1 #ifndef HEADER_CURL_SASL_H 2 #define HEADER_CURL_SASL_H 3 /*************************************************************************** 4 * _ _ ____ _ 5 * Project ___| | | | _ \| | 6 * / __| | | | |_) | | 7 * | (__| |_| | _ <| |___ 8 * \___|\___/|_| \_\_____| 9 * 10 * Copyright (C) 2012 - 2015, Daniel Stenberg, <daniel (at) haxx.se>, et al. 11 * 12 * This software is licensed as described in the file COPYING, which 13 * you should have received as part of this distribution. The terms 14 * are also available at http://curl.haxx.se/docs/copyright.html. 15 * 16 * You may opt to use, copy, modify, merge, publish, distribute and/or sell 17 * copies of the Software, and permit persons to whom the Software is 18 * furnished to do so, under the terms of the COPYING file. 19 * 20 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY 21 * KIND, either express or implied. 22 * 23 ***************************************************************************/ 24 25 #include <curl/curl.h> 26 27 struct SessionHandle; 28 struct connectdata; 29 30 #if !defined(CURL_DISABLE_CRYPTO_AUTH) 31 struct digestdata; 32 #endif 33 34 #if defined(USE_NTLM) 35 struct ntlmdata; 36 #endif 37 38 #if defined(USE_KERBEROS5) 39 struct kerberos5data; 40 #endif 41 42 /* Authentication mechanism flags */ 43 #define SASL_MECH_LOGIN (1 << 0) 44 #define SASL_MECH_PLAIN (1 << 1) 45 #define SASL_MECH_CRAM_MD5 (1 << 2) 46 #define SASL_MECH_DIGEST_MD5 (1 << 3) 47 #define SASL_MECH_GSSAPI (1 << 4) 48 #define SASL_MECH_EXTERNAL (1 << 5) 49 #define SASL_MECH_NTLM (1 << 6) 50 #define SASL_MECH_XOAUTH2 (1 << 7) 51 52 /* Authentication mechanism values */ 53 #define SASL_AUTH_NONE 0 54 #define SASL_AUTH_ANY ~0U 55 #define SASL_AUTH_DEFAULT (SASL_AUTH_ANY & \ 56 ~(SASL_MECH_EXTERNAL | SASL_MECH_XOAUTH2)) 57 58 /* Authentication mechanism strings */ 59 #define SASL_MECH_STRING_LOGIN "LOGIN" 60 #define SASL_MECH_STRING_PLAIN "PLAIN" 61 #define SASL_MECH_STRING_CRAM_MD5 "CRAM-MD5" 62 #define SASL_MECH_STRING_DIGEST_MD5 "DIGEST-MD5" 63 #define SASL_MECH_STRING_GSSAPI "GSSAPI" 64 #define SASL_MECH_STRING_EXTERNAL "EXTERNAL" 65 #define SASL_MECH_STRING_NTLM "NTLM" 66 #define SASL_MECH_STRING_XOAUTH2 "XOAUTH2" 67 68 #if !defined(CURL_DISABLE_CRYPTO_AUTH) 69 #define DIGEST_MAX_VALUE_LENGTH 256 70 #define DIGEST_MAX_CONTENT_LENGTH 1024 71 #endif 72 73 enum { 74 CURLDIGESTALGO_MD5, 75 CURLDIGESTALGO_MD5SESS 76 }; 77 78 /* SASL machine states */ 79 typedef enum { 80 SASL_STOP, 81 SASL_PLAIN, 82 SASL_LOGIN, 83 SASL_LOGIN_PASSWD, 84 SASL_EXTERNAL, 85 SASL_CRAMMD5, 86 SASL_DIGESTMD5, 87 SASL_DIGESTMD5_RESP, 88 SASL_NTLM, 89 SASL_NTLM_TYPE2MSG, 90 SASL_GSSAPI, 91 SASL_GSSAPI_TOKEN, 92 SASL_GSSAPI_NO_DATA, 93 SASL_XOAUTH2, 94 SASL_CANCEL, 95 SASL_FINAL 96 } saslstate; 97 98 /* Progress indicator */ 99 typedef enum { 100 SASL_IDLE, 101 SASL_INPROGRESS, 102 SASL_DONE 103 } saslprogress; 104 105 /* Protocol dependent SASL parameters */ 106 struct SASLproto { 107 const char *service; /* The service name */ 108 int contcode; /* Code to receive when continuation is expected */ 109 int finalcode; /* Code to receive upon authentication success */ 110 size_t maxirlen; /* Maximum initial response length */ 111 CURLcode (*sendauth)(struct connectdata *conn, 112 const char *mech, const char *ir); 113 /* Send authentication command */ 114 CURLcode (*sendcont)(struct connectdata *conn, const char *contauth); 115 /* Send authentication continuation */ 116 void (*getmessage)(char *buffer, char **outptr); 117 /* Get SASL response message */ 118 }; 119 120 /* Per-connection parameters */ 121 struct SASL { 122 const struct SASLproto *params; /* Protocol dependent parameters */ 123 saslstate state; /* Current machine state */ 124 unsigned int authmechs; /* Accepted authentication mechanisms */ 125 unsigned int prefmech; /* Preferred authentication mechanism */ 126 unsigned int authused; /* Auth mechanism used for the connection */ 127 bool resetprefs; /* For URL auth option parsing. */ 128 bool mutual_auth; /* Mutual authentication enabled (GSSAPI only) */ 129 bool force_ir; /* Protocol always supports initial response */ 130 }; 131 132 /* This is used to test whether the line starts with the given mechanism */ 133 #define sasl_mech_equal(line, wordlen, mech) \ 134 (wordlen == (sizeof(mech) - 1) / sizeof(char) && \ 135 !memcmp(line, mech, wordlen)) 136 137 /* This is used to build a SPN string */ 138 #if !defined(USE_WINDOWS_SSPI) 139 char *Curl_sasl_build_spn(const char *service, const char *instance); 140 #else 141 TCHAR *Curl_sasl_build_spn(const char *service, const char *instance); 142 #endif 143 144 /* This is used to extract the realm from a challenge message */ 145 int Curl_sasl_digest_get_pair(const char *str, char *value, char *content, 146 const char **endptr); 147 148 #if defined(HAVE_GSSAPI) 149 char *Curl_sasl_build_gssapi_spn(const char *service, const char *host); 150 #endif 151 152 #ifndef CURL_DISABLE_CRYPTO_AUTH 153 154 /* This is used to generate a base64 encoded DIGEST-MD5 response message */ 155 CURLcode Curl_sasl_create_digest_md5_message(struct SessionHandle *data, 156 const char *chlg64, 157 const char *userp, 158 const char *passwdp, 159 const char *service, 160 char **outptr, size_t *outlen); 161 162 /* This is used to decode a HTTP DIGEST challenge message */ 163 CURLcode Curl_sasl_decode_digest_http_message(const char *chlg, 164 struct digestdata *digest); 165 166 /* This is used to generate a HTTP DIGEST response message */ 167 CURLcode Curl_sasl_create_digest_http_message(struct SessionHandle *data, 168 const char *userp, 169 const char *passwdp, 170 const unsigned char *request, 171 const unsigned char *uri, 172 struct digestdata *digest, 173 char **outptr, size_t *outlen); 174 175 /* This is used to clean up the digest specific data */ 176 void Curl_sasl_digest_cleanup(struct digestdata *digest); 177 #endif 178 179 #ifdef USE_NTLM 180 /* This is used to generate a base64 encoded NTLM type-1 message */ 181 CURLcode Curl_sasl_create_ntlm_type1_message(const char *userp, 182 const char *passwdp, 183 struct ntlmdata *ntlm, 184 char **outptr, 185 size_t *outlen); 186 187 /* This is used to decode a base64 encoded NTLM type-2 message */ 188 CURLcode Curl_sasl_decode_ntlm_type2_message(struct SessionHandle *data, 189 const char *type2msg, 190 struct ntlmdata *ntlm); 191 192 /* This is used to generate a base64 encoded NTLM type-3 message */ 193 CURLcode Curl_sasl_create_ntlm_type3_message(struct SessionHandle *data, 194 const char *userp, 195 const char *passwdp, 196 struct ntlmdata *ntlm, 197 char **outptr, size_t *outlen); 198 199 /* This is used to clean up the ntlm specific data */ 200 void Curl_sasl_ntlm_cleanup(struct ntlmdata *ntlm); 201 202 #endif /* USE_NTLM */ 203 204 #if defined(USE_KERBEROS5) 205 /* This is used to generate a base64 encoded GSSAPI (Kerberos V5) user token 206 message */ 207 CURLcode Curl_sasl_create_gssapi_user_message(struct SessionHandle *data, 208 const char *userp, 209 const char *passwdp, 210 const char *service, 211 const bool mutual, 212 const char *chlg64, 213 struct kerberos5data *krb5, 214 char **outptr, size_t *outlen); 215 216 /* This is used to generate a base64 encoded GSSAPI (Kerberos V5) security 217 token message */ 218 CURLcode Curl_sasl_create_gssapi_security_message(struct SessionHandle *data, 219 const char *input, 220 struct kerberos5data *krb5, 221 char **outptr, 222 size_t *outlen); 223 224 /* This is used to clean up the gssapi specific data */ 225 void Curl_sasl_gssapi_cleanup(struct kerberos5data *krb5); 226 #endif /* USE_KERBEROS5 */ 227 228 /* This is used to cleanup any libraries or curl modules used by the sasl 229 functions */ 230 void Curl_sasl_cleanup(struct connectdata *conn, unsigned int authused); 231 232 /* Convert a mechanism name to a token */ 233 unsigned int Curl_sasl_decode_mech(const char *ptr, 234 size_t maxlen, size_t *len); 235 236 /* Parse the URL login options */ 237 CURLcode Curl_sasl_parse_url_auth_option(struct SASL *sasl, 238 const char *value, size_t len); 239 240 /* Initializes an SASL structure */ 241 void Curl_sasl_init(struct SASL *sasl, const struct SASLproto *params); 242 243 /* Check if we have enough auth data and capabilities to authenticate */ 244 bool Curl_sasl_can_authenticate(struct SASL *sasl, struct connectdata *conn); 245 246 /* Calculate the required login details for SASL authentication */ 247 CURLcode Curl_sasl_start(struct SASL *sasl, struct connectdata *conn, 248 bool force_ir, saslprogress *progress); 249 250 /* Continue an SASL authentication */ 251 CURLcode Curl_sasl_continue(struct SASL *sasl, struct connectdata *conn, 252 int code, saslprogress *progress); 253 254 #endif /* HEADER_CURL_SASL_H */ 255