1 /* ldapvc.c -- a tool for verifying credentials */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 1998-2010 The OpenLDAP Foundation.
6 * Portions Copyright 2010 Kurt D. Zeilenga.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted only as authorized by the OpenLDAP
13 * A copy of this license is available in the file LICENSE in the
14 * top-level directory of the distribution or, alternatively, at
15 * <http://www.OpenLDAP.org/license.html>.
17 /* Portions Copyright (c) 1992-1996 Regents of the University of Michigan.
18 * All rights reserved.
20 * Redistribution and use in source and binary forms are permitted
21 * provided that this notice is preserved and that due credit is given
22 * to the University of Michigan at Ann Arbor. The name of the
23 * University may not be used to endorse or promote products derived
24 * from this software without specific prior written permission. This
25 * software is provided ``as is'' without express or implied warranty.
28 * This work was originally developed by Kurt D. Zeilenga for inclusion
29 * in OpenLDAP Software based, in part, on other client tools.
36 #include <ac/stdlib.h>
39 #include <ac/socket.h>
40 #include <ac/string.h>
42 #include <ac/unistd.h>
46 #include "lutil_ldap.h"
47 #include "ldap_defaults.h"
51 static int req_authzid = 0;
52 static int req_pp = 0;
54 static char * mech = NULL;
55 static char * dn = NULL;
56 static struct berval cred = {0, NULL};
61 fprintf( stderr, _("Issue LDAP Verify Credentials operation to verify a user's credentials\n\n"));
62 fprintf( stderr, _("usage: %s [options] (-S mech|[DN [cred]])\n"), prog);
63 fprintf( stderr, _("where:\n"));
64 fprintf( stderr, _(" DN\tDistinguished Name\n"));
65 fprintf( stderr, _(" cred\tCredentials (prompt if not present)\n"));
66 fprintf( stderr, _("options:\n"));
67 fprintf( stderr, _(" -a\tRequest AuthzId\n"));
68 fprintf( stderr, _(" -b\tRequest Password Policy Information\n"));
69 fprintf( stderr, _(" -S mech\tSASL mechanism (default "" e.g. Simple)\n"));
75 const char options[] = "abS:"
76 "d:D:e:h:H:InNO:o:p:QR:U:vVw:WxX:y:Y:Z";
79 handle_private_option( int i )
83 char *control, *cvalue;
85 case 'E': /* vc extension */
86 if( protocol == LDAP_VERSION2 ) {
87 fprintf( stderr, _("%s: -E incompatible with LDAPv%d\n"),
92 /* should be extended to support comma separated list of
93 * [!]key[=value] parameters, e.g. -E !foo,bar=567
98 if( optarg[0] == '!' ) {
103 control = strdup( optarg );
104 if ( (cvalue = strchr( control, '=' )) != NULL ) {
108 fprintf( stderr, _("Invalid Verify Credentials extension name: %s\n"), control );
112 case 'a': /* request authzid */
116 case 'b': /* request authzid */
120 case 'S': /* SASL mechanism */
132 main( int argc, char *argv[] )
136 char *matcheddn = NULL, *text = NULL, **refs = NULL;
139 struct berval *scookie = NULL;
140 struct berval *scred = NULL;
143 LDAPControl **ctrls = NULL;
144 LDAPControl **vcctrls = NULL;
147 tool_init( TOOL_VC );
148 prog = lutil_progname( "ldapvc", argc, argv );
151 protocol = LDAP_VERSION3;
153 tool_args( argc, argv );
156 if (argc - optind > 0) {
160 fprintf(stderr, "SASL credential verification not yet implemented!\n");
165 if (argc - optind > 0) {
168 if (argc - optind > 0) {
169 cred.bv_val = argv[optind++];
170 cred.bv_len = strlen(cred.bv_val);
173 if (argc - optind > 0) {
178 cred.bv_val = strdup(getpassphrase(_("User's password: ")));
180 cred.bv_len = strlen(cred.bv_val);
183 ld = tool_conn_setup( 0, 0 );
192 tool_server_controls( ld, NULL, 0 );
195 vcctrls = (LDAPControl **) malloc(3*sizeof(LDAPControl *));
196 vcctrls[nvcctrls] = (LDAPControl *) malloc(sizeof(LDAPControl));
197 vcctrls[nvcctrls]->ldctl_oid = ldap_strdup(LDAP_CONTROL_AUTHZID_REQUEST);
198 vcctrls[nvcctrls]->ldctl_iscritical = 0;
199 vcctrls[nvcctrls]->ldctl_value.bv_val = NULL;
200 vcctrls[nvcctrls]->ldctl_value.bv_len = 0;
201 vcctrls[++nvcctrls] = NULL;
205 if (!vcctrls) vcctrls = (LDAPControl **) malloc(3*sizeof(LDAPControl *));
206 vcctrls[nvcctrls] = (LDAPControl *) malloc(sizeof(LDAPControl));
207 vcctrls[nvcctrls]->ldctl_oid = ldap_strdup(LDAP_CONTROL_PASSWORDPOLICYREQUEST);
208 vcctrls[nvcctrls]->ldctl_iscritical = 0;
209 vcctrls[nvcctrls]->ldctl_value.bv_val = NULL;
210 vcctrls[nvcctrls]->ldctl_value.bv_len = 0;
211 vcctrls[++nvcctrls] = NULL;
214 rc = ldap_verify_credentials( ld,
216 dn, mech, cred.bv_val ? &cred: NULL, vcctrls,
219 if( rc != LDAP_SUCCESS ) {
220 tool_perror( "ldap_verify_credentials", rc, NULL, NULL, NULL, NULL );
225 ldap_controls_free(vcctrls);
231 if ( tool_check_abandon( ld, id ) ) {
232 return LDAP_CANCELLED;
238 rc = ldap_result( ld, LDAP_RES_ANY, LDAP_MSG_ALL, &tv, &res );
240 tool_perror( "ldap_result", rc, NULL, NULL, NULL, NULL );
249 rc = ldap_parse_result( ld, res,
250 &code, &matcheddn, &text, &refs, &ctrls, 0 );
252 if ( rc == LDAP_SUCCESS ) {
256 if ( rc != LDAP_SUCCESS ) {
257 tool_perror( "ldap_parse_result", rc, NULL, matcheddn, text, refs );
262 rc = ldap_parse_verify_credentials( ld, res, &rcode, &diag, &scookie, &scred, &vcctrls );
265 if( rc != LDAP_SUCCESS ) {
266 tool_perror( "ldap_parse_verify_credentials", rc, NULL, NULL, NULL, NULL );
271 if (rcode != LDAP_SUCCESS) {
272 printf(_("Failed: %s (%d)\n"), ldap_err2string(rcode), rcode);
276 printf(_("Diagnostic: %s\n"), diag);
280 tool_print_ctrls( ld, vcctrls );
284 if ( verbose || ( code != LDAP_SUCCESS ) ||
285 matcheddn || text || refs || ctrls )
287 printf( _("Result: %s (%d)\n"), ldap_err2string( code ), code );
289 if( text && *text ) {
290 printf( _("Additional info: %s\n"), text );
293 if( matcheddn && *matcheddn ) {
294 printf( _("Matched DN: %s\n"), matcheddn );
299 for( i=0; refs[i]; i++ ) {
300 printf(_("Referral: %s\n"), refs[i] );
305 tool_print_ctrls( ld, ctrls );
306 ldap_controls_free( ctrls );
311 ber_memfree( matcheddn );
312 ber_memvfree( (void **) refs );
313 ber_bvfree( scookie );
317 /* disconnect from server */
321 return code == LDAP_SUCCESS ? EXIT_SUCCESS : EXIT_FAILURE;