2002-09-03 19:52:59 +08:00
|
|
|
/***************************************************************************
|
2013-01-04 09:50:28 +08:00
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2023-01-02 20:51:48 +08:00
|
|
|
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2002-09-03 19:52:59 +08:00
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2020-11-04 21:02:01 +08:00
|
|
|
* are also available at https://curl.se/docs/copyright.html.
|
2004-05-03 17:14:12 +08:00
|
|
|
*
|
2001-01-03 17:29:33 +08:00
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
2002-09-03 19:52:59 +08:00
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2001-01-03 17:29:33 +08:00
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2010-06-01 23:25:03 +08:00
|
|
|
* SPDX-License-Identifier: curl
|
2022-05-17 17:16:50 +08:00
|
|
|
*
|
2002-09-03 19:52:59 +08:00
|
|
|
***************************************************************************/
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2013-01-07 02:06:49 +08:00
|
|
|
#include "curl_setup.h"
|
2000-08-24 22:26:33 +08:00
|
|
|
|
2010-05-25 06:44:42 +08:00
|
|
|
#if !defined(CURL_DISABLE_LDAP) && !defined(USE_OPENLDAP)
|
2010-06-01 23:25:03 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Notice that USE_OPENLDAP is only a source code selection switch. When
|
|
|
|
* libcurl is built with USE_OPENLDAP defined the libcurl source code that
|
2013-01-04 09:50:28 +08:00
|
|
|
* gets compiled is the code from openldap.c, otherwise the code that gets
|
|
|
|
* compiled is the code from ldap.c.
|
2010-06-01 23:25:03 +08:00
|
|
|
*
|
|
|
|
* When USE_OPENLDAP is defined a recent version of the OpenLDAP library
|
|
|
|
* might be required for compilation and runtime. In order to use ancient
|
|
|
|
* OpenLDAP library versions, USE_OPENLDAP shall not be defined.
|
|
|
|
*/
|
|
|
|
|
2022-07-14 15:14:22 +08:00
|
|
|
/* Wincrypt must be included before anything that could include OpenSSL. */
|
|
|
|
#if defined(USE_WIN32_CRYPTO)
|
|
|
|
#include <wincrypt.h>
|
|
|
|
/* Undefine wincrypt conflicting symbols for BoringSSL. */
|
|
|
|
#undef X509_NAME
|
|
|
|
#undef X509_EXTENSIONS
|
|
|
|
#undef PKCS7_ISSUER_AND_SERIAL
|
|
|
|
#undef PKCS7_SIGNER_INFO
|
|
|
|
#undef OCSP_REQUEST
|
|
|
|
#undef OCSP_RESPONSE
|
|
|
|
#endif
|
|
|
|
|
2015-01-19 04:25:37 +08:00
|
|
|
#ifdef USE_WIN32_LDAP /* Use Windows LDAP implementation. */
|
2023-05-09 18:10:40 +08:00
|
|
|
# ifdef _MSC_VER
|
|
|
|
# pragma warning(push)
|
|
|
|
# pragma warning(disable: 4201)
|
|
|
|
# endif
|
|
|
|
# include <subauth.h> /* for [P]UNICODE_STRING */
|
|
|
|
# ifdef _MSC_VER
|
|
|
|
# pragma warning(pop)
|
|
|
|
# endif
|
2004-09-26 14:53:53 +08:00
|
|
|
# include <winldap.h>
|
2007-10-10 07:25:58 +08:00
|
|
|
# ifndef LDAP_VENDOR_NAME
|
2011-04-20 21:17:42 +08:00
|
|
|
# error Your Platform SDK is NOT sufficient for LDAP support! \
|
|
|
|
Update your Platform SDK, or disable LDAP support!
|
2007-10-10 07:25:58 +08:00
|
|
|
# else
|
|
|
|
# include <winber.h>
|
|
|
|
# endif
|
2007-08-12 04:57:54 +08:00
|
|
|
#else
|
2010-06-04 21:14:31 +08:00
|
|
|
# define LDAP_DEPRECATED 1 /* Be sure ldap_init() is defined. */
|
|
|
|
# ifdef HAVE_LBER_H
|
|
|
|
# include <lber.h>
|
|
|
|
# endif
|
2007-08-12 04:57:54 +08:00
|
|
|
# include <ldap.h>
|
2010-06-04 21:14:31 +08:00
|
|
|
# if (defined(HAVE_LDAP_SSL) && defined(HAVE_LDAP_SSL_H))
|
|
|
|
# include <ldap_ssl.h>
|
|
|
|
# endif /* HAVE_LDAP_SSL && HAVE_LDAP_SSL_H */
|
2004-05-03 17:14:12 +08:00
|
|
|
#endif
|
|
|
|
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "urldata.h"
|
1999-12-29 22:20:26 +08:00
|
|
|
#include <curl/curl.h>
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "sendf.h"
|
|
|
|
#include "escape.h"
|
|
|
|
#include "progress.h"
|
|
|
|
#include "transfer.h"
|
2016-10-31 16:30:36 +08:00
|
|
|
#include "strcase.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "strtok.h"
|
2007-08-12 04:57:54 +08:00
|
|
|
#include "curl_ldap.h"
|
2015-01-04 03:59:12 +08:00
|
|
|
#include "curl_multibyte.h"
|
2008-08-17 08:25:38 +08:00
|
|
|
#include "curl_base64.h"
|
2014-05-22 07:09:11 +08:00
|
|
|
#include "connect.h"
|
2016-04-29 21:46:40 +08:00
|
|
|
/* The last 3 #include files should be in this order */
|
2015-03-03 19:36:18 +08:00
|
|
|
#include "curl_printf.h"
|
2015-03-25 06:12:03 +08:00
|
|
|
#include "curl_memory.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "memdebug.h"
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2007-08-12 04:57:54 +08:00
|
|
|
#ifndef HAVE_LDAP_URL_PARSE
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2007-08-12 04:57:54 +08:00
|
|
|
/* Use our own implementation. */
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2020-05-14 06:05:04 +08:00
|
|
|
struct ldap_urldesc {
|
2013-09-06 05:51:53 +08:00
|
|
|
char *lud_host;
|
|
|
|
int lud_port;
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2015-01-04 04:36:10 +08:00
|
|
|
TCHAR *lud_dn;
|
2015-01-04 04:49:11 +08:00
|
|
|
TCHAR **lud_attrs;
|
2015-01-04 04:36:10 +08:00
|
|
|
#else
|
2013-09-06 05:51:53 +08:00
|
|
|
char *lud_dn;
|
|
|
|
char **lud_attrs;
|
2015-01-04 04:49:11 +08:00
|
|
|
#endif
|
2013-09-06 05:51:53 +08:00
|
|
|
int lud_scope;
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2015-01-04 04:58:29 +08:00
|
|
|
TCHAR *lud_filter;
|
|
|
|
#else
|
2013-09-06 05:51:53 +08:00
|
|
|
char *lud_filter;
|
2015-01-05 00:11:08 +08:00
|
|
|
#endif
|
2013-09-06 05:51:53 +08:00
|
|
|
char **lud_exts;
|
2013-09-11 02:30:07 +08:00
|
|
|
size_t lud_attrs_dups; /* how many were dup'ed, this field is not in the
|
|
|
|
"real" struct so can only be used in code
|
|
|
|
without HAVE_LDAP_URL_PARSE defined */
|
2020-05-14 06:05:04 +08:00
|
|
|
};
|
2007-08-13 21:03:08 +08:00
|
|
|
|
|
|
|
#undef LDAPURLDesc
|
2020-05-14 06:05:04 +08:00
|
|
|
#define LDAPURLDesc struct ldap_urldesc
|
2003-09-01 16:23:31 +08:00
|
|
|
|
2021-01-25 01:57:02 +08:00
|
|
|
static int _ldap_url_parse(struct Curl_easy *data,
|
|
|
|
const struct connectdata *conn,
|
2016-12-14 06:34:59 +08:00
|
|
|
LDAPURLDesc **ludp);
|
|
|
|
static void _ldap_free_urldesc(LDAPURLDesc *ludp);
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2007-08-13 21:03:08 +08:00
|
|
|
#undef ldap_free_urldesc
|
|
|
|
#define ldap_free_urldesc _ldap_free_urldesc
|
2004-05-03 17:14:12 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef DEBUG_LDAP
|
|
|
|
#define LDAP_TRACE(x) do { \
|
2016-12-14 06:34:59 +08:00
|
|
|
_ldap_trace("%u: ", __LINE__); \
|
2004-05-03 17:14:12 +08:00
|
|
|
_ldap_trace x; \
|
2019-11-30 16:29:36 +08:00
|
|
|
} while(0)
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2023-12-08 21:05:09 +08:00
|
|
|
static void _ldap_trace(const char *fmt, ...) CURL_PRINTF(1, 2);
|
2004-05-03 17:14:12 +08:00
|
|
|
#else
|
2011-09-03 22:06:10 +08:00
|
|
|
#define LDAP_TRACE(x) Curl_nop_stmt
|
2004-05-03 17:14:12 +08:00
|
|
|
#endif
|
|
|
|
|
2019-08-28 02:20:20 +08:00
|
|
|
#if defined(USE_WIN32_LDAP) && defined(ldap_err2string)
|
tidy-up: OS names
Use these words and casing more consistently across text, comments and
one curl tool output:
AIX, ALPN, ANSI, BSD, Cygwin, Darwin, FreeBSD, GitHub, HP-UX, Linux,
macOS, MS-DOS, MSYS, MinGW, NTLM, POSIX, Solaris, UNIX, Unix, Unicode,
WINE, WebDAV, Win32, winbind, WinIDN, Windows, Windows CE, Winsock.
Mostly OS names and a few more.
Also a couple of other minor text fixups.
Closes #14360
2024-08-03 07:09:57 +08:00
|
|
|
/* Use ANSI error strings in Unicode builds */
|
2019-08-28 02:20:20 +08:00
|
|
|
#undef ldap_err2string
|
|
|
|
#define ldap_err2string ldap_err2stringA
|
|
|
|
#endif
|
|
|
|
|
2023-03-06 03:55:14 +08:00
|
|
|
#if defined(USE_WIN32_LDAP) && defined(_MSC_VER) && (_MSC_VER <= 1600)
|
|
|
|
/* Workaround for warning:
|
|
|
|
'type cast' : conversion from 'int' to 'void *' of greater size */
|
|
|
|
#undef LDAP_OPT_ON
|
|
|
|
#undef LDAP_OPT_OFF
|
|
|
|
#define LDAP_OPT_ON ((void *)(size_t)1)
|
|
|
|
#define LDAP_OPT_OFF ((void *)(size_t)0)
|
|
|
|
#endif
|
2003-09-01 16:23:31 +08:00
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
static CURLcode ldap_do(struct Curl_easy *data, bool *done);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* LDAP protocol handler.
|
|
|
|
*/
|
|
|
|
|
|
|
|
const struct Curl_handler Curl_handler_ldap = {
|
2024-05-07 22:55:23 +08:00
|
|
|
"ldap", /* scheme */
|
2007-10-18 00:58:32 +08:00
|
|
|
ZERO_NULL, /* setup_connection */
|
2021-01-13 18:47:41 +08:00
|
|
|
ldap_do, /* do_it */
|
2007-10-18 00:58:32 +08:00
|
|
|
ZERO_NULL, /* done */
|
|
|
|
ZERO_NULL, /* do_more */
|
|
|
|
ZERO_NULL, /* connect_it */
|
|
|
|
ZERO_NULL, /* connecting */
|
|
|
|
ZERO_NULL, /* doing */
|
|
|
|
ZERO_NULL, /* proto_getsock */
|
|
|
|
ZERO_NULL, /* doing_getsock */
|
2011-10-22 05:36:54 +08:00
|
|
|
ZERO_NULL, /* domore_getsock */
|
2008-12-20 05:14:52 +08:00
|
|
|
ZERO_NULL, /* perform_getsock */
|
2007-10-18 00:58:32 +08:00
|
|
|
ZERO_NULL, /* disconnect */
|
lib: replace readwrite with write_resp
This clarifies the handling of server responses by folding the code for
the complicated protocols into their protocol handlers. This concerns
mainly HTTP and its bastard sibling RTSP.
The terms "read" and "write" are often used without clear context if
they refer to the connect or the client/application side of a
transfer. This PR uses "read/write" for operations on the client side
and "send/receive" for the connection, e.g. server side. If this is
considered useful, we can revisit renaming of further methods in another
PR.
Curl's protocol handler `readwrite()` method been changed:
```diff
- CURLcode (*readwrite)(struct Curl_easy *data, struct connectdata *conn,
- const char *buf, size_t blen,
- size_t *pconsumed, bool *readmore);
+ CURLcode (*write_resp)(struct Curl_easy *data, const char *buf, size_t blen,
+ bool is_eos, bool *done);
```
The name was changed to clarify that this writes reponse data to the
client side. The parameter changes are:
* `conn` removed as it always operates on `data->conn`
* `pconsumed` removed as the method needs to handle all data on success
* `readmore` removed as no longer necessary
* `is_eos` as indicator that this is the last call for the transfer
response (end-of-stream).
* `done` TRUE on return iff the transfer response is to be treated as
finished
This change affects many files only because of updated comments in
handlers that provide no implementation. The real change is that the
HTTP protocol handlers now provide an implementation.
The HTTP protocol handlers `write_resp()` implementation will get passed
**all** raw data of a server response for the transfer. The HTTP/1.x
formatted status and headers, as well as the undecoded response
body. `Curl_http_write_resp_hds()` is used internally to parse the
response headers and pass them on. This method is public as the RTSP
protocol handler also uses it.
HTTP/1.1 "chunked" transport encoding is now part of the general
*content encoding* writer stack, just like other encodings. A new flag
`CLIENTWRITE_EOS` was added for the last client write. This allows
writers to verify that they are in a valid end state. The chunked
decoder will check if it indeed has seen the last chunk.
The general response handling in `transfer.c:466` happens in function
`readwrite_data()`. This mainly operates now like:
```
static CURLcode readwrite_data(data, ...)
{
do {
Curl_xfer_recv_resp(data, buf)
...
Curl_xfer_write_resp(data, buf)
...
} while(interested);
...
}
```
All the response data handling is implemented in
`Curl_xfer_write_resp()`. It calls the protocol handler's `write_resp()`
implementation if available, or does the default behaviour.
All raw response data needs to pass through this function. Which also
means that anyone in possession of such data may call
`Curl_xfer_write_resp()`.
Closes #12480
2023-12-01 20:50:32 +08:00
|
|
|
ZERO_NULL, /* write_resp */
|
2024-03-21 19:15:59 +08:00
|
|
|
ZERO_NULL, /* write_resp_hd */
|
2017-05-31 19:09:56 +08:00
|
|
|
ZERO_NULL, /* connection_check */
|
2021-05-17 14:54:00 +08:00
|
|
|
ZERO_NULL, /* attach connection */
|
2007-10-12 21:36:37 +08:00
|
|
|
PORT_LDAP, /* defport */
|
2011-03-15 16:13:11 +08:00
|
|
|
CURLPROTO_LDAP, /* protocol */
|
2020-09-21 19:45:24 +08:00
|
|
|
CURLPROTO_LDAP, /* family */
|
2011-03-15 23:44:50 +08:00
|
|
|
PROTOPT_NONE /* flags */
|
2007-10-12 21:36:37 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
#ifdef HAVE_LDAP_SSL
|
|
|
|
/*
|
|
|
|
* LDAPS protocol handler.
|
|
|
|
*/
|
|
|
|
|
|
|
|
const struct Curl_handler Curl_handler_ldaps = {
|
2024-05-07 22:55:23 +08:00
|
|
|
"ldaps", /* scheme */
|
2007-10-18 00:58:32 +08:00
|
|
|
ZERO_NULL, /* setup_connection */
|
2021-01-13 18:47:41 +08:00
|
|
|
ldap_do, /* do_it */
|
2007-10-18 00:58:32 +08:00
|
|
|
ZERO_NULL, /* done */
|
|
|
|
ZERO_NULL, /* do_more */
|
|
|
|
ZERO_NULL, /* connect_it */
|
|
|
|
ZERO_NULL, /* connecting */
|
|
|
|
ZERO_NULL, /* doing */
|
|
|
|
ZERO_NULL, /* proto_getsock */
|
|
|
|
ZERO_NULL, /* doing_getsock */
|
2011-10-22 05:36:54 +08:00
|
|
|
ZERO_NULL, /* domore_getsock */
|
2008-12-20 05:14:52 +08:00
|
|
|
ZERO_NULL, /* perform_getsock */
|
2007-10-18 00:58:32 +08:00
|
|
|
ZERO_NULL, /* disconnect */
|
lib: replace readwrite with write_resp
This clarifies the handling of server responses by folding the code for
the complicated protocols into their protocol handlers. This concerns
mainly HTTP and its bastard sibling RTSP.
The terms "read" and "write" are often used without clear context if
they refer to the connect or the client/application side of a
transfer. This PR uses "read/write" for operations on the client side
and "send/receive" for the connection, e.g. server side. If this is
considered useful, we can revisit renaming of further methods in another
PR.
Curl's protocol handler `readwrite()` method been changed:
```diff
- CURLcode (*readwrite)(struct Curl_easy *data, struct connectdata *conn,
- const char *buf, size_t blen,
- size_t *pconsumed, bool *readmore);
+ CURLcode (*write_resp)(struct Curl_easy *data, const char *buf, size_t blen,
+ bool is_eos, bool *done);
```
The name was changed to clarify that this writes reponse data to the
client side. The parameter changes are:
* `conn` removed as it always operates on `data->conn`
* `pconsumed` removed as the method needs to handle all data on success
* `readmore` removed as no longer necessary
* `is_eos` as indicator that this is the last call for the transfer
response (end-of-stream).
* `done` TRUE on return iff the transfer response is to be treated as
finished
This change affects many files only because of updated comments in
handlers that provide no implementation. The real change is that the
HTTP protocol handlers now provide an implementation.
The HTTP protocol handlers `write_resp()` implementation will get passed
**all** raw data of a server response for the transfer. The HTTP/1.x
formatted status and headers, as well as the undecoded response
body. `Curl_http_write_resp_hds()` is used internally to parse the
response headers and pass them on. This method is public as the RTSP
protocol handler also uses it.
HTTP/1.1 "chunked" transport encoding is now part of the general
*content encoding* writer stack, just like other encodings. A new flag
`CLIENTWRITE_EOS` was added for the last client write. This allows
writers to verify that they are in a valid end state. The chunked
decoder will check if it indeed has seen the last chunk.
The general response handling in `transfer.c:466` happens in function
`readwrite_data()`. This mainly operates now like:
```
static CURLcode readwrite_data(data, ...)
{
do {
Curl_xfer_recv_resp(data, buf)
...
Curl_xfer_write_resp(data, buf)
...
} while(interested);
...
}
```
All the response data handling is implemented in
`Curl_xfer_write_resp()`. It calls the protocol handler's `write_resp()`
implementation if available, or does the default behaviour.
All raw response data needs to pass through this function. Which also
means that anyone in possession of such data may call
`Curl_xfer_write_resp()`.
Closes #12480
2023-12-01 20:50:32 +08:00
|
|
|
ZERO_NULL, /* write_resp */
|
2024-03-21 19:15:59 +08:00
|
|
|
ZERO_NULL, /* write_resp_hd */
|
2017-05-31 19:09:56 +08:00
|
|
|
ZERO_NULL, /* connection_check */
|
2021-05-17 14:54:00 +08:00
|
|
|
ZERO_NULL, /* attach connection */
|
2007-10-12 21:36:37 +08:00
|
|
|
PORT_LDAPS, /* defport */
|
2014-04-21 01:37:54 +08:00
|
|
|
CURLPROTO_LDAPS, /* protocol */
|
2020-09-21 19:45:24 +08:00
|
|
|
CURLPROTO_LDAP, /* family */
|
2011-03-15 16:13:11 +08:00
|
|
|
PROTOPT_SSL /* flags */
|
2007-10-12 21:36:37 +08:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2017-05-24 03:45:39 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
|
|
|
|
|
|
|
#if defined(USE_WINDOWS_SSPI)
|
|
|
|
static int ldap_win_bind_auth(LDAP *server, const char *user,
|
|
|
|
const char *passwd, unsigned long authflags)
|
|
|
|
{
|
|
|
|
ULONG method = 0;
|
2017-10-15 23:59:43 +08:00
|
|
|
SEC_WINNT_AUTH_IDENTITY cred;
|
2017-05-24 03:45:39 +08:00
|
|
|
int rc = LDAP_AUTH_METHOD_NOT_SUPPORTED;
|
|
|
|
|
2017-10-15 23:59:43 +08:00
|
|
|
memset(&cred, 0, sizeof(cred));
|
|
|
|
|
2017-05-24 03:45:39 +08:00
|
|
|
#if defined(USE_SPNEGO)
|
|
|
|
if(authflags & CURLAUTH_NEGOTIATE) {
|
|
|
|
method = LDAP_AUTH_NEGOTIATE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
#if defined(USE_NTLM)
|
|
|
|
if(authflags & CURLAUTH_NTLM) {
|
|
|
|
method = LDAP_AUTH_NTLM;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
2023-07-20 22:09:04 +08:00
|
|
|
#if !defined(CURL_DISABLE_DIGEST_AUTH)
|
2017-05-24 03:45:39 +08:00
|
|
|
if(authflags & CURLAUTH_DIGEST) {
|
|
|
|
method = LDAP_AUTH_DIGEST;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
/* required anyway if one of upper preprocessor definitions enabled */
|
|
|
|
}
|
|
|
|
|
|
|
|
if(method && user && passwd) {
|
2024-06-03 04:30:52 +08:00
|
|
|
CURLcode res = Curl_create_sspi_identity(user, passwd, &cred);
|
|
|
|
rc = (int)res;
|
2017-05-24 03:45:39 +08:00
|
|
|
if(!rc) {
|
2024-06-03 04:30:52 +08:00
|
|
|
rc = (int)ldap_bind_s(server, NULL, (TCHAR *)&cred, method);
|
2017-05-24 03:45:39 +08:00
|
|
|
Curl_sspi_free_identity(&cred);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* proceed with current user credentials */
|
|
|
|
method = LDAP_AUTH_NEGOTIATE;
|
2024-06-03 04:30:52 +08:00
|
|
|
rc = (int)ldap_bind_s(server, NULL, NULL, method);
|
2017-05-24 03:45:39 +08:00
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
#endif /* #if defined(USE_WINDOWS_SSPI) */
|
|
|
|
|
2021-01-25 01:57:02 +08:00
|
|
|
static int ldap_win_bind(struct Curl_easy *data, LDAP *server,
|
2017-05-24 03:45:39 +08:00
|
|
|
const char *user, const char *passwd)
|
|
|
|
{
|
|
|
|
int rc = LDAP_INVALID_CREDENTIALS;
|
|
|
|
|
|
|
|
PTCHAR inuser = NULL;
|
|
|
|
PTCHAR inpass = NULL;
|
|
|
|
|
2021-01-25 01:57:02 +08:00
|
|
|
if(user && passwd && (data->set.httpauth & CURLAUTH_BASIC)) {
|
2019-04-14 04:55:51 +08:00
|
|
|
inuser = curlx_convert_UTF8_to_tchar((char *) user);
|
|
|
|
inpass = curlx_convert_UTF8_to_tchar((char *) passwd);
|
2017-05-24 03:45:39 +08:00
|
|
|
|
2024-06-03 04:30:52 +08:00
|
|
|
rc = (int)ldap_simple_bind_s(server, inuser, inpass);
|
2017-05-24 03:45:39 +08:00
|
|
|
|
2019-04-14 04:55:51 +08:00
|
|
|
curlx_unicodefree(inuser);
|
|
|
|
curlx_unicodefree(inpass);
|
2017-05-24 03:45:39 +08:00
|
|
|
}
|
|
|
|
#if defined(USE_WINDOWS_SSPI)
|
|
|
|
else {
|
2024-06-03 04:30:52 +08:00
|
|
|
rc = (int)ldap_win_bind_auth(server, user, passwd, data->set.httpauth);
|
2017-05-24 03:45:39 +08:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
#endif /* #if defined(USE_WIN32_LDAP) */
|
2007-10-12 21:36:37 +08:00
|
|
|
|
2020-10-02 17:18:21 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
|
|
|
#define FREE_ON_WINLDAP(x) curlx_unicodefree(x)
|
2024-06-03 04:30:52 +08:00
|
|
|
#define curl_ldap_num_t ULONG
|
2020-10-02 17:18:21 +08:00
|
|
|
#else
|
|
|
|
#define FREE_ON_WINLDAP(x)
|
2024-06-03 04:30:52 +08:00
|
|
|
#define curl_ldap_num_t int
|
2020-10-02 17:18:21 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
static CURLcode ldap_do(struct Curl_easy *data, bool *done)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2014-12-10 07:36:31 +08:00
|
|
|
CURLcode result = CURLE_OK;
|
2004-05-03 17:14:12 +08:00
|
|
|
int rc = 0;
|
2007-08-16 23:23:39 +08:00
|
|
|
LDAP *server = NULL;
|
2004-05-03 17:14:12 +08:00
|
|
|
LDAPURLDesc *ludp = NULL;
|
2014-12-10 07:36:31 +08:00
|
|
|
LDAPMessage *ldapmsg = NULL;
|
2007-08-12 04:57:54 +08:00
|
|
|
LDAPMessage *entryIterator;
|
2004-05-06 15:22:32 +08:00
|
|
|
int num = 0;
|
2021-01-09 00:58:15 +08:00
|
|
|
struct connectdata *conn = data->conn;
|
2007-09-16 04:03:03 +08:00
|
|
|
int ldap_proto = LDAP_VERSION3;
|
2007-08-16 22:08:47 +08:00
|
|
|
int ldap_ssl = 0;
|
2011-08-24 14:07:36 +08:00
|
|
|
char *val_b64 = NULL;
|
|
|
|
size_t val_b64_sz = 0;
|
2007-08-21 00:30:41 +08:00
|
|
|
#ifdef LDAP_OPT_NETWORK_TIMEOUT
|
2015-03-17 20:41:49 +08:00
|
|
|
struct timeval ldap_timeout = {10, 0}; /* 10 sec connection/search timeout */
|
2007-08-21 00:30:41 +08:00
|
|
|
#endif
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2015-01-04 03:59:12 +08:00
|
|
|
TCHAR *host = NULL;
|
|
|
|
#else
|
|
|
|
char *host = NULL;
|
2017-05-24 03:45:39 +08:00
|
|
|
#endif
|
2015-01-04 04:16:26 +08:00
|
|
|
char *user = NULL;
|
|
|
|
char *passwd = NULL;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2005-02-09 21:06:40 +08:00
|
|
|
*done = TRUE; /* unconditionally */
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "LDAP local: LDAP Vendor = %s ; LDAP Version = %d",
|
2023-10-13 08:25:20 +08:00
|
|
|
LDAP_VENDOR_NAME, LDAP_VENDOR_VERSION);
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "LDAP local: %s", data->state.url);
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2007-08-23 02:05:46 +08:00
|
|
|
#ifdef HAVE_LDAP_URL_PARSE
|
2021-03-26 21:25:45 +08:00
|
|
|
rc = ldap_url_parse(data->state.url, &ludp);
|
2007-08-23 02:05:46 +08:00
|
|
|
#else
|
2021-01-25 01:57:02 +08:00
|
|
|
rc = _ldap_url_parse(data, conn, &ludp);
|
2007-08-16 22:08:47 +08:00
|
|
|
#endif
|
2021-04-19 16:46:11 +08:00
|
|
|
if(rc) {
|
2024-06-03 04:30:52 +08:00
|
|
|
failf(data, "Bad LDAP URL: %s", ldap_err2string((curl_ldap_num_t)rc));
|
2022-01-10 05:38:22 +08:00
|
|
|
result = CURLE_URL_MALFORMAT;
|
2007-08-16 22:08:47 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2016-04-04 02:28:34 +08:00
|
|
|
/* Get the URL scheme (either ldap or ldaps) */
|
2011-05-05 21:49:43 +08:00
|
|
|
if(conn->given->flags & PROTOPT_SSL)
|
2007-08-16 22:08:47 +08:00
|
|
|
ldap_ssl = 1;
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "LDAP local: trying to establish %s connection",
|
2023-10-13 08:25:20 +08:00
|
|
|
ldap_ssl ? "encrypted" : "cleartext");
|
2007-08-16 22:08:47 +08:00
|
|
|
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2019-04-14 04:55:51 +08:00
|
|
|
host = curlx_convert_UTF8_to_tchar(conn->host.name);
|
2015-01-04 03:59:12 +08:00
|
|
|
if(!host) {
|
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
host = conn->host.name;
|
2017-05-24 03:45:39 +08:00
|
|
|
#endif
|
2015-01-04 04:16:26 +08:00
|
|
|
|
2022-02-15 00:33:50 +08:00
|
|
|
if(data->state.aptr.user) {
|
2015-01-04 04:16:26 +08:00
|
|
|
user = conn->user;
|
|
|
|
passwd = conn->passwd;
|
|
|
|
}
|
2015-01-04 03:59:12 +08:00
|
|
|
|
2007-08-21 00:30:41 +08:00
|
|
|
#ifdef LDAP_OPT_NETWORK_TIMEOUT
|
2007-08-16 22:08:47 +08:00
|
|
|
ldap_set_option(NULL, LDAP_OPT_NETWORK_TIMEOUT, &ldap_timeout);
|
2007-08-21 00:30:41 +08:00
|
|
|
#endif
|
2007-08-16 22:08:47 +08:00
|
|
|
ldap_set_option(NULL, LDAP_OPT_PROTOCOL_VERSION, &ldap_proto);
|
|
|
|
|
2007-11-05 17:45:09 +08:00
|
|
|
if(ldap_ssl) {
|
2007-08-16 22:08:47 +08:00
|
|
|
#ifdef HAVE_LDAP_SSL
|
2015-01-19 04:25:37 +08:00
|
|
|
#ifdef USE_WIN32_LDAP
|
2024-07-01 22:47:21 +08:00
|
|
|
/* Win32 LDAP SDK does not support insecure mode without CA! */
|
2024-06-03 04:30:52 +08:00
|
|
|
server = ldap_sslinit(host, (curl_ldap_num_t)conn->primary.remote_port, 1);
|
2007-08-16 22:08:47 +08:00
|
|
|
ldap_set_option(server, LDAP_OPT_SSL, LDAP_OPT_ON);
|
|
|
|
#else
|
2007-08-21 07:31:26 +08:00
|
|
|
int ldap_option;
|
2016-11-23 14:53:24 +08:00
|
|
|
char *ldap_ca = conn->ssl_config.CAfile;
|
2007-08-21 00:30:41 +08:00
|
|
|
#if defined(CURL_HAS_NOVELL_LDAPSDK)
|
|
|
|
rc = ldapssl_client_init(NULL, NULL);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(rc != LDAP_SUCCESS) {
|
2007-08-23 08:10:56 +08:00
|
|
|
failf(data, "LDAP local: ldapssl_client_init %s", ldap_err2string(rc));
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-16 22:08:47 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2016-11-17 01:49:15 +08:00
|
|
|
if(conn->ssl_config.verifypeer) {
|
2007-08-21 00:30:41 +08:00
|
|
|
/* Novell SDK supports DER or BASE64 files. */
|
2007-08-23 08:10:56 +08:00
|
|
|
int cert_type = LDAPSSL_CERT_FILETYPE_B64;
|
2016-11-17 01:49:15 +08:00
|
|
|
if((data->set.ssl.cert_type) &&
|
|
|
|
(strcasecompare(data->set.ssl.cert_type, "DER")))
|
2007-08-23 08:10:56 +08:00
|
|
|
cert_type = LDAPSSL_CERT_FILETYPE_DER;
|
2007-11-05 17:45:09 +08:00
|
|
|
if(!ldap_ca) {
|
2022-04-16 17:55:05 +08:00
|
|
|
failf(data, "LDAP local: ERROR %s CA cert not set",
|
2007-08-23 08:10:56 +08:00
|
|
|
(cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"));
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-23 08:10:56 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "LDAP local: using %s CA cert '%s'",
|
|
|
|
(cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"),
|
|
|
|
ldap_ca);
|
2007-08-23 08:10:56 +08:00
|
|
|
rc = ldapssl_add_trusted_cert(ldap_ca, cert_type);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(rc != LDAP_SUCCESS) {
|
2007-08-23 08:10:56 +08:00
|
|
|
failf(data, "LDAP local: ERROR setting %s CA cert: %s",
|
2021-07-06 23:05:17 +08:00
|
|
|
(cert_type == LDAPSSL_CERT_FILETYPE_DER ? "DER" : "PEM"),
|
|
|
|
ldap_err2string(rc));
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-21 00:30:41 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
ldap_option = LDAPSSL_VERIFY_SERVER;
|
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
else
|
|
|
|
ldap_option = LDAPSSL_VERIFY_NONE;
|
2007-08-21 00:30:41 +08:00
|
|
|
rc = ldapssl_set_verify_mode(ldap_option);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(rc != LDAP_SUCCESS) {
|
2007-08-23 08:10:56 +08:00
|
|
|
failf(data, "LDAP local: ERROR setting cert verify mode: %s",
|
2007-08-21 00:30:41 +08:00
|
|
|
ldap_err2string(rc));
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-16 22:08:47 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2024-03-08 17:45:14 +08:00
|
|
|
server = ldapssl_init(host, conn->primary.remote_port, 1);
|
2021-04-19 16:46:11 +08:00
|
|
|
if(!server) {
|
2022-08-08 22:23:03 +08:00
|
|
|
failf(data, "LDAP local: Cannot connect to %s:%u",
|
2024-03-08 17:45:14 +08:00
|
|
|
conn->host.dispname, conn->primary.remote_port);
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_COULDNT_CONNECT;
|
2007-08-21 00:30:41 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
#elif defined(LDAP_OPT_X_TLS)
|
2016-11-17 01:49:15 +08:00
|
|
|
if(conn->ssl_config.verifypeer) {
|
2007-08-21 00:30:41 +08:00
|
|
|
/* OpenLDAP SDK supports BASE64 files. */
|
2016-11-17 01:49:15 +08:00
|
|
|
if((data->set.ssl.cert_type) &&
|
|
|
|
(!strcasecompare(data->set.ssl.cert_type, "PEM"))) {
|
2022-04-16 17:55:05 +08:00
|
|
|
failf(data, "LDAP local: ERROR OpenLDAP only supports PEM cert-type");
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-25 20:10:30 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2007-11-05 17:45:09 +08:00
|
|
|
if(!ldap_ca) {
|
2022-04-16 17:55:05 +08:00
|
|
|
failf(data, "LDAP local: ERROR PEM CA cert not set");
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-23 08:10:56 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "LDAP local: using PEM CA cert: %s", ldap_ca);
|
2007-08-21 00:30:41 +08:00
|
|
|
rc = ldap_set_option(NULL, LDAP_OPT_X_TLS_CACERTFILE, ldap_ca);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(rc != LDAP_SUCCESS) {
|
2007-08-21 00:30:41 +08:00
|
|
|
failf(data, "LDAP local: ERROR setting PEM CA cert: %s",
|
|
|
|
ldap_err2string(rc));
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-21 00:30:41 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
ldap_option = LDAP_OPT_X_TLS_DEMAND;
|
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
else
|
|
|
|
ldap_option = LDAP_OPT_X_TLS_NEVER;
|
|
|
|
|
2007-08-21 00:30:41 +08:00
|
|
|
rc = ldap_set_option(NULL, LDAP_OPT_X_TLS_REQUIRE_CERT, &ldap_option);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(rc != LDAP_SUCCESS) {
|
2007-08-23 08:10:56 +08:00
|
|
|
failf(data, "LDAP local: ERROR setting cert verify mode: %s",
|
2007-08-21 00:30:41 +08:00
|
|
|
ldap_err2string(rc));
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-21 00:30:41 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2024-03-08 17:45:14 +08:00
|
|
|
server = ldap_init(host, conn->primary.remote_port);
|
2021-04-19 16:46:11 +08:00
|
|
|
if(!server) {
|
2022-08-08 22:23:03 +08:00
|
|
|
failf(data, "LDAP local: Cannot connect to %s:%u",
|
2024-03-08 17:45:14 +08:00
|
|
|
conn->host.dispname, conn->primary.remote_port);
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_COULDNT_CONNECT;
|
2007-08-21 00:30:41 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
ldap_option = LDAP_OPT_X_TLS_HARD;
|
|
|
|
rc = ldap_set_option(server, LDAP_OPT_X_TLS, &ldap_option);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(rc != LDAP_SUCCESS) {
|
2007-08-21 00:30:41 +08:00
|
|
|
failf(data, "LDAP local: ERROR setting SSL/TLS mode: %s",
|
|
|
|
ldap_err2string(rc));
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-21 00:30:41 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2007-08-22 18:14:57 +08:00
|
|
|
/*
|
2007-08-21 00:30:41 +08:00
|
|
|
rc = ldap_start_tls_s(server, NULL, NULL);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(rc != LDAP_SUCCESS) {
|
2007-08-21 00:30:41 +08:00
|
|
|
failf(data, "LDAP local: ERROR starting SSL/TLS mode: %s",
|
|
|
|
ldap_err2string(rc));
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-21 00:30:41 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2007-08-22 18:14:57 +08:00
|
|
|
*/
|
2007-08-21 00:30:41 +08:00
|
|
|
#else
|
2024-05-10 23:03:26 +08:00
|
|
|
(void)ldap_option;
|
|
|
|
(void)ldap_ca;
|
2007-08-21 00:30:41 +08:00
|
|
|
/* we should probably never come up to here since configure
|
|
|
|
should check in first place if we can support LDAP SSL/TLS */
|
|
|
|
failf(data, "LDAP local: SSL/TLS not supported with this version "
|
|
|
|
"of the OpenLDAP toolkit\n");
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_SSL_CERTPROBLEM;
|
2007-08-21 00:30:41 +08:00
|
|
|
goto quit;
|
|
|
|
#endif
|
2007-08-16 22:08:47 +08:00
|
|
|
#endif
|
|
|
|
#endif /* CURL_LDAP_USE_SSL */
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
2021-12-01 00:48:28 +08:00
|
|
|
else if(data->set.use_ssl > CURLUSESSL_TRY) {
|
|
|
|
failf(data, "LDAP local: explicit TLS not supported");
|
|
|
|
result = CURLE_NOT_BUILT_IN;
|
|
|
|
goto quit;
|
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
else {
|
2024-06-03 04:30:52 +08:00
|
|
|
server = ldap_init(host, (curl_ldap_num_t)conn->primary.remote_port);
|
2021-04-19 16:46:11 +08:00
|
|
|
if(!server) {
|
2022-08-08 22:23:03 +08:00
|
|
|
failf(data, "LDAP local: Cannot connect to %s:%u",
|
2024-03-08 17:45:14 +08:00
|
|
|
conn->host.dispname, conn->primary.remote_port);
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_COULDNT_CONNECT;
|
2007-08-21 00:30:41 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2004-02-06 15:28:49 +08:00
|
|
|
}
|
2015-01-19 04:25:37 +08:00
|
|
|
#ifdef USE_WIN32_LDAP
|
2007-09-16 04:03:03 +08:00
|
|
|
ldap_set_option(server, LDAP_OPT_PROTOCOL_VERSION, &ldap_proto);
|
2021-01-25 01:57:02 +08:00
|
|
|
rc = ldap_win_bind(data, server, user, passwd);
|
2017-05-24 03:45:39 +08:00
|
|
|
#else
|
2015-01-04 04:16:26 +08:00
|
|
|
rc = ldap_simple_bind_s(server, user, passwd);
|
2017-05-24 03:45:39 +08:00
|
|
|
#endif
|
2021-04-19 16:46:11 +08:00
|
|
|
if(!ldap_ssl && rc) {
|
2005-10-31 16:55:01 +08:00
|
|
|
ldap_proto = LDAP_VERSION2;
|
2007-08-12 04:57:54 +08:00
|
|
|
ldap_set_option(server, LDAP_OPT_PROTOCOL_VERSION, &ldap_proto);
|
2017-05-24 03:45:39 +08:00
|
|
|
#ifdef USE_WIN32_LDAP
|
2021-01-25 01:57:02 +08:00
|
|
|
rc = ldap_win_bind(data, server, user, passwd);
|
2017-05-24 03:45:39 +08:00
|
|
|
#else
|
2015-01-04 04:16:26 +08:00
|
|
|
rc = ldap_simple_bind_s(server, user, passwd);
|
2017-05-24 03:45:39 +08:00
|
|
|
#endif
|
2005-10-31 16:55:01 +08:00
|
|
|
}
|
2021-04-19 16:46:11 +08:00
|
|
|
if(rc) {
|
2018-10-09 23:05:35 +08:00
|
|
|
#ifdef USE_WIN32_LDAP
|
|
|
|
failf(data, "LDAP local: bind via ldap_win_bind %s",
|
2024-06-03 04:30:52 +08:00
|
|
|
ldap_err2string((ULONG)rc));
|
2018-10-09 23:05:35 +08:00
|
|
|
#else
|
|
|
|
failf(data, "LDAP local: bind via ldap_simple_bind_s %s",
|
|
|
|
ldap_err2string(rc));
|
|
|
|
#endif
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_LDAP_CANNOT_BIND;
|
2011-04-20 21:17:42 +08:00
|
|
|
goto quit;
|
2004-05-03 17:14:12 +08:00
|
|
|
}
|
|
|
|
|
2023-10-23 16:33:07 +08:00
|
|
|
Curl_pgrsSetDownloadCounter(data, 0);
|
2024-06-03 04:30:52 +08:00
|
|
|
rc = (int)ldap_search_s(server, ludp->lud_dn,
|
|
|
|
(curl_ldap_num_t)ludp->lud_scope,
|
|
|
|
ludp->lud_filter, ludp->lud_attrs, 0, &ldapmsg);
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2021-04-19 16:46:11 +08:00
|
|
|
if(rc && rc != LDAP_SIZELIMIT_EXCEEDED) {
|
2024-06-03 04:30:52 +08:00
|
|
|
failf(data, "LDAP remote: %s", ldap_err2string((curl_ldap_num_t)rc));
|
2014-12-10 07:36:31 +08:00
|
|
|
result = CURLE_LDAP_SEARCH_FAILED;
|
2004-05-03 17:14:12 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2024-04-17 16:27:42 +08:00
|
|
|
num = 0;
|
|
|
|
for(entryIterator = ldap_first_entry(server, ldapmsg);
|
2004-05-03 17:14:12 +08:00
|
|
|
entryIterator;
|
2011-04-20 21:17:42 +08:00
|
|
|
entryIterator = ldap_next_entry(server, entryIterator), num++) {
|
2007-08-12 04:57:54 +08:00
|
|
|
BerElement *ber = NULL;
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2015-01-04 05:19:11 +08:00
|
|
|
TCHAR *attribute;
|
|
|
|
#else
|
2020-10-02 17:18:21 +08:00
|
|
|
char *attribute;
|
2015-01-04 05:19:11 +08:00
|
|
|
#endif
|
2004-05-03 17:14:12 +08:00
|
|
|
int i;
|
|
|
|
|
2015-01-04 01:05:50 +08:00
|
|
|
/* Get the DN and write it to the client */
|
|
|
|
{
|
2015-01-08 03:19:20 +08:00
|
|
|
char *name;
|
|
|
|
size_t name_len;
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2015-01-04 05:12:56 +08:00
|
|
|
TCHAR *dn = ldap_get_dn(server, entryIterator);
|
2019-04-14 04:55:51 +08:00
|
|
|
name = curlx_convert_tchar_to_UTF8(dn);
|
2015-01-08 03:19:20 +08:00
|
|
|
if(!name) {
|
|
|
|
ldap_memfree(dn);
|
|
|
|
|
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
2015-01-04 05:12:56 +08:00
|
|
|
#else
|
2015-01-08 03:19:20 +08:00
|
|
|
char *dn = name = ldap_get_dn(server, entryIterator);
|
2015-01-04 05:12:56 +08:00
|
|
|
#endif
|
2015-01-08 03:19:20 +08:00
|
|
|
name_len = strlen(name);
|
2014-12-10 07:41:32 +08:00
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, (char *)"DN: ", 4);
|
2015-01-04 01:05:50 +08:00
|
|
|
if(result) {
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(name);
|
2015-01-04 01:05:50 +08:00
|
|
|
ldap_memfree(dn);
|
|
|
|
goto quit;
|
|
|
|
}
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2022-10-29 00:32:09 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, name, name_len);
|
2015-01-04 01:05:50 +08:00
|
|
|
if(result) {
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(name);
|
2015-01-04 01:05:50 +08:00
|
|
|
ldap_memfree(dn);
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, (char *)"\n", 1);
|
2015-01-04 01:05:50 +08:00
|
|
|
if(result) {
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(name);
|
2015-01-04 01:05:50 +08:00
|
|
|
ldap_memfree(dn);
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(name);
|
2015-01-04 01:05:50 +08:00
|
|
|
ldap_memfree(dn);
|
|
|
|
}
|
2009-11-03 02:49:56 +08:00
|
|
|
|
2015-01-04 01:25:11 +08:00
|
|
|
/* Get the attributes and write them to the client */
|
2011-04-20 21:17:42 +08:00
|
|
|
for(attribute = ldap_first_attribute(server, entryIterator, &ber);
|
|
|
|
attribute;
|
|
|
|
attribute = ldap_next_attribute(server, entryIterator, ber)) {
|
2015-01-08 03:45:24 +08:00
|
|
|
BerValue **vals;
|
|
|
|
size_t attr_len;
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2019-04-14 04:55:51 +08:00
|
|
|
char *attr = curlx_convert_tchar_to_UTF8(attribute);
|
2015-01-08 03:45:24 +08:00
|
|
|
if(!attr) {
|
|
|
|
if(ber)
|
|
|
|
ber_free(ber, 0);
|
|
|
|
|
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
2021-04-23 12:21:16 +08:00
|
|
|
}
|
2015-01-04 05:19:11 +08:00
|
|
|
#else
|
2015-01-08 03:45:24 +08:00
|
|
|
char *attr = attribute;
|
2015-01-04 05:19:11 +08:00
|
|
|
#endif
|
2015-01-08 03:45:24 +08:00
|
|
|
attr_len = strlen(attr);
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-08 03:45:24 +08:00
|
|
|
vals = ldap_get_values_len(server, entryIterator, attribute);
|
2021-12-26 04:41:14 +08:00
|
|
|
if(vals) {
|
2011-04-20 21:17:42 +08:00
|
|
|
for(i = 0; (vals[i] != NULL); i++) {
|
2021-01-09 00:58:15 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, (char *)"\t", 1);
|
2015-01-04 01:25:11 +08:00
|
|
|
if(result) {
|
|
|
|
ldap_value_free_len(vals);
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(attr);
|
2015-01-04 01:25:11 +08:00
|
|
|
ldap_memfree(attribute);
|
|
|
|
if(ber)
|
|
|
|
ber_free(ber, 0);
|
|
|
|
|
2014-12-10 07:41:32 +08:00
|
|
|
goto quit;
|
2015-01-04 01:25:11 +08:00
|
|
|
}
|
2014-12-10 07:41:32 +08:00
|
|
|
|
2022-10-29 00:32:09 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, attr, attr_len);
|
2015-01-04 01:25:11 +08:00
|
|
|
if(result) {
|
|
|
|
ldap_value_free_len(vals);
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(attr);
|
2015-01-04 01:25:11 +08:00
|
|
|
ldap_memfree(attribute);
|
|
|
|
if(ber)
|
|
|
|
ber_free(ber, 0);
|
|
|
|
|
2014-12-10 07:41:32 +08:00
|
|
|
goto quit;
|
2015-01-04 01:25:11 +08:00
|
|
|
}
|
2014-12-10 07:41:32 +08:00
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, (char *)": ", 2);
|
2015-01-04 01:25:11 +08:00
|
|
|
if(result) {
|
|
|
|
ldap_value_free_len(vals);
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(attr);
|
2015-01-04 01:25:11 +08:00
|
|
|
ldap_memfree(attribute);
|
|
|
|
if(ber)
|
|
|
|
ber_free(ber, 0);
|
|
|
|
|
2014-12-10 07:41:32 +08:00
|
|
|
goto quit;
|
2015-01-04 01:25:11 +08:00
|
|
|
}
|
|
|
|
|
2015-01-04 01:39:23 +08:00
|
|
|
if((attr_len > 7) &&
|
2022-10-29 00:32:09 +08:00
|
|
|
(strcmp(";binary", attr + (attr_len - 7)) == 0)) {
|
2005-10-31 16:55:01 +08:00
|
|
|
/* Binary attribute, encode to base64. */
|
2022-02-03 20:04:30 +08:00
|
|
|
result = Curl_base64_encode(vals[i]->bv_val, vals[i]->bv_len,
|
|
|
|
&val_b64, &val_b64_sz);
|
2015-01-04 01:45:51 +08:00
|
|
|
if(result) {
|
2011-08-24 14:07:36 +08:00
|
|
|
ldap_value_free_len(vals);
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(attr);
|
2011-08-24 14:07:36 +08:00
|
|
|
ldap_memfree(attribute);
|
|
|
|
if(ber)
|
|
|
|
ber_free(ber, 0);
|
2015-01-04 01:45:51 +08:00
|
|
|
|
2011-08-24 14:07:36 +08:00
|
|
|
goto quit;
|
|
|
|
}
|
2015-01-04 01:25:11 +08:00
|
|
|
|
2007-11-05 17:45:09 +08:00
|
|
|
if(val_b64_sz > 0) {
|
2021-01-09 00:58:15 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, val_b64,
|
2014-12-10 07:41:32 +08:00
|
|
|
val_b64_sz);
|
2005-10-31 16:55:01 +08:00
|
|
|
free(val_b64);
|
2015-01-04 01:25:11 +08:00
|
|
|
if(result) {
|
|
|
|
ldap_value_free_len(vals);
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(attr);
|
2015-01-04 01:25:11 +08:00
|
|
|
ldap_memfree(attribute);
|
|
|
|
if(ber)
|
|
|
|
ber_free(ber, 0);
|
|
|
|
|
2014-12-10 07:41:32 +08:00
|
|
|
goto quit;
|
2015-01-04 01:25:11 +08:00
|
|
|
}
|
2005-10-31 16:55:01 +08:00
|
|
|
}
|
2009-11-03 02:49:56 +08:00
|
|
|
}
|
|
|
|
else {
|
2021-01-09 00:58:15 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, vals[i]->bv_val,
|
2014-12-10 07:41:32 +08:00
|
|
|
vals[i]->bv_len);
|
2015-01-04 01:25:11 +08:00
|
|
|
if(result) {
|
|
|
|
ldap_value_free_len(vals);
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(attr);
|
2015-01-04 01:25:11 +08:00
|
|
|
ldap_memfree(attribute);
|
|
|
|
if(ber)
|
|
|
|
ber_free(ber, 0);
|
|
|
|
|
2014-12-10 07:41:32 +08:00
|
|
|
goto quit;
|
2015-01-04 01:25:11 +08:00
|
|
|
}
|
2009-11-03 02:49:56 +08:00
|
|
|
}
|
2015-01-04 01:25:11 +08:00
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, (char *)"\n", 1);
|
2015-01-04 01:25:11 +08:00
|
|
|
if(result) {
|
|
|
|
ldap_value_free_len(vals);
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(attr);
|
2015-01-04 01:25:11 +08:00
|
|
|
ldap_memfree(attribute);
|
|
|
|
if(ber)
|
|
|
|
ber_free(ber, 0);
|
|
|
|
|
2014-12-10 07:41:32 +08:00
|
|
|
goto quit;
|
2015-01-04 01:25:11 +08:00
|
|
|
}
|
2004-05-03 17:14:12 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Free memory used to store values */
|
2007-08-12 04:57:54 +08:00
|
|
|
ldap_value_free_len(vals);
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2015-01-04 01:25:11 +08:00
|
|
|
|
|
|
|
/* Free the attribute as we are done with it */
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(attr);
|
2015-01-04 01:25:11 +08:00
|
|
|
ldap_memfree(attribute);
|
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
result = Curl_client_write(data, CLIENTWRITE_BODY, (char *)"\n", 1);
|
2014-12-10 07:41:32 +08:00
|
|
|
if(result)
|
|
|
|
goto quit;
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2015-01-04 01:05:50 +08:00
|
|
|
|
2007-11-05 17:45:09 +08:00
|
|
|
if(ber)
|
2023-04-29 00:07:33 +08:00
|
|
|
ber_free(ber, 0);
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2004-05-03 17:14:12 +08:00
|
|
|
|
|
|
|
quit:
|
2014-12-10 07:36:31 +08:00
|
|
|
if(ldapmsg) {
|
|
|
|
ldap_msgfree(ldapmsg);
|
2016-12-14 06:34:59 +08:00
|
|
|
LDAP_TRACE(("Received %d entries\n", num));
|
2007-08-16 22:08:47 +08:00
|
|
|
}
|
2007-11-05 17:45:09 +08:00
|
|
|
if(rc == LDAP_SIZELIMIT_EXCEEDED)
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "There are more than %d entries", num);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(ludp)
|
2007-08-16 22:08:47 +08:00
|
|
|
ldap_free_urldesc(ludp);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(server)
|
2007-08-16 22:08:47 +08:00
|
|
|
ldap_unbind_s(server);
|
2007-08-21 00:30:41 +08:00
|
|
|
#if defined(HAVE_LDAP_SSL) && defined(CURL_HAS_NOVELL_LDAPSDK)
|
2007-11-05 17:45:09 +08:00
|
|
|
if(ldap_ssl)
|
2007-08-16 22:08:47 +08:00
|
|
|
ldapssl_client_deinit();
|
2007-08-21 00:30:41 +08:00
|
|
|
#endif /* HAVE_LDAP_SSL && CURL_HAS_NOVELL_LDAPSDK */
|
2001-10-25 16:28:29 +08:00
|
|
|
|
2020-10-02 17:18:21 +08:00
|
|
|
FREE_ON_WINLDAP(host);
|
2015-01-04 03:59:12 +08:00
|
|
|
|
2001-10-25 16:28:29 +08:00
|
|
|
/* no data to transfer */
|
2024-06-10 19:32:13 +08:00
|
|
|
Curl_xfer_setup_nop(data);
|
2023-08-23 20:47:45 +08:00
|
|
|
connclose(conn, "LDAP connection always disable reuse");
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2014-12-10 07:36:31 +08:00
|
|
|
return result;
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2004-05-03 17:14:12 +08:00
|
|
|
|
|
|
|
#ifdef DEBUG_LDAP
|
2016-12-14 06:34:59 +08:00
|
|
|
static void _ldap_trace(const char *fmt, ...)
|
2004-05-03 17:14:12 +08:00
|
|
|
{
|
|
|
|
static int do_trace = -1;
|
|
|
|
va_list args;
|
|
|
|
|
2007-11-05 17:45:09 +08:00
|
|
|
if(do_trace == -1) {
|
2004-05-03 17:14:12 +08:00
|
|
|
const char *env = getenv("CURL_TRACE");
|
2010-11-29 06:11:14 +08:00
|
|
|
do_trace = (env && strtol(env, NULL, 10) > 0);
|
2004-05-03 17:14:12 +08:00
|
|
|
}
|
2007-11-05 17:45:09 +08:00
|
|
|
if(!do_trace)
|
2004-05-03 17:14:12 +08:00
|
|
|
return;
|
|
|
|
|
2016-12-14 06:34:59 +08:00
|
|
|
va_start(args, fmt);
|
|
|
|
vfprintf(stderr, fmt, args);
|
|
|
|
va_end(args);
|
2004-05-03 17:14:12 +08:00
|
|
|
}
|
2002-06-11 19:13:01 +08:00
|
|
|
#endif
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2007-08-12 04:57:54 +08:00
|
|
|
#ifndef HAVE_LDAP_URL_PARSE
|
|
|
|
|
2004-05-03 17:14:12 +08:00
|
|
|
/*
|
|
|
|
* Return scope-value for a scope-string.
|
|
|
|
*/
|
2016-12-14 06:34:59 +08:00
|
|
|
static int str2scope(const char *p)
|
2004-05-03 17:14:12 +08:00
|
|
|
{
|
2016-10-31 16:37:30 +08:00
|
|
|
if(strcasecompare(p, "one"))
|
|
|
|
return LDAP_SCOPE_ONELEVEL;
|
|
|
|
if(strcasecompare(p, "onetree"))
|
|
|
|
return LDAP_SCOPE_ONELEVEL;
|
|
|
|
if(strcasecompare(p, "base"))
|
|
|
|
return LDAP_SCOPE_BASE;
|
|
|
|
if(strcasecompare(p, "sub"))
|
|
|
|
return LDAP_SCOPE_SUBTREE;
|
|
|
|
if(strcasecompare(p, "subtree"))
|
|
|
|
return LDAP_SCOPE_SUBTREE;
|
2004-05-03 17:14:12 +08:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Split 'str' into strings separated by commas.
|
2015-01-04 04:49:11 +08:00
|
|
|
* Note: out[] points into 'str'.
|
2004-05-03 17:14:12 +08:00
|
|
|
*/
|
2015-01-04 04:49:11 +08:00
|
|
|
static bool split_str(char *str, char ***out, size_t *count)
|
2004-05-03 17:14:12 +08:00
|
|
|
{
|
2015-01-04 04:49:11 +08:00
|
|
|
char **res;
|
|
|
|
char *lasts;
|
|
|
|
char *s;
|
|
|
|
size_t i;
|
|
|
|
size_t items = 1;
|
|
|
|
|
|
|
|
s = strchr(str, ',');
|
|
|
|
while(s) {
|
|
|
|
items++;
|
|
|
|
s = strchr(++s, ',');
|
|
|
|
}
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-04 04:49:11 +08:00
|
|
|
res = calloc(items, sizeof(char *));
|
2007-11-05 17:45:09 +08:00
|
|
|
if(!res)
|
2015-01-04 04:49:11 +08:00
|
|
|
return FALSE;
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2024-11-12 20:37:33 +08:00
|
|
|
for(i = 0, s = Curl_strtok_r(str, ",", &lasts); s && i < items;
|
|
|
|
s = Curl_strtok_r(NULL, ",", &lasts), i++)
|
2004-05-03 17:14:12 +08:00
|
|
|
res[i] = s;
|
2015-01-04 04:49:11 +08:00
|
|
|
|
|
|
|
*out = res;
|
|
|
|
*count = items;
|
|
|
|
|
|
|
|
return TRUE;
|
2004-05-03 17:14:12 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Break apart the pieces of an LDAP URL.
|
|
|
|
* Syntax:
|
|
|
|
* ldap://<hostname>:<port>/<base_dn>?<attributes>?<scope>?<filter>?<ext>
|
|
|
|
*
|
|
|
|
* <hostname> already known from 'conn->host.name'.
|
|
|
|
* <port> already known from 'conn->remote_port'.
|
2021-01-25 01:57:02 +08:00
|
|
|
* extract the rest from 'data->state.path+1'. All fields are optional.
|
2006-09-08 20:17:58 +08:00
|
|
|
* e.g.
|
|
|
|
* ldap://<hostname>:<port>/?<attributes>?<scope>?<filter>
|
|
|
|
* yields ludp->lud_dn = "".
|
2004-05-03 17:14:12 +08:00
|
|
|
*
|
2009-10-13 22:48:35 +08:00
|
|
|
* Defined in RFC4516 section 2.
|
2004-05-03 17:14:12 +08:00
|
|
|
*/
|
2021-01-25 01:57:02 +08:00
|
|
|
static int _ldap_url_parse2(struct Curl_easy *data,
|
|
|
|
const struct connectdata *conn, LDAPURLDesc *ludp)
|
2004-05-03 17:14:12 +08:00
|
|
|
{
|
2015-01-04 04:36:10 +08:00
|
|
|
int rc = LDAP_SUCCESS;
|
|
|
|
char *p;
|
2019-10-05 09:49:43 +08:00
|
|
|
char *path;
|
|
|
|
char *q = NULL;
|
|
|
|
char *query = NULL;
|
2015-01-04 23:16:04 +08:00
|
|
|
size_t i;
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2021-01-25 01:57:02 +08:00
|
|
|
if(!data ||
|
|
|
|
!data->state.up.path ||
|
|
|
|
data->state.up.path[0] != '/' ||
|
|
|
|
!strncasecompare("LDAP", data->state.up.scheme, 4))
|
2007-08-13 06:25:50 +08:00
|
|
|
return LDAP_INVALID_SYNTAX;
|
2004-05-03 17:14:12 +08:00
|
|
|
|
|
|
|
ludp->lud_scope = LDAP_SCOPE_BASE;
|
|
|
|
ludp->lud_port = conn->remote_port;
|
|
|
|
ludp->lud_host = conn->host.name;
|
|
|
|
|
2015-01-04 04:36:10 +08:00
|
|
|
/* Duplicate the path */
|
2021-01-25 01:57:02 +08:00
|
|
|
p = path = strdup(data->state.up.path + 1);
|
2015-01-04 04:36:10 +08:00
|
|
|
if(!path)
|
2007-08-13 06:25:50 +08:00
|
|
|
return LDAP_NO_MEMORY;
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2019-10-05 09:49:43 +08:00
|
|
|
/* Duplicate the query if present */
|
2021-01-25 01:57:02 +08:00
|
|
|
if(data->state.up.query) {
|
|
|
|
q = query = strdup(data->state.up.query);
|
2019-10-05 09:49:43 +08:00
|
|
|
if(!query) {
|
|
|
|
free(path);
|
|
|
|
return LDAP_NO_MEMORY;
|
|
|
|
}
|
2018-12-11 18:15:15 +08:00
|
|
|
}
|
2015-01-04 04:36:10 +08:00
|
|
|
|
2018-12-11 18:15:15 +08:00
|
|
|
/* Parse the DN (Distinguished Name) */
|
2015-01-04 04:36:10 +08:00
|
|
|
if(*p) {
|
|
|
|
char *dn = p;
|
2015-01-07 21:50:56 +08:00
|
|
|
char *unescaped;
|
2016-10-08 17:21:38 +08:00
|
|
|
CURLcode result;
|
2015-01-04 04:36:10 +08:00
|
|
|
|
2016-12-14 06:34:59 +08:00
|
|
|
LDAP_TRACE(("DN '%s'\n", dn));
|
2015-01-04 04:36:10 +08:00
|
|
|
|
2015-01-04 22:11:02 +08:00
|
|
|
/* Unescape the DN */
|
2022-02-03 20:04:30 +08:00
|
|
|
result = Curl_urldecode(dn, 0, &unescaped, NULL, REJECT_ZERO);
|
2016-10-08 17:21:38 +08:00
|
|
|
if(result) {
|
2015-01-04 04:36:10 +08:00
|
|
|
rc = LDAP_NO_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2015-01-07 21:50:56 +08:00
|
|
|
/* Convert the unescaped string to a tchar */
|
2019-04-14 04:55:51 +08:00
|
|
|
ludp->lud_dn = curlx_convert_UTF8_to_tchar(unescaped);
|
2015-01-04 04:36:10 +08:00
|
|
|
|
2015-01-07 21:50:56 +08:00
|
|
|
/* Free the unescaped string as we are done with it */
|
2021-03-01 16:31:33 +08:00
|
|
|
free(unescaped);
|
2015-01-04 22:11:02 +08:00
|
|
|
|
|
|
|
if(!ludp->lud_dn) {
|
2015-01-04 04:36:10 +08:00
|
|
|
rc = LDAP_NO_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
#else
|
2015-01-07 21:50:56 +08:00
|
|
|
ludp->lud_dn = unescaped;
|
2015-01-04 04:36:10 +08:00
|
|
|
#endif
|
|
|
|
}
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-04 04:36:10 +08:00
|
|
|
p = q;
|
2007-11-05 17:45:09 +08:00
|
|
|
if(!p)
|
2015-01-04 05:04:13 +08:00
|
|
|
goto quit;
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-04 04:49:11 +08:00
|
|
|
/* Parse the attributes. skip "??" */
|
2004-05-03 17:14:12 +08:00
|
|
|
q = strchr(p, '?');
|
2007-11-05 17:45:09 +08:00
|
|
|
if(q)
|
2007-08-13 06:25:50 +08:00
|
|
|
*q++ = '\0';
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-04 04:49:11 +08:00
|
|
|
if(*p) {
|
|
|
|
char **attributes;
|
|
|
|
size_t count = 0;
|
|
|
|
|
|
|
|
/* Split the string into an array of attributes */
|
|
|
|
if(!split_str(p, &attributes, &count)) {
|
|
|
|
rc = LDAP_NO_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Allocate our array (+1 for the NULL entry) */
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2015-01-04 04:49:11 +08:00
|
|
|
ludp->lud_attrs = calloc(count + 1, sizeof(TCHAR *));
|
|
|
|
#else
|
|
|
|
ludp->lud_attrs = calloc(count + 1, sizeof(char *));
|
|
|
|
#endif
|
2015-01-04 04:36:10 +08:00
|
|
|
if(!ludp->lud_attrs) {
|
2015-03-16 22:01:15 +08:00
|
|
|
free(attributes);
|
2015-01-04 04:49:11 +08:00
|
|
|
|
2015-01-04 04:36:10 +08:00
|
|
|
rc = LDAP_NO_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-04 04:49:11 +08:00
|
|
|
for(i = 0; i < count; i++) {
|
2015-01-07 21:50:56 +08:00
|
|
|
char *unescaped;
|
2016-10-08 17:21:38 +08:00
|
|
|
CURLcode result;
|
2015-01-04 04:49:11 +08:00
|
|
|
|
2020-11-24 05:42:07 +08:00
|
|
|
LDAP_TRACE(("attr[%zu] '%s'\n", i, attributes[i]));
|
2015-01-04 04:49:11 +08:00
|
|
|
|
|
|
|
/* Unescape the attribute */
|
2022-02-03 20:04:30 +08:00
|
|
|
result = Curl_urldecode(attributes[i], 0, &unescaped, NULL,
|
2020-06-23 22:13:50 +08:00
|
|
|
REJECT_ZERO);
|
2016-10-08 17:21:38 +08:00
|
|
|
if(result) {
|
2015-03-16 22:01:15 +08:00
|
|
|
free(attributes);
|
2015-01-04 04:49:11 +08:00
|
|
|
|
|
|
|
rc = LDAP_NO_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2015-01-07 21:50:56 +08:00
|
|
|
/* Convert the unescaped string to a tchar */
|
2019-04-14 04:55:51 +08:00
|
|
|
ludp->lud_attrs[i] = curlx_convert_UTF8_to_tchar(unescaped);
|
2015-01-04 04:49:11 +08:00
|
|
|
|
2015-01-07 21:50:56 +08:00
|
|
|
/* Free the unescaped string as we are done with it */
|
2021-03-01 16:31:33 +08:00
|
|
|
free(unescaped);
|
2015-01-04 04:49:11 +08:00
|
|
|
|
|
|
|
if(!ludp->lud_attrs[i]) {
|
2015-03-16 22:01:15 +08:00
|
|
|
free(attributes);
|
2015-01-04 04:49:11 +08:00
|
|
|
|
|
|
|
rc = LDAP_NO_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
#else
|
2015-01-07 21:50:56 +08:00
|
|
|
ludp->lud_attrs[i] = unescaped;
|
2015-01-04 04:49:11 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
ludp->lud_attrs_dups++;
|
|
|
|
}
|
2015-01-05 04:06:04 +08:00
|
|
|
|
2015-03-16 22:01:15 +08:00
|
|
|
free(attributes);
|
2004-05-03 17:14:12 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
p = q;
|
2007-11-05 17:45:09 +08:00
|
|
|
if(!p)
|
2015-01-04 05:04:13 +08:00
|
|
|
goto quit;
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-04 04:58:29 +08:00
|
|
|
/* Parse the scope. skip "??" */
|
2004-05-03 17:14:12 +08:00
|
|
|
q = strchr(p, '?');
|
2007-11-05 17:45:09 +08:00
|
|
|
if(q)
|
2007-08-13 06:25:50 +08:00
|
|
|
*q++ = '\0';
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-04 04:58:29 +08:00
|
|
|
if(*p) {
|
2004-05-03 17:14:12 +08:00
|
|
|
ludp->lud_scope = str2scope(p);
|
2013-09-06 05:51:53 +08:00
|
|
|
if(ludp->lud_scope == -1) {
|
2015-01-04 04:36:10 +08:00
|
|
|
rc = LDAP_INVALID_SYNTAX;
|
|
|
|
|
|
|
|
goto quit;
|
2013-09-06 05:51:53 +08:00
|
|
|
}
|
2016-12-14 06:34:59 +08:00
|
|
|
LDAP_TRACE(("scope %d\n", ludp->lud_scope));
|
2004-05-03 17:14:12 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
p = q;
|
2007-11-05 17:45:09 +08:00
|
|
|
if(!p)
|
2015-01-04 05:04:13 +08:00
|
|
|
goto quit;
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-04 04:58:29 +08:00
|
|
|
/* Parse the filter */
|
2004-05-03 17:14:12 +08:00
|
|
|
q = strchr(p, '?');
|
2007-11-05 17:45:09 +08:00
|
|
|
if(q)
|
2007-08-13 06:25:50 +08:00
|
|
|
*q++ = '\0';
|
2015-01-04 04:58:29 +08:00
|
|
|
|
|
|
|
if(*p) {
|
|
|
|
char *filter = p;
|
2015-01-07 21:50:56 +08:00
|
|
|
char *unescaped;
|
2016-10-08 17:21:38 +08:00
|
|
|
CURLcode result;
|
2015-01-04 04:58:29 +08:00
|
|
|
|
2016-12-14 06:34:59 +08:00
|
|
|
LDAP_TRACE(("filter '%s'\n", filter));
|
2015-01-04 04:58:29 +08:00
|
|
|
|
|
|
|
/* Unescape the filter */
|
2022-02-03 20:04:30 +08:00
|
|
|
result = Curl_urldecode(filter, 0, &unescaped, NULL, REJECT_ZERO);
|
2016-10-08 17:21:38 +08:00
|
|
|
if(result) {
|
2015-01-04 04:58:29 +08:00
|
|
|
rc = LDAP_NO_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2015-01-19 04:25:37 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
2015-01-07 21:50:56 +08:00
|
|
|
/* Convert the unescaped string to a tchar */
|
2019-04-14 04:55:51 +08:00
|
|
|
ludp->lud_filter = curlx_convert_UTF8_to_tchar(unescaped);
|
2015-01-04 04:58:29 +08:00
|
|
|
|
2015-01-07 21:50:56 +08:00
|
|
|
/* Free the unescaped string as we are done with it */
|
2021-03-01 16:31:33 +08:00
|
|
|
free(unescaped);
|
2015-01-04 04:58:29 +08:00
|
|
|
|
|
|
|
if(!ludp->lud_filter) {
|
|
|
|
rc = LDAP_NO_MEMORY;
|
|
|
|
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
#else
|
2015-01-07 21:50:56 +08:00
|
|
|
ludp->lud_filter = unescaped;
|
2015-01-04 04:58:29 +08:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
p = q;
|
|
|
|
if(p && !*p) {
|
2015-01-04 04:36:10 +08:00
|
|
|
rc = LDAP_INVALID_SYNTAX;
|
|
|
|
|
|
|
|
goto quit;
|
2013-09-06 05:51:53 +08:00
|
|
|
}
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2015-01-04 04:36:10 +08:00
|
|
|
quit:
|
2015-03-16 22:01:15 +08:00
|
|
|
free(path);
|
2018-12-11 18:15:15 +08:00
|
|
|
free(query);
|
2015-01-04 04:36:10 +08:00
|
|
|
|
|
|
|
return rc;
|
2004-05-03 17:14:12 +08:00
|
|
|
}
|
|
|
|
|
2021-01-25 01:57:02 +08:00
|
|
|
static int _ldap_url_parse(struct Curl_easy *data,
|
|
|
|
const struct connectdata *conn,
|
2016-10-08 17:21:38 +08:00
|
|
|
LDAPURLDesc **ludpp)
|
2004-05-03 17:14:12 +08:00
|
|
|
{
|
2009-11-18 18:33:54 +08:00
|
|
|
LDAPURLDesc *ludp = calloc(1, sizeof(*ludp));
|
2004-05-03 17:14:12 +08:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
*ludpp = NULL;
|
2007-11-05 17:45:09 +08:00
|
|
|
if(!ludp)
|
2023-04-29 00:07:33 +08:00
|
|
|
return LDAP_NO_MEMORY;
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2021-01-25 01:57:02 +08:00
|
|
|
rc = _ldap_url_parse2(data, conn, ludp);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(rc != LDAP_SUCCESS) {
|
2004-05-03 17:14:12 +08:00
|
|
|
_ldap_free_urldesc(ludp);
|
|
|
|
ludp = NULL;
|
|
|
|
}
|
|
|
|
*ludpp = ludp;
|
|
|
|
return (rc);
|
|
|
|
}
|
|
|
|
|
2016-10-08 17:21:38 +08:00
|
|
|
static void _ldap_free_urldesc(LDAPURLDesc *ludp)
|
2004-05-03 17:14:12 +08:00
|
|
|
{
|
2007-11-05 17:45:09 +08:00
|
|
|
if(!ludp)
|
2011-04-20 21:17:42 +08:00
|
|
|
return;
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2021-04-23 12:21:16 +08:00
|
|
|
#if defined(USE_WIN32_LDAP)
|
|
|
|
curlx_unicodefree(ludp->lud_dn);
|
|
|
|
curlx_unicodefree(ludp->lud_filter);
|
|
|
|
#else
|
2015-03-12 00:41:01 +08:00
|
|
|
free(ludp->lud_dn);
|
|
|
|
free(ludp->lud_filter);
|
2021-04-23 12:21:16 +08:00
|
|
|
#endif
|
2004-05-03 17:14:12 +08:00
|
|
|
|
2007-11-05 17:45:09 +08:00
|
|
|
if(ludp->lud_attrs) {
|
2019-05-12 03:42:48 +08:00
|
|
|
size_t i;
|
2021-04-23 12:21:16 +08:00
|
|
|
for(i = 0; i < ludp->lud_attrs_dups; i++) {
|
|
|
|
#if defined(USE_WIN32_LDAP)
|
|
|
|
curlx_unicodefree(ludp->lud_attrs[i]);
|
|
|
|
#else
|
2013-09-09 06:01:52 +08:00
|
|
|
free(ludp->lud_attrs[i]);
|
2021-04-23 12:21:16 +08:00
|
|
|
#endif
|
|
|
|
}
|
2004-05-03 17:14:12 +08:00
|
|
|
free(ludp->lud_attrs);
|
|
|
|
}
|
|
|
|
|
2016-12-14 06:34:59 +08:00
|
|
|
free(ludp);
|
2004-05-03 17:14:12 +08:00
|
|
|
}
|
2007-08-23 02:05:46 +08:00
|
|
|
#endif /* !HAVE_LDAP_URL_PARSE */
|
2010-06-01 23:25:03 +08:00
|
|
|
#endif /* !CURL_DISABLE_LDAP && !USE_OPENLDAP */
|