1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225 |
- /***************************************************************************
- * _ _ ____ _
- * Project ___| | | | _ \| |
- * / __| | | | |_) | |
- * | (__| |_| | _ <| |___
- * \___|\___/|_| \_\_____|
- *
- * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
- * Copyright (C) Howard Chu, <hyc@openldap.org>
- *
- * This software is licensed as described in the file COPYING, which
- * you should have received as part of this distribution. The terms
- * are also available at https://curl.se/docs/copyright.html.
- *
- * You may opt to use, copy, modify, merge, publish, distribute and/or sell
- * copies of the Software, and permit persons to whom the Software is
- * furnished to do so, under the terms of the COPYING file.
- *
- * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
- * KIND, either express or implied.
- *
- * SPDX-License-Identifier: curl
- *
- ***************************************************************************/
- #include "curl_setup.h"
- #if !defined(CURL_DISABLE_LDAP) && defined(USE_OPENLDAP)
- /*
- * Notice that USE_OPENLDAP is only a source code selection switch. When
- * libcurl is built with USE_OPENLDAP defined the libcurl source code that
- * gets compiled is the code from openldap.c, otherwise the code that gets
- * compiled is the code from ldap.c.
- *
- * When USE_OPENLDAP is defined a recent version of the OpenLDAP library
- * might be required for compilation and runtime. In order to use ancient
- * OpenLDAP library versions, USE_OPENLDAP shall not be defined.
- */
- #include <ldap.h>
- #include "urldata.h"
- #include <curl/curl.h>
- #include "sendf.h"
- #include "vtls/vtls.h"
- #include "transfer.h"
- #include "curl_ldap.h"
- #include "curl_base64.h"
- #include "cfilters.h"
- #include "connect.h"
- #include "curl_sasl.h"
- #include "strcase.h"
- /* The last 3 #include files should be in this order */
- #include "curl_printf.h"
- #include "curl_memory.h"
- #include "memdebug.h"
- /*
- * Uncommenting this will enable the built-in debug logging of the openldap
- * library. The debug log level can be set using the CURL_OPENLDAP_TRACE
- * environment variable. The debug output is written to stderr.
- *
- * The library supports the following debug flags:
- * LDAP_DEBUG_NONE 0x0000
- * LDAP_DEBUG_TRACE 0x0001
- * LDAP_DEBUG_CONSTRUCT 0x0002
- * LDAP_DEBUG_DESTROY 0x0004
- * LDAP_DEBUG_PARAMETER 0x0008
- * LDAP_DEBUG_ANY 0xffff
- *
- * For example, use CURL_OPENLDAP_TRACE=0 for no debug,
- * CURL_OPENLDAP_TRACE=2 for LDAP_DEBUG_CONSTRUCT messages only,
- * CURL_OPENLDAP_TRACE=65535 for all debug message levels.
- */
- /* #define CURL_OPENLDAP_DEBUG */
- /* Machine states. */
- typedef enum {
- OLDAP_STOP, /* Do nothing state, stops the state machine */
- OLDAP_SSL, /* Performing SSL handshake. */
- OLDAP_STARTTLS, /* STARTTLS request sent. */
- OLDAP_TLS, /* Performing TLS handshake. */
- OLDAP_MECHS, /* Get SASL authentication mechanisms. */
- OLDAP_SASL, /* SASL binding reply. */
- OLDAP_BIND, /* Simple bind reply. */
- OLDAP_BINDV2, /* Simple bind reply in protocol version 2. */
- OLDAP_LAST /* Never used */
- } ldapstate;
- #ifndef _LDAP_PVT_H
- extern int ldap_pvt_url_scheme2proto(const char *);
- extern int ldap_init_fd(ber_socket_t fd, int proto, const char *url,
- LDAP **ld);
- #endif
- static CURLcode oldap_setup_connection(struct Curl_easy *data,
- struct connectdata *conn);
- static CURLcode oldap_do(struct Curl_easy *data, bool *done);
- static CURLcode oldap_done(struct Curl_easy *data, CURLcode, bool);
- static CURLcode oldap_connect(struct Curl_easy *data, bool *done);
- static CURLcode oldap_connecting(struct Curl_easy *data, bool *done);
- static CURLcode oldap_disconnect(struct Curl_easy *data,
- struct connectdata *conn, bool dead);
- static CURLcode oldap_perform_auth(struct Curl_easy *data, const char *mech,
- const struct bufref *initresp);
- static CURLcode oldap_continue_auth(struct Curl_easy *data, const char *mech,
- const struct bufref *resp);
- static CURLcode oldap_cancel_auth(struct Curl_easy *data, const char *mech);
- static CURLcode oldap_get_message(struct Curl_easy *data, struct bufref *out);
- static Curl_recv oldap_recv;
- /*
- * LDAP protocol handler.
- */
- const struct Curl_handler Curl_handler_ldap = {
- "ldap", /* scheme */
- oldap_setup_connection, /* setup_connection */
- oldap_do, /* do_it */
- oldap_done, /* done */
- ZERO_NULL, /* do_more */
- oldap_connect, /* connect_it */
- oldap_connecting, /* connecting */
- ZERO_NULL, /* doing */
- ZERO_NULL, /* proto_getsock */
- ZERO_NULL, /* doing_getsock */
- ZERO_NULL, /* domore_getsock */
- ZERO_NULL, /* perform_getsock */
- oldap_disconnect, /* disconnect */
- ZERO_NULL, /* write_resp */
- ZERO_NULL, /* write_resp_hd */
- ZERO_NULL, /* connection_check */
- ZERO_NULL, /* attach connection */
- PORT_LDAP, /* defport */
- CURLPROTO_LDAP, /* protocol */
- CURLPROTO_LDAP, /* family */
- PROTOPT_NONE /* flags */
- };
- #ifdef USE_SSL
- /*
- * LDAPS protocol handler.
- */
- const struct Curl_handler Curl_handler_ldaps = {
- "ldaps", /* scheme */
- oldap_setup_connection, /* setup_connection */
- oldap_do, /* do_it */
- oldap_done, /* done */
- ZERO_NULL, /* do_more */
- oldap_connect, /* connect_it */
- oldap_connecting, /* connecting */
- ZERO_NULL, /* doing */
- ZERO_NULL, /* proto_getsock */
- ZERO_NULL, /* doing_getsock */
- ZERO_NULL, /* domore_getsock */
- ZERO_NULL, /* perform_getsock */
- oldap_disconnect, /* disconnect */
- ZERO_NULL, /* write_resp */
- ZERO_NULL, /* write_resp_hd */
- ZERO_NULL, /* connection_check */
- ZERO_NULL, /* attach connection */
- PORT_LDAPS, /* defport */
- CURLPROTO_LDAPS, /* protocol */
- CURLPROTO_LDAP, /* family */
- PROTOPT_SSL /* flags */
- };
- #endif
- /* SASL parameters for the ldap protocol */
- static const struct SASLproto saslldap = {
- "ldap", /* The service name */
- oldap_perform_auth, /* Send authentication command */
- oldap_continue_auth, /* Send authentication continuation */
- oldap_cancel_auth, /* Send authentication cancellation */
- oldap_get_message, /* Get SASL response message */
- 0, /* Maximum initial response length (no max) */
- LDAP_SASL_BIND_IN_PROGRESS, /* Code received when continuation is expected */
- LDAP_SUCCESS, /* Code to receive upon authentication success */
- SASL_AUTH_NONE, /* Default mechanisms */
- 0 /* Configuration flags */
- };
- struct ldapconninfo {
- struct SASL sasl; /* SASL-related parameters */
- LDAP *ld; /* Openldap connection handle. */
- Curl_recv *recv; /* For stacking SSL handler */
- Curl_send *send;
- struct berval *servercred; /* SASL data from server. */
- ldapstate state; /* Current machine state. */
- int proto; /* LDAP_PROTO_TCP/LDAP_PROTO_UDP/LDAP_PROTO_IPC */
- int msgid; /* Current message id. */
- };
- struct ldapreqinfo {
- int msgid;
- int nument;
- };
- /*
- * oldap_state()
- *
- * This is the ONLY way to change LDAP state!
- */
- static void oldap_state(struct Curl_easy *data, ldapstate newstate)
- {
- struct ldapconninfo *ldapc = data->conn->proto.ldapc;
- #if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS)
- /* for debug purposes */
- static const char * const names[] = {
- "STOP",
- "SSL",
- "STARTTLS",
- "TLS",
- "MECHS",
- "SASL",
- "BIND",
- "BINDV2",
- /* LAST */
- };
- if(ldapc->state != newstate)
- infof(data, "LDAP %p state change from %s to %s",
- (void *)ldapc, names[ldapc->state], names[newstate]);
- #endif
- ldapc->state = newstate;
- }
- /* Map some particular LDAP error codes to CURLcode values. */
- static CURLcode oldap_map_error(int rc, CURLcode result)
- {
- switch(rc) {
- case LDAP_NO_MEMORY:
- result = CURLE_OUT_OF_MEMORY;
- break;
- case LDAP_INVALID_CREDENTIALS:
- result = CURLE_LOGIN_DENIED;
- break;
- case LDAP_PROTOCOL_ERROR:
- result = CURLE_UNSUPPORTED_PROTOCOL;
- break;
- case LDAP_INSUFFICIENT_ACCESS:
- result = CURLE_REMOTE_ACCESS_DENIED;
- break;
- }
- return result;
- }
- static CURLcode oldap_url_parse(struct Curl_easy *data, LDAPURLDesc **ludp)
- {
- CURLcode result = CURLE_OK;
- int rc = LDAP_URL_ERR_BADURL;
- static const char * const url_errs[] = {
- "success",
- "out of memory",
- "bad parameter",
- "unrecognized scheme",
- "unbalanced delimiter",
- "bad URL",
- "bad host or port",
- "bad or missing attributes",
- "bad or missing scope",
- "bad or missing filter",
- "bad or missing extensions"
- };
- *ludp = NULL;
- if(!data->state.up.user && !data->state.up.password &&
- !data->state.up.options)
- rc = ldap_url_parse(data->state.url, ludp);
- if(rc != LDAP_URL_SUCCESS) {
- const char *msg = "url parsing problem";
- result = rc == LDAP_URL_ERR_MEM ? CURLE_OUT_OF_MEMORY :
- CURLE_URL_MALFORMAT;
- rc -= LDAP_URL_SUCCESS;
- if((size_t) rc < sizeof(url_errs) / sizeof(url_errs[0]))
- msg = url_errs[rc];
- failf(data, "LDAP local: %s", msg);
- }
- return result;
- }
- /* Parse the login options. */
- static CURLcode oldap_parse_login_options(struct connectdata *conn)
- {
- CURLcode result = CURLE_OK;
- struct ldapconninfo *li = conn->proto.ldapc;
- const char *ptr = conn->options;
- while(!result && ptr && *ptr) {
- const char *key = ptr;
- const char *value;
- while(*ptr && *ptr != '=')
- ptr++;
- value = ptr + 1;
- while(*ptr && *ptr != ';')
- ptr++;
- if(checkprefix("AUTH=", key))
- result = Curl_sasl_parse_url_auth_option(&li->sasl, value, ptr - value);
- else
- result = CURLE_SETOPT_OPTION_SYNTAX;
- if(*ptr == ';')
- ptr++;
- }
- return result == CURLE_URL_MALFORMAT ? CURLE_SETOPT_OPTION_SYNTAX : result;
- }
- static CURLcode oldap_setup_connection(struct Curl_easy *data,
- struct connectdata *conn)
- {
- CURLcode result;
- LDAPURLDesc *lud;
- (void)conn;
- /* Early URL syntax check. */
- result = oldap_url_parse(data, &lud);
- ldap_free_urldesc(lud);
- return result;
- }
- /*
- * Get the SASL authentication challenge from the server credential buffer.
- */
- static CURLcode oldap_get_message(struct Curl_easy *data, struct bufref *out)
- {
- struct berval *servercred = data->conn->proto.ldapc->servercred;
- if(!servercred || !servercred->bv_val)
- return CURLE_WEIRD_SERVER_REPLY;
- Curl_bufref_set(out, servercred->bv_val, servercred->bv_len, NULL);
- return CURLE_OK;
- }
- /*
- * Sends an initial SASL bind request to the server.
- */
- static CURLcode oldap_perform_auth(struct Curl_easy *data, const char *mech,
- const struct bufref *initresp)
- {
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- CURLcode result = CURLE_OK;
- struct berval cred;
- struct berval *pcred = &cred;
- int rc;
- cred.bv_val = (char *) Curl_bufref_ptr(initresp);
- cred.bv_len = Curl_bufref_len(initresp);
- if(!cred.bv_val)
- pcred = NULL;
- rc = ldap_sasl_bind(li->ld, NULL, mech, pcred, NULL, NULL, &li->msgid);
- if(rc != LDAP_SUCCESS)
- result = oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
- return result;
- }
- /*
- * Sends SASL continuation.
- */
- static CURLcode oldap_continue_auth(struct Curl_easy *data, const char *mech,
- const struct bufref *resp)
- {
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- CURLcode result = CURLE_OK;
- struct berval cred;
- struct berval *pcred = &cred;
- int rc;
- cred.bv_val = (char *) Curl_bufref_ptr(resp);
- cred.bv_len = Curl_bufref_len(resp);
- if(!cred.bv_val)
- pcred = NULL;
- rc = ldap_sasl_bind(li->ld, NULL, mech, pcred, NULL, NULL, &li->msgid);
- if(rc != LDAP_SUCCESS)
- result = oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
- return result;
- }
- /*
- * Sends SASL bind cancellation.
- */
- static CURLcode oldap_cancel_auth(struct Curl_easy *data, const char *mech)
- {
- struct ldapconninfo *li = data->conn->proto.ldapc;
- CURLcode result = CURLE_OK;
- int rc = ldap_sasl_bind(li->ld, NULL, LDAP_SASL_NULL, NULL, NULL, NULL,
- &li->msgid);
- (void)mech;
- if(rc != LDAP_SUCCESS)
- result = oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
- return result;
- }
- /* Starts LDAP simple bind. */
- static CURLcode oldap_perform_bind(struct Curl_easy *data, ldapstate newstate)
- {
- CURLcode result = CURLE_OK;
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- char *binddn = NULL;
- struct berval passwd;
- int rc;
- passwd.bv_val = NULL;
- passwd.bv_len = 0;
- if(data->state.aptr.user) {
- binddn = conn->user;
- passwd.bv_val = conn->passwd;
- passwd.bv_len = strlen(passwd.bv_val);
- }
- rc = ldap_sasl_bind(li->ld, binddn, LDAP_SASL_SIMPLE, &passwd,
- NULL, NULL, &li->msgid);
- if(rc == LDAP_SUCCESS)
- oldap_state(data, newstate);
- else
- result = oldap_map_error(rc,
- data->state.aptr.user ?
- CURLE_LOGIN_DENIED : CURLE_LDAP_CANNOT_BIND);
- return result;
- }
- /* Query the supported SASL authentication mechanisms. */
- static CURLcode oldap_perform_mechs(struct Curl_easy *data)
- {
- CURLcode result = CURLE_OK;
- struct ldapconninfo *li = data->conn->proto.ldapc;
- int rc;
- static const char * const supportedSASLMechanisms[] = {
- "supportedSASLMechanisms",
- NULL
- };
- rc = ldap_search_ext(li->ld, "", LDAP_SCOPE_BASE, "(objectclass=*)",
- (char **) supportedSASLMechanisms, 0,
- NULL, NULL, NULL, 0, &li->msgid);
- if(rc == LDAP_SUCCESS)
- oldap_state(data, OLDAP_MECHS);
- else
- result = oldap_map_error(rc, CURLE_LOGIN_DENIED);
- return result;
- }
- /* Starts SASL bind. */
- static CURLcode oldap_perform_sasl(struct Curl_easy *data)
- {
- saslprogress progress = SASL_IDLE;
- struct ldapconninfo *li = data->conn->proto.ldapc;
- CURLcode result = Curl_sasl_start(&li->sasl, data, TRUE, &progress);
- oldap_state(data, OLDAP_SASL);
- if(!result && progress != SASL_INPROGRESS)
- result = CURLE_LOGIN_DENIED;
- return result;
- }
- #ifdef USE_SSL
- static Sockbuf_IO ldapsb_tls;
- static bool ssl_installed(struct connectdata *conn)
- {
- return conn->proto.ldapc->recv != NULL;
- }
- static CURLcode oldap_ssl_connect(struct Curl_easy *data, ldapstate newstate)
- {
- CURLcode result = CURLE_OK;
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- bool ssldone = 0;
- result = Curl_conn_connect(data, FIRSTSOCKET, FALSE, &ssldone);
- if(!result) {
- oldap_state(data, newstate);
- if(ssldone) {
- Sockbuf *sb;
- /* Install the libcurl SSL handlers into the sockbuf. */
- ldap_get_option(li->ld, LDAP_OPT_SOCKBUF, &sb);
- ber_sockbuf_add_io(sb, &ldapsb_tls, LBER_SBIOD_LEVEL_TRANSPORT, data);
- li->recv = conn->recv[FIRSTSOCKET];
- li->send = conn->send[FIRSTSOCKET];
- }
- }
- return result;
- }
- /* Send the STARTTLS request */
- static CURLcode oldap_perform_starttls(struct Curl_easy *data)
- {
- CURLcode result = CURLE_OK;
- struct ldapconninfo *li = data->conn->proto.ldapc;
- int rc = ldap_start_tls(li->ld, NULL, NULL, &li->msgid);
- if(rc == LDAP_SUCCESS)
- oldap_state(data, OLDAP_STARTTLS);
- else
- result = oldap_map_error(rc, CURLE_USE_SSL_FAILED);
- return result;
- }
- #endif
- static CURLcode oldap_connect(struct Curl_easy *data, bool *done)
- {
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li;
- static const int version = LDAP_VERSION3;
- int rc;
- char *hosturl;
- #ifdef CURL_OPENLDAP_DEBUG
- static int do_trace = -1;
- #endif
- (void)done;
- DEBUGASSERT(!conn->proto.ldapc);
- li = calloc(1, sizeof(struct ldapconninfo));
- if(!li)
- return CURLE_OUT_OF_MEMORY;
- else {
- CURLcode result;
- li->proto = ldap_pvt_url_scheme2proto(data->state.up.scheme);
- conn->proto.ldapc = li;
- /* Initialize the SASL storage */
- Curl_sasl_init(&li->sasl, data, &saslldap);
- /* Clear the TLS upgraded flag */
- conn->bits.tls_upgraded = FALSE;
- result = oldap_parse_login_options(conn);
- if(result)
- return result;
- }
- hosturl = aprintf("%s://%s%s%s:%d",
- conn->handler->scheme,
- conn->bits.ipv6_ip ? "[" : "",
- conn->host.name,
- conn->bits.ipv6_ip ? "]" : "",
- conn->remote_port);
- if(!hosturl)
- return CURLE_OUT_OF_MEMORY;
- rc = ldap_init_fd(conn->sock[FIRSTSOCKET], li->proto, hosturl, &li->ld);
- if(rc) {
- failf(data, "LDAP local: Cannot connect to %s, %s",
- hosturl, ldap_err2string(rc));
- free(hosturl);
- return CURLE_COULDNT_CONNECT;
- }
- free(hosturl);
- #ifdef CURL_OPENLDAP_DEBUG
- if(do_trace < 0) {
- const char *env = getenv("CURL_OPENLDAP_TRACE");
- do_trace = (env && strtol(env, NULL, 10) > 0);
- }
- if(do_trace)
- ldap_set_option(li->ld, LDAP_OPT_DEBUG_LEVEL, &do_trace);
- #endif
- /* Try version 3 first. */
- ldap_set_option(li->ld, LDAP_OPT_PROTOCOL_VERSION, &version);
- /* Do not chase referrals. */
- ldap_set_option(li->ld, LDAP_OPT_REFERRALS, LDAP_OPT_OFF);
- #ifdef USE_SSL
- if(conn->handler->flags & PROTOPT_SSL)
- return oldap_ssl_connect(data, OLDAP_SSL);
- if(data->set.use_ssl) {
- CURLcode result = oldap_perform_starttls(data);
- if(!result || data->set.use_ssl != CURLUSESSL_TRY)
- return result;
- }
- #endif
- if(li->sasl.prefmech != SASL_AUTH_NONE)
- return oldap_perform_mechs(data);
- /* Force bind even if anonymous bind is not needed in protocol version 3
- to detect missing version 3 support. */
- return oldap_perform_bind(data, OLDAP_BIND);
- }
- /* Handle the supported SASL mechanisms query response */
- static CURLcode oldap_state_mechs_resp(struct Curl_easy *data,
- LDAPMessage *msg, int code)
- {
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- int rc;
- BerElement *ber = NULL;
- CURLcode result = CURLE_OK;
- struct berval bv, *bvals;
- switch(ldap_msgtype(msg)) {
- case LDAP_RES_SEARCH_ENTRY:
- /* Got a list of supported SASL mechanisms. */
- if(code != LDAP_SUCCESS && code != LDAP_NO_RESULTS_RETURNED)
- return CURLE_LOGIN_DENIED;
- rc = ldap_get_dn_ber(li->ld, msg, &ber, &bv);
- if(rc < 0)
- return oldap_map_error(rc, CURLE_BAD_CONTENT_ENCODING);
- for(rc = ldap_get_attribute_ber(li->ld, msg, ber, &bv, &bvals);
- rc == LDAP_SUCCESS;
- rc = ldap_get_attribute_ber(li->ld, msg, ber, &bv, &bvals)) {
- int i;
- if(!bv.bv_val)
- break;
- if(bvals) {
- for(i = 0; bvals[i].bv_val; i++) {
- size_t llen;
- unsigned short mech = Curl_sasl_decode_mech((char *) bvals[i].bv_val,
- bvals[i].bv_len, &llen);
- if(bvals[i].bv_len == llen)
- li->sasl.authmechs |= mech;
- }
- ber_memfree(bvals);
- }
- }
- ber_free(ber, 0);
- break;
- case LDAP_RES_SEARCH_RESULT:
- switch(code) {
- case LDAP_SIZELIMIT_EXCEEDED:
- infof(data, "Too many authentication mechanisms\n");
- FALLTHROUGH();
- case LDAP_SUCCESS:
- case LDAP_NO_RESULTS_RETURNED:
- if(Curl_sasl_can_authenticate(&li->sasl, data))
- result = oldap_perform_sasl(data);
- else
- result = CURLE_LOGIN_DENIED;
- break;
- default:
- result = oldap_map_error(code, CURLE_LOGIN_DENIED);
- break;
- }
- break;
- default:
- break;
- }
- return result;
- }
- /* Handle a SASL bind response. */
- static CURLcode oldap_state_sasl_resp(struct Curl_easy *data,
- LDAPMessage *msg, int code)
- {
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- CURLcode result = CURLE_OK;
- saslprogress progress;
- int rc;
- li->servercred = NULL;
- rc = ldap_parse_sasl_bind_result(li->ld, msg, &li->servercred, 0);
- if(rc != LDAP_SUCCESS) {
- failf(data, "LDAP local: sasl ldap_parse_result %s", ldap_err2string(rc));
- result = oldap_map_error(rc, CURLE_LOGIN_DENIED);
- }
- else {
- result = Curl_sasl_continue(&li->sasl, data, code, &progress);
- if(!result && progress != SASL_INPROGRESS)
- oldap_state(data, OLDAP_STOP);
- }
- if(li->servercred)
- ber_bvfree(li->servercred);
- return result;
- }
- /* Handle a simple bind response. */
- static CURLcode oldap_state_bind_resp(struct Curl_easy *data, LDAPMessage *msg,
- int code)
- {
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- CURLcode result = CURLE_OK;
- struct berval *bv = NULL;
- int rc;
- if(code != LDAP_SUCCESS)
- return oldap_map_error(code, CURLE_LDAP_CANNOT_BIND);
- rc = ldap_parse_sasl_bind_result(li->ld, msg, &bv, 0);
- if(rc != LDAP_SUCCESS) {
- failf(data, "LDAP local: bind ldap_parse_sasl_bind_result %s",
- ldap_err2string(rc));
- result = oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
- }
- else
- oldap_state(data, OLDAP_STOP);
- if(bv)
- ber_bvfree(bv);
- return result;
- }
- static CURLcode oldap_connecting(struct Curl_easy *data, bool *done)
- {
- CURLcode result = CURLE_OK;
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- LDAPMessage *msg = NULL;
- struct timeval tv = {0, 0};
- int code = LDAP_SUCCESS;
- int rc;
- if(li->state != OLDAP_SSL && li->state != OLDAP_TLS) {
- /* Get response to last command. */
- rc = ldap_result(li->ld, li->msgid, LDAP_MSG_ONE, &tv, &msg);
- switch(rc) {
- case 0: /* Timed out. */
- return CURLE_OK;
- case LDAP_RES_SEARCH_ENTRY:
- case LDAP_RES_SEARCH_REFERENCE:
- break;
- default:
- li->msgid = 0; /* Nothing to abandon upon error. */
- if(rc < 0) {
- failf(data, "LDAP local: connecting ldap_result %s",
- ldap_err2string(rc));
- return oldap_map_error(rc, CURLE_COULDNT_CONNECT);
- }
- break;
- }
- /* Get error code from message. */
- rc = ldap_parse_result(li->ld, msg, &code, NULL, NULL, NULL, NULL, 0);
- if(rc)
- code = rc;
- else {
- /* store the latest code for later retrieval */
- data->info.httpcode = code;
- }
- /* If protocol version 3 is not supported, fallback to version 2. */
- if(code == LDAP_PROTOCOL_ERROR && li->state != OLDAP_BINDV2 &&
- #ifdef USE_SSL
- (ssl_installed(conn) || data->set.use_ssl <= CURLUSESSL_TRY) &&
- #endif
- li->sasl.prefmech == SASL_AUTH_NONE) {
- static const int version = LDAP_VERSION2;
- ldap_set_option(li->ld, LDAP_OPT_PROTOCOL_VERSION, &version);
- ldap_msgfree(msg);
- return oldap_perform_bind(data, OLDAP_BINDV2);
- }
- }
- /* Handle response message according to current state. */
- switch(li->state) {
- #ifdef USE_SSL
- case OLDAP_SSL:
- result = oldap_ssl_connect(data, OLDAP_SSL);
- if(!result && ssl_installed(conn)) {
- if(li->sasl.prefmech != SASL_AUTH_NONE)
- result = oldap_perform_mechs(data);
- else
- result = oldap_perform_bind(data, OLDAP_BIND);
- }
- break;
- case OLDAP_STARTTLS:
- if(code != LDAP_SUCCESS) {
- if(data->set.use_ssl != CURLUSESSL_TRY)
- result = oldap_map_error(code, CURLE_USE_SSL_FAILED);
- else if(li->sasl.prefmech != SASL_AUTH_NONE)
- result = oldap_perform_mechs(data);
- else
- result = oldap_perform_bind(data, OLDAP_BIND);
- break;
- }
- result = Curl_ssl_cfilter_add(data, conn, FIRSTSOCKET);
- if(result)
- break;
- FALLTHROUGH();
- case OLDAP_TLS:
- result = oldap_ssl_connect(data, OLDAP_TLS);
- if(result)
- result = oldap_map_error(code, CURLE_USE_SSL_FAILED);
- else if(ssl_installed(conn)) {
- conn->bits.tls_upgraded = TRUE;
- if(li->sasl.prefmech != SASL_AUTH_NONE)
- result = oldap_perform_mechs(data);
- else if(data->state.aptr.user)
- result = oldap_perform_bind(data, OLDAP_BIND);
- else {
- /* Version 3 supported: no bind required */
- oldap_state(data, OLDAP_STOP);
- result = CURLE_OK;
- }
- }
- break;
- #endif
- case OLDAP_MECHS:
- result = oldap_state_mechs_resp(data, msg, code);
- break;
- case OLDAP_SASL:
- result = oldap_state_sasl_resp(data, msg, code);
- break;
- case OLDAP_BIND:
- case OLDAP_BINDV2:
- result = oldap_state_bind_resp(data, msg, code);
- break;
- default:
- /* internal error */
- result = CURLE_COULDNT_CONNECT;
- break;
- }
- ldap_msgfree(msg);
- *done = li->state == OLDAP_STOP;
- if(*done)
- conn->recv[FIRSTSOCKET] = oldap_recv;
- if(result && li->msgid) {
- ldap_abandon_ext(li->ld, li->msgid, NULL, NULL);
- li->msgid = 0;
- }
- return result;
- }
- static CURLcode oldap_disconnect(struct Curl_easy *data,
- struct connectdata *conn,
- bool dead_connection)
- {
- struct ldapconninfo *li = conn->proto.ldapc;
- (void) dead_connection;
- #ifndef USE_SSL
- (void)data;
- #endif
- if(li) {
- if(li->ld) {
- #ifdef USE_SSL
- if(ssl_installed(conn)) {
- Sockbuf *sb;
- ldap_get_option(li->ld, LDAP_OPT_SOCKBUF, &sb);
- ber_sockbuf_add_io(sb, &ldapsb_tls, LBER_SBIOD_LEVEL_TRANSPORT, data);
- }
- #endif
- ldap_unbind_ext(li->ld, NULL, NULL);
- li->ld = NULL;
- }
- Curl_sasl_cleanup(conn, li->sasl.authused);
- conn->proto.ldapc = NULL;
- free(li);
- }
- return CURLE_OK;
- }
- static CURLcode oldap_do(struct Curl_easy *data, bool *done)
- {
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- struct ldapreqinfo *lr;
- CURLcode result;
- int rc;
- LDAPURLDesc *lud;
- int msgid;
- connkeep(conn, "OpenLDAP do");
- infof(data, "LDAP local: %s", data->state.url);
- result = oldap_url_parse(data, &lud);
- if(!result) {
- #ifdef USE_SSL
- if(ssl_installed(conn)) {
- Sockbuf *sb;
- /* re-install the libcurl SSL handlers into the sockbuf. */
- ldap_get_option(li->ld, LDAP_OPT_SOCKBUF, &sb);
- ber_sockbuf_add_io(sb, &ldapsb_tls, LBER_SBIOD_LEVEL_TRANSPORT, data);
- }
- #endif
- rc = ldap_search_ext(li->ld, lud->lud_dn, lud->lud_scope,
- lud->lud_filter, lud->lud_attrs, 0,
- NULL, NULL, NULL, 0, &msgid);
- ldap_free_urldesc(lud);
- if(rc != LDAP_SUCCESS) {
- failf(data, "LDAP local: ldap_search_ext %s", ldap_err2string(rc));
- result = CURLE_LDAP_SEARCH_FAILED;
- }
- else {
- lr = calloc(1, sizeof(struct ldapreqinfo));
- if(!lr) {
- ldap_abandon_ext(li->ld, msgid, NULL, NULL);
- result = CURLE_OUT_OF_MEMORY;
- }
- else {
- lr->msgid = msgid;
- data->req.p.ldap = lr;
- Curl_xfer_setup1(data, CURL_XFER_RECV, -1, FALSE);
- *done = TRUE;
- }
- }
- }
- return result;
- }
- static CURLcode oldap_done(struct Curl_easy *data, CURLcode res,
- bool premature)
- {
- struct connectdata *conn = data->conn;
- struct ldapreqinfo *lr = data->req.p.ldap;
- (void)res;
- (void)premature;
- if(lr) {
- /* if there was a search in progress, abandon it */
- if(lr->msgid) {
- struct ldapconninfo *li = conn->proto.ldapc;
- ldap_abandon_ext(li->ld, lr->msgid, NULL, NULL);
- lr->msgid = 0;
- }
- data->req.p.ldap = NULL;
- free(lr);
- }
- return CURLE_OK;
- }
- static CURLcode client_write(struct Curl_easy *data,
- const char *prefix, size_t plen,
- const char *value, size_t len,
- const char *suffix, size_t slen)
- {
- CURLcode result = CURLE_OK;
- if(prefix) {
- /* If we have a zero-length value and the prefix ends with a space
- separator, drop the latter. */
- if(!len && plen && prefix[plen - 1] == ' ')
- plen--;
- result = Curl_client_write(data, CLIENTWRITE_BODY, (char *) prefix, plen);
- }
- if(!result && value) {
- result = Curl_client_write(data, CLIENTWRITE_BODY, (char *) value, len);
- }
- if(!result && suffix) {
- result = Curl_client_write(data, CLIENTWRITE_BODY, (char *) suffix, slen);
- }
- return result;
- }
- static ssize_t oldap_recv(struct Curl_easy *data, int sockindex, char *buf,
- size_t len, CURLcode *err)
- {
- struct connectdata *conn = data->conn;
- struct ldapconninfo *li = conn->proto.ldapc;
- struct ldapreqinfo *lr = data->req.p.ldap;
- int rc;
- LDAPMessage *msg = NULL;
- BerElement *ber = NULL;
- struct timeval tv = {0, 0};
- struct berval bv, *bvals;
- int binary = 0;
- CURLcode result = CURLE_AGAIN;
- int code;
- char *info = NULL;
- (void)len;
- (void)buf;
- (void)sockindex;
- rc = ldap_result(li->ld, lr->msgid, LDAP_MSG_ONE, &tv, &msg);
- if(rc < 0) {
- failf(data, "LDAP local: search ldap_result %s", ldap_err2string(rc));
- result = CURLE_RECV_ERROR;
- }
- *err = result;
- /* error or timed out */
- if(!msg)
- return -1;
- result = CURLE_OK;
- switch(ldap_msgtype(msg)) {
- case LDAP_RES_SEARCH_RESULT:
- lr->msgid = 0;
- rc = ldap_parse_result(li->ld, msg, &code, NULL, &info, NULL, NULL, 0);
- if(rc) {
- failf(data, "LDAP local: search ldap_parse_result %s",
- ldap_err2string(rc));
- result = CURLE_LDAP_SEARCH_FAILED;
- break;
- }
- /* store the latest code for later retrieval */
- data->info.httpcode = code;
- switch(code) {
- case LDAP_SIZELIMIT_EXCEEDED:
- infof(data, "There are more than %d entries", lr->nument);
- FALLTHROUGH();
- case LDAP_SUCCESS:
- data->req.size = data->req.bytecount;
- break;
- default:
- failf(data, "LDAP remote: search failed %s %s", ldap_err2string(code),
- info ? info : "");
- result = CURLE_LDAP_SEARCH_FAILED;
- break;
- }
- if(info)
- ldap_memfree(info);
- break;
- case LDAP_RES_SEARCH_ENTRY:
- lr->nument++;
- rc = ldap_get_dn_ber(li->ld, msg, &ber, &bv);
- if(rc < 0) {
- result = CURLE_RECV_ERROR;
- break;
- }
- result = client_write(data, STRCONST("DN: "), bv.bv_val, bv.bv_len,
- STRCONST("\n"));
- if(result)
- break;
- for(rc = ldap_get_attribute_ber(li->ld, msg, ber, &bv, &bvals);
- rc == LDAP_SUCCESS;
- rc = ldap_get_attribute_ber(li->ld, msg, ber, &bv, &bvals)) {
- int i;
- if(!bv.bv_val)
- break;
- if(!bvals) {
- result = client_write(data, STRCONST("\t"), bv.bv_val, bv.bv_len,
- STRCONST(":\n"));
- if(result)
- break;
- continue;
- }
- binary = bv.bv_len > 7 &&
- !strncmp(bv.bv_val + bv.bv_len - 7, ";binary", 7);
- for(i = 0; bvals[i].bv_val != NULL; i++) {
- int binval = 0;
- result = client_write(data, STRCONST("\t"), bv.bv_val, bv.bv_len,
- STRCONST(":"));
- if(result)
- break;
- if(!binary) {
- /* check for leading or trailing whitespace */
- if(ISBLANK(bvals[i].bv_val[0]) ||
- ISBLANK(bvals[i].bv_val[bvals[i].bv_len - 1]))
- binval = 1;
- else {
- /* check for unprintable characters */
- unsigned int j;
- for(j = 0; j < bvals[i].bv_len; j++)
- if(!ISPRINT(bvals[i].bv_val[j])) {
- binval = 1;
- break;
- }
- }
- }
- if(binary || binval) {
- char *val_b64 = NULL;
- size_t val_b64_sz = 0;
- /* Binary value, encode to base64. */
- if(bvals[i].bv_len)
- result = Curl_base64_encode(bvals[i].bv_val, bvals[i].bv_len,
- &val_b64, &val_b64_sz);
- if(!result)
- result = client_write(data, STRCONST(": "), val_b64, val_b64_sz,
- STRCONST("\n"));
- free(val_b64);
- }
- else
- result = client_write(data, STRCONST(" "),
- bvals[i].bv_val, bvals[i].bv_len,
- STRCONST("\n"));
- if(result)
- break;
- }
- ber_memfree(bvals);
- bvals = NULL;
- if(!result)
- result = client_write(data, STRCONST("\n"), NULL, 0, NULL, 0);
- if(result)
- break;
- }
- ber_free(ber, 0);
- if(!result)
- result = client_write(data, STRCONST("\n"), NULL, 0, NULL, 0);
- if(!result)
- result = CURLE_AGAIN;
- break;
- }
- ldap_msgfree(msg);
- *err = result;
- return result ? -1 : 0;
- }
- #ifdef USE_SSL
- static int
- ldapsb_tls_setup(Sockbuf_IO_Desc *sbiod, void *arg)
- {
- sbiod->sbiod_pvt = arg;
- return 0;
- }
- static int
- ldapsb_tls_remove(Sockbuf_IO_Desc *sbiod)
- {
- sbiod->sbiod_pvt = NULL;
- return 0;
- }
- /* We do not need to do anything because libcurl does it already */
- static int
- ldapsb_tls_close(Sockbuf_IO_Desc *sbiod)
- {
- (void)sbiod;
- return 0;
- }
- static int
- ldapsb_tls_ctrl(Sockbuf_IO_Desc *sbiod, int opt, void *arg)
- {
- (void)arg;
- if(opt == LBER_SB_OPT_DATA_READY) {
- struct Curl_easy *data = sbiod->sbiod_pvt;
- return Curl_conn_data_pending(data, FIRSTSOCKET);
- }
- return 0;
- }
- static ber_slen_t
- ldapsb_tls_read(Sockbuf_IO_Desc *sbiod, void *buf, ber_len_t len)
- {
- struct Curl_easy *data = sbiod->sbiod_pvt;
- ber_slen_t ret = 0;
- if(data) {
- struct connectdata *conn = data->conn;
- if(conn) {
- struct ldapconninfo *li = conn->proto.ldapc;
- CURLcode err = CURLE_RECV_ERROR;
- ret = (li->recv)(data, FIRSTSOCKET, buf, len, &err);
- if(ret < 0 && err == CURLE_AGAIN) {
- SET_SOCKERRNO(EWOULDBLOCK);
- }
- }
- }
- return ret;
- }
- static ber_slen_t
- ldapsb_tls_write(Sockbuf_IO_Desc *sbiod, void *buf, ber_len_t len)
- {
- struct Curl_easy *data = sbiod->sbiod_pvt;
- ber_slen_t ret = 0;
- if(data) {
- struct connectdata *conn = data->conn;
- if(conn) {
- struct ldapconninfo *li = conn->proto.ldapc;
- CURLcode err = CURLE_SEND_ERROR;
- ret = (li->send)(data, FIRSTSOCKET, buf, len, FALSE, &err);
- if(ret < 0 && err == CURLE_AGAIN) {
- SET_SOCKERRNO(EWOULDBLOCK);
- }
- }
- }
- return ret;
- }
- static Sockbuf_IO ldapsb_tls =
- {
- ldapsb_tls_setup,
- ldapsb_tls_remove,
- ldapsb_tls_ctrl,
- ldapsb_tls_read,
- ldapsb_tls_write,
- ldapsb_tls_close
- };
- #endif /* USE_SSL */
- #endif /* !CURL_DISABLE_LDAP && USE_OPENLDAP */
|