1 /* ldapvc.c -- a tool for verifying credentials */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 1998-2010 The OpenLDAP Foundation.
6 * Portions Copyright 2010 Kurt D. Zeilenga.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted only as authorized by the OpenLDAP
13 * A copy of this license is available in the file LICENSE in the
14 * top-level directory of the distribution or, alternatively, at
15 * <http://www.OpenLDAP.org/license.html>.
17 /* Portions Copyright (c) 1992-1996 Regents of the University of Michigan.
18 * All rights reserved.
20 * Redistribution and use in source and binary forms are permitted
21 * provided that this notice is preserved and that due credit is given
22 * to the University of Michigan at Ann Arbor. The name of the
23 * University may not be used to endorse or promote products derived
24 * from this software without specific prior written permission. This
25 * software is provided ``as is'' without express or implied warranty.
28 * This work was originally developed by Kurt D. Zeilenga for inclusion
29 * in OpenLDAP Software based, in part, on other client tools.
36 #include <ac/stdlib.h>
39 #include <ac/socket.h>
40 #include <ac/string.h>
42 #include <ac/unistd.h>
46 #include "lutil_ldap.h"
47 #include "ldap_defaults.h"
51 static char * mech = NULL;
52 static char * dn = NULL;
53 static struct berval cred = {0, NULL};
58 fprintf( stderr, _("Issue LDAP Verify Credentials operation to verify a user's credentials\n\n"));
59 fprintf( stderr, _("usage: %s [options] (-S mech|[DN [cred]])\n"), prog);
60 fprintf( stderr, _("where:\n"));
61 fprintf( stderr, _(" DN\tDistinguished Name\n"));
62 fprintf( stderr, _(" cred\tCredentials (prompt if not present)\n"));
63 fprintf( stderr, _("options:\n"));
64 fprintf( stderr, _(" -S mech\tSASL mechanism (default "" e.g. Simple)\n"));
70 const char options[] = "S"
71 "d:D:e:h:H:InNO:o:p:QR:U:vVw:WxX:y:Y:Z";
74 handle_private_option( int i )
78 char *control, *cvalue;
80 case 'E': /* vc extension */
81 if( protocol == LDAP_VERSION2 ) {
82 fprintf( stderr, _("%s: -E incompatible with LDAPv%d\n"),
87 /* should be extended to support comma separated list of
88 * [!]key[=value] parameters, e.g. -E !foo,bar=567
93 if( optarg[0] == '!' ) {
98 control = strdup( optarg );
99 if ( (cvalue = strchr( control, '=' )) != NULL ) {
103 fprintf( stderr, _("Invalid Verify Credentials extension name: %s\n"), control );
107 case 'S': /* SASL mechanism */
119 main( int argc, char *argv[] )
123 char *matcheddn = NULL, *text = NULL, **refs = NULL;
124 struct berval *scookie = NULL;
125 struct berval *scred = NULL;
126 struct berval *authzid = NULL;
129 LDAPControl **ctrls = NULL;
131 tool_init( TOOL_VC );
132 prog = lutil_progname( "ldapvc", argc, argv );
135 protocol = LDAP_VERSION3;
137 tool_args( argc, argv );
140 if (argc - optind > 0) {
144 fprintf(stderr, "SASL credential verification not yet implemented!\n");
149 if (argc - optind > 0) {
152 if (argc - optind > 0) {
153 cred.bv_val = argv[optind++];
154 cred.bv_len = strlen(cred.bv_val);
157 if (argc - optind > 0) {
162 cred.bv_val = strdup(getpassphrase(_("User's password: ")));
164 cred.bv_len = strlen(cred.bv_val);
167 ld = tool_conn_setup( 0, 0 );
176 tool_server_controls( ld, NULL, 0 );
178 rc = ldap_verify_credentials( ld,
180 dn, mech, cred.bv_val ? &cred: NULL,
183 if( rc != LDAP_SUCCESS ) {
184 tool_perror( "ldap_verify_credentials", rc, NULL, NULL, NULL, NULL );
192 if ( tool_check_abandon( ld, id ) ) {
193 return LDAP_CANCELLED;
199 rc = ldap_result( ld, LDAP_RES_ANY, LDAP_MSG_ALL, &tv, &res );
201 tool_perror( "ldap_result", rc, NULL, NULL, NULL, NULL );
210 rc = ldap_parse_result( ld, res,
211 &code, &matcheddn, &text, &refs, &ctrls, 0 );
213 if ( rc == LDAP_SUCCESS ) {
217 if ( rc != LDAP_SUCCESS ) {
218 tool_perror( "ldap_parse_result", rc, NULL, matcheddn, text, refs );
223 rc = ldap_parse_verify_credentials( ld, res, &scookie, &scred, &authzid );
226 if( rc != LDAP_SUCCESS ) {
227 tool_perror( "ldap_parse_verify_credentials", rc, NULL, NULL, NULL, NULL );
232 if( authzid != NULL ) {
233 if( authzid->bv_len == 0 ) {
234 printf(_("anonymous\n") );
236 printf("%s\n", authzid->bv_val );
241 if ( verbose || ( code != LDAP_SUCCESS ) ||
242 matcheddn || text || refs || ctrls )
244 printf( _("Result: %s (%d)\n"), ldap_err2string( code ), code );
246 if( text && *text ) {
247 printf( _("Additional info: %s\n"), text );
250 if( matcheddn && *matcheddn ) {
251 printf( _("Matched DN: %s\n"), matcheddn );
256 for( i=0; refs[i]; i++ ) {
257 printf(_("Referral: %s\n"), refs[i] );
262 tool_print_ctrls( ld, ctrls );
263 ldap_controls_free( ctrls );
268 ber_memfree( matcheddn );
269 ber_memvfree( (void **) refs );
270 ber_bvfree( scookie );
272 ber_bvfree( authzid );
274 /* disconnect from server */
278 return code == LDAP_SUCCESS ? EXIT_SUCCESS : EXIT_FAILURE;