2001-11-20 11:54:15 +03:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2001-11-20 11:54:15 +03:00
ads ( active directory ) utility library
Copyright ( C ) Andrew Tridgell 2001
2001-12-20 06:54:52 +03:00
Copyright ( C ) Remus Koos 2001
2003-08-01 19:21:20 +04:00
Copyright ( C ) Jim McDonough < jmcd @ us . ibm . com > 2002
2006-02-04 01:19:41 +03:00
Copyright ( C ) Guenther Deschner 2005
2006-07-11 22:45:22 +04:00
Copyright ( C ) Gerald Carter 2006
2001-11-20 11:54:15 +03:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
2002-10-01 22:26:00 +04:00
# ifdef HAVE_LDAP
2001-11-20 11:54:15 +03:00
2002-04-10 17:28:03 +04:00
/**
* @ file ldap . c
* @ brief basic ldap client - side routines for ads server communications
*
* The routines contained here should do the necessary ldap calls for
* ads setups .
2002-07-15 14:35:28 +04:00
*
* Important note : attribute names passed into ads_ routines must
* already be in UTF - 8 format . We do not convert them because in almost
* all cases , they are just ascii ( which is represented with the same
* codepoints in UTF - 8 ) . This may have to change at some point
2002-04-10 17:28:03 +04:00
* */
2005-12-12 21:55:54 +03:00
# define LDAP_SERVER_TREE_DELETE_OID "1.2.840.113556.1.4.805"
2004-07-01 20:35:43 +04:00
static SIG_ATOMIC_T gotalarm ;
/***************************************************************
Signal function to tell us we timed out .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static void gotalarm_sig ( void )
{
gotalarm = 1 ;
}
2004-07-03 15:25:44 +04:00
LDAP * ldap_open_with_timeout ( const char * server , int port , unsigned int to )
2004-07-01 20:35:43 +04:00
{
LDAP * ldp = NULL ;
/* Setup timeout */
gotalarm = 0 ;
CatchSignal ( SIGALRM , SIGNAL_CAST gotalarm_sig ) ;
alarm ( to ) ;
/* End setup timeout. */
ldp = ldap_open ( server , port ) ;
/* Teardown timeout. */
CatchSignal ( SIGALRM , SIGNAL_CAST SIG_IGN ) ;
alarm ( 0 ) ;
return ldp ;
}
2002-08-17 21:00:51 +04:00
2004-11-18 14:43:14 +03:00
static int ldap_search_with_timeout ( LDAP * ld ,
LDAP_CONST char * base ,
int scope ,
LDAP_CONST char * filter ,
char * * attrs ,
int attrsonly ,
LDAPControl * * sctrls ,
LDAPControl * * cctrls ,
int sizelimit ,
LDAPMessage * * res )
{
2005-01-11 05:13:03 +03:00
struct timeval timeout ;
2004-11-18 14:43:14 +03:00
int result ;
2005-01-11 05:13:03 +03:00
/* Setup timeout for the ldap_search_ext_s call - local and remote. */
timeout . tv_sec = lp_ldap_timeout ( ) ;
timeout . tv_usec = 0 ;
/* Setup alarm timeout.... Do we need both of these ? JRA. */
2004-11-18 14:43:14 +03:00
gotalarm = 0 ;
CatchSignal ( SIGALRM , SIGNAL_CAST gotalarm_sig ) ;
alarm ( lp_ldap_timeout ( ) ) ;
/* End setup timeout. */
result = ldap_search_ext_s ( ld , base , scope , filter , attrs ,
2005-01-11 05:13:03 +03:00
attrsonly , sctrls , cctrls , & timeout ,
2004-11-18 14:43:14 +03:00
sizelimit , res ) ;
/* Teardown timeout. */
CatchSignal ( SIGALRM , SIGNAL_CAST SIG_IGN ) ;
alarm ( 0 ) ;
if ( gotalarm ! = 0 )
return LDAP_TIMELIMIT_EXCEEDED ;
return result ;
}
2002-08-17 21:00:51 +04:00
/*
try a connection to a given ldap server , returning True and setting the servers IP
in the ads struct if successful
*/
2006-05-12 19:17:35 +04:00
BOOL ads_try_connect ( ADS_STRUCT * ads , const char * server )
2002-08-17 21:00:51 +04:00
{
char * srv ;
2006-05-12 19:17:35 +04:00
struct cldap_netlogon_reply cldap_reply ;
2002-08-17 21:00:51 +04:00
if ( ! server | | ! * server ) {
return False ;
}
2006-05-12 19:17:35 +04:00
2006-07-07 15:43:47 +04:00
DEBUG ( 5 , ( " ads_try_connect: sending CLDAP request to %s (realm: %s) \n " ,
2006-07-07 15:59:19 +04:00
server , ads - > server . realm ) ) ;
2002-08-17 21:00:51 +04:00
/* this copes with inet_ntoa brokenness */
2006-05-12 19:17:35 +04:00
2004-12-07 21:25:53 +03:00
srv = SMB_STRDUP ( server ) ;
2002-08-17 21:00:51 +04:00
2006-05-12 19:17:35 +04:00
ZERO_STRUCT ( cldap_reply ) ;
2006-07-07 15:43:47 +04:00
2006-07-07 15:59:19 +04:00
if ( ! ads_cldap_netlogon ( srv , ads - > server . realm , & cldap_reply ) ) {
2006-05-12 19:17:35 +04:00
DEBUG ( 3 , ( " ads_try_connect: CLDAP request %s failed. \n " , srv ) ) ;
2002-08-17 21:00:51 +04:00
return False ;
}
2006-05-12 19:17:35 +04:00
/* Check the CLDAP reply flags */
if ( ! ( cldap_reply . flags & ADS_LDAP ) ) {
DEBUG ( 1 , ( " ads_try_connect: %s's CLDAP reply says it is not an LDAP server! \n " ,
srv ) ) ;
SAFE_FREE ( srv ) ;
return False ;
}
/* Fill in the ads->config values */
SAFE_FREE ( ads - > config . realm ) ;
SAFE_FREE ( ads - > config . bind_path ) ;
SAFE_FREE ( ads - > config . ldap_server_name ) ;
2006-07-06 17:38:41 +04:00
SAFE_FREE ( ads - > server . workgroup ) ;
2006-05-12 19:17:35 +04:00
ads - > config . ldap_server_name = SMB_STRDUP ( cldap_reply . hostname ) ;
strupper_m ( cldap_reply . domain ) ;
ads - > config . realm = SMB_STRDUP ( cldap_reply . domain ) ;
ads - > config . bind_path = ads_build_dn ( ads - > config . realm ) ;
2006-07-06 17:38:41 +04:00
ads - > server . workgroup = SMB_STRDUP ( cldap_reply . netbios_domain ) ;
2006-05-12 19:17:35 +04:00
ads - > ldap_port = LDAP_PORT ;
2002-08-17 21:00:51 +04:00
ads - > ldap_ip = * interpret_addr2 ( srv ) ;
2006-05-12 19:17:35 +04:00
SAFE_FREE ( srv ) ;
2006-02-04 00:19:24 +03:00
/* cache the successful connection */
2006-07-06 17:38:41 +04:00
2006-02-04 00:19:24 +03:00
saf_store ( ads - > server . workgroup , server ) ;
2002-09-25 19:19:00 +04:00
2002-08-17 21:00:51 +04:00
return True ;
}
2003-06-25 21:41:05 +04:00
/**********************************************************************
Try to find an AD dc using our internal name resolution routines
Try the realm first and then then workgroup name if netbios is not
disabled
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2002-08-17 21:00:51 +04:00
2003-06-25 21:41:05 +04:00
static BOOL ads_find_dc ( ADS_STRUCT * ads )
2002-08-17 21:00:51 +04:00
{
2002-11-13 02:20:50 +03:00
const char * c_realm ;
2002-08-17 21:00:51 +04:00
int count , i = 0 ;
2003-06-25 21:41:05 +04:00
struct ip_service * ip_list ;
pstring realm ;
BOOL got_realm = False ;
2003-07-25 20:42:34 +04:00
BOOL use_own_domain = False ;
/* if the realm and workgroup are both empty, assume they are ours */
2002-08-17 21:00:51 +04:00
2003-06-25 21:41:05 +04:00
/* realm */
2002-11-13 02:20:50 +03:00
c_realm = ads - > server . realm ;
2003-07-25 20:42:34 +04:00
if ( ! c_realm | | ! * c_realm ) {
/* special case where no realm and no workgroup means our own */
if ( ! ads - > server . workgroup | | ! * ads - > server . workgroup ) {
use_own_domain = True ;
c_realm = lp_realm ( ) ;
}
}
2003-07-23 23:58:01 +04:00
if ( c_realm & & * c_realm )
2003-06-25 21:41:05 +04:00
got_realm = True ;
2003-07-25 20:42:34 +04:00
2003-06-25 21:41:05 +04:00
again :
/* we need to try once with the realm name and fallback to the
netbios domain name if we fail ( if netbios has not been disabled */
if ( ! got_realm & & ! lp_disable_netbios ( ) ) {
c_realm = ads - > server . workgroup ;
2003-07-23 23:58:01 +04:00
if ( ! c_realm | | ! * c_realm ) {
2003-07-25 20:42:34 +04:00
if ( use_own_domain )
c_realm = lp_workgroup ( ) ;
}
if ( ! c_realm | | ! * c_realm ) {
DEBUG ( 0 , ( " ads_find_dc: no realm or workgroup! Don't know what to do \n " ) ) ;
2003-06-25 21:41:05 +04:00
return False ;
2003-07-23 23:58:01 +04:00
}
2002-08-17 21:00:51 +04:00
}
2003-06-25 21:41:05 +04:00
pstrcpy ( realm , c_realm ) ;
2002-08-17 21:00:51 +04:00
2003-06-25 23:00:15 +04:00
DEBUG ( 6 , ( " ads_find_dc: looking for %s '%s' \n " ,
2003-06-25 21:41:05 +04:00
( got_realm ? " realm " : " domain " ) , realm ) ) ;
2002-08-17 21:00:51 +04:00
2003-06-25 21:41:05 +04:00
if ( ! get_sorted_dc_list ( realm , & ip_list , & count , got_realm ) ) {
/* fall back to netbios if we can */
if ( got_realm & & ! lp_disable_netbios ( ) ) {
got_realm = False ;
goto again ;
2002-08-17 21:00:51 +04:00
}
2003-06-25 21:41:05 +04:00
return False ;
2002-08-17 21:00:51 +04:00
}
2003-06-25 21:41:05 +04:00
/* if we fail this loop, then giveup since all the IP addresses returned were dead */
for ( i = 0 ; i < count ; i + + ) {
2003-06-25 23:00:15 +04:00
fstring server ;
2003-06-25 21:41:05 +04:00
2003-06-25 23:00:15 +04:00
fstrcpy ( server , inet_ntoa ( ip_list [ i ] . ip ) ) ;
if ( ! NT_STATUS_IS_OK ( check_negative_conn_cache ( realm , server ) ) )
continue ;
2006-05-12 19:17:35 +04:00
if ( ads_try_connect ( ads , server ) ) {
2003-06-25 21:41:05 +04:00
SAFE_FREE ( ip_list ) ;
2002-08-17 21:00:51 +04:00
return True ;
}
2003-06-25 21:41:05 +04:00
/* keep track of failures */
2003-06-25 23:00:15 +04:00
add_failed_connection_entry ( realm , server , NT_STATUS_UNSUCCESSFUL ) ;
2002-08-17 21:00:51 +04:00
}
SAFE_FREE ( ip_list ) ;
2003-06-25 21:41:05 +04:00
2002-08-17 21:00:51 +04:00
return False ;
}
2002-04-10 17:28:03 +04:00
/**
* Connect to the LDAP server
* @ param ads Pointer to an existing ADS_STRUCT
* @ return status of connection
* */
2001-12-19 15:21:12 +03:00
ADS_STATUS ads_connect ( ADS_STRUCT * ads )
2001-11-20 11:54:15 +03:00
{
int version = LDAP_VERSION3 ;
2001-12-19 15:21:12 +03:00
ADS_STATUS status ;
2001-11-20 11:54:15 +03:00
2001-12-05 12:19:25 +03:00
ads - > last_attempt = time ( NULL ) ;
2002-07-15 14:35:28 +04:00
ads - > ld = NULL ;
2002-08-17 21:00:51 +04:00
/* try with a user specified server */
2006-05-12 19:17:35 +04:00
2002-08-17 21:00:51 +04:00
if ( ads - > server . ldap_server & &
2006-05-12 19:17:35 +04:00
ads_try_connect ( ads , ads - > server . ldap_server ) ) {
2002-08-17 21:00:51 +04:00
goto got_connection ;
2002-07-15 14:35:28 +04:00
}
2003-06-25 21:41:05 +04:00
if ( ads_find_dc ( ads ) ) {
2002-08-17 21:00:51 +04:00
goto got_connection ;
2001-11-20 11:54:15 +03:00
}
2002-07-15 14:35:28 +04:00
2002-08-17 21:00:51 +04:00
return ADS_ERROR_SYSTEM ( errno ? errno : ENOENT ) ;
got_connection :
DEBUG ( 3 , ( " Connected to LDAP server %s \n " , inet_ntoa ( ads - > ldap_ip ) ) ) ;
2002-07-15 14:35:28 +04:00
2002-08-17 21:00:51 +04:00
if ( ! ads - > auth . user_name ) {
2006-07-11 22:45:22 +04:00
/* Must use the userPrincipalName value here or sAMAccountName
and not servicePrincipalName ; found by Guenther Deschner */
2004-07-07 22:15:24 +04:00
2006-06-09 15:02:52 +04:00
asprintf ( & ads - > auth . user_name , " %s$ " , global_myname ( ) ) ;
2002-08-17 21:00:51 +04:00
}
if ( ! ads - > auth . realm ) {
2004-12-07 21:25:53 +03:00
ads - > auth . realm = SMB_STRDUP ( ads - > config . realm ) ;
2002-08-17 21:00:51 +04:00
}
if ( ! ads - > auth . kdc_server ) {
2004-12-07 21:25:53 +03:00
ads - > auth . kdc_server = SMB_STRDUP ( inet_ntoa ( ads - > ldap_ip ) ) ;
2002-08-17 21:00:51 +04:00
}
2002-03-11 07:06:30 +03:00
# if KRB5_DNS_HACK
/* this is a really nasty hack to avoid ADS DNS problems. It needs a patch
to MIT kerberos to work ( tridge ) */
{
char * env ;
2002-08-17 21:00:51 +04:00
asprintf ( & env , " KRB5_KDC_ADDRESS_%s " , ads - > config . realm ) ;
setenv ( env , ads - > auth . kdc_server , 1 ) ;
2002-03-11 07:06:30 +03:00
free ( env ) ;
}
# endif
2006-05-12 19:17:35 +04:00
/* If the caller() requested no LDAP bind, then we are done */
2002-09-25 19:19:00 +04:00
if ( ads - > auth . flags & ADS_AUTH_NO_BIND ) {
2002-08-17 21:00:51 +04:00
return ADS_SUCCESS ;
}
2006-05-12 19:17:35 +04:00
/* Otherwise setup the TCP LDAP session */
if ( ( ads - > ld = ldap_open_with_timeout ( ads - > config . ldap_server_name ,
LDAP_PORT , lp_ldap_timeout ( ) ) ) = = NULL )
{
return ADS_ERROR ( LDAP_OPERATIONS_ERROR ) ;
}
ldap_set_option ( ads - > ld , LDAP_OPT_PROTOCOL_VERSION , & version ) ;
status = ADS_ERROR ( smb_ldap_start_tls ( ads - > ld , version ) ) ;
if ( ! ADS_ERR_OK ( status ) ) {
return status ;
}
/* fill in the current time and offsets */
status = ads_current_time ( ads ) ;
if ( ! ADS_ERR_OK ( status ) ) {
return status ;
}
2002-08-17 21:00:51 +04:00
2006-05-12 19:17:35 +04:00
/* Now do the bind */
2002-10-01 22:26:00 +04:00
if ( ads - > auth . flags & ADS_AUTH_ANON_BIND ) {
return ADS_ERROR ( ldap_simple_bind_s ( ads - > ld , NULL , NULL ) ) ;
}
if ( ads - > auth . flags & ADS_AUTH_SIMPLE_BIND ) {
return ADS_ERROR ( ldap_simple_bind_s ( ads - > ld , ads - > auth . user_name , ads - > auth . password ) ) ;
}
2001-12-19 15:21:12 +03:00
return ads_sasl_bind ( ads ) ;
2001-11-20 11:54:15 +03:00
}
2002-07-15 14:35:28 +04:00
/*
Duplicate a struct berval into talloc ' ed memory
*/
static struct berval * dup_berval ( TALLOC_CTX * ctx , const struct berval * in_val )
{
struct berval * value ;
if ( ! in_val ) return NULL ;
2004-12-07 21:25:53 +03:00
value = TALLOC_ZERO_P ( ctx , struct berval ) ;
2002-12-31 02:55:53 +03:00
if ( value = = NULL )
return NULL ;
2002-07-15 14:35:28 +04:00
if ( in_val - > bv_len = = 0 ) return value ;
value - > bv_len = in_val - > bv_len ;
2004-12-07 21:25:53 +03:00
value - > bv_val = TALLOC_MEMDUP ( ctx , in_val - > bv_val , in_val - > bv_len ) ;
2002-07-15 14:35:28 +04:00
return value ;
}
/*
Make a values list out of an array of ( struct berval * )
*/
static struct berval * * ads_dup_values ( TALLOC_CTX * ctx ,
const struct berval * * in_vals )
{
struct berval * * values ;
int i ;
if ( ! in_vals ) return NULL ;
2004-12-07 21:25:53 +03:00
for ( i = 0 ; in_vals [ i ] ; i + + )
; /* count values */
values = TALLOC_ZERO_ARRAY ( ctx , struct berval * , i + 1 ) ;
2002-07-15 14:35:28 +04:00
if ( ! values ) return NULL ;
for ( i = 0 ; in_vals [ i ] ; i + + ) {
values [ i ] = dup_berval ( ctx , in_vals [ i ] ) ;
}
return values ;
}
/*
UTF8 - encode a values list out of an array of ( char * )
*/
static char * * ads_push_strvals ( TALLOC_CTX * ctx , const char * * in_vals )
{
char * * values ;
int i ;
if ( ! in_vals ) return NULL ;
2004-12-07 21:25:53 +03:00
for ( i = 0 ; in_vals [ i ] ; i + + )
; /* count values */
values = TALLOC_ZERO_ARRAY ( ctx , char * , i + 1 ) ;
2002-07-15 14:35:28 +04:00
if ( ! values ) return NULL ;
for ( i = 0 ; in_vals [ i ] ; i + + ) {
2002-08-17 21:00:51 +04:00
push_utf8_talloc ( ctx , & values [ i ] , in_vals [ i ] ) ;
2002-07-15 14:35:28 +04:00
}
return values ;
}
/*
Pull a ( char * ) array out of a UTF8 - encoded values list
*/
static char * * ads_pull_strvals ( TALLOC_CTX * ctx , const char * * in_vals )
{
char * * values ;
int i ;
if ( ! in_vals ) return NULL ;
2004-12-07 21:25:53 +03:00
for ( i = 0 ; in_vals [ i ] ; i + + )
; /* count values */
values = TALLOC_ZERO_ARRAY ( ctx , char * , i + 1 ) ;
2002-07-15 14:35:28 +04:00
if ( ! values ) return NULL ;
for ( i = 0 ; in_vals [ i ] ; i + + ) {
2002-08-17 21:00:51 +04:00
pull_utf8_talloc ( ctx , & values [ i ] , in_vals [ i ] ) ;
2002-07-15 14:35:28 +04:00
}
return values ;
}
2002-03-19 15:58:38 +03:00
2002-04-10 17:28:03 +04:00
/**
* Do a search with paged results . cookie must be null on the first
* call , and then returned on each subsequent call . It will be null
* again when the entire search is complete
* @ param ads connection to ads server
* @ param bind_path Base dn for the search
2003-07-03 08:12:54 +04:00
* @ param scope Scope of search ( LDAP_SCOPE_BASE | LDAP_SCOPE_ONE | LDAP_SCOPE_SUBTREE )
2003-04-15 21:06:51 +04:00
* @ param expr Search expression - specified in local charset
2002-07-15 14:35:28 +04:00
* @ param attrs Attributes to retrieve - specified in utf8 or ascii
2002-04-10 17:28:03 +04:00
* @ param res * * which will contain results - free res * with ads_msgfree ( )
* @ param count Number of entries retrieved on this page
* @ param cookie The paged results cookie to be returned on subsequent calls
* @ return status of search
* */
2006-05-18 23:34:25 +04:00
ADS_STATUS ads_do_paged_search_args ( ADS_STRUCT * ads , const char * bind_path ,
int scope , const char * expr ,
const char * * attrs , void * args , void * * res ,
int * count , void * * cookie )
2002-03-14 20:48:26 +03:00
{
2002-07-15 14:35:28 +04:00
int rc , i , version ;
2003-04-15 21:06:51 +04:00
char * utf8_expr , * utf8_path , * * search_attrs ;
2006-05-18 23:34:25 +04:00
LDAPControl PagedResults , NoReferrals , ExtendedDn , * controls [ 4 ] , * * rcontrols ;
2002-04-10 17:28:03 +04:00
BerElement * cookie_be = NULL ;
struct berval * cookie_bv = NULL ;
2006-05-18 23:34:25 +04:00
BerElement * extdn_be = NULL ;
struct berval * extdn_bv = NULL ;
2002-07-15 14:35:28 +04:00
TALLOC_CTX * ctx ;
2006-05-18 23:34:25 +04:00
ads_control * external_control = ( ads_control * ) args ;
2002-03-14 20:48:26 +03:00
* res = NULL ;
2006-05-18 23:34:25 +04:00
if ( ! ( ctx = talloc_init ( " ads_do_paged_search_args " ) ) )
2002-07-15 14:35:28 +04:00
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
2002-03-14 20:48:26 +03:00
2002-07-15 14:35:28 +04:00
/* 0 means the conversion worked but the result was empty
2003-02-19 15:31:16 +03:00
so we only fail if it ' s - 1. In any case , it always
2002-07-15 14:35:28 +04:00
at least nulls out the dest */
2003-04-15 21:06:51 +04:00
if ( ( push_utf8_talloc ( ctx , & utf8_expr , expr ) = = ( size_t ) - 1 ) | |
2003-02-19 15:31:16 +03:00
( push_utf8_talloc ( ctx , & utf8_path , bind_path ) = = ( size_t ) - 1 ) ) {
2002-07-15 14:35:28 +04:00
rc = LDAP_NO_MEMORY ;
goto done ;
}
if ( ! attrs | | ! ( * attrs ) )
search_attrs = NULL ;
else {
/* This would be the utf8-encoded version...*/
/* if (!(search_attrs = ads_push_strvals(ctx, attrs))) */
2002-11-13 02:20:50 +03:00
if ( ! ( str_list_copy ( & search_attrs , attrs ) ) ) {
2002-07-15 14:35:28 +04:00
rc = LDAP_NO_MEMORY ;
goto done ;
}
}
/* Paged results only available on ldap v3 or later */
ldap_get_option ( ads - > ld , LDAP_OPT_PROTOCOL_VERSION , & version ) ;
if ( version < LDAP_VERSION3 ) {
rc = LDAP_NOT_SUPPORTED ;
goto done ;
}
2002-03-14 20:48:26 +03:00
2002-04-05 23:26:52 +04:00
cookie_be = ber_alloc_t ( LBER_USE_DER ) ;
2002-03-14 20:48:26 +03:00
if ( cookie & & * cookie ) {
2002-04-05 23:26:52 +04:00
ber_printf ( cookie_be , " {iO} " , ( ber_int_t ) 1000 , * cookie ) ;
2002-03-14 20:48:26 +03:00
ber_bvfree ( * cookie ) ; /* don't need it from last time */
2002-03-20 01:14:53 +03:00
* cookie = NULL ;
2002-03-14 20:48:26 +03:00
} else {
2002-04-05 23:26:52 +04:00
ber_printf ( cookie_be , " {io} " , ( ber_int_t ) 1000 , " " , 0 ) ;
2002-03-14 20:48:26 +03:00
}
2002-04-05 23:26:52 +04:00
ber_flatten ( cookie_be , & cookie_bv ) ;
2005-03-31 09:06:04 +04:00
PagedResults . ldctl_oid = CONST_DISCARD ( char * , ADS_PAGE_CTL_OID ) ;
2002-03-27 06:09:50 +03:00
PagedResults . ldctl_iscritical = ( char ) 1 ;
2002-04-05 23:26:52 +04:00
PagedResults . ldctl_value . bv_len = cookie_bv - > bv_len ;
PagedResults . ldctl_value . bv_val = cookie_bv - > bv_val ;
2002-03-27 05:58:58 +03:00
2005-03-31 09:06:04 +04:00
NoReferrals . ldctl_oid = CONST_DISCARD ( char * , ADS_NO_REFERRALS_OID ) ;
2002-03-27 05:58:58 +03:00
NoReferrals . ldctl_iscritical = ( char ) 0 ;
NoReferrals . ldctl_value . bv_len = 0 ;
2005-03-31 09:06:04 +04:00
NoReferrals . ldctl_value . bv_val = CONST_DISCARD ( char * , " " ) ;
2002-03-27 05:58:58 +03:00
2006-05-18 23:34:25 +04:00
if ( external_control & & strequal ( external_control - > control , ADS_EXTENDED_DN_OID ) ) {
ExtendedDn . ldctl_oid = CONST_DISCARD ( char * , external_control - > control ) ;
ExtendedDn . ldctl_iscritical = ( char ) external_control - > critical ;
/* win2k does not accept a ldctl_value beeing passed in */
if ( external_control - > val ! = 0 ) {
if ( ( extdn_be = ber_alloc_t ( LBER_USE_DER ) ) = = NULL ) {
rc = LDAP_NO_MEMORY ;
goto done ;
}
if ( ( ber_printf ( extdn_be , " {i} " , ( ber_int_t ) external_control - > val ) ) = = - 1 ) {
rc = LDAP_NO_MEMORY ;
goto done ;
}
if ( ( ber_flatten ( extdn_be , & extdn_bv ) ) = = - 1 ) {
rc = LDAP_NO_MEMORY ;
goto done ;
}
ExtendedDn . ldctl_value . bv_len = extdn_bv - > bv_len ;
ExtendedDn . ldctl_value . bv_val = extdn_bv - > bv_val ;
} else {
ExtendedDn . ldctl_value . bv_len = 0 ;
2006-05-23 00:35:55 +04:00
ExtendedDn . ldctl_value . bv_val = NULL ;
2006-05-18 23:34:25 +04:00
}
2002-04-05 23:26:52 +04:00
2006-05-18 23:34:25 +04:00
controls [ 0 ] = & NoReferrals ;
controls [ 1 ] = & PagedResults ;
controls [ 2 ] = & ExtendedDn ;
controls [ 3 ] = NULL ;
} else {
controls [ 0 ] = & NoReferrals ;
controls [ 1 ] = & PagedResults ;
controls [ 2 ] = NULL ;
}
2002-03-14 20:48:26 +03:00
2002-03-19 15:58:38 +03:00
/* we need to disable referrals as the openldap libs don't
2002-07-15 14:35:28 +04:00
handle them and paged results at the same time . Using them
together results in the result record containing the server
page control being removed from the result list ( tridge / jmcd )
2002-03-27 05:58:58 +03:00
leaving this in despite the control that says don ' t generate
referrals , in case the server doesn ' t support it ( jmcd )
*/
2002-03-19 15:58:38 +03:00
ldap_set_option ( ads - > ld , LDAP_OPT_REFERRALS , LDAP_OPT_OFF ) ;
2004-11-18 14:43:14 +03:00
rc = ldap_search_with_timeout ( ads - > ld , utf8_path , scope , utf8_expr ,
search_attrs , 0 , controls ,
2005-01-11 05:13:03 +03:00
NULL , LDAP_NO_LIMIT ,
2004-11-18 14:43:14 +03:00
( LDAPMessage * * ) res ) ;
2002-03-19 15:58:38 +03:00
2002-04-05 23:26:52 +04:00
ber_free ( cookie_be , 1 ) ;
ber_bvfree ( cookie_bv ) ;
2002-03-19 15:58:38 +03:00
if ( rc ) {
2006-05-18 23:34:25 +04:00
DEBUG ( 3 , ( " ads_do_paged_search_args: ldap_search_with_timeout(%s) -> %s \n " , expr ,
2004-11-18 14:43:14 +03:00
ldap_err2string ( rc ) ) ) ;
2002-07-15 14:35:28 +04:00
goto done ;
2002-03-19 15:58:38 +03:00
}
2002-03-14 20:48:26 +03:00
rc = ldap_parse_result ( ads - > ld , * res , NULL , NULL , NULL ,
NULL , & rcontrols , 0 ) ;
2002-03-19 15:58:38 +03:00
if ( ! rcontrols ) {
2002-07-15 14:35:28 +04:00
goto done ;
2002-03-19 15:58:38 +03:00
}
2002-04-05 23:26:52 +04:00
for ( i = 0 ; rcontrols [ i ] ; i + + ) {
if ( strcmp ( ADS_PAGE_CTL_OID , rcontrols [ i ] - > ldctl_oid ) = = 0 ) {
cookie_be = ber_init ( & rcontrols [ i ] - > ldctl_value ) ;
ber_scanf ( cookie_be , " {iO} " , ( ber_int_t * ) count ,
& cookie_bv ) ;
2002-03-14 20:48:26 +03:00
/* the berval is the cookie, but must be freed when
it is all done */
2002-04-05 23:26:52 +04:00
if ( cookie_bv - > bv_len ) /* still more to do */
* cookie = ber_bvdup ( cookie_bv ) ;
2002-03-14 20:48:26 +03:00
else
* cookie = NULL ;
2002-04-05 23:26:52 +04:00
ber_bvfree ( cookie_bv ) ;
ber_free ( cookie_be , 1 ) ;
2002-03-14 20:48:26 +03:00
break ;
}
}
ldap_controls_free ( rcontrols ) ;
2002-07-15 14:35:28 +04:00
done :
talloc_destroy ( ctx ) ;
2006-05-18 23:34:25 +04:00
if ( extdn_be ) {
ber_free ( extdn_be , 1 ) ;
}
if ( extdn_bv ) {
ber_bvfree ( extdn_bv ) ;
}
2002-07-15 14:35:28 +04:00
/* if/when we decide to utf8-encode attrs, take out this next line */
str_list_free ( & search_attrs ) ;
2002-03-14 20:48:26 +03:00
return ADS_ERROR ( rc ) ;
}
2006-05-18 23:34:25 +04:00
ADS_STATUS ads_do_paged_search ( ADS_STRUCT * ads , const char * bind_path ,
int scope , const char * expr ,
const char * * attrs , void * * res ,
int * count , void * * cookie )
{
return ads_do_paged_search_args ( ads , bind_path , scope , expr , attrs , NULL , res , count , cookie ) ;
}
2002-03-20 01:14:53 +03:00
2002-04-10 17:28:03 +04:00
/**
* Get all results for a search . This uses ads_do_paged_search ( ) to return
* all entries in a large search .
* @ param ads connection to ads server
* @ param bind_path Base dn for the search
2003-07-03 08:12:54 +04:00
* @ param scope Scope of search ( LDAP_SCOPE_BASE | LDAP_SCOPE_ONE | LDAP_SCOPE_SUBTREE )
2003-04-15 21:06:51 +04:00
* @ param expr Search expression
2002-04-10 17:28:03 +04:00
* @ param attrs Attributes to retrieve
* @ param res * * which will contain results - free res * with ads_msgfree ( )
* @ return status of search
* */
2006-05-18 23:34:25 +04:00
ADS_STATUS ads_do_search_all_args ( ADS_STRUCT * ads , const char * bind_path ,
int scope , const char * expr ,
const char * * attrs , void * args , void * * res )
2002-03-20 01:14:53 +03:00
{
void * cookie = NULL ;
int count = 0 ;
ADS_STATUS status ;
2004-11-15 21:57:22 +03:00
* res = NULL ;
2006-05-18 23:34:25 +04:00
status = ads_do_paged_search_args ( ads , bind_path , scope , expr , attrs , args , res ,
2002-04-10 17:28:03 +04:00
& count , & cookie ) ;
2002-03-20 01:14:53 +03:00
2005-11-22 20:15:28 +03:00
if ( ! ADS_ERR_OK ( status ) )
return status ;
2002-03-20 01:14:53 +03:00
2005-11-22 20:15:28 +03:00
# ifdef HAVE_LDAP_ADD_RESULT_ENTRY
2002-03-20 01:14:53 +03:00
while ( cookie ) {
void * res2 = NULL ;
ADS_STATUS status2 ;
LDAPMessage * msg , * next ;
2006-05-18 23:34:25 +04:00
status2 = ads_do_paged_search_args ( ads , bind_path , scope , expr ,
attrs , args , & res2 , & count , & cookie ) ;
2002-03-20 01:14:53 +03:00
if ( ! ADS_ERR_OK ( status2 ) ) break ;
/* this relies on the way that ldap_add_result_entry() works internally. I hope
that this works on all ldap libs , but I have only tested with openldap */
for ( msg = ads_first_entry ( ads , res2 ) ; msg ; msg = next ) {
next = ads_next_entry ( ads , msg ) ;
ldap_add_result_entry ( ( LDAPMessage * * ) res , msg ) ;
}
/* note that we do not free res2, as the memory is now
part of the main returned list */
}
2005-11-22 20:15:28 +03:00
# else
DEBUG ( 0 , ( " no ldap_add_result_entry() support in LDAP libs! \n " ) ) ;
status = ADS_ERROR_NT ( NT_STATUS_UNSUCCESSFUL ) ;
# endif
2002-03-20 01:14:53 +03:00
return status ;
}
2006-05-18 23:34:25 +04:00
ADS_STATUS ads_do_search_all ( ADS_STRUCT * ads , const char * bind_path ,
int scope , const char * expr ,
const char * * attrs , void * * res )
{
return ads_do_search_all_args ( ads , bind_path , scope , expr , attrs , NULL , res ) ;
}
2002-04-10 17:28:03 +04:00
/**
* Run a function on all results for a search . Uses ads_do_paged_search ( ) and
* runs the function as each page is returned , using ads_process_results ( )
* @ param ads connection to ads server
* @ param bind_path Base dn for the search
2003-07-03 08:12:54 +04:00
* @ param scope Scope of search ( LDAP_SCOPE_BASE | LDAP_SCOPE_ONE | LDAP_SCOPE_SUBTREE )
2003-04-15 21:06:51 +04:00
* @ param expr Search expression - specified in local charset
2002-07-15 14:35:28 +04:00
* @ param attrs Attributes to retrieve - specified in UTF - 8 or ascii
2002-04-10 17:28:03 +04:00
* @ param fn Function which takes attr name , values list , and data_area
* @ param data_area Pointer which is passed to function on each call
* @ return status of search
* */
ADS_STATUS ads_do_search_all_fn ( ADS_STRUCT * ads , const char * bind_path ,
2003-04-15 21:06:51 +04:00
int scope , const char * expr , const char * * attrs ,
2002-07-15 14:35:28 +04:00
BOOL ( * fn ) ( char * , void * * , void * ) ,
2002-04-10 17:28:03 +04:00
void * data_area )
2002-04-05 23:26:52 +04:00
{
void * cookie = NULL ;
int count = 0 ;
ADS_STATUS status ;
void * res ;
2003-04-15 21:06:51 +04:00
status = ads_do_paged_search ( ads , bind_path , scope , expr , attrs , & res ,
2002-04-10 17:28:03 +04:00
& count , & cookie ) ;
2002-04-05 23:26:52 +04:00
if ( ! ADS_ERR_OK ( status ) ) return status ;
ads_process_results ( ads , res , fn , data_area ) ;
ads_msgfree ( ads , res ) ;
while ( cookie ) {
2003-04-15 21:06:51 +04:00
status = ads_do_paged_search ( ads , bind_path , scope , expr , attrs ,
2002-04-10 17:28:03 +04:00
& res , & count , & cookie ) ;
2002-04-05 23:26:52 +04:00
if ( ! ADS_ERR_OK ( status ) ) break ;
ads_process_results ( ads , res , fn , data_area ) ;
ads_msgfree ( ads , res ) ;
}
return status ;
}
2002-04-10 17:28:03 +04:00
/**
* Do a search with a timeout .
* @ param ads connection to ads server
* @ param bind_path Base dn for the search
2003-07-03 08:12:54 +04:00
* @ param scope Scope of search ( LDAP_SCOPE_BASE | LDAP_SCOPE_ONE | LDAP_SCOPE_SUBTREE )
2003-04-15 21:06:51 +04:00
* @ param expr Search expression
2002-04-10 17:28:03 +04:00
* @ param attrs Attributes to retrieve
* @ param res * * which will contain results - free res * with ads_msgfree ( )
* @ return status of search
* */
2001-12-19 15:21:12 +03:00
ADS_STATUS ads_do_search ( ADS_STRUCT * ads , const char * bind_path , int scope ,
2003-04-15 21:06:51 +04:00
const char * expr ,
2001-12-19 15:21:12 +03:00
const char * * attrs , void * * res )
2001-12-05 12:19:25 +03:00
{
2001-12-19 15:21:12 +03:00
int rc ;
2003-04-15 21:06:51 +04:00
char * utf8_expr , * utf8_path , * * search_attrs = NULL ;
2002-07-15 14:35:28 +04:00
TALLOC_CTX * ctx ;
2004-11-15 21:57:22 +03:00
* res = NULL ;
2002-12-20 23:21:31 +03:00
if ( ! ( ctx = talloc_init ( " ads_do_search " ) ) ) {
2002-09-25 19:19:00 +04:00
DEBUG ( 1 , ( " ads_do_search: talloc_init() failed! " ) ) ;
2002-07-15 14:35:28 +04:00
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
2002-09-25 19:19:00 +04:00
}
2002-07-15 14:35:28 +04:00
/* 0 means the conversion worked but the result was empty
so we only fail if it ' s negative . In any case , it always
at least nulls out the dest */
2003-04-15 21:06:51 +04:00
if ( ( push_utf8_talloc ( ctx , & utf8_expr , expr ) = = ( size_t ) - 1 ) | |
2003-02-19 15:31:16 +03:00
( push_utf8_talloc ( ctx , & utf8_path , bind_path ) = = ( size_t ) - 1 ) ) {
2002-09-25 19:19:00 +04:00
DEBUG ( 1 , ( " ads_do_search: push_utf8_talloc() failed! " ) ) ;
2002-07-15 14:35:28 +04:00
rc = LDAP_NO_MEMORY ;
goto done ;
}
if ( ! attrs | | ! ( * attrs ) )
search_attrs = NULL ;
else {
/* This would be the utf8-encoded version...*/
/* if (!(search_attrs = ads_push_strvals(ctx, attrs))) */
2002-08-17 21:00:51 +04:00
if ( ! ( str_list_copy ( & search_attrs , attrs ) ) )
2002-07-15 14:35:28 +04:00
{
2002-09-25 19:19:00 +04:00
DEBUG ( 1 , ( " ads_do_search: str_list_copy() failed! " ) ) ;
2002-07-15 14:35:28 +04:00
rc = LDAP_NO_MEMORY ;
goto done ;
}
}
2001-12-05 12:19:25 +03:00
2002-07-15 14:35:28 +04:00
/* see the note in ads_do_paged_search - we *must* disable referrals */
ldap_set_option ( ads - > ld , LDAP_OPT_REFERRALS , LDAP_OPT_OFF ) ;
2004-11-18 14:43:14 +03:00
rc = ldap_search_with_timeout ( ads - > ld , utf8_path , scope , utf8_expr ,
search_attrs , 0 , NULL , NULL ,
2005-01-11 05:13:03 +03:00
LDAP_NO_LIMIT ,
2004-11-18 14:43:14 +03:00
( LDAPMessage * * ) res ) ;
2002-03-14 20:48:26 +03:00
2002-03-13 09:43:52 +03:00
if ( rc = = LDAP_SIZELIMIT_EXCEEDED ) {
DEBUG ( 3 , ( " Warning! sizelimit exceeded in ldap. Truncating. \n " ) ) ;
rc = 0 ;
}
2002-03-14 20:48:26 +03:00
2002-07-15 14:35:28 +04:00
done :
talloc_destroy ( ctx ) ;
/* if/when we decide to utf8-encode attrs, take out this next line */
str_list_free ( & search_attrs ) ;
2001-12-19 15:21:12 +03:00
return ADS_ERROR ( rc ) ;
2001-12-05 12:19:25 +03:00
}
2002-04-10 17:28:03 +04:00
/**
* Do a general ADS search
* @ param ads connection to ads server
* @ param res * * which will contain results - free res * with ads_msgfree ( )
2003-04-15 21:06:51 +04:00
* @ param expr Search expression
2002-04-10 17:28:03 +04:00
* @ param attrs Attributes to retrieve
* @ return status of search
* */
2001-12-19 15:21:12 +03:00
ADS_STATUS ads_search ( ADS_STRUCT * ads , void * * res ,
2003-04-15 21:06:51 +04:00
const char * expr ,
2001-12-19 15:21:12 +03:00
const char * * attrs )
2001-11-25 04:31:07 +03:00
{
2002-08-17 21:00:51 +04:00
return ads_do_search ( ads , ads - > config . bind_path , LDAP_SCOPE_SUBTREE ,
2003-04-15 21:06:51 +04:00
expr , attrs , res ) ;
2001-11-25 04:31:07 +03:00
}
2002-04-10 17:28:03 +04:00
/**
* Do a search on a specific DistinguishedName
* @ param ads connection to ads server
* @ param res * * which will contain results - free res * with ads_msgfree ( )
* @ param dn DistinguishName to search
* @ param attrs Attributes to retrieve
* @ return status of search
* */
2006-07-11 22:01:26 +04:00
ADS_STATUS ads_search_dn ( ADS_STRUCT * ads , void * _res ,
2001-12-19 15:21:12 +03:00
const char * dn ,
const char * * attrs )
2001-12-04 15:08:16 +03:00
{
2006-07-11 22:01:26 +04:00
void * * res = ( void * * ) _res ;
2001-12-08 14:18:56 +03:00
return ads_do_search ( ads , dn , LDAP_SCOPE_BASE , " (objectclass=*) " , attrs, res) ;
2001-12-04 15:08:16 +03:00
}
2002-04-10 17:28:03 +04:00
/**
* Free up memory from a ads_search
* @ param ads connection to ads server
* @ param msg Search results to free
* */
2001-12-05 09:26:56 +03:00
void ads_msgfree ( ADS_STRUCT * ads , void * msg )
{
if ( ! msg ) return ;
ldap_msgfree ( msg ) ;
}
2001-11-25 04:31:07 +03:00
2002-04-10 17:28:03 +04:00
/**
* Free up memory from various ads requests
* @ param ads connection to ads server
* @ param mem Area to free
* */
2002-02-02 05:04:01 +03:00
void ads_memfree ( ADS_STRUCT * ads , void * mem )
{
2002-07-15 14:35:28 +04:00
SAFE_FREE ( mem ) ;
2002-02-02 05:04:01 +03:00
}
2002-04-10 17:28:03 +04:00
/**
* Get a dn from search results
* @ param ads connection to ads server
2003-06-16 06:42:00 +04:00
* @ param msg Search result
2002-04-10 17:28:03 +04:00
* @ return dn string
* */
2003-06-16 06:42:00 +04:00
char * ads_get_dn ( ADS_STRUCT * ads , void * msg )
2002-02-02 05:04:01 +03:00
{
2002-07-15 14:35:28 +04:00
char * utf8_dn , * unix_dn ;
2003-06-16 06:42:00 +04:00
utf8_dn = ldap_get_dn ( ads - > ld , msg ) ;
2003-09-11 02:33:06 +04:00
if ( ! utf8_dn ) {
DEBUG ( 5 , ( " ads_get_dn: ldap_get_dn failed \n " ) ) ;
return NULL ;
}
2003-12-31 03:31:43 +03:00
if ( pull_utf8_allocate ( & unix_dn , utf8_dn ) = = ( size_t ) - 1 ) {
2003-09-11 02:33:06 +04:00
DEBUG ( 0 , ( " ads_get_dn: string conversion failure utf8 [%s] \n " ,
utf8_dn ) ) ;
return NULL ;
}
2002-07-15 14:35:28 +04:00
ldap_memfree ( utf8_dn ) ;
return unix_dn ;
2002-02-02 05:04:01 +03:00
}
2006-02-04 01:19:41 +03:00
/**
* Get a canonical dn from search results
* @ param ads connection to ads server
* @ param msg Search result
* @ return dn string
* */
char * ads_get_dn_canonical ( ADS_STRUCT * ads , void * msg )
{
# ifdef HAVE_LDAP_DN2AD_CANONICAL
return ldap_dn2ad_canonical ( ads_get_dn ( ads , msg ) ) ;
# else
return NULL ;
# endif
}
/**
* Get the parent from a dn
* @ param dn the dn to return the parent from
* @ return parent dn string
* */
char * ads_parent_dn ( const char * dn )
{
2006-06-18 13:45:18 +04:00
char * p ;
if ( dn = = NULL ) {
return NULL ;
}
p = strchr ( dn , ' , ' ) ;
2006-02-04 01:19:41 +03:00
if ( p = = NULL ) {
return NULL ;
}
return p + 1 ;
}
2002-04-10 17:28:03 +04:00
/**
* Find a machine account given a hostname
* @ param ads connection to ads server
* @ param res * * which will contain results - free res * with ads_msgfree ( )
* @ param host Hostname to search for
* @ return status of search
* */
2004-06-22 04:48:59 +04:00
ADS_STATUS ads_find_machine_acct ( ADS_STRUCT * ads , void * * res , const char * machine )
2001-11-20 11:54:15 +03:00
{
2001-12-19 15:21:12 +03:00
ADS_STATUS status ;
2003-04-15 21:06:51 +04:00
char * expr ;
2002-01-03 14:59:33 +03:00
const char * attrs [ ] = { " * " , " nTSecurityDescriptor " , NULL } ;
2001-11-20 11:54:15 +03:00
2004-11-15 21:57:22 +03:00
* res = NULL ;
2001-11-20 11:54:15 +03:00
/* the easiest way to find a machine account anywhere in the tree
is to look for hostname $ */
2004-06-22 04:48:59 +04:00
if ( asprintf ( & expr , " (samAccountName=%s$) " , machine ) = = - 1 ) {
2002-10-01 22:26:00 +04:00
DEBUG ( 1 , ( " asprintf failed! \n " ) ) ;
return ADS_ERROR_NT ( NT_STATUS_NO_MEMORY ) ;
}
2003-04-15 21:06:51 +04:00
status = ads_search ( ads , res , expr , attrs ) ;
2004-06-22 04:48:59 +04:00
SAFE_FREE ( expr ) ;
2001-12-19 15:21:12 +03:00
return status ;
2001-11-20 11:54:15 +03:00
}
2002-04-10 17:28:03 +04:00
/**
* Initialize a list of mods to be used in a modify request
* @ param ctx An initialized TALLOC_CTX
* @ return allocated ADS_MODLIST
* */
2002-02-12 21:22:33 +03:00
ADS_MODLIST ads_init_mods ( TALLOC_CTX * ctx )
2002-02-01 19:14:33 +03:00
{
2002-02-11 18:47:02 +03:00
# define ADS_MODLIST_ALLOC_SIZE 10
2002-02-01 19:14:33 +03:00
LDAPMod * * mods ;
2004-12-07 21:25:53 +03:00
if ( ( mods = TALLOC_ZERO_ARRAY ( ctx , LDAPMod * , ADS_MODLIST_ALLOC_SIZE + 1 ) ) )
2002-02-03 01:06:10 +03:00
/* -1 is safety to make sure we don't go over the end.
need to reset it to NULL before doing ldap modify */
2002-02-11 18:47:02 +03:00
mods [ ADS_MODLIST_ALLOC_SIZE ] = ( LDAPMod * ) - 1 ;
2002-02-01 19:14:33 +03:00
2005-03-22 19:39:09 +03:00
return ( ADS_MODLIST ) mods ;
2002-02-01 19:14:33 +03:00
}
2002-07-15 14:35:28 +04:00
2002-02-01 19:14:33 +03:00
/*
add an attribute to the list , with values list already constructed
*/
2002-02-12 21:22:33 +03:00
static ADS_STATUS ads_modlist_add ( TALLOC_CTX * ctx , ADS_MODLIST * mods ,
2002-07-15 14:35:28 +04:00
int mod_op , const char * name ,
2006-07-11 22:01:26 +04:00
const void * _invals )
2002-02-01 19:14:33 +03:00
{
2006-07-11 22:01:26 +04:00
const void * * invals = ( const void * * ) _invals ;
2002-02-01 19:14:33 +03:00
int curmod ;
2002-02-11 18:47:02 +03:00
LDAPMod * * modlist = ( LDAPMod * * ) * mods ;
2003-02-24 06:43:49 +03:00
struct berval * * ber_values = NULL ;
char * * char_values = NULL ;
2002-07-15 14:35:28 +04:00
if ( ! invals ) {
mod_op = LDAP_MOD_DELETE ;
} else {
if ( mod_op & LDAP_MOD_BVALUES )
2003-02-24 05:55:00 +03:00
ber_values = ads_dup_values ( ctx ,
( const struct berval * * ) invals ) ;
2002-07-15 14:35:28 +04:00
else
2003-02-24 05:55:00 +03:00
char_values = ads_push_strvals ( ctx ,
( const char * * ) invals ) ;
2002-07-15 14:35:28 +04:00
}
2002-02-01 19:14:33 +03:00
/* find the first empty slot */
2002-02-06 05:28:46 +03:00
for ( curmod = 0 ; modlist [ curmod ] & & modlist [ curmod ] ! = ( LDAPMod * ) - 1 ;
curmod + + ) ;
2002-02-11 18:47:02 +03:00
if ( modlist [ curmod ] = = ( LDAPMod * ) - 1 ) {
2004-12-07 21:25:53 +03:00
if ( ! ( modlist = TALLOC_REALLOC_ARRAY ( ctx , modlist , LDAPMod * ,
curmod + ADS_MODLIST_ALLOC_SIZE + 1 ) ) )
2002-02-11 18:47:02 +03:00
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
memset ( & modlist [ curmod ] , 0 ,
ADS_MODLIST_ALLOC_SIZE * sizeof ( LDAPMod * ) ) ;
modlist [ curmod + ADS_MODLIST_ALLOC_SIZE ] = ( LDAPMod * ) - 1 ;
2005-03-22 19:39:09 +03:00
* mods = ( ADS_MODLIST ) modlist ;
2002-02-11 18:47:02 +03:00
}
2002-02-06 05:28:46 +03:00
2004-12-07 21:25:53 +03:00
if ( ! ( modlist [ curmod ] = TALLOC_ZERO_P ( ctx , LDAPMod ) ) )
2002-02-03 01:06:10 +03:00
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
2002-07-15 14:35:28 +04:00
modlist [ curmod ] - > mod_type = talloc_strdup ( ctx , name ) ;
2003-02-24 05:55:00 +03:00
if ( mod_op & LDAP_MOD_BVALUES ) {
modlist [ curmod ] - > mod_bvalues = ber_values ;
} else if ( mod_op & LDAP_MOD_DELETE ) {
modlist [ curmod ] - > mod_values = NULL ;
} else {
modlist [ curmod ] - > mod_values = char_values ;
}
2002-02-01 20:13:39 +03:00
modlist [ curmod ] - > mod_op = mod_op ;
2002-02-03 01:06:10 +03:00
return ADS_ERROR ( LDAP_SUCCESS ) ;
2002-02-01 19:14:33 +03:00
}
2002-04-10 17:28:03 +04:00
/**
2002-07-15 14:35:28 +04:00
* Add a single string value to a mod list
2002-04-10 17:28:03 +04:00
* @ param ctx An initialized TALLOC_CTX
* @ param mods An initialized ADS_MODLIST
* @ param name The attribute name to add
2002-07-15 14:35:28 +04:00
* @ param val The value to add - NULL means DELETE
2002-04-10 17:28:03 +04:00
* @ return ADS STATUS indicating success of add
* */
2002-07-15 14:35:28 +04:00
ADS_STATUS ads_mod_str ( TALLOC_CTX * ctx , ADS_MODLIST * mods ,
const char * name , const char * val )
2002-02-01 19:14:33 +03:00
{
2002-09-25 19:19:00 +04:00
const char * values [ 2 ] ;
values [ 0 ] = val ;
values [ 1 ] = NULL ;
2002-07-15 14:35:28 +04:00
if ( ! val )
2002-02-12 21:22:33 +03:00
return ads_modlist_add ( ctx , mods , LDAP_MOD_DELETE , name , NULL ) ;
2006-07-11 22:01:26 +04:00
return ads_modlist_add ( ctx , mods , LDAP_MOD_REPLACE , name , values ) ;
2002-02-01 19:14:33 +03:00
}
2002-04-10 17:28:03 +04:00
/**
2002-07-15 14:35:28 +04:00
* Add an array of string values to a mod list
2002-04-10 17:28:03 +04:00
* @ param ctx An initialized TALLOC_CTX
* @ param mods An initialized ADS_MODLIST
* @ param name The attribute name to add
2002-07-15 14:35:28 +04:00
* @ param vals The array of string values to add - NULL means DELETE
2002-04-10 17:28:03 +04:00
* @ return ADS STATUS indicating success of add
* */
2002-07-15 14:35:28 +04:00
ADS_STATUS ads_mod_strlist ( TALLOC_CTX * ctx , ADS_MODLIST * mods ,
const char * name , const char * * vals )
2002-02-03 01:06:10 +03:00
{
2002-07-15 14:35:28 +04:00
if ( ! vals )
return ads_modlist_add ( ctx , mods , LDAP_MOD_DELETE , name , NULL ) ;
return ads_modlist_add ( ctx , mods , LDAP_MOD_REPLACE ,
name , ( const void * * ) vals ) ;
2002-02-01 19:14:33 +03:00
}
2006-05-13 08:39:19 +04:00
#if 0
2002-04-10 17:28:03 +04:00
/**
2002-07-15 14:35:28 +04:00
* Add a single ber - encoded value to a mod list
2002-04-10 17:28:03 +04:00
* @ param ctx An initialized TALLOC_CTX
* @ param mods An initialized ADS_MODLIST
* @ param name The attribute name to add
2002-07-15 14:35:28 +04:00
* @ param val The value to add - NULL means DELETE
2002-04-10 17:28:03 +04:00
* @ return ADS STATUS indicating success of add
* */
2002-07-15 14:35:28 +04:00
static ADS_STATUS ads_mod_ber ( TALLOC_CTX * ctx , ADS_MODLIST * mods ,
const char * name , const struct berval * val )
2002-02-12 21:22:33 +03:00
{
2002-09-25 19:19:00 +04:00
const struct berval * values [ 2 ] ;
values [ 0 ] = val ;
values [ 1 ] = NULL ;
2002-02-12 21:22:33 +03:00
if ( ! val )
2002-07-15 14:35:28 +04:00
return ads_modlist_add ( ctx , mods , LDAP_MOD_DELETE , name , NULL ) ;
return ads_modlist_add ( ctx , mods , LDAP_MOD_REPLACE | LDAP_MOD_BVALUES ,
name , ( const void * * ) values ) ;
2002-02-01 19:14:33 +03:00
}
2006-05-13 08:39:19 +04:00
# endif
2002-02-01 19:14:33 +03:00
2002-04-10 17:28:03 +04:00
/**
* Perform an ldap modify
* @ param ads connection to ads server
* @ param mod_dn DistinguishedName to modify
* @ param mods list of modifications to perform
* @ return status of modify
* */
2002-02-11 18:47:02 +03:00
ADS_STATUS ads_gen_mod ( ADS_STRUCT * ads , const char * mod_dn , ADS_MODLIST mods )
2002-02-01 19:14:33 +03:00
{
int ret , i ;
2002-07-15 14:35:28 +04:00
char * utf8_dn = NULL ;
2002-02-03 01:06:10 +03:00
/*
2002-02-06 05:28:46 +03:00
this control is needed to modify that contains a currently
non - existent attribute ( but allowable for the object ) to run
2002-02-03 01:06:10 +03:00
*/
2002-02-06 05:28:46 +03:00
LDAPControl PermitModify = {
2005-03-31 09:06:04 +04:00
CONST_DISCARD ( char * , ADS_PERMIT_MODIFY_OID ) ,
2002-02-06 05:28:46 +03:00
{ 0 , NULL } ,
( char ) 1 } ;
2002-03-04 04:07:02 +03:00
LDAPControl * controls [ 2 ] ;
controls [ 0 ] = & PermitModify ;
controls [ 1 ] = NULL ;
2002-02-03 01:06:10 +03:00
2002-10-01 22:26:00 +04:00
if ( push_utf8_allocate ( & utf8_dn , mod_dn ) = = - 1 ) {
return ADS_ERROR_NT ( NT_STATUS_NO_MEMORY ) ;
}
2002-07-15 14:35:28 +04:00
2002-02-01 19:14:33 +03:00
/* find the end of the list, marked by NULL or -1 */
2002-02-11 18:47:02 +03:00
for ( i = 0 ; ( mods [ i ] ! = 0 ) & & ( mods [ i ] ! = ( LDAPMod * ) - 1 ) ; i + + ) ;
2002-02-01 19:14:33 +03:00
/* make sure the end of the list is NULL */
mods [ i ] = NULL ;
2002-10-01 22:26:00 +04:00
ret = ldap_modify_ext_s ( ads - > ld , utf8_dn ,
2002-07-15 14:35:28 +04:00
( LDAPMod * * ) mods , controls , NULL ) ;
SAFE_FREE ( utf8_dn ) ;
2002-02-01 19:14:33 +03:00
return ADS_ERROR ( ret ) ;
}
2001-11-20 11:54:15 +03:00
2002-04-10 17:28:03 +04:00
/**
* Perform an ldap add
* @ param ads connection to ads server
* @ param new_dn DistinguishedName to add
* @ param mods list of attributes and values for DN
* @ return status of add
* */
2002-02-12 21:22:33 +03:00
ADS_STATUS ads_gen_add ( ADS_STRUCT * ads , const char * new_dn , ADS_MODLIST mods )
2001-11-20 11:54:15 +03:00
{
2002-07-15 14:35:28 +04:00
int ret , i ;
char * utf8_dn = NULL ;
2001-11-20 11:54:15 +03:00
2002-10-01 22:26:00 +04:00
if ( push_utf8_allocate ( & utf8_dn , new_dn ) = = - 1 ) {
DEBUG ( 1 , ( " ads_gen_add: push_utf8_allocate failed! " ) ) ;
return ADS_ERROR_NT ( NT_STATUS_NO_MEMORY ) ;
}
2002-07-15 14:35:28 +04:00
2002-02-12 21:22:33 +03:00
/* find the end of the list, marked by NULL or -1 */
for ( i = 0 ; ( mods [ i ] ! = 0 ) & & ( mods [ i ] ! = ( LDAPMod * ) - 1 ) ; i + + ) ;
/* make sure the end of the list is NULL */
2001-11-20 11:54:15 +03:00
mods [ i ] = NULL ;
2005-03-22 19:39:09 +03:00
ret = ldap_add_s ( ads - > ld , utf8_dn , ( LDAPMod * * ) mods ) ;
2002-07-15 14:35:28 +04:00
SAFE_FREE ( utf8_dn ) ;
return ADS_ERROR ( ret ) ;
2001-11-20 11:54:15 +03:00
}
2002-04-10 17:28:03 +04:00
/**
* Delete a DistinguishedName
* @ param ads connection to ads server
* @ param new_dn DistinguishedName to delete
* @ return status of delete
* */
2002-02-02 05:04:01 +03:00
ADS_STATUS ads_del_dn ( ADS_STRUCT * ads , char * del_dn )
{
2002-07-15 14:35:28 +04:00
int ret ;
char * utf8_dn = NULL ;
2002-10-01 22:26:00 +04:00
if ( push_utf8_allocate ( & utf8_dn , del_dn ) = = - 1 ) {
DEBUG ( 1 , ( " ads_del_dn: push_utf8_allocate failed! " ) ) ;
return ADS_ERROR_NT ( NT_STATUS_NO_MEMORY ) ;
}
2003-07-07 06:50:09 +04:00
ret = ldap_delete_s ( ads - > ld , utf8_dn ) ;
2002-07-15 14:35:28 +04:00
return ADS_ERROR ( ret ) ;
2002-02-02 05:04:01 +03:00
}
2002-04-10 17:28:03 +04:00
/**
* Build an org unit string
* if org unit is Computers or blank then assume a container , otherwise
2006-04-06 05:46:01 +04:00
* assume a / separated list of organisational units .
* jmcd : ' \ ' is now used for escapes so certain chars can be in the ou ( e . g . # )
2004-10-06 20:21:35 +04:00
* @ param ads connection to ads server
2002-04-10 17:28:03 +04:00
* @ param org_unit Organizational unit
* @ return org unit string - caller must free
* */
2004-10-06 20:21:35 +04:00
char * ads_ou_string ( ADS_STRUCT * ads , const char * org_unit )
{
char * ret = NULL ;
if ( ! org_unit | | ! * org_unit ) {
ret = ads_default_ou_string ( ads , WELL_KNOWN_GUID_COMPUTERS ) ;
/* samba4 might not yet respond to a wellknownobject-query */
2004-12-07 21:25:53 +03:00
return ret ? ret : SMB_STRDUP ( " cn=Computers " ) ;
2004-10-06 20:21:35 +04:00
}
if ( strequal ( org_unit , " Computers " ) ) {
2004-12-07 21:25:53 +03:00
return SMB_STRDUP ( " cn=Computers " ) ;
2002-01-16 05:22:30 +03:00
}
2006-04-06 05:46:01 +04:00
/* jmcd: removed "\\" from the separation chars, because it is
needed as an escape for chars like ' # ' which are valid in an
OU name */
return ads_build_path ( org_unit , " / " , " ou= " , 1 ) ;
2002-01-16 05:22:30 +03:00
}
2004-10-06 20:21:35 +04:00
/**
* Get a org unit string for a well - known GUID
* @ param ads connection to ads server
* @ param wknguid Well known GUID
* @ return org unit string - caller must free
* */
char * ads_default_ou_string ( ADS_STRUCT * ads , const char * wknguid )
{
ADS_STATUS status ;
void * res ;
char * base , * wkn_dn , * ret , * * wkn_dn_exp , * * bind_dn_exp ;
const char * attrs [ ] = { " distinguishedName " , NULL } ;
int new_ln , wkn_ln , bind_ln , i ;
if ( wknguid = = NULL ) {
return NULL ;
}
if ( asprintf ( & base , " <WKGUID=%s,%s> " , wknguid , ads - > config . bind_path ) = = - 1 ) {
DEBUG ( 1 , ( " asprintf failed! \n " ) ) ;
return NULL ;
}
status = ads_search_dn ( ads , & res , base , attrs ) ;
if ( ! ADS_ERR_OK ( status ) ) {
DEBUG ( 1 , ( " Failed while searching for: %s \n " , base ) ) ;
2006-06-13 17:41:04 +04:00
SAFE_FREE ( base ) ;
2004-10-06 20:21:35 +04:00
return NULL ;
}
2006-06-13 17:41:04 +04:00
SAFE_FREE ( base ) ;
2004-10-06 20:21:35 +04:00
if ( ads_count_replies ( ads , res ) ! = 1 ) {
return NULL ;
}
/* substitute the bind-path from the well-known-guid-search result */
wkn_dn = ads_get_dn ( ads , res ) ;
wkn_dn_exp = ldap_explode_dn ( wkn_dn , 0 ) ;
bind_dn_exp = ldap_explode_dn ( ads - > config . bind_path , 0 ) ;
for ( wkn_ln = 0 ; wkn_dn_exp [ wkn_ln ] ; wkn_ln + + )
;
for ( bind_ln = 0 ; bind_dn_exp [ bind_ln ] ; bind_ln + + )
;
new_ln = wkn_ln - bind_ln ;
ret = wkn_dn_exp [ 0 ] ;
for ( i = 1 ; i < new_ln ; i + + ) {
char * s ;
asprintf ( & s , " %s,%s " , ret , wkn_dn_exp [ i ] ) ;
2004-12-07 21:25:53 +03:00
ret = SMB_STRDUP ( s ) ;
2004-10-06 20:21:35 +04:00
free ( s ) ;
}
2006-06-13 17:41:04 +04:00
ads_memfree ( ads , wkn_dn ) ;
ldap_value_free ( wkn_dn_exp ) ;
ldap_value_free ( bind_dn_exp ) ;
2004-10-06 20:21:35 +04:00
return ret ;
}
2004-06-22 04:48:59 +04:00
/**
* Adds ( appends ) an item to an attribute array , rather then
* replacing the whole list
* @ param ctx An initialized TALLOC_CTX
* @ param mods An initialized ADS_MODLIST
* @ param name name of the ldap attribute to append to
* @ param vals an array of values to add
* @ return status of addition
* */
2002-01-16 05:22:30 +03:00
2004-06-22 04:48:59 +04:00
ADS_STATUS ads_add_strlist ( TALLOC_CTX * ctx , ADS_MODLIST * mods ,
const char * name , const char * * vals )
{
return ads_modlist_add ( ctx , mods , LDAP_MOD_ADD , name , ( const void * * ) vals ) ;
}
2002-01-16 05:22:30 +03:00
2004-06-22 04:48:59 +04:00
/**
* Determines the computer account ' s current KVNO via an LDAP lookup
* @ param ads An initialized ADS_STRUCT
* @ param machine_name the NetBIOS name of the computer , which is used to identify the computer account .
* @ return the kvno for the computer account , or - 1 in case of a failure .
* */
uint32 ads_get_kvno ( ADS_STRUCT * ads , const char * machine_name )
{
2004-06-23 04:20:31 +04:00
LDAPMessage * res = NULL ;
2004-06-22 04:48:59 +04:00
uint32 kvno = ( uint32 ) - 1 ; /* -1 indicates a failure */
char * filter ;
const char * attrs [ ] = { " msDS-KeyVersionNumber " , NULL } ;
char * dn_string = NULL ;
ADS_STATUS ret = ADS_ERROR ( LDAP_SUCCESS ) ;
DEBUG ( 5 , ( " ads_get_kvno: Searching for host %s \n " , machine_name ) ) ;
if ( asprintf ( & filter , " (samAccountName=%s$) " , machine_name ) = = - 1 ) {
return kvno ;
}
2005-12-03 09:46:46 +03:00
ret = ads_search ( ads , ( void * * ) ( void * ) & res , filter , attrs ) ;
2004-06-22 04:48:59 +04:00
SAFE_FREE ( filter ) ;
if ( ! ADS_ERR_OK ( ret ) & & ads_count_replies ( ads , res ) ) {
DEBUG ( 1 , ( " ads_get_kvno: Computer Account For %s not found. \n " , machine_name ) ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return kvno ;
}
dn_string = ads_get_dn ( ads , res ) ;
if ( ! dn_string ) {
DEBUG ( 0 , ( " ads_get_kvno: out of memory. \n " ) ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return kvno ;
}
DEBUG ( 5 , ( " ads_get_kvno: Using: %s \n " , dn_string ) ) ;
ads_memfree ( ads , dn_string ) ;
/* ---------------------------------------------------------
* 0 is returned as a default KVNO from this point on . . .
* This is done because Windows 2000 does not support key
* version numbers . Chances are that a failure in the next
* step is simply due to Windows 2000 being used for a
* domain controller . */
kvno = 0 ;
if ( ! ads_pull_uint32 ( ads , res , " msDS-KeyVersionNumber " , & kvno ) ) {
DEBUG ( 3 , ( " ads_get_kvno: Error Determining KVNO! \n " ) ) ;
DEBUG ( 3 , ( " ads_get_kvno: Windows 2000 does not support KVNO's, so this may be normal. \n " ) ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return kvno ;
}
/* Success */
DEBUG ( 5 , ( " ads_get_kvno: Looked Up KVNO of: %d \n " , kvno ) ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return kvno ;
}
/**
* This clears out all registered spn ' s for a given hostname
* @ param ads An initilaized ADS_STRUCT
* @ param machine_name the NetBIOS name of the computer .
* @ return 0 upon success , non - zero otherwise .
* */
ADS_STATUS ads_clear_service_principal_names ( ADS_STRUCT * ads , const char * machine_name )
{
TALLOC_CTX * ctx ;
2004-06-23 04:20:31 +04:00
LDAPMessage * res = NULL ;
2004-06-22 04:48:59 +04:00
ADS_MODLIST mods ;
const char * servicePrincipalName [ 1 ] = { NULL } ;
ADS_STATUS ret = ADS_ERROR ( LDAP_SUCCESS ) ;
char * dn_string = NULL ;
2005-12-03 09:46:46 +03:00
ret = ads_find_machine_acct ( ads , ( void * * ) ( void * ) & res , machine_name ) ;
2004-06-22 04:48:59 +04:00
if ( ! ADS_ERR_OK ( ret ) | | ads_count_replies ( ads , res ) ! = 1 ) {
DEBUG ( 5 , ( " ads_clear_service_principal_names: WARNING: Host Account for %s not found... skipping operation. \n " , machine_name ) ) ;
DEBUG ( 5 , ( " ads_clear_service_principal_names: WARNING: Service Principals for %s have NOT been cleared. \n " , machine_name ) ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return ADS_ERROR ( LDAP_NO_SUCH_OBJECT ) ;
}
DEBUG ( 5 , ( " ads_clear_service_principal_names: Host account for %s found \n " , machine_name ) ) ;
ctx = talloc_init ( " ads_clear_service_principal_names " ) ;
if ( ! ctx ) {
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
if ( ! ( mods = ads_init_mods ( ctx ) ) ) {
talloc_destroy ( ctx ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
ret = ads_mod_strlist ( ctx , & mods , " servicePrincipalName " , servicePrincipalName ) ;
if ( ! ADS_ERR_OK ( ret ) ) {
DEBUG ( 1 , ( " ads_clear_service_principal_names: Error creating strlist. \n " ) ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
talloc_destroy ( ctx ) ;
return ret ;
}
dn_string = ads_get_dn ( ads , res ) ;
if ( ! dn_string ) {
talloc_destroy ( ctx ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
ret = ads_gen_mod ( ads , dn_string , mods ) ;
ads_memfree ( ads , dn_string ) ;
if ( ! ADS_ERR_OK ( ret ) ) {
DEBUG ( 1 , ( " ads_clear_service_principal_names: Error: Updating Service Principals for machine %s in LDAP \n " ,
machine_name ) ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
talloc_destroy ( ctx ) ;
return ret ;
}
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
talloc_destroy ( ctx ) ;
return ret ;
}
/**
* This adds a service principal name to an existing computer account
* ( found by hostname ) in AD .
* @ param ads An initialized ADS_STRUCT
* @ param machine_name the NetBIOS name of the computer , which is used to identify the computer account .
2006-07-11 22:45:22 +04:00
* @ param my_fqdn The fully qualified DNS name of the machine
2004-06-22 04:48:59 +04:00
* @ param spn A string of the service principal to add , i . e . ' host '
* @ return 0 upon sucess , or non - zero if a failure occurs
* */
2006-07-11 22:45:22 +04:00
ADS_STATUS ads_add_service_principal_name ( ADS_STRUCT * ads , const char * machine_name ,
const char * my_fqdn , const char * spn )
2004-06-22 04:48:59 +04:00
{
ADS_STATUS ret ;
TALLOC_CTX * ctx ;
2004-06-23 04:20:31 +04:00
LDAPMessage * res = NULL ;
2006-07-11 22:45:22 +04:00
char * psp1 , * psp2 ;
2004-06-22 04:48:59 +04:00
ADS_MODLIST mods ;
char * dn_string = NULL ;
2006-07-11 22:45:22 +04:00
const char * servicePrincipalName [ 3 ] = { NULL , NULL , NULL } ;
2004-06-22 04:48:59 +04:00
2005-12-03 09:46:46 +03:00
ret = ads_find_machine_acct ( ads , ( void * * ) ( void * ) & res , machine_name ) ;
2004-06-22 04:48:59 +04:00
if ( ! ADS_ERR_OK ( ret ) | | ads_count_replies ( ads , res ) ! = 1 ) {
DEBUG ( 1 , ( " ads_add_service_principal_name: WARNING: Host Account for %s not found... skipping operation. \n " ,
machine_name ) ) ;
DEBUG ( 1 , ( " ads_add_service_principal_name: WARNING: Service Principal '%s/%s@%s' has NOT been added. \n " ,
spn , machine_name , ads - > config . realm ) ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return ADS_ERROR ( LDAP_NO_SUCH_OBJECT ) ;
}
DEBUG ( 1 , ( " ads_add_service_principal_name: Host account for %s found \n " , machine_name ) ) ;
if ( ! ( ctx = talloc_init ( " ads_add_service_principal_name " ) ) ) {
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
2006-07-11 22:45:22 +04:00
/* add short name spn */
if ( ( psp1 = talloc_asprintf ( ctx , " %s/%s " , spn , machine_name ) ) = = NULL ) {
2006-06-17 03:21:36 +04:00
talloc_destroy ( ctx ) ;
ads_msgfree ( ads , res ) ;
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
2004-06-22 04:48:59 +04:00
strupper_m ( psp1 ) ;
strlower_m ( & psp1 [ strlen ( spn ) ] ) ;
servicePrincipalName [ 0 ] = psp1 ;
2006-07-11 22:45:22 +04:00
DEBUG ( 5 , ( " ads_add_service_principal_name: INFO: Adding %s to host %s \n " ,
psp1 , machine_name ) ) ;
2006-06-17 03:21:36 +04:00
2006-07-11 22:45:22 +04:00
/* add fully qualified spn */
if ( ( psp2 = talloc_asprintf ( ctx , " %s/%s " , spn , my_fqdn ) ) = = NULL ) {
ret = ADS_ERROR ( LDAP_NO_MEMORY ) ;
goto out ;
}
2004-06-22 04:48:59 +04:00
strupper_m ( psp2 ) ;
strlower_m ( & psp2 [ strlen ( spn ) ] ) ;
servicePrincipalName [ 1 ] = psp2 ;
2006-07-11 22:45:22 +04:00
DEBUG ( 5 , ( " ads_add_service_principal_name: INFO: Adding %s to host %s \n " ,
psp2 , machine_name ) ) ;
2006-06-17 03:21:36 +04:00
2006-07-11 22:45:22 +04:00
if ( ( mods = ads_init_mods ( ctx ) ) = = NULL ) {
ret = ADS_ERROR ( LDAP_NO_MEMORY ) ;
goto out ;
2004-06-22 04:48:59 +04:00
}
2006-07-11 22:45:22 +04:00
2004-06-22 04:48:59 +04:00
ret = ads_add_strlist ( ctx , & mods , " servicePrincipalName " , servicePrincipalName ) ;
if ( ! ADS_ERR_OK ( ret ) ) {
DEBUG ( 1 , ( " ads_add_service_principal_name: Error: Updating Service Principals in LDAP \n " ) ) ;
2006-07-11 22:45:22 +04:00
goto out ;
2004-06-22 04:48:59 +04:00
}
2006-07-11 22:45:22 +04:00
if ( ( dn_string = ads_get_dn ( ads , res ) ) = = NULL ) {
ret = ADS_ERROR ( LDAP_NO_MEMORY ) ;
goto out ;
2004-06-22 04:48:59 +04:00
}
2006-07-11 22:45:22 +04:00
2004-06-23 04:20:31 +04:00
ret = ads_gen_mod ( ads , dn_string , mods ) ;
2004-06-22 04:48:59 +04:00
ads_memfree ( ads , dn_string ) ;
if ( ! ADS_ERR_OK ( ret ) ) {
DEBUG ( 1 , ( " ads_add_service_principal_name: Error: Updating Service Principals in LDAP \n " ) ) ;
2006-07-11 22:45:22 +04:00
goto out ;
2004-06-22 04:48:59 +04:00
}
2006-07-11 22:45:22 +04:00
out :
TALLOC_FREE ( ctx ) ;
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2004-06-22 04:48:59 +04:00
return ret ;
}
/**
* adds a machine account to the ADS server
* @ param ads An intialized ADS_STRUCT
* @ param machine_name - the NetBIOS machine name of this account .
* @ param account_type A number indicating the type of account to create
* @ param org_unit The LDAP path in which to place this account
* @ return 0 upon success , or non - zero otherwise
* */
2006-05-13 08:39:19 +04:00
ADS_STATUS ads_create_machine_acct ( ADS_STRUCT * ads , const char * machine_name ,
const char * org_unit )
2001-11-20 11:54:15 +03:00
{
2006-05-13 08:39:19 +04:00
ADS_STATUS ret ;
char * samAccountName , * controlstr ;
2002-02-12 21:22:33 +03:00
TALLOC_CTX * ctx ;
ADS_MODLIST mods ;
2006-05-13 08:39:19 +04:00
char * new_dn ;
2002-07-15 14:35:28 +04:00
const char * objectClass [ ] = { " top " , " person " , " organizationalPerson " ,
" user " , " computer " , NULL } ;
2004-06-23 04:20:31 +04:00
LDAPMessage * res = NULL ;
2006-05-13 08:39:19 +04:00
uint32 acct_control = ( UF_WORKSTATION_TRUST_ACCOUNT | \
UF_DONT_EXPIRE_PASSWD | \
UF_ACCOUNTDISABLE ) ;
2004-06-22 04:48:59 +04:00
if ( ! ( ctx = talloc_init ( " ads_add_machine_acct " ) ) )
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
ret = ADS_ERROR ( LDAP_NO_MEMORY ) ;
2006-05-13 08:39:19 +04:00
new_dn = talloc_asprintf ( ctx , " cn=%s,%s " , machine_name , org_unit ) ;
samAccountName = talloc_asprintf ( ctx , " %s$ " , machine_name ) ;
2004-06-22 04:48:59 +04:00
2006-05-13 08:39:19 +04:00
if ( ! new_dn | | ! samAccountName ) {
2002-02-12 21:22:33 +03:00
goto done ;
2004-06-22 04:48:59 +04:00
}
2006-05-13 08:39:19 +04:00
2002-10-29 17:47:11 +03:00
# ifndef ENCTYPE_ARCFOUR_HMAC
acct_control | = UF_USE_DES_KEY_ONLY ;
# endif
2003-06-16 06:42:00 +04:00
2004-06-22 04:48:59 +04:00
if ( ! ( controlstr = talloc_asprintf ( ctx , " %u " , acct_control ) ) ) {
2002-02-12 21:22:33 +03:00
goto done ;
2004-06-22 04:48:59 +04:00
}
2002-02-12 21:22:33 +03:00
2004-06-22 04:48:59 +04:00
if ( ! ( mods = ads_init_mods ( ctx ) ) ) {
2002-02-12 21:22:33 +03:00
goto done ;
2004-06-22 04:48:59 +04:00
}
2006-05-13 08:39:19 +04:00
ads_mod_str ( ctx , & mods , " cn " , machine_name ) ;
ads_mod_str ( ctx , & mods , " sAMAccountName " , samAccountName ) ;
ads_mod_strlist ( ctx , & mods , " objectClass " , objectClass ) ;
2006-03-07 19:56:31 +03:00
ads_mod_str ( ctx , & mods , " userAccountControl " , controlstr ) ;
2003-02-19 15:31:16 +03:00
2006-05-13 08:39:19 +04:00
ret = ads_gen_add ( ads , new_dn , mods ) ;
2003-02-19 15:31:16 +03:00
2002-02-12 21:22:33 +03:00
done :
2004-06-23 04:20:31 +04:00
ads_msgfree ( ads , res ) ;
2002-02-12 21:22:33 +03:00
talloc_destroy ( ctx ) ;
2006-05-13 08:39:19 +04:00
2001-11-20 11:54:15 +03:00
return ret ;
}
2001-11-25 04:06:56 +03:00
/*
dump a binary result from ldap
*/
static void dump_binary ( const char * field , struct berval * * values )
{
int i , j ;
for ( i = 0 ; values [ i ] ; i + + ) {
printf ( " %s: " , field ) ;
for ( j = 0 ; j < values [ i ] - > bv_len ; j + + ) {
printf ( " %02X " , ( unsigned char ) values [ i ] - > bv_val [ j ] ) ;
}
printf ( " \n " ) ;
}
}
2002-10-29 17:47:11 +03:00
static void dump_guid ( const char * field , struct berval * * values )
{
int i ;
2004-04-13 18:39:48 +04:00
UUID_FLAT guid ;
2002-10-29 17:47:11 +03:00
for ( i = 0 ; values [ i ] ; i + + ) {
memcpy ( guid . info , values [ i ] - > bv_val , sizeof ( guid . info ) ) ;
2004-04-13 18:39:48 +04:00
printf ( " %s: %s \n " , field ,
smb_uuid_string_static ( smb_uuid_unpack_static ( guid ) ) ) ;
2002-10-29 17:47:11 +03:00
}
}
2001-12-19 11:44:23 +03:00
/*
dump a sid result from ldap
*/
static void dump_sid ( const char * field , struct berval * * values )
{
int i ;
for ( i = 0 ; values [ i ] ; i + + ) {
DOM_SID sid ;
sid_parse ( values [ i ] - > bv_val , values [ i ] - > bv_len , & sid ) ;
printf ( " %s: %s \n " , field , sid_string_static ( & sid ) ) ;
}
}
2002-03-10 04:54:44 +03:00
/*
dump ntSecurityDescriptor
*/
static void dump_sd ( const char * filed , struct berval * * values )
{
prs_struct ps ;
SEC_DESC * psd = 0 ;
TALLOC_CTX * ctx = 0 ;
2002-12-20 23:21:31 +03:00
if ( ! ( ctx = talloc_init ( " sec_io_desc " ) ) )
2002-03-10 04:54:44 +03:00
return ;
/* prepare data */
prs_init ( & ps , values [ 0 ] - > bv_len , ctx , UNMARSHALL ) ;
2003-02-15 01:55:46 +03:00
prs_copy_data_in ( & ps , values [ 0 ] - > bv_val , values [ 0 ] - > bv_len ) ;
prs_set_offset ( & ps , 0 ) ;
2002-03-10 04:54:44 +03:00
/* parse secdesc */
if ( ! sec_io_desc ( " sd " , & psd , & ps , 1 ) ) {
prs_mem_free ( & ps ) ;
talloc_destroy ( ctx ) ;
return ;
}
if ( psd ) ads_disp_sd ( psd ) ;
prs_mem_free ( & ps ) ;
talloc_destroy ( ctx ) ;
}
2001-11-25 04:06:56 +03:00
/*
dump a string result from ldap
*/
2002-07-15 14:35:28 +04:00
static void dump_string ( const char * field , char * * values )
2001-11-25 04:06:56 +03:00
{
int i ;
for ( i = 0 ; values [ i ] ; i + + ) {
2002-07-15 14:35:28 +04:00
printf ( " %s: %s \n " , field , values [ i ] ) ;
2001-11-25 04:06:56 +03:00
}
}
2001-11-20 11:54:15 +03:00
/*
2002-03-30 00:06:33 +03:00
dump a field from LDAP on stdout
2001-11-20 11:54:15 +03:00
used for debugging
*/
2002-03-30 00:06:33 +03:00
2002-07-15 14:35:28 +04:00
static BOOL ads_dump_field ( char * field , void * * values , void * data_area )
2001-11-20 11:54:15 +03:00
{
2003-01-03 11:28:12 +03:00
const struct {
const char * name ;
2002-07-15 14:35:28 +04:00
BOOL string ;
2001-11-25 04:06:56 +03:00
void ( * handler ) ( const char * , struct berval * * ) ;
} handlers [ ] = {
2002-10-29 17:47:11 +03:00
{ " objectGUID " , False , dump_guid } ,
2006-02-09 13:24:27 +03:00
{ " netbootGUID " , False , dump_guid } ,
2002-07-15 14:35:28 +04:00
{ " nTSecurityDescriptor " , False , dump_sd } ,
2002-08-17 21:00:51 +04:00
{ " dnsRecord " , False , dump_binary } ,
2002-07-15 14:35:28 +04:00
{ " objectSid " , False , dump_sid } ,
2003-03-18 01:41:14 +03:00
{ " tokenGroups " , False , dump_sid } ,
2006-04-26 00:13:05 +04:00
{ " tokenGroupsNoGCAcceptable " , False , dump_sid } ,
{ " tokengroupsGlobalandUniversal " , False , dump_sid } ,
2002-07-15 14:35:28 +04:00
{ NULL , True , NULL }
2001-11-25 04:06:56 +03:00
} ;
2002-03-30 00:06:33 +03:00
int i ;
if ( ! field ) { /* must be end of an entry */
printf ( " \n " ) ;
2002-07-15 14:35:28 +04:00
return False ;
2002-03-30 00:06:33 +03:00
}
for ( i = 0 ; handlers [ i ] . name ; i + + ) {
if ( StrCaseCmp ( handlers [ i ] . name , field ) = = 0 ) {
2002-07-15 14:35:28 +04:00
if ( ! values ) /* first time, indicate string or not */
return handlers [ i ] . string ;
2002-03-30 00:06:33 +03:00
handlers [ i ] . handler ( field , ( struct berval * * ) values ) ;
break ;
}
}
if ( ! handlers [ i ] . name ) {
2002-07-15 14:35:28 +04:00
if ( ! values ) /* first time, indicate string conversion */
return True ;
dump_string ( field , ( char * * ) values ) ;
2002-03-30 00:06:33 +03:00
}
2002-07-15 14:35:28 +04:00
return False ;
2002-03-30 00:06:33 +03:00
}
2002-04-10 17:28:03 +04:00
/**
* Dump a result from LDAP on stdout
* used for debugging
* @ param ads connection to ads server
* @ param res Results to dump
* */
2002-03-30 00:06:33 +03:00
void ads_dump ( ADS_STRUCT * ads , void * res )
{
ads_process_results ( ads , res , ads_dump_field , NULL ) ;
}
2002-04-10 17:28:03 +04:00
/**
* Walk through results , calling a function for each entry found .
* The function receives a field name , a berval * array of values ,
* and a data area passed through from the start . The function is
* called once with null for field and values at the end of each
* entry .
* @ param ads connection to ads server
* @ param res Results to process
* @ param fn Function for processing each result
* @ param data_area user - defined area to pass to function
* */
2002-03-30 00:06:33 +03:00
void ads_process_results ( ADS_STRUCT * ads , void * res ,
2002-07-15 14:35:28 +04:00
BOOL ( * fn ) ( char * , void * * , void * ) ,
2002-03-30 00:06:33 +03:00
void * data_area )
{
void * msg ;
2002-07-15 14:35:28 +04:00
TALLOC_CTX * ctx ;
2002-12-20 23:21:31 +03:00
if ( ! ( ctx = talloc_init ( " ads_process_results " ) ) )
2002-07-15 14:35:28 +04:00
return ;
2002-03-30 00:06:33 +03:00
for ( msg = ads_first_entry ( ads , res ) ; msg ;
msg = ads_next_entry ( ads , msg ) ) {
2002-07-15 14:35:28 +04:00
char * utf8_field ;
2002-03-30 00:06:33 +03:00
BerElement * b ;
2002-07-15 14:35:28 +04:00
for ( utf8_field = ldap_first_attribute ( ads - > ld ,
( LDAPMessage * ) msg , & b ) ;
utf8_field ;
utf8_field = ldap_next_attribute ( ads - > ld ,
( LDAPMessage * ) msg , b ) ) {
struct berval * * ber_vals ;
char * * str_vals , * * utf8_vals ;
char * field ;
BOOL string ;
2002-08-17 21:00:51 +04:00
pull_utf8_talloc ( ctx , & field , utf8_field ) ;
2002-07-15 14:35:28 +04:00
string = fn ( field , NULL , data_area ) ;
if ( string ) {
utf8_vals = ldap_get_values ( ads - > ld ,
( LDAPMessage * ) msg , field ) ;
str_vals = ads_pull_strvals ( ctx ,
( const char * * ) utf8_vals ) ;
fn ( field , ( void * * ) str_vals , data_area ) ;
ldap_value_free ( utf8_vals ) ;
} else {
ber_vals = ldap_get_values_len ( ads - > ld ,
( LDAPMessage * ) msg , field ) ;
fn ( field , ( void * * ) ber_vals , data_area ) ;
ldap_value_free_len ( ber_vals ) ;
}
ldap_memfree ( utf8_field ) ;
2001-11-20 11:54:15 +03:00
}
2002-03-30 00:06:33 +03:00
ber_free ( b , 0 ) ;
2005-05-03 11:33:49 +04:00
talloc_free_children ( ctx ) ;
2002-03-30 00:06:33 +03:00
fn ( NULL , NULL , data_area ) ; /* completed an entry */
2001-11-20 11:54:15 +03:00
}
2002-07-15 14:35:28 +04:00
talloc_destroy ( ctx ) ;
2001-11-20 11:54:15 +03:00
}
2002-04-10 17:28:03 +04:00
/**
* count how many replies are in a LDAPMessage
* @ param ads connection to ads server
* @ param res Results to count
* @ return number of replies
* */
2001-11-20 11:54:15 +03:00
int ads_count_replies ( ADS_STRUCT * ads , void * res )
{
return ldap_count_entries ( ads - > ld , ( LDAPMessage * ) res ) ;
}
2002-04-10 17:28:03 +04:00
/**
* pull the first entry from a ADS result
* @ param ads connection to ads server
* @ param res Results of search
* @ return first entry from result
* */
2001-12-03 09:04:18 +03:00
void * ads_first_entry ( ADS_STRUCT * ads , void * res )
{
return ( void * ) ldap_first_entry ( ads - > ld , ( LDAPMessage * ) res ) ;
}
2002-04-10 17:28:03 +04:00
/**
* pull the next entry from a ADS result
* @ param ads connection to ads server
* @ param res Results of search
* @ return next entry from result
* */
2001-12-03 09:04:18 +03:00
void * ads_next_entry ( ADS_STRUCT * ads , void * res )
{
return ( void * ) ldap_next_entry ( ads - > ld , ( LDAPMessage * ) res ) ;
}
2002-04-10 17:28:03 +04:00
/**
* pull a single string from a ADS result
* @ param ads connection to ads server
* @ param mem_ctx TALLOC_CTX to use for allocating result string
* @ param msg Results of search
* @ param field Attribute to retrieve
* @ return Result string in talloc context
* */
2001-12-03 09:04:18 +03:00
char * ads_pull_string ( ADS_STRUCT * ads ,
TALLOC_CTX * mem_ctx , void * msg , const char * field )
{
char * * values ;
2001-12-05 10:35:57 +03:00
char * ret = NULL ;
2002-07-15 14:35:28 +04:00
char * ux_string ;
2003-02-24 05:55:00 +03:00
size_t rc ;
2001-12-03 09:04:18 +03:00
values = ldap_get_values ( ads - > ld , msg , field ) ;
2003-02-05 02:44:28 +03:00
if ( ! values )
return NULL ;
2001-12-05 10:35:57 +03:00
if ( values [ 0 ] ) {
2002-08-17 21:00:51 +04:00
rc = pull_utf8_talloc ( mem_ctx , & ux_string ,
2002-07-15 14:35:28 +04:00
values [ 0 ] ) ;
2003-02-24 05:55:00 +03:00
if ( rc ! = ( size_t ) - 1 )
2002-07-15 14:35:28 +04:00
ret = ux_string ;
2001-12-05 10:35:57 +03:00
}
2001-12-03 09:04:18 +03:00
ldap_value_free ( values ) ;
return ret ;
}
2002-07-15 14:35:28 +04:00
/**
* pull an array of strings from a ADS result
* @ param ads connection to ads server
* @ param mem_ctx TALLOC_CTX to use for allocating result string
* @ param msg Results of search
* @ param field Attribute to retrieve
* @ return Result strings in talloc context
* */
char * * ads_pull_strings ( ADS_STRUCT * ads ,
2004-01-05 04:48:21 +03:00
TALLOC_CTX * mem_ctx , void * msg , const char * field ,
size_t * num_values )
2002-07-15 14:35:28 +04:00
{
char * * values ;
char * * ret = NULL ;
2004-01-05 04:48:21 +03:00
int i ;
2002-07-15 14:35:28 +04:00
values = ldap_get_values ( ads - > ld , msg , field ) ;
2003-02-05 02:44:28 +03:00
if ( ! values )
return NULL ;
2002-07-15 14:35:28 +04:00
2004-01-05 04:48:21 +03:00
* num_values = ldap_count_values ( values ) ;
2002-07-15 14:35:28 +04:00
2004-12-07 21:25:53 +03:00
ret = TALLOC_ARRAY ( mem_ctx , char * , * num_values + 1 ) ;
2003-02-05 02:44:28 +03:00
if ( ! ret ) {
ldap_value_free ( values ) ;
return NULL ;
}
2002-07-15 14:35:28 +04:00
2004-01-05 04:48:21 +03:00
for ( i = 0 ; i < * num_values ; i + + ) {
2002-08-17 21:00:51 +04:00
if ( pull_utf8_talloc ( mem_ctx , & ret [ i ] , values [ i ] ) = = - 1 ) {
2003-02-05 02:44:28 +03:00
ldap_value_free ( values ) ;
2002-07-15 14:35:28 +04:00
return NULL ;
}
}
ret [ i ] = NULL ;
ldap_value_free ( values ) ;
return ret ;
}
2004-01-05 04:48:21 +03:00
/**
* pull an array of strings from a ADS result
* ( handle large multivalue attributes with range retrieval )
* @ param ads connection to ads server
* @ param mem_ctx TALLOC_CTX to use for allocating result string
* @ param msg Results of search
* @ param field Attribute to retrieve
* @ param current_strings strings returned by a previous call to this function
* @ param next_attribute The next query should ask for this attribute
* @ param num_values How many values did we get this time ?
* @ param more_values Are there more values to get ?
* @ return Result strings in talloc context
* */
char * * ads_pull_strings_range ( ADS_STRUCT * ads ,
TALLOC_CTX * mem_ctx ,
void * msg , const char * field ,
char * * current_strings ,
const char * * next_attribute ,
size_t * num_strings ,
BOOL * more_strings )
{
char * attr ;
char * expected_range_attrib , * range_attr ;
BerElement * ptr = NULL ;
char * * strings ;
char * * new_strings ;
size_t num_new_strings ;
unsigned long int range_start ;
unsigned long int range_end ;
/* we might have been given the whole lot anyway */
if ( ( strings = ads_pull_strings ( ads , mem_ctx , msg , field , num_strings ) ) ) {
* more_strings = False ;
return strings ;
}
expected_range_attrib = talloc_asprintf ( mem_ctx , " %s;Range= " , field ) ;
/* look for Range result */
for ( attr = ldap_first_attribute ( ads - > ld , ( LDAPMessage * ) msg , & ptr ) ;
attr ;
attr = ldap_next_attribute ( ads - > ld , ( LDAPMessage * ) msg , ptr ) ) {
/* we ignore the fact that this is utf8, as all attributes are ascii... */
if ( strnequal ( attr , expected_range_attrib , strlen ( expected_range_attrib ) ) ) {
range_attr = attr ;
break ;
}
ldap_memfree ( attr ) ;
}
if ( ! attr ) {
ber_free ( ptr , 0 ) ;
2004-02-08 03:31:36 +03:00
/* nothing here - this field is just empty */
2004-01-05 04:48:21 +03:00
* more_strings = False ;
return NULL ;
}
if ( sscanf ( & range_attr [ strlen ( expected_range_attrib ) ] , " %lu-%lu " ,
& range_start , & range_end ) = = 2 ) {
* more_strings = True ;
} else {
if ( sscanf ( & range_attr [ strlen ( expected_range_attrib ) ] , " %lu-* " ,
& range_start ) = = 1 ) {
* more_strings = False ;
} else {
2004-01-05 15:20:15 +03:00
DEBUG ( 1 , ( " ads_pull_strings_range: Cannot parse Range attriubte (%s) \n " ,
range_attr ) ) ;
2004-01-05 04:48:21 +03:00
ldap_memfree ( range_attr ) ;
* more_strings = False ;
return NULL ;
}
}
if ( ( * num_strings ) ! = range_start ) {
2004-01-05 15:20:15 +03:00
DEBUG ( 1 , ( " ads_pull_strings_range: Range attribute (%s) doesn't start at %u, but at %lu "
" - aborting range retreival \n " ,
2005-09-30 21:13:37 +04:00
range_attr , ( unsigned int ) ( * num_strings ) + 1 , range_start ) ) ;
2004-01-05 04:48:21 +03:00
ldap_memfree ( range_attr ) ;
* more_strings = False ;
return NULL ;
}
new_strings = ads_pull_strings ( ads , mem_ctx , msg , range_attr , & num_new_strings ) ;
if ( * more_strings & & ( ( * num_strings + num_new_strings ) ! = ( range_end + 1 ) ) ) {
2004-01-05 15:20:15 +03:00
DEBUG ( 1 , ( " ads_pull_strings_range: Range attribute (%s) tells us we have %lu "
" strings in this bunch, but we only got %lu - aborting range retreival \n " ,
range_attr , ( unsigned long int ) range_end - range_start + 1 ,
( unsigned long int ) num_new_strings ) ) ;
2004-01-05 04:48:21 +03:00
ldap_memfree ( range_attr ) ;
* more_strings = False ;
return NULL ;
}
2004-12-07 21:25:53 +03:00
strings = TALLOC_REALLOC_ARRAY ( mem_ctx , current_strings , char * ,
* num_strings + num_new_strings ) ;
2004-01-05 04:48:21 +03:00
if ( strings = = NULL ) {
ldap_memfree ( range_attr ) ;
* more_strings = False ;
return NULL ;
}
2006-06-17 03:14:12 +04:00
if ( new_strings & & num_new_strings ) {
memcpy ( & strings [ * num_strings ] , new_strings ,
sizeof ( * new_strings ) * num_new_strings ) ;
}
2004-01-05 04:48:21 +03:00
( * num_strings ) + = num_new_strings ;
if ( * more_strings ) {
* next_attribute = talloc_asprintf ( mem_ctx ,
2004-02-08 03:31:36 +03:00
" %s;range=%d-* " ,
field ,
2005-09-30 21:13:37 +04:00
( int ) * num_strings ) ;
2004-01-05 04:48:21 +03:00
if ( ! * next_attribute ) {
DEBUG ( 1 , ( " talloc_asprintf for next attribute failed! \n " ) ) ;
ldap_memfree ( range_attr ) ;
* more_strings = False ;
return NULL ;
}
}
ldap_memfree ( range_attr ) ;
return strings ;
}
2002-07-15 14:35:28 +04:00
2002-04-10 17:28:03 +04:00
/**
* pull a single uint32 from a ADS result
* @ param ads connection to ads server
* @ param msg Results of search
* @ param field Attribute to retrieve
* @ param v Pointer to int to store result
* @ return boolean inidicating success
2001-12-03 09:04:18 +03:00
*/
BOOL ads_pull_uint32 ( ADS_STRUCT * ads ,
void * msg , const char * field , uint32 * v )
{
char * * values ;
values = ldap_get_values ( ads - > ld , msg , field ) ;
2003-02-05 02:44:28 +03:00
if ( ! values )
return False ;
2001-12-05 10:35:57 +03:00
if ( ! values [ 0 ] ) {
ldap_value_free ( values ) ;
return False ;
}
2001-12-03 09:04:18 +03:00
* v = atoi ( values [ 0 ] ) ;
ldap_value_free ( values ) ;
return True ;
}
2002-12-13 22:01:27 +03:00
/**
* pull a single objectGUID from an ADS result
* @ param ads connection to ADS server
* @ param msg results of search
* @ param guid 37 - byte area to receive text guid
* @ return boolean indicating success
* */
BOOL ads_pull_guid ( ADS_STRUCT * ads ,
2004-04-13 18:39:48 +04:00
void * msg , struct uuid * guid )
2002-12-13 22:01:27 +03:00
{
char * * values ;
2004-04-13 18:39:48 +04:00
UUID_FLAT flat_guid ;
2002-12-13 22:01:27 +03:00
values = ldap_get_values ( ads - > ld , msg , " objectGUID " ) ;
2003-02-05 02:44:28 +03:00
if ( ! values )
return False ;
2002-12-13 22:01:27 +03:00
if ( values [ 0 ] ) {
2004-04-13 18:39:48 +04:00
memcpy ( & flat_guid . info , values [ 0 ] , sizeof ( UUID_FLAT ) ) ;
smb_uuid_unpack ( flat_guid , guid ) ;
2002-12-13 22:01:27 +03:00
ldap_value_free ( values ) ;
return True ;
}
ldap_value_free ( values ) ;
return False ;
}
2002-04-10 17:28:03 +04:00
/**
* pull a single DOM_SID from a ADS result
* @ param ads connection to ads server
* @ param msg Results of search
* @ param field Attribute to retrieve
* @ param sid Pointer to sid to store result
* @ return boolean inidicating success
2001-12-03 09:04:18 +03:00
*/
BOOL ads_pull_sid ( ADS_STRUCT * ads ,
void * msg , const char * field , DOM_SID * sid )
{
struct berval * * values ;
2001-12-05 10:35:57 +03:00
BOOL ret = False ;
2001-12-03 09:04:18 +03:00
values = ldap_get_values_len ( ads - > ld , msg , field ) ;
2003-02-05 02:44:28 +03:00
if ( ! values )
return False ;
2001-12-03 09:04:18 +03:00
2003-02-05 02:44:28 +03:00
if ( values [ 0 ] )
2001-12-05 10:35:57 +03:00
ret = sid_parse ( values [ 0 ] - > bv_val , values [ 0 ] - > bv_len , sid ) ;
2001-12-03 09:04:18 +03:00
ldap_value_free_len ( values ) ;
return ret ;
}
2002-04-10 17:28:03 +04:00
/**
* pull an array of DOM_SIDs from a ADS result
* @ param ads connection to ads server
* @ param mem_ctx TALLOC_CTX for allocating sid array
* @ param msg Results of search
* @ param field Attribute to retrieve
* @ param sids pointer to sid array to allocate
* @ return the count of SIDs pulled
* */
2001-12-04 15:08:16 +03:00
int ads_pull_sids ( ADS_STRUCT * ads , TALLOC_CTX * mem_ctx ,
void * msg , const char * field , DOM_SID * * sids )
{
struct berval * * values ;
BOOL ret ;
int count , i ;
values = ldap_get_values_len ( ads - > ld , msg , field ) ;
2003-02-05 02:44:28 +03:00
if ( ! values )
return 0 ;
2001-12-04 15:08:16 +03:00
2003-02-05 02:44:28 +03:00
for ( i = 0 ; values [ i ] ; i + + )
/* nop */ ;
2001-12-04 15:08:16 +03:00
2004-12-07 21:25:53 +03:00
( * sids ) = TALLOC_ARRAY ( mem_ctx , DOM_SID , i ) ;
2003-02-05 02:44:28 +03:00
if ( ! ( * sids ) ) {
ldap_value_free_len ( values ) ;
return 0 ;
}
2001-12-04 15:08:16 +03:00
count = 0 ;
for ( i = 0 ; values [ i ] ; i + + ) {
ret = sid_parse ( values [ i ] - > bv_val , values [ i ] - > bv_len , & ( * sids ) [ count ] ) ;
2003-02-24 05:55:00 +03:00
if ( ret ) {
fstring sid ;
DEBUG ( 10 , ( " pulling SID: %s \n " , sid_to_string ( sid , & ( * sids ) [ count ] ) ) ) ;
2003-02-05 02:44:28 +03:00
count + + ;
2003-02-24 05:55:00 +03:00
}
2001-12-04 15:08:16 +03:00
}
ldap_value_free_len ( values ) ;
return count ;
}
2002-10-01 22:26:00 +04:00
/**
* pull a SEC_DESC from a ADS result
* @ param ads connection to ads server
* @ param mem_ctx TALLOC_CTX for allocating sid array
* @ param msg Results of search
* @ param field Attribute to retrieve
* @ param sd Pointer to * SEC_DESC to store result ( talloc ( ) ed )
* @ return boolean inidicating success
*/
BOOL ads_pull_sd ( ADS_STRUCT * ads , TALLOC_CTX * mem_ctx ,
void * msg , const char * field , SEC_DESC * * sd )
{
struct berval * * values ;
prs_struct ps ;
BOOL ret = False ;
values = ldap_get_values_len ( ads - > ld , msg , field ) ;
if ( ! values ) return False ;
if ( values [ 0 ] ) {
prs_init ( & ps , values [ 0 ] - > bv_len , mem_ctx , UNMARSHALL ) ;
2003-02-15 01:55:46 +03:00
prs_copy_data_in ( & ps , values [ 0 ] - > bv_val , values [ 0 ] - > bv_len ) ;
prs_set_offset ( & ps , 0 ) ;
2002-10-01 22:26:00 +04:00
ret = sec_io_desc ( " sd " , sd , & ps , 1 ) ;
}
ldap_value_free_len ( values ) ;
return ret ;
}
/*
* in order to support usernames longer than 21 characters we need to
* use both the sAMAccountName and the userPrincipalName attributes
* It seems that not all users have the userPrincipalName attribute set
*
* @ param ads connection to ads server
* @ param mem_ctx TALLOC_CTX for allocating sid array
* @ param msg Results of search
* @ return the username
*/
char * ads_pull_username ( ADS_STRUCT * ads , TALLOC_CTX * mem_ctx , void * msg )
{
2004-08-27 20:15:23 +04:00
#if 0 /* JERRY */
2002-10-01 22:26:00 +04:00
char * ret , * p ;
2004-08-27 20:15:23 +04:00
/* lookup_name() only works on the sAMAccountName to
returning the username portion of userPrincipalName
breaks winbindd_getpwnam ( ) */
2002-10-01 22:26:00 +04:00
ret = ads_pull_string ( ads , mem_ctx , msg , " userPrincipalName " ) ;
2004-10-27 04:41:41 +04:00
if ( ret & & ( p = strchr_m ( ret , ' @ ' ) ) ) {
2002-10-01 22:26:00 +04:00
* p = 0 ;
return ret ;
}
2004-08-27 20:15:23 +04:00
# endif
2002-10-01 22:26:00 +04:00
return ads_pull_string ( ads , mem_ctx , msg , " sAMAccountName " ) ;
}
2001-12-03 09:04:18 +03:00
2002-04-10 17:28:03 +04:00
/**
* find the update serial number - this is the core of the ldap cache
* @ param ads connection to ads server
* @ param ads connection to ADS server
* @ param usn Pointer to retrieved update serial number
* @ return status of search
* */
2001-12-19 15:21:12 +03:00
ADS_STATUS ads_USN ( ADS_STRUCT * ads , uint32 * usn )
2001-11-28 06:56:30 +03:00
{
const char * attrs [ ] = { " highestCommittedUSN " , NULL } ;
2001-12-19 15:21:12 +03:00
ADS_STATUS status ;
2001-11-28 06:56:30 +03:00
void * res ;
2003-09-06 22:02:19 +04:00
status = ads_do_search_retry ( ads , " " , LDAP_SCOPE_BASE , " (objectclass=*) " , attrs , & res ) ;
2003-10-04 01:43:09 +04:00
if ( ! ADS_ERR_OK ( status ) )
return status ;
2001-12-19 15:21:12 +03:00
if ( ads_count_replies ( ads , res ) ! = 1 ) {
return ADS_ERROR ( LDAP_NO_RESULTS_RETURNED ) ;
}
ads_pull_uint32 ( ads , res , " highestCommittedUSN " , usn ) ;
2001-12-05 12:19:25 +03:00
ads_msgfree ( ads , res ) ;
2001-12-19 15:21:12 +03:00
return ADS_SUCCESS ;
2001-11-28 06:56:30 +03:00
}
2002-09-25 19:19:00 +04:00
/* parse a ADS timestring - typical string is
' 20020917091222.0 Z0 ' which means 09 : 12.22 17 th September
2002 , timezone 0 */
static time_t ads_parse_time ( const char * str )
{
struct tm tm ;
ZERO_STRUCT ( tm ) ;
if ( sscanf ( str , " %4d%2d%2d%2d%2d%2d " ,
& tm . tm_year , & tm . tm_mon , & tm . tm_mday ,
& tm . tm_hour , & tm . tm_min , & tm . tm_sec ) ! = 6 ) {
return 0 ;
}
tm . tm_year - = 1900 ;
tm . tm_mon - = 1 ;
return timegm ( & tm ) ;
}
2006-07-11 22:45:22 +04:00
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2006-05-12 19:17:35 +04:00
ADS_STATUS ads_current_time ( ADS_STRUCT * ads )
2001-12-08 14:18:56 +03:00
{
2006-05-12 19:17:35 +04:00
const char * attrs [ ] = { " currentTime " , NULL } ;
2001-12-19 15:21:12 +03:00
ADS_STATUS status ;
2001-12-08 14:18:56 +03:00
void * res ;
2002-09-25 19:19:00 +04:00
char * timestr ;
TALLOC_CTX * ctx ;
2006-05-12 19:17:35 +04:00
ADS_STRUCT * ads_s = ads ;
2002-09-25 19:19:00 +04:00
2006-07-11 22:45:22 +04:00
if ( ! ( ctx = talloc_init ( " ads_current_time " ) ) ) {
2002-09-25 19:19:00 +04:00
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
2001-12-08 14:18:56 +03:00
2006-05-12 19:17:35 +04:00
/* establish a new ldap tcp session if necessary */
2001-12-08 14:18:56 +03:00
2006-05-12 19:17:35 +04:00
if ( ! ads - > ld ) {
if ( ( ads_s = ads_init ( ads - > server . realm , ads - > server . workgroup ,
ads - > server . ldap_server ) ) = = NULL )
{
goto done ;
}
ads_s - > auth . flags = ADS_AUTH_ANON_BIND ;
status = ads_connect ( ads_s ) ;
if ( ! ADS_ERR_OK ( status ) )
goto done ;
2002-09-25 19:19:00 +04:00
}
2006-05-12 19:17:35 +04:00
status = ads_do_search ( ads_s , " " , LDAP_SCOPE_BASE , " (objectclass=*) " , attrs , & res ) ;
if ( ! ADS_ERR_OK ( status ) ) {
goto done ;
2002-09-25 19:19:00 +04:00
}
2006-05-12 19:17:35 +04:00
timestr = ads_pull_string ( ads_s , ctx , res , " currentTime " ) ;
if ( ! timestr ) {
2005-06-29 18:03:53 +04:00
ads_msgfree ( ads , res ) ;
2006-05-12 19:17:35 +04:00
status = ADS_ERROR ( LDAP_NO_RESULTS_RETURNED ) ;
goto done ;
2005-06-29 18:03:53 +04:00
}
2006-05-12 19:17:35 +04:00
/* but save the time and offset in the original ADS_STRUCT */
ads - > config . current_time = ads_parse_time ( timestr ) ;
2001-12-08 14:18:56 +03:00
2006-05-12 19:17:35 +04:00
if ( ads - > config . current_time ! = 0 ) {
ads - > auth . time_offset = ads - > config . current_time - time ( NULL ) ;
DEBUG ( 4 , ( " time offset is %d seconds \n " , ads - > auth . time_offset ) ) ;
2001-12-08 14:18:56 +03:00
}
2006-05-18 19:08:09 +04:00
ads_msgfree ( ads , res ) ;
2006-05-12 19:17:35 +04:00
status = ADS_SUCCESS ;
2001-12-08 14:18:56 +03:00
2006-05-12 19:17:35 +04:00
done :
/* free any temporary ads connections */
if ( ads_s ! = ads ) {
ads_destroy ( & ads_s ) ;
2001-12-08 14:18:56 +03:00
}
2006-05-12 19:17:35 +04:00
talloc_destroy ( ctx ) ;
2001-12-08 14:18:56 +03:00
2006-05-12 19:17:35 +04:00
return status ;
}
2001-12-08 14:18:56 +03:00
2006-07-11 22:45:22 +04:00
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
ADS_STATUS ads_domain_func_level ( ADS_STRUCT * ads , uint32 * val )
{
const char * attrs [ ] = { " domainFunctionality " , NULL } ;
ADS_STATUS status ;
void * res ;
ADS_STRUCT * ads_s = ads ;
* val = DS_DOMAIN_FUNCTION_2000 ;
/* establish a new ldap tcp session if necessary */
if ( ! ads - > ld ) {
if ( ( ads_s = ads_init ( ads - > server . realm , ads - > server . workgroup ,
ads - > server . ldap_server ) ) = = NULL )
{
goto done ;
}
ads_s - > auth . flags = ADS_AUTH_ANON_BIND ;
status = ads_connect ( ads_s ) ;
if ( ! ADS_ERR_OK ( status ) )
goto done ;
}
/* If the attribute does not exist assume it is a Windows 2000
functional domain */
status = ads_do_search ( ads_s , " " , LDAP_SCOPE_BASE , " (objectclass=*) " , attrs , & res ) ;
if ( ! ADS_ERR_OK ( status ) ) {
if ( status . err . rc = = LDAP_NO_SUCH_ATTRIBUTE ) {
status = ADS_SUCCESS ;
}
goto done ;
}
if ( ! ads_pull_uint32 ( ads_s , res , " domainFunctionality " , val ) ) {
DEBUG ( 5 , ( " ads_domain_func_level: Failed to pull the domainFunctionality attribute. \n " ) ) ;
}
DEBUG ( 3 , ( " ads_domain_func_level: %d \n " , * val ) ) ;
ads_msgfree ( ads , res ) ;
done :
/* free any temporary ads connections */
if ( ads_s ! = ads ) {
ads_destroy ( & ads_s ) ;
}
return status ;
}
2002-04-10 17:28:03 +04:00
/**
* find the domain sid for our domain
* @ param ads connection to ads server
* @ param sid Pointer to domain sid
* @ return status of search
* */
2001-12-21 02:35:14 +03:00
ADS_STATUS ads_domain_sid ( ADS_STRUCT * ads , DOM_SID * sid )
{
const char * attrs [ ] = { " objectSid " , NULL } ;
void * res ;
ADS_STATUS rc ;
2003-09-06 22:02:19 +04:00
rc = ads_do_search_retry ( ads , ads - > config . bind_path , LDAP_SCOPE_BASE , " (objectclass=*) " ,
2001-12-21 02:35:14 +03:00
attrs , & res ) ;
if ( ! ADS_ERR_OK ( rc ) ) return rc ;
if ( ! ads_pull_sid ( ads , res , " objectSid " , sid ) ) {
2004-05-07 21:58:06 +04:00
ads_msgfree ( ads , res ) ;
2001-12-21 02:35:14 +03:00
return ADS_ERROR_SYSTEM ( ENOENT ) ;
}
ads_msgfree ( ads , res ) ;
return ADS_SUCCESS ;
}
2006-02-04 01:19:41 +03:00
/**
* find our site name
* @ param ads connection to ads server
* @ param mem_ctx Pointer to talloc context
* @ param site_name Pointer to the sitename
* @ return status of search
* */
ADS_STATUS ads_site_dn ( ADS_STRUCT * ads , TALLOC_CTX * mem_ctx , const char * * site_name )
{
ADS_STATUS status ;
void * res ;
const char * dn , * service_name ;
const char * attrs [ ] = { " dsServiceName " , NULL } ;
status = ads_do_search ( ads , " " , LDAP_SCOPE_BASE , " (objectclass=*) " , attrs , & res ) ;
if ( ! ADS_ERR_OK ( status ) ) {
return status ;
}
service_name = ads_pull_string ( ads , mem_ctx , res , " dsServiceName " ) ;
if ( service_name = = NULL ) {
return ADS_ERROR ( LDAP_NO_RESULTS_RETURNED ) ;
}
/* go up three levels */
dn = ads_parent_dn ( ads_parent_dn ( ads_parent_dn ( service_name ) ) ) ;
if ( dn = = NULL ) {
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
* site_name = talloc_strdup ( mem_ctx , dn ) ;
if ( * site_name = = NULL ) {
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
ads_msgfree ( ads , res ) ;
return status ;
/*
dsServiceName : CN = NTDS Settings , CN = W2K3DC , CN = Servers , CN = Default - First - Site - Name , CN = Sites , CN = Configuration , DC = ber , DC = suse , DC = de
*/
}
/**
* find the site dn where a machine resides
* @ param ads connection to ads server
* @ param mem_ctx Pointer to talloc context
* @ param computer_name name of the machine
* @ param site_name Pointer to the sitename
* @ return status of search
* */
ADS_STATUS ads_site_dn_for_machine ( ADS_STRUCT * ads , TALLOC_CTX * mem_ctx , const char * computer_name , const char * * site_dn )
{
ADS_STATUS status ;
void * res ;
const char * parent , * config_context , * filter ;
const char * attrs [ ] = { " configurationNamingContext " , NULL } ;
char * dn ;
/* shortcut a query */
if ( strequal ( computer_name , ads - > config . ldap_server_name ) ) {
return ads_site_dn ( ads , mem_ctx , site_dn ) ;
}
status = ads_do_search ( ads , " " , LDAP_SCOPE_BASE , " (objectclass=*) " , attrs , & res ) ;
if ( ! ADS_ERR_OK ( status ) ) {
return status ;
}
config_context = ads_pull_string ( ads , mem_ctx , res , " configurationNamingContext " ) ;
if ( config_context = = NULL ) {
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
filter = talloc_asprintf ( mem_ctx , " (cn=%s) " , computer_name ) ;
if ( filter = = NULL ) {
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
status = ads_do_search ( ads , config_context , LDAP_SCOPE_SUBTREE , filter , NULL , & res ) ;
if ( ! ADS_ERR_OK ( status ) ) {
return status ;
}
if ( ads_count_replies ( ads , res ) ! = 1 ) {
return ADS_ERROR ( LDAP_NO_SUCH_OBJECT ) ;
}
dn = ads_get_dn ( ads , res ) ;
if ( dn = = NULL ) {
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
/* go up three levels */
parent = ads_parent_dn ( ads_parent_dn ( ads_parent_dn ( dn ) ) ) ;
if ( parent = = NULL ) {
ads_memfree ( ads , dn ) ;
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
* site_dn = talloc_strdup ( mem_ctx , parent ) ;
if ( * site_dn = = NULL ) {
ads_memfree ( ads , dn ) ;
ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
ads_memfree ( ads , dn ) ;
ads_msgfree ( ads , res ) ;
return status ;
}
/**
* get the upn suffixes for a domain
* @ param ads connection to ads server
* @ param mem_ctx Pointer to talloc context
* @ param suffixes Pointer to an array of suffixes
* @ param site_name Pointer to the number of suffixes
* @ return status of search
* */
ADS_STATUS ads_upn_suffixes ( ADS_STRUCT * ads , TALLOC_CTX * mem_ctx , char * * suffixes , size_t * num_suffixes )
{
ADS_STATUS status ;
void * res ;
const char * config_context , * base ;
const char * attrs [ ] = { " configurationNamingContext " , NULL } ;
const char * attrs2 [ ] = { " uPNSuffixes " , NULL } ;
status = ads_do_search ( ads , " " , LDAP_SCOPE_BASE , " (objectclass=*) " , attrs , & res ) ;
if ( ! ADS_ERR_OK ( status ) ) {
return status ;
}
config_context = ads_pull_string ( ads , mem_ctx , res , " configurationNamingContext " ) ;
if ( config_context = = NULL ) {
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
base = talloc_asprintf ( mem_ctx , " cn=Partitions,%s " , config_context ) ;
if ( base = = NULL ) {
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
status = ads_search_dn ( ads , & res , base , attrs2 ) ;
if ( ! ADS_ERR_OK ( status ) ) {
return status ;
}
if ( ads_count_replies ( ads , res ) ! = 1 ) {
return ADS_ERROR ( LDAP_NO_SUCH_OBJECT ) ;
}
suffixes = ads_pull_strings ( ads , mem_ctx , & res , " uPNSuffixes " , num_suffixes ) ;
if ( suffixes = = NULL ) {
ads_msgfree ( ads , res ) ;
return ADS_ERROR ( LDAP_NO_MEMORY ) ;
}
ads_msgfree ( ads , res ) ;
return status ;
}
2006-05-18 23:34:25 +04:00
/**
* pull a DOM_SID from an extended dn string
* @ param mem_ctx TALLOC_CTX
* @ param flags string type of extended_dn
* @ param sid pointer to a DOM_SID
* @ return boolean inidicating success
* */
BOOL ads_get_sid_from_extended_dn ( TALLOC_CTX * mem_ctx ,
const char * dn ,
enum ads_extended_dn_flags flags ,
DOM_SID * sid )
{
char * p , * q ;
if ( ! dn ) {
return False ;
}
/*
* ADS_EXTENDED_DN_HEX_STRING :
* < GUID = 238e1963 cb390f4bb032ba0105525a29 > ; < SID = 010500000000000515000000 bb68c8fd6b61b427572eb04556040000 > ; CN = gd , OU = berlin , OU = suse , DC = ber , DC = suse , DC = de
*
* ADS_EXTENDED_DN_STRING ( only with w2k3 ) :
< GUID = 63198e23 - 39 cb - 4 b0f - b032 - ba0105525a29 > ; < SID = S - 1 - 5 - 21 - 4257769659 - 666132843 - 1169174103 - 1110 > ; CN = gd , OU = berlin , OU = suse , DC = ber , DC = suse , DC = de
*/
p = strchr ( dn , ' ; ' ) ;
if ( ! p ) {
return False ;
}
if ( strncmp ( p , " ;<SID= " , strlen ( " ;<SID= " ) ) ! = 0 ) {
return False ;
}
p + = strlen ( " ;<SID= " ) ;
q = strchr ( p , ' > ' ) ;
if ( ! q ) {
return False ;
}
* q = ' \0 ' ;
DEBUG ( 100 , ( " ads_get_sid_from_extended_dn: sid string is %s \n " , p ) ) ;
switch ( flags ) {
case ADS_EXTENDED_DN_STRING :
if ( ! string_to_sid ( sid , p ) ) {
return False ;
}
break ;
case ADS_EXTENDED_DN_HEX_STRING : {
pstring buf ;
size_t buf_len ;
buf_len = strhex_to_str ( buf , strlen ( p ) , p ) ;
if ( buf_len = = 0 ) {
return False ;
}
if ( ! sid_parse ( buf , buf_len , sid ) ) {
DEBUG ( 10 , ( " failed to parse sid \n " ) ) ;
return False ;
}
break ;
}
default :
DEBUG ( 10 , ( " unknown extended dn format \n " ) ) ;
return False ;
}
return True ;
}
/**
* pull an array of DOM_SIDs from a ADS result
* @ param ads connection to ads server
* @ param mem_ctx TALLOC_CTX for allocating sid array
* @ param msg Results of search
* @ param field Attribute to retrieve
* @ param flags string type of extended_dn
* @ param sids pointer to sid array to allocate
* @ return the count of SIDs pulled
* */
int ads_pull_sids_from_extendeddn ( ADS_STRUCT * ads ,
TALLOC_CTX * mem_ctx ,
void * msg ,
const char * field ,
enum ads_extended_dn_flags flags ,
DOM_SID * * sids )
{
int i ;
size_t dn_count ;
char * * dn_strings ;
if ( ( dn_strings = ads_pull_strings ( ads , mem_ctx , msg , field ,
& dn_count ) ) = = NULL ) {
return 0 ;
}
( * sids ) = TALLOC_ZERO_ARRAY ( mem_ctx , DOM_SID , dn_count + 1 ) ;
if ( ! ( * sids ) ) {
TALLOC_FREE ( dn_strings ) ;
return 0 ;
}
for ( i = 0 ; i < dn_count ; i + + ) {
if ( ! ads_get_sid_from_extended_dn ( mem_ctx , dn_strings [ i ] ,
flags , & ( * sids ) [ i ] ) ) {
TALLOC_FREE ( * sids ) ;
TALLOC_FREE ( dn_strings ) ;
return 0 ;
}
}
TALLOC_FREE ( dn_strings ) ;
return dn_count ;
}
2006-07-11 22:45:22 +04:00
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
char * ads_get_dnshostname ( ADS_STRUCT * ads , TALLOC_CTX * ctx , const char * machine_name )
{
LDAPMessage * res = NULL ;
ADS_STATUS status ;
int count = 0 ;
char * name = NULL ;
status = ads_find_machine_acct ( ads , ( void * * ) ( void * ) & res , global_myname ( ) ) ;
if ( ! ADS_ERR_OK ( status ) ) {
DEBUG ( 0 , ( " ads_get_dnshostname: Failed to find account for %s \n " ,
global_myname ( ) ) ) ;
goto out ;
}
if ( ( count = ads_count_replies ( ads , res ) ) ! = 1 ) {
DEBUG ( 1 , ( " ads_get_dnshostname: %d entries returned! \n " , count ) ) ;
goto out ;
}
if ( ( name = ads_pull_string ( ads , ctx , res , " dNSHostName " ) ) = = NULL ) {
DEBUG ( 0 , ( " ads_get_dnshostname: No dNSHostName attribute! \n " ) ) ;
}
out :
ads_msgfree ( ads , res ) ;
return name ;
}
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
char * ads_get_upn ( ADS_STRUCT * ads , TALLOC_CTX * ctx , const char * machine_name )
{
LDAPMessage * res = NULL ;
ADS_STATUS status ;
int count = 0 ;
char * name = NULL ;
status = ads_find_machine_acct ( ads , ( void * * ) ( void * ) & res , global_myname ( ) ) ;
if ( ! ADS_ERR_OK ( status ) ) {
DEBUG ( 0 , ( " ads_get_dnshostname: Failed to find account for %s \n " ,
global_myname ( ) ) ) ;
goto out ;
}
if ( ( count = ads_count_replies ( ads , res ) ) ! = 1 ) {
DEBUG ( 1 , ( " ads_get_dnshostname: %d entries returned! \n " , count ) ) ;
goto out ;
}
if ( ( name = ads_pull_string ( ads , ctx , res , " userPrincipalName " ) ) = = NULL ) {
DEBUG ( 0 , ( " ads_get_dnshostname: No userPrincipalName attribute! \n " ) ) ;
}
out :
ads_msgfree ( ads , res ) ;
return name ;
}
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
char * ads_get_samaccountname ( ADS_STRUCT * ads , TALLOC_CTX * ctx , const char * machine_name )
{
LDAPMessage * res = NULL ;
ADS_STATUS status ;
int count = 0 ;
char * name = NULL ;
status = ads_find_machine_acct ( ads , ( void * * ) ( void * ) & res , global_myname ( ) ) ;
if ( ! ADS_ERR_OK ( status ) ) {
DEBUG ( 0 , ( " ads_get_dnshostname: Failed to find account for %s \n " ,
global_myname ( ) ) ) ;
goto out ;
}
if ( ( count = ads_count_replies ( ads , res ) ) ! = 1 ) {
DEBUG ( 1 , ( " ads_get_dnshostname: %d entries returned! \n " , count ) ) ;
goto out ;
}
if ( ( name = ads_pull_string ( ads , ctx , res , " sAMAccountName " ) ) = = NULL ) {
DEBUG ( 0 , ( " ads_get_dnshostname: No sAMAccountName attribute! \n " ) ) ;
}
out :
ads_msgfree ( ads , res ) ;
return name ;
}
2001-11-20 11:54:15 +03:00
# endif