2012-05-26 04:49:25 +08:00
|
|
|
#ifndef HEADER_CURL_SASL_H
|
|
|
|
#define HEADER_CURL_SASL_H
|
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2015-01-19 01:12:28 +08:00
|
|
|
* Copyright (C) 2012 - 2015, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2012-05-26 04:49:25 +08:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
|
|
|
* are also available at http://curl.haxx.se/docs/copyright.html.
|
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
***************************************************************************/
|
|
|
|
|
2014-04-07 00:09:16 +08:00
|
|
|
#include <curl/curl.h>
|
|
|
|
|
|
|
|
struct SessionHandle;
|
|
|
|
struct connectdata;
|
2014-11-06 02:20:01 +08:00
|
|
|
|
|
|
|
#if !defined(CURL_DISABLE_CRYPTO_AUTH)
|
|
|
|
struct digestdata;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(USE_NTLM)
|
2014-04-07 00:09:16 +08:00
|
|
|
struct ntlmdata;
|
2014-11-06 02:20:01 +08:00
|
|
|
#endif
|
2012-05-26 04:49:25 +08:00
|
|
|
|
2014-11-16 17:50:06 +08:00
|
|
|
#if defined(USE_KERBEROS5)
|
2014-08-14 22:50:55 +08:00
|
|
|
struct kerberos5data;
|
|
|
|
#endif
|
|
|
|
|
2013-09-25 03:12:48 +08:00
|
|
|
/* Authentication mechanism flags */
|
|
|
|
#define SASL_MECH_LOGIN (1 << 0)
|
|
|
|
#define SASL_MECH_PLAIN (1 << 1)
|
|
|
|
#define SASL_MECH_CRAM_MD5 (1 << 2)
|
|
|
|
#define SASL_MECH_DIGEST_MD5 (1 << 3)
|
|
|
|
#define SASL_MECH_GSSAPI (1 << 4)
|
|
|
|
#define SASL_MECH_EXTERNAL (1 << 5)
|
|
|
|
#define SASL_MECH_NTLM (1 << 6)
|
|
|
|
#define SASL_MECH_XOAUTH2 (1 << 7)
|
|
|
|
|
2015-01-28 00:24:55 +08:00
|
|
|
/* Authentication mechanism values */
|
|
|
|
#define SASL_AUTH_NONE 0
|
|
|
|
#define SASL_AUTH_ANY ~0U
|
2015-01-28 01:08:18 +08:00
|
|
|
#define SASL_AUTH_DEFAULT (SASL_AUTH_ANY & \
|
|
|
|
~(SASL_MECH_EXTERNAL | SASL_MECH_XOAUTH2))
|
2015-01-28 00:24:55 +08:00
|
|
|
|
2013-09-25 03:12:48 +08:00
|
|
|
/* Authentication mechanism strings */
|
|
|
|
#define SASL_MECH_STRING_LOGIN "LOGIN"
|
|
|
|
#define SASL_MECH_STRING_PLAIN "PLAIN"
|
|
|
|
#define SASL_MECH_STRING_CRAM_MD5 "CRAM-MD5"
|
|
|
|
#define SASL_MECH_STRING_DIGEST_MD5 "DIGEST-MD5"
|
|
|
|
#define SASL_MECH_STRING_GSSAPI "GSSAPI"
|
|
|
|
#define SASL_MECH_STRING_EXTERNAL "EXTERNAL"
|
|
|
|
#define SASL_MECH_STRING_NTLM "NTLM"
|
|
|
|
#define SASL_MECH_STRING_XOAUTH2 "XOAUTH2"
|
|
|
|
|
2015-04-26 22:12:23 +08:00
|
|
|
#if !defined(CURL_DISABLE_CRYPTO_AUTH)
|
|
|
|
#define DIGEST_MAX_VALUE_LENGTH 256
|
|
|
|
#define DIGEST_MAX_CONTENT_LENGTH 1024
|
|
|
|
#endif
|
|
|
|
|
2014-11-05 21:35:27 +08:00
|
|
|
enum {
|
|
|
|
CURLDIGESTALGO_MD5,
|
|
|
|
CURLDIGESTALGO_MD5SESS
|
|
|
|
};
|
|
|
|
|
2015-01-21 00:33:05 +08:00
|
|
|
/* SASL machine states */
|
|
|
|
typedef enum {
|
|
|
|
SASL_STOP,
|
|
|
|
SASL_PLAIN,
|
|
|
|
SASL_LOGIN,
|
|
|
|
SASL_LOGIN_PASSWD,
|
2015-01-28 00:24:55 +08:00
|
|
|
SASL_EXTERNAL,
|
2015-01-21 00:33:05 +08:00
|
|
|
SASL_CRAMMD5,
|
|
|
|
SASL_DIGESTMD5,
|
|
|
|
SASL_DIGESTMD5_RESP,
|
|
|
|
SASL_NTLM,
|
|
|
|
SASL_NTLM_TYPE2MSG,
|
|
|
|
SASL_GSSAPI,
|
|
|
|
SASL_GSSAPI_TOKEN,
|
|
|
|
SASL_GSSAPI_NO_DATA,
|
|
|
|
SASL_XOAUTH2,
|
|
|
|
SASL_CANCEL,
|
|
|
|
SASL_FINAL
|
|
|
|
} saslstate;
|
|
|
|
|
|
|
|
/* Progress indicator */
|
|
|
|
typedef enum {
|
|
|
|
SASL_IDLE,
|
|
|
|
SASL_INPROGRESS,
|
|
|
|
SASL_DONE
|
|
|
|
} saslprogress;
|
|
|
|
|
|
|
|
/* Protocol dependent SASL parameters */
|
|
|
|
struct SASLproto {
|
|
|
|
const char *service; /* The service name */
|
|
|
|
int contcode; /* Code to receive when continuation is expected */
|
|
|
|
int finalcode; /* Code to receive upon authentication success */
|
|
|
|
size_t maxirlen; /* Maximum initial response length */
|
|
|
|
CURLcode (*sendauth)(struct connectdata *conn,
|
|
|
|
const char *mech, const char *ir);
|
|
|
|
/* Send authentication command */
|
|
|
|
CURLcode (*sendcont)(struct connectdata *conn, const char *contauth);
|
|
|
|
/* Send authentication continuation */
|
|
|
|
void (*getmessage)(char *buffer, char **outptr);
|
|
|
|
/* Get SASL response message */
|
|
|
|
};
|
|
|
|
|
2015-01-20 21:14:26 +08:00
|
|
|
/* Per-connection parameters */
|
|
|
|
struct SASL {
|
2015-01-21 00:33:05 +08:00
|
|
|
const struct SASLproto *params; /* Protocol dependent parameters */
|
|
|
|
saslstate state; /* Current machine state */
|
2015-01-20 21:14:26 +08:00
|
|
|
unsigned int authmechs; /* Accepted authentication mechanisms */
|
|
|
|
unsigned int prefmech; /* Preferred authentication mechanism */
|
|
|
|
unsigned int authused; /* Auth mechanism used for the connection */
|
2015-01-20 22:27:25 +08:00
|
|
|
bool resetprefs; /* For URL auth option parsing. */
|
2015-01-20 21:14:26 +08:00
|
|
|
bool mutual_auth; /* Mutual authentication enabled (GSSAPI only) */
|
2015-01-21 00:33:05 +08:00
|
|
|
bool force_ir; /* Protocol always supports initial response */
|
2015-01-20 21:14:26 +08:00
|
|
|
};
|
|
|
|
|
2013-09-25 03:12:48 +08:00
|
|
|
/* This is used to test whether the line starts with the given mechanism */
|
|
|
|
#define sasl_mech_equal(line, wordlen, mech) \
|
|
|
|
(wordlen == (sizeof(mech) - 1) / sizeof(char) && \
|
|
|
|
!memcmp(line, mech, wordlen))
|
|
|
|
|
2014-08-09 23:26:58 +08:00
|
|
|
/* This is used to build a SPN string */
|
|
|
|
#if !defined(USE_WINDOWS_SSPI)
|
|
|
|
char *Curl_sasl_build_spn(const char *service, const char *instance);
|
|
|
|
#else
|
|
|
|
TCHAR *Curl_sasl_build_spn(const char *service, const char *instance);
|
|
|
|
#endif
|
|
|
|
|
2015-04-26 22:12:23 +08:00
|
|
|
/* This is used to extract the realm from a challenge message */
|
|
|
|
int Curl_sasl_digest_get_pair(const char *str, char *value, char *content,
|
|
|
|
const char **endptr);
|
|
|
|
|
2015-01-19 01:12:28 +08:00
|
|
|
#if defined(HAVE_GSSAPI)
|
2015-08-31 18:45:47 +08:00
|
|
|
char *Curl_sasl_build_gssapi_spn(const char *service, const char *instance);
|
2015-01-19 01:12:28 +08:00
|
|
|
#endif
|
|
|
|
|
2012-06-04 00:21:49 +08:00
|
|
|
#ifndef CURL_DISABLE_CRYPTO_AUTH
|
2014-04-03 04:21:12 +08:00
|
|
|
|
2012-06-04 17:53:18 +08:00
|
|
|
/* This is used to generate a base64 encoded DIGEST-MD5 response message */
|
|
|
|
CURLcode Curl_sasl_create_digest_md5_message(struct SessionHandle *data,
|
2014-04-03 03:53:43 +08:00
|
|
|
const char *chlg64,
|
|
|
|
const char *userp,
|
2013-03-22 06:21:22 +08:00
|
|
|
const char *passwdp,
|
|
|
|
const char *service,
|
2012-06-04 17:53:18 +08:00
|
|
|
char **outptr, size_t *outlen);
|
2014-11-05 21:58:24 +08:00
|
|
|
|
2014-11-05 22:33:26 +08:00
|
|
|
/* This is used to decode a HTTP DIGEST challenge message */
|
|
|
|
CURLcode Curl_sasl_decode_digest_http_message(const char *chlg,
|
|
|
|
struct digestdata *digest);
|
|
|
|
|
2014-11-05 23:01:51 +08:00
|
|
|
/* This is used to generate a HTTP DIGEST response message */
|
|
|
|
CURLcode Curl_sasl_create_digest_http_message(struct SessionHandle *data,
|
|
|
|
const char *userp,
|
|
|
|
const char *passwdp,
|
|
|
|
const unsigned char *request,
|
|
|
|
const unsigned char *uri,
|
|
|
|
struct digestdata *digest,
|
|
|
|
char **outptr, size_t *outlen);
|
|
|
|
|
2014-11-05 21:58:24 +08:00
|
|
|
/* This is used to clean up the digest specific data */
|
|
|
|
void Curl_sasl_digest_cleanup(struct digestdata *digest);
|
2012-06-04 00:21:49 +08:00
|
|
|
#endif
|
|
|
|
|
2012-06-02 18:07:58 +08:00
|
|
|
#ifdef USE_NTLM
|
|
|
|
/* This is used to generate a base64 encoded NTLM type-1 message */
|
|
|
|
CURLcode Curl_sasl_create_ntlm_type1_message(const char *userp,
|
|
|
|
const char *passwdp,
|
|
|
|
struct ntlmdata *ntlm,
|
|
|
|
char **outptr,
|
|
|
|
size_t *outlen);
|
|
|
|
|
2013-10-28 06:20:18 +08:00
|
|
|
/* This is used to decode a base64 encoded NTLM type-2 message */
|
|
|
|
CURLcode Curl_sasl_decode_ntlm_type2_message(struct SessionHandle *data,
|
|
|
|
const char *type2msg,
|
|
|
|
struct ntlmdata *ntlm);
|
|
|
|
|
|
|
|
/* This is used to generate a base64 encoded NTLM type-3 message */
|
2012-06-05 05:25:45 +08:00
|
|
|
CURLcode Curl_sasl_create_ntlm_type3_message(struct SessionHandle *data,
|
2012-06-02 18:07:58 +08:00
|
|
|
const char *userp,
|
|
|
|
const char *passwdp,
|
|
|
|
struct ntlmdata *ntlm,
|
|
|
|
char **outptr, size_t *outlen);
|
|
|
|
|
2014-10-09 18:03:14 +08:00
|
|
|
/* This is used to clean up the ntlm specific data */
|
|
|
|
void Curl_sasl_ntlm_cleanup(struct ntlmdata *ntlm);
|
|
|
|
|
2012-06-02 18:07:58 +08:00
|
|
|
#endif /* USE_NTLM */
|
|
|
|
|
2014-11-16 17:50:06 +08:00
|
|
|
#if defined(USE_KERBEROS5)
|
2014-08-14 07:03:45 +08:00
|
|
|
/* This is used to generate a base64 encoded GSSAPI (Kerberos V5) user token
|
|
|
|
message */
|
|
|
|
CURLcode Curl_sasl_create_gssapi_user_message(struct SessionHandle *data,
|
|
|
|
const char *userp,
|
|
|
|
const char *passwdp,
|
|
|
|
const char *service,
|
|
|
|
const bool mutual,
|
|
|
|
const char *chlg64,
|
|
|
|
struct kerberos5data *krb5,
|
|
|
|
char **outptr, size_t *outlen);
|
|
|
|
|
|
|
|
/* This is used to generate a base64 encoded GSSAPI (Kerberos V5) security
|
|
|
|
token message */
|
|
|
|
CURLcode Curl_sasl_create_gssapi_security_message(struct SessionHandle *data,
|
|
|
|
const char *input,
|
|
|
|
struct kerberos5data *krb5,
|
|
|
|
char **outptr,
|
|
|
|
size_t *outlen);
|
2014-11-15 05:16:08 +08:00
|
|
|
|
|
|
|
/* This is used to clean up the gssapi specific data */
|
|
|
|
void Curl_sasl_gssapi_cleanup(struct kerberos5data *krb5);
|
2014-11-16 17:50:06 +08:00
|
|
|
#endif /* USE_KERBEROS5 */
|
2014-08-14 07:03:45 +08:00
|
|
|
|
2012-06-02 18:07:58 +08:00
|
|
|
/* This is used to cleanup any libraries or curl modules used by the sasl
|
|
|
|
functions */
|
|
|
|
void Curl_sasl_cleanup(struct connectdata *conn, unsigned int authused);
|
|
|
|
|
2015-01-20 22:27:25 +08:00
|
|
|
/* Convert a mechanism name to a token */
|
|
|
|
unsigned int Curl_sasl_decode_mech(const char *ptr,
|
|
|
|
size_t maxlen, size_t *len);
|
|
|
|
|
|
|
|
/* Parse the URL login options */
|
|
|
|
CURLcode Curl_sasl_parse_url_auth_option(struct SASL *sasl,
|
|
|
|
const char *value, size_t len);
|
|
|
|
|
|
|
|
/* Initializes an SASL structure */
|
2015-01-21 00:33:05 +08:00
|
|
|
void Curl_sasl_init(struct SASL *sasl, const struct SASLproto *params);
|
|
|
|
|
2015-01-28 00:24:55 +08:00
|
|
|
/* Check if we have enough auth data and capabilities to authenticate */
|
|
|
|
bool Curl_sasl_can_authenticate(struct SASL *sasl, struct connectdata *conn);
|
|
|
|
|
2015-01-21 00:33:05 +08:00
|
|
|
/* Calculate the required login details for SASL authentication */
|
|
|
|
CURLcode Curl_sasl_start(struct SASL *sasl, struct connectdata *conn,
|
|
|
|
bool force_ir, saslprogress *progress);
|
|
|
|
|
|
|
|
/* Continue an SASL authentication */
|
|
|
|
CURLcode Curl_sasl_continue(struct SASL *sasl, struct connectdata *conn,
|
2015-01-23 04:47:38 +08:00
|
|
|
int code, saslprogress *progress);
|
2015-01-20 22:27:25 +08:00
|
|
|
|
2012-05-26 04:49:25 +08:00
|
|
|
#endif /* HEADER_CURL_SASL_H */
|