426 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			426 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2006 - 2008 Kungliga Tekniska Högskolan
 | |
|  * (Royal Institute of Technology, Stockholm, Sweden).
 | |
|  * All rights reserved.
 | |
|  *
 | |
|  * Portions Copyright (c) 2010 Apple Inc. All rights reserved.
 | |
|  *
 | |
|  * Redistribution and use in source and binary forms, with or without
 | |
|  * modification, are permitted provided that the following conditions
 | |
|  * are met:
 | |
|  *
 | |
|  * 1. Redistributions of source code must retain the above copyright
 | |
|  *    notice, this list of conditions and the following disclaimer.
 | |
|  *
 | |
|  * 2. Redistributions in binary form must reproduce the above copyright
 | |
|  *    notice, this list of conditions and the following disclaimer in the
 | |
|  *    documentation and/or other materials provided with the distribution.
 | |
|  *
 | |
|  * 3. Neither the name of the Institute nor the names of its contributors
 | |
|  *    may be used to endorse or promote products derived from this software
 | |
|  *    without specific prior written permission.
 | |
|  *
 | |
|  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
 | |
|  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | |
|  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | |
|  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
 | |
|  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | |
|  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | |
|  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | |
|  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | |
|  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | |
|  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | |
|  * SUCH DAMAGE.
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <stdlib.h>
 | |
| #include <unistd.h>
 | |
| #include <roken.h>
 | |
| #include <err.h>
 | |
| #include "heim-auth.h"
 | |
| 
 | |
| static int
 | |
| test_sasl_digest_md5(void)
 | |
| {
 | |
|     heim_digest_t ctx;
 | |
|     const char *user, *challenge, *resp;
 | |
|     char *r;
 | |
| 
 | |
|     if ((ctx = heim_digest_create(1, HEIM_DIGEST_TYPE_AUTO)) == NULL)
 | |
| 	abort();
 | |
| 
 | |
|     if (heim_digest_parse_challenge(ctx, "realm=\"elwood.innosoft.com\",nonce=\"OA6MG9tEQGm2hh\",qop=\"auth\",algorithm=md5-sess,charset=utf-8"))
 | |
| 	abort();
 | |
| 
 | |
|     /* check that server detects changing QOP */
 | |
|     if (!heim_digest_parse_response(ctx, "charset=utf-8,username=\"chris\",realm=\"elwood.innosoft.com\",nonce=\"OA6MG9tEQGm2hh\",nc=00000001,cnonce=\"OA6MHXh6VqTrRk\",digest-uri=\"imap/elwood.innosoft.com\",response=d388dad90d4bbd760a152321f2143af7,qop=auth-int"))
 | |
| 	errx(1, "don't detect changing qop");
 | |
|     
 | |
|     /* should pass */
 | |
|     if (heim_digest_parse_response(ctx, "charset=utf-8,username=\"chris\",realm=\"elwood.innosoft.com\",nonce=\"OA6MG9tEQGm2hh\",nc=00000001,cnonce=\"OA6MHXh6VqTrRk\",digest-uri=\"imap/elwood.innosoft.com\",response=d388dad90d4bbd760a152321f2143af7,qop=auth"))
 | |
| 	abort();
 | |
|     
 | |
|     if ((user = heim_digest_get_key(ctx, "username")) == NULL)
 | |
| 	abort();
 | |
|     if (strcmp(user, "chris") != 0)
 | |
| 	abort();
 | |
| 
 | |
|     /*
 | |
|      * check password
 | |
|      */
 | |
| 
 | |
|     heim_digest_set_key(ctx, "password", "secret");
 | |
|     
 | |
|     if (heim_digest_verify(ctx, &r))
 | |
| 	abort();
 | |
| 
 | |
|     if (strcmp(r, "rspauth=ea40f60335c427b5527b84dbabcdfffd") != 0)
 | |
| 	abort();
 | |
| 
 | |
|     free(r);
 | |
| 
 | |
|     /*
 | |
|      * Also check userhash
 | |
|      */
 | |
| 
 | |
|     r = heim_digest_userhash("chris", "elwood.innosoft.com", "secret");
 | |
|     if (strcmp(r, "eb5a750053e4d2c34aa84bbc9b0b6ee7") != 0)
 | |
| 	abort();
 | |
| 
 | |
|     heim_digest_set_key(ctx, "userhash", r);
 | |
|     free(r);
 | |
|     
 | |
|     if (heim_digest_verify(ctx, &r))
 | |
| 	abort();
 | |
| 
 | |
|     if (strcmp(r, "rspauth=ea40f60335c427b5527b84dbabcdfffd") != 0)
 | |
| 	abort();
 | |
| 
 | |
|     free(r);
 | |
| 
 | |
|     /* check that it failes */
 | |
| 
 | |
|     heim_digest_set_key(ctx, "username", "notright");
 | |
|     heim_digest_set_key(ctx, "password", "secret");
 | |
|     
 | |
|     if (heim_digest_verify(ctx, &r) == 0)
 | |
| 	abort();
 | |
| 
 | |
|     if ((user = heim_digest_get_key(ctx, "username")) == NULL)
 | |
| 	abort();
 | |
|     if (strcmp(user, "notright") != 0)
 | |
| 	abort();
 | |
| 
 | |
| 
 | |
|     /* Done */
 | |
| 
 | |
|     heim_digest_release(ctx);
 | |
|     
 | |
|     
 | |
|     /*
 | |
|      * Check heim_digest_generate_challenge()
 | |
|      */
 | |
|     
 | |
|     if ((ctx = heim_digest_create(1, HEIM_DIGEST_TYPE_RFC2831)) == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_set_key(ctx, "serverRealm", "elwood.innosoft.com");
 | |
|     heim_digest_set_key(ctx, "serverNonce", "OA6MG9tEQGm2hh");
 | |
|     heim_digest_set_key(ctx, "serverQOP", "auth,auth-int");
 | |
|     
 | |
|     challenge = heim_digest_generate_challenge(ctx);
 | |
|     if (challenge == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     if (heim_digest_parse_challenge(ctx, challenge))
 | |
| 	abort();
 | |
| 
 | |
|     /* check that server detects changing QOP */
 | |
|     if (!heim_digest_parse_response(ctx, "charset=utf-8,username=\"chris\",realm=\"elwood.innosoft.com\",nonce=\"OA6MG9tEQGm2hh\",nc=00000001,cnonce=\"OA6MHXh6VqTrRk\",digest-uri=\"imap/elwood.innosoft.com\",response=d388dad90d4bbd760a152321f2143af7,qop=auth-conf"))
 | |
| 	abort();
 | |
|     
 | |
|     if (heim_digest_parse_response(ctx, "charset=utf-8,username=\"chris\",realm=\"elwood.innosoft.com\",nonce=\"OA6MG9tEQGm2hh\",nc=00000001,cnonce=\"OA6MHXh6VqTrRk\",digest-uri=\"imap/elwood.innosoft.com\",response=d388dad90d4bbd760a152321f2143af7,qop=auth"))
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_set_key(ctx, "password", "secret");
 | |
|     
 | |
|     if (heim_digest_verify(ctx, &r))
 | |
| 	abort();
 | |
|     
 | |
|     if (strcmp(r, "rspauth=ea40f60335c427b5527b84dbabcdfffd") != 0)
 | |
| 	abort();
 | |
|     
 | |
|     free(r);
 | |
| 
 | |
|     heim_digest_release(ctx);
 | |
| 
 | |
|     /*
 | |
|      * Validate heim_digest_service_response()
 | |
|      */
 | |
|     
 | |
|     if ((ctx = heim_digest_create(1, HEIM_DIGEST_TYPE_RFC2831)) == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_set_key(ctx, "clientNonce", "OA6MHXh6VqTrRk");
 | |
|     heim_digest_set_key(ctx, "clientQOP", "auth");
 | |
|     heim_digest_set_key(ctx, "clientNC", "00000001");
 | |
|     heim_digest_set_key(ctx, "serverNonce", "OA6MG9tEQGm2hh");
 | |
|     heim_digest_set_key(ctx, "clientURI", "imap/elwood.innosoft.com");
 | |
|     heim_digest_set_key(ctx, "serverRealm", "elwood.innosoft.com");
 | |
|     heim_digest_set_key(ctx, "serverNonce", "OA6MG9tEQGm2hh");
 | |
|     heim_digest_set_key(ctx, "H(A1)", "a2549853149b0536f01f0b850c643c57");
 | |
|     
 | |
|     resp = heim_digest_server_response(ctx);
 | |
| 
 | |
|     if (resp == NULL || strcmp(resp, "rspauth=ea40f60335c427b5527b84dbabcdfffd") != 0)
 | |
| 	abort();
 | |
| 
 | |
|     heim_digest_release(ctx);
 | |
| 
 | |
|     if ((ctx = heim_digest_create(1, HEIM_DIGEST_TYPE_RFC2831)) == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_set_key(ctx, "clientNonce", "OA6MHXh6VqTrRk");
 | |
|     heim_digest_set_key(ctx, "clientQOP", "auth");
 | |
|     heim_digest_set_key(ctx, "clientNC", "00000001");
 | |
|     heim_digest_set_key(ctx, "serverNonce", "OA6MG9tEQGm2hh");
 | |
|     heim_digest_set_key(ctx, "clientURI", "imap/elwood.innosoft.com");
 | |
|     heim_digest_set_key(ctx, "serverRealm", "elwood.innosoft.com");
 | |
|     heim_digest_set_key(ctx, "serverNonce", "OA6MG9tEQGm2hh");
 | |
|     heim_digest_set_key(ctx, "password", "secret");
 | |
|     heim_digest_set_key(ctx, "username", "chris");
 | |
| 
 | |
|     resp = heim_digest_server_response(ctx);
 | |
|     
 | |
|     if (resp == NULL || strcmp(resp, "rspauth=ea40f60335c427b5527b84dbabcdfffd") != 0)
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_release(ctx);
 | |
|     
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| test_http_digest_md5(void)
 | |
| {
 | |
|     heim_digest_t ctx, ctx2;
 | |
|     const char *user, *chal, *resp;
 | |
|     char *serverresp, *serverresp2;
 | |
| 
 | |
|     if ((ctx = heim_digest_create(1, HEIM_DIGEST_TYPE_AUTO)) == NULL)
 | |
| 	abort();
 | |
| 
 | |
|     if (heim_digest_parse_challenge(ctx, "realm=\"testrealm@host.com\","
 | |
| 				    "nonce=\"dcd98b7102dd2f0e8b11d0f600bfb0c093\","
 | |
| 				    "opaque=\"5ccc069c403ebaf9f0171e9517f40e41\""))
 | |
| 	abort();
 | |
| 
 | |
|     if (heim_digest_parse_response(ctx, "username=\"Mufasa\","
 | |
| 				   "realm=\"testrealm@host.com\","
 | |
| 				   "nonce=\"dcd98b7102dd2f0e8b11d0f600bfb0c093\","
 | |
| 				   "uri=\"/dir/index.html\","
 | |
| 				   "response=\"1949323746fe6a43ef61f9606e7febea\","
 | |
| 				   "opaque=\"5ccc069c403ebaf9f0171e9517f40e41\""))
 | |
| 	abort();
 | |
|     
 | |
|     if ((user = heim_digest_get_key(ctx, "username")) == NULL)
 | |
| 	abort();
 | |
|     if (strcmp(user, "Mufasa") != 0)
 | |
| 	abort();
 | |
| 
 | |
|     if ((user = heim_digest_get_key(ctx, "clientUsername")) == NULL)
 | |
| 	abort();
 | |
|     if (strcmp(user, "Mufasa") != 0)
 | |
| 	abort();
 | |
| 
 | |
|     heim_digest_set_key(ctx, "password", "CircleOfLife");
 | |
|     
 | |
|     if (heim_digest_verify(ctx, NULL))
 | |
| 	abort();
 | |
| 
 | |
|     /* Verify failure */
 | |
| 
 | |
|     heim_digest_set_key(ctx, "username", "Oskar");
 | |
|     
 | |
|     if (heim_digest_verify(ctx, NULL) == 0)
 | |
| 	abort();
 | |
| 
 | |
|     heim_digest_release(ctx);
 | |
|     
 | |
|     /*
 | |
|      * Check myself
 | |
|      */
 | |
| 
 | |
|     /* server */
 | |
|     if ((ctx = heim_digest_create(1, HEIM_DIGEST_TYPE_RFC2831)) == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_set_key(ctx, "serverRealm", "myrealmhahaha");
 | |
|     heim_digest_set_key(ctx, "serverQOP", "auth,auth-int");
 | |
|     
 | |
|     chal = heim_digest_generate_challenge(ctx);
 | |
|     if (chal == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     /* client */
 | |
|     if ((ctx2 = heim_digest_create(1, HEIM_DIGEST_TYPE_RFC2831)) == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     if (heim_digest_parse_challenge(ctx2, chal))
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_set_key(ctx2, "username", "lha");
 | |
|     heim_digest_set_key(ctx2, "password", "passw0rd");
 | |
|     heim_digest_set_key(ctx2, "uri", "/uri");
 | |
|     
 | |
|     resp = heim_digest_create_response(ctx2, &serverresp);
 | |
|     if (resp == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     /* server */
 | |
|     if (heim_digest_parse_response(ctx, resp))
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_set_key(ctx,  "password", "passw0rd");
 | |
|     heim_digest_verify(ctx, &serverresp2);
 | |
| 
 | |
|     
 | |
|     /* client */
 | |
|     if (strcmp(serverresp, serverresp2) != 0)
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_release(ctx);
 | |
|     heim_digest_release(ctx2);
 | |
|     
 | |
|     /*
 | |
|      * check prefix
 | |
|      */
 | |
|     
 | |
|     if ((ctx = heim_digest_create(1, HEIM_DIGEST_TYPE_AUTO)) == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     if (heim_digest_parse_challenge(ctx, "Digest realm=\"testrealm@host.com\","
 | |
| 				    "nonce=\"dcd98b7102dd2f0e8b11d0f600bfb0c093\","
 | |
| 				    "opaque=\"5ccc069c403ebaf9f0171e9517f40e41\""))
 | |
| 	abort();
 | |
| 
 | |
|     heim_digest_release(ctx);
 | |
| 
 | |
|     /*
 | |
|      * check prefix
 | |
|      */
 | |
|     
 | |
|     if ((ctx = heim_digest_create(1, HEIM_DIGEST_TYPE_AUTO)) == NULL)
 | |
| 	abort();
 | |
|     
 | |
|     if (heim_digest_parse_challenge(ctx, "Digest  realm=\"testrealm@host.com\","
 | |
| 				    "nonce=\"dcd98b7102dd2f0e8b11d0f600bfb0c093\","
 | |
| 				    "opaque=\"5ccc069c403ebaf9f0171e9517f40e41\""))
 | |
| 	abort();
 | |
|     
 | |
|     heim_digest_release(ctx);
 | |
|     
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| test_cram_md5(void)
 | |
| {
 | |
|     const char *chal = "<1896.697170952@postoffice.reston.mci.net>";
 | |
|     const char *secret = "tanstaaftanstaaf";
 | |
|     const char *resp = "b913a602c7eda7a495b4e6e7334d3890";
 | |
|     heim_CRAM_MD5_STATE state;
 | |
|     heim_cram_md5 ctx;
 | |
|     char *t;
 | |
| 
 | |
|     const uint8_t *prestate = (uint8_t *)
 | |
| 	"\x87\x1E\x24\x10\xB4\x0C\x72\x5D\xA3\x95\x2D\x5B\x8B\xFC\xDD\xE1"
 | |
| 	"\x29\x90\xCB\xA7\x66\xF6\xB3\x40\xE8\xAC\x48\x2C\xE4\xE3\xA4\x40";
 | |
| 
 | |
|     /*
 | |
|      * Test prebuild blobs
 | |
|      */
 | |
| 
 | |
|     if (sizeof(state) != 32)
 | |
| 	abort();
 | |
| 
 | |
|     heim_cram_md5_export("foo", &state);
 | |
| 
 | |
|     if (memcmp(prestate, &state, 32) != 0)
 | |
| 	abort();
 | |
| 
 | |
|     /*
 | |
|      * Check example
 | |
|      */
 | |
| 
 | |
| 
 | |
|     if (heim_cram_md5_verify(chal, secret, resp) != 0)
 | |
| 	abort();
 | |
| 
 | |
| 
 | |
|     /*
 | |
|      * Do it ourself
 | |
|      */
 | |
| 
 | |
|     t = heim_cram_md5_create(chal, secret);
 | |
|     if (t == NULL)
 | |
| 	abort();
 | |
| 
 | |
|     if (strcmp(resp, t) != 0)
 | |
| 	abort();
 | |
| 
 | |
|     heim_cram_md5_export(secret, &state);
 | |
|     /* here you can store the memcpy-ed version of state somewhere else */
 | |
| 
 | |
|     ctx = heim_cram_md5_import(&state, sizeof(state));
 | |
| 
 | |
|     memset(&state, 0, sizeof(state));
 | |
| 
 | |
|     if (heim_cram_md5_verify_ctx(ctx, chal, resp) != 0)
 | |
| 	abort();
 | |
| 
 | |
|     heim_cram_md5_free(ctx);
 | |
| 
 | |
|     free(t);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| test_apop(void)
 | |
| {
 | |
|     const char *chal = "<1896.697170952@dbc.mtview.ca.us>";
 | |
|     const char *secret = "tanstaaf";
 | |
|     const char *resp = "c4c9334bac560ecc979e58001b3e22fb";
 | |
|     char *t;
 | |
| 
 | |
|     t = heim_apop_create(chal, secret);
 | |
|     if (t == NULL)
 | |
| 	abort();
 | |
| 
 | |
|     if (strcmp(resp, t) != 0)
 | |
| 	abort();
 | |
| 
 | |
|     if (heim_apop_verify(chal, secret, resp) != 0)
 | |
| 	abort();
 | |
| 
 | |
|     free(t);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| int
 | |
| main(int argc, char **argv)
 | |
| {
 | |
|     int ret = 0;
 | |
| 
 | |
|     ret |= test_sasl_digest_md5();
 | |
|     ret |= test_http_digest_md5();
 | |
|     ret |= test_cram_md5();
 | |
|     ret |= test_apop();
 | |
| 
 | |
|     return ret;
 | |
| }
 | 
