]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/config.c
ITS#3773 additional fix
[openldap] / servers / slapd / config.c
index 97f98c3a5bb28fde0d7c0d237f1968e76958cd50..b446dcc4ca7ae7705e45f9979ecb8879ecca5b9d 100644 (file)
 #include "slapi/slapi.h"
 #endif
 #include "lutil.h"
-#ifdef HAVE_LIMITS_H
-#include <limits.h>
-#endif /* HAVE_LIMITS_H */
-#ifndef PATH_MAX
-#define PATH_MAX 4096
-#endif /* ! PATH_MAX */
 #include "config.h"
 
 #define ARGS_STEP      512
@@ -84,7 +78,8 @@ static int fp_parse_line(ConfigArgs *c);
 
 static char    *strtok_quote(char *line, char *sep, char **quote_ptr);
 
-int read_config_file(const char *fname, int depth, ConfigArgs *cf);
+int read_config_file(const char *fname, int depth, ConfigArgs *cf,
+       ConfigTable *cft );
 
 ConfigArgs *
 new_config_args( BackendDB *be, const char *fname, int lineno, int argc, char **argv )
@@ -134,38 +129,48 @@ int config_check_vals(ConfigTable *Conf, ConfigArgs *c, int check_only ) {
                c->argv[1] = "";
        }
        if(Conf->min_args && (c->argc < Conf->min_args)) {
-               Debug(LDAP_DEBUG_CONFIG, "%s: keyword <%s> missing <%s> argument\n",
-                       c->log, Conf->name, Conf->what);
+               sprintf( c->msg, "<%s> missing <%s> argument",
+                       c->argv[0], Conf->what );
+               Debug(LDAP_DEBUG_CONFIG, "%s: keyword %s\n", c->log, c->msg, 0 );
                return(ARG_BAD_CONF);
        }
        if(Conf->max_args && (c->argc > Conf->max_args)) {
-               Debug(LDAP_DEBUG_CONFIG, "%s: extra cruft after <%s> in <%s> line (ignored)\n",
-                       c->log, Conf->what, Conf->name);
+               sprintf( c->msg, "<%s> extra cruft after <%s> ignored",
+                       c->argv[0], Conf->what );
+               Debug(LDAP_DEBUG_CONFIG, "%s: %s\n", c->log, c->msg, 0 );
        }
        if((arg_type & ARG_DB) && !c->be) {
-               Debug(LDAP_DEBUG_CONFIG, "%s: keyword <%s> allowed only within database declaration\n",
-                       c->log, Conf->name, 0);
+               sprintf( c->msg, "<%s> only allowed within database declaration",
+                       c->argv[0] );
+               Debug(LDAP_DEBUG_CONFIG, "%s: keyword %s\n",
+                       c->log, c->msg, 0);
                return(ARG_BAD_CONF);
        }
        if((arg_type & ARG_PRE_BI) && c->bi) {
-               Debug(LDAP_DEBUG_CONFIG, "%s: keyword <%s> must appear before any backend %sdeclaration\n",
-                       c->log, Conf->name, ((arg_type & ARG_PRE_DB)
-                       ? "or database " : "") );
+               sprintf( c->msg, "<%s> must occur before any backend %sdeclaration",
+                       c->argv[0], (arg_type & ARG_PRE_DB) ? "or database " : "" );
+               Debug(LDAP_DEBUG_CONFIG, "%s: keyword %s\n",
+                       c->log, c->msg, 0 );
                return(ARG_BAD_CONF);
        }
        if((arg_type & ARG_PRE_DB) && c->be && c->be != frontendDB) {
-               Debug(LDAP_DEBUG_CONFIG, "%s: keyword <%s> must appear before any database declaration\n",
-                       c->log, Conf->name, 0);
+               sprintf( c->msg, "<%s> must occur before any database declaration",
+                       c->argv[0] );
+               Debug(LDAP_DEBUG_CONFIG, "%s: keyword %s\n",
+                       c->log, c->msg, 0);
                return(ARG_BAD_CONF);
        }
        if((arg_type & ARG_PAREN) && *c->argv[1] != '(' /*')'*/) {
-               Debug(LDAP_DEBUG_CONFIG, "%s: old <%s> format not supported\n",
-                       c->log, Conf->name, 0);
+               sprintf( c->msg, "<%s> old format not supported", c->argv[0] );
+               Debug(LDAP_DEBUG_CONFIG, "%s: %s\n",
+                       c->log, c->msg, 0);
                return(ARG_BAD_CONF);
        }
        if((arg_type & ARGS_POINTER) && !Conf->arg_item && !(arg_type & ARG_OFFSET)) {
-               Debug(LDAP_DEBUG_CONFIG, "%s: null arg_item for <%s>\n",
-                       c->log, Conf->name, 0);
+               sprintf( c->msg, "<%s> invalid config_table, arg_item is NULL",
+                       c->argv[0] );
+               Debug(LDAP_DEBUG_CONFIG, "%s: %s\n",
+                       c->log, c->msg, 0);
                return(ARG_BAD_CONF);
        }
        c->type = arg_user = (arg_type & ARGS_USERLAND);
@@ -187,9 +192,10 @@ int config_check_vals(ConfigTable *Conf, ConfigArgs *c, int check_only ) {
                                        !strcasecmp(c->argv[1], "false")) {
                                        iarg = 0;
                                } else {
-                                       Debug(LDAP_DEBUG_CONFIG, "%s: ignoring ", c->log, 0, 0);
-                                       Debug(LDAP_DEBUG_CONFIG, "invalid %s value (%s) in <%s> line\n",
-                                               Conf->what, c->argv[1], Conf->name);
+                                       sprintf( c->msg, "<%s> invalid value, ignored",
+                                               c->argv[0] );
+                                       Debug(LDAP_DEBUG_CONFIG, "%s: %s\n",
+                                               c->log, c->msg, 0 );
                                        return(0);
                                }
                                break;
@@ -197,8 +203,10 @@ int config_check_vals(ConfigTable *Conf, ConfigArgs *c, int check_only ) {
                j = (arg_type & ARG_NONZERO) ? 1 : 0;
                if(iarg < j && larg < j && barg < j ) {
                        larg = larg ? larg : (barg ? barg : iarg);
-                       Debug(LDAP_DEBUG_CONFIG, "%s: " , c->log, 0, 0);
-                       Debug(LDAP_DEBUG_CONFIG, "invalid %s value (%ld) in <%s> line\n", Conf->what, larg, Conf->name);
+                       sprintf( c->msg, "<%s> invalid value, ignored",
+                               c->argv[0] );
+                       Debug(LDAP_DEBUG_CONFIG, "%s: %s\n",
+                               c->log, c->msg, 0 );
                        return(ARG_BAD_CONF);
                }
                switch(arg_type & ARGS_NUMERIC) {
@@ -218,9 +226,9 @@ int config_check_vals(ConfigTable *Conf, ConfigArgs *c, int check_only ) {
                ber_str2bv( c->argv[1], 0, 0, &bv );
                rc = dnPrettyNormal( NULL, &bv, &c->value_dn, &c->value_ndn, NULL );
                if ( rc != LDAP_SUCCESS ) {
-                       Debug(LDAP_DEBUG_CONFIG, "%s: " , c->log, 0, 0);
-                       Debug(LDAP_DEBUG_CONFIG, "%s DN is invalid %d (%s)\n",
-                               Conf->name, rc, ldap_err2string( rc ));
+                       sprintf( c->msg, "<%s> invalid DN %d (%s)",
+                               c->argv[0], rc, ldap_err2string( rc ));
+                       Debug(LDAP_DEBUG_CONFIG, "%s: %s\n" , c->log, c->msg, 0);
                        return(ARG_BAD_CONF);
                }
                if ( check_only ) {
@@ -238,13 +246,18 @@ int config_set_vals(ConfigTable *Conf, ConfigArgs *c) {
        arg_type = Conf->arg_type;
        if(arg_type & ARG_MAGIC) {
                if(!c->be) c->be = frontendDB;
+               c->msg[0] = '\0';
                rc = (*((ConfigDriver*)Conf->arg_item))(c);
 #if 0
                if(c->be == frontendDB) c->be = NULL;
 #endif
                if(rc) {
-                       Debug(LDAP_DEBUG_CONFIG, "%s: handler for <%s> exited with %d!\n",
-                               c->log, Conf->name, rc);
+                       if ( !c->msg[0] ) {
+                               sprintf( c->msg, "<%s> handler exited with %d",
+                                       c->argv[0], rc );
+                               Debug(LDAP_DEBUG_CONFIG, "%s: %s!\n",
+                                       c->log, c->msg, 0 );
+                       }
                        return(ARG_BAD_CONF);
                }
                return(0);
@@ -255,8 +268,10 @@ int config_set_vals(ConfigTable *Conf, ConfigArgs *c) {
                else if (c->bi)
                        ptr = c->bi->bi_private;
                else {
-                       Debug(LDAP_DEBUG_CONFIG, "%s: offset for <%s> missing base pointer!\n",
-                               c->log, Conf->name, 0);
+                       sprintf( c->msg, "<%s> offset is missing base pointer",
+                               c->argv[0] );
+                       Debug(LDAP_DEBUG_CONFIG, "%s: %s!\n",
+                               c->log, c->msg, 0);
                        return(ARG_BAD_CONF);
                }
                ptr = (void *)((char *)ptr + (int)Conf->arg_item);
@@ -272,7 +287,7 @@ int config_set_vals(ConfigTable *Conf, ConfigArgs *c) {
                        case ARG_STRING: {
                                char *cc = *(char**)ptr;
                                if(cc) {
-                                       if (arg_type & ARG_UNIQUE) {
+                                       if ((arg_type & ARG_UNIQUE) && c->op == SLAP_CONFIG_ADD ) {
                                                Debug(LDAP_DEBUG_CONFIG, "%s: already set %s!\n",
                                                        c->log, Conf->name, 0 );
                                                return(ARG_BAD_CONF);
@@ -308,6 +323,12 @@ config_del_vals(ConfigTable *cf, ConfigArgs *c)
 {
        int rc = 0;
 
+       /* If there is no handler, just ignore it */
+       if ( cf->arg_type & ARG_MAGIC ) {
+               c->op = LDAP_MOD_DELETE;
+               c->type = cf->arg_type & ARGS_USERLAND;
+               rc = (*((ConfigDriver*)cf->arg_item))(c);
+       }
        return rc;
 }
 
@@ -425,27 +446,25 @@ int
 init_config_ocs( ConfigOCs *ocs ) {
        int i;
 
-       for (i=0;ocs[i].def;i++) {
+       for (i=0;ocs[i].co_def;i++) {
                LDAPObjectClass *oc;
                int code;
                const char *err;
 
-               oc = ldap_str2objectclass( ocs[i].def, &code, &err,
+               oc = ldap_str2objectclass( ocs[i].co_def, &code, &err,
                        LDAP_SCHEMA_ALLOW_ALL );
                if ( !oc ) {
                        fprintf( stderr, "init_config_ocs: objectclass \"%s\": %s, %s\n",
-                               ocs[i].def, ldap_scherr2str(code), err );
+                               ocs[i].co_def, ldap_scherr2str(code), err );
                        return code;
                }
                code = oc_add(oc,0,NULL,&err);
                if ( code && code != SLAP_SCHERR_CLASS_DUP ) {
                        fprintf( stderr, "init_config_ocs: objectclass \"%s\": %s, %s\n",
-                               ocs[i].def, scherr2str(code), err );
+                               ocs[i].co_def, scherr2str(code), err );
                        return code;
                }
-               if ( ocs[i].oc ) {
-                       *ocs[i].oc = oc_find(oc->oc_names[0]);
-               }
+               ocs[i].co_oc = oc_find(oc->oc_names[0]);
                ldap_memfree(oc);
        }
        return 0;
@@ -465,18 +484,20 @@ config_parse_vals(ConfigTable *ct, ConfigArgs *c, int valx)
        } else {
                rc = config_check_vals( ct, c, 1 );
        }
+       if ( rc )
+               rc = LDAP_CONSTRAINT_VIOLATION;
 
        ch_free( c->tline );
        return rc;
 }
 
 int
-config_parse_add(ConfigTable *ct, ConfigArgs *c, int valx)
+config_parse_add(ConfigTable *ct, ConfigArgs *c)
 {
        int rc = 0;
 
        snprintf( c->log, sizeof( c->log ), "%s: value #%d",
-               ct->ad->ad_cname.bv_val, valx );
+               ct->ad->ad_cname.bv_val, c->valx );
        c->argc = 1;
        c->argv[0] = ct->ad->ad_cname.bv_val;
        if ( fp_parse_line( c ) ) {
@@ -491,7 +512,7 @@ config_parse_add(ConfigTable *ct, ConfigArgs *c, int valx)
 }
 
 int
-read_config_file(const char *fname, int depth, ConfigArgs *cf)
+read_config_file(const char *fname, int depth, ConfigArgs *cf, ConfigTable *cft)
 {
        FILE *fp;
        ConfigTable *ct;
@@ -511,6 +532,7 @@ read_config_file(const char *fname, int depth, ConfigArgs *cf)
                c->be = NULL;
        }
 
+       c->valx = -1;
        c->fname = fname;
        init_config_argv( c );
 
@@ -546,13 +568,20 @@ read_config_file(const char *fname, int depth, ConfigArgs *cf)
                }
 
                if ( c->argc < 1 ) {
-                       Debug(LDAP_DEBUG_CONFIG, "%s: bad config line (ignored)\n", c->log, 0, 0);
+                       Debug( SLAPD_DEBUG_CONFIG_ERROR, "%s: bad config line" 
+                               SLAPD_CONF_UNKNOWN_IGNORED ".\n",
+                               c->log, 0, 0);
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+                       rc = 1;
+                       goto leave;
+#else /* ! SLAPD_CONF_UNKNOWN_BAILOUT */
                        continue;
+#endif /* ! SLAPD_CONF_UNKNOWN_BAILOUT */
                }
 
                c->op = SLAP_CONFIG_ADD;
 
-               ct = config_find_keyword( config_back_cf_table, c );
+               ct = config_find_keyword( cft, c );
                if ( ct ) {
                        rc = config_add_vals( ct, c );
                        if ( !rc ) continue;
@@ -569,10 +598,10 @@ read_config_file(const char *fname, int depth, ConfigArgs *cf)
                                goto leave;
                        }
                        
-               } else if ( c->bi ) {
+               } else if ( c->bi && !c->be ) {
                        rc = SLAP_CONF_UNKNOWN;
-                       if ( c->bi->bi_cf_table ) {
-                               ct = config_find_keyword( c->bi->bi_cf_table, c );
+                       if ( c->bi->bi_cf_ocs ) {
+                               ct = config_find_keyword( c->bi->bi_cf_ocs->co_table, c );
                                if ( ct ) {
                                        rc = config_add_vals( ct, c );
                                }
@@ -584,10 +613,13 @@ read_config_file(const char *fname, int depth, ConfigArgs *cf)
                        if ( rc ) {
                                switch(rc) {
                                case SLAP_CONF_UNKNOWN:
-                                       Debug(LDAP_DEBUG_CONFIG, "%s: "
-                                               "unknown directive <%s> inside backend info definition (ignored)\n",
+                                       Debug( SLAPD_DEBUG_CONFIG_ERROR, "%s: "
+                                               "unknown directive <%s> inside backend info definition"
+                                               SLAPD_CONF_UNKNOWN_IGNORED ".\n",
                                                c->log, *c->argv, 0);
+#ifndef SLAPD_CONF_UNKNOWN_BAILOUT
                                        continue;
+#endif /* ! SLAPD_CONF_UNKNOWN_BAILOUT */
                                default:
                                        rc = 1;
                                        goto leave;
@@ -596,8 +628,8 @@ read_config_file(const char *fname, int depth, ConfigArgs *cf)
 
                } else if ( c->be ) {
                        rc = SLAP_CONF_UNKNOWN;
-                       if ( c->be->be_cf_table ) {
-                               ct = config_find_keyword( c->be->be_cf_table, c );
+                       if ( c->be->be_cf_ocs ) {
+                               ct = config_find_keyword( c->be->be_cf_ocs->co_table, c );
                                if ( ct ) {
                                        rc = config_add_vals( ct, c );
                                }
@@ -609,11 +641,13 @@ read_config_file(const char *fname, int depth, ConfigArgs *cf)
                        if ( rc ) {
                                switch(rc) {
                                case SLAP_CONF_UNKNOWN:
-                                       Debug( LDAP_DEBUG_CONFIG, "%s: "
+                                       Debug( SLAPD_DEBUG_CONFIG_ERROR, "%s: "
                                                "unknown directive <%s> inside backend database "
-                                               "definition (ignored)\n",
+                                               "definition" SLAPD_CONF_UNKNOWN_IGNORED ".\n",
                                                c->log, *c->argv, 0);
+#ifndef SLAPD_CONF_UNKNOWN_BAILOUT
                                        continue;
+#endif /* ! SLAPD_CONF_UNKNOWN_BAILOUT */
                                default:
                                        rc = 1;
                                        goto leave;
@@ -625,10 +659,13 @@ read_config_file(const char *fname, int depth, ConfigArgs *cf)
                        if ( rc ) {
                                switch(rc) {
                                case SLAP_CONF_UNKNOWN:
-                                       Debug( LDAP_DEBUG_CONFIG, "%s: "
-                                               "unknown directive <%s> inside global database definition (ignored)\n",
+                                       Debug( SLAPD_DEBUG_CONFIG_ERROR, "%s: "
+                                               "unknown directive <%s> inside global database definition"
+                                               SLAPD_CONF_UNKNOWN_IGNORED ".\n",
                                                c->log, *c->argv, 0);
+#ifndef SLAPD_CONF_UNKNOWN_BAILOUT
                                        continue;
+#endif /* ! SLAPD_CONF_UNKNOWN_BAILOUT */
                                default:
                                        rc = 1;
                                        goto leave;
@@ -636,26 +673,19 @@ read_config_file(const char *fname, int depth, ConfigArgs *cf)
                        }
                        
                } else {
-                       Debug(LDAP_DEBUG_CONFIG, "%s: "
-                               "unknown directive <%s> outside backend info and database definitions (ignored)\n",
+                       Debug( SLAPD_DEBUG_CONFIG_ERROR, "%s: "
+                               "unknown directive <%s> outside backend info and database definitions"
+                               SLAPD_CONF_UNKNOWN_IGNORED ".\n",
                                c->log, *c->argv, 0);
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+                       rc = 1;
+                       goto leave;
+#else /* ! SLAPD_CONF_UNKNOWN_BAILOUT */
                        continue;
-
+#endif /* ! SLAPD_CONF_UNKNOWN_BAILOUT */
                }
        }
 
-       if ( BER_BVISNULL( &frontendDB->be_schemadn ) ) {
-               ber_str2bv( SLAPD_SCHEMA_DN, STRLENOF( SLAPD_SCHEMA_DN ), 1,
-                       &frontendDB->be_schemadn );
-               rc = dnNormalize( 0, NULL, NULL, &frontendDB->be_schemadn, &frontendDB->be_schemandn, NULL );
-               if ( rc != LDAP_SUCCESS ) {
-                       Debug(LDAP_DEBUG_ANY, "%s: "
-                               "unable to normalize default schema DN \"%s\"\n",
-                               c->log, frontendDB->be_schemadn.bv_val, 0 );
-                       /* must not happen */
-                       assert( 0 );
-               }
-       }
        rc = 0;
 
 leave:
@@ -689,6 +719,9 @@ verbs_to_mask(int argc, char *argv[], slap_verbmasks *v, slap_mask_t *m) {
        return(0);
 }
 
+/* Mask keywords that represent multiple bits should occur before single
+ * bit keywords in the verbmasks array.
+ */
 int
 mask_to_verbs(slap_verbmasks *v, slap_mask_t m, BerVarray *bva) {
        int i;
@@ -698,19 +731,37 @@ mask_to_verbs(slap_verbmasks *v, slap_mask_t m, BerVarray *bva) {
                if (!v[i].mask) continue;
                if (( m & v[i].mask ) == v[i].mask ) {
                        value_add_one( bva, &v[i].word );
+                       m ^= v[i].mask;
+                       if ( !m ) break;
                }
        }
        return 0;
 }
 
+int
+enum_to_verb(slap_verbmasks *v, slap_mask_t m, struct berval *bv) {
+       int i;
+
+       for (i=0; !BER_BVISNULL(&v[i].word); i++) {
+               if ( m == v[i].mask ) {
+                       if ( bv != NULL ) {
+                               *bv = v[i].word;
+                       }
+                       return i;
+               }
+       }
+       return -1;
+}
+
 static slap_verbmasks tlskey[] = {
-       { BER_BVC("no"),                SB_TLS_OFF },
-       { BER_BVC("yes"),               SB_TLS_ON },
+       { BER_BVC("no"),        SB_TLS_OFF },
+       { BER_BVC("yes"),       SB_TLS_ON },
        { BER_BVC("critical"),  SB_TLS_CRITICAL },
        { BER_BVNULL, 0 }
 };
 
 static slap_verbmasks methkey[] = {
+       { BER_BVC("none"),      LDAP_AUTH_NONE },
        { BER_BVC("simple"),    LDAP_AUTH_SIMPLE },
 #ifdef HAVE_CYRUS_SASL
        { BER_BVC("sasl"),      LDAP_AUTH_SASL },
@@ -731,10 +782,10 @@ static cf_aux_table bindkey[] = {
        { BER_BVC("bindmethod="), offsetof(slap_bindconf, sb_method), 'd', 0, methkey },
        { BER_BVC("binddn="), offsetof(slap_bindconf, sb_binddn), 'b', 1, NULL },
        { BER_BVC("credentials="), offsetof(slap_bindconf, sb_cred), 'b', 1, NULL },
-       { BER_BVC("saslmech="), offsetof(slap_bindconf, sb_saslmech), 's', 0, NULL },
+       { BER_BVC("saslmech="), offsetof(slap_bindconf, sb_saslmech), 'b', 0, NULL },
        { BER_BVC("secprops="), offsetof(slap_bindconf, sb_secprops), 's', 0, NULL },
-       { BER_BVC("realm="), offsetof(slap_bindconf, sb_realm), 's', 0, NULL },
-       { BER_BVC("authcID="), offsetof(slap_bindconf, sb_authcId), 's', 0, NULL },
+       { BER_BVC("realm="), offsetof(slap_bindconf, sb_realm), 'b', 0, NULL },
+       { BER_BVC("authcID="), offsetof(slap_bindconf, sb_authcId), 'b', 0, NULL },
        { BER_BVC("authzID="), offsetof(slap_bindconf, sb_authzId), 'b', 1, NULL },
        { BER_BVNULL, 0, 0, 0, NULL }
 };
@@ -761,7 +812,7 @@ int bindconf_parse( const char *word, slap_bindconf *bc ) {
                                ber_str2bv( val, 0, 1, bptr );
                                break;
 
-                       case 'i':
+                       case 'd':
                                assert( tab->aux );
                                iptr = (int *)((char *)bc + tab->off);
 
@@ -814,8 +865,9 @@ int bindconf_unparse( slap_bindconf *bc, struct berval *bv ) {
                        }
                        break;
 
-               case 'i':
+               case 'd':
                        assert( tab->aux );
+                       iptr = (int *)((char *)bc + tab->off);
                
                        for ( i = 0; !BER_BVISNULL( &tab->aux[i].word ); i++ ) {
                                if ( *iptr == tab->aux[i].mask ) {
@@ -837,24 +889,31 @@ int bindconf_unparse( slap_bindconf *bc, struct berval *bv ) {
 void bindconf_free( slap_bindconf *bc ) {
        if ( !BER_BVISNULL( &bc->sb_binddn ) ) {
                ch_free( bc->sb_binddn.bv_val );
+               BER_BVZERO( &bc->sb_binddn );
        }
        if ( !BER_BVISNULL( &bc->sb_cred ) ) {
                ch_free( bc->sb_cred.bv_val );
+               BER_BVZERO( &bc->sb_cred );
        }
-       if ( bc->sb_saslmech ) {
-               ch_free( bc->sb_saslmech );
+       if ( !BER_BVISNULL( &bc->sb_saslmech ) ) {
+               ch_free( bc->sb_saslmech.bv_val );
+               BER_BVZERO( &bc->sb_saslmech );
        }
        if ( bc->sb_secprops ) {
                ch_free( bc->sb_secprops );
+               bc->sb_secprops = NULL;
        }
-       if ( bc->sb_realm ) {
-               ch_free( bc->sb_realm );
+       if ( !BER_BVISNULL( &bc->sb_realm ) ) {
+               ch_free( bc->sb_realm.bv_val );
+               BER_BVZERO( &bc->sb_realm );
        }
-       if ( bc->sb_authcId ) {
-               ch_free( bc->sb_authcId );
+       if ( !BER_BVISNULL( &bc->sb_authcId ) ) {
+               ch_free( bc->sb_authcId.bv_val );
+               BER_BVZERO( &bc->sb_authcId );
        }
        if ( !BER_BVISNULL( &bc->sb_authzId ) ) {
                ch_free( bc->sb_authzId.bv_val );
+               BER_BVZERO( &bc->sb_authzId );
        }
 }
 
@@ -1097,10 +1156,11 @@ int config_generic_wrapper( Backend *be, const char *fname, int lineno,
        c.lineno = lineno;
        c.argc = argc;
        c.argv = argv;
+       c.valx = -1;
        sprintf( c.log, "%s: line %lu", fname, lineno );
 
        rc = SLAP_CONF_UNKNOWN;
-       ct = config_find_keyword( be->be_cf_table, &c );
+       ct = config_find_keyword( be->be_cf_ocs->co_table, &c );
        if ( ct )
                rc = config_add_vals( ct, &c );
        return rc;