aboutsummaryrefslogtreecommitdiffstats
path: root/ntlmsubr.c
diff options
context:
space:
mode:
authorMatthias Andree <matthias.andree@gmx.de>2010-10-09 12:21:51 +0200
committerMatthias Andree <matthias.andree@gmx.de>2010-10-09 12:21:51 +0200
commitc0db499f36439269c81c0d83fc4655502985bbc5 (patch)
tree6014c43afcec291ff11cbcea75320a8af5564cec /ntlmsubr.c
parent858d08aeb74c6280ebcc29f6674084f345fdd425 (diff)
parent269cba9b00fa7ecb0d707ef5b6f10d34e049327c (diff)
downloadfetchmail-c0db499f36439269c81c0d83fc4655502985bbc5.tar.gz
fetchmail-c0db499f36439269c81c0d83fc4655502985bbc5.tar.bz2
fetchmail-c0db499f36439269c81c0d83fc4655502985bbc5.zip
Merge branch 'master' of gitorious.org:fetchmail/fetchmail
Diffstat (limited to 'ntlmsubr.c')
-rw-r--r--ntlmsubr.c74
1 files changed, 74 insertions, 0 deletions
diff --git a/ntlmsubr.c b/ntlmsubr.c
new file mode 100644
index 00000000..ab685ff0
--- /dev/null
+++ b/ntlmsubr.c
@@ -0,0 +1,74 @@
+#include "config.h"
+
+#ifdef NTLM_ENABLE
+#include "fetchmail.h"
+#include "ntlm.h"
+#include "socket.h"
+
+#include <string.h>
+
+int ntlm_helper(int sock, struct query *ctl, const char *proto)
+{
+/*
+ * NTLM support by Grant Edwards.
+ *
+ * Handle MS-Exchange NTLM authentication method. This is the same
+ * as the NTLM auth used by Samba for SMB related services. We just
+ * encode the packets in base64 instead of sending them out via a
+ * network interface.
+ *
+ * Much source (ntlm.h, smb*.c smb*.h) was borrowed from Samba.
+ */
+ tSmbNtlmAuthRequest request;
+ tSmbNtlmAuthChallenge challenge;
+ tSmbNtlmAuthResponse response;
+
+ char msgbuf[2048];
+ int result;
+
+ if ((result = gen_recv(sock, msgbuf, sizeof msgbuf)))
+ return result;
+
+ if (0 != strcmp(msgbuf, "+ "))
+ return PS_AUTHFAIL;
+
+ buildSmbNtlmAuthRequest(&request,ctl->remotename,NULL);
+
+ if (outlevel >= O_DEBUG)
+ dumpSmbNtlmAuthRequest(stdout, &request);
+
+ memset(msgbuf,0,sizeof msgbuf);
+ to64frombits (msgbuf, &request, SmbLength(&request));
+
+ if (outlevel >= O_MONITOR)
+ report(stdout, "%s> %s\n", proto, msgbuf);
+
+ strcat(msgbuf,"\r\n");
+ SockWrite (sock, msgbuf, strlen (msgbuf));
+
+ if ((gen_recv(sock, msgbuf, sizeof msgbuf)))
+ return result;
+
+ (void)from64tobits (&challenge, msgbuf, sizeof(challenge));
+
+ if (outlevel >= O_DEBUG)
+ dumpSmbNtlmAuthChallenge(stdout, &challenge);
+
+ buildSmbNtlmAuthResponse(&challenge, &response,ctl->remotename,ctl->password);
+
+ if (outlevel >= O_DEBUG)
+ dumpSmbNtlmAuthResponse(stdout, &response);
+
+ memset(msgbuf,0,sizeof msgbuf);
+ to64frombits (msgbuf, &response, SmbLength(&response));
+
+ if (outlevel >= O_MONITOR)
+ report(stdout, "%s> %s\n", proto, msgbuf);
+
+ strcat(msgbuf,"\r\n");
+ SockWrite (sock, msgbuf, strlen (msgbuf));
+
+ return PS_SUCCESS;
+}
+
+#endif /* NTLM_ENABLE */