1 | /***************************************************************************\ |
---|
2 | * * |
---|
3 | * BitlBee - An IRC to IM gateway * |
---|
4 | * Simple OAuth client (consumer) implementation. * |
---|
5 | * * |
---|
6 | * Copyright 2010 Wilmer van der Gaast <wilmer@gaast.net> * |
---|
7 | * * |
---|
8 | * This library is free software; you can redistribute it and/or * |
---|
9 | * modify it under the terms of the GNU Lesser General Public * |
---|
10 | * License as published by the Free Software Foundation, version * |
---|
11 | * 2.1. * |
---|
12 | * * |
---|
13 | * This library is distributed in the hope that it will be useful, * |
---|
14 | * but WITHOUT ANY WARRANTY; without even the implied warranty of * |
---|
15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * |
---|
16 | * Lesser General Public License for more details. * |
---|
17 | * * |
---|
18 | * You should have received a copy of the GNU Lesser General Public License * |
---|
19 | * along with this library; if not, write to the Free Software Foundation, * |
---|
20 | * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA * |
---|
21 | * * |
---|
22 | \***************************************************************************/ |
---|
23 | |
---|
24 | #include <glib.h> |
---|
25 | #include <gmodule.h> |
---|
26 | #include <stdlib.h> |
---|
27 | #include <string.h> |
---|
28 | #include "http_client.h" |
---|
29 | #include "base64.h" |
---|
30 | #include "misc.h" |
---|
31 | #include "sha1.h" |
---|
32 | #include "url.h" |
---|
33 | #include "oauth.h" |
---|
34 | |
---|
35 | #define CONSUMER_KEY "xsDNKJuNZYkZyMcu914uEA" |
---|
36 | #define CONSUMER_SECRET "FCxqcr0pXKzsF9ajmP57S3VQ8V6Drk4o2QYtqMcOszo" |
---|
37 | /* How can it be a secret if it's right here in the source code? No clue... */ |
---|
38 | |
---|
39 | #define HMAC_BLOCK_SIZE 64 |
---|
40 | |
---|
41 | static char *oauth_sign( const char *method, const char *url, |
---|
42 | const char *params, const char *token_secret ) |
---|
43 | { |
---|
44 | sha1_state_t sha1; |
---|
45 | uint8_t hash[sha1_hash_size]; |
---|
46 | uint8_t key[HMAC_BLOCK_SIZE+1]; |
---|
47 | char *s; |
---|
48 | int i; |
---|
49 | |
---|
50 | /* Create K. If our current key is >64 chars we have to hash it, |
---|
51 | otherwise just pad. */ |
---|
52 | memset( key, 0, HMAC_BLOCK_SIZE ); |
---|
53 | i = strlen( CONSUMER_SECRET ) + 1 + ( token_secret ? strlen( token_secret ) : 0 ); |
---|
54 | if( i > HMAC_BLOCK_SIZE ) |
---|
55 | { |
---|
56 | sha1_init( &sha1 ); |
---|
57 | sha1_append( &sha1, (uint8_t*) CONSUMER_SECRET, strlen( CONSUMER_SECRET ) ); |
---|
58 | sha1_append( &sha1, (uint8_t*) "&", 1 ); |
---|
59 | if( token_secret ) |
---|
60 | sha1_append( &sha1, (uint8_t*) token_secret, strlen( token_secret ) ); |
---|
61 | sha1_finish( &sha1, key ); |
---|
62 | } |
---|
63 | else |
---|
64 | { |
---|
65 | g_snprintf( (gchar*) key, HMAC_BLOCK_SIZE + 1, "%s&%s", |
---|
66 | CONSUMER_SECRET, token_secret ? : "" ); |
---|
67 | } |
---|
68 | |
---|
69 | /* Inner part: H(K XOR 0x36, text) */ |
---|
70 | sha1_init( &sha1 ); |
---|
71 | |
---|
72 | for( i = 0; i < HMAC_BLOCK_SIZE; i ++ ) |
---|
73 | key[i] ^= 0x36; |
---|
74 | sha1_append( &sha1, key, HMAC_BLOCK_SIZE ); |
---|
75 | |
---|
76 | /* OAuth: text = method&url¶ms, all http_encoded. */ |
---|
77 | sha1_append( &sha1, (const uint8_t*) method, strlen( method ) ); |
---|
78 | sha1_append( &sha1, (const uint8_t*) "&", 1 ); |
---|
79 | |
---|
80 | s = g_new0( char, strlen( url ) * 3 + 1 ); |
---|
81 | strcpy( s, url ); |
---|
82 | http_encode( s ); |
---|
83 | sha1_append( &sha1, (const uint8_t*) s, strlen( s ) ); |
---|
84 | sha1_append( &sha1, (const uint8_t*) "&", 1 ); |
---|
85 | g_free( s ); |
---|
86 | |
---|
87 | s = g_new0( char, strlen( params ) * 3 + 1 ); |
---|
88 | strcpy( s, params ); |
---|
89 | http_encode( s ); |
---|
90 | sha1_append( &sha1, (const uint8_t*) s, strlen( s ) ); |
---|
91 | g_free( s ); |
---|
92 | |
---|
93 | sha1_finish( &sha1, hash ); |
---|
94 | |
---|
95 | /* Final result: H(K XOR 0x5C, inner stuff) */ |
---|
96 | sha1_init( &sha1 ); |
---|
97 | for( i = 0; i < HMAC_BLOCK_SIZE; i ++ ) |
---|
98 | key[i] ^= 0x36 ^ 0x5c; |
---|
99 | sha1_append( &sha1, key, HMAC_BLOCK_SIZE ); |
---|
100 | sha1_append( &sha1, hash, sha1_hash_size ); |
---|
101 | sha1_finish( &sha1, hash ); |
---|
102 | |
---|
103 | /* base64_encode + HTTP escape it (both consumers |
---|
104 | need it that away) and we're done. */ |
---|
105 | s = base64_encode( hash, sha1_hash_size ); |
---|
106 | s = g_realloc( s, strlen( s ) * 3 + 1 ); |
---|
107 | http_encode( s ); |
---|
108 | |
---|
109 | return s; |
---|
110 | } |
---|
111 | |
---|
112 | static char *oauth_nonce() |
---|
113 | { |
---|
114 | unsigned char bytes[9]; |
---|
115 | |
---|
116 | random_bytes( bytes, sizeof( bytes ) ); |
---|
117 | return base64_encode( bytes, sizeof( bytes ) ); |
---|
118 | } |
---|
119 | |
---|
120 | void oauth_params_add( GSList **params, const char *key, const char *value ) |
---|
121 | { |
---|
122 | char *item; |
---|
123 | |
---|
124 | item = g_strdup_printf( "%s=%s", key, value ); |
---|
125 | *params = g_slist_insert_sorted( *params, item, (GCompareFunc) strcmp ); |
---|
126 | } |
---|
127 | |
---|
128 | void oauth_params_del( GSList **params, const char *key ) |
---|
129 | { |
---|
130 | int key_len = strlen( key ); |
---|
131 | GSList *l, *n; |
---|
132 | |
---|
133 | for( l = *params; l; l = n ) |
---|
134 | { |
---|
135 | n = l->next; |
---|
136 | |
---|
137 | if( strncmp( (char*) l->data, key, key_len ) == 0 && |
---|
138 | ((char*)l->data)[key_len] == '=' ) |
---|
139 | { |
---|
140 | g_free( l->data ); |
---|
141 | *params = g_slist_remove( *params, l->data ); |
---|
142 | } |
---|
143 | } |
---|
144 | } |
---|
145 | |
---|
146 | void oauth_params_set( GSList **params, const char *key, const char *value ) |
---|
147 | { |
---|
148 | oauth_params_del( params, key ); |
---|
149 | oauth_params_add( params, key, value ); |
---|
150 | } |
---|
151 | |
---|
152 | const char *oauth_params_get( GSList **params, const char *key ) |
---|
153 | { |
---|
154 | int key_len = strlen( key ); |
---|
155 | GSList *l; |
---|
156 | |
---|
157 | for( l = *params; l; l = l->next ) |
---|
158 | { |
---|
159 | if( strncmp( (char*) l->data, key, key_len ) == 0 && |
---|
160 | ((char*)l->data)[key_len] == '=' ) |
---|
161 | return (const char*) l->data + key_len + 1; |
---|
162 | } |
---|
163 | |
---|
164 | return NULL; |
---|
165 | } |
---|
166 | |
---|
167 | static void oauth_params_parse( GSList **params, char *in ) |
---|
168 | { |
---|
169 | char *amp, *eq, *s; |
---|
170 | |
---|
171 | while( in && *in ) |
---|
172 | { |
---|
173 | eq = strchr( in, '=' ); |
---|
174 | if( !eq ) |
---|
175 | break; |
---|
176 | |
---|
177 | *eq = '\0'; |
---|
178 | if( ( amp = strchr( eq + 1, '&' ) ) ) |
---|
179 | *amp = '\0'; |
---|
180 | |
---|
181 | s = g_strdup( eq + 1 ); |
---|
182 | http_decode( s ); |
---|
183 | oauth_params_add( params, in, s ); |
---|
184 | g_free( s ); |
---|
185 | |
---|
186 | *eq = '='; |
---|
187 | if( amp == NULL ) |
---|
188 | break; |
---|
189 | |
---|
190 | *amp = '&'; |
---|
191 | in = amp + 1; |
---|
192 | } |
---|
193 | } |
---|
194 | |
---|
195 | void oauth_params_free( GSList **params ) |
---|
196 | { |
---|
197 | while( params && *params ) |
---|
198 | { |
---|
199 | g_free( (*params)->data ); |
---|
200 | *params = g_slist_remove( *params, (*params)->data ); |
---|
201 | } |
---|
202 | } |
---|
203 | |
---|
204 | char *oauth_params_string( GSList *params ) |
---|
205 | { |
---|
206 | GSList *l; |
---|
207 | GString *str = g_string_new( "" ); |
---|
208 | |
---|
209 | for( l = params; l; l = l->next ) |
---|
210 | { |
---|
211 | char *s, *eq; |
---|
212 | |
---|
213 | s = g_malloc( strlen( l->data ) * 3 + 1 ); |
---|
214 | strcpy( s, l->data ); |
---|
215 | if( ( eq = strchr( s, '=' ) ) ) |
---|
216 | http_encode( eq + 1 ); |
---|
217 | g_string_append( str, s ); |
---|
218 | g_free( s ); |
---|
219 | |
---|
220 | if( l->next ) |
---|
221 | g_string_append_c( str, '&' ); |
---|
222 | } |
---|
223 | |
---|
224 | return g_string_free( str, FALSE ); |
---|
225 | } |
---|
226 | |
---|
227 | void oauth_info_free( struct oauth_info *info ) |
---|
228 | { |
---|
229 | if( info ) |
---|
230 | { |
---|
231 | g_free( info->auth_params ); |
---|
232 | g_free( info->request_token ); |
---|
233 | g_free( info->access_token ); |
---|
234 | g_free( info ); |
---|
235 | } |
---|
236 | } |
---|
237 | |
---|
238 | static void oauth_add_default_params( GSList **params ) |
---|
239 | { |
---|
240 | char *s; |
---|
241 | |
---|
242 | oauth_params_set( params, "oauth_consumer_key", CONSUMER_KEY ); |
---|
243 | oauth_params_set( params, "oauth_signature_method", "HMAC-SHA1" ); |
---|
244 | |
---|
245 | s = g_strdup_printf( "%d", (int) time( NULL ) ); |
---|
246 | oauth_params_set( params, "oauth_timestamp", s ); |
---|
247 | g_free( s ); |
---|
248 | |
---|
249 | s = oauth_nonce(); |
---|
250 | oauth_params_set( params, "oauth_nonce", s ); |
---|
251 | g_free( s ); |
---|
252 | |
---|
253 | oauth_params_set( params, "oauth_version", "1.0" ); |
---|
254 | } |
---|
255 | |
---|
256 | static void *oauth_post_request( const char *url, GSList **params_, http_input_function func, void *data ) |
---|
257 | { |
---|
258 | GSList *params = NULL; |
---|
259 | char *s, *params_s, *post; |
---|
260 | void *req; |
---|
261 | url_t url_p; |
---|
262 | |
---|
263 | if( !url_set( &url_p, url ) ) |
---|
264 | { |
---|
265 | oauth_params_free( params_ ); |
---|
266 | return NULL; |
---|
267 | } |
---|
268 | |
---|
269 | if( params_ ) |
---|
270 | params = *params_; |
---|
271 | |
---|
272 | oauth_add_default_params( ¶ms ); |
---|
273 | |
---|
274 | params_s = oauth_params_string( params ); |
---|
275 | oauth_params_free( ¶ms ); |
---|
276 | |
---|
277 | s = oauth_sign( "POST", url, params_s, NULL ); |
---|
278 | post = g_strdup_printf( "%s&oauth_signature=%s", params_s, s ); |
---|
279 | g_free( params_s ); |
---|
280 | g_free( s ); |
---|
281 | |
---|
282 | s = g_strdup_printf( "POST %s HTTP/1.0\r\n" |
---|
283 | "Host: %s\r\n" |
---|
284 | "Content-Type: application/x-www-form-urlencoded\r\n" |
---|
285 | "Content-Length: %zd\r\n" |
---|
286 | "\r\n" |
---|
287 | "%s", url_p.file, url_p.host, strlen( post ), post ); |
---|
288 | g_free( post ); |
---|
289 | |
---|
290 | req = http_dorequest( url_p.host, url_p.port, url_p.proto == PROTO_HTTPS, |
---|
291 | s, func, data ); |
---|
292 | g_free( s ); |
---|
293 | |
---|
294 | return req; |
---|
295 | } |
---|
296 | |
---|
297 | static void oauth_request_token_done( struct http_request *req ); |
---|
298 | |
---|
299 | struct oauth_info *oauth_request_token( const char *url, oauth_cb func, void *data ) |
---|
300 | { |
---|
301 | struct oauth_info *st = g_new0( struct oauth_info, 1 ); |
---|
302 | GSList *params = NULL; |
---|
303 | |
---|
304 | st->func = func; |
---|
305 | st->data = data; |
---|
306 | |
---|
307 | oauth_params_add( ¶ms, "oauth_callback", "oob" ); |
---|
308 | |
---|
309 | if( !oauth_post_request( url, ¶ms, oauth_request_token_done, st ) ) |
---|
310 | { |
---|
311 | oauth_info_free( st ); |
---|
312 | return NULL; |
---|
313 | } |
---|
314 | |
---|
315 | return st; |
---|
316 | } |
---|
317 | |
---|
318 | static void oauth_request_token_done( struct http_request *req ) |
---|
319 | { |
---|
320 | struct oauth_info *st = req->data; |
---|
321 | |
---|
322 | st->http = req; |
---|
323 | |
---|
324 | if( req->status_code == 200 ) |
---|
325 | { |
---|
326 | GSList *params = NULL; |
---|
327 | |
---|
328 | st->auth_params = g_strdup( req->reply_body ); |
---|
329 | oauth_params_parse( ¶ms, st->auth_params ); |
---|
330 | st->request_token = g_strdup( oauth_params_get( ¶ms, "oauth_token" ) ); |
---|
331 | oauth_params_free( ¶ms ); |
---|
332 | } |
---|
333 | |
---|
334 | st->stage = OAUTH_REQUEST_TOKEN; |
---|
335 | if( !st->func( st ) ) |
---|
336 | oauth_info_free( st ); |
---|
337 | } |
---|
338 | |
---|
339 | static void oauth_access_token_done( struct http_request *req ); |
---|
340 | |
---|
341 | void oauth_access_token( const char *url, const char *pin, struct oauth_info *st ) |
---|
342 | { |
---|
343 | GSList *params = NULL; |
---|
344 | |
---|
345 | oauth_params_add( ¶ms, "oauth_token", st->request_token ); |
---|
346 | oauth_params_add( ¶ms, "oauth_verifier", pin ); |
---|
347 | |
---|
348 | if( !oauth_post_request( url, ¶ms, oauth_access_token_done, st ) ) |
---|
349 | oauth_info_free( st ); |
---|
350 | } |
---|
351 | |
---|
352 | static void oauth_access_token_done( struct http_request *req ) |
---|
353 | { |
---|
354 | struct oauth_info *st = req->data; |
---|
355 | |
---|
356 | st->http = req; |
---|
357 | |
---|
358 | if( req->status_code == 200 ) |
---|
359 | { |
---|
360 | GSList *params = NULL; |
---|
361 | const char *token, *token_secret; |
---|
362 | |
---|
363 | oauth_params_parse( ¶ms, req->reply_body ); |
---|
364 | token = oauth_params_get( ¶ms, "oauth_token" ); |
---|
365 | token_secret = oauth_params_get( ¶ms, "oauth_token_secret" ); |
---|
366 | st->access_token = g_strdup_printf( |
---|
367 | "oauth_token=%s&oauth_token_secret=%s", token, token_secret ); |
---|
368 | oauth_params_free( ¶ms ); |
---|
369 | } |
---|
370 | |
---|
371 | st->stage = OAUTH_ACCESS_TOKEN; |
---|
372 | st->func( st ); |
---|
373 | oauth_info_free( st ); |
---|
374 | } |
---|
375 | |
---|
376 | char *oauth_http_header( char *access_token, const char *method, const char *url, char *args ) |
---|
377 | { |
---|
378 | GSList *params = NULL, *l; |
---|
379 | char *token_secret, *sig, *params_s, *s; |
---|
380 | GString *ret = NULL; |
---|
381 | |
---|
382 | /* First, get the two pieces of info from the access token that we need. */ |
---|
383 | oauth_params_parse( ¶ms, access_token ); |
---|
384 | if( params == NULL ) |
---|
385 | goto err; |
---|
386 | |
---|
387 | /* Pick out the token secret, we shouldn't include it but use it for signing. */ |
---|
388 | token_secret = g_strdup( oauth_params_get( ¶ms, "oauth_token_secret" ) ); |
---|
389 | if( token_secret == NULL ) |
---|
390 | goto err; |
---|
391 | oauth_params_del( ¶ms, "oauth_token_secret" ); |
---|
392 | |
---|
393 | oauth_add_default_params( ¶ms ); |
---|
394 | |
---|
395 | /* Start building the OAuth header. 'key="value", '... */ |
---|
396 | ret = g_string_new( "OAuth " ); |
---|
397 | for( l = params; l; l = l->next ) |
---|
398 | { |
---|
399 | char *kv = l->data; |
---|
400 | char *eq = strchr( kv, '=' ); |
---|
401 | char esc[strlen(kv)*3+1]; |
---|
402 | |
---|
403 | if( eq == NULL ) |
---|
404 | break; /* WTF */ |
---|
405 | |
---|
406 | strcpy( esc, eq + 1 ); |
---|
407 | http_encode( esc ); |
---|
408 | |
---|
409 | g_string_append_len( ret, kv, eq - kv + 1 ); |
---|
410 | g_string_append_c( ret, '"' ); |
---|
411 | g_string_append( ret, esc ); |
---|
412 | g_string_append( ret, "\", " ); |
---|
413 | } |
---|
414 | |
---|
415 | /* Now, before generating the signature, add GET/POST arguments to params |
---|
416 | since they should be included in the base signature string (but not in |
---|
417 | the HTTP header). */ |
---|
418 | if( args ) |
---|
419 | oauth_params_parse( ¶ms, args ); |
---|
420 | if( ( s = strchr( url, '?' ) ) ) |
---|
421 | { |
---|
422 | s = g_strdup( s + 1 ); |
---|
423 | oauth_params_parse( ¶ms, s + 1 ); |
---|
424 | g_free( s ); |
---|
425 | } |
---|
426 | |
---|
427 | /* Append the signature and we're done! */ |
---|
428 | params_s = oauth_params_string( params ); |
---|
429 | sig = oauth_sign( method, url, params_s, token_secret ); |
---|
430 | g_string_append_printf( ret, "oauth_signature=\"%s\"", sig ); |
---|
431 | g_free( params_s ); |
---|
432 | |
---|
433 | err: |
---|
434 | oauth_params_free( ¶ms ); |
---|
435 | g_free( sig ); |
---|
436 | g_free( token_secret ); |
---|
437 | |
---|
438 | return ret ? g_string_free( ret, FALSE ) : NULL; |
---|
439 | } |
---|