237 lines
9.9 KiB
C
Raw Normal View History

2016-09-11 17:22:32 +02:00
#ifndef HEADER_CURL_VAUTH_H
#define HEADER_CURL_VAUTH_H
/***************************************************************************
* _ _ ____ _
* Project ___| | | | _ \| |
* / __| | | | |_) | |
* | (__| |_| | _ <| |___
* \___|\___/|_| \_\_____|
*
2023-07-02 19:51:09 +02:00
* Copyright (C) Steve Holme, <steve_holme@hotmail.com>.
2016-09-11 17:22:32 +02:00
*
* This software is licensed as described in the file COPYING, which
* you should have received as part of this distribution. The terms
2021-09-14 00:13:48 +02:00
* are also available at https://curl.se/docs/copyright.html.
2016-09-11 17:22:32 +02:00
*
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
* copies of the Software, and permit persons to whom the Software is
* furnished to do so, under the terms of the COPYING file.
*
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
* KIND, either express or implied.
*
2022-11-16 20:14:03 +01:00
* SPDX-License-Identifier: curl
*
2016-09-11 17:22:32 +02:00
***************************************************************************/
#include <curl/curl.h>
2021-09-14 00:13:48 +02:00
#include "bufref.h"
2016-09-11 17:22:32 +02:00
struct Curl_easy;
2023-12-07 09:12:54 +01:00
#if !defined(CURL_DISABLE_DIGEST_AUTH)
2016-09-11 17:22:32 +02:00
struct digestdata;
#endif
#if defined(USE_NTLM)
struct ntlmdata;
#endif
#if defined(USE_KERBEROS5)
struct kerberos5data;
#endif
#if (defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)) && defined(USE_SPNEGO)
struct negotiatedata;
#endif
2021-09-14 00:13:48 +02:00
#if defined(USE_GSASL)
struct gsasldata;
#endif
2016-09-11 17:22:32 +02:00
#if defined(USE_WINDOWS_SSPI)
2020-08-30 11:54:41 +02:00
#define GSS_ERROR(status) ((status) & 0x80000000)
2016-09-11 17:22:32 +02:00
#endif
2022-11-16 20:14:03 +01:00
/*
* Curl_auth_allowed_to_host() tells if authentication, cookies or other
* "sensitive data" can (still) be sent to this host.
*/
bool Curl_auth_allowed_to_host(struct Curl_easy *data);
2016-09-11 17:22:32 +02:00
/* This is used to build a SPN string */
#if !defined(USE_WINDOWS_SSPI)
char *Curl_auth_build_spn(const char *service, const char *host,
const char *realm);
#else
TCHAR *Curl_auth_build_spn(const char *service, const char *host,
const char *realm);
#endif
2017-04-14 19:02:05 +02:00
/* This is used to test if the user contains a Windows domain name */
bool Curl_auth_user_contains_domain(const char *user);
2021-09-14 00:13:48 +02:00
/* This is used to generate a PLAIN cleartext message */
CURLcode Curl_auth_create_plain_message(const char *authzid,
2019-11-11 23:01:05 +01:00
const char *authcid,
const char *passwd,
2021-09-14 00:13:48 +02:00
struct bufref *out);
2016-09-11 17:22:32 +02:00
2021-09-14 00:13:48 +02:00
/* This is used to generate a LOGIN cleartext message */
2024-07-09 14:46:46 +02:00
void Curl_auth_create_login_message(const char *value, struct bufref *out);
2016-09-11 17:22:32 +02:00
2021-09-14 00:13:48 +02:00
/* This is used to generate an EXTERNAL cleartext message */
2024-07-09 14:46:46 +02:00
void Curl_auth_create_external_message(const char *user, struct bufref *out);
2016-09-11 17:22:32 +02:00
2023-12-07 09:12:54 +01:00
#ifndef CURL_DISABLE_DIGEST_AUTH
2016-09-11 17:22:32 +02:00
/* This is used to generate a CRAM-MD5 response message */
2021-09-14 00:13:48 +02:00
CURLcode Curl_auth_create_cram_md5_message(const struct bufref *chlg,
2016-09-11 17:22:32 +02:00
const char *userp,
const char *passwdp,
2021-09-14 00:13:48 +02:00
struct bufref *out);
2016-09-11 17:22:32 +02:00
2017-04-14 19:02:05 +02:00
/* This is used to evaluate if DIGEST is supported */
bool Curl_auth_is_digest_supported(void);
2016-09-11 17:22:32 +02:00
/* This is used to generate a base64 encoded DIGEST-MD5 response message */
CURLcode Curl_auth_create_digest_md5_message(struct Curl_easy *data,
2021-09-14 00:13:48 +02:00
const struct bufref *chlg,
2016-09-11 17:22:32 +02:00
const char *userp,
const char *passwdp,
const char *service,
2021-09-14 00:13:48 +02:00
struct bufref *out);
2016-09-11 17:22:32 +02:00
2023-05-23 16:38:00 +02:00
/* This is used to decode an HTTP DIGEST challenge message */
2016-09-11 17:22:32 +02:00
CURLcode Curl_auth_decode_digest_http_message(const char *chlg,
struct digestdata *digest);
2023-05-23 16:38:00 +02:00
/* This is used to generate an HTTP DIGEST response message */
2016-09-11 17:22:32 +02:00
CURLcode Curl_auth_create_digest_http_message(struct Curl_easy *data,
const char *userp,
const char *passwdp,
const unsigned char *request,
const unsigned char *uri,
struct digestdata *digest,
char **outptr, size_t *outlen);
/* This is used to clean up the digest specific data */
void Curl_auth_digest_cleanup(struct digestdata *digest);
2023-12-07 09:12:54 +01:00
#endif /* !CURL_DISABLE_DIGEST_AUTH */
2016-09-11 17:22:32 +02:00
2021-09-14 00:13:48 +02:00
#ifdef USE_GSASL
/* This is used to evaluate if MECH is supported by gsasl */
bool Curl_auth_gsasl_is_supported(struct Curl_easy *data,
const char *mech,
struct gsasldata *gsasl);
/* This is used to start a gsasl method */
CURLcode Curl_auth_gsasl_start(struct Curl_easy *data,
const char *userp,
const char *passwdp,
struct gsasldata *gsasl);
/* This is used to process and generate a new SASL token */
CURLcode Curl_auth_gsasl_token(struct Curl_easy *data,
const struct bufref *chlg,
struct gsasldata *gsasl,
struct bufref *out);
/* This is used to clean up the gsasl specific data */
void Curl_auth_gsasl_cleanup(struct gsasldata *digest);
#endif
2016-09-11 17:22:32 +02:00
#if defined(USE_NTLM)
2017-04-14 19:02:05 +02:00
/* This is used to evaluate if NTLM is supported */
bool Curl_auth_is_ntlm_supported(void);
2016-09-11 17:22:32 +02:00
/* This is used to generate a base64 encoded NTLM type-1 message */
2018-01-26 17:06:56 +01:00
CURLcode Curl_auth_create_ntlm_type1_message(struct Curl_easy *data,
const char *userp,
2016-09-11 17:22:32 +02:00
const char *passwdp,
2018-08-09 18:06:22 +02:00
const char *service,
const char *host,
2016-09-11 17:22:32 +02:00
struct ntlmdata *ntlm,
2021-09-14 00:13:48 +02:00
struct bufref *out);
2016-09-11 17:22:32 +02:00
/* This is used to decode a base64 encoded NTLM type-2 message */
CURLcode Curl_auth_decode_ntlm_type2_message(struct Curl_easy *data,
2021-09-14 00:13:48 +02:00
const struct bufref *type2,
2016-09-11 17:22:32 +02:00
struct ntlmdata *ntlm);
/* This is used to generate a base64 encoded NTLM type-3 message */
CURLcode Curl_auth_create_ntlm_type3_message(struct Curl_easy *data,
const char *userp,
const char *passwdp,
struct ntlmdata *ntlm,
2021-09-14 00:13:48 +02:00
struct bufref *out);
2016-09-11 17:22:32 +02:00
/* This is used to clean up the NTLM specific data */
2019-11-11 23:01:05 +01:00
void Curl_auth_cleanup_ntlm(struct ntlmdata *ntlm);
2016-09-11 17:22:32 +02:00
#endif /* USE_NTLM */
/* This is used to generate a base64 encoded OAuth 2.0 message */
2021-09-14 00:13:48 +02:00
CURLcode Curl_auth_create_oauth_bearer_message(const char *user,
2016-09-11 17:22:32 +02:00
const char *host,
const long port,
const char *bearer,
2021-09-14 00:13:48 +02:00
struct bufref *out);
2019-11-11 23:01:05 +01:00
/* This is used to generate a base64 encoded XOAuth 2.0 message */
2021-09-14 00:13:48 +02:00
CURLcode Curl_auth_create_xoauth_bearer_message(const char *user,
2019-11-11 23:01:05 +01:00
const char *bearer,
2021-09-14 00:13:48 +02:00
struct bufref *out);
2019-11-11 23:01:05 +01:00
2016-09-11 17:22:32 +02:00
#if defined(USE_KERBEROS5)
2017-04-14 19:02:05 +02:00
/* This is used to evaluate if GSSAPI (Kerberos V5) is supported */
bool Curl_auth_is_gssapi_supported(void);
2016-09-11 17:22:32 +02:00
/* This is used to generate a base64 encoded GSSAPI (Kerberos V5) user token
message */
CURLcode Curl_auth_create_gssapi_user_message(struct Curl_easy *data,
const char *userp,
const char *passwdp,
const char *service,
const char *host,
const bool mutual,
2021-09-14 00:13:48 +02:00
const struct bufref *chlg,
2016-09-11 17:22:32 +02:00
struct kerberos5data *krb5,
2021-09-14 00:13:48 +02:00
struct bufref *out);
2016-09-11 17:22:32 +02:00
/* This is used to generate a base64 encoded GSSAPI (Kerberos V5) security
token message */
CURLcode Curl_auth_create_gssapi_security_message(struct Curl_easy *data,
2021-11-20 13:41:27 +01:00
const char *authzid,
2021-09-14 00:13:48 +02:00
const struct bufref *chlg,
2016-09-11 17:22:32 +02:00
struct kerberos5data *krb5,
2021-09-14 00:13:48 +02:00
struct bufref *out);
2016-09-11 17:22:32 +02:00
/* This is used to clean up the GSSAPI specific data */
2019-11-11 23:01:05 +01:00
void Curl_auth_cleanup_gssapi(struct kerberos5data *krb5);
2016-09-11 17:22:32 +02:00
#endif /* USE_KERBEROS5 */
#if defined(USE_SPNEGO)
2017-04-14 19:02:05 +02:00
/* This is used to evaluate if SPNEGO (Negotiate) is supported */
bool Curl_auth_is_spnego_supported(void);
2016-09-11 17:22:32 +02:00
/* This is used to decode a base64 encoded SPNEGO (Negotiate) challenge
message */
CURLcode Curl_auth_decode_spnego_message(struct Curl_easy *data,
const char *user,
2023-07-02 19:51:09 +02:00
const char *password,
2016-09-11 17:22:32 +02:00
const char *service,
const char *host,
const char *chlg64,
struct negotiatedata *nego);
/* This is used to generate a base64 encoded SPNEGO (Negotiate) response
message */
2022-08-04 22:12:04 +02:00
CURLcode Curl_auth_create_spnego_message(struct negotiatedata *nego,
2016-09-11 17:22:32 +02:00
char **outptr, size_t *outlen);
2022-11-16 20:14:03 +01:00
/* This is used to clean up the SPNEGO specific data */
2019-11-11 23:01:05 +01:00
void Curl_auth_cleanup_spnego(struct negotiatedata *nego);
2016-09-11 17:22:32 +02:00
#endif /* USE_SPNEGO */
#endif /* HEADER_CURL_VAUTH_H */