summaryrefslogtreecommitdiff
path: root/usr/src/lib/libldap5/sources/ldap/common/bind.c
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/lib/libldap5/sources/ldap/common/bind.c')
-rw-r--r--usr/src/lib/libldap5/sources/ldap/common/bind.c157
1 files changed, 157 insertions, 0 deletions
diff --git a/usr/src/lib/libldap5/sources/ldap/common/bind.c b/usr/src/lib/libldap5/sources/ldap/common/bind.c
new file mode 100644
index 0000000000..d28168a448
--- /dev/null
+++ b/usr/src/lib/libldap5/sources/ldap/common/bind.c
@@ -0,0 +1,157 @@
+#pragma ident "%Z%%M% %I% %E% SMI"
+
+/*
+ * The contents of this file are subject to the Netscape Public
+ * License Version 1.1 (the "License"); you may not use this file
+ * except in compliance with the License. You may obtain a copy of
+ * the License at http://www.mozilla.org/NPL/
+ *
+ * Software distributed under the License is distributed on an "AS
+ * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
+ * implied. See the License for the specific language governing
+ * rights and limitations under the License.
+ *
+ * The Original Code is Mozilla Communicator client code, released
+ * March 31, 1998.
+ *
+ * The Initial Developer of the Original Code is Netscape
+ * Communications Corporation. Portions created by Netscape are
+ * Copyright (C) 1998-1999 Netscape Communications Corporation. All
+ * Rights Reserved.
+ *
+ * Contributor(s):
+ */
+/*
+ * bind.c
+ */
+
+#if 0
+#ifndef lint
+static char copyright[] = "@(#) Copyright (c) 1990 Regents of the University of Michigan.\nAll rights reserved.\n";
+#endif
+#endif
+
+#include "ldap-int.h"
+
+/*
+ * ldap_bind - bind to the ldap server. The dn and password
+ * of the entry to which to bind are supplied, along with the authentication
+ * method to use. The msgid of the bind request is returned on success,
+ * -1 if there's trouble. Note, the kerberos support assumes the user already
+ * has a valid tgt for now. ldap_result() should be called to find out the
+ * outcome of the bind request.
+ *
+ * Example:
+ * ldap_bind( ld, "cn=manager, o=university of michigan, c=us", "secret",
+ * LDAP_AUTH_SIMPLE )
+ */
+
+int
+LDAP_CALL
+ldap_bind( LDAP *ld, const char *dn, const char *passwd, int authmethod )
+{
+ /*
+ * The bind request looks like this:
+ * BindRequest ::= SEQUENCE {
+ * version INTEGER,
+ * name DistinguishedName, -- who
+ * authentication CHOICE {
+ * simple [0] OCTET STRING -- passwd
+ * }
+ * }
+ * all wrapped up in an LDAPMessage sequence.
+ */
+
+ LDAPDebug( LDAP_DEBUG_TRACE, "ldap_bind\n", 0, 0, 0 );
+
+ if ( !NSLDAPI_VALID_LDAP_POINTER( ld )) {
+ return( -1 );
+ }
+
+ switch ( authmethod ) {
+ case LDAP_AUTH_SIMPLE:
+ return( ldap_simple_bind( ld, dn, passwd ) );
+
+ default:
+ LDAP_SET_LDERRNO( ld, LDAP_AUTH_UNKNOWN, NULL, NULL );
+ return( -1 );
+ }
+}
+
+/*
+ * ldap_bind_s - bind to the ldap server. The dn and password
+ * of the entry to which to bind are supplied, along with the authentication
+ * method to use. This routine just calls whichever bind routine is
+ * appropriate and returns the result of the bind (e.g. LDAP_SUCCESS or
+ * some other error indication). Note, the kerberos support assumes the
+ * user already has a valid tgt for now.
+ *
+ * Examples:
+ * ldap_bind_s( ld, "cn=manager, o=university of michigan, c=us",
+ * "secret", LDAP_AUTH_SIMPLE )
+ * ldap_bind_s( ld, "cn=manager, o=university of michigan, c=us",
+ * NULL, LDAP_AUTH_KRBV4 )
+ */
+int
+LDAP_CALL
+ldap_bind_s( LDAP *ld, const char *dn, const char *passwd, int authmethod )
+{
+ int err;
+
+ LDAPDebug( LDAP_DEBUG_TRACE, "ldap_bind_s\n", 0, 0, 0 );
+
+ switch ( authmethod ) {
+ case LDAP_AUTH_SIMPLE:
+ return( ldap_simple_bind_s( ld, dn, passwd ) );
+
+ default:
+ err = LDAP_AUTH_UNKNOWN;
+ LDAP_SET_LDERRNO( ld, err, NULL, NULL );
+ return( err );
+ }
+}
+
+
+void
+LDAP_CALL
+ldap_set_rebind_proc( LDAP *ld, LDAP_REBINDPROC_CALLBACK *rebindproc,
+ void *arg )
+{
+ if ( ld == NULL ) {
+ if ( !nsldapi_initialized ) {
+ nsldapi_initialize_defaults();
+ }
+ ld = &nsldapi_ld_defaults;
+ }
+
+ if ( NSLDAPI_VALID_LDAP_POINTER( ld )) {
+ LDAP_MUTEX_LOCK( ld, LDAP_OPTION_LOCK );
+ ld->ld_rebind_fn = rebindproc;
+ ld->ld_rebind_arg = arg;
+ LDAP_MUTEX_UNLOCK( ld, LDAP_OPTION_LOCK );
+ }
+}
+
+
+/*
+ * return a pointer to the bind DN for the default connection (a copy is
+ * not made). If there is no bind DN available, NULL is returned.
+ */
+char *
+nsldapi_get_binddn( LDAP *ld )
+{
+ char *binddn;
+
+ binddn = NULL; /* default -- assume they are not bound */
+
+ LDAP_MUTEX_LOCK( ld, LDAP_CONN_LOCK );
+ if ( NULL != ld->ld_defconn && LDAP_CONNST_CONNECTED ==
+ ld->ld_defconn->lconn_status && ld->ld_defconn->lconn_bound ) {
+ if (( binddn = ld->ld_defconn->lconn_binddn ) == NULL ) {
+ binddn = "";
+ }
+ }
+ LDAP_MUTEX_UNLOCK( ld, LDAP_CONN_LOCK );
+
+ return( binddn );
+}