/* passwd.c - ldbm backend password routines */ /* $OpenLDAP$ */ /* * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved. * COPYING RESTRICTIONS APPLY, see COPYRIGHT file */ #include "portable.h" #include #include #include #include "slap.h" #include "back-ldbm.h" #include "proto-back-ldbm.h" int ldbm_back_exop_passwd( Backend *be, Connection *conn, Operation *op, const char *reqoid, struct berval *reqdata, char **rspoid, struct berval **rspdata, LDAPControl *** rspctrls, const char **text, struct berval *** refs ) { struct ldbminfo *li = (struct ldbminfo *) be->be_private; int rc; Entry *e = NULL; struct berval *hash = NULL; struct berval *id = NULL; struct berval *new = NULL; char *dn; assert( reqoid != NULL ); assert( strcmp( LDAP_EXOP_X_MODIFY_PASSWD, reqoid ) == 0 ); rc = slap_passwd_parse( reqdata, &id, NULL, &new, text ); #ifdef NEW_LOGGING LDAP_LOG(( "backend", LDAP_LEVEL_ENTRY, "ldbm_back_exop_passwd: \"%s\"\n", id ? id->bv_val : "" )); #else Debug( LDAP_DEBUG_ARGS, "==> ldbm_back_exop_passwd: \"%s\"\n", id ? id->bv_val : "", 0, 0 ); #endif if( rc != LDAP_SUCCESS ) { goto done; } if( new == NULL || new->bv_len == 0 ) { new = slap_passwd_generate(); if( new == NULL || new->bv_len == 0 ) { *text = "password generation failed."; rc = LDAP_OTHER; goto done; } *rspdata = slap_passwd_return( new ); } hash = slap_passwd_hash( new ); if( hash == NULL || hash->bv_len == 0 ) { *text = "password hash failed"; rc = LDAP_OTHER; goto done; } dn = id ? id->bv_val : op->o_dn; #ifdef NEW_LOGGING LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1, "ldbm_back_exop_passwd: \"%s\"%s\n", dn, id ? " (proxy)" : "" )); #else Debug( LDAP_DEBUG_TRACE, "passwd: \"%s\"%s\n", dn, id ? " (proxy)" : "", 0 ); #endif if( dn == NULL || dn[0] == '\0' ) { *text = "No password is associated with the Root DSE"; rc = LDAP_OPERATIONS_ERROR; goto done; } if( dn_normalize( dn ) == NULL ) { *text = "Invalid DN"; rc = LDAP_INVALID_DN_SYNTAX; goto done; } e = dn2entry_w( be, dn, NULL ); if( e == NULL ) { *text = "could not locate authorization entry"; rc = LDAP_NO_SUCH_OBJECT; goto done; } if( is_entry_alias( e ) ) { /* entry is an alias, don't allow operation */ *text = "authorization entry is alias"; rc = LDAP_ALIAS_PROBLEM; goto done; } rc = LDAP_OPERATIONS_ERROR; if( is_entry_referral( e ) ) { /* entry is an referral, don't allow operation */ *text = "authorization entry is referral"; goto done; } { Modifications ml; struct berval *vals[2]; char textbuf[SLAP_TEXT_BUFLEN]; /* non-returnable */ size_t textlen; vals[0] = hash; vals[1] = NULL; ml.sml_desc = slap_schema.si_ad_userPassword; ml.sml_bvalues = vals; ml.sml_op = LDAP_MOD_REPLACE; ml.sml_next = NULL; rc = ldbm_modify_internal( be, conn, op, op->o_ndn, &ml, e, text, textbuf, textlen ); /* FIXME: ldbm_modify_internal may set *tex = textbuf, * which is BAD */ if ( *text == textbuf ) { *text = NULL; } if( rc ) { /* cannot return textbuf */ *text = "entry modify failed"; goto done; } /* change the entry itself */ if( id2entry_add( be, e ) != 0 ) { *text = "entry update failed"; rc = LDAP_OTHER; } replog( be, op, e->e_dn, &ml ); } done: if( e != NULL ) { cache_return_entry_w( &li->li_cache, e ); } if( id != NULL ) { ber_bvfree( id ); } if( new != NULL ) { ber_bvfree( new ); } if( hash != NULL ) { ber_bvfree( hash ); } return rc; }