2004-10-08 16:26:14 +04:00
/*
Unix SMB / CIFS implementation .
LDAP server
Copyright ( C ) Stefan Metzmacher 2004
2009-07-30 14:41:06 +04:00
Copyright ( C ) Matthias Dieter Wallnöfer 2009
2004-10-08 16:26:14 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-10 06:07:03 +04:00
the Free Software Foundation ; either version 3 of the License , or
2004-10-08 16:26:14 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 06:07:03 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2004-10-08 16:26:14 +04:00
*/
# include "includes.h"
2004-11-02 09:52:59 +03:00
# include "ldap_server/ldap_server.h"
2008-10-11 23:31:42 +04:00
# include "../lib/util/dlinklist.h"
2006-01-06 07:01:23 +03:00
# include "libcli/ldap/ldap.h"
2006-11-01 06:21:04 +03:00
# include "auth/credentials/credentials.h"
# include "auth/gensec/gensec.h"
2007-09-08 16:42:09 +04:00
# include "param/param.h"
2008-04-17 14:23:44 +04:00
# include "smbd/service_stream.h"
2008-07-15 09:07:13 +04:00
# include "dsdb/samdb/samdb.h"
# include "lib/ldb/include/ldb_errors.h"
# include "lib/ldb_wrap.h"
2006-01-13 03:38:35 +03:00
2008-11-14 08:34:59 +03:00
# define VALID_DN_SYNTAX(dn) do {\
2006-01-13 03:38:35 +03:00
if ( ! ( dn ) ) { \
return NT_STATUS_NO_MEMORY ; \
2006-11-22 03:59:34 +03:00
} else if ( ! ldb_dn_validate ( dn ) ) { \
result = LDAP_INVALID_DN_SYNTAX ; \
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx , LDB_ERR_INVALID_DN_SYNTAX , & errstr ) ; \
2006-11-22 03:59:34 +03:00
goto reply ; \
2006-01-13 03:38:35 +03:00
} \
} while ( 0 )
2009-07-30 14:41:06 +04:00
static int map_ldb_error ( TALLOC_CTX * mem_ctx , int ldb_err ,
const char * * errstring )
2006-01-13 03:38:35 +03:00
{
2009-07-30 14:41:06 +04:00
WERROR err ;
switch ( ldb_err ) {
case LDB_SUCCESS :
err = WERR_OK ;
break ;
case LDB_ERR_OPERATIONS_ERROR :
err = WERR_DS_OPERATIONS_ERROR ;
break ;
case LDB_ERR_PROTOCOL_ERROR :
err = WERR_DS_PROTOCOL_ERROR ;
break ;
case LDB_ERR_TIME_LIMIT_EXCEEDED :
err = WERR_DS_TIMELIMIT_EXCEEDED ;
break ;
case LDB_ERR_SIZE_LIMIT_EXCEEDED :
err = WERR_DS_SIZE_LIMIT_EXCEEDED ;
break ;
case LDB_ERR_COMPARE_FALSE :
err = WERR_DS_COMPARE_FALSE ;
break ;
case LDB_ERR_COMPARE_TRUE :
err = WERR_DS_COMPARE_TRUE ;
break ;
case LDB_ERR_AUTH_METHOD_NOT_SUPPORTED :
err = WERR_DS_AUTH_METHOD_NOT_SUPPORTED ;
break ;
case LDB_ERR_STRONG_AUTH_REQUIRED :
err = WERR_DS_STRONG_AUTH_REQUIRED ;
break ;
case LDB_ERR_REFERRAL :
err = WERR_DS_REFERRAL ;
break ;
case LDB_ERR_ADMIN_LIMIT_EXCEEDED :
err = WERR_DS_ADMIN_LIMIT_EXCEEDED ;
break ;
case LDB_ERR_UNSUPPORTED_CRITICAL_EXTENSION :
err = WERR_DS_UNAVAILABLE_CRIT_EXTENSION ;
break ;
case LDB_ERR_CONFIDENTIALITY_REQUIRED :
err = WERR_DS_CONFIDENTIALITY_REQUIRED ;
break ;
case LDB_ERR_SASL_BIND_IN_PROGRESS :
err = WERR_DS_BUSY ;
break ;
case LDB_ERR_NO_SUCH_ATTRIBUTE :
err = WERR_DS_NO_ATTRIBUTE_OR_VALUE ;
break ;
case LDB_ERR_UNDEFINED_ATTRIBUTE_TYPE :
err = WERR_DS_ATTRIBUTE_TYPE_UNDEFINED ;
break ;
case LDB_ERR_INAPPROPRIATE_MATCHING :
err = WERR_DS_INAPPROPRIATE_MATCHING ;
break ;
case LDB_ERR_CONSTRAINT_VIOLATION :
err = WERR_DS_CONSTRAINT_VIOLATION ;
break ;
case LDB_ERR_ATTRIBUTE_OR_VALUE_EXISTS :
err = WERR_DS_ATTRIBUTE_OR_VALUE_EXISTS ;
break ;
case LDB_ERR_INVALID_ATTRIBUTE_SYNTAX :
err = WERR_DS_INVALID_ATTRIBUTE_SYNTAX ;
break ;
case LDB_ERR_NO_SUCH_OBJECT :
err = WERR_DS_NO_SUCH_OBJECT ;
break ;
case LDB_ERR_ALIAS_PROBLEM :
err = WERR_DS_ALIAS_PROBLEM ;
break ;
case LDB_ERR_INVALID_DN_SYNTAX :
err = WERR_DS_INVALID_DN_SYNTAX ;
break ;
case LDB_ERR_ALIAS_DEREFERENCING_PROBLEM :
err = WERR_DS_ALIAS_DEREF_PROBLEM ;
break ;
case LDB_ERR_INAPPROPRIATE_AUTHENTICATION :
err = WERR_DS_INAPPROPRIATE_AUTH ;
break ;
case LDB_ERR_INVALID_CREDENTIALS :
err = WERR_ACCESS_DENIED ;
break ;
case LDB_ERR_INSUFFICIENT_ACCESS_RIGHTS :
err = WERR_DS_INSUFF_ACCESS_RIGHTS ;
break ;
case LDB_ERR_BUSY :
err = WERR_DS_BUSY ;
break ;
case LDB_ERR_UNAVAILABLE :
err = WERR_DS_UNAVAILABLE ;
break ;
case LDB_ERR_UNWILLING_TO_PERFORM :
err = WERR_DS_UNWILLING_TO_PERFORM ;
break ;
case LDB_ERR_LOOP_DETECT :
err = WERR_DS_LOOP_DETECT ;
break ;
case LDB_ERR_NAMING_VIOLATION :
err = WERR_DS_NAMING_VIOLATION ;
break ;
case LDB_ERR_OBJECT_CLASS_VIOLATION :
err = WERR_DS_OBJ_CLASS_VIOLATION ;
break ;
case LDB_ERR_NOT_ALLOWED_ON_NON_LEAF :
err = WERR_DS_CANT_ON_NON_LEAF ;
break ;
case LDB_ERR_NOT_ALLOWED_ON_RDN :
err = WERR_DS_CANT_ON_RDN ;
break ;
case LDB_ERR_ENTRY_ALREADY_EXISTS :
err = WERR_DS_OBJ_STRING_NAME_EXISTS ;
break ;
case LDB_ERR_OBJECT_CLASS_MODS_PROHIBITED :
err = WERR_DS_CANT_MOD_OBJ_CLASS ;
break ;
case LDB_ERR_AFFECTS_MULTIPLE_DSAS :
err = WERR_DS_AFFECTS_MULTIPLE_DSAS ;
break ;
default :
err = WERR_DS_GENERIC_ERROR ;
break ;
}
2009-08-04 02:06:26 +04:00
* errstring = talloc_asprintf ( mem_ctx , " %08x: %s " , W_ERROR_V ( err ) ,
2009-07-30 14:41:06 +04:00
ldb_strerror ( ldb_err ) ) ;
2006-01-13 03:38:35 +03:00
2009-07-30 14:41:06 +04:00
/* result is 1:1 for now */
return ldb_err ;
2006-01-13 03:38:35 +03:00
}
/*
connect to the sam database
*/
NTSTATUS ldapsrv_backend_Init ( struct ldapsrv_connection * conn )
{
2007-10-01 22:52:55 +04:00
conn - > ldb = ldb_wrap_connect ( conn ,
2008-04-17 14:23:44 +04:00
conn - > connection - > event . ctx ,
2007-12-03 23:25:06 +03:00
conn - > lp_ctx ,
lp_sam_url ( conn - > lp_ctx ) ,
conn - > session_info ,
2008-07-15 09:07:13 +04:00
samdb_credentials ( conn , conn - > connection - > event . ctx , conn - > lp_ctx ) ,
conn - > global_catalog ? LDB_FLG_RDONLY : 0 , NULL ) ;
2006-01-13 03:38:35 +03:00
if ( conn - > ldb = = NULL ) {
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
2006-11-01 06:21:04 +03:00
if ( conn - > server_credentials ) {
char * * sasl_mechs = NULL ;
struct gensec_security_ops * * backends = gensec_security_all ( ) ;
struct gensec_security_ops * * ops
2007-09-29 19:16:38 +04:00
= gensec_use_kerberos_mechs ( conn , backends , conn - > server_credentials ) ;
2006-11-01 06:21:04 +03:00
int i , j = 0 ;
for ( i = 0 ; ops & & ops [ i ] ; i + + ) {
2008-11-02 21:28:17 +03:00
if ( ! gensec_security_ops_enabled ( ops [ i ] , conn - > lp_ctx ) )
continue ;
2006-11-01 06:21:04 +03:00
if ( ops [ i ] - > sasl_name & & ops [ i ] - > server_start ) {
char * sasl_name = talloc_strdup ( conn , ops [ i ] - > sasl_name ) ;
if ( ! sasl_name ) {
return NT_STATUS_NO_MEMORY ;
}
sasl_mechs = talloc_realloc ( conn , sasl_mechs , char * , j + 2 ) ;
if ( ! sasl_mechs ) {
return NT_STATUS_NO_MEMORY ;
}
sasl_mechs [ j ] = sasl_name ;
talloc_steal ( sasl_mechs , sasl_name ) ;
sasl_mechs [ j + 1 ] = NULL ;
j + + ;
}
}
2009-07-01 08:02:37 +04:00
talloc_unlink ( conn , ops ) ;
2006-11-01 06:21:04 +03:00
ldb_set_opaque ( conn - > ldb , " supportedSASLMechanims " , sasl_mechs ) ;
}
2006-01-13 03:38:35 +03:00
return NT_STATUS_OK ;
}
2004-10-08 16:26:14 +04:00
2005-02-10 10:08:40 +03:00
struct ldapsrv_reply * ldapsrv_init_reply ( struct ldapsrv_call * call , uint8_t type )
2004-10-08 16:26:14 +04:00
{
struct ldapsrv_reply * reply ;
2005-01-27 10:08:20 +03:00
reply = talloc ( call , struct ldapsrv_reply ) ;
2004-10-08 16:26:14 +04:00
if ( ! reply ) {
return NULL ;
}
2005-06-15 04:27:51 +04:00
reply - > msg = talloc ( reply , struct ldap_message ) ;
if ( reply - > msg = = NULL ) {
talloc_free ( reply ) ;
return NULL ;
}
2004-10-08 16:26:14 +04:00
2005-06-15 04:27:51 +04:00
reply - > msg - > messageid = call - > request - > messageid ;
reply - > msg - > type = type ;
2006-01-06 07:01:23 +03:00
reply - > msg - > controls = NULL ;
2004-10-08 16:26:14 +04:00
return reply ;
}
2005-06-19 13:31:34 +04:00
void ldapsrv_queue_reply ( struct ldapsrv_call * call , struct ldapsrv_reply * reply )
2004-10-08 16:26:14 +04:00
{
DLIST_ADD_END ( call - > replies , reply , struct ldapsrv_reply * ) ;
}
2007-07-10 17:41:00 +04:00
static NTSTATUS ldapsrv_unwilling ( struct ldapsrv_call * call , int error )
2004-10-08 16:26:14 +04:00
{
struct ldapsrv_reply * reply ;
struct ldap_ExtendedResponse * r ;
2005-06-15 04:27:51 +04:00
DEBUG ( 10 , ( " Unwilling type[%d] id[%d] \n " , call - > request - > type , call - > request - > messageid ) ) ;
2004-10-08 16:26:14 +04:00
reply = ldapsrv_init_reply ( call , LDAP_TAG_ExtendedResponse ) ;
if ( ! reply ) {
return NT_STATUS_NO_MEMORY ;
}
2005-06-15 04:27:51 +04:00
r = & reply - > msg - > r . ExtendedResponse ;
2004-10-08 16:26:14 +04:00
r - > response . resultcode = error ;
r - > response . dn = NULL ;
r - > response . errormessage = NULL ;
r - > response . referral = NULL ;
2006-02-15 18:19:10 +03:00
r - > oid = NULL ;
r - > value = NULL ;
2004-10-08 16:26:14 +04:00
2005-06-19 13:31:34 +04:00
ldapsrv_queue_reply ( call , reply ) ;
return NT_STATUS_OK ;
2004-10-08 16:26:14 +04:00
}
static NTSTATUS ldapsrv_SearchRequest ( struct ldapsrv_call * call )
{
2005-06-15 04:27:51 +04:00
struct ldap_SearchRequest * req = & call - > request - > r . SearchRequest ;
2006-01-13 03:38:35 +03:00
struct ldap_SearchResEntry * ent ;
struct ldap_Result * done ;
struct ldapsrv_reply * ent_r , * done_r ;
2009-07-30 14:41:06 +04:00
TALLOC_CTX * local_ctx ;
2006-02-22 03:26:56 +03:00
struct ldb_context * samdb = talloc_get_type ( call - > conn - > ldb , struct ldb_context ) ;
2006-01-13 03:38:35 +03:00
struct ldb_dn * basedn ;
struct ldb_result * res = NULL ;
2006-03-08 04:01:14 +03:00
struct ldb_request * lreq ;
2008-09-12 02:38:40 +04:00
struct ldb_control * search_control ;
struct ldb_search_options_control * search_options ;
2008-12-16 10:44:11 +03:00
struct ldb_control * extended_dn_control ;
struct ldb_extended_dn_control * extended_dn_decoded = NULL ;
2006-01-13 03:38:35 +03:00
enum ldb_scope scope = LDB_SCOPE_DEFAULT ;
const char * * attrs = NULL ;
2007-07-12 10:15:47 +04:00
const char * scope_str , * errstr = NULL ;
2006-01-13 03:38:35 +03:00
int success_limit = 1 ;
2006-04-02 15:17:07 +04:00
int result = - 1 ;
int ldb_ret = - 1 ;
2006-02-22 03:26:56 +03:00
int i , j ;
2008-12-16 10:44:11 +03:00
int extended_type = 1 ;
2004-10-08 16:26:14 +04:00
DEBUG ( 10 , ( " SearchRequest " ) ) ;
DEBUGADD ( 10 , ( " basedn: %s " , req - > basedn ) ) ;
2005-06-13 13:10:17 +04:00
DEBUGADD ( 10 , ( " filter: %s \n " , ldb_filter_from_tree ( call , req - > tree ) ) ) ;
2004-10-08 16:26:14 +04:00
2006-02-22 03:26:56 +03:00
local_ctx = talloc_new ( call ) ;
2006-01-13 03:38:35 +03:00
NT_STATUS_HAVE_NO_MEMORY ( local_ctx ) ;
2006-11-22 03:59:34 +03:00
basedn = ldb_dn_new ( local_ctx , samdb , req - > basedn ) ;
2008-11-14 08:34:59 +03:00
VALID_DN_SYNTAX ( basedn ) ;
2006-01-13 03:38:35 +03:00
DEBUG ( 10 , ( " SearchRequest: basedn: [%s] \n " , req - > basedn ) ) ;
DEBUG ( 10 , ( " SearchRequest: filter: [%s] \n " , ldb_filter_from_tree ( call , req - > tree ) ) ) ;
switch ( req - > scope ) {
case LDAP_SEARCH_SCOPE_BASE :
2007-07-12 10:15:47 +04:00
scope_str = " BASE " ;
2006-01-13 03:38:35 +03:00
scope = LDB_SCOPE_BASE ;
success_limit = 0 ;
break ;
case LDAP_SEARCH_SCOPE_SINGLE :
2007-07-12 10:15:47 +04:00
scope_str = " ONE " ;
2006-01-13 03:38:35 +03:00
scope = LDB_SCOPE_ONELEVEL ;
success_limit = 0 ;
break ;
case LDAP_SEARCH_SCOPE_SUB :
2007-07-12 10:15:47 +04:00
scope_str = " SUB " ;
2006-01-13 03:38:35 +03:00
scope = LDB_SCOPE_SUBTREE ;
success_limit = 0 ;
break ;
2006-09-29 08:45:15 +04:00
default :
result = LDAP_PROTOCOL_ERROR ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx , LDB_ERR_PROTOCOL_ERROR ,
& errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. Invalid scope " , errstr ) ;
2007-07-12 10:15:47 +04:00
goto reply ;
2006-01-13 03:38:35 +03:00
}
2007-07-12 10:15:47 +04:00
DEBUG ( 10 , ( " SearchRequest: scope: [%s] \n " , scope_str ) ) ;
2004-10-08 16:26:14 +04:00
2006-01-13 03:38:35 +03:00
if ( req - > num_attributes > = 1 ) {
2006-11-15 19:53:32 +03:00
attrs = talloc_array ( local_ctx , const char * , req - > num_attributes + 1 ) ;
2006-01-13 03:38:35 +03:00
NT_STATUS_HAVE_NO_MEMORY ( attrs ) ;
2004-10-08 16:26:14 +04:00
2006-01-13 03:38:35 +03:00
for ( i = 0 ; i < req - > num_attributes ; i + + ) {
DEBUG ( 10 , ( " SearchRequest: attrs: [%s] \n " , req - > attributes [ i ] ) ) ;
attrs [ i ] = req - > attributes [ i ] ;
2004-10-08 16:26:14 +04:00
}
2006-01-13 03:38:35 +03:00
attrs [ i ] = NULL ;
}
2007-07-12 10:15:47 +04:00
DEBUG ( 5 , ( " ldb_request %s dn=%s filter=%s \n " ,
scope_str , req - > basedn , ldb_filter_from_tree ( call , req - > tree ) ) ) ;
2004-10-08 16:26:14 +04:00
2008-09-12 02:38:40 +04:00
res = talloc_zero ( local_ctx , struct ldb_result ) ;
NT_STATUS_HAVE_NO_MEMORY ( res ) ;
2006-05-29 20:50:22 +04:00
2008-09-12 02:38:40 +04:00
ldb_ret = ldb_build_search_req_ex ( & lreq , samdb , local_ctx ,
basedn , scope ,
req - > tree , attrs ,
call - > request - > controls ,
res , ldb_search_default_callback ,
NULL ) ;
2004-10-08 16:26:14 +04:00
2008-09-12 02:38:40 +04:00
if ( ldb_ret ! = LDB_SUCCESS ) {
goto reply ;
}
2004-10-08 16:26:14 +04:00
2007-02-22 04:54:40 +03:00
if ( call - > conn - > global_catalog ) {
2008-09-12 02:38:40 +04:00
search_control = ldb_request_get_control ( lreq , LDB_CONTROL_SEARCH_OPTIONS_OID ) ;
search_options = NULL ;
2007-02-22 04:54:40 +03:00
if ( search_control ) {
search_options = talloc_get_type ( search_control - > data , struct ldb_search_options_control ) ;
search_options - > search_options | = LDB_SEARCH_OPTION_PHANTOM_ROOT ;
} else {
search_options = talloc ( lreq , struct ldb_search_options_control ) ;
NT_STATUS_HAVE_NO_MEMORY ( search_options ) ;
search_options - > search_options = LDB_SEARCH_OPTION_PHANTOM_ROOT ;
ldb_request_add_control ( lreq , LDB_CONTROL_SEARCH_OPTIONS_OID , false , search_options ) ;
}
}
2008-12-16 10:44:11 +03:00
extended_dn_control = ldb_request_get_control ( lreq , LDB_CONTROL_EXTENDED_DN_OID ) ;
if ( extended_dn_control ) {
if ( extended_dn_control - > data ) {
extended_dn_decoded = talloc_get_type ( extended_dn_control - > data , struct ldb_extended_dn_control ) ;
extended_type = extended_dn_decoded - > type ;
} else {
extended_type = 0 ;
}
}
2006-06-15 03:39:18 +04:00
ldb_set_timeout ( samdb , lreq , req - > timelimit ) ;
2006-05-29 20:50:22 +04:00
2006-03-08 04:01:14 +03:00
ldb_ret = ldb_request ( samdb , lreq ) ;
2006-01-13 03:38:35 +03:00
2006-05-29 20:50:22 +04:00
if ( ldb_ret ! = LDB_SUCCESS ) {
goto reply ;
}
2006-07-22 21:21:59 +04:00
ldb_ret = ldb_wait ( lreq - > handle , LDB_WAIT_ALL ) ;
2006-01-13 03:38:35 +03:00
if ( ldb_ret = = LDB_SUCCESS ) {
for ( i = 0 ; i < res - > count ; i + + ) {
ent_r = ldapsrv_init_reply ( call , LDAP_TAG_SearchResultEntry ) ;
NT_STATUS_HAVE_NO_MEMORY ( ent_r ) ;
2008-03-29 05:32:15 +03:00
/* Better to have the whole message kept here,
* than to find someone further up didn ' t put
* a value in the right spot in the talloc tree */
talloc_steal ( ent_r , res - > msgs [ i ] ) ;
2006-01-13 03:38:35 +03:00
ent = & ent_r - > msg - > r . SearchResultEntry ;
2008-12-16 10:44:11 +03:00
ent - > dn = ldb_dn_get_extended_linearized ( ent_r , res - > msgs [ i ] - > dn , extended_type ) ;
2006-01-13 03:38:35 +03:00
ent - > num_attributes = 0 ;
ent - > attributes = NULL ;
if ( res - > msgs [ i ] - > num_elements = = 0 ) {
goto queue_reply ;
}
ent - > num_attributes = res - > msgs [ i ] - > num_elements ;
ent - > attributes = talloc_array ( ent_r , struct ldb_message_element , ent - > num_attributes ) ;
NT_STATUS_HAVE_NO_MEMORY ( ent - > attributes ) ;
for ( j = 0 ; j < ent - > num_attributes ; j + + ) {
2009-08-14 06:48:10 +04:00
ent - > attributes [ j ] . name = res - > msgs [ i ] - > elements [ j ] . name ;
2006-01-13 03:38:35 +03:00
ent - > attributes [ j ] . num_values = 0 ;
ent - > attributes [ j ] . values = NULL ;
if ( req - > attributesonly & & ( res - > msgs [ i ] - > elements [ j ] . num_values = = 0 ) ) {
continue ;
}
ent - > attributes [ j ] . num_values = res - > msgs [ i ] - > elements [ j ] . num_values ;
2006-02-22 03:26:56 +03:00
ent - > attributes [ j ] . values = res - > msgs [ i ] - > elements [ j ] . values ;
2006-01-13 03:38:35 +03:00
}
queue_reply :
ldapsrv_queue_reply ( call , ent_r ) ;
}
}
reply :
done_r = ldapsrv_init_reply ( call , LDAP_TAG_SearchResultDone ) ;
NT_STATUS_HAVE_NO_MEMORY ( done_r ) ;
done = & done_r - > msg - > r . SearchResultDone ;
done - > dn = NULL ;
done - > referral = NULL ;
2006-04-02 15:17:07 +04:00
if ( result ! = - 1 ) {
} else if ( ldb_ret = = LDB_SUCCESS ) {
2006-01-13 03:38:35 +03:00
if ( res - > count > = success_limit ) {
DEBUG ( 10 , ( " SearchRequest: results: [%d] \n " , res - > count ) ) ;
result = LDAP_SUCCESS ;
errstr = NULL ;
}
if ( res - > controls ) {
2006-02-22 04:31:35 +03:00
done_r - > msg - > controls = res - > controls ;
2006-02-22 03:26:56 +03:00
talloc_steal ( done_r , res - > controls ) ;
2006-01-13 03:38:35 +03:00
}
} else {
DEBUG ( 10 , ( " SearchRequest: error \n " ) ) ;
2009-07-30 14:41:06 +04:00
result = map_ldb_error ( local_ctx , ldb_ret , & errstr ) ;
2006-01-13 03:38:35 +03:00
}
done - > resultcode = result ;
done - > errormessage = ( errstr ? talloc_strdup ( done_r , errstr ) : NULL ) ;
talloc_free ( local_ctx ) ;
ldapsrv_queue_reply ( call , done_r ) ;
return NT_STATUS_OK ;
2004-10-08 16:26:14 +04:00
}
static NTSTATUS ldapsrv_ModifyRequest ( struct ldapsrv_call * call )
{
2005-06-15 04:27:51 +04:00
struct ldap_ModifyRequest * req = & call - > request - > r . ModifyRequest ;
2006-01-13 03:38:35 +03:00
struct ldap_Result * modify_result ;
struct ldapsrv_reply * modify_reply ;
2009-07-30 14:41:06 +04:00
TALLOC_CTX * local_ctx ;
2006-01-13 03:38:35 +03:00
struct ldb_context * samdb = call - > conn - > ldb ;
struct ldb_message * msg = NULL ;
struct ldb_dn * dn ;
const char * errstr = NULL ;
int result = LDAP_SUCCESS ;
int ldb_ret ;
int i , j ;
2004-10-08 16:26:14 +04:00
DEBUG ( 10 , ( " ModifyRequest " ) ) ;
DEBUGADD ( 10 , ( " dn: %s " , req - > dn ) ) ;
2006-01-13 03:38:35 +03:00
local_ctx = talloc_named ( call , 0 , " ModifyRequest local memory context " ) ;
NT_STATUS_HAVE_NO_MEMORY ( local_ctx ) ;
2006-11-22 03:59:34 +03:00
dn = ldb_dn_new ( local_ctx , samdb , req - > dn ) ;
2008-11-14 08:34:59 +03:00
VALID_DN_SYNTAX ( dn ) ;
2006-01-13 03:38:35 +03:00
DEBUG ( 10 , ( " ModifyRequest: dn: [%s] \n " , req - > dn ) ) ;
msg = talloc ( local_ctx , struct ldb_message ) ;
NT_STATUS_HAVE_NO_MEMORY ( msg ) ;
msg - > dn = dn ;
msg - > num_elements = 0 ;
msg - > elements = NULL ;
if ( req - > num_mods > 0 ) {
msg - > num_elements = req - > num_mods ;
msg - > elements = talloc_array ( msg , struct ldb_message_element , req - > num_mods ) ;
NT_STATUS_HAVE_NO_MEMORY ( msg - > elements ) ;
for ( i = 0 ; i < msg - > num_elements ; i + + ) {
msg - > elements [ i ] . name = discard_const_p ( char , req - > mods [ i ] . attrib . name ) ;
msg - > elements [ i ] . num_values = 0 ;
msg - > elements [ i ] . values = NULL ;
switch ( req - > mods [ i ] . type ) {
default :
result = LDAP_PROTOCOL_ERROR ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx ,
LDB_ERR_PROTOCOL_ERROR , & errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. Invalid LDAP_MODIFY_* type " , errstr ) ;
2006-01-13 03:38:35 +03:00
goto reply ;
case LDAP_MODIFY_ADD :
msg - > elements [ i ] . flags = LDB_FLAG_MOD_ADD ;
break ;
case LDAP_MODIFY_DELETE :
msg - > elements [ i ] . flags = LDB_FLAG_MOD_DELETE ;
break ;
case LDAP_MODIFY_REPLACE :
msg - > elements [ i ] . flags = LDB_FLAG_MOD_REPLACE ;
break ;
}
msg - > elements [ i ] . num_values = req - > mods [ i ] . attrib . num_values ;
if ( msg - > elements [ i ] . num_values > 0 ) {
2006-11-15 19:53:32 +03:00
msg - > elements [ i ] . values = talloc_array ( msg - > elements , struct ldb_val ,
msg - > elements [ i ] . num_values ) ;
2006-01-13 03:38:35 +03:00
NT_STATUS_HAVE_NO_MEMORY ( msg - > elements [ i ] . values ) ;
for ( j = 0 ; j < msg - > elements [ i ] . num_values ; j + + ) {
if ( ! ( req - > mods [ i ] . attrib . values [ j ] . length > 0 ) ) {
result = LDAP_OTHER ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx ,
LDB_ERR_OTHER , & errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. Empty attribute values not allowed " , errstr ) ;
2006-01-13 03:38:35 +03:00
goto reply ;
}
msg - > elements [ i ] . values [ j ] . length = req - > mods [ i ] . attrib . values [ j ] . length ;
msg - > elements [ i ] . values [ j ] . data = req - > mods [ i ] . attrib . values [ j ] . data ;
}
}
}
} else {
result = LDAP_OTHER ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx , LDB_ERR_OTHER , & errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. No mods are not allowed " , errstr ) ;
2006-01-13 03:38:35 +03:00
goto reply ;
}
reply :
modify_reply = ldapsrv_init_reply ( call , LDAP_TAG_ModifyResponse ) ;
NT_STATUS_HAVE_NO_MEMORY ( modify_reply ) ;
2004-10-08 16:26:14 +04:00
2006-01-13 03:38:35 +03:00
if ( result = = LDAP_SUCCESS ) {
ldb_ret = ldb_modify ( samdb , msg ) ;
2009-07-30 14:41:06 +04:00
result = map_ldb_error ( local_ctx , ldb_ret , & errstr ) ;
2004-10-08 16:26:14 +04:00
}
2006-01-13 03:38:35 +03:00
modify_result = & modify_reply - > msg - > r . AddResponse ;
modify_result - > dn = NULL ;
modify_result - > resultcode = result ;
modify_result - > errormessage = ( errstr ? talloc_strdup ( modify_reply , errstr ) : NULL ) ;
modify_result - > referral = NULL ;
talloc_free ( local_ctx ) ;
ldapsrv_queue_reply ( call , modify_reply ) ;
return NT_STATUS_OK ;
2004-10-08 16:26:14 +04:00
}
static NTSTATUS ldapsrv_AddRequest ( struct ldapsrv_call * call )
{
2005-06-15 04:27:51 +04:00
struct ldap_AddRequest * req = & call - > request - > r . AddRequest ;
2006-01-13 03:38:35 +03:00
struct ldap_Result * add_result ;
struct ldapsrv_reply * add_reply ;
2009-07-30 14:41:06 +04:00
TALLOC_CTX * local_ctx ;
2006-01-13 03:38:35 +03:00
struct ldb_context * samdb = call - > conn - > ldb ;
struct ldb_message * msg = NULL ;
struct ldb_dn * dn ;
const char * errstr = NULL ;
int result = LDAP_SUCCESS ;
int ldb_ret ;
int i , j ;
2004-10-08 16:26:14 +04:00
DEBUG ( 10 , ( " AddRequest " ) ) ;
DEBUGADD ( 10 , ( " dn: %s " , req - > dn ) ) ;
2006-01-13 03:38:35 +03:00
local_ctx = talloc_named ( call , 0 , " AddRequest local memory context " ) ;
NT_STATUS_HAVE_NO_MEMORY ( local_ctx ) ;
2006-11-22 03:59:34 +03:00
dn = ldb_dn_new ( local_ctx , samdb , req - > dn ) ;
2008-11-14 08:34:59 +03:00
VALID_DN_SYNTAX ( dn ) ;
2006-01-13 03:38:35 +03:00
DEBUG ( 10 , ( " AddRequest: dn: [%s] \n " , req - > dn ) ) ;
msg = talloc ( local_ctx , struct ldb_message ) ;
NT_STATUS_HAVE_NO_MEMORY ( msg ) ;
msg - > dn = dn ;
msg - > num_elements = 0 ;
msg - > elements = NULL ;
if ( req - > num_attributes > 0 ) {
msg - > num_elements = req - > num_attributes ;
msg - > elements = talloc_array ( msg , struct ldb_message_element , msg - > num_elements ) ;
NT_STATUS_HAVE_NO_MEMORY ( msg - > elements ) ;
for ( i = 0 ; i < msg - > num_elements ; i + + ) {
msg - > elements [ i ] . name = discard_const_p ( char , req - > attributes [ i ] . name ) ;
msg - > elements [ i ] . flags = 0 ;
msg - > elements [ i ] . num_values = 0 ;
msg - > elements [ i ] . values = NULL ;
if ( req - > attributes [ i ] . num_values > 0 ) {
msg - > elements [ i ] . num_values = req - > attributes [ i ] . num_values ;
2006-11-15 19:53:32 +03:00
msg - > elements [ i ] . values = talloc_array ( msg - > elements , struct ldb_val ,
msg - > elements [ i ] . num_values ) ;
2006-01-13 03:38:35 +03:00
NT_STATUS_HAVE_NO_MEMORY ( msg - > elements [ i ] . values ) ;
for ( j = 0 ; j < msg - > elements [ i ] . num_values ; j + + ) {
if ( ! ( req - > attributes [ i ] . values [ j ] . length > 0 ) ) {
result = LDAP_OTHER ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx ,
LDB_ERR_OTHER , & errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. Empty attribute values not allowed " , errstr ) ;
2006-01-13 03:38:35 +03:00
goto reply ;
}
msg - > elements [ i ] . values [ j ] . length = req - > attributes [ i ] . values [ j ] . length ;
msg - > elements [ i ] . values [ j ] . data = req - > attributes [ i ] . values [ j ] . data ;
}
} else {
result = LDAP_OTHER ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx , LDB_ERR_OTHER , & errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. No attribute values are not allowed " , errstr ) ;
2006-01-13 03:38:35 +03:00
goto reply ;
}
}
} else {
result = LDAP_OTHER ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx , LDB_ERR_OTHER , & errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. No attributes are not allowed " , errstr ) ;
2006-01-13 03:38:35 +03:00
goto reply ;
}
reply :
add_reply = ldapsrv_init_reply ( call , LDAP_TAG_AddResponse ) ;
NT_STATUS_HAVE_NO_MEMORY ( add_reply ) ;
2004-10-08 16:26:14 +04:00
2006-01-13 03:38:35 +03:00
if ( result = = LDAP_SUCCESS ) {
ldb_ret = ldb_add ( samdb , msg ) ;
2009-07-30 14:41:06 +04:00
result = map_ldb_error ( local_ctx , ldb_ret , & errstr ) ;
2004-10-08 16:26:14 +04:00
}
2006-01-13 03:38:35 +03:00
add_result = & add_reply - > msg - > r . AddResponse ;
add_result - > dn = NULL ;
add_result - > resultcode = result ;
add_result - > errormessage = ( errstr ? talloc_strdup ( add_reply , errstr ) : NULL ) ;
add_result - > referral = NULL ;
talloc_free ( local_ctx ) ;
ldapsrv_queue_reply ( call , add_reply ) ;
return NT_STATUS_OK ;
2004-10-08 16:26:14 +04:00
}
static NTSTATUS ldapsrv_DelRequest ( struct ldapsrv_call * call )
{
2005-06-15 04:27:51 +04:00
struct ldap_DelRequest * req = & call - > request - > r . DelRequest ;
2006-01-13 03:38:35 +03:00
struct ldap_Result * del_result ;
struct ldapsrv_reply * del_reply ;
2009-07-30 14:41:06 +04:00
TALLOC_CTX * local_ctx ;
2006-01-13 03:38:35 +03:00
struct ldb_context * samdb = call - > conn - > ldb ;
struct ldb_dn * dn ;
const char * errstr = NULL ;
int result = LDAP_SUCCESS ;
int ldb_ret ;
2004-10-08 16:26:14 +04:00
DEBUG ( 10 , ( " DelRequest " ) ) ;
DEBUGADD ( 10 , ( " dn: %s " , req - > dn ) ) ;
2006-01-13 03:38:35 +03:00
local_ctx = talloc_named ( call , 0 , " DelRequest local memory context " ) ;
NT_STATUS_HAVE_NO_MEMORY ( local_ctx ) ;
2006-11-22 03:59:34 +03:00
dn = ldb_dn_new ( local_ctx , samdb , req - > dn ) ;
2008-11-14 08:34:59 +03:00
VALID_DN_SYNTAX ( dn ) ;
2006-01-13 03:38:35 +03:00
DEBUG ( 10 , ( " DelRequest: dn: [%s] \n " , req - > dn ) ) ;
2004-10-08 16:26:14 +04:00
2006-01-13 03:38:35 +03:00
reply :
del_reply = ldapsrv_init_reply ( call , LDAP_TAG_DelResponse ) ;
NT_STATUS_HAVE_NO_MEMORY ( del_reply ) ;
if ( result = = LDAP_SUCCESS ) {
ldb_ret = ldb_delete ( samdb , dn ) ;
2009-07-30 14:41:06 +04:00
result = map_ldb_error ( local_ctx , ldb_ret , & errstr ) ;
2004-10-08 16:26:14 +04:00
}
2006-01-13 03:38:35 +03:00
del_result = & del_reply - > msg - > r . DelResponse ;
del_result - > dn = NULL ;
del_result - > resultcode = result ;
del_result - > errormessage = ( errstr ? talloc_strdup ( del_reply , errstr ) : NULL ) ;
del_result - > referral = NULL ;
talloc_free ( local_ctx ) ;
ldapsrv_queue_reply ( call , del_reply ) ;
return NT_STATUS_OK ;
2004-10-08 16:26:14 +04:00
}
static NTSTATUS ldapsrv_ModifyDNRequest ( struct ldapsrv_call * call )
{
2005-06-15 04:27:51 +04:00
struct ldap_ModifyDNRequest * req = & call - > request - > r . ModifyDNRequest ;
2006-01-13 03:38:35 +03:00
struct ldap_Result * modifydn ;
struct ldapsrv_reply * modifydn_r ;
2009-07-30 14:41:06 +04:00
TALLOC_CTX * local_ctx ;
2006-01-13 03:38:35 +03:00
struct ldb_context * samdb = call - > conn - > ldb ;
2006-09-09 14:05:58 +04:00
struct ldb_dn * olddn , * newdn = NULL , * newrdn ;
2006-01-13 03:38:35 +03:00
struct ldb_dn * parentdn = NULL ;
const char * errstr = NULL ;
int result = LDAP_SUCCESS ;
int ldb_ret ;
2004-10-08 16:26:14 +04:00
DEBUG ( 10 , ( " ModifyDNRequrest " ) ) ;
DEBUGADD ( 10 , ( " dn: %s " , req - > dn ) ) ;
DEBUGADD ( 10 , ( " newrdn: %s " , req - > newrdn ) ) ;
2006-01-13 03:38:35 +03:00
local_ctx = talloc_named ( call , 0 , " ModifyDNRequest local memory context " ) ;
NT_STATUS_HAVE_NO_MEMORY ( local_ctx ) ;
2006-11-22 03:59:34 +03:00
olddn = ldb_dn_new ( local_ctx , samdb , req - > dn ) ;
2008-11-14 08:34:59 +03:00
VALID_DN_SYNTAX ( olddn ) ;
2006-01-13 03:38:35 +03:00
2006-11-22 03:59:34 +03:00
newrdn = ldb_dn_new ( local_ctx , samdb , req - > newrdn ) ;
2008-11-14 08:34:59 +03:00
VALID_DN_SYNTAX ( newrdn ) ;
2006-01-13 03:38:35 +03:00
DEBUG ( 10 , ( " ModifyDNRequest: olddn: [%s] \n " , req - > dn ) ) ;
DEBUG ( 10 , ( " ModifyDNRequest: newrdn: [%s] \n " , req - > newrdn ) ) ;
2004-10-08 16:26:14 +04:00
2006-01-13 03:38:35 +03:00
/* we can't handle the rename if we should not remove the old dn */
if ( ! req - > deleteolddn ) {
result = LDAP_UNWILLING_TO_PERFORM ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx , LDB_ERR_UNWILLING_TO_PERFORM , & errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. Old RDN must be deleted " , errstr ) ;
2006-01-13 03:38:35 +03:00
goto reply ;
2004-10-08 16:26:14 +04:00
}
2006-01-13 03:38:35 +03:00
if ( req - > newsuperior ) {
2006-11-22 03:59:34 +03:00
parentdn = ldb_dn_new ( local_ctx , samdb , req - > newsuperior ) ;
2008-11-14 08:34:59 +03:00
VALID_DN_SYNTAX ( parentdn ) ;
2006-01-13 03:38:35 +03:00
DEBUG ( 10 , ( " ModifyDNRequest: newsuperior: [%s] \n " , req - > newsuperior ) ) ;
2006-11-02 02:31:26 +03:00
if ( ldb_dn_get_comp_num ( parentdn ) < 1 ) {
2006-01-13 03:38:35 +03:00
result = LDAP_AFFECTS_MULTIPLE_DSAS ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx , LDB_ERR_AFFECTS_MULTIPLE_DSAS ,
& errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. Error new Superior DN invalid " , errstr ) ;
2006-01-13 03:38:35 +03:00
goto reply ;
}
}
if ( ! parentdn ) {
parentdn = ldb_dn_get_parent ( local_ctx , olddn ) ;
NT_STATUS_HAVE_NO_MEMORY ( parentdn ) ;
}
2006-11-22 03:59:34 +03:00
if ( ! ldb_dn_add_child_fmt ( parentdn ,
" %s=%s " ,
ldb_dn_get_rdn_name ( newrdn ) ,
( char * ) ldb_dn_get_rdn_val ( newrdn ) - > data ) ) {
result = LDAP_OTHER ;
goto reply ;
}
2007-07-09 16:31:35 +04:00
newdn = parentdn ;
2006-01-13 03:38:35 +03:00
reply :
modifydn_r = ldapsrv_init_reply ( call , LDAP_TAG_ModifyDNResponse ) ;
NT_STATUS_HAVE_NO_MEMORY ( modifydn_r ) ;
if ( result = = LDAP_SUCCESS ) {
ldb_ret = ldb_rename ( samdb , olddn , newdn ) ;
2009-07-30 14:41:06 +04:00
result = map_ldb_error ( local_ctx , ldb_ret , & errstr ) ;
2006-01-13 03:38:35 +03:00
}
modifydn = & modifydn_r - > msg - > r . ModifyDNResponse ;
modifydn - > dn = NULL ;
modifydn - > resultcode = result ;
modifydn - > errormessage = ( errstr ? talloc_strdup ( modifydn_r , errstr ) : NULL ) ;
modifydn - > referral = NULL ;
talloc_free ( local_ctx ) ;
ldapsrv_queue_reply ( call , modifydn_r ) ;
return NT_STATUS_OK ;
2004-10-08 16:26:14 +04:00
}
static NTSTATUS ldapsrv_CompareRequest ( struct ldapsrv_call * call )
{
2005-06-15 04:27:51 +04:00
struct ldap_CompareRequest * req = & call - > request - > r . CompareRequest ;
2006-01-13 03:38:35 +03:00
struct ldap_Result * compare ;
struct ldapsrv_reply * compare_r ;
2009-07-30 14:41:06 +04:00
TALLOC_CTX * local_ctx ;
2006-01-13 03:38:35 +03:00
struct ldb_context * samdb = call - > conn - > ldb ;
struct ldb_result * res = NULL ;
struct ldb_dn * dn ;
const char * attrs [ 1 ] ;
const char * errstr = NULL ;
const char * filter = NULL ;
int result = LDAP_SUCCESS ;
int ldb_ret ;
2004-10-08 16:26:14 +04:00
DEBUG ( 10 , ( " CompareRequest " ) ) ;
DEBUGADD ( 10 , ( " dn: %s " , req - > dn ) ) ;
2006-01-13 03:38:35 +03:00
local_ctx = talloc_named ( call , 0 , " CompareRequest local_memory_context " ) ;
NT_STATUS_HAVE_NO_MEMORY ( local_ctx ) ;
2006-11-22 03:59:34 +03:00
dn = ldb_dn_new ( local_ctx , samdb , req - > dn ) ;
2008-11-14 08:34:59 +03:00
VALID_DN_SYNTAX ( dn ) ;
2006-01-13 03:38:35 +03:00
DEBUG ( 10 , ( " CompareRequest: dn: [%s] \n " , req - > dn ) ) ;
filter = talloc_asprintf ( local_ctx , " (%s=%*s) " , req - > attribute ,
( int ) req - > value . length , req - > value . data ) ;
NT_STATUS_HAVE_NO_MEMORY ( filter ) ;
DEBUGADD ( 10 , ( " CompareRequest: attribute: [%s] \n " , filter ) ) ;
attrs [ 0 ] = NULL ;
reply :
compare_r = ldapsrv_init_reply ( call , LDAP_TAG_CompareResponse ) ;
NT_STATUS_HAVE_NO_MEMORY ( compare_r ) ;
if ( result = = LDAP_SUCCESS ) {
2008-09-23 22:30:06 +04:00
ldb_ret = ldb_search ( samdb , local_ctx , & res ,
dn , LDB_SCOPE_BASE , attrs , " %s " , filter ) ;
2006-01-13 03:38:35 +03:00
if ( ldb_ret ! = LDB_SUCCESS ) {
2009-07-30 14:41:06 +04:00
result = map_ldb_error ( local_ctx , ldb_ret , & errstr ) ;
2006-01-13 03:38:35 +03:00
DEBUG ( 10 , ( " CompareRequest: error: %s \n " , errstr ) ) ;
} else if ( res - > count = = 0 ) {
DEBUG ( 10 , ( " CompareRequest: doesn't matched \n " ) ) ;
result = LDAP_COMPARE_FALSE ;
errstr = NULL ;
} else if ( res - > count = = 1 ) {
DEBUG ( 10 , ( " CompareRequest: matched \n " ) ) ;
result = LDAP_COMPARE_TRUE ;
errstr = NULL ;
} else if ( res - > count > 1 ) {
result = LDAP_OTHER ;
2009-07-30 14:41:06 +04:00
map_ldb_error ( local_ctx , LDB_ERR_OTHER , & errstr ) ;
errstr = talloc_asprintf ( local_ctx ,
" %s. Too many objects match! " , errstr ) ;
2006-01-13 03:38:35 +03:00
DEBUG ( 10 , ( " CompareRequest: %d results: %s \n " , res - > count , errstr ) ) ;
}
2004-10-08 16:26:14 +04:00
}
2006-01-13 03:38:35 +03:00
compare = & compare_r - > msg - > r . CompareResponse ;
compare - > dn = NULL ;
compare - > resultcode = result ;
compare - > errormessage = ( errstr ? talloc_strdup ( compare_r , errstr ) : NULL ) ;
compare - > referral = NULL ;
talloc_free ( local_ctx ) ;
ldapsrv_queue_reply ( call , compare_r ) ;
return NT_STATUS_OK ;
2004-10-08 16:26:14 +04:00
}
static NTSTATUS ldapsrv_AbandonRequest ( struct ldapsrv_call * call )
{
/* struct ldap_AbandonRequest *req = &call->request.r.AbandonRequest;*/
DEBUG ( 10 , ( " AbandonRequest \n " ) ) ;
return NT_STATUS_OK ;
}
NTSTATUS ldapsrv_do_call ( struct ldapsrv_call * call )
{
2007-11-29 10:02:36 +03:00
int i ;
struct ldap_message * msg = call - > request ;
/* Check for undecoded critical extensions */
for ( i = 0 ; msg - > controls & & msg - > controls [ i ] ; i + + ) {
if ( ! msg - > controls_decoded [ i ] & &
msg - > controls [ i ] - > critical ) {
DEBUG ( 3 , ( " ldapsrv_do_call: Critical extension %s is not known to this server \n " ,
msg - > controls [ i ] - > oid ) ) ;
return ldapsrv_unwilling ( call , LDAP_UNAVAILABLE_CRITICAL_EXTENSION ) ;
}
}
2005-06-15 04:27:51 +04:00
switch ( call - > request - > type ) {
2004-10-08 16:26:14 +04:00
case LDAP_TAG_BindRequest :
return ldapsrv_BindRequest ( call ) ;
case LDAP_TAG_UnbindRequest :
return ldapsrv_UnbindRequest ( call ) ;
case LDAP_TAG_SearchRequest :
return ldapsrv_SearchRequest ( call ) ;
case LDAP_TAG_ModifyRequest :
return ldapsrv_ModifyRequest ( call ) ;
case LDAP_TAG_AddRequest :
return ldapsrv_AddRequest ( call ) ;
case LDAP_TAG_DelRequest :
return ldapsrv_DelRequest ( call ) ;
case LDAP_TAG_ModifyDNRequest :
return ldapsrv_ModifyDNRequest ( call ) ;
case LDAP_TAG_CompareRequest :
return ldapsrv_CompareRequest ( call ) ;
case LDAP_TAG_AbandonRequest :
return ldapsrv_AbandonRequest ( call ) ;
case LDAP_TAG_ExtendedRequest :
return ldapsrv_ExtendedRequest ( call ) ;
default :
return ldapsrv_unwilling ( call , 2 ) ;
}
}