1 #ifndef __HTTP_NTLM_H
2 #define __HTTP_NTLM_H
3 /***************************************************************************
4  *                                  _   _ ____  _
5  *  Project                     ___| | | |  _ \| |
6  *                             / __| | | | |_) | |
7  *                            | (__| |_| |  _ <| |___
8  *                             \___|\___/|_| \_\_____|
9  *
10  * Copyright (C) 1998 - 2009, Daniel Stenberg, <daniel@haxx.se>, et al.
11  *
12  * This software is licensed as described in the file COPYING, which
13  * you should have received as part of this distribution. The terms
14  * are also available at http://curl.haxx.se/docs/copyright.html.
15  *
16  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
17  * copies of the Software, and permit persons to whom the Software is
18  * furnished to do so, under the terms of the COPYING file.
19  *
20  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
21  * KIND, either express or implied.
22  *
23  * $Id: http_ntlm.h,v 1.17 2009-02-27 08:53:10 bagder Exp $
24  ***************************************************************************/
25 
26 typedef enum {
27   CURLNTLM_NONE, /* not a ntlm */
28   CURLNTLM_BAD,  /* an ntlm, but one we don't like */
29   CURLNTLM_FIRST, /* the first 401-reply we got with NTLM */
30   CURLNTLM_FINE, /* an ntlm we act on */
31 
32   CURLNTLM_LAST  /* last entry in this enum, don't use */
33 } CURLntlm;
34 
35 /* this is for ntlm header input */
36 CURLntlm Curl_input_ntlm(struct connectdata *conn, bool proxy,
37                          const char *header);
38 
39 /* this is for creating ntlm header output */
40 CURLcode Curl_output_ntlm(struct connectdata *conn, bool proxy);
41 
42 void Curl_ntlm_cleanup(struct connectdata *conn);
43 #ifndef USE_NTLM
44 #define Curl_ntlm_cleanup(x)
45 #endif
46 
47 /* Flag bits definitions based on http://davenport.sourceforge.net/ntlm.html */
48 
49 #define NTLMFLAG_NEGOTIATE_UNICODE               (1<<0)
50 /* Indicates that Unicode strings are supported for use in security buffer
51    data. */
52 
53 #define NTLMFLAG_NEGOTIATE_OEM                   (1<<1)
54 /* Indicates that OEM strings are supported for use in security buffer data. */
55 
56 #define NTLMFLAG_REQUEST_TARGET                  (1<<2)
57 /* Requests that the server's authentication realm be included in the Type 2
58    message. */
59 
60 /* unknown (1<<3) */
61 #define NTLMFLAG_NEGOTIATE_SIGN                  (1<<4)
62 /* Specifies that authenticated communication between the client and server
63    should carry a digital signature (message integrity). */
64 
65 #define NTLMFLAG_NEGOTIATE_SEAL                  (1<<5)
66 /* Specifies that authenticated communication between the client and server
67    should be encrypted (message confidentiality). */
68 
69 #define NTLMFLAG_NEGOTIATE_DATAGRAM_STYLE        (1<<6)
70 /* Indicates that datagram authentication is being used. */
71 
72 #define NTLMFLAG_NEGOTIATE_LM_KEY                (1<<7)
73 /* Indicates that the LAN Manager session key should be used for signing and
74    sealing authenticated communications. */
75 
76 #define NTLMFLAG_NEGOTIATE_NETWARE               (1<<8)
77 /* unknown purpose */
78 
79 #define NTLMFLAG_NEGOTIATE_NTLM_KEY              (1<<9)
80 /* Indicates that NTLM authentication is being used. */
81 
82 /* unknown (1<<10) */
83 
84 #define NTLMFLAG_NEGOTIATE_ANONYMOUS             (1<<11)
85 /* Sent by the client in the Type 3 message to indicate that an anonymous
86    context has been established. This also affects the response fields. */
87 
88 #define NTLMFLAG_NEGOTIATE_DOMAIN_SUPPLIED       (1<<12)
89 /* Sent by the client in the Type 1 message to indicate that a desired
90    authentication realm is included in the message. */
91 
92 #define NTLMFLAG_NEGOTIATE_WORKSTATION_SUPPLIED  (1<<13)
93 /* Sent by the client in the Type 1 message to indicate that the client
94    workstation's name is included in the message. */
95 
96 #define NTLMFLAG_NEGOTIATE_LOCAL_CALL            (1<<14)
97 /* Sent by the server to indicate that the server and client are on the same
98    machine. Implies that the client may use a pre-established local security
99    context rather than responding to the challenge. */
100 
101 #define NTLMFLAG_NEGOTIATE_ALWAYS_SIGN           (1<<15)
102 /* Indicates that authenticated communication between the client and server
103    should be signed with a "dummy" signature. */
104 
105 #define NTLMFLAG_TARGET_TYPE_DOMAIN              (1<<16)
106 /* Sent by the server in the Type 2 message to indicate that the target
107    authentication realm is a domain. */
108 
109 #define NTLMFLAG_TARGET_TYPE_SERVER              (1<<17)
110 /* Sent by the server in the Type 2 message to indicate that the target
111    authentication realm is a server. */
112 
113 #define NTLMFLAG_TARGET_TYPE_SHARE               (1<<18)
114 /* Sent by the server in the Type 2 message to indicate that the target
115    authentication realm is a share. Presumably, this is for share-level
116    authentication. Usage is unclear. */
117 
118 #define NTLMFLAG_NEGOTIATE_NTLM2_KEY             (1<<19)
119 /* Indicates that the NTLM2 signing and sealing scheme should be used for
120    protecting authenticated communications. */
121 
122 #define NTLMFLAG_REQUEST_INIT_RESPONSE           (1<<20)
123 /* unknown purpose */
124 
125 #define NTLMFLAG_REQUEST_ACCEPT_RESPONSE         (1<<21)
126 /* unknown purpose */
127 
128 #define NTLMFLAG_REQUEST_NONNT_SESSION_KEY       (1<<22)
129 /* unknown purpose */
130 
131 #define NTLMFLAG_NEGOTIATE_TARGET_INFO           (1<<23)
132 /* Sent by the server in the Type 2 message to indicate that it is including a
133    Target Information block in the message. */
134 
135 /* unknown (1<24) */
136 /* unknown (1<25) */
137 /* unknown (1<26) */
138 /* unknown (1<27) */
139 /* unknown (1<28) */
140 
141 #define NTLMFLAG_NEGOTIATE_128                   (1<<29)
142 /* Indicates that 128-bit encryption is supported. */
143 
144 #define NTLMFLAG_NEGOTIATE_KEY_EXCHANGE          (1<<30)
145 /* Indicates that the client will provide an encrypted master key in
146    the "Session Key" field of the Type 3 message. */
147 
148 #define NTLMFLAG_NEGOTIATE_56                    (1<<31)
149 /* Indicates that 56-bit encryption is supported. */
150 #endif
151