Changes from APPLIANCE_HEAD:
[ira/wip.git] / source3 / passdb / ldap.c
index f0848c2d57f82c3aaad5b2405469dba57a34c732..54566e454b93c256b476b8c57ef640e6f1eb78a0 100644 (file)
    
 */
 
-#ifdef USE_LDAP
+#ifdef WITH_LDAP
 
 #include "includes.h"
 
+#include <lber.h>
+#include <ldap.h>
+
+#define ADD_USER 1
+#define MODIFY_USER 2
+
 extern int DEBUGLEVEL;
 
 /*******************************************************************
  open a connection to the ldap serve.
 ******************************************************************/    
-BOOL ldap_open_connection(LDAP **ldap_struct)
+static BOOL ldap_open_connection(LDAP **ldap_struct)
 {
-       if ( (*ldap_struct = ldap_open(lp_ldap_server(),lp_ldap_port()) )== NULL)
+       if ( (*ldap_struct = ldap_open(lp_ldap_server(),lp_ldap_port()) ) == NULL)
        {
-               DEBUG(0,("%s: The LDAP server is not responding !\n",timestring()));
-               return(False);
+               DEBUG( 0, ( "The LDAP server is not responding !\n" ) );
+               return( False );
        }
        DEBUG(2,("ldap_open_connection: connection opened\n"));
        return (True);
@@ -47,9 +53,9 @@ BOOL ldap_open_connection(LDAP **ldap_struct)
 ******************************************************************/    
 static BOOL ldap_connect_anonymous(LDAP *ldap_struct)
 {
-       if ( ldap_simple_bind_s(ldap_struct,lp_ldap_root(),lp_ldap_rootpasswd()) != LDAP_SUCCESS)
+       if ( ldap_simple_bind_s(ldap_struct,lp_ldap_root(),lp_ldap_rootpasswd()) ! = LDAP_SUCCESS)
        {
-               DEBUG(0,("%s: Couldn't bind to the LDAP server !\n", timestring() ));
+               DEBUG( 0, ( "Couldn't bind to the LDAP server !\n" ) );
                return(False);
        }
        return (True);
@@ -59,14 +65,14 @@ static BOOL ldap_connect_anonymous(LDAP *ldap_struct)
 /*******************************************************************
  connect to the ldap server under system privileg.
 ******************************************************************/    
-BOOL ldap_connect_system(LDAP *ldap_struct)
+static BOOL ldap_connect_system(LDAP *ldap_struct)
 {
-       if ( ldap_simple_bind_s(ldap_struct,lp_ldap_root(),lp_ldap_rootpasswd()) != LDAP_SUCCESS)
+       if ( ldap_simple_bind_s(ldap_struct,lp_ldap_root(),lp_ldap_rootpasswd()) ! = LDAP_SUCCESS)
        {
-               DEBUG(0,("%s: Couldn't bind to the LDAP server !\n", timestring() ));
+               DEBUG( 0, ( "Couldn't bind to the LDAP server!\n" ) );
                return(False);
        }
-       DEBUG(2,("ldap_connect_system: succesfull connection to the LDAP server\n"));
+       DEBUG(2,("ldap_connect_system: succesful connection to the LDAP server\n"));
        return (True);
 }
 
@@ -75,12 +81,12 @@ BOOL ldap_connect_system(LDAP *ldap_struct)
 ******************************************************************/    
 static BOOL ldap_connect_user(LDAP *ldap_struct, char *user, char *password)
 {
-       if ( ldap_simple_bind_s(ldap_struct,lp_ldap_root(),lp_ldap_rootpasswd()) != LDAP_SUCCESS)
+       if ( ldap_simple_bind_s(ldap_struct,lp_ldap_root(),lp_ldap_rootpasswd()) ! = LDAP_SUCCESS)
        {
-               DEBUG(0,("%s: Couldn't bind to the LDAP server !\n", timestring() ));
+               DEBUG( 0, ( "Couldn't bind to the LDAP server !\n" ) );
                return(False);
        }
-       DEBUG(2,("ldap_connect_user: succesfull connection to the LDAP server\n"));
+       DEBUG(2,("ldap_connect_user: succesful connection to the LDAP server\n"));
        return (True);
 }
 
@@ -94,11 +100,11 @@ static BOOL ldap_search_one_user(LDAP *ldap_struct, char *filter, LDAPMessage **
                
        DEBUG(2,("ldap_search_one_user: searching for:[%s]\n", filter));
                
-       rc=ldap_search_s(ldap_struct, lp_ldap_suffix(), scope, filter, NULL, 0, result);
+       rc = ldap_search_s(ldap_struct, lp_ldap_suffix(), scope, filter, NULL, 0, result);
 
-       if (rc != LDAP_SUCCESS )
+       if (rc ! = LDAP_SUCCESS )
        {
-               DEBUG(0,("%s: Problem during the LDAP search\n",timestring()));
+               DEBUG( 0, ( "Problem during the LDAP search\n" ) );
                return(False);
        }
        return (True);
@@ -107,7 +113,7 @@ static BOOL ldap_search_one_user(LDAP *ldap_struct, char *filter, LDAPMessage **
 /*******************************************************************
  run the search by name.
 ******************************************************************/    
-BOOL ldap_search_one_user_by_name(LDAP *ldap_struct, char *user, LDAPMessage **result)
+static BOOL ldap_search_one_user_by_name(LDAP *ldap_struct, char *user, LDAPMessage **result)
 {      
        pstring filter;
        /*
@@ -115,7 +121,7 @@ BOOL ldap_search_one_user_by_name(LDAP *ldap_struct, char *user, LDAPMessage **r
           so in ldap filter, %u MUST exist :-)
        */      
        pstrcpy(filter,lp_ldap_filter());
-       string_sub(filter,"%u",user);
+       pstring_sub(filter,"%u",user);
        
        if ( !ldap_search_one_user(ldap_struct, filter, result) )
        {
@@ -127,14 +133,11 @@ BOOL ldap_search_one_user_by_name(LDAP *ldap_struct, char *user, LDAPMessage **r
 /*******************************************************************
  run the search by uid.
 ******************************************************************/    
-BOOL ldap_search_one_user_by_uid(LDAP *ldap_struct, int uid, LDAPMessage **result)
+static BOOL ldap_search_one_user_by_uid(LDAP *ldap_struct, int uid, LDAPMessage **result)
 {      
        pstring filter;
-       /*
-          in the filter expression, replace %u with the real name
-          so in ldap filter, %u MUST exist :-)
-       */
-       snprintf(filter, sizeof(pstring), "uidAccount=%d", uid);
+       
+       slprintf(filter, sizeof(pstring)-1, "uidAccount = %d", uid);
        
        if ( !ldap_search_one_user(ldap_struct, filter, result) )
        {       
@@ -146,38 +149,38 @@ BOOL ldap_search_one_user_by_uid(LDAP *ldap_struct, int uid, LDAPMessage **resul
 /*******************************************************************
  search an attribute and return the first value found.
 ******************************************************************/
-void get_single_attribute(LDAP *ldap_struct, LDAPMessage *entry, char *attribute, char *value)
+static void get_single_attribute(LDAP *ldap_struct, LDAPMessage *entry, char *attribute, char *value)
 {
        char **valeurs;
        
-       if ( (valeurs=ldap_get_values(ldap_struct, entry, attribute)) != NULL) 
+       if ( (valeurs = ldap_get_values(ldap_struct, entry, attribute)) ! = NULL) 
        {
                pstrcpy(value, valeurs[0]);
                ldap_value_free(valeurs);
-               DEBUG(3,("get_single_attribute: [%s]=[%s]\n", attribute, value));       
+               DEBUG(3,("get_single_attribute: [%s] = [%s]\n", attribute, value));     
        }
        else
        {
-               value=NULL;
+               value = NULL;
        }
 }
 
 /*******************************************************************
  check if the returned entry is a sambaAccount objectclass.
 ******************************************************************/    
-BOOL ldap_check_user(LDAP *ldap_struct, LDAPMessage *entry)
+static BOOL ldap_check_user(LDAP *ldap_struct, LDAPMessage *entry)
 {
-       BOOL sambaAccount=False;
+       BOOL sambaAccount = False;
        char **valeur;
        int i;
 
        DEBUG(2,("ldap_check_user: "));
-       valeur=ldap_get_values(ldap_struct, entry, "objectclass");
-       if (valeur!=NULL)
+       valeur = ldap_get_values(ldap_struct, entry, "objectclass");
+       if (valeur! = NULL)
        {
-               for (i=0;valeur[i]!=NULL;i++)
+               for (i = 0;valeur[i]! = NULL;i++)
                {
-                       if (!strcmp(valeur[i],"sambaAccount")) sambaAccount=True;
+                       if (!strcmp(valeur[i],"sambaAccount")) sambaAccount = True;
                }
        }
        DEBUG(2,("%s\n",sambaAccount?"yes":"no"));
@@ -186,26 +189,26 @@ BOOL ldap_check_user(LDAP *ldap_struct, LDAPMessage *entry)
 }
 
 /*******************************************************************
- check if the returned entry is a sambaMachine objectclass.
+ check if the returned entry is a sambaTrust objectclass.
 ******************************************************************/    
-BOOL ldap_check_trust(LDAP *ldap_struct, LDAPMessage *entry)
+static BOOL ldap_check_trust(LDAP *ldap_struct, LDAPMessage *entry)
 {
-       BOOL sambaMachine=False;
+       BOOL sambaTrust = False;
        char **valeur;
        int i;
        
        DEBUG(2,("ldap_check_trust: "));
-       valeur=ldap_get_values(ldap_struct, entry, "objectclass");
-       if (valeur!=NULL)
+       valeur = ldap_get_values(ldap_struct, entry, "objectclass");
+       if (valeur! = NULL)
        {
-               for (i=0;valeur[i]!=NULL;i++)
+               for (i = 0;valeur[i]! = NULL;i++)
                {
-                       if (!strcmp(valeur[i],"sambaMachine")) sambaMachine=True;
+                       if (!strcmp(valeur[i],"sambaTrust")) sambaTrust = True;
                }
        }       
-       DEBUG(2,("%s\n",sambaMachine?"yes":"no"));
+       DEBUG(2,("%s\n",sambaTrust?"yes":"no"));
        ldap_value_free(valeur);        
-       return (sambaMachine);
+       return (sambaTrust);
 }
 
 /*******************************************************************
@@ -220,11 +223,10 @@ static void ldap_get_smb_passwd(LDAP *ldap_struct,LDAPMessage *entry,
        static unsigned char smblmpwd[16];
        static unsigned char smbntpwd[16];
 
-       user->smb_name = NULL;
-       user->smb_passwd = NULL;
-       user->smb_nt_passwd = NULL;
-       user->smb_userid = 0;
-       user->pass_last_set_time    = (time_t)-1;
+       pdb_init_smb(user);
+
+       memset((char *)smblmpwd, '\0', sizeof(smblmpwd));
+       memset((char *)smbntpwd, '\0', sizeof(smbntpwd));
 
        get_single_attribute(ldap_struct, entry, "cn", user_name);
        DEBUG(2,("ldap_get_smb_passwd: user: %s\n",user_name));
@@ -232,18 +234,19 @@ static void ldap_get_smb_passwd(LDAP *ldap_struct,LDAPMessage *entry,
 #ifdef LDAP_PLAINTEXT_PASSWORD
        get_single_attribute(ldap_struct, entry, "userPassword", temp);
        nt_lm_owf_gen(temp, user->smb_nt_passwd, user->smb_passwd);
-       bzero(temp, sizeof(temp)); /* destroy local copy of the password */
+       memset((char *)temp, '\0', sizeof(temp)); /* destroy local copy of the password */
 #else
-       get_single_attribute(ldap_struct, entry, "ntPasswordHash", temp);
-       gethexpwd(temp, user->smb_nt_passwd);           
+       get_single_attribute(ldap_struct, entry, "unicodePwd", temp);
+       pdb_gethexpwd(temp, smbntpwd);          
+       memset((char *)temp, '\0', sizeof(temp)); /* destroy local copy of the password */
 
-       get_single_attribute(ldap_struct, entry, "lmPasswordHash", temp);
-       gethexpwd(temp, user->smb_passwd);              
-       bzero(temp, sizeof(temp)); /* destroy local copy of the password */
+       get_single_attribute(ldap_struct, entry, "dBCSPwd", temp);
+       pdb_gethexpwd(temp, smblmpwd);          
+       memset((char *)temp, '\0', sizeof(temp)); /* destroy local copy of the password */
 #endif
-                       
+       
        get_single_attribute(ldap_struct, entry, "userAccountControl", temp);
-       user->acct_ctrl=decode_acct_ctrl(temp);
+       user->acct_ctrl = pdb_decode_acct_ctrl(temp);
 
        get_single_attribute(ldap_struct, entry, "pwdLastSet", temp);
        user->pass_last_set_time = (time_t)strtol(temp, NULL, 16);
@@ -251,7 +254,7 @@ static void ldap_get_smb_passwd(LDAP *ldap_struct,LDAPMessage *entry,
        get_single_attribute(ldap_struct, entry, "rid", temp);
 
        /* the smb (unix) ids are not stored: they are created */
-       user->smb_userid = user_rid_to_uid (atoi(temp));
+       user->smb_userid = pdb_user_rid_to_uid (atoi(temp));
 
        if (user->acct_ctrl & (ACB_DOMTRUST|ACB_WSTRUST|ACB_SVRTRUST) )
        {
@@ -285,16 +288,11 @@ static void ldap_get_sam_passwd(LDAP *ldap_struct, LDAPMessage *entry,
        static pstring temp;
        static struct smb_passwd pw_buf;
 
+       pdb_init_sam(user);
+
        ldap_get_smb_passwd(ldap_struct, entry, &pw_buf);
        
-       bzero(user, sizeof(*user));
-
-       user->logon_time            = (time_t)-1;
-       user->logoff_time           = (time_t)-1;
-       user->kickoff_time          = (time_t)-1;
        user->pass_last_set_time    = pw_buf.pass_last_set_time;
-       user->pass_can_change_time  = (time_t)-1;
-       user->pass_must_change_time = (time_t)-1;
 
        get_single_attribute(ldap_struct, entry, "logonTime", temp);
        user->pass_last_set_time = (time_t)strtol(temp, NULL, 16);
@@ -343,23 +341,23 @@ static void ldap_get_sam_passwd(LDAP *ldap_struct, LDAPMessage *entry,
        user->munged_dial = NULL; /* "munged" dial-back telephone number */
 
        get_single_attribute(ldap_struct, entry, "rid", temp);
-       user->user_rid=atoi(temp);
+       user->user_rid = atoi(temp);
 
        get_single_attribute(ldap_struct, entry, "primaryGroupID", temp);
-       user->group_rid=atoi(temp);
+       user->group_rid = atoi(temp);
 
        /* the smb (unix) ids are not stored: they are created */
        user->smb_userid = pw_buf.smb_userid;
-       user->smb_grpid  = group_rid_to_uid(user->group_rid);
+       user->smb_grpid = group_rid_to_uid(user->group_rid);
 
        user->acct_ctrl = pw_buf.acct_ctrl;
 
-       user->unknown_3  = 0xffffff; /* don't know */
+       user->unknown_3 = 0xffffff; /* don't know */
        user->logon_divs = 168; /* hours per week */
-       user->hours_len  = 21; /* 21 times 8 bits = 168 */
+       user->hours_len = 21; /* 21 times 8 bits = 168 */
        memset(user->hours, 0xff, user->hours_len); /* available at all hours */
-       user->unknown_5  = 0x00020000; /* don't know */
-       user->unknown_5  = 0x000004ec; /* don't know */
+       user->unknown_5 = 0x00020000; /* don't know */
+       user->unknown_5 = 0x000004ec; /* don't know */
 
        if (user->acct_ctrl & (ACB_DOMTRUST|ACB_WSTRUST|ACB_SVRTRUST) )
        {
@@ -373,16 +371,383 @@ static void ldap_get_sam_passwd(LDAP *ldap_struct, LDAPMessage *entry,
        }
 }
 
+/************************************************************************
+ Routine to manage the LDAPMod structure array
+ manage memory used by the array, by each struct, and values
+
+************************************************************************/
+static void make_a_mod(LDAPMod ***modlist,int modop, char *attribute, char *value)
+{
+       LDAPMod **mods;
+       int i;
+       int j;
+       
+       mods = *modlist;
+       
+       if (mods == NULL)
+       {
+               mods = (LDAPMod **)malloc( sizeof(LDAPMod *) );
+               if (mods == NULL)
+               {
+                       DEBUG(0,("make_a_mod: out of memory!\n"));
+                       return;
+               }
+               mods[0] = NULL;
+       }
+       
+       for ( i = 0; mods[ i ] ! = NULL; ++i )
+       {
+               if ( mods[ i ]->mod_op == modop && 
+                   !strcasecmp( mods[ i ]->mod_type, attribute ) )
+               {
+                       break;
+               }
+       }
+       
+       if (mods[i] == NULL)
+       {
+               mods = (LDAPMod **)realloc( mods,  (i+2) * sizeof( LDAPMod * ) );       
+               if (mods == NULL)
+               {
+                       DEBUG(0,("make_a_mod: out of memory!\n"));
+                       return;
+               }
+               mods[i] = (LDAPMod *)malloc( sizeof( LDAPMod ) );
+               if (mods[i] == NULL)
+               {
+                       DEBUG(0,("make_a_mod: out of memory!\n"));
+                       return;
+               }
+               mods[i]->mod_op = modop;
+               mods[i]->mod_values = NULL;
+               mods[i]->mod_type = strdup( attribute );
+               mods[i+1] = NULL;
+       }
+
+       if (value ! = NULL )
+       {
+               j = 0;
+               if ( mods[ i ]->mod_values ! = NULL )
+               {
+                       for ( ; mods[ i ]->mod_values[ j ] ! = NULL; j++ );
+               }
+               mods[ i ]->mod_values = (char **)realloc(mods[ i ]->mod_values,
+                                                         (j+2) * sizeof( char * ));
+               if ( mods[ i ]->mod_values == NULL)
+               {
+                       DEBUG(0, "make_a_mod: Memory allocation failure!\n");
+                       return;
+               }
+               mods[ i ]->mod_values[ j ] = strdup(value);     
+               mods[ i ]->mod_values[ j + 1 ] = NULL;          
+       }
+       *modlist = mods;
+}
+
+/************************************************************************
+ Add or modify an entry. Only the smb struct values
+
+*************************************************************************/
+static BOOL modadd_ldappwd_entry(struct smb_passwd *newpwd, int flag)
+{
+       
+       /* assume the struct is correct and filled
+          that's the job of passdb.c to check */
+       int scope = LDAP_SCOPE_ONELEVEL;
+       int rc;
+       char *smb_name;
+       int trust = False;
+       int ldap_state;
+       pstring filter;
+       pstring dn;
+       pstring lmhash;
+       pstring nthash;
+       pstring rid;
+       pstring lst;
+       pstring temp;
+
+       LDAP *ldap_struct;
+       LDAPMessage *result;
+       LDAPMod **mods;
+       
+       smb_name = newpwd->smb_name;
+
+       if (!ldap_open_connection(&ldap_struct)) /* open a connection to the server */
+       {
+               return False;
+       }
+
+       if (!ldap_connect_system(ldap_struct)) /* connect as system account */
+       {
+               ldap_unbind(ldap_struct);
+               return False;
+       }
+       
+       if (smb_name[strlen(smb_name)-1] == '$' )
+       {
+               smb_name[strlen(smb_name)-1] = '\0';
+               trust = True;
+       }
+
+       slprintf(filter, sizeof(filter)-1,
+                "(&(cn = %s)(|(objectclass = sambaTrust)(objectclass = sambaAccount)))",
+                smb_name);
+       
+       rc = ldap_search_s(ldap_struct, lp_ldap_suffix(), scope, filter, NULL, 0, &result);
+
+       switch (flag)
+       {
+               case ADD_USER:
+               {
+                       if (ldap_count_entries(ldap_struct, result) ! = 0)
+                       {
+                               DEBUG(0,("User already in the base, with samba properties\n"));         
+                               ldap_unbind(ldap_struct);
+                               return False;
+                       }
+                       ldap_state = LDAP_MOD_ADD;
+                       break;
+               }
+               case MODIFY_USER:
+               {
+                       if (ldap_count_entries(ldap_struct, result) ! = 1)
+                       {
+                               DEBUG(0,("No user to modify !\n"));             
+                               ldap_unbind(ldap_struct);
+                               return False;
+                       }
+                       ldap_state = LDAP_MOD_REPLACE;
+                       break;
+               }
+               default:
+               {
+                       DEBUG(0,("How did you come here? \n"));         
+                       ldap_unbind(ldap_struct);
+                       return False;
+                       break;
+               }
+       }
+       slprintf(dn, sizeof(dn)-1, "cn = %s, %s",smb_name, lp_ldap_suffix() );
+
+       if (newpwd->smb_passwd ! = NULL)
+       {
+               int i;
+               for( i = 0; i < 16; i++)
+               {
+                       slprintf(&temp[2*i], sizeof(temp) - 1, "%02X", newpwd->smb_passwd[i]);
+               }
+       
+       }
+       else
+       {
+               if (newpwd->acct_ctrl & ACB_PWNOTREQ)
+               {
+                       slprintf(temp, sizeof(temp) - 1, "NO PASSWORDXXXXXXXXXXXXXXXXXXXXX");
+               }
+               else
+               {
+                       slprintf(temp, sizeof(temp) - 1, "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX");
+               }
+       }
+       slprintf(lmhash, sizeof(lmhash)-1, "%s", temp);
+
+       if (newpwd->smb_nt_passwd ! = NULL)
+       {
+               int i;
+               for( i = 0; i < 16; i++)
+               {
+                       slprintf(&temp[2*i], sizeof(temp) - 1, "%02X", newpwd->smb_nt_passwd[i]);
+               }
+       
+       }
+       else
+       {
+               if (newpwd->acct_ctrl & ACB_PWNOTREQ)
+               {
+                       slprintf(temp, sizeof(temp) - 1, "NO PASSWORDXXXXXXXXXXXXXXXXXXXXX");
+               }
+               else
+               {
+                       slprintf(temp, sizeof(temp) - 1, "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX");
+               }
+       }
+       slprintf(nthash, sizeof(nthash)-1, "%s", temp);
+
+       slprintf(rid, sizeof(rid)-1, "%d", uid_to_user_rid(newpwd->smb_userid) );
+       slprintf(lst, sizeof(lst)-1, "%08X", newpwd->pass_last_set_time);
+       
+       mods = NULL; 
+
+       if (trust)
+       {
+               make_a_mod(&mods, ldap_state, "objectclass", "sambaTrust");
+               make_a_mod(&mods, ldap_state, "netbiosTrustName", smb_name);
+               make_a_mod(&mods, ldap_state, "trustPassword", nthash);
+       }
+       else
+       {
+               make_a_mod(&mods, ldap_state, "objectclass", "sambaAccount");
+               make_a_mod(&mods, ldap_state, "dBCSPwd", lmhash);
+               make_a_mod(&mods, ldap_state, "uid", smb_name);
+               make_a_mod(&mods, ldap_state, "unicodePwd", nthash);
+       }
+       
+       make_a_mod(&mods, ldap_state, "cn", smb_name);
+       
+       make_a_mod(&mods, ldap_state, "rid", rid);
+       make_a_mod(&mods, ldap_state, "pwdLastSet", lst);
+       make_a_mod(&mods, ldap_state, "userAccountControl", pdb_encode_acct_ctrl(newpwd->acct_ctrl, NEW_PW_FORMAT_SPACE_PADDED_LEN));
+       
+       switch(flag)
+       {
+               case ADD_USER:
+               {
+                       ldap_add_s(ldap_struct, dn, mods);
+                       DEBUG(2,("modadd_ldappwd_entry: added: cn = %s in the LDAP database\n",smb_name));
+                       break;
+               }
+               case MODIFY_USER:
+               {
+                       ldap_modify_s(ldap_struct, dn, mods);
+                       DEBUG(2,("modadd_ldappwd_entry: changed: cn = %s in the LDAP database_n",smb_name));
+                       break;
+               }
+               default:
+               {
+                       DEBUG(2,("modadd_ldappwd_entry: How did you come here? \n"));           
+                       ldap_unbind(ldap_struct);
+                       return False;
+                       break;
+               }
+       }
+       
+       ldap_mods_free(mods, 1);
+       
+       ldap_unbind(ldap_struct);
+       
+       return True;
+}
+
+/************************************************************************
+ Add or modify an entry. everything except the smb struct
+
+*************************************************************************/
+static BOOL modadd_ldap21pwd_entry(struct sam_passwd *newpwd, int flag)
+{
+       
+       /* assume the struct is correct and filled
+          that's the job of passdb.c to check */
+       int scope = LDAP_SCOPE_ONELEVEL;
+       int rc;
+       char *smb_name;
+       int trust = False;
+       int ldap_state;
+       pstring filter;
+       pstring dn;
+       pstring lmhash;
+       pstring nthash;
+       pstring rid;
+       pstring lst;
+       pstring temp;
+
+       LDAP *ldap_struct;
+       LDAPMessage *result;
+       LDAPMod **mods;
+       
+       smb_name = newpwd->smb_name;
+
+       if (!ldap_open_connection(&ldap_struct)) /* open a connection to the server */
+       {
+               return False;
+       }
+
+       if (!ldap_connect_system(ldap_struct)) /* connect as system account */
+       {
+               ldap_unbind(ldap_struct);
+               return False;
+       }
+       
+       if (smb_name[strlen(smb_name)-1] == '$' )
+       {
+               smb_name[strlen(smb_name)-1] = '\0';
+               trust = True;
+       }
+
+       slprintf(filter, sizeof(filter)-1,
+                "(&(cn = %s)(|(objectclass = sambaTrust)(objectclass = sambaAccount)))",
+                smb_name);
+       
+       rc = ldap_search_s(ldap_struct, lp_ldap_suffix(), scope, filter, NULL, 0, &result);
+
+       switch (flag)
+       {
+               case ADD_USER:
+               {
+                       if (ldap_count_entries(ldap_struct, result) ! = 1)
+                       {
+                               DEBUG(2,("User already in the base, with samba properties\n"));         
+                               ldap_unbind(ldap_struct);
+                               return False;
+                       }
+                       ldap_state = LDAP_MOD_ADD;
+                       break;
+               }
+
+               case MODIFY_USER:
+               {
+                       if (ldap_count_entries(ldap_struct, result) ! = 1)
+                       {
+                               DEBUG(2,("No user to modify !\n"));             
+                               ldap_unbind(ldap_struct);
+                               return False;
+                       }
+                       ldap_state = LDAP_MOD_REPLACE;
+                       break;
+               }
+
+               default:
+               {
+                       DEBUG(2,("How did you come here? \n"));         
+                       ldap_unbind(ldap_struct);
+                       return False;
+                       break;
+               }
+       }
+       slprintf(dn, sizeof(dn)-1, "cn = %s, %s",smb_name, lp_ldap_suffix() );
+       
+       mods = NULL; 
+
+       if (trust)
+       {
+       }
+       else
+       {
+       }
+       
+       make_a_mod(&mods, ldap_state, "cn", smb_name);
+       
+       make_a_mod(&mods, ldap_state, "rid", rid);
+       make_a_mod(&mods, ldap_state, "pwdLastSet", lst);
+       make_a_mod(&mods, ldap_state, "userAccountControl", pdb_encode_acct_ctrl(newpwd->acct_ctrl,NEW_PW_FORMAT_SPACE_PADDED_LEN));
+       
+       ldap_modify_s(ldap_struct, dn, mods);
+       
+       ldap_mods_free(mods, 1);
+       
+       ldap_unbind(ldap_struct);
+       
+       return True;
+}
+
 /************************************************************************
  Routine to add an entry to the ldap passwd file.
 
  do not call this function directly.  use passdb.c instead.
 
 *************************************************************************/
-BOOL add_ldappwd_entry(struct smb_passwd *newpwd)
+static BOOL add_ldappwd_entry(struct smb_passwd *newpwd)
 {
-       DEBUG(0,("add_ldappwd_entry - currently not supported\n"));
-       return True;
+       return (modadd_ldappwd_entry(newpwd, ADD_USER) );
 }
 
 /************************************************************************
@@ -396,19 +761,39 @@ BOOL add_ldappwd_entry(struct smb_passwd *newpwd)
  do not call this function directly.  use passdb.c instead.
 
 ************************************************************************/
-BOOL mod_ldappwd_entry(struct smb_passwd* pwd, BOOL override)
+static BOOL mod_ldappwd_entry(struct smb_passwd *pwd, BOOL override)
 {
-       DEBUG(0,("mod_ldappwd_entry - currently not supported\n"));
-    return False;
+       return (modadd_ldappwd_entry(pwd, MODIFY_USER) );
 }
 
-/***************************************************************
- Start to enumerate the ldap passwd list. Returns a void pointer
- to ensure no modification outside this module.
+/************************************************************************
+ Routine to add an entry to the ldap passwd file.
 
  do not call this function directly.  use passdb.c instead.
 
- ****************************************************************/
+*************************************************************************/
+static BOOL add_ldap21pwd_entry(struct sam_passwd *newpwd)
+{      
+       return( modadd_ldappwd_entry(newpwd, ADD_USER)?
+       modadd_ldap21pwd_entry(newpwd, ADD_USER):False);
+}
+
+/************************************************************************
+ Routine to search the ldap passwd file for an entry matching the username.
+ and then modify its password entry. We can't use the startldappwent()/
+ getldappwent()/endldappwent() interfaces here as we depend on looking
+ in the actual file to decide how much room we have to write data.
+ override = False, normal
+ override = True, override XXXXXXXX'd out password or NO PASS
+
+ do not call this function directly.  use passdb.c instead.
+
+************************************************************************/
+static BOOL mod_ldap21pwd_entry(struct sam_passwd *pwd, BOOL override)
+{
+       return( modadd_ldappwd_entry(pwd, MODIFY_USER)?
+       modadd_ldap21pwd_entry(pwd, MODIFY_USER):False);
+}
 
 struct ldap_enum_info
 {
@@ -419,7 +804,14 @@ struct ldap_enum_info
 
 static struct ldap_enum_info ldap_ent;
 
-void *startldappwent(BOOL update)
+/***************************************************************
+ Start to enumerate the ldap passwd list. Returns a void pointer
+ to ensure no modification outside this module.
+
+ do not call this function directly.  use passdb.c instead.
+
+ ****************************************************************/
+static void *startldappwent(BOOL update)
 {
        int scope = LDAP_SCOPE_ONELEVEL;
        int rc;
@@ -427,32 +819,36 @@ void *startldappwent(BOOL update)
        pstring filter;
 
        if (!ldap_open_connection(&ldap_ent.ldap_struct)) /* open a connection to the server */
+       {
                return NULL;
+       }
 
        if (!ldap_connect_system(ldap_ent.ldap_struct)) /* connect as system account */
+       {
                return NULL;
+       }
 
        /* when the class is known the search is much faster */
        switch (0)
        {
                case 1:
                {
-                       pstrcpy(filter, "objectclass=sambaAccount");
+                       pstrcpy(filter, "objectclass = sambaAccount");
                        break;
                }
                case 2:
                {
-                       pstrcpy(filter, "objectclass=sambaMachine");
+                       pstrcpy(filter, "objectclass = sambaTrust");
                        break;
                }
                default:
                {
-                       pstrcpy(filter, "(|(objectclass=sambaMachine)(objectclass=sambaAccount))");
+                       pstrcpy(filter, "(|(objectclass = sambaTrust)(objectclass = sambaAccount))");
                        break;
                }
        }
 
-       rc=ldap_search_s(ldap_ent.ldap_struct, lp_ldap_suffix(), scope, filter, NULL, 0, &ldap_ent.result);
+       rc = ldap_search_s(ldap_ent.ldap_struct, lp_ldap_suffix(), scope, filter, NULL, 0, &ldap_ent.result);
 
        DEBUG(2,("%d entries in the base!\n", ldap_count_entries(ldap_ent.ldap_struct, ldap_ent.result) ));
 
@@ -467,14 +863,14 @@ void *startldappwent(BOOL update)
  do not call this function directly.  use passdb.c instead.
 
  *************************************************************************/
-struct smb_passwd *getldappwent(void *vp)
+static struct smb_passwd *getldappwent(void *vp)
 {
        static struct smb_passwd user;
        struct ldap_enum_info *ldap_vp = (struct ldap_enum_info *)vp;
 
        ldap_vp->entry = ldap_next_entry(ldap_vp->ldap_struct, ldap_vp->entry);
 
-       if (ldap_vp->entry != NULL)
+       if (ldap_vp->entry ! = NULL)
        {
                ldap_get_smb_passwd(ldap_vp->ldap_struct, ldap_vp->entry, &user);
                return &user;
@@ -488,14 +884,14 @@ struct smb_passwd *getldappwent(void *vp)
  do not call this function directly.  use passdb.c instead.
 
  *************************************************************************/
-struct sam_passwd *getldap21pwent(void *vp)
+static struct sam_passwd *getldap21pwent(void *vp)
 {
        static struct sam_passwd user;
        struct ldap_enum_info *ldap_vp = (struct ldap_enum_info *)vp;
 
        ldap_vp->entry = ldap_next_entry(ldap_vp->ldap_struct, ldap_vp->entry);
 
-       if (ldap_vp->entry != NULL)
+       if (ldap_vp->entry ! = NULL)
        {
                ldap_get_sam_passwd(ldap_vp->ldap_struct, ldap_vp->entry, &user);
                return &user;
@@ -509,7 +905,7 @@ struct sam_passwd *getldap21pwent(void *vp)
  do not call this function directly.  use passdb.c instead.
 
 ****************************************************************/
-void endldappwent(void *vp)
+static void endldappwent(void *vp)
 {
        struct ldap_enum_info *ldap_vp = (struct ldap_enum_info *)vp;
        ldap_msgfree(ldap_vp->result);
@@ -517,27 +913,118 @@ void endldappwent(void *vp)
 }
 
 /*************************************************************************
- Return the current position in the ldap passwd list as an unsigned long.
+ Return the current position in the ldap passwd list as an SMB_BIG_UINT.
  This must be treated as an opaque token.
 
  do not call this function directly.  use passdb.c instead.
 
 *************************************************************************/
-unsigned long getldappwpos(void *vp)
+static SMB_BIG_UINT getldappwpos(void *vp)
 {
-       return 0;
+       return (SMB_BIG_UINT)0;
 }
 
 /*************************************************************************
- Set the current position in the ldap passwd list from unsigned long.
+ Set the current position in the ldap passwd list from SMB_BIG_UINT.
  This must be treated as an opaque token.
 
  do not call this function directly.  use passdb.c instead.
 
 *************************************************************************/
-BOOL setldappwpos(void *vp, unsigned long tok)
+static BOOL setldappwpos(void *vp, SMB_BIG_UINT tok)
 {
        return False;
 }
 
+/*
+ * Ldap derived functions.
+ */
+
+static struct smb_passwd *getldappwnam(char *name)
+{
+  return pdb_sam_to_smb(iterate_getsam21pwnam(name));
+}
+
+static struct smb_passwd *getldappwuid(uid_t smb_userid)
+{
+  return pdb_sam_to_smb(iterate_getsam21pwuid(smb_userid));
+}
+
+static struct smb_passwd *getldappwrid(uint32 user_rid)
+{
+  return pdb_sam_to_smb(iterate_getsam21pwuid(pdb_user_rid_to_uid(user_rid)));
+}
+
+static struct smb_passwd *getldappwent(void *vp)
+{
+  return pdb_sam_to_smb(getldap21pwent(vp));
+}
+
+static BOOL add_ldappwd_entry(struct smb_passwd *newpwd)
+{
+  return add_ldap21pwd_entry(pdb_smb_to_sam(newpwd));
+}
+
+static BOOL mod_ldappwd_entry(struct smb_passwd* pwd, BOOL override)
+{
+  return mod_ldap21pwd_entry(pdb_smb_to_sam(pwd), override);
+}
+
+static BOOL del_ldappwd_entry(const char *name)
+{
+  return False; /* Dummy... */
+}
+
+static struct sam_disp_info *getldapdispnam(char *name)
+{
+       return pdb_sam_to_dispinfo(getldap21pwnam(name));
+}
+
+static struct sam_disp_info *getldapdisprid(uint32 rid)
+{
+       return pdb_sam_to_dispinfo(getldap21pwrid(rid));
+}
+
+static struct sam_disp_info *getldapdispent(void *vp)
+{
+       return pdb_sam_to_dispinfo(getldap21pwent(vp));
+}
+
+static struct sam_passwd *getldap21pwuid(uid_t uid)
+{
+       return pdb_smb_to_sam(iterate_getsam21pwuid(pdb_uid_to_user_rid(uid)));
+}
+
+static struct passdb_ops ldap_ops =
+{
+       startldappwent,
+       endldappwent,
+       getldappwpos,
+       setldappwpos,
+       getldappwnam,
+       getldappwuid,
+       getldappwrid,
+       getldappwent,
+       add_ldappwd_entry,
+       mod_ldappwd_entry,
+       del_ldappwd_entry,
+       getldap21pwent,
+       iterate_getsam21pwnam,       /* From passdb.c */
+       iterate_getsam21pwuid,       /* From passdb.c */
+       iterate_getsam21pwrid,       /* From passdb.c */
+       add_ldap21pwd_entry,
+       mod_ldap21pwd_entry,
+       getldapdispnam,
+       getldapdisprid,
+       getldapdispent
+};
+
+struct passdb_ops *ldap_initialize_password_db(void)
+{
+  return &ldap_ops;
+}
+
+#else
+ void dummy_function(void);
+ void dummy_function(void) { } /* stop some compilers complaining */
 #endif