10Sstevel@tonic-gate /* 2*3857Sstevel * Portions Copyright 1998 Sun Microsystems, Inc. All rights reserved. 3*3857Sstevel * Use is subject to license terms. 40Sstevel@tonic-gate */ 50Sstevel@tonic-gate 60Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI" 70Sstevel@tonic-gate /* 80Sstevel@tonic-gate * Copyright (c) 1990 Regents of the University of Michigan. 90Sstevel@tonic-gate * All rights reserved. 100Sstevel@tonic-gate * 110Sstevel@tonic-gate * bind.c 120Sstevel@tonic-gate */ 130Sstevel@tonic-gate 140Sstevel@tonic-gate #ifndef lint 150Sstevel@tonic-gate static char copyright[] = "@(#) Copyright (c) 1990 Regents of the University of Michigan.\nAll rights reserved.\n"; 160Sstevel@tonic-gate #endif 170Sstevel@tonic-gate 180Sstevel@tonic-gate #include <stdio.h> 190Sstevel@tonic-gate #include <string.h> 200Sstevel@tonic-gate #ifdef MACOS 210Sstevel@tonic-gate #include <stdlib.h> 220Sstevel@tonic-gate #include "macos.h" 230Sstevel@tonic-gate #else /* MACOS */ 240Sstevel@tonic-gate #ifdef DOS 250Sstevel@tonic-gate #include "msdos.h" 260Sstevel@tonic-gate #ifdef NCSA 270Sstevel@tonic-gate #include "externs.h" 280Sstevel@tonic-gate #endif /* NCSA */ 290Sstevel@tonic-gate #else /* DOS */ 300Sstevel@tonic-gate #include <sys/types.h> 310Sstevel@tonic-gate #include <sys/socket.h> 320Sstevel@tonic-gate #include <sys/time.h> 330Sstevel@tonic-gate #endif /* DOS */ 340Sstevel@tonic-gate #endif /* MACOS */ 350Sstevel@tonic-gate 360Sstevel@tonic-gate #include "lber.h" 370Sstevel@tonic-gate #include "ldap.h" 380Sstevel@tonic-gate #include "ldap-private.h" 390Sstevel@tonic-gate #include "ldap-int.h" 400Sstevel@tonic-gate 410Sstevel@tonic-gate 420Sstevel@tonic-gate /* 430Sstevel@tonic-gate * ldap_bind - bind to the ldap server (and X.500). The dn and password 440Sstevel@tonic-gate * of the entry to which to bind are supplied, along with the authentication 450Sstevel@tonic-gate * method to use. The msgid of the bind request is returned on success, 460Sstevel@tonic-gate * -1 if there's trouble. Note, the kerberos support assumes the user already 470Sstevel@tonic-gate * has a valid tgt for now. ldap_result() should be called to find out the 480Sstevel@tonic-gate * outcome of the bind request. 490Sstevel@tonic-gate * 500Sstevel@tonic-gate * Example: 510Sstevel@tonic-gate * ldap_bind( ld, "cn=manager, o=university of michigan, c=us", "secret", 520Sstevel@tonic-gate * LDAP_AUTH_SIMPLE ) 530Sstevel@tonic-gate */ 540Sstevel@tonic-gate 550Sstevel@tonic-gate int 560Sstevel@tonic-gate ldap_bind( LDAP *ld, char *dn, char *passwd, int authmethod ) 570Sstevel@tonic-gate { 580Sstevel@tonic-gate /* 590Sstevel@tonic-gate * The bind request looks like this: 600Sstevel@tonic-gate * BindRequest ::= SEQUENCE { 610Sstevel@tonic-gate * version INTEGER, 620Sstevel@tonic-gate * name DistinguishedName, -- who 630Sstevel@tonic-gate * authentication CHOICE { 640Sstevel@tonic-gate * simple [0] OCTET STRING -- passwd 650Sstevel@tonic-gate #ifdef KERBEROS 660Sstevel@tonic-gate * krbv42ldap [1] OCTET STRING 670Sstevel@tonic-gate * krbv42dsa [2] OCTET STRING 680Sstevel@tonic-gate #endif 690Sstevel@tonic-gate * } 700Sstevel@tonic-gate * } 710Sstevel@tonic-gate * all wrapped up in an LDAPMessage sequence. 720Sstevel@tonic-gate */ 730Sstevel@tonic-gate 740Sstevel@tonic-gate Debug( LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 88, "ldap_bind\n"), 0, 0, 0 ); 750Sstevel@tonic-gate 760Sstevel@tonic-gate switch ( authmethod ) { 770Sstevel@tonic-gate case LDAP_AUTH_SIMPLE: 780Sstevel@tonic-gate return( ldap_simple_bind( ld, dn, passwd ) ); 790Sstevel@tonic-gate 800Sstevel@tonic-gate #ifdef KERBEROS 810Sstevel@tonic-gate case LDAP_AUTH_KRBV41: 820Sstevel@tonic-gate return( ldap_kerberos_bind1( ld, dn ) ); 830Sstevel@tonic-gate 840Sstevel@tonic-gate case LDAP_AUTH_KRBV42: 850Sstevel@tonic-gate return( ldap_kerberos_bind2( ld, dn ) ); 860Sstevel@tonic-gate #endif 870Sstevel@tonic-gate 880Sstevel@tonic-gate default: 890Sstevel@tonic-gate ld->ld_errno = LDAP_AUTH_UNKNOWN; 900Sstevel@tonic-gate return( -1 ); 910Sstevel@tonic-gate } 920Sstevel@tonic-gate } 930Sstevel@tonic-gate 940Sstevel@tonic-gate /* 950Sstevel@tonic-gate * ldap_bind_s - bind to the ldap server (and X.500). The dn and password 960Sstevel@tonic-gate * of the entry to which to bind are supplied, along with the authentication 970Sstevel@tonic-gate * method to use. This routine just calls whichever bind routine is 980Sstevel@tonic-gate * appropriate and returns the result of the bind (e.g. LDAP_SUCCESS or 990Sstevel@tonic-gate * some other error indication). Note, the kerberos support assumes the 1000Sstevel@tonic-gate * user already has a valid tgt for now. 1010Sstevel@tonic-gate * 1020Sstevel@tonic-gate * Examples: 1030Sstevel@tonic-gate * ldap_bind_s( ld, "cn=manager, o=university of michigan, c=us", 1040Sstevel@tonic-gate * "secret", LDAP_AUTH_SIMPLE ) 1050Sstevel@tonic-gate * ldap_bind_s( ld, "cn=manager, o=university of michigan, c=us", 1060Sstevel@tonic-gate * NULL, LDAP_AUTH_KRBV4 ) 1070Sstevel@tonic-gate */ 1080Sstevel@tonic-gate int 1090Sstevel@tonic-gate ldap_bind_s( LDAP *ld, char *dn, char *passwd, int authmethod ) 1100Sstevel@tonic-gate { 1110Sstevel@tonic-gate Debug( LDAP_DEBUG_TRACE, catgets(slapdcat, 1, 89, "ldap_bind_s\n"), 0, 0, 0 ); 1120Sstevel@tonic-gate 1130Sstevel@tonic-gate switch ( authmethod ) { 1140Sstevel@tonic-gate case LDAP_AUTH_SIMPLE: 1150Sstevel@tonic-gate return( ldap_simple_bind_s( ld, dn, passwd ) ); 1160Sstevel@tonic-gate 1170Sstevel@tonic-gate #ifdef KERBEROS 1180Sstevel@tonic-gate case LDAP_AUTH_KRBV4: 1190Sstevel@tonic-gate return( ldap_kerberos_bind_s( ld, dn ) ); 1200Sstevel@tonic-gate 1210Sstevel@tonic-gate case LDAP_AUTH_KRBV41: 1220Sstevel@tonic-gate return( ldap_kerberos_bind1_s( ld, dn ) ); 1230Sstevel@tonic-gate 1240Sstevel@tonic-gate case LDAP_AUTH_KRBV42: 1250Sstevel@tonic-gate return( ldap_kerberos_bind2_s( ld, dn ) ); 1260Sstevel@tonic-gate #endif 1270Sstevel@tonic-gate 1280Sstevel@tonic-gate default: 1290Sstevel@tonic-gate return( ld->ld_errno = LDAP_AUTH_UNKNOWN ); 1300Sstevel@tonic-gate } 1310Sstevel@tonic-gate } 1320Sstevel@tonic-gate 1330Sstevel@tonic-gate 1340Sstevel@tonic-gate void 1350Sstevel@tonic-gate ldap_set_rebind_proc( LDAP *ld, LDAP_REBIND_FUNCTION *rebindproc, void *extra_arg ) 1360Sstevel@tonic-gate { 1370Sstevel@tonic-gate #ifdef _REENTRANT 1380Sstevel@tonic-gate LOCK_LDAP(ld); 1390Sstevel@tonic-gate #endif 1400Sstevel@tonic-gate ld->ld_rebindproc = rebindproc; 1410Sstevel@tonic-gate ld->ld_rebind_extra_arg = extra_arg; 1420Sstevel@tonic-gate #ifdef _REENTRANT 1430Sstevel@tonic-gate UNLOCK_LDAP(ld); 1440Sstevel@tonic-gate #endif 1450Sstevel@tonic-gate } 146