xref: /titanic_52/usr/src/cmd/ldap/common/common.c (revision fcf3ce441efd61da9bb2884968af01cb7c1452cc)
1 /*
2  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
3  * Use is subject to license terms.
4  */
5 
6 #pragma ident	"%Z%%M%	%I%	%E% SMI"
7 
8 /*
9  * The contents of this file are subject to the Netscape Public
10  * License Version 1.1 (the "License"); you may not use this file
11  * except in compliance with the License. You may obtain a copy of
12  * the License at http://www.mozilla.org/NPL/
13  *
14  * Software distributed under the License is distributed on an "AS
15  * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
16  * implied. See the License for the specific language governing
17  * rights and limitations under the License.
18  *
19  * The Original Code is Mozilla Communicator client code, released
20  * March 31, 1998.
21  *
22  * The Initial Developer of the Original Code is Netscape
23  * Communications Corporation. Portions created by Netscape are
24  * Copyright (C) 1998-1999 Netscape Communications Corporation. All
25  * Rights Reserved.
26  *
27  * Contributor(s):
28  */
29 
30 /*
31  * code that is shared by two or more of the LDAP command line tools
32  */
33 
34 #include "ldaptool.h"
35 #include "fileurl.h"
36 #ifdef SOLARIS_LDAP_CMD
37 #include "solaris-int.h"
38 #include <ldap.h>
39 #include <locale.h>
40 #include <libgen.h>
41 #include <sys/types.h>
42 #include <sys/stat.h>
43 #include <limits.h>
44 #endif	/* SOLARIS_LDAP_CMD */
45 
46 #ifdef LDAP_TOOL_ARGPIN
47 #include "argpin.h"
48 #include "ntuserpin.h"
49 #endif /* LDAP_TOOL_ARGPIN */
50 
51 #ifndef SOLARIS_LDAP_CMD
52 #include <nspr.h> /* for PR_Cleanup() */
53 #endif	/* SOLARIS_LDAP_CMD */
54 #include <stdlib.h>
55 #include <time.h>	/* for time() and ctime() */
56 #ifdef HAVE_SASL_OPTIONS
57 #ifdef SOLARIS_LDAP_CMD
58 #include <sasl/sasl.h>
59 #else
60 #include <sasl.h>
61 #endif	/* SOLARIS_LDAP_CMD */
62 #include "ldaptool-sasl.h"
63 #endif	/* HAVE_SASL_OPTIONS */
64 
65 #ifndef SOLARIS_LDAP_CMD
66 #define gettext(s) s
67 #endif
68 
69 #ifdef SOLARIS_LDAP_CMD
70 #define	PATH_BUF_SIZE	(PATH_MAX + 1)
71 #endif
72 
73 static LDAP_REBINDPROC_CALLBACK get_rebind_credentials;
74 static void print_library_info( const LDAPAPIInfo *aip, FILE *fp );
75 static int wait4result( LDAP *ld, int msgid, struct berval **servercredp,
76 	char *msg );
77 static int parse_result( LDAP *ld, LDAPMessage *res,
78 	struct berval **servercredp, char *msg, int freeit );
79 
80 #ifdef LDAPTOOL_DEBUG_MEMORY
81 static void *ldaptool_debug_malloc( size_t size );
82 static void *ldaptool_debug_calloc( size_t nelem, size_t elsize );
83 static void *ldaptool_debug_realloc( void *ptr, size_t size );
84 static void ldaptool_debug_free( void *ptr );
85 #endif /* LDAPTOOL_DEBUG_MEMORY */
86 
87 #if defined(NET_SSL)
88 static char *certpath2keypath( char *certdbpath );
89 static int ldaptool_setcallbacks( struct ldapssl_pkcs_fns *pfns);
90 static char * buildTokenCertName( const char *tokenName, const char *certName);
91 #ifdef FORTEZZA
92 static int ldaptool_fortezza_init( int exit_on_error );
93 static int ldaptool_fortezza_alert( void *arg, PRBool onOpen,
94 	char *string, int value1, void *value2 );
95 static void * ldaptool_fortezza_getpin( char **passwordp );
96 static char * ldaptool_fortezza_err2string( int err );
97 #endif /* FORTEZZA */
98 #endif
99 #ifdef HAVE_SASL_OPTIONS
100 static int saslSetParam(char *saslarg);
101 #endif	/* HAVE_SASL_OPTIONS */
102 
103 /*
104  * display usage for common options with one exception: -f is not included
105  * since the description tends to be tool-specific.
106  *
107  * As of 1-Jul-1998, of the characters in the set [A-Za-z] the following are
108  * not currently used by any of the tools: EJgjqr
109  */
110 void
111 ldaptool_common_usage( int two_hosts )
112 {
113     fprintf( stderr, gettext("    -n\t\tshow what would be done but don't actually do it\n") );
114     fprintf( stderr, gettext("    -v\t\trun in verbose mode (diagnostics to standard output)\n") );
115     if ( two_hosts ) {
116 	fprintf( stderr, gettext("    -h host\tLDAP server1 name or IP address (default: %s)\n"), LDAPTOOL_DEFHOST );
117 	fprintf( stderr, gettext("    -p port\tLDAP server1 TCP port number (default: %d)\n"), LDAP_PORT );
118 	fprintf( stderr, gettext("    -h host\tLDAP server2 name or IP address (default: %s)\n"), LDAPTOOL_DEFHOST );
119 	fprintf( stderr, gettext("    -p port\tLDAP server2 TCP port number (default: %d)\n"), LDAP_PORT );
120     } else {
121 	fprintf( stderr, gettext("    -h host\tLDAP server name or IP address (default: %s)\n"), LDAPTOOL_DEFHOST );
122 	fprintf( stderr, gettext("    -p port\tLDAP server TCP port number (default: %d)\n"), LDAP_PORT );
123     }
124     fprintf( stderr,
125 	    gettext("    -V n\tLDAP protocol version number (%d or %d; default: %d)\n"),
126 	    LDAP_VERSION2, LDAP_VERSION3, LDAP_VERSION3 );
127 #if defined(NET_SSL)
128     fprintf( stderr, gettext("    -Z\t\tmake an SSL-encrypted connection\n") );
129     fprintf( stderr, gettext("    -P pathname\tpath to SSL certificate database (default: current directory)\n") );
130     fprintf( stderr, gettext("    -N\t\tname of certificate to use for SSL client authentication\n") );
131 #ifndef SOLARIS_LDAP_CMD
132     fprintf( stderr, gettext("    -K pathname\tpath to key database to use for SSL client authentication\n") );
133     fprintf( stderr, gettext("    \t\t(default: path to certificate database provided with -P option)\n") );
134 #endif	/* SOLARIS_LDAP_CMD */
135 #ifdef LDAP_TOOL_PKCS11
136     fprintf( stderr, gettext("    -m pathname\tpath to security module database\n"));
137 #endif /* LDAP_TOOL_PKCS11 */
138     fprintf( stderr, gettext("    -W\t\tSSL key password\n") );
139 #ifndef SOLARIS_LDAP_CMD
140     fprintf( stderr, gettext("    -3\t\tcheck hostnames in SSL certificates\n") );
141 #endif	/* SOLARIS_LDAP_CMD */
142 
143 #ifdef LDAP_TOOL_PKCS11
144     fprintf( stderr, gettext("    -Q [token][:certificate name]\tPKCS 11\n") );
145     /*    fprintf( stderr, "    -X pathname\tFORTEZZA compromised key list (CKL)\n" ); */
146     fprintf( stderr, gettext("    -I pin\tcard password file\n") );
147 #endif /* LDAP_TOOL_PKCS11 */
148 
149 #endif /* NET_SSL */
150     fprintf( stderr, gettext("    -D binddn\tbind dn\n") );
151     fprintf( stderr, gettext("    -w passwd\tbind passwd (for simple authentication)\n") );
152     fprintf( stderr, gettext("    -w - \tprompt for bind passwd (for simple authentication)\n") );
153     fprintf( stderr, gettext("    -j file\tread bind passwd (for simple authentication)\n") );
154     fprintf( stderr, gettext("      \t\tor SSL key password from 'file'\n") );
155     fprintf( stderr, gettext("    -E\t\task server to expose (report) bind identity\n") );
156 #ifdef LDAP_DEBUG
157     fprintf( stderr, gettext("    -d level\tset LDAP debugging level to `level'\n") );
158 #endif
159     fprintf( stderr, gettext("    -R\t\tdo not automatically follow referrals\n") );
160     fprintf( stderr, gettext("    -O limit\tmaximum number of referral hops to traverse (default: %d)\n"), LDAPTOOL_DEFREFHOPLIMIT );
161     fprintf( stderr, gettext("    -M\t\tmanage references (treat them as regular entries)\n") );
162 #ifndef SOLARIS_LDAP_CMD
163     fprintf( stderr, gettext("    -0\t\tignore LDAP library version mismatches\n") );
164 #endif	/* SOLARIS_LDAP_CMD */
165 
166 #ifndef NO_LIBLCACHE
167     fprintf( stderr, gettext("    -C cfgfile\tuse local database described by cfgfile\n") );
168 #endif
169     fprintf( stderr, gettext("    -i charset\tcharacter set for command line input (default taken from locale)\n") );
170     fprintf( stderr, gettext("    -k dir\tconversion routine directory (default: current directory)\n") );
171 #if 0
172 /*
173  * Suppress usage for -y (old proxied authorization control) even though
174  * we still support it.  We want to encourage people to use -Y instead (the
175  * new proxied authorization control).
176  */
177     fprintf( stderr, gettext("    -y proxydn\tDN used for proxy authorization\n") );
178 #endif
179     fprintf( stderr, gettext("    -Y proxyid\tproxied authorization id,\n") );
180     fprintf( stderr, gettext("              \te.g, dn:uid=bjensen,dc=example,dc=com\n") );
181     fprintf( stderr, gettext("    -H\t\tdisplay usage information\n") );
182 #ifdef SOLARIS_LDAP_CMD
183     fprintf( stderr, gettext("    -?\t\tdisplay usage information\n") );
184 #endif	/* SOLARIS_LDAP_CMD */
185     fprintf( stderr, gettext("    -J controloid[:criticality[:value|::b64value|:<fileurl]]\n") );
186     fprintf( stderr, gettext("\t\tcriticality is a boolean value (default is false)\n") );
187 #ifdef HAVE_SASL_OPTIONS
188     fprintf( stderr, gettext("    -o attrName=attrVal\tSASL options which are described in the man page\n"));
189 #endif	/* HAVE_SASL_OPTIONS */
190 }
191 
192 /* globals */
193 char			*ldaptool_charset = "";
194 char			*ldaptool_host = LDAPTOOL_DEFHOST;
195 char			*ldaptool_host2 = LDAPTOOL_DEFHOST;
196 int			ldaptool_port = LDAP_PORT;
197 int			ldaptool_port2 = LDAP_PORT;
198 int			ldaptool_verbose = 0;
199 int			ldaptool_not = 0;
200 #ifdef SOLARIS_LDAP_CMD
201 int			ldaptool_require_binddn = 1;
202 #endif	/* SOLARIS_LDAP_CMD */
203 FILE			*ldaptool_fp = NULL;
204 FILE			*password_fp = NULL;
205 char			*ldaptool_progname = "";
206 char			*ldaptool_nls_lang = NULL;
207 char                    *proxyauth_id = NULL;
208 int			proxyauth_version = 2;	/* use newer proxy control */
209 LDAPControl		*ldaptool_request_ctrls[CONTROL_REQUESTS] = {0};
210 #ifdef LDAP_DEBUG
211 int			ldaptool_dbg_lvl = 0;
212 #endif /* LDAP_DEBUG */
213 
214 /* statics */
215 static char		*binddn = NULL;
216 static char		*passwd = NULL;
217 static int		send_auth_response_ctrl = 0;
218 static int		user_specified_port = 0;
219 static int		user_specified_port2 = 0;
220 static int		chase_referrals = 1;
221 static int		lib_version_mismatch_is_fatal = 1;
222 static int		ldversion = -1;	/* use default */
223 static int		refhoplim = LDAPTOOL_DEFREFHOPLIMIT;
224 static int		send_manage_dsait_ctrl = 0;
225 static int		prompt_password = 0;
226 #ifdef HAVE_SASL_OPTIONS
227 static unsigned		sasl_flags = LDAP_SASL_INTERACTIVE;
228 static char		*sasl_mech = NULL;
229 static char		*sasl_authid = NULL;
230 static char		*sasl_mode = NULL;
231 static char		*sasl_realm = NULL;
232 static char		*sasl_username = NULL;
233 static char		*sasl_secprops = NULL;
234 static int		ldapauth = -1;
235 #endif	/* HAVE_SASL_OPTIONS */
236 
237 #ifndef NO_LIBLCACHE
238 static char		*cache_config_file = NULL;
239 #endif /* !NO_LIBLCACHE */
240 #if defined(NET_SSL)
241 static int		secure = 0;
242 static int		isZ = 0;
243 static int		isN = 0;
244 static int		isW = 0;
245 static int		isw = 0;
246 static int		isD = 0;
247 static int		isj = 0;
248 static int		ssl_strength = LDAPTOOL_DEFSSLSTRENGTH;
249 #ifdef SOLARIS_LDAP_CMD
250 static char		pathname[PATH_BUF_SIZE];
251 #endif
252 static char		*ssl_certdbpath = NULL;
253 static char		*ssl_keydbpath = NULL;
254 static char		*ssl_keyname = NULL;
255 static char		*ssl_certname = NULL;
256 static char		*ssl_passwd = NULL;
257 
258 #ifdef LDAP_TOOL_PKCS11
259 static char     	*ssl_secmodpath = NULL;
260 
261 static char             *pkcs_token = NULL;
262 
263 static char             *ssl_donglefile = NULL;
264 
265 #if 0
266 static char             *pkcs_pin = NULL;
267 #endif
268 static struct ldapssl_pkcs_fns local_pkcs_fns =
269     {0,NULL,NULL,NULL,NULL,NULL,NULL,NULL, NULL };
270 
271 #ifdef FORTEZZA
272 static uint32		fortezza_cardmask = 0;
273 static char		*fortezza_personality = NULL;
274 static char		*fortezza_krlfile = NULL;
275 static char		*fortezza_pin = NULL;
276 #endif /* FORTEZZA */
277 #endif /* LDAP_TOOL_PKCS11 */
278 #endif /* NET_SSL */
279 
280 /*
281  * Handle general initialization and options that are common to all of
282  * the LDAP tools.
283  * Handle options that are common to all of the LDAP tools.
284  * Note the the H option is included here but handled via the
285  * extra_opt_callback function (along with any "extra_opts" ).
286  *
287  * Return: final value for optind or -1 if usage should be displayed (for
288  * some fatal errors, we call exit here).
289  */
290 int
291 ldaptool_process_args( int argc, char **argv, char *extra_opts,
292 	int two_hosts, void (*extra_opt_callback)( int option, char *optarg ))
293 {
294     int		rc, i, hostnum;
295     char	*optstring, *common_opts;
296     extern char	*optarg;
297     extern int	optind;
298     LDAPAPIInfo	ldai;
299     char *ctrl_arg, *ctrl_oid=NULL, *ctrl_value=NULL;
300     int ctrl_criticality=0, vlen;
301     LDAPControl *ldctrl;
302 #ifdef SOLARIS_LDAP_CMD
303 	struct stat st;
304 #endif
305 
306 
307     /*
308      * Set program name global based on argv[0].
309      */
310     if (( ldaptool_progname = strrchr( argv[ 0 ], '/' )) == NULL ) {
311         ldaptool_progname = argv[ 0 ];
312     } else {
313         ++ldaptool_progname;
314     }
315 
316 #ifdef LDAPTOOL_DEBUG_MEMORY
317     {
318 	struct ldap_memalloc_fns mafns = {
319 		ldaptool_debug_malloc,
320 		ldaptool_debug_calloc,
321 		ldaptool_debug_realloc,
322 		ldaptool_debug_free
323 	};
324 
325 	ldap_set_option( NULL, LDAP_OPT_MEMALLOC_FN_PTRS, &mafns );
326     }
327 #endif	/* LDAPTOOL_DEBUG_MEMORY */
328 
329 #ifdef LDAP_DEBUG
330     i = LDAP_DEBUG_ANY;
331     ldap_set_option( NULL, LDAP_OPT_DEBUG_LEVEL, (void *) &i);
332 #endif
333 
334     /*
335      * Perform a sanity check on the revision of the LDAP API library to
336      * make sure it is at least as new as the one we were compiled against.
337      * If the API implementation is from the same vendor as we were compiled
338      * against, we also check to make sure the vendor version is at least
339      * as new as the library we were compiled against.
340      *
341      * Version differences are fatal unless the -0 option is passed on the
342      * tool command line (that's a zero, not an oh).  We check for the
343      * presence of -0 in a crude way to it must appear by itself in argv.
344      */
345     for ( i = 1; i < argc; ++i ) {
346 	if ( strcmp( argv[i], "-0" ) == 0 ) {
347 	    lib_version_mismatch_is_fatal = 0;
348 	    break;
349 	}
350     }
351 
352     memset( &ldai, 0, sizeof(ldai));
353     ldai.ldapai_info_version = LDAP_API_INFO_VERSION;
354     if (( rc = ldap_get_option( NULL, LDAP_OPT_API_INFO, &ldai )) != 0 ) {
355 	fprintf( stderr, gettext("%s: unable to retrieve LDAP library version"
356 		" information;\n\tthis program requires an LDAP library that"
357 		" implements revision\n\t%d or greater of the LDAP API.\n"),
358 		ldaptool_progname, LDAP_API_VERSION );
359 	if ( lib_version_mismatch_is_fatal ) {
360 	    exit( LDAP_LOCAL_ERROR );
361 	}
362     } else if ( ldai.ldapai_api_version < LDAP_API_VERSION ) {
363 	fprintf( stderr, gettext("%s: this program requires an LDAP library that"
364 		" implements revision\n\t%d or greater of the LDAP API;"
365 		" running with revision %d.\n"),
366 		ldaptool_progname, LDAP_API_VERSION, ldai.ldapai_api_version );
367 	if ( lib_version_mismatch_is_fatal ) {
368 	    exit( LDAP_LOCAL_ERROR );
369 	}
370     } else if ( strcmp( ldai.ldapai_vendor_name, LDAP_VENDOR_NAME ) != 0) {
371 	fprintf( stderr, gettext("%s: this program requires %s's LDAP\n"
372 		"\tlibrary version %2.2f or greater; running with\n"
373 		"\t%s's version %2.2f.\n"),
374 		ldaptool_progname, LDAP_VENDOR_NAME,
375 		(float)LDAP_VENDOR_VERSION / 100,
376 		ldai.ldapai_vendor_name,
377 		(float)ldai.ldapai_vendor_version / 100 );
378 	if ( lib_version_mismatch_is_fatal ) {
379 	    exit( LDAP_LOCAL_ERROR );
380 	}
381     } else if (ldai.ldapai_vendor_version < LDAP_VENDOR_VERSION ) {
382 	fprintf( stderr, gettext("%s: this program requires %s's LDAP\n"
383 		"\tlibrary version %2.2f or greater; running with"
384 		" version %2.2f.\n"),
385 		ldaptool_progname, LDAP_VENDOR_NAME,
386 		(float)LDAP_VENDOR_VERSION / 100,
387 		(float)ldai.ldapai_vendor_version / 100 );
388 	if ( lib_version_mismatch_is_fatal ) {
389 	    exit( LDAP_LOCAL_ERROR );
390 	}
391     }
392 
393     /*
394      * Process command line options.
395      */
396     if ( extra_opts == NULL ) {
397 	extra_opts = "";
398     }
399 
400 #ifdef HAVE_SASL_OPTIONS
401 #ifdef SOLARIS_LDAP_CMD
402     common_opts = "nvEMRH?Zd:D:f:h:j:N:O:o:P:p:W:w:V:i:k:y:Y:J:";
403 #else
404     common_opts = "nvEMRHZ03d:D:f:h:j:I:K:N:O:o:P:p:Q:W:w:V:X:m:i:k:y:Y:J:";
405 #endif	/* SOLARIS_LDAP_CMD */
406 #else
407     common_opts = "nvEMRHZ03d:D:f:h:j:I:K:N:O:P:p:Q:W:w:V:X:m:i:k:y:Y:J:";
408 #endif	/* HAVE_SASL_OPTIONS */
409 
410     /* note: optstring must include room for liblcache "C:" option */
411     if (( optstring = (char *) malloc( strlen( extra_opts ) + strlen( common_opts )
412 	    + 3 )) == NULL ) {
413 	perror( "malloc" );
414 	exit( LDAP_NO_MEMORY );
415     }
416 
417 #ifdef NO_LIBLCACHE
418     sprintf( optstring, "%s%s", common_opts, extra_opts );
419 #else
420     sprintf( optstring, "%s%sC:", common_opts, extra_opts );
421 #endif
422 
423     hostnum = 0;
424     while ( (i = getopt( argc, argv, optstring )) != EOF ) {
425 	switch( i ) {
426 	case 'n':	/* do Not do any LDAP operations */
427 	    ++ldaptool_not;
428 	    break;
429 	case 'v':	/* verbose mode */
430 	    ++ldaptool_verbose;
431 	    break;
432 	case 'd':
433 #ifdef LDAP_DEBUG
434 	    ldaptool_dbg_lvl = atoi( optarg );	/* */
435 #ifdef SOLARIS_LDAP_CMD
436 	    ldap_set_option(NULL, LBER_OPT_DEBUG_LEVEL,
437 		    (void *)&ldaptool_dbg_lvl);
438 #else
439 	    ber_set_option(NULL, LBER_OPT_DEBUG_LEVEL,
440 		    (void *)&ldaptool_dbg_lvl);
441 #endif	/* SOLARIS_LDAP_CMD */
442 	    ldaptool_dbg_lvl |= LDAP_DEBUG_ANY;
443 	    ldap_set_option( NULL, LDAP_OPT_DEBUG_LEVEL,
444 		    (void *)&ldaptool_dbg_lvl);
445 #else /* LDAP_DEBUG */
446 	    fprintf( stderr, gettext("compile with -DLDAP_DEBUG for debugging\n") );
447 #endif /* LDAP_DEBUG */
448 	    break;
449 	case 'R':	/* don't automatically chase referrals */
450 	    chase_referrals = 0;
451 	    break;
452 #ifndef NO_LIBLCACHE
453 	case 'C':	/* search local database */
454 	    cache_config_file = strdup( optarg );
455 	    break;
456 #endif
457 	case 'f':	/* input file */
458 	    if ( optarg[0] == '-' && optarg[1] == '\0' ) {
459 		ldaptool_fp = stdin;
460 	    } else if (( ldaptool_fp = ldaptool_open_file( optarg, "r" )) == NULL ) {
461 		perror( optarg );
462 		exit( LDAP_PARAM_ERROR );
463 	    }
464 	    break;
465 	case 'h':	/* ldap host */
466 	    if ( hostnum == 0 ) {
467 		ldaptool_host = strdup( optarg );
468 	    } else {
469 		ldaptool_host2 = strdup( optarg );
470 	    }
471 	    ++hostnum;
472 	    break;
473 	case 'D':	/* bind DN */
474 	    isD = 1;
475 	    binddn = strdup( optarg );
476 	    break;
477 	case 'E':	/* expose bind identity via auth. response control */
478 	    ++send_auth_response_ctrl;
479 	    break;
480 
481 	case 'p':	/* ldap port */
482 	    if ( !user_specified_port ) {
483 		++user_specified_port;
484 		ldaptool_port = atoi( optarg );
485 	    } else {
486 		++user_specified_port2;
487 		ldaptool_port2 = atoi( optarg );
488 	    }
489 	    break;
490 #if defined(NET_SSL)
491 	case 'P':	/* path to security database */
492 	    secure = 1; /* do SSL encryption */
493 #ifndef SOLARIS_LDAP_CMD
494 	    ssl_certdbpath = strdup(optarg);
495 	    if (NULL == ssl_certdbpath) {
496 		perror("malloc");
497 		exit( LDAP_NO_MEMORY );
498 	    }
499 #else
500 		/*
501 		 * Verify whether it's a base directory or a cert db file.
502 		 * If it is not a directory, truncate the file name as
503 		 * the revised NSS_Init() doesn't take file name any longer.
504 		 */
505 		if (strlcpy(pathname, optarg, PATH_BUF_SIZE) >= PATH_BUF_SIZE) {
506 			fprintf(stderr, gettext("\"-P\": Path name is too "
507 				"long\n"));
508 			exit(LDAP_PARAM_ERROR);
509 		}
510 
511 		if (stat(pathname, &st) != 0) {
512 			perror("stat");
513 			fprintf(stderr, gettext("\"-P\": Path name is "
514 				"invalid\n"));
515 			exit(LDAP_PARAM_ERROR);
516 		} else {
517 			if (S_ISREG(st.st_mode)) {
518 				/* redir to a regular file's dir name */
519 				ssl_certdbpath = dirname(pathname);
520 			} else
521 				ssl_certdbpath = pathname;
522 		}
523 #endif /* SOLARIS_LDAP_CMD */
524 	    break;
525 	case 'Z':	/* do SSL encryption */
526 	    secure = 1;
527 	    isZ = 1;
528 	    break;
529 	case 'N':	/* nickname of cert. to use for client auth. */
530 	    ssl_certname = strdup( optarg );
531 	    if (NULL == ssl_certname)
532 	    {
533 		perror("malloc");
534 		exit( LDAP_NO_MEMORY );
535 	    }
536 	    isN = 1;
537 	    break;
538 #ifndef SOLARIS_LDAP_CMD
539 	case 'K':	/* location of key database */
540 	    ssl_keydbpath = strdup( optarg );
541 	    if (NULL == ssl_keydbpath)
542 	    {
543 		perror("malloc");
544 		exit( LDAP_NO_MEMORY );
545 	    }
546 	    break;
547 #endif	/* SOLARIS_LDAP_CMD */
548 
549 	case 'W':	/* SSL key password */
550 	    ssl_passwd = strdup( optarg );
551 	    if (NULL == ssl_passwd)
552 	    {
553 		perror("malloc");
554 		exit( LDAP_NO_MEMORY );
555 	    }
556 	    isW = 1;
557 	    break;
558 
559 #ifndef SOLARIS_LDAP_CMD
560 	case '3': /* check hostnames in SSL certificates ("no third") */
561 	    ssl_strength = LDAPSSL_AUTH_CNCHECK;
562 	    break;
563 #endif	/* SOLARIS_LDAP_CMD */
564 
565 #ifdef LDAP_TOOL_PKCS11
566 	case 'm':	/* SSL secmod path */
567 	    ssl_secmodpath = strdup( optarg);
568 	    if (NULL == ssl_secmodpath)
569 	    {
570 		perror("malloc");
571 		exit( LDAP_NO_MEMORY );
572 	    }
573 	    break;
574 
575 	case 'Q': 	/* FORTEZZA [card][:personality] */
576 	    pkcs_token = strdup(optarg);
577 	    if (NULL == pkcs_token)
578 	    {
579 		perror("malloc");
580 		exit( LDAP_NO_MEMORY );
581 	    }
582 
583 	    break;
584 	    /* This option removed to prevent interference
585 	       with the getEffectiveRights option, also -X
586 	       case 'X':	* path to FORTEZZA CKL file *
587 
588 	       fortezza_krlfile = strdup( optarg );
589 
590 
591 	       break;
592 	    */
593 	case 'I':	/* FORTEZZA PIN (password file) */
594 	    ssl_donglefile = strdup( optarg );
595 
596 	    break;
597 #endif /* LDAP_TOOL_PKCS11 */
598 
599 #endif /* NET_SSL */
600 	case 'w':	/* bind password */
601 	    isw = 1;
602 	    if ( optarg[0] == '-' && optarg[1] == '\0' )
603 		prompt_password = 1;
604 	    else
605 		passwd = strdup( optarg );
606 	    break;
607 	    case 'j':       /* bind password or SSL key password from file */
608 	    isj = 1;
609 	    if ((password_fp = fopen( optarg, "r" )) == NULL ) {
610 		fprintf(stderr, gettext("%s: Unable to open '%s' file\n"),
611 			ldaptool_progname, optarg);
612 		exit( LDAP_PARAM_ERROR );
613 	    }
614             break;
615 	case 'O':	/* referral hop limit */
616 	    refhoplim = atoi( optarg );
617 	    break;
618 	case 'V':	/* protocol version */
619 	    ldversion = atoi (optarg);
620 	    if ( ldversion != LDAP_VERSION2 && ldversion != LDAP_VERSION3 ) {
621 		fprintf( stderr, gettext("%s: LDAP protocol version %d is not "
622 			"supported (use -V%d or -V%d)\n"),
623 			ldaptool_progname, ldversion, LDAP_VERSION2,
624 			LDAP_VERSION3 );
625 		exit( LDAP_PARAM_ERROR );
626 	    }
627 	    break;
628 	case 'M':	/* send a manageDsaIT control */
629 	    send_manage_dsait_ctrl = 1;
630 	    break;
631 
632 	case 'i':   /* character set specified */
633 	    ldaptool_charset = strdup( optarg );
634 	    if (NULL == ldaptool_charset)
635 	    {
636 		perror( "malloc" );
637 		exit( LDAP_NO_MEMORY );
638 	    }
639 
640 	    break;
641 	case 'k':   /* conversion directory */
642 	    ldaptool_convdir = strdup( optarg );
643 	    if (NULL == ldaptool_convdir)
644 	    {
645 		perror( "malloc" );
646 		exit( LDAP_NO_MEMORY );
647 	    }
648 	    break;
649 	case 'y':   /* old (version 1) proxied authorization control */
650 		proxyauth_version = 1;
651 	case 'Y':   /* new (version 2 ) proxied authorization control */
652 		/*FALLTHRU*/
653 	    proxyauth_id = strdup(optarg);
654 	    if (NULL == proxyauth_id)
655 	    {
656 		perror( "malloc" );
657 		exit( LDAP_NO_MEMORY );
658 	    }
659 
660 	    break;
661 
662 #ifndef SOLARIS_LDAP_CMD
663  	case '0':	/* zero -- override LDAP library version check */
664 	    break;	/* already handled above */
665 #endif	/* SOLARIS_LDAP_CMD */
666 	case 'J':	 /* send an arbitrary control */
667 	    if ( (ctrl_arg = strdup( optarg)) == NULL ) {
668 		perror ("strdup");
669 		exit (LDAP_NO_MEMORY);
670 	    }
671 	    if (ldaptool_parse_ctrl_arg(ctrl_arg, ':', &ctrl_oid,
672 		    &ctrl_criticality, &ctrl_value, &vlen)) {
673 		return (-1);
674 	    }
675 	    ldctrl = calloc(1,sizeof(LDAPControl));
676 	    if (ctrl_value) {
677 		rc = ldaptool_berval_from_ldif_value( ctrl_value,
678 			vlen, &(ldctrl->ldctl_value),
679 			1 /* recognize file URLs */,
680 			0 /* always try file */,
681 			1 /* report errors */ );
682 		if ((rc = ldaptool_fileurlerr2ldaperr( rc )) != LDAP_SUCCESS) {
683 		    fprintf( stderr, gettext("Unable to parse %s\n"), ctrl_value);
684 		    return (-1);
685 		}
686 	    }
687 	    ldctrl->ldctl_oid = ctrl_oid;
688 	    ldctrl->ldctl_iscritical = ctrl_criticality;
689 	    ldaptool_add_control_to_array(ldctrl, ldaptool_request_ctrls);
690 	    break;
691 #ifdef HAVE_SASL_OPTIONS
692 	case 'o':	/* attribute assignment */
693 	      if ((rc = saslSetParam(optarg)) == -1) {
694 	      	  return (-1);
695 	      }
696 	      ldapauth = LDAP_AUTH_SASL;
697 	      ldversion = LDAP_VERSION3;
698 	      break;
699 #endif	/* HAVE_SASL_OPTIONS */
700 	default:
701 	    (*extra_opt_callback)( i, optarg );
702 	}
703     }
704 
705 
706     /* If '-Z' is specified, check if '-P' is specified too. */
707     if ( isN || isW ) {
708 	if ( !isZ ) {
709 		fprintf( stderr, gettext("%s: with -N, -W options, please specify -Z\n\n"), ldaptool_progname );
710 		return (-1);
711 	}
712     }
713 
714     /* if '-N' is specified, -W is needed too */
715     if ( isN && NULL == ssl_passwd ) {
716         fprintf( stderr, gettext("%s: with the -N option, please specify -W also\n\n"),
717 		ldaptool_progname );
718         return (-1);
719     }
720 
721 #ifdef SOLARIS_LDAP_CMD
722     if ( isj && ( isw || isW )) {
723 	fprintf(stderr, gettext("%s: -j and -w or -W options cannot be specified simultaneously\n\n"), ldaptool_progname );
724 #else
725     if ( isj && isw ) {
726 	fprintf(stderr, gettext("%s: -j and -w options cannot be specified simultaneously\n\n"), ldaptool_progname );
727 #endif	/* SOLARIS_LDAP_CMD */
728 	return (-1);
729     }
730 
731     /* complain if -j or -w does not also have -D, unless using SASL */
732 #ifdef HAVE_SASL_OPTIONS
733     if ( (isj || isw) && !isD && (  ldapauth != LDAP_AUTH_SASL ) ) {
734 #else
735     if ( (isj || isw) && !isD ) {
736 #endif
737 	fprintf(stderr, gettext("%s: with -j, -w options, please specify -D\n\n"), ldaptool_progname );
738 	return (-1);
739     }
740 
741     /* use default key and cert DB paths if not set on the command line */
742     if ( NULL == ssl_keydbpath ) {
743         if ( NULL == ssl_certdbpath ) {
744             ssl_keydbpath = LDAPTOOL_DEFKEYDBPATH;
745         } else {
746             ssl_keydbpath = certpath2keypath( ssl_certdbpath );
747         }
748     }
749     if ( NULL == ssl_certdbpath ) {
750         ssl_certdbpath = LDAPTOOL_DEFCERTDBPATH;
751     }
752 
753     if (prompt_password != 0) {
754 	char *password_string = "Enter bind password: ";
755 
756 #if defined(_WIN32)
757 	char pbuf[257];
758 	fputs(password_string,stdout);
759 	fflush(stdout);
760 	if (fgets(pbuf,256,stdin) == NULL) {
761 	    passwd = NULL;
762 	} else {
763 	    char *tmp;
764 
765 	    tmp = strchr(pbuf,'\n');
766 	    if (tmp) *tmp = '\0';
767 	    tmp = strchr(pbuf,'\r');
768 	    if (tmp) *tmp = '\0';
769 	    passwd = strdup(pbuf);
770 	}
771 #else
772 #if defined(SOLARIS)
773 	/* 256 characters on Solaris */
774 	passwd = getpassphrase(password_string);
775 #else
776 	/* limited to 16 chars on Tru64, 32 on AIX */
777 	passwd = getpass(password_string);
778 #endif
779 #endif
780 
781     } else if (password_fp != NULL) {
782 	char *linep = NULL;
783 	int   increment = 0;
784 	int   c, index;
785 
786 	/* allocate initial block of memory */
787 	if ((linep = (char *)malloc(BUFSIZ)) == NULL) {
788 	    fprintf( stderr, gettext("%s: not enough memory to read password from file\n"), ldaptool_progname );
789 	    exit( LDAP_NO_MEMORY );
790 	}
791 	increment++;
792 	index = 0;
793 	while ((c = fgetc( password_fp )) != '\n' && c != EOF) {
794 
795 	    /* check if we will overflow the buffer */
796 	    if ((c != EOF) && (index == ((increment * BUFSIZ) -1))) {
797 
798 		/* if we did, add another BUFSIZ worth of bytes */
799 		if ((linep = (char *)
800 		    realloc(linep, (increment + 1) * BUFSIZ)) == NULL) {
801 			fprintf( stderr, gettext("%s: not enough memory to read password from file\n"), ldaptool_progname );
802 			exit( LDAP_NO_MEMORY );
803 		}
804 	 	increment++;
805 	    }
806 	    linep[index++] = c;
807 	}
808 	linep[index] = '\0';
809 	passwd = linep;
810     }
811 
812 #ifdef SOLARIS_LDAP_CMD
813     if (binddn != NULL && passwd == NULL) {
814 	char *password_string = gettext("Enter bind password: ");
815 	passwd = getpassphrase(password_string);
816     }
817 
818 #ifdef HAVE_SASL_OPTIONS
819     if (ldapauth == LDAP_AUTH_SASL) {
820 	/* BindDN not required for SASL */
821 	ldaptool_require_binddn = 0;
822     }
823 #endif	/* HAVE_SASL_OPTIONS */
824 
825 #ifdef NET_SSL
826     if (secure == 1) {
827 	/* BindDN not required for SSL */
828 	ldaptool_require_binddn = 0;
829     }
830 #endif	/* NET_SSL */
831 
832     if (ldaptool_require_binddn && binddn == NULL && passwd == NULL) {
833 		fprintf(stderr,
834 			gettext("%s: DN and Bind Password are required.\n"),
835 			ldaptool_progname );
836 		exit(1);
837     }
838 #endif	/* SOLARIS_LDAP_CMD */
839 
840     /*
841      * If verbose (-v) flag was passed in, display program name and start time.
842      * If the verbose flag was passed at least twice (-vv), also display
843      * information about the API library we are running with.
844      */
845     if ( ldaptool_verbose ) {
846 	time_t	curtime;
847 
848 	curtime = time( NULL );
849 	printf( gettext("%s: started %s\n"), ldaptool_progname, ctime( &curtime ));
850 	if ( ldaptool_verbose > 1 ) {
851 	    print_library_info( &ldai, stdout );
852 	}
853     }
854 
855 #ifdef LDAP_TOOL_PKCS11
856     if ((NULL != pkcs_token) && (NULL != ssl_certname)) {
857 	char *result;
858 
859 	if ( (result = buildTokenCertName( pkcs_token, ssl_certname)) != NULL){
860 	    free( ssl_certname );
861 	    ssl_certname = result;
862 	}
863     }
864 #endif /* LDAP_TOOL_PKCS11 */
865 
866     free( optstring );
867 
868     /*
869      * Clean up and return index of first non-option argument.
870      */
871     if ( ldai.ldapai_extensions != NULL ) {
872 	ldap_value_free( ldai.ldapai_extensions );
873     }
874     if ( ldai.ldapai_vendor_name != NULL ) {
875 	ldap_memfree( ldai.ldapai_vendor_name );
876     }
877 
878 #ifdef HAVE_SASL_OPTIONS
879     if (ldversion == LDAP_VERSION2 && ldapauth == LDAP_AUTH_SASL) {
880        fprintf( stderr, gettext("Incompatible with version %d\n"), ldversion);
881        return (-1);
882     }
883 #endif	/* HAVE_SASL_OPTIONS */
884     return( optind );
885 }
886 
887 
888 /*
889  * Write detailed information about the API library we are running with to fp.
890  */
891 static void
892 print_library_info( const LDAPAPIInfo *aip, FILE *fp )
893 {
894     int                 i;
895     LDAPAPIFeatureInfo  fi;
896 
897     fprintf( fp, gettext("LDAP Library Information -\n"
898 	    "    Highest supported protocol version: %d\n"
899 	    "    LDAP API revision:                  %d\n"
900 	    "    API vendor name:                    %s\n"
901 	    "    Vendor-specific version:            %.2f\n"),
902 	    aip->ldapai_protocol_version, aip->ldapai_api_version,
903 	    aip->ldapai_vendor_name,
904 	    (float)aip->ldapai_vendor_version / 100.0 );
905 
906     if ( aip->ldapai_extensions != NULL ) {
907 	fputs( gettext("    LDAP API Extensions:\n"), fp );
908 
909 	for ( i = 0; aip->ldapai_extensions[i] != NULL; i++ )  {
910 	    fprintf( fp, gettext("        %s"), aip->ldapai_extensions[i] );
911 	    fi.ldapaif_info_version = LDAP_FEATURE_INFO_VERSION;
912 	    fi.ldapaif_name = aip->ldapai_extensions[i];
913 	    fi.ldapaif_version = 0;
914 
915 	    if ( ldap_get_option( NULL, LDAP_OPT_API_FEATURE_INFO, &fi )
916 		    != 0 ) {
917 		fprintf( fp, gettext(" %s: ldap_get_option( NULL,"
918 			" LDAP_OPT_API_FEATURE_INFO, ... ) for %s failed"
919 			" (Feature Info version: %d)\n"), ldaptool_progname,
920 			fi.ldapaif_name, fi.ldapaif_info_version );
921 	    } else {
922 		fprintf( fp, gettext(" (revision %d)\n"), fi.ldapaif_version);
923 	    }
924 	}
925     }
926    fputc( '\n', fp );
927 }
928 
929 
930 
931 #ifdef LDAP_TOOL_ARGPIN
932 static int PinArgRegistration( void )
933 {
934 
935     /* pkcs_init was successful  register the pin args */
936 
937     SVRCOREArgPinObj *ArgPinObj;
938     char *tokenName;
939 #ifndef _WIN32
940     SVRCOREStdPinObj *StdPinObj;
941 #else
942     SVRCOREFilePinObj *FilePinObj;
943     SVRCOREAltPinObj *AltPinObj;
944     SVRCORENTUserPinObj *NTUserPinObj;
945     int err;
946 #endif
947     char *pin;
948     char *filename;
949     /* Create and register the pin object for PKCS 11 */
950     local_pkcs_fns.pkcs_getdonglefilename(NULL, &filename);
951     local_pkcs_fns.pkcs_getpin(NULL, "", &pin);
952 #ifndef _WIN32
953     if ( SVRCORE_CreateStdPinObj(&StdPinObj, filename, PR_TRUE) !=
954 	 SVRCORE_Success) {
955 	fprintf(stderr, gettext("Security Initialization: Unable to create PinObj "
956 	       "(%d)"), PR_GetError());
957 	return -1;
958     }
959     if (pin != NULL)
960     {
961 	local_pkcs_fns.pkcs_gettokenname(NULL, &tokenName);
962 	SVRCORE_CreateArgPinObj(&ArgPinObj, tokenName, pin, (SVRCOREPinObj *)StdPinObj);
963 	SVRCORE_RegisterPinObj((SVRCOREPinObj *)ArgPinObj);
964     }
965     else
966     {
967 	SVRCORE_RegisterPinObj((SVRCOREPinObj *)StdPinObj);
968     }
969 #else
970     if (NULL != pin)
971     {
972 	local_pkcs_fns.pkcs_gettokenname(NULL, &tokenName);
973 	if ((err = SVRCORE_CreateNTUserPinObj(&NTUserPinObj)) != SVRCORE_Success){
974 	    fprintf(stderr, gettext("Security Initialization: Unable to create NTUserPinObj "
975 		   "(%d)"), PR_GetError());
976 	    exit( LDAP_LOCAL_ERROR );
977 	}
978 	if ((err = SVRCORE_CreateArgPinObj(&ArgPinObj, tokenName, pin,
979 					   (SVRCOREPinObj *)NTUserPinObj)) != SVRCORE_Success)
980 	{
981 	    fprintf(stderr, gettext("Security Initialization: Unable to create ArgPinObj "
982 		   "(%d)"), PR_GetError());
983 	    return -1;
984 
985 	}
986 	SVRCORE_RegisterPinObj((SVRCOREPinObj *)ArgPinObj);
987 
988     }
989     else
990     {
991 	if ((err = SVRCORE_CreateNTUserPinObj(&NTUserPinObj)) != SVRCORE_Success){
992 	    fprintf(stderr, gettext("Security Initialization: Unable to create NTUserPinObj "
993 		   "(%d)"), PR_GetError());
994 		return -1;
995 	}
996 	if (filename && *filename)
997 	{
998 	    if ((err = SVRCORE_CreateFilePinObj(&FilePinObj, filename)) !=
999 		SVRCORE_Success) {
1000 		fprintf(stderr, gettext("Security Initialization: Unable to create FilePinObj "
1001 		       "(%d)"), PR_GetError());
1002 		return -1;
1003 
1004 	    }
1005 	    if ((err = SVRCORE_CreateAltPinObj(&AltPinObj, (SVRCOREPinObj *)FilePinObj,
1006 					       (SVRCOREPinObj *)NTUserPinObj)) != SVRCORE_Success) {
1007 		fprintf(stderr, gettext("Security Initialization: Unable to create AltPinObj "
1008 		       "(%d)"), PR_GetError());
1009 		return -1;
1010 	    }
1011 	    SVRCORE_RegisterPinObj((SVRCOREPinObj *)AltPinObj);
1012 	}
1013 	else
1014 	{
1015 	    SVRCORE_RegisterPinObj((SVRCOREPinObj *)NTUserPinObj);
1016 	}
1017     }
1018 #endif
1019     return LDAP_SUCCESS;
1020 
1021 }
1022 #endif /* LDAP_TOOL_ARGPIN */
1023 
1024 
1025 /*
1026  * initialize and return an LDAP session handle.
1027  * if errors occur, we exit here.
1028  */
1029 LDAP *
1030 ldaptool_ldap_init( int second_host )
1031 {
1032     LDAP	*ld = NULL;
1033     char	*host;
1034     int		port, rc, user_port;
1035 
1036     if ( ldaptool_not ) {
1037 	return( NULL );
1038     }
1039 
1040     if ( second_host ) {
1041 	host = ldaptool_host2;
1042 	port = ldaptool_port2;
1043 	user_port = user_specified_port2;
1044     } else {
1045 	host = ldaptool_host;
1046 	port = ldaptool_port;
1047 	user_port = user_specified_port;
1048     }
1049 
1050 
1051     if ( ldaptool_verbose ) {
1052 	printf( gettext("ldap_init( %s, %d )\n"), host, port );
1053     }
1054 
1055 #if defined(NET_SSL)
1056     /*
1057      * Initialize security libraries and databases and LDAP session.  If
1058      * ssl_certname is not NULL, then we will attempt to use client auth.
1059      * if the server supports it.
1060      */
1061 #ifdef LDAP_TOOL_PKCS11
1062     ldaptool_setcallbacks( &local_pkcs_fns );
1063 
1064     if ( !second_host 	&& secure
1065 	 &&(rc = ldapssl_pkcs_init( &local_pkcs_fns))  < 0) {
1066 	    /* secure connection requested -- fail if no SSL */
1067 #ifndef SOLARIS_LDAP_CMD
1068 	    rc = PORT_GetError();
1069 #endif	/* SOLARIS_LDAP_CMD */
1070 	    fprintf( stderr, gettext("SSL initialization failed: error %d (%s)\n"),
1071 		    rc, ldapssl_err2string( rc ));
1072 	    exit( LDAP_LOCAL_ERROR );
1073     }
1074 
1075 #ifdef LDAP_TOOL_ARGPIN
1076     if (secure) {
1077 	if (PinArgRegistration( )) {
1078 	    exit( LDAP_LOCAL_ERROR);
1079 	}
1080     }
1081 #endif /* LDAP_TOOL_ARGPIN */
1082 
1083 #else /* LDAP_TOOL_PKCS11 */
1084     if ( !second_host 	&& secure
1085 	 &&(rc = ldapssl_client_init( ssl_certdbpath, NULL )) < 0) {
1086 	    /* secure connection requested -- fail if no SSL */
1087 #ifndef SOLARIS_LDAP_CMD
1088 	    rc = PORT_GetError();
1089 #endif	/* SOLARIS_LDAP_CMD */
1090 	    fprintf( stderr, gettext("SSL initialization failed: error %d (%s)\n"),
1091 		    rc, ldapssl_err2string( rc ));
1092 	    exit( LDAP_LOCAL_ERROR );
1093     }
1094 #endif /* LDAP_TOOL_PKCS11 */
1095 
1096     /* set the default SSL strength (used for all future ld's we create) */
1097     if ( ldapssl_set_strength( NULL, ssl_strength ) < 0 ) {
1098         perror( "ldapssl_set_strength" );
1099         exit( LDAP_LOCAL_ERROR );
1100     }
1101 
1102 
1103     if (secure) {
1104 	if ( !user_port ) {
1105 	    port = LDAPS_PORT;
1106 	}
1107 
1108 	if (( ld = ldapssl_init( host, port,
1109 		secure )) != NULL && ssl_certname != NULL )
1110 	    if (ldapssl_enable_clientauth( ld, ssl_keydbpath, ssl_passwd,
1111 		ssl_certname ) != 0 ) {
1112 		exit ( ldaptool_print_lderror( ld, "ldapssl_enable_clientauth",
1113 		    LDAPTOOL_CHECK4SSL_ALWAYS ));
1114 	    }
1115     } else {
1116 	/* In order to support IPv6, we use NSPR I/O */
1117 #ifdef SOLARIS_LDAP_CMD
1118 	ld = ldap_init( host, port );
1119 #else
1120 	ld = prldap_init( host, port, 0 /* not shared across threads */ );
1121 #endif /* SOLARIS_LDAP_CMD */
1122     }
1123 
1124 #else /* NET_SSL */
1125     /* In order to support IPv6, we use NSPR I/O */
1126 #ifdef SOLARIS_LDAP_CMD
1127     ld = ldap_init( host, port );
1128 #else
1129     ld = prldap_init( host, port, 0 /* not shared across threads */ );
1130 #endif /* SOLARIS_LDAP_CMD */
1131 #endif /* NET_SSL */
1132 
1133     if ( ld == NULL ) {
1134 	perror( "ldap_init" );
1135 	exit( LDAP_LOCAL_ERROR );
1136     }
1137 
1138 #ifndef NO_LIBLCACHE
1139     if ( cache_config_file != NULL ) {
1140 	int	opt;
1141 
1142 	if ( lcache_init( ld, cache_config_file ) != 0 ) {
1143 		exit( ldaptool_print_lderror( ld, cache_config_file,
1144 			LDAPTOOL_CHECK4SSL_NEVER ));
1145 	}
1146 	opt = 1;
1147 	(void) ldap_set_option( ld, LDAP_OPT_CACHE_ENABLE, &opt );
1148 	opt = LDAP_CACHE_LOCALDB;
1149 	(void) ldap_set_option( ld, LDAP_OPT_CACHE_STRATEGY, &opt );
1150 	if ( ldversion == -1 ) {	/* not set with -V */
1151 	    ldversion = LDAP_VERSION2;	/* local db only supports v2 */
1152 	}
1153     }
1154 #endif
1155 
1156 
1157     ldap_set_option( ld, LDAP_OPT_REFERRALS, chase_referrals ? LDAP_OPT_ON:
1158 	LDAP_OPT_OFF );
1159     if ( chase_referrals ) {
1160 	ldap_set_rebind_proc( ld, get_rebind_credentials, NULL );
1161 	ldap_set_option( ld, LDAP_OPT_REFERRAL_HOP_LIMIT, &refhoplim );
1162     }
1163 
1164     if ( ldversion == -1 ) {	/* not set with -V and not using local db */
1165 	ldversion = LDAP_VERSION3;
1166     }
1167     ldap_set_option( ld, LDAP_OPT_PROTOCOL_VERSION, &ldversion );
1168 
1169     return( ld );
1170 }
1171 
1172 
1173 /*
1174  * perform a bind to the LDAP server if needed.
1175  * if an error occurs, we exit here.
1176  */
1177 void
1178 ldaptool_bind( LDAP *ld )
1179 {
1180     int		rc;
1181     char	*conv;
1182     LDAPControl	auth_resp_ctrl, *ctrl_array[ 2 ], **bindctrls;
1183 #ifdef HAVE_SASL_OPTIONS
1184     void *defaults;
1185 #endif
1186 
1187     if ( ldaptool_not ) {
1188 	return;
1189     }
1190 
1191     if ( send_auth_response_ctrl ) {
1192 	auth_resp_ctrl.ldctl_oid = LDAP_CONTROL_AUTH_REQUEST;
1193 	auth_resp_ctrl.ldctl_value.bv_val = NULL;
1194 	auth_resp_ctrl.ldctl_value.bv_len = 0;
1195 	auth_resp_ctrl.ldctl_iscritical = 0;
1196 
1197 	ctrl_array[0] = &auth_resp_ctrl;
1198 	ctrl_array[1] = NULL;
1199 	bindctrls = ctrl_array;
1200     } else {
1201 	bindctrls = NULL;
1202     }
1203 
1204     /*
1205      * if using LDAPv3 and not using client auth., omit NULL bind for
1206      * efficiency.
1207      */
1208     if ( ldversion > LDAP_VERSION2 && binddn == NULL && passwd == NULL
1209 	    && ssl_certname == NULL ) {
1210 #ifdef HAVE_SASL_OPTIONS
1211 	if ( ldapauth != LDAP_AUTH_SASL ) {
1212 	   return;
1213 	}
1214 #else
1215 	return;
1216 #endif
1217     }
1218 
1219     /*
1220      * do the bind, backing off one LDAP version if necessary
1221      */
1222     conv = ldaptool_local2UTF8( binddn );
1223 
1224 #ifdef HAVE_SASL_OPTIONS
1225     if ( ldapauth == LDAP_AUTH_SASL) {
1226 	if ( sasl_mech == NULL) {
1227 	   fprintf( stderr, gettext("Please specify the SASL mechanism name when "
1228 				"using SASL options\n"));
1229 	   return;
1230 	}
1231 
1232         if ( sasl_secprops != NULL) {
1233            rc = ldap_set_option( ld, LDAP_OPT_X_SASL_SECPROPS,
1234                                 (void *) sasl_secprops );
1235 
1236            if ( rc != LDAP_SUCCESS ) {
1237               fprintf( stderr, gettext("Unable to set LDAP_OPT_X_SASL_SECPROPS: %s\n"),
1238 				sasl_secprops );
1239               return;
1240            }
1241         }
1242 
1243         defaults = ldaptool_set_sasl_defaults( ld, sasl_mech, sasl_authid, sasl_username, passwd, sasl_realm );
1244         if (defaults == NULL) {
1245 	   perror ("malloc");
1246 	   exit (LDAP_NO_MEMORY);
1247 	}
1248 
1249         rc = ldap_sasl_interactive_bind_s( ld, binddn, sasl_mech, NULL, NULL,
1250                         sasl_flags, ldaptool_sasl_interact, defaults );
1251 
1252         if (rc != LDAP_SUCCESS ) {
1253            ldap_perror( ld, "ldap_sasl_interactive_bind_s" );
1254         }
1255     } else
1256 #endif	/* HAVE_SASL_OPTIONS */
1257         /*
1258          * if using LDAPv3 and client auth., try a SASL EXTERNAL bind
1259          */
1260          if ( ldversion > LDAP_VERSION2 && binddn == NULL && passwd == NULL
1261 	    	&& ssl_certname != NULL ) {
1262 	     rc = ldaptool_sasl_bind_s( ld, NULL, LDAP_SASL_EXTERNAL, NULL,
1263 			bindctrls, NULL, NULL, "ldap_sasl_bind" );
1264     	 }
1265          else {
1266 	     rc = ldaptool_simple_bind_s( ld, conv, passwd, bindctrls, NULL,
1267 		    "ldap_simple_bind" );
1268 	  }
1269 
1270     if ( rc == LDAP_SUCCESS ) {
1271         if ( conv != NULL ) {
1272            free( conv );
1273 	}
1274 	return;			/* success */
1275     }
1276 
1277 #ifdef HAVE_SASL_OPTIONS
1278   if (ldapauth != LDAP_AUTH_SASL) {
1279 #endif	/* HAVE_SASL_OPTIONS */
1280     if ( rc == LDAP_PROTOCOL_ERROR && ldversion > LDAP_VERSION2 ) {
1281 	/*
1282 	 * try again, backing off one LDAP version
1283 	 * this is okay even for client auth. because the way to achieve
1284 	 * client auth. with LDAPv2 is to perform a NULL simple bind.
1285 	 */
1286 	--ldversion;
1287 	fprintf( stderr, gettext("%s: the server doesn't understand LDAPv%d;"
1288 		" trying LDAPv%d instead...\n"), ldaptool_progname,
1289 		ldversion + 1, ldversion );
1290 	ldap_set_option( ld, LDAP_OPT_PROTOCOL_VERSION, &ldversion );
1291 	if (( rc = ldaptool_simple_bind_s( ld, conv, passwd,
1292 		bindctrls, NULL, "ldap_simple_bind" )) == LDAP_SUCCESS ) {
1293             if( conv != NULL )
1294                 free( conv );
1295 	    return;		/* a qualified success */
1296 	}
1297     }
1298 #ifdef HAVE_SASL_OPTIONS
1299   }
1300 #endif	/* HAVE_SASL_OPTIONS */
1301 
1302     if ( conv != NULL ) {
1303         free( conv );
1304     }
1305 
1306     /*
1307      * bind(s) failed -- fatal error
1308      */
1309     ldap_unbind( ld );
1310     exit( rc );
1311 }
1312 
1313 
1314 /*
1315  * close open files, unbind, etc.
1316  */
1317 void
1318 ldaptool_cleanup( LDAP *ld )
1319 {
1320     if ( ld != NULL ) {
1321 	ldap_unbind( ld );
1322     }
1323 
1324     if ( ldaptool_fp != NULL && ldaptool_fp != stdin ) {
1325 	fclose( ldaptool_fp );
1326 	ldaptool_fp = NULL;
1327     }
1328 }
1329 
1330 
1331 /*
1332  * Retrieve and print an LDAP error message.  Returns the LDAP error code.
1333  */
1334 int
1335 ldaptool_print_lderror( LDAP *ld, char *msg, int check4ssl )
1336 {
1337     int		lderr = ldap_get_lderrno( ld, NULL, NULL );
1338 
1339     ldap_perror( ld, msg );
1340 #ifndef SOLARIS_LDAP_CMD
1341     if ( secure && check4ssl != LDAPTOOL_CHECK4SSL_NEVER ) {
1342 	if ( check4ssl == LDAPTOOL_CHECK4SSL_ALWAYS
1343 		|| ( lderr == LDAP_SERVER_DOWN )) {
1344 	    int		sslerr = PORT_GetError();
1345 
1346 	    fprintf( stderr, gettext("\tSSL error %d (%s)\n"), sslerr,
1347 		    ldapssl_err2string( sslerr ));
1348 	}
1349     }
1350 #endif	/* SOLARIS_LDAP_CMD */
1351 
1352     return( lderr );
1353 }
1354 
1355 
1356 /*
1357  * print referrals to stderr
1358  */
1359 void
1360 ldaptool_print_referrals( char **refs )
1361 {
1362     int		i;
1363 
1364     if ( refs != NULL ) {
1365 	for ( i = 0; refs[ i ] != NULL; ++i ) {
1366 	    fprintf( stderr, gettext("Referral: %s\n"), refs[ i ] );
1367 	}
1368     }
1369 }
1370 
1371 
1372 /*
1373  * print contents of an extended response to stderr
1374  * this is mainly to support unsolicited notifications
1375  * Returns an LDAP error code (from the extended result).
1376  */
1377 int
1378 ldaptool_print_extended_response( LDAP *ld, LDAPMessage *res, char *msg )
1379 {
1380     char		*oid;
1381     struct berval	*data;
1382 
1383     if ( ldap_parse_extended_result( ld, res, &oid, &data, 0 )
1384 	    != LDAP_SUCCESS ) {
1385 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1386     } else {
1387 	if ( oid != NULL ) {
1388 	    if ( strcmp ( oid, LDAP_NOTICE_OF_DISCONNECTION ) == 0 ) {
1389 		fprintf( stderr, gettext("%s: Notice of Disconnection\n"), msg );
1390 	    } else {
1391 		fprintf( stderr, gettext("%s: OID %s\n"), msg, oid );
1392 	    }
1393 	    ldap_memfree( oid );
1394 	} else {
1395 	    fprintf( stderr, gettext("%s: missing OID\n"), msg );
1396 	}
1397 
1398 	if ( data != NULL ) {
1399 	    fprintf( stderr, gettext("%s: Data (length %ld):\n"), msg, data->bv_len );
1400 #if 0
1401 /* XXXmcs: maybe we should display the actual data? */
1402 	    lber_bprint( data->bv_val, data->bv_len );
1403 #endif
1404 	    ber_bvfree( data );
1405 	}
1406     }
1407 
1408     return parse_result( ld, res, NULL, msg, 1 );
1409 }
1410 
1411 
1412 /*
1413  * Like ldap_sasl_bind_s() but calls wait4result() to display
1414  * any referrals returned and report errors in a consistent way.
1415  */
1416 int
1417 ldaptool_sasl_bind_s( LDAP *ld, const char *dn, const char *mechanism,
1418 	const struct berval *cred, LDAPControl **serverctrls,
1419 	LDAPControl **clientctrls, struct berval **servercredp, char *msg )
1420 {
1421     int		rc, msgid;
1422 
1423     if ( servercredp != NULL ) {
1424 	    *servercredp = NULL;
1425     }
1426 
1427     if (( rc = ldap_sasl_bind( ld, dn, mechanism, cred, serverctrls,
1428 	    clientctrls, &msgid )) != LDAP_SUCCESS ) {
1429 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1430     } else {
1431 	rc = wait4result( ld, msgid, servercredp, msg );
1432     }
1433 
1434     return( rc );
1435 }
1436 
1437 
1438 /*
1439  * Like ldap_simple_bind_s() but calls wait4result() to display
1440  * any referrals returned and report errors in a consistent way.
1441  */
1442 int
1443 ldaptool_simple_bind_s( LDAP *ld, const char *dn, const char *passwd,
1444 	LDAPControl **serverctrls, LDAPControl **clientctrls, char *msg )
1445 {
1446     struct berval	bv;
1447 
1448     bv.bv_val = (char *)passwd;		/* XXXmcs: had to cast away const */
1449     bv.bv_len = ( passwd == NULL ? 0 : strlen( passwd ));
1450     return( ldaptool_sasl_bind_s( ld, dn, LDAP_SASL_SIMPLE, &bv, serverctrls,
1451 	    clientctrls, NULL, msg ));
1452 }
1453 
1454 
1455 /*
1456  * Like ldap_add_ext_s() but calls wait4result() to display
1457  * any referrals returned and report errors in a consistent way.
1458  */
1459 int
1460 ldaptool_add_ext_s( LDAP *ld, const char *dn, LDAPMod **attrs,
1461 	LDAPControl **serverctrls, LDAPControl **clientctrls, char *msg )
1462 {
1463     int		rc, msgid;
1464 
1465     if (( rc = ldap_add_ext( ld, dn, attrs, serverctrls, clientctrls, &msgid ))
1466 	    != LDAP_SUCCESS ) {
1467 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1468     } else {
1469 	/*
1470 	 * 25-April-2000 Note: the next line used to read:
1471 	 *	rc = wait4result( ld, msgid, NULL, msg );
1472 	 * 'msgid' it was changed to 'LDAP_RES_ANY' in order to receive
1473 	 * unsolicited notifications.
1474 	 */
1475 	rc = wait4result( ld, LDAP_RES_ANY, NULL, msg );
1476     }
1477 
1478     return( rc );
1479 }
1480 
1481 
1482 /*
1483  * Like ldap_modify_ext_s() but calls wait4result() to display
1484  * any referrals returned and report errors in a consistent way.
1485  */
1486 int
1487 ldaptool_modify_ext_s( LDAP *ld, const char *dn, LDAPMod **mods,
1488 	LDAPControl **serverctrls, LDAPControl **clientctrls, char *msg )
1489 {
1490     int		rc, msgid;
1491 
1492     if (( rc = ldap_modify_ext( ld, dn, mods, serverctrls, clientctrls,
1493 	    &msgid )) != LDAP_SUCCESS ) {
1494 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1495     } else {
1496 	rc = wait4result( ld, msgid, NULL, msg );
1497     }
1498 
1499     return( rc );
1500 }
1501 
1502 
1503 /*
1504  * Like ldap_delete_ext_s() but calls wait4result() to display
1505  * any referrals returned and report errors in a consistent way.
1506  */
1507 int
1508 ldaptool_delete_ext_s( LDAP *ld, const char *dn, LDAPControl **serverctrls,
1509 	LDAPControl **clientctrls, char *msg )
1510 {
1511     int		rc, msgid;
1512 
1513     if (( rc = ldap_delete_ext( ld, dn, serverctrls, clientctrls, &msgid ))
1514 	    != LDAP_SUCCESS ) {
1515 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1516     } else {
1517 	rc = wait4result( ld, msgid, NULL, msg );
1518     }
1519 
1520     return( rc );
1521 }
1522 
1523 
1524 /*
1525  * Like ldap_compare_ext_s() but calls wait4result() to display
1526  * any referrals returned and report errors in a consistent way.
1527  */
1528 int ldaptool_compare_ext_s( LDAP *ld, const char *dn, const char *attrtype,
1529 	    const struct berval *bvalue, LDAPControl **serverctrls,
1530 	    LDAPControl **clientctrls, char *msg )
1531 {
1532     int		rc, msgid;
1533 
1534     if (( rc = ldap_compare_ext( ld, dn, attrtype, bvalue, serverctrls,
1535 	    clientctrls, &msgid )) != LDAP_SUCCESS ) {
1536 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1537     } else {
1538 	rc = wait4result( ld, msgid, NULL, msg );
1539     }
1540 
1541     return( rc );
1542 }
1543 
1544 
1545 /*
1546  * Like ldap_rename_s() but calls wait4result() to display
1547  * any referrals returned and report errors in a consistent way.
1548  */
1549 int
1550 ldaptool_rename_s(  LDAP *ld, const char *dn, const char *newrdn,
1551 	const char *newparent, int deleteoldrdn, LDAPControl **serverctrls,
1552 	LDAPControl **clientctrls, char *msg )
1553 {
1554     int		rc, msgid;
1555 
1556     if (( rc = ldap_rename( ld, dn, newrdn, newparent, deleteoldrdn,
1557 	    serverctrls, clientctrls, &msgid )) != LDAP_SUCCESS ) {
1558 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1559     } else {
1560 	rc = wait4result( ld, msgid, NULL, msg );
1561     }
1562 
1563     return( rc );
1564 }
1565 
1566 
1567 /*
1568  * Wait for a result, check for and display errors and referrals.
1569  * Also recognize and display "Unsolicited notification" messages.
1570  * Returns an LDAP error code.
1571  */
1572 static int
1573 wait4result( LDAP *ld, int msgid, struct berval **servercredp, char *msg )
1574 {
1575     LDAPMessage	*res;
1576     int		rc, received_only_unsolicited = 1;
1577 
1578     while ( received_only_unsolicited ) {
1579 	res = NULL;
1580 	if (( rc = ldap_result( ld, msgid, 1, (struct timeval *)NULL, &res ))
1581 		    == -1 ) {
1582 	    ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1583 	    return( ldap_get_lderrno( ld, NULL, NULL ));
1584 	}
1585 
1586 	/*
1587 	 * Special handling for unsolicited notifications:
1588 	 *    1. Parse and display contents.
1589 	 *    2. go back and wait for another (real) result.
1590 	 */
1591 	if ( rc == LDAP_RES_EXTENDED
1592 		    && ldap_msgid( res ) == LDAP_RES_UNSOLICITED ) {
1593 	    rc = ldaptool_print_extended_response( ld, res,
1594 		    "Unsolicited response" );
1595 	} else {
1596 	    rc = parse_result( ld, res, servercredp, msg, 1 );
1597 	    received_only_unsolicited = 0;	/* we're done */
1598 	}
1599     }
1600 
1601     return( rc );
1602 }
1603 
1604 
1605 static int
1606 parse_result( LDAP *ld, LDAPMessage *res, struct berval **servercredp,
1607 	char *msg, int freeit )
1608 {
1609     int		rc, lderr, errno;
1610     int		pw_days=0, pw_hrs=0, pw_mins=0, pw_secs=0; /* for pwpolicy */
1611     char	**refs = NULL;
1612     LDAPControl	**ctrls;
1613 
1614     if (( rc = ldap_parse_result( ld, res, &lderr, NULL, NULL, &refs,
1615 	    &ctrls, 0 )) != LDAP_SUCCESS ) {
1616 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1617 	ldap_msgfree( res );
1618 	return( rc );
1619     }
1620 
1621     /* check for authentication response control & PWPOLICY control*/
1622     if ( NULL != ctrls ) {
1623 	int		i;
1624 	char		*s;
1625 
1626 	for ( i = 0; NULL != ctrls[i]; ++i ) {
1627 	    if ( 0 == strcmp( ctrls[i]->ldctl_oid,
1628 			LDAP_CONTROL_AUTH_RESPONSE )) {
1629 		    s = ctrls[i]->ldctl_value.bv_val;
1630 		    if ( NULL == s ) {
1631 			s = "Null";
1632 		    } else if ( *s == '\0' ) {
1633 			s = "Anonymous";
1634 		    }
1635 		fprintf( stderr, gettext("%s: bound as %s\n"), ldaptool_progname, s );
1636 	    }
1637 
1638 	    if ( 0 == strcmp( ctrls[i]->ldctl_oid,
1639 			LDAP_CONTROL_PWEXPIRING )) {
1640 
1641 		    /* Warn the user his passwd is to expire */
1642 		    errno = 0;
1643 		    pw_secs = atoi(ctrls[i]->ldctl_value.bv_val);
1644 		    if ( pw_secs > 0  && errno != ERANGE ) {
1645 			if ( pw_secs > 86400 ) {
1646 				pw_days = ( pw_secs / 86400 );
1647 				pw_secs = ( pw_secs % 86400 );
1648 			}
1649 			if ( pw_secs > 3600 ) {
1650 				pw_hrs = ( pw_secs / 3600 );
1651 				pw_secs = ( pw_secs % 3600 );
1652 			}
1653 			if ( pw_secs > 60 ) {
1654 				pw_mins = ( pw_secs / 60 );
1655 				pw_secs = ( pw_secs % 60 );
1656 			}
1657 
1658 			printf(gettext("%s: Warning ! Your password will expire after "), ldaptool_progname);
1659 			if ( pw_days ) {
1660 				printf (gettext("%d days, "), pw_days);
1661 			}
1662 			if ( pw_hrs ) {
1663 				printf (gettext("%d hrs, "), pw_hrs);
1664 			}
1665 			if ( pw_mins ) {
1666 				printf (gettext("%d mins, "), pw_mins);
1667 			}
1668 			printf(gettext("%d seconds.\n"), pw_secs);
1669 
1670 		   }
1671 		}
1672 	}
1673 	ldap_controls_free( ctrls );
1674     }
1675 
1676     if ( servercredp != NULL && ( rc = ldap_parse_sasl_bind_result( ld, res,
1677 	    servercredp, 0 )) != LDAP_SUCCESS ) {
1678 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1679 	ldap_msgfree( res );
1680 	return( rc );
1681     }
1682 
1683     if ( freeit ) {
1684 	ldap_msgfree( res );
1685     }
1686 
1687     if ( LDAPTOOL_RESULT_IS_AN_ERROR( lderr )) {
1688 	ldaptool_print_lderror( ld, msg, LDAPTOOL_CHECK4SSL_IF_APPROP );
1689     }
1690 
1691     if ( refs != NULL ) {
1692 	ldaptool_print_referrals( refs );
1693 	ldap_value_free( refs );
1694     }
1695 
1696     return( lderr );
1697 }
1698 
1699 
1700 /*
1701  * if -M was passed on the command line, create and return a "Manage DSA IT"
1702  * LDAPv3 control.  If not, return NULL.
1703  */
1704 LDAPControl *
1705 ldaptool_create_manage_dsait_control( void )
1706 {
1707     LDAPControl	*ctl;
1708 
1709     if ( !send_manage_dsait_ctrl ) {
1710 	return( NULL );
1711     }
1712 
1713     if (( ctl = (LDAPControl *)calloc( 1, sizeof( LDAPControl ))) == NULL ||
1714 	    ( ctl->ldctl_oid = strdup( LDAP_CONTROL_MANAGEDSAIT )) == NULL ) {
1715 	perror( "calloc" );
1716 	exit( LDAP_NO_MEMORY );
1717     }
1718 
1719     ctl->ldctl_iscritical = 1;
1720 
1721     return( ctl );
1722 }
1723 
1724 /*
1725  * if -y "dn" was supplied on the command line, create the control
1726  */
1727 LDAPControl *
1728 ldaptool_create_proxyauth_control( LDAP *ld )
1729 {
1730     LDAPControl	*ctl = NULL;
1731     int rc;
1732 
1733 
1734     if ( !proxyauth_id)
1735 	return( NULL );
1736 
1737     if ( 2 == proxyauth_version ) {
1738 	rc = ldap_create_proxiedauth_control( ld, proxyauth_id, &ctl);
1739     } else {
1740 	rc = ldap_create_proxyauth_control( ld, proxyauth_id, 1, &ctl);
1741     }
1742     if ( rc != LDAP_SUCCESS)
1743     {
1744 	if (ctl)
1745 	    ldap_control_free( ctl);
1746 	return NULL;
1747     }
1748     return( ctl );
1749 }
1750 
1751 #ifndef SOLARIS_LDAP_CMD
1752 LDAPControl *
1753 ldaptool_create_geteffectiveRights_control ( LDAP *ld, const char *authzid,
1754 											const char **attrlist)
1755 {
1756     LDAPControl	*ctl = NULL;
1757     int rc;
1758 
1759 	rc = ldap_create_geteffectiveRights_control( ld, authzid, attrlist, 1,
1760 							&ctl);
1761 
1762     if ( rc != LDAP_SUCCESS)
1763     {
1764 		if (ctl)
1765 	    	ldap_control_free( ctl);
1766 		return NULL;
1767     }
1768     return( ctl );
1769 }
1770 #endif	/* SOLARIS_LDAP_CMD */
1771 
1772 
1773 void
1774 ldaptool_add_control_to_array( LDAPControl *ctrl, LDAPControl **array)
1775 {
1776 
1777     int i;
1778     for (i=0; i< CONTROL_REQUESTS; i++)
1779     {
1780 	if (*(array + i) == NULL)
1781 	{
1782 	    *(array + i +1) = NULL;
1783 	    *(array + i) = ctrl;
1784 	    return ;
1785 	}
1786     }
1787     fprintf(stderr, gettext("%s: failed to store request control!!!!!!\n"),
1788 	    ldaptool_progname);
1789 }
1790 
1791 /*
1792  * Dispose of all controls in array and prepare array for reuse.
1793  */
1794 void
1795 ldaptool_reset_control_array( LDAPControl **array )
1796 {
1797     int		i;
1798 
1799     for ( i = 0; i < CONTROL_REQUESTS; i++ ) {
1800 	if ( array[i] != NULL ) {
1801 	    ldap_control_free( array[i] );
1802 	    array[i] = NULL;
1803 	}
1804     }
1805 }
1806 
1807 /*
1808  * This function calculates control value and its length. *value can
1809  * be pointing to plain value, ":b64encoded value" or "<fileurl".
1810  */
1811 static int
1812 calculate_ctrl_value( const char *value,
1813 	char **ctrl_value, int *vlen)
1814 {
1815     int b64;
1816     if (*value == ':') {
1817 	value++;
1818 	b64 = 1;
1819     } else {
1820 	b64 = 0;
1821     }
1822     *ctrl_value = (char *)value;
1823 
1824     if ( b64 ) {
1825 	if (( *vlen = ldif_base64_decode( (char *)value,
1826 		(unsigned char *)value )) < 0 ) {
1827 	    fprintf( stderr,
1828 		gettext("Unable to decode base64 control value \"%s\"\n"), value);
1829 	    return( -1 );
1830 	}
1831     } else {
1832 	*vlen = (int)strlen(*ctrl_value);
1833     }
1834     return( 0 );
1835 }
1836 
1837 /*
1838  * Parse the optarg from -J option of ldapsearch
1839  * and within LDIFfile for ldapmodify. Take ctrl_arg
1840  * (the whole string) and divide it into oid, criticality
1841  * and value. This function breaks down original ctrl_arg
1842  * with '\0' in places. Also, calculate length of valuestring.
1843  */
1844 int
1845 ldaptool_parse_ctrl_arg(char *ctrl_arg, char sep,
1846 		char **ctrl_oid, int *ctrl_criticality,
1847 		char **ctrl_value, int *vlen)
1848 {
1849     char *s, *p;
1850     int strict;
1851 
1852     /* Initialize passed variables with default values */
1853     *ctrl_oid = *ctrl_value = NULL;
1854     *ctrl_criticality = 0;
1855     *vlen = 0;
1856 
1857     strict = (sep == ' ' ? 1 : 0);
1858     if(!(s=strchr(ctrl_arg, sep))) {
1859 	/* Possible values of ctrl_arg are
1860 	 * oid[:value|::b64value|:<fileurl] within LDIF, i.e. sep=' '
1861 	 * oid from command line option, i.e. sep=':'
1862 	 */
1863 	if (sep == ' ') {
1864 	    if (!(s=strchr(ctrl_arg, ':'))) {
1865 		*ctrl_oid = ctrl_arg;
1866 	    }
1867 	    else {
1868 		/* ctrl_arg is of oid:[value|:b64value|<fileurl]
1869 		 * form in the LDIF record. So, grab the oid and then
1870 		 * jump to continue the parsing of ctrl_arg.
1871 		 * 's' is pointing just after oid ends.
1872 		 */
1873 		*s++ = '\0';
1874 		*ctrl_oid = ctrl_arg;
1875 		return (calculate_ctrl_value( s, ctrl_value, vlen ));
1876 	    }
1877 	} else {
1878 		/* oid - from command line option, i.e. sep=':' */
1879 		*ctrl_oid = ctrl_arg;
1880 	}
1881     }
1882     else {
1883 	/* Possible values of ctrl_arg are
1884 	 * oid:criticality[:value|::b64value|:<fileurl] - command line
1885 	 * oid criticality[:value|::b64value|:<fileurl] - LDIF
1886 	 * And 's' is pointing just after oid ends.
1887 	 */
1888 
1889 	if (*(s+1) == '\0') {
1890 	    fprintf( stderr, gettext("missing value\n") );
1891 	    return( -1 );
1892 	}
1893 	*s = '\0';
1894 	*ctrl_oid = ctrl_arg;
1895 	p = ++s;
1896 	if(!(s=strchr(p, ':'))) {
1897 	    if ( (*ctrl_criticality = ldaptool_boolean_str2value(p, strict))
1898 			== -1 ) {
1899 		fprintf( stderr, gettext("Invalid criticality value\n") );
1900 		return( -1 );
1901 	    }
1902 	}
1903 	else {
1904 	    if (*(s+1) == '\0') {
1905 	        fprintf( stderr, gettext("missing value\n") );
1906 	        return ( -1 );
1907 	    }
1908 	    *s++ = '\0';
1909             if ( (*ctrl_criticality = ldaptool_boolean_str2value(p, strict))
1910 			== -1 ) {
1911 		fprintf( stderr, gettext("Invalid criticality value\n") );
1912 		return ( -1 );
1913 	    }
1914 	    return (calculate_ctrl_value( s, ctrl_value, vlen ));
1915 	}
1916     }
1917 
1918     return( 0 );
1919 }
1920 
1921 
1922 /*
1923  * callback function for LDAP bind credentials
1924  */
1925 static int
1926 LDAP_CALL
1927 LDAP_CALLBACK
1928 get_rebind_credentials( LDAP *ld, char **whop, char **credp,
1929         int *methodp, int freeit, void* arg )
1930 {
1931     if ( !freeit ) {
1932 	*whop = binddn;
1933 	*credp = passwd;
1934 	*methodp = LDAP_AUTH_SIMPLE;
1935     }
1936 
1937     return( LDAP_SUCCESS );
1938 }
1939 
1940 
1941 /*
1942  * return pointer to pathname to temporary directory.
1943  * First we see if the environment variable "TEMP" is set and use it.
1944  * Then we see if the environment variable "TMP" is set and use it.
1945  * If this fails, we use "/tmp" on UNIX and fail on Windows.
1946  */
1947 char *
1948 ldaptool_get_tmp_dir( void )
1949 {
1950     char	*p;
1951     int		offset;
1952 
1953     if (( p = getenv( "TEMP" )) == NULL && ( p = getenv( "TMP" )) == NULL ) {
1954 #ifdef _WINDOWS
1955 	fprintf( stderr, gettext("%s: please set the TEMP environment variable.\n"),
1956 		ldaptool_progname );
1957 	exit( LDAP_LOCAL_ERROR );
1958 #else
1959 	return( "/tmp" );	/* last resort on UNIX */
1960 #endif
1961     }
1962 
1963     /*
1964      * remove trailing slash if present
1965      */
1966     offset = strlen( p ) - 1;
1967     if ( p[offset] == '/'
1968 #ifdef _WINDOWS
1969 	    || p[offset] == '\\'
1970 #endif
1971 	    ) {
1972 	if (( p = strdup( p )) == NULL ) {
1973 	    perror( "strdup" );
1974 	    exit( LDAP_NO_MEMORY );
1975 	}
1976 
1977 	p[offset] = '\0';
1978     }
1979 
1980     return( p );
1981 }
1982 
1983 
1984 int
1985 ldaptool_berval_is_ascii( const struct berval *bvp )
1986 {
1987     unsigned long	j;
1988     int			is_ascii = 1;	 /* optimistic */
1989 
1990     for ( j = 0; j < bvp->bv_len; ++j ) {
1991 	if ( !isascii( bvp->bv_val[ j ] )) {
1992 	    is_ascii = 0;
1993 	    break;
1994 	}
1995     }
1996 
1997     return( is_ascii );
1998 }
1999 
2000 
2001 #ifdef LDAP_DEBUG_MEMORY
2002 #define LDAPTOOL_ALLOC_FREED	0xF001
2003 #define LDAPTOOL_ALLOC_INUSE	0xF002
2004 
2005 static void *
2006 ldaptool_debug_alloc( void *ptr, size_t size )
2007 {
2008     int		*statusp;
2009     void	*systemptr;
2010 
2011     if ( ptr == NULL ) {
2012 	systemptr = NULL;
2013     } else {
2014 	systemptr = (void *)((char *)ptr - sizeof(int));
2015     }
2016 
2017     if (( statusp = (int *)realloc( systemptr, size + sizeof(int))) == NULL ) {
2018 	fprintf( stderr, gettext("%s: realloc( 0x%x, %d) failed\n"),
2019 		ldaptool_progname, systemptr, size );
2020 	return( NULL );
2021     }
2022 
2023     *statusp = LDAPTOOL_ALLOC_INUSE;
2024 
2025     return( (char *)statusp + sizeof(int));
2026 }
2027 
2028 
2029 static void *
2030 ldaptool_debug_realloc( void *ptr, size_t size )
2031 {
2032     void	*p;
2033 
2034     if ( ldaptool_dbg_lvl & LDAP_DEBUG_TRACE ) {
2035 	fprintf( stderr, gettext("%s: => realloc( 0x%x, %d )\n"),
2036 		ldaptool_progname, ptr, size );
2037     }
2038 
2039     p = ldaptool_debug_alloc( ptr, size );
2040 
2041     if ( ldaptool_dbg_lvl & LDAP_DEBUG_TRACE ) {
2042 	fprintf( stderr, gettext("%s: 0x%x <= realloc()\n"), ldaptool_progname, p );
2043     }
2044 
2045     return( p );
2046 }
2047 
2048 
2049 static void *
2050 ldaptool_debug_malloc( size_t size )
2051 {
2052     void	*p;
2053 
2054     if ( ldaptool_dbg_lvl & LDAP_DEBUG_TRACE ) {
2055 	fprintf( stderr, gettext("%s: => malloc( %d)\n"), ldaptool_progname, size );
2056     }
2057 
2058     p = ldaptool_debug_alloc( NULL, size );
2059 
2060     if ( ldaptool_dbg_lvl & LDAP_DEBUG_TRACE ) {
2061 	fprintf( stderr, gettext("%s: 0x%x <= malloc()\n"), ldaptool_progname, p );
2062     }
2063 
2064     return( p );
2065 }
2066 
2067 
2068 static void *
2069 ldaptool_debug_calloc( size_t nelem, size_t elsize )
2070 {
2071     void	*p;
2072 
2073     if ( ldaptool_dbg_lvl & LDAP_DEBUG_TRACE ) {
2074 	fprintf( stderr, gettext("%s: => calloc( %d, %d )\n"),
2075 		ldaptool_progname, nelem, elsize );
2076     }
2077 
2078     if (( p = ldaptool_debug_alloc( NULL, nelem * elsize )) != NULL ) {
2079 	memset( p, 0, nelem * elsize );
2080     }
2081 
2082     if ( ldaptool_dbg_lvl & LDAP_DEBUG_TRACE ) {
2083 	fprintf( stderr, gettext("%s: 0x%x <= calloc()\n"), ldaptool_progname, p );
2084     }
2085 
2086     return( p );
2087 }
2088 
2089 
2090 static void
2091 ldaptool_debug_free( void *ptr )
2092 {
2093     int		*statusp = (int *)((char *)ptr - sizeof(int));
2094 
2095     if ( ldaptool_dbg_lvl & LDAP_DEBUG_TRACE ) {
2096 	fprintf( stderr, gettext("%s: => free( 0x%x )\n"), ldaptool_progname, ptr );
2097     }
2098 
2099     if ( ptr == NULL ) {
2100 	fprintf( stderr, gettext("%s: bad free( 0x0 ) attempted (NULL pointer)\n"),
2101 		ldaptool_progname );
2102     } else if ( *statusp != LDAPTOOL_ALLOC_INUSE ) {
2103 	fprintf( stderr, gettext("%s: bad free( 0x%x ) attempted"
2104 		" (block not in use; status is %d)\n"),
2105 		ldaptool_progname, ptr, *statusp );
2106     } else {
2107 	*statusp = LDAPTOOL_ALLOC_FREED;
2108 	free( statusp );
2109     }
2110 }
2111 #endif /* LDAP_DEBUG_MEMORY */
2112 
2113 
2114 #if defined(NET_SSL)
2115 /*
2116  * Derive key database path from certificate database path and return a
2117  * malloc'd string.
2118  *
2119  * We just return an exact copy of "certdbpath" unless it ends in "cert.db",
2120  * "cert5.db", or "cert7.db".  In those cases we strip off everything from
2121  * "cert" on and append "key.db", "key5.db", or "key3.db" as appropriate.
2122  * Strangely enough cert7.db and key3.db go together.
2123  */
2124 static char *
2125 certpath2keypath( char *certdbpath )
2126 {
2127     char	*keydbpath, *appendstr;
2128     int		len, striplen;
2129 
2130     if ( certdbpath == NULL ) {
2131 	return( NULL );
2132     }
2133 
2134     if (( keydbpath = strdup( certdbpath )) == NULL ) {
2135 	perror( "strdup" );
2136 	exit( LDAP_NO_MEMORY );
2137     }
2138 
2139     len = strlen( keydbpath );
2140     if ( len > 7 &&
2141 	    strcasecmp( "cert.db", keydbpath + len - 7 ) == 0 ) {
2142 	striplen = 7;
2143 	appendstr = "key.db";
2144 
2145     } else if ( len > 8 &&
2146 	    strcasecmp( "cert5.db", keydbpath + len - 8 ) == 0 ) {
2147 	striplen = 8;
2148 	appendstr = "key5.db";
2149     } else if ( len > 8 &&
2150 	    strcasecmp( "cert7.db", keydbpath + len - 8 ) == 0 ) {
2151 	striplen = 8;
2152 	appendstr = "key3.db";
2153     } else {
2154 	striplen = 0;
2155     }
2156 
2157     if ( striplen > 0 ) {
2158 	/*
2159 	 * The following code assumes that strlen( appendstr ) < striplen!
2160 	 */
2161 	strcpy( keydbpath + len - striplen, appendstr );
2162     }
2163 
2164     return( keydbpath );
2165 }
2166 
2167 #ifdef LDAP_TOOL_PKCS11
2168 static
2169 char *
2170 buildTokenCertName( const char *tokenName, const char *certName)
2171 {
2172 
2173     int tokenlen = strlen(tokenName);
2174     int len = tokenlen + strlen(certName) +2;
2175     char *result;
2176 
2177     if (( result = malloc( len )) != NULL) {
2178 	strcpy(result, tokenName);
2179 	*(result+tokenlen) = ':';
2180 	++tokenlen;
2181 	strcpy(result+tokenlen, certName);
2182     } else {
2183 	perror("malloc");
2184 	exit( LDAP_NO_MEMORY );
2185     }
2186     return result;
2187 }
2188 
2189 
2190 
2191 static
2192 int
2193 ldaptool_getcertpath( void *context, char **certlocp )
2194 {
2195 
2196     *certlocp = ssl_certdbpath;
2197     if ( ldaptool_verbose ) {
2198 	if (ssl_certdbpath)
2199 	{
2200 	    printf(gettext("ldaptool_getcertpath -- %s\n"), ssl_certdbpath );
2201 	}
2202 	else
2203 	{
2204 	    printf(gettext("ldaptool_getcertpath -- (null)\n"));
2205 	}
2206 
2207     }
2208     return LDAP_SUCCESS;
2209 }
2210 
2211 int
2212 ldaptool_getcertname( void *context, char **certnamep )
2213 {
2214 
2215    *certnamep = ssl_certname;
2216     if ( ldaptool_verbose ) {
2217 	if (ssl_certname)
2218 	{
2219 	    printf(gettext("ldaptool_getcertname -- %s\n"), *certnamep);
2220 	}
2221 	else
2222 	{
2223 	    printf(gettext("ldaptool_getcertname -- (null)\n"));
2224 	}
2225     }
2226     return LDAP_SUCCESS;
2227 }
2228 
2229 int
2230 ldaptool_getkeypath(void *context, char **keylocp )
2231 {
2232     *keylocp = ssl_keydbpath;
2233     if ( ldaptool_verbose ) {
2234 	if (ssl_keydbpath)
2235 	{
2236 	    printf(gettext("ldaptool_getkeypath -- %s\n"),*keylocp);
2237 	}
2238 	else
2239 	{
2240 	    printf(gettext("ldaptool_getkeypath -- (null)\n"));
2241 	}
2242     }
2243 
2244     return LDAP_SUCCESS;
2245 }
2246 
2247 int
2248 ldaptool_gettokenname( void *context, char **tokennamep )
2249 {
2250 
2251     *tokennamep = pkcs_token;
2252     if ( ldaptool_verbose ) {
2253 	if (pkcs_token)
2254 	{
2255 	    printf(gettext("ldaptool_gettokenname -- %s\n"),*tokennamep);
2256 	}
2257 	else
2258 	{
2259 	    printf(gettext("ldaptool_gettokenname -- (null)\n"));
2260 	}
2261     }
2262 
2263     return LDAP_SUCCESS;
2264 }
2265 int
2266 ldaptool_gettokenpin( void *context, const char *tokennamep, char **tokenpinp)
2267 {
2268 
2269 #if 0
2270   char *localtoken;
2271 #endif
2272 
2273 /* XXXceb this stuff is removed for the time being.
2274  * This function should return the pin from ssl_password
2275  */
2276 
2277 
2278   *tokenpinp = ssl_passwd;
2279   return LDAP_SUCCESS;
2280 
2281 #if 0
2282 
2283   ldaptool_gettokenname( NULL, &localtoken);
2284 
2285   if (strcmp( localtoken, tokennamep))
2286 
2287       *tokenpinp = pkcs_pin;
2288    else
2289       *tokenpinp = NULL;
2290 
2291     if ( ldaptool_verbose ) {
2292 	if (pkcs_pin)
2293 	{
2294 	    printf(gettext("ldaptool_getokenpin --%s\n"), tokenpinp);
2295 	}
2296 	else
2297 	{
2298 	    printf(gettext("ldaptool_getokenpin -- (null)\n"));
2299 	}
2300     }
2301     return LDAP_SUCCESS;
2302 #endif
2303 }
2304 
2305 int
2306 ldaptool_getmodpath( void *context, char **modulep )
2307 {
2308     *modulep = ssl_secmodpath;
2309     if ( ldaptool_verbose ) {
2310 	if (ssl_secmodpath)
2311 	{
2312 	    printf(gettext("ldaptool_getmodpath -- %s\n"), *modulep);
2313 	}
2314 	else
2315 	{
2316 	    printf(gettext("ldaptool_getmodpath -- (null)\n"));
2317 	}
2318     }
2319 
2320     return LDAP_SUCCESS;
2321 }
2322 
2323 int
2324 ldaptool_getdonglefilename( void *context, char **filename )
2325 {
2326     *filename = ssl_donglefile;
2327     if ( ldaptool_verbose ) {
2328 	if (ssl_donglefile)
2329 	{
2330 	    printf(gettext("ldaptool_getdonglefilename -- %s\n"), *filename);
2331 	}
2332 	else
2333 	{
2334 	    printf(gettext("ldaptool_getdonglefilename -- (null)\n"));
2335 	}
2336 
2337     }
2338 
2339     return LDAP_SUCCESS;
2340 }
2341 
2342 static int
2343 ldaptool_setcallbacks( struct ldapssl_pkcs_fns *pfns)
2344 {
2345   pfns->pkcs_getcertpath = (int (*)(void *, char **))ldaptool_getcertpath;
2346   pfns->pkcs_getcertname =  (int (*)(void *, char **))ldaptool_getcertname;
2347   pfns->pkcs_getkeypath =  (int (*)(void *, char **)) ldaptool_getkeypath;
2348   pfns->pkcs_getmodpath =  (int (*)(void *, char **)) ldaptool_getmodpath;
2349   pfns->pkcs_getpin =  (int (*)(void *, const char*, char **)) ldaptool_gettokenpin;
2350   pfns->pkcs_gettokenname =  (int (*)(void *, char **)) ldaptool_gettokenname;
2351   pfns->pkcs_getdonglefilename =  (int (*)(void *, char **)) ldaptool_getdonglefilename;
2352   pfns->local_structure_id=PKCS_STRUCTURE_ID;
2353   return LDAP_SUCCESS;
2354 }
2355 
2356 
2357 
2358 #ifdef FORTEZZA
2359 static int
2360 ldaptool_fortezza_init( int exit_on_error )
2361 {
2362     int		rc, errcode;
2363 
2364     if ( fortezza_personality == NULL && fortezza_cardmask == 0 ) { /* no FORTEZZA desired */
2365 	SSL_EnableGroup( SSL_GroupFortezza, DSFalse );	/* disable FORTEZZA */
2366 	return( 0 );
2367     }
2368 
2369     if (( rc = FortezzaConfigureServer( ldaptool_fortezza_getpin, fortezza_cardmask,
2370 	    fortezza_personality, ldaptool_fortezza_alert, NULL, &errcode,
2371 	    fortezza_krlfile )) < 0 ) {
2372 	fprintf( stderr,
2373 		"%s: FORTEZZA initialization failed (error %d - %s)\n",
2374 		ldaptool_progname, errcode,
2375 		ldaptool_fortezza_err2string( errcode ));
2376 	if ( exit_on_error ) {
2377 	    exit( LDAP_LOCAL_ERROR );
2378 	}
2379 
2380 	SSL_EnableGroup( SSL_GroupFortezza, DSFalse );	/* disable FORTEZZA */
2381 	return( -1 );
2382     }
2383 
2384     SSL_EnableGroup( SSL_GroupFortezza, DSTrue );	/* enable FORTEZZA */
2385     return( 0 );
2386 }
2387 
2388 
2389 static int
2390 ldaptool_fortezza_alert( void *arg, PRBool onOpen, char *string,
2391 	int value1, void *value2 )
2392 {
2393     fprintf( stderr, "%s: FORTEZZA alert: ", ldaptool_progname );
2394     fprintf( stderr, string, value1, value2 );
2395     fprintf( stderr, "\n" );
2396     return( 1 );
2397 }
2398 
2399 
2400 static void *
2401 ldaptool_fortezza_getpin( char **passwordp )
2402 {
2403     *passwordp = fortezza_pin;
2404     return( *passwordp );
2405 }
2406 
2407 
2408 /*
2409  * convert a Fortezza error code (as returned by FortezzaConfigureServer()
2410  * into a human-readable string.
2411  *
2412  * Error strings are intentionally similar to those found in
2413  * ns/netsite/lib/libadmin/httpcon.c
2414  */
2415 static char *
2416 ldaptool_fortezza_err2string( int err )
2417 {
2418     char	*s;
2419 
2420     switch( err ) {
2421     case FORTEZZA_BADPASSWD:
2422 	s = "invalid pin number";
2423 	break;
2424     case FORTEZZA_BADCARD:
2425 	s = "bad or missing card";
2426 	break;
2427     case FORTEZZA_MISSING_KRL:
2428 	s = "bad or missing compromised key list";
2429 	break;
2430     case FORTEZZA_CERT_INIT_ERROR:
2431 	s = "unable to initialize certificate cache.  either a cert on "
2432 		"the card is bad, or an old FORTEZZA certificate is in a"
2433 		 "readonly database";
2434 	break;
2435     case FORTEZZA_EXPIRED_CERT:
2436 	s = "unable to verify certificate";
2437 	break;
2438     default:
2439 	s = "unknown error";
2440     }
2441 
2442     return( s );
2443 }
2444 
2445 #endif /* FORTEZZA */
2446 #endif /* LDAP_TOOL_PKCS11 */
2447 #endif /* NET_SSL */
2448 
2449 int
2450 ldaptool_boolean_str2value ( const char *ptr, int strict )
2451 {
2452     if (strict) {
2453 	if ( !(strcasecmp(ptr, "true"))) {
2454 	    return 1;
2455 	}
2456 	else if ( !(strcasecmp(ptr, "false"))) {
2457 	    return 0;
2458 	}
2459 	else {
2460 	    return (-1);
2461 	}
2462     }
2463     else {
2464 	if ( !(strcasecmp(ptr, "true")) ||
2465 	     !(strcasecmp(ptr, "t")) ||
2466 	     !(strcmp(ptr, "1")) ) {
2467 		return (1);
2468 	}
2469 	else if ( !(strcasecmp(ptr, "false")) ||
2470 	     !(strcasecmp(ptr, "f")) ||
2471 	     !(strcmp(ptr, "0")) ) {
2472 	    	return (0);
2473 	}
2474 	else {
2475 	    return (-1);
2476 	}
2477     }
2478 }
2479 
2480 FILE *
2481 ldaptool_open_file(const char *filename, const char *mode)
2482 {
2483 #ifdef _LARGEFILE64_SOURCE
2484 	return fopen64(filename, mode);
2485 #else
2486 	return fopen(filename, mode);
2487 #endif
2488 }
2489 
2490 #ifdef later
2491 /* Functions for list in ldapdelete.c */
2492 
2493 void L_Init(Head *list)
2494 {
2495     if(list)
2496     {
2497         list->first = NULL;
2498         list->last = NULL;
2499         list->count = 0;
2500     }
2501 }
2502 
2503 void L_Insert(Element *Node, Head *HeadNode)
2504 {
2505     if (!Node || !HeadNode)
2506         return;
2507 
2508     Node->right = NULL;
2509 
2510     if (HeadNode->first == NULL)
2511     {
2512         Node->left= NULL;
2513         HeadNode->last = HeadNode->first = Node;
2514     }
2515     else
2516     {
2517         Node->left = HeadNode->last;
2518         HeadNode->last = Node->left->right = Node;
2519     }
2520     HeadNode->count++;
2521 }
2522 
2523 void L_Remove(Element *Node, Head *HeadNode)
2524 {
2525     Element *traverse = NULL;
2526     Element *prevnode = NULL;
2527 
2528     if(!Node || !HeadNode)
2529         return;
2530 
2531     for(traverse = HeadNode->first; traverse; traverse = traverse->right)
2532     {
2533         if(traverse == Node)
2534         {
2535             if(HeadNode->first == traverse)
2536             {
2537                 HeadNode->first = traverse->right;
2538             }
2539             if(HeadNode->last == traverse)
2540             {
2541                 HeadNode->last = prevnode;
2542             }
2543             traverse = traverse->right;
2544             if(prevnode != NULL)
2545             {
2546                 prevnode->right = traverse;
2547             }
2548             if(traverse != NULL)
2549             {
2550                 traverse->left = prevnode;
2551             }
2552             HeadNode->count--;
2553             return;
2554         }
2555         else /* traverse != node */
2556         {
2557             prevnode = traverse;
2558         }
2559     }
2560 }
2561 #endif
2562 
2563 #ifdef HAVE_SASL_OPTIONS
2564 /*
2565  * Function checks for valid args, returns an error if not found
2566  * and sets SASL params from command line
2567  */
2568 
2569 static int
2570 saslSetParam(char *saslarg)
2571 {
2572 	char *attr = NULL;
2573 
2574 	attr = strchr(saslarg, '=');
2575 	if (attr == NULL) {
2576            fprintf( stderr, gettext("Didn't find \"=\" character in %s\n"), saslarg);
2577            return (-1);
2578 	}
2579 	*attr = '\0';
2580 	attr++;
2581 
2582 	if (!strcasecmp(saslarg, "secProp")) {
2583 	     if ( sasl_secprops != NULL ) {
2584                 fprintf( stderr, gettext("secProp previously specified\n"));
2585                 return (-1);
2586              }
2587              if (( sasl_secprops = strdup(attr)) == NULL ) {
2588 		perror ("malloc");
2589                 exit (LDAP_NO_MEMORY);
2590              }
2591 	} else if (!strcasecmp(saslarg, "realm")) {
2592 	     if ( sasl_realm != NULL ) {
2593                 fprintf( stderr, gettext("Realm previously specified\n"));
2594                 return (-1);
2595              }
2596              if (( sasl_realm = strdup(attr)) == NULL ) {
2597 		perror ("malloc");
2598                 exit (LDAP_NO_MEMORY);
2599              }
2600 	} else if (!strcasecmp(saslarg, "authzid")) {
2601              if (sasl_username != NULL) {
2602                 fprintf( stderr, gettext("Authorization name previously specified\n"));
2603                 return (-1);
2604              }
2605              if (( sasl_username = strdup(attr)) == NULL ) {
2606 		perror ("malloc");
2607                 exit (LDAP_NO_MEMORY);
2608              }
2609 	} else if (!strcasecmp(saslarg, "authid")) {
2610              if ( sasl_authid != NULL ) {
2611                 fprintf( stderr, gettext("Authentication name previously specified\n"));
2612                 return (-1);
2613              }
2614              if (( sasl_authid = strdup(attr)) == NULL) {
2615 		perror ("malloc");
2616                 exit (LDAP_NO_MEMORY);
2617              }
2618 	} else if (!strcasecmp(saslarg, "mech")) {
2619 	     if ( sasl_mech != NULL ) {
2620                 fprintf( stderr, gettext("Mech previously specified\n"));
2621                 return (-1);
2622              }
2623 	     if (( sasl_mech = strdup(attr)) == NULL) {
2624 		perror ("malloc");
2625 		exit (LDAP_NO_MEMORY);
2626 	     }
2627 	} else {
2628 	     fprintf (stderr, gettext("Invalid attribute name %s\n"), saslarg);
2629 	     return (-1);
2630 	}
2631 	return 0;
2632 }
2633 #endif	/* HAVE_SASL_OPTIONS */
2634