X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=libraries%2Flibldap%2Fschema.c;h=01211398204d2130a84b13582a814a861b172185;hb=fb5ba5f09c604aa2c9cdf7076141da60fbb925b3;hp=66c228eb0245b2d1578281333b61c1f797be42b8;hpb=159de0f1359459371c590ac770cc30edbade58d5;p=openldap diff --git a/libraries/libldap/schema.c b/libraries/libldap/schema.c index 66c228eb02..0121139820 100644 --- a/libraries/libldap/schema.c +++ b/libraries/libldap/schema.c @@ -1,7 +1,7 @@ /* $OpenLDAP$ */ /* This work is part of OpenLDAP Software . * - * Copyright 1998-2003 The OpenLDAP Foundation. + * Copyright 1998-2011 The OpenLDAP Foundation. * All rights reserved. * * Redistribution and use in source and binary forms, with or without @@ -30,6 +30,8 @@ #include +static const char EndOfInput[] = "end of input"; + static const char * choose_name( char *names[], const char *fallback ) { @@ -39,48 +41,56 @@ choose_name( char *names[], const char *fallback ) LDAP_CONST char * ldap_syntax2name( LDAPSyntax * syn ) { + if (!syn) return NULL; return( syn->syn_oid ); } LDAP_CONST char * ldap_matchingrule2name( LDAPMatchingRule * mr ) { + if (!mr) return NULL; return( choose_name( mr->mr_names, mr->mr_oid ) ); } LDAP_CONST char * ldap_matchingruleuse2name( LDAPMatchingRuleUse * mru ) { + if (!mru) return NULL; return( choose_name( mru->mru_names, mru->mru_oid ) ); } LDAP_CONST char * ldap_attributetype2name( LDAPAttributeType * at ) { + if (!at) return NULL; return( choose_name( at->at_names, at->at_oid ) ); } LDAP_CONST char * ldap_objectclass2name( LDAPObjectClass * oc ) { + if (!oc) return NULL; return( choose_name( oc->oc_names, oc->oc_oid ) ); } LDAP_CONST char * ldap_contentrule2name( LDAPContentRule * cr ) { + if (!cr) return NULL; return( choose_name( cr->cr_names, cr->cr_oid ) ); } LDAP_CONST char * ldap_nameform2name( LDAPNameForm * nf ) { + if (!nf) return NULL; return( choose_name( nf->nf_names, nf->nf_oid ) ); } LDAP_CONST char * ldap_structurerule2name( LDAPStructureRule * sr ) { + if (!sr) return NULL; return( choose_name( sr->sr_names, NULL ) ); } @@ -377,7 +387,10 @@ struct berval * ldap_syntax2bv( LDAPSyntax * syn, struct berval *bv ) { safe_string * ss; - + + if ( !syn || !bv ) + return NULL; + ss = new_safe_string(256); if ( !ss ) return NULL; @@ -419,7 +432,10 @@ struct berval * ldap_matchingrule2bv( LDAPMatchingRule * mr, struct berval *bv ) { safe_string * ss; - + + if ( !mr || !bv ) + return NULL; + ss = new_safe_string(256); if ( !ss ) return NULL; @@ -478,7 +494,10 @@ struct berval * ldap_matchingruleuse2bv( LDAPMatchingRuleUse * mru, struct berval *bv ) { safe_string * ss; - + + if ( !mru || !bv ) + return NULL; + ss = new_safe_string(256); if ( !ss ) return NULL; @@ -537,7 +556,10 @@ struct berval * ldap_objectclass2bv( LDAPObjectClass * oc, struct berval *bv ) { safe_string * ss; - + + if ( !oc || !bv ) + return NULL; + ss = new_safe_string(256); if ( !ss ) return NULL; @@ -626,7 +648,10 @@ struct berval * ldap_contentrule2bv( LDAPContentRule * cr, struct berval *bv ) { safe_string * ss; - + + if ( !cr || !bv ) + return NULL; + ss = new_safe_string(256); if ( !ss ) return NULL; @@ -705,7 +730,10 @@ struct berval * ldap_structurerule2bv( LDAPStructureRule * sr, struct berval *bv ) { safe_string * ss; - + + if ( !sr || !bv ) + return NULL; + ss = new_safe_string(256); if ( !ss ) return NULL; @@ -769,7 +797,10 @@ struct berval * ldap_nameform2bv( LDAPNameForm * nf, struct berval *bv ) { safe_string * ss; - + + if ( !nf || !bv ) + return NULL; + ss = new_safe_string(256); if ( !ss ) return NULL; @@ -838,7 +869,10 @@ struct berval * ldap_attributetype2bv( LDAPAttributeType * at, struct berval *bv ) { safe_string * ss; - + + if ( !at || !bv ) + return NULL; + ss = new_safe_string(256); if ( !ss ) return NULL; @@ -959,26 +993,23 @@ ldap_attributetype2bv( LDAPAttributeType * at, struct berval *bv ) * interpretation of the specs). */ -#define TK_NOENDQUOTE -2 -#define TK_OUTOFMEM -1 -#define TK_EOS 0 -#define TK_UNEXPCHAR 1 -#define TK_BAREWORD 2 -#define TK_QDSTRING 3 -#define TK_LEFTPAREN 4 -#define TK_RIGHTPAREN 5 -#define TK_DOLLAR 6 -#define TK_QDESCR TK_QDSTRING - -struct token { - int type; - char *sval; -}; - -static int +typedef enum tk_t { + TK_NOENDQUOTE = -2, + TK_OUTOFMEM = -1, + TK_EOS = 0, + TK_UNEXPCHAR = 1, + TK_BAREWORD = 2, + TK_QDSTRING = 3, + TK_LEFTPAREN = 4, + TK_RIGHTPAREN = 5, + TK_DOLLAR = 6, + TK_QDESCR = TK_QDSTRING +} tk_t; + +static tk_t get_token( const char ** sp, char ** token_val ) { - int kind; + tk_t kind; const char * p; const char * q; char * res; @@ -1030,6 +1061,9 @@ get_token( const char ** sp, char ** token_val ) **sp != ')' && **sp != '$' && **sp != '\'' && + /* for suggested minimum upper bound on the number + * of characters (RFC 4517) */ + **sp != '{' && **sp != '\0' ) (*sp)++; q = *sp; @@ -1150,7 +1184,7 @@ parse_qdescrs(const char **sp, int *code) { char ** res; char ** res1; - int kind; + tk_t kind; char * sval; int size; int pos; @@ -1183,8 +1217,8 @@ parse_qdescrs(const char **sp, int *code) } res = res1; } - res[pos] = sval; - pos++; + res[pos++] = sval; + res[pos] = NULL; parse_whsp(sp); } else { LDAP_VFREE(res); @@ -1193,7 +1227,6 @@ parse_qdescrs(const char **sp, int *code) return(NULL); } } - res[pos] = NULL; parse_whsp(sp); return(res); } else if ( kind == TK_QDESCR ) { @@ -1218,7 +1251,7 @@ static char * parse_woid(const char **sp, int *code) { char * sval; - int kind; + tk_t kind; parse_whsp(sp); kind = get_token(sp, &sval); @@ -1233,10 +1266,13 @@ parse_woid(const char **sp, int *code) /* Parse a noidlen */ static char * -parse_noidlen(const char **sp, int *code, int *len, int allow_quoted) +parse_noidlen(const char **sp, int *code, int *len, int flags) { char * sval; + const char *savepos; int quoted = 0; + int allow_quoted = ( flags & LDAP_SCHEMA_ALLOW_QUOTED ); + int allow_oidmacro = ( flags & LDAP_SCHEMA_ALLOW_OID_MACRO ); *len = 0; /* Netscape puts the SYNTAX value in quotes (incorrectly) */ @@ -1244,9 +1280,22 @@ parse_noidlen(const char **sp, int *code, int *len, int allow_quoted) quoted = 1; (*sp)++; } + savepos = *sp; sval = ldap_int_parse_numericoid(sp, code, 0); if ( !sval ) { - return NULL; + if ( allow_oidmacro + && *sp == savepos + && *code == LDAP_SCHERR_NODIGIT ) + { + if ( get_token(sp, &sval) != TK_BAREWORD ) { + if ( sval != NULL ) { + LDAP_FREE(sval); + } + return NULL; + } + } else { + return NULL; + } } if ( **sp == '{' /*}*/ ) { (*sp)++; @@ -1285,7 +1334,7 @@ parse_oids(const char **sp, int *code, const int allow_quoted) { char ** res; char ** res1; - int kind; + tk_t kind; char * sval; int size; int pos; @@ -1311,8 +1360,13 @@ parse_oids(const char **sp, int *code, const int allow_quoted) kind = get_token(sp,&sval); if ( kind == TK_BAREWORD || ( allow_quoted && kind == TK_QDSTRING ) ) { - res[pos] = sval; - pos++; + res[pos++] = sval; + res[pos] = NULL; + } else if ( kind == TK_RIGHTPAREN ) { + /* FIXME: be liberal in what we accept... */ + parse_whsp(sp); + LDAP_FREE(res); + return NULL; } else { *code = LDAP_SCHERR_UNEXPTOKEN; LDAP_FREE(sval); @@ -1341,8 +1395,8 @@ parse_oids(const char **sp, int *code, const int allow_quoted) } res = res1; } - res[pos] = sval; - pos++; + res[pos++] = sval; + res[pos] = NULL; } else { *code = LDAP_SCHERR_UNEXPTOKEN; LDAP_FREE(sval); @@ -1357,7 +1411,6 @@ parse_oids(const char **sp, int *code, const int allow_quoted) return NULL; } } - res[pos] = NULL; parse_whsp(sp); return(res); } else if ( kind == TK_BAREWORD || @@ -1395,16 +1448,20 @@ add_extension(LDAPSchemaExtensionItem ***extensions, if ( !*extensions ) { *extensions = LDAP_CALLOC(2, sizeof(LDAPSchemaExtensionItem *)); - if ( !*extensions ) - return 1; + if ( !*extensions ) { + LDAP_FREE( ext ); + return 1; + } n = 0; } else { for ( n=0; (*extensions)[n] != NULL; n++ ) ; tmp = LDAP_REALLOC(*extensions, (n+2)*sizeof(LDAPSchemaExtensionItem *)); - if ( !tmp ) + if ( !tmp ) { + LDAP_FREE( ext ); return 1; + } *extensions = tmp; } (*extensions)[n] = ext; @@ -1430,6 +1487,7 @@ free_extensions(LDAPSchemaExtensionItem **extensions) void ldap_syntax_free( LDAPSyntax * syn ) { + if ( !syn ) return; LDAP_FREE(syn->syn_oid); if (syn->syn_names) LDAP_VFREE(syn->syn_names); if (syn->syn_desc) LDAP_FREE(syn->syn_desc); @@ -1443,7 +1501,7 @@ ldap_str2syntax( LDAP_CONST char * s, LDAP_CONST char ** errp, LDAP_CONST unsigned flags ) { - int kind; + tk_t kind; const char * ss = s; char * sval; int seen_name = 0; @@ -1491,13 +1549,13 @@ ldap_str2syntax( LDAP_CONST char * s, switch (kind) { case TK_EOS: *code = LDAP_SCHERR_NORIGHTPAREN; - *errp = ss; + *errp = EndOfInput; ldap_syntax_free(syn); return NULL; case TK_RIGHTPAREN: return syn; case TK_BAREWORD: - if ( !strcmp(sval,"NAME") ) { + if ( !strcasecmp(sval,"NAME") ) { LDAP_FREE(sval); if ( seen_name ) { *code = LDAP_SCHERR_DUPOPT; @@ -1514,7 +1572,7 @@ ldap_str2syntax( LDAP_CONST char * s, ldap_syntax_free(syn); return NULL; } - } else if ( !strcmp(sval,"DESC") ) { + } else if ( !strcasecmp(sval,"DESC") ) { LDAP_FREE(sval); if ( seen_desc ) { *code = LDAP_SCHERR_DUPOPT; @@ -1571,6 +1629,7 @@ ldap_str2syntax( LDAP_CONST char * s, void ldap_matchingrule_free( LDAPMatchingRule * mr ) { + if (!mr) return; LDAP_FREE(mr->mr_oid); if (mr->mr_names) LDAP_VFREE(mr->mr_names); if (mr->mr_desc) LDAP_FREE(mr->mr_desc); @@ -1585,7 +1644,7 @@ ldap_str2matchingrule( LDAP_CONST char * s, LDAP_CONST char ** errp, LDAP_CONST unsigned flags ) { - int kind; + tk_t kind; const char * ss = s; char * sval; int seen_name = 0; @@ -1627,11 +1686,11 @@ ldap_str2matchingrule( LDAP_CONST char * s, ss = savepos; kind = get_token(&ss,&sval); if ( kind == TK_BAREWORD ) { - if ( !strcmp(sval, "NAME") || - !strcmp(sval, "DESC") || - !strcmp(sval, "OBSOLETE") || - !strcmp(sval, "SYNTAX") || - !strncmp(sval, "X-", 2) ) { + if ( !strcasecmp(sval, "NAME") || + !strcasecmp(sval, "DESC") || + !strcasecmp(sval, "OBSOLETE") || + !strcasecmp(sval, "SYNTAX") || + !strncasecmp(sval, "X-", 2) ) { /* Missing OID, backtrack */ ss = savepos; } else { @@ -1656,7 +1715,7 @@ ldap_str2matchingrule( LDAP_CONST char * s, switch (kind) { case TK_EOS: *code = LDAP_SCHERR_NORIGHTPAREN; - *errp = ss; + *errp = EndOfInput; ldap_matchingrule_free(mr); return NULL; case TK_RIGHTPAREN: @@ -1667,7 +1726,7 @@ ldap_str2matchingrule( LDAP_CONST char * s, } return mr; case TK_BAREWORD: - if ( !strcmp(sval,"NAME") ) { + if ( !strcasecmp(sval,"NAME") ) { LDAP_FREE(sval); if ( seen_name ) { *code = LDAP_SCHERR_DUPOPT; @@ -1684,7 +1743,7 @@ ldap_str2matchingrule( LDAP_CONST char * s, ldap_matchingrule_free(mr); return NULL; } - } else if ( !strcmp(sval,"DESC") ) { + } else if ( !strcasecmp(sval,"DESC") ) { LDAP_FREE(sval); if ( seen_desc ) { *code = LDAP_SCHERR_DUPOPT; @@ -1704,7 +1763,7 @@ ldap_str2matchingrule( LDAP_CONST char * s, } mr->mr_desc = sval; parse_whsp(&ss); - } else if ( !strcmp(sval,"OBSOLETE") ) { + } else if ( !strcasecmp(sval,"OBSOLETE") ) { LDAP_FREE(sval); if ( seen_obsolete ) { *code = LDAP_SCHERR_DUPOPT; @@ -1715,7 +1774,7 @@ ldap_str2matchingrule( LDAP_CONST char * s, seen_obsolete = 1; mr->mr_obsolete = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"SYNTAX") ) { + } else if ( !strcasecmp(sval,"SYNTAX") ) { LDAP_FREE(sval); if ( seen_syntax ) { *code = LDAP_SCHERR_DUPOPT; @@ -1770,6 +1829,7 @@ ldap_str2matchingrule( LDAP_CONST char * s, void ldap_matchingruleuse_free( LDAPMatchingRuleUse * mru ) { + if (!mru) return; LDAP_FREE(mru->mru_oid); if (mru->mru_names) LDAP_VFREE(mru->mru_names); if (mru->mru_desc) LDAP_FREE(mru->mru_desc); @@ -1784,7 +1844,7 @@ ldap_str2matchingruleuse( LDAP_CONST char * s, LDAP_CONST char ** errp, LDAP_CONST unsigned flags ) { - int kind; + tk_t kind; const char * ss = s; char * sval; int seen_name = 0; @@ -1826,11 +1886,11 @@ ldap_str2matchingruleuse( LDAP_CONST char * s, ss = savepos; kind = get_token(&ss,&sval); if ( kind == TK_BAREWORD ) { - if ( !strcmp(sval, "NAME") || - !strcmp(sval, "DESC") || - !strcmp(sval, "OBSOLETE") || - !strcmp(sval, "APPLIES") || - !strncmp(sval, "X-", 2) ) { + if ( !strcasecmp(sval, "NAME") || + !strcasecmp(sval, "DESC") || + !strcasecmp(sval, "OBSOLETE") || + !strcasecmp(sval, "APPLIES") || + !strncasecmp(sval, "X-", 2) ) { /* Missing OID, backtrack */ ss = savepos; } else { @@ -1855,7 +1915,7 @@ ldap_str2matchingruleuse( LDAP_CONST char * s, switch (kind) { case TK_EOS: *code = LDAP_SCHERR_NORIGHTPAREN; - *errp = ss; + *errp = EndOfInput; ldap_matchingruleuse_free(mru); return NULL; case TK_RIGHTPAREN: @@ -1866,7 +1926,7 @@ ldap_str2matchingruleuse( LDAP_CONST char * s, } return mru; case TK_BAREWORD: - if ( !strcmp(sval,"NAME") ) { + if ( !strcasecmp(sval,"NAME") ) { LDAP_FREE(sval); if ( seen_name ) { *code = LDAP_SCHERR_DUPOPT; @@ -1883,7 +1943,7 @@ ldap_str2matchingruleuse( LDAP_CONST char * s, ldap_matchingruleuse_free(mru); return NULL; } - } else if ( !strcmp(sval,"DESC") ) { + } else if ( !strcasecmp(sval,"DESC") ) { LDAP_FREE(sval); if ( seen_desc ) { *code = LDAP_SCHERR_DUPOPT; @@ -1903,7 +1963,7 @@ ldap_str2matchingruleuse( LDAP_CONST char * s, } mru->mru_desc = sval; parse_whsp(&ss); - } else if ( !strcmp(sval,"OBSOLETE") ) { + } else if ( !strcasecmp(sval,"OBSOLETE") ) { LDAP_FREE(sval); if ( seen_obsolete ) { *code = LDAP_SCHERR_DUPOPT; @@ -1914,7 +1974,7 @@ ldap_str2matchingruleuse( LDAP_CONST char * s, seen_obsolete = 1; mru->mru_obsolete = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"APPLIES") ) { + } else if ( !strcasecmp(sval,"APPLIES") ) { LDAP_FREE(sval); if ( seen_applies ) { *code = LDAP_SCHERR_DUPOPT; @@ -1926,7 +1986,7 @@ ldap_str2matchingruleuse( LDAP_CONST char * s, mru->mru_applies_oids = parse_oids(&ss, code, flags); - if ( !mru->mru_applies_oids ) { + if ( !mru->mru_applies_oids && *code != LDAP_SUCCESS ) { *errp = ss; ldap_matchingruleuse_free(mru); return NULL; @@ -1968,6 +2028,7 @@ ldap_str2matchingruleuse( LDAP_CONST char * s, void ldap_attributetype_free(LDAPAttributeType * at) { + if (!at) return; LDAP_FREE(at->at_oid); if (at->at_names) LDAP_VFREE(at->at_names); if (at->at_desc) LDAP_FREE(at->at_desc); @@ -1986,7 +2047,7 @@ ldap_str2attributetype( LDAP_CONST char * s, LDAP_CONST char ** errp, LDAP_CONST unsigned flags ) { - int kind; + tk_t kind; const char * ss = s; char * sval; int seen_name = 0; @@ -2037,28 +2098,31 @@ ldap_str2attributetype( LDAP_CONST char * s, if ( !at->at_oid ) { if ( ( flags & ( LDAP_SCHEMA_ALLOW_NO_OID | LDAP_SCHEMA_ALLOW_OID_MACRO ) ) - && (ss == savepos) ) { + && (ss == savepos) ) + { /* Backtracking */ ss = savepos; kind = get_token(&ss,&sval); if ( kind == TK_BAREWORD ) { - if ( !strcmp(sval, "NAME") || - !strcmp(sval, "DESC") || - !strcmp(sval, "OBSOLETE") || - !strcmp(sval, "SUP") || - !strcmp(sval, "EQUALITY") || - !strcmp(sval, "ORDERING") || - !strcmp(sval, "SUBSTR") || - !strcmp(sval, "SYNTAX") || - !strcmp(sval, "SINGLE-VALUE") || - !strcmp(sval, "COLLECTIVE") || - !strcmp(sval, "NO-USER-MODIFICATION") || - !strcmp(sval, "USAGE") || - !strncmp(sval, "X-", 2) ) { + if ( !strcasecmp(sval, "NAME") || + !strcasecmp(sval, "DESC") || + !strcasecmp(sval, "OBSOLETE") || + !strcasecmp(sval, "SUP") || + !strcasecmp(sval, "EQUALITY") || + !strcasecmp(sval, "ORDERING") || + !strcasecmp(sval, "SUBSTR") || + !strcasecmp(sval, "SYNTAX") || + !strcasecmp(sval, "SINGLE-VALUE") || + !strcasecmp(sval, "COLLECTIVE") || + !strcasecmp(sval, "NO-USER-MODIFICATION") || + !strcasecmp(sval, "USAGE") || + !strncasecmp(sval, "X-", 2) ) + { /* Missing OID, backtrack */ ss = savepos; } else if ( flags - & LDAP_SCHEMA_ALLOW_OID_MACRO) { + & LDAP_SCHEMA_ALLOW_OID_MACRO) + { /* Non-numerical OID ... */ int len = ss-savepos; at->at_oid = LDAP_MALLOC(len+1); @@ -2084,13 +2148,13 @@ ldap_str2attributetype( LDAP_CONST char * s, switch (kind) { case TK_EOS: *code = LDAP_SCHERR_NORIGHTPAREN; - *errp = ss; + *errp = EndOfInput; ldap_attributetype_free(at); return NULL; case TK_RIGHTPAREN: return at; case TK_BAREWORD: - if ( !strcmp(sval,"NAME") ) { + if ( !strcasecmp(sval,"NAME") ) { LDAP_FREE(sval); if ( seen_name ) { *code = LDAP_SCHERR_DUPOPT; @@ -2107,7 +2171,7 @@ ldap_str2attributetype( LDAP_CONST char * s, ldap_attributetype_free(at); return NULL; } - } else if ( !strcmp(sval,"DESC") ) { + } else if ( !strcasecmp(sval,"DESC") ) { LDAP_FREE(sval); if ( seen_desc ) { *code = LDAP_SCHERR_DUPOPT; @@ -2127,7 +2191,7 @@ ldap_str2attributetype( LDAP_CONST char * s, } at->at_desc = sval; parse_whsp(&ss); - } else if ( !strcmp(sval,"OBSOLETE") ) { + } else if ( !strcasecmp(sval,"OBSOLETE") ) { LDAP_FREE(sval); if ( seen_obsolete ) { *code = LDAP_SCHERR_DUPOPT; @@ -2138,7 +2202,7 @@ ldap_str2attributetype( LDAP_CONST char * s, seen_obsolete = 1; at->at_obsolete = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"SUP") ) { + } else if ( !strcasecmp(sval,"SUP") ) { LDAP_FREE(sval); if ( seen_sup ) { *code = LDAP_SCHERR_DUPOPT; @@ -2153,7 +2217,7 @@ ldap_str2attributetype( LDAP_CONST char * s, ldap_attributetype_free(at); return NULL; } - } else if ( !strcmp(sval,"EQUALITY") ) { + } else if ( !strcasecmp(sval,"EQUALITY") ) { LDAP_FREE(sval); if ( seen_equality ) { *code = LDAP_SCHERR_DUPOPT; @@ -2168,7 +2232,7 @@ ldap_str2attributetype( LDAP_CONST char * s, ldap_attributetype_free(at); return NULL; } - } else if ( !strcmp(sval,"ORDERING") ) { + } else if ( !strcasecmp(sval,"ORDERING") ) { LDAP_FREE(sval); if ( seen_ordering ) { *code = LDAP_SCHERR_DUPOPT; @@ -2183,7 +2247,7 @@ ldap_str2attributetype( LDAP_CONST char * s, ldap_attributetype_free(at); return NULL; } - } else if ( !strcmp(sval,"SUBSTR") ) { + } else if ( !strcasecmp(sval,"SUBSTR") ) { LDAP_FREE(sval); if ( seen_substr ) { *code = LDAP_SCHERR_DUPOPT; @@ -2198,7 +2262,7 @@ ldap_str2attributetype( LDAP_CONST char * s, ldap_attributetype_free(at); return NULL; } - } else if ( !strcmp(sval,"SYNTAX") ) { + } else if ( !strcasecmp(sval,"SYNTAX") ) { LDAP_FREE(sval); if ( seen_syntax ) { *code = LDAP_SCHERR_DUPOPT; @@ -2242,7 +2306,7 @@ ldap_str2attributetype( LDAP_CONST char * s, } } parse_whsp(&ss); - } else if ( !strcmp(sval,"SINGLE-VALUE") ) { + } else if ( !strcasecmp(sval,"SINGLE-VALUE") ) { LDAP_FREE(sval); if ( at->at_single_value ) { *code = LDAP_SCHERR_DUPOPT; @@ -2252,7 +2316,7 @@ ldap_str2attributetype( LDAP_CONST char * s, } at->at_single_value = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"COLLECTIVE") ) { + } else if ( !strcasecmp(sval,"COLLECTIVE") ) { LDAP_FREE(sval); if ( at->at_collective ) { *code = LDAP_SCHERR_DUPOPT; @@ -2262,7 +2326,7 @@ ldap_str2attributetype( LDAP_CONST char * s, } at->at_collective = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"NO-USER-MODIFICATION") ) { + } else if ( !strcasecmp(sval,"NO-USER-MODIFICATION") ) { LDAP_FREE(sval); if ( at->at_no_user_mod ) { *code = LDAP_SCHERR_DUPOPT; @@ -2272,7 +2336,7 @@ ldap_str2attributetype( LDAP_CONST char * s, } at->at_no_user_mod = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"USAGE") ) { + } else if ( !strcasecmp(sval,"USAGE") ) { LDAP_FREE(sval); if ( seen_usage ) { *code = LDAP_SCHERR_DUPOPT; @@ -2348,6 +2412,7 @@ ldap_str2attributetype( LDAP_CONST char * s, void ldap_objectclass_free(LDAPObjectClass * oc) { + if (!oc) return; LDAP_FREE(oc->oc_oid); if (oc->oc_names) LDAP_VFREE(oc->oc_names); if (oc->oc_desc) LDAP_FREE(oc->oc_desc); @@ -2364,7 +2429,7 @@ ldap_str2objectclass( LDAP_CONST char * s, LDAP_CONST char ** errp, LDAP_CONST unsigned flags ) { - int kind; + tk_t kind; const char * ss = s; char * sval; int seen_name = 0; @@ -2417,16 +2482,16 @@ ldap_str2objectclass( LDAP_CONST char * s, ss = savepos; kind = get_token(&ss,&sval); if ( kind == TK_BAREWORD ) { - if ( !strcmp(sval, "NAME") || - !strcmp(sval, "DESC") || - !strcmp(sval, "OBSOLETE") || - !strcmp(sval, "SUP") || - !strcmp(sval, "ABSTRACT") || - !strcmp(sval, "STRUCTURAL") || - !strcmp(sval, "AUXILIARY") || - !strcmp(sval, "MUST") || - !strcmp(sval, "MAY") || - !strncmp(sval, "X-", 2) ) { + if ( !strcasecmp(sval, "NAME") || + !strcasecmp(sval, "DESC") || + !strcasecmp(sval, "OBSOLETE") || + !strcasecmp(sval, "SUP") || + !strcasecmp(sval, "ABSTRACT") || + !strcasecmp(sval, "STRUCTURAL") || + !strcasecmp(sval, "AUXILIARY") || + !strcasecmp(sval, "MUST") || + !strcasecmp(sval, "MAY") || + !strncasecmp(sval, "X-", 2) ) { /* Missing OID, backtrack */ ss = savepos; } else if ( flags & @@ -2439,6 +2504,7 @@ ldap_str2objectclass( LDAP_CONST char * s, } } LDAP_FREE(sval); + *code = 0; } else { *errp = ss; ldap_objectclass_free(oc); @@ -2456,13 +2522,13 @@ ldap_str2objectclass( LDAP_CONST char * s, switch (kind) { case TK_EOS: *code = LDAP_SCHERR_NORIGHTPAREN; - *errp = ss; + *errp = EndOfInput; ldap_objectclass_free(oc); return NULL; case TK_RIGHTPAREN: return oc; case TK_BAREWORD: - if ( !strcmp(sval,"NAME") ) { + if ( !strcasecmp(sval,"NAME") ) { LDAP_FREE(sval); if ( seen_name ) { *code = LDAP_SCHERR_DUPOPT; @@ -2479,7 +2545,7 @@ ldap_str2objectclass( LDAP_CONST char * s, ldap_objectclass_free(oc); return NULL; } - } else if ( !strcmp(sval,"DESC") ) { + } else if ( !strcasecmp(sval,"DESC") ) { LDAP_FREE(sval); if ( seen_desc ) { *code = LDAP_SCHERR_DUPOPT; @@ -2499,7 +2565,7 @@ ldap_str2objectclass( LDAP_CONST char * s, } oc->oc_desc = sval; parse_whsp(&ss); - } else if ( !strcmp(sval,"OBSOLETE") ) { + } else if ( !strcasecmp(sval,"OBSOLETE") ) { LDAP_FREE(sval); if ( seen_obsolete ) { *code = LDAP_SCHERR_DUPOPT; @@ -2510,7 +2576,7 @@ ldap_str2objectclass( LDAP_CONST char * s, seen_obsolete = 1; oc->oc_obsolete = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"SUP") ) { + } else if ( !strcasecmp(sval,"SUP") ) { LDAP_FREE(sval); if ( seen_sup ) { *code = LDAP_SCHERR_DUPOPT; @@ -2522,12 +2588,13 @@ ldap_str2objectclass( LDAP_CONST char * s, oc->oc_sup_oids = parse_oids(&ss, code, flags); - if ( !oc->oc_sup_oids ) { + if ( !oc->oc_sup_oids && *code != LDAP_SUCCESS ) { *errp = ss; ldap_objectclass_free(oc); return NULL; } - } else if ( !strcmp(sval,"ABSTRACT") ) { + *code = 0; + } else if ( !strcasecmp(sval,"ABSTRACT") ) { LDAP_FREE(sval); if ( seen_kind ) { *code = LDAP_SCHERR_DUPOPT; @@ -2538,7 +2605,7 @@ ldap_str2objectclass( LDAP_CONST char * s, seen_kind = 1; oc->oc_kind = LDAP_SCHEMA_ABSTRACT; parse_whsp(&ss); - } else if ( !strcmp(sval,"STRUCTURAL") ) { + } else if ( !strcasecmp(sval,"STRUCTURAL") ) { LDAP_FREE(sval); if ( seen_kind ) { *code = LDAP_SCHERR_DUPOPT; @@ -2549,7 +2616,7 @@ ldap_str2objectclass( LDAP_CONST char * s, seen_kind = 1; oc->oc_kind = LDAP_SCHEMA_STRUCTURAL; parse_whsp(&ss); - } else if ( !strcmp(sval,"AUXILIARY") ) { + } else if ( !strcasecmp(sval,"AUXILIARY") ) { LDAP_FREE(sval); if ( seen_kind ) { *code = LDAP_SCHERR_DUPOPT; @@ -2560,7 +2627,7 @@ ldap_str2objectclass( LDAP_CONST char * s, seen_kind = 1; oc->oc_kind = LDAP_SCHEMA_AUXILIARY; parse_whsp(&ss); - } else if ( !strcmp(sval,"MUST") ) { + } else if ( !strcasecmp(sval,"MUST") ) { LDAP_FREE(sval); if ( seen_must ) { *code = LDAP_SCHERR_DUPOPT; @@ -2570,13 +2637,14 @@ ldap_str2objectclass( LDAP_CONST char * s, } seen_must = 1; oc->oc_at_oids_must = parse_oids(&ss,code,0); - if ( !oc->oc_at_oids_must ) { + if ( !oc->oc_at_oids_must && *code != LDAP_SUCCESS ) { *errp = ss; ldap_objectclass_free(oc); return NULL; } + *code = 0; parse_whsp(&ss); - } else if ( !strcmp(sval,"MAY") ) { + } else if ( !strcasecmp(sval,"MAY") ) { LDAP_FREE(sval); if ( seen_may ) { *code = LDAP_SCHERR_DUPOPT; @@ -2586,15 +2654,17 @@ ldap_str2objectclass( LDAP_CONST char * s, } seen_may = 1; oc->oc_at_oids_may = parse_oids(&ss,code,0); - if ( !oc->oc_at_oids_may ) { + if ( !oc->oc_at_oids_may && *code != LDAP_SUCCESS ) { *errp = ss; ldap_objectclass_free(oc); return NULL; } + *code = 0; parse_whsp(&ss); } else if ( sval[0] == 'X' && sval[1] == '-' ) { /* Should be parse_qdstrings */ ext_vals = parse_qdescrs(&ss, code); + *code = 0; if ( !ext_vals ) { *errp = ss; ldap_objectclass_free(oc); @@ -2629,6 +2699,7 @@ ldap_str2objectclass( LDAP_CONST char * s, void ldap_contentrule_free(LDAPContentRule * cr) { + if (!cr) return; LDAP_FREE(cr->cr_oid); if (cr->cr_names) LDAP_VFREE(cr->cr_names); if (cr->cr_desc) LDAP_FREE(cr->cr_desc); @@ -2646,7 +2717,7 @@ ldap_str2contentrule( LDAP_CONST char * s, LDAP_CONST char ** errp, LDAP_CONST unsigned flags ) { - int kind; + tk_t kind; const char * ss = s; char * sval; int seen_name = 0; @@ -2689,9 +2760,36 @@ ldap_str2contentrule( LDAP_CONST char * s, savepos = ss; cr->cr_oid = ldap_int_parse_numericoid(&ss,code,0); if ( !cr->cr_oid ) { - *errp = ss; - ldap_contentrule_free(cr); - return NULL; + if ( (flags & LDAP_SCHEMA_ALLOW_ALL) && (ss == savepos) ) { + /* Backtracking */ + ss = savepos; + kind = get_token(&ss,&sval); + if ( kind == TK_BAREWORD ) { + if ( !strcasecmp(sval, "NAME") || + !strcasecmp(sval, "DESC") || + !strcasecmp(sval, "OBSOLETE") || + !strcasecmp(sval, "AUX") || + !strcasecmp(sval, "MUST") || + !strcasecmp(sval, "MAY") || + !strcasecmp(sval, "NOT") || + !strncasecmp(sval, "X-", 2) ) { + /* Missing OID, backtrack */ + ss = savepos; + } else if ( flags & + LDAP_SCHEMA_ALLOW_OID_MACRO ) { + /* Non-numerical OID, ignore */ + int len = ss-savepos; + cr->cr_oid = LDAP_MALLOC(len+1); + strncpy(cr->cr_oid, savepos, len); + cr->cr_oid[len] = 0; + } + } + LDAP_FREE(sval); + } else { + *errp = ss; + ldap_contentrule_free(cr); + return NULL; + } } parse_whsp(&ss); @@ -2704,13 +2802,13 @@ ldap_str2contentrule( LDAP_CONST char * s, switch (kind) { case TK_EOS: *code = LDAP_SCHERR_NORIGHTPAREN; - *errp = ss; + *errp = EndOfInput; ldap_contentrule_free(cr); return NULL; case TK_RIGHTPAREN: return cr; case TK_BAREWORD: - if ( !strcmp(sval,"NAME") ) { + if ( !strcasecmp(sval,"NAME") ) { LDAP_FREE(sval); if ( seen_name ) { *code = LDAP_SCHERR_DUPOPT; @@ -2727,7 +2825,7 @@ ldap_str2contentrule( LDAP_CONST char * s, ldap_contentrule_free(cr); return NULL; } - } else if ( !strcmp(sval,"DESC") ) { + } else if ( !strcasecmp(sval,"DESC") ) { LDAP_FREE(sval); if ( seen_desc ) { *code = LDAP_SCHERR_DUPOPT; @@ -2747,7 +2845,7 @@ ldap_str2contentrule( LDAP_CONST char * s, } cr->cr_desc = sval; parse_whsp(&ss); - } else if ( !strcmp(sval,"OBSOLETE") ) { + } else if ( !strcasecmp(sval,"OBSOLETE") ) { LDAP_FREE(sval); if ( seen_obsolete ) { *code = LDAP_SCHERR_DUPOPT; @@ -2758,7 +2856,7 @@ ldap_str2contentrule( LDAP_CONST char * s, seen_obsolete = 1; cr->cr_obsolete = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"AUX") ) { + } else if ( !strcasecmp(sval,"AUX") ) { LDAP_FREE(sval); if ( seen_aux ) { *code = LDAP_SCHERR_DUPOPT; @@ -2774,7 +2872,7 @@ ldap_str2contentrule( LDAP_CONST char * s, return NULL; } parse_whsp(&ss); - } else if ( !strcmp(sval,"MUST") ) { + } else if ( !strcasecmp(sval,"MUST") ) { LDAP_FREE(sval); if ( seen_must ) { *code = LDAP_SCHERR_DUPOPT; @@ -2784,13 +2882,13 @@ ldap_str2contentrule( LDAP_CONST char * s, } seen_must = 1; cr->cr_at_oids_must = parse_oids(&ss,code,0); - if ( !cr->cr_at_oids_must ) { + if ( !cr->cr_at_oids_must && *code != LDAP_SUCCESS ) { *errp = ss; ldap_contentrule_free(cr); return NULL; } parse_whsp(&ss); - } else if ( !strcmp(sval,"MAY") ) { + } else if ( !strcasecmp(sval,"MAY") ) { LDAP_FREE(sval); if ( seen_may ) { *code = LDAP_SCHERR_DUPOPT; @@ -2800,13 +2898,13 @@ ldap_str2contentrule( LDAP_CONST char * s, } seen_may = 1; cr->cr_at_oids_may = parse_oids(&ss,code,0); - if ( !cr->cr_at_oids_may ) { + if ( !cr->cr_at_oids_may && *code != LDAP_SUCCESS ) { *errp = ss; ldap_contentrule_free(cr); return NULL; } parse_whsp(&ss); - } else if ( !strcmp(sval,"NOT") ) { + } else if ( !strcasecmp(sval,"NOT") ) { LDAP_FREE(sval); if ( seen_not ) { *code = LDAP_SCHERR_DUPOPT; @@ -2816,7 +2914,7 @@ ldap_str2contentrule( LDAP_CONST char * s, } seen_not = 1; cr->cr_at_oids_not = parse_oids(&ss,code,0); - if ( !cr->cr_at_oids_not ) { + if ( !cr->cr_at_oids_not && *code != LDAP_SUCCESS ) { *errp = ss; ldap_contentrule_free(cr); return NULL; @@ -2859,6 +2957,7 @@ ldap_str2contentrule( LDAP_CONST char * s, void ldap_structurerule_free(LDAPStructureRule * sr) { + if (!sr) return; if (sr->sr_names) LDAP_VFREE(sr->sr_names); if (sr->sr_desc) LDAP_FREE(sr->sr_desc); if (sr->sr_nameform) LDAP_FREE(sr->sr_nameform); @@ -2873,7 +2972,8 @@ ldap_str2structurerule( LDAP_CONST char * s, LDAP_CONST char ** errp, LDAP_CONST unsigned flags ) { - int kind, ret; + tk_t kind; + int ret; const char * ss = s; char * sval; int seen_name = 0; @@ -2928,7 +3028,7 @@ ldap_str2structurerule( LDAP_CONST char * s, switch (kind) { case TK_EOS: *code = LDAP_SCHERR_NORIGHTPAREN; - *errp = ss; + *errp = EndOfInput; ldap_structurerule_free(sr); return NULL; case TK_RIGHTPAREN: @@ -2939,7 +3039,7 @@ ldap_str2structurerule( LDAP_CONST char * s, } return sr; case TK_BAREWORD: - if ( !strcmp(sval,"NAME") ) { + if ( !strcasecmp(sval,"NAME") ) { LDAP_FREE(sval); if ( seen_name ) { *code = LDAP_SCHERR_DUPOPT; @@ -2956,7 +3056,7 @@ ldap_str2structurerule( LDAP_CONST char * s, ldap_structurerule_free(sr); return NULL; } - } else if ( !strcmp(sval,"DESC") ) { + } else if ( !strcasecmp(sval,"DESC") ) { LDAP_FREE(sval); if ( seen_desc ) { *code = LDAP_SCHERR_DUPOPT; @@ -2976,7 +3076,7 @@ ldap_str2structurerule( LDAP_CONST char * s, } sr->sr_desc = sval; parse_whsp(&ss); - } else if ( !strcmp(sval,"OBSOLETE") ) { + } else if ( !strcasecmp(sval,"OBSOLETE") ) { LDAP_FREE(sval); if ( seen_obsolete ) { *code = LDAP_SCHERR_DUPOPT; @@ -2987,7 +3087,7 @@ ldap_str2structurerule( LDAP_CONST char * s, seen_obsolete = 1; sr->sr_obsolete = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"FORM") ) { + } else if ( !strcasecmp(sval,"FORM") ) { LDAP_FREE(sval); if ( seen_nameform ) { *code = LDAP_SCHERR_DUPOPT; @@ -3040,6 +3140,7 @@ ldap_str2structurerule( LDAP_CONST char * s, void ldap_nameform_free(LDAPNameForm * nf) { + if (!nf) return; LDAP_FREE(nf->nf_oid); if (nf->nf_names) LDAP_VFREE(nf->nf_names); if (nf->nf_desc) LDAP_FREE(nf->nf_desc); @@ -3056,7 +3157,7 @@ ldap_str2nameform( LDAP_CONST char * s, LDAP_CONST char ** errp, LDAP_CONST unsigned flags ) { - int kind; + tk_t kind; const char * ss = s; char * sval; int seen_name = 0; @@ -3117,7 +3218,7 @@ ldap_str2nameform( LDAP_CONST char * s, switch (kind) { case TK_EOS: *code = LDAP_SCHERR_NORIGHTPAREN; - *errp = ss; + *errp = EndOfInput; ldap_nameform_free(nf); return NULL; case TK_RIGHTPAREN: @@ -3128,7 +3229,7 @@ ldap_str2nameform( LDAP_CONST char * s, } return nf; case TK_BAREWORD: - if ( !strcmp(sval,"NAME") ) { + if ( !strcasecmp(sval,"NAME") ) { LDAP_FREE(sval); if ( seen_name ) { *code = LDAP_SCHERR_DUPOPT; @@ -3145,7 +3246,7 @@ ldap_str2nameform( LDAP_CONST char * s, ldap_nameform_free(nf); return NULL; } - } else if ( !strcmp(sval,"DESC") ) { + } else if ( !strcasecmp(sval,"DESC") ) { LDAP_FREE(sval); if ( seen_desc ) { *code = LDAP_SCHERR_DUPOPT; @@ -3165,7 +3266,7 @@ ldap_str2nameform( LDAP_CONST char * s, } nf->nf_desc = sval; parse_whsp(&ss); - } else if ( !strcmp(sval,"OBSOLETE") ) { + } else if ( !strcasecmp(sval,"OBSOLETE") ) { LDAP_FREE(sval); if ( seen_obsolete ) { *code = LDAP_SCHERR_DUPOPT; @@ -3176,7 +3277,22 @@ ldap_str2nameform( LDAP_CONST char * s, seen_obsolete = 1; nf->nf_obsolete = LDAP_SCHEMA_YES; parse_whsp(&ss); - } else if ( !strcmp(sval,"MUST") ) { + } else if ( !strcasecmp(sval,"OC") ) { + LDAP_FREE(sval); + if ( seen_class ) { + *code = LDAP_SCHERR_DUPOPT; + *errp = ss; + ldap_nameform_free(nf); + return(NULL); + } + seen_class = 1; + nf->nf_objectclass = parse_woid(&ss,code); + if ( !nf->nf_objectclass ) { + *errp = ss; + ldap_nameform_free(nf); + return NULL; + } + } else if ( !strcasecmp(sval,"MUST") ) { LDAP_FREE(sval); if ( seen_must ) { *code = LDAP_SCHERR_DUPOPT; @@ -3186,13 +3302,13 @@ ldap_str2nameform( LDAP_CONST char * s, } seen_must = 1; nf->nf_at_oids_must = parse_oids(&ss,code,0); - if ( !nf->nf_at_oids_must ) { + if ( !nf->nf_at_oids_must && *code != LDAP_SUCCESS ) { *errp = ss; ldap_nameform_free(nf); return NULL; } parse_whsp(&ss); - } else if ( !strcmp(sval,"MAY") ) { + } else if ( !strcasecmp(sval,"MAY") ) { LDAP_FREE(sval); if ( seen_may ) { *code = LDAP_SCHERR_DUPOPT; @@ -3202,7 +3318,7 @@ ldap_str2nameform( LDAP_CONST char * s, } seen_may = 1; nf->nf_at_oids_may = parse_oids(&ss,code,0); - if ( !nf->nf_at_oids_may ) { + if ( !nf->nf_at_oids_may && *code != LDAP_SUCCESS ) { *errp = ss; ldap_nameform_free(nf); return NULL;