MD5_Final(md5buf, &md5ctx);
digest_md5_to_hex(md5buf, md5hex);
+ memset(result, 0, resultlen);
strncpy(result, md5hex, resultlen-1);
- result[resultlen-1] = '\0';
}
int
digest_is_valid(const char *our_realm, const char *password,
const char *our_nonce, const char *method,
- const char *authorization)
+ const char *our_uri, const char *authorization)
{
char *auth;
char *current;
response = first+10;
}
+ if (!username || !realm || !nonce || !uri || !response) {
+ return 0;
+ }
+ if (strcmp(realm, our_realm) || strcmp(nonce, our_nonce) || strcmp(uri, our_uri)) {
+ return 0;
+ }
+
/* Calculate our response */
memset(our_response, 0, sizeof(our_response));
digest_get_response(username, realm, password, nonce,
void digest_generate_nonce(char *result, int resultlen);
int digest_is_valid(const char *our_realm, const char *password,
const char *our_nonce, const char *method,
- const char *authorization);
+ const char *our_uri, const char *authorization);
#endif
#define MAX_PASSWORD_LEN 64
/* MD5 as hex fits here */
-#define MAX_NONCE_LEN 33
+#define MAX_NONCE_LEN 32
struct raop_s {
/* Callbacks for audio */
authorization = http_request_get_header(request, "Authorization");
if (authorization) {
+ logger_log(&conn->raop->logger, LOGGER_DEBUG, "Our nonce: %s\n", conn->nonce);
logger_log(&conn->raop->logger, LOGGER_DEBUG, "Authorization: %s\n", authorization);
}
- if (!digest_is_valid("AppleTV", raop->password, conn->nonce, method, authorization)) {
+ if (!digest_is_valid("AppleTV", raop->password, conn->nonce, method, http_request_get_url(request), authorization)) {
char *authstr;
int authstrlen;