summaryrefslogtreecommitdiffstats
path: root/tinyHTTP/ragel/thttp_parser_header_WWW_Authenticate.rl
diff options
context:
space:
mode:
Diffstat (limited to 'tinyHTTP/ragel/thttp_parser_header_WWW_Authenticate.rl')
-rw-r--r--tinyHTTP/ragel/thttp_parser_header_WWW_Authenticate.rl259
1 files changed, 259 insertions, 0 deletions
diff --git a/tinyHTTP/ragel/thttp_parser_header_WWW_Authenticate.rl b/tinyHTTP/ragel/thttp_parser_header_WWW_Authenticate.rl
new file mode 100644
index 0000000..ef1ce64
--- /dev/null
+++ b/tinyHTTP/ragel/thttp_parser_header_WWW_Authenticate.rl
@@ -0,0 +1,259 @@
+/*
+* Copyright (C) 2009-2010 Mamadou Diop.
+*
+* Contact: Mamadou Diop <diopmamadou(at)doubango.org>
+*
+* This file is part of Open Source Doubango Framework.
+*
+* DOUBANGO is free software: you can redistribute it and/or modify
+* it under the terms of the GNU General Public License as published by
+* the Free Software Foundation, either version 3 of the License, or
+* (at your option) any later version.
+*
+* DOUBANGO is distributed in the hope that it will be useful,
+* but WITHOUT ANY WARRANTY; without even the implied warranty of
+* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+* GNU General Public License for more details.
+*
+* You should have received a copy of the GNU General Public License
+* along with DOUBANGO.
+*
+*/
+
+/**@file thttp_header_WWW_Authenticate.c
+ * @brief HTTP WWW-Authenticate header.
+ *
+ * @author Mamadou Diop <diopmamadou(at)doubango.org>
+ *
+ * @date Created: Sat Nov 8 16:54:58 2009 mdiop
+ */
+#include "tinyhttp/headers/thttp_header_WWW_Authenticate.h"
+
+#include "tinyhttp/parsers/thttp_parser_url.h"
+
+#include "tsk_debug.h"
+#include "tsk_memory.h"
+#include "tsk_time.h"
+
+#include <string.h>
+
+// Check if we have ",CRLF" ==> See WWW-Authenticate header
+// As :>CRLF is preceded by any+ ==> p will be at least (start + 1)
+// p point to CR
+#define prev_not_comma(p) !(p && p[-1] == ',')
+
+/***********************************
+* Ragel state machine.
+*/
+%%{
+ machine thttp_machine_parser_header_WWW_Authenticate;
+
+ # Includes
+ include thttp_machine_utils "./ragel/thttp_machine_utils.rl";
+
+ action tag{
+ tag_start = p;
+ }
+
+ action is_digest{
+ hdr_WWW_Authenticate->scheme = tsk_strdup("Digest");
+ }
+
+ action is_basic{
+ hdr_WWW_Authenticate->scheme = tsk_strdup("Basic");
+ }
+
+ action is_auth{
+ THTTP_HEADER(hdr_WWW_Authenticate)->type = thttp_htype_WWW_Authenticate;
+ }
+
+ action is_proxy{
+ THTTP_HEADER(hdr_WWW_Authenticate)->type = thttp_htype_Proxy_Authenticate;
+ }
+
+ action parse_realm{
+ TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->realm);
+ tsk_strunquote(&hdr_WWW_Authenticate->realm);
+ }
+
+ action parse_domain{
+ TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->domain);
+ //tsk_strunquote(&hdr_WWW_Authenticate->domain);
+ }
+
+ action parse_nonce{
+ TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->nonce);
+ tsk_strunquote(&hdr_WWW_Authenticate->nonce);
+ }
+
+ action parse_opaque{
+ TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->opaque);
+ tsk_strunquote(&hdr_WWW_Authenticate->opaque);
+ }
+
+ action parse_stale{
+ hdr_WWW_Authenticate->stale = tsk_strniequals(tag_start, "true", 4);
+ }
+
+ action parse_algorithm{
+ TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->algorithm);
+ }
+
+ action parse_qop{
+ TSK_PARSER_SET_STRING(hdr_WWW_Authenticate->qop);
+ //tsk_strunquote(&hdr_WWW_Authenticate->qop);
+ }
+
+ action parse_param{
+ TSK_PARSER_ADD_PARAM(THTTP_HEADER_PARAMS(hdr_WWW_Authenticate));
+ }
+
+ action prev_not_comma{
+ prev_not_comma(p)
+ }
+
+ action eob{
+ }
+
+ #FIXME: Only Digest (MD5, AKAv1-MD5 and AKAv2-MD5) is supported
+ other_challenge = (any+);
+ auth_param = generic_param>tag %parse_param;
+
+ realm = "realm"i EQUAL quoted_string>tag %parse_realm;
+ domain = "domain"i EQUAL LDQUOT <: (any*)>tag %parse_domain :> RDQUOT;
+ nonce = "nonce"i EQUAL quoted_string>tag %parse_nonce;
+ opaque = "opaque"i EQUAL quoted_string>tag %parse_opaque;
+ stale = "stale"i EQUAL ( "true"i | "false"i )>tag %parse_stale;
+ algorithm = "algorithm"i EQUAL <:token>tag %parse_algorithm;
+ qop_options = "qop"i EQUAL LDQUOT <: (any*)>tag %parse_qop :> RDQUOT;
+
+ digest_cln = (realm | domain | nonce | opaque | stale | algorithm | qop_options)@1 | auth_param@0;
+ challenge = ( ("Digest"i%is_digest | "Basic"i%is_basic) LWS digest_cln ( (COMMA | CRLF) <:digest_cln )* ) | other_challenge;
+ WWW_Authenticate = ("WWW-Authenticate"i>is_auth | "Proxy-Authenticate"i>is_proxy) HCOLON challenge;
+
+ # Entry point
+ main := WWW_Authenticate CRLF @eob;
+
+}%%
+
+thttp_header_WWW_Authenticate_t* thttp_header_www_authenticate_create()
+{
+ return tsk_object_new(thttp_header_WWW_Authenticate_def_t);
+}
+
+int thttp_header_WWW_Authenticate_tostring(const thttp_header_t* header, tsk_buffer_t* output)
+{
+ if(header){
+ const thttp_header_WWW_Authenticate_t *WWW_Authenticate = (const thttp_header_WWW_Authenticate_t*)header;
+ if(WWW_Authenticate && WWW_Authenticate->scheme){
+ return tsk_buffer_append_2(output, "%s realm=\"%s\"%s%s%s%s%s%s%s%s%s%s%s%s,stale=%s%s%s",
+ WWW_Authenticate->scheme,
+ WWW_Authenticate->realm ? WWW_Authenticate->realm : "",
+
+ WWW_Authenticate->domain ? ",domain=\"" : "",
+ WWW_Authenticate->domain ? WWW_Authenticate->domain : "",
+ WWW_Authenticate->domain ? "\"" : "",
+
+
+ WWW_Authenticate->qop ? ",qop=\"" : "",
+ WWW_Authenticate->qop ? WWW_Authenticate->qop : "",
+ WWW_Authenticate->qop ? "\"" : "",
+
+
+ WWW_Authenticate->nonce ? ",nonce=\"" : "",
+ WWW_Authenticate->nonce ? WWW_Authenticate->nonce : "",
+ WWW_Authenticate->nonce ? "\"" : "",
+
+ WWW_Authenticate->opaque ? ",opaque=\"" : "",
+ WWW_Authenticate->opaque ? WWW_Authenticate->opaque : "",
+ WWW_Authenticate->opaque ? "\"" : "",
+
+ WWW_Authenticate->stale ? "TRUE" : "FALSE",
+
+ WWW_Authenticate->algorithm ? ",algorithm=" : "",
+ WWW_Authenticate->algorithm ? WWW_Authenticate->algorithm : ""
+ );
+ }
+ }
+ return -1;
+}
+
+/**@ingroup thttp_header_group
+*/
+thttp_header_WWW_Authenticate_t *thttp_header_WWW_Authenticate_parse(const char *data, tsk_size_t size)
+{
+ int cs = 0;
+ const char *p = data;
+ const char *pe = p + size;
+ const char *eof = pe;
+ thttp_header_WWW_Authenticate_t *hdr_WWW_Authenticate = thttp_header_www_authenticate_create();
+
+ const char *tag_start;
+
+ %%write data;
+ %%write init;
+ %%write exec;
+
+ if( cs < %%{ write first_final; }%% ){
+ TSK_DEBUG_ERROR("Failed to parse WWW-Authenticate header.");
+ TSK_OBJECT_SAFE_FREE(hdr_WWW_Authenticate);
+ }
+
+ return hdr_WWW_Authenticate;
+}
+
+thttp_header_Proxy_Authenticate_t *thttp_header_Proxy_Authenticate_parse(const char *data, tsk_size_t size)
+{
+ return thttp_header_WWW_Authenticate_parse(data, size);
+}
+
+
+
+
+
+//========================================================
+// WWW_Authenticate header object definition
+//
+
+static tsk_object_t* thttp_header_WWW_Authenticate_ctor(tsk_object_t *self, va_list * app)
+{
+ thttp_header_WWW_Authenticate_t *WWW_Authenticate = self;
+ if(WWW_Authenticate){
+ THTTP_HEADER(WWW_Authenticate)->type = thttp_htype_WWW_Authenticate;
+ THTTP_HEADER(WWW_Authenticate)->tostring = thttp_header_WWW_Authenticate_tostring;
+ }
+ else{
+ TSK_DEBUG_ERROR("Failed to create new WWW_Authenticate header.");
+ }
+ return self;
+}
+
+static tsk_object_t* thttp_header_WWW_Authenticate_dtor(tsk_object_t *self)
+{
+ thttp_header_WWW_Authenticate_t *WWW_Authenticate = self;
+ if(WWW_Authenticate){
+ TSK_FREE(WWW_Authenticate->scheme);
+ TSK_FREE(WWW_Authenticate->realm);
+ TSK_FREE(WWW_Authenticate->domain);
+ TSK_FREE(WWW_Authenticate->nonce);
+ TSK_FREE(WWW_Authenticate->opaque);
+ TSK_FREE(WWW_Authenticate->algorithm);
+ TSK_FREE(WWW_Authenticate->qop);
+
+ TSK_OBJECT_SAFE_FREE(THTTP_HEADER_PARAMS(WWW_Authenticate));
+ }
+ else{
+ TSK_DEBUG_ERROR("Null WWW_Authenticate header.");
+ }
+
+ return self;
+}
+
+static const tsk_object_def_t thttp_header_WWW_Authenticate_def_s =
+{
+ sizeof(thttp_header_WWW_Authenticate_t),
+ thttp_header_WWW_Authenticate_ctor,
+ thttp_header_WWW_Authenticate_dtor,
+ tsk_null
+};
+const tsk_object_def_t *thttp_header_WWW_Authenticate_def_t = &thttp_header_WWW_Authenticate_def_s;
OpenPOWER on IntegriCloud