3 * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright (c) 1996 Regents of the University of Michigan.
10 * Redistribution and use in source and binary forms are permitted
11 * provided that this notice is preserved and that due credit is given
12 * to the University of Michigan at Ann Arbor. The name of the University
13 * may not be used to endorse or promote products derived from this
14 * software without specific prior written permission. This software
15 * is provided ``as is'' without express or implied warranty.
19 * ldap_op.c - routines to perform LDAP operations
26 #include <ac/stdlib.h>
29 #include <ac/string.h>
32 #include <ac/unistd.h>
35 #include "lutil_ldap.h"
38 /* Forward references */
39 static struct berval **make_singlevalued_berval LDAP_P(( char *, int ));
40 static int op_ldap_add LDAP_P(( Ri *, Re *, char ** ));
41 static int op_ldap_modify LDAP_P(( Ri *, Re *, char ** ));
42 static int op_ldap_delete LDAP_P(( Ri *, Re *, char ** ));
43 static int op_ldap_modrdn LDAP_P(( Ri *, Re *, char ** ));
44 static LDAPMod *alloc_ldapmod LDAP_P(( void ));
45 static void free_ldapmod LDAP_P(( LDAPMod * ));
46 static void free_ldmarr LDAP_P(( LDAPMod ** ));
47 static int getmodtype LDAP_P(( char * ));
48 static void dump_ldm_array LDAP_P(( LDAPMod ** ));
49 static int do_bind LDAP_P(( Ri *, int * ));
50 static int do_unbind LDAP_P(( Ri * ));
54 * Determine the type of ldap operation being performed and call the
55 * appropriate routine.
56 * - If successful, returns DO_LDAP_OK
57 * - If a retryable error occurs, ERR_DO_LDAP_RETRYABLE is returned.
58 * The caller should wait a while and retry the operation.
59 * - If a fatal error occurs, ERR_DO_LDAP_FATAL is returned. The caller
60 * should reject the operation and continue with the next replication
75 if ( ri->ri_ldp == NULL ) {
76 lderr = do_bind( ri, &lderr );
78 if ( lderr != BIND_OK ) {
79 return DO_LDAP_ERR_RETRYABLE;
83 switch ( re->re_changetype ) {
85 lderr = op_ldap_add( ri, re, errmsg );
86 if ( lderr != LDAP_SUCCESS ) {
88 LDAP_LOG (( " ldap_op", LDAP_LEVEL_ERR, "do_ldap: "
89 "Error: ldap_add_s failed adding \"%s\": %s\n",
90 *errmsg ? *errmsg : ldap_err2string( lderr ), re->re_dn ));
92 Debug( LDAP_DEBUG_ANY,
93 "Error: ldap_add_s failed adding \"%s\": %s\n",
94 *errmsg ? *errmsg : ldap_err2string( lderr ),
101 lderr = op_ldap_modify( ri, re, errmsg );
102 if ( lderr != LDAP_SUCCESS ) {
104 LDAP_LOG (( " ldap_op", LDAP_LEVEL_ERR, "do_ldap: "
105 "Error: ldap_modify_s failed modifying \"%s\": %s\n",
106 *errmsg ? *errmsg : ldap_err2string( lderr ), re->re_dn ));
108 Debug( LDAP_DEBUG_ANY,
109 "Error: ldap_modify_s failed modifying \"%s\": %s\n",
110 *errmsg ? *errmsg : ldap_err2string( lderr ),
117 lderr = op_ldap_delete( ri, re, errmsg );
118 if ( lderr != LDAP_SUCCESS ) {
120 LDAP_LOG (( " ldap_op", LDAP_LEVEL_ERR, "do_ldap: "
121 "Error: ldap_delete_s failed deleting \"%s\": %s\n",
122 *errmsg ? *errmsg : ldap_err2string( lderr ), re->re_dn ));
124 Debug( LDAP_DEBUG_ANY,
125 "Error: ldap_delete_s failed deleting \"%s\": %s\n",
126 *errmsg ? *errmsg : ldap_err2string( lderr ),
133 lderr = op_ldap_modrdn( ri, re, errmsg );
134 if ( lderr != LDAP_SUCCESS ) {
136 LDAP_LOG (( " ldap_op", LDAP_LEVEL_ERR, "do_ldap: "
137 "Error: ldap_modrdn_s failed modifying %s: %s\n",
138 *errmsg ? *errmsg : ldap_err2string( lderr ), re->re_dn ));
140 Debug( LDAP_DEBUG_ANY,
141 "Error: ldap_modrdn_s failed modifying %s: %s\n",
142 *errmsg ? *errmsg : ldap_err2string( lderr ),
150 LDAP_LOG (( " ldap_op", LDAP_LEVEL_ERR, "do_ldap: "
151 "Error: bad op \"%d\", dn = \"%s\"\n",
152 re->re_changetype, re->re_dn ));
154 Debug( LDAP_DEBUG_ANY,
155 "Error: do_ldap: bad op \"%d\", dn = \"%s\"\n",
156 re->re_changetype, re->re_dn, 0 );
158 return DO_LDAP_ERR_FATAL;
162 * Analyze return code. If ok, just return. If LDAP_SERVER_DOWN,
163 * we may have been idle long enough that the remote slapd timed
164 * us out. Rebind and try again.
171 return DO_LDAP_ERR_FATAL;
173 case LDAP_SERVER_DOWN: /* server went down */
174 (void) do_unbind( ri );
177 } while ( retry > 0 );
179 return DO_LDAP_ERR_RETRYABLE;
185 * Perform an ldap add operation.
195 int nattrs, rc = 0, i;
196 LDAPMod *ldm, **ldmarr;
203 * Construct a null-terminated array of LDAPMod structs.
206 while ( mi[ i ].mi_type != NULL ) {
207 ldm = alloc_ldapmod();
208 ldmarr = ( LDAPMod ** ) ch_realloc( ldmarr,
209 ( nattrs + 2 ) * sizeof( LDAPMod * ));
210 ldmarr[ nattrs ] = ldm;
211 ldm->mod_op = LDAP_MOD_BVALUES;
212 ldm->mod_type = mi[ i ].mi_type;
214 make_singlevalued_berval( mi[ i ].mi_val, mi[ i ].mi_len );
219 if ( ldmarr != NULL ) {
220 ldmarr[ nattrs ] = NULL;
222 /* Perform the operation */
224 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ARGS,
225 "op_ldap_add: replica %s:%d - add dn \"%s\"\n",
226 ri->ri_hostname, ri->ri_port, re->re_dn ));
228 Debug( LDAP_DEBUG_ARGS, "replica %s:%d - add dn \"%s\"\n",
229 ri->ri_hostname, ri->ri_port, re->re_dn );
231 rc = ldap_add_s( ri->ri_ldp, re->re_dn, ldmarr );
233 ldap_get_option( ri->ri_ldp, LDAP_OPT_ERROR_NUMBER, &lderr);
236 *errmsg = "No modifications to do";
238 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
239 "op_ldap_add: Error: no mods to do (%s)!\n", re->re_dn ));
241 Debug( LDAP_DEBUG_ANY,
242 "Error: op_ldap_add: no mods to do (%s)!\n", re->re_dn, 0, 0 );
245 free_ldmarr( ldmarr );
253 * Perform an ldap modify operation.
255 #define AWAITING_OP -1
264 int state; /* This code is a simple-minded state machine */
265 int nvals; /* Number of values we're modifying */
266 int nops; /* Number of LDAPMod structs in ldmarr */
267 LDAPMod *ldm = NULL, **ldmarr;
277 if ( re->re_mods == NULL ) {
278 *errmsg = "No arguments given";
280 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
281 "op_ldap_modify: Error: no arguments\n" ));
283 Debug( LDAP_DEBUG_ANY, "Error: op_ldap_modify: no arguments\n",
290 * Construct a null-terminated array of LDAPMod structs.
292 for ( mi = re->re_mods, i = 0; mi[ i ].mi_type != NULL; i++ ) {
293 type = mi[ i ].mi_type;
294 value = mi[ i ].mi_val;
295 len = mi[ i ].mi_len;
296 switch ( getmodtype( type )) {
298 state = T_MODSEP; /* Got a separator line "-\n" */
302 ldmarr = ( LDAPMod ** )
303 ch_realloc(ldmarr, (( nops + 2 ) * ( sizeof( LDAPMod * ))));
304 ldmarr[ nops ] = ldm = alloc_ldapmod();
305 ldm->mod_op = LDAP_MOD_ADD | LDAP_MOD_BVALUES;
306 ldm->mod_type = value;
311 state = T_MODOPREPLACE;
312 ldmarr = ( LDAPMod ** )
313 ch_realloc(ldmarr, (( nops + 2 ) * ( sizeof( LDAPMod * ))));
314 ldmarr[ nops ] = ldm = alloc_ldapmod();
315 ldm->mod_op = LDAP_MOD_REPLACE | LDAP_MOD_BVALUES;
316 ldm->mod_type = value;
321 state = T_MODOPDELETE;
322 ldmarr = ( LDAPMod ** )
323 ch_realloc(ldmarr, (( nops + 2 ) * ( sizeof( LDAPMod * ))));
324 ldmarr[ nops ] = ldm = alloc_ldapmod();
325 ldm->mod_op = LDAP_MOD_DELETE | LDAP_MOD_BVALUES;
326 ldm->mod_type = value;
331 if ( state == AWAITING_OP ) {
333 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
334 "op_ldap_modify: Error: unknown mod type \"%s\"\n", type ));
336 Debug( LDAP_DEBUG_ANY,
337 "Error: op_ldap_modify: unknown mod type \"%s\"\n",
346 * We should have an attribute: value pair here.
347 * Construct the mod_bvalues part of the ldapmod struct.
349 if ( strcasecmp( type, ldm->mod_type )) {
351 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
352 "op_ldap_modify: Error: "
353 "malformed modify op, %s: %s (expecting \"%s\")\n",
354 type, value, ldm->mod_type ));
356 Debug( LDAP_DEBUG_ANY,
357 "Error: malformed modify op, %s: %s (expecting %s:)\n",
358 type, value, ldm->mod_type );
362 ldm->mod_bvalues = ( struct berval ** )
363 ch_realloc( ldm->mod_bvalues,
364 ( nvals + 2 ) * sizeof( struct berval * ));
365 ldm->mod_bvalues[ nvals + 1 ] = NULL;
366 ldm->mod_bvalues[ nvals ] = ( struct berval * )
367 ch_malloc( sizeof( struct berval ));
368 ldm->mod_bvalues[ nvals ]->bv_val = value;
369 ldm->mod_bvalues[ nvals ]->bv_len = len;
373 ldmarr[ nops ] = NULL;
376 /* Actually perform the LDAP operation */
378 LDAP_LOG (( "ldap_op", LDAP_LEVEL_DETAIL1,
379 "op_ldap_modify: replica %s:%d - modify dn \"%s\"\n",
380 ri->ri_hostname, ri->ri_port, re->re_dn ));
382 Debug( LDAP_DEBUG_ARGS, "replica %s:%d - modify dn \"%s\"\n",
383 ri->ri_hostname, ri->ri_port, re->re_dn );
385 rc = ldap_modify_s( ri->ri_ldp, re->re_dn, ldmarr );
387 free_ldmarr( ldmarr );
395 * Perform an ldap delete operation.
407 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ARGS,
408 "op_ldap_delete: replica %s:%d - delete dn \"%s\"\n",
409 ri->ri_hostname, ri->ri_port, re->re_dn ));
411 Debug( LDAP_DEBUG_ARGS, "replica %s:%d - delete dn \"%s\"\n",
412 ri->ri_hostname, ri->ri_port, re->re_dn );
414 rc = ldap_delete_s( ri->ri_ldp, re->re_dn );
423 * Perform an ldap modrdn operation.
425 #define GOT_NEWRDN 0x1
426 #define GOT_DELOLDRDN 0x2
427 #define GOT_NEWSUP 0x4
429 #define GOT_MODDN_REQ (GOT_NEWRDN|GOT_DELOLDRDN)
430 #define GOT_ALL_MODDN(f) (((f) & GOT_MODDN_REQ) == GOT_MODDN_REQ)
447 if ( re->re_mods == NULL ) {
448 *errmsg = "No arguments given";
450 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
451 "op_ldap_modrdn: Error: no arguments\n" ));
453 Debug( LDAP_DEBUG_ANY, "Error: op_ldap_modrdn: no arguments\n",
460 * Get the arguments: should see newrdn: and deleteoldrdn: args.
462 for ( mi = re->re_mods, i = 0; mi[ i ].mi_type != NULL; i++ ) {
463 if ( !strcmp( mi[ i ].mi_type, T_NEWRDNSTR )) {
464 if( state & GOT_NEWRDN ) {
466 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
467 "op_ldap_modrdn: Error: multiple newrdn arg \"%s\"\n",
470 Debug( LDAP_DEBUG_ANY,
471 "Error: op_ldap_modrdn: multiple newrdn arg \"%s\"\n",
472 mi[ i ].mi_val, 0, 0 );
474 *errmsg = "Multiple newrdn argument";
478 newrdn = mi[ i ].mi_val;
481 } else if ( !strcmp( mi[ i ].mi_type, T_DELOLDRDNSTR )) {
482 if( state & GOT_DELOLDRDN ) {
484 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
485 "op_ldap_modrdn: Error: multiple deleteoldrdn arg \"%s\"\n",
488 Debug( LDAP_DEBUG_ANY,
489 "Error: op_ldap_modrdn: multiple deleteoldrdn arg \"%s\"\n",
490 mi[ i ].mi_val, 0, 0 );
492 *errmsg = "Multiple newrdn argument";
496 state |= GOT_DELOLDRDN;
497 if ( !strcmp( mi[ i ].mi_val, "0" )) {
499 } else if ( !strcmp( mi[ i ].mi_val, "1" )) {
503 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
504 "op_ldap_modrdn: Error: bad deleteoldrdn arg \"%s\"\n",
507 Debug( LDAP_DEBUG_ANY,
508 "Error: op_ldap_modrdn: bad deleteoldrdn arg \"%s\"\n",
509 mi[ i ].mi_val, 0, 0 );
511 *errmsg = "Incorrect argument to deleteoldrdn";
515 } else if ( !strcmp( mi[ i ].mi_type, T_NEWSUPSTR )) {
516 if( state & GOT_NEWSUP ) {
518 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
519 "op_ldap_modrdn: Error: multiple newsuperior arg \"%s\"\n",
522 Debug( LDAP_DEBUG_ANY,
523 "Error: op_ldap_modrdn: multiple newsuperior arg \"%s\"\n",
524 mi[ i ].mi_val, 0, 0 );
526 *errmsg = "Multiple newsuperior argument";
530 newsup = mi[ i ].mi_val;
535 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
536 "op_ldap_modrdn: Error: bad type \"%s\"\n",
539 Debug( LDAP_DEBUG_ANY, "Error: op_ldap_modrdn: bad type \"%s\"\n",
540 mi[ i ].mi_type, 0, 0 );
542 *errmsg = "Bad value in replication log entry";
548 * Punt if we don't have all the args.
550 if ( !GOT_ALL_MODDN(state) ) {
552 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
553 "op_ldap_modrdn: Error: missing arguments\n" ));
555 Debug( LDAP_DEBUG_ANY, "Error: op_ldap_modrdn: missing arguments\n",
558 *errmsg = "Missing argument: requires \"newrdn\" and \"deleteoldrdn\"";
563 if ( ldap_debug & LDAP_DEBUG_ARGS ) {
566 int buf2len = strlen( re->re_dn ) + strlen( mi->mi_val ) + 11;
568 snprintf( buf, sizeof(buf), "%s:%d", ri->ri_hostname, ri->ri_port );
570 buf2 = (char *) ch_malloc( buf2len );
571 snprintf( buf2, buf2len, "(\"%s\" -> \"%s\")", re->re_dn, mi->mi_val );
574 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ARGS,
575 "op_ldap_modrdn: replica %s - modify rdn %s (flag: %d)\n",
576 buf, buf2, drdnflag ));
578 Debug( LDAP_DEBUG_ARGS,
579 "replica %s - modify rdn %s (flag: %d)\n",
580 buf, buf2, drdnflag );
584 #endif /* LDAP_DEBUG */
589 rc = ldap_rename2_s( ri->ri_ldp, re->re_dn, newrdn, newsup, drdnflag );
591 ldap_get_option( ri->ri_ldp, LDAP_OPT_ERROR_NUMBER, &lderr);
598 * Allocate and initialize an ldapmod struct.
601 alloc_ldapmod( void )
605 ldm = ( struct ldapmod * ) ch_malloc( sizeof ( struct ldapmod ));
606 ldm->mod_type = NULL;
607 ldm->mod_bvalues = ( struct berval ** ) NULL;
614 * Free an ldapmod struct associated mod_bvalues. NOTE - it is assumed
615 * that mod_bvalues and mod_type contain pointers to the same block of memory
616 * pointed to by the repl struct. Therefore, it's not freed here.
627 if ( ldm->mod_bvalues != NULL ) {
628 for ( i = 0; ldm->mod_bvalues[ i ] != NULL; i++ ) {
629 free( ldm->mod_bvalues[ i ] );
631 free( ldm->mod_bvalues );
639 * Free an an array of LDAPMod pointers and the LDAPMod structs they point
648 for ( i = 0; ldmarr[ i ] != NULL; i++ ) {
649 free_ldapmod( ldmarr[ i ] );
656 * Create a berval with a single value.
658 static struct berval **
659 make_singlevalued_berval(
665 p = ( struct berval ** ) ch_malloc( 2 * sizeof( struct berval * ));
666 p[ 0 ] = ( struct berval * ) ch_malloc( sizeof( struct berval ));
668 p[ 0 ]->bv_val = value;
669 p[ 0 ]->bv_len = len;
675 * Given a modification type (string), return an enumerated type.
676 * Avoids ugly copy in op_ldap_modify - lets us use a switch statement
683 if ( !strcmp( type, T_MODSEPSTR )) {
686 if ( !strcmp( type, T_MODOPADDSTR )) {
687 return( T_MODOPADD );
689 if ( !strcmp( type, T_MODOPREPLACESTR )) {
690 return( T_MODOPREPLACE );
692 if ( !strcmp( type, T_MODOPDELETESTR )) {
693 return( T_MODOPDELETE );
700 * Perform an LDAP unbind operation. If replica is NULL, or the
701 * repl_ldp is NULL, just return LDAP_SUCCESS. Otherwise, unbind,
702 * set the ldp to NULL, and return the result of the unbind call.
709 int rc = LDAP_SUCCESS;
711 if (( ri != NULL ) && ( ri->ri_ldp != NULL )) {
712 rc = ldap_unbind( ri->ri_ldp );
713 if ( rc != LDAP_SUCCESS ) {
715 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
716 "do_unbind: ldap_unbind failed for %s:%d: %s\n",
717 ri->ri_hostname, ri->ri_port, ldap_err2string( rc ) ));
719 Debug( LDAP_DEBUG_ANY,
720 "Error: do_unbind: ldap_unbind failed for %s:%d: %s\n",
721 ri->ri_hostname, ri->ri_port, ldap_err2string( rc ) );
732 * Perform an LDAP bind operation to the replication site given
733 * by replica. If replica->repl_ldp is non-NULL, then we unbind
734 * from the replica before rebinding. It should be safe to call
735 * this to re-connect if the replica's connection goes away
738 * Returns 0 on success, -1 if an LDAP error occurred, and a return
739 * code > 0 if some other error occurred, e.g. invalid bind method.
740 * If an LDAP error occurs, the LDAP error is returned in lderr.
754 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: null ri ptr\n" ));
756 Debug( LDAP_DEBUG_ANY, "Error: do_bind: null ri ptr\n", 0, 0, 0 );
758 return( BIND_ERR_BADRI );
761 if ( ri->ri_ldp != NULL ) {
762 ldrc = ldap_unbind( ri->ri_ldp );
763 if ( ldrc != LDAP_SUCCESS ) {
765 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
766 "do_bind: ldap_unbind failed: %s\n", ldap_err2string( ldrc ) ));
768 Debug( LDAP_DEBUG_ANY,
769 "Error: do_bind: ldap_unbind failed: %s\n",
770 ldap_err2string( ldrc ), 0, 0 );
777 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ARGS,
778 "do_bind: Initializing session to %s:%d\n",
779 ri->ri_hostname, ri->ri_port ));
781 Debug( LDAP_DEBUG_ARGS, "Initializing session to %s:%d\n",
782 ri->ri_hostname, ri->ri_port, 0 );
785 ri->ri_ldp = ldap_init( ri->ri_hostname, ri->ri_port );
786 if ( ri->ri_ldp == NULL ) {
788 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR,
789 "do_bind: ldap_init (%s, %d) failed: %s\n",
790 ri->ri_hostname, ri->ri_port, sys_errlist[ errno ] ));
792 Debug( LDAP_DEBUG_ANY, "Error: ldap_init(%s, %d) failed: %s\n",
793 ri->ri_hostname, ri->ri_port, sys_errlist[ errno ] );
795 return( BIND_ERR_OPEN );
798 { /* set version 3 */
799 int err, version = 3;
800 err = ldap_set_option(ri->ri_ldp,
801 LDAP_OPT_PROTOCOL_VERSION, &version);
803 if( err != LDAP_OPT_SUCCESS ) {
805 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: ",
806 "Error: ldap_set_option(%s, LDAP_OPT_VERSION, 3) failed!\n",
809 Debug( LDAP_DEBUG_ANY,
810 "Error: ldap_set_option(%s, LDAP_OPT_VERSION, 3) failed!\n",
811 ri->ri_hostname, NULL, NULL );
814 ldap_unbind( ri->ri_ldp );
816 return BIND_ERR_VERSION;
821 * Set ldap library options to (1) not follow referrals, and
822 * (2) restart the select() system call.
826 err = ldap_set_option(ri->ri_ldp, LDAP_OPT_REFERRALS, LDAP_OPT_OFF);
828 if( err != LDAP_OPT_SUCCESS ) {
830 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: ",
831 "Error: ldap_set_option(%s, REFERRALS, OFF) failed!\n",
834 Debug( LDAP_DEBUG_ANY,
835 "Error: ldap_set_option(%s,REFERRALS, OFF) failed!\n",
836 ri->ri_hostname, NULL, NULL );
838 ldap_unbind( ri->ri_ldp );
840 return BIND_ERR_REFERRALS;
843 ldap_set_option(ri->ri_ldp, LDAP_OPT_RESTART, LDAP_OPT_ON);
847 err = ldap_start_tls_s(ri->ri_ldp, NULL, NULL);
849 if( err != LDAP_SUCCESS ) {
851 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: ",
852 "%s: ldap_start_tls failed: %s (%d)\n",
853 ri->ri_tls == TLS_CRITICAL ? "Error" : "Warning",
854 ldap_err2string( err ), err ));
856 Debug( LDAP_DEBUG_ANY,
857 "%s: ldap_start_tls failed: %s (%d)\n",
858 ri->ri_tls == TLS_CRITICAL ? "Error" : "Warning",
859 ldap_err2string( err ), err );
862 if( ri->ri_tls == TLS_CRITICAL ) {
863 ldap_unbind( ri->ri_ldp );
865 return BIND_ERR_TLS_FAILED;
870 switch ( ri->ri_bind_method ) {
873 * Bind with a plaintext password.
876 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ARGS,
877 "do_bind: bind to %s:%d as %s (simple)\n",
878 ri->ri_hostname, ri->ri_port, ri->ri_bind_dn ));
880 Debug( LDAP_DEBUG_ARGS, "bind to %s:%d as %s (simple)\n",
881 ri->ri_hostname, ri->ri_port, ri->ri_bind_dn );
883 ldrc = ldap_simple_bind_s( ri->ri_ldp, ri->ri_bind_dn,
885 if ( ldrc != LDAP_SUCCESS ) {
887 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: "
888 "Error: ldap_simple_bind_s for %s:%d failed: %s\n",
889 ri->ri_hostname, ri->ri_port, ldap_err2string( ldrc ) ));
891 Debug( LDAP_DEBUG_ANY,
892 "Error: ldap_simple_bind_s for %s:%d failed: %s\n",
893 ri->ri_hostname, ri->ri_port, ldap_err2string( ldrc ));
896 ldap_unbind( ri->ri_ldp );
898 return( BIND_ERR_SIMPLE_FAILED );
904 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ARGS,
905 "do_bind: bind to %s as %s via %s (SASL)\n",
906 ri->ri_hostname, ri->ri_authcId, ri->ri_saslmech ));
908 Debug( LDAP_DEBUG_ARGS, "bind to %s as %s via %s (SASL)\n",
909 ri->ri_hostname, ri->ri_authcId, ri->ri_saslmech );
912 #ifdef HAVE_CYRUS_SASL
913 if( ri->ri_secprops != NULL ) {
915 err = ldap_set_option(ri->ri_ldp, LDAP_OPT_X_SASL_SECPROPS,
918 if( err != LDAP_OPT_SUCCESS ) {
920 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: "
921 "Error: ldap_set_option(%s,SECPROPS,\"%s\") failed!\n",
922 ri->ri_hostname, ri->ri_secprops ));
924 Debug( LDAP_DEBUG_ANY,
925 "Error: ldap_set_option(%s,SECPROPS,\"%s\") failed!\n",
926 ri->ri_hostname, ri->ri_secprops, NULL );
928 ldap_unbind( ri->ri_ldp );
930 return BIND_ERR_SASL_FAILED;
935 char *passwd = ri->ri_password ? ber_strdup( ri->ri_password ) : NULL;
936 void *defaults = lutil_sasl_defaults( ri->ri_ldp, ri->ri_saslmech,
937 ri->ri_realm, ri->ri_authcId, passwd, ri->ri_authzId );
939 ldrc = ldap_sasl_interactive_bind_s( ri->ri_ldp, ri->ri_bind_dn,
940 ri->ri_saslmech, NULL, NULL,
941 LDAP_SASL_QUIET, lutil_sasl_interact, defaults );
942 if ( ldrc != LDAP_SUCCESS ) {
944 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: "
945 "Error: LDAP SASL for %s:%d failed: %s\n",
946 ri->ri_hostname, ri->ri_port, ldap_err2string( ldrc ) ));
948 Debug( LDAP_DEBUG_ANY, "Error: LDAP SASL for %s:%d failed: %s\n",
949 ri->ri_hostname, ri->ri_port, ldap_err2string( ldrc ));
952 ldap_unbind( ri->ri_ldp );
954 return( BIND_ERR_SASL_FAILED );
957 ber_memfree( passwd );
958 ber_memfree( defaults );
963 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: "
964 "Error: do_bind: SASL not supported %s:%d\n",
965 ri->ri_hostname, ri->ri_port ));
967 Debug( LDAP_DEBUG_ANY,
968 "Error: do_bind: SASL not supported %s:%d\n",
969 ri->ri_hostname, ri->ri_port, NULL );
971 ldap_unbind( ri->ri_ldp );
973 return( BIND_ERR_BAD_ATYPE );
978 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: "
979 "Error: do_bind: unknown auth type \"%d\" for %s:%d\n",
980 ri->ri_bind_method, ri->ri_hostname, ri->ri_port ));
982 Debug( LDAP_DEBUG_ANY,
983 "Error: do_bind: unknown auth type \"%d\" for %s:%d\n",
984 ri->ri_bind_method, ri->ri_hostname, ri->ri_port );
986 ldap_unbind( ri->ri_ldp );
988 return( BIND_ERR_BAD_ATYPE );
994 LDAPControl *ctrls[2];
998 c.ldctl_oid = LDAP_CONTROL_MANAGEDSAIT;
999 c.ldctl_value.bv_val = NULL;
1000 c.ldctl_value.bv_len = 0;
1001 c.ldctl_iscritical = 0;
1003 err = ldap_set_option(ri->ri_ldp, LDAP_OPT_SERVER_CONTROLS, &ctrls);
1005 if( err != LDAP_OPT_SUCCESS ) {
1007 LDAP_LOG (( "ldap_op", LDAP_LEVEL_ERR, "do_bind: "
1008 "ldap_set_option(%s, SERVER_CONTROLS, ManageDSAit) failed!\n",
1011 Debug( LDAP_DEBUG_ANY, "Error: "
1012 "ldap_set_option(%s, SERVER_CONTROLS, ManageDSAit) failed!\n",
1013 ri->ri_hostname, NULL, NULL );
1015 ldap_unbind( ri->ri_ldp );
1017 return BIND_ERR_MANAGEDSAIT;
1029 * For debugging. Print the contents of an ldmarr array.
1041 for ( i = 0; ldmarr[ i ] != NULL; i++ ) {
1044 LDAP_LOG (( "ldap_op", LDAP_LEVEL_INFO, "dump_ldm_array: "
1045 "Trace (%ld): *** ldmarr[ %d ] contents:\n",
1046 (long) getpid(), i ));
1047 LDAP_LOG (( "ldap_op", LDAP_LEVEL_INFO, "dump_ldm_array: "
1048 "Trace (%ld): *** ldm->mod_op: %d\n",
1049 (long) getpid(), ldm->mod_op ));
1050 LDAP_LOG (( "ldap_op", LDAP_LEVEL_INFO, "dump_ldm_array: "
1051 "Trace (%ld): *** ldm->mod_type: %s\n",
1052 (long) getpid(), ldm->mod_type ));
1054 Debug( LDAP_DEBUG_TRACE,
1055 "Trace (%ld): *** ldmarr[ %d ] contents:\n",
1056 (long) getpid(), i, 0 );
1057 Debug( LDAP_DEBUG_TRACE,
1058 "Trace (%ld): *** ldm->mod_op: %d\n",
1059 (long) getpid(), ldm->mod_op, 0 );
1060 Debug( LDAP_DEBUG_TRACE,
1061 "Trace (%ld): *** ldm->mod_type: %s\n",
1062 (long) getpid(), ldm->mod_type, 0 );
1064 if ( ldm->mod_bvalues != NULL ) {
1065 for ( j = 0; ( b = ldm->mod_bvalues[ j ] ) != NULL; j++ ) {
1066 msgbuf = ch_malloc( b->bv_len + 512 );
1067 sprintf( msgbuf, "***** bv[ %d ] len = %ld, val = <%s>",
1068 j, b->bv_len, b->bv_val );
1070 LDAP_LOG (( "ldap_op", LDAP_LEVEL_INFO, "dump_ldm_array: "
1071 "Trace (%ld):%s\n", (long) getpid(), msgbuf ));
1073 Debug( LDAP_DEBUG_TRACE,
1074 "Trace (%ld):%s\n", (long) getpid(), msgbuf, 0 );