blob: 7eaf60f1bbeeb03c28bd2071a89c1d9664ae1ef8 [file] [log] [blame] [edit]
/*
This file is part of libmicrohttpd
Copyright (C) 2010 Christian Grothoff (and other contributing authors)
Copyright (C) 2016-2024 Evgeny Grin (Karlson2k)
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with this library; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*/
/**
* @file digest_auth_example.c
* @brief minimal example for how to use digest auth with libmicrohttpd
* @author Amr Ali
* @author Karlson2k (Evgeny Grin)
*/
#include "platform.h"
#include <microhttpd.h>
#include <stdlib.h>
#include <stdio.h>
#include <errno.h>
#if defined(_WIN32) && ! defined(__CYGWIN__)
# include <wincrypt.h>
#endif /* _WIN32 && ! __CYGWIN__ */
#define PAGE \
"<html><head><title>libmicrohttpd demo</title></head>" \
"<body>Access granted</body></html>"
#define DENIED \
"<html><head><title>libmicrohttpd demo</title></head>" \
"<body>Access denied</body></html>"
#define MY_OPAQUE_STR "11733b200778ce33060f31c9af70a870ba96ddd4"
static enum MHD_Result
ahc_echo (void *cls,
struct MHD_Connection *connection,
const char *url,
const char *method,
const char *version,
const char *upload_data, size_t *upload_data_size, void **req_cls)
{
struct MHD_Response *response;
/* Only one user has access to the page */
static const char *username = "testuser";
static const char *password = "testpass";
static const char *realm = "[email protected]";
enum MHD_DigestAuthResult res_e;
enum MHD_Result ret;
static int already_called_marker;
(void) cls; /* Unused. Silent compiler warning. */
(void) url; /* Unused. Silent compiler warning. */
(void) method; /* Unused. Silent compiler warning. */
(void) version; /* Unused. Silent compiler warning. */
(void) upload_data; /* Unused. Silent compiler warning. */
(void) upload_data_size; /* Unused. Silent compiler warning. */
if (&already_called_marker != *req_cls)
{ /* Called for the first time, request not fully read yet */
*req_cls = &already_called_marker;
/* Wait for complete request */
return MHD_YES;
}
/* No need to call MHD_digest_auth_get_username3() as the only
* one user has an access. The username match is checked by
* MHD_digest_auth_check3() function. */
res_e = MHD_digest_auth_check3 (
connection,
realm,
username,
password,
0, 0,
MHD_DIGEST_AUTH_MULT_QOP_ANY_NON_INT,
MHD_DIGEST_AUTH_MULT_ALGO3_ANY_NON_SESSION);
if (res_e != MHD_DAUTH_OK)
{
response =
MHD_create_response_from_buffer_static (strlen (DENIED),
DENIED);
if (NULL == response)
return MHD_NO;
ret = MHD_queue_auth_required_response3 (
connection,
realm,
MY_OPAQUE_STR,
NULL,
response,
(res_e == MHD_DAUTH_NONCE_STALE) ? MHD_YES : MHD_NO,
MHD_DIGEST_AUTH_MULT_QOP_ANY_NON_INT,
MHD_DIGEST_AUTH_MULT_ALGO3_ANY_NON_SESSION,
MHD_NO,
MHD_YES);
MHD_destroy_response (response);
return ret;
}
response = MHD_create_response_from_buffer_static (strlen (PAGE), PAGE);
ret = MHD_queue_response (connection, MHD_HTTP_OK, response);
MHD_destroy_response (response);
return ret;
}
int
main (int argc, char *const *argv)
{
char rnd[8];
struct MHD_Daemon *d;
unsigned int port;
if ( (argc != 2) ||
(1 != sscanf (argv[1], "%u", &port)) ||
(65535 < port) )
{
fprintf (stderr, "%s PORT\n", argv[0]);
return 1;
}
if (1)
{
#if ! defined(_WIN32) || defined(__CYGWIN__)
int fd;
ssize_t len;
size_t off;
fd = open ("/dev/urandom", O_RDONLY);
if (-1 == fd)
{
fprintf (stderr, "Failed to open `%s': %s\n",
"/dev/urandom",
strerror (errno));
return 1;
}
for (off = 0; off < sizeof(rnd); off += (size_t) len)
{
len = read (fd, rnd, 8);
if (0 > len)
{
fprintf (stderr, "Failed to read `%s': %s\n",
"/dev/urandom",
strerror (errno));
(void) close (fd);
return 1;
}
}
(void) close (fd);
#else /* Native W32 */
HCRYPTPROV cc;
BOOL b;
b = CryptAcquireContext (&cc,
NULL,
NULL,
PROV_RSA_FULL,
CRYPT_VERIFYCONTEXT);
if (FALSE == b)
{
fprintf (stderr,
"Failed to acquire crypto provider context: %lu\n",
(unsigned long) GetLastError ());
return 1;
}
b = CryptGenRandom (cc, sizeof(rnd), (BYTE *) rnd);
if (FALSE == b)
{
fprintf (stderr,
"Failed to generate 8 random bytes: %lu\n",
GetLastError ());
}
CryptReleaseContext (cc, 0);
if (FALSE == b)
return 1;
#endif /* Native W32 */
}
d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION
| MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_ERROR_LOG,
(uint16_t) port,
NULL, NULL, &ahc_echo, NULL,
MHD_OPTION_DIGEST_AUTH_RANDOM, sizeof(rnd), rnd,
MHD_OPTION_NONCE_NC_SIZE, 300,
MHD_OPTION_CONNECTION_TIMEOUT, (unsigned int) 120,
MHD_OPTION_END);
if (d == NULL)
return 1;
(void) getc (stdin);
MHD_stop_daemon (d);
return 0;
}
/* end of digest_auth_example.c */