wip
[users/jgh/exim.git] / src / src / pdkim / pdkim.c
index 7d6475e3618bdc03dea53a3c9558f80505f5e77b..836df263898ee8c9914919496416eecdd11a8671 100644 (file)
@@ -1,4 +1,4 @@
-/* $Cambridge: exim/src/src/pdkim/pdkim.c,v 1.1.2.1 2009/02/24 13:13:47 tom Exp $ */
+/* $Cambridge: exim/src/src/pdkim/pdkim.c,v 1.1.2.5 2009/02/27 17:04:20 tom Exp $ */
 /* pdkim.c */
 
 #include <stdlib.h>
 /* -------------------------------------------------------------------------- */
 /* A bunch of list constants */
 char *pdkim_querymethods[] = {
-  "dns/txt"
+  "dns/txt",
+  NULL
 };
 char *pdkim_algos[] = {
   "rsa-sha256",
-  "rsa-sha1"
+  "rsa-sha1",
+  NULL
 };
 char *pdkim_canons[] = {
   "simple",
-  "relaxed"
+  "relaxed",
+  NULL
+};
+
+typedef struct pdkim_combined_canon_entry {
+  char *str;
+  int canon_headers;
+  int canon_body;
+} pdkim_combined_canon_entry;
+pdkim_combined_canon_entry pdkim_combined_canons[] = {
+  { "simple/simple",    PDKIM_CANON_SIMPLE,   PDKIM_CANON_SIMPLE },
+  { "simple/relaxed",   PDKIM_CANON_SIMPLE,   PDKIM_CANON_RELAXED },
+  { "relaxed/simple",   PDKIM_CANON_RELAXED,  PDKIM_CANON_SIMPLE },
+  { "relaxed/relaxed",  PDKIM_CANON_RELAXED,  PDKIM_CANON_RELAXED },
+  { "simple",           PDKIM_CANON_SIMPLE,   PDKIM_CANON_SIMPLE },
+  { "relaxed",          PDKIM_CANON_RELAXED,  PDKIM_CANON_SIMPLE },
+  { NULL,               0,                    0 }
 };
 
 
@@ -52,6 +70,17 @@ void pdkim_quoteprint(FILE *stream, char *data, int len, int lf) {
   if (lf)
     fputc('\n',stream);
 }
+void pdkim_hexprint(FILE *stream, char *data, int len, int lf) {
+  int i;
+  unsigned char *p = (unsigned char *)data;
+
+  for (i=0;i<len;i++) {
+    int c = p[i];
+    fprintf(stream,"%02x ",c);
+  }
+  if (lf)
+    fputc('\n',stream);
+}
 #endif
 
 
@@ -114,6 +143,24 @@ char *pdkim_numcat(pdkim_str *str, unsigned long num) {
   snprintf(minibuf,20,"%lu",num);
   return pdkim_strcat(str,minibuf);
 };
+char *pdkim_strtrim(pdkim_str *str) {
+  char *p = str->str;
+  char *q = str->str;
+  while ( (*p != '\0') && ((*p == '\t') || (*p == ' ')) ) p++;
+  while (*p != '\0') {*q = *p; q++; p++;};
+  *q = '\0';
+  while ( (q != str->str) && ( (*q == '\0') || (*q == '\t') || (*q == ' ') ) ) {
+    *q = '\0';
+    q--;
+  }
+  str->len = strlen(str->str);
+  return str->str;
+};
+char *pdkim_strclear(pdkim_str *str) {
+  str->str[0] = '\0';
+  str->len = 0;
+  return str->str;
+};
 void pdkim_strfree(pdkim_str *str) {
   if (str == NULL) return;
   if (str->str != NULL) free(str->str);
@@ -123,14 +170,17 @@ void pdkim_strfree(pdkim_str *str) {
 
 /* -------------------------------------------------------------------------- */
 /* Matches the name of the passed raw "header" against
-   the passed colon-separated "list". Case-insensitive.
-   Returns '0' for a match. */
+   the passed colon-separated "list", starting at entry
+   "start". Returns the position of the header name in
+   the list. */
 int header_name_match(char *header,
-                      char *list) {
+                      char *list,
+                      int   start) {
   char *hname;
   char *lcopy;
   char *p;
   char *q;
+  int pos = 0;
   int rc = PDKIM_FAIL;
   char *hcolon = strchr(header,':');
   if (hcolon == NULL) return rc; /* This isn't a header */
@@ -148,14 +198,20 @@ int header_name_match(char *header,
   q = strchr(p,':');
   while (q != NULL) {
     *q = '\0';
-    if (strcasecmp(p,hname) == 0) {
-      rc = PDKIM_OK;
-      goto BAIL;
+    if (pos >= start) {
+      if (strcasecmp(p,hname) == 0) {
+        rc = pos;
+        goto BAIL;
+      }
     }
     p = q+1;
     q = strchr(p,':');
+    pos++;
+  }
+  if (pos >= start) {
+    if (strcasecmp(p,hname) == 0)
+      rc = pos;
   }
-  if (strcasecmp(p,hname) == 0) rc = PDKIM_OK;
   BAIL:
   free(hname);
   free(lcopy);
@@ -209,6 +265,306 @@ char *pdkim_relax_header (char *header, int crlf) {
 };
 
 
+/* -------------------------------------------------------------------------- */
+#define PDKIM_QP_ERROR_DECODE -1
+char *pdkim_decode_qp_char(char *qp_p, int *c) {
+  char *initial_pos = qp_p;
+
+  /* Advance one char */
+  qp_p++;
+
+  /* Check for two hex digits and decode them */
+  if (isxdigit(*qp_p) && isxdigit(qp_p[1])) {
+    /* Do hex conversion */
+    if (isdigit(*qp_p)) {*c = *qp_p - '0';}
+    else {*c = toupper(*qp_p) - 'A' + 10;};
+    *c <<= 4;
+    if (isdigit(qp_p[1])) {*c |= qp_p[1] - '0';}
+    else {*c |= toupper(qp_p[1]) - 'A' + 10;};
+    return qp_p + 2;
+  };
+
+  /* Illegal char here */
+  *c = PDKIM_QP_ERROR_DECODE;
+  return initial_pos;
+}
+
+
+/* -------------------------------------------------------------------------- */
+char *pdkim_decode_qp(char *str) {
+  int nchar = 0;
+  char *q;
+  char *p = str;
+  char *n = malloc(strlen(p)+1);
+  if (n == NULL) return NULL;
+  *n = '\0';
+  q = n;
+  while (*p != '\0') {
+    if (*p == '=') {
+      p = pdkim_decode_qp_char(p,&nchar);
+      if (nchar >= 0) {
+        *q = nchar;
+        q++;
+        continue;
+      }
+    }
+    else {
+      *q = *p;
+      q++;
+    }
+    p++;
+  }
+  return n;
+}
+
+
+/* -------------------------------------------------------------------------- */
+char *pdkim_decode_base64(char *str, int *num_decoded) {
+  int dlen = 0;
+  char *res;
+
+  base64_decode(NULL, &dlen, (unsigned char *)str, strlen(str));
+  res = malloc(dlen+1);
+  if (res == NULL) return NULL;
+  if (base64_decode((unsigned char *)res,&dlen,(unsigned char *)str,strlen(str)) != 0) {
+    free(res);
+    return NULL;
+  }
+  if (num_decoded != NULL) *num_decoded = dlen;
+  return res;
+}
+
+/* -------------------------------------------------------------------------- */
+char *pdkim_encode_base64(char *str, int num) {
+  int dlen = 0;
+  char *res;
+
+  base64_encode(NULL, &dlen, (unsigned char *)str, num);
+  res = malloc(dlen+1);
+  if (res == NULL) return NULL;
+  if (base64_encode((unsigned char *)res,&dlen,(unsigned char *)str,num) != 0) {
+    free(res);
+    return NULL;
+  }
+  return res;
+}
+
+
+/* -------------------------------------------------------------------------- */
+#define PDKIM_HDR_LIMBO 0
+#define PDKIM_HDR_TAG   1
+#define PDKIM_HDR_VALUE 2
+pdkim_signature *pdkim_parse_sig_header(pdkim_ctx *ctx, char *raw_hdr) {
+  pdkim_signature *sig ;
+  char *p,*q;
+  pdkim_str *cur_tag = NULL;
+  pdkim_str *cur_val = NULL;
+  int past_hname = 0;
+  int in_b_val = 0;
+  int where = PDKIM_HDR_LIMBO;
+  int i;
+
+  sig = malloc(sizeof(pdkim_signature));
+  if (sig == NULL) return NULL;
+  memset(sig,0,sizeof(pdkim_signature));
+
+  sig->rawsig_no_b_val = malloc(strlen(raw_hdr)+1);
+  if (sig->rawsig_no_b_val == NULL) {
+    free(sig);
+    return NULL;
+  }
+
+  p = raw_hdr;
+  q = sig->rawsig_no_b_val;
+
+  while (*p != '\0') {
+
+    /* Ignore FWS */
+    if ( (*p == '\r') || (*p == '\n') )
+      goto NEXT_CHAR;
+
+    /* Fast-forward through header name */
+    if (!past_hname) {
+      if (*p == ':') past_hname = 1;
+      goto NEXT_CHAR;
+    }
+
+    if (where == PDKIM_HDR_LIMBO) {
+      /* In limbo, just wait for a tag-char to appear */
+      if (!((*p >= 'a') && (*p <= 'z')))
+        goto NEXT_CHAR;
+
+      where = PDKIM_HDR_TAG;
+    }
+
+    if (where == PDKIM_HDR_TAG) {
+      if (cur_tag == NULL)
+        cur_tag = pdkim_strnew(NULL);
+
+      if ((*p >= 'a') && (*p <= 'z'))
+        pdkim_strncat(cur_tag,p,1);
+
+      if (*p == '=') {
+        if (strcmp(cur_tag->str,"b") == 0) {
+          *q = '='; q++;
+          in_b_val = 1;
+        }
+        where = PDKIM_HDR_VALUE;
+        goto NEXT_CHAR;
+      }
+    }
+
+    if (where == PDKIM_HDR_VALUE) {
+      if (cur_val == NULL)
+        cur_val = pdkim_strnew(NULL);
+
+      if ( (*p == '\r') || (*p == '\n') )
+        goto NEXT_CHAR;
+
+      if (*p == ';') {
+        if (cur_tag->len > 0) {
+          pdkim_strtrim(cur_val);
+          #ifdef PDKIM_DEBUG
+          if (ctx->debug_stream)
+            fprintf(ctx->debug_stream, "%s=%s\n", cur_tag->str, cur_val->str);
+          #endif
+          switch (cur_tag->str[0]) {
+            case 'b':
+              switch (cur_tag->str[1]) {
+                case 'h':
+                  sig->bodyhash = pdkim_decode_base64(cur_val->str,&(sig->bodyhash_len));
+                break;
+                default:
+                  sig->sigdata = pdkim_decode_base64(cur_val->str,&(sig->sigdata_len));
+                break;
+              }
+            break;
+            case 'v':
+              if (strcmp(cur_val->str,PDKIM_SIGNATURE_VERSION) == 0) {
+                /* We only support version 1, and that is currently the
+                   only version there is. */
+                sig->version = 1;
+              }
+            break;
+            case 'a':
+              i = 0;
+              while (pdkim_algos[i] != NULL) {
+                if (strcmp(cur_val->str,pdkim_algos[i]) == 0 ) {
+                  sig->algo = i;
+                  break;
+                }
+                i++;
+              }
+            break;
+            case 'c':
+              i = 0;
+              while (pdkim_combined_canons[i].str != NULL) {
+                if (strcmp(cur_val->str,pdkim_combined_canons[i].str) == 0 ) {
+                  sig->canon_headers = pdkim_combined_canons[i].canon_headers;
+                  sig->canon_body    = pdkim_combined_canons[i].canon_body;
+                  break;
+                }
+                i++;
+              }
+            break;
+            case 'q':
+              i = 0;
+              while (pdkim_querymethods[i] != NULL) {
+                if (strcmp(cur_val->str,pdkim_querymethods[i]) == 0 ) {
+                  sig->querymethod = i;
+                  break;
+                }
+                i++;
+              }
+            break;
+            case 's':
+              sig->selector = malloc(strlen(cur_val->str)+1);
+              if (sig->selector == NULL) break;
+              strcpy(sig->selector, cur_val->str);
+            break;
+            case 'd':
+              sig->domain = malloc(strlen(cur_val->str)+1);
+              if (sig->domain == NULL) break;
+              strcpy(sig->domain, cur_val->str);
+            break;
+            case 'i':
+              sig->identity = pdkim_decode_qp(cur_val->str);
+            break;
+            case 't':
+              sig->created = strtoul(cur_val->str,NULL,10);
+            break;
+            case 'x':
+              sig->expires = strtoul(cur_val->str,NULL,10);
+            break;
+            case 'l':
+              sig->bodylength = strtoul(cur_val->str,NULL,10);
+            break;
+            case 'h':
+              sig->headernames = malloc(strlen(cur_val->str)+1);
+              if (sig->headernames == NULL) break;
+              strcpy(sig->headernames, cur_val->str);
+            break;
+            case 'z':
+              sig->copiedheaders = pdkim_decode_qp(cur_val->str);
+            break;
+            default:
+              #ifdef PDKIM_DEBUG
+              if (ctx->debug_stream)
+                fprintf(ctx->debug_stream, "Unknown tag encountered\n");
+              #endif
+            break;
+          }
+        }
+        pdkim_strclear(cur_tag);
+        pdkim_strclear(cur_val);
+        in_b_val = 0;
+        where = PDKIM_HDR_LIMBO;
+        goto NEXT_CHAR;
+      }
+      else pdkim_strncat(cur_val,p,1);
+    }
+
+    NEXT_CHAR:
+
+    if (!in_b_val) {
+      *q = *p;
+      q++;
+    }
+    p++;
+  }
+
+  /* Make sure the most important bits are there. */
+  if (!(sig->domain      && (*(sig->domain)      != '\0') &&
+        sig->selector    && (*(sig->selector)    != '\0') &&
+        sig->headernames && (*(sig->headernames) != '\0') &&
+        sig->bodyhash    && (*(sig->bodyhash)    != '\0') &&
+        sig->sigdata     && (*(sig->sigdata)     != '\0') &&
+        sig->version)) {
+    pdkim_free_sig(sig);
+    return NULL;
+  }
+
+  *q = '\0';
+  #ifdef PDKIM_DEBUG
+  if (ctx->debug_stream) {
+    fprintf(ctx->debug_stream,
+            "PDKIM >> Raw signature w/o b= tag value >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>\n");
+    pdkim_quoteprint(ctx->debug_stream,
+                     sig->rawsig_no_b_val,
+                     strlen(sig->rawsig_no_b_val), 1);
+    fprintf(ctx->debug_stream,
+            "PDKIM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n");
+  }
+  #endif
+
+  sha1_starts(&(sig->sha1_body));
+  sha2_starts(&(sig->sha2_body),0);
+
+  return sig;
+}
+
+
+
 /* -------------------------------------------------------------------------- */
 int pdkim_update_bodyhash(pdkim_ctx *ctx, char *data, int len) {
   pdkim_signature *sig = ctx->sig;
@@ -228,7 +584,7 @@ int pdkim_update_bodyhash(pdkim_ctx *ctx, char *data, int len) {
         int seen_wsp = 0;
         char *p = data;
         int q = 0;
-        relaxed_data = malloc(len);
+        relaxed_data = malloc(len+1);
         if (relaxed_data == NULL) return PDKIM_ERR_OOM;
         while (*p != '\0') {
           char c = *p;
@@ -283,12 +639,6 @@ int pdkim_finish_bodyhash(pdkim_ctx *ctx) {
   /* Traverse all signatures */
   while (sig != NULL) {
 
-#ifdef PDKIM_DEBUG
-    if (ctx->debug_stream)
-      fprintf(ctx->debug_stream, "PDKIM [%s] Body bytes hashed: %lu\n",
-              sig->domain, sig->signed_body_bytes);
-#endif
-
     /* Finish hashes */
     unsigned char bh[32]; /* SHA-256 = 32 Bytes,  SHA-1 = 20 Bytes */
     if (sig->algo == PDKIM_ALGO_RSA_SHA1)
@@ -296,24 +646,22 @@ int pdkim_finish_bodyhash(pdkim_ctx *ctx) {
     else
       sha2_finish(&(sig->sha2_body),bh);
 
+    #ifdef PDKIM_DEBUG
+    if (ctx->debug_stream) {
+      fprintf(ctx->debug_stream, "PDKIM [%s] Body bytes hashed: %lu\n",
+        sig->domain, sig->signed_body_bytes);
+      fprintf(ctx->debug_stream, "PDKIM [%s] bh  computed: ", sig->domain);
+      pdkim_hexprint(ctx->debug_stream, (char *)bh,
+                     (sig->algo == PDKIM_ALGO_RSA_SHA1)?20:32,1);
+    }
+    #endif
+
     /* SIGNING -------------------------------------------------------------- */
     if (ctx->mode == PDKIM_MODE_SIGN) {
-
-      /* Build base64 version of body hash and place it in the sig struct */
-      int slen = (sig->algo == PDKIM_ALGO_RSA_SHA1)?20:32;
-      int dlen = 0;
-      base64_encode(NULL,&dlen,bh,slen); /* Puts needed length in dlen */
-      sig->bodyhash = malloc(dlen+1);
+      sig->bodyhash_len = (sig->algo == PDKIM_ALGO_RSA_SHA1)?20:32;
+      sig->bodyhash = malloc(sig->bodyhash_len);
       if (sig->bodyhash == NULL) return PDKIM_ERR_OOM;
-      if (base64_encode((unsigned char *)sig->bodyhash,&dlen,bh,slen) == 0) {
-        sig->bodyhash[dlen] = '\0';
-#ifdef PDKIM_DEBUG
-        if (ctx->debug_stream)
-          fprintf(ctx->debug_stream, "PDKIM [%s] body hash: %s\n",
-                  sig->domain, sig->bodyhash);
-#endif
-        return PDKIM_OK;
-      }
+      memcpy(sig->bodyhash,bh,sig->bodyhash_len);
 
       /* If bodylength limit is set, and we have received less bytes
          than the requested amount, effectively remove the limit tag. */
@@ -321,11 +669,30 @@ int pdkim_finish_bodyhash(pdkim_ctx *ctx) {
     }
     /* VERIFICATION --------------------------------------------------------- */
     else {
-
-
+      /* Compare bodyhash */
+      if (memcmp(bh,sig->bodyhash,
+                 (sig->algo == PDKIM_ALGO_RSA_SHA1)?20:32) == 0) {
+        #ifdef PDKIM_DEBUG
+        if (ctx->debug_stream)
+          fprintf(ctx->debug_stream, "PDKIM [%s] Body hash verified OK\n",
+                  sig->domain);
+        #endif
+      }
+      else {
+        #ifdef PDKIM_DEBUG
+        if (ctx->debug_stream) {
+          fprintf(ctx->debug_stream, "PDKIM [%s] Body hash did NOT verify\n",
+                  sig->domain);
+          fprintf(ctx->debug_stream, "PDKIM [%s] bh signature: ", sig->domain);
+          pdkim_hexprint(ctx->debug_stream, sig->bodyhash,
+                           (sig->algo == PDKIM_ALGO_RSA_SHA1)?20:32,1);
+        }
+        #endif
+        sig->verify_status     = PDKIM_VERIFY_FAIL;
+        sig->verify_ext_status = PDKIM_VERIFY_FAIL_BODY;
+      }
     }
 
-
     sig = sig->next;
   }
 
@@ -381,6 +748,7 @@ int pdkim_bodyline_complete(pdkim_ctx *ctx) {
 
 /* -------------------------------------------------------------------------- */
 /* Callback from pdkim_feed below for processing complete headers */
+#define DKIM_SIGNATURE_HEADERNAME "DKIM-Signature:"
 int pdkim_header_complete(pdkim_ctx *ctx) {
   pdkim_signature *sig = ctx->sig;
 
@@ -397,22 +765,64 @@ int pdkim_header_complete(pdkim_ctx *ctx) {
     /* SIGNING -------------------------------------------------------------- */
     if (ctx->mode == PDKIM_MODE_SIGN) {
       if (header_name_match(ctx->cur_header->str,
-                            sig->sign_headers?sig->sign_headers
-                                             :PDKIM_DEFAULT_SIGN_HEADERS) == 0) {
-        pdkim_stringlist *list = pdkim_append_stringlist(sig->headers,
-                                                         ctx->cur_header->str);
-        if (list == NULL) return PDKIM_ERR_OOM;
-        sig->headers = list;
-      }
+                            sig->sign_headers?
+                              sig->sign_headers:
+                              PDKIM_DEFAULT_SIGN_HEADERS, 0) < 0) goto NEXT_SIG;
     }
     /* VERIFICATION --------------------------------------------------------- */
     else {
-
+      int rc = header_name_match(ctx->cur_header->str,
+                                 sig->headernames,
+                                 sig->headernames_pos);
+      /* Header is not included or out-of-sequence */
+      if (rc < 0) goto NEXT_SIG;
+      sig->headernames_pos = rc;
     }
 
+    /* Add header to the signed headers list */
+    pdkim_stringlist *list = pdkim_append_stringlist(sig->headers,
+                                                     ctx->cur_header->str);
+    if (list == NULL) return PDKIM_ERR_OOM;
+    sig->headers = list;
+
+    NEXT_SIG:
     sig = sig->next;
   }
-  ctx->cur_header->len = 0; /* Re-use existing pdkim_str */
+
+  /* DKIM-Signature: headers are added to the verification list */
+  if ( (ctx->mode == PDKIM_MODE_VERIFY) &&
+       (strncasecmp(ctx->cur_header->str,
+                    DKIM_SIGNATURE_HEADERNAME,
+                    strlen(DKIM_SIGNATURE_HEADERNAME)) == 0) ) {
+    /* Create and chain new signature block */
+    #ifdef PDKIM_DEBUG
+    if (ctx->debug_stream)
+      fprintf(ctx->debug_stream,
+        "PDKIM >> Found sig, trying to parse >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>\n");
+    #endif
+    pdkim_signature *new_sig = pdkim_parse_sig_header(ctx, ctx->cur_header->str);
+    if (new_sig != NULL) {
+      pdkim_signature *last_sig = ctx->sig;
+      if (last_sig == NULL) {
+        ctx->sig = new_sig;
+      }
+      else {
+        while (last_sig->next != NULL) { last_sig = last_sig->next; };
+        last_sig->next = new_sig;
+      }
+    }
+    else {
+      #ifdef PDKIM_DEBUG
+      if (ctx->debug_stream) {
+        fprintf(ctx->debug_stream,"Error while parsing signature header\n");
+        fprintf(ctx->debug_stream,
+          "PDKIM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n");
+      }
+      #endif
+    }
+  }
+
+  pdkim_strclear(ctx->cur_header); /* Re-use existing pdkim_str */
   return PDKIM_OK;
 };
 
@@ -475,81 +885,101 @@ int pdkim_feed (pdkim_ctx *ctx,
 
 
 /* -------------------------------------------------------------------------- */
-pdkim_str *pdkim_create_header(pdkim_ctx *ctx, int final) {
-
+char *pdkim_create_header(pdkim_signature *sig, int final) {
+  char *rc = NULL;
+  char *base64_bh = NULL;
+  char *base64_b  = NULL;
   pdkim_str *hdr = pdkim_strnew("DKIM-Signature: v="PDKIM_SIGNATURE_VERSION);
   if (hdr == NULL) return NULL;
+
+  base64_bh = pdkim_encode_base64(sig->bodyhash, sig->bodyhash_len);
+  if (base64_bh == NULL) goto BAIL;
+
   /* Required and static bits */
   if (
-        pdkim_strcat(hdr,"; a=")                                     &&
-        pdkim_strcat(hdr,pdkim_algos[ctx->sig->algo])                &&
-        pdkim_strcat(hdr,"; q=")                                     &&
-        pdkim_strcat(hdr,pdkim_querymethods[ctx->sig->querymethod])  &&
-        pdkim_strcat(hdr,"; c=")                                     &&
-        pdkim_strcat(hdr,pdkim_canons[ctx->sig->canon_headers])      &&
-        pdkim_strcat(hdr,"/")                                        &&
-        pdkim_strcat(hdr,pdkim_canons[ctx->sig->canon_body])         &&
-        pdkim_strcat(hdr,"; d=")                                     &&
-        pdkim_strcat(hdr,ctx->sig->domain)                           &&
-        pdkim_strcat(hdr,"; s=")                                     &&
-        pdkim_strcat(hdr,ctx->sig->selector)                         &&
-        pdkim_strcat(hdr,";\r\n\th=")                                &&
-        pdkim_strcat(hdr,ctx->sig->headernames)                      &&
-        pdkim_strcat(hdr,"; bh=")                                    &&
-        pdkim_strcat(hdr,ctx->sig->bodyhash)                         &&
+        pdkim_strcat(hdr,"; a=")                                &&
+        pdkim_strcat(hdr,pdkim_algos[sig->algo])                &&
+        pdkim_strcat(hdr,"; q=")                                &&
+        pdkim_strcat(hdr,pdkim_querymethods[sig->querymethod])  &&
+        pdkim_strcat(hdr,"; c=")                                &&
+        pdkim_strcat(hdr,pdkim_canons[sig->canon_headers])      &&
+        pdkim_strcat(hdr,"/")                                   &&
+        pdkim_strcat(hdr,pdkim_canons[sig->canon_body])         &&
+        pdkim_strcat(hdr,"; d=")                                &&
+        pdkim_strcat(hdr,sig->domain)                           &&
+        pdkim_strcat(hdr,"; s=")                                &&
+        pdkim_strcat(hdr,sig->selector)                         &&
+        pdkim_strcat(hdr,";\r\n\th=")                           &&
+        pdkim_strcat(hdr,sig->headernames)                      &&
+        pdkim_strcat(hdr,"; bh=")                               &&
+        pdkim_strcat(hdr,base64_bh)                             &&
         pdkim_strcat(hdr,";\r\n\t")
      ) {
     /* Optional bits */
-    if (ctx->sig->identity != NULL) {
-      if (!( pdkim_strcat(hdr,"i=")                                  &&
-             pdkim_strcat(hdr,ctx->sig->identity)                    &&
+    if (sig->identity != NULL) {
+      if (!( pdkim_strcat(hdr,"i=")                             &&
+             pdkim_strcat(hdr,sig->identity)                    &&
              pdkim_strcat(hdr,";") ) ) {
-        return NULL;
+        goto BAIL;
       }
     }
-    if (ctx->sig->created > 0) {
-      if (!( pdkim_strcat(hdr,"t=")                                  &&
-             pdkim_numcat(hdr,ctx->sig->created)                     &&
+    if (sig->created > 0) {
+      if (!( pdkim_strcat(hdr,"t=")                             &&
+             pdkim_numcat(hdr,sig->created)                     &&
              pdkim_strcat(hdr,";") ) ) {
-        return NULL;
+        goto BAIL;
       }
     }
-    if (ctx->sig->expires > 0) {
-      if (!( pdkim_strcat(hdr,"x=")                                  &&
-             pdkim_numcat(hdr,ctx->sig->expires)                     &&
+    if (sig->expires > 0) {
+      if (!( pdkim_strcat(hdr,"x=")                             &&
+             pdkim_numcat(hdr,sig->expires)                     &&
              pdkim_strcat(hdr,";") ) ) {
-        return NULL;
+        goto BAIL;
       }
     }
-    if (ctx->sig->bodylength > 0) {
-      if (!( pdkim_strcat(hdr,"l=")                                  &&
-             pdkim_numcat(hdr,ctx->sig->bodylength)                  &&
+    if (sig->bodylength > 0) {
+      if (!( pdkim_strcat(hdr,"l=")                             &&
+             pdkim_numcat(hdr,sig->bodylength)                  &&
              pdkim_strcat(hdr,";") ) ) {
-        return NULL;
+        goto BAIL;
       }
     }
     /* Extra linebreak */
     if (hdr->str[(hdr->len)-1] == ';') {
-      if (!pdkim_strcat(hdr," \r\n\t")) return NULL;
+      if (!pdkim_strcat(hdr," \r\n\t")) goto BAIL;
     }
     /* Preliminary or final version? */
     if (final) {
+      base64_b = pdkim_encode_base64(sig->sigdata, sig->sigdata_len);
+      if (base64_b == NULL) goto BAIL;
       if (
-            pdkim_strcat(hdr,"b=")                                   &&
-            pdkim_strcat(hdr,ctx->sig->sigdata)                      &&
+            pdkim_strcat(hdr,"b=")                              &&
+            pdkim_strcat(hdr,base64_b)                          &&
             pdkim_strcat(hdr,";")
-         ) return hdr;
+         ) goto DONE;
     }
     else {
-      if (pdkim_strcat(hdr,"b=;")) return hdr;
+      if (pdkim_strcat(hdr,"b=;")) goto DONE;
     }
+
+    goto BAIL;
   }
-  return NULL;
+
+  DONE:
+  rc = strdup(hdr->str);
+
+  BAIL:
+  pdkim_strfree(hdr);
+  if (base64_bh != NULL) free(base64_bh);
+  if (base64_b  != NULL) free(base64_b);
+  return rc;
 }
 
 
 /* -------------------------------------------------------------------------- */
-int pdkim_feed_finish(pdkim_ctx *ctx) {
+int pdkim_feed_finish(pdkim_ctx *ctx, char **signature) {
+  pdkim_signature *sig = ctx->sig;
+  pdkim_str *headernames = NULL;             /* Collected signed header names */
 
   /* Check if we must still flush a (partial) header. If that is the
      case, the message has no body, and we must compute a body hash
@@ -567,181 +997,189 @@ int pdkim_feed_finish(pdkim_ctx *ctx) {
       pdkim_update_bodyhash(ctx, ctx->linebuf, ctx->linebuf_offset);
       pdkim_update_bodyhash(ctx,"\r\n",2);
     }
-#ifdef PDKIM_DEBUG
+    #ifdef PDKIM_DEBUG
     if (ctx->debug_stream)
       fprintf(ctx->debug_stream,
         "\nPDKIM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n");
-#endif
+    #endif
   }
 
+  /* Build (and/or evaluate) body hash */
   if (pdkim_finish_bodyhash(ctx) != PDKIM_OK) return PDKIM_ERR_OOM;
 
-  /* SIGNING ---------------------------------------------------------------- */
+  /* SIGNING -------------------------------------------------------------- */
   if (ctx->mode == PDKIM_MODE_SIGN) {
-    pdkim_stringlist *p;
-    pdkim_str *headernames;
-    pdkim_str *hdr;
-    char *canon_signature;
-    unsigned char headerhash[32];
-    char *headerhash_base64;
-    char *rsa_sig;
-    int sigdata_len = 0;
+    headernames = pdkim_strnew(NULL);
+    if (headernames == NULL) return PDKIM_ERR_OOM;
+  }
+  /* ---------------------------------------------------------------------- */
+
+  while (sig != NULL) {
     sha1_context sha1_headers;
     sha2_context sha2_headers;
-    rsa_context rsa;
-    if (ctx->sig->algo == PDKIM_ALGO_RSA_SHA1) sha1_starts(&sha1_headers);
-    else sha2_starts(&sha2_headers,0);
-    /* Run through the accumulated list of to-be-signed headers */
-#ifdef PDKIM_DEBUG
+    pdkim_stringlist *p = sig->headers;
+    char *sig_hdr;
+    char headerhash[32];
+
+    if (sig->algo == PDKIM_ALGO_RSA_SHA1)
+      sha1_starts(&sha1_headers);
+    else
+      sha2_starts(&sha2_headers,0);
+
+    #ifdef PDKIM_DEBUG
     if (ctx->debug_stream)
       fprintf(ctx->debug_stream,
               "PDKIM >> Hashed header data, canonicalized, in sequence >>>>>>>>>>>>>>\n");
-#endif
-    headernames = pdkim_strnew(NULL);
-    p = ctx->sig->headers;
+    #endif
+
     while (p != NULL) {
-      char *rh = p->value;
-      /* Collect header names (Note: colon presence is guaranteed here) */
-      char *q = strchr(p->value,':');
-      if (pdkim_strncat(headernames, p->value,
-                        (q-(p->value))+((p->next==NULL)?0:1)) == NULL)
-        return PDKIM_ERR_OOM;
-      /* Cook the header if using relaxed canon */
-      if (ctx->sig->canon_body == PDKIM_CANON_RELAXED) {
-        rh = pdkim_relax_header(p->value,1);
-        if (rh == NULL) return PDKIM_ERR_OOM;
+      char *rh;
+
+      /* SIGNING -------------------------------------------------------------- */
+      if (ctx->mode == PDKIM_MODE_SIGN) {
+        /* Collect header names (Note: colon presence is guaranteed here) */
+        char *q = strchr(p->value,':');
+        if (pdkim_strncat(headernames, p->value,
+                          (q-(p->value))+((p->next==NULL)?0:1)) == NULL)
+          return PDKIM_ERR_OOM;
       }
+      /* ---------------------------------------------------------------------- */
+
+      if (sig->canon_body == PDKIM_CANON_RELAXED)
+        rh = pdkim_relax_header(p->value,1); /* cook header for relaxed canon */
+      else
+        rh = strdup(p->value);             /* just copy it for simple canon */
+
+      if (rh == NULL) return PDKIM_ERR_OOM;
+
       /* Feed header to the hash algorithm */
-      if (ctx->sig->algo == PDKIM_ALGO_RSA_SHA1)
+      if (sig->algo == PDKIM_ALGO_RSA_SHA1)
         sha1_update(&(sha1_headers),(unsigned char *)rh,strlen(rh));
       else
         sha2_update(&(sha2_headers),(unsigned char *)rh,strlen(rh));
-#ifdef PDKIM_DEBUG
+      #ifdef PDKIM_DEBUG
       if (ctx->debug_stream)
         pdkim_quoteprint(ctx->debug_stream, rh, strlen(rh), 1);
-#endif
+      #endif
+      free(rh);
       p = p->next;
     }
 
-#ifdef PDKIM_DEBUG
+    #ifdef PDKIM_DEBUG
     if (ctx->debug_stream)
       fprintf(ctx->debug_stream,
               "PDKIM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n");
-#endif
+    #endif
 
-    /* Copy headernames to signature struct */
-    ctx->sig->headernames = malloc((headernames->len)+1);
-    if (ctx->sig->headernames == NULL) return PDKIM_ERR_OOM;
-    strcpy(ctx->sig->headernames, headernames->str);
-    pdkim_strfree(headernames);
 
-    /* Create signature header with b= omitted */
-    hdr = pdkim_create_header(ctx,0);
-    if (hdr == NULL) return PDKIM_ERR_OOM;
+    /* SIGNING ---------------------------------------------------------------- */
+    if (ctx->mode == PDKIM_MODE_SIGN) {
+      /* Copy headernames to signature struct */
+      sig->headernames = strdup(headernames->str);
+      pdkim_strfree(headernames);
 
-    /* If necessary, perform relaxed canon */
-    canon_signature = hdr->str;
-    if (ctx->sig->canon_headers == PDKIM_CANON_RELAXED) {
-      canon_signature = pdkim_relax_header(canon_signature,0);
-      if (canon_signature == NULL) return PDKIM_ERR_OOM;
+      /* Create signature header with b= omitted */
+      sig_hdr = pdkim_create_header(ctx->sig,0);
+    }
+    /* VERIFICATION ----------------------------------------------------------- */
+    else {
+      sig_hdr = strdup(sig->rawsig_no_b_val);
     }
+    /* ------------------------------------------------------------------------ */
 
-#ifdef PDKIM_DEBUG
-  if (ctx->debug_stream) {
-    fprintf(ctx->debug_stream,
-            "PDKIM >> Signed DKIM-Signature header, canonicalized >>>>>>>>>>>>>>>>>\n");
-    pdkim_quoteprint(ctx->debug_stream, canon_signature, strlen(canon_signature), 1);
-    fprintf(ctx->debug_stream,
-            "PDKIM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n");
-  }
-#endif
+    if (sig_hdr == NULL) return PDKIM_ERR_OOM;
 
-    /* Feed preliminary signature header to the hash algorithm */
-    if (ctx->sig->algo == PDKIM_ALGO_RSA_SHA1) {
-      int dlen = 0;
-      sha1_update(&(sha1_headers),(unsigned char *)canon_signature,strlen(canon_signature));
-      sha1_finish(&(sha1_headers),headerhash);
-      base64_encode(NULL,&dlen,headerhash,20);
-      headerhash_base64 = malloc(dlen+1);
-      if (headerhash == NULL) return PDKIM_ERR_OOM;
-      base64_encode((unsigned char *)headerhash_base64,&dlen,headerhash,20);
-      headerhash_base64[dlen] = '\0';
-#ifdef PDKIM_DEBUG
-      if (ctx->debug_stream)
-        fprintf(ctx->debug_stream,
-          "PDKIM SHA1 header hash: %s\n",headerhash_base64);
-#endif
+    /* Relax header if necessary */
+    if (sig->canon_headers == PDKIM_CANON_RELAXED) {
+      char *relaxed_hdr = pdkim_relax_header(sig_hdr,0);
+      free(sig_hdr);
+      if (relaxed_hdr == NULL) return PDKIM_ERR_OOM;
+      sig_hdr = relaxed_hdr;
     }
-    else {
-      int dlen = 0;
-      sha2_update(&(sha2_headers),(unsigned char *)canon_signature,strlen(canon_signature));
-      sha2_finish(&(sha2_headers),headerhash);
-      base64_encode(NULL,&dlen,headerhash,32);
-      headerhash_base64 = malloc(dlen+1);
-      if (headerhash == NULL) return PDKIM_ERR_OOM;
-      base64_encode((unsigned char *)headerhash_base64,&dlen,headerhash,32);
-      headerhash_base64[dlen] = '\0';
-#ifdef PDKIM_DEBUG
-      if (ctx->debug_stream)
-        fprintf(ctx->debug_stream,
-          "PDKIM SHA256 header hash: %s\n",headerhash_base64);
-#endif
+
+    #ifdef PDKIM_DEBUG
+    if (ctx->debug_stream) {
+      fprintf(ctx->debug_stream,
+              "PDKIM >> Signed DKIM-Signature header, canonicalized >>>>>>>>>>>>>>>>>\n");
+      pdkim_quoteprint(ctx->debug_stream, sig_hdr, strlen(sig_hdr), 1);
+      fprintf(ctx->debug_stream,
+              "PDKIM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n");
     }
+    #endif
 
-    if (rsa_parse_key(&rsa, (unsigned char *)ctx->sig->rsa_privkey,
-                      strlen(ctx->sig->rsa_privkey), NULL, 0) != 0) {
-      return PDKIM_ERR_RSA_PRIVKEY;
+    /* Finalize header hash */
+    if (sig->algo == PDKIM_ALGO_RSA_SHA1) {
+      sha1_update(&(sha1_headers),(unsigned char *)sig_hdr,strlen(sig_hdr));
+      sha1_finish(&(sha1_headers),(unsigned char *)headerhash);
+    }
+    else {
+      sha2_update(&(sha2_headers),(unsigned char *)sig_hdr,strlen(sig_hdr));
+      sha2_finish(&(sha2_headers),(unsigned char *)headerhash);
     }
 
-    rsa_sig = malloc(mpi_size(&(rsa.N)));
-    if (rsa_sig == NULL) return PDKIM_ERR_OOM;
+    free(sig_hdr);
 
-    if (rsa_pkcs1_sign( &rsa, RSA_PRIVATE,
-                        ((ctx->sig->algo == PDKIM_ALGO_RSA_SHA1)?
-                           RSA_SHA1
-                           :
-                           RSA_SHA256
-                        ),
-                        0, headerhash, (unsigned char *)rsa_sig ) != 0) {
-      return PDKIM_ERR_RSA_SIGNING;
-    }
+    /* SIGNING ---------------------------------------------------------------- */
+    if (ctx->mode == PDKIM_MODE_SIGN) {
+      rsa_context rsa;
 
-    base64_encode(NULL,&sigdata_len,(unsigned char *)rsa_sig,mpi_size(&(rsa.N)));
-    ctx->sig->sigdata = malloc(sigdata_len+1);
-    if (ctx->sig->sigdata == NULL) return PDKIM_ERR_OOM;
-    base64_encode((unsigned char *)ctx->sig->sigdata,
-                  &sigdata_len,
-                  (unsigned char *)rsa_sig,
-                  mpi_size(&(rsa.N)));
-    ctx->sig->sigdata[sigdata_len] = '\0';
+      /* Perform private key operation */
+      if (rsa_parse_key(&rsa, (unsigned char *)sig->rsa_privkey,
+                        strlen(sig->rsa_privkey), NULL, 0) != 0) {
+        return PDKIM_ERR_RSA_PRIVKEY;
+      }
 
-#ifdef PDKIM_DEBUG
-    if (ctx->debug_stream)
-      fprintf(ctx->debug_stream,
-        "PDKIM RSA-signed hash: %s\n",ctx->sig->sigdata);
-#endif
+      sig->sigdata_len = mpi_size(&(rsa.N));
+      sig->sigdata = malloc(sig->sigdata_len);
+      if (sig->sigdata == NULL) return PDKIM_ERR_OOM;
+
+      if (rsa_pkcs1_sign( &rsa, RSA_PRIVATE,
+                          ((sig->algo == PDKIM_ALGO_RSA_SHA1)?
+                             RSA_SHA1:RSA_SHA256),
+                          0,
+                          (unsigned char *)headerhash,
+                          (unsigned char *)sig->sigdata ) != 0) {
+        return PDKIM_ERR_RSA_SIGNING;
+      }
 
-    /* Recreate signature header with b= included */
-    pdkim_strfree(hdr);
-    hdr = pdkim_create_header(ctx,1);
-    if (hdr == NULL) return PDKIM_ERR_OOM;
+      rsa_free(&rsa);
 
-#ifdef PDKIM_DEBUG
-    if (ctx->debug_stream) {
-      fprintf(ctx->debug_stream,
-              "PDKIM >> Final DKIM-Signature header >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>\n");
-      fprintf(ctx->debug_stream,"%s\n",hdr->str);
-      //pdkim_quoteprint(ctx->debug_stream, hdr->str, hdr->len, 1);
-      fprintf(ctx->debug_stream,
-              "PDKIM <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n");
+      #ifdef PDKIM_DEBUG
+      if (ctx->debug_stream) {
+        fprintf(ctx->debug_stream, "PDKIM [%s] b computed: ",
+                sig->domain);
+        pdkim_hexprint(ctx->debug_stream, sig->sigdata, sig->sigdata_len, 1);
+      }
+      #endif
+
+      /* Recreate signature header with b= included, return it to the caller */
+      if (signature != NULL) {
+        *signature = pdkim_create_header(ctx->sig,1);
+        if (*signature == NULL) return PDKIM_ERR_OOM;
+      }
     }
-#endif
+    /* VERIFICATION ----------------------------------------------------------- */
+    else {
+
+    }
+
+    sig = sig->next;
   }
 
   return PDKIM_OK;
 }
 
 
+/* -------------------------------------------------------------------------- */
+pdkim_ctx *pdkim_init_verify(void) {
+  pdkim_ctx *ctx = malloc(sizeof(pdkim_ctx));
+  if (ctx == NULL) return NULL;
+  memset(ctx,0,sizeof(pdkim_ctx));
+  ctx->mode = PDKIM_MODE_VERIFY;
+  return ctx;
+}
+
+
 /* -------------------------------------------------------------------------- */
 pdkim_ctx *pdkim_init_sign(char *domain,
                            char *selector,
@@ -780,7 +1218,6 @@ pdkim_ctx *pdkim_init_sign(char *domain,
   sha2_starts(&(ctx->sig->sha2_body),0);
 
   return ctx;
-
 };
 
 #ifdef PDKIM_DEBUG
@@ -793,6 +1230,7 @@ void pdkim_set_debug_stream(pdkim_ctx *ctx,
 
 /* -------------------------------------------------------------------------- */
 int pdkim_set_optional(pdkim_ctx *ctx,
+                       int input_mode,
                        char *sign_headers,
                        char *identity,
                        int canon_headers,
@@ -818,6 +1256,7 @@ int pdkim_set_optional(pdkim_ctx *ctx,
     strcpy(ctx->sig->sign_headers, sign_headers);
   }
 
+  ctx->input_mode = input_mode;
   ctx->sig->canon_headers = canon_headers;
   ctx->sig->canon_body = canon_body;
   ctx->sig->bodylength = bodylength;