/* extended.c - ldap backend extended routines */ /* $OpenLDAP$ */ /* * Copyright 1998-2003 The OpenLDAP Foundation, All Rights Reserved. * COPYING RESTRICTIONS APPLY, see COPYRIGHT file */ #include "portable.h" #include #include #include "slap.h" #include "back-ldap.h" #include "lber_pvt.h" BI_op_extended ldap_back_exop_passwd; static struct exop { struct berval *oid; BI_op_extended *extended; } exop_table[] = { { (struct berval *)&slap_EXOP_MODIFY_PASSWD, ldap_back_exop_passwd }, { NULL, NULL } }; int ldap_back_extended( Operation *op, SlapReply *rs ) { int i; for( i=0; exop_table[i].extended != NULL; i++ ) { if( ber_bvcmp( exop_table[i].oid, &op->oq_extended.rs_reqoid ) == 0 ) { return (exop_table[i].extended)( op, rs ); } } rs->sr_text = "not supported within naming context"; return LDAP_UNWILLING_TO_PERFORM; } int ldap_back_exop_passwd( Operation *op, SlapReply *rs ) { struct ldapinfo *li = (struct ldapinfo *) op->o_bd->be_private; struct ldapconn *lc; struct berval id = { 0, NULL }; struct berval old = { 0, NULL }; struct berval new = { 0, NULL }; struct berval dn, mdn = { 0, NULL }, newpw; LDAPMessage *res; ber_int_t msgid; int rc; lc = ldap_back_getconn(op, rs); if (!lc || !ldap_back_dobind(lc, op, rs) ) { return -1; } rc = slap_passwd_parse( op->oq_extended.rs_reqdata, &id, &old, &new, &rs->sr_text ); if (rc != LDAP_SUCCESS) return rc; if (id.bv_len) { dn = id; } else { dn = op->o_dn; } #ifdef NEW_LOGGING LDAP_LOG ( ACL, DETAIL1, "ldap_back_exop_passwd: \"%s\"%s\"\n", dn.bv_val, id.bv_len ? " (proxy)" : "", 0 ); #else Debug( LDAP_DEBUG_TRACE, "ldap_back_exop_passwd: \"%s\"%s\n", dn.bv_val, id.bv_len ? " (proxy)" : "", 0 ); #endif if (dn.bv_len == 0) { rs->sr_text = "No password is associated with the Root DSE"; return LDAP_UNWILLING_TO_PERFORM; } if (id.bv_len) { #ifdef ENABLE_REWRITE switch ( rewrite_session( li->rwinfo, "modifyPwd", dn.bv_val, op->o_conn, &mdn.bv_val ) ) { case REWRITE_REGEXEC_OK: if ( mdn.bv_val == NULL ) { mdn.bv_val = dn.bv_val; } mdn.bv_len = strlen(mdn.bv_val); #ifdef NEW_LOGGING LDAP_LOG( BACK_LDAP, DETAIL1, "[rw] modifyPwd: \"%s\" -> \"%s\"\n", dn.bv_val, mdn.bv_val, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ARGS, "rw> modifyPwd: \"%s\" -> \"%s\"\n%s", dn.bv_val, mdn.bv_val, "" ); #endif /* !NEW_LOGGING */ break; case REWRITE_REGEXEC_UNWILLING: send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM, "Operation not allowed" ); return( -1 ); case REWRITE_REGEXEC_ERR: send_ldap_error( op, rs, LDAP_OTHER, "Rewrite error" ); return( -1 ); } #else /* !ENABLE_REWRITE */ ldap_back_dn_massage( li, &dn, &mdn, 0, 1 ); #endif /* !ENABLE_REWRITE */ } rc = ldap_passwd(lc->ld, id.bv_len ? &mdn : NULL, old.bv_len ? &old : NULL, new.bv_len ? &new : NULL, op->o_ctrls, NULL, &msgid); if (mdn.bv_val != dn.bv_val) { free(mdn.bv_val); } if (rc == LDAP_SUCCESS) { if (ldap_result(lc->ld, msgid, 1, NULL, &res) == -1) { ldap_get_option(lc->ld, LDAP_OPT_ERROR_NUMBER, &rc); } else { /* sigh. parse twice, because parse_passwd doesn't give * us the err / match / msg info. */ rc = ldap_parse_result(lc->ld, res, &rs->sr_err, (char **)&rs->sr_matched, (char **)&rs->sr_text, NULL, NULL, 0); if (rc == LDAP_SUCCESS) { if (rs->sr_err == LDAP_SUCCESS) { rc = ldap_parse_passwd(lc->ld, res, &newpw); if (rc == LDAP_SUCCESS && newpw.bv_val) { rs->sr_type = REP_EXTENDED; rs->sr_rspdata = slap_passwd_return(&newpw); free(newpw.bv_val); } } else { rc = rs->sr_err; } } ldap_msgfree(res); } } if (rc != LDAP_SUCCESS) { rs->sr_err = ldap_back_map_result(rc); send_ldap_result(op, rs); if (rs->sr_matched) free((char *)rs->sr_matched); if (rs->sr_text) free((char *)rs->sr_text); rs->sr_matched = NULL; rs->sr_text = NULL; rc = -1; } return rc; }