2 Unix SMB/CIFS mplementation.
5 Copyright (C) Stefan Metzmacher <metze@samba.org> 2006
6 Copyright (C) Simo Sorce 2005
7 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2008
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "dsdb/samdb/samdb.h"
25 #include "librpc/gen_ndr/ndr_drsuapi.h"
26 #include "librpc/gen_ndr/ndr_security.h"
27 #include "librpc/gen_ndr/ndr_misc.h"
28 #include "lib/ldb/include/ldb.h"
29 #include "lib/ldb/include/ldb_errors.h"
30 #include "system/time.h"
31 #include "../lib/util/charset/charset.h"
32 #include "librpc/ndr/libndr.h"
33 #include "../lib/util/asn1.h"
36 * Initialize dsdb_syntax_ctx with default values
39 void dsdb_syntax_ctx_init(struct dsdb_syntax_ctx *ctx,
40 struct ldb_context *ldb,
41 const struct dsdb_schema *schema)
47 * 'true' will keep current behavior,
48 * i.e. attributeID_id will be returned by default
50 ctx->is_schema_nc = true;
52 ctx->pfm_remote = NULL;
57 * Returns ATTID for DRS attribute.
59 * ATTID depends on whether we are replicating
60 * Schema NC or msDs-IntId is set for schemaAttribute
63 uint32_t dsdb_attribute_get_attid(const struct dsdb_attribute *attr,
66 if (!for_schema_nc && attr->msDS_IntId) {
67 return attr->msDS_IntId;
70 return attr->attributeID_id;
74 * Map an ATTID from remote DC to a local ATTID
75 * using remote prefixMap
77 static bool dsdb_syntax_attid_from_remote_attid(const struct dsdb_syntax_ctx *ctx,
86 * map remote ATTID to local directly in case
87 * of no remote prefixMap (during provision for instance)
89 if (!ctx->pfm_remote) {
90 *id_local = id_remote;
94 werr = dsdb_schema_pfm_oid_from_attid(ctx->pfm_remote, id_remote, mem_ctx, &oid);
95 if (!W_ERROR_IS_OK(werr)) {
96 DEBUG(0,("ATTID->OID failed (%s) for: 0x%08X\n", win_errstr(werr), id_remote));
100 werr = dsdb_schema_pfm_attid_from_oid(ctx->schema->prefixmap, oid, id_local);
101 if (!W_ERROR_IS_OK(werr)) {
102 DEBUG(0,("OID->ATTID failed (%s) for: %s\n", win_errstr(werr), oid));
109 static WERROR dsdb_syntax_FOOBAR_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
110 const struct dsdb_attribute *attr,
111 const struct drsuapi_DsReplicaAttribute *in,
113 struct ldb_message_element *out)
118 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
119 W_ERROR_HAVE_NO_MEMORY(out->name);
121 out->num_values = in->value_ctr.num_values;
122 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
123 W_ERROR_HAVE_NO_MEMORY(out->values);
125 for (i=0; i < out->num_values; i++) {
128 if (in->value_ctr.values[i].blob == NULL) {
132 str = talloc_asprintf(out->values, "%s: not implemented",
134 W_ERROR_HAVE_NO_MEMORY(str);
136 out->values[i] = data_blob_string_const(str);
142 static WERROR dsdb_syntax_FOOBAR_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
143 const struct dsdb_attribute *attr,
144 const struct ldb_message_element *in,
146 struct drsuapi_DsReplicaAttribute *out)
151 static WERROR dsdb_syntax_FOOBAR_validate_ldb(const struct dsdb_syntax_ctx *ctx,
152 const struct dsdb_attribute *attr,
153 const struct ldb_message_element *in)
158 static WERROR dsdb_syntax_BOOL_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
159 const struct dsdb_attribute *attr,
160 const struct drsuapi_DsReplicaAttribute *in,
162 struct ldb_message_element *out)
167 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
168 W_ERROR_HAVE_NO_MEMORY(out->name);
170 out->num_values = in->value_ctr.num_values;
171 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
172 W_ERROR_HAVE_NO_MEMORY(out->values);
174 for (i=0; i < out->num_values; i++) {
178 if (in->value_ctr.values[i].blob == NULL) {
182 if (in->value_ctr.values[i].blob->length != 4) {
186 v = IVAL(in->value_ctr.values[i].blob->data, 0);
189 str = talloc_strdup(out->values, "TRUE");
190 W_ERROR_HAVE_NO_MEMORY(str);
192 str = talloc_strdup(out->values, "FALSE");
193 W_ERROR_HAVE_NO_MEMORY(str);
196 out->values[i] = data_blob_string_const(str);
202 static WERROR dsdb_syntax_BOOL_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
203 const struct dsdb_attribute *attr,
204 const struct ldb_message_element *in,
206 struct drsuapi_DsReplicaAttribute *out)
211 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
215 out->attid = dsdb_attribute_get_attid(attr,
217 out->value_ctr.num_values = in->num_values;
218 out->value_ctr.values = talloc_array(mem_ctx,
219 struct drsuapi_DsAttributeValue,
221 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
223 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
224 W_ERROR_HAVE_NO_MEMORY(blobs);
226 for (i=0; i < in->num_values; i++) {
227 out->value_ctr.values[i].blob = &blobs[i];
229 blobs[i] = data_blob_talloc(blobs, NULL, 4);
230 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
232 if (strcmp("TRUE", (const char *)in->values[i].data) == 0) {
233 SIVAL(blobs[i].data, 0, 0x00000001);
234 } else if (strcmp("FALSE", (const char *)in->values[i].data) == 0) {
235 SIVAL(blobs[i].data, 0, 0x00000000);
244 static WERROR dsdb_syntax_BOOL_validate_ldb(const struct dsdb_syntax_ctx *ctx,
245 const struct dsdb_attribute *attr,
246 const struct ldb_message_element *in)
250 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
254 for (i=0; i < in->num_values; i++) {
258 (const char *)in->values[i].data,
259 in->values[i].length);
261 (const char *)in->values[i].data,
262 in->values[i].length);
264 if (t != 0 && f != 0) {
265 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
272 static WERROR dsdb_syntax_INT32_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
273 const struct dsdb_attribute *attr,
274 const struct drsuapi_DsReplicaAttribute *in,
276 struct ldb_message_element *out)
281 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
282 W_ERROR_HAVE_NO_MEMORY(out->name);
284 out->num_values = in->value_ctr.num_values;
285 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
286 W_ERROR_HAVE_NO_MEMORY(out->values);
288 for (i=0; i < out->num_values; i++) {
292 if (in->value_ctr.values[i].blob == NULL) {
296 if (in->value_ctr.values[i].blob->length != 4) {
300 v = IVALS(in->value_ctr.values[i].blob->data, 0);
302 str = talloc_asprintf(out->values, "%d", v);
303 W_ERROR_HAVE_NO_MEMORY(str);
305 out->values[i] = data_blob_string_const(str);
311 static WERROR dsdb_syntax_INT32_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
312 const struct dsdb_attribute *attr,
313 const struct ldb_message_element *in,
315 struct drsuapi_DsReplicaAttribute *out)
320 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
324 out->attid = dsdb_attribute_get_attid(attr,
326 out->value_ctr.num_values = in->num_values;
327 out->value_ctr.values = talloc_array(mem_ctx,
328 struct drsuapi_DsAttributeValue,
330 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
332 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
333 W_ERROR_HAVE_NO_MEMORY(blobs);
335 for (i=0; i < in->num_values; i++) {
338 out->value_ctr.values[i].blob = &blobs[i];
340 blobs[i] = data_blob_talloc(blobs, NULL, 4);
341 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
343 /* We've to use "strtoll" here to have the intended overflows.
344 * Otherwise we may get "LONG_MAX" and the conversion is wrong. */
345 v = (int32_t) strtoll((char *)in->values[i].data, NULL, 0);
347 SIVALS(blobs[i].data, 0, v);
353 static WERROR dsdb_syntax_INT32_validate_ldb(const struct dsdb_syntax_ctx *ctx,
354 const struct dsdb_attribute *attr,
355 const struct ldb_message_element *in)
359 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
363 for (i=0; i < in->num_values; i++) {
365 char buf[sizeof("-2147483648")];
369 if (in->values[i].length >= sizeof(buf)) {
370 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
373 memcpy(buf, in->values[i].data, in->values[i].length);
375 v = strtol(buf, &end, 10);
377 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
379 if (end && end[0] != '\0') {
380 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
383 if (attr->rangeLower) {
384 if ((int32_t)v < (int32_t)*attr->rangeLower) {
385 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
389 if (attr->rangeUpper) {
390 if ((int32_t)v > (int32_t)*attr->rangeUpper) {
391 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
399 static WERROR dsdb_syntax_INT64_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
400 const struct dsdb_attribute *attr,
401 const struct drsuapi_DsReplicaAttribute *in,
403 struct ldb_message_element *out)
408 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
409 W_ERROR_HAVE_NO_MEMORY(out->name);
411 out->num_values = in->value_ctr.num_values;
412 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
413 W_ERROR_HAVE_NO_MEMORY(out->values);
415 for (i=0; i < out->num_values; i++) {
419 if (in->value_ctr.values[i].blob == NULL) {
423 if (in->value_ctr.values[i].blob->length != 8) {
427 v = BVALS(in->value_ctr.values[i].blob->data, 0);
429 str = talloc_asprintf(out->values, "%lld", (long long int)v);
430 W_ERROR_HAVE_NO_MEMORY(str);
432 out->values[i] = data_blob_string_const(str);
438 static WERROR dsdb_syntax_INT64_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
439 const struct dsdb_attribute *attr,
440 const struct ldb_message_element *in,
442 struct drsuapi_DsReplicaAttribute *out)
447 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
451 out->attid = dsdb_attribute_get_attid(attr,
453 out->value_ctr.num_values = in->num_values;
454 out->value_ctr.values = talloc_array(mem_ctx,
455 struct drsuapi_DsAttributeValue,
457 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
459 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
460 W_ERROR_HAVE_NO_MEMORY(blobs);
462 for (i=0; i < in->num_values; i++) {
465 out->value_ctr.values[i].blob = &blobs[i];
467 blobs[i] = data_blob_talloc(blobs, NULL, 8);
468 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
470 v = strtoll((const char *)in->values[i].data, NULL, 10);
472 SBVALS(blobs[i].data, 0, v);
478 static WERROR dsdb_syntax_INT64_validate_ldb(const struct dsdb_syntax_ctx *ctx,
479 const struct dsdb_attribute *attr,
480 const struct ldb_message_element *in)
484 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
488 for (i=0; i < in->num_values; i++) {
490 char buf[sizeof("-9223372036854775808")];
494 if (in->values[i].length >= sizeof(buf)) {
495 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
497 memcpy(buf, in->values[i].data, in->values[i].length);
500 v = strtoll(buf, &end, 10);
502 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
504 if (end && end[0] != '\0') {
505 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
508 if (attr->rangeLower) {
509 if ((int64_t)v < (int64_t)*attr->rangeLower) {
510 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
514 if (attr->rangeUpper) {
515 if ((int64_t)v > (int64_t)*attr->rangeUpper) {
516 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
523 static WERROR dsdb_syntax_NTTIME_UTC_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
524 const struct dsdb_attribute *attr,
525 const struct drsuapi_DsReplicaAttribute *in,
527 struct ldb_message_element *out)
532 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
533 W_ERROR_HAVE_NO_MEMORY(out->name);
535 out->num_values = in->value_ctr.num_values;
536 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
537 W_ERROR_HAVE_NO_MEMORY(out->values);
539 for (i=0; i < out->num_values; i++) {
544 if (in->value_ctr.values[i].blob == NULL) {
548 if (in->value_ctr.values[i].blob->length != 8) {
552 v = BVAL(in->value_ctr.values[i].blob->data, 0);
554 t = nt_time_to_unix(v);
557 * NOTE: On a w2k3 server you can set a GeneralizedTime string
558 * via LDAP, but you get back an UTCTime string,
559 * but via DRSUAPI you get back the NTTIME_1sec value
560 * that represents the GeneralizedTime value!
562 * So if we store the UTCTime string in our ldb
563 * we'll loose information!
565 str = ldb_timestring_utc(out->values, t);
566 W_ERROR_HAVE_NO_MEMORY(str);
567 out->values[i] = data_blob_string_const(str);
573 static WERROR dsdb_syntax_NTTIME_UTC_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
574 const struct dsdb_attribute *attr,
575 const struct ldb_message_element *in,
577 struct drsuapi_DsReplicaAttribute *out)
582 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
586 out->attid = dsdb_attribute_get_attid(attr,
588 out->value_ctr.num_values = in->num_values;
589 out->value_ctr.values = talloc_array(mem_ctx,
590 struct drsuapi_DsAttributeValue,
592 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
594 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
595 W_ERROR_HAVE_NO_MEMORY(blobs);
597 for (i=0; i < in->num_values; i++) {
601 out->value_ctr.values[i].blob = &blobs[i];
603 blobs[i] = data_blob_talloc(blobs, NULL, 8);
604 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
606 t = ldb_string_utc_to_time((const char *)in->values[i].data);
607 unix_to_nt_time(&v, t);
610 SBVAL(blobs[i].data, 0, v);
616 static WERROR dsdb_syntax_NTTIME_UTC_validate_ldb(const struct dsdb_syntax_ctx *ctx,
617 const struct dsdb_attribute *attr,
618 const struct ldb_message_element *in)
622 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
626 for (i=0; i < in->num_values; i++) {
628 char buf[sizeof("090826075717Z")];
631 if (in->values[i].length >= sizeof(buf)) {
632 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
634 memcpy(buf, in->values[i].data, in->values[i].length);
637 t = ldb_string_utc_to_time(buf);
639 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
642 if (attr->rangeLower) {
643 if ((int32_t)t < (int32_t)*attr->rangeLower) {
644 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
648 if (attr->rangeUpper) {
649 if ((int32_t)t > (int32_t)*attr->rangeLower) {
650 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
655 * TODO: verify the comment in the
656 * dsdb_syntax_NTTIME_UTC_drsuapi_to_ldb() function!
663 static WERROR dsdb_syntax_NTTIME_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
664 const struct dsdb_attribute *attr,
665 const struct drsuapi_DsReplicaAttribute *in,
667 struct ldb_message_element *out)
672 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
673 W_ERROR_HAVE_NO_MEMORY(out->name);
675 out->num_values = in->value_ctr.num_values;
676 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
677 W_ERROR_HAVE_NO_MEMORY(out->values);
679 for (i=0; i < out->num_values; i++) {
684 if (in->value_ctr.values[i].blob == NULL) {
688 if (in->value_ctr.values[i].blob->length != 8) {
692 v = BVAL(in->value_ctr.values[i].blob->data, 0);
694 t = nt_time_to_unix(v);
696 str = ldb_timestring(out->values, t);
697 W_ERROR_HAVE_NO_MEMORY(str);
699 out->values[i] = data_blob_string_const(str);
705 static WERROR dsdb_syntax_NTTIME_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
706 const struct dsdb_attribute *attr,
707 const struct ldb_message_element *in,
709 struct drsuapi_DsReplicaAttribute *out)
714 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
718 out->attid = dsdb_attribute_get_attid(attr,
720 out->value_ctr.num_values = in->num_values;
721 out->value_ctr.values = talloc_array(mem_ctx,
722 struct drsuapi_DsAttributeValue,
724 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
726 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
727 W_ERROR_HAVE_NO_MEMORY(blobs);
729 for (i=0; i < in->num_values; i++) {
734 out->value_ctr.values[i].blob = &blobs[i];
736 blobs[i] = data_blob_talloc(blobs, NULL, 8);
737 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
739 ret = ldb_val_to_time(&in->values[i], &t);
740 if (ret != LDB_SUCCESS) {
741 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
743 unix_to_nt_time(&v, t);
746 SBVAL(blobs[i].data, 0, v);
752 static WERROR dsdb_syntax_NTTIME_validate_ldb(const struct dsdb_syntax_ctx *ctx,
753 const struct dsdb_attribute *attr,
754 const struct ldb_message_element *in)
758 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
762 for (i=0; i < in->num_values; i++) {
766 ret = ldb_val_to_time(&in->values[i], &t);
767 if (ret != LDB_SUCCESS) {
768 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
771 if (attr->rangeLower) {
772 if ((int32_t)t < (int32_t)*attr->rangeLower) {
773 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
777 if (attr->rangeUpper) {
778 if ((int32_t)t > (int32_t)*attr->rangeLower) {
779 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
787 static WERROR dsdb_syntax_DATA_BLOB_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
788 const struct dsdb_attribute *attr,
789 const struct drsuapi_DsReplicaAttribute *in,
791 struct ldb_message_element *out)
796 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
797 W_ERROR_HAVE_NO_MEMORY(out->name);
799 out->num_values = in->value_ctr.num_values;
800 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
801 W_ERROR_HAVE_NO_MEMORY(out->values);
803 for (i=0; i < out->num_values; i++) {
804 if (in->value_ctr.values[i].blob == NULL) {
808 if (in->value_ctr.values[i].blob->length == 0) {
812 out->values[i] = data_blob_dup_talloc(out->values,
813 in->value_ctr.values[i].blob);
814 W_ERROR_HAVE_NO_MEMORY(out->values[i].data);
820 static WERROR dsdb_syntax_DATA_BLOB_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
821 const struct dsdb_attribute *attr,
822 const struct ldb_message_element *in,
824 struct drsuapi_DsReplicaAttribute *out)
829 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
833 out->attid = dsdb_attribute_get_attid(attr,
835 out->value_ctr.num_values = in->num_values;
836 out->value_ctr.values = talloc_array(mem_ctx,
837 struct drsuapi_DsAttributeValue,
839 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
841 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
842 W_ERROR_HAVE_NO_MEMORY(blobs);
844 for (i=0; i < in->num_values; i++) {
845 out->value_ctr.values[i].blob = &blobs[i];
847 blobs[i] = data_blob_dup_talloc(blobs, &in->values[i]);
848 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
854 static WERROR dsdb_syntax_DATA_BLOB_validate_one_val(const struct dsdb_syntax_ctx *ctx,
855 const struct dsdb_attribute *attr,
856 const struct ldb_val *val)
858 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
862 if (attr->rangeLower) {
863 if ((uint32_t)val->length < (uint32_t)*attr->rangeLower) {
864 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
868 if (attr->rangeUpper) {
869 if ((uint32_t)val->length > (uint32_t)*attr->rangeUpper) {
870 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
877 static WERROR dsdb_syntax_DATA_BLOB_validate_ldb(const struct dsdb_syntax_ctx *ctx,
878 const struct dsdb_attribute *attr,
879 const struct ldb_message_element *in)
884 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
888 for (i=0; i < in->num_values; i++) {
889 if (in->values[i].length == 0) {
890 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
893 status = dsdb_syntax_DATA_BLOB_validate_one_val(ctx,
896 if (!W_ERROR_IS_OK(status)) {
904 static WERROR _dsdb_syntax_auto_OID_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
905 const struct dsdb_attribute *attr,
906 const struct drsuapi_DsReplicaAttribute *in,
908 struct ldb_message_element *out)
913 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
914 W_ERROR_HAVE_NO_MEMORY(out->name);
916 out->num_values = in->value_ctr.num_values;
917 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
918 W_ERROR_HAVE_NO_MEMORY(out->values);
920 for (i=0; i < out->num_values; i++) {
922 const struct dsdb_class *c;
923 const struct dsdb_attribute *a;
924 const char *str = NULL;
926 if (in->value_ctr.values[i].blob == NULL) {
930 if (in->value_ctr.values[i].blob->length != 4) {
934 v = IVAL(in->value_ctr.values[i].blob->data, 0);
936 if ((c = dsdb_class_by_governsID_id(ctx->schema, v))) {
937 str = talloc_strdup(out->values, c->lDAPDisplayName);
938 } else if ((a = dsdb_attribute_by_attributeID_id(ctx->schema, v))) {
939 str = talloc_strdup(out->values, a->lDAPDisplayName);
942 SMB_ASSERT(ctx->pfm_remote);
943 werr = dsdb_schema_pfm_oid_from_attid(ctx->pfm_remote, v,
945 W_ERROR_NOT_OK_RETURN(werr);
947 W_ERROR_HAVE_NO_MEMORY(str);
949 /* the values need to be reversed */
950 out->values[out->num_values - (i + 1)] = data_blob_string_const(str);
956 static WERROR _dsdb_syntax_OID_obj_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
957 const struct dsdb_attribute *attr,
958 const struct drsuapi_DsReplicaAttribute *in,
960 struct ldb_message_element *out)
965 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
966 W_ERROR_HAVE_NO_MEMORY(out->name);
968 out->num_values = in->value_ctr.num_values;
969 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
970 W_ERROR_HAVE_NO_MEMORY(out->values);
972 for (i=0; i < out->num_values; i++) {
974 const struct dsdb_class *c;
977 if (in->value_ctr.values[i].blob == NULL) {
981 if (in->value_ctr.values[i].blob->length != 4) {
985 v = IVAL(in->value_ctr.values[i].blob->data, 0);
987 c = dsdb_class_by_governsID_id(ctx->schema, v);
992 str = talloc_strdup(out->values, c->lDAPDisplayName);
993 W_ERROR_HAVE_NO_MEMORY(str);
995 /* the values need to be reversed */
996 out->values[out->num_values - (i + 1)] = data_blob_string_const(str);
1002 static WERROR _dsdb_syntax_OID_attr_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1003 const struct dsdb_attribute *attr,
1004 const struct drsuapi_DsReplicaAttribute *in,
1005 TALLOC_CTX *mem_ctx,
1006 struct ldb_message_element *out)
1011 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1012 W_ERROR_HAVE_NO_MEMORY(out->name);
1014 out->num_values = in->value_ctr.num_values;
1015 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1016 W_ERROR_HAVE_NO_MEMORY(out->values);
1018 for (i=0; i < out->num_values; i++) {
1020 const struct dsdb_attribute *a;
1023 if (in->value_ctr.values[i].blob == NULL) {
1027 if (in->value_ctr.values[i].blob->length != 4) {
1031 v = IVAL(in->value_ctr.values[i].blob->data, 0);
1033 /* convert remote ATTID to local ATTID */
1034 if (!dsdb_syntax_attid_from_remote_attid(ctx, mem_ctx, v, &v)) {
1035 DEBUG(0,(__location__ "Failed to map remote ATTID to local ATTID!\n"));
1039 a = dsdb_attribute_by_attributeID_id(ctx->schema, v);
1044 str = talloc_strdup(out->values, a->lDAPDisplayName);
1045 W_ERROR_HAVE_NO_MEMORY(str);
1047 /* the values need to be reversed */
1048 out->values[out->num_values - (i + 1)] = data_blob_string_const(str);
1054 static WERROR _dsdb_syntax_OID_oid_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1055 const struct dsdb_attribute *attr,
1056 const struct drsuapi_DsReplicaAttribute *in,
1057 TALLOC_CTX *mem_ctx,
1058 struct ldb_message_element *out)
1062 SMB_ASSERT(ctx->pfm_remote);
1065 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1066 W_ERROR_HAVE_NO_MEMORY(out->name);
1068 out->num_values = in->value_ctr.num_values;
1069 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1070 W_ERROR_HAVE_NO_MEMORY(out->values);
1072 for (i=0; i < out->num_values; i++) {
1077 if (in->value_ctr.values[i].blob == NULL) {
1081 if (in->value_ctr.values[i].blob->length != 4) {
1085 attid = IVAL(in->value_ctr.values[i].blob->data, 0);
1087 status = dsdb_schema_pfm_oid_from_attid(ctx->pfm_remote, attid,
1089 W_ERROR_NOT_OK_RETURN(status);
1091 out->values[i] = data_blob_string_const(oid);
1097 static WERROR _dsdb_syntax_auto_OID_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1098 const struct dsdb_attribute *attr,
1099 const struct ldb_message_element *in,
1100 TALLOC_CTX *mem_ctx,
1101 struct drsuapi_DsReplicaAttribute *out)
1106 out->attid= dsdb_attribute_get_attid(attr,
1108 out->value_ctr.num_values= in->num_values;
1109 out->value_ctr.values= talloc_array(mem_ctx,
1110 struct drsuapi_DsAttributeValue,
1112 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1114 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1115 W_ERROR_HAVE_NO_MEMORY(blobs);
1117 for (i=0; i < in->num_values; i++) {
1118 const struct dsdb_class *obj_class;
1119 const struct dsdb_attribute *obj_attr;
1122 out->value_ctr.values[i].blob= &blobs[i];
1124 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1125 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1127 /* in DRS windows puts the classes in the opposite
1128 order to the order used in ldap */
1129 v = &in->values[(in->num_values-1)-i];
1131 if ((obj_class = dsdb_class_by_lDAPDisplayName_ldb_val(ctx->schema, v))) {
1132 SIVAL(blobs[i].data, 0, obj_class->governsID_id);
1133 } else if ((obj_attr = dsdb_attribute_by_lDAPDisplayName_ldb_val(ctx->schema, v))) {
1134 SIVAL(blobs[i].data, 0, obj_attr->attributeID_id);
1138 werr = dsdb_schema_pfm_attid_from_oid(ctx->schema->prefixmap,
1139 (const char *)v->data,
1141 W_ERROR_NOT_OK_RETURN(werr);
1142 SIVAL(blobs[i].data, 0, attid);
1151 static WERROR _dsdb_syntax_OID_obj_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1152 const struct dsdb_attribute *attr,
1153 const struct ldb_message_element *in,
1154 TALLOC_CTX *mem_ctx,
1155 struct drsuapi_DsReplicaAttribute *out)
1160 out->attid= dsdb_attribute_get_attid(attr,
1162 out->value_ctr.num_values= in->num_values;
1163 out->value_ctr.values= talloc_array(mem_ctx,
1164 struct drsuapi_DsAttributeValue,
1166 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1168 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1169 W_ERROR_HAVE_NO_MEMORY(blobs);
1171 for (i=0; i < in->num_values; i++) {
1172 const struct dsdb_class *obj_class;
1174 out->value_ctr.values[i].blob= &blobs[i];
1176 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1177 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1179 /* in DRS windows puts the classes in the opposite
1180 order to the order used in ldap */
1181 obj_class = dsdb_class_by_lDAPDisplayName(ctx->schema,
1182 (const char *)in->values[(in->num_values-1)-i].data);
1186 SIVAL(blobs[i].data, 0, obj_class->governsID_id);
1193 static WERROR _dsdb_syntax_OID_attr_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1194 const struct dsdb_attribute *attr,
1195 const struct ldb_message_element *in,
1196 TALLOC_CTX *mem_ctx,
1197 struct drsuapi_DsReplicaAttribute *out)
1202 out->attid= dsdb_attribute_get_attid(attr,
1204 out->value_ctr.num_values= in->num_values;
1205 out->value_ctr.values= talloc_array(mem_ctx,
1206 struct drsuapi_DsAttributeValue,
1208 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1210 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1211 W_ERROR_HAVE_NO_MEMORY(blobs);
1213 for (i=0; i < in->num_values; i++) {
1214 const struct dsdb_attribute *obj_attr;
1216 out->value_ctr.values[i].blob= &blobs[i];
1218 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1219 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1221 obj_attr = dsdb_attribute_by_lDAPDisplayName(ctx->schema, (const char *)in->values[i].data);
1225 SIVAL(blobs[i].data, 0, obj_attr->attributeID_id);
1232 static WERROR _dsdb_syntax_OID_oid_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1233 const struct dsdb_attribute *attr,
1234 const struct ldb_message_element *in,
1235 TALLOC_CTX *mem_ctx,
1236 struct drsuapi_DsReplicaAttribute *out)
1241 out->attid= dsdb_attribute_get_attid(attr,
1243 out->value_ctr.num_values= in->num_values;
1244 out->value_ctr.values= talloc_array(mem_ctx,
1245 struct drsuapi_DsAttributeValue,
1247 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1249 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1250 W_ERROR_HAVE_NO_MEMORY(blobs);
1252 for (i=0; i < in->num_values; i++) {
1256 out->value_ctr.values[i].blob= &blobs[i];
1258 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1259 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1261 status = dsdb_schema_pfm_attid_from_oid(ctx->schema->prefixmap,
1262 (const char *)in->values[i].data,
1264 W_ERROR_NOT_OK_RETURN(status);
1266 SIVAL(blobs[i].data, 0, attid);
1272 static WERROR dsdb_syntax_OID_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1273 const struct dsdb_attribute *attr,
1274 const struct drsuapi_DsReplicaAttribute *in,
1275 TALLOC_CTX *mem_ctx,
1276 struct ldb_message_element *out)
1280 switch (attr->attributeID_id) {
1281 case DRSUAPI_ATTID_objectClass:
1282 case DRSUAPI_ATTID_subClassOf:
1283 case DRSUAPI_ATTID_auxiliaryClass:
1284 case DRSUAPI_ATTID_systemAuxiliaryClass:
1285 case DRSUAPI_ATTID_systemPossSuperiors:
1286 case DRSUAPI_ATTID_possSuperiors:
1287 werr = _dsdb_syntax_OID_obj_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1289 case DRSUAPI_ATTID_systemMustContain:
1290 case DRSUAPI_ATTID_systemMayContain:
1291 case DRSUAPI_ATTID_mustContain:
1292 case DRSUAPI_ATTID_rDNAttId:
1293 case DRSUAPI_ATTID_transportAddressAttribute:
1294 case DRSUAPI_ATTID_mayContain:
1295 werr = _dsdb_syntax_OID_attr_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1297 case DRSUAPI_ATTID_governsID:
1298 case DRSUAPI_ATTID_attributeID:
1299 case DRSUAPI_ATTID_attributeSyntax:
1300 werr = _dsdb_syntax_OID_oid_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1303 DEBUG(0,(__location__ ": Unknown handling for attributeID_id for %s\n",
1304 attr->lDAPDisplayName));
1305 return _dsdb_syntax_auto_OID_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1308 /* When we are doing the vampire of a schema, we don't want
1309 * the inability to reference an OID to get in the way.
1310 * Otherwise, we won't get the new schema with which to
1311 * understand this */
1312 if (!W_ERROR_IS_OK(werr) && ctx->schema->relax_OID_conversions) {
1313 return _dsdb_syntax_OID_oid_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1318 static WERROR dsdb_syntax_OID_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1319 const struct dsdb_attribute *attr,
1320 const struct ldb_message_element *in,
1321 TALLOC_CTX *mem_ctx,
1322 struct drsuapi_DsReplicaAttribute *out)
1324 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1328 switch (attr->attributeID_id) {
1329 case DRSUAPI_ATTID_objectClass:
1330 case DRSUAPI_ATTID_subClassOf:
1331 case DRSUAPI_ATTID_auxiliaryClass:
1332 case DRSUAPI_ATTID_systemAuxiliaryClass:
1333 case DRSUAPI_ATTID_systemPossSuperiors:
1334 case DRSUAPI_ATTID_possSuperiors:
1335 return _dsdb_syntax_OID_obj_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1336 case DRSUAPI_ATTID_systemMustContain:
1337 case DRSUAPI_ATTID_systemMayContain:
1338 case DRSUAPI_ATTID_mustContain:
1339 case DRSUAPI_ATTID_rDNAttId:
1340 case DRSUAPI_ATTID_transportAddressAttribute:
1341 case DRSUAPI_ATTID_mayContain:
1342 return _dsdb_syntax_OID_attr_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1343 case DRSUAPI_ATTID_governsID:
1344 case DRSUAPI_ATTID_attributeID:
1345 case DRSUAPI_ATTID_attributeSyntax:
1346 return _dsdb_syntax_OID_oid_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1349 DEBUG(0,(__location__ ": Unknown handling for attributeID_id for %s\n",
1350 attr->lDAPDisplayName));
1352 return _dsdb_syntax_auto_OID_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1355 static WERROR _dsdb_syntax_OID_validate_numericoid(const struct dsdb_syntax_ctx *ctx,
1356 const struct dsdb_attribute *attr,
1357 const struct ldb_message_element *in)
1360 TALLOC_CTX *tmp_ctx;
1362 tmp_ctx = talloc_new(ctx->ldb);
1363 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1365 for (i=0; i < in->num_values; i++) {
1367 const char *oid_out;
1368 const char *oid = (const char*)in->values[i].data;
1370 if (!ber_write_OID_String(tmp_ctx, &blob, oid)) {
1371 DEBUG(0,("ber_write_OID_String() failed for %s\n", oid));
1372 talloc_free(tmp_ctx);
1373 return WERR_INVALID_PARAMETER;
1376 if (!ber_read_OID_String(tmp_ctx, blob, &oid_out)) {
1377 DEBUG(0,("ber_read_OID_String() failed for %s\n",
1378 hex_encode_talloc(tmp_ctx, blob.data, blob.length)));
1379 talloc_free(tmp_ctx);
1380 return WERR_INVALID_PARAMETER;
1383 if (strcmp(oid, oid_out) != 0) {
1384 talloc_free(tmp_ctx);
1385 return WERR_INVALID_PARAMETER;
1389 talloc_free(tmp_ctx);
1393 static WERROR dsdb_syntax_OID_validate_ldb(const struct dsdb_syntax_ctx *ctx,
1394 const struct dsdb_attribute *attr,
1395 const struct ldb_message_element *in)
1398 struct drsuapi_DsReplicaAttribute drs_tmp;
1399 struct ldb_message_element ldb_tmp;
1400 TALLOC_CTX *tmp_ctx;
1402 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1406 switch (attr->attributeID_id) {
1407 case DRSUAPI_ATTID_governsID:
1408 case DRSUAPI_ATTID_attributeID:
1409 case DRSUAPI_ATTID_attributeSyntax:
1410 return _dsdb_syntax_OID_validate_numericoid(ctx, attr, in);
1414 * TODO: optimize and verify this code
1417 tmp_ctx = talloc_new(ctx->ldb);
1418 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1420 status = dsdb_syntax_OID_ldb_to_drsuapi(ctx,
1425 if (!W_ERROR_IS_OK(status)) {
1426 talloc_free(tmp_ctx);
1430 status = dsdb_syntax_OID_drsuapi_to_ldb(ctx,
1435 if (!W_ERROR_IS_OK(status)) {
1436 talloc_free(tmp_ctx);
1440 talloc_free(tmp_ctx);
1444 static WERROR dsdb_syntax_UNICODE_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1445 const struct dsdb_attribute *attr,
1446 const struct drsuapi_DsReplicaAttribute *in,
1447 TALLOC_CTX *mem_ctx,
1448 struct ldb_message_element *out)
1453 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1454 W_ERROR_HAVE_NO_MEMORY(out->name);
1456 out->num_values = in->value_ctr.num_values;
1457 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1458 W_ERROR_HAVE_NO_MEMORY(out->values);
1460 for (i=0; i < out->num_values; i++) {
1463 if (in->value_ctr.values[i].blob == NULL) {
1467 if (in->value_ctr.values[i].blob->length == 0) {
1471 if (!convert_string_talloc(out->values,
1473 in->value_ctr.values[i].blob->data,
1474 in->value_ctr.values[i].blob->length,
1475 (void **)&str, NULL, false)) {
1479 out->values[i] = data_blob_string_const(str);
1485 static WERROR dsdb_syntax_UNICODE_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1486 const struct dsdb_attribute *attr,
1487 const struct ldb_message_element *in,
1488 TALLOC_CTX *mem_ctx,
1489 struct drsuapi_DsReplicaAttribute *out)
1494 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1498 out->attid = dsdb_attribute_get_attid(attr,
1500 out->value_ctr.num_values = in->num_values;
1501 out->value_ctr.values = talloc_array(mem_ctx,
1502 struct drsuapi_DsAttributeValue,
1504 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1506 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1507 W_ERROR_HAVE_NO_MEMORY(blobs);
1509 for (i=0; i < in->num_values; i++) {
1510 out->value_ctr.values[i].blob = &blobs[i];
1512 if (!convert_string_talloc(blobs,
1514 in->values[i].data, in->values[i].length,
1515 (void **)&blobs[i].data, &blobs[i].length, false)) {
1523 static WERROR dsdb_syntax_UNICODE_validate_one_val(const struct dsdb_syntax_ctx *ctx,
1524 const struct dsdb_attribute *attr,
1525 const struct ldb_val *val)
1531 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1535 ok = convert_string_talloc(ctx->ldb,
1543 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1546 if (attr->rangeLower) {
1547 if ((size/2) < *attr->rangeLower) {
1548 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1552 if (attr->rangeUpper) {
1553 if ((size/2) > *attr->rangeUpper) {
1554 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1561 static WERROR dsdb_syntax_UNICODE_validate_ldb(const struct dsdb_syntax_ctx *ctx,
1562 const struct dsdb_attribute *attr,
1563 const struct ldb_message_element *in)
1568 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1572 for (i=0; i < in->num_values; i++) {
1573 if (in->values[i].length == 0) {
1574 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1577 status = dsdb_syntax_UNICODE_validate_one_val(ctx,
1580 if (!W_ERROR_IS_OK(status)) {
1588 static WERROR dsdb_syntax_one_DN_drsuapi_to_ldb(TALLOC_CTX *mem_ctx, struct ldb_context *ldb,
1589 const struct dsdb_syntax *syntax,
1590 const DATA_BLOB *in, DATA_BLOB *out)
1592 struct drsuapi_DsReplicaObjectIdentifier3 id3;
1593 enum ndr_err_code ndr_err;
1594 DATA_BLOB guid_blob;
1596 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1601 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1605 talloc_free(tmp_ctx);
1609 if (in->length == 0) {
1610 talloc_free(tmp_ctx);
1615 /* windows sometimes sends an extra two pad bytes here */
1616 ndr_err = ndr_pull_struct_blob(in,
1618 (ndr_pull_flags_fn_t)ndr_pull_drsuapi_DsReplicaObjectIdentifier3);
1619 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1620 status = ndr_map_error2ntstatus(ndr_err);
1621 talloc_free(tmp_ctx);
1622 return ntstatus_to_werror(status);
1625 dn = ldb_dn_new(tmp_ctx, ldb, id3.dn);
1627 talloc_free(tmp_ctx);
1628 /* If this fails, it must be out of memory, as it does not do much parsing */
1629 W_ERROR_HAVE_NO_MEMORY(dn);
1632 if (!GUID_all_zero(&id3.guid)) {
1633 status = GUID_to_ndr_blob(&id3.guid, tmp_ctx, &guid_blob);
1634 if (!NT_STATUS_IS_OK(status)) {
1635 talloc_free(tmp_ctx);
1636 return ntstatus_to_werror(status);
1639 ret = ldb_dn_set_extended_component(dn, "GUID", &guid_blob);
1640 if (ret != LDB_SUCCESS) {
1641 talloc_free(tmp_ctx);
1644 talloc_free(guid_blob.data);
1647 if (id3.__ndr_size_sid) {
1649 ndr_err = ndr_push_struct_blob(&sid_blob, tmp_ctx, &id3.sid,
1650 (ndr_push_flags_fn_t)ndr_push_dom_sid);
1651 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1652 status = ndr_map_error2ntstatus(ndr_err);
1653 talloc_free(tmp_ctx);
1654 return ntstatus_to_werror(status);
1657 ret = ldb_dn_set_extended_component(dn, "SID", &sid_blob);
1658 if (ret != LDB_SUCCESS) {
1659 talloc_free(tmp_ctx);
1664 *out = data_blob_string_const(ldb_dn_get_extended_linearized(mem_ctx, dn, 1));
1665 talloc_free(tmp_ctx);
1669 static WERROR dsdb_syntax_DN_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1670 const struct dsdb_attribute *attr,
1671 const struct drsuapi_DsReplicaAttribute *in,
1672 TALLOC_CTX *mem_ctx,
1673 struct ldb_message_element *out)
1678 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1679 W_ERROR_HAVE_NO_MEMORY(out->name);
1681 out->num_values = in->value_ctr.num_values;
1682 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1683 W_ERROR_HAVE_NO_MEMORY(out->values);
1685 for (i=0; i < out->num_values; i++) {
1686 WERROR status = dsdb_syntax_one_DN_drsuapi_to_ldb(out->values, ctx->ldb, attr->syntax,
1687 in->value_ctr.values[i].blob,
1689 if (!W_ERROR_IS_OK(status)) {
1698 static WERROR dsdb_syntax_DN_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1699 const struct dsdb_attribute *attr,
1700 const struct ldb_message_element *in,
1701 TALLOC_CTX *mem_ctx,
1702 struct drsuapi_DsReplicaAttribute *out)
1707 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1711 out->attid = dsdb_attribute_get_attid(attr,
1713 out->value_ctr.num_values = in->num_values;
1714 out->value_ctr.values = talloc_array(mem_ctx,
1715 struct drsuapi_DsAttributeValue,
1717 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1719 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1720 W_ERROR_HAVE_NO_MEMORY(blobs);
1722 for (i=0; i < in->num_values; i++) {
1723 struct drsuapi_DsReplicaObjectIdentifier3 id3;
1724 enum ndr_err_code ndr_err;
1726 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1729 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1731 out->value_ctr.values[i].blob = &blobs[i];
1733 dn = ldb_dn_from_ldb_val(tmp_ctx, ctx->ldb, &in->values[i]);
1735 W_ERROR_HAVE_NO_MEMORY(dn);
1739 status = dsdb_get_extended_dn_guid(dn, &id3.guid, "GUID");
1740 if (!NT_STATUS_IS_OK(status) &&
1741 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1742 talloc_free(tmp_ctx);
1743 return ntstatus_to_werror(status);
1746 status = dsdb_get_extended_dn_sid(dn, &id3.sid, "SID");
1747 if (!NT_STATUS_IS_OK(status) &&
1748 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1749 talloc_free(tmp_ctx);
1750 return ntstatus_to_werror(status);
1753 id3.dn = ldb_dn_get_linearized(dn);
1755 ndr_err = ndr_push_struct_blob(&blobs[i], blobs, &id3, (ndr_push_flags_fn_t)ndr_push_drsuapi_DsReplicaObjectIdentifier3);
1756 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1757 status = ndr_map_error2ntstatus(ndr_err);
1758 talloc_free(tmp_ctx);
1759 return ntstatus_to_werror(status);
1761 talloc_free(tmp_ctx);
1767 static WERROR dsdb_syntax_DN_validate_one_val(const struct dsdb_syntax_ctx *ctx,
1768 const struct dsdb_attribute *attr,
1769 const struct ldb_val *val,
1770 TALLOC_CTX *mem_ctx,
1771 struct dsdb_dn **_dsdb_dn)
1773 static const char * const extended_list[] = { "GUID", "SID", NULL };
1774 enum ndr_err_code ndr_err;
1777 const DATA_BLOB *sid_blob;
1778 struct dsdb_dn *dsdb_dn;
1784 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1787 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1789 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1793 dsdb_dn = dsdb_dn_parse(tmp_ctx, ctx->ldb, val,
1794 attr->syntax->ldap_oid);
1796 talloc_free(tmp_ctx);
1797 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1801 dn2 = ldb_dn_copy(tmp_ctx, dn);
1803 talloc_free(tmp_ctx);
1807 num_components = ldb_dn_get_comp_num(dn);
1809 status = dsdb_get_extended_dn_guid(dn, &guid, "GUID");
1810 if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1812 } else if (!NT_STATUS_IS_OK(status)) {
1813 talloc_free(tmp_ctx);
1814 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1817 sid_blob = ldb_dn_get_extended_component(dn, "SID");
1820 ndr_err = ndr_pull_struct_blob_all(sid_blob,
1823 (ndr_pull_flags_fn_t)ndr_pull_dom_sid);
1824 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1825 talloc_free(tmp_ctx);
1826 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1830 /* Do not allow links to the RootDSE */
1831 if (num_components == 0) {
1832 talloc_free(tmp_ctx);
1833 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1837 * We need to check that only "GUID" and "SID" are
1838 * specified as extended components, we do that
1839 * by comparing the dn's after removing all components
1840 * from one dn and only the allowed subset from the other
1843 ldb_dn_extended_filter(dn, extended_list);
1845 dn_str = ldb_dn_get_extended_linearized(tmp_ctx, dn, 0);
1846 if (dn_str == NULL) {
1847 talloc_free(tmp_ctx);
1848 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1850 dn2_str = ldb_dn_get_extended_linearized(tmp_ctx, dn2, 0);
1851 if (dn2_str == NULL) {
1852 talloc_free(tmp_ctx);
1853 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1856 if (strcmp(dn_str, dn2_str) != 0) {
1857 talloc_free(tmp_ctx);
1858 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1861 *_dsdb_dn = talloc_move(mem_ctx, &dsdb_dn);
1862 talloc_free(tmp_ctx);
1866 static WERROR dsdb_syntax_DN_validate_ldb(const struct dsdb_syntax_ctx *ctx,
1867 const struct dsdb_attribute *attr,
1868 const struct ldb_message_element *in)
1872 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1876 for (i=0; i < in->num_values; i++) {
1878 struct dsdb_dn *dsdb_dn;
1879 TALLOC_CTX *tmp_ctx = talloc_new(ctx->ldb);
1880 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1882 status = dsdb_syntax_DN_validate_one_val(ctx,
1886 if (!W_ERROR_IS_OK(status)) {
1887 talloc_free(tmp_ctx);
1891 if (dsdb_dn->dn_format != DSDB_NORMAL_DN) {
1892 talloc_free(tmp_ctx);
1893 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1896 talloc_free(tmp_ctx);
1902 static WERROR dsdb_syntax_DN_BINARY_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1903 const struct dsdb_attribute *attr,
1904 const struct drsuapi_DsReplicaAttribute *in,
1905 TALLOC_CTX *mem_ctx,
1906 struct ldb_message_element *out)
1912 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1913 W_ERROR_HAVE_NO_MEMORY(out->name);
1915 out->num_values = in->value_ctr.num_values;
1916 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1917 W_ERROR_HAVE_NO_MEMORY(out->values);
1919 for (i=0; i < out->num_values; i++) {
1920 struct drsuapi_DsReplicaObjectIdentifier3Binary id3;
1921 enum ndr_err_code ndr_err;
1922 DATA_BLOB guid_blob;
1924 struct dsdb_dn *dsdb_dn;
1926 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1928 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1931 if (in->value_ctr.values[i].blob == NULL) {
1932 talloc_free(tmp_ctx);
1936 if (in->value_ctr.values[i].blob->length == 0) {
1937 talloc_free(tmp_ctx);
1942 /* windows sometimes sends an extra two pad bytes here */
1943 ndr_err = ndr_pull_struct_blob(in->value_ctr.values[i].blob,
1945 (ndr_pull_flags_fn_t)ndr_pull_drsuapi_DsReplicaObjectIdentifier3Binary);
1946 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1947 status = ndr_map_error2ntstatus(ndr_err);
1948 talloc_free(tmp_ctx);
1949 return ntstatus_to_werror(status);
1952 dn = ldb_dn_new(tmp_ctx, ctx->ldb, id3.dn);
1954 talloc_free(tmp_ctx);
1955 /* If this fails, it must be out of memory, as it does not do much parsing */
1956 W_ERROR_HAVE_NO_MEMORY(dn);
1959 status = GUID_to_ndr_blob(&id3.guid, tmp_ctx, &guid_blob);
1960 if (!NT_STATUS_IS_OK(status)) {
1961 talloc_free(tmp_ctx);
1962 return ntstatus_to_werror(status);
1965 ret = ldb_dn_set_extended_component(dn, "GUID", &guid_blob);
1966 if (ret != LDB_SUCCESS) {
1967 talloc_free(tmp_ctx);
1971 talloc_free(guid_blob.data);
1973 if (id3.__ndr_size_sid) {
1975 ndr_err = ndr_push_struct_blob(&sid_blob, tmp_ctx, &id3.sid,
1976 (ndr_push_flags_fn_t)ndr_push_dom_sid);
1977 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1978 status = ndr_map_error2ntstatus(ndr_err);
1979 talloc_free(tmp_ctx);
1980 return ntstatus_to_werror(status);
1983 ret = ldb_dn_set_extended_component(dn, "SID", &sid_blob);
1984 if (ret != LDB_SUCCESS) {
1985 talloc_free(tmp_ctx);
1990 /* set binary stuff */
1991 dsdb_dn = dsdb_dn_construct(tmp_ctx, dn, id3.binary, attr->syntax->ldap_oid);
1993 /* If this fails, it must be out of memory, we know the ldap_oid is valid */
1994 talloc_free(tmp_ctx);
1995 W_ERROR_HAVE_NO_MEMORY(dsdb_dn);
1997 out->values[i] = data_blob_string_const(dsdb_dn_get_extended_linearized(out->values, dsdb_dn, 1));
1998 talloc_free(tmp_ctx);
2004 static WERROR dsdb_syntax_DN_BINARY_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
2005 const struct dsdb_attribute *attr,
2006 const struct ldb_message_element *in,
2007 TALLOC_CTX *mem_ctx,
2008 struct drsuapi_DsReplicaAttribute *out)
2013 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2017 out->attid = dsdb_attribute_get_attid(attr,
2019 out->value_ctr.num_values = in->num_values;
2020 out->value_ctr.values = talloc_array(mem_ctx,
2021 struct drsuapi_DsAttributeValue,
2023 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
2025 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
2026 W_ERROR_HAVE_NO_MEMORY(blobs);
2028 for (i=0; i < in->num_values; i++) {
2029 struct drsuapi_DsReplicaObjectIdentifier3Binary id3;
2030 enum ndr_err_code ndr_err;
2031 const DATA_BLOB *sid_blob;
2032 struct dsdb_dn *dsdb_dn;
2033 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
2036 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
2038 out->value_ctr.values[i].blob = &blobs[i];
2040 dsdb_dn = dsdb_dn_parse(tmp_ctx, ctx->ldb, &in->values[i], attr->syntax->ldap_oid);
2043 talloc_free(tmp_ctx);
2044 return ntstatus_to_werror(NT_STATUS_INVALID_PARAMETER);
2049 status = dsdb_get_extended_dn_guid(dsdb_dn->dn, &id3.guid, "GUID");
2050 if (!NT_STATUS_IS_OK(status) &&
2051 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
2052 talloc_free(tmp_ctx);
2053 return ntstatus_to_werror(status);
2056 sid_blob = ldb_dn_get_extended_component(dsdb_dn->dn, "SID");
2059 ndr_err = ndr_pull_struct_blob_all(sid_blob,
2061 (ndr_pull_flags_fn_t)ndr_pull_dom_sid);
2062 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2063 status = ndr_map_error2ntstatus(ndr_err);
2064 talloc_free(tmp_ctx);
2065 return ntstatus_to_werror(status);
2069 id3.dn = ldb_dn_get_linearized(dsdb_dn->dn);
2071 /* get binary stuff */
2072 id3.binary = dsdb_dn->extra_part;
2074 ndr_err = ndr_push_struct_blob(&blobs[i], blobs, &id3, (ndr_push_flags_fn_t)ndr_push_drsuapi_DsReplicaObjectIdentifier3Binary);
2075 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2076 status = ndr_map_error2ntstatus(ndr_err);
2077 talloc_free(tmp_ctx);
2078 return ntstatus_to_werror(status);
2080 talloc_free(tmp_ctx);
2086 static WERROR dsdb_syntax_DN_BINARY_validate_ldb(const struct dsdb_syntax_ctx *ctx,
2087 const struct dsdb_attribute *attr,
2088 const struct ldb_message_element *in)
2092 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2096 for (i=0; i < in->num_values; i++) {
2098 struct dsdb_dn *dsdb_dn;
2099 TALLOC_CTX *tmp_ctx = talloc_new(ctx->ldb);
2100 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
2102 status = dsdb_syntax_DN_validate_one_val(ctx,
2106 if (!W_ERROR_IS_OK(status)) {
2107 talloc_free(tmp_ctx);
2111 if (dsdb_dn->dn_format != DSDB_BINARY_DN) {
2112 talloc_free(tmp_ctx);
2113 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
2116 status = dsdb_syntax_DATA_BLOB_validate_one_val(ctx,
2118 &dsdb_dn->extra_part);
2119 if (!W_ERROR_IS_OK(status)) {
2120 talloc_free(tmp_ctx);
2124 talloc_free(tmp_ctx);
2130 static WERROR dsdb_syntax_DN_STRING_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
2131 const struct dsdb_attribute *attr,
2132 const struct drsuapi_DsReplicaAttribute *in,
2133 TALLOC_CTX *mem_ctx,
2134 struct ldb_message_element *out)
2136 return dsdb_syntax_DN_BINARY_drsuapi_to_ldb(ctx,
2143 static WERROR dsdb_syntax_DN_STRING_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
2144 const struct dsdb_attribute *attr,
2145 const struct ldb_message_element *in,
2146 TALLOC_CTX *mem_ctx,
2147 struct drsuapi_DsReplicaAttribute *out)
2149 return dsdb_syntax_DN_BINARY_ldb_to_drsuapi(ctx,
2156 static WERROR dsdb_syntax_DN_STRING_validate_ldb(const struct dsdb_syntax_ctx *ctx,
2157 const struct dsdb_attribute *attr,
2158 const struct ldb_message_element *in)
2162 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2166 for (i=0; i < in->num_values; i++) {
2168 struct dsdb_dn *dsdb_dn;
2169 TALLOC_CTX *tmp_ctx = talloc_new(ctx->ldb);
2170 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
2172 status = dsdb_syntax_DN_validate_one_val(ctx,
2176 if (!W_ERROR_IS_OK(status)) {
2177 talloc_free(tmp_ctx);
2181 if (dsdb_dn->dn_format != DSDB_STRING_DN) {
2182 talloc_free(tmp_ctx);
2183 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
2186 status = dsdb_syntax_UNICODE_validate_one_val(ctx,
2188 &dsdb_dn->extra_part);
2189 if (!W_ERROR_IS_OK(status)) {
2190 talloc_free(tmp_ctx);
2194 talloc_free(tmp_ctx);
2200 static WERROR dsdb_syntax_PRESENTATION_ADDRESS_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
2201 const struct dsdb_attribute *attr,
2202 const struct drsuapi_DsReplicaAttribute *in,
2203 TALLOC_CTX *mem_ctx,
2204 struct ldb_message_element *out)
2209 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
2210 W_ERROR_HAVE_NO_MEMORY(out->name);
2212 out->num_values = in->value_ctr.num_values;
2213 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
2214 W_ERROR_HAVE_NO_MEMORY(out->values);
2216 for (i=0; i < out->num_values; i++) {
2220 if (in->value_ctr.values[i].blob == NULL) {
2224 if (in->value_ctr.values[i].blob->length < 4) {
2228 len = IVAL(in->value_ctr.values[i].blob->data, 0);
2230 if (len != in->value_ctr.values[i].blob->length) {
2234 if (!convert_string_talloc(out->values, CH_UTF16, CH_UNIX,
2235 in->value_ctr.values[i].blob->data+4,
2236 in->value_ctr.values[i].blob->length-4,
2237 (void **)&str, NULL, false)) {
2241 out->values[i] = data_blob_string_const(str);
2247 static WERROR dsdb_syntax_PRESENTATION_ADDRESS_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
2248 const struct dsdb_attribute *attr,
2249 const struct ldb_message_element *in,
2250 TALLOC_CTX *mem_ctx,
2251 struct drsuapi_DsReplicaAttribute *out)
2256 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2260 out->attid = dsdb_attribute_get_attid(attr,
2262 out->value_ctr.num_values = in->num_values;
2263 out->value_ctr.values = talloc_array(mem_ctx,
2264 struct drsuapi_DsAttributeValue,
2266 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
2268 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
2269 W_ERROR_HAVE_NO_MEMORY(blobs);
2271 for (i=0; i < in->num_values; i++) {
2275 out->value_ctr.values[i].blob = &blobs[i];
2277 if (!convert_string_talloc(blobs, CH_UNIX, CH_UTF16,
2279 in->values[i].length,
2280 (void **)&data, &ret, false)) {
2284 blobs[i] = data_blob_talloc(blobs, NULL, 4 + ret);
2285 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
2287 SIVAL(blobs[i].data, 0, 4 + ret);
2290 memcpy(blobs[i].data + 4, data, ret);
2298 static WERROR dsdb_syntax_PRESENTATION_ADDRESS_validate_ldb(const struct dsdb_syntax_ctx *ctx,
2299 const struct dsdb_attribute *attr,
2300 const struct ldb_message_element *in)
2302 return dsdb_syntax_UNICODE_validate_ldb(ctx,
2307 #define OMOBJECTCLASS(val) { .length = sizeof(val) - 1, .data = discard_const_p(uint8_t, val) }
2309 static const struct dsdb_syntax dsdb_syntaxes[] = {
2312 .ldap_oid = LDB_SYNTAX_BOOLEAN,
2314 .attributeSyntax_oid = "2.5.5.8",
2315 .drsuapi_to_ldb = dsdb_syntax_BOOL_drsuapi_to_ldb,
2316 .ldb_to_drsuapi = dsdb_syntax_BOOL_ldb_to_drsuapi,
2317 .validate_ldb = dsdb_syntax_BOOL_validate_ldb,
2318 .equality = "booleanMatch",
2319 .comment = "Boolean"
2322 .ldap_oid = LDB_SYNTAX_INTEGER,
2324 .attributeSyntax_oid = "2.5.5.9",
2325 .drsuapi_to_ldb = dsdb_syntax_INT32_drsuapi_to_ldb,
2326 .ldb_to_drsuapi = dsdb_syntax_INT32_ldb_to_drsuapi,
2327 .validate_ldb = dsdb_syntax_INT32_validate_ldb,
2328 .equality = "integerMatch",
2329 .comment = "Integer",
2330 .ldb_syntax = LDB_SYNTAX_SAMBA_INT32
2332 .name = "String(Octet)",
2333 .ldap_oid = LDB_SYNTAX_OCTET_STRING,
2335 .attributeSyntax_oid = "2.5.5.10",
2336 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2337 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2338 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2339 .equality = "octetStringMatch",
2340 .comment = "Octet String",
2342 .name = "String(Sid)",
2343 .ldap_oid = LDB_SYNTAX_OCTET_STRING,
2345 .attributeSyntax_oid = "2.5.5.17",
2346 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2347 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2348 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2349 .equality = "octetStringMatch",
2350 .comment = "Octet String - Security Identifier (SID)",
2351 .ldb_syntax = LDB_SYNTAX_SAMBA_SID
2353 .name = "String(Object-Identifier)",
2354 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.38",
2356 .attributeSyntax_oid = "2.5.5.2",
2357 .drsuapi_to_ldb = dsdb_syntax_OID_drsuapi_to_ldb,
2358 .ldb_to_drsuapi = dsdb_syntax_OID_ldb_to_drsuapi,
2359 .validate_ldb = dsdb_syntax_OID_validate_ldb,
2360 .equality = "caseIgnoreMatch", /* Would use "objectIdentifierMatch" but most are ldap attribute/class names */
2361 .comment = "OID String",
2362 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING
2364 .name = "Enumeration",
2365 .ldap_oid = LDB_SYNTAX_INTEGER,
2367 .attributeSyntax_oid = "2.5.5.9",
2368 .drsuapi_to_ldb = dsdb_syntax_INT32_drsuapi_to_ldb,
2369 .ldb_to_drsuapi = dsdb_syntax_INT32_ldb_to_drsuapi,
2370 .validate_ldb = dsdb_syntax_INT32_validate_ldb,
2371 .ldb_syntax = LDB_SYNTAX_SAMBA_INT32
2373 /* not used in w2k3 forest */
2374 .name = "String(Numeric)",
2375 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.36",
2377 .attributeSyntax_oid = "2.5.5.6",
2378 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2379 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2380 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2381 .equality = "numericStringMatch",
2382 .substring = "numericStringSubstringsMatch",
2383 .comment = "Numeric String",
2384 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2386 .name = "String(Printable)",
2387 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.44",
2389 .attributeSyntax_oid = "2.5.5.5",
2390 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2391 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2392 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2393 .ldb_syntax = LDB_SYNTAX_OCTET_STRING,
2395 .name = "String(Teletex)",
2396 .ldap_oid = "1.2.840.113556.1.4.905",
2398 .attributeSyntax_oid = "2.5.5.4",
2399 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2400 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2401 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2402 .equality = "caseIgnoreMatch",
2403 .substring = "caseIgnoreSubstringsMatch",
2404 .comment = "Case Insensitive String",
2405 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2407 .name = "String(IA5)",
2408 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.26",
2410 .attributeSyntax_oid = "2.5.5.5",
2411 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2412 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2413 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2414 .equality = "caseExactIA5Match",
2415 .comment = "Printable String",
2416 .ldb_syntax = LDB_SYNTAX_OCTET_STRING,
2418 .name = "String(UTC-Time)",
2419 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.53",
2421 .attributeSyntax_oid = "2.5.5.11",
2422 .drsuapi_to_ldb = dsdb_syntax_NTTIME_UTC_drsuapi_to_ldb,
2423 .ldb_to_drsuapi = dsdb_syntax_NTTIME_UTC_ldb_to_drsuapi,
2424 .validate_ldb = dsdb_syntax_NTTIME_UTC_validate_ldb,
2425 .equality = "generalizedTimeMatch",
2426 .comment = "UTC Time",
2428 .name = "String(Generalized-Time)",
2429 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.24",
2431 .attributeSyntax_oid = "2.5.5.11",
2432 .drsuapi_to_ldb = dsdb_syntax_NTTIME_drsuapi_to_ldb,
2433 .ldb_to_drsuapi = dsdb_syntax_NTTIME_ldb_to_drsuapi,
2434 .validate_ldb = dsdb_syntax_NTTIME_validate_ldb,
2435 .equality = "generalizedTimeMatch",
2436 .comment = "Generalized Time",
2437 .ldb_syntax = LDB_SYNTAX_UTC_TIME,
2439 /* not used in w2k3 schema */
2440 .name = "String(Case Sensitive)",
2441 .ldap_oid = "1.2.840.113556.1.4.1362",
2443 .attributeSyntax_oid = "2.5.5.3",
2444 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2445 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2446 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2447 .equality = "caseExactMatch",
2448 .substring = "caseExactSubstringsMatch",
2449 /* TODO (kim): according to LDAP rfc we should be using same comparison
2450 * as Directory String (LDB_SYNTAX_DIRECTORY_STRING), but case sensitive.
2451 * But according to ms docs binary compare should do the job:
2452 * http://msdn.microsoft.com/en-us/library/cc223200(v=PROT.10).aspx */
2453 .ldb_syntax = LDB_SYNTAX_OCTET_STRING,
2455 .name = "String(Unicode)",
2456 .ldap_oid = LDB_SYNTAX_DIRECTORY_STRING,
2458 .attributeSyntax_oid = "2.5.5.12",
2459 .drsuapi_to_ldb = dsdb_syntax_UNICODE_drsuapi_to_ldb,
2460 .ldb_to_drsuapi = dsdb_syntax_UNICODE_ldb_to_drsuapi,
2461 .validate_ldb = dsdb_syntax_UNICODE_validate_ldb,
2462 .equality = "caseIgnoreMatch",
2463 .substring = "caseIgnoreSubstringsMatch",
2464 .comment = "Directory String",
2466 .name = "Interval/LargeInteger",
2467 .ldap_oid = "1.2.840.113556.1.4.906",
2469 .attributeSyntax_oid = "2.5.5.16",
2470 .drsuapi_to_ldb = dsdb_syntax_INT64_drsuapi_to_ldb,
2471 .ldb_to_drsuapi = dsdb_syntax_INT64_ldb_to_drsuapi,
2472 .validate_ldb = dsdb_syntax_INT64_validate_ldb,
2473 .equality = "integerMatch",
2474 .comment = "Large Integer",
2475 .ldb_syntax = LDB_SYNTAX_INTEGER,
2477 .name = "String(NT-Sec-Desc)",
2478 .ldap_oid = LDB_SYNTAX_SAMBA_SECURITY_DESCRIPTOR,
2480 .attributeSyntax_oid = "2.5.5.15",
2481 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2482 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2483 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2485 .name = "Object(DS-DN)",
2486 .ldap_oid = LDB_SYNTAX_DN,
2488 .oMObjectClass = OMOBJECTCLASS("\x2b\x0c\x02\x87\x73\x1c\x00\x85\x4a"),
2489 .attributeSyntax_oid = "2.5.5.1",
2490 .drsuapi_to_ldb = dsdb_syntax_DN_drsuapi_to_ldb,
2491 .ldb_to_drsuapi = dsdb_syntax_DN_ldb_to_drsuapi,
2492 .validate_ldb = dsdb_syntax_DN_validate_ldb,
2493 .equality = "distinguishedNameMatch",
2494 .comment = "Object(DS-DN) == a DN",
2496 .name = "Object(DN-Binary)",
2497 .ldap_oid = DSDB_SYNTAX_BINARY_DN,
2499 .oMObjectClass = OMOBJECTCLASS("\x2a\x86\x48\x86\xf7\x14\x01\x01\x01\x0b"),
2500 .attributeSyntax_oid = "2.5.5.7",
2501 .drsuapi_to_ldb = dsdb_syntax_DN_BINARY_drsuapi_to_ldb,
2502 .ldb_to_drsuapi = dsdb_syntax_DN_BINARY_ldb_to_drsuapi,
2503 .validate_ldb = dsdb_syntax_DN_BINARY_validate_ldb,
2504 .equality = "octetStringMatch",
2505 .comment = "OctetString: Binary+DN",
2507 /* not used in w2k3 schema, but used in Exchange schema*/
2508 .name = "Object(OR-Name)",
2509 .ldap_oid = DSDB_SYNTAX_OR_NAME,
2511 .oMObjectClass = OMOBJECTCLASS("\x56\x06\x01\x02\x05\x0b\x1D"),
2512 .attributeSyntax_oid = "2.5.5.7",
2513 .drsuapi_to_ldb = dsdb_syntax_DN_BINARY_drsuapi_to_ldb,
2514 .ldb_to_drsuapi = dsdb_syntax_DN_BINARY_ldb_to_drsuapi,
2515 .validate_ldb = dsdb_syntax_DN_BINARY_validate_ldb,
2516 .equality = "caseIgnoreMatch",
2517 .ldb_syntax = LDB_SYNTAX_DN,
2520 * TODO: verify if DATA_BLOB is correct here...!
2522 * repsFrom and repsTo are the only attributes using
2523 * this attribute syntax, but they're not replicated...
2525 .name = "Object(Replica-Link)",
2526 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.40",
2528 .oMObjectClass = OMOBJECTCLASS("\x2a\x86\x48\x86\xf7\x14\x01\x01\x01\x06"),
2529 .attributeSyntax_oid = "2.5.5.10",
2530 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2531 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2532 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2534 .name = "Object(Presentation-Address)",
2535 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.43",
2537 .oMObjectClass = OMOBJECTCLASS("\x2b\x0c\x02\x87\x73\x1c\x00\x85\x5c"),
2538 .attributeSyntax_oid = "2.5.5.13",
2539 .drsuapi_to_ldb = dsdb_syntax_PRESENTATION_ADDRESS_drsuapi_to_ldb,
2540 .ldb_to_drsuapi = dsdb_syntax_PRESENTATION_ADDRESS_ldb_to_drsuapi,
2541 .validate_ldb = dsdb_syntax_PRESENTATION_ADDRESS_validate_ldb,
2542 .comment = "Presentation Address",
2543 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2545 /* not used in w2k3 schema */
2546 .name = "Object(Access-Point)",
2547 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.2",
2549 .oMObjectClass = OMOBJECTCLASS("\x2b\x0c\x02\x87\x73\x1c\x00\x85\x3e"),
2550 .attributeSyntax_oid = "2.5.5.14",
2551 .drsuapi_to_ldb = dsdb_syntax_FOOBAR_drsuapi_to_ldb,
2552 .ldb_to_drsuapi = dsdb_syntax_FOOBAR_ldb_to_drsuapi,
2553 .validate_ldb = dsdb_syntax_FOOBAR_validate_ldb,
2554 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2556 /* not used in w2k3 schema */
2557 .name = "Object(DN-String)",
2558 .ldap_oid = DSDB_SYNTAX_STRING_DN,
2560 .oMObjectClass = OMOBJECTCLASS("\x2a\x86\x48\x86\xf7\x14\x01\x01\x01\x0c"),
2561 .attributeSyntax_oid = "2.5.5.14",
2562 .drsuapi_to_ldb = dsdb_syntax_DN_STRING_drsuapi_to_ldb,
2563 .ldb_to_drsuapi = dsdb_syntax_DN_STRING_ldb_to_drsuapi,
2564 .validate_ldb = dsdb_syntax_DN_STRING_validate_ldb,
2565 .equality = "octetStringMatch",
2566 .comment = "OctetString: String+DN",
2570 const struct dsdb_syntax *find_syntax_map_by_ad_oid(const char *ad_oid)
2573 for (i=0; dsdb_syntaxes[i].ldap_oid; i++) {
2574 if (strcasecmp(ad_oid, dsdb_syntaxes[i].attributeSyntax_oid) == 0) {
2575 return &dsdb_syntaxes[i];
2581 const struct dsdb_syntax *find_syntax_map_by_ad_syntax(int oMSyntax)
2584 for (i=0; dsdb_syntaxes[i].ldap_oid; i++) {
2585 if (oMSyntax == dsdb_syntaxes[i].oMSyntax) {
2586 return &dsdb_syntaxes[i];
2592 const struct dsdb_syntax *find_syntax_map_by_standard_oid(const char *standard_oid)
2595 for (i=0; dsdb_syntaxes[i].ldap_oid; i++) {
2596 if (strcasecmp(standard_oid, dsdb_syntaxes[i].ldap_oid) == 0) {
2597 return &dsdb_syntaxes[i];
2603 const struct dsdb_syntax *dsdb_syntax_for_attribute(const struct dsdb_attribute *attr)
2607 for (i=0; i < ARRAY_SIZE(dsdb_syntaxes); i++) {
2608 if (attr->oMSyntax != dsdb_syntaxes[i].oMSyntax) continue;
2610 if (attr->oMObjectClass.length != dsdb_syntaxes[i].oMObjectClass.length) continue;
2612 if (attr->oMObjectClass.length) {
2614 ret = memcmp(attr->oMObjectClass.data,
2615 dsdb_syntaxes[i].oMObjectClass.data,
2616 attr->oMObjectClass.length);
2617 if (ret != 0) continue;
2620 if (strcmp(attr->attributeSyntax_oid, dsdb_syntaxes[i].attributeSyntax_oid) != 0) continue;
2622 return &dsdb_syntaxes[i];
2628 WERROR dsdb_attribute_drsuapi_to_ldb(struct ldb_context *ldb,
2629 const struct dsdb_schema *schema,
2630 const struct dsdb_schema_prefixmap *pfm_remote,
2631 const struct drsuapi_DsReplicaAttribute *in,
2632 TALLOC_CTX *mem_ctx,
2633 struct ldb_message_element *out)
2635 const struct dsdb_attribute *sa;
2636 struct dsdb_syntax_ctx syntax_ctx;
2638 sa = dsdb_attribute_by_attributeID_id(schema, in->attid);
2640 DEBUG(1,(__location__ ": Unknown attributeID_id 0x%08X\n", in->attid));
2644 /* use default syntax conversion context */
2645 dsdb_syntax_ctx_init(&syntax_ctx, ldb, schema);
2646 syntax_ctx.pfm_remote = pfm_remote;
2648 return sa->syntax->drsuapi_to_ldb(&syntax_ctx, sa, in, mem_ctx, out);
2651 WERROR dsdb_attribute_ldb_to_drsuapi(struct ldb_context *ldb,
2652 const struct dsdb_schema *schema,
2653 const struct ldb_message_element *in,
2654 TALLOC_CTX *mem_ctx,
2655 struct drsuapi_DsReplicaAttribute *out)
2657 const struct dsdb_attribute *sa;
2658 struct dsdb_syntax_ctx syntax_ctx;
2660 sa = dsdb_attribute_by_lDAPDisplayName(schema, in->name);
2665 /* use default syntax conversion context */
2666 dsdb_syntax_ctx_init(&syntax_ctx, ldb, schema);
2668 return sa->syntax->ldb_to_drsuapi(&syntax_ctx, sa, in, mem_ctx, out);