43#include <openssl/hmac.h>
44#include <openssl/bio.h>
45#include <openssl/buffer.h>
46#include <openssl/err.h>
47#include <openssl/ssl.h>
48# include "sys/param.h"
58#if OPENSSL_VERSION_NUMBER < 0x10100000L
60 HMAC_CTX *ctx = (HMAC_CTX *)OPENSSL_malloc(
sizeof(HMAC_CTX));
61 if (ctx) HMAC_CTX_init(ctx);
67 HMAC_CTX_cleanup(ctx);
77int parseURL(
char *url,
char *host,
int &port,
char **path) {
83 char *p = strstr(url,
"//");
90 char *p2 = strchr(p,
'/');
96 int l = std::min((
int)(p2 - p), (
int)
sizeof (buf) - 1);
101 p = strchr(buf,
':');
103 int l = std::min((
int)(p - buf), (
int)
sizeof (buf) - 1);
104 strncpy(host, buf, l);
121void Tobase64(
const unsigned char *input,
int length,
char *out) {
129 b64 = BIO_new(BIO_f_base64());
131 bmem = BIO_new(BIO_s_mem());
133 BIO_write(b64, input, length);
135 if (BIO_flush(b64) <= 0) {
140 BIO_get_mem_ptr(b64, &bptr);
143 memcpy(out, bptr->data, bptr->length);
144 out[bptr->length] =
'\0';
159 if (c >=
'a' && c <=
'f') {
169bool Fromhexdigest(
const unsigned char *input,
int length,
unsigned char *out) {
170 for (
int idx=0; idx < length; idx += 2) {
173 if ((upper < 0) || (lower < 0)) {
176 out[idx/2] = (upper << 4) + lower;
185 sprintf(buf,
"%ld", i);
194 char *ptr = strchr((
char *)s, c);
197 return strchr((
char *)s,
'\0');
233#if OPENSSL_VERSION_NUMBER >= 0x30000000L
241 unsigned char mdbuf[EVP_MAX_MD_SIZE];
255 if (!fn || !secent) {
259#if OPENSSL_VERSION_NUMBER >= 0x30000000L
261 mac = EVP_MAC_fetch(0,
"sha256", 0);
262 ctx = EVP_MAC_CTX_new(mac);
269 EVP_MAC_init(ctx, (
const unsigned char *) key, strlen(key), 0);
273 EVP_MAC_update(ctx, (
const unsigned char *) fn,
276 EVP_MAC_update(ctx, (
const unsigned char *) &request,
280 EVP_MAC_update(ctx, (
const unsigned char *) secent->
name,
281 strlen(secent->
name) + 1);
284 EVP_MAC_update(ctx, (
const unsigned char *) secent->
vorg,
285 strlen(secent->
vorg) + 1);
288 EVP_MAC_update(ctx, (
const unsigned char *) secent->
host,
289 strlen(secent->
host) + 1);
292 EVP_MAC_update(ctx, (
const unsigned char *) secent->
moninfo,
295 localtime_r(&tim, &tms);
296 strftime(buf,
sizeof (buf),
"%s", &tms);
297 EVP_MAC_update(ctx, (
const unsigned char *) buf,
300 EVP_MAC_final(ctx, mdbuf, &len, EVP_MAX_MD_SIZE);
302 EVP_MAC_CTX_free(ctx);
315 HMAC_Init_ex(ctx, (
const void *) key, strlen(key), EVP_sha256(), 0);
319 HMAC_Update(ctx, (
const unsigned char *) fn,
322 HMAC_Update(ctx, (
const unsigned char *) &request,
326 HMAC_Update(ctx, (
const unsigned char *) secent->
name,
327 strlen(secent->
name) + 1);
330 HMAC_Update(ctx, (
const unsigned char *) secent->
vorg,
331 strlen(secent->
vorg) + 1);
334 HMAC_Update(ctx, (
const unsigned char *) secent->
host,
335 strlen(secent->
host) + 1);
338 HMAC_Update(ctx, (
const unsigned char *) secent->
moninfo,
341 localtime_r(&tim, &tms);
342 strftime(buf,
sizeof (buf),
"%s", &tms);
343 HMAC_Update(ctx, (
const unsigned char *) buf,
346 HMAC_Final(ctx, mdbuf, &len);
359 if (h1 == h2)
return 0;
364 return strcmp(h1, h2);
372 char *r = (
char *) malloc(l + 1);
376 for (i = 0; i < l; i++) {
382 char savec = str[i + 3];
385 r[j] = strtol(str + i + 1, 0, 16);
389 }
else r[j] = str[i];
404 char *r = (
char *) malloc(l*3 + 1);
408 for (i = 0; i < l; i++) {
413 strcpy(r + j,
"%20");
417 strcpy(r + j,
"%5B");
421 strcpy(r + j,
"%5D");
425 strcpy(r + j,
"%3A");
433 strcpy(r + j,
"%23");
437 strcpy(r + j,
"%0A");
441 strcpy(r + j,
"%0D");
445 strcpy(r + j,
"%3D");
463 char *r = (
char *) malloc(l*6 + 1);
467 for (i = 0; i < l; i++) {
472 strcpy(r + j,
""");
476 strcpy(r + j,
"&");
480 strcpy(r + j,
"<");
484 strcpy(r + j,
">");
488 strcpy(r + j,
"'");
585 case 100:
return "Continue";
586 case 101:
return "Switching Protocols";
587 case 102:
return "Processing";
588 case 103:
return "Early Hints";
591 case 200:
return "OK";
592 case 201:
return "Created";
593 case 202:
return "Accepted";
594 case 203:
return "Non-Authoritative Information";
595 case 204:
return "No Content";
596 case 205:
return "Reset Content";
597 case 206:
return "Partial Content";
598 case 207:
return "Multi-Status";
599 case 208:
return "Already Reported";
600 case 226:
return "IM Used";
603 case 300:
return "Multiple Choices";
604 case 301:
return "Moved Permanently";
605 case 302:
return "Found";
606 case 303:
return "See Other";
607 case 304:
return "Not Modified";
608 case 305:
return "Use Proxy";
609 case 307:
return "Temporary Redirect";
610 case 308:
return "Permanent Redirect";
613 case 400:
return "Bad Request";
614 case 401:
return "Unauthorized";
615 case 402:
return "Payment Required";
616 case 403:
return "Forbidden";
617 case 404:
return "Not Found";
618 case 405:
return "Method Not Allowed";
619 case 406:
return "Not Acceptable";
620 case 407:
return "Proxy Authentication Required";
621 case 408:
return "Request Timeout";
622 case 409:
return "Conflict";
623 case 410:
return "Gone";
624 case 411:
return "Length Required";
625 case 412:
return "Precondition Failed";
626 case 413:
return "Payload Too Large";
627 case 414:
return "URI Too Long";
628 case 415:
return "Unsupported Media Type";
629 case 416:
return "Range Not Satisfiable";
630 case 417:
return "Expectation Failed";
631 case 418:
return "I'm a teapot";
632 case 421:
return "Misdirected Request";
633 case 422:
return "Unprocessable Entity";
634 case 423:
return "Locked";
635 case 424:
return "Failed Dependency";
636 case 425:
return "Too Early";
637 case 426:
return "Upgrade Required";
638 case 428:
return "Precondition Required";
639 case 429:
return "Too Many Requests";
640 case 431:
return "Request Header Fields Too Large";
641 case 451:
return "Unavailable For Legal Reasons";
644 case 500:
return "Internal Server Error";
645 case 501:
return "Not Implemented";
646 case 502:
return "Bad Gateway";
647 case 503:
return "Service Unavailable";
648 case 504:
return "Gateway Timeout";
649 case 505:
return "HTTP Version Not Supported";
650 case 506:
return "Variant Also Negotiates";
651 case 507:
return "Insufficient Storage";
652 case 508:
return "Loop Detected";
653 case 510:
return "Not Extended";
654 case 511:
return "Network Authentication Required";
658 case 100 ... 199:
return "Informational";
659 case 200 ... 299:
return "Success";
660 case 300 ... 399:
return "Redirection";
661 case 400 ... 499:
return "Client Error";
662 case 500 ... 599:
return "Server Error";
663 default:
return "Unknown";
void BIO_set_flags(BIO *bio, int flags)
int parseURL(char *url, char *host, int &port, char **path)
void Tobase64(const unsigned char *input, int length, char *out)
int compareHash(const char *h1, const char *h2)
static HMAC_CTX * HMAC_CTX_new()
bool Fromhexdigest(const unsigned char *input, int length, unsigned char *out)
char * unquote(char *str)
int mapXrdErrToHttp(XErrorCode xrdError)
char * quote(const char *str)
char * escapeXML(const char *str)
static int char_to_int(int c)
int mapErrNoToHttp(int errNo)
char * mystrchrnul(const char *s, int c)
static void HMAC_CTX_free(HMAC_CTX *ctx)
void calcHashes(char *hash, const char *fn, kXR_int16 request, XrdSecEntity *secent, time_t tim, const char *key)
std::string httpStatusToString(int status)
Utility functions for XrdHTTP.
@ HTTP_INSUFFICIENT_STORAGE
@ HTTP_SERVICE_UNAVAILABLE
@ HTTP_INTERNAL_SERVER_ERROR
@ HTTP_UNPROCESSABLE_ENTITY
static int toErrno(int xerr)
char * vorg
Entity's virtual organization(s)
char * name
Entity's name.
char * moninfo
Information for monitoring.
char * host
Entity's host name dnr dependent.