32 int key_len,
char **dest,
int *dest_len)
34 if (!strncmp(key,
"realm=", key_len)) {
36 *dest_len =
sizeof(state->
realm);
41 int key_len,
char **dest,
int *dest_len)
45 if (!strncmp(key,
"realm=", key_len)) {
47 *dest_len =
sizeof(state->
realm);
48 }
else if (!strncmp(key,
"nonce=", key_len)) {
49 *dest = digest->
nonce;
50 *dest_len =
sizeof(digest->
nonce);
51 }
else if (!strncmp(key,
"opaque=", key_len)) {
53 *dest_len =
sizeof(digest->
opaque);
54 }
else if (!strncmp(key,
"algorithm=", key_len)) {
57 }
else if (!strncmp(key,
"qop=", key_len)) {
59 *dest_len =
sizeof(digest->
qop);
64 int key_len,
char **dest,
int *dest_len)
68 if (!strncmp(key,
"nextnonce=", key_len)) {
69 *dest = digest->
nonce;
70 *dest_len =
sizeof(digest->
nonce);
76 char *ptr = strstr(qop,
"auth");
77 char *end = ptr + strlen(
"auth");
79 if (ptr && (!*end || isspace(*end) || *end ==
',') &&
80 (ptr == qop || isspace(ptr[-1]) || ptr[-1] ==
',')) {
90 if (!strcmp(key,
"WWW-Authenticate") || !strcmp(key,
"Proxy-Authenticate")) {
108 }
else if (!strcmp(key,
"Authentication-Info")) {
119 va_start(vl, md5ctx);
121 const char* str = va_arg(vl,
const char*);
131 const char *password,
const char *uri,
136 uint32_t cnonce_buf[2];
140 char A1hash[33], A2hash[33], response[33];
141 struct AVMD5 *md5ctx;
146 snprintf(nc,
sizeof(nc),
"%08x", digest->
nc);
149 for (i = 0; i < 2; i++)
151 ff_data_to_hex(cnonce, (
const uint8_t*) cnonce_buf,
sizeof(cnonce_buf), 1);
152 cnonce[2*
sizeof(cnonce_buf)] = 0;
165 }
else if (!strcmp(digest->
algorithm,
"MD5-sess")) {
185 if (!strcmp(digest->
qop,
"auth") || !strcmp(digest->
qop,
"auth-int")) {
195 if (!strcmp(digest->
qop,
"") || !strcmp(digest->
qop,
"auth")) {
196 }
else if (!strcmp(digest->
qop,
"auth-int")) {
204 len = strlen(username) + strlen(state->
realm) + strlen(digest->
nonce) +
205 strlen(uri) + strlen(response) + strlen(digest->
algorithm) +
206 strlen(digest->
opaque) + strlen(digest->
qop) + strlen(cnonce) +
212 snprintf(authstr, len,
"Authorization: Digest ");
215 av_strlcatf(authstr, len,
"username=\"%s\"", username);
219 av_strlcatf(authstr, len,
",response=\"%s\"", response);
224 if (digest->
qop[0]) {
226 av_strlcatf(authstr, len,
",cnonce=\"%s\"", cnonce);
236 const char *path,
const char *method)
238 char *authstr =
NULL;
240 if (!auth || !strchr(auth,
':'))
245 int len = auth_b64_len + 30;
250 snprintf(authstr, len,
"Authorization: Basic ");
251 ptr = authstr + strlen(authstr);
253 av_strlcat(ptr,
"\r\n", len - (ptr - authstr));
255 char *username =
av_strdup(auth), *password;
260 if ((password = strchr(username,
':'))) {
char algorithm[10]
Server specified digest algorithm.
static int hash(int head, const int add)
Hash function adding character.
static void handle_basic_params(HTTPAuthState *state, const char *key, int key_len, char **dest, int *dest_len)
HTTP Authentication state structure.
int av_stristart(const char *str, const char *pfx, const char **ptr)
Return non-zero if pfx is a prefix of str independent of case.
char opaque[300]
A server-specified string that should be included in authentication responses, not included in the ac...
HTTP 1.0 Basic auth from RFC 1945 (also in RFC 2617)
static void choose_qop(char *qop, int size)
void av_md5_update(AVMD5 *ctx, const uint8_t *src, const int len)
void av_free(void *ptr)
Free a memory block which has been allocated with av_malloc(z)() or av_realloc(). ...
char * av_base64_encode(char *out, int out_size, const uint8_t *in, int in_size)
Encode data to base64 and null-terminate.
size_t av_strlcpy(char *dst, const char *src, size_t size)
Copy the string src to dst, but no more than size - 1 bytes, and null-terminate dst.
#define AV_BASE64_SIZE(x)
Calculate the output size needed to base64-encode x bytes.
static char * make_digest_auth(HTTPAuthState *state, const char *username, const char *password, const char *uri, const char *method)
static void handle_digest_params(HTTPAuthState *state, const char *key, int key_len, char **dest, int *dest_len)
char * av_strdup(const char *s)
Duplicate the string s.
char realm[200]
Authentication realm.
void av_md5_init(AVMD5 *ctx)
void * av_malloc(size_t size)
Allocate a block of size bytes with alignment suitable for all memory accesses (including vectors if ...
HTTP 1.1 Digest auth from RFC 2617.
char qop[30]
Quality of protection, containing the one that we've chosen to use, from the alternatives that the se...
size_t av_strlcatf(char *dst, size_t size, const char *fmt,...)
void av_md5_final(AVMD5 *ctx, uint8_t *dst)
char * ff_http_auth_create_response(HTTPAuthState *state, const char *auth, const char *path, const char *method)
size_t av_strlcat(char *dst, const char *src, size_t size)
Append the string src to the string dst, but to a total length of no more than size - 1 bytes...
void ff_http_auth_handle_header(HTTPAuthState *state, const char *key, const char *value)
static void handle_digest_update(HTTPAuthState *state, const char *key, int key_len, char **dest, int *dest_len)
char nonce[300]
Server specified nonce.
DigestParams digest_params
The parameters specifiec to digest authentication.
HTTPAuthType auth_type
The currently chosen auth type.
int nc
Nonce count, the number of earlier replies where this particular nonce has been used.
uint32_t av_get_random_seed(void)
Get random data.
static void update_md5_strings(struct AVMD5 *md5ctx,...)