version 1.77, 2003/02/28 11:34:35
|
version 1.117, 2006/08/19 03:47:05
|
Line 1
|
Line 1
|
/* $OpenLDAP: pkg/ldap/servers/slapd/root_dse.c,v 1.76 2003/02/25 20:08:48 kurt Exp $ */ |
/* root_dse.c - Provides the Root DSA-Specific Entry */ |
/* root_dse.c - Provides the ROOT DSA-Specific Entry |
/* $OpenLDAP: pkg/ldap/servers/slapd/root_dse.c,v 1.116 2006/05/10 11:03:42 hyc Exp $ */ |
|
/* This work is part of OpenLDAP Software <http://www.openldap.org/>. |
* |
* |
* Copyright 1999-2003 The OpenLDAP Foundation. |
* Copyright 1999-2006 The OpenLDAP Foundation. |
* All rights reserved. |
* All rights reserved. |
* |
* |
* Redistribution and use in source and binary forms are permitted only |
* Redistribution and use in source and binary forms, with or without |
* as authorized by the OpenLDAP Public License. A copy of this |
* modification, are permitted only as authorized by the OpenLDAP |
* license is available at http://www.OpenLDAP.org/license.html or |
* Public License. |
* in file LICENSE in the top-level directory of the distribution. |
* |
|
* A copy of this license is available in the file LICENSE in the |
|
* top-level directory of the distribution or, alternatively, at |
|
* <http://www.OpenLDAP.org/license.html>. |
*/ |
*/ |
|
|
#include "portable.h" |
#include "portable.h" |
Line 21
|
Line 25
|
#include "lber_pvt.h" |
#include "lber_pvt.h" |
|
|
#ifdef LDAP_SLAPI |
#ifdef LDAP_SLAPI |
#include "slapi.h" |
#include "slapi/slapi.h" |
#endif |
#endif |
|
|
static struct berval supportedFeatures[] = { |
static struct berval builtin_supportedFeatures[] = { |
BER_BVC(LDAP_FEATURE_ALL_OPERATIONAL_ATTRS), /* all Operational Attributes ("+") */ |
BER_BVC(LDAP_FEATURE_MODIFY_INCREMENT), /* Modify/increment */ |
BER_BVC(LDAP_FEATURE_OBJECTCLASS_ATTRS), /* OCs in Attributes List */ |
BER_BVC(LDAP_FEATURE_ALL_OP_ATTRS), /* All Op Attrs (+) */ |
BER_BVC(LDAP_FEATURE_ABSOLUTE_FILTERS), /* (&) and (|) search filters */ |
BER_BVC(LDAP_FEATURE_OBJECTCLASS_ATTRS), /* OCs in Attrs List (@class) */ |
BER_BVC(LDAP_FEATURE_LANGUAGE_TAG_OPTIONS), /* Language Tag Options */ |
BER_BVC(LDAP_FEATURE_ABSOLUTE_FILTERS), /* (&) and (|) search filters */ |
BER_BVC(LDAP_FEATURE_LANGUAGE_RANGE_OPTIONS), /* Language Range Options */ |
BER_BVC(LDAP_FEATURE_LANGUAGE_TAG_OPTIONS), /* Language Tag Options */ |
{0,NULL} |
BER_BVC(LDAP_FEATURE_LANGUAGE_RANGE_OPTIONS), /* Language Range Options */ |
|
#ifdef LDAP_DEVEL |
|
BER_BVC(LDAP_FEATURE_SUBORDINATE_SCOPE), /* "children" search scope */ |
|
#endif |
|
BER_BVNULL |
}; |
}; |
|
static struct berval *supportedFeatures; |
|
|
static Entry *usr_attr = NULL; |
static Entry *usr_attr = NULL; |
|
|
|
/* |
|
* allow modules to register functions that muck with the root DSE entry |
|
*/ |
|
|
|
typedef struct entry_info_t { |
|
SLAP_ENTRY_INFO_FN func; |
|
void *arg; |
|
struct entry_info_t *next; |
|
} entry_info_t; |
|
|
|
static entry_info_t *extra_info; |
|
|
|
int |
|
entry_info_register( SLAP_ENTRY_INFO_FN func, void *arg ) |
|
{ |
|
entry_info_t *ei = ch_calloc( 1, sizeof( entry_info_t ) ); |
|
|
|
ei->func = func; |
|
ei->arg = arg; |
|
|
|
ei->next = extra_info; |
|
extra_info = ei; |
|
|
|
return 0; |
|
} |
|
|
|
int |
|
entry_info_unregister( SLAP_ENTRY_INFO_FN func, void *arg ) |
|
{ |
|
entry_info_t **eip; |
|
|
|
for ( eip = &extra_info; *eip != NULL; eip = &(*eip)->next ) { |
|
if ( (*eip)->func == func && (*eip)->arg == arg ) { |
|
entry_info_t *ei = *eip; |
|
|
|
*eip = ei->next; |
|
|
|
ch_free( ei ); |
|
|
|
return 0; |
|
} |
|
} |
|
|
|
return -1; |
|
} |
|
|
|
void |
|
entry_info_destroy( void ) |
|
{ |
|
entry_info_t **eip; |
|
|
|
for ( eip = &extra_info; *eip != NULL; ) { |
|
entry_info_t *ei = *eip; |
|
|
|
eip = &(*eip)->next; |
|
|
|
ch_free( ei ); |
|
} |
|
} |
|
|
|
/* |
|
* Allow modules to register supported features |
|
*/ |
|
|
|
static int |
|
supported_feature_init( void ) |
|
{ |
|
int i; |
|
|
|
if ( supportedFeatures != NULL ) { |
|
return 0; |
|
} |
|
|
|
for ( i = 0; !BER_BVISNULL( &builtin_supportedFeatures[ i ] ); i++ ) |
|
; |
|
|
|
supportedFeatures = ch_calloc( sizeof( struct berval ), i + 1 ); |
|
if ( supportedFeatures == NULL ) { |
|
return -1; |
|
} |
|
|
|
for ( i = 0; !BER_BVISNULL( &builtin_supportedFeatures[ i ] ); i++ ) { |
|
ber_dupbv( &supportedFeatures[ i ], &builtin_supportedFeatures[ i ] ); |
|
} |
|
BER_BVZERO( &supportedFeatures[ i ] ); |
|
|
|
return 0; |
|
} |
|
|
|
int |
|
supported_feature_destroy( void ) |
|
{ |
|
int i; |
|
|
|
if ( supportedFeatures == NULL ) { |
|
return 0; |
|
} |
|
|
|
for ( i = 0; !BER_BVISNULL( &supportedFeatures[ i ] ); i++ ) { |
|
ch_free( supportedFeatures[ i ].bv_val ); |
|
} |
|
|
|
ch_free( supportedFeatures ); |
|
supportedFeatures = NULL; |
|
|
|
return 0; |
|
} |
|
|
|
int |
|
supported_feature_load( struct berval *f ) |
|
{ |
|
struct berval *tmp; |
|
int i; |
|
|
|
supported_feature_init(); |
|
|
|
for ( i = 0; !BER_BVISNULL( &supportedFeatures[ i ] ); i++ ) |
|
; |
|
|
|
tmp = ch_realloc( supportedFeatures, sizeof( struct berval ) * ( i + 2 ) ); |
|
if ( tmp == NULL ) { |
|
return -1; |
|
} |
|
supportedFeatures = tmp; |
|
|
|
ber_dupbv( &supportedFeatures[ i ], f ); |
|
BER_BVZERO( &supportedFeatures[ i + 1 ] ); |
|
|
|
return 0; |
|
} |
|
|
int |
int |
root_dse_info( |
root_dse_info( |
Connection *conn, |
Connection *conn, |
Line 42 root_dse_info(
|
Line 182 root_dse_info(
|
const char **text ) |
const char **text ) |
{ |
{ |
Entry *e; |
Entry *e; |
struct berval vals[2], *bv; |
struct berval val; |
#ifdef SLAP_NVALUES |
#ifdef LDAP_SLAPI |
struct berval nvals[2]; |
struct berval *bv; |
#endif |
#endif |
int i, j; |
int i, j; |
char ** supportedSASLMechanisms; |
char ** supportedSASLMechanisms; |
|
BackendDB *be; |
|
|
AttributeDescription *ad_structuralObjectClass |
AttributeDescription *ad_structuralObjectClass |
= slap_schema.si_ad_structuralObjectClass; |
= slap_schema.si_ad_structuralObjectClass; |
Line 55 root_dse_info(
|
Line 196 root_dse_info(
|
= slap_schema.si_ad_objectClass; |
= slap_schema.si_ad_objectClass; |
AttributeDescription *ad_namingContexts |
AttributeDescription *ad_namingContexts |
= slap_schema.si_ad_namingContexts; |
= slap_schema.si_ad_namingContexts; |
|
#ifdef LDAP_SLAPI |
AttributeDescription *ad_supportedExtension |
AttributeDescription *ad_supportedExtension |
= slap_schema.si_ad_supportedExtension; |
= slap_schema.si_ad_supportedExtension; |
|
#endif |
AttributeDescription *ad_supportedLDAPVersion |
AttributeDescription *ad_supportedLDAPVersion |
= slap_schema.si_ad_supportedLDAPVersion; |
= slap_schema.si_ad_supportedLDAPVersion; |
AttributeDescription *ad_supportedSASLMechanisms |
AttributeDescription *ad_supportedSASLMechanisms |
Line 65 root_dse_info(
|
Line 208 root_dse_info(
|
= slap_schema.si_ad_supportedFeatures; |
= slap_schema.si_ad_supportedFeatures; |
AttributeDescription *ad_monitorContext |
AttributeDescription *ad_monitorContext |
= slap_schema.si_ad_monitorContext; |
= slap_schema.si_ad_monitorContext; |
|
AttributeDescription *ad_configContext |
|
= slap_schema.si_ad_configContext; |
AttributeDescription *ad_ref |
AttributeDescription *ad_ref |
= slap_schema.si_ad_ref; |
= slap_schema.si_ad_ref; |
|
|
vals[1].bv_val = NULL; |
|
#ifdef SLAP_NVALUES |
|
nvals[1].bv_val = NULL; |
|
#endif |
|
|
|
e = (Entry *) SLAP_CALLOC( 1, sizeof(Entry) ); |
e = (Entry *) SLAP_CALLOC( 1, sizeof(Entry) ); |
|
|
if( e == NULL ) { |
if( e == NULL ) { |
#ifdef NEW_LOGGING |
|
LDAP_LOG( OPERATION, ERR, |
|
"root_dse_info: SLAP_CALLOC failed", 0, 0, 0 ); |
|
#else |
|
Debug( LDAP_DEBUG_ANY, |
Debug( LDAP_DEBUG_ANY, |
"root_dse_info: SLAP_CALLOC failed", 0, 0, 0 ); |
"root_dse_info: SLAP_CALLOC failed", 0, 0, 0 ); |
#endif |
|
return LDAP_OTHER; |
return LDAP_OTHER; |
} |
} |
|
|
Line 98 root_dse_info(
|
Line 232 root_dse_info(
|
|
|
e->e_private = NULL; |
e->e_private = NULL; |
|
|
vals[0].bv_val = "top"; |
/* FIXME: is this really needed? */ |
vals[0].bv_len = sizeof("top")-1; |
BER_BVSTR( &val, "top" ); |
#ifdef SLAP_NVALUES |
if( attr_merge_one( e, ad_objectClass, &val, NULL ) ) { |
if( attr_merge( e, ad_objectClass, vals, vals ) ) |
fail: |
#else |
entry_free( e ); |
if( attr_merge( e, ad_objectClass, vals ) ) |
|
#endif |
|
{ |
|
return LDAP_OTHER; |
return LDAP_OTHER; |
} |
} |
|
|
vals[0].bv_val = "OpenLDAProotDSE"; |
BER_BVSTR( &val, "OpenLDAProotDSE" ); |
vals[0].bv_len = sizeof("OpenLDAProotDSE")-1; |
if( attr_merge_one( e, ad_objectClass, &val, NULL ) ) { |
#ifdef SLAP_NVALUES |
goto fail; |
if( attr_merge( e, ad_objectClass, vals, vals ) ) |
} |
#else |
if( attr_merge_one( e, ad_structuralObjectClass, &val, NULL ) ) { |
if( attr_merge( e, ad_objectClass, vals ) ) |
goto fail; |
#endif |
} |
return LDAP_OTHER; |
|
#ifdef SLAP_NVALUES |
|
if( attr_merge( e, ad_structuralObjectClass, vals, vals ) ) |
|
#else |
|
if( attr_merge( e, ad_structuralObjectClass, vals ) ) |
|
#endif |
|
return LDAP_OTHER; |
|
|
|
for ( i = 0; i < nbackends; i++ ) { |
LDAP_STAILQ_FOREACH( be, &backendDB, be_next ) { |
if ( backends[i].be_flags & SLAP_BFLAG_MONITOR ) { |
if ( be->be_suffix == NULL |
vals[0] = backends[i].be_suffix[0]; |
|| be->be_nsuffix == NULL ) { |
#ifdef SLAP_NVALUES |
/* no suffix! */ |
if( attr_merge( e, ad_monitorContext, vals, nvals ) ) |
continue; |
#else |
} |
if( attr_merge( e, ad_monitorContext, vals ) ) |
if ( SLAP_MONITOR( be )) { |
#endif |
if( attr_merge_one( e, ad_monitorContext, |
|
&be->be_suffix[0], |
|
&be->be_nsuffix[0] ) ) |
{ |
{ |
return LDAP_OTHER; |
goto fail; |
} |
} |
continue; |
continue; |
} |
} |
if ( backends[i].be_flags & SLAP_BFLAG_GLUE_SUBORDINATE ) { |
if ( SLAP_CONFIG( be )) { |
|
if( attr_merge_one( e, ad_configContext, |
|
&be->be_suffix[0], |
|
& be->be_nsuffix[0] ) ) |
|
{ |
|
goto fail; |
|
} |
continue; |
continue; |
} |
} |
for ( j = 0; backends[i].be_suffix[j].bv_val != NULL; j++ ) { |
if ( SLAP_GLUE_SUBORDINATE( be ) && !SLAP_GLUE_ADVERTISE( be ) ) { |
vals[0] = backends[i].be_suffix[j]; |
continue; |
#ifdef SLAP_NVALUES |
} |
if( attr_merge( e, ad_namingContexts, vals, NULL ) ) |
for ( j = 0; be->be_suffix[j].bv_val != NULL; j++ ) { |
#else |
if( attr_merge_one( e, ad_namingContexts, |
if( attr_merge( e, ad_namingContexts, vals ) ) |
&be->be_suffix[j], |
#endif |
&be->be_nsuffix[0] ) ) |
{ |
{ |
return LDAP_OTHER; |
goto fail; |
} |
} |
} |
} |
} |
} |
Line 157 root_dse_info(
|
Line 289 root_dse_info(
|
|
|
/* supportedControl */ |
/* supportedControl */ |
if ( controls_root_dse_info( e ) != 0 ) { |
if ( controls_root_dse_info( e ) != 0 ) { |
return LDAP_OTHER; |
goto fail; |
} |
} |
|
|
/* supportedExtension */ |
/* supportedExtension */ |
for ( i=0; (bv = get_supported_extop(i)) != NULL; i++ ) { |
if ( exop_root_dse_info( e ) != 0 ) { |
vals[0] = *bv; |
goto fail; |
#ifdef SLAP_NVALUES |
|
if( attr_merge( e, ad_supportedExtension, vals, NULL ) ) |
|
#else |
|
if( attr_merge( e, ad_supportedExtension, vals ) ) |
|
#endif |
|
{ |
|
return LDAP_OTHER; |
|
} |
|
} |
} |
|
|
#ifdef LDAP_SLAPI |
#ifdef LDAP_SLAPI |
/* netscape supportedExtension */ |
/* netscape supportedExtension */ |
for ( i = 0; (bv = ns_get_supported_extop(i)) != NULL; i++ ) { |
for ( i = 0; (bv = slapi_int_get_supported_extop(i)) != NULL; i++ ) { |
vals[0] = *bv; |
if( attr_merge_one( e, ad_supportedExtension, bv, NULL ) ) { |
#ifdef SLAP_NVALUES |
goto fail; |
if( attr_merge( e, ad_supportedExtension, vals, NULL )) |
|
#else |
|
if( attr_merge( e, ad_supportedExtension, vals )) |
|
#endif |
|
{ |
|
return LDAP_OTHER; |
|
} |
} |
} |
} |
#endif /* LDAP_SLAPI */ |
#endif /* LDAP_SLAPI */ |
|
|
/* supportedFeatures */ |
/* supportedFeatures */ |
#ifdef SLAP_NVALUES |
if ( supportedFeatures == NULL ) { |
if( attr_merge( e, ad_supportedFeatures, |
supported_feature_init(); |
supportedFeatures, supportedFeatures ) ) |
} |
#else |
|
if( attr_merge( e, ad_supportedFeatures, supportedFeatures ) ) |
if( attr_merge( e, ad_supportedFeatures, supportedFeatures, NULL ) ) { |
#endif |
goto fail; |
{ |
|
return LDAP_OTHER; |
|
} |
} |
|
|
/* supportedLDAPVersion */ |
/* supportedLDAPVersion */ |
for ( i=LDAP_VERSION_MIN; i<=LDAP_VERSION_MAX; i++ ) { |
/* don't publish version 2 as we don't really support it |
|
* (even when configured to accept version 2 Bind requests) |
|
* and the value would never be used by true LDAPv2 (or LDAPv3) |
|
* clients. |
|
*/ |
|
for ( i=LDAP_VERSION3; i<=LDAP_VERSION_MAX; i++ ) { |
char buf[BUFSIZ]; |
char buf[BUFSIZ]; |
if (!( global_allows & SLAP_ALLOW_BIND_V2 ) && |
|
( i < LDAP_VERSION3 ) ) |
|
{ |
|
/* version 2 and lower are disallowed */ |
|
continue; |
|
} |
|
snprintf(buf, sizeof buf, "%d", i); |
snprintf(buf, sizeof buf, "%d", i); |
vals[0].bv_val = buf; |
val.bv_val = buf; |
vals[0].bv_len = strlen( vals[0].bv_val ); |
val.bv_len = strlen( val.bv_val ); |
#ifdef SLAP_NVALUES |
if( attr_merge_one( e, ad_supportedLDAPVersion, &val, NULL ) ) { |
if( attr_merge( e, ad_supportedLDAPVersion, vals, NULL ) ) |
goto fail; |
#else |
|
if( attr_merge( e, ad_supportedLDAPVersion, vals ) ) |
|
#endif |
|
{ |
|
return LDAP_OTHER; |
|
} |
} |
} |
} |
|
|
Line 226 root_dse_info(
|
Line 336 root_dse_info(
|
|
|
if( supportedSASLMechanisms != NULL ) { |
if( supportedSASLMechanisms != NULL ) { |
for ( i=0; supportedSASLMechanisms[i] != NULL; i++ ) { |
for ( i=0; supportedSASLMechanisms[i] != NULL; i++ ) { |
vals[0].bv_val = supportedSASLMechanisms[i]; |
val.bv_val = supportedSASLMechanisms[i]; |
vals[0].bv_len = strlen( vals[0].bv_val ); |
val.bv_len = strlen( val.bv_val ); |
#ifdef SLAP_NVALUES |
if( attr_merge_one( e, ad_supportedSASLMechanisms, &val, NULL ) ) { |
if( attr_merge( e, ad_supportedSASLMechanisms, vals, NULL ) ) |
ldap_charray_free( supportedSASLMechanisms ); |
#else |
goto fail; |
if( attr_merge( e, ad_supportedSASLMechanisms, vals ) ) |
|
#endif |
|
{ |
|
return LDAP_OTHER; |
|
} |
} |
} |
} |
ldap_charray_free( supportedSASLMechanisms ); |
ldap_charray_free( supportedSASLMechanisms ); |
} |
} |
|
|
if ( default_referral != NULL ) { |
if ( default_referral != NULL ) { |
#ifdef SLAP_NVALUES |
if( attr_merge( e, ad_ref, default_referral, NULL /* FIXME */ ) ) { |
if( attr_merge( e, ad_ref, default_referral, NULL /* FIXME */ ) ) |
goto fail; |
#else |
|
if( attr_merge( e, ad_ref, default_referral ) ) |
|
#endif |
|
{ |
|
return LDAP_OTHER; |
|
} |
} |
} |
} |
|
|
if( usr_attr != NULL) { |
if( usr_attr != NULL) { |
Attribute *a; |
Attribute *a; |
for( a = usr_attr->e_attrs; a != NULL; a = a->a_next ) { |
for( a = usr_attr->e_attrs; a != NULL; a = a->a_next ) { |
#ifdef SLAP_NVALUES |
if( attr_merge( e, a->a_desc, a->a_vals, |
if( attr_merge( e, a->a_desc, a->a_vals, a->a_nvals ) ) |
(a->a_nvals == a->a_vals) ? NULL : a->a_nvals ) ) |
#else |
|
if( attr_merge( e, a->a_desc, a->a_vals ) ) |
|
#endif |
|
{ |
{ |
return LDAP_OTHER; |
goto fail; |
} |
} |
} |
} |
} |
} |
|
|
|
if ( extra_info ) { |
|
entry_info_t *ei = extra_info; |
|
|
|
for ( ; ei; ei = ei->next ) { |
|
ei->func( ei->arg, e ); |
|
} |
|
} |
|
|
*entry = e; |
*entry = e; |
return LDAP_SUCCESS; |
return LDAP_SUCCESS; |
} |
} |
Line 277 root_dse_info(
|
Line 383 root_dse_info(
|
*/ |
*/ |
int read_root_dse_file( const char *fname ) |
int read_root_dse_file( const char *fname ) |
{ |
{ |
FILE *fp; |
struct LDIFFP *fp; |
int rc = 0, lineno = 0, lmax = 0; |
int rc = 0, lineno = 0, lmax = 0; |
char *buf = NULL; |
char *buf = NULL; |
|
|
if ( (fp = fopen( fname, "r" )) == NULL ) { |
if ( (fp = ldif_open( fname, "r" )) == NULL ) { |
Debug( LDAP_DEBUG_ANY, |
Debug( LDAP_DEBUG_ANY, |
"could not open rootdse attr file \"%s\" - absolute path?\n", |
"could not open rootdse attr file \"%s\" - absolute path?\n", |
fname, 0, 0 ); |
fname, 0, 0 ); |
Line 291 int read_root_dse_file( const char *fnam
|
Line 397 int read_root_dse_file( const char *fnam
|
|
|
usr_attr = (Entry *) SLAP_CALLOC( 1, sizeof(Entry) ); |
usr_attr = (Entry *) SLAP_CALLOC( 1, sizeof(Entry) ); |
if( usr_attr == NULL ) { |
if( usr_attr == NULL ) { |
#ifdef NEW_LOGGING |
|
LDAP_LOG( OPERATION, ERR, |
|
"read_root_dse_file: SLAP_CALLOC failed", 0, 0, 0 ); |
|
#else |
|
Debug( LDAP_DEBUG_ANY, |
Debug( LDAP_DEBUG_ANY, |
"read_root_dse_file: SLAP_CALLOC failed", 0, 0, 0 ); |
"read_root_dse_file: SLAP_CALLOC failed", 0, 0, 0 ); |
#endif |
ldif_close( fp ); |
return LDAP_OTHER; |
return LDAP_OTHER; |
} |
} |
usr_attr->e_attrs = NULL; |
usr_attr->e_attrs = NULL; |
Line 309 int read_root_dse_file( const char *fnam
|
Line 411 int read_root_dse_file( const char *fnam
|
if( e == NULL ) { |
if( e == NULL ) { |
fprintf( stderr, "root_dse: could not parse entry (line=%d)\n", |
fprintf( stderr, "root_dse: could not parse entry (line=%d)\n", |
lineno ); |
lineno ); |
entry_free( usr_attr ); |
rc = EXIT_FAILURE; |
usr_attr = NULL; |
break; |
return EXIT_FAILURE; |
|
} |
} |
|
|
/* make sure the DN is the empty DN */ |
/* make sure the DN is the empty DN */ |
Line 320 int read_root_dse_file( const char *fnam
|
Line 421 int read_root_dse_file( const char *fnam
|
"root_dse: invalid rootDSE - dn=\"%s\" (line=%d)\n", |
"root_dse: invalid rootDSE - dn=\"%s\" (line=%d)\n", |
e->e_dn, lineno ); |
e->e_dn, lineno ); |
entry_free( e ); |
entry_free( e ); |
entry_free( usr_attr ); |
rc = EXIT_FAILURE; |
usr_attr = NULL; |
break; |
return EXIT_FAILURE; |
|
} |
} |
|
|
/* |
/* |
Line 332 int read_root_dse_file( const char *fnam
|
Line 432 int read_root_dse_file( const char *fnam
|
*/ |
*/ |
|
|
for(a = e->e_attrs; a != NULL; a = a->a_next) { |
for(a = e->e_attrs; a != NULL; a = a->a_next) { |
#ifdef SLAP_NVALUES |
if( attr_merge( usr_attr, a->a_desc, a->a_vals, |
if( attr_merge( usr_attr, a->a_desc, a->a_vals, a->a_nvals ) ) |
(a->a_nvals == a->a_vals) ? NULL : a->a_nvals ) ) |
#else |
|
if( attr_merge( usr_attr, a->a_desc, a->a_vals ) ) |
|
#endif |
|
{ |
{ |
return LDAP_OTHER; |
rc = LDAP_OTHER; |
|
break; |
} |
} |
} |
} |
|
|
entry_free( e ); |
entry_free( e ); |
|
if (rc) break; |
|
} |
|
|
|
if (rc) { |
|
entry_free( usr_attr ); |
|
usr_attr = NULL; |
} |
} |
|
|
ch_free( buf ); |
ch_free( buf ); |
|
|
|
ldif_close( fp ); |
|
|
Debug(LDAP_DEBUG_CONFIG, "rootDSE file %s read.\n", fname, 0, 0); |
Debug(LDAP_DEBUG_CONFIG, "rootDSE file %s read.\n", fname, 0, 0); |
return rc; |
return rc; |
} |
} |
|
|
|
int |
|
slap_discover_feature( |
|
const char *uri, |
|
int version, |
|
const char *attr, |
|
const char *val ) |
|
{ |
|
LDAP *ld; |
|
LDAPMessage *res = NULL, *entry; |
|
int rc, i; |
|
struct berval cred = BER_BVC( "" ), |
|
bv_val, |
|
**values = NULL; |
|
char *attrs[ 2 ] = { NULL, NULL }; |
|
|
|
ber_str2bv( val, 0, 0, &bv_val ); |
|
attrs[ 0 ] = (char *) attr; |
|
|
|
rc = ldap_initialize( &ld, uri ); |
|
if ( rc != LDAP_SUCCESS ) { |
|
return rc; |
|
} |
|
|
|
rc = ldap_set_option( ld, LDAP_OPT_PROTOCOL_VERSION, |
|
(const void *)&version ); |
|
if ( rc != LDAP_SUCCESS ) { |
|
goto done; |
|
} |
|
|
|
rc = ldap_sasl_bind_s( ld, "", LDAP_SASL_SIMPLE, |
|
&cred, NULL, NULL, NULL ); |
|
if ( rc != LDAP_SUCCESS ) { |
|
goto done; |
|
} |
|
|
|
rc = ldap_search_ext_s( ld, "", LDAP_SCOPE_BASE, "(objectClass=*)", |
|
attrs, 0, NULL, NULL, NULL, 0, &res ); |
|
if ( rc != LDAP_SUCCESS ) { |
|
goto done; |
|
} |
|
|
|
entry = ldap_first_entry( ld, res ); |
|
if ( entry == NULL ) { |
|
goto done; |
|
} |
|
|
|
values = ldap_get_values_len( ld, entry, attrs[ 0 ] ); |
|
if ( values == NULL ) { |
|
rc = LDAP_NO_SUCH_ATTRIBUTE; |
|
goto done; |
|
} |
|
|
|
for ( i = 0; values[ i ] != NULL; i++ ) { |
|
if ( bvmatch( &bv_val, values[ i ] ) ) { |
|
rc = LDAP_COMPARE_TRUE; |
|
goto done; |
|
} |
|
} |
|
|
|
rc = LDAP_COMPARE_FALSE; |
|
|
|
done:; |
|
if ( values != NULL ) { |
|
ldap_value_free_len( values ); |
|
} |
|
|
|
if ( res != NULL ) { |
|
ldap_msgfree( res ); |
|
} |
|
|
|
ldap_unbind_ext( ld, NULL, NULL ); |
|
|
|
return rc; |
|
} |
|
|