summaryrefslogtreecommitdiffstats
path: root/src/providers/ldap/sdap_async_connection.c
Commit message (Collapse)AuthorAgeFilesLines
* Unbreak SASLPavel Březina2012-07-311-9/+12
| | | | | | | Patch bc76428246c4ce532abd0eadcd539069fc1d94a8 changed the data type of sasl_minssf from int to ber_len_t. Unfortunately, default value of ldap_sasl_minssf is -1 but ber_len_t is defined as unsigned long. This made SASL mechanism inoperative.
* Fix uninitialized valuesNick Guay2012-07-181-1/+1
| | | | https://fedorahosted.org/sssd/ticket/1379
* LDAP: Properly cast type for MINSSF valueJan Vcelak2012-07-181-11/+9
|
* LDAP: Print extended failure message for SASL bindStephen Gallagher2012-07-021-2/+14
|
* Simple implementation of Netscape password warning expiration controlJoshua Roys2012-05-221-22/+74
|
* Try all KDCs when getting TGT for LDAPJakub Hrozek2012-05-091-15/+18
| | | | | | | | When the ldap child process is killed after a timeout, try the next KDC. When none of the ldap child processes succeed, just abort the connection because we wouldn't be able to authenticate to the LDAP server anyway. https://fedorahosted.org/sssd/ticket/1324
* Get the RootDSE after binding if not successfull beforeJakub Hrozek2012-04-201-26/+104
| | | | https://fedorahosted.org/sssd/ticket/1258
* Free controls in sdap_rebind_procJakub Hrozek2012-04-201-4/+6
|
* Do not call sdap_auth if not neededJakub Hrozek2012-04-181-7/+11
|
* LDAP: Fix memory leaks in synchronous_tls_setupStephen Gallagher2012-03-261-8/+10
| | | | | | | | | | We were never freeing "result" if it was allocated by ldap_result(). We were also not freeing "errmsg" if it was allocated but ldap_parse_result() returned an error. Also disambiguate error messages from ldap_parse_result() and error messages from sss_ldap_get_diagnostic_msg() since they use differing memory-management functions.
* LDAP: Errors retrieving the RootDSE should not be fatalStephen Gallagher2012-03-161-15/+8
| | | | | | | | If we can't reach the RootDSE, let's just proceed as if it's unavailable with reasonable defaults. If we fail later on, that's fine. Fixes https://fedorahosted.org/sssd/ticket/1257
* Detect cycle in the fail over on subsequent resolve requests onlyJakub Hrozek2012-03-081-2/+4
|
* Only do one cycle when resolving a serverJakub Hrozek2012-03-061-7/+6
| | | | https://fedorahosted.org/sssd/ticket/1214
* LDAP: Copy URI instead of pointing at failover service recordStephen Gallagher2012-01-141-2/+8
| | | | | | | | In a heavy load environment, sometimes the failover service record would be updated and free the URI value. We need to guarantee that this URI string remains valid throughout the entire request. https://fedorahosted.org/sssd/ticket/1139
* Add sdap_connection_expire_timeout optionStephen Gallagher2011-12-121-0/+12
| | | | https://fedorahosted.org/sssd/ticket/1036
* LDAP: Fix missing break statements in force_tlsStephen Gallagher2011-12-081-6/+12
| | | | Also add a default case to protect against bad input
* LDAP provider: Error while setting the nocanon option should not be fatalJakub Hrozek2011-12-081-3/+9
| | | | https://fedorahosted.org/sssd/ticket/1100
* Add ldap_sasl_minssf optionJan Zeleny2011-12-081-0/+17
| | | | https://fedorahosted.org/sssd/ticket/1075
* Provide means of forcing TLS and GSSAPI enabled/disabled for sdap connectionsJakub Hrozek2011-11-291-7/+28
|
* LDAP: Try next failover server on any errorStephen Gallagher2011-11-291-9/+5
|
* Cleanup: Remove unused parametersJakub Hrozek2011-11-221-9/+5
|
* Prevent printing NULL in several places of LDAP providerJakub Hrozek2011-11-181-3/+5
|
* Support to request canonicalization in LDAP/IPA providerJan Zeleny2011-11-021-0/+15
| | | | https://fedorahosted.org/sssd/ticket/957
* sss_ldap_err2string() - ldap_err2string() to sss_ldap_err2string()Pavel Březina2011-09-061-16/+16
| | | | https://fedorahosted.org/sssd/ticket/986
* sss_ldap_err2string() - function createdPavel Březina2011-09-061-2/+0
| | | | https://fedorahosted.org/sssd/ticket/986
* Add LDAP provider option to set LDAP_OPT_X_SASL_NOCANONJakub Hrozek2011-08-261-0/+11
| | | | https://fedorahosted.org/sssd/ticket/978
* Handle timeout during sss_ldap_init_sendJakub Hrozek2011-08-151-1/+5
| | | | | | | | | In some cases, where there would be no response from the LDAP server, there would be no R/W events on the LDAP fd, so sdap_async_sys_connect_done would never be called. This patch adds a tevent timer that cancels the connection after SDAP_NETWORK_TIMEOUT seconds.
* Request password control unconditionally during bindJakub Hrozek2011-08-011-6/+6
| | | | https://fedorahosted.org/sssd/ticket/940
* Use ldap_init_fd() instead of ldap_initialize() if availableSumit Bose2011-06-301-36/+83
|
* Add ldap_page_size configuration optionStephen Gallagher2011-04-271-0/+4
|
* Modify principal selection for keytab authenticationJan Zeleny2011-04-251-2/+7
| | | | | | | | | | | | | | | | Currently we construct the principal as host/fqdn@REALM. The problem with this is that this principal doesn't have to be in the keytab. In that case the provider fails to start. It is better to scan the keytab and find the most suitable principal to use. Only in case no suitable principal is found the backend should fail to start. The second issue solved by this patch is that the realm we are authenticating the machine to can be in general different from the realm our users are part of (in case of cross Kerberos trust). The patch adds new configuration option SDAP_SASL_REALM. https://fedorahosted.org/sssd/ticket/781
* Initialise rootdse to NULL if not availableSumit Bose2011-04-121-0/+1
|
* Initialise srv_opts even if rootDSE is missingSumit Bose2011-04-111-8/+9
|
* Read only rootDSE data if rootDSE is availableSumit Bose2011-04-081-20/+22
|
* Don't pass NULL to printf for TLS errorsJakub Hrozek2011-04-081-19/+22
| | | | https://fedorahosted.org/sssd/ticket/643
* Do not attempt to use START_TLS on SSL connectionsStephen Gallagher2011-02-161-2/+10
| | | | | | | Not all LDAP servers are capable of handling dual-encryption with both TLS and SSL. https://fedorahosted.org/sssd/ticket/795
* Convert obfuscated password once at startupSumit Bose2011-01-061-14/+0
|
* Mark unavailable Kerberos server as PORT_NOT_WORKINGSumit Bose2010-12-071-0/+1
|
* ldap: add checks to determine if USN features are available.Simo Sorce2010-12-071-9/+19
|
* Fix offline detection in sdap_cli_connect requestSumit Bose2010-12-011-0/+1
| | | | | | | sdap_cli_connect_recv_ext() checks if the failover server is not set to determine if the backend is offline. To make this work properly if multiple servers are defined the failover server must be set to NULL if all servers are checked.
* Use (default)namingContext to set empty search basesSumit Bose2010-11-041-0/+8
|
* Allow authentication for referralsSumit Bose2010-10-271-0/+193
|
* Add some missing ldap_memfree()Sumit Bose2010-10-221-2/+4
|
* Add ldap_deref optionSumit Bose2010-10-221-0/+37
|
* Initialize kerberos service for GSSAPIJakub Hrozek2010-10-131-4/+88
|
* Make ldap_child report kerberos return code to parentJakub Hrozek2010-10-131-1/+3
|
* Check if control is supported before using it.Simo Sorce2010-09-151-7/+9
|
* Revert "Make ldap bind asynchronous"Jakub Hrozek2010-09-151-127/+91
| | | | This reverts 56d8d19ac9d857580a233d8264e851883b883c67
* Store rootdse supported features in sdap_handlerSumit Bose2010-09-151-34/+17
|
* Deobfuscate password in back endsJakub Hrozek2010-09-081-7/+52
| | | | | | When obfuscated password is used in config file, the LDAP backend converts it back to clear text and uses it to authenticate to the server.