/*++ Copyright (c) 1998 Microsoft Corporation Module Name: digest.cxx Abstract: Parses http digest challenges and generates http digest authorization headers for digest sspi package. Author: Adriaan Canter (adriaanc) 01-Aug-1998 --*/ #include "include.hxx" // HTTP related defines #define HEADER_IDX 0 #define REALM_IDX 1 #define HOST_IDX 2 #define URL_IDX 3 #define METHOD_IDX 4 #define USER_IDX 5 #define PASS_IDX 6 #define NONCE_IDX 7 #define NC_IDX 8 #define HWND_IDX 9 #define NUM_BUFF 10 // POP related defines. #define POP_USER_IDX 1 #define POP_PASS_IDX 2 #define NUM_EXTENDED_POP_BUFFERS 3 // Used for generating response line. #define FLAG_QUOTE 0x1 #define FLAG_TERMINATE 0x2 //-------------------------------------------------------------------- // CDigest:: ToHex // // Routine Description: // // Convert binary data to ASCII hex representation // // Arguments: // // pSrc - binary data to convert // cSrc - length of binary data // pDst - buffer receiving ASCII representation of pSrc // //-------------------------------------------------------------------- VOID CDigest::ToHex(LPBYTE pSrc, UINT cSrc, LPSTR pDst) { UINT x; UINT y; // BUGBUG - character case issue ? #define TOHEX(a) ((a)>=10 ? 'a'+(a)-10 : '0'+(a)) for ( x = 0, y = 0 ; x < cSrc ; ++x ) { UINT v; v = pSrc[x]>>4; pDst[y++] = TOHEX( v ); v = pSrc[x]&0x0f; pDst[y++] = TOHEX( v ); } pDst[y] = '\0'; } //-------------------------------------------------------------------- // AddDigestHeader //-------------------------------------------------------------------- BOOL AddDigestHeader(LPSTR szHeader, LPDWORD pcbHeader, LPSTR szValue, LPSTR szData, DWORD cbAlloced, DWORD dwFlags) { DWORD cbValue, cbData, cbRequired; cbValue = strlen(szValue); cbData = strlen(szData); cbRequired = *pcbHeader + cbValue + cbData + sizeof('=') + 2 * sizeof('\"') + sizeof(", ") - 1; if (cbRequired > cbAlloced) return FALSE; memcpy(szHeader + *pcbHeader, szValue, cbValue); (*pcbHeader) += cbValue; memcpy(szHeader + *pcbHeader, "=", sizeof('=')); (*pcbHeader) += sizeof('='); if (dwFlags & FLAG_QUOTE) { memcpy(szHeader + *pcbHeader, "\"", sizeof('\"')); (*pcbHeader) += sizeof('\"'); } memcpy(szHeader + *pcbHeader, szData, cbData); (*pcbHeader) += cbData; if (dwFlags & FLAG_QUOTE) { memcpy(szHeader + *pcbHeader, "\"", sizeof('\"')); (*pcbHeader) += sizeof('\"'); } if (!(dwFlags & FLAG_TERMINATE)) { memcpy(szHeader + *pcbHeader, ", ", sizeof(", ")); (*pcbHeader) += (sizeof(", ") - 1); } else { *(szHeader + *pcbHeader) = '\0'; } return TRUE; } //-------------------------------------------------------------------- // CDigest::CDigest() //-------------------------------------------------------------------- CDigest::CDigest() {} //-------------------------------------------------------------------- // CDigest::MakeCNonce //-------------------------------------------------------------------- LPSTR CDigest::MakeCNonce() { DWORD dwRand; static DWORD dwCounter; LPSTR szCNonce; szCNonce = new CHAR[SIZE_MD5_DIGEST+1]; if (!szCNonce) { DIGEST_ASSERT(FALSE); return NULL; } dwRand = (GetTickCount() * rand()) + dwCounter++; MD5_CTX md5ctx; MD5Init (&md5ctx); MD5Update(&md5ctx, (LPBYTE) &dwRand, sizeof(DWORD)); MD5Final (&md5ctx); ToHex(md5ctx.digest, sizeof(md5ctx.digest), szCNonce); return szCNonce; } //-------------------------------------------------------------------- // CDigest::ParseChallenge //-------------------------------------------------------------------- DWORD CDigest::ParseChallenge(CSess * pSess, PSecBufferDesc pSecBufDesc, CParams **ppParams, DWORD fContextReq) { // SecBufferDesc looks like // // [ulversion][cbuffers][pbuffers] // | // -------------------------- // | // |--> [cbBuffer][buffertype][lpvoid][cbBuffer]... // DWORD cbQop, cbAlgo, dwError = ERROR_SUCCESS; CHAR *szQop, *szAlgo, *ptr; HWND *phWnd; LPDWORD pcNC; LPSTR szHeader, szRealm, szHost, szUrl, szMethod, szUser, szPass, szNonce; BOOL fPreAuth = FALSE, fCredsSupplied = FALSE; // Identify buffer components. // Legacy client. if (!pSess->fHTTP) { szHeader = (LPSTR) pSecBufDesc->pBuffers[HEADER_IDX].pvBuffer; szRealm = NULL; szHost = ""; szUrl = ""; szMethod = "AUTHENTICATE"; if (pSecBufDesc->cBuffers == NUM_EXTENDED_POP_BUFFERS) szUser = (LPSTR) pSecBufDesc->pBuffers[POP_USER_IDX].pvBuffer; else szUser = NULL; if (pSecBufDesc->cBuffers == NUM_EXTENDED_POP_BUFFERS) szPass = (LPSTR) pSecBufDesc->pBuffers [POP_PASS_IDX].pvBuffer; else szPass = NULL; szNonce = NULL; phWnd = NULL; } // Current client. Leave room for extra // param (pRequest). else if (pSess->fHTTP && (pSecBufDesc->cBuffers == NUM_BUFF || pSecBufDesc->cBuffers == NUM_BUFF+1)) { szHeader = (LPSTR) pSecBufDesc->pBuffers[HEADER_IDX].pvBuffer; szRealm = (LPSTR) pSecBufDesc->pBuffers [REALM_IDX].pvBuffer; szHost = (LPSTR) pSecBufDesc->pBuffers [HOST_IDX].pvBuffer; szUrl = (LPSTR) pSecBufDesc->pBuffers [URL_IDX].pvBuffer; szMethod = (LPSTR) pSecBufDesc->pBuffers[METHOD_IDX].pvBuffer; szUser = (LPSTR) pSecBufDesc->pBuffers [USER_IDX].pvBuffer; szPass = (LPSTR) pSecBufDesc->pBuffers [PASS_IDX].pvBuffer; szNonce = (LPSTR) pSecBufDesc->pBuffers [NONCE_IDX].pvBuffer; pcNC =(DWORD*) pSecBufDesc->pBuffers [ NC_IDX].pvBuffer; phWnd = (HWND*) pSecBufDesc->pBuffers [HWND_IDX].pvBuffer; } else { dwError = ERROR_INVALID_PARAMETER; goto exit; } // Validate parameters. dwError = ERROR_INVALID_PARAMETER; if (szHost && szUrl && szMethod) { // Auth or UI prompt to challenge for any user. if (szHeader && !szRealm && !szUser && !szPass && !szNonce) dwError = ERROR_SUCCESS; // Auth or UI prompt to challenge for particular user. else if (szHeader && !szRealm && szUser && !szPass && !szNonce) dwError = ERROR_SUCCESS; // Auth to challenge with creds supplied. else if (szHeader && !szRealm && szUser && szPass && !szNonce && (fContextReq & ISC_REQ_USE_SUPPLIED_CREDS)) { fCredsSupplied = TRUE; dwError = ERROR_SUCCESS; } // Preauth with realm supplied for any user. else if (!szHeader && szRealm && !szUser && !szPass && !szNonce) { fPreAuth = TRUE; dwError = ERROR_SUCCESS; } // Preauth with realm supplied for a particular user. else if (!szHeader && szRealm && szUser && !szPass && !szNonce) { fPreAuth = TRUE; dwError = ERROR_SUCCESS; } // Preauth with realm and creds supplied. else if (!szHeader && szRealm && szUser && szPass && szNonce && pcNC && (fContextReq & ISC_REQ_USE_SUPPLIED_CREDS)) { fPreAuth = TRUE; fCredsSupplied = TRUE; dwError = ERROR_SUCCESS; } } // Fail if buffers did not fall into one // of the acceptable formats. if (dwError != ERROR_SUCCESS) goto exit; // Construct the params object. *ppParams = new CParams(szHeader); if (!*ppParams) { DIGEST_ASSERT(FALSE); dwError = ERROR_NOT_ENOUGH_MEMORY; goto exit; } // Flag if this is preauth and/or if // credentials are supplied. (*ppParams)->SetPreAuth(fPreAuth); (*ppParams)->SetCredsSupplied(fCredsSupplied); // Only set algorithm if auth to challenge or UI prompting. if (!(*ppParams)->IsPreAuth()) { // Algorithm should be MD5 or MD5-sess, default to MD5 if not specified. if (!(*ppParams)->GetParam(CParams::ALGORITHM, &szAlgo, &cbAlgo)) { (*ppParams)->SetParam(CParams::ALGORITHM, "MD5", sizeof("MD5") - 1); (*ppParams)->SetMd5Sess(FALSE); } else if (szAlgo && !lstrcmpi(szAlgo, "Md5-sess")) { (*ppParams)->SetMd5Sess(TRUE); } else if (szAlgo && !lstrcmpi(szAlgo, "MD5")) { (*ppParams)->SetMd5Sess(FALSE); } else { // Not md5 or md5-sess // DIGEST_ASSERT(FALSE); dwError = ERROR_INVALID_PARAMETER; goto exit; } } // If this is an imap/pop client we require // md5-sess specified in the challenge. if (!pSess->fHTTP && !(*ppParams)->IsMd5Sess()) { DIGEST_ASSERT(FALSE); dwError = ERROR_INVALID_PARAMETER; goto exit; } // Always set host, url, method (required). User and pass optional. if (! (*ppParams)->SetParam(CParams::HOST, szHost, szHost ? strlen(szHost) : 0) || !(*ppParams)->SetParam(CParams::URL, szUrl, szUrl ? strlen(szUrl) : 0) || !(*ppParams)->SetParam(CParams::METHOD, szMethod, szMethod ? strlen(szMethod) : 0) || !(*ppParams)->SetParam(CParams::USER, szUser, szUser ? strlen(szUser) : 0) || !(*ppParams)->SetParam(CParams::PASS, szPass, szPass ? strlen(szPass) : 0)) { DIGEST_ASSERT(FALSE); dwError = ERROR_NOT_ENOUGH_MEMORY; goto exit; } // BUGBUG - do cleanup locally on failure. // If not preauthenticating we are authenticating in response // to a challenge or prompting for UI. if (!(*ppParams)->IsPreAuth()) { // Check to see that qop=auth is specified (*ppParams)->GetParam(CParams::QOP, &szQop, &cbQop); if (!(szQop && (*ppParams)->FindToken(szQop, cbQop+1, AUTH_SZ, AUTH_LEN, NULL))) { DIGEST_ASSERT(FALSE); dwError = ERROR_INVALID_PARAMETER; goto exit; } // Save off any hWnd for UI (only needed for challenges). if (fContextReq & ISC_REQ_PROMPT_FOR_CREDS) { (*ppParams)->SetHwnd(phWnd); } } // Otherwise we are attempting to preauthenticate. else { // Set the realm for preauth. if (!(*ppParams)->SetParam(CParams::REALM, szRealm, strlen(szRealm))) { DIGEST_ASSERT(FALSE); dwError = ERROR_INVALID_PARAMETER; goto exit; } // Also set the nonce if preauth + use supplied creds. if (fContextReq & ISC_REQ_USE_SUPPLIED_CREDS) { (*ppParams)->SetNC(pcNC); if (!(*ppParams)->SetParam(CParams::NONCE, szNonce, strlen(szNonce))) { DIGEST_ASSERT(FALSE); dwError = ERROR_INVALID_PARAMETER; goto exit; } } } exit: return dwError; } //-------------------------------------------------------------------- // CDigest::GenerateResponse //-------------------------------------------------------------------- DWORD CDigest::GenerateResponse(CSess *pSess, CParams *pParams, CCredInfo *pInfo, PSecBufferDesc pSecBufDesc) { // bugbug - psz's on these. LPSTR szBuf, szMethod, szUrl, szNonce, szCNonce, szCNonceSess, szOpaque; DWORD *pcbBuf, cbMethod, cbUrl, cbNonce, cbCNonce, cbCNonceSess, cbOpaque; DWORD dwError, cbAlloced; BOOL fSess = FALSE; szBuf = (LPSTR) pSecBufDesc->pBuffers[0].pvBuffer; pcbBuf = &(pSecBufDesc->pBuffers[0].cbBuffer); cbAlloced = *pcbBuf; *pcbBuf = 0; szCNonce = NULL; if (!cbAlloced) { // Modern clients better pass in // the size of the output buffer. if (pSess->fHTTP) { DIGEST_ASSERT(FALSE); dwError = ERROR_INVALID_PARAMETER; goto quit; } else // Legacy clients like OE don't, so // we allow up to 64k. cbAlloced = PACKAGE_MAXTOKEN; } CHAR szA1[SIZE_MD5_DIGEST + 1], szA2[SIZE_MD5_DIGEST + 1], szH [SIZE_MD5_DIGEST + 1]; MD5_CTX md5a1, md5a2, md5h; // Get method and request-uri. pParams->GetParam(CParams::METHOD, &szMethod, &cbMethod); if (pSess->fHTTP) pParams->GetParam(CParams::URL, &szUrl, &cbUrl); else { // request-uri is empty string for legacy clients. szUrl = ""; cbUrl = 0; } // Must have both method and request-uri. if (!szMethod || !szUrl) { DIGEST_ASSERT(FALSE); dwError = ERROR_INVALID_PARAMETER; goto quit; } // Opaque is optional. pParams->GetParam(CParams::_OPAQUE, &szOpaque, &cbOpaque); // Unless we are preauthenticating it is possible that // the credential does not have a nonce value if the // credential was established via ApplyControlToken. // In this case we use the nonce received in the challenge. if (pInfo->szNonce) { szNonce = pInfo->szNonce; cbNonce = strlen(szNonce); } else if (!pParams->GetParam(CParams::NONCE, &szNonce, &cbNonce)) { DIGEST_ASSERT(FALSE); dwError = ERROR_INVALID_PARAMETER; goto quit; } // Existance of a client nonce in the credential // implies md5-sess. Otherwise we need to create one. if (pInfo->szCNonce) { szCNonceSess = pInfo->szCNonce; cbCNonceSess = SIZE_MD5_DIGEST; if (pInfo->cCount == 1) szCNonce = pInfo->szCNonce; else szCNonce = MakeCNonce(); cbCNonce = SIZE_MD5_DIGEST; fSess = TRUE; } // No client nonce means we simply // generate one now. else { szCNonce = MakeCNonce(); cbCNonce = SIZE_MD5_DIGEST; szCNonceSess = NULL; cbCNonceSess = 0; fSess = FALSE; } // Encode nonce count. // BUGBUG - wsprintf returns strlen // and are any cruntime deps. CHAR szNC[16]; DWORD cbNC; wsprintf(szNC, "%08x", pInfo->cCount); cbNC = strlen(szNC); // 1) Md5(user:realm:pass) or // Md5(Md5(user:realm:pass):nonce:cnoncesess) MD5Init (&md5a1); MD5Update(&md5a1, (LPBYTE) pInfo->szUser, strlen(pInfo->szUser)); MD5Update(&md5a1, (LPBYTE) ":", 1); MD5Update(&md5a1, (LPBYTE) pInfo->szRealm, strlen(pInfo->szRealm)); MD5Update(&md5a1, (LPBYTE) ":", 1); MD5Update(&md5a1, (LPBYTE) pInfo->szPass, strlen(pInfo->szPass)); if (fSess) { // Md5(Md5(user:realm:pass):nonce:cnoncesess) MD5Final (&md5a1); ToHex(md5a1.digest, sizeof(md5a1.digest), szA1); MD5Init (&md5a1); MD5Update(&md5a1, (LPBYTE) szA1, SIZE_MD5_DIGEST); MD5Update(&md5a1, (LPBYTE) ":", 1); MD5Update(&md5a1, (LPBYTE) szNonce, cbNonce); MD5Update(&md5a1, (LPBYTE) ":", 1); MD5Update(&md5a1, (LPBYTE) szCNonceSess, cbCNonceSess); } MD5Final (&md5a1); ToHex(md5a1.digest, sizeof(md5a1.digest), szA1); // 2) Md5(method:url) MD5Init (&md5a2); MD5Update(&md5a2, (LPBYTE) szMethod, cbMethod); MD5Update(&md5a2, (LPBYTE) ":", 1); MD5Update(&md5a2, (LPBYTE) szUrl, cbUrl); MD5Final (&md5a2); ToHex(md5a2.digest, sizeof(md5a2.digest), szA2); // 3) Md5(A1:nonce:nc:cnonce:qop:A2) MD5Init (&md5h); MD5Update(&md5h, (LPBYTE) szA1, SIZE_MD5_DIGEST); MD5Update(&md5h, (LPBYTE) ":", 1); MD5Update(&md5h, (LPBYTE) szNonce, cbNonce); MD5Update(&md5h, (LPBYTE) ":", 1); MD5Update(&md5h, (LPBYTE) szNC, cbNC); MD5Update(&md5h, (LPBYTE) ":", 1); MD5Update(&md5h, (LPBYTE) szCNonce, cbCNonce); MD5Update(&md5h, (LPBYTE) ":", 1); MD5Update(&md5h, (LPBYTE) AUTH_SZ, AUTH_LEN); MD5Update(&md5h, (LPBYTE) ":", 1); MD5Update(&md5h, (LPBYTE) szA2, SIZE_MD5_DIGEST); MD5Final (&md5h); ToHex(md5h.digest, sizeof(md5h.digest), szH); // http digest. if (pSess->fHTTP) { if ( AddDigestHeader(szBuf, pcbBuf, "Digest username", pInfo->szUser, cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "realm", pInfo->szRealm, cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "qop", "auth", cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "algorithm", (pInfo->szCNonce ? "MD5-sess" : "MD5"), cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "uri", szUrl, cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "nonce", szNonce, cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "nc", szNC, cbAlloced, 0) && AddDigestHeader(szBuf, pcbBuf, "cnonce", szCNonce, cbAlloced, FLAG_QUOTE) && (!szOpaque || AddDigestHeader(szBuf, pcbBuf, "opaque", szOpaque, cbAlloced, FLAG_QUOTE)) && AddDigestHeader(szBuf, pcbBuf, "response", szH, cbAlloced, FLAG_QUOTE | FLAG_TERMINATE) ) { dwError = ERROR_SUCCESS; } else { dwError = ERROR_NOT_ENOUGH_MEMORY; *pcbBuf = 0; } } else { if ( AddDigestHeader(szBuf, pcbBuf, "Digest username", pInfo->szUser, cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "realm", pInfo->szRealm, cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "qop", "auth", cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "algorithm", (pInfo->szCNonce ? "MD5-sess" : "MD5"), cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "nonce", szNonce, cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "cnonce", szCNonce, cbAlloced, FLAG_QUOTE) && AddDigestHeader(szBuf, pcbBuf, "response", szH, cbAlloced, FLAG_QUOTE | FLAG_TERMINATE) ) { dwError = ERROR_SUCCESS; } else { dwError = ERROR_NOT_ENOUGH_MEMORY; *pcbBuf = 0; } } quit: if (szCNonce && szCNonce != pInfo->szCNonce) delete szCNonce; return dwError; }