mirror of
https://git.openldap.org/openldap/openldap.git
synced 2024-12-21 03:10:25 +08:00
179 lines
4.2 KiB
C
179 lines
4.2 KiB
C
|
/* extended.c - ldap backend extended routines */
|
||
|
/* $OpenLDAP$ */
|
||
|
/*
|
||
|
* Copyright 1998-2003 The OpenLDAP Foundation, All Rights Reserved.
|
||
|
* COPYING RESTRICTIONS APPLY, see COPYRIGHT file
|
||
|
*/
|
||
|
|
||
|
#include "portable.h"
|
||
|
|
||
|
#include <stdio.h>
|
||
|
#include <ac/string.h>
|
||
|
|
||
|
#include "slap.h"
|
||
|
#include "back-ldap.h"
|
||
|
#include "lber_pvt.h"
|
||
|
|
||
|
BI_op_extended ldap_back_exop_passwd;
|
||
|
|
||
|
static struct exop {
|
||
|
struct berval *oid;
|
||
|
BI_op_extended *extended;
|
||
|
} exop_table[] = {
|
||
|
{ (struct berval *)&slap_EXOP_MODIFY_PASSWD, ldap_back_exop_passwd },
|
||
|
{ NULL, NULL }
|
||
|
};
|
||
|
|
||
|
int
|
||
|
ldap_back_extended(
|
||
|
Backend *be,
|
||
|
Connection *conn,
|
||
|
Operation *op,
|
||
|
struct berval *reqoid,
|
||
|
struct berval *reqdata,
|
||
|
char **rspoid,
|
||
|
struct berval **rspdata,
|
||
|
LDAPControl *** rspctrls,
|
||
|
const char** text,
|
||
|
BerVarray *refs
|
||
|
)
|
||
|
{
|
||
|
int i;
|
||
|
|
||
|
for( i=0; exop_table[i].extended != NULL; i++ ) {
|
||
|
if( ber_bvcmp( exop_table[i].oid, reqoid ) == 0 ) {
|
||
|
return (exop_table[i].extended)(
|
||
|
be, conn, op,
|
||
|
reqoid, reqdata,
|
||
|
rspoid, rspdata, rspctrls,
|
||
|
text, refs );
|
||
|
}
|
||
|
}
|
||
|
|
||
|
*text = "not supported within naming context";
|
||
|
return LDAP_UNWILLING_TO_PERFORM;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
ldap_back_exop_passwd(
|
||
|
Backend *be,
|
||
|
Connection *conn,
|
||
|
Operation *op,
|
||
|
struct berval *reqoid,
|
||
|
struct berval *reqdata,
|
||
|
char **rspoid,
|
||
|
struct berval **rspdata,
|
||
|
LDAPControl *** rspctrls,
|
||
|
const char **text,
|
||
|
BerVarray *refs )
|
||
|
{
|
||
|
struct ldapinfo *li = (struct ldapinfo *) be->be_private;
|
||
|
struct ldapconn *lc;
|
||
|
struct berval id = { 0, NULL };
|
||
|
struct berval old = { 0, NULL };
|
||
|
struct berval new = { 0, NULL };
|
||
|
struct berval dn, mdn = { 0, NULL }, *newpw = NULL;
|
||
|
LDAPMessage *res;
|
||
|
ber_int_t msgid;
|
||
|
char *msg = NULL, *match = NULL;
|
||
|
int rc;
|
||
|
|
||
|
lc = ldap_back_getconn(li, conn, op);
|
||
|
if (!lc || !ldap_back_dobind(li, lc, conn, op) ) {
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
rc = slap_passwd_parse( reqdata, &id, &old, &new, text );
|
||
|
if (rc != LDAP_SUCCESS)
|
||
|
return rc;
|
||
|
|
||
|
if (id.bv_len) {
|
||
|
dn = id;
|
||
|
} else {
|
||
|
dn = op->o_dn;
|
||
|
}
|
||
|
|
||
|
#ifdef NEW_LOGGING
|
||
|
LDAP_LOG ( ACL, DETAIL1, "ldap_back_exop_passwd: \"%s\"%s\"\n",
|
||
|
dn.bv_val, id.bv_len ? " (proxy)" : "", 0 );
|
||
|
#else
|
||
|
Debug( LDAP_DEBUG_TRACE, "ldap_back_exop_passwd: \"%s\"%s\n",
|
||
|
dn.bv_val, id.bv_len ? " (proxy)" : "", 0 );
|
||
|
#endif
|
||
|
|
||
|
if (dn.bv_len == 0) {
|
||
|
*text = "No password is associated with the Root DSE";
|
||
|
return LDAP_UNWILLING_TO_PERFORM;
|
||
|
}
|
||
|
if (id.bv_len) {
|
||
|
#ifdef ENABLE_REWRITE
|
||
|
switch ( rewrite_session( li->rwinfo, "modifyPwd", dn.bv_val, conn, &mdn.bv_val ) ) {
|
||
|
case REWRITE_REGEXEC_OK:
|
||
|
if ( mdn.bv_val == NULL ) {
|
||
|
mdn.bv_val = dn.bv_val;
|
||
|
}
|
||
|
mdn.bv_len = strlen(mdn.bv_val);
|
||
|
#ifdef NEW_LOGGING
|
||
|
LDAP_LOG( BACK_LDAP, DETAIL1,
|
||
|
"[rw] modifyPwd: \"%s\" -> \"%s\"\n", dn.bv_val, mdn.bv_val, 0 );
|
||
|
#else /* !NEW_LOGGING */
|
||
|
Debug( LDAP_DEBUG_ARGS, "rw> modifyPwd: \"%s\" -> \"%s\"\n%s",
|
||
|
dn.bv_val, mdn.bv_val, "" );
|
||
|
#endif /* !NEW_LOGGING */
|
||
|
break;
|
||
|
|
||
|
case REWRITE_REGEXEC_UNWILLING:
|
||
|
send_ldap_result( conn, op, LDAP_UNWILLING_TO_PERFORM,
|
||
|
NULL, "Operation not allowed", NULL, NULL );
|
||
|
return( -1 );
|
||
|
|
||
|
case REWRITE_REGEXEC_ERR:
|
||
|
send_ldap_result( conn, op, LDAP_OTHER,
|
||
|
NULL, "Rewrite error", NULL, NULL );
|
||
|
return( -1 );
|
||
|
}
|
||
|
#else /* !ENABLE_REWRITE */
|
||
|
ldap_back_dn_massage( li, &dn, &mdn, 0, 1 );
|
||
|
#endif /* !ENABLE_REWRITE */
|
||
|
}
|
||
|
|
||
|
rc = ldap_passwd(lc->ld, id.bv_len ? &mdn : NULL, old.bv_len ? &old : NULL,
|
||
|
new.bv_len ? &new : NULL, op->o_ctrls, NULL, &msgid);
|
||
|
#ifdef ENABLE_REWRITE
|
||
|
if (mdn.bv_val != dn.bv_val)
|
||
|
#endif
|
||
|
free(mdn.bv_val);
|
||
|
if (rc == LDAP_SUCCESS) {
|
||
|
if (ldap_result(lc->ld, msgid, 1, NULL, &res) == -1) {
|
||
|
ldap_get_option(lc->ld, LDAP_OPT_ERROR_NUMBER, &rc);
|
||
|
} else {
|
||
|
/* sigh. parse twice, because parse_passwd doesn't give
|
||
|
* us the err / match / msg info.
|
||
|
*/
|
||
|
int err;
|
||
|
rc = ldap_parse_result(lc->ld, res, &err, &match, &msg,
|
||
|
NULL, NULL, 0);
|
||
|
if (rc == LDAP_SUCCESS) {
|
||
|
if (err == LDAP_SUCCESS) {
|
||
|
rc = ldap_parse_passwd(lc->ld, res, &newpw);
|
||
|
if (rc == LDAP_SUCCESS && newpw) {
|
||
|
*rspdata = slap_passwd_return(newpw);
|
||
|
ber_bvfree(newpw);
|
||
|
}
|
||
|
} else {
|
||
|
rc = err;
|
||
|
}
|
||
|
}
|
||
|
ldap_msgfree(res);
|
||
|
}
|
||
|
}
|
||
|
if (rc != LDAP_SUCCESS) {
|
||
|
rc = ldap_back_map_result(rc);
|
||
|
send_ldap_result(conn, op, rc, match, msg, NULL, NULL);
|
||
|
if (match) free(match);
|
||
|
if (msg) free(msg);
|
||
|
rc = -1;
|
||
|
}
|
||
|
return rc;
|
||
|
}
|