diff options
Diffstat (limited to 'lib/ssl_sspi.c')
| -rw-r--r-- | lib/ssl_sspi.c | 278 | 
1 files changed, 0 insertions, 278 deletions
| diff --git a/lib/ssl_sspi.c b/lib/ssl_sspi.c deleted file mode 100644 index e14c451e..00000000 --- a/lib/ssl_sspi.c +++ /dev/null @@ -1,278 +0,0 @@ -  /********************************************************************\ -  * BitlBee -- An IRC to other IM-networks gateway                     * -  *                                                                    * -  * Copyright 2002-2004 Wilmer van der Gaast and others                * -  \********************************************************************/ - -/* SSL module - SSPI backend */ - -/* Copyright (C) 2005 Jelmer Vernooij <jelmer@samba.org> */ - -/* -  This program is free software; you can redistribute it and/or modify -  it under the terms of the GNU General Public License as published by -  the Free Software Foundation; either version 2 of the License, or -  (at your option) any later version. - -  This program is distributed in the hope that it will be useful, -  but WITHOUT ANY WARRANTY; without even the implied warranty of -  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the -  GNU General Public License for more details. - -  You should have received a copy of the GNU General Public License with -  the Debian GNU/Linux distribution in /usr/share/common-licenses/GPL; -  if not, write to the Free Software Foundation, Inc., 59 Temple Place, -  Suite 330, Boston, MA  02111-1307  USA -*/ - -#include "ssl_client.h" -#include <windows.h> -#define SECURITY_WIN32 -#include <security.h> -#include <sspi.h> -#include <schannel.h> -#include "sock.h" - -static gboolean initialized = FALSE; -int ssl_errno; - -struct scd -{ -	int fd; -	ssl_input_function func; -	gpointer data; -	gboolean established; -  	CredHandle cred;		/* SSL credentials */ -	CtxtHandle context;		/* SSL context */ -	SecPkgContext_StreamSizes sizes; - -	char *host; - -	char *pending_raw_data; -	gsize pending_raw_data_len; -	char *pending_data; -	gsize pending_data_len; -}; - -static void ssl_connected(gpointer, gint, GaimInputCondition); - -void sspi_global_init(void) -{ -	/* FIXME */ -} - -void sspi_global_deinit(void) -{ -	/* FIXME */ -} - -void *ssl_connect(char *host, int port, ssl_input_function func, gpointer data) -{ -	struct scd *conn = g_new0(struct scd, 1); -		 -	conn->fd = proxy_connect(host, port, ssl_connected, conn); -	sock_make_nonblocking(conn->fd); -	conn->func = func; -	conn->data = data; -	conn->host = g_strdup(host); -	 -	if (conn->fd < 0) -	{ -		g_free(conn); -		return NULL; -	} -	 -	if (!initialized) -	{ -		sspi_global_init(); -		initialized = TRUE; -		atexit(sspi_global_deinit); -	} - -	return conn; -} - -static void ssl_connected(gpointer _conn, gint fd, GaimInputCondition cond) -{ -	struct scd *conn = _conn; -	SCHANNEL_CRED ssl_cred; -	TimeStamp timestamp; -	SecBuffer ibuf[2],obuf[1]; -	SecBufferDesc ibufs,obufs; -	ULONG req = ISC_REQ_REPLAY_DETECT | ISC_REQ_SEQUENCE_DETECT | -    	ISC_REQ_CONFIDENTIALITY | ISC_REQ_USE_SESSION_KEY | -      	ISC_REQ_ALLOCATE_MEMORY | ISC_REQ_STREAM | ISC_REQ_EXTENDED_ERROR | -		ISC_REQ_MANUAL_CRED_VALIDATION; -	ULONG a; -	gsize size = 0; -	gchar *data = NULL; - -	memset(&ssl_cred, 0, sizeof(SCHANNEL_CRED)); -	ssl_cred.dwVersion = SCHANNEL_CRED_VERSION; -	ssl_cred.grbitEnabledProtocols = SP_PROT_SSL3_CLIENT; - -	SECURITY_STATUS st = AcquireCredentialsHandle(NULL, UNISP_NAME, SECPKG_CRED_OUTBOUND, NULL, &ssl_cred, NULL, NULL, &conn->cred, ×tamp); - -	if (st != SEC_E_OK) { -		conn->func(conn->data, NULL, cond); -		return; -	} -	 -	do { -		/* initialize buffers */ -	    ibuf[0].cbBuffer = size; ibuf[0].pvBuffer = data; -	    ibuf[1].cbBuffer = 0; ibuf[1].pvBuffer = NULL; -	    obuf[0].cbBuffer = 0; obuf[0].pvBuffer = NULL; -    	ibuf[0].BufferType = obuf[0].BufferType = SECBUFFER_TOKEN; -	    ibuf[1].BufferType = SECBUFFER_EMPTY; - -		/* initialize buffer descriptors */ -	    ibufs.ulVersion = obufs.ulVersion = SECBUFFER_VERSION; -	    ibufs.cBuffers = 2; obufs.cBuffers = 1; -	    ibufs.pBuffers = ibuf; obufs.pBuffers = obuf; - -		st = InitializeSecurityContext(&conn->cred, size?&conn->context:NULL, conn->host, req, 0, SECURITY_NETWORK_DREP, size?&ibufs:NULL, 0, &conn->context, &obufs, &a, ×tamp);   -    	if (obuf[0].pvBuffer && obuf[0].cbBuffer) { -			/* FIXME: Check return value */ -			send(conn->fd, obuf[0].pvBuffer, obuf[0].cbBuffer, 0); -		} - -		switch (st) { -		case SEC_I_INCOMPLETE_CREDENTIALS: -			break; -		case SEC_I_CONTINUE_NEEDED: -			break; -		case SEC_E_INCOMPLETE_MESSAGE: -			break; -		case SEC_E_OK: -			break; -		} -	 -		QueryContextAttributes(&conn->context, SECPKG_ATTR_STREAM_SIZES, &conn->sizes); -	} while (1); - -	conn->func(conn->data, conn, cond); -} - -int ssl_read(void *conn, char *retdata, int len) -{ -	struct scd *scd = conn; -	SecBufferDesc msg; -	SecBuffer buf[4]; -	int ret = -1, i; -	char *data = g_malloc(scd->sizes.cbHeader + scd->sizes.cbMaximumMessage + scd->sizes.cbTrailer); - -	/* FIXME: Try to read some data */ - -  	msg.ulVersion = SECBUFFER_VERSION; -	msg.cBuffers = 4; -	msg.pBuffers = buf; -	 -	buf[0].BufferType = SECBUFFER_DATA; -	buf[0].cbBuffer = len; -	buf[0].pvBuffer = data; - -	buf[1].BufferType = SECBUFFER_EMPTY; -	buf[2].BufferType = SECBUFFER_EMPTY; -	buf[3].BufferType = SECBUFFER_EMPTY; - -	SECURITY_STATUS st = DecryptMessage(&scd->context, &msg, 0, NULL); - -	if (st != SEC_E_OK) { -		/* FIXME */ -		return -1; -	} - -	for (i = 0; i < 4; i++) { -		if (buf[i].BufferType == SECBUFFER_DATA) { -			memcpy(retdata, buf[i].pvBuffer, len); -			ret = len; -		}	 -	} - -	g_free(data); -	return -1; -} - -int ssl_write(void *conn, const char *userdata, int len) -{ -	struct scd *scd = conn; -	SecBuffer buf[4]; -	SecBufferDesc msg; -	char *data; -	int ret; - -	msg.ulVersion = SECBUFFER_VERSION; -	msg.cBuffers = 4; -	msg.pBuffers = buf; - -	data = g_malloc(scd->sizes.cbHeader + scd->sizes.cbMaximumMessage + scd->sizes.cbTrailer); -	memcpy(data + scd->sizes.cbHeader, userdata, len); - -	buf[0].BufferType = SECBUFFER_STREAM_HEADER; -	buf[0].cbBuffer = scd->sizes.cbHeader; -	buf[0].pvBuffer = data; - -	buf[1].BufferType = SECBUFFER_DATA; -	buf[1].cbBuffer = len; -	buf[1].pvBuffer = data + scd->sizes.cbHeader; - -	buf[2].BufferType = SECBUFFER_STREAM_TRAILER; -	buf[2].cbBuffer = scd->sizes.cbTrailer; -	buf[2].pvBuffer = data + scd->sizes.cbHeader + len; -	buf[3].BufferType = SECBUFFER_EMPTY; - -	SECURITY_STATUS st = EncryptMessage(&scd->context, 0, &msg, 0); - -	ret = send(scd->fd, data,  -				buf[0].cbBuffer + buf[1].cbBuffer + buf[2].cbBuffer, 0); - -	g_free(data); - -	return ret; -} - -void ssl_disconnect(void *conn) -{ -	struct scd *scd = conn; - -	SecBufferDesc msg; -	SecBuffer buf; -	DWORD dw; - -	dw = SCHANNEL_SHUTDOWN; -	buf.cbBuffer = sizeof(dw); -	buf.BufferType = SECBUFFER_TOKEN; -	buf.pvBuffer = &dw; -	 -	msg.ulVersion = SECBUFFER_VERSION; -	msg.cBuffers = 1; -	msg.pBuffers = &buf; - -	SECURITY_STATUS st = ApplyControlToken(&scd->context, &msg); - -	if (st != SEC_E_OK) { -		/* FIXME */ -	} -	 -	/* FIXME: call InitializeSecurityContext(Schannel), passing  -	 * in empty buffers*/ - -	DeleteSecurityContext(&scd->context); - -	FreeCredentialsHandle(&scd->cred); - -	closesocket(scd->fd); -	g_free(scd->host); -	g_free(scd); -} - -int ssl_getfd(void *conn) -{ -	return ((struct scd*)conn)->fd; -} - -GaimInputCondition ssl_getdirection( void *conn ) -{ -	return B_EV_IO_WRITE; /* FIXME: or B_EV_IO_READ */ -} | 
