]> git.sur5r.net Git - openldap/blob - servers/slapd/back-sql/bind.c
Fix ITS#3424
[openldap] / servers / slapd / back-sql / bind.c
1 /* $OpenLDAP$ */
2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
3  *
4  * Copyright 1999-2004 The OpenLDAP Foundation.
5  * Portions Copyright 1999 Dmitry Kovalev.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted only as authorized by the OpenLDAP
10  * Public License.
11  *
12  * A copy of this license is available in the file LICENSE in the
13  * top-level directory of the distribution or, alternatively, at
14  * <http://www.OpenLDAP.org/license.html>.
15  */
16 /* ACKNOWLEDGEMENTS:
17  * This work was initially developed by Dmitry Kovalev for inclusion
18  * by OpenLDAP Software.
19  */
20
21 #include "portable.h"
22
23 #include <stdio.h>
24 #include <sys/types.h>
25
26 #include "slap.h"
27 #include "proto-sql.h"
28
29 int 
30 backsql_bind( Operation *op, SlapReply *rs )
31 {
32         SQLHDBC                 dbh;
33         AttributeDescription    *password = slap_schema.si_ad_userPassword;
34         Entry                   *e, user_entry;
35         Attribute               *a;
36         backsql_srch_info       bsi;
37         AttributeName           anlist[2];
38         int                     rc;
39  
40         Debug( LDAP_DEBUG_TRACE, "==>backsql_bind()\n", 0, 0, 0 );
41
42         if ( be_isroot_pw( op ) ) {
43                 ber_dupbv( &op->oq_bind.rb_edn, be_root_dn( op->o_bd ) );
44                 Debug( LDAP_DEBUG_TRACE, "<==backsql_bind() root bind\n", 
45                                 0, 0, 0 );
46                 return 0;
47         }
48
49         ber_dupbv( &op->oq_bind.rb_edn, &op->o_req_ndn );
50
51         if ( op->oq_bind.rb_method != LDAP_AUTH_SIMPLE ) {
52                 rs->sr_err = LDAP_STRONG_AUTH_NOT_SUPPORTED;
53                 rs->sr_text = "authentication method not supported"; 
54                 send_ldap_result( op, rs );
55                 return 1;
56         }
57
58         /*
59          * method = LDAP_AUTH_SIMPLE
60          */
61         rs->sr_err = backsql_get_db_conn( op, &dbh );
62         if ( !dbh ) {
63                 Debug( LDAP_DEBUG_TRACE, "backsql_bind(): "
64                         "could not get connection handle - exiting\n",
65                         0, 0, 0 );
66
67                 rs->sr_text = ( rs->sr_err == LDAP_OTHER )
68                         ? "SQL-backend error" : NULL;
69                 send_ldap_result( op, rs );
70                 return 1;
71         }
72
73         anlist[0].an_name = password->ad_cname;
74         anlist[0].an_desc = password;
75         anlist[1].an_name.bv_val = NULL;
76
77         rc = backsql_init_search( &bsi, &op->o_req_ndn, LDAP_SCOPE_BASE, 
78                         -1, -1, -1, NULL, dbh, op, rs, anlist,
79                         ( BACKSQL_ISF_GET_ID | BACKSQL_ISF_MUCK ) );
80         if ( rc != LDAP_SUCCESS ) {
81                 Debug( LDAP_DEBUG_TRACE, "backsql_bind(): "
82                         "could not retrieve bindDN ID - no such entry\n", 
83                         0, 0, 0 );
84                 rs->sr_err = LDAP_INVALID_CREDENTIALS;
85                 send_ldap_result( op, rs );
86                 return 1;
87         }
88
89         bsi.bsi_e = &user_entry;
90         rc = backsql_id2entry( &bsi, &bsi.bsi_base_id );
91         if ( rc != LDAP_SUCCESS ) {
92                 Debug( LDAP_DEBUG_TRACE, "backsql_bind(): "
93                         "error %d in backsql_id2entry() "
94                         "- auth failed\n", rc, 0, 0 );
95                 rs->sr_err = LDAP_INVALID_CREDENTIALS;
96                 goto error_return;
97         }
98         e = &user_entry;
99
100         if ( ! access_allowed( op, e, password, NULL, ACL_AUTH, NULL ) ) {
101 #if 1
102                 rs->sr_err = LDAP_INVALID_CREDENTIALS;
103 #else
104                 rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
105 #endif
106                 goto error_return;
107         }
108
109         a = attr_find( e->e_attrs, password );
110         if ( a == NULL ) {
111 #if 1
112                 rs->sr_err = LDAP_INVALID_CREDENTIALS;
113 #else
114                 rs->sr_err = LDAP_INAPPROPRIATE_AUTH;
115 #endif
116                 goto error_return;
117         }
118
119         if ( slap_passwd_check( op->o_conn, a, &op->oq_bind.rb_cred, &rs->sr_text ) != 0 ) {
120                 rs->sr_err = LDAP_INVALID_CREDENTIALS;
121                 goto error_return;
122         }
123
124 error_return:;
125         if ( !BER_BVISNULL( &bsi.bsi_base_id.eid_ndn ) ) {
126                 (void)backsql_free_entryID( &bsi.bsi_base_id, 0 );
127         }
128
129         if ( rs->sr_err ) {
130                 send_ldap_result( op, rs );
131                 return 1;
132         }
133         
134         Debug(LDAP_DEBUG_TRACE,"<==backsql_bind()\n",0,0,0);
135         return 0;
136 }
137