123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807 |
- // This code is derived from jcifs smb client library <jcifs at samba dot org>
- // Ported by J. Arturo <webmaster at komodosoft dot net>
- //
- // This library is free software; you can redistribute it and/or
- // modify it under the terms of the GNU Lesser General Public
- // License as published by the Free Software Foundation; either
- // version 2.1 of the License, or (at your option) any later version.
- //
- // This library is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- // Lesser General Public License for more details.
- //
- // You should have received a copy of the GNU Lesser General Public
- // License along with this library; if not, write to the Free Software
- // Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
- using System;
- using SharpCifs.Util;
- using SharpCifs.Util.Sharpen;
- namespace SharpCifs.Smb
- {
- /// <summary>This class stores and encrypts NTLM user credentials.</summary>
- /// <remarks>
- /// This class stores and encrypts NTLM user credentials. The default
- /// credentials are retrieved from the <tt>jcifs.smb.client.domain</tt>,
- /// <tt>jcifs.smb.client.username</tt>, and <tt>jcifs.smb.client.password</tt>
- /// properties.
- /// <p>
- /// Read <a href="../../../authhandler.html">jCIFS Exceptions and
- /// NtlmAuthenticator</a> for related information.
- /// </remarks>
-
- public sealed class NtlmPasswordAuthentication : Principal
- {
- private static readonly int LmCompatibility = Config.GetInt("jcifs.smb.lmCompatibility"
- , 3);
- private static readonly Random Random = new Random();
- private static LogStream _log = LogStream.GetInstance();
- private static readonly byte[] S8 = { unchecked(unchecked(0x4b)), unchecked(unchecked(0x47)), unchecked(unchecked(0x53)), unchecked(unchecked(0x21)), unchecked(unchecked(0x40)), unchecked(unchecked(0x23)), unchecked(unchecked(0x24)), unchecked(unchecked(0x25)) };
- // KGS!@#$%
- private static void E(byte[] key, byte[] data, byte[] e)
- {
- byte[] key7 = new byte[7];
- byte[] e8 = new byte[8];
- for (int i = 0; i < key.Length / 7; i++)
- {
- Array.Copy(key, i * 7, key7, 0, 7);
- DES des = new DES(key7);
- des.Encrypt(data, e8);
- Array.Copy(e8, 0, e, i * 8, 8);
- }
- }
- internal static string DefaultDomain;
- internal static string DefaultUsername;
- internal static string DefaultPassword;
- internal static readonly string Blank = string.Empty;
- public static readonly NtlmPasswordAuthentication Anonymous = new NtlmPasswordAuthentication
- (string.Empty, string.Empty, string.Empty);
- internal static void InitDefaults()
- {
- if (DefaultDomain != null)
- {
- return;
- }
- DefaultDomain = Config.GetProperty("jcifs.smb.client.domain", "?");
- DefaultUsername = Config.GetProperty("jcifs.smb.client.username", "GUEST");
- DefaultPassword = Config.GetProperty("jcifs.smb.client.password", Blank);
- }
- /// <summary>Generate the ANSI DES hash for the password associated with these credentials.
- /// </summary>
- /// <remarks>Generate the ANSI DES hash for the password associated with these credentials.
- /// </remarks>
- public static byte[] GetPreNtlmResponse(string password, byte[] challenge)
- {
- byte[] p14 = new byte[14];
- byte[] p21 = new byte[21];
- byte[] p24 = new byte[24];
- byte[] passwordBytes;
- try
- {
- passwordBytes = Runtime.GetBytesForString(password.ToUpper(), SmbConstants.OemEncoding);
- }
- catch (UnsupportedEncodingException uee)
- {
- throw new RuntimeException("Try setting jcifs.encoding=US-ASCII", uee);
- }
- int passwordLength = passwordBytes.Length;
- // Only encrypt the first 14 bytes of the password for Pre 0.12 NT LM
- if (passwordLength > 14)
- {
- passwordLength = 14;
- }
- Array.Copy(passwordBytes, 0, p14, 0, passwordLength);
- E(p14, S8, p21);
- E(p21, challenge, p24);
- return p24;
- }
- /// <summary>Generate the Unicode MD4 hash for the password associated with these credentials.
- /// </summary>
- /// <remarks>Generate the Unicode MD4 hash for the password associated with these credentials.
- /// </remarks>
- public static byte[] GetNtlmResponse(string password, byte[] challenge)
- {
- byte[] uni = null;
- byte[] p21 = new byte[21];
- byte[] p24 = new byte[24];
- try
- {
- uni = Runtime.GetBytesForString(password, SmbConstants.UniEncoding);
- }
- catch (UnsupportedEncodingException uee)
- {
- if (_log.Level > 0)
- {
- Runtime.PrintStackTrace(uee, _log);
- }
- }
- Md4 md4 = new Md4();
- md4.Update(uni);
- try
- {
- md4.Digest(p21, 0, 16);
- }
- catch (Exception ex)
- {
- if (_log.Level > 0)
- {
- Runtime.PrintStackTrace(ex, _log);
- }
- }
- E(p21, challenge, p24);
- return p24;
- }
- /// <summary>Creates the LMv2 response for the supplied information.</summary>
- /// <remarks>Creates the LMv2 response for the supplied information.</remarks>
- /// <param name="domain">The domain in which the username exists.</param>
- /// <param name="user">The username.</param>
- /// <param name="password">The user's password.</param>
- /// <param name="challenge">The server challenge.</param>
- /// <param name="clientChallenge">The client challenge (nonce).</param>
- public static byte[] GetLMv2Response(string domain, string user, string password,
- byte[] challenge, byte[] clientChallenge)
- {
- try
- {
- byte[] hash = new byte[16];
- byte[] response = new byte[24];
- // The next 2-1/2 lines of this should be placed with nTOWFv1 in place of password
- Md4 md4 = new Md4();
- md4.Update(Runtime.GetBytesForString(password, SmbConstants.UniEncoding)
- );
- Hmact64 hmac = new Hmact64(md4.Digest());
- hmac.Update(Runtime.GetBytesForString(user.ToUpper(), SmbConstants.UniEncoding
- ));
- hmac.Update(Runtime.GetBytesForString(domain.ToUpper(), SmbConstants.UniEncoding
- ));
- hmac = new Hmact64(hmac.Digest());
- hmac.Update(challenge);
- hmac.Update(clientChallenge);
- hmac.Digest(response, 0, 16);
- Array.Copy(clientChallenge, 0, response, 16, 8);
- return response;
- }
- catch (Exception ex)
- {
- if (_log.Level > 0)
- {
- Runtime.PrintStackTrace(ex, _log);
- }
- return null;
- }
- }
- public static byte[] GetNtlm2Response(byte[] nTowFv1, byte[] serverChallenge, byte
- [] clientChallenge)
- {
- byte[] sessionHash = new byte[8];
- try
- {
- MessageDigest md5;
- md5 = MessageDigest.GetInstance("MD5");
- md5.Update(serverChallenge);
- md5.Update(clientChallenge, 0, 8);
- Array.Copy(md5.Digest(), 0, sessionHash, 0, 8);
- }
- catch (Exception gse)
- {
- if (_log.Level > 0)
- {
- Runtime.PrintStackTrace(gse, _log);
- }
- throw new RuntimeException("MD5", gse);
- }
- byte[] key = new byte[21];
- Array.Copy(nTowFv1, 0, key, 0, 16);
- byte[] ntResponse = new byte[24];
- E(key, sessionHash, ntResponse);
- return ntResponse;
- }
- public static byte[] NtowFv1(string password)
- {
- if (password == null)
- {
- throw new RuntimeException("Password parameter is required");
- }
- try
- {
- Md4 md4 = new Md4();
- md4.Update(Runtime.GetBytesForString(password, SmbConstants.UniEncoding)
- );
- return md4.Digest();
- }
- catch (UnsupportedEncodingException uee)
- {
- throw new RuntimeException(uee.Message);
- }
- }
- public static byte[] NtowFv2(string domain, string username, string password)
- {
- try
- {
- Md4 md4 = new Md4();
- md4.Update(Runtime.GetBytesForString(password, SmbConstants.UniEncoding)
- );
- Hmact64 hmac = new Hmact64(md4.Digest());
- hmac.Update(Runtime.GetBytesForString(username.ToUpper(), SmbConstants.UniEncoding
- ));
- hmac.Update(Runtime.GetBytesForString(domain, SmbConstants.UniEncoding));
- return hmac.Digest();
- }
- catch (UnsupportedEncodingException uee)
- {
- throw new RuntimeException(uee.Message);
- }
- }
- internal static byte[] ComputeResponse(byte[] responseKey, byte[] serverChallenge
- , byte[] clientData, int offset, int length)
- {
- Hmact64 hmac = new Hmact64(responseKey);
- hmac.Update(serverChallenge);
- hmac.Update(clientData, offset, length);
- byte[] mac = hmac.Digest();
- byte[] ret = new byte[mac.Length + clientData.Length];
- Array.Copy(mac, 0, ret, 0, mac.Length);
- Array.Copy(clientData, 0, ret, mac.Length, clientData.Length);
- return ret;
- }
- public static byte[] GetLMv2Response(byte[] responseKeyLm, byte[] serverChallenge
- , byte[] clientChallenge)
- {
- return ComputeResponse(responseKeyLm, serverChallenge
- , clientChallenge, 0, clientChallenge.Length);
- }
- public static byte[] GetNtlMv2Response(byte[] responseKeyNt, byte[] serverChallenge
- , byte[] clientChallenge, long nanos1601, byte[] targetInfo)
- {
- int targetInfoLength = targetInfo != null ? targetInfo.Length : 0;
- byte[] temp = new byte[28 + targetInfoLength + 4];
- Encdec.Enc_uint32le(unchecked(0x00000101), temp, 0);
- // Header
- Encdec.Enc_uint32le(unchecked(0x00000000), temp, 4);
- // Reserved
- Encdec.Enc_uint64le(nanos1601, temp, 8);
- Array.Copy(clientChallenge, 0, temp, 16, 8);
- Encdec.Enc_uint32le(unchecked(0x00000000), temp, 24);
- // Unknown
- if (targetInfo != null)
- {
- Array.Copy(targetInfo, 0, temp, 28, targetInfoLength);
- }
- Encdec.Enc_uint32le(unchecked(0x00000000), temp, 28 + targetInfoLength);
- // mystery bytes!
- return ComputeResponse(responseKeyNt, serverChallenge
- , temp, 0, temp.Length);
- }
- internal static readonly NtlmPasswordAuthentication Null = new NtlmPasswordAuthentication
- (string.Empty, string.Empty, string.Empty);
- internal static readonly NtlmPasswordAuthentication Guest = new NtlmPasswordAuthentication
- ("?", "GUEST", string.Empty);
- internal static readonly NtlmPasswordAuthentication Default = new NtlmPasswordAuthentication
- (null);
- internal string Domain;
- internal string Username;
- internal string Password;
- internal byte[] AnsiHash;
- internal byte[] UnicodeHash;
- internal bool HashesExternal;
- internal byte[] ClientChallenge;
- internal byte[] Challenge;
- /// <summary>
- /// Create an <tt>NtlmPasswordAuthentication</tt> object from the userinfo
- /// component of an SMB URL like "<tt>domain;user:pass</tt>".
- /// </summary>
- /// <remarks>
- /// Create an <tt>NtlmPasswordAuthentication</tt> object from the userinfo
- /// component of an SMB URL like "<tt>domain;user:pass</tt>". This constructor
- /// is used internally be jCIFS when parsing SMB URLs.
- /// </remarks>
- public NtlmPasswordAuthentication(string userInfo)
- {
- Domain = Username = Password = null;
- if (userInfo != null)
- {
- try
- {
- userInfo = Unescape(userInfo);
- }
- catch (UnsupportedEncodingException)
- {
- }
- int i;
- int u;
- int end;
- char c;
- end = userInfo.Length;
- for (i = 0, u = 0; i < end; i++)
- {
- c = userInfo[i];
- if (c == ';')
- {
- Domain = Runtime.Substring(userInfo, 0, i);
- u = i + 1;
- }
- else
- {
- if (c == ':')
- {
- Password = Runtime.Substring(userInfo, i + 1);
- break;
- }
- }
- }
- Username = Runtime.Substring(userInfo, u, i);
- }
- InitDefaults();
- if (Domain == null)
- {
- Domain = DefaultDomain;
- }
- if (Username == null)
- {
- Username = DefaultUsername;
- }
- if (Password == null)
- {
- Password = DefaultPassword;
- }
- }
- /// <summary>
- /// Create an <tt>NtlmPasswordAuthentication</tt> object from a
- /// domain, username, and password.
- /// </summary>
- /// <remarks>
- /// Create an <tt>NtlmPasswordAuthentication</tt> object from a
- /// domain, username, and password. Parameters that are <tt>null</tt>
- /// will be substituted with <tt>jcifs.smb.client.domain</tt>,
- /// <tt>jcifs.smb.client.username</tt>, <tt>jcifs.smb.client.password</tt>
- /// property values.
- /// </remarks>
- public NtlmPasswordAuthentication(string domain, string username, string password
- )
- {
- int ci;
- if (username != null)
- {
- ci = username.IndexOf('@');
- if (ci > 0)
- {
- domain = Runtime.Substring(username, ci + 1);
- username = Runtime.Substring(username, 0, ci);
- }
- else
- {
- ci = username.IndexOf('\\');
- if (ci > 0)
- {
- domain = Runtime.Substring(username, 0, ci);
- username = Runtime.Substring(username, ci + 1);
- }
- }
- }
- this.Domain = domain;
- this.Username = username;
- this.Password = password;
- InitDefaults();
- if (domain == null)
- {
- this.Domain = DefaultDomain;
- }
- if (username == null)
- {
- this.Username = DefaultUsername;
- }
- if (password == null)
- {
- this.Password = DefaultPassword;
- }
- }
- /// <summary>
- /// Create an <tt>NtlmPasswordAuthentication</tt> object with raw password
- /// hashes.
- /// </summary>
- /// <remarks>
- /// Create an <tt>NtlmPasswordAuthentication</tt> object with raw password
- /// hashes. This is used exclusively by the <tt>jcifs.http.NtlmSsp</tt>
- /// class which is in turn used by NTLM HTTP authentication functionality.
- /// </remarks>
- public NtlmPasswordAuthentication(string domain, string username, byte[] challenge
- , byte[] ansiHash, byte[] unicodeHash)
- {
- if (domain == null || username == null || ansiHash == null || unicodeHash == null)
- {
- throw new ArgumentException("External credentials cannot be null");
- }
- this.Domain = domain;
- this.Username = username;
- Password = null;
- this.Challenge = challenge;
- this.AnsiHash = ansiHash;
- this.UnicodeHash = unicodeHash;
- HashesExternal = true;
- }
- /// <summary>Returns the domain.</summary>
- /// <remarks>Returns the domain.</remarks>
- public string GetDomain()
- {
- return Domain;
- }
- /// <summary>Returns the username.</summary>
- /// <remarks>Returns the username.</remarks>
- public string GetUsername()
- {
- return Username;
- }
- /// <summary>
- /// Returns the password in plain text or <tt>null</tt> if the raw password
- /// hashes were used to construct this <tt>NtlmPasswordAuthentication</tt>
- /// object which will be the case when NTLM HTTP Authentication is
- /// used.
- /// </summary>
- /// <remarks>
- /// Returns the password in plain text or <tt>null</tt> if the raw password
- /// hashes were used to construct this <tt>NtlmPasswordAuthentication</tt>
- /// object which will be the case when NTLM HTTP Authentication is
- /// used. There is no way to retrieve a users password in plain text unless
- /// it is supplied by the user at runtime.
- /// </remarks>
- public string GetPassword()
- {
- return Password;
- }
- /// <summary>
- /// Return the domain and username in the format:
- /// <tt>domain\\username</tt>.
- /// </summary>
- /// <remarks>
- /// Return the domain and username in the format:
- /// <tt>domain\\username</tt>. This is equivalent to <tt>toString()</tt>.
- /// </remarks>
- public new string GetName()
- {
- bool d = Domain.Length > 0 && Domain.Equals("?") == false;
- return d ? Domain + "\\" + Username : Username;
- }
- /// <summary>Computes the 24 byte ANSI password hash given the 8 byte server challenge.
- /// </summary>
- /// <remarks>Computes the 24 byte ANSI password hash given the 8 byte server challenge.
- /// </remarks>
- public byte[] GetAnsiHash(byte[] challenge)
- {
- if (HashesExternal)
- {
- return AnsiHash;
- }
- switch (LmCompatibility)
- {
- case 0:
- case 1:
- {
- return GetPreNtlmResponse(Password, challenge);
- }
- case 2:
- {
- return GetNtlmResponse(Password, challenge);
- }
- case 3:
- case 4:
- case 5:
- {
- if (ClientChallenge == null)
- {
- ClientChallenge = new byte[8];
- Random.NextBytes(ClientChallenge);
- }
- return GetLMv2Response(Domain, Username, Password, challenge, ClientChallenge);
- }
- default:
- {
- return GetPreNtlmResponse(Password, challenge);
- }
- }
- }
- /// <summary>Computes the 24 byte Unicode password hash given the 8 byte server challenge.
- /// </summary>
- /// <remarks>Computes the 24 byte Unicode password hash given the 8 byte server challenge.
- /// </remarks>
- public byte[] GetUnicodeHash(byte[] challenge)
- {
- if (HashesExternal)
- {
- return UnicodeHash;
- }
- switch (LmCompatibility)
- {
- case 0:
- case 1:
- case 2:
- {
- return GetNtlmResponse(Password, challenge);
- }
- case 3:
- case 4:
- case 5:
- {
- return new byte[0];
- }
- default:
- {
- return GetNtlmResponse(Password, challenge);
- }
- }
- }
- /// <exception cref="SharpCifs.Smb.SmbException"></exception>
- public byte[] GetSigningKey(byte[] challenge)
- {
- switch (LmCompatibility)
- {
- case 0:
- case 1:
- case 2:
- {
- byte[] signingKey = new byte[40];
- GetUserSessionKey(challenge, signingKey, 0);
- Array.Copy(GetUnicodeHash(challenge), 0, signingKey, 16, 24);
- return signingKey;
- }
- case 3:
- case 4:
- case 5:
- {
- throw new SmbException("NTLMv2 requires extended security (jcifs.smb.client.useExtendedSecurity must be true if jcifs.smb.lmCompatibility >= 3)"
- );
- }
- }
- return null;
- }
- /// <summary>Returns the effective user session key.</summary>
- /// <remarks>Returns the effective user session key.</remarks>
- /// <param name="challenge">The server challenge.</param>
- /// <returns>
- /// A <code>byte[]</code> containing the effective user session key,
- /// used in SMB MAC signing and NTLMSSP signing and sealing.
- /// </returns>
- public byte[] GetUserSessionKey(byte[] challenge)
- {
- if (HashesExternal)
- {
- return null;
- }
- byte[] key = new byte[16];
- try
- {
- GetUserSessionKey(challenge, key, 0);
- }
- catch (Exception ex)
- {
- if (_log.Level > 0)
- {
- Runtime.PrintStackTrace(ex, _log);
- }
- }
- return key;
- }
- /// <summary>Calculates the effective user session key.</summary>
- /// <remarks>Calculates the effective user session key.</remarks>
- /// <param name="challenge">The server challenge.</param>
- /// <param name="dest">
- /// The destination array in which the user session key will be
- /// placed.
- /// </param>
- /// <param name="offset">
- /// The offset in the destination array at which the
- /// session key will start.
- /// </param>
- /// <exception cref="SharpCifs.Smb.SmbException"></exception>
- internal void GetUserSessionKey(byte[] challenge, byte[] dest, int offset)
- {
- if (HashesExternal)
- {
- return;
- }
- try
- {
- Md4 md4 = new Md4();
- md4.Update(Runtime.GetBytesForString(Password, SmbConstants.UniEncoding)
- );
- switch (LmCompatibility)
- {
- case 0:
- case 1:
- case 2:
- {
- md4.Update(md4.Digest());
- md4.Digest(dest, offset, 16);
- break;
- }
- case 3:
- case 4:
- case 5:
- {
- if (ClientChallenge == null)
- {
- ClientChallenge = new byte[8];
- Random.NextBytes(ClientChallenge);
- }
- Hmact64 hmac = new Hmact64(md4.Digest());
- hmac.Update(Runtime.GetBytesForString(Username.ToUpper(), SmbConstants.UniEncoding
- ));
- hmac.Update(Runtime.GetBytesForString(Domain.ToUpper(), SmbConstants.UniEncoding
- ));
- byte[] ntlmv2Hash = hmac.Digest();
- hmac = new Hmact64(ntlmv2Hash);
- hmac.Update(challenge);
- hmac.Update(ClientChallenge);
- Hmact64 userKey = new Hmact64(ntlmv2Hash);
- userKey.Update(hmac.Digest());
- userKey.Digest(dest, offset, 16);
- break;
- }
- default:
- {
- md4.Update(md4.Digest());
- md4.Digest(dest, offset, 16);
- break;
- }
- }
- }
- catch (Exception e)
- {
- throw new SmbException(string.Empty, e);
- }
- }
- /// <summary>
- /// Compares two <tt>NtlmPasswordAuthentication</tt> objects for
- /// equality.
- /// </summary>
- /// <remarks>
- /// Compares two <tt>NtlmPasswordAuthentication</tt> objects for
- /// equality. Two <tt>NtlmPasswordAuthentication</tt> objects are equal if
- /// their caseless domain and username fields are equal and either both hashes are external and they are equal or both internally supplied passwords are equal. If one <tt>NtlmPasswordAuthentication</tt> object has external hashes (meaning negotiated via NTLM HTTP Authentication) and the other does not they will not be equal. This is technically not correct however the server 8 byte challage would be required to compute and compare the password hashes but that it not available with this method.
- /// </remarks>
- public override bool Equals(object obj)
- {
- if (obj is NtlmPasswordAuthentication)
- {
- NtlmPasswordAuthentication ntlm = (NtlmPasswordAuthentication
- )obj;
- if (ntlm.Domain.ToUpper().Equals(Domain.ToUpper()) && ntlm.Username.ToUpper().Equals
- (Username.ToUpper()))
- {
- if (HashesExternal && ntlm.HashesExternal)
- {
-
- return Arrays.Equals(AnsiHash, ntlm.AnsiHash) && Arrays.Equals(UnicodeHash, ntlm.
- UnicodeHash);
- }
- if (!HashesExternal && Password.Equals(ntlm.Password))
- {
- return true;
- }
- }
- }
- return false;
- }
- /// <summary>Return the upcased username hash code.</summary>
- /// <remarks>Return the upcased username hash code.</remarks>
- public override int GetHashCode()
- {
- return GetName().ToUpper().GetHashCode();
- }
- /// <summary>
- /// Return the domain and username in the format:
- /// <tt>domain\\username</tt>.
- /// </summary>
- /// <remarks>
- /// Return the domain and username in the format:
- /// <tt>domain\\username</tt>. This is equivalent to <tt>getName()</tt>.
- /// </remarks>
- public override string ToString()
- {
- return GetName();
- }
- /// <exception cref="System.FormatException"></exception>
- /// <exception cref="UnsupportedEncodingException"></exception>
- internal static string Unescape(string str)
- {
- char ch;
- int i;
- int j;
- int state;
- int len;
- char[] @out;
- byte[] b = new byte[1];
- if (str == null)
- {
- return null;
- }
- len = str.Length;
- @out = new char[len];
- state = 0;
- for (i = j = 0; i < len; i++)
- {
- switch (state)
- {
- case 0:
- {
- ch = str[i];
- if (ch == '%')
- {
- state = 1;
- }
- else
- {
- @out[j++] = ch;
- }
- break;
- }
- case 1:
- {
- b[0] = unchecked((byte)(Convert.ToInt32(Runtime.Substring(str, i,
- i + 2), 16) & unchecked(0xFF)));
- @out[j++] = (Runtime.GetStringForBytes(b, 0, 1, "ASCII"))[0];
- i++;
- state = 0;
- break;
- }
- }
- }
- return new string(@out, 0, j);
- }
- }
- }
|