26RCSID(
"$Id: 92b570cb9302b70825f909ce1ded121b28eb250c $")
30#include <freeradius-devel/ldap/base.h>
31#include <freeradius-devel/util/base16.h>
33#include <freeradius-devel/util/value.h>
39static const char hextab[] =
"0123456789abcdef";
106 return outlen - left;
121 if (!fr_sbuff_init_talloc(vb, &sbuff, &sbuff_ctx, vb->vb_length * 3, vb->vb_length * 3)) {
131 if (len == vb->vb_length) {
157 size_t left = outlen;
161 if (left <= 3)
break;
172 if (left <= 1)
break;
180 return outlen - left;
195 if (!fr_sbuff_init_talloc(vb, &sbuff, &sbuff_ctx, vb->vb_length * 3, vb->vb_length * 3)) {
202 if (len == vb->vb_length) {
232 size_t freespace = outlen;
234 if (outlen <= 1)
return 0;
237 while (*p && (--freespace > 0)) {
253 if (!(c1 = memchr(
hextab, tolower(p[0]), 16)) ||
254 !(c2 = memchr(
hextab, tolower(p[1]), 16)))
goto next;
263 return outlen - freespace;
280 bool too_soon =
true;
292 if (
inlen < 2)
return false;
315 if (
inlen < 3)
return false;
334 if (too_soon || (*p != want))
return false;
340 if (too_soon || (*p != want))
return false;
358 if (too_soon || (
comp < 2))
return false;
375 LDAPControl **sss_p = sss, **sss_end = sss_p + sss_len;
386 for (i = 0; extensions[i]; i++) {
388 bool is_critical =
false;
390 if (sss_p == sss_end) {
407 "in the format \"[!]sss=<key>[,key]\"");
411 if (*s) ldap_control_free(*s);
418 if (ret != LDAP_SUCCESS) {
424 if (*sss_p) ldap_control_free(*sss_p);
427 ldap_free_sort_keylist(keys);
428 if (ret != LDAP_SUCCESS) {
430 ldap_err2string(ret));
441 struct berval attr_value;
447 "in the format \"[!]vlv=<before>/<after>(/<offset>/<count>|:<value>)");
451 vlvinfo.ldvlv_context = NULL;
453 if (
fr_sbuff_out(NULL, &ext_value, &sbuff) <= 0)
goto vlv_error;
455 vlvinfo.ldvlv_before_count = ext_value;
457 if (
fr_sbuff_out(NULL, &ext_value, &sbuff) <= 0)
goto vlv_error;
458 vlvinfo.ldvlv_after_count = ext_value;
463 vlvinfo.ldvlv_attrvalue = NULL;
465 if (
fr_sbuff_out(NULL, &ext_value, &sbuff) <= 0)
goto vlv_error;
467 vlvinfo.ldvlv_offset = ext_value;
469 if (
fr_sbuff_out(NULL, &ext_value, &sbuff) <= 0)
goto vlv_error;
470 vlvinfo.ldvlv_count = ext_value;
476 vlvinfo.ldvlv_attrvalue = &attr_value;
482 if (ret != LDAP_SUCCESS) {
484 ldap_err2string(ret));
497 return (sss_end - sss_p);
516 out = talloc_array(ctx,
char,
in->bv_len + 1);
517 if (!
out)
return NULL;
519 memcpy(
out,
in->bv_val,
in->bv_len);
520 out[
in->bv_len] =
'\0';
536 if (!
out)
return NULL;
538 memcpy(
out,
in->bv_val,
in->bv_len);
566 for (p =
in; *p !=
'\0'; p++) {
612 size_t f_len, p_len, i;
614 if (!full)
return -1;
616 f_len = strlen(full);
618 if (!part)
return -1;
620 p_len = strlen(part);
621 if (!p_len)
return f_len;
623 if ((f_len < p_len) || !f_len)
return -1;
625 for (i = 0; i < p_len; i++)
if (part[p_len - i] != full[f_len - i])
return -1;
627 return f_len - p_len;
642 char const *
in = NULL;
653 for (i = 0; i < sublen; i++) {
654 if (sub[i] && *sub[i]) {
657 len += strlen(sub[i]);
667 buffer = talloc_array(ctx,
char, len + 4);
670 for (i = 0; i < sublen; i++) {
671 if (sub[i] && (*sub[i] !=
'\0')) {
705 if (!attr)
return -1;
707 len = talloc_array_length(attrs);
709 for (i = 0; i < len; i++) {
710 if (!attrs[i])
continue;
711 if (
strcasecmp(attrs[i], attr) == 0)
return 1;
729 LDAPURLDesc *ldap_url;
730 bool set_port_maybe =
true;
731 int default_port = LDAP_PORT;
736 if (ldap_url_parse(server, &ldap_url)) {
737 cf_log_err(ci,
"Parsing LDAP URL \"%s\" failed", server);
739 ldap_free_urldesc(ldap_url);
743 if (ldap_url->lud_dn && (ldap_url->lud_dn[0] !=
'\0')) {
744 cf_log_err(ci,
"Base DN cannot be specified via server URL");
748 if (ldap_url->lud_attrs && ldap_url->lud_attrs[0]) {
749 cf_log_err(ci,
"Attribute list cannot be speciried via server URL");
756 if (ldap_url->lud_scope != LDAP_SCOPE_BASE) {
757 cf_log_err(ci,
"Scope cannot be specified via server URL");
760 ldap_url->lud_scope = -1;
767 if ((p = strchr(server,
']')) && (p[1] ==
':')) {
768 set_port_maybe =
false;
769 }
else if ((p = strchr(server,
':')) && (strchr(p+1,
':') != NULL)) {
770 set_port_maybe =
false;
776 if (ldap_url->lud_scheme) {
777 if (strcmp(ldap_url->lud_scheme,
"ldaps") == 0) {
779 cf_log_err(ci,
"ldaps:// scheme is not compatible with 'start_tls'");
782 default_port = LDAPS_PORT;
783 handle_config->
tls_mode = LDAP_OPT_X_TLS_HARD;
784 }
else if (strcmp(ldap_url->lud_scheme,
"ldapi") == 0) {
785 set_port_maybe =
false;
789 if (set_port_maybe) {
793 ldap_url->lud_port = handle_config->
port;
800 if (!ldap_url->lud_port) ldap_url->lud_port = default_port;
803 url = ldap_url_desc2str(ldap_url);
805 cf_log_err(ci,
"Failed recombining URL components");
808 handle_config->
server = talloc_asprintf_append(handle_config->
server,
"%s ",
url);
810 ldap_free_urldesc(ldap_url);
831 port = handle_config->
port;
837 if (strchr(server,
'/')) {
841 cf_log_err(ci,
"Invalid 'server' entry, must be in format <server>[:<port>] or "
842 "an ldap URI (ldap|cldap|ldaps|ldapi)://<server>:<port>");
846 p = strrchr(server,
':');
848 port = (int)strtol((p + 1), &q, 10);
849 if ((p == server) || ((p + 1) == q) || (*q !=
'\0'))
goto bad_server_fmt;
852 len = strlen(server);
854 if (port == 0) port = LDAP_PORT;
856 handle_config->
server = talloc_asprintf_append(handle_config->
server,
"ldap://%.*s:%i ",
857 (
int)len, server, port);
867 switch (ldap_url_err) {
868 case LDAP_URL_SUCCESS:
871 case LDAP_URL_ERR_MEM:
874 case LDAP_URL_ERR_PARAM:
875 return "parameter is bad";
877 case LDAP_URL_ERR_BADSCHEME:
878 return "URL doesn't begin with \"[c]ldap[si]://\"";
880 case LDAP_URL_ERR_BADENCLOSURE:
881 return "URL is missing trailing \">\"";
883 case LDAP_URL_ERR_BADURL:
886 case LDAP_URL_ERR_BADHOST:
887 return "host/port is bad";
889 case LDAP_URL_ERR_BADATTRS:
890 return "bad (or missing) attributes";
892 case LDAP_URL_ERR_BADSCOPE:
893 return "scope string is invalid (or missing)";
895 case LDAP_URL_ERR_BADFILTER:
896 return "bad or missing filter";
898 case LDAP_URL_ERR_BADEXTS:
899 return "bad or missing extensions";
902 return "unknown reason";
915 BerElement *ber = NULL;
917 struct berval **vals;
922 msgtype = ldap_msgtype(entry);
924 case LDAP_RES_SEARCH_ENTRY:
925 dn = ldap_get_dn(ld, entry);
931 for (attr = ldap_first_attribute(ld, entry, &ber);
933 attr = ldap_next_attribute(ld, entry, ber)) {
934 vals = ldap_get_values_len(ld, entry, attr);
936 DEBUG(
"%s: no values", attr);
941 for (i = 0; vals[i] != NULL; i++) {
945 for (j = 0; j < vals[i]->bv_len; j++) {
946 char c = vals[i]->bv_val[j];
947 if ((c < 32) || (c > 126)) {
961 ldap_value_free_len(vals);
966 case LDAP_RES_SEARCH_RESULT:
968 case LDAP_RES_MODIFY:
970 case LDAP_RES_DELETE:
971 case LDAP_RES_COMPARE:
972 case LDAP_RES_EXTENDED:
975 char *matched = NULL;
979 rc = ldap_parse_result(ld, entry, &msgtype, &matched, &errmsg, &refs, NULL, 0);
980 if (rc != LDAP_SUCCESS) {
981 DEBUG(
"failed to parse result: %s", ldap_err2string(rc));
985 DEBUG(
"result code: %d (%s)", msgtype, ldap_err2string(msgtype));
987 if (matched && *matched) {
988 DEBUG(
"matched DN: %s", matched);
990 if (errmsg && *errmsg) {
991 DEBUG(
"error message: %s", errmsg);
994 for (i = 0; refs[i] != NULL; i++) {
995 DEBUG(
"referral: %s", refs[i]);
999 if (matched) ldap_memfree(matched);
1000 if (errmsg) ldap_memfree(errmsg);
1001 if (refs) ldap_memvfree((
void **)refs);
1006 DEBUG(
"unhandled LDAP message type: %d", msgtype);
1010 if (ber) ber_free(ber, 0);
static int const char char buffer[256]
strcpy(log_entry->msg, buffer)
#define fr_base16_decode(_err, _out, _in, _no_trailing)
#define USES_APPLE_DEPRECATED_API
Common header for all CONF_* types.
A section grouping multiple CONF_PAIR.
CONF_PAIR * cf_pair_find(CONF_SECTION const *cs, char const *attr)
Search for a CONF_PAIR with a specific name.
#define cf_log_err(_cf, _fmt,...)
#define FR_DBUFF_TMP(_start, _len_or_end)
Creates a compound literal to pass into functions which accept a dbuff.
char * server
Initial server to bind to.
bool start_tls
Send the Start TLS message to the LDAP directory to start encrypted communications using the standard...
uint16_t port
Port to use when binding to the server.
Connection configuration.
LDAP * fr_ldap_handle_thread_local(void)
Get a thread local dummy LDAP handle.
char const * fr_ldap_url_err_to_str(int ldap_url_err)
Translate the error code emitted from ldap_url_parse and friends into something accessible with fr_st...
static const char hextab[]
size_t fr_ldap_util_normalise_dn(char *out, char const *in)
Normalise escape sequences in a DN.
static const bool escapes[SBUFF_CHAR_CLASS]
int fr_ldap_filter_box_escape(fr_value_box_t *vb, UNUSED void *uctx)
bool fr_ldap_util_is_dn(char const *in, size_t inlen)
Check whether a string looks like a DN.
size_t fr_ldap_common_dn(char const *full, char const *part)
Find the place at which the two DN strings diverge.
int fr_ldap_attrs_check(char const **attrs, char const *attr)
Check that a particular attribute is included in an attribute list.
uint8_t * fr_ldap_berval_to_bin(TALLOC_CTX *ctx, struct berval const *in)
Convert a berval to a talloced buffer.
int fr_ldap_server_url_check(fr_ldap_config_t *handle_config, char const *server, CONF_SECTION const *cs)
Check an LDAP server entry in URL format is valid.
static USES_APPLE_DEPRECATED_API const char dn_specials[]
char * fr_ldap_berval_to_string(TALLOC_CTX *ctx, struct berval const *in)
Convert a berval to a talloced string.
static const char filter_specials[]
int fr_ldap_server_config_check(fr_ldap_config_t *handle_config, char const *server, CONF_SECTION *cs)
Check an LDAP server config in server:port format is valid.
int fr_ldap_dn_box_escape(fr_value_box_t *vb, UNUSED void *uctx)
size_t fr_ldap_dn_escape_func(UNUSED request_t *request, char *out, size_t outlen, char const *in, UNUSED void *arg)
Escape a string for use as an RFC 4514 DN attribute value.
size_t fr_ldap_uri_unescape_func(UNUSED request_t *request, char *out, size_t outlen, char const *in, UNUSED void *arg)
Converts escaped DNs and filter strings into normal.
void fr_ldap_entry_dump(LDAPMessage *entry)
Dump out the contents of an LDAPMessage.
int fr_ldap_parse_url_extensions(LDAPControl **sss, size_t sss_len, char *extensions[])
Parse a subset (just server side sort and virtual list view for now) of LDAP URL extensions.
int fr_ldap_filter_to_tmpl(TALLOC_CTX *ctx, tmpl_rules_t const *t_rules, char const **sub, size_t sublen, tmpl_t **out)
Combine filters and tokenize to a tmpl.
size_t fr_ldap_filter_escape_func(UNUSED request_t *request, char *out, size_t outlen, char const *in, UNUSED void *arg)
Escape a string for use as an RFC 4515 filter assertion value.
#define EMARKER(_str, _marker_idx, _marker)
@ FR_TYPE_STRING
String of printable characters.
int strcasecmp(char *s1, char *s2)
static int encode(bio_handle_t *h, request_t *request, bio_request_t *u, uint8_t id)
static char const * url[FR_RADIUS_FAIL_MAX+1]
static int8_t comp(void const *a, void const *b)
int fr_sbuff_trim_talloc(fr_sbuff_t *sbuff, size_t len)
Trim a talloced sbuff to the minimum length required to represent the contained string.
size_t fr_sbuff_adv_past_str(fr_sbuff_t *sbuff, char const *needle, size_t needle_len)
Return true and advance past the end of the needle if needle occurs next in the sbuff.
bool fr_sbuff_next_if_char(fr_sbuff_t *sbuff, char c)
Return true if the current char matches, and if it does, advance.
#define FR_SBUFF_IN(_start, _len_or_end)
#define fr_sbuff_current(_sbuff_or_marker)
#define fr_sbuff_buff(_sbuff_or_marker)
#define FR_SBUFF_IN_STR(_start)
#define fr_sbuff_out(_err, _out, _in)
#define fr_sbuff_remaining(_sbuff_or_marker)
Talloc sbuff extension structure.
ssize_t tmpl_afrom_substr(TALLOC_CTX *ctx, tmpl_t **out, fr_sbuff_t *in, fr_token_t quote, fr_sbuff_parse_rules_t const *p_rules, tmpl_rules_t const *t_rules))
Convert an arbitrary string into a tmpl_t.
Optional arguments passed to vp_tmpl functions.
char const * fr_strerror(void)
Get the last library error.
#define fr_strerror_printf(_fmt,...)
Log to thread local error buffer.
#define fr_strerror_printf_push(_fmt,...)
Add a message to an existing stack of messages at the tail.
#define fr_strerror_const(_msg)
int fr_value_box_cast_in_place(TALLOC_CTX *ctx, fr_value_box_t *vb, fr_type_t dst_type, fr_dict_attr_t const *dst_enumv)
Convert one type of fr_value_box_t to another in place.
void fr_value_box_strdup_shallow_replace(fr_value_box_t *vb, char const *src, ssize_t len)
Free the existing buffer (if talloced) associated with the valuebox, and replace it with a new one.
#define fr_box_strvalue_len(_val, _len)
#define fr_value_box_is_safe_for(_box, _safe_for)
static size_t char fr_sbuff_t size_t inlen
static size_t char ** out
#define fr_box_octets(_val, _len)