mirror of https://github.com/sipwise/kamailio.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
317 lines
8.1 KiB
317 lines
8.1 KiB
/*
|
|
* $Id$
|
|
*
|
|
* Digest credentials parser interface
|
|
*
|
|
* Copyright (C) 2001-2003 FhG Fokus
|
|
*
|
|
* This file is part of ser, a free SIP server.
|
|
*
|
|
* ser is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version
|
|
*
|
|
* For a license to use the ser software under conditions
|
|
* other than those described here, or to purchase support for this
|
|
* software, please contact iptel.org by e-mail at the following addresses:
|
|
* info@iptel.org
|
|
*
|
|
* ser is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
|
|
|
|
#include "digest.h"
|
|
#include "../../mem/mem.h" /* pkg_malloc */
|
|
#include "../../dprint.h" /* Guess what */
|
|
#include <stdio.h> /* printf */
|
|
#include <string.h> /* strncasecmp */
|
|
|
|
|
|
/*
|
|
* Create and initialize a new credentials structure
|
|
*/
|
|
static inline int new_credentials(struct hdr_field* _h)
|
|
{
|
|
auth_body_t* b;
|
|
|
|
b = (auth_body_t*)pkg_malloc(sizeof(auth_body_t));
|
|
if (b == 0) {
|
|
LOG(L_ERR, "parse_credentials(): No memory left\n");
|
|
return -1;
|
|
}
|
|
|
|
init_dig_cred(&(b->digest));
|
|
b->stale = 0;
|
|
b->authorized = 0;
|
|
|
|
_h->parsed = (void*)b;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*
|
|
* Parse digest credentials
|
|
* Return value -1 means that the function was unable to allocate
|
|
* memory and therefore the server should return Internal Server Error,
|
|
* not Bad Request in this case !
|
|
* Bad Request should be send when return value != -1
|
|
*/
|
|
int parse_credentials(struct hdr_field* _h)
|
|
{
|
|
int res;
|
|
void** ph_parsed;
|
|
|
|
if (_h->parsed) {
|
|
return 0; /* Already parsed */
|
|
}
|
|
|
|
if (new_credentials(_h) < 0) {
|
|
LOG(L_ERR, "parse_credentials(): Can't create new credentials\n");
|
|
return -1;
|
|
}
|
|
|
|
/* parse_digest_cred must return < -1 on error otherwise we will be
|
|
* unable to distinguish if the error was caused by the server or if the
|
|
* credentials are broken
|
|
*/
|
|
res = parse_digest_cred(&(_h->body), &(((auth_body_t*)(_h->parsed))->digest));
|
|
|
|
if (res != 0) {
|
|
ph_parsed=&_h->parsed;
|
|
free_credentials((auth_body_t**)ph_parsed);
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
|
|
/*
|
|
* Free all memory
|
|
*/
|
|
void free_credentials(auth_body_t** _b)
|
|
{
|
|
pkg_free(*_b);
|
|
*_b = 0;
|
|
}
|
|
|
|
|
|
/*
|
|
* Check semantics of a digest credentials structure
|
|
* Make sure that all attributes needed to verify response
|
|
* string are set or at least have a default value
|
|
*
|
|
* The returned value is logical OR of all errors encountered
|
|
* during the check, see dig_err_t type for more details
|
|
*/
|
|
dig_err_t check_dig_cred(dig_cred_t* _c)
|
|
{
|
|
dig_err_t res = E_DIG_OK;
|
|
|
|
/* Username must be present */
|
|
if (_c->username.user.s == 0) res |= E_DIG_USERNAME;
|
|
|
|
/* Realm must be present */
|
|
if (_c->realm.s == 0) res |= E_DIG_REALM;
|
|
|
|
/* Nonce that was used must be specified */
|
|
if (_c->nonce.s == 0) res |= E_DIG_NONCE;
|
|
|
|
/* URI must be specified */
|
|
if (_c->uri.s == 0) res |= E_DIG_URI;
|
|
|
|
/* We cannot check credentials without response */
|
|
if (_c->response.s == 0) res |= E_DIG_RESPONSE;
|
|
|
|
/* If QOP parameter is present, some additional
|
|
* requirements must be met
|
|
*/
|
|
if ((_c->qop.qop_parsed == QOP_AUTH) || (_c->qop.qop_parsed == QOP_AUTHINT)) {
|
|
/* CNONCE must be specified */
|
|
if (_c->cnonce.s == 0) res |= E_DIG_CNONCE;
|
|
/* and also nonce count must be specified */
|
|
if (_c->nc.s == 0) res |= E_DIG_NC;
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
|
|
/*
|
|
* Print credential structure content to stdout
|
|
* Just for debugging
|
|
*/
|
|
void print_cred(dig_cred_t* _c)
|
|
{
|
|
printf("===Digest credentials===\n");
|
|
if (_c) {
|
|
printf("Username\n");
|
|
printf("+--whole = \'%.*s\'\n", _c->username.whole.len, _c->username.whole.s);
|
|
printf("+--user = \'%.*s\'\n", _c->username.user.len, _c->username.user.s);
|
|
printf("\\--domain = \'%.*s\'\n", _c->username.domain.len, _c->username.domain.s);
|
|
printf("Realm = \'%.*s\'\n", _c->realm.len, _c->realm.s);
|
|
printf("Nonce = \'%.*s\'\n", _c->nonce.len, _c->nonce.s);
|
|
printf("URI = \'%.*s\'\n", _c->uri.len, _c->uri.s);
|
|
printf("Response = \'%.*s\'\n", _c->response.len, _c->response.s);
|
|
printf("Algorithm = \'%.*s\'\n", _c->alg.alg_str.len, _c->alg.alg_str.s);
|
|
printf("\\--parsed = ");
|
|
|
|
switch(_c->alg.alg_parsed) {
|
|
case ALG_UNSPEC: printf("ALG_UNSPEC\n"); break;
|
|
case ALG_MD5: printf("ALG_MD5\n"); break;
|
|
case ALG_MD5SESS: printf("ALG_MD5SESS\n"); break;
|
|
case ALG_OTHER: printf("ALG_OTHER\n"); break;
|
|
}
|
|
|
|
printf("Cnonce = \'%.*s\'\n", _c->cnonce.len, _c->cnonce.s);
|
|
printf("Opaque = \'%.*s\'\n", _c->opaque.len, _c->opaque.s);
|
|
printf("QOP = \'%.*s\'\n", _c->qop.qop_str.len, _c->qop.qop_str.s);
|
|
printf("\\--parsed = ");
|
|
|
|
switch(_c->qop.qop_parsed) {
|
|
case QOP_UNSPEC: printf("QOP_UNSPEC\n"); break;
|
|
case QOP_AUTH: printf("QOP_AUTH\n"); break;
|
|
case QOP_AUTHINT: printf("QOP_AUTHINT\n"); break;
|
|
case QOP_OTHER: printf("QOP_OTHER\n"); break;
|
|
}
|
|
printf("NC = \'%.*s\'\n", _c->nc.len, _c->nc.s);
|
|
}
|
|
printf("===/Digest credentials===\n");
|
|
}
|
|
|
|
|
|
/*
|
|
* Mark credentials as selected so functions
|
|
* following authorize know which credentials
|
|
* to use if the message contained more than
|
|
* one
|
|
*/
|
|
int mark_authorized_cred(struct sip_msg* _m, struct hdr_field* _h)
|
|
{
|
|
struct hdr_field* f;
|
|
|
|
switch(_h->type) {
|
|
case HDR_AUTHORIZATION_T: f = _m->authorization; break;
|
|
case HDR_PROXYAUTH_T: f = _m->proxy_auth; break;
|
|
default:
|
|
LOG(L_ERR, "mark_authorized_cred(): Invalid header field type\n");
|
|
return -1;
|
|
}
|
|
|
|
if (!(f->parsed)) {
|
|
if (new_credentials(f) < 0) {
|
|
LOG(L_ERR, "mark_authorized_cred(): Error in new_credentials\n");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
((auth_body_t*)(f->parsed))->authorized = _h;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*
|
|
* Get pointer to authorized credentials, if there are no
|
|
* authorized credentials, 0 is returned
|
|
*/
|
|
int get_authorized_cred(struct hdr_field* _f, struct hdr_field** _h)
|
|
{
|
|
if (_f && _f->parsed) {
|
|
*_h = ((auth_body_t*)(_f->parsed))->authorized;
|
|
} else {
|
|
*_h = 0;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*
|
|
* Find credentials with given realm in a SIP message header
|
|
*/
|
|
int find_credentials(struct sip_msg* msg, str* realm,
|
|
hdr_types_t hftype, struct hdr_field** hdr)
|
|
{
|
|
struct hdr_field** hook, *ptr;
|
|
hdr_flags_t hdr_flags;
|
|
int res;
|
|
str* r;
|
|
|
|
/*
|
|
* Determine if we should use WWW-Authorization or
|
|
* Proxy-Authorization header fields, this parameter
|
|
* is set in www_authorize and proxy_authorize
|
|
*/
|
|
switch(hftype) {
|
|
case HDR_AUTHORIZATION_T:
|
|
hook = &(msg->authorization);
|
|
hdr_flags=HDR_AUTHORIZATION_F;
|
|
break;
|
|
case HDR_PROXYAUTH_T:
|
|
hook = &(msg->proxy_auth);
|
|
hdr_flags=HDR_PROXYAUTH_F;
|
|
break;
|
|
default:
|
|
hook = &(msg->authorization);
|
|
hdr_flags=HDR_T2F(hftype);
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* If the credentials haven't been parsed yet, do it now
|
|
*/
|
|
if (*hook == 0) {
|
|
/* No credentials parsed yet */
|
|
if (parse_headers(msg, hdr_flags, 0) == -1) {
|
|
LOG(L_ERR, "auth:find_credentials: Error while parsing headers\n");
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
ptr = *hook;
|
|
|
|
/*
|
|
* Iterate through the credentials in the message and
|
|
* find credentials with given realm
|
|
*/
|
|
while(ptr) {
|
|
res = parse_credentials(ptr);
|
|
if (res < 0) {
|
|
LOG(L_ERR, "auth:find_credentials: Error while parsing credentials\n");
|
|
return (res == -1) ? -2 : -3;
|
|
} else if (res == 0) {
|
|
r = &(((auth_body_t*)(ptr->parsed))->digest.realm);
|
|
|
|
if (r->len == realm->len) {
|
|
if (!strncasecmp(realm->s, r->s, r->len)) {
|
|
*hdr = ptr;
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (parse_headers(msg, hdr_flags, 1) == -1) {
|
|
LOG(L_ERR, "auth:find_credentials: Error while parsing headers\n");
|
|
return -4;
|
|
} else {
|
|
ptr = next_sibling_hdr(ptr);
|
|
if (!ptr)
|
|
break;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Credentials with given realm not found
|
|
*/
|
|
return 1;
|
|
}
|