98 lines
3.0 KiB
C
Raw Normal View History

2016-09-11 17:22:32 +02:00
/***************************************************************************
* _ _ ____ _
* Project ___| | | | _ \| |
* / __| | | | |_) | |
* | (__| |_| | _ <| |___
* \___|\___/|_| \_\_____|
*
2023-07-02 19:51:09 +02:00
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
2016-09-11 17:22:32 +02:00
*
* This software is licensed as described in the file COPYING, which
* you should have received as part of this distribution. The terms
2021-09-14 00:13:48 +02:00
* are also available at https://curl.se/docs/copyright.html.
2016-09-11 17:22:32 +02:00
*
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
* copies of the Software, and permit persons to whom the Software is
* furnished to do so, under the terms of the COPYING file.
*
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
* KIND, either express or implied.
*
2022-11-16 20:14:03 +01:00
* SPDX-License-Identifier: curl
*
2016-09-11 17:22:32 +02:00
* RFC2195 CRAM-MD5 authentication
*
***************************************************************************/
#include "curl_setup.h"
#if !defined(CURL_DISABLE_CRYPTO_AUTH)
#include <curl/curl.h>
#include "urldata.h"
#include "vauth/vauth.h"
#include "curl_hmac.h"
#include "curl_md5.h"
#include "warnless.h"
#include "curl_printf.h"
/* The last #include files should be: */
#include "curl_memory.h"
#include "memdebug.h"
/*
* Curl_auth_create_cram_md5_message()
*
2021-09-14 00:13:48 +02:00
* This is used to generate a CRAM-MD5 response message ready for sending to
* the recipient.
2016-09-11 17:22:32 +02:00
*
* Parameters:
*
* chlg [in] - The challenge.
* userp [in] - The user name.
2018-11-29 20:27:00 +01:00
* passwdp [in] - The user's password.
2021-09-14 00:13:48 +02:00
* out [out] - The result storage.
2016-09-11 17:22:32 +02:00
*
* Returns CURLE_OK on success.
*/
2021-09-14 00:13:48 +02:00
CURLcode Curl_auth_create_cram_md5_message(const struct bufref *chlg,
2016-09-11 17:22:32 +02:00
const char *userp,
const char *passwdp,
2021-09-14 00:13:48 +02:00
struct bufref *out)
2016-09-11 17:22:32 +02:00
{
2020-08-30 11:54:41 +02:00
struct HMAC_context *ctxt;
2016-09-11 17:22:32 +02:00
unsigned char digest[MD5_DIGEST_LEN];
char *response;
/* Compute the digest using the password as the key */
ctxt = Curl_HMAC_init(Curl_HMAC_MD5,
(const unsigned char *) passwdp,
curlx_uztoui(strlen(passwdp)));
if(!ctxt)
return CURLE_OUT_OF_MEMORY;
/* Update the digest with the given challenge */
2021-09-14 00:13:48 +02:00
if(Curl_bufref_len(chlg))
Curl_HMAC_update(ctxt, Curl_bufref_ptr(chlg),
curlx_uztoui(Curl_bufref_len(chlg)));
2016-09-11 17:22:32 +02:00
/* Finalise the digest */
Curl_HMAC_final(ctxt, digest);
/* Generate the response */
response = aprintf(
"%s %02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x",
userp, digest[0], digest[1], digest[2], digest[3], digest[4],
digest[5], digest[6], digest[7], digest[8], digest[9], digest[10],
digest[11], digest[12], digest[13], digest[14], digest[15]);
if(!response)
return CURLE_OUT_OF_MEMORY;
2021-09-14 00:13:48 +02:00
Curl_bufref_set(out, response, strlen(response), curl_free);
return CURLE_OK;
2016-09-11 17:22:32 +02:00
}
#endif /* !CURL_DISABLE_CRYPTO_AUTH */