598 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			598 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Copyright (c) 2006 - 2008 Kungliga Tekniska Högskolan
 | 
						|
 * (Royal Institute of Technology, Stockholm, Sweden).
 | 
						|
 * All rights reserved.
 | 
						|
 *
 | 
						|
 * Portions Copyright (c) 2010 Apple Inc. All rights reserved.
 | 
						|
 *
 | 
						|
 * Redistribution and use in source and binary forms, with or without
 | 
						|
 * modification, are permitted provided that the following conditions
 | 
						|
 * are met:
 | 
						|
 *
 | 
						|
 * 1. Redistributions of source code must retain the above copyright
 | 
						|
 *    notice, this list of conditions and the following disclaimer.
 | 
						|
 *
 | 
						|
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
						|
 *    notice, this list of conditions and the following disclaimer in the
 | 
						|
 *    documentation and/or other materials provided with the distribution.
 | 
						|
 *
 | 
						|
 * 3. Neither the name of the Institute nor the names of its contributors
 | 
						|
 *    may be used to endorse or promote products derived from this software
 | 
						|
 *    without specific prior written permission.
 | 
						|
 *
 | 
						|
 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
 | 
						|
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
						|
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | 
						|
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
 | 
						|
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | 
						|
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | 
						|
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
						|
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | 
						|
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | 
						|
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | 
						|
 * SUCH DAMAGE.
 | 
						|
 */
 | 
						|
 | 
						|
#include <sys/types.h>
 | 
						|
#include <stdio.h>
 | 
						|
#include <unistd.h>
 | 
						|
#include <CommonCrypto/CommonDigest.h>
 | 
						|
#include <CommonCrypto/CommonHMAC.h>
 | 
						|
#include <assert.h>
 | 
						|
#include <roken.h>
 | 
						|
#include <hex.h>
 | 
						|
#include "heim-auth.h"
 | 
						|
#include "ntlm_err.h"
 | 
						|
 | 
						|
struct heim_digest_desc {
 | 
						|
    int server;
 | 
						|
    int type;
 | 
						|
    char *password;
 | 
						|
    uint8_t SecretHash[CC_MD5_DIGEST_LENGTH];
 | 
						|
    char *serverNonce;
 | 
						|
    char *serverRealm;
 | 
						|
    char *serverQOP;
 | 
						|
    char *serverMethod;
 | 
						|
    char *clientUsername;
 | 
						|
    char *clientResponse;
 | 
						|
    char *clientURI;
 | 
						|
    char *clientRealm;
 | 
						|
    char *clientNonce;
 | 
						|
    char *clientQOP;
 | 
						|
    char *clientNC;
 | 
						|
    char *serverAlgorithm;
 | 
						|
    char *auth_id;
 | 
						|
};
 | 
						|
 | 
						|
#define FREE_AND_CLEAR(x) do { if ((x)) { free((x)); (x) = NULL; } } while(0)
 | 
						|
#define MEMSET_FREE_AND_CLEAR(x) do { if ((x)) { memset(x, 0, strlen(x)); free((x)); (x) = NULL; } } while(0)
 | 
						|
 | 
						|
static void
 | 
						|
clear_context(heim_digest_t context)
 | 
						|
{
 | 
						|
    MEMSET_FREE_AND_CLEAR(context->password);
 | 
						|
    memset(context->SecretHash, 0, sizeof(context->SecretHash));
 | 
						|
    FREE_AND_CLEAR(context->serverNonce);
 | 
						|
    FREE_AND_CLEAR(context->serverRealm);
 | 
						|
    FREE_AND_CLEAR(context->serverQOP);
 | 
						|
    FREE_AND_CLEAR(context->serverMethod);
 | 
						|
    FREE_AND_CLEAR(context->clientUsername);
 | 
						|
    FREE_AND_CLEAR(context->clientResponse);
 | 
						|
    FREE_AND_CLEAR(context->clientURI);
 | 
						|
    FREE_AND_CLEAR(context->clientRealm);
 | 
						|
    FREE_AND_CLEAR(context->clientNonce);
 | 
						|
    FREE_AND_CLEAR(context->clientQOP);
 | 
						|
    FREE_AND_CLEAR(context->clientNC);
 | 
						|
    FREE_AND_CLEAR(context->serverAlgorithm);
 | 
						|
    FREE_AND_CLEAR(context->auth_id);
 | 
						|
}
 | 
						|
 | 
						|
static char *
 | 
						|
build_A1_hash(int type,
 | 
						|
	      const char *username, const char *password,
 | 
						|
	      const char *realm, const char *serverNonce,
 | 
						|
	      const char *clientNonce,
 | 
						|
	      const char *auth_id)
 | 
						|
{
 | 
						|
    unsigned char md[CC_MD5_DIGEST_LENGTH];
 | 
						|
    CC_MD5_CTX ctx;
 | 
						|
    char *A1;
 | 
						|
 | 
						|
    CC_MD5_Init(&ctx);
 | 
						|
    CC_MD5_Update(&ctx, username, strlen(username));
 | 
						|
    CC_MD5_Update(&ctx, ":", 1);
 | 
						|
    CC_MD5_Update(&ctx, realm, strlen(realm));
 | 
						|
    CC_MD5_Update(&ctx, ":", 1);
 | 
						|
    CC_MD5_Update(&ctx, password, strlen(password));
 | 
						|
    CC_MD5_Final(md, &ctx);
 | 
						|
 | 
						|
    if (type != HEIM_DIGEST_TYPE_RFC2069) {
 | 
						|
	CC_MD5_Init(&ctx);
 | 
						|
	CC_MD5_Update(&ctx, md, sizeof(md));
 | 
						|
	memset(md, 0, sizeof(md));
 | 
						|
	CC_MD5_Update(&ctx, ":", 1);
 | 
						|
	CC_MD5_Update(&ctx, serverNonce, strlen(serverNonce));
 | 
						|
	if (clientNonce) {
 | 
						|
	    CC_MD5_Update(&ctx, ":", 1);
 | 
						|
	    CC_MD5_Update(&ctx, clientNonce, strlen(clientNonce));
 | 
						|
	}
 | 
						|
	if (auth_id) {
 | 
						|
	    CC_MD5_Update(&ctx, ":", 1);
 | 
						|
	    CC_MD5_Update(&ctx, auth_id, strlen(auth_id));
 | 
						|
	}
 | 
						|
	CC_MD5_Final(md, &ctx);
 | 
						|
    }
 | 
						|
    hex_encode(md, sizeof(md), &A1);
 | 
						|
    if (A1)
 | 
						|
      strlwr(A1);
 | 
						|
 | 
						|
    return A1;
 | 
						|
}
 | 
						|
 | 
						|
static char *
 | 
						|
build_A2_hash(heim_digest_t context, const char *method)
 | 
						|
{
 | 
						|
    unsigned char md[CC_MD5_DIGEST_LENGTH];
 | 
						|
    CC_MD5_CTX ctx;
 | 
						|
    char *A2;
 | 
						|
  
 | 
						|
    CC_MD5_Init(&ctx);
 | 
						|
    if (method)
 | 
						|
	CC_MD5_Update(&ctx, method, strlen(method));
 | 
						|
    CC_MD5_Update(&ctx, ":", 1);
 | 
						|
    CC_MD5_Update(&ctx, context->clientURI, strlen(context->clientURI));
 | 
						|
	
 | 
						|
    /* conf|int */
 | 
						|
    if (context->type != HEIM_DIGEST_TYPE_RFC2069) {
 | 
						|
	if (strcmp(context->clientQOP, "auth") != 0) {
 | 
						|
	    /* XXX if we have a body hash, use that */
 | 
						|
	    static char conf_zeros[] = ":00000000000000000000000000000000";
 | 
						|
	    CC_MD5_Update(&ctx, conf_zeros, sizeof(conf_zeros) - 1);
 | 
						|
	}
 | 
						|
    } else {
 | 
						|
	/* support auth-int ? */
 | 
						|
    }
 | 
						|
	
 | 
						|
    CC_MD5_Final(md, &ctx);
 | 
						|
 | 
						|
    hex_encode(md, sizeof(md), &A2);
 | 
						|
    if (A2)
 | 
						|
      strlwr(A2);
 | 
						|
 | 
						|
    return A2;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
struct md5_value {
 | 
						|
    char		*mv_name;
 | 
						|
    char		*mv_value;
 | 
						|
    struct md5_value 	*mv_next;
 | 
						|
};
 | 
						|
 | 
						|
static void
 | 
						|
free_values(struct md5_value *val)
 | 
						|
{
 | 
						|
    struct md5_value *v;
 | 
						|
    while(val) {
 | 
						|
	v = val->mv_next;
 | 
						|
	if (val->mv_name)
 | 
						|
	    free(val->mv_name);
 | 
						|
	if (val->mv_value)
 | 
						|
	    free(val->mv_value);
 | 
						|
	free(val);
 | 
						|
	val = v;
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Search for entry, if found, remove entry and return string to be freed.
 | 
						|
 */
 | 
						|
 | 
						|
static char *
 | 
						|
values_find(struct md5_value **val, const char *v)
 | 
						|
{
 | 
						|
    struct md5_value *cur = *val;
 | 
						|
    char *str;
 | 
						|
 | 
						|
    while (*val != NULL) {
 | 
						|
	if (strcasecmp(v, (*val)->mv_name) == 0)
 | 
						|
	    break;
 | 
						|
	val = &(*val)->mv_next;
 | 
						|
    }
 | 
						|
    if (*val == NULL)
 | 
						|
	return NULL;
 | 
						|
    cur = *val;
 | 
						|
    *val = (*val)->mv_next;
 | 
						|
 | 
						|
    str = cur->mv_value;
 | 
						|
    free(cur->mv_name);
 | 
						|
    free(cur);
 | 
						|
 | 
						|
    return str;
 | 
						|
}
 | 
						|
 | 
						|
static int
 | 
						|
parse_values(const char *string, struct md5_value **val)
 | 
						|
{
 | 
						|
    struct md5_value *v;
 | 
						|
    size_t size;
 | 
						|
    char *str, *p1, *p2;
 | 
						|
    size_t sz;
 | 
						|
 | 
						|
    *val = NULL;
 | 
						|
 | 
						|
    if ((str = strdup(string)) == NULL)
 | 
						|
	return ENOMEM;
 | 
						|
 | 
						|
    size = strlen(str);
 | 
						|
 | 
						|
    p1 = str;
 | 
						|
 | 
						|
    while (p1 - str < size) {
 | 
						|
	sz = strspn(p1, " \t\n\r,");
 | 
						|
	if (p1[sz] == '\0')
 | 
						|
	    break;
 | 
						|
	p1 += sz;
 | 
						|
	sz = strcspn(p1, " \t\n\r=");
 | 
						|
	if (sz == 0 || p1[sz] == '\0')
 | 
						|
	    goto error;
 | 
						|
	p2 = p1 + sz;
 | 
						|
 | 
						|
	if ((v = malloc(sizeof(*v))) == NULL)
 | 
						|
	    goto nomem;
 | 
						|
	v->mv_name = v->mv_value = NULL;
 | 
						|
	v->mv_next = *val;
 | 
						|
	*val = v;
 | 
						|
	if ((v->mv_name = malloc(p2 - p1 + 1)) == NULL)
 | 
						|
	    goto nomem;
 | 
						|
	strncpy(v->mv_name, p1, p2 - p1);
 | 
						|
	v->mv_name[p2 - p1] = '\0';
 | 
						|
 | 
						|
	sz = strspn(p2, " \t\n\r");
 | 
						|
	if (p2[sz] == '\0')
 | 
						|
	    goto error;
 | 
						|
	p2 += sz;
 | 
						|
 | 
						|
	if (*p2 != '=')
 | 
						|
	    goto error;
 | 
						|
	p2++;
 | 
						|
 | 
						|
	sz = strspn(p2, " \t\n\r");
 | 
						|
	if (p2[sz] == '\0')
 | 
						|
	    goto error;
 | 
						|
	p2 += sz;
 | 
						|
	p1 = p2;
 | 
						|
		
 | 
						|
	if (*p2 == '"') {
 | 
						|
	    p1++;
 | 
						|
	    while (*p2 == '"') {
 | 
						|
		p2++;
 | 
						|
		p2 = strchr(p2, '\"');
 | 
						|
		if (p2 == NULL)
 | 
						|
		    goto error;
 | 
						|
		if (p2[0] == '\0')
 | 
						|
		    goto error;
 | 
						|
		if (p2[-1] != '\\')
 | 
						|
		    break;
 | 
						|
	    }
 | 
						|
	} else {
 | 
						|
	    sz = strcspn(p2, " \t\n\r=,");
 | 
						|
	    p2 += sz;
 | 
						|
	}
 | 
						|
 | 
						|
#if 0 /* allow empty values */
 | 
						|
	if (p1 == p2)
 | 
						|
	    goto error;
 | 
						|
#endif
 | 
						|
 | 
						|
	if ((v->mv_value = malloc(p2 - p1 + 1)) == NULL)
 | 
						|
	    goto nomem;
 | 
						|
	strncpy(v->mv_value, p1, p2 - p1);
 | 
						|
	v->mv_value[p2 - p1] = '\0';
 | 
						|
		
 | 
						|
	if (p2[0] == '\0')
 | 
						|
	    break;
 | 
						|
	if (p2[0] == '"')
 | 
						|
	    p2++;
 | 
						|
 | 
						|
	sz = strspn(p2, " \t\n\r");
 | 
						|
	if (p2[sz] == '\0')
 | 
						|
	    break;
 | 
						|
	p2 += sz;
 | 
						|
 | 
						|
	if (p2[0] == '\0')
 | 
						|
	    break;
 | 
						|
	if (p2[0] != ',')
 | 
						|
	    goto error;
 | 
						|
	p1 = p2;
 | 
						|
    }
 | 
						|
 | 
						|
    free(str);
 | 
						|
 | 
						|
    return 0;
 | 
						|
 error:
 | 
						|
    free_values(*val);
 | 
						|
    *val = NULL;
 | 
						|
    free(str);
 | 
						|
    return EINVAL;
 | 
						|
 nomem:
 | 
						|
    free_values(*val);
 | 
						|
    *val = NULL;
 | 
						|
    free(str);
 | 
						|
    return ENOMEM;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
heim_digest_t
 | 
						|
heim_digest_create(int server, int type)
 | 
						|
{
 | 
						|
    heim_digest_t context;
 | 
						|
 | 
						|
    context = calloc(1, sizeof(*context));
 | 
						|
    if (context == NULL)
 | 
						|
	return NULL;
 | 
						|
    context->server = server;
 | 
						|
    context->type = type;
 | 
						|
 | 
						|
    return context;
 | 
						|
}
 | 
						|
 | 
						|
const char *
 | 
						|
heim_digest_generate_challenge(heim_digest_t context)
 | 
						|
{
 | 
						|
    return NULL;
 | 
						|
}
 | 
						|
 | 
						|
int
 | 
						|
heim_digest_parse_challenge(heim_digest_t context, const char *challenge)
 | 
						|
{
 | 
						|
    struct md5_value *val = NULL;
 | 
						|
    int ret, type;
 | 
						|
 | 
						|
    ret = parse_values(challenge, &val);
 | 
						|
    if (ret)
 | 
						|
	goto out;
 | 
						|
 | 
						|
    ret = 1;
 | 
						|
 | 
						|
    context->serverNonce = values_find(&val, "nonce");
 | 
						|
    if (context->serverNonce == NULL) goto out;
 | 
						|
 | 
						|
    context->serverRealm = values_find(&val, "realm");
 | 
						|
    if (context->serverRealm == NULL) goto out;
 | 
						|
 | 
						|
    context->serverQOP = values_find(&val, "qop");
 | 
						|
    if (context->serverQOP == NULL)
 | 
						|
	context->serverQOP = strdup("auth");
 | 
						|
    if (context->serverQOP == NULL) goto out;
 | 
						|
 | 
						|
    /* check alg */
 | 
						|
 | 
						|
    context->serverAlgorithm = values_find(&val, "algorithm");
 | 
						|
    if (context->serverAlgorithm == NULL || strcasecmp(context->serverAlgorithm, "md5") == 0) {
 | 
						|
	type = HEIM_DIGEST_TYPE_RFC2069;
 | 
						|
    } else if (strcasecmp(context->serverAlgorithm, "md5-sess") == 0) {
 | 
						|
	type = HEIM_DIGEST_TYPE_MD5_SESS;
 | 
						|
    } else {
 | 
						|
	goto out;
 | 
						|
    }
 | 
						|
 | 
						|
    if (context->type != HEIM_DIGEST_TYPE_AUTO && context->type != type)
 | 
						|
	goto out;
 | 
						|
    else
 | 
						|
	context->type = type;
 | 
						|
 | 
						|
 | 
						|
 | 
						|
    ret = 0;
 | 
						|
 out:
 | 
						|
    free_values(val);
 | 
						|
    if (ret)
 | 
						|
	clear_context(context);
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
int
 | 
						|
heim_digest_parse_response(heim_digest_t context, const char *response)
 | 
						|
{
 | 
						|
    struct md5_value *val = NULL;
 | 
						|
    char *nonce;
 | 
						|
    int ret;
 | 
						|
 | 
						|
    ret = parse_values(response, &val);
 | 
						|
    if (ret)
 | 
						|
	goto out;
 | 
						|
 | 
						|
    ret = 1;
 | 
						|
 | 
						|
    if (context->type == HEIM_DIGEST_TYPE_AUTO)
 | 
						|
	goto out;
 | 
						|
 | 
						|
    context->clientUsername = values_find(&val, "username");
 | 
						|
    if (context->clientUsername == NULL) goto out;
 | 
						|
 | 
						|
    context->clientRealm = values_find(&val, "realm");
 | 
						|
    
 | 
						|
    context->clientResponse = values_find(&val, "response");
 | 
						|
    if (context->clientResponse == NULL) goto out;
 | 
						|
 | 
						|
    nonce = values_find(&val, "nonce");
 | 
						|
    if (nonce == NULL) goto out;
 | 
						|
 | 
						|
    if (strcmp(nonce, context->serverNonce) != 0) {
 | 
						|
	free(nonce);
 | 
						|
	goto out;
 | 
						|
    }
 | 
						|
    free(nonce);
 | 
						|
 | 
						|
    context->clientQOP = values_find(&val, "qop");
 | 
						|
    if (context->clientQOP == NULL)
 | 
						|
	context->clientQOP = strdup("auth");
 | 
						|
    if (context->clientQOP == NULL) goto out;
 | 
						|
 | 
						|
 | 
						|
    if (context->type != HEIM_DIGEST_TYPE_RFC2069) {
 | 
						|
	context->clientNC = values_find(&val, "nc");
 | 
						|
	if (context->clientNC == NULL) goto out;
 | 
						|
 | 
						|
	context->clientNonce = values_find(&val, "cnonce");
 | 
						|
	if (context->clientNonce == NULL) goto out;
 | 
						|
    }
 | 
						|
 | 
						|
    if (context->type == HEIM_DIGEST_TYPE_RFC2069)
 | 
						|
	context->clientURI = values_find(&val, "uri");
 | 
						|
    else
 | 
						|
	context->clientURI = values_find(&val, "digest-uri");
 | 
						|
    if (context->clientURI == NULL) goto out;
 | 
						|
 | 
						|
    ret = 0;
 | 
						|
 out:
 | 
						|
    free_values(val);
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
const char *
 | 
						|
heim_digest_get_key(heim_digest_t context, const char *key)
 | 
						|
{
 | 
						|
    if (strcmp(key, "username") == 0) {
 | 
						|
        return context->clientUsername;
 | 
						|
    } else if (strcmp(key, "realm") == 0) {
 | 
						|
        return context->clientRealm;
 | 
						|
    } else {
 | 
						|
	return NULL;
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
int
 | 
						|
heim_digest_set_key(heim_digest_t context, const char *key, const char *value)
 | 
						|
{
 | 
						|
    if (strcmp(key, "password") == 0) {
 | 
						|
	FREE_AND_CLEAR(context->password);
 | 
						|
	if ((context->password = strdup(value)) == NULL)
 | 
						|
	    return ENOMEM;
 | 
						|
    } else if (strcmp(key, "method") == 0) {
 | 
						|
	FREE_AND_CLEAR(context->serverMethod);
 | 
						|
	if ((context->serverMethod = strdup(value)) != NULL)
 | 
						|
	    return ENOMEM;
 | 
						|
    } else {
 | 
						|
	return EINVAL;
 | 
						|
    }
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
static char *
 | 
						|
build_digest(heim_digest_t context, const char *a1, const char *method)
 | 
						|
{
 | 
						|
    CC_MD5_CTX ctx;
 | 
						|
    uint8_t md[CC_MD5_DIGEST_LENGTH];
 | 
						|
    char *a2, *str = NULL;
 | 
						|
 | 
						|
    a2 = build_A2_hash(context, method);
 | 
						|
    if (a2 == NULL)
 | 
						|
      return NULL;
 | 
						|
 | 
						|
    CC_MD5_Init(&ctx);
 | 
						|
    CC_MD5_Update(&ctx, a1, strlen(a1));
 | 
						|
    CC_MD5_Update(&ctx, ":", 1);
 | 
						|
    CC_MD5_Update(&ctx, context->serverNonce, strlen(context->serverNonce));
 | 
						|
    if (context->type != HEIM_DIGEST_TYPE_RFC2069) {
 | 
						|
	CC_MD5_Update(&ctx, ":", 1);
 | 
						|
	CC_MD5_Update(&ctx, context->clientNC, strlen(context->clientNC));
 | 
						|
	CC_MD5_Update(&ctx, ":", 1);
 | 
						|
	CC_MD5_Update(&ctx, context->clientNonce, strlen(context->clientNonce));
 | 
						|
	CC_MD5_Update(&ctx, ":", 1);
 | 
						|
	CC_MD5_Update(&ctx, context->clientQOP, strlen(context->clientQOP));
 | 
						|
    }
 | 
						|
    CC_MD5_Update(&ctx, ":", 1);
 | 
						|
    CC_MD5_Update(&ctx, a2, strlen(a2));
 | 
						|
    CC_MD5_Final(md, &ctx);
 | 
						|
 | 
						|
    free(a2);
 | 
						|
 | 
						|
    hex_encode(md, sizeof(md), &str);
 | 
						|
    if (str)
 | 
						|
      strlwr(str);
 | 
						|
 | 
						|
    return str;
 | 
						|
}
 | 
						|
 | 
						|
const char *
 | 
						|
heim_digest_create_response(heim_digest_t context)
 | 
						|
{
 | 
						|
    return NULL;
 | 
						|
}
 | 
						|
 | 
						|
int
 | 
						|
heim_digest_verify(heim_digest_t context, char **response)
 | 
						|
{
 | 
						|
    CC_MD5_CTX ctx;
 | 
						|
    char *a1, *a2;
 | 
						|
    uint8_t md[CC_MD5_DIGEST_LENGTH];
 | 
						|
    char *str;
 | 
						|
    int res;
 | 
						|
 | 
						|
    if (response)
 | 
						|
	*response = NULL;
 | 
						|
 | 
						|
    if (context->serverMethod == NULL) {
 | 
						|
	if (context->type != HEIM_DIGEST_TYPE_RFC2069)
 | 
						|
	    context->serverMethod = strdup("AUTHENTICATE");
 | 
						|
	else
 | 
						|
	    context->serverMethod = strdup("GET");
 | 
						|
    }
 | 
						|
 | 
						|
    a1 = build_A1_hash(context->type,
 | 
						|
		       context->clientUsername, context->password,
 | 
						|
		       context->serverRealm, context->serverNonce,
 | 
						|
		       context->clientNonce, context->auth_id);
 | 
						|
    if (a1 == NULL)
 | 
						|
      return ENOMEM;
 | 
						|
 | 
						|
    str = build_digest(context, a1, context->serverMethod);
 | 
						|
    if (str == NULL) {
 | 
						|
	MEMSET_FREE_AND_CLEAR(a1);
 | 
						|
	return ENOMEM;
 | 
						|
    }
 | 
						|
 | 
						|
    res = (strcmp(str, context->clientResponse) == 0) ? 0 : EINVAL;
 | 
						|
    free(str);
 | 
						|
    if (res) {
 | 
						|
	MEMSET_FREE_AND_CLEAR(a1);
 | 
						|
	return res;
 | 
						|
    }
 | 
						|
 | 
						|
    /* build server_response */
 | 
						|
    if (response) {
 | 
						|
	str = build_digest(context, a1, NULL);
 | 
						|
	if (str == NULL) {
 | 
						|
	    MEMSET_FREE_AND_CLEAR(a1);
 | 
						|
	    return ENOMEM;
 | 
						|
	}
 | 
						|
 | 
						|
	asprintf(response, "rspauth=%s", str);
 | 
						|
	free(str);
 | 
						|
    }
 | 
						|
    MEMSET_FREE_AND_CLEAR(a1);
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
heim_digest_get_session_key(heim_digest_t context, void **key, size_t *keySize)
 | 
						|
{
 | 
						|
}
 | 
						|
 | 
						|
void
 | 
						|
heim_digest_release(heim_digest_t context)
 | 
						|
{
 | 
						|
    clear_context(context);
 | 
						|
    free(context);
 | 
						|
}
 | 
						|
 |