2009-01-29 23:32:27 +03:00
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2016-05-29 23:57:40 +03:00
|
|
|
* Copyright (C) 1998 - 2016, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2009-01-29 23:32:27 +03:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2016-02-03 02:19:02 +03:00
|
|
|
* are also available at https://curl.haxx.se/docs/copyright.html.
|
2009-01-29 23:32:27 +03:00
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
***************************************************************************/
|
|
|
|
|
2013-01-06 22:06:49 +04:00
|
|
|
#include "curl_setup.h"
|
2009-01-29 23:32:27 +03:00
|
|
|
|
|
|
|
#ifdef USE_WINDOWS_SSPI
|
|
|
|
|
|
|
|
#include <curl/curl.h>
|
|
|
|
#include "curl_sspi.h"
|
2014-04-03 01:04:13 +04:00
|
|
|
#include "curl_multibyte.h"
|
2016-05-29 23:57:40 +03:00
|
|
|
#include "system_win32.h"
|
2014-04-03 01:04:13 +04:00
|
|
|
#include "warnless.h"
|
|
|
|
|
2015-03-25 01:12:03 +03:00
|
|
|
/* The last #include files should be: */
|
|
|
|
#include "curl_memory.h"
|
2013-01-04 05:50:28 +04:00
|
|
|
#include "memdebug.h"
|
2009-01-29 23:32:27 +03:00
|
|
|
|
2010-09-02 02:38:16 +04:00
|
|
|
/* We use our own typedef here since some headers might lack these */
|
2012-06-15 20:05:11 +04:00
|
|
|
typedef PSecurityFunctionTable (APIENTRY *INITSECURITYINTERFACE_FN)(VOID);
|
|
|
|
|
|
|
|
/* See definition of SECURITY_ENTRYPOINT in sspi.h */
|
|
|
|
#ifdef UNICODE
|
|
|
|
# ifdef _WIN32_WCE
|
|
|
|
# define SECURITYENTRYPOINT L"InitSecurityInterfaceW"
|
|
|
|
# else
|
|
|
|
# define SECURITYENTRYPOINT "InitSecurityInterfaceW"
|
|
|
|
# endif
|
|
|
|
#else
|
|
|
|
# define SECURITYENTRYPOINT "InitSecurityInterfaceA"
|
|
|
|
#endif
|
2010-09-02 02:38:16 +04:00
|
|
|
|
2009-01-29 23:32:27 +03:00
|
|
|
/* Handle of security.dll or secur32.dll, depending on Windows version */
|
|
|
|
HMODULE s_hSecDll = NULL;
|
|
|
|
|
|
|
|
/* Pointer to SSPI dispatch table */
|
2012-06-15 20:05:11 +04:00
|
|
|
PSecurityFunctionTable s_pSecFn = NULL;
|
2009-01-29 23:32:27 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Curl_sspi_global_init()
|
|
|
|
*
|
|
|
|
* This is used to load the Security Service Provider Interface (SSPI)
|
|
|
|
* dynamic link library portably across all Windows versions, without
|
|
|
|
* the need to directly link libcurl, nor the application using it, at
|
|
|
|
* build time.
|
|
|
|
*
|
2009-01-30 04:54:22 +03:00
|
|
|
* Once this function has been executed, Windows SSPI functions can be
|
2009-01-29 23:32:27 +03:00
|
|
|
* called through the Security Service Provider Interface dispatch table.
|
2016-08-31 13:57:28 +03:00
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
* Returns CURLE_OK on success.
|
2009-01-29 23:32:27 +03:00
|
|
|
*/
|
2012-06-10 15:30:02 +04:00
|
|
|
CURLcode Curl_sspi_global_init(void)
|
2009-01-29 23:32:27 +03:00
|
|
|
{
|
2012-06-15 20:05:11 +04:00
|
|
|
INITSECURITYINTERFACE_FN pInitSecurityInterface;
|
2009-01-29 23:32:27 +03:00
|
|
|
|
|
|
|
/* If security interface is not yet initialized try to do this */
|
2012-06-10 15:30:02 +04:00
|
|
|
if(!s_hSecDll) {
|
2014-01-16 00:11:02 +04:00
|
|
|
/* Security Service Provider Interface (SSPI) functions are located in
|
|
|
|
* security.dll on WinNT 4.0 and in secur32.dll on Win9x. Win2K and XP
|
|
|
|
* have both these DLLs (security.dll forwards calls to secur32.dll) */
|
2009-01-29 23:32:27 +03:00
|
|
|
|
|
|
|
/* Load SSPI dll into the address space of the calling process */
|
2016-06-04 22:58:39 +03:00
|
|
|
if(Curl_verify_windows_version(4, 0, PLATFORM_WINNT, VERSION_EQUAL))
|
2016-05-29 23:57:40 +03:00
|
|
|
s_hSecDll = Curl_load_library(TEXT("security.dll"));
|
2009-01-29 23:32:27 +03:00
|
|
|
else
|
2016-05-29 23:57:40 +03:00
|
|
|
s_hSecDll = Curl_load_library(TEXT("secur32.dll"));
|
2012-06-10 15:30:02 +04:00
|
|
|
if(!s_hSecDll)
|
2009-01-29 23:32:27 +03:00
|
|
|
return CURLE_FAILED_INIT;
|
|
|
|
|
|
|
|
/* Get address of the InitSecurityInterfaceA function from the SSPI dll */
|
2018-09-12 11:52:40 +03:00
|
|
|
pInitSecurityInterface =
|
|
|
|
CURLX_FUNCTION_CAST(INITSECURITYINTERFACE_FN,
|
|
|
|
(GetProcAddress(s_hSecDll, SECURITYENTRYPOINT)));
|
2012-06-10 15:30:02 +04:00
|
|
|
if(!pInitSecurityInterface)
|
2009-01-29 23:32:27 +03:00
|
|
|
return CURLE_FAILED_INIT;
|
|
|
|
|
|
|
|
/* Get pointer to Security Service Provider Interface dispatch table */
|
|
|
|
s_pSecFn = pInitSecurityInterface();
|
2012-06-10 15:30:02 +04:00
|
|
|
if(!s_pSecFn)
|
2009-01-29 23:32:27 +03:00
|
|
|
return CURLE_FAILED_INIT;
|
2012-04-23 18:27:47 +04:00
|
|
|
}
|
2012-06-10 15:30:02 +04:00
|
|
|
|
2009-01-29 23:32:27 +03:00
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Curl_sspi_global_cleanup()
|
|
|
|
*
|
|
|
|
* This deinitializes the Security Service Provider Interface from libcurl.
|
2016-08-31 13:57:28 +03:00
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* None.
|
2009-01-29 23:32:27 +03:00
|
|
|
*/
|
2012-06-10 15:30:02 +04:00
|
|
|
void Curl_sspi_global_cleanup(void)
|
2009-01-29 23:32:27 +03:00
|
|
|
{
|
|
|
|
if(s_hSecDll) {
|
|
|
|
FreeLibrary(s_hSecDll);
|
|
|
|
s_hSecDll = NULL;
|
|
|
|
s_pSecFn = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-03 01:04:13 +04:00
|
|
|
/*
|
|
|
|
* Curl_create_sspi_identity()
|
|
|
|
*
|
|
|
|
* This is used to populate a SSPI identity structure based on the supplied
|
|
|
|
* username and password.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* userp [in] - The user name in the format User or Domain\User.
|
2018-10-03 11:27:27 +03:00
|
|
|
* passwdp [in] - The user's password.
|
2014-04-03 01:04:13 +04:00
|
|
|
* identity [in/out] - The identity structure.
|
|
|
|
*
|
|
|
|
* Returns CURLE_OK on success.
|
|
|
|
*/
|
|
|
|
CURLcode Curl_create_sspi_identity(const char *userp, const char *passwdp,
|
|
|
|
SEC_WINNT_AUTH_IDENTITY *identity)
|
|
|
|
{
|
|
|
|
xcharp_u useranddomain;
|
|
|
|
xcharp_u user, dup_user;
|
|
|
|
xcharp_u domain, dup_domain;
|
|
|
|
xcharp_u passwd, dup_passwd;
|
|
|
|
size_t domlen = 0;
|
|
|
|
|
|
|
|
domain.const_tchar_ptr = TEXT("");
|
|
|
|
|
|
|
|
/* Initialize the identity */
|
|
|
|
memset(identity, 0, sizeof(*identity));
|
|
|
|
|
|
|
|
useranddomain.tchar_ptr = Curl_convert_UTF8_to_tchar((char *)userp);
|
|
|
|
if(!useranddomain.tchar_ptr)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
user.const_tchar_ptr = _tcschr(useranddomain.const_tchar_ptr, TEXT('\\'));
|
|
|
|
if(!user.const_tchar_ptr)
|
|
|
|
user.const_tchar_ptr = _tcschr(useranddomain.const_tchar_ptr, TEXT('/'));
|
|
|
|
|
|
|
|
if(user.tchar_ptr) {
|
|
|
|
domain.tchar_ptr = useranddomain.tchar_ptr;
|
|
|
|
domlen = user.tchar_ptr - useranddomain.tchar_ptr;
|
|
|
|
user.tchar_ptr++;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
user.tchar_ptr = useranddomain.tchar_ptr;
|
|
|
|
domain.const_tchar_ptr = TEXT("");
|
|
|
|
domlen = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Setup the identity's user and length */
|
|
|
|
dup_user.tchar_ptr = _tcsdup(user.tchar_ptr);
|
|
|
|
if(!dup_user.tchar_ptr) {
|
|
|
|
Curl_unicodefree(useranddomain.tchar_ptr);
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
}
|
|
|
|
identity->User = dup_user.tbyte_ptr;
|
|
|
|
identity->UserLength = curlx_uztoul(_tcslen(dup_user.tchar_ptr));
|
|
|
|
dup_user.tchar_ptr = NULL;
|
|
|
|
|
|
|
|
/* Setup the identity's domain and length */
|
|
|
|
dup_domain.tchar_ptr = malloc(sizeof(TCHAR) * (domlen + 1));
|
|
|
|
if(!dup_domain.tchar_ptr) {
|
|
|
|
Curl_unicodefree(useranddomain.tchar_ptr);
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
}
|
|
|
|
_tcsncpy(dup_domain.tchar_ptr, domain.tchar_ptr, domlen);
|
|
|
|
*(dup_domain.tchar_ptr + domlen) = TEXT('\0');
|
|
|
|
identity->Domain = dup_domain.tbyte_ptr;
|
|
|
|
identity->DomainLength = curlx_uztoul(domlen);
|
|
|
|
dup_domain.tchar_ptr = NULL;
|
|
|
|
|
|
|
|
Curl_unicodefree(useranddomain.tchar_ptr);
|
|
|
|
|
2015-08-02 00:53:18 +03:00
|
|
|
/* Setup the identity's password and length */
|
2014-04-03 01:04:13 +04:00
|
|
|
passwd.tchar_ptr = Curl_convert_UTF8_to_tchar((char *)passwdp);
|
|
|
|
if(!passwd.tchar_ptr)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
dup_passwd.tchar_ptr = _tcsdup(passwd.tchar_ptr);
|
|
|
|
if(!dup_passwd.tchar_ptr) {
|
|
|
|
Curl_unicodefree(passwd.tchar_ptr);
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
}
|
|
|
|
identity->Password = dup_passwd.tbyte_ptr;
|
|
|
|
identity->PasswordLength = curlx_uztoul(_tcslen(dup_passwd.tchar_ptr));
|
|
|
|
dup_passwd.tchar_ptr = NULL;
|
|
|
|
|
|
|
|
Curl_unicodefree(passwd.tchar_ptr);
|
|
|
|
|
|
|
|
/* Setup the identity's flags */
|
|
|
|
identity->Flags = SECFLAG_WINNT_AUTH_IDENTITY;
|
|
|
|
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2016-08-31 13:57:28 +03:00
|
|
|
/*
|
|
|
|
* Curl_sspi_free_identity()
|
|
|
|
*
|
|
|
|
* This is used to free the contents of a SSPI identifier structure.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* identity [in/out] - The identity structure.
|
|
|
|
*/
|
2014-04-03 01:04:13 +04:00
|
|
|
void Curl_sspi_free_identity(SEC_WINNT_AUTH_IDENTITY *identity)
|
|
|
|
{
|
|
|
|
if(identity) {
|
|
|
|
Curl_safefree(identity->User);
|
|
|
|
Curl_safefree(identity->Password);
|
|
|
|
Curl_safefree(identity->Domain);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-01-29 23:32:27 +03:00
|
|
|
#endif /* USE_WINDOWS_SSPI */
|