3 * Copyright 1999-2002 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * schema.c: parsing routines used by servers and clients to process
14 #include <ac/stdlib.h>
16 #include <ac/string.h>
21 #include <ldap_schema.h>
24 choose_name( char *names[], const char *fallback )
26 return( (names != NULL && names[0] != NULL) ? names[0] : fallback );
30 ldap_syntax2name( LDAPSyntax * syn )
32 return( syn->syn_oid );
36 ldap_matchingrule2name( LDAPMatchingRule * mr )
38 return( choose_name( mr->mr_names, mr->mr_oid ) );
42 ldap_matchingruleuse2name( LDAPMatchingRuleUse * mru )
44 return( choose_name( mru->mru_names, mru->mru_oid ) );
48 ldap_attributetype2name( LDAPAttributeType * at )
50 return( choose_name( at->at_names, at->at_oid ) );
54 ldap_objectclass2name( LDAPObjectClass * oc )
56 return( choose_name( oc->oc_names, oc->oc_oid ) );
60 ldap_contentrule2name( LDAPContentRule * cr )
62 return( choose_name( cr->cr_names, cr->cr_oid ) );
66 * When pretty printing the entities we will be appending to a buffer.
67 * Since checking for overflow, realloc'ing and checking if no error
68 * is extremely boring, we will use a protection layer that will let
69 * us blissfully ignore the error until the end. This layer is
70 * implemented with the help of the next type.
73 typedef struct safe_string {
81 new_safe_string(int size)
85 ss = LDAP_MALLOC(sizeof(safe_string));
89 ss->val = LDAP_MALLOC(size);
103 safe_string_free(safe_string * ss)
112 safe_string_val(safe_string * ss)
114 ss->val[ss->pos] = '\0';
119 safe_strdup(safe_string * ss)
121 char *ret = LDAP_MALLOC(ss->pos+1);
124 AC_MEMCPY(ret, ss->val, ss->pos);
130 append_to_safe_string(safe_string * ss, char * s)
136 * Some runaway process is trying to append to a string that
137 * overflowed and we could not extend.
142 /* We always make sure there is at least one position available */
143 if ( ss->pos + l >= ss->size-1 ) {
145 if ( ss->pos + l >= ss->size-1 ) {
146 ss->size = ss->pos + l + 1;
149 temp = LDAP_REALLOC(ss->val, ss->size);
151 /* Trouble, out of memory */
157 strncpy(&ss->val[ss->pos], s, l);
159 if ( ss->pos > 0 && LDAP_SPACE(ss->val[ss->pos-1]) )
168 print_literal(safe_string *ss, char *s)
170 return(append_to_safe_string(ss,s));
174 print_whsp(safe_string *ss)
177 return(append_to_safe_string(ss,""));
179 return(append_to_safe_string(ss," "));
183 print_numericoid(safe_string *ss, char *s)
186 return(append_to_safe_string(ss,s));
188 return(append_to_safe_string(ss,""));
191 /* This one is identical to print_qdescr */
193 print_qdstring(safe_string *ss, char *s)
196 print_literal(ss,"'");
197 append_to_safe_string(ss,s);
198 print_literal(ss,"'");
199 return(print_whsp(ss));
203 print_qdescr(safe_string *ss, char *s)
206 print_literal(ss,"'");
207 append_to_safe_string(ss,s);
208 print_literal(ss,"'");
209 return(print_whsp(ss));
213 print_qdescrlist(safe_string *ss, char **sa)
218 for (sp=sa; *sp; sp++) {
219 ret = print_qdescr(ss,*sp);
221 /* If the list was empty, we return zero that is potentially
222 * incorrect, but since we will be still appending things, the
223 * overflow will be detected later. Maybe FIX.
229 print_qdescrs(safe_string *ss, char **sa)
231 /* The only way to represent an empty list is as a qdescrlist
232 * so, if the list is empty we treat it as a long list.
233 * Really, this is what the syntax mandates. We should not
234 * be here if the list was empty, but if it happens, a label
235 * has already been output and we cannot undo it.
237 if ( !sa[0] || ( sa[0] && sa[1] ) ) {
239 print_literal(ss,"("/*)*/);
240 print_qdescrlist(ss,sa);
241 print_literal(ss,/*(*/")");
242 return(print_whsp(ss));
244 return(print_qdescr(ss,*sa));
249 print_woid(safe_string *ss, char *s)
252 append_to_safe_string(ss,s);
253 return print_whsp(ss);
257 print_oidlist(safe_string *ss, char **sa)
261 for (sp=sa; *(sp+1); sp++) {
263 print_literal(ss,"$");
265 return(print_woid(ss,*sp));
269 print_oids(safe_string *ss, char **sa)
271 if ( sa[0] && sa[1] ) {
272 print_literal(ss,"("/*)*/);
273 print_oidlist(ss,sa);
275 return(print_literal(ss,/*(*/")"));
277 return(print_woid(ss,*sa));
282 print_noidlen(safe_string *ss, char *s, int l)
287 ret = print_numericoid(ss,s);
289 snprintf(buf, sizeof buf, "{%d}",l);
290 ret = print_literal(ss,buf);
296 print_extensions(safe_string *ss, LDAPSchemaExtensionItem **extensions)
298 LDAPSchemaExtensionItem **ext;
302 for ( ext = extensions; *ext != NULL; ext++ ) {
303 print_literal(ss, (*ext)->lsei_name);
305 /* Should be print_qdstrings */
306 print_qdescrs(ss, (*ext)->lsei_values);
315 ldap_syntax2str( LDAPSyntax * syn )
318 if (ldap_syntax2bv( syn, &bv ))
325 ldap_syntax2bv( LDAPSyntax * syn, struct berval *bv )
329 ss = new_safe_string(256);
333 print_literal(ss,"("/*)*/);
336 print_numericoid(ss, syn->syn_oid);
339 if ( syn->syn_desc ) {
340 print_literal(ss,"DESC");
341 print_qdstring(ss,syn->syn_desc);
346 print_extensions(ss, syn->syn_extensions);
348 print_literal(ss,/*(*/ ")");
350 bv->bv_val = safe_strdup(ss);
351 bv->bv_len = ss->pos;
352 safe_string_free(ss);
357 ldap_matchingrule2str( LDAPMatchingRule * mr )
360 if (ldap_matchingrule2bv( mr, &bv ))
367 ldap_matchingrule2bv( LDAPMatchingRule * mr, struct berval *bv )
371 ss = new_safe_string(256);
375 print_literal(ss,"(" /*)*/);
378 print_numericoid(ss, mr->mr_oid);
381 if ( mr->mr_names ) {
382 print_literal(ss,"NAME");
383 print_qdescrs(ss,mr->mr_names);
387 print_literal(ss,"DESC");
388 print_qdstring(ss,mr->mr_desc);
391 if ( mr->mr_obsolete ) {
392 print_literal(ss, "OBSOLETE");
396 if ( mr->mr_syntax_oid ) {
397 print_literal(ss,"SYNTAX");
399 print_literal(ss, mr->mr_syntax_oid);
405 print_extensions(ss, mr->mr_extensions);
407 print_literal(ss,/*(*/")");
409 bv->bv_val = safe_strdup(ss);
410 bv->bv_len = ss->pos;
411 safe_string_free(ss);
416 ldap_matchingruleuse2str( LDAPMatchingRuleUse * mru )
419 if (ldap_matchingruleuse2bv( mru, &bv ))
426 ldap_matchingruleuse2bv( LDAPMatchingRuleUse * mru, struct berval *bv )
430 ss = new_safe_string(256);
434 print_literal(ss,"(" /*)*/);
437 print_numericoid(ss, mru->mru_oid);
440 if ( mru->mru_names ) {
441 print_literal(ss,"NAME");
442 print_qdescrs(ss,mru->mru_names);
445 if ( mru->mru_desc ) {
446 print_literal(ss,"DESC");
447 print_qdstring(ss,mru->mru_desc);
450 if ( mru->mru_obsolete ) {
451 print_literal(ss, "OBSOLETE");
455 if ( mru->mru_applies_oids ) {
456 print_literal(ss,"APPLIES");
458 print_oids(ss, mru->mru_applies_oids);
464 print_extensions(ss, mru->mru_extensions);
466 print_literal(ss,/*(*/")");
468 bv->bv_val = safe_strdup(ss);
469 bv->bv_len = ss->pos;
470 safe_string_free(ss);
475 ldap_objectclass2str( LDAPObjectClass * oc )
478 if (ldap_objectclass2bv( oc, &bv ))
485 ldap_objectclass2bv( LDAPObjectClass * oc, struct berval *bv )
489 ss = new_safe_string(256);
493 print_literal(ss,"("/*)*/);
496 print_numericoid(ss, oc->oc_oid);
499 if ( oc->oc_names ) {
500 print_literal(ss,"NAME");
501 print_qdescrs(ss,oc->oc_names);
505 print_literal(ss,"DESC");
506 print_qdstring(ss,oc->oc_desc);
509 if ( oc->oc_obsolete ) {
510 print_literal(ss, "OBSOLETE");
514 if ( oc->oc_sup_oids ) {
515 print_literal(ss,"SUP");
517 print_oids(ss,oc->oc_sup_oids);
521 switch (oc->oc_kind) {
522 case LDAP_SCHEMA_ABSTRACT:
523 print_literal(ss,"ABSTRACT");
525 case LDAP_SCHEMA_STRUCTURAL:
526 print_literal(ss,"STRUCTURAL");
528 case LDAP_SCHEMA_AUXILIARY:
529 print_literal(ss,"AUXILIARY");
532 print_literal(ss,"KIND-UNKNOWN");
537 if ( oc->oc_at_oids_must ) {
538 print_literal(ss,"MUST");
540 print_oids(ss,oc->oc_at_oids_must);
544 if ( oc->oc_at_oids_may ) {
545 print_literal(ss,"MAY");
547 print_oids(ss,oc->oc_at_oids_may);
553 print_extensions(ss, oc->oc_extensions);
555 print_literal(ss, /*(*/")");
557 bv->bv_val = safe_strdup(ss);
558 bv->bv_len = ss->pos;
559 safe_string_free(ss);
564 ldap_contentrule2str( LDAPContentRule * cr )
567 if (ldap_contentrule2bv( cr, &bv ))
574 ldap_contentrule2bv( LDAPContentRule * cr, struct berval *bv )
578 ss = new_safe_string(256);
582 print_literal(ss,"("/*)*/);
585 print_numericoid(ss, cr->cr_oid);
588 if ( cr->cr_names ) {
589 print_literal(ss,"NAME");
590 print_qdescrs(ss,cr->cr_names);
594 print_literal(ss,"DESC");
595 print_qdstring(ss,cr->cr_desc);
598 if ( cr->cr_obsolete ) {
599 print_literal(ss, "OBSOLETE");
603 if ( cr->cr_oc_oids_aux ) {
604 print_literal(ss,"AUX");
606 print_oids(ss,cr->cr_oc_oids_aux);
610 if ( cr->cr_at_oids_must ) {
611 print_literal(ss,"MUST");
613 print_oids(ss,cr->cr_at_oids_must);
617 if ( cr->cr_at_oids_may ) {
618 print_literal(ss,"MAY");
620 print_oids(ss,cr->cr_at_oids_may);
624 if ( cr->cr_at_oids_not ) {
625 print_literal(ss,"NOT");
627 print_oids(ss,cr->cr_at_oids_not);
632 print_extensions(ss, cr->cr_extensions);
634 print_literal(ss, /*(*/")");
636 bv->bv_val = safe_strdup(ss);
637 bv->bv_len = ss->pos;
638 safe_string_free(ss);
643 ldap_attributetype2str( LDAPAttributeType * at )
646 if (ldap_attributetype2bv( at, &bv ))
653 ldap_attributetype2bv( LDAPAttributeType * at, struct berval *bv )
657 ss = new_safe_string(256);
661 print_literal(ss,"("/*)*/);
664 print_numericoid(ss, at->at_oid);
667 if ( at->at_names ) {
668 print_literal(ss,"NAME");
669 print_qdescrs(ss,at->at_names);
673 print_literal(ss,"DESC");
674 print_qdstring(ss,at->at_desc);
677 if ( at->at_obsolete ) {
678 print_literal(ss, "OBSOLETE");
682 if ( at->at_sup_oid ) {
683 print_literal(ss,"SUP");
684 print_woid(ss,at->at_sup_oid);
687 if ( at->at_equality_oid ) {
688 print_literal(ss,"EQUALITY");
689 print_woid(ss,at->at_equality_oid);
692 if ( at->at_ordering_oid ) {
693 print_literal(ss,"ORDERING");
694 print_woid(ss,at->at_ordering_oid);
697 if ( at->at_substr_oid ) {
698 print_literal(ss,"SUBSTR");
699 print_woid(ss,at->at_substr_oid);
702 if ( at->at_syntax_oid ) {
703 print_literal(ss,"SYNTAX");
705 print_noidlen(ss,at->at_syntax_oid,at->at_syntax_len);
709 if ( at->at_single_value == LDAP_SCHEMA_YES ) {
710 print_literal(ss,"SINGLE-VALUE");
714 if ( at->at_collective == LDAP_SCHEMA_YES ) {
715 print_literal(ss,"COLLECTIVE");
719 if ( at->at_no_user_mod == LDAP_SCHEMA_YES ) {
720 print_literal(ss,"NO-USER-MODIFICATION");
724 if ( at->at_usage != LDAP_SCHEMA_USER_APPLICATIONS ) {
725 print_literal(ss,"USAGE");
727 switch (at->at_usage) {
728 case LDAP_SCHEMA_DIRECTORY_OPERATION:
729 print_literal(ss,"directoryOperation");
731 case LDAP_SCHEMA_DISTRIBUTED_OPERATION:
732 print_literal(ss,"distributedOperation");
734 case LDAP_SCHEMA_DSA_OPERATION:
735 print_literal(ss,"dSAOperation");
738 print_literal(ss,"UNKNOWN");
745 print_extensions(ss, at->at_extensions);
747 print_literal(ss,/*(*/")");
749 bv->bv_val = safe_strdup(ss);
750 bv->bv_len = ss->pos;
751 safe_string_free(ss);
756 * Now come the parsers. There is one parser for each entity type:
757 * objectclasses, attributetypes, etc.
759 * Each of them is written as a recursive-descent parser, except that
760 * none of them is really recursive. But the idea is kept: there
761 * is one routine per non-terminal that eithers gobbles lexical tokens
762 * or calls lower-level routines, etc.
764 * The scanner is implemented in the routine get_token. Actually,
765 * get_token is more than a scanner and will return tokens that are
766 * in fact non-terminals in the grammar. So you can see the whole
767 * approach as the combination of a low-level bottom-up recognizer
768 * combined with a scanner and a number of top-down parsers. Or just
769 * consider that the real grammars recognized by the parsers are not
770 * those of the standards. As a matter of fact, our parsers are more
771 * liberal than the spec when there is no ambiguity.
773 * The difference is pretty academic (modulo bugs or incorrect
774 * interpretation of the specs).
777 #define TK_NOENDQUOTE -2
778 #define TK_OUTOFMEM -1
780 #define TK_UNEXPCHAR 1
781 #define TK_BAREWORD 2
782 #define TK_QDSTRING 3
783 #define TK_LEFTPAREN 4
784 #define TK_RIGHTPAREN 5
786 #define TK_QDESCR TK_QDSTRING
794 get_token( const char ** sp, char ** token_val )
812 kind = TK_RIGHTPAREN;
823 while ( **sp != '\'' && **sp != '\0' )
825 if ( **sp == '\'' ) {
827 res = LDAP_MALLOC(q-p+1);
837 kind = TK_NOENDQUOTE;
843 while ( !LDAP_SPACE(**sp) &&
851 res = LDAP_MALLOC(q-p+1);
860 /* kind = TK_UNEXPCHAR; */
867 /* Gobble optional whitespace */
869 parse_whsp(const char **sp)
871 while (LDAP_SPACE(**sp))
876 * General note for all parsers: to guarantee the algorithm halts they
877 * must always advance the pointer even when an error is found. For
878 * this one is not that important since an error here is fatal at the
879 * upper layers, but it is a simple strategy that will not get in
883 /* Parse a sequence of dot-separated decimal strings */
885 ldap_int_parse_numericoid(const char **sp, int *code, const int flags)
888 const char * start = *sp;
892 /* Netscape puts the SYNTAX value in quotes (incorrectly) */
893 if ( flags & LDAP_SCHEMA_ALLOW_QUOTED && **sp == '\'' ) {
898 /* Each iteration of this loop gets one decimal string */
900 if ( !LDAP_DIGIT(**sp) ) {
902 * Initial char is not a digit or char after dot is
905 *code = LDAP_SCHERR_NODIGIT;
909 while ( LDAP_DIGIT(**sp) )
913 /* Otherwise, gobble the dot and loop again */
916 /* Now *sp points at the char past the numericoid. Perfect. */
918 if ( flags & LDAP_SCHEMA_ALLOW_QUOTED && quoted ) {
919 if ( **sp == '\'' ) {
922 *code = LDAP_SCHERR_UNEXPTOKEN;
926 if (flags & LDAP_SCHEMA_SKIP) {
929 res = LDAP_MALLOC(len+1);
931 *code = LDAP_SCHERR_OUTOFMEM;
934 strncpy(res,start,len);
940 /* Parse a qdescr or a list of them enclosed in () */
942 parse_qdescrs(const char **sp, int *code)
952 kind = get_token(sp,&sval);
953 if ( kind == TK_LEFTPAREN ) {
954 /* Let's presume there will be at least 2 entries */
956 res = LDAP_CALLOC(3,sizeof(char *));
958 *code = LDAP_SCHERR_OUTOFMEM;
964 kind = get_token(sp,&sval);
965 if ( kind == TK_RIGHTPAREN )
967 if ( kind == TK_QDESCR ) {
968 if ( pos == size-2 ) {
970 res1 = LDAP_REALLOC(res,size*sizeof(char *));
974 *code = LDAP_SCHERR_OUTOFMEM;
985 *code = LDAP_SCHERR_UNEXPTOKEN;
992 } else if ( kind == TK_QDESCR ) {
993 res = LDAP_CALLOC(2,sizeof(char *));
995 *code = LDAP_SCHERR_OUTOFMEM;
1004 *code = LDAP_SCHERR_BADNAME;
1011 parse_woid(const char **sp, int *code)
1017 kind = get_token(sp, &sval);
1018 if ( kind != TK_BAREWORD ) {
1020 *code = LDAP_SCHERR_UNEXPTOKEN;
1027 /* Parse a noidlen */
1029 parse_noidlen(const char **sp, int *code, int *len, int allow_quoted)
1035 /* Netscape puts the SYNTAX value in quotes (incorrectly) */
1036 if ( allow_quoted && **sp == '\'' ) {
1040 sval = ldap_int_parse_numericoid(sp, code, 0);
1044 if ( **sp == '{' /*}*/ ) {
1047 while ( LDAP_DIGIT(**sp) )
1049 if ( **sp != /*{*/ '}' ) {
1050 *code = LDAP_SCHERR_UNEXPTOKEN;
1056 if ( allow_quoted && quoted ) {
1057 if ( **sp == '\'' ) {
1060 *code = LDAP_SCHERR_UNEXPTOKEN;
1069 * Next routine will accept a qdstring in place of an oid if
1070 * allow_quoted is set. This is necessary to interoperate with
1071 * Netscape Directory server that will improperly quote each oid (at
1072 * least those of the descr kind) in the SUP clause.
1075 /* Parse a woid or a $-separated list of them enclosed in () */
1077 parse_oids(const char **sp, int *code, const int allow_quoted)
1087 * Strictly speaking, doing this here accepts whsp before the
1088 * ( at the begining of an oidlist, but this is harmless. Also,
1089 * we are very liberal in what we accept as an OID. Maybe
1093 kind = get_token(sp,&sval);
1094 if ( kind == TK_LEFTPAREN ) {
1095 /* Let's presume there will be at least 2 entries */
1097 res = LDAP_CALLOC(3,sizeof(char *));
1099 *code = LDAP_SCHERR_OUTOFMEM;
1104 kind = get_token(sp,&sval);
1105 if ( kind == TK_BAREWORD ||
1106 ( allow_quoted && kind == TK_QDSTRING ) ) {
1110 *code = LDAP_SCHERR_UNEXPTOKEN;
1117 kind = get_token(sp,&sval);
1118 if ( kind == TK_RIGHTPAREN )
1120 if ( kind == TK_DOLLAR ) {
1122 kind = get_token(sp,&sval);
1123 if ( kind == TK_BAREWORD ||
1125 kind == TK_QDSTRING ) ) {
1126 if ( pos == size-2 ) {
1128 res1 = LDAP_REALLOC(res,size*sizeof(char *));
1132 *code = LDAP_SCHERR_OUTOFMEM;
1140 *code = LDAP_SCHERR_UNEXPTOKEN;
1147 *code = LDAP_SCHERR_UNEXPTOKEN;
1156 } else if ( kind == TK_BAREWORD ||
1157 ( allow_quoted && kind == TK_QDSTRING ) ) {
1158 res = LDAP_CALLOC(2,sizeof(char *));
1161 *code = LDAP_SCHERR_OUTOFMEM;
1170 *code = LDAP_SCHERR_BADNAME;
1176 add_extension(LDAPSchemaExtensionItem ***extensions,
1177 char * name, char ** values)
1180 LDAPSchemaExtensionItem **tmp, *ext;
1182 ext = LDAP_CALLOC(1, sizeof(LDAPSchemaExtensionItem));
1185 ext->lsei_name = name;
1186 ext->lsei_values = values;
1188 if ( !*extensions ) {
1190 LDAP_CALLOC(2, sizeof(LDAPSchemaExtensionItem *));
1195 for ( n=0; (*extensions)[n] != NULL; n++ )
1197 tmp = LDAP_REALLOC(*extensions,
1198 (n+2)*sizeof(LDAPSchemaExtensionItem *));
1203 (*extensions)[n] = ext;
1204 (*extensions)[n+1] = NULL;
1209 free_extensions(LDAPSchemaExtensionItem **extensions)
1211 LDAPSchemaExtensionItem **ext;
1214 for ( ext = extensions; *ext != NULL; ext++ ) {
1215 LDAP_FREE((*ext)->lsei_name);
1216 LDAP_VFREE((*ext)->lsei_values);
1219 LDAP_FREE(extensions);
1224 ldap_syntax_free( LDAPSyntax * syn )
1226 LDAP_FREE(syn->syn_oid);
1227 if (syn->syn_names) LDAP_VFREE(syn->syn_names);
1228 if (syn->syn_desc) LDAP_FREE(syn->syn_desc);
1229 free_extensions(syn->syn_extensions);
1234 ldap_str2syntax( LDAP_CONST char * s,
1236 LDAP_CONST char ** errp,
1237 LDAP_CONST int flags )
1240 const char * ss = s;
1248 *code = LDAP_SCHERR_EMPTY;
1254 syn = LDAP_CALLOC(1,sizeof(LDAPSyntax));
1257 *code = LDAP_SCHERR_OUTOFMEM;
1261 kind = get_token(&ss,&sval);
1262 if ( kind != TK_LEFTPAREN ) {
1264 *code = LDAP_SCHERR_NOLEFTPAREN;
1265 ldap_syntax_free(syn);
1270 syn->syn_oid = ldap_int_parse_numericoid(&ss,code,0);
1271 if ( !syn->syn_oid ) {
1273 ldap_syntax_free(syn);
1279 * Beyond this point we will be liberal and accept the items
1283 kind = get_token(&ss,&sval);
1286 *code = LDAP_SCHERR_NORIGHTPAREN;
1288 ldap_syntax_free(syn);
1293 if ( !strcmp(sval,"NAME") ) {
1296 *code = LDAP_SCHERR_DUPOPT;
1298 ldap_syntax_free(syn);
1302 syn->syn_names = parse_qdescrs(&ss,code);
1303 if ( !syn->syn_names ) {
1304 if ( *code != LDAP_SCHERR_OUTOFMEM )
1305 *code = LDAP_SCHERR_BADNAME;
1307 ldap_syntax_free(syn);
1310 } else if ( !strcmp(sval,"DESC") ) {
1313 *code = LDAP_SCHERR_DUPOPT;
1315 ldap_syntax_free(syn);
1320 kind = get_token(&ss,&sval);
1321 if ( kind != TK_QDSTRING ) {
1322 *code = LDAP_SCHERR_UNEXPTOKEN;
1325 ldap_syntax_free(syn);
1328 syn->syn_desc = sval;
1330 } else if ( sval[0] == 'X' && sval[1] == '-' ) {
1331 /* Should be parse_qdstrings */
1332 ext_vals = parse_qdescrs(&ss, code);
1335 ldap_syntax_free(syn);
1338 if ( add_extension(&syn->syn_extensions,
1340 *code = LDAP_SCHERR_OUTOFMEM;
1343 ldap_syntax_free(syn);
1347 *code = LDAP_SCHERR_UNEXPTOKEN;
1350 ldap_syntax_free(syn);
1355 *code = LDAP_SCHERR_UNEXPTOKEN;
1358 ldap_syntax_free(syn);
1365 ldap_matchingrule_free( LDAPMatchingRule * mr )
1367 LDAP_FREE(mr->mr_oid);
1368 if (mr->mr_names) LDAP_VFREE(mr->mr_names);
1369 if (mr->mr_desc) LDAP_FREE(mr->mr_desc);
1370 if (mr->mr_syntax_oid) LDAP_FREE(mr->mr_syntax_oid);
1371 free_extensions(mr->mr_extensions);
1376 ldap_str2matchingrule( LDAP_CONST char * s,
1378 LDAP_CONST char ** errp,
1379 LDAP_CONST int flags )
1382 const char * ss = s;
1386 int seen_obsolete = 0;
1387 int seen_syntax = 0;
1388 LDAPMatchingRule * mr;
1390 const char * savepos;
1393 *code = LDAP_SCHERR_EMPTY;
1399 mr = LDAP_CALLOC(1,sizeof(LDAPMatchingRule));
1402 *code = LDAP_SCHERR_OUTOFMEM;
1406 kind = get_token(&ss,&sval);
1407 if ( kind != TK_LEFTPAREN ) {
1408 *code = LDAP_SCHERR_NOLEFTPAREN;
1410 ldap_matchingrule_free(mr);
1416 mr->mr_oid = ldap_int_parse_numericoid(&ss,code,flags);
1417 if ( !mr->mr_oid ) {
1418 if ( flags & LDAP_SCHEMA_ALLOW_NO_OID ) {
1421 kind = get_token(&ss,&sval);
1422 if ( kind == TK_BAREWORD ) {
1423 if ( !strcmp(sval, "NAME") ||
1424 !strcmp(sval, "DESC") ||
1425 !strcmp(sval, "OBSOLETE") ||
1426 !strcmp(sval, "SYNTAX") ||
1427 !strncmp(sval, "X-", 2) ) {
1428 /* Missing OID, backtrack */
1431 /* Non-numerical OID, ignore */
1437 ldap_matchingrule_free(mr);
1444 * Beyond this point we will be liberal and accept the items
1448 kind = get_token(&ss,&sval);
1451 *code = LDAP_SCHERR_NORIGHTPAREN;
1453 ldap_matchingrule_free(mr);
1458 if ( !strcmp(sval,"NAME") ) {
1461 *code = LDAP_SCHERR_DUPOPT;
1463 ldap_matchingrule_free(mr);
1467 mr->mr_names = parse_qdescrs(&ss,code);
1468 if ( !mr->mr_names ) {
1469 if ( *code != LDAP_SCHERR_OUTOFMEM )
1470 *code = LDAP_SCHERR_BADNAME;
1472 ldap_matchingrule_free(mr);
1475 } else if ( !strcmp(sval,"DESC") ) {
1478 *code = LDAP_SCHERR_DUPOPT;
1480 ldap_matchingrule_free(mr);
1485 kind = get_token(&ss,&sval);
1486 if ( kind != TK_QDSTRING ) {
1487 *code = LDAP_SCHERR_UNEXPTOKEN;
1490 ldap_matchingrule_free(mr);
1495 } else if ( !strcmp(sval,"OBSOLETE") ) {
1497 if ( seen_obsolete ) {
1498 *code = LDAP_SCHERR_DUPOPT;
1500 ldap_matchingrule_free(mr);
1504 mr->mr_obsolete = LDAP_SCHEMA_YES;
1506 } else if ( !strcmp(sval,"SYNTAX") ) {
1508 if ( seen_syntax ) {
1509 *code = LDAP_SCHERR_DUPOPT;
1511 ldap_matchingrule_free(mr);
1517 ldap_int_parse_numericoid(&ss,code,flags);
1518 if ( !mr->mr_syntax_oid ) {
1520 ldap_matchingrule_free(mr);
1524 } else if ( sval[0] == 'X' && sval[1] == '-' ) {
1525 /* Should be parse_qdstrings */
1526 ext_vals = parse_qdescrs(&ss, code);
1529 ldap_matchingrule_free(mr);
1532 if ( add_extension(&mr->mr_extensions,
1534 *code = LDAP_SCHERR_OUTOFMEM;
1537 ldap_matchingrule_free(mr);
1541 *code = LDAP_SCHERR_UNEXPTOKEN;
1544 ldap_matchingrule_free(mr);
1549 *code = LDAP_SCHERR_UNEXPTOKEN;
1552 ldap_matchingrule_free(mr);
1559 ldap_matchingruleuse_free( LDAPMatchingRuleUse * mru )
1561 LDAP_FREE(mru->mru_oid);
1562 if (mru->mru_names) LDAP_VFREE(mru->mru_names);
1563 if (mru->mru_desc) LDAP_FREE(mru->mru_desc);
1564 if (mru->mru_applies_oids) LDAP_VFREE(mru->mru_applies_oids);
1565 free_extensions(mru->mru_extensions);
1569 LDAPMatchingRuleUse *
1570 ldap_str2matchingruleuse( LDAP_CONST char * s,
1572 LDAP_CONST char ** errp,
1573 LDAP_CONST int flags )
1576 const char * ss = s;
1580 int seen_obsolete = 0;
1581 int seen_applies = 0;
1582 LDAPMatchingRuleUse * mru;
1584 const char * savepos;
1587 *code = LDAP_SCHERR_EMPTY;
1593 mru = LDAP_CALLOC(1,sizeof(LDAPMatchingRuleUse));
1596 *code = LDAP_SCHERR_OUTOFMEM;
1600 kind = get_token(&ss,&sval);
1601 if ( kind != TK_LEFTPAREN ) {
1602 *code = LDAP_SCHERR_NOLEFTPAREN;
1604 ldap_matchingruleuse_free(mru);
1610 mru->mru_oid = ldap_int_parse_numericoid(&ss,code,flags);
1611 if ( !mru->mru_oid ) {
1612 if ( flags & LDAP_SCHEMA_ALLOW_NO_OID ) {
1615 kind = get_token(&ss,&sval);
1616 if ( kind == TK_BAREWORD ) {
1617 if ( !strcmp(sval, "NAME") ||
1618 !strcmp(sval, "DESC") ||
1619 !strcmp(sval, "OBSOLETE") ||
1620 !strcmp(sval, "APPLIES") ||
1621 !strncmp(sval, "X-", 2) ) {
1622 /* Missing OID, backtrack */
1625 /* Non-numerical OID, ignore */
1631 ldap_matchingruleuse_free(mru);
1638 * Beyond this point we will be liberal and accept the items
1642 kind = get_token(&ss,&sval);
1645 *code = LDAP_SCHERR_NORIGHTPAREN;
1647 ldap_matchingruleuse_free(mru);
1652 if ( !strcmp(sval,"NAME") ) {
1655 *code = LDAP_SCHERR_DUPOPT;
1657 ldap_matchingruleuse_free(mru);
1661 mru->mru_names = parse_qdescrs(&ss,code);
1662 if ( !mru->mru_names ) {
1663 if ( *code != LDAP_SCHERR_OUTOFMEM )
1664 *code = LDAP_SCHERR_BADNAME;
1666 ldap_matchingruleuse_free(mru);
1669 } else if ( !strcmp(sval,"DESC") ) {
1672 *code = LDAP_SCHERR_DUPOPT;
1674 ldap_matchingruleuse_free(mru);
1679 kind = get_token(&ss,&sval);
1680 if ( kind != TK_QDSTRING ) {
1681 *code = LDAP_SCHERR_UNEXPTOKEN;
1684 ldap_matchingruleuse_free(mru);
1687 mru->mru_desc = sval;
1689 } else if ( !strcmp(sval,"OBSOLETE") ) {
1691 if ( seen_obsolete ) {
1692 *code = LDAP_SCHERR_DUPOPT;
1694 ldap_matchingruleuse_free(mru);
1698 mru->mru_obsolete = LDAP_SCHEMA_YES;
1700 } else if ( !strcmp(sval,"APPLIES") ) {
1702 if ( seen_applies ) {
1703 *code = LDAP_SCHERR_DUPOPT;
1705 ldap_matchingruleuse_free(mru);
1709 mru->mru_applies_oids = parse_oids(&ss,
1712 if ( !mru->mru_applies_oids ) {
1714 ldap_matchingruleuse_free(mru);
1717 } else if ( sval[0] == 'X' && sval[1] == '-' ) {
1718 /* Should be parse_qdstrings */
1719 ext_vals = parse_qdescrs(&ss, code);
1722 ldap_matchingruleuse_free(mru);
1725 if ( add_extension(&mru->mru_extensions,
1727 *code = LDAP_SCHERR_OUTOFMEM;
1730 ldap_matchingruleuse_free(mru);
1734 *code = LDAP_SCHERR_UNEXPTOKEN;
1737 ldap_matchingruleuse_free(mru);
1742 *code = LDAP_SCHERR_UNEXPTOKEN;
1745 ldap_matchingruleuse_free(mru);
1752 ldap_attributetype_free(LDAPAttributeType * at)
1754 LDAP_FREE(at->at_oid);
1755 if (at->at_names) LDAP_VFREE(at->at_names);
1756 if (at->at_desc) LDAP_FREE(at->at_desc);
1757 if (at->at_sup_oid) LDAP_FREE(at->at_sup_oid);
1758 if (at->at_equality_oid) LDAP_FREE(at->at_equality_oid);
1759 if (at->at_ordering_oid) LDAP_FREE(at->at_ordering_oid);
1760 if (at->at_substr_oid) LDAP_FREE(at->at_substr_oid);
1761 if (at->at_syntax_oid) LDAP_FREE(at->at_syntax_oid);
1762 free_extensions(at->at_extensions);
1767 ldap_str2attributetype( LDAP_CONST char * s,
1769 LDAP_CONST char ** errp,
1770 LDAP_CONST int flags )
1773 const char * ss = s;
1777 int seen_obsolete = 0;
1779 int seen_equality = 0;
1780 int seen_ordering = 0;
1781 int seen_substr = 0;
1782 int seen_syntax = 0;
1784 LDAPAttributeType * at;
1786 const char * savepos;
1789 *code = LDAP_SCHERR_EMPTY;
1795 at = LDAP_CALLOC(1,sizeof(LDAPAttributeType));
1798 *code = LDAP_SCHERR_OUTOFMEM;
1802 kind = get_token(&ss,&sval);
1803 if ( kind != TK_LEFTPAREN ) {
1804 *code = LDAP_SCHERR_NOLEFTPAREN;
1806 ldap_attributetype_free(at);
1811 * Definitions MUST begin with an OID in the numericoid format.
1812 * However, this routine is used by clients to parse the response
1813 * from servers and very well known servers will provide an OID
1814 * in the wrong format or even no OID at all. We do our best to
1815 * extract info from those servers.
1819 at->at_oid = ldap_int_parse_numericoid(&ss,code,0);
1820 if ( !at->at_oid ) {
1821 if ( ( flags & ( LDAP_SCHEMA_ALLOW_NO_OID
1822 | LDAP_SCHEMA_ALLOW_OID_MACRO ) )
1823 && (ss == savepos) ) {
1826 kind = get_token(&ss,&sval);
1827 if ( kind == TK_BAREWORD ) {
1828 if ( !strcmp(sval, "NAME") ||
1829 !strcmp(sval, "DESC") ||
1830 !strcmp(sval, "OBSOLETE") ||
1831 !strcmp(sval, "SUP") ||
1832 !strcmp(sval, "EQUALITY") ||
1833 !strcmp(sval, "ORDERING") ||
1834 !strcmp(sval, "SUBSTR") ||
1835 !strcmp(sval, "SYNTAX") ||
1836 !strcmp(sval, "SINGLE-VALUE") ||
1837 !strcmp(sval, "COLLECTIVE") ||
1838 !strcmp(sval, "NO-USER-MODIFICATION") ||
1839 !strcmp(sval, "USAGE") ||
1840 !strncmp(sval, "X-", 2) ) {
1841 /* Missing OID, backtrack */
1844 & LDAP_SCHEMA_ALLOW_OID_MACRO) {
1845 /* Non-numerical OID ... */
1846 int len = ss-savepos;
1847 at->at_oid = LDAP_MALLOC(len+1);
1848 strncpy(at->at_oid, savepos, len);
1849 at->at_oid[len] = 0;
1855 ldap_attributetype_free(at);
1862 * Beyond this point we will be liberal and accept the items
1866 kind = get_token(&ss,&sval);
1869 *code = LDAP_SCHERR_NORIGHTPAREN;
1871 ldap_attributetype_free(at);
1876 if ( !strcmp(sval,"NAME") ) {
1879 *code = LDAP_SCHERR_DUPOPT;
1881 ldap_attributetype_free(at);
1885 at->at_names = parse_qdescrs(&ss,code);
1886 if ( !at->at_names ) {
1887 if ( *code != LDAP_SCHERR_OUTOFMEM )
1888 *code = LDAP_SCHERR_BADNAME;
1890 ldap_attributetype_free(at);
1893 } else if ( !strcmp(sval,"DESC") ) {
1896 *code = LDAP_SCHERR_DUPOPT;
1898 ldap_attributetype_free(at);
1903 kind = get_token(&ss,&sval);
1904 if ( kind != TK_QDSTRING ) {
1905 *code = LDAP_SCHERR_UNEXPTOKEN;
1908 ldap_attributetype_free(at);
1913 } else if ( !strcmp(sval,"OBSOLETE") ) {
1915 if ( seen_obsolete ) {
1916 *code = LDAP_SCHERR_DUPOPT;
1918 ldap_attributetype_free(at);
1922 at->at_obsolete = LDAP_SCHEMA_YES;
1924 } else if ( !strcmp(sval,"SUP") ) {
1927 *code = LDAP_SCHERR_DUPOPT;
1929 ldap_attributetype_free(at);
1933 at->at_sup_oid = parse_woid(&ss,code);
1934 if ( !at->at_sup_oid ) {
1936 ldap_attributetype_free(at);
1939 } else if ( !strcmp(sval,"EQUALITY") ) {
1941 if ( seen_equality ) {
1942 *code = LDAP_SCHERR_DUPOPT;
1944 ldap_attributetype_free(at);
1948 at->at_equality_oid = parse_woid(&ss,code);
1949 if ( !at->at_equality_oid ) {
1951 ldap_attributetype_free(at);
1954 } else if ( !strcmp(sval,"ORDERING") ) {
1956 if ( seen_ordering ) {
1957 *code = LDAP_SCHERR_DUPOPT;
1959 ldap_attributetype_free(at);
1963 at->at_ordering_oid = parse_woid(&ss,code);
1964 if ( !at->at_ordering_oid ) {
1966 ldap_attributetype_free(at);
1969 } else if ( !strcmp(sval,"SUBSTR") ) {
1971 if ( seen_substr ) {
1972 *code = LDAP_SCHERR_DUPOPT;
1974 ldap_attributetype_free(at);
1978 at->at_substr_oid = parse_woid(&ss,code);
1979 if ( !at->at_substr_oid ) {
1981 ldap_attributetype_free(at);
1984 } else if ( !strcmp(sval,"SYNTAX") ) {
1986 if ( seen_syntax ) {
1987 *code = LDAP_SCHERR_DUPOPT;
1989 ldap_attributetype_free(at);
2000 if ( !at->at_syntax_oid ) {
2001 if ( flags & LDAP_SCHEMA_ALLOW_OID_MACRO ) {
2002 kind = get_token(&ss,&sval);
2003 if (kind == TK_BAREWORD)
2005 char *sp = strchr(sval, '{');
2006 at->at_syntax_oid = sval;
2010 at->at_syntax_len = atoi(sp);
2011 while ( LDAP_DIGIT(*sp) )
2014 *code = LDAP_SCHERR_UNEXPTOKEN;
2016 ldap_attributetype_free(at);
2023 ldap_attributetype_free(at);
2028 } else if ( !strcmp(sval,"SINGLE-VALUE") ) {
2030 if ( at->at_single_value ) {
2031 *code = LDAP_SCHERR_DUPOPT;
2033 ldap_attributetype_free(at);
2036 at->at_single_value = LDAP_SCHEMA_YES;
2038 } else if ( !strcmp(sval,"COLLECTIVE") ) {
2040 if ( at->at_collective ) {
2041 *code = LDAP_SCHERR_DUPOPT;
2043 ldap_attributetype_free(at);
2046 at->at_collective = LDAP_SCHEMA_YES;
2048 } else if ( !strcmp(sval,"NO-USER-MODIFICATION") ) {
2050 if ( at->at_no_user_mod ) {
2051 *code = LDAP_SCHERR_DUPOPT;
2053 ldap_attributetype_free(at);
2056 at->at_no_user_mod = LDAP_SCHEMA_YES;
2058 } else if ( !strcmp(sval,"USAGE") ) {
2061 *code = LDAP_SCHERR_DUPOPT;
2063 ldap_attributetype_free(at);
2068 kind = get_token(&ss,&sval);
2069 if ( kind != TK_BAREWORD ) {
2070 *code = LDAP_SCHERR_UNEXPTOKEN;
2073 ldap_attributetype_free(at);
2076 if ( !strcasecmp(sval,"userApplications") )
2078 LDAP_SCHEMA_USER_APPLICATIONS;
2079 else if ( !strcasecmp(sval,"directoryOperation") )
2081 LDAP_SCHEMA_DIRECTORY_OPERATION;
2082 else if ( !strcasecmp(sval,"distributedOperation") )
2084 LDAP_SCHEMA_DISTRIBUTED_OPERATION;
2085 else if ( !strcasecmp(sval,"dSAOperation") )
2087 LDAP_SCHEMA_DSA_OPERATION;
2089 *code = LDAP_SCHERR_UNEXPTOKEN;
2092 ldap_attributetype_free(at);
2097 } else if ( sval[0] == 'X' && sval[1] == '-' ) {
2098 /* Should be parse_qdstrings */
2099 ext_vals = parse_qdescrs(&ss, code);
2102 ldap_attributetype_free(at);
2105 if ( add_extension(&at->at_extensions,
2107 *code = LDAP_SCHERR_OUTOFMEM;
2110 ldap_attributetype_free(at);
2114 *code = LDAP_SCHERR_UNEXPTOKEN;
2117 ldap_attributetype_free(at);
2122 *code = LDAP_SCHERR_UNEXPTOKEN;
2125 ldap_attributetype_free(at);
2132 ldap_objectclass_free(LDAPObjectClass * oc)
2134 LDAP_FREE(oc->oc_oid);
2135 if (oc->oc_names) LDAP_VFREE(oc->oc_names);
2136 if (oc->oc_desc) LDAP_FREE(oc->oc_desc);
2137 if (oc->oc_sup_oids) LDAP_VFREE(oc->oc_sup_oids);
2138 if (oc->oc_at_oids_must) LDAP_VFREE(oc->oc_at_oids_must);
2139 if (oc->oc_at_oids_may) LDAP_VFREE(oc->oc_at_oids_may);
2140 free_extensions(oc->oc_extensions);
2145 ldap_str2objectclass( LDAP_CONST char * s,
2147 LDAP_CONST char ** errp,
2148 LDAP_CONST int flags )
2151 const char * ss = s;
2155 int seen_obsolete = 0;
2160 LDAPObjectClass * oc;
2162 const char * savepos;
2165 *code = LDAP_SCHERR_EMPTY;
2171 oc = LDAP_CALLOC(1,sizeof(LDAPObjectClass));
2174 *code = LDAP_SCHERR_OUTOFMEM;
2177 oc->oc_kind = LDAP_SCHEMA_STRUCTURAL;
2179 kind = get_token(&ss,&sval);
2180 if ( kind != TK_LEFTPAREN ) {
2181 *code = LDAP_SCHERR_NOLEFTPAREN;
2183 ldap_objectclass_free(oc);
2188 * Definitions MUST begin with an OID in the numericoid format.
2189 * However, this routine is used by clients to parse the response
2190 * from servers and very well known servers will provide an OID
2191 * in the wrong format or even no OID at all. We do our best to
2192 * extract info from those servers.
2196 oc->oc_oid = ldap_int_parse_numericoid(&ss,code,0);
2197 if ( !oc->oc_oid ) {
2198 if ( (flags & LDAP_SCHEMA_ALLOW_ALL) && (ss == savepos) ) {
2201 kind = get_token(&ss,&sval);
2202 if ( kind == TK_BAREWORD ) {
2203 if ( !strcmp(sval, "NAME") ||
2204 !strcmp(sval, "DESC") ||
2205 !strcmp(sval, "OBSOLETE") ||
2206 !strcmp(sval, "SUP") ||
2207 !strcmp(sval, "ABSTRACT") ||
2208 !strcmp(sval, "STRUCTURAL") ||
2209 !strcmp(sval, "AUXILIARY") ||
2210 !strcmp(sval, "MUST") ||
2211 !strcmp(sval, "MAY") ||
2212 !strncmp(sval, "X-", 2) ) {
2213 /* Missing OID, backtrack */
2216 LDAP_SCHEMA_ALLOW_OID_MACRO ) {
2217 /* Non-numerical OID, ignore */
2218 int len = ss-savepos;
2219 oc->oc_oid = LDAP_MALLOC(len+1);
2220 strncpy(oc->oc_oid, savepos, len);
2221 oc->oc_oid[len] = 0;
2227 ldap_objectclass_free(oc);
2234 * Beyond this point we will be liberal an accept the items
2238 kind = get_token(&ss,&sval);
2241 *code = LDAP_SCHERR_NORIGHTPAREN;
2243 ldap_objectclass_free(oc);
2248 if ( !strcmp(sval,"NAME") ) {
2251 *code = LDAP_SCHERR_DUPOPT;
2253 ldap_objectclass_free(oc);
2257 oc->oc_names = parse_qdescrs(&ss,code);
2258 if ( !oc->oc_names ) {
2259 if ( *code != LDAP_SCHERR_OUTOFMEM )
2260 *code = LDAP_SCHERR_BADNAME;
2262 ldap_objectclass_free(oc);
2265 } else if ( !strcmp(sval,"DESC") ) {
2268 *code = LDAP_SCHERR_DUPOPT;
2270 ldap_objectclass_free(oc);
2275 kind = get_token(&ss,&sval);
2276 if ( kind != TK_QDSTRING ) {
2277 *code = LDAP_SCHERR_UNEXPTOKEN;
2280 ldap_objectclass_free(oc);
2285 } else if ( !strcmp(sval,"OBSOLETE") ) {
2287 if ( seen_obsolete ) {
2288 *code = LDAP_SCHERR_DUPOPT;
2290 ldap_objectclass_free(oc);
2294 oc->oc_obsolete = LDAP_SCHEMA_YES;
2296 } else if ( !strcmp(sval,"SUP") ) {
2299 *code = LDAP_SCHERR_DUPOPT;
2301 ldap_objectclass_free(oc);
2305 oc->oc_sup_oids = parse_oids(&ss,
2308 if ( !oc->oc_sup_oids ) {
2310 ldap_objectclass_free(oc);
2313 } else if ( !strcmp(sval,"ABSTRACT") ) {
2316 *code = LDAP_SCHERR_DUPOPT;
2318 ldap_objectclass_free(oc);
2322 oc->oc_kind = LDAP_SCHEMA_ABSTRACT;
2324 } else if ( !strcmp(sval,"STRUCTURAL") ) {
2327 *code = LDAP_SCHERR_DUPOPT;
2329 ldap_objectclass_free(oc);
2333 oc->oc_kind = LDAP_SCHEMA_STRUCTURAL;
2335 } else if ( !strcmp(sval,"AUXILIARY") ) {
2338 *code = LDAP_SCHERR_DUPOPT;
2340 ldap_objectclass_free(oc);
2344 oc->oc_kind = LDAP_SCHEMA_AUXILIARY;
2346 } else if ( !strcmp(sval,"MUST") ) {
2349 *code = LDAP_SCHERR_DUPOPT;
2351 ldap_objectclass_free(oc);
2355 oc->oc_at_oids_must = parse_oids(&ss,code,0);
2356 if ( !oc->oc_at_oids_must ) {
2358 ldap_objectclass_free(oc);
2362 } else if ( !strcmp(sval,"MAY") ) {
2365 *code = LDAP_SCHERR_DUPOPT;
2367 ldap_objectclass_free(oc);
2371 oc->oc_at_oids_may = parse_oids(&ss,code,0);
2372 if ( !oc->oc_at_oids_may ) {
2374 ldap_objectclass_free(oc);
2378 } else if ( sval[0] == 'X' && sval[1] == '-' ) {
2379 /* Should be parse_qdstrings */
2380 ext_vals = parse_qdescrs(&ss, code);
2383 ldap_objectclass_free(oc);
2386 if ( add_extension(&oc->oc_extensions,
2388 *code = LDAP_SCHERR_OUTOFMEM;
2391 ldap_objectclass_free(oc);
2395 *code = LDAP_SCHERR_UNEXPTOKEN;
2398 ldap_objectclass_free(oc);
2403 *code = LDAP_SCHERR_UNEXPTOKEN;
2406 ldap_objectclass_free(oc);
2413 ldap_contentrule_free(LDAPContentRule * cr)
2415 LDAP_FREE(cr->cr_oid);
2416 if (cr->cr_names) LDAP_VFREE(cr->cr_names);
2417 if (cr->cr_desc) LDAP_FREE(cr->cr_desc);
2418 if (cr->cr_oc_oids_aux) LDAP_VFREE(cr->cr_oc_oids_aux);
2419 if (cr->cr_at_oids_must) LDAP_VFREE(cr->cr_at_oids_must);
2420 if (cr->cr_at_oids_may) LDAP_VFREE(cr->cr_at_oids_may);
2421 if (cr->cr_at_oids_not) LDAP_VFREE(cr->cr_at_oids_not);
2422 free_extensions(cr->cr_extensions);
2427 ldap_str2contentrule( LDAP_CONST char * s,
2429 LDAP_CONST char ** errp,
2430 LDAP_CONST int flags )
2433 const char * ss = s;
2437 int seen_obsolete = 0;
2442 LDAPContentRule * cr;
2444 const char * savepos;
2447 *code = LDAP_SCHERR_EMPTY;
2453 cr = LDAP_CALLOC(1,sizeof(LDAPContentRule));
2456 *code = LDAP_SCHERR_OUTOFMEM;
2460 kind = get_token(&ss,&sval);
2461 if ( kind != TK_LEFTPAREN ) {
2462 *code = LDAP_SCHERR_NOLEFTPAREN;
2464 ldap_contentrule_free(cr);
2469 * Definitions MUST begin with an OID in the numericoid format.
2470 * However, this routine is used by clients to parse the response
2471 * from servers and very well known servers will provide an OID
2472 * in the wrong format or even no OID at all. We do our best to
2473 * extract info from those servers.
2477 cr->cr_oid = ldap_int_parse_numericoid(&ss,code,0);
2478 if ( !cr->cr_oid ) {
2479 if ( (flags & LDAP_SCHEMA_ALLOW_ALL) && (ss == savepos) ) {
2482 kind = get_token(&ss,&sval);
2483 if ( kind == TK_BAREWORD ) {
2484 if ( !strcmp(sval, "NAME") ||
2485 !strcmp(sval, "DESC") ||
2486 !strcmp(sval, "OBSOLETE") ||
2487 !strcmp(sval, "AUX") ||
2488 !strcmp(sval, "MUST") ||
2489 !strcmp(sval, "MAY") ||
2490 !strcmp(sval, "NOT") ||
2491 !strncmp(sval, "X-", 2) ) {
2492 /* Missing OID, backtrack */
2495 LDAP_SCHEMA_ALLOW_OID_MACRO ) {
2496 /* Non-numerical OID, ignore */
2497 int len = ss-savepos;
2498 cr->cr_oid = LDAP_MALLOC(len+1);
2499 strncpy(cr->cr_oid, savepos, len);
2500 cr->cr_oid[len] = 0;
2506 ldap_contentrule_free(cr);
2513 * Beyond this point we will be liberal an accept the items
2517 kind = get_token(&ss,&sval);
2520 *code = LDAP_SCHERR_NORIGHTPAREN;
2522 ldap_contentrule_free(cr);
2527 if ( !strcmp(sval,"NAME") ) {
2530 *code = LDAP_SCHERR_DUPOPT;
2532 ldap_contentrule_free(cr);
2536 cr->cr_names = parse_qdescrs(&ss,code);
2537 if ( !cr->cr_names ) {
2538 if ( *code != LDAP_SCHERR_OUTOFMEM )
2539 *code = LDAP_SCHERR_BADNAME;
2541 ldap_contentrule_free(cr);
2544 } else if ( !strcmp(sval,"DESC") ) {
2547 *code = LDAP_SCHERR_DUPOPT;
2549 ldap_contentrule_free(cr);
2554 kind = get_token(&ss,&sval);
2555 if ( kind != TK_QDSTRING ) {
2556 *code = LDAP_SCHERR_UNEXPTOKEN;
2559 ldap_contentrule_free(cr);
2564 } else if ( !strcmp(sval,"OBSOLETE") ) {
2566 if ( seen_obsolete ) {
2567 *code = LDAP_SCHERR_DUPOPT;
2569 ldap_contentrule_free(cr);
2573 cr->cr_obsolete = LDAP_SCHEMA_YES;
2575 } else if ( !strcmp(sval,"AUX") ) {
2578 *code = LDAP_SCHERR_DUPOPT;
2580 ldap_contentrule_free(cr);
2584 cr->cr_oc_oids_aux = parse_oids(&ss,code,0);
2585 if ( !cr->cr_oc_oids_aux ) {
2587 ldap_contentrule_free(cr);
2591 } else if ( !strcmp(sval,"MUST") ) {
2594 *code = LDAP_SCHERR_DUPOPT;
2596 ldap_contentrule_free(cr);
2600 cr->cr_at_oids_must = parse_oids(&ss,code,0);
2601 if ( !cr->cr_at_oids_must ) {
2603 ldap_contentrule_free(cr);
2607 } else if ( !strcmp(sval,"MAY") ) {
2610 *code = LDAP_SCHERR_DUPOPT;
2612 ldap_contentrule_free(cr);
2616 cr->cr_at_oids_may = parse_oids(&ss,code,0);
2617 if ( !cr->cr_at_oids_may ) {
2619 ldap_contentrule_free(cr);
2623 } else if ( !strcmp(sval,"NOT") ) {
2626 *code = LDAP_SCHERR_DUPOPT;
2628 ldap_contentrule_free(cr);
2632 cr->cr_at_oids_not = parse_oids(&ss,code,0);
2633 if ( !cr->cr_at_oids_not ) {
2635 ldap_contentrule_free(cr);
2639 } else if ( sval[0] == 'X' && sval[1] == '-' ) {
2640 /* Should be parse_qdstrings */
2641 ext_vals = parse_qdescrs(&ss, code);
2644 ldap_contentrule_free(cr);
2647 if ( add_extension(&cr->cr_extensions,
2649 *code = LDAP_SCHERR_OUTOFMEM;
2652 ldap_contentrule_free(cr);
2656 *code = LDAP_SCHERR_UNEXPTOKEN;
2659 ldap_contentrule_free(cr);
2664 *code = LDAP_SCHERR_UNEXPTOKEN;
2667 ldap_contentrule_free(cr);
2673 static char *const err2text[] = {
2677 "Missing opening parenthesis",
2678 "Missing closing parenthesis",
2684 "Unexpected end of data"
2688 ldap_scherr2str(int code)
2690 if ( code < 0 || code >= (int)(sizeof(err2text)/sizeof(char *)) ) {
2691 return "Unknown error";
2693 return err2text[code];