/* Unix SMB/CIFS mplementation. LDAP protocol helper functions for SAMBA Copyright (C) Stefan Metzmacher 2004 Copyright (C) Simo Sorce 2004 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" NTSTATUS torture_ldap_bind(struct ldap_connection *conn, const char *userdn, const char *password) { NTSTATUS status = NT_STATUS_UNSUCCESSFUL; int result; if (!conn) { printf("We need a valid ldap_connection structure and be connected\n"); return status; } result = ldap_bind_simple(conn, userdn, password); if (result != LDAP_SUCCESS) { printf("Failed to bind with provided credentials\n"); /* FIXME: what abut actually implementing an ldap_connection_free() function ? :-) sss */ return status; } return NT_STATUS_OK; } NTSTATUS torture_ldap_bind_sasl(struct ldap_connection *conn, const char *username, const char *domain, const char *password) { NTSTATUS status = NT_STATUS_UNSUCCESSFUL; int result; if (!conn) { printf("We need a valid ldap_connection structure and be connected\n"); return status; } result = ldap_bind_sasl(conn, username, domain, password); if (result != LDAP_SUCCESS) { printf("Failed to bind with provided credentialsi and SASL mechanism\n"); /* FIXME: what abut actually implementing an ldap_connection_free() function ? :-) sss */ return status; } return NT_STATUS_OK; } /* open a ldap connection to a server */ NTSTATUS torture_ldap_connection(struct ldap_connection **conn, const char *url, const char *userdn, const char *password) { NTSTATUS status = NT_STATUS_UNSUCCESSFUL; BOOL ret; if (!url) { printf("You must specify a url string\n"); return NT_STATUS_INVALID_PARAMETER; } *conn = new_ldap_connection(); if (!*conn) { printf("Failed to initialize ldap_connection structure\n"); return status; } ret = ldap_setup_connection(*conn, url, userdn, password); if (!ret) { printf("Failed to connect with url [%s]\n", url); /* FIXME: what abut actually implementing an ldap_connection_free() function ? :-) sss */ return status; } return NT_STATUS_OK; } /* close an ldap connection to a server */ NTSTATUS torture_ldap_close(struct ldap_connection *conn) { /* FIXME: what about actually implementing ldap_close() ? :-) sss */ return NT_STATUS_OK; } BOOL ldap_sasl_send_msg(struct ldap_connection *conn, struct ldap_message *msg, const struct timeval *endtime) { NTSTATUS status; DATA_BLOB request; BOOL result; DATA_BLOB creds; DATA_BLOB pdu; int len; ASN1_DATA asn1; TALLOC_CTX *mem_ctx; msg->messageid = conn->next_msgid++; if (!ldap_encode(msg, &request)) return False; status = gensec_seal_packet(conn->gensec, msg->mem_ctx, request.data, request.length, request.data, request.length, &creds); if (!NT_STATUS_IS_OK(status)) { DEBUG(0,("gensec_seal_packet: %s\n",nt_errstr(status))); return False; } len = 4 + creds.length + request.length; pdu = data_blob_talloc(msg->mem_ctx, NULL, len); RSIVAL(pdu.data, 0, len-4); memcpy(pdu.data + 4, creds.data, creds.length); memcpy(pdu.data + 4 + creds.length, request.data, request.length); result = (write_data_until(conn->sock, pdu.data, pdu.length, endtime) == pdu.length); if (!result) return result; pdu = data_blob(NULL, 0x4000); data_blob_clear(&pdu); result = (read_data_until(conn->sock, pdu.data, 4, NULL) == 4); if (!result) return result; len = RIVAL(pdu.data,0); result = (read_data_until(conn->sock, pdu.data + 4, MIN(0x4000,len), NULL) == len); if (!result) return result; pdu.length = 4+len; creds = data_blob(pdu.data + 4 , gensec_sig_size(conn->gensec)); request = data_blob(pdu.data + (4 + creds.length), pdu.length - (4 + creds.length)); status = gensec_unseal_packet(conn->gensec, msg->mem_ctx, request.data, request.length, request.data, request.length, &creds); if (!NT_STATUS_IS_OK(status)) { DEBUG(0,("gensec_unseal_packet: %s\n",nt_errstr(status))); return False; } mem_ctx = msg->mem_ctx; ZERO_STRUCTP(msg); msg->mem_ctx = mem_ctx; asn1_load(&asn1, request); if (!ldap_decode(&asn1, msg)) { return False; } result = True; return result; }