1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
|
/*
Unix SMB/CIFS implementation.
HTTP library - NTLM authentication mechanism gensec module
Copyright (C) 2014 Samuel Cabrero <samuelcabrero@kernevil.me>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "auth/auth.h"
#include "auth/gensec/gensec.h"
#include "auth/gensec/gensec_internal.h"
#include "lib/util/base64.h"
_PUBLIC_ NTSTATUS gensec_http_ntlm_init(void);
struct gensec_http_ntlm_state {
struct gensec_security *sub;
};
static NTSTATUS gensec_http_ntlm_client_start(struct gensec_security *gensec)
{
NTSTATUS status;
struct gensec_http_ntlm_state *state;
state = talloc_zero(gensec, struct gensec_http_ntlm_state);
if (state == NULL) {
return NT_STATUS_NO_MEMORY;
}
gensec->private_data = state;
status = gensec_subcontext_start(state, gensec, &state->sub);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
return gensec_start_mech_by_oid(state->sub, GENSEC_OID_NTLMSSP);
}
static NTSTATUS gensec_http_ntlm_update(struct gensec_security *gensec_ctx,
TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
const DATA_BLOB in,
DATA_BLOB *out)
{
NTSTATUS status;
struct gensec_http_ntlm_state *state;
DATA_BLOB ntlm_in;
state = talloc_get_type_abort(gensec_ctx->private_data,
struct gensec_http_ntlm_state);
if (in.length) {
if (strncasecmp((char *)in.data, "NTLM ", 5) != 0) {
return NT_STATUS_INVALID_PARAMETER;
}
ntlm_in = base64_decode_data_blob_talloc(mem_ctx,
(char *)&in.data[5]);
} else {
ntlm_in = data_blob_null;
}
status = gensec_update_ev(state->sub, mem_ctx, ev, ntlm_in, out);
if (NT_STATUS_IS_OK(status) ||
NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
char *tmp, *b64;
b64 = base64_encode_data_blob(mem_ctx, *out);
if (b64 == NULL) {
return NT_STATUS_NO_MEMORY;
}
tmp = talloc_asprintf(mem_ctx, "NTLM %s", b64);
TALLOC_FREE(b64);
if (tmp == NULL) {
return NT_STATUS_NO_MEMORY;
}
*out = data_blob_string_const(tmp);
}
if (ntlm_in.data) {
data_blob_free(&ntlm_in);
}
return status;
}
static const struct gensec_security_ops gensec_http_ntlm_security_ops = {
.name = "http_ntlm",
.auth_type = 0,
.client_start = gensec_http_ntlm_client_start,
.update = gensec_http_ntlm_update,
.enabled = true,
.priority = GENSEC_EXTERNAL,
};
_PUBLIC_ NTSTATUS gensec_http_ntlm_init(void)
{
NTSTATUS status;
status = gensec_register(&gensec_http_ntlm_security_ops);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("Failed to register '%s' gensec backend!\n",
gensec_http_ntlm_security_ops.name));
return status;
}
return status;
}
|