auth-request.h revision 6135260095e1704ed6edff9d00bdfc043c11429c
#ifndef AUTH_REQUEST_H
#define AUTH_REQUEST_H
#include "net.h"
#include "var-expand.h"
#include "mech.h"
#include "userdb.h"
#include "passdb.h"
#define AUTH_REQUEST_USER_KEY_IGNORE " "
struct auth_client_connection;
enum auth_request_state {
};
typedef const char *
auth_request_escape_func_t(const char *string,
const struct auth_request *auth_request);
struct auth_request {
int refcount;
enum auth_request_state state;
/* user contains the user who is being authenticated.
When master user is logging in as someone else, it gets more
complicated. Initially user is set to master's username and the
requested_login_user is set to destination username. After masterdb
has validated user as a valid master user, master_user is set to
user and user is set to requested_login_user. */
/* original_username contains the username exactly as given by the
client. this is needed at least with DIGEST-MD5 for password
verification. however with master logins the master username has
been dropped from it. */
const char *original_username;
/* the username after doing all internal translations, but before
being changed by a db lookup */
const char *translated_username;
/* realm for the request, may be specified by some auth mechanisms */
const char *realm;
char *mech_password; /* set if verify_plain() is called */
char *passdb_password; /* set after password lookup if successful */
/* extra_fields are returned in authentication reply. Fields prefixed
with "userdb_" are automatically placed to userdb_reply instead. */
struct auth_fields *extra_fields;
/* the whole userdb result reply */
struct auth_fields *userdb_reply;
/* The final result of passdb lookup (delayed due to asynchronous
proxy DNS lookups) */
enum passdb_result passdb_result;
const struct mech_module *mech;
const struct auth_settings *set;
struct auth_passdb *passdb;
struct auth_userdb *userdb;
/* passdb lookups have a handler, userdb lookups don't */
struct auth_request_handler *handler;
struct auth_master_connection *master;
unsigned int connect_uid;
unsigned int client_pid;
unsigned int id;
unsigned int last_penalty;
unsigned int initial_response_len;
const unsigned char *initial_response;
union {
const char *credentials_scheme;
void *context;
/* this is a lookup on auth socket (not login socket).
skip any proxying stuff if enabled. */
unsigned int auth_only:1;
/* we're doing a userdb lookup now (we may have done passdb lookup
earlier) */
unsigned int userdb_lookup:1;
/* DIGEST-MD5 kludge */
unsigned int domain_is_realm:1;
/* flags received from auth client: */
unsigned int secured:1;
unsigned int final_resp_ok:1;
unsigned int no_penalty:1;
unsigned int valid_client_cert:1;
unsigned int cert_username:1;
unsigned int request_auth_token:1;
unsigned int successful:1;
unsigned int internal_failure:1;
unsigned int passdbs_seen_user_unknown:1;
unsigned int passdbs_seen_internal_failure:1;
unsigned int userdbs_seen_internal_failure:1;
/* current state: */
unsigned int accept_cont_input:1;
unsigned int skip_password_check:1;
unsigned int prefer_plain_credentials:1;
unsigned int in_delayed_failure_queue:1;
unsigned int removed_from_handler:1;
unsigned int snapshot_has_userdb_reply:1;
/* each passdb lookup can update the current success-status using the
result_* rules. the authentication succeeds only if this is TRUE
at the end. mechanisms that don't require passdb, but do a passdb
lookup anyway (e.g. GSSAPI) need to set this to TRUE by default. */
unsigned int passdb_success:1;
/* userdb equivalent of passdb_success */
unsigned int userdb_success:1;
/* the last userdb lookup failed either due to "tempfail" extra field
to a number */
unsigned int userdb_lookup_tempfailed:1;
/* userdb_* fields have been set by the passdb lookup, userdb prefetch
will work. */
unsigned int userdb_prefetch_set:1;
/* ... mechanism specific data ... */
};
extern unsigned int auth_request_state_count[AUTH_REQUEST_STATE_MAX];
#define AUTH_REQUEST_VAR_TAB_USER_IDX 0
#define AUTH_REQUEST_VAR_TAB_USERNAME_IDX 1
#define AUTH_REQUEST_VAR_TAB_DOMAIN_IDX 2
#define AUTH_REQUEST_VAR_TAB_COUNT 27
extern const struct var_expand_table
extern const char auth_default_subsystems[2];
#define AUTH_SUBSYS_DB &auth_default_subsystems[0]
struct auth_request *
struct auth_request *auth_request_new_dummy(void);
enum auth_request_state state);
const char *password,
const char *scheme,
const char *username,
const char **error_r);
const char *field,
const char *const *fields,
const char *name,
const char *const *values);
/* returns -1 = failed, 0 = callback is called later, 1 = finished */
const char *subsystem);
const char *plain_password,
const char *crypted_password,
const struct var_expand_table *
ATTR_NULL(2);
struct var_expand_table *
const char *auth_request_str_escape(const char *string,
const struct auth_request *request);
const char *subsystem,
const char *subsystem,
const char *subsystem,
const char *subsystem,
const char *subsystem);
struct auth_request *request);
const unsigned char *credentials,
struct auth_request *request);
struct auth_request *request);
#endif