// // VMime library (http://www.vmime.org) // Copyright (C) 2002-2006 Vincent Richard // // This program is free software; you can redistribute it and/or // modify it under the terms of the GNU General Public License as // published by the Free Software Foundation; either version 2 of // the License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // General Public License for more details. // // You should have received a copy of the GNU General Public License along // with this program; if not, write to the Free Software Foundation, Inc., // 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. // // Linking this library statically or dynamically with other modules is making // a combined work based on this library. Thus, the terms and conditions of // the GNU General Public License cover the whole combination. // #include #include #include "vmime/security/sasl/SASLSession.hpp" #include "vmime/security/sasl/SASLContext.hpp" #include "vmime/security/sasl/SASLSocket.hpp" #include "vmime/security/sasl/SASLAuthenticator.hpp" namespace vmime { namespace security { namespace sasl { SASLSession::SASLSession(const string& serviceName, ref ctx, ref auth, ref mech) : m_serviceName(serviceName), m_context(ctx), m_auth(auth), m_mech(mech), m_gsaslContext(0), m_gsaslSession(0) { if (gsasl_init(&m_gsaslContext) != GSASL_OK) throw std::bad_alloc(); gsasl_client_start(m_gsaslContext, mech->getName().c_str(), &m_gsaslSession); gsasl_callback_set(m_gsaslContext, gsaslCallback); gsasl_callback_hook_set(m_gsaslContext, this); } SASLSession::~SASLSession() { gsasl_finish(m_gsaslSession); m_gsaslSession = 0; gsasl_done(m_gsaslContext); m_gsaslContext = 0; } void SASLSession::init() { ref saslAuth = m_auth.dynamicCast (); if (saslAuth) { saslAuth->setSASLMechanism(m_mech); saslAuth->setSASLSession(thisRef().dynamicCast ()); } } ref SASLSession::getAuthenticator() { return m_auth; } ref SASLSession::getMechanism() { return m_mech; } ref SASLSession::getContext() { return m_context; } const bool SASLSession::evaluateChallenge (const byte* challenge, const int challengeLen, byte** response, int* responseLen) { return m_mech->step(thisRef().dynamicCast (), challenge, challengeLen, response, responseLen); } ref SASLSession::getSecuredSocket(ref sok) { return vmime::create (thisRef().dynamicCast (), sok); } const string SASLSession::getServiceName() const { return m_serviceName; } // static int SASLSession::gsaslCallback (Gsasl* ctx, Gsasl_session* sctx, Gsasl_property prop) { SASLSession* sess = reinterpret_cast (gsasl_callback_hook_get(ctx)); if (!sess) return GSASL_AUTHENTICATION_ERROR; ref auth = sess->getAuthenticator(); try { string res; switch (prop) { case GSASL_AUTHID: res = auth->getUsername(); break; case GSASL_PASSWORD: res = auth->getPassword(); break; case GSASL_ANONYMOUS_TOKEN: res = auth->getAnonymousToken(); break; case GSASL_HOSTNAME: res = auth->getHostname(); break; case GSASL_SERVICE: res = auth->getServiceName(); break; case GSASL_AUTHZID: case GSASL_GSSAPI_DISPLAY_NAME: case GSASL_PASSCODE: case GSASL_SUGGESTED_PIN: case GSASL_PIN: case GSASL_REALM: default: return GSASL_NO_CALLBACK; } gsasl_property_set(sctx, prop, res.c_str()); return GSASL_OK; } //catch (exceptions::no_auth_information&) catch (...) { return GSASL_NO_CALLBACK; } } } // sasl } // security } // vmime