s4-schema_syntax: Use remote prefixMap to map remote ATTID to local one
[Samba.git] / source4 / dsdb / schema / schema_syntax.c
blob1c30065618e5110cec4eb26c488b94bf2b529b01
1 /*
2 Unix SMB/CIFS mplementation.
3 DSDB schema syntaxes
5 Copyright (C) Stefan Metzmacher <metze@samba.org> 2006
6 Copyright (C) Simo Sorce 2005
7 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2008
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include "dsdb/samdb/samdb.h"
25 #include "librpc/gen_ndr/ndr_drsuapi.h"
26 #include "librpc/gen_ndr/ndr_security.h"
27 #include "librpc/gen_ndr/ndr_misc.h"
28 #include "lib/ldb/include/ldb.h"
29 #include "lib/ldb/include/ldb_errors.h"
30 #include "system/time.h"
31 #include "../lib/util/charset/charset.h"
32 #include "librpc/ndr/libndr.h"
33 #include "../lib/util/asn1.h"
35 /**
36 * Initialize dsdb_syntax_ctx with default values
37 * for common cases.
39 void dsdb_syntax_ctx_init(struct dsdb_syntax_ctx *ctx,
40 struct ldb_context *ldb,
41 const struct dsdb_schema *schema)
43 ctx->ldb = ldb;
44 ctx->schema = schema;
47 * 'true' will keep current behavior,
48 * i.e. attributeID_id will be returned by default
50 ctx->is_schema_nc = true;
52 ctx->pfm_remote = NULL;
56 /**
57 * Returns ATTID for DRS attribute.
59 * ATTID depends on whether we are replicating
60 * Schema NC or msDs-IntId is set for schemaAttribute
61 * for the attribute.
63 uint32_t dsdb_attribute_get_attid(const struct dsdb_attribute *attr,
64 bool for_schema_nc)
66 if (!for_schema_nc && attr->msDS_IntId) {
67 return attr->msDS_IntId;
70 return attr->attributeID_id;
73 /**
74 * Map an ATTID from remote DC to a local ATTID
75 * using remote prefixMap
77 static bool dsdb_syntax_attid_from_remote_attid(const struct dsdb_syntax_ctx *ctx,
78 TALLOC_CTX *mem_ctx,
79 uint32_t id_remote,
80 uint32_t *id_local)
82 WERROR werr;
83 const char *oid;
86 * map remote ATTID to local directly in case
87 * of no remote prefixMap (during provision for instance)
89 if (!ctx->pfm_remote) {
90 *id_local = id_remote;
91 return true;
94 werr = dsdb_schema_pfm_oid_from_attid(ctx->pfm_remote, id_remote, mem_ctx, &oid);
95 if (!W_ERROR_IS_OK(werr)) {
96 DEBUG(0,("ATTID->OID failed (%s) for: 0x%08X\n", win_errstr(werr), id_remote));
97 return false;
100 werr = dsdb_schema_pfm_attid_from_oid(ctx->schema->prefixmap, oid, id_local);
101 if (!W_ERROR_IS_OK(werr)) {
102 DEBUG(0,("OID->ATTID failed (%s) for: %s\n", win_errstr(werr), oid));
103 return false;
106 return true;
109 static WERROR dsdb_syntax_FOOBAR_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
110 const struct dsdb_attribute *attr,
111 const struct drsuapi_DsReplicaAttribute *in,
112 TALLOC_CTX *mem_ctx,
113 struct ldb_message_element *out)
115 unsigned int i;
117 out->flags = 0;
118 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
119 W_ERROR_HAVE_NO_MEMORY(out->name);
121 out->num_values = in->value_ctr.num_values;
122 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
123 W_ERROR_HAVE_NO_MEMORY(out->values);
125 for (i=0; i < out->num_values; i++) {
126 char *str;
128 if (in->value_ctr.values[i].blob == NULL) {
129 return WERR_FOOBAR;
132 str = talloc_asprintf(out->values, "%s: not implemented",
133 attr->syntax->name);
134 W_ERROR_HAVE_NO_MEMORY(str);
136 out->values[i] = data_blob_string_const(str);
139 return WERR_OK;
142 static WERROR dsdb_syntax_FOOBAR_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
143 const struct dsdb_attribute *attr,
144 const struct ldb_message_element *in,
145 TALLOC_CTX *mem_ctx,
146 struct drsuapi_DsReplicaAttribute *out)
148 return WERR_FOOBAR;
151 static WERROR dsdb_syntax_FOOBAR_validate_ldb(const struct dsdb_syntax_ctx *ctx,
152 const struct dsdb_attribute *attr,
153 const struct ldb_message_element *in)
155 return WERR_FOOBAR;
158 static WERROR dsdb_syntax_BOOL_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
159 const struct dsdb_attribute *attr,
160 const struct drsuapi_DsReplicaAttribute *in,
161 TALLOC_CTX *mem_ctx,
162 struct ldb_message_element *out)
164 unsigned int i;
166 out->flags = 0;
167 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
168 W_ERROR_HAVE_NO_MEMORY(out->name);
170 out->num_values = in->value_ctr.num_values;
171 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
172 W_ERROR_HAVE_NO_MEMORY(out->values);
174 for (i=0; i < out->num_values; i++) {
175 uint32_t v;
176 char *str;
178 if (in->value_ctr.values[i].blob == NULL) {
179 return WERR_FOOBAR;
182 if (in->value_ctr.values[i].blob->length != 4) {
183 return WERR_FOOBAR;
186 v = IVAL(in->value_ctr.values[i].blob->data, 0);
188 if (v != 0) {
189 str = talloc_strdup(out->values, "TRUE");
190 W_ERROR_HAVE_NO_MEMORY(str);
191 } else {
192 str = talloc_strdup(out->values, "FALSE");
193 W_ERROR_HAVE_NO_MEMORY(str);
196 out->values[i] = data_blob_string_const(str);
199 return WERR_OK;
202 static WERROR dsdb_syntax_BOOL_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
203 const struct dsdb_attribute *attr,
204 const struct ldb_message_element *in,
205 TALLOC_CTX *mem_ctx,
206 struct drsuapi_DsReplicaAttribute *out)
208 unsigned int i;
209 DATA_BLOB *blobs;
211 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
212 return WERR_FOOBAR;
215 out->attid = dsdb_attribute_get_attid(attr,
216 ctx->is_schema_nc);
217 out->value_ctr.num_values = in->num_values;
218 out->value_ctr.values = talloc_array(mem_ctx,
219 struct drsuapi_DsAttributeValue,
220 in->num_values);
221 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
223 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
224 W_ERROR_HAVE_NO_MEMORY(blobs);
226 for (i=0; i < in->num_values; i++) {
227 out->value_ctr.values[i].blob = &blobs[i];
229 blobs[i] = data_blob_talloc(blobs, NULL, 4);
230 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
232 if (strcmp("TRUE", (const char *)in->values[i].data) == 0) {
233 SIVAL(blobs[i].data, 0, 0x00000001);
234 } else if (strcmp("FALSE", (const char *)in->values[i].data) == 0) {
235 SIVAL(blobs[i].data, 0, 0x00000000);
236 } else {
237 return WERR_FOOBAR;
241 return WERR_OK;
244 static WERROR dsdb_syntax_BOOL_validate_ldb(const struct dsdb_syntax_ctx *ctx,
245 const struct dsdb_attribute *attr,
246 const struct ldb_message_element *in)
248 unsigned int i;
250 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
251 return WERR_FOOBAR;
254 for (i=0; i < in->num_values; i++) {
255 int t, f;
257 t = strncmp("TRUE",
258 (const char *)in->values[i].data,
259 in->values[i].length);
260 f = strncmp("FALSE",
261 (const char *)in->values[i].data,
262 in->values[i].length);
264 if (t != 0 && f != 0) {
265 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
269 return WERR_OK;
272 static WERROR dsdb_syntax_INT32_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
273 const struct dsdb_attribute *attr,
274 const struct drsuapi_DsReplicaAttribute *in,
275 TALLOC_CTX *mem_ctx,
276 struct ldb_message_element *out)
278 unsigned int i;
280 out->flags = 0;
281 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
282 W_ERROR_HAVE_NO_MEMORY(out->name);
284 out->num_values = in->value_ctr.num_values;
285 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
286 W_ERROR_HAVE_NO_MEMORY(out->values);
288 for (i=0; i < out->num_values; i++) {
289 int32_t v;
290 char *str;
292 if (in->value_ctr.values[i].blob == NULL) {
293 return WERR_FOOBAR;
296 if (in->value_ctr.values[i].blob->length != 4) {
297 return WERR_FOOBAR;
300 v = IVALS(in->value_ctr.values[i].blob->data, 0);
302 str = talloc_asprintf(out->values, "%d", v);
303 W_ERROR_HAVE_NO_MEMORY(str);
305 out->values[i] = data_blob_string_const(str);
308 return WERR_OK;
311 static WERROR dsdb_syntax_INT32_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
312 const struct dsdb_attribute *attr,
313 const struct ldb_message_element *in,
314 TALLOC_CTX *mem_ctx,
315 struct drsuapi_DsReplicaAttribute *out)
317 unsigned int i;
318 DATA_BLOB *blobs;
320 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
321 return WERR_FOOBAR;
324 out->attid = dsdb_attribute_get_attid(attr,
325 ctx->is_schema_nc);
326 out->value_ctr.num_values = in->num_values;
327 out->value_ctr.values = talloc_array(mem_ctx,
328 struct drsuapi_DsAttributeValue,
329 in->num_values);
330 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
332 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
333 W_ERROR_HAVE_NO_MEMORY(blobs);
335 for (i=0; i < in->num_values; i++) {
336 int32_t v;
338 out->value_ctr.values[i].blob = &blobs[i];
340 blobs[i] = data_blob_talloc(blobs, NULL, 4);
341 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
343 /* We've to use "strtoll" here to have the intended overflows.
344 * Otherwise we may get "LONG_MAX" and the conversion is wrong. */
345 v = (int32_t) strtoll((char *)in->values[i].data, NULL, 0);
347 SIVALS(blobs[i].data, 0, v);
350 return WERR_OK;
353 static WERROR dsdb_syntax_INT32_validate_ldb(const struct dsdb_syntax_ctx *ctx,
354 const struct dsdb_attribute *attr,
355 const struct ldb_message_element *in)
357 unsigned int i;
359 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
360 return WERR_FOOBAR;
363 for (i=0; i < in->num_values; i++) {
364 long v;
365 char buf[sizeof("-2147483648")];
366 char *end = NULL;
368 ZERO_STRUCT(buf);
369 if (in->values[i].length >= sizeof(buf)) {
370 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
373 memcpy(buf, in->values[i].data, in->values[i].length);
374 errno = 0;
375 v = strtol(buf, &end, 10);
376 if (errno != 0) {
377 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
379 if (end && end[0] != '\0') {
380 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
383 if (attr->rangeLower) {
384 if ((int32_t)v < (int32_t)*attr->rangeLower) {
385 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
389 if (attr->rangeUpper) {
390 if ((int32_t)v > (int32_t)*attr->rangeUpper) {
391 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
396 return WERR_OK;
399 static WERROR dsdb_syntax_INT64_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
400 const struct dsdb_attribute *attr,
401 const struct drsuapi_DsReplicaAttribute *in,
402 TALLOC_CTX *mem_ctx,
403 struct ldb_message_element *out)
405 unsigned int i;
407 out->flags = 0;
408 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
409 W_ERROR_HAVE_NO_MEMORY(out->name);
411 out->num_values = in->value_ctr.num_values;
412 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
413 W_ERROR_HAVE_NO_MEMORY(out->values);
415 for (i=0; i < out->num_values; i++) {
416 int64_t v;
417 char *str;
419 if (in->value_ctr.values[i].blob == NULL) {
420 return WERR_FOOBAR;
423 if (in->value_ctr.values[i].blob->length != 8) {
424 return WERR_FOOBAR;
427 v = BVALS(in->value_ctr.values[i].blob->data, 0);
429 str = talloc_asprintf(out->values, "%lld", (long long int)v);
430 W_ERROR_HAVE_NO_MEMORY(str);
432 out->values[i] = data_blob_string_const(str);
435 return WERR_OK;
438 static WERROR dsdb_syntax_INT64_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
439 const struct dsdb_attribute *attr,
440 const struct ldb_message_element *in,
441 TALLOC_CTX *mem_ctx,
442 struct drsuapi_DsReplicaAttribute *out)
444 unsigned int i;
445 DATA_BLOB *blobs;
447 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
448 return WERR_FOOBAR;
451 out->attid = dsdb_attribute_get_attid(attr,
452 ctx->is_schema_nc);
453 out->value_ctr.num_values = in->num_values;
454 out->value_ctr.values = talloc_array(mem_ctx,
455 struct drsuapi_DsAttributeValue,
456 in->num_values);
457 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
459 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
460 W_ERROR_HAVE_NO_MEMORY(blobs);
462 for (i=0; i < in->num_values; i++) {
463 int64_t v;
465 out->value_ctr.values[i].blob = &blobs[i];
467 blobs[i] = data_blob_talloc(blobs, NULL, 8);
468 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
470 v = strtoll((const char *)in->values[i].data, NULL, 10);
472 SBVALS(blobs[i].data, 0, v);
475 return WERR_OK;
478 static WERROR dsdb_syntax_INT64_validate_ldb(const struct dsdb_syntax_ctx *ctx,
479 const struct dsdb_attribute *attr,
480 const struct ldb_message_element *in)
482 unsigned int i;
484 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
485 return WERR_FOOBAR;
488 for (i=0; i < in->num_values; i++) {
489 long long v;
490 char buf[sizeof("-9223372036854775808")];
491 char *end = NULL;
493 ZERO_STRUCT(buf);
494 if (in->values[i].length >= sizeof(buf)) {
495 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
497 memcpy(buf, in->values[i].data, in->values[i].length);
499 errno = 0;
500 v = strtoll(buf, &end, 10);
501 if (errno != 0) {
502 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
504 if (end && end[0] != '\0') {
505 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
508 if (attr->rangeLower) {
509 if ((int64_t)v < (int64_t)*attr->rangeLower) {
510 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
514 if (attr->rangeUpper) {
515 if ((int64_t)v > (int64_t)*attr->rangeUpper) {
516 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
521 return WERR_OK;
523 static WERROR dsdb_syntax_NTTIME_UTC_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
524 const struct dsdb_attribute *attr,
525 const struct drsuapi_DsReplicaAttribute *in,
526 TALLOC_CTX *mem_ctx,
527 struct ldb_message_element *out)
529 unsigned int i;
531 out->flags = 0;
532 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
533 W_ERROR_HAVE_NO_MEMORY(out->name);
535 out->num_values = in->value_ctr.num_values;
536 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
537 W_ERROR_HAVE_NO_MEMORY(out->values);
539 for (i=0; i < out->num_values; i++) {
540 NTTIME v;
541 time_t t;
542 char *str;
544 if (in->value_ctr.values[i].blob == NULL) {
545 return WERR_FOOBAR;
548 if (in->value_ctr.values[i].blob->length != 8) {
549 return WERR_FOOBAR;
552 v = BVAL(in->value_ctr.values[i].blob->data, 0);
553 v *= 10000000;
554 t = nt_time_to_unix(v);
557 * NOTE: On a w2k3 server you can set a GeneralizedTime string
558 * via LDAP, but you get back an UTCTime string,
559 * but via DRSUAPI you get back the NTTIME_1sec value
560 * that represents the GeneralizedTime value!
562 * So if we store the UTCTime string in our ldb
563 * we'll loose information!
565 str = ldb_timestring_utc(out->values, t);
566 W_ERROR_HAVE_NO_MEMORY(str);
567 out->values[i] = data_blob_string_const(str);
570 return WERR_OK;
573 static WERROR dsdb_syntax_NTTIME_UTC_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
574 const struct dsdb_attribute *attr,
575 const struct ldb_message_element *in,
576 TALLOC_CTX *mem_ctx,
577 struct drsuapi_DsReplicaAttribute *out)
579 unsigned int i;
580 DATA_BLOB *blobs;
582 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
583 return WERR_FOOBAR;
586 out->attid = dsdb_attribute_get_attid(attr,
587 ctx->is_schema_nc);
588 out->value_ctr.num_values = in->num_values;
589 out->value_ctr.values = talloc_array(mem_ctx,
590 struct drsuapi_DsAttributeValue,
591 in->num_values);
592 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
594 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
595 W_ERROR_HAVE_NO_MEMORY(blobs);
597 for (i=0; i < in->num_values; i++) {
598 NTTIME v;
599 time_t t;
601 out->value_ctr.values[i].blob = &blobs[i];
603 blobs[i] = data_blob_talloc(blobs, NULL, 8);
604 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
606 t = ldb_string_utc_to_time((const char *)in->values[i].data);
607 unix_to_nt_time(&v, t);
608 v /= 10000000;
610 SBVAL(blobs[i].data, 0, v);
613 return WERR_OK;
616 static WERROR dsdb_syntax_NTTIME_UTC_validate_ldb(const struct dsdb_syntax_ctx *ctx,
617 const struct dsdb_attribute *attr,
618 const struct ldb_message_element *in)
620 unsigned int i;
622 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
623 return WERR_FOOBAR;
626 for (i=0; i < in->num_values; i++) {
627 time_t t;
628 char buf[sizeof("090826075717Z")];
630 ZERO_STRUCT(buf);
631 if (in->values[i].length >= sizeof(buf)) {
632 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
634 memcpy(buf, in->values[i].data, in->values[i].length);
636 errno = 0;
637 t = ldb_string_utc_to_time(buf);
638 if (errno != 0) {
639 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
642 if (attr->rangeLower) {
643 if ((int32_t)t < (int32_t)*attr->rangeLower) {
644 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
648 if (attr->rangeUpper) {
649 if ((int32_t)t > (int32_t)*attr->rangeLower) {
650 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
655 * TODO: verify the comment in the
656 * dsdb_syntax_NTTIME_UTC_drsuapi_to_ldb() function!
660 return WERR_OK;
663 static WERROR dsdb_syntax_NTTIME_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
664 const struct dsdb_attribute *attr,
665 const struct drsuapi_DsReplicaAttribute *in,
666 TALLOC_CTX *mem_ctx,
667 struct ldb_message_element *out)
669 unsigned int i;
671 out->flags = 0;
672 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
673 W_ERROR_HAVE_NO_MEMORY(out->name);
675 out->num_values = in->value_ctr.num_values;
676 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
677 W_ERROR_HAVE_NO_MEMORY(out->values);
679 for (i=0; i < out->num_values; i++) {
680 NTTIME v;
681 time_t t;
682 char *str;
684 if (in->value_ctr.values[i].blob == NULL) {
685 return WERR_FOOBAR;
688 if (in->value_ctr.values[i].blob->length != 8) {
689 return WERR_FOOBAR;
692 v = BVAL(in->value_ctr.values[i].blob->data, 0);
693 v *= 10000000;
694 t = nt_time_to_unix(v);
696 str = ldb_timestring(out->values, t);
697 W_ERROR_HAVE_NO_MEMORY(str);
699 out->values[i] = data_blob_string_const(str);
702 return WERR_OK;
705 static WERROR dsdb_syntax_NTTIME_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
706 const struct dsdb_attribute *attr,
707 const struct ldb_message_element *in,
708 TALLOC_CTX *mem_ctx,
709 struct drsuapi_DsReplicaAttribute *out)
711 unsigned int i;
712 DATA_BLOB *blobs;
714 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
715 return WERR_FOOBAR;
718 out->attid = dsdb_attribute_get_attid(attr,
719 ctx->is_schema_nc);
720 out->value_ctr.num_values = in->num_values;
721 out->value_ctr.values = talloc_array(mem_ctx,
722 struct drsuapi_DsAttributeValue,
723 in->num_values);
724 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
726 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
727 W_ERROR_HAVE_NO_MEMORY(blobs);
729 for (i=0; i < in->num_values; i++) {
730 NTTIME v;
731 time_t t;
732 int ret;
734 out->value_ctr.values[i].blob = &blobs[i];
736 blobs[i] = data_blob_talloc(blobs, NULL, 8);
737 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
739 ret = ldb_val_to_time(&in->values[i], &t);
740 if (ret != LDB_SUCCESS) {
741 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
743 unix_to_nt_time(&v, t);
744 v /= 10000000;
746 SBVAL(blobs[i].data, 0, v);
749 return WERR_OK;
752 static WERROR dsdb_syntax_NTTIME_validate_ldb(const struct dsdb_syntax_ctx *ctx,
753 const struct dsdb_attribute *attr,
754 const struct ldb_message_element *in)
756 unsigned int i;
758 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
759 return WERR_FOOBAR;
762 for (i=0; i < in->num_values; i++) {
763 time_t t;
764 int ret;
766 ret = ldb_val_to_time(&in->values[i], &t);
767 if (ret != LDB_SUCCESS) {
768 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
771 if (attr->rangeLower) {
772 if ((int32_t)t < (int32_t)*attr->rangeLower) {
773 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
777 if (attr->rangeUpper) {
778 if ((int32_t)t > (int32_t)*attr->rangeLower) {
779 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
784 return WERR_OK;
787 static WERROR dsdb_syntax_DATA_BLOB_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
788 const struct dsdb_attribute *attr,
789 const struct drsuapi_DsReplicaAttribute *in,
790 TALLOC_CTX *mem_ctx,
791 struct ldb_message_element *out)
793 unsigned int i;
795 out->flags = 0;
796 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
797 W_ERROR_HAVE_NO_MEMORY(out->name);
799 out->num_values = in->value_ctr.num_values;
800 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
801 W_ERROR_HAVE_NO_MEMORY(out->values);
803 for (i=0; i < out->num_values; i++) {
804 if (in->value_ctr.values[i].blob == NULL) {
805 return WERR_FOOBAR;
808 if (in->value_ctr.values[i].blob->length == 0) {
809 return WERR_FOOBAR;
812 out->values[i] = data_blob_dup_talloc(out->values,
813 in->value_ctr.values[i].blob);
814 W_ERROR_HAVE_NO_MEMORY(out->values[i].data);
817 return WERR_OK;
820 static WERROR dsdb_syntax_DATA_BLOB_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
821 const struct dsdb_attribute *attr,
822 const struct ldb_message_element *in,
823 TALLOC_CTX *mem_ctx,
824 struct drsuapi_DsReplicaAttribute *out)
826 unsigned int i;
827 DATA_BLOB *blobs;
829 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
830 return WERR_FOOBAR;
833 out->attid = dsdb_attribute_get_attid(attr,
834 ctx->is_schema_nc);
835 out->value_ctr.num_values = in->num_values;
836 out->value_ctr.values = talloc_array(mem_ctx,
837 struct drsuapi_DsAttributeValue,
838 in->num_values);
839 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
841 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
842 W_ERROR_HAVE_NO_MEMORY(blobs);
844 for (i=0; i < in->num_values; i++) {
845 out->value_ctr.values[i].blob = &blobs[i];
847 blobs[i] = data_blob_dup_talloc(blobs, &in->values[i]);
848 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
851 return WERR_OK;
854 static WERROR dsdb_syntax_DATA_BLOB_validate_one_val(const struct dsdb_syntax_ctx *ctx,
855 const struct dsdb_attribute *attr,
856 const struct ldb_val *val)
858 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
859 return WERR_FOOBAR;
862 if (attr->rangeLower) {
863 if ((uint32_t)val->length < (uint32_t)*attr->rangeLower) {
864 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
868 if (attr->rangeUpper) {
869 if ((uint32_t)val->length > (uint32_t)*attr->rangeUpper) {
870 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
874 return WERR_OK;
877 static WERROR dsdb_syntax_DATA_BLOB_validate_ldb(const struct dsdb_syntax_ctx *ctx,
878 const struct dsdb_attribute *attr,
879 const struct ldb_message_element *in)
881 unsigned int i;
882 WERROR status;
884 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
885 return WERR_FOOBAR;
888 for (i=0; i < in->num_values; i++) {
889 if (in->values[i].length == 0) {
890 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
893 status = dsdb_syntax_DATA_BLOB_validate_one_val(ctx,
894 attr,
895 &in->values[i]);
896 if (!W_ERROR_IS_OK(status)) {
897 return status;
901 return WERR_OK;
904 static WERROR _dsdb_syntax_auto_OID_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
905 const struct dsdb_attribute *attr,
906 const struct drsuapi_DsReplicaAttribute *in,
907 TALLOC_CTX *mem_ctx,
908 struct ldb_message_element *out)
910 unsigned int i;
912 out->flags = 0;
913 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
914 W_ERROR_HAVE_NO_MEMORY(out->name);
916 out->num_values = in->value_ctr.num_values;
917 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
918 W_ERROR_HAVE_NO_MEMORY(out->values);
920 for (i=0; i < out->num_values; i++) {
921 uint32_t v;
922 const struct dsdb_class *c;
923 const struct dsdb_attribute *a;
924 const char *str = NULL;
926 if (in->value_ctr.values[i].blob == NULL) {
927 return WERR_FOOBAR;
930 if (in->value_ctr.values[i].blob->length != 4) {
931 return WERR_FOOBAR;
934 v = IVAL(in->value_ctr.values[i].blob->data, 0);
936 if ((c = dsdb_class_by_governsID_id(ctx->schema, v))) {
937 str = talloc_strdup(out->values, c->lDAPDisplayName);
938 } else if ((a = dsdb_attribute_by_attributeID_id(ctx->schema, v))) {
939 str = talloc_strdup(out->values, a->lDAPDisplayName);
940 } else {
941 WERROR werr;
942 SMB_ASSERT(ctx->pfm_remote);
943 werr = dsdb_schema_pfm_oid_from_attid(ctx->pfm_remote, v,
944 out->values, &str);
945 W_ERROR_NOT_OK_RETURN(werr);
947 W_ERROR_HAVE_NO_MEMORY(str);
949 /* the values need to be reversed */
950 out->values[out->num_values - (i + 1)] = data_blob_string_const(str);
953 return WERR_OK;
956 static WERROR _dsdb_syntax_OID_obj_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
957 const struct dsdb_attribute *attr,
958 const struct drsuapi_DsReplicaAttribute *in,
959 TALLOC_CTX *mem_ctx,
960 struct ldb_message_element *out)
962 unsigned int i;
964 out->flags = 0;
965 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
966 W_ERROR_HAVE_NO_MEMORY(out->name);
968 out->num_values = in->value_ctr.num_values;
969 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
970 W_ERROR_HAVE_NO_MEMORY(out->values);
972 for (i=0; i < out->num_values; i++) {
973 uint32_t v;
974 const struct dsdb_class *c;
975 const char *str;
977 if (in->value_ctr.values[i].blob == NULL) {
978 return WERR_FOOBAR;
981 if (in->value_ctr.values[i].blob->length != 4) {
982 return WERR_FOOBAR;
985 v = IVAL(in->value_ctr.values[i].blob->data, 0);
987 /* convert remote ATTID to local ATTID */
988 if (!dsdb_syntax_attid_from_remote_attid(ctx, mem_ctx, v, &v)) {
989 DEBUG(1,(__location__ ": Failed to map remote ATTID to local ATTID!\n"));
990 return WERR_FOOBAR;
993 c = dsdb_class_by_governsID_id(ctx->schema, v);
994 if (!c) {
995 DEBUG(1,(__location__ ": Unknown governsID 0x%08X\n", v));
996 return WERR_FOOBAR;
999 str = talloc_strdup(out->values, c->lDAPDisplayName);
1000 W_ERROR_HAVE_NO_MEMORY(str);
1002 /* the values need to be reversed */
1003 out->values[out->num_values - (i + 1)] = data_blob_string_const(str);
1006 return WERR_OK;
1009 static WERROR _dsdb_syntax_OID_attr_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1010 const struct dsdb_attribute *attr,
1011 const struct drsuapi_DsReplicaAttribute *in,
1012 TALLOC_CTX *mem_ctx,
1013 struct ldb_message_element *out)
1015 unsigned int i;
1017 out->flags = 0;
1018 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1019 W_ERROR_HAVE_NO_MEMORY(out->name);
1021 out->num_values = in->value_ctr.num_values;
1022 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1023 W_ERROR_HAVE_NO_MEMORY(out->values);
1025 for (i=0; i < out->num_values; i++) {
1026 uint32_t v;
1027 const struct dsdb_attribute *a;
1028 const char *str;
1030 if (in->value_ctr.values[i].blob == NULL) {
1031 return WERR_FOOBAR;
1034 if (in->value_ctr.values[i].blob->length != 4) {
1035 return WERR_FOOBAR;
1038 v = IVAL(in->value_ctr.values[i].blob->data, 0);
1040 /* convert remote ATTID to local ATTID */
1041 if (!dsdb_syntax_attid_from_remote_attid(ctx, mem_ctx, v, &v)) {
1042 DEBUG(1,(__location__ ": Failed to map remote ATTID to local ATTID!\n"));
1043 return WERR_FOOBAR;
1046 a = dsdb_attribute_by_attributeID_id(ctx->schema, v);
1047 if (!a) {
1048 DEBUG(1,(__location__ ": Unknown attributeID_id 0x%08X\n", v));
1049 return WERR_FOOBAR;
1052 str = talloc_strdup(out->values, a->lDAPDisplayName);
1053 W_ERROR_HAVE_NO_MEMORY(str);
1055 /* the values need to be reversed */
1056 out->values[out->num_values - (i + 1)] = data_blob_string_const(str);
1059 return WERR_OK;
1062 static WERROR _dsdb_syntax_OID_oid_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1063 const struct dsdb_attribute *attr,
1064 const struct drsuapi_DsReplicaAttribute *in,
1065 TALLOC_CTX *mem_ctx,
1066 struct ldb_message_element *out)
1068 unsigned int i;
1070 SMB_ASSERT(ctx->pfm_remote);
1072 out->flags = 0;
1073 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1074 W_ERROR_HAVE_NO_MEMORY(out->name);
1076 out->num_values = in->value_ctr.num_values;
1077 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1078 W_ERROR_HAVE_NO_MEMORY(out->values);
1080 for (i=0; i < out->num_values; i++) {
1081 uint32_t attid;
1082 WERROR status;
1083 const char *oid;
1085 if (in->value_ctr.values[i].blob == NULL) {
1086 return WERR_FOOBAR;
1089 if (in->value_ctr.values[i].blob->length != 4) {
1090 return WERR_FOOBAR;
1093 attid = IVAL(in->value_ctr.values[i].blob->data, 0);
1095 status = dsdb_schema_pfm_oid_from_attid(ctx->pfm_remote, attid,
1096 out->values, &oid);
1097 W_ERROR_NOT_OK_RETURN(status);
1099 out->values[i] = data_blob_string_const(oid);
1102 return WERR_OK;
1105 static WERROR _dsdb_syntax_auto_OID_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1106 const struct dsdb_attribute *attr,
1107 const struct ldb_message_element *in,
1108 TALLOC_CTX *mem_ctx,
1109 struct drsuapi_DsReplicaAttribute *out)
1111 unsigned int i;
1112 DATA_BLOB *blobs;
1114 out->attid= dsdb_attribute_get_attid(attr,
1115 ctx->is_schema_nc);
1116 out->value_ctr.num_values= in->num_values;
1117 out->value_ctr.values= talloc_array(mem_ctx,
1118 struct drsuapi_DsAttributeValue,
1119 in->num_values);
1120 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1122 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1123 W_ERROR_HAVE_NO_MEMORY(blobs);
1125 for (i=0; i < in->num_values; i++) {
1126 const struct dsdb_class *obj_class;
1127 const struct dsdb_attribute *obj_attr;
1128 struct ldb_val *v;
1130 out->value_ctr.values[i].blob= &blobs[i];
1132 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1133 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1135 /* in DRS windows puts the classes in the opposite
1136 order to the order used in ldap */
1137 v = &in->values[(in->num_values-1)-i];
1139 if ((obj_class = dsdb_class_by_lDAPDisplayName_ldb_val(ctx->schema, v))) {
1140 SIVAL(blobs[i].data, 0, obj_class->governsID_id);
1141 } else if ((obj_attr = dsdb_attribute_by_lDAPDisplayName_ldb_val(ctx->schema, v))) {
1142 SIVAL(blobs[i].data, 0, obj_attr->attributeID_id);
1143 } else {
1144 uint32_t attid;
1145 WERROR werr;
1146 werr = dsdb_schema_pfm_attid_from_oid(ctx->schema->prefixmap,
1147 (const char *)v->data,
1148 &attid);
1149 W_ERROR_NOT_OK_RETURN(werr);
1150 SIVAL(blobs[i].data, 0, attid);
1156 return WERR_OK;
1159 static WERROR _dsdb_syntax_OID_obj_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1160 const struct dsdb_attribute *attr,
1161 const struct ldb_message_element *in,
1162 TALLOC_CTX *mem_ctx,
1163 struct drsuapi_DsReplicaAttribute *out)
1165 unsigned int i;
1166 DATA_BLOB *blobs;
1168 out->attid= dsdb_attribute_get_attid(attr,
1169 ctx->is_schema_nc);
1170 out->value_ctr.num_values= in->num_values;
1171 out->value_ctr.values= talloc_array(mem_ctx,
1172 struct drsuapi_DsAttributeValue,
1173 in->num_values);
1174 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1176 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1177 W_ERROR_HAVE_NO_MEMORY(blobs);
1179 for (i=0; i < in->num_values; i++) {
1180 const struct dsdb_class *obj_class;
1182 out->value_ctr.values[i].blob= &blobs[i];
1184 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1185 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1187 /* in DRS windows puts the classes in the opposite
1188 order to the order used in ldap */
1189 obj_class = dsdb_class_by_lDAPDisplayName(ctx->schema,
1190 (const char *)in->values[(in->num_values-1)-i].data);
1191 if (!obj_class) {
1192 return WERR_FOOBAR;
1194 SIVAL(blobs[i].data, 0, obj_class->governsID_id);
1198 return WERR_OK;
1201 static WERROR _dsdb_syntax_OID_attr_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1202 const struct dsdb_attribute *attr,
1203 const struct ldb_message_element *in,
1204 TALLOC_CTX *mem_ctx,
1205 struct drsuapi_DsReplicaAttribute *out)
1207 unsigned int i;
1208 DATA_BLOB *blobs;
1210 out->attid= dsdb_attribute_get_attid(attr,
1211 ctx->is_schema_nc);
1212 out->value_ctr.num_values= in->num_values;
1213 out->value_ctr.values= talloc_array(mem_ctx,
1214 struct drsuapi_DsAttributeValue,
1215 in->num_values);
1216 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1218 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1219 W_ERROR_HAVE_NO_MEMORY(blobs);
1221 for (i=0; i < in->num_values; i++) {
1222 const struct dsdb_attribute *obj_attr;
1224 out->value_ctr.values[i].blob= &blobs[i];
1226 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1227 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1229 obj_attr = dsdb_attribute_by_lDAPDisplayName(ctx->schema, (const char *)in->values[i].data);
1230 if (!obj_attr) {
1231 return WERR_FOOBAR;
1233 SIVAL(blobs[i].data, 0, obj_attr->attributeID_id);
1237 return WERR_OK;
1240 static WERROR _dsdb_syntax_OID_oid_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1241 const struct dsdb_attribute *attr,
1242 const struct ldb_message_element *in,
1243 TALLOC_CTX *mem_ctx,
1244 struct drsuapi_DsReplicaAttribute *out)
1246 unsigned int i;
1247 DATA_BLOB *blobs;
1249 out->attid= dsdb_attribute_get_attid(attr,
1250 ctx->is_schema_nc);
1251 out->value_ctr.num_values= in->num_values;
1252 out->value_ctr.values= talloc_array(mem_ctx,
1253 struct drsuapi_DsAttributeValue,
1254 in->num_values);
1255 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1257 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1258 W_ERROR_HAVE_NO_MEMORY(blobs);
1260 for (i=0; i < in->num_values; i++) {
1261 uint32_t attid;
1262 WERROR status;
1264 out->value_ctr.values[i].blob= &blobs[i];
1266 blobs[i] = data_blob_talloc(blobs, NULL, 4);
1267 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
1269 status = dsdb_schema_pfm_attid_from_oid(ctx->schema->prefixmap,
1270 (const char *)in->values[i].data,
1271 &attid);
1272 W_ERROR_NOT_OK_RETURN(status);
1274 SIVAL(blobs[i].data, 0, attid);
1277 return WERR_OK;
1280 static WERROR dsdb_syntax_OID_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1281 const struct dsdb_attribute *attr,
1282 const struct drsuapi_DsReplicaAttribute *in,
1283 TALLOC_CTX *mem_ctx,
1284 struct ldb_message_element *out)
1286 WERROR werr;
1288 switch (attr->attributeID_id) {
1289 case DRSUAPI_ATTID_objectClass:
1290 case DRSUAPI_ATTID_subClassOf:
1291 case DRSUAPI_ATTID_auxiliaryClass:
1292 case DRSUAPI_ATTID_systemAuxiliaryClass:
1293 case DRSUAPI_ATTID_systemPossSuperiors:
1294 case DRSUAPI_ATTID_possSuperiors:
1295 werr = _dsdb_syntax_OID_obj_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1296 break;
1297 case DRSUAPI_ATTID_systemMustContain:
1298 case DRSUAPI_ATTID_systemMayContain:
1299 case DRSUAPI_ATTID_mustContain:
1300 case DRSUAPI_ATTID_rDNAttId:
1301 case DRSUAPI_ATTID_transportAddressAttribute:
1302 case DRSUAPI_ATTID_mayContain:
1303 werr = _dsdb_syntax_OID_attr_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1304 break;
1305 case DRSUAPI_ATTID_governsID:
1306 case DRSUAPI_ATTID_attributeID:
1307 case DRSUAPI_ATTID_attributeSyntax:
1308 werr = _dsdb_syntax_OID_oid_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1309 break;
1310 default:
1311 DEBUG(0,(__location__ ": Unknown handling for attributeID_id for %s\n",
1312 attr->lDAPDisplayName));
1313 return _dsdb_syntax_auto_OID_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1316 /* When we are doing the vampire of a schema, we don't want
1317 * the inability to reference an OID to get in the way.
1318 * Otherwise, we won't get the new schema with which to
1319 * understand this */
1320 if (!W_ERROR_IS_OK(werr) && ctx->schema->relax_OID_conversions) {
1321 return _dsdb_syntax_OID_oid_drsuapi_to_ldb(ctx, attr, in, mem_ctx, out);
1323 return werr;
1326 static WERROR dsdb_syntax_OID_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1327 const struct dsdb_attribute *attr,
1328 const struct ldb_message_element *in,
1329 TALLOC_CTX *mem_ctx,
1330 struct drsuapi_DsReplicaAttribute *out)
1332 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1333 return WERR_FOOBAR;
1336 switch (attr->attributeID_id) {
1337 case DRSUAPI_ATTID_objectClass:
1338 case DRSUAPI_ATTID_subClassOf:
1339 case DRSUAPI_ATTID_auxiliaryClass:
1340 case DRSUAPI_ATTID_systemAuxiliaryClass:
1341 case DRSUAPI_ATTID_systemPossSuperiors:
1342 case DRSUAPI_ATTID_possSuperiors:
1343 return _dsdb_syntax_OID_obj_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1344 case DRSUAPI_ATTID_systemMustContain:
1345 case DRSUAPI_ATTID_systemMayContain:
1346 case DRSUAPI_ATTID_mustContain:
1347 case DRSUAPI_ATTID_rDNAttId:
1348 case DRSUAPI_ATTID_transportAddressAttribute:
1349 case DRSUAPI_ATTID_mayContain:
1350 return _dsdb_syntax_OID_attr_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1351 case DRSUAPI_ATTID_governsID:
1352 case DRSUAPI_ATTID_attributeID:
1353 case DRSUAPI_ATTID_attributeSyntax:
1354 return _dsdb_syntax_OID_oid_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1357 DEBUG(0,(__location__ ": Unknown handling for attributeID_id for %s\n",
1358 attr->lDAPDisplayName));
1360 return _dsdb_syntax_auto_OID_ldb_to_drsuapi(ctx, attr, in, mem_ctx, out);
1363 static WERROR _dsdb_syntax_OID_validate_numericoid(const struct dsdb_syntax_ctx *ctx,
1364 const struct dsdb_attribute *attr,
1365 const struct ldb_message_element *in)
1367 unsigned int i;
1368 TALLOC_CTX *tmp_ctx;
1370 tmp_ctx = talloc_new(ctx->ldb);
1371 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1373 for (i=0; i < in->num_values; i++) {
1374 DATA_BLOB blob;
1375 const char *oid_out;
1376 const char *oid = (const char*)in->values[i].data;
1378 if (!ber_write_OID_String(tmp_ctx, &blob, oid)) {
1379 DEBUG(0,("ber_write_OID_String() failed for %s\n", oid));
1380 talloc_free(tmp_ctx);
1381 return WERR_INVALID_PARAMETER;
1384 if (!ber_read_OID_String(tmp_ctx, blob, &oid_out)) {
1385 DEBUG(0,("ber_read_OID_String() failed for %s\n",
1386 hex_encode_talloc(tmp_ctx, blob.data, blob.length)));
1387 talloc_free(tmp_ctx);
1388 return WERR_INVALID_PARAMETER;
1391 if (strcmp(oid, oid_out) != 0) {
1392 talloc_free(tmp_ctx);
1393 return WERR_INVALID_PARAMETER;
1397 talloc_free(tmp_ctx);
1398 return WERR_OK;
1401 static WERROR dsdb_syntax_OID_validate_ldb(const struct dsdb_syntax_ctx *ctx,
1402 const struct dsdb_attribute *attr,
1403 const struct ldb_message_element *in)
1405 WERROR status;
1406 struct drsuapi_DsReplicaAttribute drs_tmp;
1407 struct ldb_message_element ldb_tmp;
1408 TALLOC_CTX *tmp_ctx;
1410 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1411 return WERR_FOOBAR;
1414 switch (attr->attributeID_id) {
1415 case DRSUAPI_ATTID_governsID:
1416 case DRSUAPI_ATTID_attributeID:
1417 case DRSUAPI_ATTID_attributeSyntax:
1418 return _dsdb_syntax_OID_validate_numericoid(ctx, attr, in);
1422 * TODO: optimize and verify this code
1425 tmp_ctx = talloc_new(ctx->ldb);
1426 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1428 status = dsdb_syntax_OID_ldb_to_drsuapi(ctx,
1429 attr,
1431 tmp_ctx,
1432 &drs_tmp);
1433 if (!W_ERROR_IS_OK(status)) {
1434 talloc_free(tmp_ctx);
1435 return status;
1438 status = dsdb_syntax_OID_drsuapi_to_ldb(ctx,
1439 attr,
1440 &drs_tmp,
1441 tmp_ctx,
1442 &ldb_tmp);
1443 if (!W_ERROR_IS_OK(status)) {
1444 talloc_free(tmp_ctx);
1445 return status;
1448 talloc_free(tmp_ctx);
1449 return WERR_OK;
1452 static WERROR dsdb_syntax_UNICODE_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1453 const struct dsdb_attribute *attr,
1454 const struct drsuapi_DsReplicaAttribute *in,
1455 TALLOC_CTX *mem_ctx,
1456 struct ldb_message_element *out)
1458 unsigned int i;
1460 out->flags = 0;
1461 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1462 W_ERROR_HAVE_NO_MEMORY(out->name);
1464 out->num_values = in->value_ctr.num_values;
1465 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1466 W_ERROR_HAVE_NO_MEMORY(out->values);
1468 for (i=0; i < out->num_values; i++) {
1469 char *str;
1471 if (in->value_ctr.values[i].blob == NULL) {
1472 return WERR_FOOBAR;
1475 if (in->value_ctr.values[i].blob->length == 0) {
1476 return WERR_FOOBAR;
1479 if (!convert_string_talloc(out->values,
1480 CH_UTF16, CH_UNIX,
1481 in->value_ctr.values[i].blob->data,
1482 in->value_ctr.values[i].blob->length,
1483 (void **)&str, NULL, false)) {
1484 return WERR_FOOBAR;
1487 out->values[i] = data_blob_string_const(str);
1490 return WERR_OK;
1493 static WERROR dsdb_syntax_UNICODE_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1494 const struct dsdb_attribute *attr,
1495 const struct ldb_message_element *in,
1496 TALLOC_CTX *mem_ctx,
1497 struct drsuapi_DsReplicaAttribute *out)
1499 unsigned int i;
1500 DATA_BLOB *blobs;
1502 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1503 return WERR_FOOBAR;
1506 out->attid = dsdb_attribute_get_attid(attr,
1507 ctx->is_schema_nc);
1508 out->value_ctr.num_values = in->num_values;
1509 out->value_ctr.values = talloc_array(mem_ctx,
1510 struct drsuapi_DsAttributeValue,
1511 in->num_values);
1512 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1514 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1515 W_ERROR_HAVE_NO_MEMORY(blobs);
1517 for (i=0; i < in->num_values; i++) {
1518 out->value_ctr.values[i].blob = &blobs[i];
1520 if (!convert_string_talloc(blobs,
1521 CH_UNIX, CH_UTF16,
1522 in->values[i].data, in->values[i].length,
1523 (void **)&blobs[i].data, &blobs[i].length, false)) {
1524 return WERR_FOOBAR;
1528 return WERR_OK;
1531 static WERROR dsdb_syntax_UNICODE_validate_one_val(const struct dsdb_syntax_ctx *ctx,
1532 const struct dsdb_attribute *attr,
1533 const struct ldb_val *val)
1535 void *dst = NULL;
1536 size_t size;
1537 bool ok;
1539 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1540 return WERR_FOOBAR;
1543 ok = convert_string_talloc(ctx->ldb,
1544 CH_UNIX, CH_UTF16,
1545 val->data,
1546 val->length,
1547 (void **)&dst,
1548 &size, false);
1549 TALLOC_FREE(dst);
1550 if (!ok) {
1551 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1554 if (attr->rangeLower) {
1555 if ((size/2) < *attr->rangeLower) {
1556 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1560 if (attr->rangeUpper) {
1561 if ((size/2) > *attr->rangeUpper) {
1562 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1566 return WERR_OK;
1569 static WERROR dsdb_syntax_UNICODE_validate_ldb(const struct dsdb_syntax_ctx *ctx,
1570 const struct dsdb_attribute *attr,
1571 const struct ldb_message_element *in)
1573 WERROR status;
1574 unsigned int i;
1576 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1577 return WERR_FOOBAR;
1580 for (i=0; i < in->num_values; i++) {
1581 if (in->values[i].length == 0) {
1582 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1585 status = dsdb_syntax_UNICODE_validate_one_val(ctx,
1586 attr,
1587 &in->values[i]);
1588 if (!W_ERROR_IS_OK(status)) {
1589 return status;
1593 return WERR_OK;
1596 static WERROR dsdb_syntax_one_DN_drsuapi_to_ldb(TALLOC_CTX *mem_ctx, struct ldb_context *ldb,
1597 const struct dsdb_syntax *syntax,
1598 const DATA_BLOB *in, DATA_BLOB *out)
1600 struct drsuapi_DsReplicaObjectIdentifier3 id3;
1601 enum ndr_err_code ndr_err;
1602 DATA_BLOB guid_blob;
1603 struct ldb_dn *dn;
1604 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1605 int ret;
1606 NTSTATUS status;
1608 if (!tmp_ctx) {
1609 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1612 if (in == NULL) {
1613 talloc_free(tmp_ctx);
1614 return WERR_FOOBAR;
1617 if (in->length == 0) {
1618 talloc_free(tmp_ctx);
1619 return WERR_FOOBAR;
1623 /* windows sometimes sends an extra two pad bytes here */
1624 ndr_err = ndr_pull_struct_blob(in,
1625 tmp_ctx, &id3,
1626 (ndr_pull_flags_fn_t)ndr_pull_drsuapi_DsReplicaObjectIdentifier3);
1627 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1628 status = ndr_map_error2ntstatus(ndr_err);
1629 talloc_free(tmp_ctx);
1630 return ntstatus_to_werror(status);
1633 dn = ldb_dn_new(tmp_ctx, ldb, id3.dn);
1634 if (!dn) {
1635 talloc_free(tmp_ctx);
1636 /* If this fails, it must be out of memory, as it does not do much parsing */
1637 W_ERROR_HAVE_NO_MEMORY(dn);
1640 if (!GUID_all_zero(&id3.guid)) {
1641 status = GUID_to_ndr_blob(&id3.guid, tmp_ctx, &guid_blob);
1642 if (!NT_STATUS_IS_OK(status)) {
1643 talloc_free(tmp_ctx);
1644 return ntstatus_to_werror(status);
1647 ret = ldb_dn_set_extended_component(dn, "GUID", &guid_blob);
1648 if (ret != LDB_SUCCESS) {
1649 talloc_free(tmp_ctx);
1650 return WERR_FOOBAR;
1652 talloc_free(guid_blob.data);
1655 if (id3.__ndr_size_sid) {
1656 DATA_BLOB sid_blob;
1657 ndr_err = ndr_push_struct_blob(&sid_blob, tmp_ctx, &id3.sid,
1658 (ndr_push_flags_fn_t)ndr_push_dom_sid);
1659 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1660 status = ndr_map_error2ntstatus(ndr_err);
1661 talloc_free(tmp_ctx);
1662 return ntstatus_to_werror(status);
1665 ret = ldb_dn_set_extended_component(dn, "SID", &sid_blob);
1666 if (ret != LDB_SUCCESS) {
1667 talloc_free(tmp_ctx);
1668 return WERR_FOOBAR;
1672 *out = data_blob_string_const(ldb_dn_get_extended_linearized(mem_ctx, dn, 1));
1673 talloc_free(tmp_ctx);
1674 return WERR_OK;
1677 static WERROR dsdb_syntax_DN_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1678 const struct dsdb_attribute *attr,
1679 const struct drsuapi_DsReplicaAttribute *in,
1680 TALLOC_CTX *mem_ctx,
1681 struct ldb_message_element *out)
1683 unsigned int i;
1685 out->flags = 0;
1686 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1687 W_ERROR_HAVE_NO_MEMORY(out->name);
1689 out->num_values = in->value_ctr.num_values;
1690 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1691 W_ERROR_HAVE_NO_MEMORY(out->values);
1693 for (i=0; i < out->num_values; i++) {
1694 WERROR status = dsdb_syntax_one_DN_drsuapi_to_ldb(out->values, ctx->ldb, attr->syntax,
1695 in->value_ctr.values[i].blob,
1696 &out->values[i]);
1697 if (!W_ERROR_IS_OK(status)) {
1698 return status;
1703 return WERR_OK;
1706 static WERROR dsdb_syntax_DN_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
1707 const struct dsdb_attribute *attr,
1708 const struct ldb_message_element *in,
1709 TALLOC_CTX *mem_ctx,
1710 struct drsuapi_DsReplicaAttribute *out)
1712 unsigned int i;
1713 DATA_BLOB *blobs;
1715 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1716 return WERR_FOOBAR;
1719 out->attid = dsdb_attribute_get_attid(attr,
1720 ctx->is_schema_nc);
1721 out->value_ctr.num_values = in->num_values;
1722 out->value_ctr.values = talloc_array(mem_ctx,
1723 struct drsuapi_DsAttributeValue,
1724 in->num_values);
1725 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
1727 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
1728 W_ERROR_HAVE_NO_MEMORY(blobs);
1730 for (i=0; i < in->num_values; i++) {
1731 struct drsuapi_DsReplicaObjectIdentifier3 id3;
1732 enum ndr_err_code ndr_err;
1733 struct ldb_dn *dn;
1734 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1735 NTSTATUS status;
1737 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1739 out->value_ctr.values[i].blob = &blobs[i];
1741 dn = ldb_dn_from_ldb_val(tmp_ctx, ctx->ldb, &in->values[i]);
1743 W_ERROR_HAVE_NO_MEMORY(dn);
1745 ZERO_STRUCT(id3);
1747 status = dsdb_get_extended_dn_guid(dn, &id3.guid, "GUID");
1748 if (!NT_STATUS_IS_OK(status) &&
1749 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1750 talloc_free(tmp_ctx);
1751 return ntstatus_to_werror(status);
1754 status = dsdb_get_extended_dn_sid(dn, &id3.sid, "SID");
1755 if (!NT_STATUS_IS_OK(status) &&
1756 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1757 talloc_free(tmp_ctx);
1758 return ntstatus_to_werror(status);
1761 id3.dn = ldb_dn_get_linearized(dn);
1763 ndr_err = ndr_push_struct_blob(&blobs[i], blobs, &id3, (ndr_push_flags_fn_t)ndr_push_drsuapi_DsReplicaObjectIdentifier3);
1764 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1765 status = ndr_map_error2ntstatus(ndr_err);
1766 talloc_free(tmp_ctx);
1767 return ntstatus_to_werror(status);
1769 talloc_free(tmp_ctx);
1772 return WERR_OK;
1775 static WERROR dsdb_syntax_DN_validate_one_val(const struct dsdb_syntax_ctx *ctx,
1776 const struct dsdb_attribute *attr,
1777 const struct ldb_val *val,
1778 TALLOC_CTX *mem_ctx,
1779 struct dsdb_dn **_dsdb_dn)
1781 static const char * const extended_list[] = { "GUID", "SID", NULL };
1782 enum ndr_err_code ndr_err;
1783 struct GUID guid;
1784 struct dom_sid sid;
1785 const DATA_BLOB *sid_blob;
1786 struct dsdb_dn *dsdb_dn;
1787 struct ldb_dn *dn;
1788 char *dn_str;
1789 struct ldb_dn *dn2;
1790 char *dn2_str;
1791 int num_components;
1792 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1793 NTSTATUS status;
1795 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1797 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1798 return WERR_FOOBAR;
1801 dsdb_dn = dsdb_dn_parse(tmp_ctx, ctx->ldb, val,
1802 attr->syntax->ldap_oid);
1803 if (!dsdb_dn) {
1804 talloc_free(tmp_ctx);
1805 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1807 dn = dsdb_dn->dn;
1809 dn2 = ldb_dn_copy(tmp_ctx, dn);
1810 if (dn == NULL) {
1811 talloc_free(tmp_ctx);
1812 return WERR_NOMEM;
1815 num_components = ldb_dn_get_comp_num(dn);
1817 status = dsdb_get_extended_dn_guid(dn, &guid, "GUID");
1818 if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1819 num_components++;
1820 } else if (!NT_STATUS_IS_OK(status)) {
1821 talloc_free(tmp_ctx);
1822 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1825 sid_blob = ldb_dn_get_extended_component(dn, "SID");
1826 if (sid_blob) {
1827 num_components++;
1828 ndr_err = ndr_pull_struct_blob_all(sid_blob,
1829 tmp_ctx,
1830 &sid,
1831 (ndr_pull_flags_fn_t)ndr_pull_dom_sid);
1832 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1833 talloc_free(tmp_ctx);
1834 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1838 /* Do not allow links to the RootDSE */
1839 if (num_components == 0) {
1840 talloc_free(tmp_ctx);
1841 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1845 * We need to check that only "GUID" and "SID" are
1846 * specified as extended components, we do that
1847 * by comparing the dn's after removing all components
1848 * from one dn and only the allowed subset from the other
1849 * one.
1851 ldb_dn_extended_filter(dn, extended_list);
1853 dn_str = ldb_dn_get_extended_linearized(tmp_ctx, dn, 0);
1854 if (dn_str == NULL) {
1855 talloc_free(tmp_ctx);
1856 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1858 dn2_str = ldb_dn_get_extended_linearized(tmp_ctx, dn2, 0);
1859 if (dn2_str == NULL) {
1860 talloc_free(tmp_ctx);
1861 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1864 if (strcmp(dn_str, dn2_str) != 0) {
1865 talloc_free(tmp_ctx);
1866 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1869 *_dsdb_dn = talloc_move(mem_ctx, &dsdb_dn);
1870 talloc_free(tmp_ctx);
1871 return WERR_OK;
1874 static WERROR dsdb_syntax_DN_validate_ldb(const struct dsdb_syntax_ctx *ctx,
1875 const struct dsdb_attribute *attr,
1876 const struct ldb_message_element *in)
1878 unsigned int i;
1880 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
1881 return WERR_FOOBAR;
1884 for (i=0; i < in->num_values; i++) {
1885 WERROR status;
1886 struct dsdb_dn *dsdb_dn;
1887 TALLOC_CTX *tmp_ctx = talloc_new(ctx->ldb);
1888 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1890 status = dsdb_syntax_DN_validate_one_val(ctx,
1891 attr,
1892 &in->values[i],
1893 tmp_ctx, &dsdb_dn);
1894 if (!W_ERROR_IS_OK(status)) {
1895 talloc_free(tmp_ctx);
1896 return status;
1899 if (dsdb_dn->dn_format != DSDB_NORMAL_DN) {
1900 talloc_free(tmp_ctx);
1901 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
1904 talloc_free(tmp_ctx);
1907 return WERR_OK;
1910 static WERROR dsdb_syntax_DN_BINARY_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
1911 const struct dsdb_attribute *attr,
1912 const struct drsuapi_DsReplicaAttribute *in,
1913 TALLOC_CTX *mem_ctx,
1914 struct ldb_message_element *out)
1916 unsigned int i;
1917 int ret;
1919 out->flags = 0;
1920 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
1921 W_ERROR_HAVE_NO_MEMORY(out->name);
1923 out->num_values = in->value_ctr.num_values;
1924 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
1925 W_ERROR_HAVE_NO_MEMORY(out->values);
1927 for (i=0; i < out->num_values; i++) {
1928 struct drsuapi_DsReplicaObjectIdentifier3Binary id3;
1929 enum ndr_err_code ndr_err;
1930 DATA_BLOB guid_blob;
1931 struct ldb_dn *dn;
1932 struct dsdb_dn *dsdb_dn;
1933 NTSTATUS status;
1934 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
1935 if (!tmp_ctx) {
1936 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
1939 if (in->value_ctr.values[i].blob == NULL) {
1940 talloc_free(tmp_ctx);
1941 return WERR_FOOBAR;
1944 if (in->value_ctr.values[i].blob->length == 0) {
1945 talloc_free(tmp_ctx);
1946 return WERR_FOOBAR;
1950 /* windows sometimes sends an extra two pad bytes here */
1951 ndr_err = ndr_pull_struct_blob(in->value_ctr.values[i].blob,
1952 tmp_ctx, &id3,
1953 (ndr_pull_flags_fn_t)ndr_pull_drsuapi_DsReplicaObjectIdentifier3Binary);
1954 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1955 status = ndr_map_error2ntstatus(ndr_err);
1956 talloc_free(tmp_ctx);
1957 return ntstatus_to_werror(status);
1960 dn = ldb_dn_new(tmp_ctx, ctx->ldb, id3.dn);
1961 if (!dn) {
1962 talloc_free(tmp_ctx);
1963 /* If this fails, it must be out of memory, as it does not do much parsing */
1964 W_ERROR_HAVE_NO_MEMORY(dn);
1967 status = GUID_to_ndr_blob(&id3.guid, tmp_ctx, &guid_blob);
1968 if (!NT_STATUS_IS_OK(status)) {
1969 talloc_free(tmp_ctx);
1970 return ntstatus_to_werror(status);
1973 ret = ldb_dn_set_extended_component(dn, "GUID", &guid_blob);
1974 if (ret != LDB_SUCCESS) {
1975 talloc_free(tmp_ctx);
1976 return WERR_FOOBAR;
1979 talloc_free(guid_blob.data);
1981 if (id3.__ndr_size_sid) {
1982 DATA_BLOB sid_blob;
1983 ndr_err = ndr_push_struct_blob(&sid_blob, tmp_ctx, &id3.sid,
1984 (ndr_push_flags_fn_t)ndr_push_dom_sid);
1985 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
1986 status = ndr_map_error2ntstatus(ndr_err);
1987 talloc_free(tmp_ctx);
1988 return ntstatus_to_werror(status);
1991 ret = ldb_dn_set_extended_component(dn, "SID", &sid_blob);
1992 if (ret != LDB_SUCCESS) {
1993 talloc_free(tmp_ctx);
1994 return WERR_FOOBAR;
1998 /* set binary stuff */
1999 dsdb_dn = dsdb_dn_construct(tmp_ctx, dn, id3.binary, attr->syntax->ldap_oid);
2000 if (!dsdb_dn) {
2001 /* If this fails, it must be out of memory, we know the ldap_oid is valid */
2002 talloc_free(tmp_ctx);
2003 W_ERROR_HAVE_NO_MEMORY(dsdb_dn);
2005 out->values[i] = data_blob_string_const(dsdb_dn_get_extended_linearized(out->values, dsdb_dn, 1));
2006 talloc_free(tmp_ctx);
2009 return WERR_OK;
2012 static WERROR dsdb_syntax_DN_BINARY_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
2013 const struct dsdb_attribute *attr,
2014 const struct ldb_message_element *in,
2015 TALLOC_CTX *mem_ctx,
2016 struct drsuapi_DsReplicaAttribute *out)
2018 unsigned int i;
2019 DATA_BLOB *blobs;
2021 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2022 return WERR_FOOBAR;
2025 out->attid = dsdb_attribute_get_attid(attr,
2026 ctx->is_schema_nc);
2027 out->value_ctr.num_values = in->num_values;
2028 out->value_ctr.values = talloc_array(mem_ctx,
2029 struct drsuapi_DsAttributeValue,
2030 in->num_values);
2031 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
2033 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
2034 W_ERROR_HAVE_NO_MEMORY(blobs);
2036 for (i=0; i < in->num_values; i++) {
2037 struct drsuapi_DsReplicaObjectIdentifier3Binary id3;
2038 enum ndr_err_code ndr_err;
2039 const DATA_BLOB *sid_blob;
2040 struct dsdb_dn *dsdb_dn;
2041 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
2042 NTSTATUS status;
2044 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
2046 out->value_ctr.values[i].blob = &blobs[i];
2048 dsdb_dn = dsdb_dn_parse(tmp_ctx, ctx->ldb, &in->values[i], attr->syntax->ldap_oid);
2050 if (!dsdb_dn) {
2051 talloc_free(tmp_ctx);
2052 return ntstatus_to_werror(NT_STATUS_INVALID_PARAMETER);
2055 ZERO_STRUCT(id3);
2057 status = dsdb_get_extended_dn_guid(dsdb_dn->dn, &id3.guid, "GUID");
2058 if (!NT_STATUS_IS_OK(status) &&
2059 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
2060 talloc_free(tmp_ctx);
2061 return ntstatus_to_werror(status);
2064 sid_blob = ldb_dn_get_extended_component(dsdb_dn->dn, "SID");
2065 if (sid_blob) {
2067 ndr_err = ndr_pull_struct_blob_all(sid_blob,
2068 tmp_ctx, &id3.sid,
2069 (ndr_pull_flags_fn_t)ndr_pull_dom_sid);
2070 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2071 status = ndr_map_error2ntstatus(ndr_err);
2072 talloc_free(tmp_ctx);
2073 return ntstatus_to_werror(status);
2077 id3.dn = ldb_dn_get_linearized(dsdb_dn->dn);
2079 /* get binary stuff */
2080 id3.binary = dsdb_dn->extra_part;
2082 ndr_err = ndr_push_struct_blob(&blobs[i], blobs, &id3, (ndr_push_flags_fn_t)ndr_push_drsuapi_DsReplicaObjectIdentifier3Binary);
2083 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
2084 status = ndr_map_error2ntstatus(ndr_err);
2085 talloc_free(tmp_ctx);
2086 return ntstatus_to_werror(status);
2088 talloc_free(tmp_ctx);
2091 return WERR_OK;
2094 static WERROR dsdb_syntax_DN_BINARY_validate_ldb(const struct dsdb_syntax_ctx *ctx,
2095 const struct dsdb_attribute *attr,
2096 const struct ldb_message_element *in)
2098 unsigned int i;
2100 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2101 return WERR_FOOBAR;
2104 for (i=0; i < in->num_values; i++) {
2105 WERROR status;
2106 struct dsdb_dn *dsdb_dn;
2107 TALLOC_CTX *tmp_ctx = talloc_new(ctx->ldb);
2108 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
2110 status = dsdb_syntax_DN_validate_one_val(ctx,
2111 attr,
2112 &in->values[i],
2113 tmp_ctx, &dsdb_dn);
2114 if (!W_ERROR_IS_OK(status)) {
2115 talloc_free(tmp_ctx);
2116 return status;
2119 if (dsdb_dn->dn_format != DSDB_BINARY_DN) {
2120 talloc_free(tmp_ctx);
2121 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
2124 status = dsdb_syntax_DATA_BLOB_validate_one_val(ctx,
2125 attr,
2126 &dsdb_dn->extra_part);
2127 if (!W_ERROR_IS_OK(status)) {
2128 talloc_free(tmp_ctx);
2129 return status;
2132 talloc_free(tmp_ctx);
2135 return WERR_OK;
2138 static WERROR dsdb_syntax_DN_STRING_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
2139 const struct dsdb_attribute *attr,
2140 const struct drsuapi_DsReplicaAttribute *in,
2141 TALLOC_CTX *mem_ctx,
2142 struct ldb_message_element *out)
2144 return dsdb_syntax_DN_BINARY_drsuapi_to_ldb(ctx,
2145 attr,
2147 mem_ctx,
2148 out);
2151 static WERROR dsdb_syntax_DN_STRING_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
2152 const struct dsdb_attribute *attr,
2153 const struct ldb_message_element *in,
2154 TALLOC_CTX *mem_ctx,
2155 struct drsuapi_DsReplicaAttribute *out)
2157 return dsdb_syntax_DN_BINARY_ldb_to_drsuapi(ctx,
2158 attr,
2160 mem_ctx,
2161 out);
2164 static WERROR dsdb_syntax_DN_STRING_validate_ldb(const struct dsdb_syntax_ctx *ctx,
2165 const struct dsdb_attribute *attr,
2166 const struct ldb_message_element *in)
2168 unsigned int i;
2170 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2171 return WERR_FOOBAR;
2174 for (i=0; i < in->num_values; i++) {
2175 WERROR status;
2176 struct dsdb_dn *dsdb_dn;
2177 TALLOC_CTX *tmp_ctx = talloc_new(ctx->ldb);
2178 W_ERROR_HAVE_NO_MEMORY(tmp_ctx);
2180 status = dsdb_syntax_DN_validate_one_val(ctx,
2181 attr,
2182 &in->values[i],
2183 tmp_ctx, &dsdb_dn);
2184 if (!W_ERROR_IS_OK(status)) {
2185 talloc_free(tmp_ctx);
2186 return status;
2189 if (dsdb_dn->dn_format != DSDB_STRING_DN) {
2190 talloc_free(tmp_ctx);
2191 return WERR_DS_INVALID_ATTRIBUTE_SYNTAX;
2194 status = dsdb_syntax_UNICODE_validate_one_val(ctx,
2195 attr,
2196 &dsdb_dn->extra_part);
2197 if (!W_ERROR_IS_OK(status)) {
2198 talloc_free(tmp_ctx);
2199 return status;
2202 talloc_free(tmp_ctx);
2205 return WERR_OK;
2208 static WERROR dsdb_syntax_PRESENTATION_ADDRESS_drsuapi_to_ldb(const struct dsdb_syntax_ctx *ctx,
2209 const struct dsdb_attribute *attr,
2210 const struct drsuapi_DsReplicaAttribute *in,
2211 TALLOC_CTX *mem_ctx,
2212 struct ldb_message_element *out)
2214 unsigned int i;
2216 out->flags = 0;
2217 out->name = talloc_strdup(mem_ctx, attr->lDAPDisplayName);
2218 W_ERROR_HAVE_NO_MEMORY(out->name);
2220 out->num_values = in->value_ctr.num_values;
2221 out->values = talloc_array(mem_ctx, struct ldb_val, out->num_values);
2222 W_ERROR_HAVE_NO_MEMORY(out->values);
2224 for (i=0; i < out->num_values; i++) {
2225 size_t len;
2226 char *str;
2228 if (in->value_ctr.values[i].blob == NULL) {
2229 return WERR_FOOBAR;
2232 if (in->value_ctr.values[i].blob->length < 4) {
2233 return WERR_FOOBAR;
2236 len = IVAL(in->value_ctr.values[i].blob->data, 0);
2238 if (len != in->value_ctr.values[i].blob->length) {
2239 return WERR_FOOBAR;
2242 if (!convert_string_talloc(out->values, CH_UTF16, CH_UNIX,
2243 in->value_ctr.values[i].blob->data+4,
2244 in->value_ctr.values[i].blob->length-4,
2245 (void **)&str, NULL, false)) {
2246 return WERR_FOOBAR;
2249 out->values[i] = data_blob_string_const(str);
2252 return WERR_OK;
2255 static WERROR dsdb_syntax_PRESENTATION_ADDRESS_ldb_to_drsuapi(const struct dsdb_syntax_ctx *ctx,
2256 const struct dsdb_attribute *attr,
2257 const struct ldb_message_element *in,
2258 TALLOC_CTX *mem_ctx,
2259 struct drsuapi_DsReplicaAttribute *out)
2261 unsigned int i;
2262 DATA_BLOB *blobs;
2264 if (attr->attributeID_id == DRSUAPI_ATTID_INVALID) {
2265 return WERR_FOOBAR;
2268 out->attid = dsdb_attribute_get_attid(attr,
2269 ctx->is_schema_nc);
2270 out->value_ctr.num_values = in->num_values;
2271 out->value_ctr.values = talloc_array(mem_ctx,
2272 struct drsuapi_DsAttributeValue,
2273 in->num_values);
2274 W_ERROR_HAVE_NO_MEMORY(out->value_ctr.values);
2276 blobs = talloc_array(mem_ctx, DATA_BLOB, in->num_values);
2277 W_ERROR_HAVE_NO_MEMORY(blobs);
2279 for (i=0; i < in->num_values; i++) {
2280 uint8_t *data;
2281 size_t ret;
2283 out->value_ctr.values[i].blob = &blobs[i];
2285 if (!convert_string_talloc(blobs, CH_UNIX, CH_UTF16,
2286 in->values[i].data,
2287 in->values[i].length,
2288 (void **)&data, &ret, false)) {
2289 return WERR_FOOBAR;
2292 blobs[i] = data_blob_talloc(blobs, NULL, 4 + ret);
2293 W_ERROR_HAVE_NO_MEMORY(blobs[i].data);
2295 SIVAL(blobs[i].data, 0, 4 + ret);
2297 if (ret > 0) {
2298 memcpy(blobs[i].data + 4, data, ret);
2299 talloc_free(data);
2303 return WERR_OK;
2306 static WERROR dsdb_syntax_PRESENTATION_ADDRESS_validate_ldb(const struct dsdb_syntax_ctx *ctx,
2307 const struct dsdb_attribute *attr,
2308 const struct ldb_message_element *in)
2310 return dsdb_syntax_UNICODE_validate_ldb(ctx,
2311 attr,
2312 in);
2315 #define OMOBJECTCLASS(val) { .length = sizeof(val) - 1, .data = discard_const_p(uint8_t, val) }
2317 static const struct dsdb_syntax dsdb_syntaxes[] = {
2319 .name = "Boolean",
2320 .ldap_oid = LDB_SYNTAX_BOOLEAN,
2321 .oMSyntax = 1,
2322 .attributeSyntax_oid = "2.5.5.8",
2323 .drsuapi_to_ldb = dsdb_syntax_BOOL_drsuapi_to_ldb,
2324 .ldb_to_drsuapi = dsdb_syntax_BOOL_ldb_to_drsuapi,
2325 .validate_ldb = dsdb_syntax_BOOL_validate_ldb,
2326 .equality = "booleanMatch",
2327 .comment = "Boolean"
2329 .name = "Integer",
2330 .ldap_oid = LDB_SYNTAX_INTEGER,
2331 .oMSyntax = 2,
2332 .attributeSyntax_oid = "2.5.5.9",
2333 .drsuapi_to_ldb = dsdb_syntax_INT32_drsuapi_to_ldb,
2334 .ldb_to_drsuapi = dsdb_syntax_INT32_ldb_to_drsuapi,
2335 .validate_ldb = dsdb_syntax_INT32_validate_ldb,
2336 .equality = "integerMatch",
2337 .comment = "Integer",
2338 .ldb_syntax = LDB_SYNTAX_SAMBA_INT32
2340 .name = "String(Octet)",
2341 .ldap_oid = LDB_SYNTAX_OCTET_STRING,
2342 .oMSyntax = 4,
2343 .attributeSyntax_oid = "2.5.5.10",
2344 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2345 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2346 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2347 .equality = "octetStringMatch",
2348 .comment = "Octet String",
2350 .name = "String(Sid)",
2351 .ldap_oid = LDB_SYNTAX_OCTET_STRING,
2352 .oMSyntax = 4,
2353 .attributeSyntax_oid = "2.5.5.17",
2354 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2355 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2356 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2357 .equality = "octetStringMatch",
2358 .comment = "Octet String - Security Identifier (SID)",
2359 .ldb_syntax = LDB_SYNTAX_SAMBA_SID
2361 .name = "String(Object-Identifier)",
2362 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.38",
2363 .oMSyntax = 6,
2364 .attributeSyntax_oid = "2.5.5.2",
2365 .drsuapi_to_ldb = dsdb_syntax_OID_drsuapi_to_ldb,
2366 .ldb_to_drsuapi = dsdb_syntax_OID_ldb_to_drsuapi,
2367 .validate_ldb = dsdb_syntax_OID_validate_ldb,
2368 .equality = "caseIgnoreMatch", /* Would use "objectIdentifierMatch" but most are ldap attribute/class names */
2369 .comment = "OID String",
2370 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING
2372 .name = "Enumeration",
2373 .ldap_oid = LDB_SYNTAX_INTEGER,
2374 .oMSyntax = 10,
2375 .attributeSyntax_oid = "2.5.5.9",
2376 .drsuapi_to_ldb = dsdb_syntax_INT32_drsuapi_to_ldb,
2377 .ldb_to_drsuapi = dsdb_syntax_INT32_ldb_to_drsuapi,
2378 .validate_ldb = dsdb_syntax_INT32_validate_ldb,
2379 .ldb_syntax = LDB_SYNTAX_SAMBA_INT32
2381 /* not used in w2k3 forest */
2382 .name = "String(Numeric)",
2383 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.36",
2384 .oMSyntax = 18,
2385 .attributeSyntax_oid = "2.5.5.6",
2386 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2387 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2388 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2389 .equality = "numericStringMatch",
2390 .substring = "numericStringSubstringsMatch",
2391 .comment = "Numeric String",
2392 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2394 .name = "String(Printable)",
2395 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.44",
2396 .oMSyntax = 19,
2397 .attributeSyntax_oid = "2.5.5.5",
2398 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2399 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2400 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2401 .ldb_syntax = LDB_SYNTAX_OCTET_STRING,
2403 .name = "String(Teletex)",
2404 .ldap_oid = "1.2.840.113556.1.4.905",
2405 .oMSyntax = 20,
2406 .attributeSyntax_oid = "2.5.5.4",
2407 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2408 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2409 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2410 .equality = "caseIgnoreMatch",
2411 .substring = "caseIgnoreSubstringsMatch",
2412 .comment = "Case Insensitive String",
2413 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2415 .name = "String(IA5)",
2416 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.26",
2417 .oMSyntax = 22,
2418 .attributeSyntax_oid = "2.5.5.5",
2419 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2420 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2421 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2422 .equality = "caseExactIA5Match",
2423 .comment = "Printable String",
2424 .ldb_syntax = LDB_SYNTAX_OCTET_STRING,
2426 .name = "String(UTC-Time)",
2427 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.53",
2428 .oMSyntax = 23,
2429 .attributeSyntax_oid = "2.5.5.11",
2430 .drsuapi_to_ldb = dsdb_syntax_NTTIME_UTC_drsuapi_to_ldb,
2431 .ldb_to_drsuapi = dsdb_syntax_NTTIME_UTC_ldb_to_drsuapi,
2432 .validate_ldb = dsdb_syntax_NTTIME_UTC_validate_ldb,
2433 .equality = "generalizedTimeMatch",
2434 .comment = "UTC Time",
2436 .name = "String(Generalized-Time)",
2437 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.24",
2438 .oMSyntax = 24,
2439 .attributeSyntax_oid = "2.5.5.11",
2440 .drsuapi_to_ldb = dsdb_syntax_NTTIME_drsuapi_to_ldb,
2441 .ldb_to_drsuapi = dsdb_syntax_NTTIME_ldb_to_drsuapi,
2442 .validate_ldb = dsdb_syntax_NTTIME_validate_ldb,
2443 .equality = "generalizedTimeMatch",
2444 .comment = "Generalized Time",
2445 .ldb_syntax = LDB_SYNTAX_UTC_TIME,
2447 /* not used in w2k3 schema */
2448 .name = "String(Case Sensitive)",
2449 .ldap_oid = "1.2.840.113556.1.4.1362",
2450 .oMSyntax = 27,
2451 .attributeSyntax_oid = "2.5.5.3",
2452 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2453 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2454 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2455 .equality = "caseExactMatch",
2456 .substring = "caseExactSubstringsMatch",
2457 /* TODO (kim): according to LDAP rfc we should be using same comparison
2458 * as Directory String (LDB_SYNTAX_DIRECTORY_STRING), but case sensitive.
2459 * But according to ms docs binary compare should do the job:
2460 * http://msdn.microsoft.com/en-us/library/cc223200(v=PROT.10).aspx */
2461 .ldb_syntax = LDB_SYNTAX_OCTET_STRING,
2463 .name = "String(Unicode)",
2464 .ldap_oid = LDB_SYNTAX_DIRECTORY_STRING,
2465 .oMSyntax = 64,
2466 .attributeSyntax_oid = "2.5.5.12",
2467 .drsuapi_to_ldb = dsdb_syntax_UNICODE_drsuapi_to_ldb,
2468 .ldb_to_drsuapi = dsdb_syntax_UNICODE_ldb_to_drsuapi,
2469 .validate_ldb = dsdb_syntax_UNICODE_validate_ldb,
2470 .equality = "caseIgnoreMatch",
2471 .substring = "caseIgnoreSubstringsMatch",
2472 .comment = "Directory String",
2474 .name = "Interval/LargeInteger",
2475 .ldap_oid = "1.2.840.113556.1.4.906",
2476 .oMSyntax = 65,
2477 .attributeSyntax_oid = "2.5.5.16",
2478 .drsuapi_to_ldb = dsdb_syntax_INT64_drsuapi_to_ldb,
2479 .ldb_to_drsuapi = dsdb_syntax_INT64_ldb_to_drsuapi,
2480 .validate_ldb = dsdb_syntax_INT64_validate_ldb,
2481 .equality = "integerMatch",
2482 .comment = "Large Integer",
2483 .ldb_syntax = LDB_SYNTAX_INTEGER,
2485 .name = "String(NT-Sec-Desc)",
2486 .ldap_oid = LDB_SYNTAX_SAMBA_SECURITY_DESCRIPTOR,
2487 .oMSyntax = 66,
2488 .attributeSyntax_oid = "2.5.5.15",
2489 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2490 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2491 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2493 .name = "Object(DS-DN)",
2494 .ldap_oid = LDB_SYNTAX_DN,
2495 .oMSyntax = 127,
2496 .oMObjectClass = OMOBJECTCLASS("\x2b\x0c\x02\x87\x73\x1c\x00\x85\x4a"),
2497 .attributeSyntax_oid = "2.5.5.1",
2498 .drsuapi_to_ldb = dsdb_syntax_DN_drsuapi_to_ldb,
2499 .ldb_to_drsuapi = dsdb_syntax_DN_ldb_to_drsuapi,
2500 .validate_ldb = dsdb_syntax_DN_validate_ldb,
2501 .equality = "distinguishedNameMatch",
2502 .comment = "Object(DS-DN) == a DN",
2504 .name = "Object(DN-Binary)",
2505 .ldap_oid = DSDB_SYNTAX_BINARY_DN,
2506 .oMSyntax = 127,
2507 .oMObjectClass = OMOBJECTCLASS("\x2a\x86\x48\x86\xf7\x14\x01\x01\x01\x0b"),
2508 .attributeSyntax_oid = "2.5.5.7",
2509 .drsuapi_to_ldb = dsdb_syntax_DN_BINARY_drsuapi_to_ldb,
2510 .ldb_to_drsuapi = dsdb_syntax_DN_BINARY_ldb_to_drsuapi,
2511 .validate_ldb = dsdb_syntax_DN_BINARY_validate_ldb,
2512 .equality = "octetStringMatch",
2513 .comment = "OctetString: Binary+DN",
2515 /* not used in w2k3 schema, but used in Exchange schema*/
2516 .name = "Object(OR-Name)",
2517 .ldap_oid = DSDB_SYNTAX_OR_NAME,
2518 .oMSyntax = 127,
2519 .oMObjectClass = OMOBJECTCLASS("\x56\x06\x01\x02\x05\x0b\x1D"),
2520 .attributeSyntax_oid = "2.5.5.7",
2521 .drsuapi_to_ldb = dsdb_syntax_DN_BINARY_drsuapi_to_ldb,
2522 .ldb_to_drsuapi = dsdb_syntax_DN_BINARY_ldb_to_drsuapi,
2523 .validate_ldb = dsdb_syntax_DN_BINARY_validate_ldb,
2524 .equality = "caseIgnoreMatch",
2525 .ldb_syntax = LDB_SYNTAX_DN,
2528 * TODO: verify if DATA_BLOB is correct here...!
2530 * repsFrom and repsTo are the only attributes using
2531 * this attribute syntax, but they're not replicated...
2533 .name = "Object(Replica-Link)",
2534 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.40",
2535 .oMSyntax = 127,
2536 .oMObjectClass = OMOBJECTCLASS("\x2a\x86\x48\x86\xf7\x14\x01\x01\x01\x06"),
2537 .attributeSyntax_oid = "2.5.5.10",
2538 .drsuapi_to_ldb = dsdb_syntax_DATA_BLOB_drsuapi_to_ldb,
2539 .ldb_to_drsuapi = dsdb_syntax_DATA_BLOB_ldb_to_drsuapi,
2540 .validate_ldb = dsdb_syntax_DATA_BLOB_validate_ldb,
2542 .name = "Object(Presentation-Address)",
2543 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.43",
2544 .oMSyntax = 127,
2545 .oMObjectClass = OMOBJECTCLASS("\x2b\x0c\x02\x87\x73\x1c\x00\x85\x5c"),
2546 .attributeSyntax_oid = "2.5.5.13",
2547 .drsuapi_to_ldb = dsdb_syntax_PRESENTATION_ADDRESS_drsuapi_to_ldb,
2548 .ldb_to_drsuapi = dsdb_syntax_PRESENTATION_ADDRESS_ldb_to_drsuapi,
2549 .validate_ldb = dsdb_syntax_PRESENTATION_ADDRESS_validate_ldb,
2550 .comment = "Presentation Address",
2551 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2553 /* not used in w2k3 schema */
2554 .name = "Object(Access-Point)",
2555 .ldap_oid = "1.3.6.1.4.1.1466.115.121.1.2",
2556 .oMSyntax = 127,
2557 .oMObjectClass = OMOBJECTCLASS("\x2b\x0c\x02\x87\x73\x1c\x00\x85\x3e"),
2558 .attributeSyntax_oid = "2.5.5.14",
2559 .drsuapi_to_ldb = dsdb_syntax_FOOBAR_drsuapi_to_ldb,
2560 .ldb_to_drsuapi = dsdb_syntax_FOOBAR_ldb_to_drsuapi,
2561 .validate_ldb = dsdb_syntax_FOOBAR_validate_ldb,
2562 .ldb_syntax = LDB_SYNTAX_DIRECTORY_STRING,
2564 /* not used in w2k3 schema */
2565 .name = "Object(DN-String)",
2566 .ldap_oid = DSDB_SYNTAX_STRING_DN,
2567 .oMSyntax = 127,
2568 .oMObjectClass = OMOBJECTCLASS("\x2a\x86\x48\x86\xf7\x14\x01\x01\x01\x0c"),
2569 .attributeSyntax_oid = "2.5.5.14",
2570 .drsuapi_to_ldb = dsdb_syntax_DN_STRING_drsuapi_to_ldb,
2571 .ldb_to_drsuapi = dsdb_syntax_DN_STRING_ldb_to_drsuapi,
2572 .validate_ldb = dsdb_syntax_DN_STRING_validate_ldb,
2573 .equality = "octetStringMatch",
2574 .comment = "OctetString: String+DN",
2578 const struct dsdb_syntax *find_syntax_map_by_ad_oid(const char *ad_oid)
2580 unsigned int i;
2581 for (i=0; dsdb_syntaxes[i].ldap_oid; i++) {
2582 if (strcasecmp(ad_oid, dsdb_syntaxes[i].attributeSyntax_oid) == 0) {
2583 return &dsdb_syntaxes[i];
2586 return NULL;
2589 const struct dsdb_syntax *find_syntax_map_by_ad_syntax(int oMSyntax)
2591 unsigned int i;
2592 for (i=0; dsdb_syntaxes[i].ldap_oid; i++) {
2593 if (oMSyntax == dsdb_syntaxes[i].oMSyntax) {
2594 return &dsdb_syntaxes[i];
2597 return NULL;
2600 const struct dsdb_syntax *find_syntax_map_by_standard_oid(const char *standard_oid)
2602 unsigned int i;
2603 for (i=0; dsdb_syntaxes[i].ldap_oid; i++) {
2604 if (strcasecmp(standard_oid, dsdb_syntaxes[i].ldap_oid) == 0) {
2605 return &dsdb_syntaxes[i];
2608 return NULL;
2611 const struct dsdb_syntax *dsdb_syntax_for_attribute(const struct dsdb_attribute *attr)
2613 unsigned int i;
2615 for (i=0; i < ARRAY_SIZE(dsdb_syntaxes); i++) {
2616 if (attr->oMSyntax != dsdb_syntaxes[i].oMSyntax) continue;
2618 if (attr->oMObjectClass.length != dsdb_syntaxes[i].oMObjectClass.length) continue;
2620 if (attr->oMObjectClass.length) {
2621 int ret;
2622 ret = memcmp(attr->oMObjectClass.data,
2623 dsdb_syntaxes[i].oMObjectClass.data,
2624 attr->oMObjectClass.length);
2625 if (ret != 0) continue;
2628 if (strcmp(attr->attributeSyntax_oid, dsdb_syntaxes[i].attributeSyntax_oid) != 0) continue;
2630 return &dsdb_syntaxes[i];
2633 return NULL;
2636 WERROR dsdb_attribute_drsuapi_to_ldb(struct ldb_context *ldb,
2637 const struct dsdb_schema *schema,
2638 const struct dsdb_schema_prefixmap *pfm_remote,
2639 const struct drsuapi_DsReplicaAttribute *in,
2640 TALLOC_CTX *mem_ctx,
2641 struct ldb_message_element *out)
2643 const struct dsdb_attribute *sa;
2644 struct dsdb_syntax_ctx syntax_ctx;
2645 uint32_t attid_local;
2647 /* use default syntax conversion context */
2648 dsdb_syntax_ctx_init(&syntax_ctx, ldb, schema);
2649 syntax_ctx.pfm_remote = pfm_remote;
2651 /* map remote ATTID to local ATTID */
2652 if (!dsdb_syntax_attid_from_remote_attid(&syntax_ctx, mem_ctx, in->attid, &attid_local)) {
2653 DEBUG(0,(__location__ "Error: Can't find local ATTID for 0x%08X\n",
2654 in->attid));
2655 return WERR_FOOBAR;
2658 sa = dsdb_attribute_by_attributeID_id(schema, attid_local);
2659 if (!sa) {
2660 DEBUG(1,(__location__ ": Unknown attributeID_id 0x%08X\n", in->attid));
2661 return WERR_FOOBAR;
2664 return sa->syntax->drsuapi_to_ldb(&syntax_ctx, sa, in, mem_ctx, out);
2667 WERROR dsdb_attribute_ldb_to_drsuapi(struct ldb_context *ldb,
2668 const struct dsdb_schema *schema,
2669 const struct ldb_message_element *in,
2670 TALLOC_CTX *mem_ctx,
2671 struct drsuapi_DsReplicaAttribute *out)
2673 const struct dsdb_attribute *sa;
2674 struct dsdb_syntax_ctx syntax_ctx;
2676 sa = dsdb_attribute_by_lDAPDisplayName(schema, in->name);
2677 if (!sa) {
2678 return WERR_FOOBAR;
2681 /* use default syntax conversion context */
2682 dsdb_syntax_ctx_init(&syntax_ctx, ldb, schema);
2684 return sa->syntax->ldb_to_drsuapi(&syntax_ctx, sa, in, mem_ctx, out);