Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
wine-mirror
GitHub Repository: wine-mirror/wine
Path: blob/master/libs/ldap/libldap/request.c
4393 views
1
/* $OpenLDAP$ */
2
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
3
*
4
* Copyright 1998-2024 The OpenLDAP Foundation.
5
* All rights reserved.
6
*
7
* Redistribution and use in source and binary forms, with or without
8
* modification, are permitted only as authorized by the OpenLDAP
9
* Public License.
10
*
11
* A copy of this license is available in the file LICENSE in the
12
* top-level directory of the distribution or, alternatively, at
13
* <http://www.OpenLDAP.org/license.html>.
14
*/
15
/* Portions Copyright (c) 1995 Regents of the University of Michigan.
16
* All rights reserved.
17
*/
18
/* This notice applies to changes, created by or for Novell, Inc.,
19
* to preexisting works for which notices appear elsewhere in this file.
20
*
21
* Copyright (C) 1999, 2000 Novell, Inc. All Rights Reserved.
22
*
23
* THIS WORK IS SUBJECT TO U.S. AND INTERNATIONAL COPYRIGHT LAWS AND TREATIES.
24
* USE, MODIFICATION, AND REDISTRIBUTION OF THIS WORK IS SUBJECT TO VERSION
25
* 2.0.1 OF THE OPENLDAP PUBLIC LICENSE, A COPY OF WHICH IS AVAILABLE AT
26
* HTTP://WWW.OPENLDAP.ORG/LICENSE.HTML OR IN THE FILE "LICENSE" IN THE
27
* TOP-LEVEL DIRECTORY OF THE DISTRIBUTION. ANY USE OR EXPLOITATION OF THIS
28
* WORK OTHER THAN AS AUTHORIZED IN VERSION 2.0.1 OF THE OPENLDAP PUBLIC
29
* LICENSE, OR OTHER PRIOR WRITTEN CONSENT FROM NOVELL, COULD SUBJECT THE
30
* PERPETRATOR TO CRIMINAL AND CIVIL LIABILITY.
31
*---
32
* Modification to OpenLDAP source by Novell, Inc.
33
* April 2000 sfs Added code to chase V3 referrals
34
* request.c - sending of ldap requests; handling of referrals
35
*---
36
* Note: A verbatim copy of version 2.0.1 of the OpenLDAP Public License
37
* can be found in the file "build/LICENSE-2.0.1" in this distribution
38
* of OpenLDAP Software.
39
*/
40
41
#include "portable.h"
42
43
#include <stdio.h>
44
45
#include <ac/stdlib.h>
46
47
#include <ac/errno.h>
48
#include <ac/param.h>
49
#include <ac/socket.h>
50
#include <ac/string.h>
51
#include <ac/time.h>
52
#include <ac/unistd.h>
53
54
#include "ldap-int.h"
55
#include "lber.h"
56
57
/* used by ldap_send_server_request and ldap_new_connection */
58
#ifdef LDAP_R_COMPILE
59
#define LDAP_CONN_LOCK_IF(nolock) \
60
{ if (nolock) LDAP_MUTEX_LOCK( &ld->ld_conn_mutex ); }
61
#define LDAP_CONN_UNLOCK_IF(nolock) \
62
{ if (nolock) LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex ); }
63
#define LDAP_REQ_LOCK_IF(nolock) \
64
{ if (nolock) LDAP_MUTEX_LOCK( &ld->ld_req_mutex ); }
65
#define LDAP_REQ_UNLOCK_IF(nolock) \
66
{ if (nolock) LDAP_MUTEX_UNLOCK( &ld->ld_req_mutex ); }
67
#define LDAP_RES_LOCK_IF(nolock) \
68
{ if (nolock) LDAP_MUTEX_LOCK( &ld->ld_res_mutex ); }
69
#define LDAP_RES_UNLOCK_IF(nolock) \
70
{ if (nolock) LDAP_MUTEX_UNLOCK( &ld->ld_res_mutex ); }
71
#else
72
#define LDAP_CONN_LOCK_IF(nolock)
73
#define LDAP_CONN_UNLOCK_IF(nolock)
74
#define LDAP_REQ_LOCK_IF(nolock)
75
#define LDAP_REQ_UNLOCK_IF(nolock)
76
#define LDAP_RES_LOCK_IF(nolock)
77
#define LDAP_RES_UNLOCK_IF(nolock)
78
#endif
79
80
static LDAPConn *find_connection LDAP_P(( LDAP *ld, LDAPURLDesc *srv, int any ));
81
static void use_connection LDAP_P(( LDAP *ld, LDAPConn *lc ));
82
static void ldap_free_request_int LDAP_P(( LDAP *ld, LDAPRequest *lr ));
83
84
static BerElement *
85
re_encode_request( LDAP *ld,
86
BerElement *origber,
87
ber_int_t msgid,
88
int sref,
89
LDAPURLDesc *srv,
90
int *type );
91
92
BerElement *
93
ldap_alloc_ber_with_options( LDAP *ld )
94
{
95
BerElement *ber;
96
97
ber = ber_alloc_t( ld->ld_lberoptions );
98
if ( ber == NULL ) {
99
ld->ld_errno = LDAP_NO_MEMORY;
100
}
101
102
return( ber );
103
}
104
105
106
void
107
ldap_set_ber_options( LDAP *ld, BerElement *ber )
108
{
109
/* ld_lberoptions is constant, hence no lock */
110
ber->ber_options = ld->ld_lberoptions;
111
}
112
113
114
/* sets needed mutexes - no mutexes set to this point */
115
ber_int_t
116
ldap_send_initial_request(
117
LDAP *ld,
118
ber_tag_t msgtype,
119
const char *dn,
120
BerElement *ber,
121
ber_int_t msgid)
122
{
123
int rc = 1;
124
ber_socket_t sd = AC_SOCKET_INVALID;
125
126
Debug0( LDAP_DEBUG_TRACE, "ldap_send_initial_request\n" );
127
128
LDAP_MUTEX_LOCK( &ld->ld_conn_mutex );
129
if ( ber_sockbuf_ctrl( ld->ld_sb, LBER_SB_OPT_GET_FD, &sd ) == -1 ) {
130
/* not connected yet */
131
rc = ldap_open_defconn( ld );
132
if ( rc == 0 ) {
133
ber_sockbuf_ctrl( ld->ld_defconn->lconn_sb,
134
LBER_SB_OPT_GET_FD, &sd );
135
}
136
}
137
if ( ld->ld_defconn && ld->ld_defconn->lconn_status == LDAP_CONNST_CONNECTING )
138
rc = ldap_int_check_async_open( ld, sd );
139
if( rc < 0 ) {
140
ber_free( ber, 1 );
141
LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex );
142
return( -1 );
143
} else if ( rc == 0 ) {
144
Debug0( LDAP_DEBUG_TRACE,
145
"ldap_open_defconn: successful\n" );
146
}
147
148
#ifdef LDAP_CONNECTIONLESS
149
if (LDAP_IS_UDP(ld)) {
150
if (msgtype == LDAP_REQ_BIND) {
151
LDAP_MUTEX_LOCK( &ld->ld_options.ldo_mutex );
152
if (ld->ld_options.ldo_cldapdn)
153
ldap_memfree(ld->ld_options.ldo_cldapdn);
154
ld->ld_options.ldo_cldapdn = ldap_strdup(dn);
155
ber_free( ber, 1 );
156
LDAP_MUTEX_UNLOCK( &ld->ld_options.ldo_mutex );
157
LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex );
158
return 0;
159
}
160
if (msgtype != LDAP_REQ_ABANDON && msgtype != LDAP_REQ_SEARCH)
161
{
162
ber_free( ber, 1 );
163
LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex );
164
return LDAP_PARAM_ERROR;
165
}
166
}
167
#endif
168
LDAP_MUTEX_LOCK( &ld->ld_req_mutex );
169
rc = ldap_send_server_request( ld, ber, msgid, NULL,
170
NULL, NULL, NULL, 0, 0 );
171
LDAP_MUTEX_UNLOCK( &ld->ld_req_mutex );
172
LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex );
173
return(rc);
174
}
175
176
177
/* protected by conn_mutex */
178
int
179
ldap_int_flush_request(
180
LDAP *ld,
181
LDAPRequest *lr )
182
{
183
LDAPConn *lc = lr->lr_conn;
184
185
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_conn_mutex );
186
if ( ber_flush2( lc->lconn_sb, lr->lr_ber, LBER_FLUSH_FREE_NEVER ) != 0 ) {
187
if (( sock_errno() == EAGAIN ) || ( sock_errno() == ENOTCONN )) {
188
/* ENOTCONN is returned in Solaris 10 */
189
/* need to continue write later */
190
lr->lr_status = LDAP_REQST_WRITING;
191
ldap_mark_select_write( ld, lc->lconn_sb );
192
ld->ld_errno = LDAP_BUSY;
193
return -2;
194
} else {
195
ld->ld_errno = LDAP_SERVER_DOWN;
196
ldap_free_request( ld, lr );
197
ldap_free_connection( ld, lc, 0, 0 );
198
return( -1 );
199
}
200
} else {
201
if ( lr->lr_parent == NULL ) {
202
lr->lr_ber->ber_end = lr->lr_ber->ber_ptr;
203
lr->lr_ber->ber_ptr = lr->lr_ber->ber_buf;
204
}
205
lr->lr_status = LDAP_REQST_INPROGRESS;
206
207
/* sent -- waiting for a response */
208
ldap_mark_select_read( ld, lc->lconn_sb );
209
ldap_clear_select_write( ld, lc->lconn_sb );
210
}
211
return 0;
212
}
213
214
/*
215
* protected by req_mutex
216
* if m_noconn then protect using conn_lock
217
* else already protected with conn_lock
218
* if m_res then also protected by res_mutex
219
*/
220
221
int
222
ldap_send_server_request(
223
LDAP *ld,
224
BerElement *ber,
225
ber_int_t msgid,
226
LDAPRequest *parentreq,
227
LDAPURLDesc **srvlist,
228
LDAPConn *lc,
229
LDAPreqinfo *bind,
230
int m_noconn,
231
int m_res )
232
{
233
LDAPRequest *lr;
234
int incparent, rc;
235
236
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_req_mutex );
237
Debug0( LDAP_DEBUG_TRACE, "ldap_send_server_request\n" );
238
239
incparent = 0;
240
ld->ld_errno = LDAP_SUCCESS; /* optimistic */
241
242
LDAP_CONN_LOCK_IF(m_noconn);
243
if ( lc == NULL ) {
244
if ( srvlist == NULL ) {
245
lc = ld->ld_defconn;
246
} else {
247
lc = find_connection( ld, *srvlist, 1 );
248
if ( lc == NULL ) {
249
if ( (bind != NULL) && (parentreq != NULL) ) {
250
/* Remember the bind in the parent */
251
incparent = 1;
252
++parentreq->lr_outrefcnt;
253
}
254
lc = ldap_new_connection( ld, srvlist, 0,
255
1, bind, 1, m_res );
256
}
257
}
258
}
259
260
/* async connect... */
261
if ( lc != NULL && lc->lconn_status == LDAP_CONNST_CONNECTING ) {
262
ber_socket_t sd = AC_SOCKET_ERROR;
263
struct timeval tv = { 0 };
264
265
ber_sockbuf_ctrl( lc->lconn_sb, LBER_SB_OPT_GET_FD, &sd );
266
267
/* poll ... */
268
switch ( ldap_int_poll( ld, sd, &tv, 1 ) ) {
269
case 0:
270
/* go on! */
271
lc->lconn_status = LDAP_CONNST_CONNECTED;
272
break;
273
274
case -2:
275
/* async only occurs if a network timeout is set */
276
277
/* honor network timeout */
278
LDAP_MUTEX_LOCK( &ld->ld_options.ldo_mutex );
279
if ( time( NULL ) - lc->lconn_created <= ld->ld_options.ldo_tm_net.tv_sec )
280
{
281
/* caller will have to call again */
282
ld->ld_errno = LDAP_X_CONNECTING;
283
}
284
LDAP_MUTEX_UNLOCK( &ld->ld_options.ldo_mutex );
285
/* fallthru */
286
287
default:
288
/* error */
289
break;
290
}
291
}
292
293
if ( lc == NULL || lc->lconn_status != LDAP_CONNST_CONNECTED ) {
294
if ( ld->ld_errno == LDAP_SUCCESS ) {
295
ld->ld_errno = LDAP_SERVER_DOWN;
296
}
297
298
ber_free( ber, 1 );
299
if ( incparent ) {
300
/* Forget about the bind */
301
--parentreq->lr_outrefcnt;
302
}
303
LDAP_CONN_UNLOCK_IF(m_noconn);
304
return( -1 );
305
}
306
307
use_connection( ld, lc );
308
309
#ifdef LDAP_CONNECTIONLESS
310
if ( LDAP_IS_UDP( ld )) {
311
BerElement tmpber = *ber;
312
ber_rewind( &tmpber );
313
LDAP_MUTEX_LOCK( &ld->ld_options.ldo_mutex );
314
rc = ber_write( &tmpber, ld->ld_options.ldo_peer,
315
sizeof( struct sockaddr_storage ), 0 );
316
LDAP_MUTEX_UNLOCK( &ld->ld_options.ldo_mutex );
317
if ( rc == -1 ) {
318
ld->ld_errno = LDAP_ENCODING_ERROR;
319
ber_free( ber, 1 );
320
LDAP_CONN_UNLOCK_IF(m_noconn);
321
return rc;
322
}
323
}
324
#endif
325
326
/* If we still have an incomplete write, try to finish it before
327
* dealing with the new request. If we don't finish here, return
328
* LDAP_BUSY and let the caller retry later. We only allow a single
329
* request to be in WRITING state.
330
*/
331
rc = 0;
332
if ( ld->ld_requests != NULL ) {
333
TAvlnode *node = ldap_tavl_end( ld->ld_requests, TAVL_DIR_RIGHT );
334
LDAPRequest *lr;
335
336
assert( node != NULL );
337
lr = node->avl_data;
338
if ( lr->lr_status == LDAP_REQST_WRITING &&
339
ldap_int_flush_request( ld, lr ) < 0 ) {
340
rc = -1;
341
}
342
}
343
if ( rc ) {
344
ber_free( ber, 1 );
345
LDAP_CONN_UNLOCK_IF(m_noconn);
346
return rc;
347
}
348
349
lr = (LDAPRequest *)LDAP_CALLOC( 1, sizeof( LDAPRequest ) );
350
if ( lr == NULL ) {
351
ld->ld_errno = LDAP_NO_MEMORY;
352
ldap_free_connection( ld, lc, 0, 0 );
353
ber_free( ber, 1 );
354
if ( incparent ) {
355
/* Forget about the bind */
356
--parentreq->lr_outrefcnt;
357
}
358
LDAP_CONN_UNLOCK_IF(m_noconn);
359
return( -1 );
360
}
361
lr->lr_msgid = msgid;
362
lr->lr_status = LDAP_REQST_INPROGRESS;
363
lr->lr_res_errno = LDAP_SUCCESS; /* optimistic */
364
lr->lr_ber = ber;
365
lr->lr_conn = lc;
366
if ( parentreq != NULL ) { /* sub-request */
367
if ( !incparent ) {
368
/* Increment if we didn't do it before the bind */
369
++parentreq->lr_outrefcnt;
370
}
371
lr->lr_origid = parentreq->lr_origid;
372
lr->lr_parentcnt = ++parentreq->lr_parentcnt;
373
lr->lr_parent = parentreq;
374
lr->lr_refnext = parentreq->lr_child;
375
parentreq->lr_child = lr;
376
} else { /* original request */
377
lr->lr_origid = lr->lr_msgid;
378
}
379
380
/* Extract requestDN for future reference */
381
#ifdef LDAP_CONNECTIONLESS
382
if ( !LDAP_IS_UDP(ld) )
383
#endif
384
{
385
BerElement tmpber = *ber;
386
ber_int_t bint;
387
ber_tag_t tag, rtag;
388
389
ber_reset( &tmpber, 1 );
390
rtag = ber_scanf( &tmpber, "{it", /*}*/ &bint, &tag );
391
switch ( tag ) {
392
case LDAP_REQ_BIND:
393
rtag = ber_scanf( &tmpber, "{i" /*}*/, &bint );
394
break;
395
case LDAP_REQ_DELETE:
396
break;
397
default:
398
rtag = ber_scanf( &tmpber, "{" /*}*/ );
399
case LDAP_REQ_ABANDON:
400
break;
401
}
402
if ( tag != LDAP_REQ_ABANDON ) {
403
ber_skip_tag( &tmpber, &lr->lr_dn.bv_len );
404
lr->lr_dn.bv_val = tmpber.ber_ptr;
405
}
406
}
407
408
rc = ldap_tavl_insert( &ld->ld_requests, lr, ldap_req_cmp, ldap_avl_dup_error );
409
assert( rc == LDAP_SUCCESS );
410
411
ld->ld_errno = LDAP_SUCCESS;
412
if ( ldap_int_flush_request( ld, lr ) == -1 ) {
413
msgid = -1;
414
}
415
416
LDAP_CONN_UNLOCK_IF(m_noconn);
417
return( msgid );
418
}
419
420
/* return 0 if no StartTLS ext, 1 if present, 2 if critical */
421
static int
422
find_tls_ext( LDAPURLDesc *srv )
423
{
424
int i, crit;
425
char *ext;
426
427
if ( !srv->lud_exts )
428
return 0;
429
430
for (i=0; srv->lud_exts[i]; i++) {
431
crit = 0;
432
ext = srv->lud_exts[i];
433
if ( ext[0] == '!') {
434
ext++;
435
crit = 1;
436
}
437
if ( !strcasecmp( ext, "StartTLS" ) ||
438
!strcasecmp( ext, "X-StartTLS" ) ||
439
!strcmp( ext, LDAP_EXOP_START_TLS )) {
440
return crit + 1;
441
}
442
}
443
return 0;
444
}
445
446
/*
447
* always protected by conn_mutex
448
* optionally protected by req_mutex and res_mutex
449
*/
450
LDAPConn *
451
ldap_new_connection( LDAP *ld, LDAPURLDesc **srvlist, int use_ldsb,
452
int connect, LDAPreqinfo *bind, int m_req, int m_res )
453
{
454
LDAPConn *lc;
455
int async = 0;
456
457
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_conn_mutex );
458
Debug3( LDAP_DEBUG_TRACE, "ldap_new_connection %d %d %d\n",
459
use_ldsb, connect, (bind != NULL) );
460
/*
461
* make a new LDAP server connection
462
* XXX open connection synchronously for now
463
*/
464
lc = (LDAPConn *)LDAP_CALLOC( 1, sizeof( LDAPConn ) );
465
if ( lc == NULL ) {
466
ld->ld_errno = LDAP_NO_MEMORY;
467
return( NULL );
468
}
469
470
if ( use_ldsb ) {
471
assert( ld->ld_sb != NULL );
472
lc->lconn_sb = ld->ld_sb;
473
474
} else {
475
lc->lconn_sb = ber_sockbuf_alloc();
476
if ( lc->lconn_sb == NULL ) {
477
LDAP_FREE( (char *)lc );
478
ld->ld_errno = LDAP_NO_MEMORY;
479
return( NULL );
480
}
481
}
482
483
if ( connect ) {
484
LDAPURLDesc **srvp, *srv = NULL;
485
486
async = LDAP_BOOL_GET( &ld->ld_options, LDAP_BOOL_CONNECT_ASYNC );
487
488
for ( srvp = srvlist; *srvp != NULL; srvp = &(*srvp)->lud_next ) {
489
int rc;
490
491
rc = ldap_int_open_connection( ld, lc, *srvp, async );
492
if ( rc != -1 ) {
493
srv = *srvp;
494
495
/* If we fully connected, async is moot */
496
if ( rc == 0 )
497
async = 0;
498
499
if ( ld->ld_urllist_proc && ( !async || rc != -2 ) ) {
500
ld->ld_urllist_proc( ld, srvlist, srvp, ld->ld_urllist_params );
501
}
502
503
break;
504
}
505
}
506
507
if ( srv == NULL ) {
508
if ( !use_ldsb ) {
509
ber_sockbuf_free( lc->lconn_sb );
510
}
511
LDAP_FREE( (char *)lc );
512
ld->ld_errno = LDAP_SERVER_DOWN;
513
return( NULL );
514
}
515
516
lc->lconn_server = ldap_url_dup( srv );
517
if ( !lc->lconn_server ) {
518
if ( !use_ldsb )
519
ber_sockbuf_free( lc->lconn_sb );
520
LDAP_FREE( (char *)lc );
521
ld->ld_errno = LDAP_NO_MEMORY;
522
return( NULL );
523
}
524
}
525
526
lc->lconn_status = async ? LDAP_CONNST_CONNECTING : LDAP_CONNST_CONNECTED;
527
lc->lconn_next = ld->ld_conns;
528
ld->ld_conns = lc;
529
530
if ( connect ) {
531
#ifdef HAVE_TLS
532
if ( lc->lconn_server->lud_exts ) {
533
int rc, ext = find_tls_ext( lc->lconn_server );
534
if ( ext ) {
535
LDAPConn *savedefconn;
536
537
savedefconn = ld->ld_defconn;
538
++lc->lconn_refcnt; /* avoid premature free */
539
ld->ld_defconn = lc;
540
541
LDAP_REQ_UNLOCK_IF(m_req);
542
LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex );
543
LDAP_RES_UNLOCK_IF(m_res);
544
rc = ldap_start_tls_s( ld, NULL, NULL );
545
LDAP_RES_LOCK_IF(m_res);
546
LDAP_MUTEX_LOCK( &ld->ld_conn_mutex );
547
LDAP_REQ_LOCK_IF(m_req);
548
ld->ld_defconn = savedefconn;
549
--lc->lconn_refcnt;
550
551
if ( rc != LDAP_SUCCESS && ext == 2 ) {
552
ldap_free_connection( ld, lc, 1, 0 );
553
return NULL;
554
}
555
}
556
}
557
#endif
558
}
559
560
if ( bind != NULL ) {
561
int err = 0;
562
LDAPConn *savedefconn;
563
564
/* Set flag to prevent additional referrals
565
* from being processed on this
566
* connection until the bind has completed
567
*/
568
lc->lconn_rebind_inprogress = 1;
569
/* V3 rebind function */
570
if ( ld->ld_rebind_proc != NULL) {
571
LDAPURLDesc *srvfunc;
572
573
srvfunc = ldap_url_dup( *srvlist );
574
if ( srvfunc == NULL ) {
575
ld->ld_errno = LDAP_NO_MEMORY;
576
err = -1;
577
} else {
578
savedefconn = ld->ld_defconn;
579
++lc->lconn_refcnt; /* avoid premature free */
580
ld->ld_defconn = lc;
581
582
Debug0( LDAP_DEBUG_TRACE, "Call application rebind_proc\n" );
583
LDAP_REQ_UNLOCK_IF(m_req);
584
LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex );
585
LDAP_RES_UNLOCK_IF(m_res);
586
err = (*ld->ld_rebind_proc)( ld,
587
bind->ri_url, bind->ri_request, bind->ri_msgid,
588
ld->ld_rebind_params );
589
LDAP_RES_LOCK_IF(m_res);
590
LDAP_MUTEX_LOCK( &ld->ld_conn_mutex );
591
LDAP_REQ_LOCK_IF(m_req);
592
593
ld->ld_defconn = savedefconn;
594
--lc->lconn_refcnt;
595
596
if ( err != 0 ) {
597
err = -1;
598
ldap_free_connection( ld, lc, 1, 0 );
599
lc = NULL;
600
}
601
ldap_free_urldesc( srvfunc );
602
}
603
604
} else {
605
int msgid, rc;
606
struct berval passwd = BER_BVNULL;
607
608
savedefconn = ld->ld_defconn;
609
++lc->lconn_refcnt; /* avoid premature free */
610
ld->ld_defconn = lc;
611
612
Debug0( LDAP_DEBUG_TRACE,
613
"anonymous rebind via ldap_sasl_bind(\"\")\n" );
614
615
LDAP_REQ_UNLOCK_IF(m_req);
616
LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex );
617
LDAP_RES_UNLOCK_IF(m_res);
618
rc = ldap_sasl_bind( ld, "", LDAP_SASL_SIMPLE, &passwd,
619
NULL, NULL, &msgid );
620
if ( rc != LDAP_SUCCESS ) {
621
err = -1;
622
623
} else {
624
for ( err = 1; err > 0; ) {
625
struct timeval tv = { 0, 100000 };
626
LDAPMessage *res = NULL;
627
628
switch ( ldap_result( ld, msgid, LDAP_MSG_ALL, &tv, &res ) ) {
629
case -1:
630
err = -1;
631
break;
632
633
case 0:
634
#ifdef LDAP_R_COMPILE
635
ldap_pvt_thread_yield();
636
#endif
637
break;
638
639
case LDAP_RES_BIND:
640
rc = ldap_parse_result( ld, res, &err, NULL, NULL, NULL, NULL, 1 );
641
if ( rc != LDAP_SUCCESS ) {
642
err = -1;
643
644
} else if ( err != LDAP_SUCCESS ) {
645
err = -1;
646
}
647
/* else err == LDAP_SUCCESS == 0 */
648
break;
649
650
default:
651
Debug3( LDAP_DEBUG_TRACE,
652
"ldap_new_connection %p: "
653
"unexpected response %d "
654
"from BIND request id=%d\n",
655
(void *) ld, ldap_msgtype( res ), msgid );
656
err = -1;
657
break;
658
}
659
}
660
}
661
LDAP_RES_LOCK_IF(m_res);
662
LDAP_MUTEX_LOCK( &ld->ld_conn_mutex );
663
LDAP_REQ_LOCK_IF(m_req);
664
ld->ld_defconn = savedefconn;
665
--lc->lconn_refcnt;
666
667
if ( err != 0 ) {
668
ldap_free_connection( ld, lc, 1, 0 );
669
lc = NULL;
670
}
671
}
672
if ( lc != NULL )
673
lc->lconn_rebind_inprogress = 0;
674
}
675
return( lc );
676
}
677
678
679
/* protected by ld_conn_mutex */
680
static LDAPConn *
681
find_connection( LDAP *ld, LDAPURLDesc *srv, int any )
682
/*
683
* return an existing connection (if any) to the server srv
684
* if "any" is non-zero, check for any server in the "srv" chain
685
*/
686
{
687
LDAPConn *lc;
688
LDAPURLDesc *lcu, *lsu;
689
int lcu_port, lsu_port;
690
int found = 0;
691
692
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_conn_mutex );
693
for ( lc = ld->ld_conns; lc != NULL; lc = lc->lconn_next ) {
694
lcu = lc->lconn_server;
695
lcu_port = ldap_pvt_url_scheme_port( lcu->lud_scheme,
696
lcu->lud_port );
697
698
for ( lsu = srv; lsu != NULL; lsu = lsu->lud_next ) {
699
lsu_port = ldap_pvt_url_scheme_port( lsu->lud_scheme,
700
lsu->lud_port );
701
702
if ( lsu_port == lcu_port
703
&& strcmp( lcu->lud_scheme, lsu->lud_scheme ) == 0
704
&& lcu->lud_host != NULL && lsu->lud_host != NULL
705
&& strcasecmp( lsu->lud_host, lcu->lud_host ) == 0 )
706
{
707
found = 1;
708
break;
709
}
710
711
if ( !any ) break;
712
}
713
if ( found )
714
break;
715
}
716
return lc;
717
}
718
719
720
721
/* protected by ld_conn_mutex */
722
static void
723
use_connection( LDAP *ld, LDAPConn *lc )
724
{
725
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_conn_mutex );
726
++lc->lconn_refcnt;
727
lc->lconn_lastused = time( NULL );
728
}
729
730
731
/* protected by ld_conn_mutex */
732
void
733
ldap_free_connection( LDAP *ld, LDAPConn *lc, int force, int unbind )
734
{
735
LDAPConn *tmplc, *prevlc;
736
737
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_conn_mutex );
738
Debug2( LDAP_DEBUG_TRACE,
739
"ldap_free_connection %d %d\n",
740
force, unbind );
741
742
if ( force || --lc->lconn_refcnt <= 0 ) {
743
/* remove from connections list first */
744
745
for ( prevlc = NULL, tmplc = ld->ld_conns;
746
tmplc != NULL;
747
tmplc = tmplc->lconn_next )
748
{
749
if ( tmplc == lc ) {
750
if ( prevlc == NULL ) {
751
ld->ld_conns = tmplc->lconn_next;
752
} else {
753
prevlc->lconn_next = tmplc->lconn_next;
754
}
755
if ( ld->ld_defconn == lc ) {
756
ld->ld_defconn = NULL;
757
}
758
break;
759
}
760
prevlc = tmplc;
761
}
762
763
/* process connection callbacks */
764
{
765
struct ldapoptions *lo;
766
ldaplist *ll;
767
ldap_conncb *cb;
768
769
lo = &ld->ld_options;
770
LDAP_MUTEX_LOCK( &lo->ldo_mutex );
771
if ( lo->ldo_conn_cbs ) {
772
for ( ll=lo->ldo_conn_cbs; ll; ll=ll->ll_next ) {
773
cb = ll->ll_data;
774
cb->lc_del( ld, lc->lconn_sb, cb );
775
}
776
}
777
LDAP_MUTEX_UNLOCK( &lo->ldo_mutex );
778
lo = LDAP_INT_GLOBAL_OPT();
779
LDAP_MUTEX_LOCK( &lo->ldo_mutex );
780
if ( lo->ldo_conn_cbs ) {
781
for ( ll=lo->ldo_conn_cbs; ll; ll=ll->ll_next ) {
782
cb = ll->ll_data;
783
cb->lc_del( ld, lc->lconn_sb, cb );
784
}
785
}
786
LDAP_MUTEX_UNLOCK( &lo->ldo_mutex );
787
}
788
789
if ( lc->lconn_status == LDAP_CONNST_CONNECTED ) {
790
ldap_mark_select_clear( ld, lc->lconn_sb );
791
if ( unbind ) {
792
ldap_send_unbind( ld, lc->lconn_sb,
793
NULL, NULL );
794
}
795
}
796
797
if ( lc->lconn_ber != NULL ) {
798
ber_free( lc->lconn_ber, 1 );
799
}
800
801
ldap_int_sasl_close( ld, lc );
802
803
ldap_free_urllist( lc->lconn_server );
804
805
/* FIXME: is this at all possible?
806
* ldap_ld_free() in unbind.c calls ldap_free_connection()
807
* with force == 1 __after__ explicitly calling
808
* ldap_tavl_free on ld->ld_requests */
809
if ( force ) {
810
ldap_tavl_free( ld->ld_requests, ldap_do_free_request );
811
ld->ld_requests = NULL;
812
}
813
814
if ( lc->lconn_sb != ld->ld_sb ) {
815
ber_sockbuf_free( lc->lconn_sb );
816
} else {
817
ber_int_sb_close( lc->lconn_sb );
818
}
819
820
if ( lc->lconn_rebind_queue != NULL) {
821
int i;
822
for( i = 0; lc->lconn_rebind_queue[i] != NULL; i++ ) {
823
LDAP_VFREE( lc->lconn_rebind_queue[i] );
824
}
825
LDAP_FREE( lc->lconn_rebind_queue );
826
}
827
828
LDAP_FREE( lc );
829
830
Debug0( LDAP_DEBUG_TRACE,
831
"ldap_free_connection: actually freed\n" );
832
833
} else {
834
lc->lconn_lastused = time( NULL );
835
Debug1( LDAP_DEBUG_TRACE, "ldap_free_connection: refcnt %d\n",
836
lc->lconn_refcnt );
837
}
838
}
839
840
841
/* Protects self with ld_conn_mutex */
842
#ifdef LDAP_DEBUG
843
void
844
ldap_dump_connection( LDAP *ld, LDAPConn *lconns, int all )
845
{
846
LDAPConn *lc;
847
char timebuf[32];
848
849
Debug2( LDAP_DEBUG_TRACE, "** ld %p Connection%s:\n", (void *)ld, all ? "s" : "" );
850
LDAP_MUTEX_LOCK( &ld->ld_conn_mutex );
851
for ( lc = lconns; lc != NULL; lc = lc->lconn_next ) {
852
if ( lc->lconn_server != NULL ) {
853
Debug3( LDAP_DEBUG_TRACE, "* host: %s port: %d%s\n",
854
( lc->lconn_server->lud_host == NULL ) ? "(null)"
855
: lc->lconn_server->lud_host,
856
lc->lconn_server->lud_port, ( lc->lconn_sb ==
857
ld->ld_sb ) ? " (default)" : "" );
858
}
859
if ( lc->lconn_sb != NULL ) {
860
char from[LDAP_IPADDRLEN];
861
struct berval frombv = BER_BVC(from);
862
ber_socket_t sb;
863
if ( ber_sockbuf_ctrl( lc->lconn_sb, LBER_SB_OPT_GET_FD, &sb ) == 1 ) {
864
Sockaddr sin;
865
socklen_t len = sizeof( sin );
866
if ( getsockname( sb, (struct sockaddr *)&sin, &len ) == 0 ) {
867
ldap_pvt_sockaddrstr( &sin, &frombv );
868
Debug1( LDAP_DEBUG_TRACE, "* from: %s\n",
869
( from == NULL ) ? "(null)" : from );
870
}
871
}
872
}
873
Debug2( LDAP_DEBUG_TRACE, " refcnt: %d status: %s\n", lc->lconn_refcnt,
874
( lc->lconn_status == LDAP_CONNST_NEEDSOCKET )
875
? "NeedSocket" :
876
( lc->lconn_status == LDAP_CONNST_CONNECTING )
877
? "Connecting" : "Connected" );
878
Debug2( LDAP_DEBUG_TRACE, " last used: %s%s\n",
879
ldap_pvt_ctime( &lc->lconn_lastused, timebuf ),
880
lc->lconn_rebind_inprogress ? " rebind in progress" : "" );
881
if ( lc->lconn_rebind_inprogress ) {
882
if ( lc->lconn_rebind_queue != NULL) {
883
int i;
884
885
for ( i = 0; lc->lconn_rebind_queue[i] != NULL; i++ ) {
886
int j;
887
for( j = 0; lc->lconn_rebind_queue[i][j] != 0; j++ ) {
888
Debug3( LDAP_DEBUG_TRACE, " queue %d entry %d - %s\n",
889
i, j, lc->lconn_rebind_queue[i][j] );
890
}
891
}
892
} else {
893
Debug0( LDAP_DEBUG_TRACE, " queue is empty\n" );
894
}
895
}
896
Debug0( LDAP_DEBUG_TRACE, "\n" );
897
if ( !all ) {
898
break;
899
}
900
}
901
LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex );
902
}
903
904
905
/* protected by req_mutex and res_mutex */
906
void
907
ldap_dump_requests_and_responses( LDAP *ld )
908
{
909
LDAPMessage *lm, *l;
910
TAvlnode *node;
911
int i;
912
913
Debug1( LDAP_DEBUG_TRACE, "** ld %p Outstanding Requests:\n",
914
(void *)ld );
915
node = ldap_tavl_end( ld->ld_requests, TAVL_DIR_LEFT );
916
if ( node == NULL ) {
917
Debug0( LDAP_DEBUG_TRACE, " Empty\n" );
918
}
919
for ( i = 0 ; node != NULL; i++, node = ldap_tavl_next( node, TAVL_DIR_RIGHT ) ) {
920
LDAPRequest *lr = node->avl_data;
921
922
Debug3( LDAP_DEBUG_TRACE, " * msgid %d, origid %d, status %s\n",
923
lr->lr_msgid, lr->lr_origid,
924
( lr->lr_status == LDAP_REQST_INPROGRESS ) ? "InProgress" :
925
( lr->lr_status == LDAP_REQST_CHASINGREFS ) ? "ChasingRefs" :
926
( lr->lr_status == LDAP_REQST_NOTCONNECTED ) ? "NotConnected" :
927
( lr->lr_status == LDAP_REQST_WRITING ) ? "Writing" :
928
( lr->lr_status == LDAP_REQST_COMPLETED ) ? "RequestCompleted"
929
: "InvalidStatus" );
930
Debug2( LDAP_DEBUG_TRACE, " outstanding referrals %d, parent count %d\n",
931
lr->lr_outrefcnt, lr->lr_parentcnt );
932
}
933
Debug3( LDAP_DEBUG_TRACE, " ld %p request count %d (abandoned %lu)\n",
934
(void *)ld, i, ld->ld_nabandoned );
935
Debug1( LDAP_DEBUG_TRACE, "** ld %p Response Queue:\n", (void *)ld );
936
if ( ( lm = ld->ld_responses ) == NULL ) {
937
Debug0( LDAP_DEBUG_TRACE, " Empty\n" );
938
}
939
for ( i = 0; lm != NULL; lm = lm->lm_next, i++ ) {
940
Debug2( LDAP_DEBUG_TRACE, " * msgid %d, type %lu\n",
941
lm->lm_msgid, (unsigned long)lm->lm_msgtype );
942
if ( lm->lm_chain != NULL ) {
943
Debug0( LDAP_DEBUG_TRACE, " chained responses:\n" );
944
for ( l = lm->lm_chain; l != NULL; l = l->lm_chain ) {
945
Debug2( LDAP_DEBUG_TRACE,
946
" * msgid %d, type %lu\n",
947
l->lm_msgid,
948
(unsigned long)l->lm_msgtype );
949
}
950
}
951
}
952
Debug2( LDAP_DEBUG_TRACE, " ld %p response count %d\n", (void *)ld, i );
953
}
954
#endif /* LDAP_DEBUG */
955
956
/* protected by req_mutex */
957
void
958
ldap_do_free_request( void *arg )
959
{
960
LDAPRequest *lr = arg;
961
962
Debug3( LDAP_DEBUG_TRACE, "ldap_do_free_request: "
963
"asked to free lr %p msgid %d refcnt %d\n",
964
(void *) lr, lr->lr_msgid, lr->lr_refcnt );
965
/* if lr_refcnt > 0, the request has been looked up
966
* by ldap_find_request_by_msgid(); if in the meanwhile
967
* the request is free()'d by someone else, just decrease
968
* the reference count; later on, it will be freed. */
969
if ( lr->lr_refcnt > 0 ) {
970
assert( lr->lr_refcnt == 1 );
971
lr->lr_refcnt = -lr->lr_refcnt;
972
return;
973
}
974
975
if ( lr->lr_ber != NULL ) {
976
ber_free( lr->lr_ber, 1 );
977
lr->lr_ber = NULL;
978
}
979
980
if ( lr->lr_res_error != NULL ) {
981
LDAP_FREE( lr->lr_res_error );
982
lr->lr_res_error = NULL;
983
}
984
985
if ( lr->lr_res_matched != NULL ) {
986
LDAP_FREE( lr->lr_res_matched );
987
lr->lr_res_matched = NULL;
988
}
989
990
LDAP_FREE( lr );
991
}
992
993
int
994
ldap_req_cmp( const void *l, const void *r )
995
{
996
const LDAPRequest *left = l, *right = r;
997
return left->lr_msgid - right->lr_msgid;
998
}
999
1000
/* protected by req_mutex */
1001
static void
1002
ldap_free_request_int( LDAP *ld, LDAPRequest *lr )
1003
{
1004
LDAPRequest *removed;
1005
1006
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_req_mutex );
1007
removed = ldap_tavl_delete( &ld->ld_requests, lr, ldap_req_cmp );
1008
assert( !removed || removed == lr );
1009
Debug3( LDAP_DEBUG_TRACE, "ldap_free_request_int: "
1010
"lr %p msgid %d%s removed\n",
1011
(void *) lr, lr->lr_msgid, removed ? "" : " not" );
1012
1013
ldap_do_free_request( lr );
1014
}
1015
1016
/* protected by req_mutex */
1017
void
1018
ldap_free_request( LDAP *ld, LDAPRequest *lr )
1019
{
1020
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_req_mutex );
1021
Debug2( LDAP_DEBUG_TRACE, "ldap_free_request (origid %d, msgid %d)\n",
1022
lr->lr_origid, lr->lr_msgid );
1023
1024
/* free all referrals (child requests) */
1025
while ( lr->lr_child ) {
1026
ldap_free_request( ld, lr->lr_child );
1027
}
1028
1029
if ( lr->lr_parent != NULL ) {
1030
LDAPRequest **lrp;
1031
1032
--lr->lr_parent->lr_outrefcnt;
1033
for ( lrp = &lr->lr_parent->lr_child;
1034
*lrp && *lrp != lr;
1035
lrp = &(*lrp)->lr_refnext );
1036
1037
if ( *lrp == lr ) {
1038
*lrp = lr->lr_refnext;
1039
}
1040
}
1041
ldap_free_request_int( ld, lr );
1042
}
1043
1044
/*
1045
* call first time with *cntp = -1
1046
* when returns *cntp == -1, no referrals are left
1047
*
1048
* NOTE: may replace *refsp, or shuffle the contents
1049
* of the original array.
1050
*/
1051
static int ldap_int_nextref(
1052
LDAP *ld,
1053
char ***refsp,
1054
int *cntp,
1055
void *params )
1056
{
1057
assert( refsp != NULL );
1058
assert( *refsp != NULL );
1059
assert( cntp != NULL );
1060
1061
if ( *cntp < -1 ) {
1062
*cntp = -1;
1063
return -1;
1064
}
1065
1066
(*cntp)++;
1067
1068
if ( (*refsp)[ *cntp ] == NULL ) {
1069
*cntp = -1;
1070
}
1071
1072
return 0;
1073
}
1074
1075
/*
1076
* Chase v3 referrals
1077
*
1078
* Parameters:
1079
* (IN) ld = LDAP connection handle
1080
* (IN) lr = LDAP Request structure
1081
* (IN) refs = array of pointers to referral strings that we will chase
1082
* The array will be free'd by this function when no longer needed
1083
* (IN) sref != 0 if following search reference
1084
* (OUT) errstrp = Place to return a string of referrals which could not be followed
1085
* (OUT) hadrefp = 1 if successfully followed referral
1086
*
1087
* Return value - number of referrals followed
1088
*
1089
* Protected by res_mutex, conn_mutex and req_mutex (try_read1msg)
1090
*/
1091
int
1092
ldap_chase_v3referrals( LDAP *ld, LDAPRequest *lr, char **refs, int sref, char **errstrp, int *hadrefp )
1093
{
1094
char *unfollowed;
1095
int unfollowedcnt = 0;
1096
LDAPRequest *origreq;
1097
LDAPURLDesc *srv = NULL;
1098
BerElement *ber;
1099
char **refarray = NULL;
1100
LDAPConn *lc;
1101
int rc, count, i, j, id;
1102
LDAPreqinfo rinfo;
1103
LDAP_NEXTREF_PROC *nextref_proc = ld->ld_nextref_proc ? ld->ld_nextref_proc : ldap_int_nextref;
1104
1105
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_res_mutex );
1106
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_conn_mutex );
1107
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_req_mutex );
1108
Debug0( LDAP_DEBUG_TRACE, "ldap_chase_v3referrals\n" );
1109
1110
ld->ld_errno = LDAP_SUCCESS; /* optimistic */
1111
*hadrefp = 0;
1112
1113
unfollowed = NULL;
1114
rc = count = 0;
1115
1116
/* If no referrals in array, return */
1117
if ( (refs == NULL) || ( (refs)[0] == NULL) ) {
1118
rc = 0;
1119
goto done;
1120
}
1121
1122
/* Check for hop limit exceeded */
1123
if ( lr->lr_parentcnt >= ld->ld_refhoplimit ) {
1124
Debug1( LDAP_DEBUG_ANY,
1125
"more than %d referral hops (dropping)\n", ld->ld_refhoplimit );
1126
ld->ld_errno = LDAP_REFERRAL_LIMIT_EXCEEDED;
1127
rc = -1;
1128
goto done;
1129
}
1130
1131
/* find original request */
1132
for ( origreq = lr;
1133
origreq->lr_parent != NULL;
1134
origreq = origreq->lr_parent )
1135
{
1136
/* empty */ ;
1137
}
1138
1139
refarray = refs;
1140
refs = NULL;
1141
1142
/* parse out & follow referrals */
1143
/* NOTE: if nextref_proc == ldap_int_nextref, params is ignored */
1144
i = -1;
1145
for ( nextref_proc( ld, &refarray, &i, ld->ld_nextref_params );
1146
i != -1;
1147
nextref_proc( ld, &refarray, &i, ld->ld_nextref_params ) )
1148
{
1149
1150
/* Parse the referral URL */
1151
rc = ldap_url_parse_ext( refarray[i], &srv, LDAP_PVT_URL_PARSE_NOEMPTY_DN );
1152
if ( rc != LDAP_URL_SUCCESS ) {
1153
/* ldap_url_parse_ext() returns LDAP_URL_* errors
1154
* which do not map on API errors */
1155
ld->ld_errno = LDAP_PARAM_ERROR;
1156
rc = -1;
1157
goto done;
1158
}
1159
1160
if( srv->lud_crit_exts ) {
1161
int ok = 0;
1162
#ifdef HAVE_TLS
1163
/* If StartTLS is the only critical ext, OK. */
1164
if ( find_tls_ext( srv ) == 2 && srv->lud_crit_exts == 1 )
1165
ok = 1;
1166
#endif
1167
if ( !ok ) {
1168
/* we do not support any other extensions */
1169
ld->ld_errno = LDAP_NOT_SUPPORTED;
1170
rc = -1;
1171
goto done;
1172
}
1173
}
1174
1175
/* check connection for re-bind in progress */
1176
if (( lc = find_connection( ld, srv, 1 )) != NULL ) {
1177
/* See if we've already requested this DN with this conn */
1178
LDAPRequest *lp;
1179
int looped = 0;
1180
ber_len_t len = srv->lud_dn ? strlen( srv->lud_dn ) : 0;
1181
for ( lp = origreq; lp; ) {
1182
if ( lp->lr_conn == lc
1183
&& len == lp->lr_dn.bv_len
1184
&& len
1185
&& strncmp( srv->lud_dn, lp->lr_dn.bv_val, len ) == 0 )
1186
{
1187
looped = 1;
1188
break;
1189
}
1190
if ( lp == origreq ) {
1191
lp = lp->lr_child;
1192
} else {
1193
lp = lp->lr_refnext;
1194
}
1195
}
1196
if ( looped ) {
1197
ldap_free_urllist( srv );
1198
srv = NULL;
1199
ld->ld_errno = LDAP_CLIENT_LOOP;
1200
rc = -1;
1201
continue;
1202
}
1203
1204
if ( lc->lconn_rebind_inprogress ) {
1205
/* We are already chasing a referral or search reference and a
1206
* bind on that connection is in progress. We must queue
1207
* referrals on that connection, so we don't get a request
1208
* going out before the bind operation completes. This happens
1209
* if two search references come in one behind the other
1210
* for the same server with different contexts.
1211
*/
1212
Debug1( LDAP_DEBUG_TRACE,
1213
"ldap_chase_v3referrals: queue referral \"%s\"\n",
1214
refarray[i] );
1215
if( lc->lconn_rebind_queue == NULL ) {
1216
/* Create a referral list */
1217
lc->lconn_rebind_queue =
1218
(char ***) LDAP_MALLOC( sizeof(void *) * 2);
1219
1220
if( lc->lconn_rebind_queue == NULL) {
1221
ld->ld_errno = LDAP_NO_MEMORY;
1222
rc = -1;
1223
goto done;
1224
}
1225
1226
lc->lconn_rebind_queue[0] = refarray;
1227
lc->lconn_rebind_queue[1] = NULL;
1228
refarray = NULL;
1229
1230
} else {
1231
/* Count how many referral arrays we already have */
1232
for( j = 0; lc->lconn_rebind_queue[j] != NULL; j++) {
1233
/* empty */;
1234
}
1235
1236
/* Add the new referral to the list */
1237
lc->lconn_rebind_queue = (char ***) LDAP_REALLOC(
1238
lc->lconn_rebind_queue, sizeof(void *) * (j + 2));
1239
1240
if( lc->lconn_rebind_queue == NULL ) {
1241
ld->ld_errno = LDAP_NO_MEMORY;
1242
rc = -1;
1243
goto done;
1244
}
1245
lc->lconn_rebind_queue[j] = refarray;
1246
lc->lconn_rebind_queue[j+1] = NULL;
1247
refarray = NULL;
1248
}
1249
1250
/* We have queued the referral/reference, now just return */
1251
rc = 0;
1252
*hadrefp = 1;
1253
count = 1; /* Pretend we already followed referral */
1254
goto done;
1255
}
1256
}
1257
/* Re-encode the request with the new starting point of the search.
1258
* Note: In the future we also need to replace the filter if one
1259
* was provided with the search reference
1260
*/
1261
1262
/* For references we don't want old dn if new dn empty */
1263
if ( sref && srv->lud_dn == NULL ) {
1264
srv->lud_dn = LDAP_STRDUP( "" );
1265
}
1266
1267
LDAP_NEXT_MSGID( ld, id );
1268
ber = re_encode_request( ld, origreq->lr_ber, id,
1269
sref, srv, &rinfo.ri_request );
1270
1271
if( ber == NULL ) {
1272
ld->ld_errno = LDAP_ENCODING_ERROR;
1273
rc = -1;
1274
goto done;
1275
}
1276
1277
Debug2( LDAP_DEBUG_TRACE,
1278
"ldap_chase_v3referral: msgid %d, url \"%s\"\n",
1279
lr->lr_msgid, refarray[i] );
1280
1281
/* Send the new request to the server - may require a bind */
1282
rinfo.ri_msgid = origreq->lr_origid;
1283
rinfo.ri_url = refarray[i];
1284
rc = ldap_send_server_request( ld, ber, id,
1285
origreq, &srv, NULL, &rinfo, 0, 1 );
1286
if ( rc < 0 ) {
1287
/* Failure, try next referral in the list */
1288
Debug3( LDAP_DEBUG_ANY, "Unable to chase referral \"%s\" (%d: %s)\n",
1289
refarray[i], ld->ld_errno, ldap_err2string( ld->ld_errno ) );
1290
unfollowedcnt += ldap_append_referral( ld, &unfollowed, refarray[i] );
1291
ldap_free_urllist( srv );
1292
srv = NULL;
1293
ld->ld_errno = LDAP_REFERRAL;
1294
} else {
1295
/* Success, no need to try this referral list further */
1296
rc = 0;
1297
++count;
1298
*hadrefp = 1;
1299
1300
/* check if there is a queue of referrals that came in during bind */
1301
if ( lc == NULL) {
1302
lc = find_connection( ld, srv, 1 );
1303
if ( lc == NULL ) {
1304
ld->ld_errno = LDAP_OPERATIONS_ERROR;
1305
rc = -1;
1306
LDAP_MUTEX_UNLOCK( &ld->ld_conn_mutex );
1307
goto done;
1308
}
1309
}
1310
1311
if ( lc->lconn_rebind_queue != NULL ) {
1312
/* Release resources of previous list */
1313
LDAP_VFREE( refarray );
1314
refarray = NULL;
1315
ldap_free_urllist( srv );
1316
srv = NULL;
1317
1318
/* Pull entries off end of queue so list always null terminated */
1319
for( j = 0; lc->lconn_rebind_queue[j] != NULL; j++ )
1320
;
1321
refarray = lc->lconn_rebind_queue[j - 1];
1322
lc->lconn_rebind_queue[j-1] = NULL;
1323
/* we pulled off last entry from queue, free queue */
1324
if ( j == 1 ) {
1325
LDAP_FREE( lc->lconn_rebind_queue );
1326
lc->lconn_rebind_queue = NULL;
1327
}
1328
/* restart the loop the with new referral list */
1329
i = -1;
1330
continue;
1331
}
1332
break; /* referral followed, break out of for loop */
1333
}
1334
} /* end for loop */
1335
done:
1336
LDAP_VFREE( refarray );
1337
ldap_free_urllist( srv );
1338
LDAP_FREE( *errstrp );
1339
1340
if( rc == 0 ) {
1341
*errstrp = NULL;
1342
LDAP_FREE( unfollowed );
1343
return count;
1344
} else {
1345
*errstrp = unfollowed;
1346
return rc;
1347
}
1348
}
1349
1350
/*
1351
* XXX merging of errors in this routine needs to be improved
1352
* Protected by res_mutex, conn_mutex and req_mutex (try_read1msg)
1353
*/
1354
int
1355
ldap_chase_referrals( LDAP *ld,
1356
LDAPRequest *lr,
1357
char **errstrp,
1358
int sref,
1359
int *hadrefp )
1360
{
1361
int rc, count, id;
1362
unsigned len;
1363
char *p, *ref, *unfollowed;
1364
LDAPRequest *origreq;
1365
LDAPURLDesc *srv;
1366
BerElement *ber;
1367
LDAPreqinfo rinfo;
1368
LDAPConn *lc;
1369
1370
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_res_mutex );
1371
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_conn_mutex );
1372
LDAP_ASSERT_MUTEX_OWNER( &ld->ld_req_mutex );
1373
Debug0( LDAP_DEBUG_TRACE, "ldap_chase_referrals\n" );
1374
1375
ld->ld_errno = LDAP_SUCCESS; /* optimistic */
1376
*hadrefp = 0;
1377
1378
if ( *errstrp == NULL ) {
1379
return( 0 );
1380
}
1381
1382
len = strlen( *errstrp );
1383
for ( p = *errstrp; len >= LDAP_REF_STR_LEN; ++p, --len ) {
1384
if ( strncasecmp( p, LDAP_REF_STR, LDAP_REF_STR_LEN ) == 0 ) {
1385
*p = '\0';
1386
p += LDAP_REF_STR_LEN;
1387
break;
1388
}
1389
}
1390
1391
if ( len < LDAP_REF_STR_LEN ) {
1392
return( 0 );
1393
}
1394
1395
if ( lr->lr_parentcnt >= ld->ld_refhoplimit ) {
1396
Debug1( LDAP_DEBUG_ANY,
1397
"more than %d referral hops (dropping)\n",
1398
ld->ld_refhoplimit );
1399
/* XXX report as error in ld->ld_errno? */
1400
return( 0 );
1401
}
1402
1403
/* find original request */
1404
for ( origreq = lr; origreq->lr_parent != NULL;
1405
origreq = origreq->lr_parent ) {
1406
/* empty */;
1407
}
1408
1409
unfollowed = NULL;
1410
rc = count = 0;
1411
1412
/* parse out & follow referrals */
1413
for ( ref = p; rc == 0 && ref != NULL; ref = p ) {
1414
p = strchr( ref, '\n' );
1415
if ( p != NULL ) {
1416
*p++ = '\0';
1417
}
1418
1419
rc = ldap_url_parse_ext( ref, &srv, LDAP_PVT_URL_PARSE_NOEMPTY_DN );
1420
if ( rc != LDAP_URL_SUCCESS ) {
1421
Debug2( LDAP_DEBUG_TRACE,
1422
"ignoring %s referral <%s>\n",
1423
ref, rc == LDAP_URL_ERR_BADSCHEME ? "unknown" : "incorrect" );
1424
rc = ldap_append_referral( ld, &unfollowed, ref );
1425
*hadrefp = 1;
1426
continue;
1427
}
1428
1429
Debug1( LDAP_DEBUG_TRACE,
1430
"chasing LDAP referral: <%s>\n", ref );
1431
1432
*hadrefp = 1;
1433
1434
/* See if we've already been here */
1435
if (( lc = find_connection( ld, srv, 1 )) != NULL ) {
1436
LDAPRequest *lp;
1437
int looped = 0;
1438
ber_len_t len = srv->lud_dn ? strlen( srv->lud_dn ) : 0;
1439
for ( lp = lr; lp; lp = lp->lr_parent ) {
1440
if ( lp->lr_conn == lc
1441
&& len == lp->lr_dn.bv_len )
1442
{
1443
if ( len && strncmp( srv->lud_dn, lp->lr_dn.bv_val, len ) )
1444
continue;
1445
looped = 1;
1446
break;
1447
}
1448
}
1449
if ( looped ) {
1450
ldap_free_urllist( srv );
1451
ld->ld_errno = LDAP_CLIENT_LOOP;
1452
rc = -1;
1453
continue;
1454
}
1455
}
1456
1457
LDAP_NEXT_MSGID( ld, id );
1458
ber = re_encode_request( ld, origreq->lr_ber,
1459
id, sref, srv, &rinfo.ri_request );
1460
1461
if ( ber == NULL ) {
1462
ldap_free_urllist( srv );
1463
return -1 ;
1464
}
1465
1466
/* copy the complete referral for rebind process */
1467
rinfo.ri_url = LDAP_STRDUP( ref );
1468
1469
rinfo.ri_msgid = origreq->lr_origid;
1470
1471
rc = ldap_send_server_request( ld, ber, id,
1472
lr, &srv, NULL, &rinfo, 0, 1 );
1473
LDAP_FREE( rinfo.ri_url );
1474
1475
if( rc >= 0 ) {
1476
++count;
1477
} else {
1478
Debug3( LDAP_DEBUG_ANY,
1479
"Unable to chase referral \"%s\" (%d: %s)\n",
1480
ref, ld->ld_errno, ldap_err2string( ld->ld_errno ) );
1481
rc = ldap_append_referral( ld, &unfollowed, ref );
1482
}
1483
1484
ldap_free_urllist(srv);
1485
}
1486
1487
LDAP_FREE( *errstrp );
1488
*errstrp = unfollowed;
1489
1490
return(( rc == 0 ) ? count : rc );
1491
}
1492
1493
1494
int
1495
ldap_append_referral( LDAP *ld, char **referralsp, char *s )
1496
{
1497
int first;
1498
1499
if ( *referralsp == NULL ) {
1500
first = 1;
1501
*referralsp = (char *)LDAP_MALLOC( strlen( s ) + LDAP_REF_STR_LEN
1502
+ 1 );
1503
} else {
1504
first = 0;
1505
*referralsp = (char *)LDAP_REALLOC( *referralsp,
1506
strlen( *referralsp ) + strlen( s ) + 2 );
1507
}
1508
1509
if ( *referralsp == NULL ) {
1510
ld->ld_errno = LDAP_NO_MEMORY;
1511
return( -1 );
1512
}
1513
1514
if ( first ) {
1515
strcpy( *referralsp, LDAP_REF_STR );
1516
} else {
1517
strcat( *referralsp, "\n" );
1518
}
1519
strcat( *referralsp, s );
1520
1521
return( 0 );
1522
}
1523
1524
1525
1526
static BerElement *
1527
re_encode_request( LDAP *ld,
1528
BerElement *origber,
1529
ber_int_t msgid,
1530
int sref,
1531
LDAPURLDesc *srv,
1532
int *type )
1533
{
1534
/*
1535
* XXX this routine knows way too much about how the lber library works!
1536
*/
1537
ber_int_t along;
1538
ber_tag_t tag;
1539
ber_tag_t rtag;
1540
ber_int_t ver;
1541
ber_int_t scope;
1542
int rc;
1543
BerElement tmpber, *ber;
1544
struct berval dn;
1545
1546
Debug2( LDAP_DEBUG_TRACE,
1547
"re_encode_request: new msgid %ld, new dn <%s>\n",
1548
(long) msgid,
1549
( srv == NULL || srv->lud_dn == NULL) ? "NONE" : srv->lud_dn );
1550
1551
tmpber = *origber;
1552
1553
/*
1554
* all LDAP requests are sequences that start with a message id.
1555
* For all except delete, this is followed by a sequence that is
1556
* tagged with the operation code. For delete, the provided DN
1557
* is not wrapped by a sequence.
1558
*/
1559
rtag = ber_scanf( &tmpber, "{it", /*}*/ &along, &tag );
1560
1561
if ( rtag == LBER_ERROR ) {
1562
ld->ld_errno = LDAP_DECODING_ERROR;
1563
return( NULL );
1564
}
1565
1566
assert( tag != 0);
1567
if ( tag == LDAP_REQ_BIND ) {
1568
/* bind requests have a version number before the DN & other stuff */
1569
rtag = ber_scanf( &tmpber, "{im" /*}*/, &ver, &dn );
1570
1571
} else if ( tag == LDAP_REQ_DELETE ) {
1572
/* delete requests don't have a DN wrapping sequence */
1573
rtag = ber_scanf( &tmpber, "m", &dn );
1574
1575
} else if ( tag == LDAP_REQ_SEARCH ) {
1576
/* search requests need to be re-scope-ed */
1577
rtag = ber_scanf( &tmpber, "{me" /*"}"*/, &dn, &scope );
1578
1579
if( srv->lud_scope != LDAP_SCOPE_DEFAULT ) {
1580
/* use the scope provided in reference */
1581
scope = srv->lud_scope;
1582
1583
} else if ( sref ) {
1584
/* use scope implied by previous operation
1585
* base -> base
1586
* one -> base
1587
* subtree -> subtree
1588
* subordinate -> subtree
1589
*/
1590
switch( scope ) {
1591
default:
1592
case LDAP_SCOPE_BASE:
1593
case LDAP_SCOPE_ONELEVEL:
1594
scope = LDAP_SCOPE_BASE;
1595
break;
1596
case LDAP_SCOPE_SUBTREE:
1597
case LDAP_SCOPE_SUBORDINATE:
1598
scope = LDAP_SCOPE_SUBTREE;
1599
break;
1600
}
1601
}
1602
1603
} else {
1604
rtag = ber_scanf( &tmpber, "{m" /*}*/, &dn );
1605
}
1606
1607
if( rtag == LBER_ERROR ) {
1608
ld->ld_errno = LDAP_DECODING_ERROR;
1609
return NULL;
1610
}
1611
1612
/* restore character zero'd out by ber_scanf*/
1613
dn.bv_val[dn.bv_len] = tmpber.ber_tag;
1614
1615
if (( ber = ldap_alloc_ber_with_options( ld )) == NULL ) {
1616
return NULL;
1617
}
1618
1619
if ( srv->lud_dn ) {
1620
ber_str2bv( srv->lud_dn, 0, 0, &dn );
1621
}
1622
1623
if ( tag == LDAP_REQ_BIND ) {
1624
rc = ber_printf( ber, "{it{iO" /*}}*/, msgid, tag, ver, &dn );
1625
} else if ( tag == LDAP_REQ_DELETE ) {
1626
rc = ber_printf( ber, "{itON}", msgid, tag, &dn );
1627
} else if ( tag == LDAP_REQ_SEARCH ) {
1628
rc = ber_printf( ber, "{it{Oe" /*}}*/, msgid, tag, &dn, scope );
1629
} else {
1630
rc = ber_printf( ber, "{it{O" /*}}*/, msgid, tag, &dn );
1631
}
1632
1633
if ( rc == -1 ) {
1634
ld->ld_errno = LDAP_ENCODING_ERROR;
1635
ber_free( ber, 1 );
1636
return NULL;
1637
}
1638
1639
if ( tag != LDAP_REQ_DELETE && (
1640
ber_write(ber, tmpber.ber_ptr, ( tmpber.ber_end - tmpber.ber_ptr ), 0)
1641
!= ( tmpber.ber_end - tmpber.ber_ptr ) ||
1642
ber_printf( ber, /*{{*/ "N}N}" ) == -1 ) )
1643
{
1644
ld->ld_errno = LDAP_ENCODING_ERROR;
1645
ber_free( ber, 1 );
1646
return NULL;
1647
}
1648
1649
#ifdef LDAP_DEBUG
1650
if ( ldap_debug & LDAP_DEBUG_PACKETS ) {
1651
Debug0( LDAP_DEBUG_ANY, "re_encode_request new request is:\n" );
1652
ber_log_dump( LDAP_DEBUG_BER, ldap_debug, ber, 0 );
1653
}
1654
#endif /* LDAP_DEBUG */
1655
1656
*type = tag; /* return request type */
1657
return ber;
1658
}
1659
1660
1661
/* protected by req_mutex */
1662
LDAPRequest *
1663
ldap_find_request_by_msgid( LDAP *ld, ber_int_t msgid )
1664
{
1665
LDAPRequest *lr, needle = {0};
1666
needle.lr_msgid = msgid;
1667
1668
lr = ldap_tavl_find( ld->ld_requests, &needle, ldap_req_cmp );
1669
if ( lr != NULL && lr->lr_status != LDAP_REQST_COMPLETED ) {
1670
/* lr_refcnt is only negative when we removed it from ld_requests
1671
* already, it is positive if we have sub-requests (referrals) */
1672
assert( lr->lr_refcnt >= 0 );
1673
lr->lr_refcnt++;
1674
Debug3( LDAP_DEBUG_TRACE, "ldap_find_request_by_msgid: "
1675
"msgid %d, lr %p lr->lr_refcnt = %d\n",
1676
msgid, (void *) lr, lr->lr_refcnt );
1677
return lr;
1678
}
1679
1680
Debug2( LDAP_DEBUG_TRACE, "ldap_find_request_by_msgid: "
1681
"msgid %d, lr %p\n", msgid, (void *) lr );
1682
return NULL;
1683
}
1684
1685
/* protected by req_mutex */
1686
void
1687
ldap_return_request( LDAP *ld, LDAPRequest *lrx, int freeit )
1688
{
1689
LDAPRequest *lr;
1690
1691
lr = ldap_tavl_find( ld->ld_requests, lrx, ldap_req_cmp );
1692
Debug2( LDAP_DEBUG_TRACE, "ldap_return_request: "
1693
"lrx %p, lr %p\n", (void *) lrx, (void *) lr );
1694
if ( lr ) {
1695
assert( lr == lrx );
1696
if ( lr->lr_refcnt > 0 ) {
1697
lr->lr_refcnt--;
1698
} else if ( lr->lr_refcnt < 0 ) {
1699
lr->lr_refcnt++;
1700
if ( lr->lr_refcnt == 0 ) {
1701
lr = NULL;
1702
}
1703
}
1704
}
1705
Debug3( LDAP_DEBUG_TRACE, "ldap_return_request: "
1706
"lrx->lr_msgid %d, lrx->lr_refcnt is now %d, lr is %s present\n",
1707
lrx->lr_msgid, lrx->lr_refcnt, lr ? "still" : "not" );
1708
/* The request is not tracked anymore */
1709
if ( lr == NULL ) {
1710
ldap_free_request_int( ld, lrx );
1711
} else if ( freeit ) {
1712
ldap_free_request( ld, lrx );
1713
}
1714
}
1715
1716