/* Unix SMB/CIFS implementation. Infrastructure for async ldap client requests Copyright (C) Volker Lendecke 2009 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "includes.h" #include "tldap.h" #include "tldap_util.h" #include "../libcli/security/security.h" #include "../lib/util/asn1.h" bool tldap_entry_values(struct tldap_message *msg, const char *attribute, DATA_BLOB **values, int *num_values) { struct tldap_attribute *attributes; int i, num_attributes; if (!tldap_entry_attributes(msg, &attributes, &num_attributes)) { return false; } for (i=0; ivalues); int i; DATA_BLOB *tmp; tmp = talloc_realloc(mem_ctx, mod->values, DATA_BLOB, num_values + num_newvals); if (tmp == NULL) { return false; } mod->values = tmp; for (i=0; ivalues[i+num_values].data = (uint8_t *)talloc_memdup( mod->values, newvals[i].data, newvals[i].length); if (mod->values[i+num_values].data == NULL) { return false; } mod->values[i+num_values].length = newvals[i].length; } mod->num_values = num_values + num_newvals; return true; } bool tldap_add_mod_blobs(TALLOC_CTX *mem_ctx, struct tldap_mod **pmods, int *pnum_mods, int mod_op, const char *attrib, DATA_BLOB *newvals, int num_newvals) { struct tldap_mod new_mod; struct tldap_mod *mods = *pmods; struct tldap_mod *mod = NULL; int i, num_mods; if (mods == NULL) { mods = talloc_array(mem_ctx, struct tldap_mod, 0); } if (mods == NULL) { return false; } num_mods = *pnum_mods; for (i=0; i 1) { /* can't change multivalue attributes atm */ return false; } if (num_values == 1) { oldval = values[0]; } } if ((oldval.data != NULL) && (newval.data != NULL) && (comparison(&oldval, &newval) == 0)) { /* Believe it or not, but LDAP will deny a delete and an add at the same time if the values are the same... */ DEBUG(10,("tldap_make_mod_blob_int: attribute |%s| not " "changed.\n", attrib)); return true; } if (oldval.data != NULL) { /* By deleting exactly the value we found in the entry this * should be race-free in the sense that the LDAP-Server will * deny the complete operation if somebody changed the * attribute behind our back. */ /* This will also allow modifying single valued attributes in * Novell NDS. In NDS you have to first remove attribute and * then you could add new value */ DEBUG(10, ("tldap_make_mod_blob_int: deleting attribute |%s|\n", attrib)); if (!tldap_add_mod_blobs(mem_ctx, pmods, pnum_mods, TLDAP_MOD_DELETE, attrib, &oldval, 1)) { return false; } } /* Regardless of the real operation (add or modify) we add the new value here. We rely on deleting the old value, should it exist. */ if (newval.data != NULL) { DEBUG(10, ("tldap_make_mod_blob_int: adding attribute |%s| value len " "%d\n", attrib, (int)newval.length)); if (!tldap_add_mod_blobs(mem_ctx, pmods, pnum_mods, TLDAP_MOD_ADD, attrib, &newval, 1)) { return false; } } return true; } bool tldap_make_mod_blob(struct tldap_message *existing, TALLOC_CTX *mem_ctx, struct tldap_mod **pmods, int *pnum_mods, const char *attrib, DATA_BLOB newval) { return tldap_make_mod_blob_int(existing, mem_ctx, pmods, pnum_mods, attrib, newval, data_blob_cmp); } static int compare_utf8_blobs(const DATA_BLOB *d1, const DATA_BLOB *d2) { char *s1, *s2; size_t s1len, s2len; int ret; if (!convert_string_talloc(talloc_tos(), CH_UTF8, CH_UNIX, d1->data, d1->length, &s1, &s1len)) { /* can't do much here */ return 0; } if (!convert_string_talloc(talloc_tos(), CH_UTF8, CH_UNIX, d2->data, d2->length, &s2, &s2len)) { /* can't do much here */ TALLOC_FREE(s1); return 0; } ret = strcasecmp_m(s1, s2); TALLOC_FREE(s2); TALLOC_FREE(s1); return ret; } bool tldap_make_mod_fmt(struct tldap_message *existing, TALLOC_CTX *mem_ctx, struct tldap_mod **pmods, int *pnum_mods, const char *attrib, const char *fmt, ...) { va_list ap; char *newval; bool ret; DATA_BLOB blob = data_blob_null; va_start(ap, fmt); newval = talloc_vasprintf(talloc_tos(), fmt, ap); va_end(ap); if (newval == NULL) { return false; } blob.length = strlen(newval); if (blob.length != 0) { blob.data = discard_const_p(uint8_t, newval); } ret = tldap_make_mod_blob_int(existing, mem_ctx, pmods, pnum_mods, attrib, blob, compare_utf8_blobs); TALLOC_FREE(newval); return ret; } const char *tldap_errstr(TALLOC_CTX *mem_ctx, struct tldap_context *ld, TLDAPRC rc) { const char *ld_error = NULL; char *res; if (ld != NULL) { ld_error = tldap_msg_diagnosticmessage(tldap_ctx_lastmsg(ld)); } res = talloc_asprintf(mem_ctx, "LDAP error %d (%s), %s", (int)TLDAP_RC_V(rc), tldap_rc2string(rc), ld_error ? ld_error : "unknown"); return res; } TLDAPRC tldap_search_va(struct tldap_context *ld, const char *base, int scope, const char *attrs[], int num_attrs, int attrsonly, TALLOC_CTX *mem_ctx, struct tldap_message ***res, const char *fmt, va_list ap) { char *filter; TLDAPRC rc; filter = talloc_vasprintf(talloc_tos(), fmt, ap); if (filter == NULL) { return TLDAP_NO_MEMORY; } rc = tldap_search(ld, base, scope, filter, attrs, num_attrs, attrsonly, NULL /*sctrls*/, 0, NULL /*cctrls*/, 0, 0 /*timelimit*/, 0 /*sizelimit*/, 0 /*deref*/, mem_ctx, res); TALLOC_FREE(filter); return rc; } TLDAPRC tldap_search_fmt(struct tldap_context *ld, const char *base, int scope, const char *attrs[], int num_attrs, int attrsonly, TALLOC_CTX *mem_ctx, struct tldap_message ***res, const char *fmt, ...) { va_list ap; TLDAPRC rc; va_start(ap, fmt); rc = tldap_search_va(ld, base, scope, attrs, num_attrs, attrsonly, mem_ctx, res, fmt, ap); va_end(ap); return rc; } bool tldap_pull_uint64(struct tldap_message *msg, const char *attr, uint64_t *presult) { char *str; uint64_t result; int error = 0; str = tldap_talloc_single_attribute(msg, attr, talloc_tos()); if (str == NULL) { DEBUG(10, ("Could not find attribute %s\n", attr)); return false; } result = strtoull_err(str, NULL, 10, &error); if (error != 0) { DBG_DEBUG("Attribute conversion failed (%s)\n", strerror(error)); TALLOC_FREE(str); return false; } TALLOC_FREE(str); *presult = result; return true; } bool tldap_pull_uint32(struct tldap_message *msg, const char *attr, uint32_t *presult) { uint64_t result; if (!tldap_pull_uint64(msg, attr, &result)) { return false; } *presult = (uint32_t)result; return true; } struct tldap_fetch_rootdse_state { struct tldap_context *ld; struct tldap_message *rootdse; }; static void tldap_fetch_rootdse_done(struct tevent_req *subreq); struct tevent_req *tldap_fetch_rootdse_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct tldap_context *ld) { struct tevent_req *req, *subreq; struct tldap_fetch_rootdse_state *state; static const char *attrs[2] = { "*", "+" }; req = tevent_req_create(mem_ctx, &state, struct tldap_fetch_rootdse_state); if (req == NULL) { return NULL; } state->ld = ld; state->rootdse = NULL; subreq = tldap_search_send( mem_ctx, ev, ld, "", TLDAP_SCOPE_BASE, "(objectclass=*)", attrs, ARRAY_SIZE(attrs), 0, NULL, 0, NULL, 0, 0, 0, 0); if (tevent_req_nomem(subreq, req)) { return tevent_req_post(req, ev); } tevent_req_set_callback(subreq, tldap_fetch_rootdse_done, req); return req; } static void tldap_fetch_rootdse_done(struct tevent_req *subreq) { struct tevent_req *req = tevent_req_callback_data( subreq, struct tevent_req); struct tldap_fetch_rootdse_state *state = tevent_req_data( req, struct tldap_fetch_rootdse_state); struct tldap_message *msg; TLDAPRC rc; rc = tldap_search_recv(subreq, state, &msg); if (tevent_req_ldap_error(req, rc)) { return; } switch (tldap_msg_type(msg)) { case TLDAP_RES_SEARCH_ENTRY: if (state->rootdse != NULL) { goto protocol_error; } state->rootdse = msg; break; case TLDAP_RES_SEARCH_RESULT: TALLOC_FREE(subreq); if (state->rootdse == NULL) { goto protocol_error; } tevent_req_done(req); break; default: goto protocol_error; } return; protocol_error: tevent_req_ldap_error(req, TLDAP_PROTOCOL_ERROR); return; } TLDAPRC tldap_fetch_rootdse_recv(struct tevent_req *req) { struct tldap_fetch_rootdse_state *state = tevent_req_data( req, struct tldap_fetch_rootdse_state); TLDAPRC rc; char *dn; if (tevent_req_is_ldap_error(req, &rc)) { return rc; } /* Trigger parsing the dn, just to make sure it's ok */ if (!tldap_entry_dn(state->rootdse, &dn)) { return TLDAP_DECODING_ERROR; } if (!tldap_context_setattr(state->ld, "tldap:rootdse", &state->rootdse)) { return TLDAP_NO_MEMORY; } return TLDAP_SUCCESS; } TLDAPRC tldap_fetch_rootdse(struct tldap_context *ld) { TALLOC_CTX *frame = talloc_stackframe(); struct tevent_context *ev; struct tevent_req *req; TLDAPRC rc = TLDAP_NO_MEMORY; ev = samba_tevent_context_init(frame); if (ev == NULL) { goto fail; } req = tldap_fetch_rootdse_send(frame, ev, ld); if (req == NULL) { goto fail; } if (!tevent_req_poll(req, ev)) { rc = TLDAP_OPERATIONS_ERROR; goto fail; } rc = tldap_fetch_rootdse_recv(req); fail: TALLOC_FREE(frame); return rc; } struct tldap_message *tldap_rootdse(struct tldap_context *ld) { return talloc_get_type(tldap_context_getattr(ld, "tldap:rootdse"), struct tldap_message); } bool tldap_entry_has_attrvalue(struct tldap_message *msg, const char *attribute, const DATA_BLOB blob) { int i, num_values; DATA_BLOB *values; if (!tldap_entry_values(msg, attribute, &values, &num_values)) { return false; } for (i=0; ipage_size)) goto err; if (!asn1_write_OctetString(asn1, state->cookie.data, state->cookie.length)) goto err; if (!asn1_pop_tag(asn1)) goto err; state->asn1 = asn1; pgctrl = &state->sctrls[state->num_sctrls-1]; pgctrl->oid = TLDAP_CONTROL_PAGEDRESULTS; pgctrl->critical = true; if (!asn1_blob(state->asn1, &pgctrl->value)) { goto err; } return tldap_search_send(mem_ctx, state->ev, state->ld, state->base, state->scope, state->filter, state->attrs, state->num_attrs, state->attrsonly, state->sctrls, state->num_sctrls, state->cctrls, state->num_cctrls, state->timelimit, state->sizelimit, state->deref); err: TALLOC_FREE(asn1); return NULL; } static void tldap_search_paged_done(struct tevent_req *subreq); struct tevent_req *tldap_search_paged_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct tldap_context *ld, const char *base, int scope, const char *filter, const char **attrs, int num_attrs, int attrsonly, struct tldap_control *sctrls, int num_sctrls, struct tldap_control *cctrls, int num_cctrls, int timelimit, int sizelimit, int deref, int page_size) { struct tevent_req *req, *subreq; struct tldap_search_paged_state *state; struct tldap_control empty_control; req = tevent_req_create(mem_ctx, &state, struct tldap_search_paged_state); if (req == NULL) { return NULL; } state->ev = ev; state->ld = ld; state->base = base; state->filter = filter; state->scope = scope; state->attrs = attrs; state->num_attrs = num_attrs; state->attrsonly = attrsonly; state->cctrls = cctrls; state->num_cctrls = num_cctrls; state->timelimit = timelimit; state->sizelimit = sizelimit; state->deref = deref; state->page_size = page_size; state->asn1 = NULL; state->cookie = data_blob_null; ZERO_STRUCT(empty_control); state->sctrls = tldap_add_control(state, sctrls, num_sctrls, &empty_control); if (tevent_req_nomem(state->sctrls, req)) { return tevent_req_post(req, ev); } state->num_sctrls = num_sctrls+1; subreq = tldap_ship_paged_search(state, state); if (tevent_req_nomem(subreq, req)) { return tevent_req_post(req, ev); } tevent_req_set_callback(subreq, tldap_search_paged_done, req); return req; } static void tldap_search_paged_done(struct tevent_req *subreq) { struct tevent_req *req = tevent_req_callback_data( subreq, struct tevent_req); struct tldap_search_paged_state *state = tevent_req_data( req, struct tldap_search_paged_state); struct asn1_data *asn1 = NULL; struct tldap_control *pgctrl; TLDAPRC rc; int size; rc = tldap_search_recv(subreq, state, &state->result); if (tevent_req_ldap_error(req, rc)) { return; } TALLOC_FREE(state->asn1); switch (tldap_msg_type(state->result)) { case TLDAP_RES_SEARCH_ENTRY: case TLDAP_RES_SEARCH_REFERENCE: tevent_req_notify_callback(req); return; case TLDAP_RES_SEARCH_RESULT: break; default: TALLOC_FREE(subreq); tevent_req_ldap_error(req, TLDAP_PROTOCOL_ERROR); return; } TALLOC_FREE(subreq); /* We've finished one paged search, fire the next */ pgctrl = tldap_msg_findcontrol(state->result, TLDAP_CONTROL_PAGEDRESULTS); if (pgctrl == NULL) { /* RFC2696 requires the server to return the control */ tevent_req_ldap_error(req, TLDAP_PROTOCOL_ERROR); return; } TALLOC_FREE(state->cookie.data); asn1 = asn1_init(talloc_tos()); if (tevent_req_nomem(asn1, req)) { return; } asn1_load_nocopy(asn1, pgctrl->value.data, pgctrl->value.length); if (!asn1_start_tag(asn1, ASN1_SEQUENCE(0))) goto err; if (!asn1_read_Integer(asn1, &size)) goto err; if (!asn1_read_OctetString(asn1, state, &state->cookie)) goto err; if (!asn1_end_tag(asn1)) goto err; TALLOC_FREE(asn1); if (state->cookie.length == 0) { /* We're done, no cookie anymore */ tevent_req_done(req); return; } TALLOC_FREE(state->result); subreq = tldap_ship_paged_search(state, state); if (tevent_req_nomem(subreq, req)) { return; } tevent_req_set_callback(subreq, tldap_search_paged_done, req); err: TALLOC_FREE(asn1); tevent_req_ldap_error(req, TLDAP_DECODING_ERROR); } TLDAPRC tldap_search_paged_recv(struct tevent_req *req, TALLOC_CTX *mem_ctx, struct tldap_message **pmsg) { struct tldap_search_paged_state *state = tevent_req_data( req, struct tldap_search_paged_state); TLDAPRC rc; if (!tevent_req_is_in_progress(req) && tevent_req_is_ldap_error(req, &rc)) { return rc; } if (tevent_req_is_in_progress(req)) { switch (tldap_msg_type(state->result)) { case TLDAP_RES_SEARCH_ENTRY: case TLDAP_RES_SEARCH_REFERENCE: break; default: return TLDAP_PROTOCOL_ERROR; } } *pmsg = talloc_move(mem_ctx, &state->result); return TLDAP_SUCCESS; }