]> git.ipfire.org Git - thirdparty/openldap.git/commitdiff
ITS#9054, #9318 add new TLS options to slapd bindconf
authorHoward Chu <hyc@openldap.org>
Fri, 21 Aug 2020 19:06:56 +0000 (20:06 +0100)
committerHoward Chu <hyc@openldap.org>
Fri, 21 Aug 2020 19:06:56 +0000 (20:06 +0100)
For use with back-ldap/back-meta/syncrepl/etc

servers/slapd/config.c
servers/slapd/slap.h

index cab979a294d8866953b34bcb9a4ce9f9a5ec49dd..2248a9a3e1a2435be4751a88b40977d571900123 100644 (file)
@@ -1488,8 +1488,10 @@ static slap_cf_aux_table bindkey[] = {
        { BER_BVC("tls_cacert="), offsetof(slap_bindconf, sb_tls_cacert), 's', 1, NULL },
        { BER_BVC("tls_cacertdir="), offsetof(slap_bindconf, sb_tls_cacertdir), 's', 1, NULL },
        { BER_BVC("tls_reqcert="), offsetof(slap_bindconf, sb_tls_reqcert), 's', 0, NULL },
+       { BER_BVC("tls_reqsan="), offsetof(slap_bindconf, sb_tls_reqsan), 's', 0, NULL },
        { BER_BVC("tls_cipher_suite="), offsetof(slap_bindconf, sb_tls_cipher_suite), 's', 0, NULL },
        { BER_BVC("tls_protocol_min="), offsetof(slap_bindconf, sb_tls_protocol_min), 's', 0, NULL },
+       { BER_BVC("tls_ecname="), offsetof(slap_bindconf, sb_tls_ecname), 's', 0, NULL },
 #ifdef HAVE_OPENSSL_CRL
        { BER_BVC("tls_crlcheck="), offsetof(slap_bindconf, sb_tls_crlcheck), 's', 0, NULL },
 #endif
@@ -1855,6 +1857,10 @@ void bindconf_free( slap_bindconf *bc ) {
                ch_free( bc->sb_tls_reqcert );
                bc->sb_tls_reqcert = NULL;
        }
+       if ( bc->sb_tls_reqsan ) {
+               ch_free( bc->sb_tls_reqsan );
+               bc->sb_tls_reqsan = NULL;
+       }
        if ( bc->sb_tls_cipher_suite ) {
                ch_free( bc->sb_tls_cipher_suite );
                bc->sb_tls_cipher_suite = NULL;
@@ -1863,6 +1869,10 @@ void bindconf_free( slap_bindconf *bc ) {
                ch_free( bc->sb_tls_protocol_min );
                bc->sb_tls_protocol_min = NULL;
        }
+       if ( bc->sb_tls_ecname ) {
+               ch_free( bc->sb_tls_ecname );
+               bc->sb_tls_ecname = NULL;
+       }
 #ifdef HAVE_OPENSSL_CRL
        if ( bc->sb_tls_crlcheck ) {
                ch_free( bc->sb_tls_crlcheck );
@@ -1898,6 +1908,11 @@ bindconf_tls_defaults( slap_bindconf *bc )
                                &bc->sb_tls_cipher_suite );
                if ( !bc->sb_tls_reqcert )
                        bc->sb_tls_reqcert = ch_strdup("demand");
+               if ( !bc->sb_tls_reqsan )
+                       bc->sb_tls_reqsan = ch_strdup("allow");
+               if ( !bc->sb_tls_ecname )
+                       slap_tls_get_config( slap_tls_ld, LDAP_OPT_X_TLS_ECNAME,
+                               &bc->sb_tls_ecname );
 #ifdef HAVE_OPENSSL_CRL
                if ( !bc->sb_tls_crlcheck )
                        slap_tls_get_config( slap_tls_ld, LDAP_OPT_X_TLS_CRLCHECK,
@@ -1918,7 +1933,7 @@ static struct {
        { "tls_cacert", offsetof(slap_bindconf, sb_tls_cacert), LDAP_OPT_X_TLS_CACERTFILE },
        { "tls_cacertdir", offsetof(slap_bindconf, sb_tls_cacertdir), LDAP_OPT_X_TLS_CACERTDIR },
        { "tls_cipher_suite", offsetof(slap_bindconf, sb_tls_cipher_suite), LDAP_OPT_X_TLS_CIPHER_SUITE },
-       { "tls_protocol_min", offsetof(slap_bindconf, sb_tls_protocol_min), LDAP_OPT_X_TLS_PROTOCOL_MIN },
+       { "tls_ecname", offsetof(slap_bindconf, sb_tls_ecname), LDAP_OPT_X_TLS_ECNAME },
        {0, 0}
 };
 
@@ -1951,6 +1966,16 @@ int bindconf_tls_set( slap_bindconf *bc, LDAP *ld )
                        res = -1;
                }
        }
+       if ( bc->sb_tls_reqsan ) {
+               rc = ldap_pvt_tls_config( ld, LDAP_OPT_X_TLS_REQUIRE_SAN,
+                       bc->sb_tls_reqsan );
+               if ( rc ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bindconf_tls_set: failed to set tls_reqsan to %s\n",
+                                       bc->sb_tls_reqsan );
+                       res = -1;
+               }
+       }
        if ( bc->sb_tls_protocol_min ) {
                rc = ldap_pvt_tls_config( ld, LDAP_OPT_X_TLS_PROTOCOL_MIN,
                        bc->sb_tls_protocol_min );
index e762a19bec71e235c9704fb4f934689754f9c62b..3f5180b3012635540306ec44ddbbacb507f1de3a 100644 (file)
@@ -1651,8 +1651,10 @@ typedef struct slap_bindconf {
        char *sb_tls_cacert;
        char *sb_tls_cacertdir;
        char *sb_tls_reqcert;
+       char *sb_tls_reqsan;
        char *sb_tls_cipher_suite;
        char *sb_tls_protocol_min;
+       char *sb_tls_ecname;
 #ifdef HAVE_OPENSSL_CRL
        char *sb_tls_crlcheck;
 #endif