2012-05-30 23:52:52 +04:00
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2013-03-22 02:21:22 +04:00
|
|
|
* Copyright (C) 2012 - 2013, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2012-05-30 23:52:52 +04:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
|
|
|
* are also available at http://curl.haxx.se/docs/copyright.html.
|
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
2012-06-03 20:21:49 +04:00
|
|
|
* RFC2195 CRAM-MD5 authentication
|
2012-06-04 13:53:18 +04:00
|
|
|
* RFC2831 DIGEST-MD5 authentication
|
2013-01-23 02:02:30 +04:00
|
|
|
* RFC4422 Simple Authentication and Security Layer (SASL)
|
2012-05-30 23:52:52 +04:00
|
|
|
* RFC4616 PLAIN authentication
|
|
|
|
*
|
|
|
|
***************************************************************************/
|
|
|
|
|
2013-01-06 22:06:49 +04:00
|
|
|
#include "curl_setup.h"
|
2012-05-30 23:52:52 +04:00
|
|
|
|
|
|
|
#include <curl/curl.h>
|
2013-01-04 05:50:28 +04:00
|
|
|
#include "urldata.h"
|
2012-05-30 23:52:52 +04:00
|
|
|
|
|
|
|
#include "curl_base64.h"
|
2012-06-03 20:21:49 +04:00
|
|
|
#include "curl_md5.h"
|
2012-06-04 13:53:18 +04:00
|
|
|
#include "curl_rand.h"
|
2012-06-03 20:21:49 +04:00
|
|
|
#include "curl_hmac.h"
|
2012-06-02 14:07:58 +04:00
|
|
|
#include "curl_ntlm_msgs.h"
|
2012-05-30 23:52:52 +04:00
|
|
|
#include "curl_sasl.h"
|
2013-01-04 05:50:28 +04:00
|
|
|
#include "warnless.h"
|
2012-06-15 20:05:11 +04:00
|
|
|
#include "curl_memory.h"
|
2012-06-03 20:21:49 +04:00
|
|
|
|
|
|
|
#define _MPRINTF_REPLACE /* use our functions only */
|
|
|
|
#include <curl/mprintf.h>
|
2012-05-30 23:52:52 +04:00
|
|
|
|
|
|
|
/* The last #include file should be: */
|
2013-01-04 05:50:28 +04:00
|
|
|
#include "memdebug.h"
|
2012-05-30 23:52:52 +04:00
|
|
|
|
2012-06-04 13:53:18 +04:00
|
|
|
#ifndef CURL_DISABLE_CRYPTO_AUTH
|
|
|
|
/* Retrieves the value for a corresponding key from the challenge string
|
|
|
|
* returns TRUE if the key could be found, FALSE if it does not exists
|
|
|
|
*/
|
|
|
|
static bool sasl_digest_get_key_value(const unsigned char *chlg,
|
|
|
|
const char *key,
|
|
|
|
char *value,
|
|
|
|
size_t max_val_len,
|
|
|
|
char end_char)
|
|
|
|
{
|
|
|
|
char *find_pos;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
find_pos = strstr((const char *) chlg, key);
|
|
|
|
if(!find_pos)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
find_pos += strlen(key);
|
|
|
|
|
|
|
|
for(i = 0; *find_pos && *find_pos != end_char && i < max_val_len - 1; ++i)
|
|
|
|
value[i] = *find_pos++;
|
|
|
|
value[i] = '\0';
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-05-30 23:52:52 +04:00
|
|
|
/*
|
|
|
|
* Curl_sasl_create_plain_message()
|
|
|
|
*
|
2012-06-02 14:09:59 +04:00
|
|
|
* This is used to generate an already encoded PLAIN message ready
|
2012-05-30 23:52:52 +04:00
|
|
|
* for sending to the recipient.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* data [in] - The session handle.
|
|
|
|
* userp [in] - The user name.
|
|
|
|
* passdwp [in] - The user's password.
|
|
|
|
* outptr [in/out] - The address where a pointer to newly allocated memory
|
|
|
|
* holding the result will be stored upon completion.
|
|
|
|
* outlen [out] - The length of the output message.
|
|
|
|
*
|
|
|
|
* Returns CURLE_OK on success.
|
|
|
|
*/
|
|
|
|
CURLcode Curl_sasl_create_plain_message(struct SessionHandle *data,
|
2013-03-22 02:21:22 +04:00
|
|
|
const char *userp,
|
|
|
|
const char *passwdp,
|
2012-05-30 23:52:52 +04:00
|
|
|
char **outptr, size_t *outlen)
|
|
|
|
{
|
|
|
|
char plainauth[2 * MAX_CURL_USER_LENGTH + MAX_CURL_PASSWORD_LENGTH];
|
|
|
|
size_t ulen;
|
|
|
|
size_t plen;
|
|
|
|
|
|
|
|
ulen = strlen(userp);
|
|
|
|
plen = strlen(passwdp);
|
|
|
|
|
|
|
|
if(2 * ulen + plen + 2 > sizeof(plainauth)) {
|
|
|
|
*outlen = 0;
|
|
|
|
*outptr = NULL;
|
2012-06-03 21:24:35 +04:00
|
|
|
|
2012-06-03 21:42:47 +04:00
|
|
|
/* Plainauth too small */
|
2012-06-03 21:24:35 +04:00
|
|
|
return CURLE_OUT_OF_MEMORY;
|
2012-05-30 23:52:52 +04:00
|
|
|
}
|
|
|
|
|
2012-06-03 21:24:35 +04:00
|
|
|
/* Calculate the reply */
|
2012-05-30 23:52:52 +04:00
|
|
|
memcpy(plainauth, userp, ulen);
|
|
|
|
plainauth[ulen] = '\0';
|
|
|
|
memcpy(plainauth + ulen + 1, userp, ulen);
|
|
|
|
plainauth[2 * ulen + 1] = '\0';
|
|
|
|
memcpy(plainauth + 2 * ulen + 2, passwdp, plen);
|
|
|
|
|
2012-06-03 21:24:35 +04:00
|
|
|
/* Base64 encode the reply */
|
2012-05-30 23:52:52 +04:00
|
|
|
return Curl_base64_encode(data, plainauth, 2 * ulen + plen + 2, outptr,
|
|
|
|
outlen);
|
|
|
|
}
|
2012-06-01 02:11:54 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Curl_sasl_create_login_message()
|
|
|
|
*
|
2012-06-02 14:09:59 +04:00
|
|
|
* This is used to generate an already encoded LOGIN message containing the
|
2012-06-01 02:11:54 +04:00
|
|
|
* user name or password ready for sending to the recipient.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* data [in] - The session handle.
|
2012-06-02 17:03:55 +04:00
|
|
|
* valuep [in] - The user name or user's password.
|
2012-06-01 02:11:54 +04:00
|
|
|
* outptr [in/out] - The address where a pointer to newly allocated memory
|
|
|
|
* holding the result will be stored upon completion.
|
|
|
|
* outlen [out] - The length of the output message.
|
|
|
|
*
|
|
|
|
* Returns CURLE_OK on success.
|
|
|
|
*/
|
|
|
|
CURLcode Curl_sasl_create_login_message(struct SessionHandle *data,
|
2013-03-22 02:21:22 +04:00
|
|
|
const char *valuep, char **outptr,
|
2012-06-01 02:11:54 +04:00
|
|
|
size_t *outlen)
|
|
|
|
{
|
|
|
|
size_t vlen = strlen(valuep);
|
|
|
|
|
|
|
|
if(!vlen) {
|
2012-06-03 21:24:35 +04:00
|
|
|
/* Calculate an empty reply */
|
2012-06-01 02:11:54 +04:00
|
|
|
*outptr = strdup("=");
|
|
|
|
if(*outptr) {
|
|
|
|
*outlen = (size_t) 1;
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
*outlen = 0;
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
}
|
|
|
|
|
2012-06-03 21:24:35 +04:00
|
|
|
/* Base64 encode the value */
|
2012-06-01 02:11:54 +04:00
|
|
|
return Curl_base64_encode(data, valuep, vlen, outptr, outlen);
|
|
|
|
}
|
2012-06-02 14:07:58 +04:00
|
|
|
|
2012-06-03 20:21:49 +04:00
|
|
|
#ifndef CURL_DISABLE_CRYPTO_AUTH
|
|
|
|
/*
|
|
|
|
* Curl_sasl_create_cram_md5_message()
|
|
|
|
*
|
2012-06-04 13:49:55 +04:00
|
|
|
* This is used to generate an already encoded CRAM-MD5 response message ready
|
|
|
|
* for sending to the recipient.
|
2012-06-03 20:21:49 +04:00
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* data [in] - The session handle.
|
2012-06-05 01:25:45 +04:00
|
|
|
* chlg64 [in] - Pointer to the base64 encoded challenge buffer.
|
2012-06-04 13:49:55 +04:00
|
|
|
* userp [in] - The user name.
|
2012-06-03 20:21:49 +04:00
|
|
|
* passdwp [in] - The user's password.
|
|
|
|
* outptr [in/out] - The address where a pointer to newly allocated memory
|
|
|
|
* holding the result will be stored upon completion.
|
|
|
|
* outlen [out] - The length of the output message.
|
|
|
|
*
|
|
|
|
* Returns CURLE_OK on success.
|
|
|
|
*/
|
|
|
|
CURLcode Curl_sasl_create_cram_md5_message(struct SessionHandle *data,
|
2013-03-22 02:21:22 +04:00
|
|
|
const char *chlg64,
|
|
|
|
const char *userp,
|
|
|
|
const char *passwdp,
|
2012-06-03 20:21:49 +04:00
|
|
|
char **outptr, size_t *outlen)
|
|
|
|
{
|
|
|
|
CURLcode result = CURLE_OK;
|
|
|
|
size_t chlg64len = strlen(chlg64);
|
|
|
|
unsigned char *chlg = (unsigned char *) NULL;
|
|
|
|
size_t chlglen = 0;
|
|
|
|
HMAC_context *ctxt;
|
|
|
|
unsigned char digest[MD5_DIGEST_LEN];
|
2012-06-04 14:02:03 +04:00
|
|
|
char response[MAX_CURL_USER_LENGTH + 2 * MD5_DIGEST_LEN + 1];
|
2012-06-03 20:21:49 +04:00
|
|
|
|
|
|
|
/* Decode the challenge if necessary */
|
|
|
|
if(chlg64len && *chlg64 != '=') {
|
|
|
|
result = Curl_base64_decode(chlg64, &chlg, &chlglen);
|
|
|
|
|
|
|
|
if(result)
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Compute the digest using the password as the key */
|
|
|
|
ctxt = Curl_HMAC_init(Curl_HMAC_MD5,
|
|
|
|
(const unsigned char *) passwdp,
|
|
|
|
curlx_uztoui(strlen(passwdp)));
|
|
|
|
|
|
|
|
if(!ctxt) {
|
|
|
|
Curl_safefree(chlg);
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Update the digest with the given challenge */
|
|
|
|
if(chlglen > 0)
|
|
|
|
Curl_HMAC_update(ctxt, chlg, curlx_uztoui(chlglen));
|
|
|
|
|
|
|
|
Curl_safefree(chlg);
|
|
|
|
|
|
|
|
/* Finalise the digest */
|
|
|
|
Curl_HMAC_final(ctxt, digest);
|
|
|
|
|
2012-06-04 14:02:03 +04:00
|
|
|
/* Prepare the response */
|
|
|
|
snprintf(response, sizeof(response),
|
2012-06-03 20:21:49 +04:00
|
|
|
"%s %02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x",
|
2012-06-04 13:49:55 +04:00
|
|
|
userp, digest[0], digest[1], digest[2], digest[3], digest[4],
|
2012-06-03 20:21:49 +04:00
|
|
|
digest[5], digest[6], digest[7], digest[8], digest[9], digest[10],
|
|
|
|
digest[11], digest[12], digest[13], digest[14], digest[15]);
|
|
|
|
|
|
|
|
/* Base64 encode the reply */
|
2012-06-04 14:02:03 +04:00
|
|
|
return Curl_base64_encode(data, response, 0, outptr, outlen);
|
2012-06-03 20:21:49 +04:00
|
|
|
}
|
2012-06-04 13:53:18 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Curl_sasl_create_digest_md5_message()
|
|
|
|
*
|
|
|
|
* This is used to generate an already encoded DIGEST-MD5 response message
|
|
|
|
* ready for sending to the recipient.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* data [in] - The session handle.
|
2012-06-05 01:25:45 +04:00
|
|
|
* chlg64 [in] - Pointer to the base64 encoded challenge buffer.
|
2012-06-04 13:53:18 +04:00
|
|
|
* userp [in] - The user name.
|
|
|
|
* passdwp [in] - The user's password.
|
2012-06-04 23:22:06 +04:00
|
|
|
* service [in] - The service type such as www, smtp or pop
|
2012-06-04 13:53:18 +04:00
|
|
|
* outptr [in/out] - The address where a pointer to newly allocated memory
|
|
|
|
* holding the result will be stored upon completion.
|
|
|
|
* outlen [out] - The length of the output message.
|
|
|
|
*
|
|
|
|
* Returns CURLE_OK on success.
|
|
|
|
*/
|
|
|
|
CURLcode Curl_sasl_create_digest_md5_message(struct SessionHandle *data,
|
2013-03-22 02:21:22 +04:00
|
|
|
const char *chlg64,
|
|
|
|
const char *userp,
|
|
|
|
const char *passwdp,
|
|
|
|
const char *service,
|
2012-06-04 13:53:18 +04:00
|
|
|
char **outptr, size_t *outlen)
|
|
|
|
{
|
|
|
|
static const char table16[] = "0123456789abcdef";
|
|
|
|
|
|
|
|
CURLcode result = CURLE_OK;
|
|
|
|
unsigned char *chlg = (unsigned char *) NULL;
|
|
|
|
size_t chlglen = 0;
|
|
|
|
size_t i;
|
|
|
|
MD5_context *ctxt;
|
|
|
|
unsigned char digest[MD5_DIGEST_LEN];
|
|
|
|
char HA1_hex[2 * MD5_DIGEST_LEN + 1];
|
|
|
|
char HA2_hex[2 * MD5_DIGEST_LEN + 1];
|
|
|
|
char resp_hash_hex[2 * MD5_DIGEST_LEN + 1];
|
|
|
|
|
|
|
|
char nonce[64];
|
|
|
|
char realm[128];
|
|
|
|
char alg[64];
|
|
|
|
char nonceCount[] = "00000001";
|
|
|
|
char cnonce[] = "12345678"; /* will be changed */
|
|
|
|
char method[] = "AUTHENTICATE";
|
|
|
|
char qop[] = "auth";
|
2012-06-04 23:22:06 +04:00
|
|
|
char uri[128];
|
2012-06-04 13:53:18 +04:00
|
|
|
char response[512];
|
|
|
|
|
|
|
|
result = Curl_base64_decode(chlg64, &chlg, &chlglen);
|
|
|
|
|
|
|
|
if(result)
|
|
|
|
return result;
|
|
|
|
|
2013-02-13 02:20:44 +04:00
|
|
|
if(!chlg)
|
|
|
|
return CURLE_LOGIN_DENIED;
|
|
|
|
|
2012-06-04 13:53:18 +04:00
|
|
|
/* Retrieve nonce string from the challenge */
|
|
|
|
if(!sasl_digest_get_key_value(chlg, "nonce=\"", nonce,
|
|
|
|
sizeof(nonce), '\"')) {
|
|
|
|
Curl_safefree(chlg);
|
|
|
|
return CURLE_LOGIN_DENIED;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Retrieve realm string from the challenge */
|
|
|
|
if(!sasl_digest_get_key_value(chlg, "realm=\"", realm,
|
|
|
|
sizeof(realm), '\"')) {
|
|
|
|
/* Challenge does not have a realm, set empty string [RFC2831] page 6 */
|
|
|
|
strcpy(realm, "");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Retrieve algorithm string from the challenge */
|
|
|
|
if(!sasl_digest_get_key_value(chlg, "algorithm=", alg, sizeof(alg), ',')) {
|
|
|
|
Curl_safefree(chlg);
|
|
|
|
return CURLE_LOGIN_DENIED;
|
|
|
|
}
|
|
|
|
|
|
|
|
Curl_safefree(chlg);
|
|
|
|
|
|
|
|
/* We do not support other algorithms */
|
|
|
|
if(strcmp(alg, "md5-sess") != 0)
|
|
|
|
return CURLE_LOGIN_DENIED;
|
|
|
|
|
|
|
|
/* Generate 64 bits of random data */
|
|
|
|
for(i = 0; i < 8; i++)
|
|
|
|
cnonce[i] = table16[Curl_rand()%16];
|
|
|
|
|
|
|
|
/* So far so good, now calculate A1 and H(A1) according to RFC 2831 */
|
|
|
|
ctxt = Curl_MD5_init(Curl_DIGEST_MD5);
|
|
|
|
if(!ctxt)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) userp,
|
|
|
|
curlx_uztoui(strlen(userp)));
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) realm,
|
|
|
|
curlx_uztoui(strlen(realm)));
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) passwdp,
|
|
|
|
curlx_uztoui(strlen(passwdp)));
|
|
|
|
Curl_MD5_final(ctxt, digest);
|
|
|
|
|
|
|
|
ctxt = Curl_MD5_init(Curl_DIGEST_MD5);
|
|
|
|
if(!ctxt)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) digest, MD5_DIGEST_LEN);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) nonce,
|
|
|
|
curlx_uztoui(strlen(nonce)));
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) cnonce,
|
|
|
|
curlx_uztoui(strlen(cnonce)));
|
|
|
|
Curl_MD5_final(ctxt, digest);
|
|
|
|
|
|
|
|
/* Convert calculated 16 octet hex into 32 bytes string */
|
|
|
|
for(i = 0; i < MD5_DIGEST_LEN; i++)
|
|
|
|
snprintf(&HA1_hex[2 * i], 3, "%02x", digest[i]);
|
|
|
|
|
2012-06-04 23:22:06 +04:00
|
|
|
/* Prepare the URL string */
|
2013-01-31 02:22:27 +04:00
|
|
|
snprintf(uri, sizeof(uri), "%s/%s", service, realm);
|
2012-06-04 13:53:18 +04:00
|
|
|
|
|
|
|
/* Calculate H(A2) */
|
|
|
|
ctxt = Curl_MD5_init(Curl_DIGEST_MD5);
|
|
|
|
if(!ctxt)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) method,
|
|
|
|
curlx_uztoui(strlen(method)));
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) uri,
|
|
|
|
curlx_uztoui(strlen(uri)));
|
|
|
|
Curl_MD5_final(ctxt, digest);
|
|
|
|
|
|
|
|
for(i = 0; i < MD5_DIGEST_LEN; i++)
|
|
|
|
snprintf(&HA2_hex[2 * i], 3, "%02x", digest[i]);
|
|
|
|
|
|
|
|
/* Now calculate the response hash */
|
|
|
|
ctxt = Curl_MD5_init(Curl_DIGEST_MD5);
|
|
|
|
if(!ctxt)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) HA1_hex, 2 * MD5_DIGEST_LEN);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) nonce,
|
|
|
|
curlx_uztoui(strlen(nonce)));
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) nonceCount,
|
|
|
|
curlx_uztoui(strlen(nonceCount)));
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) cnonce,
|
|
|
|
curlx_uztoui(strlen(cnonce)));
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) qop,
|
|
|
|
curlx_uztoui(strlen(qop)));
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
|
|
|
|
|
|
|
|
Curl_MD5_update(ctxt, (const unsigned char *) HA2_hex, 2 * MD5_DIGEST_LEN);
|
|
|
|
Curl_MD5_final(ctxt, digest);
|
|
|
|
|
|
|
|
for(i = 0; i < MD5_DIGEST_LEN; i++)
|
|
|
|
snprintf(&resp_hash_hex[2 * i], 3, "%02x", digest[i]);
|
|
|
|
|
2013-01-31 02:22:27 +04:00
|
|
|
snprintf(response, sizeof(response),
|
|
|
|
"username=\"%s\",realm=\"%s\",nonce=\"%s\","
|
|
|
|
"cnonce=\"%s\",nc=\"%s\",digest-uri=\"%s\",response=%s",
|
|
|
|
userp, realm, nonce,
|
|
|
|
cnonce, nonceCount, uri, resp_hash_hex);
|
2012-06-04 13:53:18 +04:00
|
|
|
|
|
|
|
/* Base64 encode the reply */
|
|
|
|
return Curl_base64_encode(data, response, 0, outptr, outlen);
|
|
|
|
}
|
2012-06-03 20:21:49 +04:00
|
|
|
#endif
|
|
|
|
|
2012-06-02 14:07:58 +04:00
|
|
|
#ifdef USE_NTLM
|
|
|
|
/*
|
|
|
|
* Curl_sasl_create_ntlm_type1_message()
|
|
|
|
*
|
|
|
|
* This is used to generate an already encoded NTLM type-1 message ready for
|
|
|
|
* sending to the recipient.
|
|
|
|
*
|
|
|
|
* Note: This is a simple wrapper of the NTLM function which means that any
|
|
|
|
* SASL based protocols don't have to include the NTLM functions directly.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* userp [in] - The user name in the format User or Domain\User.
|
|
|
|
* passdwp [in] - The user's password.
|
|
|
|
* ntlm [in/out] - The ntlm data struct being used and modified.
|
|
|
|
* outptr [in/out] - The address where a pointer to newly allocated memory
|
|
|
|
* holding the result will be stored upon completion.
|
|
|
|
* outlen [out] - The length of the output message.
|
|
|
|
*
|
|
|
|
* Returns CURLE_OK on success.
|
|
|
|
*/
|
|
|
|
CURLcode Curl_sasl_create_ntlm_type1_message(const char *userp,
|
|
|
|
const char *passwdp,
|
|
|
|
struct ntlmdata *ntlm,
|
|
|
|
char **outptr, size_t *outlen)
|
|
|
|
{
|
|
|
|
return Curl_ntlm_create_type1_message(userp, passwdp, ntlm, outptr,
|
|
|
|
outlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2012-06-05 01:25:45 +04:00
|
|
|
* Curl_sasl_create_ntlm_type3_message()
|
2012-06-02 14:07:58 +04:00
|
|
|
*
|
2012-06-05 01:25:45 +04:00
|
|
|
* This is used to generate an already encoded NTLM type-3 message ready for
|
|
|
|
* sending to the recipient.
|
2012-06-02 14:07:58 +04:00
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* data [in] - Pointer to session handle.
|
2012-06-05 01:25:45 +04:00
|
|
|
* header [in] - Pointer to the base64 encoded type-2 message buffer.
|
2012-06-02 14:07:58 +04:00
|
|
|
* userp [in] - The user name in the format User or Domain\User.
|
|
|
|
* passdwp [in] - The user's password.
|
|
|
|
* ntlm [in/out] - The ntlm data struct being used and modified.
|
|
|
|
* outptr [in/out] - The address where a pointer to newly allocated memory
|
|
|
|
* holding the result will be stored upon completion.
|
|
|
|
* outlen [out] - The length of the output message.
|
|
|
|
*
|
|
|
|
* Returns CURLE_OK on success.
|
|
|
|
*/
|
2012-06-05 01:25:45 +04:00
|
|
|
CURLcode Curl_sasl_create_ntlm_type3_message(struct SessionHandle *data,
|
2012-06-02 14:07:58 +04:00
|
|
|
const char *header,
|
|
|
|
const char *userp,
|
|
|
|
const char *passwdp,
|
|
|
|
struct ntlmdata *ntlm,
|
|
|
|
char **outptr, size_t *outlen)
|
|
|
|
{
|
|
|
|
CURLcode result = Curl_ntlm_decode_type2_message(data, header, ntlm);
|
|
|
|
|
|
|
|
if(!result)
|
|
|
|
result = Curl_ntlm_create_type3_message(data, userp, passwdp, ntlm,
|
|
|
|
outptr, outlen);
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
#endif /* USE_NTLM */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Curl_sasl_cleanup()
|
|
|
|
*
|
|
|
|
* This is used to cleanup any libraries or curl modules used by the sasl
|
|
|
|
* functions.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* conn [in] - Pointer to the connection data.
|
|
|
|
* authused [in] - The authentication mechanism used.
|
|
|
|
*/
|
|
|
|
void Curl_sasl_cleanup(struct connectdata *conn, unsigned int authused)
|
|
|
|
{
|
|
|
|
#ifdef USE_NTLM
|
|
|
|
/* Cleanup the ntlm structure */
|
2012-06-08 22:52:28 +04:00
|
|
|
if(authused == SASL_MECH_NTLM) {
|
2012-06-02 14:07:58 +04:00
|
|
|
Curl_ntlm_sspi_cleanup(&conn->ntlm);
|
|
|
|
}
|
2012-06-03 03:00:34 +04:00
|
|
|
(void)conn;
|
2012-06-02 14:07:58 +04:00
|
|
|
#else
|
|
|
|
/* Reserved for future use */
|
|
|
|
(void)conn;
|
|
|
|
(void)authused;
|
|
|
|
#endif
|
2012-06-03 03:00:34 +04:00
|
|
|
}
|