summaryrefslogtreecommitdiff
path: root/source4/libcli/ldap/ldap.c
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2004-08-12 04:55:59 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 12:57:54 -0500
commitfa8d37adae70a5f479262b722e47aa7fc21aaf5c (patch)
tree375b9389b7e6f7d2adc7c133058259595326918c /source4/libcli/ldap/ldap.c
parent5a4845ff8b44ef32cdb6d34ba5fc3359f9e3ef15 (diff)
downloadsamba-fa8d37adae70a5f479262b722e47aa7fc21aaf5c.tar.gz
samba-fa8d37adae70a5f479262b722e47aa7fc21aaf5c.tar.bz2
samba-fa8d37adae70a5f479262b722e47aa7fc21aaf5c.zip
r1756: merge volkers ldap client lib to samba4 for simo to start with the
ldap server code it's not compiled in yet... metze (This used to be commit 48939adca1332ff90f9287311c0e9ff3e2e5917a)
Diffstat (limited to 'source4/libcli/ldap/ldap.c')
-rw-r--r--source4/libcli/ldap/ldap.c1989
1 files changed, 1989 insertions, 0 deletions
diff --git a/source4/libcli/ldap/ldap.c b/source4/libcli/ldap/ldap.c
new file mode 100644
index 0000000000..38fff7e357
--- /dev/null
+++ b/source4/libcli/ldap/ldap.c
@@ -0,0 +1,1989 @@
+/*
+ Unix SMB/CIFS mplementation.
+ LDAP protocol helper functions for SAMBA
+
+ Copyright (C) Andrew Tridgell 2004
+ Copyright (C) Volker Lendecke 2004
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+
+*/
+
+#include "includes.h"
+#include "smb_ldap.h"
+
+/****************************************************************************
+ *
+ * LDAP filter parser -- main routine is ldb_parse_filter
+ *
+ * Shamelessly stolen and adapted from Samba 4.
+ *
+ ***************************************************************************/
+
+/* Hmm. A blob might be more appropriate here :-) */
+
+struct ldb_val {
+ unsigned int length;
+ void *data;
+};
+
+enum ldb_parse_op {LDB_OP_SIMPLE, LDB_OP_AND, LDB_OP_OR, LDB_OP_NOT};
+
+struct ldb_parse_tree {
+ enum ldb_parse_op operation;
+ union {
+ struct {
+ char *attr;
+ struct ldb_val value;
+ } simple;
+ struct {
+ unsigned int num_elements;
+ struct ldb_parse_tree **elements;
+ } list;
+ struct {
+ struct ldb_parse_tree *child;
+ } not;
+ } u;
+};
+
+#define LDB_ALL_SEP "()&|=!"
+
+/*
+ return next token element. Caller frees
+*/
+static char *ldb_parse_lex(TALLOC_CTX *mem_ctx, const char **s,
+ const char *sep)
+{
+ const char *p = *s;
+ char *ret;
+
+ while (isspace(*p)) {
+ p++;
+ }
+ *s = p;
+
+ if (*p == 0) {
+ return NULL;
+ }
+
+ if (strchr(sep, *p)) {
+ (*s) = p+1;
+ ret = talloc_strndup(mem_ctx, p, 1);
+ if (!ret) {
+ errno = ENOMEM;
+ }
+ return ret;
+ }
+
+ while (*p && (isalnum(*p) || !strchr(sep, *p))) {
+ p++;
+ }
+
+ if (p == *s) {
+ return NULL;
+ }
+
+ ret = talloc_strndup(mem_ctx, *s, p - *s);
+ if (!ret) {
+ errno = ENOMEM;
+ }
+
+ *s = p;
+
+ return ret;
+}
+
+
+/*
+ find a matching close brace in a string
+*/
+static const char *match_brace(const char *s)
+{
+ unsigned int count = 0;
+ while (*s && (count != 0 || *s != ')')) {
+ if (*s == '(') {
+ count++;
+ }
+ if (*s == ')') {
+ count--;
+ }
+ s++;
+ }
+ if (! *s) {
+ return NULL;
+ }
+ return s;
+}
+
+static struct ldb_parse_tree *ldb_parse_filter(TALLOC_CTX *mem_ctx,
+ const char **s);
+
+/*
+ <simple> ::= <attributetype> <filtertype> <attributevalue>
+*/
+static struct ldb_parse_tree *ldb_parse_simple(TALLOC_CTX *mem_ctx,
+ const char *s)
+{
+ char *eq, *val, *l;
+ struct ldb_parse_tree *ret;
+
+ l = ldb_parse_lex(mem_ctx, &s, LDB_ALL_SEP);
+ if (!l) {
+ return NULL;
+ }
+
+ if (strchr("()&|=", *l))
+ return NULL;
+
+ eq = ldb_parse_lex(mem_ctx, &s, LDB_ALL_SEP);
+ if (!eq || strcmp(eq, "=") != 0)
+ return NULL;
+
+ val = ldb_parse_lex(mem_ctx, &s, ")");
+ if (val && strchr("()&|", *val))
+ return NULL;
+
+ ret = talloc(mem_ctx, sizeof(*ret));
+ if (!ret) {
+ errno = ENOMEM;
+ return NULL;
+ }
+
+ ret->operation = LDB_OP_SIMPLE;
+ ret->u.simple.attr = l;
+ ret->u.simple.value.data = val;
+ ret->u.simple.value.length = val?strlen(val):0;
+
+ return ret;
+}
+
+
+/*
+ parse a filterlist
+ <and> ::= '&' <filterlist>
+ <or> ::= '|' <filterlist>
+ <filterlist> ::= <filter> | <filter> <filterlist>
+*/
+static struct ldb_parse_tree *ldb_parse_filterlist(TALLOC_CTX *mem_ctx,
+ enum ldb_parse_op op,
+ const char *s)
+{
+ struct ldb_parse_tree *ret, *next;
+
+ ret = talloc(mem_ctx, sizeof(*ret));
+
+ if (!ret) {
+ errno = ENOMEM;
+ return NULL;
+ }
+
+ ret->operation = op;
+ ret->u.list.num_elements = 1;
+ ret->u.list.elements = talloc(mem_ctx, sizeof(*ret->u.list.elements));
+ if (!ret->u.list.elements) {
+ errno = ENOMEM;
+ return NULL;
+ }
+
+ ret->u.list.elements[0] = ldb_parse_filter(mem_ctx, &s);
+ if (!ret->u.list.elements[0]) {
+ return NULL;
+ }
+
+ while (isspace(*s)) s++;
+
+ while (*s && (next = ldb_parse_filter(mem_ctx, &s))) {
+ struct ldb_parse_tree **e;
+ e = talloc_realloc(mem_ctx, ret->u.list.elements,
+ sizeof(struct ldb_parse_tree) *
+ (ret->u.list.num_elements+1));
+ if (!e) {
+ errno = ENOMEM;
+ return NULL;
+ }
+ ret->u.list.elements = e;
+ ret->u.list.elements[ret->u.list.num_elements] = next;
+ ret->u.list.num_elements++;
+ while (isspace(*s)) s++;
+ }
+
+ return ret;
+}
+
+
+/*
+ <not> ::= '!' <filter>
+*/
+static struct ldb_parse_tree *ldb_parse_not(TALLOC_CTX *mem_ctx, const char *s)
+{
+ struct ldb_parse_tree *ret;
+
+ ret = talloc(mem_ctx, sizeof(*ret));
+ if (!ret) {
+ errno = ENOMEM;
+ return NULL;
+ }
+
+ ret->operation = LDB_OP_NOT;
+ ret->u.not.child = ldb_parse_filter(mem_ctx, &s);
+ if (!ret->u.not.child)
+ return NULL;
+
+ return ret;
+}
+
+/*
+ parse a filtercomp
+ <filtercomp> ::= <and> | <or> | <not> | <simple>
+*/
+static struct ldb_parse_tree *ldb_parse_filtercomp(TALLOC_CTX *mem_ctx,
+ const char *s)
+{
+ while (isspace(*s)) s++;
+
+ switch (*s) {
+ case '&':
+ return ldb_parse_filterlist(mem_ctx, LDB_OP_AND, s+1);
+
+ case '|':
+ return ldb_parse_filterlist(mem_ctx, LDB_OP_OR, s+1);
+
+ case '!':
+ return ldb_parse_not(mem_ctx, s+1);
+
+ case '(':
+ case ')':
+ return NULL;
+ }
+
+ return ldb_parse_simple(mem_ctx, s);
+}
+
+
+/*
+ <filter> ::= '(' <filtercomp> ')'
+*/
+static struct ldb_parse_tree *ldb_parse_filter(TALLOC_CTX *mem_ctx,
+ const char **s)
+{
+ char *l, *s2;
+ const char *p, *p2;
+ struct ldb_parse_tree *ret;
+
+ l = ldb_parse_lex(mem_ctx, s, LDB_ALL_SEP);
+ if (!l) {
+ return NULL;
+ }
+
+ if (strcmp(l, "(") != 0) {
+ return NULL;
+ }
+
+ p = match_brace(*s);
+ if (!p) {
+ return NULL;
+ }
+ p2 = p + 1;
+
+ s2 = talloc_strndup(mem_ctx, *s, p - *s);
+ if (!s2) {
+ errno = ENOMEM;
+ return NULL;
+ }
+
+ ret = ldb_parse_filtercomp(mem_ctx, s2);
+
+ *s = p2;
+
+ return ret;
+}
+
+/*
+ main parser entry point. Takes a search string and returns a parse tree
+
+ expression ::= <simple> | <filter>
+*/
+static struct ldb_parse_tree *ldb_parse_tree(TALLOC_CTX *mem_ctx, const char *s)
+{
+ while (isspace(*s)) s++;
+
+ if (*s == '(') {
+ return ldb_parse_filter(mem_ctx, &s);
+ }
+
+ return ldb_parse_simple(mem_ctx, s);
+}
+
+static BOOL ldap_push_filter(ASN1_DATA *data, struct ldb_parse_tree *tree)
+{
+ switch (tree->operation) {
+ case LDB_OP_SIMPLE: {
+ if ((tree->u.simple.value.length == 1) &&
+ (((char *)(tree->u.simple.value.data))[0] == '*')) {
+ /* Just a presence test */
+ asn1_push_tag(data, 0x87);
+ asn1_write(data, tree->u.simple.attr,
+ strlen(tree->u.simple.attr));
+ asn1_pop_tag(data);
+ return !data->has_error;
+ }
+
+ /* Equality is all we currently do... */
+ asn1_push_tag(data, 0xa3);
+ asn1_write_OctetString(data, tree->u.simple.attr,
+ strlen(tree->u.simple.attr));
+ asn1_write_OctetString(data, tree->u.simple.value.data,
+ tree->u.simple.value.length);
+ asn1_pop_tag(data);
+ break;
+ }
+
+ case LDB_OP_AND: {
+ int i;
+
+ asn1_push_tag(data, 0xa0);
+ for (i=0; i<tree->u.list.num_elements; i++) {
+ ldap_push_filter(data, tree->u.list.elements[i]);
+ }
+ asn1_pop_tag(data);
+ break;
+ }
+
+ case LDB_OP_OR: {
+ int i;
+
+ asn1_push_tag(data, 0xa1);
+ for (i=0; i<tree->u.list.num_elements; i++) {
+ ldap_push_filter(data, tree->u.list.elements[i]);
+ }
+ asn1_pop_tag(data);
+ break;
+ }
+ default:
+ return False;
+ }
+ return !data->has_error;
+}
+
+/****************************************************************************
+ *
+ * LDIF parser
+ *
+ * Shamelessly stolen and adapted from Samba 4.
+ *
+ ***************************************************************************/
+
+/*
+ pull a ldif chunk, which is defined as a piece of data ending in \n\n or EOF
+ this routine removes any RFC2849 continuations and comments
+
+ caller frees
+*/
+static char *next_chunk(TALLOC_CTX *mem_ctx,
+ int (*fgetc_fn)(void *), void *private_data)
+{
+ size_t alloc_size=0, chunk_size = 0;
+ char *chunk = NULL;
+ int c;
+ int in_comment = 0;
+
+ while ((c = fgetc_fn(private_data)) != EOF) {
+ if (chunk_size+1 >= alloc_size) {
+ char *c2;
+ alloc_size += 1024;
+ c2 = talloc_realloc(mem_ctx, chunk, alloc_size);
+ if (!c2) {
+ errno = ENOMEM;
+ return NULL;
+ }
+ chunk = c2;
+ }
+
+ if (in_comment) {
+ if (c == '\n') {
+ in_comment = 0;
+ }
+ continue;
+ }
+
+ /* handle continuation lines - see RFC2849 */
+ if (c == ' ' && chunk_size > 1 &&
+ chunk[chunk_size-1] == '\n') {
+ chunk_size--;
+ continue;
+ }
+
+ /* chunks are terminated by a double line-feed */
+ if (c == '\n' && chunk_size > 0 &&
+ chunk[chunk_size-1] == '\n') {
+ chunk[chunk_size-1] = 0;
+ return chunk;
+ }
+
+ if (c == '#' &&
+ (chunk_size == 0 || chunk[chunk_size-1] == '\n')) {
+ in_comment = 1;
+ continue;
+ }
+
+ /* ignore leading blank lines */
+ if (chunk_size == 0 && c == '\n') {
+ continue;
+ }
+
+ chunk[chunk_size++] = c;
+ }
+
+ if (chunk) {
+ chunk[chunk_size] = 0;
+ }
+
+ return chunk;
+}
+
+/* simple ldif attribute parser */
+static int next_attr(char **s, const char **attr, struct ldb_val *value)
+{
+ char *p;
+ int base64_encoded = 0;
+
+ if (strncmp(*s, "-\n", 2) == 0) {
+ value->length = 0;
+ *attr = "-";
+ *s += 2;
+ return 0;
+ }
+
+ p = strchr(*s, ':');
+ if (!p) {
+ return -1;
+ }
+
+ *p++ = 0;
+
+ if (*p == ':') {
+ base64_encoded = 1;
+ p++;
+ }
+
+ *attr = *s;
+
+ while (isspace(*p)) {
+ p++;
+ }
+
+ value->data = p;
+
+ p = strchr(p, '\n');
+
+ if (!p) {
+ value->length = strlen((char *)value->data);
+ *s = ((char *)value->data) + value->length;
+ } else {
+ value->length = p - (char *)value->data;
+ *s = p+1;
+ *p = 0;
+ }
+
+ if (base64_encoded) {
+ DATA_BLOB blob = base64_decode_data_blob(value->data);
+ memcpy(value->data, blob.data, blob.length);
+ value->length = blob.length;
+ ((char *)value->data)[value->length] = '\0';
+ }
+
+ return 0;
+}
+
+static BOOL add_value_to_attrib(TALLOC_CTX *mem_ctx, struct ldb_val *value,
+ struct ldap_attribute *attrib)
+{
+ attrib->values = talloc_realloc(mem_ctx, attrib->values,
+ sizeof(*attrib->values) *
+ (attrib->num_values+1));
+ if (attrib->values == NULL)
+ return False;
+
+ attrib->values[attrib->num_values] =
+ data_blob_talloc(mem_ctx, value->data, value->length);
+ attrib->num_values += 1;
+ return True;
+}
+
+static BOOL fill_add_attributes(struct ldap_message *msg, char **chunk)
+{
+ struct ldap_AddRequest *r = &msg->r.AddRequest;
+ const char *attr_name;
+ struct ldb_val value;
+
+ r->num_attributes = 0;
+ r->attributes = NULL;
+
+ while (next_attr(chunk, &attr_name, &value) == 0) {
+ int i;
+ struct ldap_attribute *attrib = NULL;
+
+ for (i=0; i<r->num_attributes; i++) {
+ if (strequal(r->attributes[i].name, attr_name)) {
+ attrib = &r->attributes[i];
+ break;
+ }
+ }
+
+ if (attrib == NULL) {
+ r->attributes = talloc_realloc(msg->mem_ctx,
+ r->attributes,
+ sizeof(*r->attributes) *
+ (r->num_attributes+1));
+ if (r->attributes == NULL)
+ return False;
+
+ attrib = &(r->attributes[r->num_attributes]);
+ r->num_attributes += 1;
+ ZERO_STRUCTP(attrib);
+ attrib->name = talloc_strdup(msg->mem_ctx,
+ attr_name);
+ }
+
+ if (!add_value_to_attrib(msg->mem_ctx, &value, attrib))
+ return False;
+ }
+ return True;
+}
+
+static BOOL add_mod_to_array_talloc(TALLOC_CTX *mem_ctx,
+ struct ldap_mod *mod,
+ struct ldap_mod **mods,
+ int *num_mods)
+{
+ *mods = talloc_realloc(mem_ctx, *mods,
+ sizeof(**mods) * ((*num_mods)+1));
+
+ if (*mods == NULL)
+ return False;
+
+ (*mods)[*num_mods] = *mod;
+ *num_mods += 1;
+ return True;
+}
+
+static BOOL fill_mods(struct ldap_message *msg, char **chunk)
+{
+ struct ldap_ModifyRequest *r = &msg->r.ModifyRequest;
+ const char *attr_name;
+ struct ldb_val value;
+
+ r->num_mods = 0;
+ r->mods = NULL;
+
+ while (next_attr(chunk, &attr_name, &value) == 0) {
+
+ struct ldap_mod mod;
+ mod.type = LDAP_MODIFY_NONE;
+
+ mod.attrib.name = talloc_strdup(msg->mem_ctx, value.data);
+
+ if (strequal(attr_name, "add"))
+ mod.type = LDAP_MOD_ADD;
+
+ if (strequal(attr_name, "delete"))
+ mod.type = LDAP_MOD_DELETE;
+
+ if (strequal(attr_name, "replace"))
+ mod.type = LDAP_MOD_REPLACE;
+
+ if (mod.type == LDAP_MODIFY_NONE) {
+ DEBUG(2, ("ldif modification type %s unsupported\n",
+ attr_name));
+ return False;
+ }
+
+ mod.attrib.num_values = 0;
+ mod.attrib.values = NULL;
+
+ while (next_attr(chunk, &attr_name, &value) == 0) {
+ if (strequal(attr_name, "-"))
+ break;
+ if (!strequal(attr_name, mod.attrib.name)) {
+ DEBUG(3, ("attrib name %s does not "
+ "match %s\n", attr_name,
+ mod.attrib.name));
+ return False;
+ }
+ if (!add_value_to_attrib(msg->mem_ctx, &value,
+ &mod.attrib)) {
+ DEBUG(3, ("Could not add value\n"));
+ return False;
+ }
+ }
+
+ if (!add_mod_to_array_talloc(msg->mem_ctx, &mod, &r->mods,
+ &r->num_mods))
+ return False;
+ }
+
+ return True;
+}
+
+/*
+ read from a LDIF source, creating a ldap_message
+*/
+static struct ldap_message *ldif_read(int (*fgetc_fn)(void *),
+ void *private_data)
+{
+ struct ldap_message *msg;
+ const char *attr=NULL;
+ const char *dn;
+ char *chunk=NULL, *s;
+ struct ldb_val value;
+
+ value.data = NULL;
+
+ msg = new_ldap_message();
+ if (msg == NULL)
+ return NULL;
+
+ chunk = next_chunk(msg->mem_ctx, fgetc_fn, private_data);
+ if (!chunk) {
+ goto failed;
+ }
+
+ s = chunk;
+
+ if (next_attr(&s, &attr, &value) != 0) {
+ goto failed;
+ }
+
+ /* first line must be a dn */
+ if (!strequal(attr, "dn")) {
+ DEBUG(5, ("Error: First line of ldif must be a dn not '%s'\n",
+ attr));
+ goto failed;
+ }
+
+ dn = talloc_strdup(msg->mem_ctx, value.data);
+
+ if (next_attr(&s, &attr, &value) != 0) {
+ goto failed;
+ }
+
+ if (!strequal(attr, "changetype")) {
+ DEBUG(5, ("Error: Second line of ldif must be a changetype "
+ "not '%s'\n", attr));
+ goto failed;
+ }
+
+ if (strequal(value.data, "delete")) {
+ msg->type = LDAP_TAG_DelRequest;
+ msg->r.DelRequest.dn = dn;
+ return msg;
+ }
+
+ if (strequal(value.data, "add")) {
+ msg->type = LDAP_TAG_AddRequest;
+
+ msg->r.AddRequest.dn = dn;
+
+ if (!fill_add_attributes(msg, &s))
+ goto failed;
+
+ return msg;
+ }
+
+ if (strequal(value.data, "modify")) {
+ msg->type = LDAP_TAG_ModifyRequest;
+
+ msg->r.ModifyRequest.dn = dn;
+
+ if (!fill_mods(msg, &s))
+ goto failed;
+
+ return msg;
+ }
+
+ DEBUG(3, ("changetype %s not supported\n", (char *)value.data));
+
+failed:
+ destroy_ldap_message(msg);
+ return NULL;
+}
+
+/*
+ a wrapper around ldif_read() for reading from const char*
+*/
+struct ldif_read_string_state {
+ const char *s;
+};
+
+static int fgetc_string(void *private_data)
+{
+ struct ldif_read_string_state *state = private_data;
+ if (state->s[0] != 0) {
+ return *state->s++;
+ }
+ return EOF;
+}
+
+struct ldap_message *ldap_ldif2msg(const char *s)
+{
+ struct ldif_read_string_state state;
+ state.s = s;
+ return ldif_read(fgetc_string, &state);
+}
+
+static void ldap_encode_response(enum ldap_request_tag tag,
+ struct ldap_Result *result,
+ ASN1_DATA *data)
+{
+ asn1_push_tag(data, ASN1_APPLICATION(tag));
+ asn1_write_enumerated(data, result->resultcode);
+ asn1_write_OctetString(data, result->dn,
+ (result->dn) ? strlen(result->dn) : 0);
+ asn1_write_OctetString(data, result->errormessage,
+ (result->errormessage) ?
+ strlen(result->errormessage) : 0);
+ if (result->referral != NULL)
+ asn1_write_OctetString(data, result->referral,
+ strlen(result->referral));
+ asn1_pop_tag(data);
+}
+
+BOOL ldap_encode(struct ldap_message *msg, DATA_BLOB *result)
+{
+ ASN1_DATA data;
+ int i, j;
+
+ ZERO_STRUCT(data);
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+ asn1_write_Integer(&data, msg->messageid);
+
+ switch (msg->type) {
+ case LDAP_TAG_BindRequest: {
+ struct ldap_BindRequest *r = &msg->r.BindRequest;
+ asn1_push_tag(&data, ASN1_APPLICATION(LDAP_TAG_BindRequest));
+ asn1_write_Integer(&data, r->version);
+ asn1_write_OctetString(&data, r->dn,
+ (r->dn != NULL) ? strlen(r->dn) : 0);
+
+ switch (r->mechanism) {
+ case LDAP_AUTH_MECH_SIMPLE:
+ /* context, primitive */
+ asn1_push_tag(&data, r->mechanism | 0x80);
+ asn1_write(&data, r->creds.password,
+ strlen(r->creds.password));
+ asn1_pop_tag(&data);
+ break;
+ case LDAP_AUTH_MECH_SASL:
+ /* context, constructed */
+ asn1_push_tag(&data, r->mechanism | 0xa0);
+ asn1_write_OctetString(&data, r->creds.SASL.mechanism,
+ strlen(r->creds.SASL.mechanism));
+ asn1_write_OctetString(&data, r->creds.SASL.creds.data,
+ r->creds.SASL.creds.length);
+ asn1_pop_tag(&data);
+ break;
+ default:
+ return False;
+ }
+
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_BindResponse: {
+ struct ldap_BindResponse *r = &msg->r.BindResponse;
+ ldap_encode_response(msg->type, &r->response, &data);
+ break;
+ }
+ case LDAP_TAG_UnbindRequest: {
+/* struct ldap_UnbindRequest *r = &msg->r.UnbindRequest; */
+ break;
+ }
+ case LDAP_TAG_SearchRequest: {
+ struct ldap_SearchRequest *r = &msg->r.SearchRequest;
+ asn1_push_tag(&data, ASN1_APPLICATION(LDAP_TAG_SearchRequest));
+ asn1_write_OctetString(&data, r->basedn, strlen(r->basedn));
+ asn1_write_enumerated(&data, r->scope);
+ asn1_write_enumerated(&data, r->deref);
+ asn1_write_Integer(&data, r->sizelimit);
+ asn1_write_Integer(&data, r->timelimit);
+ asn1_write_BOOLEAN2(&data, r->attributesonly);
+
+ {
+ TALLOC_CTX *mem_ctx = talloc_init("ldb_parse_tree");
+ struct ldb_parse_tree *tree;
+
+ if (mem_ctx == NULL)
+ return False;
+
+ tree = ldb_parse_tree(mem_ctx, r->filter);
+
+ if (tree == NULL)
+ return False;
+
+ ldap_push_filter(&data, tree);
+
+ talloc_destroy(mem_ctx);
+ }
+
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+ for (i=0; i<r->num_attributes; i++) {
+ asn1_write_OctetString(&data, r->attributes[i],
+ strlen(r->attributes[i]));
+ }
+ asn1_pop_tag(&data);
+
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_SearchResultEntry: {
+ struct ldap_SearchResEntry *r = &msg->r.SearchResultEntry;
+ asn1_push_tag(&data, ASN1_APPLICATION(LDAP_TAG_SearchResultEntry));
+ asn1_write_OctetString(&data, r->dn, strlen(r->dn));
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+ for (i=0; i<r->num_attributes; i++) {
+ struct ldap_attribute *attr = &r->attributes[i];
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+ asn1_write_OctetString(&data, attr->name,
+ strlen(attr->name));
+ asn1_push_tag(&data, ASN1_SEQUENCE(1));
+ for (j=0; j<attr->num_values; j++) {
+ asn1_write_OctetString(&data,
+ attr->values[j].data,
+ attr->values[j].length);
+ }
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ }
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_SearchResultDone: {
+ struct ldap_SearchResultDone *r = &msg->r.SearchResultDone;
+ ldap_encode_response(msg->type, r, &data);
+ break;
+ }
+ case LDAP_TAG_ModifyRequest: {
+ struct ldap_ModifyRequest *r = &msg->r.ModifyRequest;
+ asn1_push_tag(&data, ASN1_APPLICATION(LDAP_TAG_ModifyRequest));
+ asn1_write_OctetString(&data, r->dn, strlen(r->dn));
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+
+ for (i=0; i<r->num_mods; i++) {
+ struct ldap_attribute *attrib = &r->mods[i].attrib;
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+ asn1_write_enumerated(&data, r->mods[i].type);
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+ asn1_write_OctetString(&data, attrib->name,
+ strlen(attrib->name));
+ asn1_push_tag(&data, ASN1_SET);
+ for (j=0; j<attrib->num_values; j++) {
+ asn1_write_OctetString(&data,
+ attrib->values[j].data,
+ attrib->values[j].length);
+
+ }
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ }
+
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_ModifyResponse: {
+ struct ldap_Result *r = &msg->r.ModifyResponse;
+ ldap_encode_response(msg->type, r, &data);
+ break;
+ }
+ case LDAP_TAG_AddRequest: {
+ struct ldap_AddRequest *r = &msg->r.AddRequest;
+ asn1_push_tag(&data, ASN1_APPLICATION(LDAP_TAG_AddRequest));
+ asn1_write_OctetString(&data, r->dn, strlen(r->dn));
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+
+ for (i=0; i<r->num_attributes; i++) {
+ struct ldap_attribute *attrib = &r->attributes[i];
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+ asn1_write_OctetString(&data, attrib->name,
+ strlen(attrib->name));
+ asn1_push_tag(&data, ASN1_SET);
+ for (j=0; j<r->attributes[i].num_values; j++) {
+ asn1_write_OctetString(&data,
+ attrib->values[j].data,
+ attrib->values[j].length);
+ }
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ }
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_AddResponse: {
+ struct ldap_Result *r = &msg->r.AddResponse;
+ ldap_encode_response(msg->type, r, &data);
+ break;
+ }
+ case LDAP_TAG_DelRequest: {
+ struct ldap_DelRequest *r = &msg->r.DelRequest;
+ asn1_push_tag(&data,
+ ASN1_APPLICATION_SIMPLE(LDAP_TAG_DelRequest));
+ asn1_write(&data, r->dn, strlen(r->dn));
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_DelResponse: {
+ struct ldap_Result *r = &msg->r.DelResponse;
+ ldap_encode_response(msg->type, r, &data);
+ break;
+ }
+ case LDAP_TAG_ModifyDNRequest: {
+ struct ldap_ModifyDNRequest *r = &msg->r.ModifyDNRequest;
+ asn1_push_tag(&data,
+ ASN1_APPLICATION(LDAP_TAG_ModifyDNRequest));
+ asn1_write_OctetString(&data, r->dn, strlen(r->dn));
+ asn1_write_OctetString(&data, r->newrdn, strlen(r->newrdn));
+ asn1_write_BOOLEAN2(&data, r->deleteolddn);
+ if (r->newsuperior != NULL) {
+ asn1_push_tag(&data, ASN1_CONTEXT_SIMPLE(0));
+ asn1_write(&data, r->newsuperior,
+ strlen(r->newsuperior));
+ asn1_pop_tag(&data);
+ }
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_ModifyDNResponse: {
+/* struct ldap_Result *r = &msg->r.ModifyDNResponse; */
+ break;
+ }
+ case LDAP_TAG_CompareRequest: {
+ struct ldap_CompareRequest *r = &msg->r.CompareRequest;
+ asn1_push_tag(&data,
+ ASN1_APPLICATION(LDAP_TAG_CompareRequest));
+ asn1_write_OctetString(&data, r->dn, strlen(r->dn));
+ asn1_push_tag(&data, ASN1_SEQUENCE(0));
+ asn1_write_OctetString(&data, r->attribute,
+ strlen(r->attribute));
+ asn1_write_OctetString(&data, r->value,
+ strlen(r->value));
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_CompareResponse: {
+/* struct ldap_Result *r = &msg->r.CompareResponse; */
+ break;
+ }
+ case LDAP_TAG_AbandonRequest: {
+ struct ldap_AbandonRequest *r = &msg->r.AbandonRequest;
+ asn1_push_tag(&data,
+ ASN1_APPLICATION_SIMPLE(LDAP_TAG_AbandonRequest));
+ asn1_write_Integer(&data, r->messageid);
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_SearchResultReference: {
+/* struct ldap_SearchResRef *r = &msg->r.SearchResultReference; */
+ break;
+ }
+ case LDAP_TAG_ExtendedRequest: {
+ struct ldap_ExtendedRequest *r = &msg->r.ExtendedRequest;
+ asn1_push_tag(&data, ASN1_APPLICATION(LDAP_TAG_ExtendedRequest));
+ asn1_push_tag(&data, ASN1_CONTEXT_SIMPLE(0));
+ asn1_write(&data, r->oid, strlen(r->oid));
+ asn1_pop_tag(&data);
+ asn1_push_tag(&data, ASN1_CONTEXT_SIMPLE(1));
+ asn1_write(&data, r->value.data, r->value.length);
+ asn1_pop_tag(&data);
+ asn1_pop_tag(&data);
+ break;
+ }
+ case LDAP_TAG_ExtendedResponse: {
+ struct ldap_ExtendedResponse *r = &msg->r.ExtendedResponse;
+ ldap_encode_response(msg->type, &r->response, &data);
+ break;
+ }
+ default:
+ return False;
+ }
+
+ asn1_pop_tag(&data);
+ *result = data_blob(data.data, data.length);
+ asn1_free(&data);
+ return True;
+}
+
+static const char *blob2string_talloc(TALLOC_CTX *mem_ctx,
+ DATA_BLOB blob)
+{
+ char *result = talloc(mem_ctx, blob.length+1);
+ memcpy(result, blob.data, blob.length);
+ result[blob.length] = '\0';
+ return result;
+}
+
+static BOOL asn1_read_OctetString_talloc(TALLOC_CTX *mem_ctx,
+ ASN1_DATA *data,
+ const char **result)
+{
+ DATA_BLOB string;
+ if (!asn1_read_OctetString(data, &string))
+ return False;
+ *result = blob2string_talloc(mem_ctx, string);
+ data_blob_free(&string);
+ return True;
+}
+
+static void ldap_decode_response(TALLOC_CTX *mem_ctx,
+ ASN1_DATA *data,
+ enum ldap_request_tag tag,
+ struct ldap_Result *result)
+{
+ asn1_start_tag(data, ASN1_APPLICATION(tag));
+ asn1_read_enumerated(data, &result->resultcode);
+ asn1_read_OctetString_talloc(mem_ctx, data, &result->dn);
+ asn1_read_OctetString_talloc(mem_ctx, data, &result->errormessage);
+ if (asn1_peek_tag(data, ASN1_OCTET_STRING))
+ asn1_read_OctetString_talloc(mem_ctx, data, &result->referral);
+ else
+ result->referral = NULL;
+ asn1_end_tag(data);
+}
+
+static BOOL add_attrib_to_array_talloc(TALLOC_CTX *mem_ctx,
+ const struct ldap_attribute *attrib,
+ struct ldap_attribute **attribs,
+ int *num_attribs)
+{
+ *attribs = talloc_realloc(mem_ctx, *attribs,
+ sizeof(**attribs) * (*num_attribs+1));
+
+ if (*attribs == NULL)
+ return False;
+
+ (*attribs)[*num_attribs] = *attrib;
+ *num_attribs += 1;
+ return True;
+}
+
+static BOOL ldap_decode_filter(TALLOC_CTX *mem_ctx, ASN1_DATA *data,
+ char **filter)
+{
+ uint8 filter_tag, tag_desc;
+
+ if (!asn1_peek_uint8(data, &filter_tag))
+ return False;
+
+ tag_desc = filter_tag;
+ filter_tag &= 0x1f; /* strip off the asn1 stuff */
+ tag_desc &= 0xe0;
+
+ switch(filter_tag) {
+ case 0: {
+ /* AND of one or more filters */
+ if (tag_desc != 0xa0) /* context compount */
+ return False;
+
+ asn1_start_tag(data, ASN1_CONTEXT(0));
+
+ *filter = talloc_strdup(mem_ctx, "(&");
+ if (*filter == NULL)
+ return False;
+
+ while (asn1_tag_remaining(data) > 0) {
+ char *subfilter;
+ if (!ldap_decode_filter(mem_ctx, data, &subfilter))
+ return False;
+ *filter = talloc_asprintf(mem_ctx, "%s%s", *filter,
+ subfilter);
+ if (*filter == NULL)
+ return False;
+ }
+ asn1_end_tag(data);
+
+ *filter = talloc_asprintf(mem_ctx, "%s)", *filter);
+ break;
+ }
+ case 1: {
+ /* OR of one or more filters */
+ if (tag_desc != 0xa0) /* context compount */
+ return False;
+
+ asn1_start_tag(data, ASN1_CONTEXT(1));
+
+ *filter = talloc_strdup(mem_ctx, "(|");
+ if (*filter == NULL)
+ return False;
+
+ while (asn1_tag_remaining(data) > 0) {
+ char *subfilter;
+ if (!ldap_decode_filter(mem_ctx, data, &subfilter))
+ return False;
+ *filter = talloc_asprintf(mem_ctx, "%s%s", *filter,
+ subfilter);
+ if (*filter == NULL)
+ return False;
+ }
+
+ asn1_end_tag(data);
+
+ *filter = talloc_asprintf(mem_ctx, "%s)", *filter);
+ break;
+ }
+ case 3: {
+ /* equalityMatch */
+ const char *attrib, *value;
+ if (tag_desc != 0xa0) /* context compound */
+ return False;
+ asn1_start_tag(data, ASN1_CONTEXT(3));
+ asn1_read_OctetString_talloc(mem_ctx, data, &attrib);
+ asn1_read_OctetString_talloc(mem_ctx, data, &value);
+ asn1_end_tag(data);
+ if ((data->has_error) || (attrib == NULL) || (value == NULL))
+ return False;
+ *filter = talloc_asprintf(mem_ctx, "(%s=%s)", attrib, value);
+ break;
+ }
+ case 7: {
+ /* Normal presence, "attribute=*" */
+ int attr_len;
+ char *attr_name;
+ if (tag_desc != 0x80) /* context simple */
+ return False;
+ if (!asn1_start_tag(data, ASN1_CONTEXT_SIMPLE(7)))
+ return False;
+ attr_len = asn1_tag_remaining(data);
+ attr_name = malloc(attr_len+1);
+ if (attr_name == NULL)
+ return False;
+ asn1_read(data, attr_name, attr_len);
+ attr_name[attr_len] = '\0';
+ *filter = talloc_asprintf(mem_ctx, "(%s=*)", attr_name);
+ SAFE_FREE(attr_name);
+ asn1_end_tag(data);
+ break;
+ }
+ default:
+ return False;
+ }
+ if (*filter == NULL)
+ return False;
+ return True;
+}
+
+static void ldap_decode_attrib(TALLOC_CTX *mem_ctx, ASN1_DATA *data,
+ struct ldap_attribute *attrib)
+{
+ asn1_start_tag(data, ASN1_SEQUENCE(0));
+ asn1_read_OctetString_talloc(mem_ctx, data, &attrib->name);
+ asn1_start_tag(data, ASN1_SET);
+ while (asn1_peek_tag(data, ASN1_OCTET_STRING)) {
+ DATA_BLOB blob;
+ struct ldb_val value;
+ asn1_read_OctetString(data, &blob);
+ value.data = blob.data;
+ value.length = blob.length;
+ add_value_to_attrib(mem_ctx, &value, attrib);
+ data_blob_free(&blob);
+ }
+ asn1_end_tag(data);
+ asn1_end_tag(data);
+
+}
+
+static void ldap_decode_attribs(TALLOC_CTX *mem_ctx, ASN1_DATA *data,
+ struct ldap_attribute **attributes,
+ int *num_attributes)
+{
+ asn1_start_tag(data, ASN1_SEQUENCE(0));
+ while (asn1_peek_tag(data, ASN1_SEQUENCE(0))) {
+ struct ldap_attribute attrib;
+ ZERO_STRUCT(attrib);
+ ldap_decode_attrib(mem_ctx, data, &attrib);
+ add_attrib_to_array_talloc(mem_ctx, &attrib,
+ attributes, num_attributes);
+ }
+ asn1_end_tag(data);
+}
+
+BOOL ldap_decode(ASN1_DATA *data, struct ldap_message *msg)
+{
+ uint8 tag;
+
+ asn1_start_tag(data, ASN1_SEQUENCE(0));
+ asn1_read_Integer(data, &msg->messageid);
+
+ if (!asn1_peek_uint8(data, &tag))
+ return False;
+
+ switch(tag) {
+
+ case ASN1_APPLICATION(LDAP_TAG_BindRequest): {
+ struct ldap_BindRequest *r = &msg->r.BindRequest;
+ msg->type = LDAP_TAG_BindRequest;
+ asn1_start_tag(data, ASN1_APPLICATION(LDAP_TAG_BindRequest));
+ asn1_read_Integer(data, &r->version);
+ asn1_read_OctetString_talloc(msg->mem_ctx, data, &r->dn);
+ if (asn1_peek_tag(data, 0x80)) {
+ int pwlen;
+ r->creds.password = "";
+ /* Mechanism 0 (SIMPLE) */
+ asn1_start_tag(data, 0x80);
+ pwlen = asn1_tag_remaining(data);
+ if (pwlen != 0) {
+ char *pw = talloc(msg->mem_ctx, pwlen+1);
+ asn1_read(data, pw, pwlen);
+ pw[pwlen] = '\0';
+ r->creds.password = pw;
+ }
+ asn1_end_tag(data);
+ }
+ asn1_end_tag(data);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_BindResponse): {
+ struct ldap_BindResponse *r = &msg->r.BindResponse;
+ msg->type = LDAP_TAG_BindResponse;
+ ldap_decode_response(msg->mem_ctx,
+ data, LDAP_TAG_BindResponse,
+ &r->response);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_UnbindRequest): {
+ msg->type = LDAP_TAG_UnbindRequest;
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_SearchRequest): {
+ struct ldap_SearchRequest *r = &msg->r.SearchRequest;
+ msg->type = LDAP_TAG_SearchRequest;
+ asn1_start_tag(data, ASN1_APPLICATION(LDAP_TAG_SearchRequest));
+ asn1_read_OctetString_talloc(msg->mem_ctx, data, &r->basedn);
+ asn1_read_enumerated(data, (int *)&(r->scope));
+ asn1_read_enumerated(data, (int *)&(r->deref));
+ asn1_read_Integer(data, &r->sizelimit);
+ asn1_read_Integer(data, &r->timelimit);
+ asn1_read_BOOLEAN2(data, &r->attributesonly);
+
+ /* Maybe create a TALLOC_CTX for the filter? This can waste
+ * quite a bit of memory recursing down. */
+ ldap_decode_filter(msg->mem_ctx, data, &r->filter);
+
+ asn1_start_tag(data, ASN1_SEQUENCE(0));
+
+ r->num_attributes = 0;
+ r->attributes = NULL;
+
+ while (asn1_tag_remaining(data) > 0) {
+ const char *attr;
+ if (!asn1_read_OctetString_talloc(msg->mem_ctx, data,
+ &attr))
+ return False;
+ if (!add_string_to_array(msg->mem_ctx, attr,
+ &r->attributes,
+ &r->num_attributes))
+ return False;
+ }
+
+ asn1_end_tag(data);
+ asn1_end_tag(data);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_SearchResultEntry): {
+ struct ldap_SearchResEntry *r = &msg->r.SearchResultEntry;
+ msg->type = LDAP_TAG_SearchResultEntry;
+ r->attributes = NULL;
+ r->num_attributes = 0;
+ asn1_start_tag(data,
+ ASN1_APPLICATION(LDAP_TAG_SearchResultEntry));
+ asn1_read_OctetString_talloc(msg->mem_ctx, data, &r->dn);
+ ldap_decode_attribs(msg->mem_ctx, data, &r->attributes,
+ &r->num_attributes);
+ asn1_end_tag(data);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_SearchResultDone): {
+ struct ldap_SearchResultDone *r = &msg->r.SearchResultDone;
+ msg->type = LDAP_TAG_SearchResultDone;
+ ldap_decode_response(msg->mem_ctx, data,
+ LDAP_TAG_SearchResultDone, r);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_SearchResultReference): {
+/* struct ldap_SearchResRef *r = &msg->r.SearchResultReference; */
+ msg->type = LDAP_TAG_SearchResultReference;
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_ModifyRequest): {
+ struct ldap_ModifyRequest *r = &msg->r.ModifyRequest;
+ msg->type = LDAP_TAG_ModifyRequest;
+ asn1_start_tag(data, ASN1_APPLICATION(LDAP_TAG_ModifyRequest));
+ asn1_read_OctetString_talloc(msg->mem_ctx, data, &r->dn);
+ asn1_start_tag(data, ASN1_SEQUENCE(0));
+
+ r->num_mods = 0;
+ r->mods = NULL;
+
+ while (asn1_tag_remaining(data) > 0) {
+ struct ldap_mod mod;
+ ZERO_STRUCT(mod);
+ asn1_start_tag(data, ASN1_SEQUENCE(0));
+ asn1_read_enumerated(data, &mod.type);
+ ldap_decode_attrib(msg->mem_ctx, data, &mod.attrib);
+ asn1_end_tag(data);
+ if (!add_mod_to_array_talloc(msg->mem_ctx, &mod,
+ &r->mods, &r->num_mods))
+ break;
+ }
+
+ asn1_end_tag(data);
+ asn1_end_tag(data);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_ModifyResponse): {
+ struct ldap_ModifyResponse *r = &msg->r.ModifyResponse;
+ msg->type = LDAP_TAG_ModifyResponse;
+ ldap_decode_response(msg->mem_ctx, data,
+ LDAP_TAG_ModifyResponse, r);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_AddRequest): {
+ struct ldap_AddRequest *r = &msg->r.AddRequest;
+ msg->type = LDAP_TAG_AddRequest;
+ asn1_start_tag(data, ASN1_APPLICATION(LDAP_TAG_AddRequest));
+ asn1_read_OctetString_talloc(msg->mem_ctx, data, &r->dn);
+
+ r->attributes = NULL;
+ r->num_attributes = 0;
+ ldap_decode_attribs(msg->mem_ctx, data, &r->attributes,
+ &r->num_attributes);
+
+ asn1_end_tag(data);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_AddResponse): {
+ struct ldap_AddResponse *r = &msg->r.AddResponse;
+ msg->type = LDAP_TAG_AddResponse;
+ ldap_decode_response(msg->mem_ctx, data,
+ LDAP_TAG_AddResponse, r);
+ break;
+ }
+
+ case ASN1_APPLICATION_SIMPLE(LDAP_TAG_DelRequest): {
+ struct ldap_DelRequest *r = &msg->r.DelRequest;
+ int len;
+ char *dn;
+ msg->type = LDAP_TAG_DelRequest;
+ asn1_start_tag(data,
+ ASN1_APPLICATION_SIMPLE(LDAP_TAG_DelRequest));
+ len = asn1_tag_remaining(data);
+ dn = talloc(msg->mem_ctx, len+1);
+ if (dn == NULL)
+ break;
+ asn1_read(data, dn, len);
+ dn[len] = '\0';
+ r->dn = dn;
+ asn1_end_tag(data);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_DelResponse): {
+ struct ldap_DelResponse *r = &msg->r.DelResponse;
+ msg->type = LDAP_TAG_DelResponse;
+ ldap_decode_response(msg->mem_ctx, data,
+ LDAP_TAG_DelResponse, r);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_ModifyDNRequest): {
+/* struct ldap_ModifyDNRequest *r = &msg->r.ModifyDNRequest; */
+ msg->type = LDAP_TAG_ModifyDNRequest;
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_ModifyDNResponse): {
+ struct ldap_ModifyDNResponse *r = &msg->r.ModifyDNResponse;
+ msg->type = LDAP_TAG_ModifyDNResponse;
+ ldap_decode_response(msg->mem_ctx, data,
+ LDAP_TAG_ModifyDNResponse, r);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_CompareRequest): {
+/* struct ldap_CompareRequest *r = &msg->r.CompareRequest; */
+ msg->type = LDAP_TAG_CompareRequest;
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_CompareResponse): {
+ struct ldap_CompareResponse *r = &msg->r.CompareResponse;
+ msg->type = LDAP_TAG_CompareResponse;
+ ldap_decode_response(msg->mem_ctx, data,
+ LDAP_TAG_CompareResponse, r);
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_AbandonRequest): {
+/* struct ldap_AbandonRequest *r = &msg->r.AbandonRequest; */
+ msg->type = LDAP_TAG_AbandonRequest;
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_ExtendedRequest): {
+/* struct ldap_ExtendedRequest *r = &msg->r.ExtendedRequest; */
+ msg->type = LDAP_TAG_ExtendedRequest;
+ break;
+ }
+
+ case ASN1_APPLICATION(LDAP_TAG_ExtendedResponse): {
+ struct ldap_ExtendedResponse *r = &msg->r.ExtendedResponse;
+ msg->type = LDAP_TAG_ExtendedResponse;
+ ldap_decode_response(msg->mem_ctx, data,
+ LDAP_TAG_ExtendedResponse, &r->response);
+ /* I have to come across an operation that actually sends
+ * something back to really see what's going on. The currently
+ * needed pwdchange does not send anything back. */
+ r->name = NULL;
+ r->value.data = NULL;
+ r->value.length = 0;
+ break;
+ }
+
+ }
+
+ asn1_end_tag(data);
+ return ((!data->has_error) && (data->nesting == NULL));
+}
+
+BOOL ldap_parse_basic_url(TALLOC_CTX *mem_ctx, const char *url,
+ char **host, uint16 *port, BOOL *ldaps)
+{
+ int tmp_port = 0;
+ fstring protocol;
+ fstring tmp_host;
+ const char *p = url;
+
+ /* skip leading "URL:" (if any) */
+ if ( strnequal( p, "URL:", 4 ) ) {
+ p += 4;
+ }
+
+ /* Paranoia check */
+ SMB_ASSERT(sizeof(protocol)>10 && sizeof(tmp_host)>254);
+
+ sscanf(p, "%10[^:]://%254[^:/]:%d", protocol, tmp_host, &tmp_port);
+
+ if (strequal(protocol, "ldap")) {
+ *port = 389;
+ *ldaps = False;
+ } else if (strequal(protocol, "ldaps")) {
+ *port = 636;
+ *ldaps = True;
+ } else {
+ DEBUG(0, ("unrecognised protocol (%s)!\n", protocol));
+ return False;
+ }
+
+ if (tmp_port != 0)
+ *port = tmp_port;
+
+ *host = talloc_strdup(mem_ctx, tmp_host);
+
+ return (*host != NULL);
+}
+
+struct ldap_connection *new_ldap_connection(void)
+{
+ TALLOC_CTX *mem_ctx = talloc_init("ldap_connection");
+ struct ldap_connection *result;
+
+ if (mem_ctx == NULL)
+ return NULL;
+
+ result = talloc(mem_ctx, sizeof(*result));
+
+ if (result == NULL)
+ return NULL;
+
+ result->mem_ctx = mem_ctx;
+ result->next_msgid = 1;
+ result->outstanding = NULL;
+ result->searchid = 0;
+ result->search_entries = NULL;
+ return result;
+}
+
+BOOL ldap_connect(struct ldap_connection *conn, const char *url)
+{
+ struct hostent *hp;
+ struct in_addr ip;
+
+ if (!ldap_parse_basic_url(conn->mem_ctx, url, &conn->host,
+ &conn->port, &conn->ldaps))
+ return False;
+
+ hp = sys_gethostbyname(conn->host);
+
+ if ((hp == NULL) || (hp->h_addr == NULL))
+ return False;
+
+ putip((char *)&ip, (char *)hp->h_addr);
+
+ conn->sock = open_socket_out(SOCK_STREAM, &ip, conn->port, 10000);
+
+ return (conn->sock >= 0);
+}
+
+BOOL ldap_set_simple_creds(struct ldap_connection *conn,
+ const char *dn, const char *password)
+{
+ conn->auth_dn = talloc_strdup(conn->mem_ctx, dn);
+ conn->simple_pw = talloc_strdup(conn->mem_ctx, password);
+
+ return ((conn->auth_dn != NULL) && (conn->simple_pw != NULL));
+}
+
+struct ldap_message *new_ldap_message(void)
+{
+ TALLOC_CTX *mem_ctx = talloc_init("ldap_message");
+ struct ldap_message *result;
+
+ if (mem_ctx == NULL)
+ return NULL;
+
+ result = talloc(mem_ctx, sizeof(*result));
+
+ if (result == NULL)
+ return NULL;
+
+ result->mem_ctx = mem_ctx;
+ return result;
+}
+
+void destroy_ldap_message(struct ldap_message *msg)
+{
+ if (msg != NULL)
+ talloc_destroy(msg->mem_ctx);
+}
+
+BOOL ldap_send_msg(struct ldap_connection *conn, struct ldap_message *msg,
+ const struct timeval *endtime)
+{
+ DATA_BLOB request;
+ BOOL result;
+ struct ldap_queue_entry *entry;
+
+ msg->messageid = conn->next_msgid++;
+
+ if (!ldap_encode(msg, &request))
+ return False;
+
+ result = (write_data_until(conn->sock, request.data, request.length,
+ endtime) == request.length);
+
+ data_blob_free(&request);
+
+ if (!result)
+ return result;
+
+ /* abandon and unbind don't expect results */
+
+ if ((msg->type == LDAP_TAG_AbandonRequest) ||
+ (msg->type == LDAP_TAG_UnbindRequest))
+ return True;
+
+ entry = malloc(sizeof(*entry));
+
+ if (entry == NULL)
+ return False;
+
+ entry->msgid = msg->messageid;
+ entry->msg = NULL;
+ DLIST_ADD(conn->outstanding, entry);
+
+ return True;
+}
+
+BOOL ldap_receive_msg(struct ldap_connection *conn, struct ldap_message *msg,
+ const struct timeval *endtime)
+{
+ struct asn1_data data;
+ BOOL result;
+
+ if (!asn1_read_sequence_until(conn->sock, &data, endtime))
+ return False;
+
+ result = ldap_decode(&data, msg);
+
+ asn1_free(&data);
+ return result;
+}
+
+static struct ldap_message *recv_from_queue(struct ldap_connection *conn,
+ int msgid)
+{
+ struct ldap_queue_entry *e;
+
+ for (e = conn->outstanding; e != NULL; e = e->next) {
+
+ if (e->msgid == msgid) {
+ struct ldap_message *result = e->msg;
+ DLIST_REMOVE(conn->outstanding, e);
+ SAFE_FREE(e);
+ return result;
+ }
+ }
+
+ return NULL;
+}
+
+static void add_search_entry(struct ldap_connection *conn,
+ struct ldap_message *msg)
+{
+ struct ldap_queue_entry *e = malloc(sizeof *e);
+ struct ldap_queue_entry *tmp;
+
+ if (e == NULL)
+ return;
+
+ e->msg = msg;
+ DLIST_ADD_END(conn->search_entries, e, tmp);
+ return;
+}
+
+static void fill_outstanding_request(struct ldap_connection *conn,
+ struct ldap_message *msg)
+{
+ struct ldap_queue_entry *e;
+
+ for (e = conn->outstanding; e != NULL; e = e->next) {
+ if (e->msgid == msg->messageid) {
+ e->msg = msg;
+ return;
+ }
+ }
+
+ /* This reply has not been expected, destroy the incoming msg */
+ destroy_ldap_message(msg);
+ return;
+}
+
+struct ldap_message *ldap_receive(struct ldap_connection *conn, int msgid,
+ const struct timeval *endtime)
+{
+ struct ldap_message *result = recv_from_queue(conn, msgid);
+
+ if (result != NULL)
+ return result;
+
+ while (True) {
+ struct asn1_data data;
+ result = new_ldap_message();
+ BOOL res;
+
+ if (!asn1_read_sequence_until(conn->sock, &data, endtime))
+ return NULL;
+
+ res = ldap_decode(&data, result);
+ asn1_free(&data);
+
+ if (!res)
+ return NULL;
+
+ if (result->messageid == msgid)
+ return result;
+
+ if (result->type == LDAP_TAG_SearchResultEntry) {
+ add_search_entry(conn, result);
+ } else {
+ fill_outstanding_request(conn, result);
+ }
+ }
+
+ return NULL;
+}
+
+struct ldap_message *ldap_transaction(struct ldap_connection *conn,
+ struct ldap_message *request)
+{
+ if (!ldap_send_msg(conn, request, NULL))
+ return False;
+
+ return ldap_receive(conn, request->messageid, NULL);
+}
+
+BOOL ldap_setup_connection(struct ldap_connection *conn,
+ const char *url)
+{
+ struct ldap_message *msg = new_ldap_message();
+ struct ldap_message *response;
+ BOOL result;
+
+ if (msg == NULL)
+ return False;
+
+ if (!ldap_connect(conn, url)) {
+ destroy_ldap_message(msg);
+ return False;
+ }
+
+ msg->messageid = conn->next_msgid++;
+ msg->type = LDAP_TAG_BindRequest;
+ msg->r.BindRequest.version = 3;
+ msg->r.BindRequest.dn = conn->auth_dn;
+ msg->r.BindRequest.mechanism = LDAP_AUTH_MECH_SIMPLE;
+ msg->r.BindRequest.creds.password = conn->simple_pw;
+
+ if ((response = ldap_transaction(conn, msg)) == NULL)
+ return False;
+
+ result = (response->r.BindResponse.response.resultcode == 0);
+
+ destroy_ldap_message(msg);
+ destroy_ldap_message(response);
+ return result;
+}
+
+static BOOL ldap_abandon_message(struct ldap_connection *conn, int msgid,
+ const struct timeval *endtime)
+{
+ struct ldap_message *msg = new_ldap_message();
+ BOOL result;
+
+ if (msg == NULL)
+ return False;
+
+ msg->type = LDAP_TAG_AbandonRequest;
+ msg->r.AbandonRequest.messageid = msgid;
+
+ result = ldap_send_msg(conn, msg, endtime);
+ destroy_ldap_message(msg);
+ return result;
+}
+
+struct ldap_message *new_ldap_search_message(const char *base,
+ enum ldap_scope scope,
+ char *filter,
+ int num_attributes,
+ const char **attributes)
+{
+ struct ldap_message *res = new_ldap_message();
+
+ if (res == NULL)
+ return NULL;
+
+ res->type = LDAP_TAG_SearchRequest;
+ res->r.SearchRequest.basedn = base;
+ res->r.SearchRequest.scope = scope;
+ res->r.SearchRequest.deref = LDAP_DEREFERENCE_NEVER;
+ res->r.SearchRequest.timelimit = 0;
+ res->r.SearchRequest.sizelimit = 0;
+ res->r.SearchRequest.attributesonly = False;
+ res->r.SearchRequest.filter = filter;
+ res->r.SearchRequest.num_attributes = num_attributes;
+ res->r.SearchRequest.attributes = attributes;
+ return res;
+}
+
+struct ldap_message *new_ldap_simple_bind_msg(const char *dn, const char *pw)
+{
+ struct ldap_message *res = new_ldap_message();
+
+ if (res == NULL)
+ return NULL;
+
+ res->type = LDAP_TAG_BindRequest;
+ res->r.BindRequest.version = 3;
+ res->r.BindRequest.dn = talloc_strdup(res->mem_ctx, dn);
+ res->r.BindRequest.mechanism = LDAP_AUTH_MECH_SIMPLE;
+ res->r.BindRequest.creds.password = talloc_strdup(res->mem_ctx, pw);
+ return res;
+}
+
+BOOL ldap_setsearchent(struct ldap_connection *conn, struct ldap_message *msg,
+ const struct timeval *endtime)
+{
+ if ((conn->searchid != 0) &&
+ (!ldap_abandon_message(conn, conn->searchid, endtime)))
+ return False;
+
+ conn->searchid = conn->next_msgid;
+ return ldap_send_msg(conn, msg, endtime);
+}
+
+struct ldap_message *ldap_getsearchent(struct ldap_connection *conn,
+ const struct timeval *endtime)
+{
+ struct ldap_message *result;
+
+ if (conn->search_entries != NULL) {
+ struct ldap_queue_entry *e = conn->search_entries;
+
+ result = e->msg;
+ DLIST_REMOVE(conn->search_entries, e);
+ SAFE_FREE(e);
+ return result;
+ }
+
+ result = ldap_receive(conn, conn->searchid, endtime);
+
+ if (result->type == LDAP_TAG_SearchResultEntry)
+ return result;
+
+ if (result->type == LDAP_TAG_SearchResultDone) {
+ /* TODO: Handle Paged Results */
+ destroy_ldap_message(result);
+ return NULL;
+ }
+
+ /* TODO: Handle Search References here */
+ return NULL;
+}
+
+void ldap_endsearchent(struct ldap_connection *conn,
+ const struct timeval *endtime)
+{
+ struct ldap_queue_entry *e;
+
+ e = conn->search_entries;
+
+ while (e != NULL) {
+ struct ldap_queue_entry *next = e->next;
+ DLIST_REMOVE(conn->search_entries, e);
+ SAFE_FREE(e);
+ e = next;
+ }
+}
+
+struct ldap_message *ldap_searchone(struct ldap_connection *conn,
+ struct ldap_message *msg,
+ const struct timeval *endtime)
+{
+ struct ldap_message *res1, *res2 = NULL;
+ if (!ldap_setsearchent(conn, msg, endtime))
+ return NULL;
+
+ res1 = ldap_getsearchent(conn, endtime);
+
+ if (res1 != NULL)
+ res2 = ldap_getsearchent(conn, endtime);
+
+ ldap_endsearchent(conn, endtime);
+
+ if (res1 == NULL)
+ return NULL;
+
+ if (res2 != NULL) {
+ /* More than one entry */
+ destroy_ldap_message(res1);
+ destroy_ldap_message(res2);
+ return NULL;
+ }
+
+ return res1;
+}
+
+BOOL ldap_find_single_value(struct ldap_message *msg, const char *attr,
+ DATA_BLOB *value)
+{
+ int i;
+ struct ldap_SearchResEntry *r = &msg->r.SearchResultEntry;
+
+ if (msg->type != LDAP_TAG_SearchResultEntry)
+ return False;
+
+ for (i=0; i<r->num_attributes; i++) {
+ if (strequal(attr, r->attributes[i].name)) {
+ if (r->attributes[i].num_values != 1)
+ return False;
+
+ *value = r->attributes[i].values[0];
+ return True;
+ }
+ }
+ return False;
+}
+
+BOOL ldap_find_single_string(struct ldap_message *msg, const char *attr,
+ TALLOC_CTX *mem_ctx, char **value)
+{
+ DATA_BLOB blob;
+
+ if (!ldap_find_single_value(msg, attr, &blob))
+ return False;
+
+ *value = talloc(mem_ctx, blob.length+1);
+
+ if (*value == NULL)
+ return False;
+
+ memcpy(*value, blob.data, blob.length);
+ (*value)[blob.length] = '\0';
+ return True;
+}
+
+BOOL ldap_find_single_int(struct ldap_message *msg, const char *attr,
+ int *value)
+{
+ DATA_BLOB blob;
+ char *val;
+ int errno_save;
+ BOOL res;
+
+ if (!ldap_find_single_value(msg, attr, &blob))
+ return False;
+
+ val = malloc(blob.length+1);
+ if (val == NULL)
+ return False;
+
+ memcpy(val, blob.data, blob.length);
+ val[blob.length] = '\0';
+
+ errno_save = errno;
+ errno = 0;
+
+ *value = strtol(val, NULL, 10);
+
+ res = (errno == 0);
+
+ free(val);
+ errno = errno_save;
+
+ return res;
+}
+
+int ldap_error(struct ldap_connection *conn)
+{
+ return 0;
+}
+
+NTSTATUS ldap2nterror(int ldaperror)
+{
+ return NT_STATUS_OK;
+}