2 Unix SMB/CIFS mplementation.
5 Copyright (C) Stefan Metzmacher <metze@samba.org> 2006
6 Copyright (C) Simo Sorce 2005
7 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2008
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "dsdb/samdb/samdb.h"
25 #include "librpc/gen_ndr/ndr_drsuapi.h"
26 #include "librpc/gen_ndr/ndr_security.h"
27 #include "librpc/gen_ndr/ndr_misc.h"
29 #include <ldb_errors.h>
30 #include "system/time.h"
31 #include "../lib/util/charset/charset.h"
32 #include "librpc/ndr/libndr.h"
33 #include "../lib/util/asn1.h"
36 * Initialize dsdb_syntax_ctx with default values
39 void dsdb_syntax_ctx_init(struct dsdb_syntax_ctx *ctx,
40 struct ldb_context *ldb,
41 const struct dsdb_schema *schema)
47 * 'true' will keep current behavior,
48 * i.e. attributeID_id will be returned by default
50 ctx->is_schema_nc = true;
52 ctx->pfm_remote = NULL;
57 * Returns ATTID for DRS attribute.
59 * ATTID depends on whether we are replicating
60 * Schema NC or msDs-IntId is set for schemaAttribute
63 uint32_t dsdb_attribute_get_attid(const struct dsdb_attribute *attr,
66 if (!for_schema_nc && attr->msDS_IntId) {
67 return attr->msDS_IntId;
70 return attr->attributeID_id;
74 * Map an ATTID from remote DC to a local ATTID
75 * using remote prefixMap
77 static bool dsdb_syntax_attid_from_remote_attid(const struct dsdb_syntax_ctx *ctx,
86 * map remote ATTID to local directly in case
87 * of no remote prefixMap (during provision for instance)
89 if (!ctx->pfm_remote) {
90 *id_local = id_remote;
94 werr = dsdb_schema_pfm_oid_from_attid(ctx->pfm_remote, id_remote, mem_ctx, &oid);
95 if (!W_ERROR_IS_OK(werr)) {
96 DEBUG(0,("ATTID->OID failed (%s) for: 0x%08X\n", win_errstr(werr), id_remote));
100 werr = dsdb_schema_pfm_make_attid(ctx->schema->prefixmap, oid, id_local);
101 if (!W_ERROR_IS_OK(werr)) {
102 DEBUG(0,("OID->ATTID failed (%s) for: %s\n", win_errstr(werr), oid));
109 static WERROR dsdb_syntax_FOOBAR_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
110 const struct dsdb_attribute *attr,
111 const struct drsuapi_DsReplicaAttribute *in,
113 struct ldb_message_element *out)
118 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
119 W_ERROR_HAVE_NO_MEMORY(out->name);
121 out->num_values = in->value_ctr.num_values;
122 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
123 W_ERROR_HAVE_NO_MEMORY(out->values);
125 for (i=0; i < out->num_values; i++) {
128 if (in->value_ctr.values[i].blob == NULL) {
132 str = talloc_asprintf(out->values, "%s: not implemented",
134 W_ERROR_HAVE_NO_MEMORY(str);
136 out->values[i] = data_blob_string_const(str);
142 static WERROR dsdb_syntax_FOOBAR_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
143 const struct dsdb_attribute *attr,
144 const struct ldb_message_element *in,
146 struct drsuapi_DsReplicaAttribute *out)
151 static WERROR dsdb_syntax_FOOBAR_validate_ldb(const struct dsdb_syntax_ctx *ctx,
152 const struct dsdb_attribute *attr,
153 const struct ldb_message_element *in)
158 static WERROR dsdb_syntax_BOOL_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
159 const struct dsdb_attribute *attr,
160 const struct drsuapi_DsReplicaAttribute *in,
162 struct ldb_message_element *out)
167 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
168 W_ERROR_HAVE_NO_MEMORY(out->name);
170 out->num_values = in->value_ctr.num_values;
171 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
172 W_ERROR_HAVE_NO_MEMORY(out->values);
174 for (i=0; i < out->num_values; i++) {
178 if (in->value_ctr.values[i].blob == NULL) {
182 if (in->value_ctr.values[i].blob->length != 4) {
186 v = IVAL(in->value_ctr.values[i].blob->data, 0);
189 str = talloc_strdup(out->values, "TRUE");
190 W_ERROR_HAVE_NO_MEMORY(str);
192 str = talloc_strdup(out->values, "FALSE");
193 W_ERROR_HAVE_NO_MEMORY(str);
196 out->values[i] = data_blob_string_const(str);
202 static WERROR dsdb_syntax_BOOL_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
203 const struct dsdb_attribute *attr,
204 const struct ldb_message_element *in,
206 struct drsuapi_DsReplicaAttribute *out)
211 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
215 out->attid = dsdb_attribute_get_attid(attr,
217 out->value_ctr.num_values = in->num_values;
218 out->value_ctr.values = talloc_array(mem_ctx,
219 struct drsuapi_DsAttributeValue,
221 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
223 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
224 W_ERROR_HAVE_NO_MEMORY(blobs);
226 for (i=0; i < in->num_values; i++) {
227 out->value_ctr.values[i].blob = &blobs[i];
229 blobs[i] = data_blob_talloc(blobs, NULL, 4);
230 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
232 if (strcmp("TRUE", (const char *)in->values[i].data) == 0) {
233 SIVAL(blobs[i].data, 0, 0x00000001);
234 } else if (strcmp("FALSE", (const char *)in->values[i].data) == 0) {
235 SIVAL(blobs[i].data, 0, 0x00000000);
244 static WERROR dsdb_syntax_BOOL_validate_ldb(const struct dsdb_syntax_ctx *ctx,
245 const struct dsdb_attribute *attr,
246 const struct ldb_message_element *in)
250 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
254 for (i=0; i < in->num_values; i++) {
257 if (in->values[i].length == 0) {
258 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
262 (const char *)in->values[i].data,
263 in->values[i].length);
265 (const char *)in->values[i].data,
266 in->values[i].length);
268 if (t != 0 && f != 0) {
269 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
276 static WERROR dsdb_syntax_INT32_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
277 const struct dsdb_attribute *attr,
278 const struct drsuapi_DsReplicaAttribute *in,
280 struct ldb_message_element *out)
285 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
286 W_ERROR_HAVE_NO_MEMORY(out->name);
288 out->num_values = in->value_ctr.num_values;
289 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
290 W_ERROR_HAVE_NO_MEMORY(out->values);
292 for (i=0; i < out->num_values; i++) {
296 if (in->value_ctr.values[i].blob == NULL) {
300 if (in->value_ctr.values[i].blob->length != 4) {
304 v = IVALS(in->value_ctr.values[i].blob->data, 0);
306 str = talloc_asprintf(out->values, "%d", v);
307 W_ERROR_HAVE_NO_MEMORY(str);
309 out->values[i] = data_blob_string_const(str);
315 static WERROR dsdb_syntax_INT32_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
316 const struct dsdb_attribute *attr,
317 const struct ldb_message_element *in,
319 struct drsuapi_DsReplicaAttribute *out)
324 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
328 out->attid = dsdb_attribute_get_attid(attr,
330 out->value_ctr.num_values = in->num_values;
331 out->value_ctr.values = talloc_array(mem_ctx,
332 struct drsuapi_DsAttributeValue,
334 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
336 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
337 W_ERROR_HAVE_NO_MEMORY(blobs);
339 for (i=0; i < in->num_values; i++) {
342 out->value_ctr.values[i].blob = &blobs[i];
344 blobs[i] = data_blob_talloc(blobs, NULL, 4);
345 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
347 /* We've to use "strtoll" here to have the intended overflows.
348 * Otherwise we may get "LONG_MAX" and the conversion is wrong. */
349 v = (int32_t) strtoll((char *)in->values[i].data, NULL, 0);
351 SIVALS(blobs[i].data, 0, v);
357 static WERROR dsdb_syntax_INT32_validate_ldb(const struct dsdb_syntax_ctx *ctx,
358 const struct dsdb_attribute *attr,
359 const struct ldb_message_element *in)
363 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
367 for (i=0; i < in->num_values; i++) {
369 char buf[sizeof("-2147483648")];
373 if (in->values[i].length >= sizeof(buf)) {
374 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
377 memcpy(buf, in->values[i].data, in->values[i].length);
379 v = strtol(buf, &end, 10);
381 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
383 if (end && end[0] != '\0') {
384 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
387 if (attr->rangeLower) {
388 if ((int32_t)v < (int32_t)*attr->rangeLower) {
389 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
393 if (attr->rangeUpper) {
394 if ((int32_t)v > (int32_t)*attr->rangeUpper) {
395 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
403 static WERROR dsdb_syntax_INT64_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
404 const struct dsdb_attribute *attr,
405 const struct drsuapi_DsReplicaAttribute *in,
407 struct ldb_message_element *out)
412 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
413 W_ERROR_HAVE_NO_MEMORY(out->name);
415 out->num_values = in->value_ctr.num_values;
416 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
417 W_ERROR_HAVE_NO_MEMORY(out->values);
419 for (i=0; i < out->num_values; i++) {
423 if (in->value_ctr.values[i].blob == NULL) {
427 if (in->value_ctr.values[i].blob->length != 8) {
431 v = BVALS(in->value_ctr.values[i].blob->data, 0);
433 str = talloc_asprintf(out->values, "%lld", (long long int)v);
434 W_ERROR_HAVE_NO_MEMORY(str);
436 out->values[i] = data_blob_string_const(str);
442 static WERROR dsdb_syntax_INT64_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
443 const struct dsdb_attribute *attr,
444 const struct ldb_message_element *in,
446 struct drsuapi_DsReplicaAttribute *out)
451 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
455 out->attid = dsdb_attribute_get_attid(attr,
457 out->value_ctr.num_values = in->num_values;
458 out->value_ctr.values = talloc_array(mem_ctx,
459 struct drsuapi_DsAttributeValue,
461 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
463 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
464 W_ERROR_HAVE_NO_MEMORY(blobs);
466 for (i=0; i < in->num_values; i++) {
469 out->value_ctr.values[i].blob = &blobs[i];
471 blobs[i] = data_blob_talloc(blobs, NULL, 8);
472 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
474 v = strtoll((const char *)in->values[i].data, NULL, 10);
476 SBVALS(blobs[i].data, 0, v);
482 static WERROR dsdb_syntax_INT64_validate_ldb(const struct dsdb_syntax_ctx *ctx,
483 const struct dsdb_attribute *attr,
484 const struct ldb_message_element *in)
488 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
492 for (i=0; i < in->num_values; i++) {
494 char buf[sizeof("-9223372036854775808")];
498 if (in->values[i].length >= sizeof(buf)) {
499 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
501 memcpy(buf, in->values[i].data, in->values[i].length);
504 v = strtoll(buf, &end, 10);
506 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
508 if (end && end[0] != '\0') {
509 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
512 if (attr->rangeLower) {
513 if ((int64_t)v < (int64_t)*attr->rangeLower) {
514 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
518 if (attr->rangeUpper) {
519 if ((int64_t)v > (int64_t)*attr->rangeUpper) {
520 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
527 static WERROR dsdb_syntax_NTTIME_UTC_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
528 const struct dsdb_attribute *attr,
529 const struct drsuapi_DsReplicaAttribute *in,
531 struct ldb_message_element *out)
536 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
537 W_ERROR_HAVE_NO_MEMORY(out->name);
539 out->num_values = in->value_ctr.num_values;
540 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
541 W_ERROR_HAVE_NO_MEMORY(out->values);
543 for (i=0; i < out->num_values; i++) {
548 if (in->value_ctr.values[i].blob == NULL) {
552 if (in->value_ctr.values[i].blob->length != 8) {
556 v = BVAL(in->value_ctr.values[i].blob->data, 0);
558 /* special case for 1601 zero timestamp */
559 out->values[i] = data_blob_string_const("16010101000000.0Z");
563 t = nt_time_to_unix(v);
566 * NOTE: On a w2k3 server you can set a GeneralizedTime string
567 * via LDAP, but you get back an UTCTime string,
568 * but via DRSUAPI you get back the NTTIME_1sec value
569 * that represents the GeneralizedTime value!
571 * So if we store the UTCTime string in our ldb
572 * we'll loose information!
574 str = ldb_timestring_utc(out->values, t);
575 W_ERROR_HAVE_NO_MEMORY(str);
576 out->values[i] = data_blob_string_const(str);
582 static WERROR dsdb_syntax_NTTIME_UTC_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
583 const struct dsdb_attribute *attr,
584 const struct ldb_message_element *in,
586 struct drsuapi_DsReplicaAttribute *out)
591 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
595 out->attid = dsdb_attribute_get_attid(attr,
597 out->value_ctr.num_values = in->num_values;
598 out->value_ctr.values = talloc_array(mem_ctx,
599 struct drsuapi_DsAttributeValue,
601 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
603 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
604 W_ERROR_HAVE_NO_MEMORY(blobs);
606 for (i=0; i < in->num_values; i++) {
610 out->value_ctr.values[i].blob = &blobs[i];
612 blobs[i] = data_blob_talloc(blobs, NULL, 8);
613 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
615 if (ldb_val_string_cmp("16010101000000.0Z", &in->values[i]) == 0) {
616 SBVALS(blobs[i].data, 0, 0);
620 t = ldb_string_utc_to_time((const char *)in->values[i].data);
621 unix_to_nt_time(&v, t);
624 SBVAL(blobs[i].data, 0, v);
630 static WERROR dsdb_syntax_NTTIME_UTC_validate_ldb(const struct dsdb_syntax_ctx *ctx,
631 const struct dsdb_attribute *attr,
632 const struct ldb_message_element *in)
636 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
640 for (i=0; i < in->num_values; i++) {
642 char buf[sizeof("090826075717Z")];
645 if (in->values[i].length >= sizeof(buf)) {
646 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
648 memcpy(buf, in->values[i].data, in->values[i].length);
650 t = ldb_string_utc_to_time(buf);
652 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
655 if (attr->rangeLower) {
656 if ((int32_t)t < (int32_t)*attr->rangeLower) {
657 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
661 if (attr->rangeUpper) {
662 if ((int32_t)t > (int32_t)*attr->rangeLower) {
663 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
668 * TODO: verify the comment in the
669 * dsdb_syntax_NTTIME_UTC_drsuapi_to_ldb() function!
676 static WERROR dsdb_syntax_NTTIME_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
677 const struct dsdb_attribute *attr,
678 const struct drsuapi_DsReplicaAttribute *in,
680 struct ldb_message_element *out)
685 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
686 W_ERROR_HAVE_NO_MEMORY(out->name);
688 out->num_values = in->value_ctr.num_values;
689 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
690 W_ERROR_HAVE_NO_MEMORY(out->values);
692 for (i=0; i < out->num_values; i++) {
697 if (in->value_ctr.values[i].blob == NULL) {
701 if (in->value_ctr.values[i].blob->length != 8) {
705 v = BVAL(in->value_ctr.values[i].blob->data, 0);
707 /* special case for 1601 zero timestamp */
708 out->values[i] = data_blob_string_const("16010101000000.0Z");
712 t = nt_time_to_unix(v);
714 str = ldb_timestring(out->values, t);
715 W_ERROR_HAVE_NO_MEMORY(str);
717 out->values[i] = data_blob_string_const(str);
723 static WERROR dsdb_syntax_NTTIME_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
724 const struct dsdb_attribute *attr,
725 const struct ldb_message_element *in,
727 struct drsuapi_DsReplicaAttribute *out)
732 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
736 out->attid = dsdb_attribute_get_attid(attr,
738 out->value_ctr.num_values = in->num_values;
739 out->value_ctr.values = talloc_array(mem_ctx,
740 struct drsuapi_DsAttributeValue,
742 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
744 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
745 W_ERROR_HAVE_NO_MEMORY(blobs);
747 for (i=0; i < in->num_values; i++) {
752 out->value_ctr.values[i].blob = &blobs[i];
754 blobs[i] = data_blob_talloc(blobs, NULL, 8);
755 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
757 if (ldb_val_string_cmp("16010101000000.0Z", &in->values[i]) == 0) {
758 SBVALS(blobs[i].data, 0, 0);
762 ret = ldb_val_to_time(&in->values[i], &t);
763 if (ret != LDB_SUCCESS) {
764 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
766 unix_to_nt_time(&v, t);
769 SBVAL(blobs[i].data, 0, v);
775 static WERROR dsdb_syntax_NTTIME_validate_ldb(const struct dsdb_syntax_ctx *ctx,
776 const struct dsdb_attribute *attr,
777 const struct ldb_message_element *in)
781 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
785 for (i=0; i < in->num_values; i++) {
789 ret = ldb_val_to_time(&in->values[i], &t);
790 if (ret != LDB_SUCCESS) {
791 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
794 if (attr->rangeLower) {
795 if ((int32_t)t < (int32_t)*attr->rangeLower) {
796 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
800 if (attr->rangeUpper) {
801 if ((int32_t)t > (int32_t)*attr->rangeLower) {
802 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
810 static WERROR dsdb_syntax_DATA_BLOB_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
811 const struct dsdb_attribute *attr,
812 const struct drsuapi_DsReplicaAttribute *in,
814 struct ldb_message_element *out)
819 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
820 W_ERROR_HAVE_NO_MEMORY(out->name);
822 out->num_values = in->value_ctr.num_values;
823 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
824 W_ERROR_HAVE_NO_MEMORY(out->values);
826 for (i=0; i < out->num_values; i++) {
827 if (in->value_ctr.values[i].blob == NULL) {
831 if (in->value_ctr.values[i].blob->length == 0) {
835 out->values[i] = data_blob_dup_talloc(out->values,
836 in->value_ctr.values[i].blob);
837 W_ERROR_HAVE_NO_MEMORY(out->values[i].data);
843 static WERROR dsdb_syntax_DATA_BLOB_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
844 const struct dsdb_attribute *attr,
845 const struct ldb_message_element *in,
847 struct drsuapi_DsReplicaAttribute *out)
852 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
856 out->attid = dsdb_attribute_get_attid(attr,
858 out->value_ctr.num_values = in->num_values;
859 out->value_ctr.values = talloc_array(mem_ctx,
860 struct drsuapi_DsAttributeValue,
862 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
864 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
865 W_ERROR_HAVE_NO_MEMORY(blobs);
867 for (i=0; i < in->num_values; i++) {
868 out->value_ctr.values[i].blob = &blobs[i];
870 blobs[i] = data_blob_dup_talloc(blobs, &in->values[i]);
871 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
877 static WERROR dsdb_syntax_DATA_BLOB_validate_one_val(const struct dsdb_syntax_ctx *ctx,
878 const struct dsdb_attribute *attr,
879 const struct ldb_val *val)
881 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
885 if (attr->rangeLower) {
886 if ((uint32_t)val->length < (uint32_t)*attr->rangeLower) {
887 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
891 if (attr->rangeUpper) {
892 if ((uint32_t)val->length > (uint32_t)*attr->rangeUpper) {
893 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
900 static WERROR dsdb_syntax_DATA_BLOB_validate_ldb(const struct dsdb_syntax_ctx *ctx,
901 const struct dsdb_attribute *attr,
902 const struct ldb_message_element *in)
907 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
911 for (i=0; i < in->num_values; i++) {
912 if (in->values[i].length == 0) {
913 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
916 status = dsdb_syntax_DATA_BLOB_validate_one_val(ctx,
919 if (!W_ERROR_IS_OK(status)) {
927 static WERROR _dsdb_syntax_auto_OID_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
928 const struct dsdb_attribute *attr,
929 const struct drsuapi_DsReplicaAttribute *in,
931 struct ldb_message_element *out)
936 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
937 W_ERROR_HAVE_NO_MEMORY(out->name);
939 out->num_values = in->value_ctr.num_values;
940 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
941 W_ERROR_HAVE_NO_MEMORY(out->values);
943 for (i=0; i < out->num_values; i++) {
945 const struct dsdb_class *c;
946 const struct dsdb_attribute *a;
947 const char *str = NULL;
949 if (in->value_ctr.values[i].blob == NULL) {
953 if (in->value_ctr.values[i].blob->length != 4) {
957 v = IVAL(in->value_ctr.values[i].blob->data, 0);
959 if ((c = dsdb_class_by_governsID_id(ctx->schema, v))) {
960 str = talloc_strdup(out->values, c->lDAPDisplayName);
961 } else if ((a = dsdb_attribute_by_attributeID_id(ctx->schema, v))) {
962 str = talloc_strdup(out->values, a->lDAPDisplayName);
965 SMB_ASSERT(ctx->pfm_remote);
966 werr = dsdb_schema_pfm_oid_from_attid(ctx->pfm_remote, v,
968 W_ERROR_NOT_OK_RETURN(werr);
970 W_ERROR_HAVE_NO_MEMORY(str);
972 /* the values need to be reversed */
973 out->values[out->num_values - (i + 1)] = data_blob_string_const(str);
979 static WERROR _dsdb_syntax_OID_obj_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
980 const struct dsdb_attribute *attr,
981 const struct drsuapi_DsReplicaAttribute *in,
983 struct ldb_message_element *out)
988 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
989 W_ERROR_HAVE_NO_MEMORY(out->name);
991 out->num_values = in->value_ctr.num_values;
992 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
993 W_ERROR_HAVE_NO_MEMORY(out->values);
995 for (i=0; i < out->num_values; i++) {
997 const struct dsdb_class *c;
1000 if (in->value_ctr.values[i].blob == NULL) {
1004 if (in->value_ctr.values[i].blob->length != 4) {
1008 v = IVAL(in->value_ctr.values[i].blob->data, 0);
1010 /* convert remote ATTID to local ATTID */
1011 if (!dsdb_syntax_attid_from_remote_attid(ctx, mem_ctx, v, &v)) {
1012 DEBUG(1,(__location__ ": Failed to map remote ATTID to local ATTID!\n"));
1016 c = dsdb_class_by_governsID_id(ctx->schema, v);
1018 DEBUG(1,(__location__ ": Unknown governsID 0x%08X\n", v));
1022 str = talloc_strdup(out->values, c->lDAPDisplayName);
1023 W_ERROR_HAVE_NO_MEMORY(str);
1025 /* the values need to be reversed */
1026 out->values[out->num_values - (i + 1)] = data_blob_string_const(str);
1032 static WERROR _dsdb_syntax_OID_attr_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1033 const struct dsdb_attribute *attr,
1034 const struct drsuapi_DsReplicaAttribute *in,
1035 TALLOC_CTX *mem_ctx,
1036 struct ldb_message_element *out)
1041 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1042 W_ERROR_HAVE_NO_MEMORY(out->name);
1044 out->num_values = in->value_ctr.num_values;
1045 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1046 W_ERROR_HAVE_NO_MEMORY(out->values);
1048 for (i=0; i < out->num_values; i++) {
1050 const struct dsdb_attribute *a;
1053 if (in->value_ctr.values[i].blob == NULL) {
1057 if (in->value_ctr.values[i].blob->length != 4) {
1061 v = IVAL(in->value_ctr.values[i].blob->data, 0);
1063 /* convert remote ATTID to local ATTID */
1064 if (!dsdb_syntax_attid_from_remote_attid(ctx, mem_ctx, v, &v)) {
1065 DEBUG(1,(__location__ ": Failed to map remote ATTID to local ATTID!\n"));
1069 a = dsdb_attribute_by_attributeID_id(ctx->schema, v);
1071 DEBUG(1,(__location__ ": Unknown attributeID_id 0x%08X\n", v));
1075 str = talloc_strdup(out->values, a->lDAPDisplayName);
1076 W_ERROR_HAVE_NO_MEMORY(str);
1078 /* the values need to be reversed */
1079 out->values[out->num_values - (i + 1)] = data_blob_string_const(str);
1085 static WERROR _dsdb_syntax_OID_oid_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1086 const struct dsdb_attribute *attr,
1087 const struct drsuapi_DsReplicaAttribute *in,
1088 TALLOC_CTX *mem_ctx,
1089 struct ldb_message_element *out)
1092 const struct dsdb_schema_prefixmap *prefixmap;
1094 if (ctx->pfm_remote != NULL) {
1095 prefixmap = ctx->pfm_remote;
1097 prefixmap = ctx->schema->prefixmap;
1099 SMB_ASSERT(prefixmap);
1102 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1103 W_ERROR_HAVE_NO_MEMORY(out->name);
1105 out->num_values = in->value_ctr.num_values;
1106 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1107 W_ERROR_HAVE_NO_MEMORY(out->values);
1109 for (i=0; i < out->num_values; i++) {
1114 if (in->value_ctr.values[i].blob == NULL) {
1118 if (in->value_ctr.values[i].blob->length != 4) {
1122 attid = IVAL(in->value_ctr.values[i].blob->data, 0);
1124 status = dsdb_schema_pfm_oid_from_attid(prefixmap, attid,
1126 if (!W_ERROR_IS_OK(status)) {
1127 DEBUG(0,(__location__ ": Error: Unknown ATTID 0x%08X\n",
1132 out->values[i] = data_blob_string_const(oid);
1138 static WERROR _dsdb_syntax_auto_OID_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1139 const struct dsdb_attribute *attr,
1140 const struct ldb_message_element *in,
1141 TALLOC_CTX *mem_ctx,
1142 struct drsuapi_DsReplicaAttribute *out)
1147 out->attid= dsdb_attribute_get_attid(attr,
1149 out->value_ctr.num_values= in->num_values;
1150 out->value_ctr.values= talloc_array(mem_ctx,
1151 struct drsuapi_DsAttributeValue,
1153 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1155 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1156 W_ERROR_HAVE_NO_MEMORY(blobs);
1158 for (i=0; i < in->num_values; i++) {
1159 const struct dsdb_class *obj_class;
1160 const struct dsdb_attribute *obj_attr;
1163 out->value_ctr.values[i].blob= &blobs[i];
1165 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1166 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1168 /* in DRS windows puts the classes in the opposite
1169 order to the order used in ldap */
1170 v = &in->values[(in->num_values-1)-i];
1172 if ((obj_class = dsdb_class_by_lDAPDisplayName_ldb_val(ctx->schema, v))) {
1173 SIVAL(blobs[i].data, 0, obj_class->governsID_id);
1174 } else if ((obj_attr = dsdb_attribute_by_lDAPDisplayName_ldb_val(ctx->schema, v))) {
1175 SIVAL(blobs[i].data, 0, obj_attr->attributeID_id);
1179 werr = dsdb_schema_pfm_attid_from_oid(ctx->schema->prefixmap,
1180 (const char *)v->data,
1182 W_ERROR_NOT_OK_RETURN(werr);
1183 SIVAL(blobs[i].data, 0, attid);
1192 static WERROR _dsdb_syntax_OID_obj_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1193 const struct dsdb_attribute *attr,
1194 const struct ldb_message_element *in,
1195 TALLOC_CTX *mem_ctx,
1196 struct drsuapi_DsReplicaAttribute *out)
1201 out->attid= dsdb_attribute_get_attid(attr,
1203 out->value_ctr.num_values= in->num_values;
1204 out->value_ctr.values= talloc_array(mem_ctx,
1205 struct drsuapi_DsAttributeValue,
1207 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1209 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1210 W_ERROR_HAVE_NO_MEMORY(blobs);
1212 for (i=0; i < in->num_values; i++) {
1213 const struct dsdb_class *obj_class;
1215 out->value_ctr.values[i].blob= &blobs[i];
1217 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1218 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1220 /* in DRS windows puts the classes in the opposite
1221 order to the order used in ldap */
1222 obj_class = dsdb_class_by_lDAPDisplayName(ctx->schema,
1223 (const char *)in->values[(in->num_values-1)-i].data);
1227 SIVAL(blobs[i].data, 0, obj_class->governsID_id);
1234 static WERROR _dsdb_syntax_OID_attr_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1235 const struct dsdb_attribute *attr,
1236 const struct ldb_message_element *in,
1237 TALLOC_CTX *mem_ctx,
1238 struct drsuapi_DsReplicaAttribute *out)
1243 out->attid= dsdb_attribute_get_attid(attr,
1245 out->value_ctr.num_values= in->num_values;
1246 out->value_ctr.values= talloc_array(mem_ctx,
1247 struct drsuapi_DsAttributeValue,
1249 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1251 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1252 W_ERROR_HAVE_NO_MEMORY(blobs);
1254 for (i=0; i < in->num_values; i++) {
1255 const struct dsdb_attribute *obj_attr;
1257 out->value_ctr.values[i].blob= &blobs[i];
1259 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1260 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1262 obj_attr = dsdb_attribute_by_lDAPDisplayName(ctx->schema, (const char *)in->values[i].data);
1266 SIVAL(blobs[i].data, 0, obj_attr->attributeID_id);
1273 static WERROR _dsdb_syntax_OID_oid_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1274 const struct dsdb_attribute *attr,
1275 const struct ldb_message_element *in,
1276 TALLOC_CTX *mem_ctx,
1277 struct drsuapi_DsReplicaAttribute *out)
1282 out->attid= dsdb_attribute_get_attid(attr,
1284 out->value_ctr.num_values= in->num_values;
1285 out->value_ctr.values= talloc_array(mem_ctx,
1286 struct drsuapi_DsAttributeValue,
1288 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1290 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1291 W_ERROR_HAVE_NO_MEMORY(blobs);
1293 for (i=0; i < in->num_values; i++) {
1297 out->value_ctr.values[i].blob= &blobs[i];
1299 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1300 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1302 status = dsdb_schema_pfm_attid_from_oid(ctx->schema->prefixmap,
1303 (const char *)in->values[i].data,
1305 W_ERROR_NOT_OK_RETURN(status);
1307 SIVAL(blobs[i].data, 0, attid);
1313 static WERROR dsdb_syntax_OID_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1314 const struct dsdb_attribute *attr,
1315 const struct drsuapi_DsReplicaAttribute *in,
1316 TALLOC_CTX *mem_ctx,
1317 struct ldb_message_element *out)
1321 switch (attr->attributeID_id) {
1322 case DRSUAPI_ATTID_objectClass:
1323 case DRSUAPI_ATTID_subClassOf:
1324 case DRSUAPI_ATTID_auxiliaryClass:
1325 case DRSUAPI_ATTID_systemAuxiliaryClass:
1326 case DRSUAPI_ATTID_systemPossSuperiors:
1327 case DRSUAPI_ATTID_possSuperiors:
1328 werr = _dsdb_syntax_OID_obj_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1330 case DRSUAPI_ATTID_systemMustContain:
1331 case DRSUAPI_ATTID_systemMayContain:
1332 case DRSUAPI_ATTID_mustContain:
1333 case DRSUAPI_ATTID_rDNAttId:
1334 case DRSUAPI_ATTID_transportAddressAttribute:
1335 case DRSUAPI_ATTID_mayContain:
1336 werr = _dsdb_syntax_OID_attr_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1338 case DRSUAPI_ATTID_governsID:
1339 case DRSUAPI_ATTID_attributeID:
1340 case DRSUAPI_ATTID_attributeSyntax:
1341 werr = _dsdb_syntax_OID_oid_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1344 DEBUG(0,(__location__ ": Unknown handling for attributeID_id for %s\n",
1345 attr->lDAPDisplayName));
1346 return _dsdb_syntax_auto_OID_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1349 /* When we are doing the vampire of a schema, we don't want
1350 * the inability to reference an OID to get in the way.
1351 * Otherwise, we won't get the new schema with which to
1352 * understand this */
1353 if (!W_ERROR_IS_OK(werr) && ctx->schema->relax_OID_conversions) {
1354 return _dsdb_syntax_OID_oid_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1359 static WERROR dsdb_syntax_OID_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1360 const struct dsdb_attribute *attr,
1361 const struct ldb_message_element *in,
1362 TALLOC_CTX *mem_ctx,
1363 struct drsuapi_DsReplicaAttribute *out)
1365 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1369 switch (attr->attributeID_id) {
1370 case DRSUAPI_ATTID_objectClass:
1371 case DRSUAPI_ATTID_subClassOf:
1372 case DRSUAPI_ATTID_auxiliaryClass:
1373 case DRSUAPI_ATTID_systemAuxiliaryClass:
1374 case DRSUAPI_ATTID_systemPossSuperiors:
1375 case DRSUAPI_ATTID_possSuperiors:
1376 return _dsdb_syntax_OID_obj_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1377 case DRSUAPI_ATTID_systemMustContain:
1378 case DRSUAPI_ATTID_systemMayContain:
1379 case DRSUAPI_ATTID_mustContain:
1380 case DRSUAPI_ATTID_rDNAttId:
1381 case DRSUAPI_ATTID_transportAddressAttribute:
1382 case DRSUAPI_ATTID_mayContain:
1383 return _dsdb_syntax_OID_attr_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1384 case DRSUAPI_ATTID_governsID:
1385 case DRSUAPI_ATTID_attributeID:
1386 case DRSUAPI_ATTID_attributeSyntax:
1387 return _dsdb_syntax_OID_oid_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1390 DEBUG(0,(__location__ ": Unknown handling for attributeID_id for %s\n",
1391 attr->lDAPDisplayName));
1393 return _dsdb_syntax_auto_OID_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1396 static WERROR _dsdb_syntax_OID_validate_numericoid(const struct dsdb_syntax_ctx *ctx,
1397 const struct dsdb_attribute *attr,
1398 const struct ldb_message_element *in)
1401 TALLOC_CTX *tmp_ctx;
1403 tmp_ctx = talloc_new(ctx->ldb);
1404 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1406 for (i=0; i < in->num_values; i++) {
1409 const char *oid = (const char*)in->values[i].data;
1411 if (in->values[i].length == 0) {
1412 talloc_free(tmp_ctx);
1413 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1416 if (!ber_write_OID_String(tmp_ctx, &blob, oid)) {
1417 DEBUG(0,("ber_write_OID_String() failed for %s\n", oid));
1418 talloc_free(tmp_ctx);
1419 return WERR_INVALID_PARAMETER;
1422 if (!ber_read_OID_String(tmp_ctx, blob, &oid_out)) {
1423 DEBUG(0,("ber_read_OID_String() failed for %s\n",
1424 hex_encode_talloc(tmp_ctx, blob.data, blob.length)));
1425 talloc_free(tmp_ctx);
1426 return WERR_INVALID_PARAMETER;
1429 if (strcmp(oid, oid_out) != 0) {
1430 talloc_free(tmp_ctx);
1431 return WERR_INVALID_PARAMETER;
1435 talloc_free(tmp_ctx);
1439 static WERROR dsdb_syntax_OID_validate_ldb(const struct dsdb_syntax_ctx *ctx,
1440 const struct dsdb_attribute *attr,
1441 const struct ldb_message_element *in)
1444 struct drsuapi_DsReplicaAttribute drs_tmp;
1445 struct ldb_message_element ldb_tmp;
1446 TALLOC_CTX *tmp_ctx;
1448 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1452 switch (attr->attributeID_id) {
1453 case DRSUAPI_ATTID_governsID:
1454 case DRSUAPI_ATTID_attributeID:
1455 case DRSUAPI_ATTID_attributeSyntax:
1456 return _dsdb_syntax_OID_validate_numericoid(ctx, attr, in);
1460 * TODO: optimize and verify this code
1463 tmp_ctx = talloc_new(ctx->ldb);
1464 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1466 status = dsdb_syntax_OID_ldb_to_drsuapi(ctx,
1471 if (!W_ERROR_IS_OK(status)) {
1472 talloc_free(tmp_ctx);
1476 status = dsdb_syntax_OID_drsuapi_to_ldb(ctx,
1481 if (!W_ERROR_IS_OK(status)) {
1482 talloc_free(tmp_ctx);
1486 talloc_free(tmp_ctx);
1490 static WERROR dsdb_syntax_UNICODE_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1491 const struct dsdb_attribute *attr,
1492 const struct drsuapi_DsReplicaAttribute *in,
1493 TALLOC_CTX *mem_ctx,
1494 struct ldb_message_element *out)
1499 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1500 W_ERROR_HAVE_NO_MEMORY(out->name);
1502 out->num_values = in->value_ctr.num_values;
1503 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1504 W_ERROR_HAVE_NO_MEMORY(out->values);
1506 for (i=0; i < out->num_values; i++) {
1507 size_t converted_size = 0;
1510 if (in->value_ctr.values[i].blob == NULL) {
1514 if (in->value_ctr.values[i].blob->length == 0) {
1518 if (!convert_string_talloc(out->values,
1520 in->value_ctr.values[i].blob->data,
1521 in->value_ctr.values[i].blob->length,
1522 (void **)&str, &converted_size)) {
1526 out->values[i] = data_blob_string_const(str);
1532 static WERROR dsdb_syntax_UNICODE_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1533 const struct dsdb_attribute *attr,
1534 const struct ldb_message_element *in,
1535 TALLOC_CTX *mem_ctx,
1536 struct drsuapi_DsReplicaAttribute *out)
1541 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1545 out->attid = dsdb_attribute_get_attid(attr,
1547 out->value_ctr.num_values = in->num_values;
1548 out->value_ctr.values = talloc_array(mem_ctx,
1549 struct drsuapi_DsAttributeValue,
1551 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1553 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1554 W_ERROR_HAVE_NO_MEMORY(blobs);
1556 for (i=0; i < in->num_values; i++) {
1557 out->value_ctr.values[i].blob = &blobs[i];
1559 if (!convert_string_talloc(blobs,
1561 in->values[i].data, in->values[i].length,
1562 (void **)&blobs[i].data, &blobs[i].length)) {
1570 static WERROR dsdb_syntax_UNICODE_validate_one_val(const struct dsdb_syntax_ctx *ctx,
1571 const struct dsdb_attribute *attr,
1572 const struct ldb_val *val)
1578 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1582 ok = convert_string_talloc(ctx->ldb,
1590 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1593 if (attr->rangeLower) {
1594 if ((size/2) < *attr->rangeLower) {
1595 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1599 if (attr->rangeUpper) {
1600 if ((size/2) > *attr->rangeUpper) {
1601 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1608 static WERROR dsdb_syntax_UNICODE_validate_ldb(const struct dsdb_syntax_ctx *ctx,
1609 const struct dsdb_attribute *attr,
1610 const struct ldb_message_element *in)
1615 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1619 for (i=0; i < in->num_values; i++) {
1620 if (in->values[i].length == 0) {
1621 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1624 status = dsdb_syntax_UNICODE_validate_one_val(ctx,
1627 if (!W_ERROR_IS_OK(status)) {
1635 static WERROR dsdb_syntax_one_DN_drsuapi_to_ldb(TALLOC_CTX *mem_ctx, struct ldb_context *ldb,
1636 const struct dsdb_syntax *syntax,
1637 const DATA_BLOB *in, DATA_BLOB *out)
1639 struct drsuapi_DsReplicaObjectIdentifier3 id3;
1640 enum ndr_err_code ndr_err;
1641 DATA_BLOB guid_blob;
1643 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1648 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1652 talloc_free(tmp_ctx);
1656 if (in->length == 0) {
1657 talloc_free(tmp_ctx);
1662 /* windows sometimes sends an extra two pad bytes here */
1663 ndr_err = ndr_pull_struct_blob(in,
1665 (ndr_pull_flags_fn_t)ndr_pull_drsuapi_DsReplicaObjectIdentifier3);
1666 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1667 status = ndr_map_error2ntstatus(ndr_err);
1668 talloc_free(tmp_ctx);
1669 return ntstatus_to_werror(status);
1672 dn = ldb_dn_new(tmp_ctx, ldb, id3.dn);
1674 talloc_free(tmp_ctx);
1675 /* If this fails, it must be out of memory, as it does not do much parsing */
1676 W_ERROR_HAVE_NO_MEMORY(dn);
1679 if (!GUID_all_zero(&id3.guid)) {
1680 status = GUID_to_ndr_blob(&id3.guid, tmp_ctx, &guid_blob);
1681 if (!NT_STATUS_IS_OK(status)) {
1682 talloc_free(tmp_ctx);
1683 return ntstatus_to_werror(status);
1686 ret = ldb_dn_set_extended_component(dn, "GUID", &guid_blob);
1687 if (ret != LDB_SUCCESS) {
1688 talloc_free(tmp_ctx);
1691 talloc_free(guid_blob.data);
1694 if (id3.__ndr_size_sid) {
1696 ndr_err = ndr_push_struct_blob(&sid_blob, tmp_ctx, &id3.sid,
1697 (ndr_push_flags_fn_t)ndr_push_dom_sid);
1698 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1699 status = ndr_map_error2ntstatus(ndr_err);
1700 talloc_free(tmp_ctx);
1701 return ntstatus_to_werror(status);
1704 ret = ldb_dn_set_extended_component(dn, "SID", &sid_blob);
1705 if (ret != LDB_SUCCESS) {
1706 talloc_free(tmp_ctx);
1711 *out = data_blob_string_const(ldb_dn_get_extended_linearized(mem_ctx, dn, 1));
1712 talloc_free(tmp_ctx);
1716 static WERROR dsdb_syntax_DN_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1717 const struct dsdb_attribute *attr,
1718 const struct drsuapi_DsReplicaAttribute *in,
1719 TALLOC_CTX *mem_ctx,
1720 struct ldb_message_element *out)
1725 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1726 W_ERROR_HAVE_NO_MEMORY(out->name);
1728 out->num_values = in->value_ctr.num_values;
1729 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1730 W_ERROR_HAVE_NO_MEMORY(out->values);
1732 for (i=0; i < out->num_values; i++) {
1733 WERROR status = dsdb_syntax_one_DN_drsuapi_to_ldb(out->values, ctx->ldb, attr->syntax,
1734 in->value_ctr.values[i].blob,
1736 if (!W_ERROR_IS_OK(status)) {
1745 static WERROR dsdb_syntax_DN_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1746 const struct dsdb_attribute *attr,
1747 const struct ldb_message_element *in,
1748 TALLOC_CTX *mem_ctx,
1749 struct drsuapi_DsReplicaAttribute *out)
1754 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1758 out->attid = dsdb_attribute_get_attid(attr,
1760 out->value_ctr.num_values = in->num_values;
1761 out->value_ctr.values = talloc_array(mem_ctx,
1762 struct drsuapi_DsAttributeValue,
1764 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1766 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1767 W_ERROR_HAVE_NO_MEMORY(blobs);
1769 for (i=0; i < in->num_values; i++) {
1770 struct drsuapi_DsReplicaObjectIdentifier3 id3;
1771 enum ndr_err_code ndr_err;
1773 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1776 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1778 out->value_ctr.values[i].blob = &blobs[i];
1780 dn = ldb_dn_from_ldb_val(tmp_ctx, ctx->ldb, &in->values[i]);
1782 W_ERROR_HAVE_NO_MEMORY(dn);
1786 status = dsdb_get_extended_dn_guid(dn, &id3.guid, "GUID");
1787 if (!NT_STATUS_IS_OK(status) &&
1788 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1789 talloc_free(tmp_ctx);
1790 return ntstatus_to_werror(status);
1793 status = dsdb_get_extended_dn_sid(dn, &id3.sid, "SID");
1794 if (!NT_STATUS_IS_OK(status) &&
1795 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1796 talloc_free(tmp_ctx);
1797 return ntstatus_to_werror(status);
1800 id3.dn = ldb_dn_get_linearized(dn);
1802 ndr_err = ndr_push_struct_blob(&blobs[i], blobs, &id3, (ndr_push_flags_fn_t)ndr_push_drsuapi_DsReplicaObjectIdentifier3);
1803 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1804 status = ndr_map_error2ntstatus(ndr_err);
1805 talloc_free(tmp_ctx);
1806 return ntstatus_to_werror(status);
1808 talloc_free(tmp_ctx);
1814 static WERROR dsdb_syntax_DN_validate_one_val(const struct dsdb_syntax_ctx *ctx,
1815 const struct dsdb_attribute *attr,
1816 const struct ldb_val *val,
1817 TALLOC_CTX *mem_ctx,
1818 struct dsdb_dn **_dsdb_dn)
1820 static const char * const extended_list[] = { "GUID", "SID", NULL };
1821 enum ndr_err_code ndr_err;
1824 const DATA_BLOB *sid_blob;
1825 struct dsdb_dn *dsdb_dn;
1831 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1834 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1836 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1840 dsdb_dn = dsdb_dn_parse(tmp_ctx, ctx->ldb, val,
1841 attr->syntax->ldap_oid);
1843 talloc_free(tmp_ctx);
1844 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1848 dn2 = ldb_dn_copy(tmp_ctx, dn);
1850 talloc_free(tmp_ctx);
1854 num_components = ldb_dn_get_comp_num(dn);
1856 status = dsdb_get_extended_dn_guid(dn, &guid, "GUID");
1857 if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1859 } else if (!NT_STATUS_IS_OK(status)) {
1860 talloc_free(tmp_ctx);
1861 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1864 sid_blob = ldb_dn_get_extended_component(dn, "SID");
1867 ndr_err = ndr_pull_struct_blob_all(sid_blob,
1870 (ndr_pull_flags_fn_t)ndr_pull_dom_sid);
1871 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1872 talloc_free(tmp_ctx);
1873 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1877 /* Do not allow links to the RootDSE */
1878 if (num_components == 0) {
1879 talloc_free(tmp_ctx);
1880 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1884 * We need to check that only "GUID" and "SID" are
1885 * specified as extended components, we do that
1886 * by comparing the dn's after removing all components
1887 * from one dn and only the allowed subset from the other
1890 ldb_dn_extended_filter(dn, extended_list);
1892 dn_str = ldb_dn_get_extended_linearized(tmp_ctx, dn, 0);
1893 if (dn_str == NULL) {
1894 talloc_free(tmp_ctx);
1895 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1897 dn2_str = ldb_dn_get_extended_linearized(tmp_ctx, dn2, 0);
1898 if (dn2_str == NULL) {
1899 talloc_free(tmp_ctx);
1900 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1903 if (strcmp(dn_str, dn2_str) != 0) {
1904 talloc_free(tmp_ctx);
1905 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1908 *_dsdb_dn = talloc_move(mem_ctx, &dsdb_dn);
1909 talloc_free(tmp_ctx);
1913 static WERROR dsdb_syntax_DN_validate_ldb(const struct dsdb_syntax_ctx *ctx,
1914 const struct dsdb_attribute *attr,
1915 const struct ldb_message_element *in)
1919 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1923 for (i=0; i < in->num_values; i++) {
1925 struct dsdb_dn *dsdb_dn;
1926 TALLOC_CTX *tmp_ctx = talloc_new(ctx->ldb);
1927 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1929 status = dsdb_syntax_DN_validate_one_val(ctx,
1933 if (!W_ERROR_IS_OK(status)) {
1934 talloc_free(tmp_ctx);
1938 if (dsdb_dn->dn_format != DSDB_NORMAL_DN) {
1939 talloc_free(tmp_ctx);
1940 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1943 talloc_free(tmp_ctx);
1949 static WERROR dsdb_syntax_DN_BINARY_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1950 const struct dsdb_attribute *attr,
1951 const struct drsuapi_DsReplicaAttribute *in,
1952 TALLOC_CTX *mem_ctx,
1953 struct ldb_message_element *out)
1959 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1960 W_ERROR_HAVE_NO_MEMORY(out->name);
1962 out->num_values = in->value_ctr.num_values;
1963 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1964 W_ERROR_HAVE_NO_MEMORY(out->values);
1966 for (i=0; i < out->num_values; i++) {
1967 struct drsuapi_DsReplicaObjectIdentifier3Binary id3;
1968 enum ndr_err_code ndr_err;
1969 DATA_BLOB guid_blob;
1971 struct dsdb_dn *dsdb_dn;
1973 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1975 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1978 if (in->value_ctr.values[i].blob == NULL) {
1979 talloc_free(tmp_ctx);
1983 if (in->value_ctr.values[i].blob->length == 0) {
1984 talloc_free(tmp_ctx);
1989 /* windows sometimes sends an extra two pad bytes here */
1990 ndr_err = ndr_pull_struct_blob(in->value_ctr.values[i].blob,
1992 (ndr_pull_flags_fn_t)ndr_pull_drsuapi_DsReplicaObjectIdentifier3Binary);
1993 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1994 status = ndr_map_error2ntstatus(ndr_err);
1995 talloc_free(tmp_ctx);
1996 return ntstatus_to_werror(status);
1999 dn = ldb_dn_new(tmp_ctx, ctx->ldb, id3.dn);
2001 talloc_free(tmp_ctx);
2002 /* If this fails, it must be out of memory, as it does not do much parsing */
2003 W_ERROR_HAVE_NO_MEMORY(dn);
2006 if (!GUID_all_zero(&id3.guid)) {
2007 status = GUID_to_ndr_blob(&id3.guid, tmp_ctx, &guid_blob);
2008 if (!NT_STATUS_IS_OK(status)) {
2009 talloc_free(tmp_ctx);
2010 return ntstatus_to_werror(status);
2013 ret = ldb_dn_set_extended_component(dn, "GUID", &guid_blob);
2014 if (ret != LDB_SUCCESS) {
2015 talloc_free(tmp_ctx);
2018 talloc_free(guid_blob.data);
2021 if (id3.__ndr_size_sid) {
2023 ndr_err = ndr_push_struct_blob(&sid_blob, tmp_ctx, &id3.sid,
2024 (ndr_push_flags_fn_t)ndr_push_dom_sid);
2025 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2026 status = ndr_map_error2ntstatus(ndr_err);
2027 talloc_free(tmp_ctx);
2028 return ntstatus_to_werror(status);
2031 ret = ldb_dn_set_extended_component(dn, "SID", &sid_blob);
2032 if (ret != LDB_SUCCESS) {
2033 talloc_free(tmp_ctx);
2038 /* set binary stuff */
2039 dsdb_dn = dsdb_dn_construct(tmp_ctx, dn, id3.binary, attr->syntax->ldap_oid);
2041 /* If this fails, it must be out of memory, we know the ldap_oid is valid */
2042 talloc_free(tmp_ctx);
2043 W_ERROR_HAVE_NO_MEMORY(dsdb_dn);
2045 out->values[i] = data_blob_string_const(dsdb_dn_get_extended_linearized(out->values, dsdb_dn, 1));
2046 talloc_free(tmp_ctx);
2052 static WERROR dsdb_syntax_DN_BINARY_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
2053 const struct dsdb_attribute *attr,
2054 const struct ldb_message_element *in,
2055 TALLOC_CTX *mem_ctx,
2056 struct drsuapi_DsReplicaAttribute *out)
2061 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2065 out->attid = dsdb_attribute_get_attid(attr,
2067 out->value_ctr.num_values = in->num_values;
2068 out->value_ctr.values = talloc_array(mem_ctx,
2069 struct drsuapi_DsAttributeValue,
2071 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
2073 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
2074 W_ERROR_HAVE_NO_MEMORY(blobs);
2076 for (i=0; i < in->num_values; i++) {
2077 struct drsuapi_DsReplicaObjectIdentifier3Binary id3;
2078 enum ndr_err_code ndr_err;
2079 const DATA_BLOB *sid_blob;
2080 struct dsdb_dn *dsdb_dn;
2081 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
2084 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
2086 out->value_ctr.values[i].blob = &blobs[i];
2088 dsdb_dn = dsdb_dn_parse(tmp_ctx, ctx->ldb, &in->values[i], attr->syntax->ldap_oid);
2091 talloc_free(tmp_ctx);
2092 return ntstatus_to_werror(NT_STATUS_INVALID_PARAMETER);
2097 status = dsdb_get_extended_dn_guid(dsdb_dn->dn, &id3.guid, "GUID");
2098 if (!NT_STATUS_IS_OK(status) &&
2099 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
2100 talloc_free(tmp_ctx);
2101 return ntstatus_to_werror(status);
2104 sid_blob = ldb_dn_get_extended_component(dsdb_dn->dn, "SID");
2107 ndr_err = ndr_pull_struct_blob_all(sid_blob,
2109 (ndr_pull_flags_fn_t)ndr_pull_dom_sid);
2110 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2111 status = ndr_map_error2ntstatus(ndr_err);
2112 talloc_free(tmp_ctx);
2113 return ntstatus_to_werror(status);
2117 id3.dn = ldb_dn_get_linearized(dsdb_dn->dn);
2119 /* get binary stuff */
2120 id3.binary = dsdb_dn->extra_part;
2122 ndr_err = ndr_push_struct_blob(&blobs[i], blobs, &id3, (ndr_push_flags_fn_t)ndr_push_drsuapi_DsReplicaObjectIdentifier3Binary);
2123 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2124 status = ndr_map_error2ntstatus(ndr_err);
2125 talloc_free(tmp_ctx);
2126 return ntstatus_to_werror(status);
2128 talloc_free(tmp_ctx);
2134 static WERROR dsdb_syntax_DN_BINARY_validate_ldb(const struct dsdb_syntax_ctx *ctx,
2135 const struct dsdb_attribute *attr,
2136 const struct ldb_message_element *in)
2140 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2144 for (i=0; i < in->num_values; i++) {
2146 struct dsdb_dn *dsdb_dn;
2147 TALLOC_CTX *tmp_ctx = talloc_new(ctx->ldb);
2148 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
2150 status = dsdb_syntax_DN_validate_one_val(ctx,
2154 if (!W_ERROR_IS_OK(status)) {
2155 talloc_free(tmp_ctx);
2159 if (dsdb_dn->dn_format != DSDB_BINARY_DN) {
2160 talloc_free(tmp_ctx);
2161 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
2164 status = dsdb_syntax_DATA_BLOB_validate_one_val(ctx,
2166 &dsdb_dn->extra_part);
2167 if (!W_ERROR_IS_OK(status)) {
2168 talloc_free(tmp_ctx);
2172 talloc_free(tmp_ctx);
2178 static WERROR dsdb_syntax_DN_STRING_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
2179 const struct dsdb_attribute *attr,
2180 const struct drsuapi_DsReplicaAttribute *in,
2181 TALLOC_CTX *mem_ctx,
2182 struct ldb_message_element *out)
2184 return dsdb_syntax_DN_BINARY_drsuapi_to_ldb(ctx,
2191 static WERROR dsdb_syntax_DN_STRING_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
2192 const struct dsdb_attribute *attr,
2193 const struct ldb_message_element *in,
2194 TALLOC_CTX *mem_ctx,
2195 struct drsuapi_DsReplicaAttribute *out)
2197 return dsdb_syntax_DN_BINARY_ldb_to_drsuapi(ctx,
2204 static WERROR dsdb_syntax_DN_STRING_validate_ldb(const struct dsdb_syntax_ctx *ctx,
2205 const struct dsdb_attribute *attr,
2206 const struct ldb_message_element *in)
2210 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2214 for (i=0; i < in->num_values; i++) {
2216 struct dsdb_dn *dsdb_dn;
2217 TALLOC_CTX *tmp_ctx = talloc_new(ctx->ldb);
2218 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
2220 status = dsdb_syntax_DN_validate_one_val(ctx,
2224 if (!W_ERROR_IS_OK(status)) {
2225 talloc_free(tmp_ctx);
2229 if (dsdb_dn->dn_format != DSDB_STRING_DN) {
2230 talloc_free(tmp_ctx);
2231 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
2234 status = dsdb_syntax_UNICODE_validate_one_val(ctx,
2236 &dsdb_dn->extra_part);
2237 if (!W_ERROR_IS_OK(status)) {
2238 talloc_free(tmp_ctx);
2242 talloc_free(tmp_ctx);
2248 static WERROR dsdb_syntax_PRESENTATION_ADDRESS_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
2249 const struct dsdb_attribute *attr,
2250 const struct drsuapi_DsReplicaAttribute *in,
2251 TALLOC_CTX *mem_ctx,
2252 struct ldb_message_element *out)
2257 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
2258 W_ERROR_HAVE_NO_MEMORY(out->name);
2260 out->num_values = in->value_ctr.num_values;
2261 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
2262 W_ERROR_HAVE_NO_MEMORY(out->values);
2264 for (i=0; i < out->num_values; i++) {
2266 size_t converted_size = 0;
2269 if (in->value_ctr.values[i].blob == NULL) {
2273 if (in->value_ctr.values[i].blob->length < 4) {
2277 len = IVAL(in->value_ctr.values[i].blob->data, 0);
2279 if (len != in->value_ctr.values[i].blob->length) {
2283 if (!convert_string_talloc(out->values, CH_UTF16, CH_UNIX,
2284 in->value_ctr.values[i].blob->data+4,
2285 in->value_ctr.values[i].blob->length-4,
2286 (void **)&str, &converted_size)) {
2290 out->values[i] = data_blob_string_const(str);
2296 static WERROR dsdb_syntax_PRESENTATION_ADDRESS_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
2297 const struct dsdb_attribute *attr,
2298 const struct ldb_message_element *in,
2299 TALLOC_CTX *mem_ctx,
2300 struct drsuapi_DsReplicaAttribute *out)
2305 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2309 out->attid = dsdb_attribute_get_attid(attr,
2311 out->value_ctr.num_values = in->num_values;
2312 out->value_ctr.values = talloc_array(mem_ctx,
2313 struct drsuapi_DsAttributeValue,
2315 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
2317 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
2318 W_ERROR_HAVE_NO_MEMORY(blobs);
2320 for (i=0; i < in->num_values; i++) {
2324 out->value_ctr.values[i].blob = &blobs[i];
2326 if (!convert_string_talloc(blobs, CH_UNIX, CH_UTF16,
2328 in->values[i].length,
2329 (void **)&data, &ret)) {
2333 blobs[i] = data_blob_talloc(blobs, NULL, 4 + ret);
2334 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
2336 SIVAL(blobs[i].data, 0, 4 + ret);
2339 memcpy(blobs[i].data + 4, data, ret);
2347 static WERROR dsdb_syntax_PRESENTATION_ADDRESS_validate_ldb(const struct dsdb_syntax_ctx *ctx,
2348 const struct dsdb_attribute *attr,
2349 const struct ldb_message_element *in)
2351 return dsdb_syntax_UNICODE_validate_ldb(ctx,
2356 #define OMOBJECTCLASS(val) { .length = sizeof(val) - 1, .data = discard_const_p(uint8_t, val) }
2358 static const struct dsdb_syntax dsdb_syntaxes[] = {
2361 .ldap_oid = LDB_SYNTAX_BOOLEAN,
2363 .attributeSyntax_oid = "2.5.5.8",
2364 .drsuapi_to_ldb = dsdb_syntax_BOOL_drsuapi_to_ldb,
2365 .ldb_to_drsuapi = dsdb_syntax_BOOL_ldb_to_drsuapi,
2366 .validate_ldb = dsdb_syntax_BOOL_validate_ldb,
2367 .equality = "booleanMatch",
2368 .comment = "Boolean"
2371 .ldap_oid = LDB_SYNTAX_INTEGER,
2373 .attributeSyntax_oid = "2.5.5.9",
2374 .drsuapi_to_ldb = dsdb_syntax_INT32_drsuapi_to_ldb,
2375 .ldb_to_drsuapi = dsdb_syntax_INT32_ldb_to_drsuapi,
2376 .validate_ldb = dsdb_syntax_INT32_validate_ldb,
2377 .equality = "integerMatch",
2378 .comment = "Integer",
2379 .ldb_syntax = LDB_SYNTAX_SAMBA_INT32
2381 .name = "String(Octet)",
2382 .ldap_oid = LDB_SYNTAX_OCTET_STRING,
2384 .attributeSyntax_oid = "2.5.5.10",
2385 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2386 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2387 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2388 .equality = "octetStringMatch",
2389 .comment = "Octet String",
2391 .name = "String(Sid)",
2392 .ldap_oid = LDB_SYNTAX_OCTET_STRING,
2394 .attributeSyntax_oid = "2.5.5.17",
2395 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2396 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2397 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2398 .equality = "octetStringMatch",
2399 .comment = "Octet String - Security Identifier (SID)",
2400 .ldb_syntax = LDB_SYNTAX_SAMBA_SID
2402 .name = "String(Object-Identifier)",
2403 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.38",
2405 .attributeSyntax_oid = "2.5.5.2",
2406 .drsuapi_to_ldb = dsdb_syntax_OID_drsuapi_to_ldb,
2407 .ldb_to_drsuapi = dsdb_syntax_OID_ldb_to_drsuapi,
2408 .validate_ldb = dsdb_syntax_OID_validate_ldb,
2409 .equality = "caseIgnoreMatch", /* Would use "objectIdentifierMatch" but most are ldap attribute/class names */
2410 .comment = "OID String",
2411 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING
2413 .name = "Enumeration",
2414 .ldap_oid = LDB_SYNTAX_INTEGER,
2416 .attributeSyntax_oid = "2.5.5.9",
2417 .drsuapi_to_ldb = dsdb_syntax_INT32_drsuapi_to_ldb,
2418 .ldb_to_drsuapi = dsdb_syntax_INT32_ldb_to_drsuapi,
2419 .validate_ldb = dsdb_syntax_INT32_validate_ldb,
2420 .ldb_syntax = LDB_SYNTAX_SAMBA_INT32
2422 /* not used in w2k3 forest */
2423 .name = "String(Numeric)",
2424 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.36",
2426 .attributeSyntax_oid = "2.5.5.6",
2427 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2428 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2429 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2430 .equality = "numericStringMatch",
2431 .substring = "numericStringSubstringsMatch",
2432 .comment = "Numeric String",
2433 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2435 .name = "String(Printable)",
2436 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.44",
2438 .attributeSyntax_oid = "2.5.5.5",
2439 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2440 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2441 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2442 .ldb_syntax = LDB_SYNTAX_OCTET_STRING,
2444 .name = "String(Teletex)",
2445 .ldap_oid = "1.2.840.113556.1.4.905",
2447 .attributeSyntax_oid = "2.5.5.4",
2448 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2449 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2450 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2451 .equality = "caseIgnoreMatch",
2452 .substring = "caseIgnoreSubstringsMatch",
2453 .comment = "Case Insensitive String",
2454 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2456 .name = "String(IA5)",
2457 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.26",
2459 .attributeSyntax_oid = "2.5.5.5",
2460 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2461 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2462 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2463 .equality = "caseExactIA5Match",
2464 .comment = "Printable String",
2465 .ldb_syntax = LDB_SYNTAX_OCTET_STRING,
2467 .name = "String(UTC-Time)",
2468 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.53",
2470 .attributeSyntax_oid = "2.5.5.11",
2471 .drsuapi_to_ldb = dsdb_syntax_NTTIME_UTC_drsuapi_to_ldb,
2472 .ldb_to_drsuapi = dsdb_syntax_NTTIME_UTC_ldb_to_drsuapi,
2473 .validate_ldb = dsdb_syntax_NTTIME_UTC_validate_ldb,
2474 .equality = "generalizedTimeMatch",
2475 .comment = "UTC Time",
2477 .name = "String(Generalized-Time)",
2478 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.24",
2480 .attributeSyntax_oid = "2.5.5.11",
2481 .drsuapi_to_ldb = dsdb_syntax_NTTIME_drsuapi_to_ldb,
2482 .ldb_to_drsuapi = dsdb_syntax_NTTIME_ldb_to_drsuapi,
2483 .validate_ldb = dsdb_syntax_NTTIME_validate_ldb,
2484 .equality = "generalizedTimeMatch",
2485 .comment = "Generalized Time",
2486 .ldb_syntax = LDB_SYNTAX_UTC_TIME,
2488 /* not used in w2k3 schema */
2489 .name = "String(Case Sensitive)",
2490 .ldap_oid = "1.2.840.113556.1.4.1362",
2492 .attributeSyntax_oid = "2.5.5.3",
2493 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2494 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2495 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2496 .equality = "caseExactMatch",
2497 .substring = "caseExactSubstringsMatch",
2498 /* TODO (kim): according to LDAP rfc we should be using same comparison
2499 * as Directory String (LDB_SYNTAX_DIRECTORY_STRING), but case sensitive.
2500 * But according to ms docs binary compare should do the job:
2501 * http://msdn.microsoft.com/en-us/library/cc223200(v=PROT.10).aspx */
2502 .ldb_syntax = LDB_SYNTAX_OCTET_STRING,
2504 .name = "String(Unicode)",
2505 .ldap_oid = LDB_SYNTAX_DIRECTORY_STRING,
2507 .attributeSyntax_oid = "2.5.5.12",
2508 .drsuapi_to_ldb = dsdb_syntax_UNICODE_drsuapi_to_ldb,
2509 .ldb_to_drsuapi = dsdb_syntax_UNICODE_ldb_to_drsuapi,
2510 .validate_ldb = dsdb_syntax_UNICODE_validate_ldb,
2511 .equality = "caseIgnoreMatch",
2512 .substring = "caseIgnoreSubstringsMatch",
2513 .comment = "Directory String",
2515 .name = "Interval/LargeInteger",
2516 .ldap_oid = "1.2.840.113556.1.4.906",
2518 .attributeSyntax_oid = "2.5.5.16",
2519 .drsuapi_to_ldb = dsdb_syntax_INT64_drsuapi_to_ldb,
2520 .ldb_to_drsuapi = dsdb_syntax_INT64_ldb_to_drsuapi,
2521 .validate_ldb = dsdb_syntax_INT64_validate_ldb,
2522 .equality = "integerMatch",
2523 .comment = "Large Integer",
2524 .ldb_syntax = LDB_SYNTAX_INTEGER,
2526 .name = "String(NT-Sec-Desc)",
2527 .ldap_oid = LDB_SYNTAX_SAMBA_SECURITY_DESCRIPTOR,
2529 .attributeSyntax_oid = "2.5.5.15",
2530 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2531 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2532 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2534 .name = "Object(DS-DN)",
2535 .ldap_oid = LDB_SYNTAX_DN,
2537 .oMObjectClass = OMOBJECTCLASS("\x2b\x0c\x02\x87\x73\x1c\x00\x85\x4a"),
2538 .attributeSyntax_oid = "2.5.5.1",
2539 .drsuapi_to_ldb = dsdb_syntax_DN_drsuapi_to_ldb,
2540 .ldb_to_drsuapi = dsdb_syntax_DN_ldb_to_drsuapi,
2541 .validate_ldb = dsdb_syntax_DN_validate_ldb,
2542 .equality = "distinguishedNameMatch",
2543 .comment = "Object(DS-DN) == a DN",
2545 .name = "Object(DN-Binary)",
2546 .ldap_oid = DSDB_SYNTAX_BINARY_DN,
2548 .oMObjectClass = OMOBJECTCLASS("\x2a\x86\x48\x86\xf7\x14\x01\x01\x01\x0b"),
2549 .attributeSyntax_oid = "2.5.5.7",
2550 .drsuapi_to_ldb = dsdb_syntax_DN_BINARY_drsuapi_to_ldb,
2551 .ldb_to_drsuapi = dsdb_syntax_DN_BINARY_ldb_to_drsuapi,
2552 .validate_ldb = dsdb_syntax_DN_BINARY_validate_ldb,
2553 .equality = "octetStringMatch",
2554 .comment = "OctetString: Binary+DN",
2556 /* not used in w2k3 schema, but used in Exchange schema*/
2557 .name = "Object(OR-Name)",
2558 .ldap_oid = DSDB_SYNTAX_OR_NAME,
2560 .oMObjectClass = OMOBJECTCLASS("\x56\x06\x01\x02\x05\x0b\x1D"),
2561 .attributeSyntax_oid = "2.5.5.7",
2562 .drsuapi_to_ldb = dsdb_syntax_DN_BINARY_drsuapi_to_ldb,
2563 .ldb_to_drsuapi = dsdb_syntax_DN_BINARY_ldb_to_drsuapi,
2564 .validate_ldb = dsdb_syntax_DN_BINARY_validate_ldb,
2565 .equality = "caseIgnoreMatch",
2566 .ldb_syntax = LDB_SYNTAX_DN,
2569 * TODO: verify if DATA_BLOB is correct here...!
2571 * repsFrom and repsTo are the only attributes using
2572 * this attribute syntax, but they're not replicated...
2574 .name = "Object(Replica-Link)",
2575 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.40",
2577 .oMObjectClass = OMOBJECTCLASS("\x2a\x86\x48\x86\xf7\x14\x01\x01\x01\x06"),
2578 .attributeSyntax_oid = "2.5.5.10",
2579 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2580 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2581 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2583 .name = "Object(Presentation-Address)",
2584 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.43",
2586 .oMObjectClass = OMOBJECTCLASS("\x2b\x0c\x02\x87\x73\x1c\x00\x85\x5c"),
2587 .attributeSyntax_oid = "2.5.5.13",
2588 .drsuapi_to_ldb = dsdb_syntax_PRESENTATION_ADDRESS_drsuapi_to_ldb,
2589 .ldb_to_drsuapi = dsdb_syntax_PRESENTATION_ADDRESS_ldb_to_drsuapi,
2590 .validate_ldb = dsdb_syntax_PRESENTATION_ADDRESS_validate_ldb,
2591 .comment = "Presentation Address",
2592 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2594 /* not used in w2k3 schema */
2595 .name = "Object(Access-Point)",
2596 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.2",
2598 .oMObjectClass = OMOBJECTCLASS("\x2b\x0c\x02\x87\x73\x1c\x00\x85\x3e"),
2599 .attributeSyntax_oid = "2.5.5.14",
2600 .drsuapi_to_ldb = dsdb_syntax_FOOBAR_drsuapi_to_ldb,
2601 .ldb_to_drsuapi = dsdb_syntax_FOOBAR_ldb_to_drsuapi,
2602 .validate_ldb = dsdb_syntax_FOOBAR_validate_ldb,
2603 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2605 /* not used in w2k3 schema */
2606 .name = "Object(DN-String)",
2607 .ldap_oid = DSDB_SYNTAX_STRING_DN,
2609 .oMObjectClass = OMOBJECTCLASS("\x2a\x86\x48\x86\xf7\x14\x01\x01\x01\x0c"),
2610 .attributeSyntax_oid = "2.5.5.14",
2611 .drsuapi_to_ldb = dsdb_syntax_DN_STRING_drsuapi_to_ldb,
2612 .ldb_to_drsuapi = dsdb_syntax_DN_STRING_ldb_to_drsuapi,
2613 .validate_ldb = dsdb_syntax_DN_STRING_validate_ldb,
2614 .equality = "octetStringMatch",
2615 .comment = "OctetString: String+DN",
2619 const struct dsdb_syntax *find_syntax_map_by_ad_oid(const char *ad_oid)
2622 for (i=0; dsdb_syntaxes[i].ldap_oid; i++) {
2623 if (strcasecmp(ad_oid, dsdb_syntaxes[i].attributeSyntax_oid) == 0) {
2624 return &dsdb_syntaxes[i];
2630 const struct dsdb_syntax *find_syntax_map_by_ad_syntax(int oMSyntax)
2633 for (i=0; dsdb_syntaxes[i].ldap_oid; i++) {
2634 if (oMSyntax == dsdb_syntaxes[i].oMSyntax) {
2635 return &dsdb_syntaxes[i];
2641 const struct dsdb_syntax *find_syntax_map_by_standard_oid(const char *standard_oid)
2644 for (i=0; dsdb_syntaxes[i].ldap_oid; i++) {
2645 if (strcasecmp(standard_oid, dsdb_syntaxes[i].ldap_oid) == 0) {
2646 return &dsdb_syntaxes[i];
2652 const struct dsdb_syntax *dsdb_syntax_for_attribute(const struct dsdb_attribute *attr)
2656 for (i=0; i < ARRAY_SIZE(dsdb_syntaxes); i++) {
2657 if (attr->oMSyntax != dsdb_syntaxes[i].oMSyntax) continue;
2659 if (attr->oMObjectClass.length != dsdb_syntaxes[i].oMObjectClass.length) continue;
2661 if (attr->oMObjectClass.length) {
2663 ret = memcmp(attr->oMObjectClass.data,
2664 dsdb_syntaxes[i].oMObjectClass.data,
2665 attr->oMObjectClass.length);
2666 if (ret != 0) continue;
2669 if (strcmp(attr->attributeSyntax_oid, dsdb_syntaxes[i].attributeSyntax_oid) != 0) continue;
2671 return &dsdb_syntaxes[i];
2677 WERROR dsdb_attribute_drsuapi_to_ldb(struct ldb_context *ldb,
2678 const struct dsdb_schema *schema,
2679 const struct dsdb_schema_prefixmap *pfm_remote,
2680 const struct drsuapi_DsReplicaAttribute *in,
2681 TALLOC_CTX *mem_ctx,
2682 struct ldb_message_element *out)
2684 const struct dsdb_attribute *sa;
2685 struct dsdb_syntax_ctx syntax_ctx;
2686 uint32_t attid_local;
2688 /* use default syntax conversion context */
2689 dsdb_syntax_ctx_init(&syntax_ctx, ldb, schema);
2690 syntax_ctx.pfm_remote = pfm_remote;
2692 switch (dsdb_pfm_get_attid_type(in->attid)) {
2693 case DSDB_ATTID_TYPE_PFM:
2694 /* map remote ATTID to local ATTID */
2695 if (!dsdb_syntax_attid_from_remote_attid(&syntax_ctx, mem_ctx, in->attid, &attid_local)) {
2696 DEBUG(0,(__location__ ": Can't find local ATTID for 0x%08X\n",
2701 case DSDB_ATTID_TYPE_INTID:
2702 /* use IntId value directly */
2703 attid_local = in->attid;
2706 /* we should never get here */
2707 DEBUG(0,(__location__ ": Invalid ATTID type passed for conversion - 0x%08X\n",
2709 return WERR_INVALID_PARAMETER;
2712 sa = dsdb_attribute_by_attributeID_id(schema, attid_local);
2714 DEBUG(1,(__location__ ": Unknown attributeID_id 0x%08X\n", in->attid));
2718 return sa->syntax->drsuapi_to_ldb(&syntax_ctx, sa, in, mem_ctx, out);
2721 WERROR dsdb_attribute_ldb_to_drsuapi(struct ldb_context *ldb,
2722 const struct dsdb_schema *schema,
2723 const struct ldb_message_element *in,
2724 TALLOC_CTX *mem_ctx,
2725 struct drsuapi_DsReplicaAttribute *out)
2727 const struct dsdb_attribute *sa;
2728 struct dsdb_syntax_ctx syntax_ctx;
2730 sa = dsdb_attribute_by_lDAPDisplayName(schema, in->name);
2735 /* use default syntax conversion context */
2736 dsdb_syntax_ctx_init(&syntax_ctx, ldb, schema);
2738 return sa->syntax->ldb_to_drsuapi(&syntax_ctx, sa, in, mem_ctx, out);