[0001]
[0002]
[0003]
[0004]
[0005]
[0006]
[0007]
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
[0058]
[0059]
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074]
[0075]
[0076]
[0077]
[0078]
[0079]
[0080]
[0081]
[0082]
[0083]
[0084]
[0085]
[0086]
[0087]
[0088]
[0089]
[0090]
[0091]
[0092]
[0093]
[0094]
[0095]
[0096]
[0097]
[0098]
[0099]
[0100]
[0101]
[0102]
[0103]
[0104]
[0105]
[0106]
[0107]
[0108]
[0109]
[0110]
[0111]
[0112]
[0113]
[0114]
[0115]
[0116]
[0117]
[0118]
[0119]
[0120]
[0121]
[0122]
[0123]
[0124]
[0125]
[0126]
[0127]
[0128]
[0129]
[0130]
[0131]
[0132]
[0133]
[0134]
[0135]
[0136]
[0137]
[0138]
[0139]
[0140]
[0141]
[0142]
[0143]
[0144]
[0145]
[0146]
[0147]
[0148]
[0149]
[0150]
[0151]
[0152]
[0153]
[0154]
[0155]
[0156]
[0157]
[0158]
[0159]
[0160]
[0161]
[0162]
[0163]
[0164]
[0165]
[0166]
[0167]
[0168]
[0169]
[0170]
[0171]
[0172]
[0173]
[0174]
[0175]
[0176]
[0177]
[0178]
[0179]
[0180]
[0181]
[0182]
[0183]
[0184]
[0185]
[0186]
[0187]
[0188]
[0189]
[0190]
[0191]
[0192]
[0193]
[0194]
[0195]
[0196]
[0197]
[0198]
[0199]
[0200]
[0201]
[0202]
[0203]
[0204]
[0205]
[0206]
[0207]
[0208]
[0209]
[0210]
[0211]
[0212]
[0213]
[0214]
[0215]
[0216]
[0217]
[0218]
[0219]
[0220]
[0221]
[0222]
[0223]
[0224]
[0225]
[0226]
[0227]
[0228]
[0229]
[0230]
[0231]
[0232]
[0233]
[0234]
[0235]
[0236]
[0237]
[0238]
[0239]
[0240]
[0241]
[0242]
[0243]
[0244]
[0245]
[0246]
[0247]
[0248]
[0249]
[0250]
[0251]
[0252]
[0253]
[0254]
[0255]
[0256]
[0257]
[0258]
[0259]
[0260]
[0261]
[0262]
[0263]
[0264]
[0265]
[0266]
[0267]
[0268]
[0269]
[0270]
[0271]
[0272]
[0273]
[0274]
[0275]
[0276]
[0277]
[0278]
[0279]
[0280]
[0281]
[0282]
[0283]
[0284]
[0285]
[0286]
[0287]
[0288]
[0289]
[0290]
[0291]
[0292]
[0293]
[0294]
[0295]
[0296]
[0297]
[0298]
[0299]
[0300]
[0301]
[0302]
[0303]
[0304]
[0305]
[0306]
[0307]
[0308]
[0309]
[0310]
[0311]
[0312]
[0313]
[0314]
[0315]
[0316]
[0317]
[0318]
[0319]
[0320]
[0321]
[0322]
[0323]
[0324]
[0325]
[0326]
[0327]
[0328]
[0329]
[0330]
[0331]
[0332]
[0333]
[0334]
[0335]
[0336]
[0337]
[0338]
[0339]
[0340]
[0341]
[0342]
[0343]
[0344]
[0345]
[0346]
[0347]
[0348]
[0349]
[0350]
[0351]
[0352]
[0353]
[0354]
[0355]
[0356]
[0357]
[0358]
[0359]
[0360]
[0361]
[0362]
[0363]
[0364]
[0365]
[0366]
[0367]
[0368]
[0369]
[0370]
[0371]
[0372]
[0373]
[0374]
[0375]
[0376]
[0377]
[0378]
[0379]
[0380]
[0381]
[0382]
[0383]
[0384]
[0385]
[0386]
[0387]
[0388]
[0389]
[0390]
[0391]
[0392]
[0393]
[0394]
[0395]
[0396]
[0397]
[0398]
[0399]
[0400]
[0401]
[0402]
[0403]
[0404]
[0405]
[0406]
[0407]
[0408]
[0409]
[0410]
[0411]
[0412]
[0413]
[0414]
[0415]
[0416]
[0417]
[0418]
[0419]
[0420]
[0421]
[0422]
[0423]
[0424]
[0425]
[0426]
[0427]
[0428]
[0429]
[0430]
[0431]
[0432]
[0433]
[0434]
[0435]
[0436]
[0437]
[0438]
[0439]
[0440]
[0441]
[0442]
[0443]
[0444]
[0445]
[0446]
[0447]
[0448]
[0449]
[0450]
[0451]
[0452]
[0453]
[0454]
[0455]
[0456]
[0457]
[0458]
[0459]
[0460]
[0461]
[0462]
[0463]
[0464]
[0465]
[0466]
[0467]
[0468]
[0469]
[0470]
[0471]
[0472]
[0473]
[0474]
[0475]
[0476]
[0477]
[0478]
[0479]
[0480]
[0481]
[0482]
[0483]
[0484]
[0485]
[0486]
[0487]
[0488]
[0489]
[0490]
[0491]
[0492]
[0493]
[0494]
[0495]
[0496]
[0497]
[0498]
[0499]
[0500]
[0501]
[0502]
[0503]
[0504]
[0505]
[0506]
[0507]
[0508]
[0509]
[0510]
[0511]
[0512]
[0513]
[0514]
[0515]
[0516]
[0517]
[0518]
[0519]
[0520]
[0521]
[0522]
[0523]
[0524]
[0525]
[0526]
[0527]
[0528]
[0529]
[0530]
[0531]
[0532]
[0533]
[0534]
[0535]
[0536]
[0537]
[0538]
[0539]
[0540]
[0541]
[0542]
[0543]
[0544]
[0545]
[0546]
[0547]
[0548]
[0549]
[0550]
[0551]
[0552]
[0553]
[0554]
[0555]
[0556]
[0557]
[0558]
[0559]
[0560]
[0561]
[0562]
[0563]
[0564]
[0565]
[0566]
[0567]
[0568]
[0569]
[0570]
[0571]
[0572]
[0573]
[0574]
[0575]
[0576]
[0577]
[0578]
[0579]
[0580]
[0581]
[0582]
[0583]
[0584]
[0585]
[0586]
[0587]
[0588]
[0589]
[0590]
[0591]
[0592]
[0593]
[0594]
[0595]
[0596]
[0597]
[0598]
[0599]
[0600]
[0601]
[0602]
[0603]
[0604]
[0605]
[0606]
[0607]
[0608]
[0609]
[0610]
[0611]
[0612]
[0613]
[0614]
[0615]
[0616]
[0617]
[0618]
[0619]
[0620]
[0621]
[0622]
[0623]
[0624]
[0625]
[0626]
[0627]
[0628]
[0629]
[0630]
[0631]
[0632]
[0633]
[0634]
[0635]
[0636]
[0637]
[0638]
[0639]
[0640]
[0641]
[0642]
[0643]
[0644]
[0645]
[0646]
[0647]
[0648]
[0649]
[0650]
[0651]
[0652]
[0653]
[0654]
[0655]
[0656]
[0657]
[0658]
[0659]
[0660]
[0661]
[0662]
[0663]
[0664]
[0665]
[0666]
[0667]
[0668]
[0669]
[0670]
[0671]
[0672]
[0673]
[0674]
[0675]
[0676]
[0677]
[0678]
[0679]
[0680]
[0681]
[0682]
[0683]
[0684]
[0685]
[0686]
[0687]
[0688]
[0689]
[0690]
[0691]
[0692]
[0693]
[0694]
[0695]
[0696]
[0697]
[0698]
[0699]
[0700]
[0701]
[0702]
[0703]
[0704]
[0705]
[0706]
[0707]
[0708]
[0709]
[0710]
[0711]
[0712]
[0713]
[0714]
[0715]
[0716]
[0717]
[0718]
[0719]
[0720]
[0721]
[0722]
[0723]
[0724]
[0725]
[0726]
[0727]
[0728]
[0729]
[0730]
[0731]
[0732]
[0733]
[0734]
[0735]
[0736]
[0737]
[0738]
[0739]
[0740]
[0741]
[0742]
[0743]
[0744]
[0745]
[0746]
[0747]
[0748]
[0749]
[0750]
[0751]
[0752]
[0753]
[0754]
[0755]
[0756]
[0757]
[0758]
[0759]
[0760]
[0761]
[0762]
[0763]
[0764]
[0765]
[0766]
[0767]
[0768]
[0769]
[0770]
[0771]
[0772]
[0773]
[0774]
[0775]
[0776]
[0777]
[0778]
[0779]
[0780]
[0781]
[0782]
[0783]
[0784]
[0785]
[0786]
[0787]
[0788]
[0789]
[0790]
[0791]
[0792]
[0793]
[0794]
[0795]
[0796]
[0797]
[0798]
[0799]
[0800]
[0801]
[0802]
[0803]
[0804]
[0805]
[0806]
[0807]
[0808]
[0809]
[0810]
[0811]
[0812]
[0813]
[0814]
[0815]
[0816]
[0817]
[0818]
[0819]
[0820]
[0821]
[0822]
[0823]
[0824]
[0825]
[0826]
[0827]
[0828]
[0829]
[0830]
[0831]
[0832]
[0833]
[0834]
[0835]
[0836]
[0837]
[0838]
[0839]
[0840]
[0841]
[0842]
[0843]
[0844]
[0845]
[0846]
[0847]
[0848]
[0849]
[0850]
[0851]
[0852]
[0853]
[0854]
[0855]
[0856]
[0857]
[0858]
[0859]
[0860]
[0861]
[0862]
[0863]
[0864]
[0865]
[0866]
[0867]
[0868]
[0869]
[0870]
[0871]
[0872]
[0873]
[0874]
[0875]
[0876]
[0877]
[0878]
[0879]
[0880]
[0881]
[0882]
[0883]
[0884]
[0885]
[0886]
[0887]
[0888]
[0889]
[0890]
[0891]
[0892]
[0893]
[0894]
[0895]
[0896]
[0897]
[0898]
[0899]
[0900]
[0901]
[0902]
[0903]
[0904]
[0905]
[0906]
[0907]
[0908]
[0909]
[0910]
[0911]
[0912]
[0913]
[0914]
[0915]
[0916]
[0917]
[0918]
[0919]
[0920]
[0921]
[0922]
[0923]
[0924]
[0925]
[0926]
[0927]
[0928]
[0929]
[0930]
[0931]
[0932]
[0933]
[0934]
[0935]
[0936]
[0937]
[0938]
[0939]
[0940]
[0941]
[0942]
[0943]
[0944]
[0945]
[0946]
[0947]
[0948]
[0949]
[0950]
[0951]
[0952]
[0953]
[0954]
[0955]
[0956]
[0957]
[0958]
[0959]
[0960]
[0961]
[0962]
[0963]
[0964]
[0965]
[0966]
[0967]
[0968]
[0969]
[0970]
[0971]
[0972]
[0973]
[0974]
[0975]
[0976]
[0977]
[0978]
[0979]
[0980]
[0981]
[0982]
[0983]
[0984]
[0985]
[0986]
[0987]
[0988]
[0989]
[0990]
[0991]
[0992]
[0993]
[0994]
[0995]
[0996]
[0997]
[0998]
[0999]
[1000]
[1001]
[1002]
[1003]
[1004]
[1005]
[1006]
[1007]
[1008]
[1009]
[1010]
[1011]
[1012]
[1013]
[1014]
[1015]
[1016]
[1017]
[1018]
[1019]
[1020]
[1021]
[1022]
[1023]
[1024]
[1025]
[1026]
[1027]
[1028]
[1029]
[1030]
[1031]
[1032]
[1033]
[1034]
[1035]
[1036]
[1037]
[1038]
[1039]
[1040]
[1041]
[1042]
[1043]
[1044]
[1045]
[1046]
[1047]
[1048]
[1049]
[1050]
[1051]
[1052]
[1053]
[1054]
[1055]
[1056]
[1057]
[1058]
[1059]
[1060]
[1061]
[1062]
[1063]
[1064]
[1065]
[1066]
[1067]
[1068]
[1069]
[1070]
[1071]
[1072]
[1073]
[1074]
[1075]
[1076]
[1077]
[1078]
[1079]
[1080]
[1081]
[1082]
[1083]
[1084]
[1085]
[1086]
[1087]
[1088]
[1089]
[1090]
[1091]
[1092]
[1093]
[1094]
[1095]
[1096]
[1097]
[1098]
[1099]
[1100]
[1101]
[1102]
[1103]
[1104]
[1105]
[1106]
[1107]
[1108]
[1109]
[1110]
[1111]
[1112]
[1113]
[1114]
[1115]
[1116]
[1117]
[1118]
[1119]
[1120]
[1121]
[1122]
[1123]
[1124]
[1125]
[1126]
[1127]
[1128]
[1129]
[1130]
[1131]
[1132]
[1133]
[1134]
[1135]
[1136]
[1137]
[1138]
[1139]
[1140]
[1141]
[1142]
[1143]
[1144]
[1145]
[1146]
[1147]
[1148]
[1149]
[1150]
[1151]
[1152]
[1153]
[1154]
[1155]
[1156]
[1157]
[1158]
[1159]
[1160]
[1161]
[1162]
[1163]
[1164]
[1165]
[1166]
[1167]
[1168]
[1169]
[1170]
[1171]
[1172]
[1173]
[1174]
[1175]
[1176]
[1177]
[1178]
[1179]
[1180]
[1181]
[1182]
[1183]
[1184]
[1185]
[1186]
[1187]
/*****************************************************************************/
/*
                                 AuthToken.c


    THE GNU GENERAL PUBLIC LICENSE APPLIES DOUBLY TO ANYTHING TO DO WITH
                    AUTHENTICATION AND AUTHORIZATION!

    This package is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation; version 2 of the License, or any later
    version.

>   This package is distributed in the hope that it will be useful,
>   but WITHOUT ANY WARRANTY; without even the implied warranty of
>   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
>   GNU General Public License for more details.

    You should have received a copy of the GNU General Public License
    along with this program; if not, write to the Free Software
    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.

This module provides functions related to the authentication of
case-insensitive usernames via simple lists of names (and optional
case-insensitive passwords and user detail).

See AUTH.C for overall detail on the WASD authorization environment.


TOKEN AUTHORIZATION
-------------------
This is a niche authorisation environment for addressing niche requirements.

Reflect the authorisation applied in one environment to another using a
short-lived token supplied as a cookie.  Originally devised to allow controlled
access to very large datasets without the overhead of SSL in the transmission
but with the access credentials supplied in the privacy of an SSL connection. 
The cookie contains NO CREDENTIAL data at all and the agent manages an internal
database (in memory) of these so it can determine whether any supplied token is
valid and when that token has expired.  By default (and commonly) token
authorisation occurs in non-SSL space (http:) and the credential authorisation
in SSL space (https:) although it is possible to have the two differentiated by
port only.  The path and realm specified in both must be the same.

A common scenario is where the client starts off attempting to access a
resource in non-SSL space which is controlled by TOKEN authentication.  In the
first instance the code detects there is no access token present and redirects
the client (browser) to the SSL equivalent of that space, where credentials can
be supplied encrypted.  In this scenario this SSL area is controlled by WASD
SYSUAF  authentication (or SSL client certificate for example, or other) and
the username/password is prompted for.  When correctly entered this generates a
token.  The token is stored (with corresponding detail) as a record in a global
memory buffer and then returned to the browser as a set-cookie value (during
the redirect described in the next paragraph).

With the token data stored the browser is transparently redirected back to the
non-SSL space where the actual access is to be undertaken, this time the
browser presenting the cookie containing the token to the TOKEN authentication
code originally initiating the described activity.  This code examines the
token, looking it up in the global memory buffer.  If found, has originated
from the same IP address, represents the same authentication realm,  has not
expired, then it allows the non-SSL space access to proceed, and in the
original case the dataset transfer is initiated (in unencrypted clear-text). 
If the token is not found in the database or has expired, then the process is
repeated with a redirect back into SSL space.  If the realms differ a 403
forbidden response is issued (see configuration below).

The token is a significant sequence of pseudo-random characters, is
short-lived (configurable as anything from a few seconds to a few tens of
seconds, in fact any amount of time the site is comfortable with), and as a
consequence is frequently regenerated.  The token is just that, containing no
actual credential data at all.  It might be possible to sniff but as it
contains nothing of value in itself, expires relatively quickly, and has an
originating IP address check, the fairly remote risk of playback is just that.

The authentication agent does all the work, implicitly redirecting the user
from non-SSL space to SSL space for the original authentication, and then
back again with the token used for access in the non-SSL space.  With the
expiry of a token it undertakes that cycle again, redirecting back to the
SSL-space where the browser-cached credentials will be supplied automatically
allowing the fresh token to be issued, and then redirected back into non-SSL
space for access.  To emphasise - all this is transparent to the user.

As a consequence of this model the resource being controlled can ONLY be
accessed from non-SSL space using the controlled path.  To access the same
resource from SSL space a distinct path to the resource must be provided.

Has been developed and tested against Chrome 21.0, Firefox 15.0, MSIE 9.0,
Opera 12.0 (with some tweaking) and Safari 6.0.


TOKEN RULE
----------
The token comprises two mandatory and two optional elements.  The mandatory are
the TOKEN authentication type and the preceding realm string.  This realm
string must be the same as that used to authenticate against (see below).  The
optional elements are the leading (and throwaway) realm description and the
realm parameter (see below).

Using defaults ("WASDtoken" for the token name), default https: port (443)

  [EXAMPLE_REALM=TOKEN]
  /a/path/* r+w

Specify a non-default SSL (default https:) port with default token name
("WASDtoken") using a leading ':'

  [EXAMPLE_REALM=TOKEN+:7443]
  /a/path/* r+w

Specify a non-default http: scheme (non-SSL) port with token name default
("WASDtoken") using the scheme ':' to also delimit the port

  [EXAMPLE_REALM=TOKEN+http:7443]
  /a/path/* r+w

An optional and throwaway realm description

  ["throwaway description"=EXAMPLE_REALM=TOKEN]
  /a/path/* r+w

An optional and throwaway realm description, specify non-default https: port
7443 (realm parameter can optionally be delimited by quotes)

  ["throwaway description"=EXAMPLE_REALM=TOKEN+":7443"]
  /a/path/* r+w


TOKEN PARAMETER
---------------
Token parameters can be used with both TOKEN and other credential realms,
although the lifetime parameter only applies to non-TOKEN realms.  A realm
parameter is appended to the realm type using a plus symbol and optional quoted
string.  Parameter elements are delimited by a comma.

For example a non-standard port specified with a leading ':'

  ["VMS credentials"=EXAMPLE=ID+"token=:7080"]
  /a/path/* r+w

A non-default token (cookie) name may be specified

  ["VMS credentials"=EXAMPLE=ID+"token=example-token-name"]
  /a/path/* r+w

Variations on the token (cookie) name may be specified using an integer. 
Instead of the default "WASDtoken" cookie name the following example would use
"WASDtoken10".

  ["VMS credentials"=EXAMPLE=ID+"&10"]
  /a/path/* r+w

A non-default token lifetime may be specified using a leading '#' symbol, in
this case one of 300 seconds (or 5 minutes)

  ["VMS credentials"=EXAMPLE=ID+"token=example-token-name,#300"]
  /a/path/* r+w

By default credentials are supplied in SSL space and the token is used in
non-SSL space (by redirect) but a redirect back into SSL space may be effected
using the "https:" keyword parameter (on a different port!)

  ["VMS credentials"=EXAMPLE=ID+"token=example-token-name,https:7080"]
  /a/path/* r+w


CONFIGURATION
-------------
The automatic authorisation and redirection occurs using a combination of two
distinguishable authorisation rules, one for supplying the credentials, the
other for using the token for authorisation.  In this example (and commonly)
the resources are at "/location/" and the configuration accepts user-supplied
credentials in SSL space and uses the token in non-SSL space.  The asterisk
just indicates that in the absence of any other parameter this authorisation
rule has a complementary token rule.

  # WASD_CONFIG_AUTH
  if (ssl:) 
     ["VMS credentials"=WASD_VMS_RW=id+"TOKEN=*"]
     /location/* r+w
  else
     [WASD_VMS_RW=TOKEN]
     /location/* r+w
  endif

And in this example, the same arrangement but with non-standard ports.

  # WASD_CONFIG_AUTH
  if (ssl:) 
     ["VMS credentials"=WASD_VMS_RW=id+"TOKEN=:7080"]
     /location/* r+w
  else
     [WASD_VMS_RW=TOKEN+"TOKEN=:7443"]
     /location/* r+w
  endif

To prevent potential "thrashing", where multiple, distinct realms within a
single request are authorised using tokens, corresponding multiple token
(cookie) names must be used.  It is expected that this would be an uncommon but
not impossible scenario.  "Thrashing" would be a result of authorisation
associated with a single, particular token name.  Where a realm differs from a
previous token generated another is required.  The TOKEN authorsation scheme
forces the use of distinct token names by 403-forbidding change of realm using
the one token.   Use explicitly specified, independent token (cookie) names, or
the "&<integer>" syntax to append the integer to the base token name, ensuring
the complementary rules are using the same name/integer.

  # WASD_CONFIG_AUTH
  if (ssl:) 
     ["VMS credentials"=WASD_VMS_RW=id+"TOKEN=&42"]
     /location/* r+w
  else
     [WASD_VMS_RW=TOKEN+"TOKEN=&42"]
     /location/* r+w
  endif

For the final example, the token is contained in the non-default cookie named
"WaSd_example" and the authentication performed using an X509 client
certificate (which can only be supplied via SSL).

  # WASD_CONFIG_AUTH
  if (ssl:) 
     [X509+"TOKEN=WaSd_example"]
     /location/* r+w
  else
     [X509=TOKEN+"TOKEN=WaSd_example"]
     /location/* r+w
  endif


VERSION HISTORY
---------------
18-SEP-2012  MGD  initial
*/
/*****************************************************************************/

#ifdef WASD_VMS_V7
#undef _VMS__V6__SOURCE
#define _VMS__V6__SOURCE
#undef __VMS_VER
#define __VMS_VER 70000000
#undef __CRTL_VER
#define __CRTL_VER 70000000
#endif

/* standard C header files */
#include <ctype.h>
#include <errno.h>
#include <stdio.h>
#include <string.h>

/* VMS related header files */
#include <descrip.h>
#include <secdef.h>
#include <ssdef.h>
#include <stsdef.h>

/* application related header files */
#include "wasd.h"

#define WASD_MODULE "AUTHTOKEN"

#if WATCH_MOD
#define FI_NOLI WASD_MODULE, __LINE__
#else
/* in production let's keep the exact line to ourselves! */
#define FI_NOLI WASD_MODULE, 0
#endif

/******************/
/* global storage */
/******************/

int  AuthTokenCurrentCount,
     AuthTokenGblSecPages,
     AuthTokenGblSecSize,
     AuthTokenRecordMax,
     AuthTokenRecordSize = sizeof(AUTH_TOKEN_RECORD);

AUTH_TOKEN_RECORD  *AuthTokenDataBase;

AUTH_TOKEN_GBLSEC  *AuthTokenGblSecPtr;

/********************/
/* external storage */
/********************/

extern BOOL  AuthRealmToken,
             HttpdServerStartup;

extern int  GblPageCount,
            GblSectionCount,
            HttpdTickSecond,
            InstanceNodeConfig,
            InstanceEnvNumber,
            OpcomMessages,
            AuthTokenGblSecVersion;

extern int  ToLowerCase[],
            ToUpperCase[];

extern unsigned long  GblSecPrvMask[];

extern char  ErrorSanityCheck[];

extern CONFIG_STRUCT  Config;
extern HTTPD_PROCESS  HttpdProcess;
extern SYS_INFO  SysInfo;
extern WATCH_STRUCT  Watch;

/*****************************************************************************/
/*
Initialize the token authentication/authorization environment.
*/ 

AuthTokenInit ()

{
   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_AUTH))
      WatchThis (WATCHALL, WATCH_MOD_AUTH, "AuthTokenInit()");

   if (!AuthRealmToken) return;

   if (HttpdServerStartup)
   {
      AuthTokenRecordMax = Config.cfAuth.TokenEntriesMax;
      if (AuthTokenRecordMax < 0)
      {
         AuthTokenRecordMax = 0;
         FaoToStdout ("%HTTPD-W-AUTHTOKEN, disabled\n");
         return;
      }
      if (!AuthTokenRecordMax)
         AuthTokenRecordMax = AUTH_TOKEN_DEFAULT_RECORD_MAX;
      else
      if (AuthTokenRecordMax < AUTH_TOKEN_RECORD_MIN)
         AuthTokenRecordMax = AUTH_TOKEN_RECORD_MIN;

      AuthTokenGblSecInit ();
   }

   if (!AuthTokenGblSecPtr) return;

   AuthTokenDataBase = (AUTH_TOKEN_RECORD*)(&AuthTokenGblSecPtr->RecordPool);
}

/****************************************************************************/
/*
This function runs after authentication and authorisation has occured (often
but not exclusively in SSL space).  A pseudo-random token is generated and set
as a cookie during the redirection back to the non-encrypted space.  This
token, along with a expiry time and client IP address, is added to the global
section as a record.  It then redirects to the non-SSL resource.  If anything
falls over it returns false other true to indicate a redirect is effect.
*/ 

void AuthTokenGenerate (REQUEST_STRUCT* rqptr)

{
   static unsigned long  PrevSeed;

   uint64  RandomNumber;

   int  cnt, idx,
        CookieSize,
        LocationSize,
        SemiColon,
        TokenIntegerLength = 0,
        TokenLifeTime,
        TokenMaxAgeLength,
        TokenNameLength,
        TokenPortLength = 0;
   char  *cptr, *sptr, *zptr,
         *CookiePtr,
         *SchemePtr = "http:",
         *TokenMaxAgePtr = NULL,
         *TokenIntegerPtr = NULL,
         *TokenNamePtr = NULL,
         *TokenPortPtr = NULL,
         *TokenValuePtr;
   char  TokenName [64],
         TokenValue [AUTH_SIZE_TOKEN_VALUE+1];
   AUTH_TOKEN_RECORD  *atkptr;
   DICT_ENTRY_STRUCT  *denptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_AUTH))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_AUTH, "AuthTokenGenerate()");

   if (!AuthTokenRecordMax)
   {
      if (WATCHING (rqptr, WATCH_AUTH))
          WatchThis (WATCHITM(rqptr), WATCH_AUTH, "TOKEN disabled 0 entries");
      rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_OTHER;
      return;
   }

   if (!rqptr->rqHeader.HostPtr ||
       !rqptr->rqHeader.RequestUriPtr)
   {
      if (WATCHING (rqptr, WATCH_AUTH))
          WatchThis (WATCHITM(rqptr), WATCH_AUTH, "!AZ", ErrorSanityCheck);
      rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_OTHER;
      return;
   }

   if (rqptr->rqAuth.RealmParamPtr &&
       *(cptr = rqptr->rqAuth.RealmParamPtr))
   {
      /* shouldn't even get here without this! */
      if (strsame (cptr, "TOKEN=", 6))
      {
         /**************/
         /* parameters */
         /**************/

         cptr += 6;
         while (*cptr)
         {
            if (*cptr == '*')
               cptr++;
            else
            if (*cptr == ':' && isdigit(*cptr+1))
            {
               TokenPortPtr = ++cptr;
               while (isdigit(*cptr)) cptr++;
               TokenPortLength = cptr - TokenPortPtr;
            }
            else
            if (*cptr == '#' && isdigit(*(cptr+1)))
            {
               TokenMaxAgePtr = ++cptr;
               while (isdigit(*cptr)) cptr++;
               TokenMaxAgeLength = cptr - TokenMaxAgePtr;
            }
            else
            if (*cptr == '&' && isdigit(*(cptr+1)))
            {
               TokenIntegerPtr = ++cptr;
               while (isdigit(*cptr)) cptr++;
               TokenIntegerLength = cptr - TokenIntegerPtr;
            }
            else
            if (strsame (cptr, "http:", 5))
            {
               SchemePtr = "http:";
               cptr += 5;
               if (isdigit(*cptr)) cptr--;
            }
            else
            if (strsame (cptr, "https:", 6))
            {
               SchemePtr = "https:";
               cptr += 6;
               if (isdigit(*cptr)) cptr--;
            }
            else
            if (isalpha(*cptr))
            {
               for (TokenNamePtr = cptr; *cptr && isalpha(*cptr); cptr++);
               TokenNameLength = cptr - TokenNamePtr;
            }
            else
               while (*cptr && !(ISLWS(*cptr) || *cptr == ',')) cptr++;

            while (*cptr && (ISLWS(*cptr) || *cptr == ',')) cptr++;
         }
      }
      else
      {
         if (WATCHING (rqptr, WATCH_AUTH))
             WatchThis (WATCHITM(rqptr), WATCH_AUTH, "!AZ", ErrorSanityCheck);
         rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_OTHER;
         return;
      }
   }

   if (!TokenNamePtr)
   {
      TokenNamePtr = AUTH_TOKEN_NAME_DEFAULT;
      TokenNameLength = sizeof(AUTH_TOKEN_NAME_DEFAULT)-1;
   }
   zptr = (sptr = TokenName) + sizeof(TokenName)-1;
   for (cptr = TokenNamePtr;
        TokenNameLength-- && sptr < zptr;
        *sptr++ = *cptr++);
   if (TokenIntegerLength)
      for (cptr = TokenIntegerPtr;
           TokenIntegerLength-- && sptr < zptr;
           *sptr++ = *cptr++);
   *sptr = '\0';
   TokenNameLength = sptr - TokenName;

   if (!TokenMaxAgePtr)
   {
      TokenMaxAgePtr = AUTH_TOKEN_MAXAGE_DEFAULT;
      TokenMaxAgeLength = sizeof(AUTH_TOKEN_MAXAGE_DEFAULT)-1;
   }

   TokenLifeTime = atoi(TokenMaxAgePtr);
   if (TokenLifeTime < AUTH_TOKEN_MAXAGE_MIN)
   {
      TokenMaxAgePtr = AUTH_TOKEN_MAXAGE_DEFAULT;
      TokenMaxAgeLength = sizeof(AUTH_TOKEN_MAXAGE_DEFAULT)-1;
      TokenLifeTime = atoi(TokenMaxAgePtr);
   }

   TokenValuePtr = AuthTokenFromCookie (rqptr, TokenName);

   /****************************/
   /* generate fresh PRN token */
   /****************************/

   sys$gettim (&RandomNumber);
   RandomNumber += PrevSeed;
   zptr = (sptr = TokenValue) + sizeof(TokenValue)-1;
   while (sptr < zptr)
   {
      /* cheap (no subroutine call) MTH$RANDOM() */
      RandomNumber = RandomNumber * 69069 + 1;
      cptr = (char*)&RandomNumber;
      for (cnt = sizeof(RandomNumber); cnt && sptr < zptr; cnt--)
      {
         if ((*cptr >= 'a' && *cptr <= 'z') ||
             (*cptr >= 'A' && *cptr <= 'Z') ||
             (*cptr >= '0' && *cptr <= '9')) *sptr++ = *cptr;
         cptr++;
      }
   }
   *sptr = '\0';
   PrevSeed = RandomNumber & 0xffff;

   /*******************/
   /* update database */
   /*******************/

   if (WATCHING (rqptr, WATCH_AUTH))
      WatchThis (WATCHITM(rqptr), WATCH_AUTH, "TOKEN !AZ for !ULS",
                 TokenValue, TokenLifeTime);

   InstanceMutexLock (INSTANCE_MUTEX_AUTH_TOKEN);

   /* if a previous record is not located then find one to (re)use */
   if (!(atkptr = AuthTokenFind (TokenValuePtr)))
      atkptr = AuthTokenFind (NULL);

   if (atkptr)
   {
      /* (refresh) using the new token value */
      strcpy (atkptr->TokenValue, TokenValue);
      strcpy (atkptr->AuthRealm, rqptr->rqAuth.RealmPtr);
      strcpy (atkptr->RemoteUser, rqptr->RemoteUser);
      atkptr->RemoteUserLength = rqptr->RemoteUserLength;
      atkptr->SysUafAuthenticated = rqptr->rqAuth.SysUafAuthenticated;
      atkptr->VmsUserProfile = (rqptr->rqAuth.VmsUserProfilePtr != NULL);
      atkptr->AuthUserCan = rqptr->rqAuth.UserCan;
      atkptr->ExpireSecond = HttpdTickSecond + TokenLifeTime;
      IPADDRESS_COPY (&atkptr->ClientIpAddr, &rqptr->ClientPtr->IpAddress);
   }

   InstanceMutexUnLock (INSTANCE_MUTEX_AUTH_TOKEN);

   if (!atkptr)
   {
      FaoToStdout (
"%HTTPD-W-AUTHTOKEN, !20%D, global section exhausted at !UL records\n",
                   AuthTokenRecordMax);

      if (OpcomMessages & OPCOM_AUTHORIZATION)
         FaoToOpcom (
"%HTTPD-W-AUTHTOKEN, global section exhausted\r\n",
                     AuthTokenRecordMax);

      rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_OTHER;
      return;
   }

   /*******************/
   /* generate cookie */
   /*******************/

   SemiColon = rqptr->rqHeader.UserAgentPtr &&
               !strncmp (rqptr->rqHeader.UserAgentPtr, "Opera/", 6);

   CookieSize = TokenNameLength + 3 + AUTH_SIZE_TOKEN_VALUE;
   CookieSize += sizeof(" domain=\"\"") + rqptr->rqHeader.HostLength;
   CookieSize += sizeof(" path=\"\"") + rqptr->rqHeader.RequestUriLength;
   CookieSize += sizeof(" max-age=\"\"") + TokenMaxAgeLength;
   if (SemiColon) CookieSize += 3;
   CookiePtr = VmGetHeap (rqptr, CookieSize);

   zptr = (sptr = CookiePtr) + CookieSize;
   for (cptr = TokenName;
        TokenNameLength-- && sptr < zptr;
        *sptr++ = *cptr++);
   if (sptr < zptr) *sptr++ = '=';
   if (sptr < zptr) *sptr++ = '\"';
   for (cptr = TokenValue; *cptr && sptr < zptr; *sptr++ = *cptr++);
   if (sptr < zptr) *sptr++ = '\"';
   if (SemiColon && sptr < zptr) *sptr++ = ';';
   for (cptr = " domain=\""; *cptr && sptr < zptr; *sptr++ = *cptr++);
   for (cptr = rqptr->rqHeader.HostPtr;
        *cptr && sptr < zptr;
        *sptr++ = *cptr++);
   if (sptr < zptr) *sptr++ = '\"';
   if (SemiColon && sptr < zptr) *sptr++ = ';';
   for (cptr = " path=\""; *cptr && sptr < zptr; *sptr++ = *cptr++);
   for (cptr = rqptr->rqHeader.RequestUriPtr;
        *cptr && sptr < zptr;
        *sptr++ = *cptr++);
   if (sptr < zptr) *sptr++ = '\"';
   if (SemiColon && sptr < zptr) *sptr++ = ';';
   for (cptr = " max-age=\""; *cptr && sptr < zptr; *sptr++ = *cptr++);
   for (cptr = TokenMaxAgePtr; *cptr && sptr < zptr; *sptr++ = *cptr++);
   if (sptr < zptr) *sptr++ = '\"';
   *sptr = '\0';

   for (idx = 0; idx < RESPONSE_COOKIE_MAX; idx++)
   {
      if (!rqptr->rqResponse.CookiePtr[idx])
      {
         rqptr->rqResponse.CookiePtr[idx] = CookiePtr;
         break;
      }
   }
   if (idx >= RESPONSE_COOKIE_MAX)
   {
      if (WATCHING (rqptr, WATCH_AUTH))
         WatchThis (WATCHITM(rqptr), WATCH_AUTH, "cookie storage exhausted");
      rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_OTHER;
      return;
   }
 
   /************/
   /* redirect */
   /************/

   LocationSize = rqptr->rqHeader.HostLength + TokenPortLength +
                  rqptr->rqHeader.RequestUriLength + 11;
   /* reserves space in the dictionary that will then be populated */
   sptr = ResponseLocation (rqptr, NULL, LocationSize);
   zptr = sptr + LocationSize;

   for (cptr = SchemePtr; *cptr && sptr < zptr; *sptr++ = *cptr++);
   if (sptr < zptr) *sptr++ = '/';
   if (sptr < zptr) *sptr++ = '/';
   for (cptr = rqptr->rqHeader.HostPtr;
        *cptr && *cptr != ':' && sptr < zptr;
        *sptr++ = *cptr++);

   if (TokenPortPtr)
   {
      if (sptr < zptr) *sptr++ = ':';
      for (cptr = TokenPortPtr;
           TokenPortLength-- && sptr < zptr; 
           *sptr++ = *cptr++);
   }

   for (cptr = rqptr->rqHeader.RequestUriPtr;
        *cptr && sptr < zptr;
        *sptr++ = *cptr++);
   *sptr = '\0';

   rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_REDIRECT;
}

/****************************************************************************/
/*
Authorisation by token is occurring (commonly in non-SSL space).  It looks for
a token delivered in a cookie.  If present it is searched for as a correspnding
record in the global section.  If found the expiry time and client IP address
are checked.  If after that all is OK the access is permitted.  If any of this
fails the request is redirected to the SSL-space equivalent where
authentication can be applied securely and from that generate the token and
associated cookie.
*/ 

void AuthTokenProcess (REQUEST_STRUCT* rqptr)

{
   BOOL  IPaddrMismatch = false,
         RealmMismatch = false,
         VmsUserProfile = false;
   int  ExpiresSecs = 0,
        LocationSize,
        TokenIntegerLength = 0,
        TokenNameLength,
        TokenPortLength = 0;
   char  *cptr, *sptr, *zptr,
         *SchemePtr = "https:",
         *TokenIntegerPtr = NULL,
         *TokenNamePtr = NULL,
         *TokenPortPtr = NULL,
         *TokenValuePtr;
   char  TokenName [64],
         TokenValue [AUTH_SIZE_TOKEN_VALUE+1];
   AUTH_TOKEN_RECORD  *atkptr = NULL;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_AUTH))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_AUTH,
                 "AuthTokenProcess() !&Z", rqptr->rqHeader.CookiePtr);

   if (!AuthTokenRecordMax)
   {
      if (WATCHING (rqptr, WATCH_AUTH))
          WatchThis (WATCHITM(rqptr), WATCH_AUTH, "TOKEN disabled 0 entries");
      rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_OTHER;
      return;
   }

   if (!rqptr->rqHeader.HostPtr ||
       !rqptr->rqHeader.RequestUriPtr)
   {
      ErrorNoticed (rqptr, SS$_BUGCHECK, ErrorSanityCheck, FI_LI);
      rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_OTHER;
      return;
   }

   if (rqptr->rqAuth.RealmParamPtr &&
       *(cptr = rqptr->rqAuth.RealmParamPtr))
   {
      if (strsame (cptr, "TOKEN=", 6))
      {
         /**************/
         /* parameters */
         /**************/

         cptr += 6;
         while (*cptr)
         {
            if (*cptr == '*')
               cptr++;
            else
            if (*cptr == ':' && isdigit(*cptr+1))
            {
               TokenPortPtr = ++cptr;
               while (isdigit(*cptr)) cptr++;
               TokenPortLength = cptr - TokenPortPtr;
            }
            else
            if (*cptr == '&' && isdigit(*(cptr+1)))
            {
               TokenIntegerPtr = ++cptr;
               while (isdigit(*cptr)) cptr++;
               TokenIntegerLength = cptr - TokenIntegerPtr;
            }
            else
            if (strsame (cptr, "http:", 5))
            {
               SchemePtr = "http:";
               cptr += 5;
               if (isdigit(*cptr)) cptr--;
            }
            else
            if (strsame (cptr, "https:", 6))
            {
               SchemePtr = "https:";
               cptr += 6;
               if (isdigit(*cptr)) cptr--;
            }
            else
            if (isalpha(*cptr))
            {
               for (TokenNamePtr = cptr; *cptr && isalpha(*cptr); cptr++);
               TokenNameLength = cptr - TokenNamePtr;
            }
            else
               while (*cptr && !(ISLWS(*cptr) || *cptr == ',')) cptr++;

            while (*cptr && (ISLWS(*cptr) || *cptr == ',')) cptr++;
         }
      }
   }

   if (!TokenNamePtr)
   {
      TokenNamePtr = AUTH_TOKEN_NAME_DEFAULT;
      TokenNameLength = sizeof(AUTH_TOKEN_NAME_DEFAULT)-1;
   }
   zptr = (sptr = TokenName) + sizeof(TokenName)-1;
   for (cptr = TokenNamePtr;
        TokenNameLength-- && sptr < zptr;
        *sptr++ = *cptr++);
   if (TokenIntegerLength)
      for (cptr = TokenIntegerPtr;
           TokenIntegerLength-- && sptr < zptr;
           *sptr++ = *cptr++);
   *sptr = '\0';

   TokenValuePtr = AuthTokenFromCookie (rqptr, TokenName);

   if (TokenValuePtr)
   {
      /****************/
      /* verify token */
      /****************/

      if (WATCHING (rqptr, WATCH_AUTH))
         WatchThis (WATCHITM(rqptr), WATCH_AUTH, "TOKEN !AZ", TokenValuePtr);

      InstanceMutexLock (INSTANCE_MUTEX_AUTH_TOKEN);

      atkptr = AuthTokenFind (TokenValuePtr);

      if (atkptr)
      {
         /* surely this could only happen subversively! */
         if (!IPADDRESS_IS_SAME(&atkptr->ClientIpAddr,
                                &rqptr->ClientPtr->IpAddress))
         {
            atkptr = NULL;
            IPaddrMismatch = true;
         }
      }

      if (atkptr)
      {
         /* compare the request and record realms */
         if (!strsame (rqptr->rqAuth.RealmPtr, atkptr->AuthRealm, -1))
         {
            /* can just be misconfiguration */
            atkptr = NULL;
            RealmMismatch = true;
         }
      }

      if (atkptr)
      {
         /* check the token has not expired */
         ExpiresSecs = atkptr->ExpireSecond - (unsigned int)HttpdTickSecond;
         if (ExpiresSecs < 0) atkptr = NULL;
      }

      if (atkptr)
      {
         /* validated so use the record */
         strcpy (rqptr->RemoteUser, atkptr->RemoteUser);
         rqptr->RemoteUserLength = atkptr->RemoteUserLength;
         rqptr->rqAuth.UserCan = atkptr->AuthUserCan;
         rqptr->rqAuth.SysUafAuthenticated = atkptr->SysUafAuthenticated;
         VmsUserProfile = atkptr->VmsUserProfile;
      }

      InstanceMutexUnLock (INSTANCE_MUTEX_AUTH_TOKEN);

      if (IPaddrMismatch)
      {
         if (WATCHING (rqptr, WATCH_AUTH))
            WatchThis (WATCHITM(rqptr), WATCH_AUTH, "IP address MISMATCH");

         FaoToStdout (
"%HTTPD-W-AUTHTOKEN, !20%D, IP address mismatch\n\
-AUTHTOKEN-I-SERVICE, !AZ//!AZ\n\
-AUTHTOKEN-I-CLIENT, !AZ\n\
-AUTHTOKEN-I-URI, !AZ !AZ\n",
            0, rqptr->ServicePtr->RequestSchemeNamePtr,
            rqptr->ServicePtr->ServerHostPort,
            ClientHostString(rqptr),
            rqptr->rqHeader.MethodName, rqptr->rqHeader.RequestUriPtr);

         if (OpcomMessages & OPCOM_AUTHORIZATION)
            FaoToOpcom (
"%HTTPD-W-AUTHTOKEN, IP address mismatch\r\n\
-AUTHTOKEN-I-SERVICE, !AZ//!AZ\r\n\
-AUTHTOKEN-I-CLIENT, !AZ\r\n\
-AUTHTOKEN-I-URI, !AZ !AZ",
               rqptr->ServicePtr->RequestSchemeNamePtr,
               rqptr->ServicePtr->ServerHostPort,
               ClientHostString(rqptr),
               rqptr->rqHeader.MethodName, rqptr->rqHeader.RequestUriPtr);

         rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_OTHER;
         return;
      }

      if (RealmMismatch)
      {
         if (WATCHING (rqptr, WATCH_AUTH))
            WatchThis (WATCHITM(rqptr), WATCH_AUTH, "REALM MISMATCH");

         rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_OTHER;
         return;
      }

      if (WATCHING (rqptr, WATCH_AUTH))
         WatchThis (WATCHITM(rqptr), WATCH_AUTH, "EXPIRES !AZ!SLS",
                    ExpiresSecs >= 0 ? "+" : "", ExpiresSecs);
   }

   if (TokenValuePtr && atkptr)
   {
      /************/
      /* verified */
      /************/

      rqptr->rqAuth.ResolvedRemoteUser = true;
      rqptr->rqAuth.FinalStatus = SS$_NORMAL;
      if (rqptr->rqAuth.SysUafAuthenticated)
      {
         strcpy (rqptr->rqAuth.RemoteUser, rqptr->RemoteUser);
         rqptr->rqAuth.RemoteUserLength = rqptr->RemoteUserLength;
         if (VmsUserProfile)
            rqptr->rqAuth.FinalStatus = AuthVmsCreateUserProfile (rqptr);
      }
   }
   else
   {
      /************/
      /* redirect */
      /************/

      LocationSize = rqptr->rqHeader.HostLength + TokenPortLength +
                     rqptr->rqHeader.RequestUriLength + 11;
      /* reserves space in the dictionary that will then be populated */
      sptr = ResponseLocation (rqptr, NULL, LocationSize);
      zptr = sptr + LocationSize;

      for (cptr = SchemePtr; *cptr && sptr < zptr; *sptr++ = *cptr++);
      if (sptr < zptr) *sptr++ = '/';
      if (sptr < zptr) *sptr++ = '/';
      for (cptr = rqptr->rqHeader.HostPtr;
           *cptr && *cptr != ':' && sptr < zptr;
           *sptr++ = *cptr++);

      if (TokenPortPtr)
      {
         if (sptr < zptr) *sptr++ = ':';
         for (cptr = TokenPortPtr;
              TokenPortLength-- && sptr < zptr; 
              *sptr++ = *cptr++);
      }

      for (cptr = rqptr->rqHeader.RequestUriPtr;
           *cptr && sptr < zptr;
           *sptr++ = *cptr++);
      *sptr = '\0';

      rqptr->rqAuth.FinalStatus = AUTH_DENIED_BY_REDIRECT;
   }
}

/*****************************************************************************/
/*
Find and return the token value from the cookie.  Return NULL if not found.
*/ 

char* AuthTokenFromCookie
(
REQUEST_STRUCT* rqptr,
char *TokenNamePtr
)
{
   char  *cptr, *sptr, *zptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_AUTH))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_AUTH,
                 "AuthTokenFromCookie() !&Z", TokenNamePtr);

   if (!rqptr->rqHeader.CookiePtr) return (NULL);

   if (cptr = strstr (rqptr->rqHeader.CookiePtr, TokenNamePtr))
   {
      cptr += strlen(TokenNamePtr);
      if (*cptr++ == '=')
         if (*cptr++ == '\"')
         {
            sptr = VmGetHeap (rqptr, AUTH_SIZE_TOKEN_VALUE+1);
            zptr = (rqptr->rqAuth.AuthTokenValuePtr = sptr) +
                   AUTH_SIZE_TOKEN_VALUE;
            while (*cptr && *cptr != '\"' && sptr < zptr) *sptr++ = *cptr++;
            if (sptr == zptr && *cptr == '\"')
            {
               *sptr = '\0';
               return (rqptr->rqAuth.AuthTokenValuePtr);
            }
         }
   }

   return (NULL);
}

/*****************************************************************************/
/*
Expects the global section to be locked.  If token is NULL then returns the
first available record for (re)use.  Returns NULL if not found or usable
records are exhausted.
*/ 

AUTH_TOKEN_RECORD* AuthTokenFind (char *TokenValue)

{
   int  idx;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_AUTH))
      WatchThis (WATCHALL, WATCH_MOD_AUTH,
                 "AuthTokenFind() !&Z in !UL of !UL records",
                 TokenValue, AuthTokenGblSecPtr->RecordCount,
                 AuthTokenRecordMax);

   if (TokenValue)
   {
      /* find the specified record */
      for (idx = 0; idx < AuthTokenGblSecPtr->RecordCount; idx++)
      {
         if (WATCH_MODULE(WATCH_MOD_AUTH))
            WatchThis (WATCHALL, WATCH_MOD_AUTH,
                       "!&Z", AuthTokenDataBase[idx].TokenValue);
         if (*(ULONGPTR)(AuthTokenDataBase[idx].TokenValue) !=
             *(ULONGPTR)TokenValue) continue;
         if (!strcmp (AuthTokenDataBase[idx].TokenValue, TokenValue))
            return (&AuthTokenDataBase[idx]);
      }
   }
   else
   {
      /* find a record that can be (re)used */
      for (idx = 0; idx < AuthTokenRecordMax; idx++)
      {
         if (WATCH_MODULE(WATCH_MOD_AUTH))
            WatchThis (WATCHALL, WATCH_MOD_AUTH,
                       "!&Z", AuthTokenDataBase[idx].TokenValue);
         if (!AuthTokenDataBase[idx].TokenValue[0])
         {
            AuthTokenGblSecPtr->RecordCount++;
            return (&AuthTokenDataBase[idx]);
         }
         if (AuthTokenDataBase[idx].ExpireSecond < HttpdTickSecond)
            return (&AuthTokenDataBase[idx]);
      }
   }

   return (NULL);
}

/*****************************************************************************/
/*
If only one instance can execute (from configuration) then allocate a block of
process-local dynamic memory and point to that as the cache.  If multiple
instances create and map a global section and point to that.  This is not
permananent and so requires no deletion function.
*/ 

AuthTokenGblSecInit ()

{
   static char  GblSecReport [] =
"%HTTPD-I-AUTHTOKEN, for !UL records in !AZ of !UL page(let)s\n";

   /* global, allocate space, system, in page file, writable */
   static int CreFlags = SEC$M_GBL | SEC$M_EXPREG | SEC$M_SYSGBL |
                         SEC$M_PAGFIL | SEC$M_WRT;
   static int DelFlags = SEC$M_SYSGBL;
   /* system & owner full access, group and world no access */
   static unsigned long  ProtectionMask = 0xff00;
   /* it is recommended to map into any virtual address in the region (P0) */
   static unsigned long  InAddr [2] = { 0x200, 0x200 };

   int  attempt, status,
        BaseGblSecPages,
        TokenRecordPoolSize,
        PageCount,
        SetPrvStatus;
   short  ShortLength;
   unsigned long  RetAddr [2];
   char  GblSecName [32];
   $DESCRIPTOR (GblSecNameDsc, GblSecName);
   AUTH_TOKEN_GBLSEC  *gsptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_AUTH))
      WatchThis (WATCHALL, WATCH_MOD_AUTH, "AuthTokenGblSecInit()");

   TokenRecordPoolSize = AuthTokenRecordSize * AuthTokenRecordMax;
   AuthTokenGblSecSize = sizeof(AUTH_TOKEN_GBLSEC) + TokenRecordPoolSize;
   AuthTokenGblSecPages = AuthTokenGblSecSize / 512;
   if (AuthTokenGblSecSize & 0x1ff) AuthTokenGblSecPages++;

   if (InstanceNodeConfig <= 1)
   {
      /* no need for a global section, just use process-local storage */
      AuthTokenGblSecPtr =
         (AUTH_TOKEN_GBLSEC*)VmGet (AuthTokenGblSecPages * 512);
      sys$gettim (&AuthTokenGblSecPtr->SinceTime64);
      FaoToStdout (GblSecReport, AuthTokenRecordMax,
                   "local storage", AuthTokenGblSecPages);
      return (SS$_CREATED);
   }

   FaoToBuffer (GblSecName, sizeof(GblSecName), &ShortLength,
                GBLSEC_NAME_FAO, HTTPD_NAME, AUTH_TOKEN_GBLSEC_VERSION_NUMBER,
                InstanceEnvNumber, "AUTH_TOKEN");
   GblSecNameDsc.dsc$w_length = ShortLength;

   if VMSnok ((SetPrvStatus = sys$setprv (1, &GblSecPrvMask, 0, 0)))
      ErrorExitVmsStatus (SetPrvStatus, "sys$setprv()", FI_LI);

   for (attempt = 1; attempt <= 2; attempt++)
   {
      /* create and/or map the specified global section */
      sys$setprv (1, &GblSecPrvMask, 0, 0);
      status = sys$crmpsc (&InAddr, &RetAddr, 0, CreFlags,
                           &GblSecNameDsc, 0, 0, 0, AuthTokenGblSecPages, 0,
                           ProtectionMask, AuthTokenGblSecPages);
      sys$setprv (0, &GblSecPrvMask, 0, 0);

      if (WATCH_MODULE(WATCH_MOD_AUTH))
         WatchThis (WATCHALL, WATCH_MOD_AUTH,
                    "sys$crmpsc() !&S begin:!UL end:!UL",
                    status, RetAddr[0], RetAddr[1]);

      PageCount = (RetAddr[1]+1) - RetAddr[0] >> 9;
      AuthTokenGblSecPtr = gsptr = (AUTH_TOKEN_GBLSEC*)RetAddr[0];
      AuthTokenGblSecPages = PageCount;
      if (VMSnok (status) || status == SS$_CREATED) break;

      /* section already exists, break if 'same size' and version! */
      if (gsptr->GblSecVersion &&
          gsptr->GblSecVersion == AuthTokenGblSecVersion &&
          gsptr->GblSecLength == AuthTokenGblSecSize)
         break;

      /* delete the current global section, have one more attempt */
      sys$setprv (1, &GblSecPrvMask, 0, 0);
      status = sys$dgblsc (DelFlags, &GblSecNameDsc, 0);
      sys$setprv (0, &GblSecPrvMask, 0, 0);
      status = SS$_IDMISMATCH;
   }

   if (VMSnok (status))
   {
      /* must have this global section! */
      char  String [256];
      FaoToBuffer (String, sizeof(String), NULL,
                   "1 global section, !UL global pages",
                   AuthTokenGblSecPages);
      ErrorExitVmsStatus (status, String, FI_LI);
   }

   if (WATCH_MODULE(WATCH_MOD_AUTH))
      WatchThis (WATCHALL, WATCH_MOD_AUTH,
         "GBLSEC \"!AZ\" page(let)s:!UL !&S",
         GblSecName, PageCount, status);

   FaoToStdout (GblSecReport, AuthTokenRecordMax,
                status == SS$_CREATED ? "a new global section" :
                                        "an existing global section",
                AuthTokenGblSecPages);

   if (status == SS$_CREATED)
   {
      /* first time it's been mapped */
      memset (gsptr, 0, PageCount * 512);
      gsptr->GblSecVersion = AuthTokenGblSecVersion;
      gsptr->GblSecLength =  AuthTokenGblSecSize;
      sys$gettim (&AuthTokenGblSecPtr->SinceTime64);
   }

   GblSectionCount++;
   GblPageCount += PageCount;

   return (status);
}

/****************************************************************************/