// // VMime library (http://www.vmime.org) // Copyright (C) 2002 Vincent Richard // // This program is free software; you can redistribute it and/or // modify it under the terms of the GNU General Public License as // published by the Free Software Foundation; either version 3 of // the License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // General Public License for more details. // // You should have received a copy of the GNU General Public License along // with this program; if not, write to the Free Software Foundation, Inc., // 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. // // Linking this library statically or dynamically with other modules is making // a combined work based on this library. Thus, the terms and conditions of // the GNU General Public License cover the whole combination. // #include "vmime/config.hpp" #if VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_SASL_SUPPORT #include "vmime/security/sasl/XOAuth2SASLMechanism.hpp" #include "vmime/security/sasl/SASLContext.hpp" #include "vmime/security/sasl/SASLSession.hpp" #include "vmime/exception.hpp" #include namespace vmime { namespace security { namespace sasl { XOAuth2SASLMechanism::XOAuth2SASLMechanism( const shared_ptr & ctx, const string& /* name */ ) : m_context(ctx), m_complete(false) { } XOAuth2SASLMechanism::~XOAuth2SASLMechanism() { } const string XOAuth2SASLMechanism::getName() const { return "XOAUTH2"; } bool XOAuth2SASLMechanism::step( const shared_ptr & sess, const byte_t* /* challenge */, const size_t /* challengeLen */, byte_t** response, size_t* responseLen ) { // Build initial response // // The SASL XOAUTH2 initial client response has the following format: // base64("user=" {User} "^Aauth=Bearer " {Access Token} "^A^A") const std::string user(sess->getAuthenticator()->getUsername()); const std::string accessToken(sess->getAuthenticator()->getAccessToken()); std::ostringstream initRespBytes; initRespBytes.write("user=", 5); initRespBytes.write(user.c_str(), user.length()); initRespBytes.write("\x01", 1); initRespBytes.write("auth=Bearer ", 12); initRespBytes.write(accessToken.c_str(), accessToken.length()); initRespBytes.write("\x01\x01", 2); const std::string initResp = initRespBytes.str(); // Set initial response byte_t* res = new byte_t[initResp.length()]; std::copy(initResp.c_str(), initResp.c_str() + initResp.length(), res); *response = res; *responseLen = initResp.length(); m_complete = true; return true; } bool XOAuth2SASLMechanism::isComplete() const { return m_complete; } bool XOAuth2SASLMechanism::hasInitialResponse() const { return true; } void XOAuth2SASLMechanism::encode( const shared_ptr & /* sess */, const byte_t* input, const size_t inputLen, byte_t** output, size_t* outputLen ) { // No encoding performed, just copy input bytes byte_t* res = new byte_t[inputLen]; std::copy(input, input + inputLen, res); *outputLen = inputLen; *output = res; } void XOAuth2SASLMechanism::decode( const shared_ptr & /* sess */, const byte_t* input, const size_t inputLen, byte_t** output, size_t* outputLen ) { // No decoding performed, just copy input bytes byte_t* res = new byte_t[inputLen]; std::copy(input, input + inputLen, res); *outputLen = inputLen; *output = res; } } // sasl } // security } // vmime #endif // VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_SASL_SUPPORT