3 * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
11 #include <ac/stdlib.h>
13 #include <ac/socket.h>
14 #include <ac/string.h>
19 #define LDAP_OPT_REBIND_PROC 0x4e814d
20 #define LDAP_OPT_REBIND_PARAMS 0x4e814e
22 static const LDAPAPIFeatureInfo features[] = {
23 #ifdef LDAP_API_FEATURE_X_OPENLDAP
24 { /* OpenLDAP Extensions API Feature */
25 LDAP_FEATURE_INFO_VERSION,
27 LDAP_API_FEATURE_X_OPENLDAP
31 #ifdef LDAP_API_FEATURE_THREAD_SAFE
32 { /* Basic Thread Safe */
33 LDAP_FEATURE_INFO_VERSION,
35 LDAP_API_FEATURE_THREAD_SAFE
38 #ifdef LDAP_API_FEATURE_SESSION_THREAD_SAFE
39 { /* Session Thread Safe */
40 LDAP_FEATURE_INFO_VERSION,
41 "SESSION_THREAD_SAFE",
42 LDAP_API_FEATURE_SESSION_THREAD_SAFE
45 #ifdef LDAP_API_FEATURE_OPERATION_THREAD_SAFE
46 { /* Operation Thread Safe */
47 LDAP_FEATURE_INFO_VERSION,
48 "OPERATION_THREAD_SAFE",
49 LDAP_API_FEATURE_OPERATION_THREAD_SAFE
52 #ifdef LDAP_API_FEATURE_X_OPENLDAP_REENTRANT
53 { /* OpenLDAP Reentrant */
54 LDAP_FEATURE_INFO_VERSION,
55 "X_OPENLDAP_REENTRANT",
56 LDAP_API_FEATURE_X_OPENLDAP_REENTRANT
59 #if defined( LDAP_API_FEATURE_X_OPENLDAP_THREAD_SAFE ) && \
60 defined( LDAP_THREAD_SAFE )
61 { /* OpenLDAP Thread Safe */
62 LDAP_FEATURE_INFO_VERSION,
63 "X_OPENLDAP_THREAD_SAFE",
64 LDAP_API_FEATURE_X_OPENLDAP_THREAD_SAFE
67 #ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_REFERRALS
69 LDAP_FEATURE_INFO_VERSION,
70 "X_OPENLDAP_V2_REFERRALS",
71 LDAP_API_FEATURE_X_OPENLDAP_V2_REFERRALS
83 struct ldapoptions *lo;
85 /* Get pointer to global option structure */
86 lo = LDAP_INT_GLOBAL_OPT();
88 return LDAP_NO_MEMORY;
91 if( lo->ldo_valid != LDAP_INITIALIZED ) {
92 ldap_int_initialize(lo, NULL);
96 assert( LDAP_VALID( ld ) );
98 if( !LDAP_VALID( ld ) ) {
99 return LDAP_OPT_ERROR;
102 lo = &ld->ld_options;
105 if(outvalue == NULL) {
106 /* no place to get to */
107 return LDAP_OPT_ERROR;
111 case LDAP_OPT_API_INFO: {
112 struct ldapapiinfo *info = (struct ldapapiinfo *) outvalue;
115 /* outvalue must point to an apiinfo structure */
116 return LDAP_OPT_ERROR;
119 if(info->ldapai_info_version != LDAP_API_INFO_VERSION) {
120 /* api info version mismatch */
121 info->ldapai_info_version = LDAP_API_INFO_VERSION;
122 return LDAP_OPT_ERROR;
125 info->ldapai_api_version = LDAP_API_VERSION;
126 info->ldapai_api_version = LDAP_API_VERSION;
127 info->ldapai_protocol_version = LDAP_VERSION_MAX;
129 if(features[0].ldapaif_name == NULL) {
130 info->ldapai_extensions = NULL;
133 info->ldapai_extensions = LDAP_MALLOC(sizeof(char *) *
134 sizeof(features)/sizeof(LDAPAPIFeatureInfo));
136 for(i=0; features[i].ldapaif_name != NULL; i++) {
137 info->ldapai_extensions[i] =
138 LDAP_STRDUP(features[i].ldapaif_name);
141 info->ldapai_extensions[i] = NULL;
144 info->ldapai_vendor_name = LDAP_STRDUP(LDAP_VENDOR_NAME);
145 info->ldapai_vendor_version = LDAP_VENDOR_VERSION;
147 return LDAP_OPT_SUCCESS;
151 if( ld == NULL || ld->ld_sb == NULL ) {
156 ber_sockbuf_ctrl( ld->ld_sb, LBER_SB_OPT_GET_FD, outvalue );
157 return LDAP_OPT_SUCCESS;
159 case LDAP_OPT_TIMEOUT:
160 /* the caller has to free outvalue ! */
161 if ( ldap_int_timeval_dup( outvalue, lo->ldo_tm_api) != 0 )
163 return LDAP_OPT_ERROR;
165 return LDAP_OPT_SUCCESS;
167 case LDAP_OPT_NETWORK_TIMEOUT:
168 /* the caller has to free outvalue ! */
169 if ( ldap_int_timeval_dup( outvalue, lo->ldo_tm_net ) != 0 )
171 return LDAP_OPT_ERROR;
173 return LDAP_OPT_SUCCESS;
176 * (int *) outvalue = lo->ldo_deref;
177 return LDAP_OPT_SUCCESS;
179 case LDAP_OPT_SIZELIMIT:
180 * (int *) outvalue = lo->ldo_sizelimit;
181 return LDAP_OPT_SUCCESS;
183 case LDAP_OPT_TIMELIMIT:
184 * (int *) outvalue = lo->ldo_timelimit;
185 return LDAP_OPT_SUCCESS;
187 case LDAP_OPT_REFERRALS:
188 * (int *) outvalue = (int) LDAP_BOOL_GET(lo, LDAP_BOOL_REFERRALS);
189 return LDAP_OPT_SUCCESS;
191 case LDAP_OPT_RESTART:
192 * (int *) outvalue = (int) LDAP_BOOL_GET(lo, LDAP_BOOL_RESTART);
193 return LDAP_OPT_SUCCESS;
195 case LDAP_OPT_PROTOCOL_VERSION:
196 * (int *) outvalue = lo->ldo_version;
197 return LDAP_OPT_SUCCESS;
199 case LDAP_OPT_SERVER_CONTROLS:
200 * (LDAPControl ***) outvalue =
201 ldap_controls_dup( lo->ldo_sctrls );
203 return LDAP_OPT_SUCCESS;
205 case LDAP_OPT_CLIENT_CONTROLS:
206 * (LDAPControl ***) outvalue =
207 ldap_controls_dup( lo->ldo_cctrls );
209 return LDAP_OPT_SUCCESS;
211 case LDAP_OPT_HOST_NAME:
212 * (char **) outvalue = ldap_url_list2hosts(lo->ldo_defludp);
213 return LDAP_OPT_SUCCESS;
216 * (char **) outvalue = ldap_url_list2urls(lo->ldo_defludp);
217 return LDAP_OPT_SUCCESS;
219 case LDAP_OPT_ERROR_NUMBER:
224 * (int *) outvalue = ld->ld_errno;
225 return LDAP_OPT_SUCCESS;
227 case LDAP_OPT_ERROR_STRING:
233 if( ld->ld_error == NULL ) {
234 * (char **) outvalue = NULL;
236 * (char **) outvalue = LDAP_STRDUP(ld->ld_error);
239 return LDAP_OPT_SUCCESS;
241 case LDAP_OPT_MATCHED_DN:
247 if( ld->ld_matched == NULL ) {
248 * (char **) outvalue = NULL;
250 * (char **) outvalue = LDAP_STRDUP(ld->ld_matched);
253 return LDAP_OPT_SUCCESS;
255 case LDAP_OPT_API_FEATURE_INFO: {
256 LDAPAPIFeatureInfo *info = (LDAPAPIFeatureInfo *) outvalue;
259 if(info == NULL) return LDAP_OPT_ERROR;
261 if(info->ldapaif_info_version != LDAP_FEATURE_INFO_VERSION) {
262 /* api info version mismatch */
263 info->ldapaif_info_version = LDAP_FEATURE_INFO_VERSION;
264 return LDAP_OPT_ERROR;
267 if(info->ldapaif_name == NULL) return LDAP_OPT_ERROR;
269 for(i=0; features[i].ldapaif_name != NULL; i++) {
270 if(!strcmp(info->ldapaif_name, features[i].ldapaif_name)) {
271 info->ldapaif_version =
272 features[i].ldapaif_version;
273 return LDAP_OPT_SUCCESS;
279 case LDAP_OPT_DEBUG_LEVEL:
280 * (int *) outvalue = lo->ldo_debug;
281 return LDAP_OPT_SUCCESS;
285 if ( ldap_pvt_tls_get_option( ld, option, outvalue ) == 0 ) {
286 return LDAP_OPT_SUCCESS;
289 #ifdef HAVE_CYRUS_SASL
290 if ( ldap_int_sasl_get_option( ld, option, outvalue ) == 0 ) {
291 return LDAP_OPT_SUCCESS;
298 return LDAP_OPT_ERROR;
305 LDAP_CONST void *invalue)
307 struct ldapoptions *lo;
310 /* Get pointer to global option structure */
311 lo = LDAP_INT_GLOBAL_OPT();
313 return LDAP_NO_MEMORY;
317 * The architecture to turn on debugging has a chicken and egg
318 * problem. Thus, we introduce a fix here.
321 if (option == LDAP_OPT_DEBUG_LEVEL)
322 dbglvl = (int *) invalue;
324 if( lo->ldo_valid != LDAP_INITIALIZED ) {
325 ldap_int_initialize(lo, dbglvl);
329 assert( LDAP_VALID( ld ) );
331 if( !LDAP_VALID( ld ) ) {
332 return LDAP_OPT_ERROR;
335 lo = &ld->ld_options;
339 case LDAP_OPT_REFERRALS:
340 if(invalue == LDAP_OPT_OFF) {
341 LDAP_BOOL_CLR(lo, LDAP_BOOL_REFERRALS);
343 LDAP_BOOL_SET(lo, LDAP_BOOL_REFERRALS);
345 return LDAP_OPT_SUCCESS;
347 case LDAP_OPT_RESTART:
348 if(invalue == LDAP_OPT_OFF) {
349 LDAP_BOOL_CLR(lo, LDAP_BOOL_RESTART);
351 LDAP_BOOL_SET(lo, LDAP_BOOL_RESTART);
353 return LDAP_OPT_SUCCESS;
356 /* options which can withstand invalue == NULL */
358 case LDAP_OPT_SERVER_CONTROLS: {
359 LDAPControl *const *controls =
360 (LDAPControl *const *) invalue;
362 ldap_controls_free( lo->ldo_sctrls );
364 if( controls == NULL || *controls == NULL ) {
365 lo->ldo_sctrls = NULL;
366 return LDAP_OPT_SUCCESS;
369 lo->ldo_sctrls = ldap_controls_dup( controls );
371 if(lo->ldo_sctrls == NULL) {
372 /* memory allocation error ? */
375 } return LDAP_OPT_SUCCESS;
377 case LDAP_OPT_CLIENT_CONTROLS: {
378 LDAPControl *const *controls =
379 (LDAPControl *const *) invalue;
381 ldap_controls_free( lo->ldo_cctrls );
383 if( controls == NULL || *controls == NULL ) {
384 lo->ldo_cctrls = NULL;
385 return LDAP_OPT_SUCCESS;
388 lo->ldo_cctrls = ldap_controls_dup( controls );
390 if(lo->ldo_cctrls == NULL) {
391 /* memory allocation error ? */
394 } return LDAP_OPT_SUCCESS;
396 case LDAP_OPT_TIMEOUT: {
397 const struct timeval *tv =
398 (const struct timeval *) invalue;
400 if ( lo->ldo_tm_api != NULL ) {
401 LDAP_FREE( lo->ldo_tm_api );
402 lo->ldo_tm_api = NULL;
405 if ( ldap_int_timeval_dup( &lo->ldo_tm_api, tv ) != 0 ) {
406 return LDAP_OPT_ERROR;
408 } return LDAP_OPT_SUCCESS;
410 case LDAP_OPT_NETWORK_TIMEOUT: {
411 const struct timeval *tv =
412 (const struct timeval *) invalue;
414 if ( lo->ldo_tm_net != NULL ) {
415 LDAP_FREE( lo->ldo_tm_net );
416 lo->ldo_tm_net = NULL;
419 if ( ldap_int_timeval_dup( &lo->ldo_tm_net, tv ) != 0 ) {
420 return LDAP_OPT_ERROR;
422 } return LDAP_OPT_SUCCESS;
424 /* Only accessed from inside this function by ldap_set_rebind_proc() */
425 case LDAP_OPT_REBIND_PROC: {
426 lo->ldo_rebind_proc = (LDAP_REBIND_PROC *)invalue;
427 } return LDAP_OPT_SUCCESS;
428 case LDAP_OPT_REBIND_PARAMS: {
429 lo->ldo_rebind_params = (void *)invalue;
430 } return LDAP_OPT_SUCCESS;
433 if(invalue == NULL) {
434 /* no place to set from */
435 return LDAP_OPT_ERROR;
438 /* options which cannot withstand invalue == NULL */
441 case LDAP_OPT_API_INFO:
447 lo->ldo_deref = * (const int *) invalue;
448 return LDAP_OPT_SUCCESS;
450 case LDAP_OPT_SIZELIMIT:
451 lo->ldo_sizelimit = * (const int *) invalue;
452 return LDAP_OPT_SUCCESS;
454 case LDAP_OPT_TIMELIMIT:
455 lo->ldo_timelimit = * (const int *) invalue;
456 return LDAP_OPT_SUCCESS;
458 case LDAP_OPT_PROTOCOL_VERSION: {
459 int vers = * (const int *) invalue;
460 if (vers < LDAP_VERSION_MIN || vers > LDAP_VERSION_MAX) {
464 lo->ldo_version = vers;
465 } return LDAP_OPT_SUCCESS;
468 case LDAP_OPT_HOST_NAME: {
469 const char *host = (const char *) invalue;
470 LDAPURLDesc *ludlist = NULL;
471 int rc = LDAP_OPT_SUCCESS;
474 rc = ldap_url_parsehosts( &ludlist, host,
475 lo->ldo_defport ? lo->ldo_defport : LDAP_PORT );
477 } else if(ld == NULL) {
479 * must want global default returned
480 * to initial condition.
482 rc = ldap_url_parselist(&ludlist, "ldap://localhost/");
486 * must want the session default
487 * updated to the current global default
489 ludlist = ldap_url_duplist(
490 ldap_int_global_options.ldo_defludp);
495 if (rc == LDAP_OPT_SUCCESS) {
496 if (lo->ldo_defludp != NULL)
497 ldap_free_urllist(lo->ldo_defludp);
498 lo->ldo_defludp = ludlist;
504 const char *urls = (const char *) invalue;
505 LDAPURLDesc *ludlist = NULL;
506 int rc = LDAP_OPT_SUCCESS;
509 rc = ldap_url_parselist(&ludlist, urls);
511 } else if(ld == NULL) {
513 * must want global default returned
514 * to initial condition.
516 rc = ldap_url_parselist(&ludlist, "ldap://localhost/");
520 * must want the session default
521 * updated to the current global default
523 ludlist = ldap_url_duplist(
524 ldap_int_global_options.ldo_defludp);
529 if (rc == LDAP_OPT_SUCCESS) {
530 if (lo->ldo_defludp != NULL)
531 ldap_free_urllist(lo->ldo_defludp);
532 lo->ldo_defludp = ludlist;
537 case LDAP_OPT_ERROR_NUMBER: {
538 int err = * (const int *) invalue;
541 /* need a struct ldap */
546 } return LDAP_OPT_SUCCESS;
548 case LDAP_OPT_ERROR_STRING: {
549 const char *err = (const char *) invalue;
552 /* need a struct ldap */
557 LDAP_FREE(ld->ld_error);
560 ld->ld_error = LDAP_STRDUP(err);
561 } return LDAP_OPT_SUCCESS;
563 case LDAP_OPT_MATCHED_DN: {
564 const char *err = (const char *) invalue;
567 /* need a struct ldap */
571 if( ld->ld_matched ) {
572 LDAP_FREE(ld->ld_matched);
575 ld->ld_matched = LDAP_STRDUP(err);
576 } return LDAP_OPT_SUCCESS;
578 case LDAP_OPT_API_FEATURE_INFO:
582 case LDAP_OPT_DEBUG_LEVEL:
583 lo->ldo_debug = * (const int *) invalue;
584 return LDAP_OPT_SUCCESS;
588 if ( ldap_pvt_tls_set_option( ld, option, (void *)invalue ) == 0 )
589 return LDAP_OPT_SUCCESS;
591 #ifdef HAVE_CYRUS_SASL
592 if ( ldap_int_sasl_set_option( ld, option, (void *)invalue ) == 0 )
593 return LDAP_OPT_SUCCESS;
598 return LDAP_OPT_ERROR;
602 ldap_set_rebind_proc( LDAP *ld, LDAP_REBIND_PROC *proc, void *params )
605 rc = ldap_set_option( ld, LDAP_OPT_REBIND_PROC, (void *)proc );
606 if( rc != LDAP_OPT_SUCCESS ) return rc;
608 rc = ldap_set_option( ld, LDAP_OPT_REBIND_PARAMS, (void *)params );