| /*************************************************************************** | |
| * _ _ ____ _ | |
| * Project ___| | | | _ \| | | |
| * / __| | | | |_) | | | |
| * | (__| |_| | _ <| |___ | |
| * \___|\___/|_| \_\_____| | |
| * | |
| * Copyright (C) Steve Holme, <[email protected]>. | |
| * | |
| * This software is licensed as described in the file COPYING, which | |
| * you should have received as part of this distribution. The terms | |
| * are also available at https://curl.se/docs/copyright.html. | |
| * | |
| * You may opt to use, copy, modify, merge, publish, distribute and/or sell | |
| * copies of the Software, and permit persons to whom the Software is | |
| * furnished to do so, under the terms of the COPYING file. | |
| * | |
| * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY | |
| * KIND, either express or implied. | |
| * | |
| * SPDX-License-Identifier: curl | |
| * | |
| ***************************************************************************/ | |
| /* The last #include files should be: */ | |
| /* | |
| * Curl_auth_build_spn() | |
| * | |
| * This is used to build a SPN string in the following formats: | |
| * | |
| * service/host@realm (Not currently used) | |
| * service/host (Not used by GSS-API) | |
| * service@realm (Not used by Windows SSPI) | |
| * | |
| * Parameters: | |
| * | |
| * service [in] - The service type such as http, smtp, pop or imap. | |
| * host [in] - The hostname. | |
| * realm [in] - The realm. | |
| * | |
| * Returns a pointer to the newly allocated SPN. | |
| */ | |
| char *Curl_auth_build_spn(const char *service, const char *host, | |
| const char *realm) | |
| { | |
| char *spn = NULL; | |
| /* Generate our SPN */ | |
| if(host && realm) | |
| spn = aprintf("%s/%s@%s", service, host, realm); | |
| else if(host) | |
| spn = aprintf("%s/%s", service, host); | |
| else if(realm) | |
| spn = aprintf("%s@%s", service, realm); | |
| /* Return our newly allocated SPN */ | |
| return spn; | |
| } | |
| TCHAR *Curl_auth_build_spn(const char *service, const char *host, | |
| const char *realm) | |
| { | |
| char *utf8_spn = NULL; | |
| TCHAR *tchar_spn = NULL; | |
| TCHAR *dupe_tchar_spn = NULL; | |
| (void) realm; | |
| /* Note: We could use DsMakeSPN() or DsClientMakeSpnForTargetServer() rather | |
| than doing this ourselves but the first is only available in Windows XP | |
| and Windows Server 2003 and the latter is only available in Windows 2000 | |
| but not Windows95/98/ME or Windows NT4.0 unless the Active Directory | |
| Client Extensions are installed. As such it is far simpler for us to | |
| formulate the SPN instead. */ | |
| /* Generate our UTF8 based SPN */ | |
| utf8_spn = aprintf("%s/%s", service, host); | |
| if(!utf8_spn) | |
| return NULL; | |
| /* Allocate and return a TCHAR based SPN. Since curlx_convert_UTF8_to_tchar | |
| must be freed by curlx_unicodefree we will dupe the result so that the | |
| pointer this function returns can be normally free'd. */ | |
| tchar_spn = curlx_convert_UTF8_to_tchar(utf8_spn); | |
| free(utf8_spn); | |
| if(!tchar_spn) | |
| return NULL; | |
| dupe_tchar_spn = _tcsdup(tchar_spn); | |
| curlx_unicodefree(tchar_spn); | |
| return dupe_tchar_spn; | |
| } | |
| /* | |
| * Curl_auth_user_contains_domain() | |
| * | |
| * This is used to test if the specified user contains a Windows domain name as | |
| * follows: | |
| * | |
| * Domain\User (Down-level Logon Name) | |
| * Domain/User (curl Down-level format - for compatibility with existing code) | |
| * User@Domain (User Principal Name) | |
| * | |
| * Note: The username may be empty when using a GSS-API library or Windows | |
| * SSPI as the user and domain are either obtained from the credentials cache | |
| * when using GSS-API or via the currently logged in user's credentials when | |
| * using Windows SSPI. | |
| * | |
| * Parameters: | |
| * | |
| * user [in] - The username. | |
| * | |
| * Returns TRUE on success; otherwise FALSE. | |
| */ | |
| bool Curl_auth_user_contains_domain(const char *user) | |
| { | |
| bool valid = FALSE; | |
| if(user && *user) { | |
| /* Check we have a domain name or UPN present */ | |
| char *p = strpbrk(user, "\\/@"); | |
| valid = (p != NULL && p > user && p < user + strlen(user) - 1); | |
| } | |
| else | |
| /* User and domain are obtained from the GSS-API credentials cache or the | |
| currently logged in user from Windows */ | |
| valid = TRUE; | |
| return valid; | |
| } | |
| /* | |
| * Curl_auth_ollowed_to_host() tells if authentication, cookies or other | |
| * "sensitive data" can (still) be sent to this host. | |
| */ | |
| bool Curl_auth_allowed_to_host(struct Curl_easy *data) | |
| { | |
| struct connectdata *conn = data->conn; | |
| return (!data->state.this_is_a_follow || | |
| data->set.allow_auth_to_other_hosts || | |
| (data->state.first_host && | |
| strcasecompare(data->state.first_host, conn->host.name) && | |
| (data->state.first_remote_port == conn->remote_port) && | |
| (data->state.first_remote_protocol == conn->handler->protocol))); | |
| } | |