1 /* ldapexop.c -- a tool for performing well-known extended operations */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 2005-2006 The OpenLDAP Foundation.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted only as authorized by the OpenLDAP
12 * A copy of this license is available in the file LICENSE in the
13 * top-level directory of the distribution or, alternatively, at
14 * <http://www.OpenLDAP.org/license.html>.
17 * This work was originally developed by Pierangelo Masarati for inclusion
18 * in OpenLDAP Software based, in part, on other client tools.
25 #include <ac/stdlib.h>
28 #include <ac/socket.h>
29 #include <ac/string.h>
31 #include <ac/unistd.h>
36 #include "lutil_ldap.h"
37 #include "ldap_defaults.h"
44 fprintf( stderr, _("Issue LDAP extended operations\n\n"));
45 fprintf( stderr, _("usage: %s [options] [oid [data]]\n"), prog);
51 const char options[] = ""
52 "d:D:e:h:H:InO:p:QR:U:vVw:WxX:y:Y:Z";
55 handle_private_option( int i )
66 main( int argc, char *argv[] )
73 char *matcheddn = NULL, *text = NULL, **refs = NULL;
77 tool_init( TOOL_EXOP );
78 prog = lutil_progname( "ldapexop", argc, argv );
81 protocol = LDAP_VERSION3;
83 tool_args( argc, argv );
85 if ( argc - optind < 1 ) {
89 if ( pw_file || want_bindpw ) {
91 rc = lutil_get_filed_password( pw_file, &passwd );
92 if( rc ) return EXIT_FAILURE;
94 passwd.bv_val = getpassphrase( _("Enter LDAP Password: ") );
95 passwd.bv_len = passwd.bv_val ? strlen( passwd.bv_val ) : 0;
99 ld = tool_conn_setup( 0, 0 );
106 if ( strcasecmp( argv[ 0 ], "whoami" ) == 0 ) {
115 fprintf( stderr, "need [user]\n\n" );
119 tool_server_controls( ld, NULL, 0 );
121 rc = ldap_whoami( ld, NULL, NULL, &id );
122 if ( rc != LDAP_SUCCESS ) {
123 tool_perror( "ldap_extended_operation", rc, NULL, NULL, NULL, NULL );
128 } else if ( strcasecmp( argv[ 0 ], "cancel" ) == 0 ) {
133 if ( lutil_atoi( &cancelid, argv[ 1 ] ) != 0 || cancelid < 0 ) {
134 fprintf( stderr, "invalid cancelid=%s\n\n", argv[ 1 ] );
140 fprintf( stderr, "need cancelid\n\n" );
144 rc = ldap_cancel( ld, cancelid, NULL, NULL, &id );
145 if ( rc != LDAP_SUCCESS ) {
146 tool_perror( "ldap_cancel", rc, NULL, NULL, NULL, NULL );
151 } else if ( strcasecmp( argv[ 0 ], "passwd" ) == 0 ) {
152 fprintf( stderr, "use ldappasswd(1) instead.\n\n", argv[ 0 ] );
156 } else if ( strcasecmp( argv[ 0 ], "refresh" ) == 0 ) {
162 ttl = atoi( argv[ 2 ] );
165 dn.bv_val = argv[ 1 ];
166 dn.bv_len = strlen( dn.bv_val );
172 fprintf( stderr, _("need DN [ttl]\n\n") );
176 tool_server_controls( ld, NULL, 0 );
178 rc = ldap_refresh( ld, &dn, ttl, NULL, NULL, &id );
179 if ( rc != LDAP_SUCCESS ) {
180 tool_perror( "ldap_extended_operation", rc, NULL, NULL, NULL, NULL );
185 } else if ( tool_is_oid( argv[ 0 ] ) ) {
186 struct berval reqdata;
187 struct berval *reqdatap;
191 } else if ( argc == 2 ) {
192 reqdata.bv_val = argv[ 1 ];
193 reqdata.bv_len = strlen( argv[ 1 ] );
198 rc = ldap_extended_operation( ld, argv[ 0 ], reqdatap, NULL, NULL, &id );
199 if ( rc != LDAP_SUCCESS ) {
200 tool_perror( "ldap_extended_operation", rc, NULL, NULL, NULL, NULL );
205 fprintf( stderr, "unknown exop \"%s\"\n\n", argv[ 0 ] );
212 if ( tool_check_abandon( ld, id ) ) {
213 return LDAP_CANCELLED;
219 rc = ldap_result( ld, LDAP_RES_ANY, LDAP_MSG_ALL, &tv, &res );
221 tool_perror( "ldap_result", rc, NULL, NULL, NULL, NULL );
231 rc = ldap_parse_result( ld, res,
232 &code, &matcheddn, &text, &refs, NULL, 0 );
233 if ( rc == LDAP_SUCCESS ) {
237 if ( rc != LDAP_SUCCESS ) {
238 tool_perror( "ldap_parse_result", rc, NULL, matcheddn, text, refs );
243 if ( strcasecmp( argv[ 0 ], "whoami" ) == 0 ) {
245 struct berval *retdata = NULL;
247 rc = ldap_parse_extended_result( ld, res, &retoid, &retdata, 1 );
249 if ( rc != LDAP_SUCCESS ) {
250 tool_perror( "ldap_parse_extended_result", rc, NULL, NULL, NULL, NULL );
255 if ( retdata != NULL ) {
256 if ( retdata->bv_len == 0 ) {
257 printf(_("anonymous\n") );
259 printf("%s\n", retdata->bv_val );
263 ber_memfree( retoid );
264 ber_bvfree( retdata );
266 } else if ( strcasecmp( argv[ 0 ], "cancel" ) == 0 ) {
267 /* no extended response; returns specific errors */
270 } else if ( strcasecmp( argv[ 0 ], "passwd" ) == 0 ) {
273 } else if ( strcasecmp( argv[ 0 ], "refresh" ) == 0 ) {
276 rc = ldap_parse_refresh( ld, res, &newttl );
278 if ( rc != LDAP_SUCCESS ) {
279 tool_perror( "ldap_parse_refresh", rc, NULL, NULL, NULL, NULL );
284 printf( "newttl=%d\n", newttl );
286 } else if ( tool_is_oid( argv[ 0 ] ) ) {
288 struct berval *retdata = NULL;
291 printf(_("# extended operation response\n"));
294 rc = ldap_parse_extended_result( ld, res, &retoid, &retdata, 1 );
295 if ( rc != LDAP_SUCCESS ) {
296 tool_perror( "ldap_parse_extended_result", rc, NULL, NULL, NULL, NULL );
301 if ( ldif < 2 && retoid != NULL ) {
302 tool_write_ldif( ldif ? LDIF_PUT_COMMENT : LDIF_PUT_VALUE,
303 "oid", retoid, strlen(retoid) );
306 ber_memfree( retoid );
308 if( retdata != NULL ) {
310 tool_write_ldif( ldif ? LDIF_PUT_COMMENT : LDIF_PUT_BINARY,
311 "data", retdata->bv_val, retdata->bv_len );
314 ber_bvfree( retdata );
318 if( verbose || ( code != LDAP_SUCCESS ) || matcheddn || text || refs ) {
319 printf( _("Result: %s (%d)\n"), ldap_err2string( code ), code );
321 if( text && *text ) {
322 printf( _("Additional info: %s\n"), text );
325 if( matcheddn && *matcheddn ) {
326 printf( _("Matched DN: %s\n"), matcheddn );
331 for( i=0; refs[i]; i++ ) {
332 printf(_("Referral: %s\n"), refs[i] );
338 ber_memfree( matcheddn );
339 ber_memvfree( (void **) refs );
342 /* disconnect from server */
346 return code == LDAP_SUCCESS ? EXIT_SUCCESS : EXIT_FAILURE;