkedIn // Author: Eran Sandler // Code Url: http://oauth.net/code/ // Author Url: http://eran.sandler.co.il/ // // Some modifications by Shannon Whitley // Author Url: http://voiceoftech.com/ namespace TradeIdeas.TIProGUI { public class OAuthBase { /// /// Provides a predefined set of algorithms that are supported officially by the protocol /// public enum SignatureTypes { HMACSHA1, PLAINTEXT, RSASHA1 } /// /// Provides an internal structure to sort the query parameter /// protected class QueryParameter { private string name = null; private string value = null; public QueryParameter(string name, string value) { this.name = name; this.value = value; } public string Name { get { return name; } } public string Value { get { return value; } } } /// /// Comparer class used to perform the sorting of the query parameters /// protected class QueryParameterComparer : IComparer { #region IComparer Members public int Compare(QueryParameter x, QueryParameter y) { if (x.Name == y.Name) { return string.Compare(x.Value, y.Value); } else { return string.Compare(x.Name, y.Name); } } #endregion } protected const string OAuthVersion = "1.0"; protected const string OAuthParameterPrefix = "oauth_"; // // List of know and used oauth parameters' names // protected const string OAuthConsumerKeyKey = "oauth_consumer_key"; protected const string OAuthCallbackKey = "oauth_callback"; protected const string OAuthVersionKey = "oauth_version"; protected const string OAuthSignatureMethodKey = "oauth_signature_method"; protected const string OAuthSignatureKey = "oauth_signature"; protected const string OAuthTimestampKey = "oauth_timestamp"; protected const string OAuthNonceKey = "oauth_nonce"; protected const string OAuthTokenKey = "oauth_token"; protected const string OAuthTokenSecretKey = "oauth_token_secret"; protected const string OAuthVerifier = "oauth_verifier"; protected const string HMACSHA1SignatureType = "HMAC-SHA1"; protected const string PlainTextSignatureType = "PLAINTEXT"; protected const string RSASHA1SignatureType = "RSA-SHA1"; protected Random random = new Random(); private string oauth_verifier; public string Verifier { get { return oauth_verifier; } set { oauth_verifier = value; } } protected string unreservedChars = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_.~"; /// /// Helper function to compute a hash value /// /// The hashing algoirhtm used. If that algorithm needs some initialization, like HMAC and its derivatives, they should be initialized prior to passing it to this function /// The data to hash /// a Base64 string of the hash value private string ComputeHash(HashAlgorithm hashAlgorithm, string data) { if (hashAlgorithm == null) { throw new ArgumentNullException("hashAlgorithm"); } if (string.IsNullOrEmpty(data)) { throw new ArgumentNullException("data"); } byte[] dataBuffer = System.Text.Encoding.ASCII.GetBytes(data); byte[] hashBytes = hashAlgorithm.ComputeHash(dataBuffer); return Convert.ToBase64String(hashBytes); } /// /// Internal function to cut out all non oauth query string parameters (all parameters not begining with "oauth_") /// /// The query string part of the Url /// A list of QueryParameter each containing the parameter name and value private List GetQueryParameters(string parameters) { if (parameters.StartsWith("?")) { parameters = parameters.Remove(0, 1); } List result = new List(); if (!string.IsNullOrEmpty(parameters)) { string[] p = parameters.Split('&'); foreach (string s in p) { if (!string.IsNullOrEmpty(s) && !s.StartsWith(OAuthParameterPrefix)) { if (s.IndexOf('=') > -1) { string[] temp = s.Split('='); result.Add(new QueryParameter(temp[0], temp[1])); } else { result.Add(new QueryParameter(s, string.Empty)); } } } } return result; } /// /// This is a different Url Encode implementation since the default .NET one outputs the percent encoding in lower case. /// While this is not a problem with the percent encoding spec, it is used in upper case throughout OAuth /// /// The value to Url encode /// Returns a Url encoded string public string UrlEncode(string value) { string oAuthUnreservedChars = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_.~"; StringBuilder sb = new StringBuilder(); Encoding uTF8Encoding = Encoding.UTF8; foreach (char thisChar in value) { if (oAuthUnreservedChars.IndexOf(thisChar) != -1) { sb.Append(thisChar); } else { byte[] bytes = uTF8Encoding.GetBytes(thisChar.ToString()); foreach (byte b in bytes) { sb.Append('%' + String.Format("{0:X2}", b)); } } } return sb.ToString(); } /// /// Normalizes the request parameters according to the spec /// /// The list of parameters already sorted /// a string representing the normalized parameters protected string NormalizeRequestParameters(IList parameters) { StringBuilder sb = new StringBuilder(); QueryParameter p = null; for (int i = 0; i < parameters.Count; i++) { p = parameters[i]; sb.AppendFormat("{0}={1}", p.Name, p.Value); if (i < parameters.Count - 1) { sb.Append("&"); } } return sb.ToString(); } /*LinkedIn stuff... Did some code cleanup.. there are some subtle yet important * differences between the parameters necessary for generating signatures for twitter and * those needed for LinkedIn the below "generateSignture methods are gleaned from work by David Quail https://developer.linkedin.com/thread/1346 I took these segments and put in an extra parameter, a string identifier, to differentiate between the two. It is within the GenerateSignature Base where the subtle differences are noted.*/ public string GenerateSignatureBase(string identifier, Uri url, string consumerKey, string token, string tokenSecret, string callbackVerifier, string httpMethod, string timeStamp, string nonce, string signatureType, out string normalizedUrl, out string normalizedRequestParameters) { if (token == null) { token = string.Empty; } if (tokenSecret == null) { tokenSecret = string.Empty; } if (string.IsNullOrEmpty(consumerKey)) { throw new ArgumentNullException("consumerKey"); } if (string.IsNullOrEmpty(httpMethod)) { throw new ArgumentNullException("httpMethod"); } if (string.IsNullOrEmpty(signatureType)) { throw new ArgumentNullException("signatureType"); } normalizedUrl = null; normalizedRequestParameters = null; List parameters = GetQueryParameters(url.Query); parameters.Add(new QueryParameter(OAuthVersionKey, OAuthVersion)); parameters.Add(new QueryParameter(OAuthNonceKey, nonce)); parameters.Add(new QueryParameter(OAuthTimestampKey, timeStamp)); parameters.Add(new QueryParameter(OAuthSignatureMethodKey, signatureType)); parameters.Add(new QueryParameter(OAuthConsumerKeyKey, consumerKey)); //TODO: Make this less of a hack if (identifier == "li") //linkedIn { if (!string.IsNullOrEmpty(callbackVerifier)) { parameters.Add(new QueryParameter(OAuthCallbackKey, UrlEncode(callbackVerifier))); } if (!string.IsNullOrEmpty(oauth_verifier)) { parameters.Add(new QueryParameter(OAuthVerifier, oauth_verifier)); } } else //twitter... { if (!string.IsNullOrEmpty(callbackVerifier)) { parameters.Add(new QueryParameter(OAuthVerifier, callbackVerifier)); } } if (!string.IsNullOrEmpty(token)) //same for both twitter and LinkedIn { parameters.Add(new QueryParameter(OAuthTokenKey, token)); } parameters.Sort(new QueryParameterComparer()); normalizedUrl = string.Format("{0}://{1}", url.Scheme, url.Host); if (!((url.Scheme == "http" && url.Port == 80) || (url.Scheme == "https" && url.Port == 443))) { normalizedUrl += ":" + url.Port; } normalizedUrl += url.AbsolutePath; normalizedRequestParameters = NormalizeRequestParameters(parameters); StringBuilder signatureBase = new StringBuilder(); signatureBase.AppendFormat("{0}&", httpMethod.ToUpper()); signatureBase.AppendFormat("{0}&", UrlEncode(normalizedUrl)); signatureBase.AppendFormat("{0}", UrlEncode(normalizedRequestParameters)); return signatureBase.ToString(); } /// A base64 string of the hash value public string GenerateSignatureUsingHash(string signatureBase, HashAlgorithm hash) { return ComputeHash(hash, signatureBase); } public string GenerateSignature(string id, Uri url, string consumerKey, string consumerSecret, string token, string tokenSecret, string callbackVerifier, string httpMethod, string timeStamp, string nonce, out string normalizedUrl, out string normalizedRequestParameters) { return GenerateSignature(id, url, consumerKey, consumerSecret, token, tokenSecret, callbackVerifier, httpMethod, timeStamp, nonce, SignatureTypes.HMACSHA1, out normalizedUrl, out normalizedRequestParameters); } public string GenerateSignature(string identifier, Uri url, string consumerKey, string consumerSecret, string token, string tokenSecret, string callbackVerifier, string httpMethod, string timeStamp, string nonce, SignatureTypes signatureType, out string normalizedUrl, out string normalizedRequestParameters) { normalizedUrl = null; normalizedRequestParameters = null; switch (signatureType) { case SignatureTypes.PLAINTEXT: return HttpUtility.UrlEncode(string.Format("{0}&{1}", consumerSecret, tokenSecret)); case SignatureTypes.HMACSHA1: string signatureBase = GenerateSignatureBase(identifier, url, consumerKey, token, tokenSecret, callbackVerifier, httpMethod, timeStamp, nonce, HMACSHA1SignatureType, out normalizedUrl, out normalizedRequestParameters); HMACSHA1 hmacsha1 = new HMACSHA1(); hmacsha1.Key = Encoding.ASCII.GetBytes(string.Format("{0}&{1}", UrlEncode(consumerSecret), string.IsNullOrEmpty(tokenSecret) ? "" : UrlEncode(tokenSecret))); return GenerateSignatureUsingHash(signatureBase, hmacsha1); case SignatureTypes.RSASHA1: throw new NotImplementedException(); default: throw new ArgumentException("Unknown signature type", "signatureType"); } } /// /// Generate the timestamp for the signature /// /// public virtual string GenerateTimeStamp() { // Default implementation of UNIX time of the current UTC time TimeSpan ts = DateTime.UtcNow - new DateTime(1970, 1, 1, 0, 0, 0, 0); return Convert.ToInt64(ts.TotalSeconds).ToString(); } /// /// Generate a nonce /// /// public virtual string GenerateNonce() { // Just a simple implementation of a random number between 123400 and 9999999 return random.Next(123400, 9999999).ToString(); } } }