xref: /netbsd-src/external/bsd/openldap/dist/clients/tools/ldappasswd.c (revision 549b59ed3ccf0d36d3097190a0db27b770f3a839)
1*549b59edSchristos /*	$NetBSD: ldappasswd.c,v 1.3 2021/08/14 16:14:49 christos Exp $	*/
24e6df137Slukem 
32de962bdSlukem /* ldappasswd -- a tool for change LDAP passwords */
4d11b170bStron /* $OpenLDAP$ */
52de962bdSlukem /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
62de962bdSlukem  *
7*549b59edSchristos  * Copyright 1998-2021 The OpenLDAP Foundation.
82de962bdSlukem  * Portions Copyright 1998-2003 Kurt D. Zeilenga.
92de962bdSlukem  * Portions Copyright 1998-2001 Net Boolean Incorporated.
102de962bdSlukem  * Portions Copyright 2001-2003 IBM Corporation.
112de962bdSlukem  * All rights reserved.
122de962bdSlukem  *
132de962bdSlukem  * Redistribution and use in source and binary forms, with or without
142de962bdSlukem  * modification, are permitted only as authorized by the OpenLDAP
152de962bdSlukem  * Public License.
162de962bdSlukem  *
172de962bdSlukem  * A copy of this license is available in the file LICENSE in the
182de962bdSlukem  * top-level directory of the distribution or, alternatively, at
192de962bdSlukem  * <http://www.OpenLDAP.org/license.html>.
202de962bdSlukem  */
212de962bdSlukem /* Portions Copyright (c) 1992-1996 Regents of the University of Michigan.
222de962bdSlukem  * All rights reserved.
232de962bdSlukem  *
242de962bdSlukem  * Redistribution and use in source and binary forms are permitted
252de962bdSlukem  * provided that this notice is preserved and that due credit is given
262de962bdSlukem  * to the University of Michigan at Ann Arbor.  The name of the
272de962bdSlukem  * University may not be used to endorse or promote products derived
282de962bdSlukem  * from this software without specific prior written permission.  This
292de962bdSlukem  * software is provided ``as is'' without express or implied warranty.
302de962bdSlukem  */
312de962bdSlukem /* ACKNOWLEDGEMENTS:
322de962bdSlukem  * The original ldappasswd(1) tool was developed by Dave Storey (F5
332de962bdSlukem  * Network), based on other OpenLDAP client tools (which are, of
342de962bdSlukem  * course, based on U-MICH LDAP).  This version was rewritten
352de962bdSlukem  * by Kurt D. Zeilenga (based on other OpenLDAP client tools).
362de962bdSlukem  */
372de962bdSlukem 
38376af7d7Schristos #include <sys/cdefs.h>
39*549b59edSchristos __RCSID("$NetBSD: ldappasswd.c,v 1.3 2021/08/14 16:14:49 christos Exp $");
40376af7d7Schristos 
412de962bdSlukem #include "portable.h"
422de962bdSlukem 
432de962bdSlukem #include <stdio.h>
442de962bdSlukem 
452de962bdSlukem #include <ac/stdlib.h>
462de962bdSlukem 
472de962bdSlukem #include <ac/ctype.h>
482de962bdSlukem #include <ac/socket.h>
492de962bdSlukem #include <ac/string.h>
502de962bdSlukem #include <ac/time.h>
512de962bdSlukem #include <ac/unistd.h>
522de962bdSlukem 
532de962bdSlukem #include <ldap.h>
542de962bdSlukem #include "lutil.h"
552de962bdSlukem #include "lutil_ldap.h"
562de962bdSlukem #include "ldap_defaults.h"
572de962bdSlukem 
582de962bdSlukem #include "common.h"
592de962bdSlukem 
602de962bdSlukem 
612de962bdSlukem static struct berval newpw = { 0, NULL };
622de962bdSlukem static struct berval oldpw = { 0, NULL };
632de962bdSlukem 
642de962bdSlukem static int   want_newpw = 0;
652de962bdSlukem static int   want_oldpw = 0;
662de962bdSlukem 
672de962bdSlukem static char *oldpwfile = NULL;
682de962bdSlukem static char *newpwfile = NULL;
692de962bdSlukem 
702de962bdSlukem void
usage(void)712de962bdSlukem usage( void )
722de962bdSlukem {
732de962bdSlukem 	fprintf( stderr, _("Change password of an LDAP user\n\n"));
742de962bdSlukem 	fprintf( stderr,_("usage: %s [options] [user]\n"), prog);
752de962bdSlukem 	fprintf( stderr, _("  user: the authentication identity, commonly a DN\n"));
762de962bdSlukem 	fprintf( stderr, _("Password change options:\n"));
772de962bdSlukem 	fprintf( stderr, _("  -a secret  old password\n"));
782de962bdSlukem 	fprintf( stderr, _("  -A         prompt for old password\n"));
792de962bdSlukem 	fprintf( stderr, _("  -t file    read file for old password\n"));
802de962bdSlukem 	fprintf( stderr, _("  -s secret  new password\n"));
812de962bdSlukem 	fprintf( stderr, _("  -S         prompt for new password\n"));
822de962bdSlukem 	fprintf( stderr, _("  -T file    read file for new password\n"));
832de962bdSlukem 	tool_common_usage();
842de962bdSlukem 	exit( EXIT_FAILURE );
852de962bdSlukem }
862de962bdSlukem 
872de962bdSlukem 
882de962bdSlukem const char options[] = "a:As:St:T:"
894e6df137Slukem 	"d:D:e:h:H:InNO:o:p:QR:U:vVw:WxX:y:Y:Z";
902de962bdSlukem 
912de962bdSlukem int
handle_private_option(int i)922de962bdSlukem handle_private_option( int i )
932de962bdSlukem {
942de962bdSlukem 	switch ( i ) {
952de962bdSlukem #if 0
962de962bdSlukem 	case 'E': /* passwd extensions */ {
972de962bdSlukem 		int		crit;
982de962bdSlukem 		char	*control, *cvalue;
992de962bdSlukem 		if( protocol == LDAP_VERSION2 ) {
1002de962bdSlukem 			fprintf( stderr, _("%s: -E incompatible with LDAPv%d\n"),
1012de962bdSlukem 			         prog, protocol );
1022de962bdSlukem 			exit( EXIT_FAILURE );
1032de962bdSlukem 		}
1042de962bdSlukem 
1052de962bdSlukem 		/* should be extended to support comma separated list of
1062de962bdSlukem 		 *	[!]key[=value] parameters, e.g.  -E !foo,bar=567
1072de962bdSlukem 		 */
1082de962bdSlukem 
1092de962bdSlukem 		crit = 0;
1102de962bdSlukem 		cvalue = NULL;
1112de962bdSlukem 		if( optarg[0] == '!' ) {
1122de962bdSlukem 			crit = 1;
1132de962bdSlukem 			optarg++;
1142de962bdSlukem 		}
1152de962bdSlukem 
116*549b59edSchristos 		control = optarg;
1172de962bdSlukem 		if ( (cvalue = strchr( control, '=' )) != NULL ) {
1182de962bdSlukem 			*cvalue++ = '\0';
1192de962bdSlukem 		}
1202de962bdSlukem 		fprintf( stderr, _("Invalid passwd extension name: %s\n"), control );
1212de962bdSlukem 		usage();
1222de962bdSlukem 		}
1232de962bdSlukem #endif
1242de962bdSlukem 
1252de962bdSlukem 	case 'a':	/* old password (secret) */
1262de962bdSlukem 		oldpw.bv_val = strdup( optarg );
1272de962bdSlukem 		{
1282de962bdSlukem 			char* p;
1292de962bdSlukem 			for( p = optarg; *p != '\0'; p++ ) {
1302de962bdSlukem 				*p = '\0';
1312de962bdSlukem 			}
1322de962bdSlukem 		}
1332de962bdSlukem 		oldpw.bv_len = strlen( oldpw.bv_val );
1342de962bdSlukem 		break;
1352de962bdSlukem 
1362de962bdSlukem 	case 'A':	/* prompt for old password */
1372de962bdSlukem 		want_oldpw++;
1382de962bdSlukem 		break;
1392de962bdSlukem 
1402de962bdSlukem 	case 's':	/* new password (secret) */
1412de962bdSlukem 		newpw.bv_val = strdup( optarg );
1422de962bdSlukem 		{
1432de962bdSlukem 			char* p;
1442de962bdSlukem 			for( p = optarg; *p != '\0'; p++ ) {
1452de962bdSlukem 				*p = '\0';
1462de962bdSlukem 			}
1472de962bdSlukem 		}
1482de962bdSlukem 		newpw.bv_len = strlen( newpw.bv_val );
1492de962bdSlukem 		break;
1502de962bdSlukem 
1512de962bdSlukem 	case 'S':	/* prompt for user password */
1522de962bdSlukem 		want_newpw++;
1532de962bdSlukem 		break;
1542de962bdSlukem 
1552de962bdSlukem 	case 't':
1562de962bdSlukem 		oldpwfile = optarg;
1572de962bdSlukem 		break;
1582de962bdSlukem 
1592de962bdSlukem 	case 'T':
1602de962bdSlukem 		newpwfile = optarg;
1612de962bdSlukem 		break;
1622de962bdSlukem 
1632de962bdSlukem 	default:
1642de962bdSlukem 		return 0;
1652de962bdSlukem 	}
1662de962bdSlukem 	return 1;
1672de962bdSlukem }
1682de962bdSlukem 
1692de962bdSlukem 
1702de962bdSlukem int
main(int argc,char * argv[])1712de962bdSlukem main( int argc, char *argv[] )
1722de962bdSlukem {
1732de962bdSlukem 	int rc;
1742de962bdSlukem 	char	*user = NULL;
1752de962bdSlukem 
1762de962bdSlukem 	LDAP	       *ld = NULL;
1772de962bdSlukem 	struct berval bv = {0, NULL};
1782de962bdSlukem 	BerElement  *ber = NULL;
1792de962bdSlukem 
1802de962bdSlukem 	int id, code = LDAP_OTHER;
1812de962bdSlukem 	LDAPMessage *res;
1822de962bdSlukem 	char *matcheddn = NULL, *text = NULL, **refs = NULL;
1832de962bdSlukem 	char	*retoid = NULL;
1842de962bdSlukem 	struct berval *retdata = NULL;
1852de962bdSlukem 	LDAPControl **ctrls = NULL;
1862de962bdSlukem 
1872de962bdSlukem     tool_init( TOOL_PASSWD );
1882de962bdSlukem 	prog = lutil_progname( "ldappasswd", argc, argv );
1892de962bdSlukem 
1902de962bdSlukem 	/* LDAPv3 only */
1912de962bdSlukem 	protocol = LDAP_VERSION3;
1922de962bdSlukem 
1932de962bdSlukem 	tool_args( argc, argv );
1942de962bdSlukem 
1952de962bdSlukem 	if( argc - optind > 1 ) {
1962de962bdSlukem 		usage();
1972de962bdSlukem 	} else if ( argc - optind == 1 ) {
1982de962bdSlukem 		user = strdup( argv[optind] );
1992de962bdSlukem 	} else {
2002de962bdSlukem 		user = NULL;
2012de962bdSlukem 	}
2022de962bdSlukem 
2032de962bdSlukem 	if( oldpwfile ) {
2042de962bdSlukem 		rc = lutil_get_filed_password( oldpwfile, &oldpw );
2052de962bdSlukem 		if( rc ) {
2062de962bdSlukem 			rc = EXIT_FAILURE;
2072de962bdSlukem 			goto done;
2082de962bdSlukem 		}
2092de962bdSlukem 	}
2102de962bdSlukem 
2112de962bdSlukem 	if( want_oldpw && oldpw.bv_val == NULL ) {
2122de962bdSlukem 		/* prompt for old password */
2132de962bdSlukem 		char *ckoldpw;
2142de962bdSlukem 		oldpw.bv_val = strdup(getpassphrase(_("Old password: ")));
2152de962bdSlukem 		ckoldpw = getpassphrase(_("Re-enter old password: "));
2162de962bdSlukem 
2172de962bdSlukem 		if( oldpw.bv_val == NULL || ckoldpw == NULL ||
2182de962bdSlukem 			strcmp( oldpw.bv_val, ckoldpw ))
2192de962bdSlukem 		{
2202de962bdSlukem 			fprintf( stderr, _("passwords do not match\n") );
2212de962bdSlukem 			rc = EXIT_FAILURE;
2222de962bdSlukem 			goto done;
2232de962bdSlukem 		}
2242de962bdSlukem 
2252de962bdSlukem 		oldpw.bv_len = strlen( oldpw.bv_val );
2262de962bdSlukem 	}
2272de962bdSlukem 
2282de962bdSlukem 	if( newpwfile ) {
2292de962bdSlukem 		rc = lutil_get_filed_password( newpwfile, &newpw );
2302de962bdSlukem 		if( rc ) {
2312de962bdSlukem 			rc = EXIT_FAILURE;
2322de962bdSlukem 			goto done;
2332de962bdSlukem 		}
2342de962bdSlukem 	}
2352de962bdSlukem 
2362de962bdSlukem 	if( want_newpw && newpw.bv_val == NULL ) {
2372de962bdSlukem 		/* prompt for new password */
2382de962bdSlukem 		char *cknewpw;
2392de962bdSlukem 		newpw.bv_val = strdup(getpassphrase(_("New password: ")));
2402de962bdSlukem 		cknewpw = getpassphrase(_("Re-enter new password: "));
2412de962bdSlukem 
2422de962bdSlukem 		if( newpw.bv_val == NULL || cknewpw == NULL ||
2432de962bdSlukem 			strcmp( newpw.bv_val, cknewpw ))
2442de962bdSlukem 		{
2452de962bdSlukem 			fprintf( stderr, _("passwords do not match\n") );
2462de962bdSlukem 			rc = EXIT_FAILURE;
2472de962bdSlukem 			goto done;
2482de962bdSlukem 		}
2492de962bdSlukem 
2502de962bdSlukem 		newpw.bv_len = strlen( newpw.bv_val );
2512de962bdSlukem 	}
2522de962bdSlukem 
2532de962bdSlukem 	ld = tool_conn_setup( 0, 0 );
2542de962bdSlukem 
2552de962bdSlukem 	tool_bind( ld );
2562de962bdSlukem 
2572de962bdSlukem 	if( user != NULL || oldpw.bv_val != NULL || newpw.bv_val != NULL ) {
2582de962bdSlukem 		/* build the password modify request data */
2592de962bdSlukem 		ber = ber_alloc_t( LBER_USE_DER );
2602de962bdSlukem 
2612de962bdSlukem 		if( ber == NULL ) {
2622de962bdSlukem 			perror( "ber_alloc_t" );
2632de962bdSlukem 			rc = EXIT_FAILURE;
2642de962bdSlukem 			goto done;
2652de962bdSlukem 		}
2662de962bdSlukem 
2672de962bdSlukem 		ber_printf( ber, "{" /*}*/ );
2682de962bdSlukem 
2692de962bdSlukem 		if( user != NULL ) {
2702de962bdSlukem 			ber_printf( ber, "ts",
2712de962bdSlukem 				LDAP_TAG_EXOP_MODIFY_PASSWD_ID, user );
2722de962bdSlukem 			free(user);
2732de962bdSlukem 		}
2742de962bdSlukem 
2752de962bdSlukem 		if( oldpw.bv_val != NULL ) {
2762de962bdSlukem 			ber_printf( ber, "tO",
2772de962bdSlukem 				LDAP_TAG_EXOP_MODIFY_PASSWD_OLD, &oldpw );
2782de962bdSlukem 			free(oldpw.bv_val);
2792de962bdSlukem 		}
2802de962bdSlukem 
2812de962bdSlukem 		if( newpw.bv_val != NULL ) {
2822de962bdSlukem 			ber_printf( ber, "tO",
2832de962bdSlukem 				LDAP_TAG_EXOP_MODIFY_PASSWD_NEW, &newpw );
2842de962bdSlukem 			free(newpw.bv_val);
2852de962bdSlukem 		}
2862de962bdSlukem 
2872de962bdSlukem 		ber_printf( ber, /*{*/ "N}" );
2882de962bdSlukem 
2892de962bdSlukem 		rc = ber_flatten2( ber, &bv, 0 );
2902de962bdSlukem 
2912de962bdSlukem 		if( rc < 0 ) {
2922de962bdSlukem 			perror( "ber_flatten2" );
2932de962bdSlukem 			rc = EXIT_FAILURE;
2942de962bdSlukem 			goto done;
2952de962bdSlukem 		}
2962de962bdSlukem 	}
2972de962bdSlukem 
2982de962bdSlukem 	if ( dont ) {
2992de962bdSlukem 		rc = LDAP_SUCCESS;
3002de962bdSlukem 		goto done;
3012de962bdSlukem 	}
3022de962bdSlukem 
3032de962bdSlukem 	tool_server_controls( ld, NULL, 0);
3042de962bdSlukem 
3052de962bdSlukem 	rc = ldap_extended_operation( ld,
3062de962bdSlukem 		LDAP_EXOP_MODIFY_PASSWD, bv.bv_val ? &bv : NULL,
3072de962bdSlukem 		NULL, NULL, &id );
3082de962bdSlukem 
3092de962bdSlukem 	ber_free( ber, 1 );
3102de962bdSlukem 
3112de962bdSlukem 	if( rc != LDAP_SUCCESS ) {
3122de962bdSlukem 		tool_perror( "ldap_extended_operation", rc, NULL, NULL, NULL, NULL );
3132de962bdSlukem 		rc = EXIT_FAILURE;
3142de962bdSlukem 		goto done;
3152de962bdSlukem 	}
3162de962bdSlukem 
3172de962bdSlukem 	for ( ; ; ) {
3182de962bdSlukem 		struct timeval	tv;
3192de962bdSlukem 
3202de962bdSlukem 		if ( tool_check_abandon( ld, id ) ) {
321d11b170bStron 			tool_exit( ld, LDAP_CANCELLED );
3222de962bdSlukem 		}
3232de962bdSlukem 
3242de962bdSlukem 		tv.tv_sec = 0;
3252de962bdSlukem 		tv.tv_usec = 100000;
3262de962bdSlukem 
3272de962bdSlukem 		rc = ldap_result( ld, LDAP_RES_ANY, LDAP_MSG_ALL, &tv, &res );
3282de962bdSlukem 		if ( rc < 0 ) {
3292de962bdSlukem 			tool_perror( "ldap_result", rc, NULL, NULL, NULL, NULL );
330d11b170bStron 			tool_exit( ld, rc );
3312de962bdSlukem 		}
3322de962bdSlukem 
3332de962bdSlukem 		if ( rc != 0 ) {
3342de962bdSlukem 			break;
3352de962bdSlukem 		}
3362de962bdSlukem 	}
3372de962bdSlukem 
3382de962bdSlukem 	rc = ldap_parse_result( ld, res,
3392de962bdSlukem 		&code, &matcheddn, &text, &refs, &ctrls, 0 );
3402de962bdSlukem 	if( rc != LDAP_SUCCESS ) {
3412de962bdSlukem 		tool_perror( "ldap_parse_result", rc, NULL, NULL, NULL, NULL );
3422de962bdSlukem 		rc = EXIT_FAILURE;
3432de962bdSlukem 		goto done;
3442de962bdSlukem 	}
3452de962bdSlukem 
3462de962bdSlukem 	rc = ldap_parse_extended_result( ld, res, &retoid, &retdata, 1 );
3472de962bdSlukem 	if( rc != LDAP_SUCCESS ) {
3482de962bdSlukem 		tool_perror( "ldap_parse_extended_result", rc, NULL, NULL, NULL, NULL );
3492de962bdSlukem 		rc = EXIT_FAILURE;
3502de962bdSlukem 		goto done;
3512de962bdSlukem 	}
3522de962bdSlukem 
3532de962bdSlukem 	if( retdata != NULL ) {
3542de962bdSlukem 		ber_tag_t tag;
3552de962bdSlukem 		char *s;
3562de962bdSlukem 		ber = ber_init( retdata );
3572de962bdSlukem 
3582de962bdSlukem 		if( ber == NULL ) {
3592de962bdSlukem 			perror( "ber_init" );
3602de962bdSlukem 			rc = EXIT_FAILURE;
3612de962bdSlukem 			goto done;
3622de962bdSlukem 		}
3632de962bdSlukem 
3642de962bdSlukem 		/* we should check the tag */
3652de962bdSlukem 		tag = ber_scanf( ber, "{a}", &s);
3662de962bdSlukem 
3672de962bdSlukem 		if( tag == LBER_ERROR ) {
3682de962bdSlukem 			perror( "ber_scanf" );
3692de962bdSlukem 		} else {
3702de962bdSlukem 			printf(_("New password: %s\n"), s);
3714e6df137Slukem 			ber_memfree( s );
3722de962bdSlukem 		}
3732de962bdSlukem 
3742de962bdSlukem 		ber_free( ber, 1 );
3752de962bdSlukem 
3762de962bdSlukem 	} else if ( code == LDAP_SUCCESS && newpw.bv_val == NULL ) {
3772de962bdSlukem 		tool_perror( "ldap_parse_extended_result", LDAP_DECODING_ERROR,
3782de962bdSlukem 			" new password expected", NULL, NULL, NULL );
3792de962bdSlukem 	}
3802de962bdSlukem 
3812de962bdSlukem 	if( verbose || code != LDAP_SUCCESS ||
382d11b170bStron 		( matcheddn && *matcheddn ) || ( text && *text ) || refs || ctrls )
3832de962bdSlukem 	{
3842de962bdSlukem 		printf( _("Result: %s (%d)\n"), ldap_err2string( code ), code );
3852de962bdSlukem 
3862de962bdSlukem 		if( text && *text ) {
3872de962bdSlukem 			printf( _("Additional info: %s\n"), text );
3882de962bdSlukem 		}
3892de962bdSlukem 
3902de962bdSlukem 		if( matcheddn && *matcheddn ) {
3912de962bdSlukem 			printf( _("Matched DN: %s\n"), matcheddn );
3922de962bdSlukem 		}
3932de962bdSlukem 
3942de962bdSlukem 		if( refs ) {
3952de962bdSlukem 			int i;
3962de962bdSlukem 			for( i=0; refs[i]; i++ ) {
3972de962bdSlukem 				printf(_("Referral: %s\n"), refs[i] );
3982de962bdSlukem 			}
3992de962bdSlukem 		}
4002de962bdSlukem 
4012de962bdSlukem 		if( ctrls ) {
4022de962bdSlukem 			tool_print_ctrls( ld, ctrls );
4032de962bdSlukem 			ldap_controls_free( ctrls );
4042de962bdSlukem 		}
4052de962bdSlukem 	}
4062de962bdSlukem 
4072de962bdSlukem 	ber_memfree( text );
4082de962bdSlukem 	ber_memfree( matcheddn );
4092de962bdSlukem 	ber_memvfree( (void **) refs );
4102de962bdSlukem 	ber_memfree( retoid );
4112de962bdSlukem 	ber_bvfree( retdata );
4122de962bdSlukem 
4132de962bdSlukem 	rc = ( code == LDAP_SUCCESS ) ? EXIT_SUCCESS : EXIT_FAILURE;
4142de962bdSlukem 
4152de962bdSlukem done:
4162de962bdSlukem 	/* disconnect from server */
417d11b170bStron 	tool_exit( ld, rc );
4182de962bdSlukem }
419