curl_sasl.c 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702
  1. /***************************************************************************
  2. * _ _ ____ _
  3. * Project ___| | | | _ \| |
  4. * / __| | | | |_) | |
  5. * | (__| |_| | _ <| |___
  6. * \___|\___/|_| \_\_____|
  7. *
  8. * Copyright (C) 2012 - 2014, Daniel Stenberg, <daniel@haxx.se>, et al.
  9. *
  10. * This software is licensed as described in the file COPYING, which
  11. * you should have received as part of this distribution. The terms
  12. * are also available at http://curl.haxx.se/docs/copyright.html.
  13. *
  14. * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. * copies of the Software, and permit persons to whom the Software is
  16. * furnished to do so, under the terms of the COPYING file.
  17. *
  18. * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. * KIND, either express or implied.
  20. *
  21. * RFC2195 CRAM-MD5 authentication
  22. * RFC2831 DIGEST-MD5 authentication
  23. * RFC4422 Simple Authentication and Security Layer (SASL)
  24. * RFC4616 PLAIN authentication
  25. * RFC6749 OAuth 2.0 Authorization Framework
  26. * Draft LOGIN SASL Mechanism <draft-murchison-sasl-login-00.txt>
  27. *
  28. ***************************************************************************/
  29. #include "curl_setup.h"
  30. #include <curl/curl.h>
  31. #include "urldata.h"
  32. #include "curl_base64.h"
  33. #include "curl_md5.h"
  34. #include "vtls/vtls.h"
  35. #include "curl_hmac.h"
  36. #include "curl_ntlm_msgs.h"
  37. #include "curl_sasl.h"
  38. #include "warnless.h"
  39. #include "curl_memory.h"
  40. #include "strtok.h"
  41. #include "rawstr.h"
  42. #ifdef USE_NSS
  43. #include "vtls/nssg.h" /* for Curl_nss_force_init() */
  44. #endif
  45. #define _MPRINTF_REPLACE /* use our functions only */
  46. #include <curl/mprintf.h>
  47. /* The last #include file should be: */
  48. #include "memdebug.h"
  49. #if !defined(CURL_DISABLE_CRYPTO_AUTH) && !defined(USE_WINDOWS_SSPI)
  50. #define DIGEST_QOP_VALUE_AUTH (1 << 0)
  51. #define DIGEST_QOP_VALUE_AUTH_INT (1 << 1)
  52. #define DIGEST_QOP_VALUE_AUTH_CONF (1 << 2)
  53. #define DIGEST_QOP_VALUE_STRING_AUTH "auth"
  54. #define DIGEST_QOP_VALUE_STRING_AUTH_INT "auth-int"
  55. #define DIGEST_QOP_VALUE_STRING_AUTH_CONF "auth-conf"
  56. /* Retrieves the value for a corresponding key from the challenge string
  57. * returns TRUE if the key could be found, FALSE if it does not exists
  58. */
  59. static bool sasl_digest_get_key_value(const char *chlg,
  60. const char *key,
  61. char *value,
  62. size_t max_val_len,
  63. char end_char)
  64. {
  65. char *find_pos;
  66. size_t i;
  67. find_pos = strstr(chlg, key);
  68. if(!find_pos)
  69. return FALSE;
  70. find_pos += strlen(key);
  71. for(i = 0; *find_pos && *find_pos != end_char && i < max_val_len - 1; ++i)
  72. value[i] = *find_pos++;
  73. value[i] = '\0';
  74. return TRUE;
  75. }
  76. static CURLcode sasl_digest_get_qop_values(const char *options, int *value)
  77. {
  78. char *tmp;
  79. char *token;
  80. char *tok_buf;
  81. /* Initialise the output */
  82. *value = 0;
  83. /* Tokenise the list of qop values. Use a temporary clone of the buffer since
  84. strtok_r() ruins it. */
  85. tmp = strdup(options);
  86. if(!tmp)
  87. return CURLE_OUT_OF_MEMORY;
  88. token = strtok_r(tmp, ",", &tok_buf);
  89. while(token != NULL) {
  90. if(Curl_raw_equal(token, DIGEST_QOP_VALUE_STRING_AUTH))
  91. *value |= DIGEST_QOP_VALUE_AUTH;
  92. else if(Curl_raw_equal(token, DIGEST_QOP_VALUE_STRING_AUTH_INT))
  93. *value |= DIGEST_QOP_VALUE_AUTH_INT;
  94. else if(Curl_raw_equal(token, DIGEST_QOP_VALUE_STRING_AUTH_CONF))
  95. *value |= DIGEST_QOP_VALUE_AUTH_CONF;
  96. token = strtok_r(NULL, ",", &tok_buf);
  97. }
  98. Curl_safefree(tmp);
  99. return CURLE_OK;
  100. }
  101. #endif
  102. /*
  103. * Curl_sasl_create_plain_message()
  104. *
  105. * This is used to generate an already encoded PLAIN message ready
  106. * for sending to the recipient.
  107. *
  108. * Parameters:
  109. *
  110. * data [in] - The session handle.
  111. * userp [in] - The user name.
  112. * passdwp [in] - The user's password.
  113. * outptr [in/out] - The address where a pointer to newly allocated memory
  114. * holding the result will be stored upon completion.
  115. * outlen [out] - The length of the output message.
  116. *
  117. * Returns CURLE_OK on success.
  118. */
  119. CURLcode Curl_sasl_create_plain_message(struct SessionHandle *data,
  120. const char *userp,
  121. const char *passwdp,
  122. char **outptr, size_t *outlen)
  123. {
  124. CURLcode result;
  125. char *plainauth;
  126. size_t ulen;
  127. size_t plen;
  128. ulen = strlen(userp);
  129. plen = strlen(passwdp);
  130. plainauth = malloc(2 * ulen + plen + 2);
  131. if(!plainauth) {
  132. *outlen = 0;
  133. *outptr = NULL;
  134. return CURLE_OUT_OF_MEMORY;
  135. }
  136. /* Calculate the reply */
  137. memcpy(plainauth, userp, ulen);
  138. plainauth[ulen] = '\0';
  139. memcpy(plainauth + ulen + 1, userp, ulen);
  140. plainauth[2 * ulen + 1] = '\0';
  141. memcpy(plainauth + 2 * ulen + 2, passwdp, plen);
  142. /* Base64 encode the reply */
  143. result = Curl_base64_encode(data, plainauth, 2 * ulen + plen + 2, outptr,
  144. outlen);
  145. Curl_safefree(plainauth);
  146. return result;
  147. }
  148. /*
  149. * Curl_sasl_create_login_message()
  150. *
  151. * This is used to generate an already encoded LOGIN message containing the
  152. * user name or password ready for sending to the recipient.
  153. *
  154. * Parameters:
  155. *
  156. * data [in] - The session handle.
  157. * valuep [in] - The user name or user's password.
  158. * outptr [in/out] - The address where a pointer to newly allocated memory
  159. * holding the result will be stored upon completion.
  160. * outlen [out] - The length of the output message.
  161. *
  162. * Returns CURLE_OK on success.
  163. */
  164. CURLcode Curl_sasl_create_login_message(struct SessionHandle *data,
  165. const char *valuep, char **outptr,
  166. size_t *outlen)
  167. {
  168. size_t vlen = strlen(valuep);
  169. if(!vlen) {
  170. /* Calculate an empty reply */
  171. *outptr = strdup("=");
  172. if(*outptr) {
  173. *outlen = (size_t) 1;
  174. return CURLE_OK;
  175. }
  176. *outlen = 0;
  177. return CURLE_OUT_OF_MEMORY;
  178. }
  179. /* Base64 encode the value */
  180. return Curl_base64_encode(data, valuep, vlen, outptr, outlen);
  181. }
  182. #ifndef CURL_DISABLE_CRYPTO_AUTH
  183. /*
  184. * Curl_sasl_decode_cram_md5_message()
  185. *
  186. * This is used to decode an already encoded CRAM-MD5 challenge message.
  187. *
  188. * Parameters:
  189. *
  190. * chlg64 [in] - Pointer to the base64 encoded challenge message.
  191. * outptr [in/out] - The address where a pointer to newly allocated memory
  192. * holding the result will be stored upon completion.
  193. * outlen [out] - The length of the output message.
  194. *
  195. * Returns CURLE_OK on success.
  196. */
  197. CURLcode Curl_sasl_decode_cram_md5_message(const char *chlg64, char **outptr,
  198. size_t *outlen)
  199. {
  200. CURLcode result = CURLE_OK;
  201. size_t chlg64len = strlen(chlg64);
  202. *outptr = NULL;
  203. *outlen = 0;
  204. /* Decode the challenge if necessary */
  205. if(chlg64len && *chlg64 != '=')
  206. result = Curl_base64_decode(chlg64, (unsigned char **) outptr, outlen);
  207. return result;
  208. }
  209. /*
  210. * Curl_sasl_create_cram_md5_message()
  211. *
  212. * This is used to generate an already encoded CRAM-MD5 response message ready
  213. * for sending to the recipient.
  214. *
  215. * Parameters:
  216. *
  217. * data [in] - The session handle.
  218. * chlg [in] - The challenge.
  219. * userp [in] - The user name.
  220. * passdwp [in] - The user's password.
  221. * outptr [in/out] - The address where a pointer to newly allocated memory
  222. * holding the result will be stored upon completion.
  223. * outlen [out] - The length of the output message.
  224. *
  225. * Returns CURLE_OK on success.
  226. */
  227. CURLcode Curl_sasl_create_cram_md5_message(struct SessionHandle *data,
  228. const char *chlg,
  229. const char *userp,
  230. const char *passwdp,
  231. char **outptr, size_t *outlen)
  232. {
  233. CURLcode result = CURLE_OK;
  234. size_t chlglen = 0;
  235. HMAC_context *ctxt;
  236. unsigned char digest[MD5_DIGEST_LEN];
  237. char *response;
  238. if(chlg)
  239. chlglen = strlen(chlg);
  240. /* Compute the digest using the password as the key */
  241. ctxt = Curl_HMAC_init(Curl_HMAC_MD5,
  242. (const unsigned char *) passwdp,
  243. curlx_uztoui(strlen(passwdp)));
  244. if(!ctxt)
  245. return CURLE_OUT_OF_MEMORY;
  246. /* Update the digest with the given challenge */
  247. if(chlglen > 0)
  248. Curl_HMAC_update(ctxt, (const unsigned char *) chlg,
  249. curlx_uztoui(chlglen));
  250. /* Finalise the digest */
  251. Curl_HMAC_final(ctxt, digest);
  252. /* Generate the response */
  253. response = aprintf(
  254. "%s %02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x",
  255. userp, digest[0], digest[1], digest[2], digest[3], digest[4],
  256. digest[5], digest[6], digest[7], digest[8], digest[9], digest[10],
  257. digest[11], digest[12], digest[13], digest[14], digest[15]);
  258. if(!response)
  259. return CURLE_OUT_OF_MEMORY;
  260. /* Base64 encode the response */
  261. result = Curl_base64_encode(data, response, 0, outptr, outlen);
  262. Curl_safefree(response);
  263. return result;
  264. }
  265. #ifndef USE_WINDOWS_SSPI
  266. /*
  267. * sasl_decode_digest_md5_message()
  268. *
  269. * This is used internally to decode an already encoded DIGEST-MD5 challenge
  270. * message into the seperate attributes.
  271. *
  272. * Parameters:
  273. *
  274. * chlg64 [in] - Pointer to the base64 encoded challenge message.
  275. * nonce [in/out] - The buffer where the nonce will be stored.
  276. * nlen [in] - The length of the nonce buffer.
  277. * realm [in/out] - The buffer where the realm will be stored.
  278. * rlen [in] - The length of the realm buffer.
  279. * alg [in/out] - The buffer where the algorithm will be stored.
  280. * alen [in] - The length of the algorithm buffer.
  281. * qop [in/out] - The buffer where the qop-options will be stored.
  282. * qlen [in] - The length of the qop buffer.
  283. *
  284. * Returns CURLE_OK on success.
  285. */
  286. static CURLcode sasl_decode_digest_md5_message(const char *chlg64,
  287. char *nonce, size_t nlen,
  288. char *realm, size_t rlen,
  289. char *alg, size_t alen,
  290. char *qop, size_t qlen)
  291. {
  292. CURLcode result = CURLE_OK;
  293. unsigned char *chlg = NULL;
  294. size_t chlglen = 0;
  295. size_t chlg64len = strlen(chlg64);
  296. /* Decode the base-64 encoded challenge message */
  297. if(chlg64len && *chlg64 != '=') {
  298. result = Curl_base64_decode(chlg64, &chlg, &chlglen);
  299. if(result)
  300. return result;
  301. }
  302. /* Ensure we have a valid challenge message */
  303. if(!chlg)
  304. return CURLE_BAD_CONTENT_ENCODING;
  305. /* Retrieve nonce string from the challenge */
  306. if(!sasl_digest_get_key_value((char *)chlg, "nonce=\"", nonce, nlen, '\"')) {
  307. Curl_safefree(chlg);
  308. return CURLE_BAD_CONTENT_ENCODING;
  309. }
  310. /* Retrieve realm string from the challenge */
  311. if(!sasl_digest_get_key_value((char *)chlg, "realm=\"", realm, rlen, '\"')) {
  312. /* Challenge does not have a realm, set empty string [RFC2831] page 6 */
  313. strcpy(realm, "");
  314. }
  315. /* Retrieve algorithm string from the challenge */
  316. if(!sasl_digest_get_key_value((char *)chlg, "algorithm=", alg, alen, ',')) {
  317. Curl_safefree(chlg);
  318. return CURLE_BAD_CONTENT_ENCODING;
  319. }
  320. /* Retrieve qop-options string from the challenge */
  321. if(!sasl_digest_get_key_value((char *)chlg, "qop=\"", qop, qlen, '\"')) {
  322. Curl_safefree(chlg);
  323. return CURLE_BAD_CONTENT_ENCODING;
  324. }
  325. Curl_safefree(chlg);
  326. return CURLE_OK;
  327. }
  328. /*
  329. * Curl_sasl_create_digest_md5_message()
  330. *
  331. * This is used to generate an already encoded DIGEST-MD5 response message
  332. * ready for sending to the recipient.
  333. *
  334. * Parameters:
  335. *
  336. * data [in] - The session handle.
  337. * chlg64 [in] - Pointer to the base64 encoded challenge message.
  338. * userp [in] - The user name.
  339. * passdwp [in] - The user's password.
  340. * service [in] - The service type such as www, smtp, pop or imap.
  341. * outptr [in/out] - The address where a pointer to newly allocated memory
  342. * holding the result will be stored upon completion.
  343. * outlen [out] - The length of the output message.
  344. *
  345. * Returns CURLE_OK on success.
  346. */
  347. CURLcode Curl_sasl_create_digest_md5_message(struct SessionHandle *data,
  348. const char *chlg64,
  349. const char *userp,
  350. const char *passwdp,
  351. const char *service,
  352. char **outptr, size_t *outlen)
  353. {
  354. CURLcode result = CURLE_OK;
  355. size_t i;
  356. MD5_context *ctxt;
  357. char *response = NULL;
  358. unsigned char digest[MD5_DIGEST_LEN];
  359. char HA1_hex[2 * MD5_DIGEST_LEN + 1];
  360. char HA2_hex[2 * MD5_DIGEST_LEN + 1];
  361. char resp_hash_hex[2 * MD5_DIGEST_LEN + 1];
  362. char nonce[64];
  363. char realm[128];
  364. char algorithm[64];
  365. char qop_options[64];
  366. int qop_values;
  367. char cnonce[33];
  368. unsigned int entropy[4];
  369. char nonceCount[] = "00000001";
  370. char method[] = "AUTHENTICATE";
  371. char qop[] = DIGEST_QOP_VALUE_STRING_AUTH;
  372. char uri[128];
  373. /* Decode the challange message */
  374. result = sasl_decode_digest_md5_message(chlg64, nonce, sizeof(nonce),
  375. realm, sizeof(realm),
  376. algorithm, sizeof(algorithm),
  377. qop_options, sizeof(qop_options));
  378. if(result)
  379. return result;
  380. /* We only support md5 sessions */
  381. if(strcmp(algorithm, "md5-sess") != 0)
  382. return CURLE_BAD_CONTENT_ENCODING;
  383. /* Get the qop-values from the qop-options */
  384. result = sasl_digest_get_qop_values(qop_options, &qop_values);
  385. if(result)
  386. return result;
  387. /* We only support auth quality-of-protection */
  388. if(!(qop_values & DIGEST_QOP_VALUE_AUTH))
  389. return CURLE_BAD_CONTENT_ENCODING;
  390. /* Generate 16 bytes of random data */
  391. entropy[0] = Curl_rand(data);
  392. entropy[1] = Curl_rand(data);
  393. entropy[2] = Curl_rand(data);
  394. entropy[3] = Curl_rand(data);
  395. /* Convert the random data into a 32 byte hex string */
  396. snprintf(cnonce, sizeof(cnonce), "%08x%08x%08x%08x",
  397. entropy[0], entropy[1], entropy[2], entropy[3]);
  398. /* So far so good, now calculate A1 and H(A1) according to RFC 2831 */
  399. ctxt = Curl_MD5_init(Curl_DIGEST_MD5);
  400. if(!ctxt)
  401. return CURLE_OUT_OF_MEMORY;
  402. Curl_MD5_update(ctxt, (const unsigned char *) userp,
  403. curlx_uztoui(strlen(userp)));
  404. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  405. Curl_MD5_update(ctxt, (const unsigned char *) realm,
  406. curlx_uztoui(strlen(realm)));
  407. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  408. Curl_MD5_update(ctxt, (const unsigned char *) passwdp,
  409. curlx_uztoui(strlen(passwdp)));
  410. Curl_MD5_final(ctxt, digest);
  411. ctxt = Curl_MD5_init(Curl_DIGEST_MD5);
  412. if(!ctxt)
  413. return CURLE_OUT_OF_MEMORY;
  414. Curl_MD5_update(ctxt, (const unsigned char *) digest, MD5_DIGEST_LEN);
  415. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  416. Curl_MD5_update(ctxt, (const unsigned char *) nonce,
  417. curlx_uztoui(strlen(nonce)));
  418. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  419. Curl_MD5_update(ctxt, (const unsigned char *) cnonce,
  420. curlx_uztoui(strlen(cnonce)));
  421. Curl_MD5_final(ctxt, digest);
  422. /* Convert calculated 16 octet hex into 32 bytes string */
  423. for(i = 0; i < MD5_DIGEST_LEN; i++)
  424. snprintf(&HA1_hex[2 * i], 3, "%02x", digest[i]);
  425. /* Prepare the URL string */
  426. snprintf(uri, sizeof(uri), "%s/%s", service, realm);
  427. /* Calculate H(A2) */
  428. ctxt = Curl_MD5_init(Curl_DIGEST_MD5);
  429. if(!ctxt)
  430. return CURLE_OUT_OF_MEMORY;
  431. Curl_MD5_update(ctxt, (const unsigned char *) method,
  432. curlx_uztoui(strlen(method)));
  433. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  434. Curl_MD5_update(ctxt, (const unsigned char *) uri,
  435. curlx_uztoui(strlen(uri)));
  436. Curl_MD5_final(ctxt, digest);
  437. for(i = 0; i < MD5_DIGEST_LEN; i++)
  438. snprintf(&HA2_hex[2 * i], 3, "%02x", digest[i]);
  439. /* Now calculate the response hash */
  440. ctxt = Curl_MD5_init(Curl_DIGEST_MD5);
  441. if(!ctxt)
  442. return CURLE_OUT_OF_MEMORY;
  443. Curl_MD5_update(ctxt, (const unsigned char *) HA1_hex, 2 * MD5_DIGEST_LEN);
  444. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  445. Curl_MD5_update(ctxt, (const unsigned char *) nonce,
  446. curlx_uztoui(strlen(nonce)));
  447. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  448. Curl_MD5_update(ctxt, (const unsigned char *) nonceCount,
  449. curlx_uztoui(strlen(nonceCount)));
  450. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  451. Curl_MD5_update(ctxt, (const unsigned char *) cnonce,
  452. curlx_uztoui(strlen(cnonce)));
  453. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  454. Curl_MD5_update(ctxt, (const unsigned char *) qop,
  455. curlx_uztoui(strlen(qop)));
  456. Curl_MD5_update(ctxt, (const unsigned char *) ":", 1);
  457. Curl_MD5_update(ctxt, (const unsigned char *) HA2_hex, 2 * MD5_DIGEST_LEN);
  458. Curl_MD5_final(ctxt, digest);
  459. for(i = 0; i < MD5_DIGEST_LEN; i++)
  460. snprintf(&resp_hash_hex[2 * i], 3, "%02x", digest[i]);
  461. /* Generate the response */
  462. response = aprintf("username=\"%s\",realm=\"%s\",nonce=\"%s\","
  463. "cnonce=\"%s\",nc=\"%s\",digest-uri=\"%s\",response=%s,"
  464. "qop=%s",
  465. userp, realm, nonce,
  466. cnonce, nonceCount, uri, resp_hash_hex, qop);
  467. if(!response)
  468. return CURLE_OUT_OF_MEMORY;
  469. /* Base64 encode the response */
  470. result = Curl_base64_encode(data, response, 0, outptr, outlen);
  471. free(response);
  472. return result;
  473. }
  474. #endif /* USE_WINDOWS_SSPI */
  475. #endif /* CURL_DISABLE_CRYPTO_AUTH */
  476. #ifdef USE_NTLM
  477. /*
  478. * Curl_sasl_create_ntlm_type1_message()
  479. *
  480. * This is used to generate an already encoded NTLM type-1 message ready for
  481. * sending to the recipient.
  482. *
  483. * Note: This is a simple wrapper of the NTLM function which means that any
  484. * SASL based protocols don't have to include the NTLM functions directly.
  485. *
  486. * Parameters:
  487. *
  488. * userp [in] - The user name in the format User or Domain\User.
  489. * passdwp [in] - The user's password.
  490. * ntlm [in/out] - The ntlm data struct being used and modified.
  491. * outptr [in/out] - The address where a pointer to newly allocated memory
  492. * holding the result will be stored upon completion.
  493. * outlen [out] - The length of the output message.
  494. *
  495. * Returns CURLE_OK on success.
  496. */
  497. CURLcode Curl_sasl_create_ntlm_type1_message(const char *userp,
  498. const char *passwdp,
  499. struct ntlmdata *ntlm,
  500. char **outptr, size_t *outlen)
  501. {
  502. return Curl_ntlm_create_type1_message(userp, passwdp, ntlm, outptr, outlen);
  503. }
  504. /*
  505. * Curl_sasl_decode_ntlm_type2_message()
  506. *
  507. * This is used to decode an already encoded NTLM type-2 message.
  508. *
  509. * Parameters:
  510. *
  511. * data [in] - Pointer to session handle.
  512. * type2msg [in] - Pointer to the base64 encoded type-2 message.
  513. * ntlm [in/out] - The ntlm data struct being used and modified.
  514. *
  515. * Returns CURLE_OK on success.
  516. */
  517. CURLcode Curl_sasl_decode_ntlm_type2_message(struct SessionHandle *data,
  518. const char *type2msg,
  519. struct ntlmdata *ntlm)
  520. {
  521. #ifdef USE_NSS
  522. CURLcode result;
  523. /* make sure the crypto backend is initialized */
  524. result = Curl_nss_force_init(data);
  525. if(result)
  526. return result;
  527. #endif
  528. return Curl_ntlm_decode_type2_message(data, type2msg, ntlm);
  529. }
  530. /*
  531. * Curl_sasl_create_ntlm_type3_message()
  532. *
  533. * This is used to generate an already encoded NTLM type-3 message ready for
  534. * sending to the recipient.
  535. *
  536. * Parameters:
  537. *
  538. * data [in] - Pointer to session handle.
  539. * userp [in] - The user name in the format User or Domain\User.
  540. * passdwp [in] - The user's password.
  541. * ntlm [in/out] - The ntlm data struct being used and modified.
  542. * outptr [in/out] - The address where a pointer to newly allocated memory
  543. * holding the result will be stored upon completion.
  544. * outlen [out] - The length of the output message.
  545. *
  546. * Returns CURLE_OK on success.
  547. */
  548. CURLcode Curl_sasl_create_ntlm_type3_message(struct SessionHandle *data,
  549. const char *userp,
  550. const char *passwdp,
  551. struct ntlmdata *ntlm,
  552. char **outptr, size_t *outlen)
  553. {
  554. return Curl_ntlm_create_type3_message(data, userp, passwdp, ntlm, outptr,
  555. outlen);
  556. }
  557. #endif /* USE_NTLM */
  558. /*
  559. * Curl_sasl_create_xoauth2_message()
  560. *
  561. * This is used to generate an already encoded OAuth 2.0 message ready for
  562. * sending to the recipient.
  563. *
  564. * Parameters:
  565. *
  566. * data [in] - The session handle.
  567. * user [in] - The user name.
  568. * bearer [in] - The bearer token.
  569. * outptr [in/out] - The address where a pointer to newly allocated memory
  570. * holding the result will be stored upon completion.
  571. * outlen [out] - The length of the output message.
  572. *
  573. * Returns CURLE_OK on success.
  574. */
  575. CURLcode Curl_sasl_create_xoauth2_message(struct SessionHandle *data,
  576. const char *user,
  577. const char *bearer,
  578. char **outptr, size_t *outlen)
  579. {
  580. CURLcode result = CURLE_OK;
  581. char *xoauth = NULL;
  582. /* Generate the message */
  583. xoauth = aprintf("user=%s\1auth=Bearer %s\1\1", user, bearer);
  584. if(!xoauth)
  585. return CURLE_OUT_OF_MEMORY;
  586. /* Base64 encode the reply */
  587. result = Curl_base64_encode(data, xoauth, strlen(xoauth), outptr, outlen);
  588. Curl_safefree(xoauth);
  589. return result;
  590. }
  591. /*
  592. * Curl_sasl_cleanup()
  593. *
  594. * This is used to cleanup any libraries or curl modules used by the sasl
  595. * functions.
  596. *
  597. * Parameters:
  598. *
  599. * conn [in] - Pointer to the connection data.
  600. * authused [in] - The authentication mechanism used.
  601. */
  602. void Curl_sasl_cleanup(struct connectdata *conn, unsigned int authused)
  603. {
  604. #ifdef USE_NTLM
  605. /* Cleanup the ntlm structure */
  606. if(authused == SASL_MECH_NTLM) {
  607. Curl_ntlm_sspi_cleanup(&conn->ntlm);
  608. }
  609. (void)conn;
  610. #else
  611. /* Reserved for future use */
  612. (void)conn;
  613. (void)authused;
  614. #endif
  615. }