+static int
+slap_sasl_log(
+ void *context,
+ int priority,
+ const char *message)
+{
+ Connection *conn = context;
+ int level;
+ const char * label;
+
+ if ( message == NULL ) {
+ return SASL_BADPARAM;
+ }
+
+ switch (priority) {
+ case SASL_LOG_ERR:
+ level = LDAP_DEBUG_ANY;
+ label = "Error";
+ break;
+ case SASL_LOG_WARNING:
+ level = LDAP_DEBUG_TRACE;
+ label = "Warning";
+ break;
+ case SASL_LOG_INFO:
+ level = LDAP_DEBUG_TRACE;
+ label = "Info";
+ break;
+ default:
+ return SASL_BADPARAM;
+ }
+
+#ifdef NEW_LOGGING
+ LDAP_LOG(( "sasl", LDAP_LEVEL_ENTRY,
+ "SASL [conn=%ld] %s: %s\n",
+ conn ? conn->c_connid : -1,
+ label, message ));
+#else
+ Debug( level, "SASL [conn=%ld] %s: %s\n",
+ conn ? conn->c_connid: -1,
+ label, message );
+#endif
+
+
+ return SASL_OK;
+}
+
+
+/* Take any sort of identity string and return a DN with the "dn:" prefix. The
+ string returned in *dnptr is in its own allocated memory, and must be free'd
+ by the calling process.
+ -Mark Adamson, Carnegie Mellon
+*/
+
+int slap_sasl_getdn( Connection *conn, char *id, char **dnptr, int flags )
+{
+ char *c=NULL, *c1, *dn=NULL;
+ int rc, len;
+ sasl_conn_t *ctx;
+
+
+#ifdef NEW_LOGGING
+ LDAP_LOG(( "sasl", LDAP_LEVEL_ENTRY,
+ "slap_sasl_getdn: conn %d id=%s\n",
+ conn ? conn->c_connid : -1,
+ id ? (*id ? id : "<empty>") : "NULL" ));
+#else
+ Debug( LDAP_DEBUG_ARGS, "slap_sasl_getdn: id=%s\n",
+ id?(*id?id:"<empty>"):"NULL",0,0 );
+#endif
+
+
+ /* Blatantly anonymous ID */
+ if( id &&
+ ( id[sizeof( "anonymous" )-1] == '\0'
+ || id[sizeof( "anonymous" )-1] == '@' ) &&
+ !strncasecmp( id, "anonymous", sizeof( "anonymous" )-1) ) {
+ *dnptr = NULL;
+ return( LDAP_SUCCESS );
+ }
+ ctx = conn->c_sasl_context;
+ len = strlen( id );
+
+ /* An authcID needs to be converted to authzID form */
+ if( flags & FLAG_GETDN_AUTHCID ) {
+ if( sasl_external_x509dn_convert && conn->c_sasl_bind_mech
+ && ( strcasecmp( "EXTERNAL", conn->c_sasl_bind_mech ) == 0 )
+ && len && id[0] == '/' /* && id[len-1]== '/' */)
+ {
+ /* check SASL external for X.509 style DN and */
+ /* convert to dn:<dn> form */
+ char *tmpdn = ldap_dcedn2dn( id );
+ len = strlen( tmpdn );
+
+ dn = ch_malloc( len+4 );
+ dn[0] = 'd';
+ dn[1] = 'n';
+ dn[2] = ':';
+ AC_MEMCPY( &dn[3], tmpdn, len+1 );
+ len += 3;
+
+ } else {
+ /* convert to u:<username> form */
+ dn = ch_malloc( len+3 );
+ dn[0] = 'u';
+ dn[1] = ':';
+ AC_MEMCPY( &dn[2], id, len+1 );
+ len += 2;
+ }
+ } else {
+ dn = ch_strdup( id );
+ }
+
+ /* An authzID must be properly prefixed */
+ if( flags & FLAG_GETDN_AUTHZID
+ && strncasecmp( dn, "u:", sizeof("u:")-1 )
+ && strncasecmp( dn, "dn:", sizeof("dn:")-1 ) )
+ {
+ ch_free( dn );
+ *dnptr = NULL;
+ return( LDAP_INAPPROPRIATE_AUTH );
+ }
+
+ /* Username strings */
+ if( !strncasecmp( dn, "u:", sizeof("u:")-1 ) ) {
+ len += (sizeof("dn:uid=")-1) + (sizeof(",cn=auth")-1);
+
+ /* Figure out how much data we have for the dn */
+ rc = sasl_getprop( ctx, SASL_REALM, (void **)&c );
+ if( rc != SASL_OK && rc != SASL_NOTDONE ) {
+#ifdef NEW_LOGGING
+ LDAP_LOG(( "sasl", LDAP_LEVEL_ERR,
+ "slap_sasl_getdn: getprop(REALM) failed.\n" ));
+#else
+ Debug(LDAP_DEBUG_TRACE,
+ "getdn: getprop(REALM) failed!\n", 0,0,0);
+#endif
+
+ ch_free( dn );
+ *dnptr = NULL;
+ return( LDAP_OPERATIONS_ERROR );
+ }
+
+ if( c && *c ) {
+ len += strlen( c ) + (sizeof(",cn=")-1);
+ }
+
+ if( conn->c_sasl_bind_mech ) {
+ len += strlen( conn->c_sasl_bind_mech ) + (sizeof(",cn=")-1);
+ }
+
+ /* Build the new dn */
+ c1 = dn;
+ dn = ch_malloc( len );
+ len = sprintf( dn, "dn:uid=%s", c1+2 );
+ ch_free( c1 );
+
+ if( c ) {
+ len += sprintf( dn+len, ",cn=%s", c );
+ }
+ if( conn->c_sasl_bind_mech ) {
+ len += sprintf( dn+len, ",cn=%s", conn->c_sasl_bind_mech );
+ }
+ strcpy( dn+len, ",cn=auth" );
+ len += (sizeof(",cn=auth")-1);
+
+#ifdef NEW_LOGGING
+ LDAP_LOG(( "sasl", LDAP_LEVEL_ENTRY,
+ "slap_sasl_getdn: u:id converted to %s.\n", dn ));
+#else
+ Debug( LDAP_DEBUG_TRACE, "getdn: u:id converted to %s\n", dn,0,0 );
+#endif
+ }
+
+ /* DN strings that are a cn=auth identity to run through regexp */
+ if( !strncasecmp( dn, "dn:", sizeof("dn:")-1) &&
+ ( ( flags & FLAG_GETDN_FINAL ) == 0 ) )
+ {
+ c1 = slap_sasl2dn( dn + (sizeof("dn:")-1) );
+ if( c1 ) {
+ ch_free( dn );
+ dn = c1;
+ /* Reaffix the dn: prefix if it was removed */
+ if( strncasecmp( dn, "dn:", sizeof("dn:")-1) ) {
+ c1 = dn;
+ dn = ch_malloc( strlen( c1 ) + sizeof("dn:") );
+ sprintf( dn, "dn:%s", c1 );
+ ch_free( c1 );
+ }
+
+#ifdef NEW_LOGGING
+ LDAP_LOG(( "sasl", LDAP_LEVEL_ENTRY,
+ "slap_sasl_getdn: dn:id converted to %s.\n", dn ));
+#else
+ Debug( LDAP_DEBUG_TRACE, "getdn: dn:id converted to %s\n",
+ dn, 0, 0 );
+#endif
+ }
+ }
+
+ if( ( flags & FLAG_GETDN_FINAL ) == 0 ) {
+ dn_normalize( dn+(sizeof("dn:")-1) );
+ }
+
+ *dnptr = dn;
+ return( LDAP_SUCCESS );
+}
+
+
+
+static int
+slap_sasl_authorize(
+ void *context,
+ const char *authcid,
+ const char *authzid,
+ const char **user,
+ const char **errstr)
+{
+ char *authcDN, *authzDN;
+ int rc;
+ Connection *conn = context;
+
+ *user = NULL;
+
+#ifdef NEW_LOGGING
+ LDAP_LOG(( "sasl", LDAP_LEVEL_ENTRY,
+ "slap_sas_authorize: conn %d authcid=\"%s\" authzid=\"%s\"\n",
+ conn ? conn->c_connid : -1,
+ authcid ? authcid : "<empty>",
+ authzid ? authzid : "<empty>" ));
+#else
+ Debug( LDAP_DEBUG_ARGS, "SASL Authorize [conn=%ld]: "
+ "authcid=\"%s\" authzid=\"%s\"\n",
+ (long) (conn ? conn->c_connid : -1),
+ authcid ? authcid : "<empty>",
+ authzid ? authzid : "<empty>" );
+#endif
+
+
+ /* Convert the identities to DN's. If no authzid was given, client will
+ be bound as the DN matching their username */
+ rc = slap_sasl_getdn( conn, (char *)authcid, &authcDN, FLAG_GETDN_AUTHCID );
+ if( rc != LDAP_SUCCESS ) {
+ *errstr = ldap_err2string( rc );
+ return SASL_NOAUTHZ;
+ }
+ if( ( authzid == NULL ) || !strcmp( authcid,authzid ) ) {
+#ifdef NEW_LOGGING
+ LDAP_LOG(( "sasl", LDAP_LEVEL_ENTRY,
+ "slap_sasl_authorize: conn %d Using authcDN=%s\n",
+ conn ? conn->c_connid : -1, authcDN ));
+#else
+ Debug( LDAP_DEBUG_TRACE, "SASL Authorize [conn=%ld]: "
+ "Using authcDN=%s\n", (long) (conn ? conn->c_connid : -1), authcDN,0 );
+#endif
+
+ *user = authcDN;
+ *errstr = NULL;
+ return SASL_OK;
+ }
+ rc = slap_sasl_getdn( conn, (char *)authzid, &authzDN, FLAG_GETDN_AUTHZID );
+ if( rc != LDAP_SUCCESS ) {
+ ch_free( authcDN );
+ *errstr = ldap_err2string( rc );
+ return SASL_NOAUTHZ;
+ }
+
+ rc = slap_sasl_authorized( authcDN, authzDN );
+ if( rc ) {
+#ifdef NEW_LOGGING
+ LDAP_LOG(( "sasl", LDAP_LEVEL_INFO,
+ "slap_sasl_authorize: conn %ld authorization disallowed (%d)\n",
+ (long)(conn ? conn->c_connid : -1), rc ));
+#else
+ Debug( LDAP_DEBUG_TRACE, "SASL Authorize [conn=%ld]: "
+ " authorization disallowed (%d)\n",
+ (long) (conn ? conn->c_connid : -1), rc, 0 );
+#endif
+
+ *errstr = "not authorized";
+ ch_free( authcDN );
+ ch_free( authzDN );
+ return SASL_NOAUTHZ;
+ }
+
+#ifdef NEW_LOGGING
+ LDAP_LOG(( "sasl", LDAP_LEVEL_ENTRY,
+ "slap_sasl_authorize: conn %d authorization allowed\n",
+ (long)(conn ? conn->c_connid : -1 ) ));
+#else
+ Debug( LDAP_DEBUG_TRACE, "SASL Authorize [conn=%ld]: "
+ " authorization allowed\n",
+ (long) (conn ? conn->c_connid : -1), 0, 0 );
+#endif
+
+
+ ch_free( authcDN );
+ *user = authzDN;
+ *errstr = NULL;
+ return SASL_OK;
+}
+
+