1 #pragma ident "%Z%%M% %I% %E% SMI"
4 * The contents of this file are subject to the Netscape Public
5 * License Version 1.1 (the "License"); you may not use this file
6 * except in compliance with the License. You may obtain a copy of
7 * the License at http://www.mozilla.org/NPL/
9 * Software distributed under the License is distributed on an "AS
10 * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
11 * implied. See the License for the specific language governing
12 * rights and limitations under the License.
14 * The Original Code is Mozilla Communicator client code, released
17 * The Initial Developer of the Original Code is Netscape
18 * Communications Corporation. Portions created by Netscape are
19 * Copyright (C) 1998-1999 Netscape Communications Corporation. All
29 static char copyright
[] = "@(#) Copyright (c) 1990 Regents of the University of Michigan.\nAll rights reserved.\n";
35 * ldap_bind - bind to the ldap server. The dn and password
36 * of the entry to which to bind are supplied, along with the authentication
37 * method to use. The msgid of the bind request is returned on success,
38 * -1 if there's trouble. Note, the kerberos support assumes the user already
39 * has a valid tgt for now. ldap_result() should be called to find out the
40 * outcome of the bind request.
43 * ldap_bind( ld, "cn=manager, o=university of michigan, c=us", "secret",
49 ldap_bind( LDAP
*ld
, const char *dn
, const char *passwd
, int authmethod
)
52 * The bind request looks like this:
53 * BindRequest ::= SEQUENCE {
55 * name DistinguishedName, -- who
56 * authentication CHOICE {
57 * simple [0] OCTET STRING -- passwd
60 * all wrapped up in an LDAPMessage sequence.
63 LDAPDebug( LDAP_DEBUG_TRACE
, "ldap_bind\n", 0, 0, 0 );
65 if ( !NSLDAPI_VALID_LDAP_POINTER( ld
)) {
69 switch ( authmethod
) {
70 case LDAP_AUTH_SIMPLE
:
71 return( ldap_simple_bind( ld
, dn
, passwd
) );
74 LDAP_SET_LDERRNO( ld
, LDAP_AUTH_UNKNOWN
, NULL
, NULL
);
80 * ldap_bind_s - bind to the ldap server. The dn and password
81 * of the entry to which to bind are supplied, along with the authentication
82 * method to use. This routine just calls whichever bind routine is
83 * appropriate and returns the result of the bind (e.g. LDAP_SUCCESS or
84 * some other error indication). Note, the kerberos support assumes the
85 * user already has a valid tgt for now.
88 * ldap_bind_s( ld, "cn=manager, o=university of michigan, c=us",
89 * "secret", LDAP_AUTH_SIMPLE )
90 * ldap_bind_s( ld, "cn=manager, o=university of michigan, c=us",
91 * NULL, LDAP_AUTH_KRBV4 )
95 ldap_bind_s( LDAP
*ld
, const char *dn
, const char *passwd
, int authmethod
)
99 LDAPDebug( LDAP_DEBUG_TRACE
, "ldap_bind_s\n", 0, 0, 0 );
101 switch ( authmethod
) {
102 case LDAP_AUTH_SIMPLE
:
103 return( ldap_simple_bind_s( ld
, dn
, passwd
) );
106 err
= LDAP_AUTH_UNKNOWN
;
107 LDAP_SET_LDERRNO( ld
, err
, NULL
, NULL
);
115 ldap_set_rebind_proc( LDAP
*ld
, LDAP_REBINDPROC_CALLBACK
*rebindproc
,
119 if ( !nsldapi_initialized
) {
120 nsldapi_initialize_defaults();
122 ld
= &nsldapi_ld_defaults
;
125 if ( NSLDAPI_VALID_LDAP_POINTER( ld
)) {
126 LDAP_MUTEX_LOCK( ld
, LDAP_OPTION_LOCK
);
127 ld
->ld_rebind_fn
= rebindproc
;
128 ld
->ld_rebind_arg
= arg
;
129 LDAP_MUTEX_UNLOCK( ld
, LDAP_OPTION_LOCK
);
135 * return a pointer to the bind DN for the default connection (a copy is
136 * not made). If there is no bind DN available, NULL is returned.
139 nsldapi_get_binddn( LDAP
*ld
)
143 binddn
= NULL
; /* default -- assume they are not bound */
145 LDAP_MUTEX_LOCK( ld
, LDAP_CONN_LOCK
);
146 if ( NULL
!= ld
->ld_defconn
&& LDAP_CONNST_CONNECTED
==
147 ld
->ld_defconn
->lconn_status
&& ld
->ld_defconn
->lconn_bound
) {
148 if (( binddn
= ld
->ld_defconn
->lconn_binddn
) == NULL
) {
152 LDAP_MUTEX_UNLOCK( ld
, LDAP_CONN_LOCK
);