From 4321d72d9ba3e58e4ab05a75dc4beeb16246a392 Mon Sep 17 00:00:00 2001 From: Jeffrey Stedfast Date: Wed, 28 Feb 2001 18:16:02 +0000 Subject: Added camel-sasl*.[c,h] to the build. 2001-02-28 Jeffrey Stedfast * Makefile.am: Added camel-sasl*.[c,h] to the build. * camel-sasl.[c,h]: new "abstract" SASL class * camel-sasl-kerberos4.[c,h]: new SASL class for KERBEROS_V4 * camel-sasl-cram-md5.[c,h]: new SASL class for CRAM-MD5 * camel-sasl-plain.[c,h]: new SASL class for PLAIN * providers/imap/camel-imap-auth.c: Removed the base64 functions. * camel-mime-utils.c (base64_encode_simple): Moved here from camel-imap-auth.c (base64_decode_simple): Same. svn path=/trunk/; revision=8428 --- camel/camel-sasl-kerberos4.c | 262 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 262 insertions(+) create mode 100644 camel/camel-sasl-kerberos4.c (limited to 'camel/camel-sasl-kerberos4.c') diff --git a/camel/camel-sasl-kerberos4.c b/camel/camel-sasl-kerberos4.c new file mode 100644 index 0000000000..28ef780773 --- /dev/null +++ b/camel/camel-sasl-kerberos4.c @@ -0,0 +1,262 @@ +/* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */ +/* + * Authors: Jeffrey Stedfast + * + * Copyright 2001 Ximian, Inc. (www.ximian.com) + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Street #330, Boston, MA 02111-1307, USA. + * + */ + +#include +#include "camel-sasl-kerberos4.h" +#include "camel-mime-utils.h" +#include + + +#ifdef HAVE_KRB4 +#include +/* MIT krb4 des.h #defines _. Sigh. We don't need it. */ +#undef _ +#endif + +#define KERBEROS_V4_PROTECTION_NONE 1 +#define KERBEROS_V4_PROTECTION_INTEGRITY 2 +#define KERBEROS_V4_PROTECTION_PRIVACY 4 + +static CamelSaslClass *parent_class = NULL; + +/* Returns the class for a CamelSaslKerberos4 */ +#define CSK4_CLASS(so) CAMEL_SASL_KERBEROS4_CLASS (CAMEL_OBJECT_GET_CLASS (so)) + +#ifdef HAVE_KRB4 +static GByteArray *krb4_challenge (CamelSasl *sasl, const char *token, CamelException *ex); +#endif + +enum { + STATE_NONCE, + STATE_NONCE_PLUS_ONE, + STATE_FINAL +}; + +struct _CamelSaslKerberos4Private { + int state; + + guint32 nonce_n; + guint32 nonce_h; + guint32 plus1; + +#ifdef HAVE_KRB4 + KTEXT_ST authenticator; + CREDENTIALS credentials; + des_cblock session; + des_key_schedule schedule; +#endif /* HAVE_KRB4 */ +}; + +static void +camel_sasl_kerberos4_class_init (CamelSaslKerberos4Class *camel_sasl_kerberos4_class) +{ +#ifdef HAVE_KRB4 + CamelSaslClass *camel_sasl_class = CAMEL_SASL_CLASS (camel_sasl_kerberos4_class); +#endif + + parent_class = CAMEL_SASL_CLASS (camel_type_get_global_classfuncs (camel_sasl_get_type ())); + + /* virtual method overload */ +#ifdef HAVE_KRB4 + camel_sasl_class->challenge = krb4_challenge; +#endif +} + +static void +camel_sasl_kerberos4_init (gpointer object, gpointer klass) +{ + CamelSaslKerberos4 *sasl_krb4 = CAMEL_SASL_KERBEROS4 (object); + + sasl_krb4->priv = g_new0 (struct _CamelSaslKerberos4Private, 1); +} + +static void +camel_sasl_kerberos4_finalize (CamelObject *object) +{ + CamelSaslKerberos4 *sasl = CAMEL_SASL_KERBEROS4 (object); + + g_free (sasl->protocol); + g_free (sasl->username); + g_free (sasl->priv); +} + + +CamelType +camel_sasl_kerberos4_get_type (void) +{ + static CamelType type = CAMEL_INVALID_TYPE; + + if (type == CAMEL_INVALID_TYPE) { + type = camel_type_register (camel_sasl_get_type (), + "CamelSaslKerberos4", + sizeof (CamelSaslKerberos4), + sizeof (CamelSaslKerberos4Class), + (CamelObjectClassInitFunc) camel_sasl_kerberos4_class_init, + NULL, + (CamelObjectInitFunc) camel_sasl_kerberos4_init, + (CamelObjectFinalizeFunc) camel_sasl_kerberos4_finalize); + } + + return type; +} + +CamelSasl * +camel_sasl_kerberos4_new (const char *protocol, const char *username, struct hostent *host) +{ + CamelSaslKerberos4 *sasl_krb4; + + if (!protocol) return NULL; + if (!username) return NULL; + if (!host) return NULL; + +#ifdef HAVE_KRB4 + sasl_krb4 = CAMEL_SASL_KERBEROS4 (camel_object_new (camel_sasl_kerberos4_get_type ())); + sasl_krb4->protocol = g_strdup (protocol); + g_strdown (sasl_krb4->protocol); + sasl_krb4->username = g_strdup (username); + sasl_krb4->host = host; + + return CAMEL_SASL (sasl_krb4); +#else + return NULL; +#endif /* HAVE_KRB4 */ +} + +#ifdef HAVE_KRB4 +static GByteArray * +krb4_challenge (CamelSasl *sasl, const char *token, CamelException *ex) +{ + CamelSaslKerberos4 *sasl_krb4 = CAMEL_SASL_KERBEROS4 (sasl); + struct CamelSaslKerberos4Private *priv = sasl_krb4->priv; + char *buf = NULL, *data = NULL; + GByteArray *ret = NULL; + char *inst, *realm; + struct hostent *h; + int status, len; + + if (token) + data = g_strdup (token); + else + goto fail; + + switch (priv->state) { + case STATE_NONCE: + if (strlen (data) != 8 || base64_decode_simple (data, 8) != 4) + goto break_and_lose; + + memcpy (&priv->nonce_n, data, 4); + priv->nonce_h = ntohl (priv->nonce_n); + + /* Our response is an authenticator including that number. */ + h = sasl_krb4->host; + inst = g_strndup (h->h_name, strcspn (h->h_name, ".")); + g_strdown (inst); + realm = g_strdup (krb_realmofhost (h->h_name)); + status = krb_mk_req (&authenticator, sasl_krb4->protocol, inst, realm, priv->nonce_h); + if (status == KSUCCESS) { + status = krb_get_cred (sasl_krb4->protocol, inst, realm, &credentials); + memcpy (session, credentials.session, sizeof (session)); + memset (&credentials, 0, sizeof (credentials)); + } + g_free (inst); + g_free (realm); + + if (status != KSUCCESS) { + camel_exception_setv (ex, CAMEL_EXCEPTION_SERVICE_CANT_AUTHENTICATE, + _("Could not get Kerberos ticket:\n%s"), + krb_err_txt[status]); + goto break_and_lose; + } + des_key_sched (&session, schedule); + + buf = base64_encode_simple (authenticator.dat, authenticator.length); + break; + case STATE_NONCE_PLUS_ONE: + len = strlen (data); + base64_decode_simple (data, len); + + /* This one is encrypted. */ + des_ecb_encrypt ((des_cblock *)data, (des_cblock *)data, schedule, 0); + + /* Check that the returned value is the original nonce plus one. */ + memcpy (&priv->plus1, data, 4); + if (ntohl (priv->plus1) != priv->nonce_h + 1) + goto lose; + + /* "the fifth octet contain[s] a bit-mask specifying the + * protection mechanisms supported by the server" + */ + if (!(data[4] & KERBEROS_V4_PROTECTION_NONE)) { + g_warning ("Server does not support `no protection' :-("); + goto break_and_lose; + } + + len = strlen (sasl_krb4->username) + 9; + len += 8 - len % 8; + data = g_malloc0 (len); + memcpy (data, &priv->nonce_n, 4); + data[4] = KERBEROS_V4_PROTECTION_NONE; + data[5] = data[6] = data[7] = 0; + strcpy (data + 8, sasl_krb4->username); + + des_pcbc_encrypt ((des_cblock *)data, (des_cblock *)data, len, + schedule, &session, 1); + memset (&session, 0, sizeof (session)); + buf = base64_encode_simple (data, len); + break; + case STATE_FINAL: + sasl->authenticated = TRUE; + break; + default: + break; + } + + g_free (data); + priv->state++; + + if (buf) { + ret = g_byte_array_new (); + g_byte_array_append (ret, buf, strlen (buf)); + g_free (buf); + } + + return ret; + + break_and_lose: + /* Get the server out of "waiting for continuation data" mode. */ + g_free (data); + ret = g_byte_array_new (); + g_byte_array_append (ret, "*", 1); + return ret; + + lose: + memset (&session, 0, sizeof (session)); + + if (!camel_exception_is_set (ex)) { + camel_exception_set (ex, CAMEL_EXCEPTION_SERVICE_CANT_AUTHENTICATE, + _("Bad authentication response from server.")); + } + fail: + g_free (data); + return NULL; +} +#endif HAVE_KRB4 -- cgit v1.2.3