// // VMime library (http://www.vmime.org) // Copyright (C) 2002 Vincent Richard // // This program is free software; you can redistribute it and/or // modify it under the terms of the GNU General Public License as // published by the Free Software Foundation; either version 3 of // the License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // General Public License for more details. // // You should have received a copy of the GNU General Public License along // with this program; if not, write to the Free Software Foundation, Inc., // 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. // // Linking this library statically or dynamically with other modules is making // a combined work based on this library. Thus, the terms and conditions of // the GNU General Public License cover the whole combination. // #include "vmime/config.hpp" #if VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_SASL_SUPPORT #include #include #include "vmime/security/sasl/SASLSession.hpp" #include "vmime/security/sasl/SASLContext.hpp" #include "vmime/security/sasl/SASLSocket.hpp" #include "vmime/security/sasl/SASLAuthenticator.hpp" namespace vmime { namespace security { namespace sasl { SASLSession::SASLSession( const string& serviceName, const shared_ptr & ctx, const shared_ptr & auth, const shared_ptr & mech ) : m_serviceName(serviceName), m_context(ctx), m_auth(auth), m_mech(mech), m_gsaslContext(0), m_gsaslSession(0) { if (gsasl_init(&m_gsaslContext) != GSASL_OK) { throw std::bad_alloc(); } gsasl_client_start(m_gsaslContext, mech->getName().c_str(), &m_gsaslSession); gsasl_callback_set(m_gsaslContext, gsaslCallback); gsasl_callback_hook_set(m_gsaslContext, this); } SASLSession::~SASLSession() { gsasl_finish(m_gsaslSession); m_gsaslSession = NULL; gsasl_done(m_gsaslContext); m_gsaslContext = NULL; } // static shared_ptr SASLSession::create( const string& serviceName, const shared_ptr & ctx, const shared_ptr & auth, const shared_ptr & mech ) { return shared_ptr (new SASLSession(serviceName, ctx, auth, mech)); } void SASLSession::init() { shared_ptr saslAuth = dynamicCast (m_auth); if (saslAuth) { saslAuth->setSASLMechanism(m_mech); saslAuth->setSASLSession(dynamicCast (shared_from_this())); } } shared_ptr SASLSession::getAuthenticator() { return m_auth; } shared_ptr SASLSession::getMechanism() { return m_mech; } shared_ptr SASLSession::getContext() { return m_context; } bool SASLSession::evaluateChallenge( const byte_t* challenge, const size_t challengeLen, byte_t** response, size_t* responseLen ) { return m_mech->step( dynamicCast (shared_from_this()), challenge, challengeLen, response, responseLen ); } shared_ptr SASLSession::getSecuredSocket(const shared_ptr & sok) { return make_shared (dynamicCast (shared_from_this()), sok); } const string SASLSession::getServiceName() const { return m_serviceName; } // static int SASLSession::gsaslCallback( Gsasl* ctx, Gsasl_session* sctx, Gsasl_property prop ) { SASLSession* sess = reinterpret_cast (gsasl_callback_hook_get(ctx)); if (!sess) { return GSASL_AUTHENTICATION_ERROR; } shared_ptr auth = sess->getAuthenticator(); try { string res; switch (prop) { case GSASL_AUTHID: res = auth->getUsername(); break; case GSASL_PASSWORD: res = auth->getPassword(); break; case GSASL_ANONYMOUS_TOKEN: res = auth->getAnonymousToken(); break; case GSASL_HOSTNAME: res = auth->getHostname(); break; case GSASL_SERVICE: res = auth->getServiceName(); break; case GSASL_AUTHZID: case GSASL_GSSAPI_DISPLAY_NAME: case GSASL_PASSCODE: case GSASL_SUGGESTED_PIN: case GSASL_PIN: case GSASL_REALM: default: return GSASL_NO_CALLBACK; } gsasl_property_set(sctx, prop, res.c_str()); return GSASL_OK; } catch (...) { return GSASL_NO_CALLBACK; } } } // sasl } // security } // vmime #endif // VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_SASL_SUPPORT