1 /* ldapexop.c -- a tool for performing well-known extended operations */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 2005-2006 The OpenLDAP Foundation.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted only as authorized by the OpenLDAP
12 * A copy of this license is available in the file LICENSE in the
13 * top-level directory of the distribution or, alternatively, at
14 * <http://www.OpenLDAP.org/license.html>.
17 * This work was originally developed by Pierangelo Masarati for inclusion
18 * in OpenLDAP Software based, in part, on other client tools.
25 #include <ac/stdlib.h>
28 #include <ac/socket.h>
29 #include <ac/string.h>
31 #include <ac/unistd.h>
36 #include "lutil_ldap.h"
37 #include "ldap_defaults.h"
44 fprintf( stderr, _("Issue LDAP extended operations\n\n"));
45 fprintf( stderr, _("usage: %s [options] [oid[:data]]\n"), prog);
51 const char options[] = ""
52 "d:D:e:h:H:InO:p:QR:U:vVw:WxX:y:Y:Z";
55 handle_private_option( int i )
66 main( int argc, char *argv[] )
73 char *matcheddn = NULL, *text = NULL, **refs = NULL;
77 tool_init( TOOL_EXOP );
78 prog = lutil_progname( "ldapexop", argc, argv );
81 protocol = LDAP_VERSION3;
83 tool_args( argc, argv );
85 if ( argc - optind < 1 ) {
89 if ( pw_file || want_bindpw ) {
91 rc = lutil_get_filed_password( pw_file, &passwd );
92 if( rc ) return EXIT_FAILURE;
94 passwd.bv_val = getpassphrase( _("Enter LDAP Password: ") );
95 passwd.bv_len = passwd.bv_val ? strlen( passwd.bv_val ) : 0;
99 ld = tool_conn_setup( 0, 0 );
106 if ( strcasecmp( argv[ 0 ], "whoami" ) == 0 ) {
115 fprintf( stderr, "need [user]\n\n" );
119 tool_server_controls( ld, NULL, 0 );
121 rc = ldap_whoami( ld, NULL, NULL, &id );
122 if ( rc != LDAP_SUCCESS ) {
123 tool_perror( "ldap_extended_operation", rc, NULL, NULL, NULL, NULL );
128 } else if ( strcasecmp( argv[ 0 ], "cancel" ) == 0 ) {
133 if ( lutil_atoi( &cancelid, argv[ 1 ] ) != 0 || cancelid < 0 ) {
134 fprintf( stderr, "invalid cancelid=%s\n\n", argv[ 1 ] );
140 fprintf( stderr, "need cancelid\n\n" );
144 rc = ldap_cancel( ld, cancelid, NULL, NULL, &id );
145 if ( rc != LDAP_SUCCESS ) {
146 tool_perror( "ldap_cancel", rc, NULL, NULL, NULL, NULL );
151 } else if ( strcasecmp( argv[ 0 ], "passwd" ) == 0 ) {
152 fprintf( stderr, "use ldappasswd(1) instead.\n\n", argv[ 0 ] );
156 } else if ( strcasecmp( argv[ 0 ], "refresh" ) == 0 ) {
162 ttl = atoi( argv[ 2 ] );
165 dn.bv_val = argv[ 1 ];
166 dn.bv_len = strlen( dn.bv_val );
172 fprintf( stderr, _("need DN [ttl]\n\n") );
176 tool_server_controls( ld, NULL, 0 );
178 rc = ldap_refresh( ld, &dn, ttl, NULL, NULL, &id );
179 if ( rc != LDAP_SUCCESS ) {
180 tool_perror( "ldap_extended_operation", rc, NULL, NULL, NULL, NULL );
185 } else if ( tool_is_oid( argv[ 0 ] ) ) {
186 struct berval reqdata;
187 struct berval *reqdatap;
194 p = strchr( argv[ 0 ], ':' );
199 reqdata.bv_len = strlen( reqdata.bv_val );
204 tool_server_controls( ld, NULL, 0 );
206 rc = ldap_extended_operation( ld, argv[ 0 ], reqdatap, NULL, NULL, &id );
207 if ( rc != LDAP_SUCCESS ) {
208 tool_perror( "ldap_extended_operation", rc, NULL, NULL, NULL, NULL );
213 fprintf( stderr, "unknown exop \"%s\"\n\n", argv[ 0 ] );
220 if ( tool_check_abandon( ld, id ) ) {
221 return LDAP_CANCELLED;
227 rc = ldap_result( ld, LDAP_RES_ANY, LDAP_MSG_ALL, &tv, &res );
229 tool_perror( "ldap_result", rc, NULL, NULL, NULL, NULL );
239 rc = ldap_parse_result( ld, res,
240 &code, &matcheddn, &text, &refs, NULL, 0 );
241 if ( rc == LDAP_SUCCESS ) {
245 if ( rc != LDAP_SUCCESS ) {
246 tool_perror( "ldap_parse_result", rc, NULL, matcheddn, text, refs );
251 if ( strcasecmp( argv[ 0 ], "whoami" ) == 0 ) {
253 struct berval *retdata = NULL;
255 rc = ldap_parse_extended_result( ld, res, &retoid, &retdata, 1 );
257 if ( rc != LDAP_SUCCESS ) {
258 tool_perror( "ldap_parse_extended_result", rc, NULL, NULL, NULL, NULL );
263 if ( retdata != NULL ) {
264 if ( retdata->bv_len == 0 ) {
265 printf(_("anonymous\n") );
267 printf("%s\n", retdata->bv_val );
271 ber_memfree( retoid );
272 ber_bvfree( retdata );
274 } else if ( strcasecmp( argv[ 0 ], "cancel" ) == 0 ) {
275 /* no extended response; returns specific errors */
278 } else if ( strcasecmp( argv[ 0 ], "passwd" ) == 0 ) {
281 } else if ( strcasecmp( argv[ 0 ], "refresh" ) == 0 ) {
284 rc = ldap_parse_refresh( ld, res, &newttl );
286 if ( rc != LDAP_SUCCESS ) {
287 tool_perror( "ldap_parse_refresh", rc, NULL, NULL, NULL, NULL );
292 printf( "newttl=%d\n", newttl );
294 } else if ( tool_is_oid( argv[ 0 ] ) ) {
296 struct berval *retdata = NULL;
299 printf(_("# extended operation response\n"));
302 rc = ldap_parse_extended_result( ld, res, &retoid, &retdata, 1 );
303 if ( rc != LDAP_SUCCESS ) {
304 tool_perror( "ldap_parse_extended_result", rc, NULL, NULL, NULL, NULL );
309 if ( ldif < 2 && retoid != NULL ) {
310 tool_write_ldif( ldif ? LDIF_PUT_COMMENT : LDIF_PUT_VALUE,
311 "oid", retoid, strlen(retoid) );
314 ber_memfree( retoid );
316 if( retdata != NULL ) {
318 tool_write_ldif( ldif ? LDIF_PUT_COMMENT : LDIF_PUT_BINARY,
319 "data", retdata->bv_val, retdata->bv_len );
322 ber_bvfree( retdata );
326 if( verbose || ( code != LDAP_SUCCESS ) || matcheddn || text || refs ) {
327 printf( _("Result: %s (%d)\n"), ldap_err2string( code ), code );
329 if( text && *text ) {
330 printf( _("Additional info: %s\n"), text );
333 if( matcheddn && *matcheddn ) {
334 printf( _("Matched DN: %s\n"), matcheddn );
339 for( i=0; refs[i]; i++ ) {
340 printf(_("Referral: %s\n"), refs[i] );
346 ber_memfree( matcheddn );
347 ber_memvfree( (void **) refs );
350 /* disconnect from server */
354 return code == LDAP_SUCCESS ? EXIT_SUCCESS : EXIT_FAILURE;