#endif
static int connect_timeout = 0;
static int timelimit = LDAP_NO_LIMIT;
-static int debug = 0;
+static int debug_mode = 0;
/* Added for TLS support and version 3 */
static int use_tls = 0;
break;
#endif
case 'd':
- debug++;
+ debug_mode++;
break;
default:
fprintf(stderr, PROGRAM_NAME ": ERROR: Unknown command line option '%c'\n", option);
/* LDAP can't bind with a blank password. Seen as "anonymous"
* and always granted access
*/
- if (debug)
+ if (debug_mode)
fprintf(stderr, "Blank password given\n");
return 1;
}
}
}
snprintf(filter, sizeof(filter), searchfilter, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login, escaped_login);
- if (debug)
+ if (debug_mode)
fprintf(stderr, "user filter '%s', searchbase '%s'\n", filter, basedn);
rc = ldap_search_s(search_ld, basedn, searchscope, filter, searchattr, 1, &res);
if (rc != LDAP_SUCCESS) {
/* Everything is fine. This is expected when referrals
* are disabled.
*/
- if (debug)
+ if (debug_mode)
fprintf(stderr, "noreferrals && rc == LDAP_PARTIAL_RESULTS\n");
} else {
fprintf(stderr, PROGRAM_NAME ": WARNING, LDAP search error '%s'\n", ldap_err2string(rc));
}
entry = ldap_first_entry(search_ld, res);
if (!entry) {
- if (debug)
+ if (debug_mode)
fprintf(stderr, "Ldap search returned nothing\n");
ret = 1;
goto search_done;
snprintf(dn, sizeof(dn), "%s=%s,%s", userattr, userid, basedn);
}
- if (debug)
+ if (debug_mode)
fprintf(stderr, "attempting to authenticate user '%s'\n", dn);
if (!bind_ld && !bind_once)
bind_ld = persistent_ld;