2005-07-19 22:32:46 +02:00
|
|
|
/*
|
|
|
|
* WLDAP32 - LDAP support for Wine
|
|
|
|
*
|
|
|
|
* Copyright 2005 Hans Leidekker
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
2006-05-18 14:49:52 +02:00
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
2005-07-19 22:32:46 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdarg.h>
|
2021-04-19 10:04:52 +02:00
|
|
|
#include <stdlib.h>
|
2005-07-19 22:32:46 +02:00
|
|
|
#include "windef.h"
|
|
|
|
#include "winbase.h"
|
|
|
|
#include "winnls.h"
|
2020-03-23 14:14:15 +01:00
|
|
|
#include "rpc.h"
|
2021-04-19 10:04:54 +02:00
|
|
|
#include "winldap.h"
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2011-09-05 17:23:34 +02:00
|
|
|
#include "wine/debug.h"
|
2021-04-14 09:40:27 +02:00
|
|
|
#include "winldap_private.h"
|
2005-07-19 22:32:46 +02:00
|
|
|
|
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(wldap32);
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_bindA (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* See ldap_bindW.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_bindA( LDAP *ld, char *dn, char *cred, ULONG method )
|
2005-07-19 22:32:46 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
WCHAR *dnW = NULL, *credW = NULL;
|
2005-08-02 16:42:10 +02:00
|
|
|
|
2006-09-30 12:07:23 +02:00
|
|
|
TRACE( "(%p, %s, %p, 0x%08x)\n", ld, debugstr_a(dn), cred, method );
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2009-01-05 12:40:28 +01:00
|
|
|
if (!ld) return ~0u;
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (dn && !(dnW = strAtoW( dn ))) goto exit;
|
|
|
|
if (cred && !(credW = strAtoW( cred ))) goto exit;
|
2005-07-19 22:32:46 +02:00
|
|
|
|
|
|
|
ret = ldap_bindW( ld, dnW, credW, method );
|
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnW );
|
|
|
|
free( credW );
|
2005-07-19 22:32:46 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_bindW (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* Authenticate with an LDAP server (asynchronous operation).
|
|
|
|
*
|
2005-12-02 11:26:19 +01:00
|
|
|
* PARAMS
|
2005-11-28 20:41:08 +01:00
|
|
|
* ld [I] Pointer to an LDAP context.
|
|
|
|
* dn [I] DN of entry to bind as.
|
|
|
|
* cred [I] Credentials (e.g. password string).
|
|
|
|
* method [I] Authentication method.
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Success: Message ID of the bind operation.
|
|
|
|
* Failure: An LDAP error code.
|
|
|
|
*
|
|
|
|
* NOTES
|
2005-12-02 11:26:19 +01:00
|
|
|
* Only LDAP_AUTH_SIMPLE is supported (just like native).
|
2005-11-28 20:41:08 +01:00
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_bindW( LDAP *ld, WCHAR *dn, WCHAR *cred, ULONG method )
|
2005-07-19 22:32:46 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
char *dnU = NULL, *credU = NULL;
|
2021-04-14 09:40:27 +02:00
|
|
|
struct bervalU pwd = { 0, NULL };
|
2005-11-18 16:05:01 +01:00
|
|
|
int msg;
|
2005-08-02 16:42:10 +02:00
|
|
|
|
2006-09-30 12:07:23 +02:00
|
|
|
TRACE( "(%p, %s, %p, 0x%08x)\n", ld, debugstr_w(dn), cred, method );
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2009-01-05 12:40:28 +01:00
|
|
|
if (!ld) return ~0u;
|
2021-04-19 10:04:54 +02:00
|
|
|
if (method != LDAP_AUTH_SIMPLE) return LDAP_PARAM_ERROR;
|
2005-11-18 16:05:01 +01:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (dn && !(dnU = strWtoU( dn ))) goto exit;
|
|
|
|
if (cred)
|
|
|
|
{
|
|
|
|
if (!(credU = strWtoU( cred ))) goto exit;
|
2005-11-18 16:05:01 +01:00
|
|
|
pwd.bv_len = strlen( credU );
|
|
|
|
pwd.bv_val = credU;
|
2005-07-26 12:30:49 +02:00
|
|
|
}
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
ret = map_error( ldap_funcs->fn_ldap_sasl_bind( CTX(ld), dnU, 0, &pwd, NULL, NULL, &msg ) );
|
|
|
|
if (ret == LDAP_SUCCESS)
|
2005-11-18 16:05:01 +01:00
|
|
|
ret = msg;
|
|
|
|
else
|
2009-01-05 12:40:28 +01:00
|
|
|
ret = ~0u;
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnU );
|
|
|
|
free( credU );
|
2005-07-19 22:32:46 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_bind_sA (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* See ldap_bind_sW.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_bind_sA( LDAP *ld, char *dn, char *cred, ULONG method )
|
2005-07-19 22:32:46 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
WCHAR *dnW = NULL, *credW = NULL;
|
2005-08-02 16:42:10 +02:00
|
|
|
|
2006-09-30 12:07:23 +02:00
|
|
|
TRACE( "(%p, %s, %p, 0x%08x)\n", ld, debugstr_a(dn), cred, method );
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld) return LDAP_PARAM_ERROR;
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (dn && !(dnW = strAtoW( dn ))) goto exit;
|
|
|
|
if (cred)
|
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
if (method == LDAP_AUTH_SIMPLE)
|
2020-03-23 14:14:15 +01:00
|
|
|
{
|
2021-04-14 09:40:27 +02:00
|
|
|
if (!(credW = strAtoW( cred ))) goto exit;
|
2020-03-23 14:14:15 +01:00
|
|
|
}
|
2021-04-14 09:40:27 +02:00
|
|
|
else credW = (WCHAR *)cred /* SEC_WINNT_AUTH_IDENTITY_A */;
|
2005-07-26 12:30:49 +02:00
|
|
|
}
|
2005-07-19 22:32:46 +02:00
|
|
|
|
|
|
|
ret = ldap_bind_sW( ld, dnW, credW, method );
|
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnW );
|
|
|
|
if (credW != (WCHAR *)cred) free( credW );
|
2005-07-19 22:32:46 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
int CDECL sasl_interact_cb( void *ld, unsigned flags, void *defaults, void *interact )
|
2020-03-23 14:14:15 +01:00
|
|
|
{
|
|
|
|
SEC_WINNT_AUTH_IDENTITY_A *id = defaults;
|
2021-04-14 09:40:27 +02:00
|
|
|
struct sasl_interactU *sasl = interact;
|
2020-03-23 14:14:15 +01:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
TRACE( "(%p, 0x%08x, %p, %p)\n", ld, flags, defaults, interact );
|
2020-03-23 14:14:15 +01:00
|
|
|
|
|
|
|
while (sasl->id != SASL_CB_LIST_END)
|
|
|
|
{
|
2021-04-14 09:40:27 +02:00
|
|
|
TRACE( "sasl->id = %04lx\n", sasl->id );
|
2020-03-23 14:14:15 +01:00
|
|
|
|
|
|
|
if (sasl->id == SASL_CB_GETREALM)
|
|
|
|
{
|
|
|
|
sasl->result = id->Domain;
|
|
|
|
sasl->len = id->DomainLength;
|
|
|
|
}
|
|
|
|
else if (sasl->id == SASL_CB_USER)
|
|
|
|
{
|
|
|
|
sasl->result = id->User;
|
|
|
|
sasl->len = id->UserLength;
|
|
|
|
}
|
|
|
|
else if (sasl->id == SASL_CB_PASS)
|
|
|
|
{
|
|
|
|
sasl->result = id->Password;
|
|
|
|
sasl->len = id->PasswordLength;
|
|
|
|
}
|
|
|
|
sasl++;
|
|
|
|
}
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
return LDAP_SUCCESS;
|
2020-03-23 14:14:15 +01:00
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_bind_sW (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* Authenticate with an LDAP server (synchronous operation).
|
|
|
|
*
|
2005-12-02 11:26:19 +01:00
|
|
|
* PARAMS
|
2005-11-28 20:41:08 +01:00
|
|
|
* ld [I] Pointer to an LDAP context.
|
|
|
|
* dn [I] DN of entry to bind as.
|
|
|
|
* cred [I] Credentials (e.g. password string).
|
|
|
|
* method [I] Authentication method.
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Success: LDAP_SUCCESS
|
|
|
|
* Failure: An LDAP error code.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_bind_sW( LDAP *ld, WCHAR *dn, WCHAR *cred, ULONG method )
|
2005-07-19 22:32:46 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
char *dnU = NULL, *credU = NULL;
|
2021-04-14 09:40:27 +02:00
|
|
|
struct bervalU pwd = { 0, NULL };
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2006-09-30 12:07:23 +02:00
|
|
|
TRACE( "(%p, %s, %p, 0x%08x)\n", ld, debugstr_w(dn), cred, method );
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld) return LDAP_PARAM_ERROR;
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (method == LDAP_AUTH_SIMPLE)
|
2020-03-23 14:14:15 +01:00
|
|
|
{
|
2021-04-14 09:40:27 +02:00
|
|
|
if (dn && !(dnU = strWtoU( dn ))) goto exit;
|
2020-03-23 14:14:15 +01:00
|
|
|
if (cred)
|
|
|
|
{
|
2021-04-14 09:40:27 +02:00
|
|
|
if (!(credU = strWtoU( cred ))) goto exit;
|
2020-03-23 14:14:15 +01:00
|
|
|
pwd.bv_len = strlen( credU );
|
|
|
|
pwd.bv_val = credU;
|
|
|
|
}
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
ret = map_error( ldap_funcs->fn_ldap_sasl_bind_s( CTX(ld), dnU, 0, &pwd, NULL, NULL, NULL ) );
|
2005-07-26 12:30:49 +02:00
|
|
|
}
|
2021-04-19 10:04:54 +02:00
|
|
|
else if (method == LDAP_AUTH_NEGOTIATE)
|
2020-03-23 14:14:15 +01:00
|
|
|
{
|
|
|
|
SEC_WINNT_AUTH_IDENTITY_A idU;
|
|
|
|
SEC_WINNT_AUTH_IDENTITY_W idW;
|
|
|
|
SEC_WINNT_AUTH_IDENTITY_W *id = (SEC_WINNT_AUTH_IDENTITY_W *)cred;
|
|
|
|
|
|
|
|
memset( &idU, 0, sizeof(idU) );
|
|
|
|
if (id)
|
|
|
|
{
|
|
|
|
if (id->Flags & SEC_WINNT_AUTH_IDENTITY_ANSI)
|
|
|
|
{
|
|
|
|
idW.Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE;
|
|
|
|
idW.Domain = (unsigned short *)strnAtoW( (char *)id->Domain, id->DomainLength, &idW.DomainLength );
|
|
|
|
idW.User = (unsigned short *)strnAtoW( (char *)id->User, id->UserLength, &idW.UserLength );
|
|
|
|
idW.Password = (unsigned short *)strnAtoW( (char *)id->Password, id->PasswordLength, &idW.PasswordLength );
|
|
|
|
id = &idW;
|
|
|
|
}
|
|
|
|
idU.Domain = (unsigned char *)strnWtoU( id->Domain, id->DomainLength, &idU.DomainLength );
|
|
|
|
idU.User = (unsigned char *)strnWtoU( id->User, id->UserLength, &idU.UserLength );
|
|
|
|
idU.Password = (unsigned char *)strnWtoU( id->Password, id->PasswordLength, &idU.PasswordLength );
|
|
|
|
}
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
ret = map_error( ldap_funcs->fn_ldap_sasl_interactive_bind_s( CTX(ld),
|
|
|
|
NULL /* server will ignore DN anyway */,
|
|
|
|
NULL /* query supportedSASLMechanisms */,
|
|
|
|
NULL, NULL, 2 /* LDAP_SASL_QUIET */, &idU ) );
|
2020-03-23 14:14:15 +01:00
|
|
|
|
|
|
|
if (id && (id->Flags & SEC_WINNT_AUTH_IDENTITY_ANSI))
|
|
|
|
{
|
2021-04-19 10:04:52 +02:00
|
|
|
free( (WCHAR *)idW.Domain );
|
|
|
|
free( (WCHAR *)idW.User );
|
|
|
|
free( (WCHAR *)idW.Password );
|
2020-03-23 14:14:15 +01:00
|
|
|
}
|
|
|
|
|
2021-04-19 10:04:52 +02:00
|
|
|
free( (char *)idU.Domain );
|
|
|
|
free( (char *)idU.User );
|
|
|
|
free( (char *)idU.Password );
|
2020-03-23 14:14:15 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
FIXME( "method %#x not supported\n", method );
|
2021-04-19 10:04:54 +02:00
|
|
|
return LDAP_PARAM_ERROR;
|
2005-07-26 12:30:49 +02:00
|
|
|
}
|
2005-07-19 22:32:46 +02:00
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnU );
|
|
|
|
free( credU );
|
2005-07-19 22:32:46 +02:00
|
|
|
return ret;
|
|
|
|
}
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_sasl_bindA (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* See ldap_sasl_bindW.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_sasl_bindA( LDAP *ld, const PCHAR dn, const PCHAR mechanism, const BERVAL *cred,
|
2021-04-14 09:40:27 +02:00
|
|
|
LDAPControlA **serverctrls, LDAPControlA **clientctrls, int *message )
|
2005-07-24 19:10:46 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
WCHAR *dnW, *mechanismW = NULL;
|
|
|
|
LDAPControlW **serverctrlsW = NULL, **clientctrlsW = NULL;
|
2005-08-02 16:42:10 +02:00
|
|
|
|
2005-07-24 19:10:46 +02:00
|
|
|
TRACE( "(%p, %s, %s, %p, %p, %p, %p)\n", ld, debugstr_a(dn),
|
|
|
|
debugstr_a(mechanism), cred, serverctrls, clientctrls, message );
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld || !dn || !mechanism || !cred || !message) return LDAP_PARAM_ERROR;
|
2005-07-26 12:30:49 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (!(dnW = strAtoW( dn ))) goto exit;
|
|
|
|
if (!(mechanismW = strAtoW( mechanism ))) goto exit;
|
|
|
|
if (serverctrls && !(serverctrlsW = controlarrayAtoW( serverctrls ))) goto exit;
|
|
|
|
if (clientctrls && !(clientctrlsW = controlarrayAtoW( clientctrls ))) goto exit;
|
2005-07-24 19:10:46 +02:00
|
|
|
|
|
|
|
ret = ldap_sasl_bindW( ld, dnW, mechanismW, cred, serverctrlsW, clientctrlsW, message );
|
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnW );
|
|
|
|
free( mechanismW );
|
2005-07-24 19:10:46 +02:00
|
|
|
controlarrayfreeW( serverctrlsW );
|
|
|
|
controlarrayfreeW( clientctrlsW );
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_sasl_bindW (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* Authenticate with an LDAP server using SASL (asynchronous operation).
|
|
|
|
*
|
2005-12-02 11:26:19 +01:00
|
|
|
* PARAMS
|
2005-11-28 20:41:08 +01:00
|
|
|
* ld [I] Pointer to an LDAP context.
|
|
|
|
* dn [I] DN of entry to bind as.
|
|
|
|
* mechanism [I] Authentication method.
|
|
|
|
* cred [I] Credentials.
|
|
|
|
* serverctrls [I] Array of LDAP server controls.
|
|
|
|
* clientctrls [I] Array of LDAP client controls.
|
2021-04-14 09:40:27 +02:00
|
|
|
* message [O] Message ID of the bind operation.
|
2005-11-28 20:41:08 +01:00
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Success: LDAP_SUCCESS
|
|
|
|
* Failure: An LDAP error code.
|
|
|
|
*
|
|
|
|
* NOTES
|
|
|
|
* The serverctrls and clientctrls parameters are optional and should
|
|
|
|
* be set to NULL if not used.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_sasl_bindW( LDAP *ld, const PWCHAR dn, const PWCHAR mechanism, const BERVAL *cred,
|
2021-04-14 09:40:27 +02:00
|
|
|
LDAPControlW **serverctrls, LDAPControlW **clientctrls, int *message )
|
2005-07-24 19:10:46 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
char *dnU, *mechanismU = NULL;
|
2021-04-14 09:40:27 +02:00
|
|
|
LDAPControlU **serverctrlsU = NULL, **clientctrlsU = NULL;
|
|
|
|
struct bervalU credU;
|
2005-07-24 19:10:46 +02:00
|
|
|
|
|
|
|
TRACE( "(%p, %s, %s, %p, %p, %p, %p)\n", ld, debugstr_w(dn),
|
|
|
|
debugstr_w(mechanism), cred, serverctrls, clientctrls, message );
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld || !dn || !mechanism || !cred || !message) return LDAP_PARAM_ERROR;
|
2005-07-26 12:30:49 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (!(dnU = strWtoU( dn ))) goto exit;
|
|
|
|
if (!(mechanismU = strWtoU( mechanism ))) goto exit;
|
|
|
|
if (serverctrls && !(serverctrlsU = controlarrayWtoU( serverctrls ))) goto exit;
|
|
|
|
if (clientctrls && !(clientctrlsU = controlarrayWtoU( clientctrls ))) goto exit;
|
2005-07-24 19:10:46 +02:00
|
|
|
|
2006-10-05 15:37:39 +02:00
|
|
|
credU.bv_len = cred->bv_len;
|
|
|
|
credU.bv_val = cred->bv_val;
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
ret = map_error( ldap_funcs->fn_ldap_sasl_bind( CTX(ld), dnU, mechanismU, &credU, serverctrlsU, clientctrlsU,
|
|
|
|
message ) );
|
2005-07-24 19:10:46 +02:00
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnU );
|
|
|
|
free( mechanismU );
|
2005-07-24 19:10:46 +02:00
|
|
|
controlarrayfreeU( serverctrlsU );
|
|
|
|
controlarrayfreeU( clientctrlsU );
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_sasl_bind_sA (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* See ldap_sasl_bind_sW.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_sasl_bind_sA( LDAP *ld, const PCHAR dn, const PCHAR mechanism, const BERVAL *cred,
|
2021-04-14 09:40:27 +02:00
|
|
|
LDAPControlA **serverctrls, LDAPControlA **clientctrls, BERVAL **serverdata )
|
2005-07-24 19:10:46 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
WCHAR *dnW, *mechanismW = NULL;
|
|
|
|
LDAPControlW **serverctrlsW = NULL, **clientctrlsW = NULL;
|
2005-08-02 16:42:10 +02:00
|
|
|
|
2005-07-24 19:10:46 +02:00
|
|
|
TRACE( "(%p, %s, %s, %p, %p, %p, %p)\n", ld, debugstr_a(dn),
|
|
|
|
debugstr_a(mechanism), cred, serverctrls, clientctrls, serverdata );
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld || !dn || !mechanism || !cred || !serverdata) return LDAP_PARAM_ERROR;
|
2005-07-26 12:30:49 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (!(dnW = strAtoW( dn ))) goto exit;
|
|
|
|
if (!(mechanismW = strAtoW( mechanism ))) goto exit;
|
|
|
|
if (serverctrls && !(serverctrlsW = controlarrayAtoW( serverctrls ))) goto exit;
|
|
|
|
if (clientctrls && !(clientctrlsW = controlarrayAtoW( clientctrls ))) goto exit;
|
2005-07-24 19:10:46 +02:00
|
|
|
|
|
|
|
ret = ldap_sasl_bind_sW( ld, dnW, mechanismW, cred, serverctrlsW, clientctrlsW, serverdata );
|
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnW );
|
|
|
|
free( mechanismW );
|
2005-07-24 19:10:46 +02:00
|
|
|
controlarrayfreeW( serverctrlsW );
|
|
|
|
controlarrayfreeW( clientctrlsW );
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_sasl_bind_sW (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* Authenticate with an LDAP server using SASL (synchronous operation).
|
|
|
|
*
|
2005-12-02 11:26:19 +01:00
|
|
|
* PARAMS
|
2005-11-28 20:41:08 +01:00
|
|
|
* ld [I] Pointer to an LDAP context.
|
|
|
|
* dn [I] DN of entry to bind as.
|
|
|
|
* mechanism [I] Authentication method.
|
|
|
|
* cred [I] Credentials.
|
|
|
|
* serverctrls [I] Array of LDAP server controls.
|
|
|
|
* clientctrls [I] Array of LDAP client controls.
|
|
|
|
* serverdata [O] Authentication response from the server.
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Success: LDAP_SUCCESS
|
|
|
|
* Failure: An LDAP error code.
|
|
|
|
*
|
|
|
|
* NOTES
|
|
|
|
* The serverctrls and clientctrls parameters are optional and should
|
|
|
|
* be set to NULL if not used.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_sasl_bind_sW( LDAP *ld, const PWCHAR dn, const PWCHAR mechanism, const BERVAL *cred,
|
|
|
|
LDAPControlW **serverctrls, LDAPControlW **clientctrls, BERVAL **serverdata )
|
2005-07-24 19:10:46 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
char *dnU, *mechanismU = NULL;
|
2021-04-14 09:40:27 +02:00
|
|
|
LDAPControlU **serverctrlsU = NULL, **clientctrlsU = NULL;
|
|
|
|
struct bervalU *dataU, credU;
|
2005-07-24 19:10:46 +02:00
|
|
|
|
|
|
|
TRACE( "(%p, %s, %s, %p, %p, %p, %p)\n", ld, debugstr_w(dn),
|
|
|
|
debugstr_w(mechanism), cred, serverctrls, clientctrls, serverdata );
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld || !dn || !mechanism || !cred || !serverdata) return LDAP_PARAM_ERROR;
|
2005-07-26 12:30:49 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (!(dnU = strWtoU( dn ))) goto exit;
|
|
|
|
if (!(mechanismU = strWtoU( mechanism ))) goto exit;
|
|
|
|
if (serverctrls && !(serverctrlsU = controlarrayWtoU( serverctrls ))) goto exit;
|
|
|
|
if (clientctrls && !(clientctrlsU = controlarrayWtoU( clientctrls ))) goto exit;
|
2005-07-24 19:10:46 +02:00
|
|
|
|
2006-10-05 15:37:39 +02:00
|
|
|
credU.bv_len = cred->bv_len;
|
|
|
|
credU.bv_val = cred->bv_val;
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
ret = map_error( ldap_funcs->fn_ldap_sasl_bind_s( CTX(ld), dnU, mechanismU, &credU, serverctrlsU, clientctrlsU,
|
|
|
|
&dataU ) );
|
|
|
|
if (ret == LDAP_SUCCESS)
|
2021-04-14 09:40:27 +02:00
|
|
|
{
|
|
|
|
BERVAL *ptr;
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!(ptr = bervalUtoW( dataU ))) ret = LDAP_NO_MEMORY;
|
2021-04-14 09:40:27 +02:00
|
|
|
else *serverdata = ptr;
|
2021-04-19 10:04:54 +02:00
|
|
|
ldap_funcs->fn_ber_bvfree( dataU );
|
2021-04-14 09:40:27 +02:00
|
|
|
}
|
2005-07-24 19:10:46 +02:00
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnU );
|
|
|
|
free( mechanismU );
|
2005-07-24 19:10:46 +02:00
|
|
|
controlarrayfreeU( serverctrlsU );
|
|
|
|
controlarrayfreeU( clientctrlsU );
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_simple_bindA (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* See ldap_simple_bindW.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_simple_bindA( LDAP *ld, char *dn, char *passwd )
|
2005-07-20 19:47:53 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
WCHAR *dnW = NULL, *passwdW = NULL;
|
2005-08-02 16:42:10 +02:00
|
|
|
|
2005-07-20 19:47:53 +02:00
|
|
|
TRACE( "(%p, %s, %p)\n", ld, debugstr_a(dn), passwd );
|
|
|
|
|
2009-01-05 12:40:28 +01:00
|
|
|
if (!ld) return ~0u;
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (dn && !(dnW = strAtoW( dn ))) goto exit;
|
|
|
|
if (passwd && !(passwdW = strAtoW( passwd ))) goto exit;
|
2005-07-20 19:47:53 +02:00
|
|
|
|
|
|
|
ret = ldap_simple_bindW( ld, dnW, passwdW );
|
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnW );
|
|
|
|
free( passwdW );
|
2005-07-20 19:47:53 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_simple_bindW (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* Authenticate with an LDAP server (asynchronous operation).
|
|
|
|
*
|
2005-12-02 11:26:19 +01:00
|
|
|
* PARAMS
|
2005-11-28 20:41:08 +01:00
|
|
|
* ld [I] Pointer to an LDAP context.
|
|
|
|
* dn [I] DN of entry to bind as.
|
|
|
|
* passwd [I] Password string.
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Success: Message ID of the bind operation.
|
|
|
|
* Failure: An LDAP error code.
|
|
|
|
*
|
|
|
|
* NOTES
|
2021-04-14 09:40:27 +02:00
|
|
|
* Set dn and passwd to NULL to bind as an anonymous user.
|
2005-11-28 20:41:08 +01:00
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_simple_bindW( LDAP *ld, WCHAR *dn, WCHAR *passwd )
|
2005-07-20 19:47:53 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
char *dnU = NULL, *passwdU = NULL;
|
2021-04-14 09:40:27 +02:00
|
|
|
struct bervalU pwd = { 0, NULL };
|
2005-11-18 16:05:01 +01:00
|
|
|
int msg;
|
2005-08-02 16:42:10 +02:00
|
|
|
|
2005-07-20 19:47:53 +02:00
|
|
|
TRACE( "(%p, %s, %p)\n", ld, debugstr_w(dn), passwd );
|
|
|
|
|
2009-01-05 12:40:28 +01:00
|
|
|
if (!ld) return ~0u;
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (dn && !(dnU = strWtoU( dn ))) goto exit;
|
|
|
|
if (passwd)
|
|
|
|
{
|
|
|
|
if (!(passwdU = strWtoU( passwd ))) goto exit;
|
2005-11-18 16:05:01 +01:00
|
|
|
pwd.bv_len = strlen( passwdU );
|
|
|
|
pwd.bv_val = passwdU;
|
2005-07-26 12:30:49 +02:00
|
|
|
}
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
ret = map_error( ldap_funcs->fn_ldap_sasl_bind( CTX(ld), dnU, 0, &pwd, NULL, NULL, &msg ) );
|
|
|
|
if (ret == LDAP_SUCCESS)
|
2005-11-18 16:05:01 +01:00
|
|
|
ret = msg;
|
|
|
|
else
|
2009-01-05 12:40:28 +01:00
|
|
|
ret = ~0u;
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnU );
|
|
|
|
free( passwdU );
|
2005-07-20 19:47:53 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_simple_bind_sA (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* See ldap_simple_bind_sW.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_simple_bind_sA( LDAP *ld, char *dn, char *passwd )
|
2005-07-20 19:47:53 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
WCHAR *dnW = NULL, *passwdW = NULL;
|
2005-08-02 16:42:10 +02:00
|
|
|
|
2005-07-20 19:47:53 +02:00
|
|
|
TRACE( "(%p, %s, %p)\n", ld, debugstr_a(dn), passwd );
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld) return LDAP_PARAM_ERROR;
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (dn && !(dnW = strAtoW( dn ))) goto exit;
|
|
|
|
if (passwd && !(passwdW = strAtoW( passwd ))) goto exit;
|
2005-07-20 19:47:53 +02:00
|
|
|
|
|
|
|
ret = ldap_simple_bind_sW( ld, dnW, passwdW );
|
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnW );
|
|
|
|
free( passwdW );
|
2005-07-20 19:47:53 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_simple_bind_sW (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* Authenticate with an LDAP server (synchronous operation).
|
|
|
|
*
|
2005-12-02 11:26:19 +01:00
|
|
|
* PARAMS
|
2005-11-28 20:41:08 +01:00
|
|
|
* ld [I] Pointer to an LDAP context.
|
|
|
|
* dn [I] DN of entry to bind as.
|
|
|
|
* passwd [I] Password string.
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Success: LDAP_SUCCESS
|
|
|
|
* Failure: An LDAP error code.
|
|
|
|
*
|
|
|
|
* NOTES
|
2021-04-14 09:40:27 +02:00
|
|
|
* Set dn and passwd to NULL to bind as an anonymous user.
|
2005-11-28 20:41:08 +01:00
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_simple_bind_sW( LDAP *ld, WCHAR *dn, WCHAR *passwd )
|
2005-07-20 19:47:53 +02:00
|
|
|
{
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG ret = LDAP_NO_MEMORY;
|
2005-07-26 12:30:49 +02:00
|
|
|
char *dnU = NULL, *passwdU = NULL;
|
2021-04-14 09:40:27 +02:00
|
|
|
struct bervalU pwd = { 0, NULL };
|
2005-07-20 19:47:53 +02:00
|
|
|
|
|
|
|
TRACE( "(%p, %s, %p)\n", ld, debugstr_w(dn), passwd );
|
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld) return LDAP_PARAM_ERROR;
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2021-04-14 09:40:27 +02:00
|
|
|
if (dn && !(dnU = strWtoU( dn ))) goto exit;
|
|
|
|
if (passwd)
|
|
|
|
{
|
|
|
|
if (!(passwdU = strWtoU( passwd ))) goto exit;
|
2005-11-18 16:05:01 +01:00
|
|
|
pwd.bv_len = strlen( passwdU );
|
|
|
|
pwd.bv_val = passwdU;
|
2005-07-26 12:30:49 +02:00
|
|
|
}
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
ret = map_error( ldap_funcs->fn_ldap_sasl_bind_s( CTX(ld), dnU, 0, &pwd, NULL, NULL, NULL ) );
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2005-07-26 12:30:49 +02:00
|
|
|
exit:
|
2021-04-19 10:04:52 +02:00
|
|
|
free( dnU );
|
|
|
|
free( passwdU );
|
2005-07-20 19:47:53 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_unbind (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* Close LDAP connection and free resources (asynchronous operation).
|
|
|
|
*
|
2005-12-02 11:26:19 +01:00
|
|
|
* PARAMS
|
2005-11-28 20:41:08 +01:00
|
|
|
* ld [I] Pointer to an LDAP context.
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Success: LDAP_SUCCESS
|
|
|
|
* Failure: An LDAP error code.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_unbind( LDAP *ld )
|
2005-07-20 19:47:53 +02:00
|
|
|
{
|
2021-04-14 09:40:27 +02:00
|
|
|
ULONG ret;
|
2005-07-20 19:47:53 +02:00
|
|
|
|
|
|
|
TRACE( "(%p)\n", ld );
|
2005-07-26 12:30:49 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld) return LDAP_PARAM_ERROR;
|
2021-04-14 09:40:27 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
ret = map_error( ldap_funcs->fn_ldap_unbind_ext( CTX(ld), NULL, NULL ));
|
|
|
|
if (SERVER_CTRLS(ld)) ldap_funcs->fn_ldap_value_free_len( SERVER_CTRLS(ld) );
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2021-04-19 10:04:52 +02:00
|
|
|
free( ld );
|
2005-07-20 19:47:53 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-11-28 20:41:08 +01:00
|
|
|
/***********************************************************************
|
|
|
|
* ldap_unbind_s (WLDAP32.@)
|
|
|
|
*
|
|
|
|
* Close LDAP connection and free resources (synchronous operation).
|
|
|
|
*
|
2005-12-02 11:26:19 +01:00
|
|
|
* PARAMS
|
2005-11-28 20:41:08 +01:00
|
|
|
* ld [I] Pointer to an LDAP context.
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Success: LDAP_SUCCESS
|
|
|
|
* Failure: An LDAP error code.
|
|
|
|
*/
|
2021-04-19 10:04:54 +02:00
|
|
|
ULONG CDECL ldap_unbind_s( LDAP *ld )
|
2005-07-20 19:47:53 +02:00
|
|
|
{
|
2021-04-14 09:40:27 +02:00
|
|
|
ULONG ret;
|
2005-07-20 19:47:53 +02:00
|
|
|
|
|
|
|
TRACE( "(%p)\n", ld );
|
2005-07-26 12:30:49 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
if (!ld) return LDAP_PARAM_ERROR;
|
2021-04-14 09:40:27 +02:00
|
|
|
|
2021-04-19 10:04:54 +02:00
|
|
|
ret = map_error( ldap_funcs->fn_ldap_unbind_ext_s( CTX(ld), NULL, NULL ) );
|
|
|
|
if (SERVER_CTRLS(ld)) ldap_funcs->fn_ldap_value_free_len( SERVER_CTRLS(ld) );
|
2005-07-20 19:47:53 +02:00
|
|
|
|
2021-04-19 10:04:52 +02:00
|
|
|
free( ld );
|
2005-07-20 19:47:53 +02:00
|
|
|
return ret;
|
|
|
|
}
|