mirror of
https://github.com/moparisthebest/curl
synced 2024-11-10 03:25:04 -05:00
8288862b7e
authenticated our connection, we can continue without any Authorization: headers as long as our connection is maintained.
578 lines
18 KiB
C
578 lines
18 KiB
C
/***************************************************************************
|
||
* _ _ ____ _
|
||
* Project ___| | | | _ \| |
|
||
* / __| | | | |_) | |
|
||
* | (__| |_| | _ <| |___
|
||
* \___|\___/|_| \_\_____|
|
||
*
|
||
* Copyright (C) 1998 - 2003, Daniel Stenberg, <daniel@haxx.se>, et al.
|
||
*
|
||
* This software is licensed as described in the file COPYING, which
|
||
* you should have received as part of this distribution. The terms
|
||
* are also available at http://curl.haxx.se/docs/copyright.html.
|
||
*
|
||
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
||
* copies of the Software, and permit persons to whom the Software is
|
||
* furnished to do so, under the terms of the COPYING file.
|
||
*
|
||
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
||
* KIND, either express or implied.
|
||
*
|
||
* $Id$
|
||
***************************************************************************/
|
||
#include "setup.h"
|
||
|
||
/* All NTLM details here: http://www.innovation.ch/java/ntlm.html */
|
||
|
||
#ifndef CURL_DISABLE_HTTP
|
||
#ifdef USE_SSLEAY
|
||
/* We need OpenSSL for the crypto lib to provide us with MD4 and DES */
|
||
|
||
/* -- WIN32 approved -- */
|
||
#include <stdio.h>
|
||
#include <string.h>
|
||
#include <stdarg.h>
|
||
#include <stdlib.h>
|
||
#include <ctype.h>
|
||
|
||
#include "urldata.h"
|
||
#include "sendf.h"
|
||
#include "strequal.h"
|
||
#include "base64.h"
|
||
#include "http_ntlm.h"
|
||
|
||
#define _MPRINTF_REPLACE /* use our functions only */
|
||
#include <curl/mprintf.h>
|
||
|
||
#include <openssl/des.h>
|
||
#include <openssl/md4.h>
|
||
#include <openssl/ssl.h>
|
||
|
||
#if OPENSSL_VERSION_NUMBER < 0x00907001L
|
||
#define DES_key_schedule des_key_schedule
|
||
#define DES_cblock des_cblock
|
||
#define DES_set_odd_parity des_set_odd_parity
|
||
#define DES_set_key des_set_key
|
||
#define DES_ecb_encrypt des_ecb_encrypt
|
||
|
||
/* This is how things were done in the old days */#define DESKEY(x) x
|
||
#define DESKEY(x) x
|
||
#define DESKEYARG(x) x
|
||
#else
|
||
/* Modern version */
|
||
#define DESKEYARG(x) *x
|
||
#define DESKEY(x) &x
|
||
#endif
|
||
|
||
/* The last #include file should be: */
|
||
#ifdef MALLOCDEBUG
|
||
#include "memdebug.h"
|
||
#endif
|
||
|
||
/*
|
||
The one and only master resource for NTLM "hacking":
|
||
|
||
====> http://www.innovation.ch/java/ntlm.html <====
|
||
|
||
Brought to the world by Ronald Tschal<61>r.
|
||
*/
|
||
|
||
/* Test example header:
|
||
|
||
WWW-Authenticate: NTLM
|
||
|
||
*/
|
||
|
||
CURLntlm Curl_input_ntlm(struct connectdata *conn,
|
||
char *header) /* rest of the www-authenticate:
|
||
header */
|
||
{
|
||
struct SessionHandle *data=conn->data;
|
||
|
||
/* skip initial whitespaces */
|
||
while(*header && isspace((int)*header))
|
||
header++;
|
||
|
||
if(checkprefix("NTLM", header)) {
|
||
unsigned char buffer[256];
|
||
header += strlen("NTLM");
|
||
|
||
while(*header && isspace((int)*header))
|
||
header++;
|
||
|
||
if(*header) {
|
||
/* we got a type-2 message here */
|
||
|
||
/* My test-IE session reveived this type-2:
|
||
|
||
TlRMTVNTUAACAAAAAgACADAAAAAGgoEAc51AYVDgyNcAAAAAAAAAAG4AbgA\
|
||
yAAAAQ0MCAAQAQwBDAAEAEgBFAEwASQBTAEEAQgBFAFQASAAEABgAYwBjAC4\
|
||
AaQBjAGUAZABlAHYALgBuAHUAAwAsAGUAbABpAHMAYQBiAGUAdABoAC4AYwB\
|
||
jAC4AaQBjAGUAZABlAHYALgBuAHUAAAAAAA==
|
||
|
||
which translates to this:
|
||
|
||
0x00: 4e 54 4c 4d 53 53 50 00 02 00 00 00 02 00 02 00 | NTLMSSP.........
|
||
0x10: 30 00 00 00 06 82 81 00 73 9d 40 61 50 e0 c8 d7 | 0.......s.@aP...
|
||
0x20: 00 00 00 00 00 00 00 00 6e 00 6e 00 32 00 00 00 | ........n.n.2...
|
||
0x30: 43 43 02 00 04 00 43 00 43 00 01 00 12 00 45 00 | CC....C.C.....E.
|
||
0x40: 4c 00 49 00 53 00 41 00 42 00 45 00 54 00 48 00 | L.I.S.A.B.E.T.H.
|
||
0x50: 04 00 18 00 63 00 63 00 2e 00 69 00 63 00 65 00 | ....c.c...i.c.e.
|
||
0x60: 64 00 65 00 76 00 2e 00 6e 00 75 00 03 00 2c 00 | d.e.v...n.u...,.
|
||
0x70: 65 00 6c 00 69 00 73 00 61 00 62 00 65 00 74 00 | e.l.i.s.a.b.e.t.
|
||
0x80: 68 00 2e 00 63 00 63 00 2e 00 69 00 63 00 65 00 | h...c.c...i.c.e.
|
||
0x90: 64 00 65 00 76 00 2e 00 6e 00 75 00 00 00 00 00 | d.e.v...n.u.....
|
||
|
||
This is not the same format as described on the web page, but doing repeated
|
||
requests show that 0x18-0x1f seems to be the nonce anyway.
|
||
|
||
*/
|
||
|
||
int size = Curl_base64_decode(header, buffer);
|
||
|
||
data->state.ntlm.state = NTLMSTATE_TYPE2; /* we got a type-2 */
|
||
|
||
if(size >= 48)
|
||
/* the nonce of interest is index [24 .. 31], 8 bytes */
|
||
memcpy(data->state.ntlm.nonce, &buffer[24], 8);
|
||
}
|
||
else {
|
||
if(data->state.ntlm.state >= NTLMSTATE_TYPE1)
|
||
return CURLNTLM_BAD;
|
||
|
||
data->state.ntlm.state = NTLMSTATE_TYPE1; /* we should sent away a
|
||
type-1 */
|
||
}
|
||
}
|
||
return CURLNTLM_FINE;
|
||
}
|
||
|
||
/*
|
||
* Turns a 56 bit key into the 64 bit, odd parity key and sets the key. The
|
||
* key schedule ks is also set.
|
||
*/
|
||
static void setup_des_key(unsigned char *key_56,
|
||
DES_key_schedule DESKEYARG(ks))
|
||
{
|
||
DES_cblock key;
|
||
|
||
key[0] = key_56[0];
|
||
key[1] = ((key_56[0] << 7) & 0xFF) | (key_56[1] >> 1);
|
||
key[2] = ((key_56[1] << 6) & 0xFF) | (key_56[2] >> 2);
|
||
key[3] = ((key_56[2] << 5) & 0xFF) | (key_56[3] >> 3);
|
||
key[4] = ((key_56[3] << 4) & 0xFF) | (key_56[4] >> 4);
|
||
key[5] = ((key_56[4] << 3) & 0xFF) | (key_56[5] >> 5);
|
||
key[6] = ((key_56[5] << 2) & 0xFF) | (key_56[6] >> 6);
|
||
key[7] = (key_56[6] << 1) & 0xFF;
|
||
|
||
DES_set_odd_parity(&key);
|
||
DES_set_key(&key, ks);
|
||
}
|
||
|
||
/*
|
||
* takes a 21 byte array and treats it as 3 56-bit DES keys. The
|
||
* 8 byte plaintext is encrypted with each key and the resulting 24
|
||
* bytes are stored in the results array.
|
||
*/
|
||
static void calc_resp(unsigned char *keys,
|
||
unsigned char *plaintext,
|
||
unsigned char *results)
|
||
{
|
||
DES_key_schedule ks;
|
||
|
||
setup_des_key(keys, DESKEY(ks));
|
||
DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) results,
|
||
DESKEY(ks), DES_ENCRYPT);
|
||
|
||
setup_des_key(keys+7, DESKEY(ks));
|
||
DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results+8),
|
||
DESKEY(ks), DES_ENCRYPT);
|
||
|
||
setup_des_key(keys+14, DESKEY(ks));
|
||
DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results+16),
|
||
DESKEY(ks), DES_ENCRYPT);
|
||
}
|
||
|
||
/*
|
||
* Set up lanmanager and nt hashed passwords
|
||
*/
|
||
static void mkhash(char *password,
|
||
unsigned char *nonce, /* 8 bytes */
|
||
unsigned char *lmresp, /* must fit 0x18 bytes */
|
||
unsigned char *ntresp) /* must fit 0x18 bytes */
|
||
{
|
||
unsigned char lmbuffer[21];
|
||
unsigned char ntbuffer[21];
|
||
|
||
unsigned char *pw;
|
||
static const unsigned char magic[] = {
|
||
0x4B, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25
|
||
};
|
||
int i;
|
||
int len = strlen(password);
|
||
|
||
/* make it fit at least 14 bytes */
|
||
pw = malloc(len<7?14:len*2);
|
||
if(!pw)
|
||
return; /* this will lead to a badly generated package */
|
||
|
||
if (len > 14)
|
||
len = 14;
|
||
|
||
for (i=0; i<len; i++)
|
||
pw[i] = toupper(password[i]);
|
||
|
||
for (; i<14; i++)
|
||
pw[i] = 0;
|
||
|
||
{
|
||
/* create LanManager hashed password */
|
||
DES_key_schedule ks;
|
||
|
||
setup_des_key(pw, DESKEY(ks));
|
||
DES_ecb_encrypt((DES_cblock *)magic, (DES_cblock *)lmbuffer,
|
||
DESKEY(ks), DES_ENCRYPT);
|
||
|
||
setup_des_key(pw+7, DESKEY(ks));
|
||
DES_ecb_encrypt((DES_cblock *)magic, (DES_cblock *)(lmbuffer+8),
|
||
DESKEY(ks), DES_ENCRYPT);
|
||
|
||
memset(lmbuffer+16, 0, 5);
|
||
}
|
||
|
||
{
|
||
/* create NT hashed password */
|
||
MD4_CTX MD4;
|
||
|
||
len = strlen(password);
|
||
|
||
for (i=0; i<len; i++) {
|
||
pw[2*i] = password[i];
|
||
pw[2*i+1] = 0;
|
||
}
|
||
|
||
MD4_Init(&MD4);
|
||
MD4_Update(&MD4, pw, 2*len);
|
||
MD4_Final(ntbuffer, &MD4);
|
||
|
||
memset(ntbuffer+16, 0, 8);
|
||
}
|
||
|
||
/* create responses */
|
||
calc_resp(lmbuffer, nonce, lmresp);
|
||
calc_resp(ntbuffer, nonce, ntresp);
|
||
|
||
free(pw);
|
||
}
|
||
|
||
/* convert an ascii string to upper case unicode, the destination buffer
|
||
must fit twice the source size */
|
||
static void ascii_to_unicode(unsigned char *destunicode,
|
||
unsigned char *sourceascii,
|
||
bool conv)
|
||
{
|
||
while (*sourceascii) {
|
||
destunicode[0] = conv?toupper(*sourceascii):*sourceascii;
|
||
destunicode[1] = '\0';
|
||
destunicode += 2;
|
||
sourceascii++;
|
||
}
|
||
}
|
||
|
||
#define SHORTPAIR(x) ((x) & 0xff), ((x) >> 8)
|
||
|
||
/* this is for creating ntlm header output */
|
||
CURLcode Curl_output_ntlm(struct connectdata *conn)
|
||
{
|
||
struct SessionHandle *data=conn->data;
|
||
const char *domain="CURL";
|
||
const char *host="HAXX";
|
||
int domlen=strlen(domain);
|
||
int hostlen = strlen(host);
|
||
int hostoff; /* host name offset */
|
||
int domoff; /* domain name offset */
|
||
int size;
|
||
char *base64=NULL;
|
||
|
||
unsigned char ntlm[256]; /* enough, unless the host/domain is very long */
|
||
if(NTLMSTATE_TYPE1 == data->state.ntlm.state) {
|
||
hostoff = 32;
|
||
domoff = hostoff + hostlen;
|
||
|
||
/* IE used this as type-1 maessage:
|
||
|
||
Authorization: NTLM \
|
||
TlRMTVNTUAABAAAABoIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMAAAAAAAAAAwAAAA\r\n
|
||
|
||
This translates into:
|
||
|
||
0x00: 4e 54 4c 4d 53 53 50 00 01 00 00 00 06 82 00 00 | NTLMSSP.........
|
||
0x10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
|
||
0x20: 00 00 00 00 30 00 00 00 00 00 00 00 30 00 00 00 | ....0.......0...
|
||
|
||
Which isn't following the web spec. This uses 0x8206 instead of 0xb203
|
||
and sends a longer chunk of data than we do! Interestingly, there's no
|
||
host or domain either.
|
||
|
||
We want to send something like this:
|
||
|
||
0x00: 4e 54 4c 4d 53 53 50 00 01 00 00 00 03 b2 00 00 | NTLMSSP.........
|
||
0x10: 05 00 05 00 2b 00 00 00 0b 00 0b 00 20 00 00 00 | ....+...........
|
||
0x20: 4c 49 4c 4c 41 53 59 53 54 45 52 48 45 4d 4d 41 | LILLASYSTERHEMMA
|
||
|
||
*/
|
||
|
||
snprintf((char *)ntlm, sizeof(ntlm), "NTLMSSP%c"
|
||
"\x01" /* type 1 */
|
||
"%c%c%c"
|
||
"\x03\xb2"
|
||
"%c%c"
|
||
"%c%c" /* domain length */
|
||
"%c%c" /* domain length */
|
||
"%c%c" /* domain name offset */
|
||
"%c%c" /* 2 zeroes */
|
||
"%c%c" /* host length */
|
||
"%c%c" /* host length */
|
||
"%c%c" /* host name offset */
|
||
"%c%c" /* 2 zeroes */
|
||
"%s" /* host name */
|
||
"%s", /* domain string */
|
||
0,0,0,0,0,0,
|
||
SHORTPAIR(domlen),
|
||
SHORTPAIR(domlen),
|
||
SHORTPAIR(domoff),
|
||
0,0,
|
||
SHORTPAIR(hostlen),
|
||
SHORTPAIR(hostlen),
|
||
SHORTPAIR(hostoff),
|
||
0,0,
|
||
host, domain);
|
||
|
||
/* initial packet length */
|
||
size = 32 + hostlen + domlen;
|
||
#if 0
|
||
#define CHUNK "\x4e\x54\x4c\x4d\x53\x53\x50\x00\x01\x00\x00\x00\x06\x82\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x30\x00\x00\x00\x00\x00\x00\x00\x30\x00\x00\x00"
|
||
memcpy(ntlm, CHUNK, sizeof(CHUNK)-1);
|
||
size = sizeof(CHUNK)-1;
|
||
#endif
|
||
/* now keeper of the base64 encoded package size */
|
||
size = Curl_base64_encode(ntlm, size, &base64);
|
||
|
||
if(size >0 ) {
|
||
conn->allocptr.userpwd = aprintf("Authorization: NTLM %s\r\n",
|
||
base64);
|
||
free(base64);
|
||
}
|
||
else
|
||
return CURLE_OUT_OF_MEMORY; /* FIX TODO */
|
||
}
|
||
else {
|
||
if(NTLMSTATE_TYPE2 == data->state.ntlm.state) {
|
||
/* We received the type-2 already, create a type-3 message */
|
||
|
||
/*
|
||
My test-IE session sent this type-3:
|
||
|
||
TlRMTVNTUAADAAAAGAAYAEoAAAAAAAAAYgAAAAUABQA0AAAABgAGADk\
|
||
AAAALAAsAPwAAAEhFTU1BZGFuaWVsTElMTEFTWVNURVJPVPJELoebUg\
|
||
4SvW0ed2QmKu0SjX4qNrI=
|
||
|
||
Which translates to:
|
||
|
||
0x00: 4e 54 4c 4d 53 53 50 00 03 00 00 00 18 00 18 00 | NTLMSSP.........
|
||
0x10: 4a 00 00 00 00 00 00 00 62 00 00 00 05 00 05 00 | J.......b.......
|
||
0x20: 34 00 00 00 06 00 06 00 39 00 00 00 0b 00 0b 00 | 4.......9.......
|
||
0x30: 3f 00 00 00 48 45 4d 4d 41 64 61 6e 69 65 6c 4c | ?...HEMMAdanielL
|
||
0x40: 49 4c 4c 41 53 59 53 54 45 52 4f 54 f2 44 2e 87 | ILLASYSTEROT.D..
|
||
0x50: 9b 52 0e 12 bd 6d 1e 77 64 26 2a ed 12 8d 7e 2a | .R...m.wd&*...~*
|
||
0x60: 36 b2 | 6.
|
||
|
||
Note how the domain + username + hostname ARE NOT unicoded in any way.
|
||
Domain and hostname are uppercase, while username are case sensitive.
|
||
|
||
We send something like this:
|
||
|
||
0x00: 4e 54 4c 4d 53 53 50 00 03 00 00 00 18 00 18 00 | NTLMSSP.........
|
||
0x10: 6c 00 00 00 18 00 18 00 84 00 00 00 0a 00 0a 00 | l...............
|
||
0x20: 40 00 00 00 0c 00 0c 00 4a 00 00 00 16 00 16 00 | @.......J.......
|
||
0x30: 56 00 00 00 00 00 00 00 9c 00 00 00 01 82 00 00 | V...............
|
||
0x40: 48 00 45 00 4d 00 4d 00 41 00 64 00 61 00 6e 00 | H.E.M.M.A.d.a.n.
|
||
0x50: 69 00 65 00 6c 00 4c 00 49 00 4c 00 4c 00 41 00 | i.e.l.L.I.L.L.A.
|
||
0x60: 53 00 59 00 53 00 54 00 45 00 52 00 bc ed 28 c9 | S.Y.S.T.E.R...(.
|
||
0x70: 16 c4 1b 16 d7 c9 b4 0e ef ef 02 6d 26 8d c0 ba | ...........m&...
|
||
0x80: ac b6 5a c1 26 8d c0 ba ac b6 5a c1 26 8d c0 ba | ..Z.&.....Z.&...
|
||
0x90: ac b6 5a c1 26 8d c0 ba ac b6 5a c1 | ..Z.&.....Z.
|
||
|
||
*/
|
||
|
||
int lmrespoff;
|
||
int ntrespoff;
|
||
int useroff;
|
||
unsigned char lmresp[0x18]; /* fixed-size */
|
||
unsigned char ntresp[0x18]; /* fixed-size */
|
||
|
||
int userlen = strlen(data->state.user);
|
||
|
||
mkhash(data->state.passwd, &data->state.ntlm.nonce[0], lmresp, ntresp);
|
||
|
||
/* these are going unicode */
|
||
domlen *= 2;
|
||
userlen *= 2;
|
||
hostlen *= 2;
|
||
|
||
domoff = 64; /* always */
|
||
useroff = domoff + domlen;
|
||
hostoff = useroff + userlen;
|
||
lmrespoff = hostoff + hostlen;
|
||
ntrespoff = lmrespoff + 0x18;
|
||
|
||
/* Create the big type-3 message binary blob */
|
||
size = snprintf((char *)ntlm, sizeof(ntlm),
|
||
"NTLMSSP%c"
|
||
"\x03" /* type 3 */
|
||
"%c%c%c" /* 3 zeroes */
|
||
|
||
"%c%c%c%c" /* LanManager length twice */
|
||
"%c%c" /* LanManager offset */
|
||
"%c%c" /* 2 zeroes */
|
||
|
||
"%c%c%c%c" /* NT-response length twice */
|
||
"%c%c" /* NT-response offset */
|
||
"%c%c" /* 2 zeroes */
|
||
|
||
"%c%c" /* domain length */
|
||
"%c%c" /* domain length */
|
||
"%c%c" /* domain name offset */
|
||
"%c%c" /* 2 zeroes */
|
||
|
||
"%c%c" /* user length */
|
||
"%c%c" /* user length */
|
||
"%c%c" /* user offset */
|
||
"%c%c" /* 2 zeroes */
|
||
|
||
"%c%c" /* host length */
|
||
"%c%c" /* host length */
|
||
"%c%c" /* host offset */
|
||
"%c%c%c%c%c%c" /* 6 zeroes */
|
||
|
||
"\xff\xff" /* message length */
|
||
"%c%c" /* 2 zeroes */
|
||
|
||
"\x01\x82" /* flags */
|
||
"%c%c" /* 2 zeroes */
|
||
|
||
/* domain string */
|
||
/* user string */
|
||
/* host string */
|
||
/* LanManager response */
|
||
/* NT response */
|
||
,
|
||
0,
|
||
0,0,0,
|
||
|
||
SHORTPAIR(0x18), /* LanManager response length, twice */
|
||
SHORTPAIR(0x18),
|
||
SHORTPAIR(lmrespoff),
|
||
0x0, 0x0,
|
||
|
||
SHORTPAIR(0x18), /* NT-response length, twice */
|
||
SHORTPAIR(0x18),
|
||
SHORTPAIR(ntrespoff),
|
||
0x0, 0x0,
|
||
|
||
SHORTPAIR(domlen),
|
||
SHORTPAIR(domlen),
|
||
SHORTPAIR(domoff),
|
||
0x0, 0x0,
|
||
|
||
SHORTPAIR(userlen),
|
||
SHORTPAIR(userlen),
|
||
SHORTPAIR(useroff),
|
||
0x0, 0x0,
|
||
|
||
SHORTPAIR(hostlen),
|
||
SHORTPAIR(hostlen),
|
||
SHORTPAIR(hostoff),
|
||
0x0, 0x0, 0x0, 0x0, 0x0, 0x0,
|
||
|
||
0x0, 0x0,
|
||
|
||
0x0, 0x0);
|
||
|
||
/* size is now 64 */
|
||
size=64;
|
||
ntlm[62]=ntlm[63]=0;
|
||
|
||
#if 1
|
||
ascii_to_unicode(&ntlm[size], (unsigned char *)domain, TRUE);
|
||
size += domlen;
|
||
|
||
ascii_to_unicode(&ntlm[size], (unsigned char *)data->state.user, FALSE);
|
||
size += userlen;
|
||
|
||
ascii_to_unicode(&ntlm[size], (unsigned char *)host, TRUE);
|
||
size += hostlen;
|
||
#else
|
||
strcpy(&ntlm[size], (unsigned char *)domain);
|
||
size += domlen;
|
||
|
||
strcpy(&ntlm[size], (unsigned char *)data->state.user);
|
||
size += userlen;
|
||
|
||
strcpy(&ntlm[size], (unsigned char *)host);
|
||
size += hostlen;
|
||
#endif
|
||
|
||
/* we append the binary hashes to the end of the blob */
|
||
if(size < ((int)sizeof(ntlm) - 0x18)) {
|
||
memcpy(&ntlm[size], lmresp, 0x18);
|
||
size += 0x18;
|
||
}
|
||
|
||
if(size < ((int)sizeof(ntlm) - 0x18)) {
|
||
memcpy(&ntlm[size], ntresp, 0x18);
|
||
size += 0x18;
|
||
}
|
||
|
||
|
||
ntlm[56] = size & 0xff;
|
||
ntlm[57] = size >> 8;
|
||
|
||
#if 0
|
||
#undef CHUNK
|
||
|
||
#define CHUNK "\x4e\x54\x4c\x4d\x53\x53\x50\x00\x03\x00\x00\x00\x18\x00\x18\x00\x4a\x00\x00\x00\x00\x00\x00\x00\x62\x00\x00\x00\x05\x00\x05\x00\x34\x00\x00\x00\x06\x00\x06\x00\x39\x00\x00\x00\x0b\x00\x0b\x00\x3f\x00\x00\x00\x48\x45\x4d\x4d\x41\x64\x61\x6e\x69\x65\x6c\x4c\x49\x4c\x4c\x41\x53\x59\x53\x54\x45\x52\x4f\x54\xf2\x44\x2e\x87\x9b\x52\x0e\x12\xbd\x6d\x1e\x77\x64\x26\x2a\xed\x12\x8d\x7e\x2a\x36\xb2"
|
||
memcpy(ntlm, CHUNK, sizeof(CHUNK)-1);
|
||
size = sizeof(CHUNK)-1;
|
||
#endif
|
||
|
||
|
||
/* convert the binary blob into base64 */
|
||
size = Curl_base64_encode(ntlm, size, &base64);
|
||
|
||
if(size >0 ) {
|
||
conn->allocptr.userpwd = aprintf("Authorization: NTLM %s\r\n",
|
||
base64);
|
||
free(base64);
|
||
}
|
||
else
|
||
return CURLE_OUT_OF_MEMORY; /* FIX TODO */
|
||
|
||
data->state.ntlm.state = NTLMSTATE_TYPE3; /* we sent a type-3 */
|
||
|
||
} else
|
||
if(NTLMSTATE_TYPE3 == data->state.ntlm.state) {
|
||
/* connection is already authenticated,
|
||
* don't send a header in future requests */
|
||
if(conn->allocptr.userpwd) {
|
||
free(conn->allocptr.userpwd);
|
||
conn->allocptr.userpwd=NULL;
|
||
}
|
||
}
|
||
}
|
||
|
||
return CURLE_OK;
|
||
}
|
||
#endif /* USE_SSLEAY */
|
||
#endif /* !CURL_DISABLE_HTTP */
|