1999-09-09 03:06:24 +08:00
|
|
|
/* $OpenLDAP$ */
|
2003-11-26 15:16:36 +08:00
|
|
|
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
|
|
|
*
|
2005-01-02 04:49:32 +08:00
|
|
|
* Copyright 1998-2005 The OpenLDAP Foundation.
|
2003-11-26 15:16:36 +08:00
|
|
|
* All rights reserved.
|
1998-08-09 08:43:13 +08:00
|
|
|
*
|
2003-11-26 15:16:36 +08:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted only as authorized by the OpenLDAP
|
|
|
|
* Public License.
|
|
|
|
*
|
|
|
|
* A copy of this license is available in the file LICENSE in the
|
|
|
|
* top-level directory of the distribution or, alternatively, at
|
|
|
|
* <http://www.OpenLDAP.org/license.html>.
|
1998-08-09 08:43:13 +08:00
|
|
|
*/
|
2003-11-26 15:16:36 +08:00
|
|
|
/* Portions Copyright (c) 1993 Regents of the University of Michigan.
|
|
|
|
* All rights reserved.
|
|
|
|
*/
|
|
|
|
/* Portions Copyright (C) The Internet Society (1997)
|
2003-07-07 13:14:03 +08:00
|
|
|
* ASN.1 fragments are from RFC 2251; see RFC for full legal notices.
|
|
|
|
*/
|
1998-08-09 08:43:13 +08:00
|
|
|
|
1999-06-04 03:22:33 +08:00
|
|
|
/*
|
|
|
|
* BindRequest ::= SEQUENCE {
|
|
|
|
* version INTEGER,
|
|
|
|
* name DistinguishedName, -- who
|
|
|
|
* authentication CHOICE {
|
|
|
|
* simple [0] OCTET STRING -- passwd
|
2000-01-09 02:42:11 +08:00
|
|
|
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND
|
1999-06-04 03:22:33 +08:00
|
|
|
* krbv42ldap [1] OCTET STRING
|
|
|
|
* krbv42dsa [2] OCTET STRING
|
|
|
|
#endif
|
|
|
|
* sasl [3] SaslCredentials -- LDAPv3
|
|
|
|
* }
|
|
|
|
* }
|
|
|
|
*
|
|
|
|
* BindResponse ::= SEQUENCE {
|
|
|
|
* COMPONENTS OF LDAPResult,
|
|
|
|
* serverSaslCreds OCTET STRING OPTIONAL -- LDAPv3
|
|
|
|
* }
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
1998-10-25 09:41:42 +08:00
|
|
|
#include "portable.h"
|
|
|
|
|
2000-01-09 02:42:11 +08:00
|
|
|
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
#include <stdio.h>
|
1999-06-03 08:37:44 +08:00
|
|
|
#include <ac/stdlib.h>
|
1998-08-09 08:43:13 +08:00
|
|
|
|
1998-10-25 09:41:42 +08:00
|
|
|
#include <ac/krb.h>
|
|
|
|
#include <ac/socket.h>
|
|
|
|
#include <ac/string.h>
|
|
|
|
#include <ac/time.h>
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
#include "ldap-int.h"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* ldap_kerberos_bind1 - initiate a bind to the ldap server using
|
|
|
|
* kerberos authentication. The dn is supplied. It is assumed the user
|
|
|
|
* already has a valid ticket granting ticket. The msgid of the
|
|
|
|
* request is returned on success (suitable for passing to ldap_result()),
|
|
|
|
* -1 is returned if there's trouble.
|
|
|
|
*
|
|
|
|
* Example:
|
|
|
|
* ldap_kerberos_bind1( ld, "cn=manager, o=university of michigan, c=us" )
|
|
|
|
*/
|
|
|
|
int
|
1999-05-19 09:53:09 +08:00
|
|
|
ldap_kerberos_bind1( LDAP *ld, LDAP_CONST char *dn )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
|
|
|
BerElement *ber;
|
|
|
|
char *cred;
|
1999-06-19 07:53:05 +08:00
|
|
|
int rc;
|
|
|
|
ber_len_t credlen;
|
2003-02-14 07:02:31 +08:00
|
|
|
ber_int_t id;
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind1\n", 0, 0, 0 );
|
|
|
|
|
2000-06-26 09:25:36 +08:00
|
|
|
if( ld->ld_version > LDAP_VERSION2 ) {
|
|
|
|
ld->ld_errno = LDAP_NOT_SUPPORTED;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
if ( dn == NULL )
|
|
|
|
dn = "";
|
|
|
|
|
1998-08-09 11:04:12 +08:00
|
|
|
if ( (cred = ldap_get_kerberosv4_credentials( ld, dn, "ldapserver",
|
1998-08-09 08:43:13 +08:00
|
|
|
&credlen )) == NULL ) {
|
|
|
|
return( -1 ); /* ld_errno should already be set */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* create a message to send */
|
1999-06-19 07:53:05 +08:00
|
|
|
if ( (ber = ldap_alloc_ber_with_options( ld )) == NULL ) {
|
1999-05-29 09:19:14 +08:00
|
|
|
LDAP_FREE( cred );
|
1998-08-09 08:43:13 +08:00
|
|
|
return( -1 );
|
|
|
|
}
|
|
|
|
|
2003-02-14 07:02:31 +08:00
|
|
|
LDAP_NEXT_MSGID( ld, id );
|
1998-08-09 08:43:13 +08:00
|
|
|
/* fill it in */
|
2003-02-14 07:02:31 +08:00
|
|
|
rc = ber_printf( ber, "{it{istoN}N}", id, LDAP_REQ_BIND,
|
1998-08-09 08:43:13 +08:00
|
|
|
ld->ld_version, dn, LDAP_AUTH_KRBV41, cred, credlen );
|
|
|
|
|
|
|
|
if ( rc == -1 ) {
|
1999-05-29 09:19:14 +08:00
|
|
|
LDAP_FREE( cred );
|
1998-08-09 08:43:13 +08:00
|
|
|
ber_free( ber, 1 );
|
|
|
|
ld->ld_errno = LDAP_ENCODING_ERROR;
|
|
|
|
return( -1 );
|
|
|
|
}
|
|
|
|
|
1999-05-29 09:19:14 +08:00
|
|
|
LDAP_FREE( cred );
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
|
|
|
|
/* send the message */
|
2003-02-14 07:02:31 +08:00
|
|
|
return ( ldap_send_initial_request( ld, LDAP_REQ_BIND, dn, ber, id ));
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
1999-05-19 09:53:09 +08:00
|
|
|
ldap_kerberos_bind1_s( LDAP *ld, LDAP_CONST char *dn )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
|
|
|
int msgid;
|
|
|
|
LDAPMessage *res;
|
|
|
|
|
|
|
|
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind1_s\n", 0, 0, 0 );
|
|
|
|
|
|
|
|
/* initiate the bind */
|
|
|
|
if ( (msgid = ldap_kerberos_bind1( ld, dn )) == -1 )
|
|
|
|
return( ld->ld_errno );
|
|
|
|
|
|
|
|
/* wait for a result */
|
2003-03-06 22:50:39 +08:00
|
|
|
if ( ldap_result( ld, msgid, 1, (struct timeval *) 0, &res )
|
1998-08-09 08:43:13 +08:00
|
|
|
== -1 ) {
|
|
|
|
return( ld->ld_errno ); /* ldap_result sets ld_errno */
|
|
|
|
}
|
|
|
|
|
|
|
|
return( ldap_result2error( ld, res, 1 ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* ldap_kerberos_bind2 - initiate a bind to the X.500 server using
|
|
|
|
* kerberos authentication. The dn is supplied. It is assumed the user
|
|
|
|
* already has a valid ticket granting ticket. The msgid of the
|
|
|
|
* request is returned on success (suitable for passing to ldap_result()),
|
|
|
|
* -1 is returned if there's trouble.
|
|
|
|
*
|
|
|
|
* Example:
|
|
|
|
* ldap_kerberos_bind2( ld, "cn=manager, o=university of michigan, c=us" )
|
|
|
|
*/
|
|
|
|
int
|
1999-05-19 09:53:09 +08:00
|
|
|
ldap_kerberos_bind2( LDAP *ld, LDAP_CONST char *dn )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
|
|
|
BerElement *ber;
|
|
|
|
char *cred;
|
1999-06-19 07:53:05 +08:00
|
|
|
int rc;
|
|
|
|
ber_len_t credlen;
|
2003-02-14 07:02:31 +08:00
|
|
|
ber_int_t id;
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind2\n", 0, 0, 0 );
|
|
|
|
|
2000-06-26 09:25:36 +08:00
|
|
|
if( ld->ld_version > LDAP_VERSION2 ) {
|
|
|
|
ld->ld_errno = LDAP_NOT_SUPPORTED;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
if ( dn == NULL )
|
|
|
|
dn = "";
|
|
|
|
|
1998-08-09 11:04:12 +08:00
|
|
|
if ( (cred = ldap_get_kerberosv4_credentials( ld, dn, "x500dsa", &credlen ))
|
1998-08-09 08:43:13 +08:00
|
|
|
== NULL ) {
|
|
|
|
return( -1 ); /* ld_errno should already be set */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* create a message to send */
|
1999-06-19 07:53:05 +08:00
|
|
|
if ( (ber = ldap_alloc_ber_with_options( ld )) == NULL ) {
|
1999-05-29 09:19:14 +08:00
|
|
|
LDAP_FREE( cred );
|
1998-08-09 08:43:13 +08:00
|
|
|
return( -1 );
|
|
|
|
}
|
|
|
|
|
2003-02-14 07:02:31 +08:00
|
|
|
LDAP_NEXT_MSGID( ld, id );
|
1998-08-09 08:43:13 +08:00
|
|
|
/* fill it in */
|
2003-02-14 07:02:31 +08:00
|
|
|
rc = ber_printf( ber, "{it{istoN}N}", id, LDAP_REQ_BIND,
|
1998-08-09 08:43:13 +08:00
|
|
|
ld->ld_version, dn, LDAP_AUTH_KRBV42, cred, credlen );
|
|
|
|
|
1999-05-29 09:19:14 +08:00
|
|
|
LDAP_FREE( cred );
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
if ( rc == -1 ) {
|
|
|
|
ber_free( ber, 1 );
|
|
|
|
ld->ld_errno = LDAP_ENCODING_ERROR;
|
|
|
|
return( -1 );
|
|
|
|
}
|
|
|
|
|
|
|
|
/* send the message */
|
2003-02-14 07:02:31 +08:00
|
|
|
return ( ldap_send_initial_request( ld, LDAP_REQ_BIND, dn, ber, id ));
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* synchronous bind to DSA using kerberos */
|
|
|
|
int
|
1999-05-19 09:53:09 +08:00
|
|
|
ldap_kerberos_bind2_s( LDAP *ld, LDAP_CONST char *dn )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
|
|
|
int msgid;
|
|
|
|
LDAPMessage *res;
|
|
|
|
|
|
|
|
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind2_s\n", 0, 0, 0 );
|
|
|
|
|
|
|
|
/* initiate the bind */
|
|
|
|
if ( (msgid = ldap_kerberos_bind2( ld, dn )) == -1 )
|
|
|
|
return( ld->ld_errno );
|
|
|
|
|
|
|
|
/* wait for a result */
|
2003-03-06 22:50:39 +08:00
|
|
|
if ( ldap_result( ld, msgid, 1, (struct timeval *) 0, &res )
|
1998-08-09 08:43:13 +08:00
|
|
|
== -1 ) {
|
|
|
|
return( ld->ld_errno ); /* ldap_result sets ld_errno */
|
|
|
|
}
|
|
|
|
|
|
|
|
return( ldap_result2error( ld, res, 1 ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
/* synchronous bind to ldap and DSA using kerberos */
|
|
|
|
int
|
1999-05-19 09:53:09 +08:00
|
|
|
ldap_kerberos_bind_s( LDAP *ld, LDAP_CONST char *dn )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
|
|
|
Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind_s\n", 0, 0, 0 );
|
|
|
|
|
|
|
|
if ( (err = ldap_kerberos_bind1_s( ld, dn )) != LDAP_SUCCESS )
|
|
|
|
return( err );
|
|
|
|
|
|
|
|
return( ldap_kerberos_bind2_s( ld, dn ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef AUTHMAN
|
|
|
|
/*
|
1998-08-09 11:04:12 +08:00
|
|
|
* ldap_get_kerberosv4_credentials - obtain kerberos v4 credentials for ldap.
|
1998-08-09 08:43:13 +08:00
|
|
|
* The dn of the entry to which to bind is supplied. It's assumed the
|
|
|
|
* user already has a tgt.
|
|
|
|
*/
|
|
|
|
|
|
|
|
char *
|
1999-05-19 09:53:09 +08:00
|
|
|
ldap_get_kerberosv4_credentials(
|
|
|
|
LDAP *ld,
|
|
|
|
LDAP_CONST char *who,
|
|
|
|
LDAP_CONST char *service,
|
1999-06-19 07:53:05 +08:00
|
|
|
ber_len_t *len )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
|
|
|
KTEXT_ST ktxt;
|
|
|
|
int err;
|
|
|
|
char realm[REALM_SZ], *cred, *krbinstance;
|
|
|
|
|
1998-08-09 11:04:12 +08:00
|
|
|
Debug( LDAP_DEBUG_TRACE, "ldap_get_kerberosv4_credentials\n", 0, 0, 0 );
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
if ( (err = krb_get_tf_realm( tkt_string(), realm )) != KSUCCESS ) {
|
2000-09-14 15:22:01 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "ldap_get_kerberosv4_credentials: "
|
|
|
|
"krb_get_tf_realm failed: %s\n", krb_err_txt[err], 0, 0 );
|
2000-05-04 02:59:58 +08:00
|
|
|
ld->ld_errno = LDAP_AUTH_UNKNOWN;
|
1998-08-09 08:43:13 +08:00
|
|
|
return( NULL );
|
|
|
|
}
|
|
|
|
|
2000-06-02 04:59:21 +08:00
|
|
|
if ( ber_sockbuf_ctrl( ld->ld_sb, LBER_SB_OPT_GET_FD, NULL ) == -1 ) {
|
1999-09-23 12:08:33 +08:00
|
|
|
/* not connected yet */
|
|
|
|
int rc = ldap_open_defconn( ld );
|
|
|
|
|
|
|
|
if( rc < 0 ) return NULL;
|
|
|
|
}
|
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
krbinstance = ld->ld_defconn->lconn_krbinstance;
|
|
|
|
|
|
|
|
if ( (err = krb_mk_req( &ktxt, service, krbinstance, realm, 0 ))
|
2000-09-14 15:22:01 +08:00
|
|
|
!= KSUCCESS )
|
|
|
|
{
|
|
|
|
Debug( LDAP_DEBUG_ANY, "ldap_get_kerberosv4_credentials: "
|
|
|
|
"krb_mk_req failed (%s)\n", krb_err_txt[err], 0, 0 );
|
2000-05-04 02:59:58 +08:00
|
|
|
ld->ld_errno = LDAP_AUTH_UNKNOWN;
|
1998-08-09 08:43:13 +08:00
|
|
|
return( NULL );
|
|
|
|
}
|
|
|
|
|
1999-05-29 09:19:14 +08:00
|
|
|
if ( ( cred = LDAP_MALLOC( ktxt.length )) == NULL ) {
|
1998-08-09 08:43:13 +08:00
|
|
|
ld->ld_errno = LDAP_NO_MEMORY;
|
|
|
|
return( NULL );
|
|
|
|
}
|
|
|
|
|
|
|
|
*len = ktxt.length;
|
2000-07-28 09:07:07 +08:00
|
|
|
AC_MEMCPY( cred, ktxt.dat, ktxt.length );
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
return( cred );
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* !AUTHMAN */
|
2000-01-09 02:42:11 +08:00
|
|
|
#endif /* LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND */
|