return TRUE;
}
-static bool verify_realm(struct digest_auth_request *request, const char *realm)
-{
- const char *const *tmp;
-
- if (*realm == '\0')
- return TRUE;
-
- tmp = request->auth_request.auth->auth_realms;
- for (; *tmp != NULL; tmp++) {
- if (strcmp(realm, *tmp) == 0)
- return TRUE;
- }
-
- return FALSE;
-}
-
static bool parse_next(char **data, char **key, char **value)
{
/* @UNSAFE */
str_lcase(key);
if (strcmp(key, "realm") == 0) {
- if (!verify_realm(request, value)) {
- *error = t_strdup_printf("Invalid realm: %s",
- str_sanitize(value, MAX_REALM_LEN));
- return FALSE;
- }
if (request->auth_request.realm == NULL && *value != '\0')
request->auth_request.realm =
p_strdup(request->pool, value);
return len;
}
-static bool
-rpa_verify_realm(struct rpa_auth_request *request, const char *realm)
-{
- const struct auth *auth = request->auth_request.auth;
- const char *default_realm;
- const char *const *tmp;
-
- for (tmp = auth->auth_realms; *tmp != NULL; tmp++) {
- if (strcasecmp(realm, *tmp) == 0)
- return TRUE;
- }
-
- default_realm = *auth->set->default_realm != '\0' ?
- auth->set->default_realm : my_hostname;
-
- return strcasecmp(realm, default_realm) == 0;
-}
-
static bool
rpa_parse_token3(struct rpa_auth_request *request, const void *data,
size_t data_size, const char **error)
user = t_strndup(p, len);
realm = strrchr(user, '@');
- if ((realm == NULL) || !rpa_verify_realm(request, realm + 1)) {
- *error = "invalid realm";
+ if (realm == NULL) {
+ *error = "missing realm";
return FALSE;
}
user = t_strdup_until(user, realm++);