/* myldap.c - simple interface to do LDAP requests Parts of this file were part of the nss_ldap library (as ldap-nss.c) which has been forked into the nss-pam-ldapd library. Copyright (C) 1997-2006 Luke Howard Copyright (C) 2006, 2007 West Consulting Copyright (C) 2006, 2007, 2008, 2009 Arthur de Jong This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ /* This library expects to use an LDAP library to provide the real functionality and only provides a convenient wrapper. Some pointers for more information on the LDAP API: http://tools.ietf.org/id/draft-ietf-ldapext-ldap-c-api-05.txt http://www.mozilla.org/directory/csdk-docs/function.htm http://publib.boulder.ibm.com/infocenter/iseries/v5r3/topic/apis/dirserv1.htm http://www.openldap.org/software/man.cgi?query=ldap */ #include "config.h" /* also include deprecated LDAP functions for now */ #define LDAP_DEPRECATED 1 /* for compatibility on Solaris */ #define LDAP_REFERRALS 1 #include #include #include #include #include #include #include #include #include #include #include #include #ifdef HAVE_LDAP_SSL_H #include #endif #ifdef HAVE_GSSLDAP_H #include #endif #ifdef HAVE_GSSSASL_H #include #endif /* Try to handle systems with both SASL libraries installed */ #if defined(HAVE_SASL_SASL_H) && defined(HAVE_SASL_AUXPROP_REQUEST) #include #elif defined(HAVE_SASL_H) #include #endif #include #include #include "myldap.h" #include "common.h" #include "log.h" #include "cfg.h" #include "attmap.h" #include "common/set.h" #include "compat/ldap_compat.h" /* the maximum number of searches per session */ #define MAX_SEARCHES_IN_SESSION 4 /* This refers to a current LDAP session that contains the connection information. */ struct ldap_session { /* the connection */ LDAP *ld; /* the username to bind with */ char binddn[256]; /* the password to bind with if any */ char bindpw[64]; /* timestamp of last activity */ time_t lastactivity; /* index into ldc_uris: currently connected LDAP uri */ int current_uri; /* a list of searches registered with this session */ struct myldap_search *searches[MAX_SEARCHES_IN_SESSION]; }; /* A search description set as returned by myldap_search(). */ struct myldap_search { /* reference to the session */ MYLDAP_SESSION *session; /* indicator that the search is still valid */ int valid; /* the parameters descibing the search */ const char *base; int scope; const char *filter; char **attrs; /* a pointer to the current result entry, used for freeing resource allocated with that entry */ MYLDAP_ENTRY *entry; /* LDAP message id for the search, -1 indicates absense of an active search */ int msgid; /* the last result that was returned by ldap_result() */ LDAPMessage *msg; /* cookie for paged searches */ struct berval *cookie; /* to indicate that we can retry the search from myldap_get_entry() */ int may_retry_search; }; /* The maximum number of calls to myldap_get_values() that may be done per returned entry. */ #define MAX_ATTRIBUTES_PER_ENTRY 16 /* The maximum number of ranged attribute values that may be stoted per entry. */ #define MAX_RANGED_ATTRIBUTES_PER_ENTRY 2 /* A single entry from the LDAP database as returned by myldap_get_entry(). */ struct myldap_entry { /* reference to the search to be used to get parameters (e.g. LDAP connection) for other calls */ MYLDAP_SEARCH *search; /* the DN */ const char *dn; /* a cached version of the exploded rdn */ char **exploded_rdn; /* a cache of attribute to value list */ char **attributevalues[MAX_ATTRIBUTES_PER_ENTRY]; /* a reference to ranged attribute values so we can free() them later on */ char **rangedattributevalues[MAX_RANGED_ATTRIBUTES_PER_ENTRY]; }; static MYLDAP_ENTRY *myldap_entry_new(MYLDAP_SEARCH *search) { MYLDAP_ENTRY *entry; int i; /* Note: as an alternative we could embed the myldap_entry into the myldap_search struct to save on malloc() and free() calls. */ /* allocate new entry */ entry=(MYLDAP_ENTRY *)malloc(sizeof(struct myldap_entry)); if (entry==NULL) { log_log(LOG_CRIT,"myldap_entry_new(): malloc() failed to allocate memory"); exit(EXIT_FAILURE); } /* fill in fields */ entry->search=search; entry->dn=NULL; entry->exploded_rdn=NULL; for (i=0;iattributevalues[i]=NULL; for (i=0;irangedattributevalues[i]=NULL; /* return the fresh entry */ return entry; } static void myldap_entry_free(MYLDAP_ENTRY *entry) { int i; /* free the DN */ if (entry->dn!=NULL) ldap_memfree((char *)entry->dn); /* free the exploded RDN */ if (entry->exploded_rdn!=NULL) ldap_value_free(entry->exploded_rdn); /* free all attribute values */ for (i=0;iattributevalues[i]!=NULL) ldap_value_free(entry->attributevalues[i]); /* free all ranged attribute values */ for (i=0;irangedattributevalues[i]!=NULL) free(entry->rangedattributevalues[i]); /* we don't need the result anymore, ditch it. */ ldap_msgfree(entry->search->msg); entry->search->msg=NULL; /* free the actual memory for the struct */ free(entry); } static MYLDAP_SEARCH *myldap_search_new( MYLDAP_SESSION *session, const char *base,int scope,const char *filter,const char **attrs) { char *buffer; MYLDAP_SEARCH *search; int i; size_t sz; /* figure out size for new memory block to allocate this has the advantage that we can free the whole lot with one call */ sz=sizeof(struct myldap_search); sz+=strlen(base)+1+strlen(filter)+1; for (i=0;attrs[i]!=NULL;i++) sz+=strlen(attrs[i])+1; sz+=(i+1)*sizeof(char *); /* allocate new results memory region */ buffer=(char *)malloc(sz); if (buffer==NULL) { log_log(LOG_CRIT,"myldap_search_new(): malloc() failed to allocate memory"); exit(EXIT_FAILURE); } /* initialize struct */ search=(MYLDAP_SEARCH *)(void *)(buffer); buffer+=sizeof(struct myldap_search); /* save pointer to session */ search->session=session; /* flag as valid search */ search->valid=1; /* initialize array of attributes */ search->attrs=(char **)(void *)buffer; buffer+=(i+1)*sizeof(char *); /* copy base */ strcpy(buffer,base); search->base=buffer; buffer+=strlen(base)+1; /* just plainly store scope */ search->scope=scope; /* copy filter */ strcpy(buffer,filter); search->filter=buffer; buffer+=strlen(filter)+1; /* copy attributes themselves */ for (i=0;attrs[i]!=NULL;i++) { strcpy(buffer,attrs[i]); search->attrs[i]=buffer; buffer+=strlen(attrs[i])+1; } search->attrs[i]=NULL; /* initialize context */ search->cookie=NULL; search->msg=NULL; search->msgid=-1; search->may_retry_search=1; /* clear result entry */ search->entry=NULL; /* return the new search struct */ return search; } static MYLDAP_SESSION *myldap_session_new(void) { MYLDAP_SESSION *session; int i; /* allocate memory for the session storage */ session=(struct ldap_session *)malloc(sizeof(struct ldap_session)); if (session==NULL) { log_log(LOG_CRIT,"myldap_session_new(): malloc() failed to allocate memory"); exit(EXIT_FAILURE); } /* initialize the session */ session->ld=NULL; session->binddn[0]='\0'; session->bindpw[0]='\0'; session->lastactivity=0; session->current_uri=0; for (i=0;isearches[i]=NULL; /* return the new session */ return session; } PURE static inline int is_valid_session(MYLDAP_SESSION *session) { return (session!=NULL); } PURE static inline int is_open_session(MYLDAP_SESSION *session) { return is_valid_session(session)&&(session->ld!=NULL); } /* note that this does not check the valid flag of the search */ PURE static inline int is_valid_search(MYLDAP_SEARCH *search) { return (search!=NULL)&&is_open_session(search->session); } PURE static inline int is_valid_entry(MYLDAP_ENTRY *entry) { return (entry!=NULL)&&is_valid_search(entry->search)&&(entry->search->msg!=NULL); } #ifdef HAVE_SASL_INTERACT_T /* this is registered with ldap_sasl_interactive_bind_s() in do_bind() */ static int do_sasl_interact(LDAP UNUSED(*ld),unsigned UNUSED(flags),void *defaults,void *_interact) { struct ldap_config *cfg=defaults; sasl_interact_t *interact=_interact; while (interact->id!=SASL_CB_LIST_END) { switch(interact->id) { case SASL_CB_GETREALM: if (cfg->ldc_sasl_realm) { interact->result=cfg->ldc_sasl_realm; interact->len=strlen(cfg->ldc_sasl_realm); } break; case SASL_CB_AUTHNAME: if (cfg->ldc_sasl_authcid) { interact->result=cfg->ldc_sasl_authcid; interact->len=strlen(cfg->ldc_sasl_authcid); } break; case SASL_CB_USER: if (cfg->ldc_sasl_authzid) { interact->result=cfg->ldc_sasl_authzid; interact->len=strlen(cfg->ldc_sasl_authzid); } break; case SASL_CB_PASS: if (cfg->ldc_bindpw) { interact->result=cfg->ldc_bindpw; interact->len=strlen(cfg->ldc_bindpw); } break; default: /* just ignore */ break; } interact++; } return LDAP_SUCCESS; } #endif /* HAVE_SASL_INTERACT_T */ #define LDAP_SET_OPTION(ld,option,invalue) \ rc=ldap_set_option(ld,option,invalue); \ if (rc!=LDAP_SUCCESS) \ { \ log_log(LOG_ERR,"ldap_set_option(" #option ") failed: %s",ldap_err2string(rc)); \ return rc; \ } /* This function performs the authentication phase of opening a connection. This returns an LDAP result code. */ static int do_bind(MYLDAP_SESSION *session,const char *uri) { int rc; #ifdef HAVE_LDAP_SASL_INTERACTIVE_BIND_S #ifndef HAVE_SASL_INTERACT_T struct berval cred; #endif /* not HAVE_SASL_INTERACT_T */ #endif /* HAVE_LDAP_SASL_INTERACTIVE_BIND_S */ #ifdef LDAP_OPT_X_TLS /* check if StartTLS is requested */ if (nslcd_cfg->ldc_ssl_on==SSL_START_TLS) { log_log(LOG_DEBUG,"ldap_start_tls_s()"); errno=0; rc=ldap_start_tls_s(session->ld,NULL,NULL); if (rc!=LDAP_SUCCESS) { log_log(LOG_WARNING,"ldap_start_tls_s() failed: %s: %s", ldap_err2string(rc),strerror(errno)); return rc; } } #endif /* LDAP_OPT_X_TLS */ /* check if the binddn and bindpw are overwritten in the session */ if (session->binddn[0]!='\0') { /* do a simple bind */ log_log(LOG_DEBUG,"ldap_simple_bind_s(\"%s\",%s) (uri=\"%s\")",session->binddn, (session->bindpw[0]!='\0')?"\"*****\"":"empty",uri); return ldap_simple_bind_s(session->ld,session->binddn,session->bindpw); } #ifdef HAVE_LDAP_SASL_INTERACTIVE_BIND_S /* TODO: store this information in the session */ if (!nslcd_cfg->ldc_usesasl) { #endif /* HAVE_LDAP_SASL_INTERACTIVE_BIND_S */ /* do a simple bind */ if (nslcd_cfg->ldc_binddn) log_log(LOG_DEBUG,"ldap_simple_bind_s(\"%s\",%s) (uri=\"%s\")",nslcd_cfg->ldc_binddn, nslcd_cfg->ldc_bindpw?"\"*****\"":"NULL",uri); else log_log(LOG_DEBUG,"ldap_simple_bind_s(NULL,%s) (uri=\"%s\")", nslcd_cfg->ldc_bindpw?"\"*****\"":"NULL",uri); return ldap_simple_bind_s(session->ld,nslcd_cfg->ldc_binddn,nslcd_cfg->ldc_bindpw); #ifdef HAVE_LDAP_SASL_INTERACTIVE_BIND_S } else { /* do a SASL bind */ log_log(LOG_DEBUG,"SASL bind to %s as %s",uri,nslcd_cfg->ldc_binddn); if (nslcd_cfg->ldc_sasl_secprops!=NULL) { log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_X_SASL_SECPROPS,\"%s\")",nslcd_cfg->ldc_sasl_secprops); LDAP_SET_OPTION(session->ld,LDAP_OPT_X_SASL_SECPROPS,(void *)nslcd_cfg->ldc_sasl_secprops); } #ifdef HAVE_SASL_INTERACT_T log_log(LOG_DEBUG,"ldap_sasl_interactive_bind_s(\"%s\",\"%s\")",nslcd_cfg->ldc_binddn,nslcd_cfg->ldc_sasl_mech); return ldap_sasl_interactive_bind_s(session->ld,nslcd_cfg->ldc_binddn,nslcd_cfg->ldc_sasl_mech,NULL,NULL, LDAP_SASL_QUIET, do_sasl_interact,(void *)nslcd_cfg); #else /* HAVE_SASL_INTERACT_T */ if (nslcd_cfg->ldc_bindpw!=NULL) { cred.bv_val=nslcd_cfg->ldc_bindpw; cred.bv_len=strlen(nslcd_cfg->ldc_bindpw); } else { cred.bv_val=""; cred.bv_len=0; } log_log(LOG_DEBUG,"ldap_sasl_bind_s(\"%s\",\"%s\",%s)",nslcd_cfg->ldc_binddn, nslcd_cfg->ldc_sasl_mech,nslcd_cfg->ldc_bindpw?"\"*****\"":"NULL"); return ldap_sasl_bind_s(session->ld,nslcd_cfg->ldc_binddn,nslcd_cfg->ldc_sasl_mech,&cred,NULL,NULL,NULL); #endif /* not HAVE_SASL_INTERACT_T */ } #endif /* HAVE_LDAP_SASL_INTERACTIVE_BIND_S */ } #ifdef HAVE_LDAP_SET_REBIND_PROC /* This function is called by the LDAP library when chasing referrals. It is configured with the ldap_set_rebind_proc() below. */ static int do_rebind(LDAP *UNUSED(ld),LDAP_CONST char *url, ber_tag_t UNUSED(request), ber_int_t UNUSED(msgid),void *arg) { log_log(LOG_DEBUG,"rebinding to %s",url); return do_bind((MYLDAP_SESSION *)arg,url); } #endif /* HAVE_LDAP_SET_REBIND_PROC */ /* This function sets a number of properties on the connection, based what is configured in the configfile. This function returns an LDAP status code. */ static int do_set_options(MYLDAP_SESSION *session) { /* FIXME: move this to a global initialisation routine */ int rc; struct timeval tv; int i; #ifdef HAVE_LDAP_SET_REBIND_PROC /* the rebind function that is called when chasing referrals, see http://publib.boulder.ibm.com/infocenter/iseries/v5r3/topic/apis/ldap_set_rebind_proc.htm http://www.openldap.org/software/man.cgi?query=ldap_set_rebind_proc&manpath=OpenLDAP+2.4-Release */ /* TODO: probably only set this if we should chase referrals */ log_log(LOG_DEBUG,"ldap_set_rebind_proc()"); #ifndef LDAP_SET_REBIND_PROC_RETURNS_VOID /* it returns int */ rc=ldap_set_rebind_proc(session->ld,do_rebind,session); if (rc!=LDAP_SUCCESS) { log_log(LOG_ERR,"ldap_set_rebind_proc() failed: %s",ldap_err2string(rc)); return rc; } #else /* ldap_set_rebind_proc() returns void */ ldap_set_rebind_proc(session->ld,do_rebind,session); #endif #endif /* HAVE_LDAP_SET_REBIND_PROC */ /* set the protocol version to use */ log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_PROTOCOL_VERSION,%d)",nslcd_cfg->ldc_version); LDAP_SET_OPTION(session->ld,LDAP_OPT_PROTOCOL_VERSION,&nslcd_cfg->ldc_version); /* set some other options */ log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_DEREF,%d)",nslcd_cfg->ldc_deref); LDAP_SET_OPTION(session->ld,LDAP_OPT_DEREF,&nslcd_cfg->ldc_deref); log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_TIMELIMIT,%d)",nslcd_cfg->ldc_timelimit); LDAP_SET_OPTION(session->ld,LDAP_OPT_TIMELIMIT,&nslcd_cfg->ldc_timelimit); tv.tv_sec=nslcd_cfg->ldc_bind_timelimit; tv.tv_usec=0; #ifdef LDAP_OPT_TIMEOUT log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_TIMEOUT,%d)",nslcd_cfg->ldc_timelimit); LDAP_SET_OPTION(session->ld,LDAP_OPT_TIMEOUT,&tv); #endif /* LDAP_OPT_TIMEOUT */ #ifdef LDAP_OPT_NETWORK_TIMEOUT log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_NETWORK_TIMEOUT,%d)",nslcd_cfg->ldc_timelimit); LDAP_SET_OPTION(session->ld,LDAP_OPT_NETWORK_TIMEOUT,&tv); #endif /* LDAP_OPT_NETWORK_TIMEOUT */ #ifdef LDAP_X_OPT_CONNECT_TIMEOUT log_log(LOG_DEBUG,"ldap_set_option(LDAP_X_OPT_CONNECT_TIMEOUT,%d)",nslcd_cfg->ldc_timelimit); LDAP_SET_OPTION(session->ld,LDAP_X_OPT_CONNECT_TIMEOUT,&tv); #endif /* LDAP_X_OPT_CONNECT_TIMEOUT */ log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_REFERRALS,%s)",nslcd_cfg->ldc_referrals?"LDAP_OPT_ON":"LDAP_OPT_OFF"); LDAP_SET_OPTION(session->ld,LDAP_OPT_REFERRALS,nslcd_cfg->ldc_referrals?LDAP_OPT_ON:LDAP_OPT_OFF); log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_RESTART,%s)",nslcd_cfg->ldc_restart?"LDAP_OPT_ON":"LDAP_OPT_OFF"); LDAP_SET_OPTION(session->ld,LDAP_OPT_RESTART,nslcd_cfg->ldc_restart?LDAP_OPT_ON:LDAP_OPT_OFF); #ifdef LDAP_OPT_X_TLS /* if SSL is desired, then enable it */ if ( (nslcd_cfg->ldc_ssl_on==SSL_LDAPS) || (strncasecmp(nslcd_cfg->ldc_uris[session->current_uri].uri,"ldaps://",8)==0) ) { /* use tls */ i=LDAP_OPT_X_TLS_HARD; log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_X_TLS,LDAP_OPT_X_TLS_HARD)"); LDAP_SET_OPTION(session->ld,LDAP_OPT_X_TLS,&i); } #endif /* LDAP_OPT_X_TLS */ /* if nothing above failed, everything should be fine */ return LDAP_SUCCESS; } /* close the connection to the server and invalidate any running searches */ static void do_close(MYLDAP_SESSION *session) { int i; int rc; /* if we had reachability problems with the server close the connection */ if (session->ld!=NULL) { /* go over the other searches and partially close them */ for (i=0;isearches[i]!=NULL) { /* free any messages (because later ld is no longer valid) */ if (session->searches[i]->msg!=NULL) { ldap_msgfree(session->searches[i]->msg); session->searches[i]->msg=NULL; } /* abandon the search if there were more results to fetch */ if (session->searches[i]->msgid!=-1) { log_log(LOG_DEBUG,"ldap_abandon()"); if (ldap_abandon(session->searches[i]->session->ld,session->searches[i]->msgid)) { if (ldap_get_option(session->ld,LDAP_OPT_ERROR_NUMBER,&rc)==LDAP_SUCCESS) rc=LDAP_OTHER; log_log(LOG_WARNING,"ldap_abandon() failed to abandon search: %s",ldap_err2string(rc)); } session->searches[i]->msgid=-1; } /* flag the search as invalid */ session->searches[i]->valid=0; } } /* close the connection to the server */ log_log(LOG_DEBUG,"ldap_unbind()"); rc=ldap_unbind(session->ld); session->ld=NULL; if (rc!=LDAP_SUCCESS) log_log(LOG_WARNING,"ldap_unbind() failed: %s",ldap_err2string(rc)); } } /* This checks the timeout value of the session and closes the connection to the LDAP server if the timeout has expired and there are no pending searches. */ static void myldap_session_check(MYLDAP_SESSION *session) { int i; int runningsearches=0; time_t current_time; /* check parameters */ if (!is_valid_session(session)) { log_log(LOG_ERR,"myldap_session_check(): invalid parameter passed"); errno=EINVAL; return; } /* check if we should time out the connection */ if ((session->ld!=NULL)&&(nslcd_cfg->ldc_idle_timelimit>0)) { /* check if we have any running searches */ for (i=0;isearches[i]!=NULL)&&(session->searches[i]->valid)) { runningsearches=1; break; } } /* only consider timeout if we have no running searches */ if (!runningsearches) { time(¤t_time); if ((session->lastactivity+nslcd_cfg->ldc_idle_timelimit)ld!=NULL) return LDAP_SUCCESS; /* we should build a new session now */ session->ld=NULL; session->lastactivity=0; /* open the connection */ log_log(LOG_DEBUG,"ldap_initialize(%s)",nslcd_cfg->ldc_uris[session->current_uri].uri); errno=0; rc=ldap_initialize(&(session->ld),nslcd_cfg->ldc_uris[session->current_uri].uri); if (rc!=LDAP_SUCCESS) { log_log(LOG_WARNING,"ldap_initialize(%s) failed: %s: %s", nslcd_cfg->ldc_uris[session->current_uri].uri, ldap_err2string(rc),strerror(errno)); if (session->ld!=NULL) { log_log(LOG_DEBUG,"ldap_unbind()"); rc2=ldap_unbind(session->ld); session->ld=NULL; if (rc2!=LDAP_SUCCESS) log_log(LOG_WARNING,"ldap_unbind() failed: %s",ldap_err2string(rc2)); } return rc; } else if (session->ld==NULL) { log_log(LOG_WARNING,"ldap_initialize() returned NULL"); return LDAP_LOCAL_ERROR; } /* set the options for the connection */ rc=do_set_options(session); if (rc!=LDAP_SUCCESS) { rc2=ldap_unbind(session->ld); session->ld=NULL; if (rc2!=LDAP_SUCCESS) log_log(LOG_WARNING,"ldap_unbind() failed: %s",ldap_err2string(rc2)); return rc; } /* bind to the server */ errno=0; rc=do_bind(session,nslcd_cfg->ldc_uris[session->current_uri].uri); if (rc!=LDAP_SUCCESS) { /* log actual LDAP error code */ log_log(LOG_WARNING,"failed to bind to LDAP server %s: %s: %s", nslcd_cfg->ldc_uris[session->current_uri].uri, ldap_err2string(rc),strerror(errno)); rc2=ldap_unbind(session->ld); session->ld=NULL; if (rc2!=LDAP_SUCCESS) log_log(LOG_WARNING,"ldap_unbind() failed: %s",ldap_err2string(rc2)); return rc; } /* disable keepalive on the LDAP connection socket (why?) */ if (ldap_get_option(session->ld,LDAP_OPT_DESC,&sd)==LDAP_SUCCESS) { /* ignore errors */ (void)setsockopt(sd,SOL_SOCKET,SO_KEEPALIVE,(void *)&off,sizeof(off)); } /* update last activity and finish off state */ time(&(session->lastactivity)); log_log(LOG_INFO,"connected to LDAP server %s", nslcd_cfg->ldc_uris[session->current_uri].uri); return LDAP_SUCCESS; } /* Set alternative credentials for the session. */ int myldap_set_credentials(MYLDAP_SESSION *session,const char *dn, const char *password) { /* copy dn and password into session */ strncpy(session->binddn,dn,sizeof(session->binddn)); session->binddn[sizeof(session->binddn)-1]='\0'; strncpy(session->bindpw,password,sizeof(session->bindpw)); session->bindpw[sizeof(session->bindpw)-1]='\0'; /* try to open a connection */ return do_open(session); } static int do_try_search(MYLDAP_SEARCH *search) { int rc; LDAPControl *serverCtrls[2]; LDAPControl **pServerCtrls; int msgid; /* ensure that we have an open connection */ rc=do_open(search->session); if (rc!=LDAP_SUCCESS) return rc; /* if we're using paging, build a page control */ if ((nslcd_cfg->ldc_pagesize>0)&&(search->scope!=LDAP_SCOPE_BASE)) { rc=ldap_create_page_control(search->session->ld,nslcd_cfg->ldc_pagesize, NULL,0,&serverCtrls[0]); if (rc==LDAP_SUCCESS) { serverCtrls[1]=NULL; pServerCtrls=serverCtrls; } else { log_log(LOG_WARNING,"ldap_create_page_control() failed: %s",ldap_err2string(rc)); /* clear error flag */ rc=LDAP_SUCCESS; ldap_set_option(search->session->ld,LDAP_OPT_ERROR_NUMBER,&rc); pServerCtrls=NULL; } } else pServerCtrls=NULL; /* perform the search */ rc=ldap_search_ext(search->session->ld,search->base,search->scope, search->filter,(char **)(search->attrs), 0,pServerCtrls,NULL,NULL, LDAP_NO_LIMIT,&msgid); /* free the controls if we had them */ if (pServerCtrls!=NULL) { ldap_control_free(serverCtrls[0]); serverCtrls[0]=NULL; } /* handle errors */ if (rc!=LDAP_SUCCESS) { log_log(LOG_WARNING,"ldap_search_ext() failed: %s",ldap_err2string(rc)); return rc; } /* update the last activity on the connection */ time(&(search->session->lastactivity)); /* save msgid */ search->msgid=msgid; /* return the new search */ return LDAP_SUCCESS; } MYLDAP_SESSION *myldap_create_session(void) { return myldap_session_new(); } void myldap_session_cleanup(MYLDAP_SESSION *session) { int i; /* check parameter */ if (!is_valid_session(session)) { log_log(LOG_ERR,"myldap_session_cleanup(): invalid session passed"); return; } /* go over all searches in the session and close them */ for (i=0;isearches[i]!=NULL) { myldap_search_close(session->searches[i]); session->searches[i]=NULL; } } } void myldap_session_close(MYLDAP_SESSION *session) { /* check parameter */ if (!is_valid_session(session)) { log_log(LOG_ERR,"myldap_session_cleanup(): invalid session passed"); return; } /* close pending searches */ myldap_session_cleanup(session); /* close any open connections */ do_close(session); /* free allocated memory */ free(session); } /* mutex for updating the times in the uri */ pthread_mutex_t uris_mutex = PTHREAD_MUTEX_INITIALIZER; static int do_retry_search(MYLDAP_SEARCH *search) { int sleeptime=0; int start_uri; time_t endtime; time_t nexttry; time_t t; int rc=LDAP_UNAVAILABLE; /* keep trying until we time out */ endtime=time(NULL)+nslcd_cfg->ldc_reconnect_maxsleeptime; nexttry=endtime; while (1) { /* try each configured URL once */ pthread_mutex_lock(&uris_mutex); start_uri=search->session->current_uri; do { /* only try if we haven't just had an error and it was a long tme since the last ok */ if ( ( ( nslcd_cfg->ldc_uris[search->session->current_uri].lastfail - nslcd_cfg->ldc_uris[search->session->current_uri].lastok ) < nslcd_cfg->ldc_reconnect_maxsleeptime) || ( time(NULL) >= (nslcd_cfg->ldc_uris[search->session->current_uri].lastfail+nslcd_cfg->ldc_reconnect_maxsleeptime) ) ) { pthread_mutex_unlock(&uris_mutex); /* try to start the search */ rc=do_try_search(search); if (rc==LDAP_SUCCESS) { /* update ok time and return search handle */ pthread_mutex_lock(&uris_mutex); nslcd_cfg->ldc_uris[search->session->current_uri].lastok=time(NULL); pthread_mutex_unlock(&uris_mutex); /* flag the search as valid */ search->valid=1; return LDAP_SUCCESS; } /* close the current connection */ do_close(search->session); /* update time of failure and figure out when we should retry */ pthread_mutex_lock(&uris_mutex); t=time(NULL); nslcd_cfg->ldc_uris[search->session->current_uri].lastfail=t; t+=nslcd_cfg->ldc_reconnect_sleeptime; if (tldc_uris[search->session->current_uri].lastfail>0) { /* we are in a hard fail state, figure out when we can retry */ t=(nslcd_cfg->ldc_uris[search->session->current_uri].lastfail+nslcd_cfg->ldc_reconnect_maxsleeptime); if (tsession->current_uri++; if (nslcd_cfg->ldc_uris[search->session->current_uri].uri==NULL) search->session->current_uri=0; } while (search->session->current_uri!=start_uri); pthread_mutex_unlock(&uris_mutex); /* see if it is any use sleeping */ if (nexttry>=endtime) { log_log(LOG_ERR,"no available LDAP server found"); return rc; } /* sleep between tries */ sleeptime=nexttry-time(NULL); if (sleeptime>nslcd_cfg->ldc_reconnect_maxsleeptime) sleeptime=nslcd_cfg->ldc_reconnect_maxsleeptime; if (sleeptime>0) { log_log(LOG_WARNING,"no available LDAP server found, sleeping %d seconds",sleeptime); (void)sleep(sleeptime); } nexttry=time(NULL)+nslcd_cfg->ldc_reconnect_maxsleeptime; } } MYLDAP_SEARCH *myldap_search( MYLDAP_SESSION *session, const char *base,int scope,const char *filter,const char **attrs) { MYLDAP_SEARCH *search; int i; /* check parameters */ if (!is_valid_session(session)||(base==NULL)||(filter==NULL)||(attrs==NULL)) { log_log(LOG_ERR,"myldap_search(): invalid parameter passed"); errno=EINVAL; return NULL; } /* log the call */ log_log(LOG_DEBUG,"myldap_search(base=\"%s\", filter=\"%s\")", base,filter); /* allocate a new search entry */ search=myldap_search_new(session,base,scope,filter,attrs); /* find a place in the session where we can register our search */ for (i=0;(session->searches[i]!=NULL)&&(i=MAX_SEARCHES_IN_SESSION) { log_log(LOG_ERR,"myldap_search(): too many searches registered with session (max %d)", MAX_SEARCHES_IN_SESSION); myldap_search_close(search); return NULL; } /* regsiter search with the session so we can free it later on */ session->searches[i]=search; /* do the search with retries to all configured servers */ if (do_retry_search(search)!=LDAP_SUCCESS) { myldap_search_close(search); return NULL; } return search; } void myldap_search_close(MYLDAP_SEARCH *search) { int i; if (search==NULL) return; /* free any messages */ if (search->msg!=NULL) { ldap_msgfree(search->msg); search->msg=NULL; } /* abandon the search if there were more results to fetch */ if ((search->session->ld!=NULL)&&(search->msgid!=-1)) { ldap_abandon(search->session->ld,search->msgid); search->msgid=-1; } /* find the reference to this search in the session */ for (i=0;isession->searches[i]==search) search->session->searches[i]=NULL; } /* free any search entries */ if (search->entry!=NULL) myldap_entry_free(search->entry); /* clean up cookie */ if (search->cookie!=NULL) ber_bvfree(search->cookie); /* free read messages */ if (search->msg!=NULL) ldap_msgfree(search->msg); /* free the storage we allocated */ free(search); } MYLDAP_ENTRY *myldap_get_entry(MYLDAP_SEARCH *search,int *rcp) { int rc; int parserc; int msgid; struct timeval tv,*tvp; LDAPControl **resultcontrols; LDAPControl *serverctrls[2]; ber_int_t count; /* check parameters */ if (!is_valid_search(search)) { log_log(LOG_ERR,"myldap_get_entry(): invalid search passed"); errno=EINVAL; if (rcp!=NULL) *rcp=LDAP_OPERATIONS_ERROR; return NULL; } /* check if the connection wasn't closed in another search */ if (!search->valid) { log_log(LOG_WARNING,"myldap_get_entry(): connection was closed"); /* retry the search */ if (search->may_retry_search) { log_log(LOG_DEBUG,"myldap_get_entry(): retry search"); search->may_retry_search=0; if (do_retry_search(search)==LDAP_SUCCESS) return myldap_get_entry(search,rcp); } myldap_search_close(search); if (rcp!=NULL) *rcp=LDAP_SERVER_DOWN; return NULL; } /* set up a timelimit value for operations */ if (nslcd_cfg->ldc_timelimit==LDAP_NO_LIMIT) tvp=NULL; else { tv.tv_sec=nslcd_cfg->ldc_timelimit; tv.tv_usec=0; tvp=&tv; } /* if we have an existing result entry, free it */ if (search->entry!=NULL) { myldap_entry_free(search->entry); search->entry=NULL; } /* try to parse results until we have a final error or ok */ while (1) { /* free the previous message if there was any */ if (search->msg!=NULL) { ldap_msgfree(search->msg); search->msg=NULL; } /* get the next result */ rc=ldap_result(search->session->ld,search->msgid,LDAP_MSG_ONE,tvp,&(search->msg)); /* handle result */ switch (rc) { case -1: /* we have an error condition, try to get error code */ if (ldap_get_option(search->session->ld,LDAP_OPT_ERROR_NUMBER,&rc)!=LDAP_SUCCESS) rc=LDAP_UNAVAILABLE; log_log(LOG_ERR,"ldap_result() failed: %s",ldap_err2string(rc)); /* close connection on connection problems */ if ((rc==LDAP_UNAVAILABLE)||(rc==LDAP_SERVER_DOWN)||(rc==LDAP_SUCCESS)) { /* close the connection and retry */ do_close(search->session); if (search->may_retry_search) { log_log(LOG_DEBUG,"myldap_get_entry(): retry search"); search->may_retry_search=0; if (do_retry_search(search)==LDAP_SUCCESS) return myldap_get_entry(search,rcp); } } /* close search */ myldap_search_close(search); if (rcp!=NULL) *rcp=rc; return NULL; case 0: /* the timeout expired */ log_log(LOG_ERR,"ldap_result() timed out"); myldap_search_close(search); if (rcp!=NULL) *rcp=LDAP_TIMELIMIT_EXCEEDED; return NULL; case LDAP_RES_SEARCH_ENTRY: /* we have a normal search entry, update timestamp and return result */ time(&(search->session->lastactivity)); search->entry=myldap_entry_new(search); if (rcp!=NULL) *rcp=LDAP_SUCCESS; search->may_retry_search=0; return search->entry; case LDAP_RES_SEARCH_RESULT: /* we have a search result, parse it */ resultcontrols=NULL; if (search->cookie!=NULL) { ber_bvfree(search->cookie); search->cookie=NULL; } /* NB: this frees search->msg */ parserc=ldap_parse_result(search->session->ld,search->msg,&rc,NULL, NULL,NULL,&resultcontrols,1); search->msg=NULL; /* check for errors during parsing */ if ((parserc!=LDAP_SUCCESS)&&(parserc!=LDAP_MORE_RESULTS_TO_RETURN)) { if (resultcontrols!=NULL) ldap_controls_free(resultcontrols); log_log(LOG_ERR,"ldap_parse_result() failed: %s",ldap_err2string(parserc)); myldap_search_close(search); if (rcp!=NULL) *rcp=parserc; return NULL; } /* check for errors in message */ if ((rc!=LDAP_SUCCESS)&&(rc!=LDAP_MORE_RESULTS_TO_RETURN)) { if (resultcontrols!=NULL) ldap_controls_free(resultcontrols); log_log(LOG_ERR,"ldap_result() failed: %s",ldap_err2string(rc)); /* close connection on connection problems */ if ((rc==LDAP_UNAVAILABLE)||(rc==LDAP_SERVER_DOWN)) do_close(search->session); myldap_search_close(search); if (rcp!=NULL) *rcp=rc; return NULL; } /* handle result controls */ if (resultcontrols!=NULL) { /* see if there are any more pages to come */ rc=ldap_parse_page_control(search->session->ld, resultcontrols,&count, &(search->cookie)); if (rc!=LDAP_SUCCESS) { log_log(LOG_WARNING,"ldap_parse_page_control() failed: %s", ldap_err2string(rc)); /* clear error flag */ rc=LDAP_SUCCESS; ldap_set_option(search->session->ld,LDAP_OPT_ERROR_NUMBER,&rc); } /* TODO: handle the above return code?? */ ldap_controls_free(resultcontrols); } search->msgid=-1; /* check if there are more pages to come */ if ((search->cookie==NULL)||(search->cookie->bv_len==0)) { log_log(LOG_DEBUG,"ldap_result(): end of results"); /* we are at the end of the search, no more results */ myldap_search_close(search); if (rcp!=NULL) *rcp=LDAP_SUCCESS; return NULL; } /* try the next page */ serverctrls[0]=NULL; serverctrls[1]=NULL; rc=ldap_create_page_control(search->session->ld, nslcd_cfg->ldc_pagesize, search->cookie,0,&serverctrls[0]); if (rc!=LDAP_SUCCESS) { if (serverctrls[0]!=NULL) ldap_control_free(serverctrls[0]); log_log(LOG_WARNING,"ldap_create_page_control() failed: %s", ldap_err2string(rc)); myldap_search_close(search); if (rcp!=NULL) *rcp=rc; return NULL; } /* set up a new search for the next page */ rc=ldap_search_ext(search->session->ld, search->base,search->scope,search->filter, search->attrs,0,serverctrls,NULL,NULL, LDAP_NO_LIMIT,&msgid); ldap_control_free(serverctrls[0]); if (rc!=LDAP_SUCCESS) { log_log(LOG_WARNING,"ldap_search_ext() failed: %s", ldap_err2string(rc)); /* close connection on connection problems */ if ((rc==LDAP_UNAVAILABLE)||(rc==LDAP_SERVER_DOWN)) do_close(search->session); myldap_search_close(search); if (rcp!=NULL) *rcp=rc; return NULL; } search->msgid=msgid; /* we continue with another pass */ break; case LDAP_RES_SEARCH_REFERENCE: break; /* just ignore search references */ default: log_log(LOG_WARNING,"ldap_result() returned unexpected result type"); myldap_search_close(search); if (rcp!=NULL) *rcp=LDAP_PROTOCOL_ERROR; return NULL; } } } /* Get the DN from the entry. This function only returns NULL (and sets errno) if an incorrect entry is passed. If the DN value cannot be retreived "unknown" is returned instead. */ const char *myldap_get_dn(MYLDAP_ENTRY *entry) { int rc; /* check parameters */ if (!is_valid_entry(entry)) { log_log(LOG_ERR,"myldap_get_dn(): invalid result entry passed"); errno=EINVAL; return "unknown"; } /* if we don't have it yet, retreive it */ if ((entry->dn==NULL)&&(entry->search->valid)) { entry->dn=ldap_get_dn(entry->search->session->ld,entry->search->msg); if (entry->dn==NULL) { if (ldap_get_option(entry->search->session->ld,LDAP_OPT_ERROR_NUMBER,&rc)!=LDAP_SUCCESS) rc=LDAP_UNAVAILABLE; log_log(LOG_WARNING,"ldap_get_dn() returned NULL: %s",ldap_err2string(rc)); /* close connection on connection problems */ if ((rc==LDAP_UNAVAILABLE)||(rc==LDAP_SERVER_DOWN)) do_close(entry->search->session); } } /* if we still don't have it, return unknown */ if (entry->dn==NULL) return "unknown"; /* return it */ return entry->dn; } char *myldap_cpy_dn(MYLDAP_ENTRY *entry,char *buf,size_t buflen) { const char *dn; /* get the dn */ dn=myldap_get_dn(entry); /* copy into buffer */ if (strlen(dn)search->session; MYLDAP_SEARCH *search=NULL; SET *set=NULL; /* build the attribute name to find */ if (mysnprintf(attbuf,sizeof(attbuf),"%s;range=0-*",attr)) return NULL; /* keep doing lookups untul we can't get any more results */ while (1) { /* go over all attributes to find the ranged attribute */ ber=NULL; attn=ldap_first_attribute(entry->search->session->ld,entry->search->msg,&ber); values=NULL; while (attn!=NULL) { if (strncasecmp(attn,attbuf,strlen(attbuf)-1)==0) { log_log(LOG_DEBUG,"found ranged results %s",attn); nxt=atoi(attn+strlen(attbuf)-1)+1; values=ldap_get_values(entry->search->session->ld,entry->search->msg,attn); ldap_memfree(attn); break; } /* free old attribute name and get next one */ ldap_memfree(attn); attn=ldap_next_attribute(entry->search->session->ld,entry->search->msg,ber); } ber_free(ber,0); /* see if we found any values */ if ((values==NULL)||(*values==NULL)) break; /* allocate memory */ if (set==NULL) { set=set_new(); if (set==NULL) { ldap_value_free(values); log_log(LOG_CRIT,"myldap_get_ranged_values(): set_new() failed to allocate memory"); return NULL; } } /* add to the set */ for (i=0;values[i]!=NULL;i++) set_add(set,values[i]); /* free results */ ldap_value_free(values); /* check if we should start a new search */ if (nxt<=startat) break; startat=nxt; /* build attributes for a new search */ if (mysnprintf(attbuf,sizeof(attbuf),"%s;range=%d-*",attr,startat)) break; attrs[0]=attbuf; attrs[1]=NULL; /* close the previous search, if any */ if (search!=NULL) myldap_search_close(search); /* start the new search */ search=myldap_search(session,dn,LDAP_SCOPE_BASE,"(objectClass=*)",attrs); if (search==NULL) break; entry=myldap_get_entry(search,NULL); if (entry==NULL) break; } /* close any started searches */ if (search!=NULL) myldap_search_close(search); return set2values(set); } /* Simple wrapper around ldap_get_values(). */ const char **myldap_get_values(MYLDAP_ENTRY *entry,const char *attr) { char **values; int rc; int i; /* check parameters */ if (!is_valid_entry(entry)) { log_log(LOG_ERR,"myldap_get_values(): invalid result entry passed"); errno=EINVAL; return NULL; } else if (attr==NULL) { log_log(LOG_ERR,"myldap_get_values(): invalid attribute name passed"); errno=EINVAL; return NULL; } if (!entry->search->valid) return NULL; /* search has been stopped */ /* get from LDAP */ values=ldap_get_values(entry->search->session->ld,entry->search->msg,attr); if (values==NULL) { if (ldap_get_option(entry->search->session->ld,LDAP_OPT_ERROR_NUMBER,&rc)!=LDAP_SUCCESS) rc=LDAP_UNAVAILABLE; /* ignore decoding errors as they are just nonexisting attribute values */ if (rc==LDAP_DECODING_ERROR) { rc=LDAP_SUCCESS; ldap_set_option(entry->search->session->ld,LDAP_OPT_ERROR_NUMBER,&rc); } else if (rc==LDAP_SUCCESS) { /* we have a success code but no values, let's try to get ranged values */ values=myldap_get_ranged_values(entry,attr); if (values==NULL) return NULL; /* store values entry so we can free it later on */ for (i=0;irangedattributevalues[i]==NULL) { entry->rangedattributevalues[i]=values; return (const char **)values; } /* we found no room to store the values */ log_log(LOG_ERR,"ldap_get_values() couldn't store results, increase MAX_RANGED_ATTRIBUTES_PER_ENTRY"); free(values); return NULL; } else log_log(LOG_WARNING,"ldap_get_values() of attribute \"%s\" on entry \"%s\" returned NULL: %s", attr,myldap_get_dn(entry),ldap_err2string(rc)); return NULL; } /* store values entry so we can free it later on */ for (i=0;iattributevalues[i]==NULL) { entry->attributevalues[i]=values; return (const char **)values; } /* we found no room to store the entry */ log_log(LOG_ERR,"ldap_get_values() couldn't store results, increase MAX_ATTRIBUTES_PER_ENTRY"); ldap_value_free(values); return NULL; } /* Go over the entries in exploded_rdn and see if any start with the requested attribute. Return a reference to the value part of the DN (does not modify exploded_rdn). */ static const char *find_rdn_value(char **exploded_rdn,const char *attr) { int i,j; int l; if (exploded_rdn==NULL) return NULL; /* go over all RDNs */ l=strlen(attr); for (i=0;exploded_rdn[i]!=NULL;i++) { /* check that RDN starts with attr */ if (strncasecmp(exploded_rdn[i],attr,l)!=0) continue; /* skip spaces */ for (j=l;isspace(exploded_rdn[i][j]);j++) /* nothing here */; /* ensure that we found an equals sign now */ if (exploded_rdn[i][j]!='=') j++; /* skip more spaces */ for (j++;isspace(exploded_rdn[i][j]);j++) /* nothing here */; /* ensure that we're not at the end of the string */ if (exploded_rdn[i][j]=='\0') continue; /* we found our value */ return exploded_rdn[i]+j; } /* fail */ return NULL; } /* explode the first part of DN into parts (e.g. "cn=Test", "uid=test") The returned value should be freed with ldap_value_free(). */ static char **get_exploded_rdn(const char *dn) { char **exploded_dn; char **exploded_rdn; /* check if we have a DN */ if ((dn==NULL)||(strcasecmp(dn,"unknown")==0)) return NULL; /* explode dn into { "uid=test", "ou=people", ..., NULL } */ exploded_dn=ldap_explode_dn(dn,0); if ((exploded_dn==NULL)||(exploded_dn[0]==NULL)) { log_log(LOG_WARNING,"ldap_explode_dn(%s) returned NULL: %s", dn,strerror(errno)); return NULL; } /* explode rdn (first part of exploded_dn), e.g. "cn=Test User+uid=testusr" into { "cn=Test User", "uid=testusr", NULL } */ errno=0; exploded_rdn=ldap_explode_rdn(exploded_dn[0],0); if ((exploded_rdn==NULL)||(exploded_rdn[0]==NULL)) { log_log(LOG_WARNING,"ldap_explode_rdn(%s) returned NULL: %s", exploded_dn[0],strerror(errno)); if (exploded_rdn!=NULL) ldap_value_free(exploded_rdn); ldap_value_free(exploded_dn); return NULL; } ldap_value_free(exploded_dn); return exploded_rdn; } const char *myldap_get_rdn_value(MYLDAP_ENTRY *entry,const char *attr) { /* check parameters */ if (!is_valid_entry(entry)) { log_log(LOG_ERR,"myldap_get_rdn_value(): invalid result entry passed"); errno=EINVAL; return NULL; } else if (attr==NULL) { log_log(LOG_ERR,"myldap_get_rdn_value(): invalid attribute name passed"); errno=EINVAL; return NULL; } /* check if entry contains exploded_rdn */ if (entry->exploded_rdn==NULL) { entry->exploded_rdn=get_exploded_rdn(myldap_get_dn(entry)); if (entry->exploded_rdn==NULL) return NULL; } /* find rnd value */ return find_rdn_value(entry->exploded_rdn,attr); } const char *myldap_cpy_rdn_value(const char *dn,const char *attr, char *buf,size_t buflen) { char **exploded_rdn; const char *value; /* explode dn into { "cn=Test", "uid=test", NULL } */ exploded_rdn=get_exploded_rdn(dn); if (exploded_rdn==NULL) return NULL; /* see if we have a match */ value=find_rdn_value(exploded_rdn,attr); /* if we have something store it in the buffer */ if ((value!=NULL)&&(strlen(value)=(buflen+4)) return -1; /* do escaping for some characters */ switch (*src) { case '*': strcpy(buffer+pos,"\\2a"); pos+=3; break; case '(': strcpy(buffer+pos,"\\28"); pos+=3; break; case ')': strcpy(buffer+pos,"\\29"); pos+=3; break; case '\\': strcpy(buffer+pos,"\\5c"); pos+=3; break; default: /* just copy character */ buffer[pos++]=*src; break; } } /* terminate destination string */ buffer[pos]='\0'; return 0; } int myldap_set_debuglevel(int level) { int i; int rc; /* turn on debugging */ if (level>1) { #ifdef LBER_OPT_LOG_PRINT_FILE log_log(LOG_DEBUG,"ber_set_option(LBER_OPT_LOG_PRINT_FILE)"); \ rc=ber_set_option(NULL,LBER_OPT_LOG_PRINT_FILE,stderr); if (rc!=LDAP_SUCCESS) { log_log(LOG_ERR,"ber_set_option(LBER_OPT_LOG_PRINT_FILE) failed: %s",ldap_err2string(rc)); return rc; } #endif /* LBER_OPT_LOG_PRINT_FILE */ #ifdef LBER_OPT_DEBUG_LEVEL if (level>2) { i=-1; log_log(LOG_DEBUG,"ber_set_option(LBER_OPT_DEBUG_LEVEL,-1)"); rc=ber_set_option(NULL,LBER_OPT_DEBUG_LEVEL,&i); if (rc!=LDAP_SUCCESS) { log_log(LOG_ERR,"ber_set_option(LBER_OPT_DEBUG_LEVEL) failed: %s",ldap_err2string(rc)); return rc; } } #endif /* LBER_OPT_DEBUG_LEVEL */ #ifdef LDAP_OPT_DEBUG_LEVEL i=-1; log_log(LOG_DEBUG,"ldap_set_option(LDAP_OPT_DEBUG_LEVEL,-1)"); rc=ldap_set_option(NULL,LDAP_OPT_DEBUG_LEVEL,&i); if (rc!=LDAP_SUCCESS) { log_log(LOG_ERR,"ldap_set_option(LDAP_OPT_DEBUG_LEVEL) failed: %s",ldap_err2string(rc)); return rc; } #endif /* LDAP_OPT_DEBUG_LEVEL */ } return LDAP_SUCCESS; } int myldap_passwd( MYLDAP_SESSION *session, const char *userdn,const char *oldpassword,const char *newpasswd) { int rc; struct berval ber_userdn, ber_oldpassword, ber_newpassword, ber_retpassword; /* check parameters */ if (!is_valid_session(session)||(userdn==NULL)||(oldpassword==NULL)||(newpasswd==NULL)) { log_log(LOG_ERR,"myldap_exop_passwd(): invalid parameter passed"); errno=EINVAL; return NULL; } /* log the call */ log_log(LOG_DEBUG,"myldap_exop_passwd(userdn=\"%s\")",userdn); /* translate to ber stuff */ ber_userdn.bv_val=userdn; ber_userdn.bv_len=strlen(userdn); ber_oldpassword.bv_val=oldpassword; ber_oldpassword.bv_len=strlen(oldpassword); ber_newpassword.bv_val=newpasswd; ber_newpassword.bv_len=strlen(newpasswd); ber_retpassword.bv_val=NULL; ber_retpassword.bv_len=0; /* perform request */ rc=ldap_passwd_s(session->ld,&ber_userdn,&ber_oldpassword,&ber_newpassword, &ber_retpassword,NULL,NULL); if (rc!=LDAP_SUCCESS) log_log(LOG_ERR,"ldap_passwd_s() failed: %s",ldap_err2string(rc)); /* FIXME: free ber_retpassword data if bv_val!=NULL */ return rc; }