]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/config.c
Move the input data exhaustion loop to connection.c from daemon.c
[openldap] / servers / slapd / config.c
index ce402b1c8cc15148490c88ea89942b6ae6b4a4b9..873f2d16c23a411e3c7dad2304142cf976bc5c2c 100644 (file)
@@ -21,7 +21,7 @@
  */
 int            defsize = SLAPD_DEFAULT_SIZELIMIT;
 int            deftime = SLAPD_DEFAULT_TIMELIMIT;
-struct acl     *global_acl = NULL;
+AccessControl  *global_acl = NULL;
 int            global_default_access = ACL_READ;
 char           *replogfile;
 int            global_lastmod;
@@ -45,8 +45,10 @@ read_config( char *fname )
        char    *line, *savefname, *saveline;
        int     cargc, savelineno;
        char    *cargv[MAXARGS];
-       int     lineno, i, rc;
-
+       int     lineno, i;
+#ifdef HAVE_TLS
+       int rc;
+#endif
        struct berval *vals[2];
        struct berval val;
 
@@ -588,42 +590,42 @@ read_config( char *fname )
 #endif /*SLAPD_MODULES*/
 
 #ifdef HAVE_TLS
-               } else if ( !strcasecmp( cargv[0], "SSLProtocol" ) ) {
+               } else if ( !strcasecmp( cargv[0], "TLSProtocol" ) ) {
                        rc = ldap_pvt_tls_set_option( NULL,
                                                      LDAP_OPT_X_TLS_PROTOCOL,
                                                      cargv[1] );
                        if ( rc )
                                return rc;
 
-               } else if ( !strcasecmp( cargv[0], "SSLCipherSuite" ) ) {
+               } else if ( !strcasecmp( cargv[0], "TLSCipherSuite" ) ) {
                        rc = ldap_pvt_tls_set_option( NULL,
                                                      LDAP_OPT_X_TLS_CIPHER_SUITE,
                                                      cargv[1] );
                        if ( rc )
                                return rc;
 
-               } else if ( !strcasecmp( cargv[0], "SSLCertificateFile" ) ) {
+               } else if ( !strcasecmp( cargv[0], "TLSCertificateFile" ) ) {
                        rc = ldap_pvt_tls_set_option( NULL,
                                                      LDAP_OPT_X_TLS_CERTFILE,
                                                      cargv[1] );
                        if ( rc )
                                return rc;
 
-               } else if ( !strcasecmp( cargv[0], "SSLCertificateKeyFile" ) ) {
+               } else if ( !strcasecmp( cargv[0], "TLSCertificateKeyFile" ) ) {
                        rc = ldap_pvt_tls_set_option( NULL,
                                                      LDAP_OPT_X_TLS_KEYFILE,
                                                      cargv[1] );
                        if ( rc )
                                return rc;
 
-               } else if ( !strcasecmp( cargv[0], "SSLCACertificatePath" ) ) {
+               } else if ( !strcasecmp( cargv[0], "TLSCACertificatePath" ) ) {
                        rc = ldap_pvt_tls_set_option( NULL,
                                                      LDAP_OPT_X_TLS_CACERTDIR,
                                                      cargv[1] );
                        if ( rc )
                                return rc;
 
-               } else if ( !strcasecmp( cargv[0], "SSLCACertificateFile" ) ) {
+               } else if ( !strcasecmp( cargv[0], "TLSCACertificateFile" ) ) {
                        rc = ldap_pvt_tls_set_option( NULL,
                                                      LDAP_OPT_X_TLS_CACERTFILE,
                                                      cargv[1] );