123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279 |
- /*
- * Copyright (C) 2010-2011 Mamadou Diop.
- *
- * Contact: Mamadou Diop <diopmamadou(at)doubango[dot]org>
- *
- * This file is part of Open Source Doubango Framework.
- *
- * DOUBANGO is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * DOUBANGO is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with DOUBANGO.
- *
- */
- /**@file tsip_header_Security_Verify.c
- * @brief SIP Security-Verify header as per RFC 3329.
- *
- * @author Mamadou Diop <diopmamadou(at)doubango[dot]org>
- *
- */
- #include "tinysip/headers/tsip_header_Security_Verify.h"
- #include "tinysip/parsers/tsip_parser_uri.h"
- #include "tsk_debug.h"
- #include "tsk_memory.h"
- #include "tsk_time.h"
- #include <string.h>
- /***********************************
- * Ragel state machine.
- */
- %%{
- machine tsip_machine_parser_header_Security_Verify;
- # Includes
- include tsip_machine_utils "./ragel/tsip_machine_utils.rl";
-
- action tag{
- tag_start = p;
- }
-
- action create_securityverify{
- if(!curr_securityverify){
- curr_securityverify = tsip_header_Security_Verify_create_null();
- }
- }
- action add_securityverify{
- if(curr_securityverify){
- tsk_list_push_back_data(hdr_securityverifies, ((void**) &curr_securityverify));
- }
- }
-
- action parse_mech{
- if(curr_securityverify){
- TSK_PARSER_SET_STRING(curr_securityverify->mech);
- }
- }
- action parse_port_s{
- if(curr_securityverify){
- TSK_PARSER_SET_INT(curr_securityverify->port_s);
- }
- }
- action parse_port_c{
- if(curr_securityverify){
- TSK_PARSER_SET_INT(curr_securityverify->port_c);
- }
- }
- action parse_spi_s{
- if(curr_securityverify){
- TSK_PARSER_SET_UINT(curr_securityverify->spi_s);
- }
- }
- action parse_spi_c{
- if(curr_securityverify){
- TSK_PARSER_SET_UINT(curr_securityverify->spi_c);
- }
- }
- action parse_ealg{
- if(curr_securityverify){
- TSK_PARSER_SET_STRING(curr_securityverify->ealg);
- }
- }
- action parse_alg{
- if(curr_securityverify){
- TSK_PARSER_SET_STRING(curr_securityverify->alg);
- }
- }
- action parse_prot{
- if(curr_securityverify){
- TSK_PARSER_SET_STRING(curr_securityverify->prot);
- }
- }
- action parse_preference{
- if(curr_securityverify){
- TSK_PARSER_SET_DOUBLE(curr_securityverify->q);
- }
- }
- action parse_param{
- if(curr_securityverify){
- TSK_PARSER_ADD_PARAM(TSIP_HEADER_PARAMS(curr_securityverify));
- }
- }
- action eob{
- }
- mech_extension = generic_param>tag %parse_param;
- port_s = "port-s"i EQUAL DIGIT+>tag %parse_port_s;
- port_c = "port-c"i EQUAL DIGIT+>tag %parse_port_c;
- spi_s = "spi-s"i EQUAL DIGIT+>tag %parse_spi_s;
- spi_c = "spi-c"i EQUAL DIGIT+>tag %parse_spi_c;
- ealg = "ealg"i EQUAL token>tag %parse_ealg;
- alg = "alg"i EQUAL token>tag %parse_alg;
- prot = "prot"i EQUAL token>tag %parse_prot;
- preference = "q"i EQUAL qvalue>tag %parse_preference;
- mech_parameters = (preference | prot | alg | ealg | spi_c | spi_s | port_c | port_s) @1 | mech_extension @0;
- mechanism_name = token>tag %parse_mech;
- sec_mechanism = (mechanism_name ( SEMI mech_parameters )*) >create_securityverify %add_securityverify;
- Security_Verify = "Security-Verify"i HCOLON sec_mechanism ( COMMA sec_mechanism )*;
- # Entry point
- main := Security_Verify :>CRLF @eob;
- }%%
- tsip_header_Security_Verify_t* tsip_header_Security_Verify_create()
- {
- return tsk_object_new(TSIP_HEADER_SECURITY_VERIFY_VA_ARGS());
- }
- tsip_header_Security_Verify_t* tsip_header_Security_Verify_create_null()
- {
- return tsip_header_Security_Verify_create();
- }
- int tsip_header_Security_Verify_serialize(const tsip_header_t* header, tsk_buffer_t* output)
- {
- if(header){
- const tsip_header_Security_Verify_t *Security_Verify = (const tsip_header_Security_Verify_t *)header;
- int ret = 0;
-
- // ipsec-3gpp; alg=hmac-md5-96; ealg=des-ede3-cbc; spi-c=1111; spi-s=2222; port-c=5062; port-s=5064
- if(tsk_striequals(Security_Verify->mech, "ipsec-3gpp")){
- ret = tsk_buffer_append_2(output, "%s%s%s%s%s%s%s;spi-c=%u;spi-s=%u;port-c=%u;port-s=%u",
- Security_Verify->mech,
-
- Security_Verify->alg ? ";alg=" : "",
- Security_Verify->alg ? Security_Verify->alg : "",
-
- Security_Verify->ealg ? ";ealg=" : "",
- Security_Verify->ealg ? Security_Verify->ealg : "",
- Security_Verify->prot ? ";prot=" : "",
- Security_Verify->prot ? Security_Verify->prot : "",
-
- Security_Verify->spi_c,
- Security_Verify->spi_s,
- Security_Verify->port_c,
- Security_Verify->port_s
- );
- }
- else if(Security_Verify->mech){
- tsk_buffer_append(output, Security_Verify->mech, tsk_strlen(Security_Verify->mech));
- }
- if(Security_Verify->q >= 0){
- /* qvalue = ("0" [ "." 0*3DIGIT ] ) / ( "1" [ "." 0*3("0") ] ) */
- tsk_buffer_append_2(output, ";q=%1.3f", Security_Verify->q);
- }
-
- return ret;
- }
- return -1;
- }
- tsip_header_Security_Verifies_L_t *tsip_header_Security_Verify_parse(const char *data, tsk_size_t size)
- {
- int cs = 0;
- const char *p = data;
- const char *pe = p + size;
- const char *eof = pe;
- tsip_header_Security_Verifies_L_t *hdr_securityverifies = tsk_list_create();
-
- const char *tag_start = tsk_null;
- tsip_header_Security_Verify_t *curr_securityverify = tsk_null;
- %%write data;
- (void)(eof);
- (void)(tsip_machine_parser_header_Security_Verify_first_final);
- (void)(tsip_machine_parser_header_Security_Verify_error);
- (void)(tsip_machine_parser_header_Security_Verify_en_main);
- %%write init;
- %%write exec;
-
- if( cs < %%{ write first_final; }%% ){
- TSK_DEBUG_ERROR("Failed to parse 'Security-Verify' header.");
- TSK_OBJECT_SAFE_FREE(curr_securityverify);
- TSK_OBJECT_SAFE_FREE(hdr_securityverifies);
- }
-
- return hdr_securityverifies;
- }
- //========================================================
- // Security_Verify header object definition
- //
- static tsk_object_t* tsip_header_Security_Verify_ctor(tsk_object_t *self, va_list * app)
- {
- tsip_header_Security_Verify_t *Security_Verify = self;
- if(Security_Verify){
- TSIP_HEADER(Security_Verify)->type = tsip_htype_Security_Verify;
- TSIP_HEADER(Security_Verify)->serialize = tsip_header_Security_Verify_serialize;
- Security_Verify->q = -1;
- }
- else{
- TSK_DEBUG_ERROR("Failed to create new Security_Verify header.");
- }
- return self;
- }
- static tsk_object_t* tsip_header_Security_Verify_dtor(tsk_object_t *self)
- {
- tsip_header_Security_Verify_t *Security_Verify = self;
- if(Security_Verify){
- TSK_FREE(Security_Verify->mech);
- TSK_FREE(Security_Verify->alg);
- TSK_FREE(Security_Verify->prot);
- TSK_FREE(Security_Verify->mod);
- TSK_FREE(Security_Verify->ealg);
- TSK_OBJECT_SAFE_FREE(TSIP_HEADER_PARAMS(Security_Verify));
- }
- else{
- TSK_DEBUG_ERROR("Null Security_Verify header.");
- }
- return self;
- }
- static const tsk_object_def_t tsip_header_Security_Verify_def_s =
- {
- sizeof(tsip_header_Security_Verify_t),
- tsip_header_Security_Verify_ctor,
- tsip_header_Security_Verify_dtor,
- tsk_null
- };
- const tsk_object_def_t *tsip_header_Security_Verify_def_t = &tsip_header_Security_Verify_def_s;
|