260 lines
7.4 KiB
Ragel
Executable File
260 lines
7.4 KiB
Ragel
Executable File
/*
|
|
* Copyright (C) 2010-2015 Mamadou Diop.
|
|
*
|
|
* This file is part of Open Source Doubango Framework.
|
|
*
|
|
* DOUBANGO is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* DOUBANGO is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with DOUBANGO.
|
|
*
|
|
*/
|
|
|
|
/**@file thttp_header_WWW_Authenticate.c
|
|
* @brief HTTP WWW-Authenticate header.
|
|
*/
|
|
#include "tinyhttp/headers/thttp_header_WWW_Authenticate.h"
|
|
|
|
#include "tinyhttp/parsers/thttp_parser_url.h"
|
|
|
|
#include "tsk_debug.h"
|
|
#include "tsk_memory.h"
|
|
#include "tsk_time.h"
|
|
|
|
#include <string.h>
|
|
|
|
// Check if we have ",CRLF" ==> See WWW-Authenticate header
|
|
// As :>CRLF is preceded by any+ ==> p will be at least (start + 1)
|
|
// p point to CR
|
|
#define prev_not_comma(p) !(p && p[-1] == ',')
|
|
|
|
/***********************************
|
|
* Ragel state machine.
|
|
*/
|
|
%%{
|
|
machine thttp_machine_parser_header_WWW_Authenticate;
|
|
|
|
# Includes
|
|
include thttp_machine_utils "./ragel/thttp_machine_utils.rl";
|
|
|
|
action tag{
|
|
tag_start = p;
|
|
}
|
|
|
|
action is_digest{
|
|
hdr_WWW_Authenticate->scheme = tsk_strdup("Digest");
|
|
}
|
|
|
|
action is_basic{
|
|
hdr_WWW_Authenticate->scheme = tsk_strdup("Basic");
|
|
}
|
|
|
|
action is_auth{
|
|
THTTP_HEADER(hdr_WWW_Authenticate)->type = thttp_htype_WWW_Authenticate;
|
|
}
|
|
|
|
action is_proxy{
|
|
THTTP_HEADER(hdr_WWW_Authenticate)->type = thttp_htype_Proxy_Authenticate;
|
|
}
|
|
|
|
action parse_realm{
|
|
TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->realm);
|
|
tsk_strunquote(&hdr_WWW_Authenticate->realm);
|
|
}
|
|
|
|
action parse_domain{
|
|
TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->domain);
|
|
//tsk_strunquote(&hdr_WWW_Authenticate->domain);
|
|
}
|
|
|
|
action parse_nonce{
|
|
TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->nonce);
|
|
tsk_strunquote(&hdr_WWW_Authenticate->nonce);
|
|
}
|
|
|
|
action parse_opaque{
|
|
TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->opaque);
|
|
tsk_strunquote(&hdr_WWW_Authenticate->opaque);
|
|
}
|
|
|
|
action parse_stale{
|
|
hdr_WWW_Authenticate->stale = tsk_strniequals(tag_start, "true", 4);
|
|
}
|
|
|
|
action parse_algorithm{
|
|
TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->algorithm);
|
|
}
|
|
|
|
action parse_qop{
|
|
TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->qop);
|
|
//tsk_strunquote(&hdr_WWW_Authenticate->qop);
|
|
}
|
|
|
|
action parse_param{
|
|
TSK_PARSER_ADD_PARAM(THTTP_HEADER_PARAMS(hdr_WWW_Authenticate));
|
|
}
|
|
|
|
action prev_not_comma{
|
|
prev_not_comma(p)
|
|
}
|
|
|
|
action eob{
|
|
}
|
|
|
|
#FIXME: Only Digest (MD5, AKAv1-MD5 and AKAv2-MD5) is supported
|
|
other_challenge = (any+);
|
|
auth_param = generic_param>tag %parse_param;
|
|
|
|
realm = "realm"i EQUAL quoted_string>tag %parse_realm;
|
|
domain = "domain"i EQUAL LDQUOT <: (any*)>tag %parse_domain :> RDQUOT;
|
|
nonce = "nonce"i EQUAL quoted_string>tag %parse_nonce;
|
|
opaque = "opaque"i EQUAL quoted_string>tag %parse_opaque;
|
|
stale = "stale"i EQUAL ( "true"i | "false"i )>tag %parse_stale;
|
|
algorithm = "algorithm"i EQUAL <:token>tag %parse_algorithm;
|
|
qop_options = "qop"i EQUAL LDQUOT <: (any*)>tag %parse_qop :> RDQUOT;
|
|
|
|
digest_cln = (realm | domain | nonce | opaque | stale | algorithm | qop_options)@1 | auth_param@0;
|
|
challenge = ( ("Digest"i%is_digest | "Basic"i%is_basic) LWS digest_cln ( (COMMA | CRLF) <:digest_cln )* ) | other_challenge;
|
|
WWW_Authenticate = ("WWW-Authenticate"i>is_auth | "Proxy-Authenticate"i>is_proxy) HCOLON challenge;
|
|
|
|
# Entry point
|
|
main := WWW_Authenticate CRLF @eob;
|
|
|
|
}%%
|
|
|
|
thttp_header_WWW_Authenticate_t* thttp_header_www_authenticate_create()
|
|
{
|
|
return tsk_object_new(thttp_header_WWW_Authenticate_def_t);
|
|
}
|
|
|
|
int thttp_header_WWW_Authenticate_tostring(const thttp_header_t* header, tsk_buffer_t* output)
|
|
{
|
|
if(header){
|
|
const thttp_header_WWW_Authenticate_t *WWW_Authenticate = (const thttp_header_WWW_Authenticate_t*)header;
|
|
if(WWW_Authenticate && WWW_Authenticate->scheme){
|
|
return tsk_buffer_append_2(output, "%s realm=\"%s\"%s%s%s%s%s%s%s%s%s%s%s%s,stale=%s%s%s",
|
|
WWW_Authenticate->scheme,
|
|
WWW_Authenticate->realm ? WWW_Authenticate->realm : "",
|
|
|
|
WWW_Authenticate->domain ? ",domain=\"" : "",
|
|
WWW_Authenticate->domain ? WWW_Authenticate->domain : "",
|
|
WWW_Authenticate->domain ? "\"" : "",
|
|
|
|
|
|
WWW_Authenticate->qop ? ",qop=\"" : "",
|
|
WWW_Authenticate->qop ? WWW_Authenticate->qop : "",
|
|
WWW_Authenticate->qop ? "\"" : "",
|
|
|
|
|
|
WWW_Authenticate->nonce ? ",nonce=\"" : "",
|
|
WWW_Authenticate->nonce ? WWW_Authenticate->nonce : "",
|
|
WWW_Authenticate->nonce ? "\"" : "",
|
|
|
|
WWW_Authenticate->opaque ? ",opaque=\"" : "",
|
|
WWW_Authenticate->opaque ? WWW_Authenticate->opaque : "",
|
|
WWW_Authenticate->opaque ? "\"" : "",
|
|
|
|
WWW_Authenticate->stale ? "TRUE" : "FALSE",
|
|
|
|
WWW_Authenticate->algorithm ? ",algorithm=" : "",
|
|
WWW_Authenticate->algorithm ? WWW_Authenticate->algorithm : ""
|
|
);
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
/**@ingroup thttp_header_group
|
|
*/
|
|
thttp_header_WWW_Authenticate_t *thttp_header_WWW_Authenticate_parse(const char *data, tsk_size_t size)
|
|
{
|
|
int cs = 0;
|
|
const char *p = data;
|
|
const char *pe = p + size;
|
|
const char *eof = pe;
|
|
thttp_header_WWW_Authenticate_t *hdr_WWW_Authenticate = thttp_header_www_authenticate_create();
|
|
|
|
const char *tag_start = tsk_null;
|
|
|
|
TSK_RAGEL_DISABLE_WARNINGS_BEGIN()
|
|
%%write data;
|
|
(void)(eof);
|
|
(void)(thttp_machine_parser_header_WWW_Authenticate_first_final);
|
|
(void)(thttp_machine_parser_header_WWW_Authenticate_error);
|
|
(void)(thttp_machine_parser_header_WWW_Authenticate_en_main);
|
|
%%write init;
|
|
%%write exec;
|
|
TSK_RAGEL_DISABLE_WARNINGS_END()
|
|
|
|
if( cs < %%{ write first_final; }%% ){
|
|
TSK_DEBUG_ERROR("Failed to parse WWW-Authenticate header.");
|
|
TSK_OBJECT_SAFE_FREE(hdr_WWW_Authenticate);
|
|
}
|
|
|
|
return hdr_WWW_Authenticate;
|
|
}
|
|
|
|
thttp_header_Proxy_Authenticate_t *thttp_header_Proxy_Authenticate_parse(const char *data, tsk_size_t size)
|
|
{
|
|
return thttp_header_WWW_Authenticate_parse(data, size);
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
//========================================================
|
|
// WWW_Authenticate header object definition
|
|
//
|
|
|
|
static tsk_object_t* thttp_header_WWW_Authenticate_ctor(tsk_object_t *self, va_list * app)
|
|
{
|
|
thttp_header_WWW_Authenticate_t *WWW_Authenticate = self;
|
|
if(WWW_Authenticate){
|
|
THTTP_HEADER(WWW_Authenticate)->type = thttp_htype_WWW_Authenticate;
|
|
THTTP_HEADER(WWW_Authenticate)->tostring = thttp_header_WWW_Authenticate_tostring;
|
|
}
|
|
else{
|
|
TSK_DEBUG_ERROR("Failed to create new WWW_Authenticate header.");
|
|
}
|
|
return self;
|
|
}
|
|
|
|
static tsk_object_t* thttp_header_WWW_Authenticate_dtor(tsk_object_t *self)
|
|
{
|
|
thttp_header_WWW_Authenticate_t *WWW_Authenticate = self;
|
|
if(WWW_Authenticate){
|
|
TSK_FREE(WWW_Authenticate->scheme);
|
|
TSK_FREE(WWW_Authenticate->realm);
|
|
TSK_FREE(WWW_Authenticate->domain);
|
|
TSK_FREE(WWW_Authenticate->nonce);
|
|
TSK_FREE(WWW_Authenticate->opaque);
|
|
TSK_FREE(WWW_Authenticate->algorithm);
|
|
TSK_FREE(WWW_Authenticate->qop);
|
|
|
|
TSK_OBJECT_SAFE_FREE(THTTP_HEADER_PARAMS(WWW_Authenticate));
|
|
}
|
|
else{
|
|
TSK_DEBUG_ERROR("Null WWW_Authenticate header.");
|
|
}
|
|
|
|
return self;
|
|
}
|
|
|
|
static const tsk_object_def_t thttp_header_WWW_Authenticate_def_s =
|
|
{
|
|
sizeof(thttp_header_WWW_Authenticate_t),
|
|
thttp_header_WWW_Authenticate_ctor,
|
|
thttp_header_WWW_Authenticate_dtor,
|
|
tsk_null
|
|
};
|
|
const tsk_object_def_t *thttp_header_WWW_Authenticate_def_t = &thttp_header_WWW_Authenticate_def_s;
|