X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=servers%2Fslapd%2Fmra.c;h=1e7a7e63782af0f8d48e586741c2a0938147aa81;hb=b94d5e17e22b58b990dac4d4af5319be915366a6;hp=eca939b02674fd8b17def10f75c736b76a158c53;hpb=6107ba67d2fd7eadb23ffdd1d284306011ef4013;p=openldap diff --git a/servers/slapd/mra.c b/servers/slapd/mra.c index eca939b026..1e7a7e6378 100644 --- a/servers/slapd/mra.c +++ b/servers/slapd/mra.c @@ -1,9 +1,18 @@ +/* mra.c - routines for dealing with extensible matching rule assertions */ /* $OpenLDAP$ */ -/* - * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved. - * COPYING RESTRICTIONS APPLY, see COPYRIGHT file +/* This work is part of OpenLDAP Software . + * + * Copyright 1998-2004 The OpenLDAP Foundation. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in the file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * . */ -/* mra.c - routines for dealing with extensible matching rule assertions */ #include "portable.h" @@ -16,39 +25,33 @@ void mra_free( + Operation *op, MatchingRuleAssertion *mra, - int freeit -) + int freeit ) { + /* op->o_tmpfree( mra->ma_value.bv_val, op->o_tmpmemctx ); */ ch_free( mra->ma_value.bv_val ); - if ( freeit ) { - ch_free( (char *) mra ); - } + if ( freeit ) op->o_tmpfree( (char *) mra, op->o_tmpmemctx ); } int get_mra( + Operation *op, BerElement *ber, MatchingRuleAssertion **mra, - const char **text -) + const char **text ) { int rc; ber_tag_t tag, rtag; ber_len_t length; - struct berval type = { 0, NULL }, value; - MatchingRuleAssertion *ma; + struct berval type = BER_BVNULL; + struct berval value = BER_BVNULL; + struct berval rule_text = BER_BVNULL; + MatchingRuleAssertion ma; - ma = ch_malloc( sizeof( MatchingRuleAssertion ) ); - ma->ma_rule = NULL; - ma->ma_rule_text.bv_len = 0; - ma->ma_rule_text.bv_val = NULL; - ma->ma_desc = NULL; - ma->ma_dnattrs = 0; - ma->ma_value.bv_len = 0; - ma->ma_value.bv_val = NULL; + memset( &ma, 0, sizeof ma); - rtag = ber_scanf( ber, "{t", &tag ); + rtag = ber_scanf( ber, "{t" /*"}"*/, &tag ); if( rtag == LBER_ERROR ) { #ifdef NEW_LOGGING @@ -59,12 +62,11 @@ get_mra( #endif *text = "Error parsing matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } if ( tag == LDAP_FILTER_EXT_OID ) { - rtag = ber_scanf( ber, "m", &ma->ma_rule_text ); + rtag = ber_scanf( ber, "m", &rule_text ); if ( rtag == LBER_ERROR ) { #ifdef NEW_LOGGING LDAP_LOG( OPERATION, ERR, @@ -74,7 +76,6 @@ get_mra( #endif *text = "Error parsing matching rule in matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } @@ -88,7 +89,6 @@ get_mra( #endif *text = "Error parsing matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } } @@ -117,7 +117,6 @@ get_mra( #endif *text = "Error parsing matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } } @@ -131,7 +130,6 @@ get_mra( #endif *text = "Missing value in matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } @@ -146,16 +144,15 @@ get_mra( #endif *text = "Error decoding value in matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } tag = ber_peek_tag( ber, &length ); if ( tag == LDAP_FILTER_EXT_DNATTRS ) { - rtag = ber_scanf( ber, "b}", &ma->ma_dnattrs ); + rtag = ber_scanf( ber, /*"{"*/ "b}", &ma.ma_dnattrs ); } else { - rtag = ber_scanf( ber, "}" ); + rtag = ber_scanf( ber, /*"{"*/ "}" ); } if( rtag == LBER_ERROR ) { @@ -166,73 +163,77 @@ get_mra( #endif *text = "Error decoding dnattrs matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } - if( ma->ma_dnattrs ) { - *text = "matching with \":dn\" not supported"; - return LDAP_INAPPROPRIATE_MATCHING; - } - if( type.bv_val != NULL ) { - rc = slap_bv2ad( &type, &ma->ma_desc, text ); + rc = slap_bv2ad( &type, &ma.ma_desc, text ); if( rc != LDAP_SUCCESS ) { - mra_free( ma, 1 ); return rc; } - - } else { - *text = "matching without attribute description rule not supported"; - return LDAP_INAPPROPRIATE_MATCHING; } - if( ma->ma_rule_text.bv_val != NULL ) { - ma->ma_rule = mr_bvfind( &ma->ma_rule_text ); - if( ma->ma_rule == NULL ) { - mra_free( ma, 1 ); + if( rule_text.bv_val != NULL ) { + ma.ma_rule = mr_bvfind( &rule_text ); + if( ma.ma_rule == NULL ) { *text = "matching rule not recognized"; return LDAP_INAPPROPRIATE_MATCHING; } } - if( ma->ma_desc != NULL && - ma->ma_desc->ad_type->sat_equality != NULL && - ma->ma_desc->ad_type->sat_equality->smr_usage & SLAP_MR_EXT ) - { - /* no matching rule was provided, use the attribute's - equality rule if it supports extensible matching. */ - ma->ma_rule = ma->ma_desc->ad_type->sat_equality; + if ( ma.ma_rule == NULL ) { + /* + * Need either type or rule ... + */ + if ( ma.ma_desc == NULL ) { + *text = "no matching rule or type"; + return LDAP_INAPPROPRIATE_MATCHING; + } - } else { - mra_free( ma, 1 ); - return LDAP_INAPPROPRIATE_MATCHING; + if ( ma.ma_desc->ad_type->sat_equality != NULL && + ma.ma_desc->ad_type->sat_equality->smr_usage & SLAP_MR_EXT ) + { + /* no matching rule was provided, use the attribute's + equality rule if it supports extensible matching. */ + ma.ma_rule = ma.ma_desc->ad_type->sat_equality; + + } else { + *text = "no appropriate rule to use for type"; + return LDAP_INAPPROPRIATE_MATCHING; + } } - /* check to see if the matching rule is appropriate for - the syntax of the attribute. This check will need - to be extended to support other kinds of extensible - matching rules */ - if( strcmp( ma->ma_rule->smr_syntax->ssyn_oid, - ma->ma_desc->ad_type->sat_syntax->ssyn_oid ) != 0 ) - { - mra_free( ma, 1 ); - return LDAP_INAPPROPRIATE_MATCHING; + if ( ma.ma_desc != NULL ) { + if( !mr_usable_with_at( ma.ma_rule, ma.ma_desc->ad_type ) ) { + *text = "matching rule use with this attribute not appropriate"; + return LDAP_INAPPROPRIATE_MATCHING; + } + } /* - * OK, if no matching rule, normalize for equality, otherwise - * normalize for the matching rule. + * Normalize per matching rule */ - rc = value_validate_normalize( ma->ma_desc, SLAP_MR_EQUALITY, - &value, &ma->ma_value, text ); + rc = asserted_value_validate_normalize( ma.ma_desc, + ma.ma_rule, + SLAP_MR_EXT|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX, + &value, &ma.ma_value, text, op->o_tmpmemctx ); if( rc != LDAP_SUCCESS ) { - mra_free( ma, 1 ); return rc; } - *mra = ma; + length = sizeof(ma); + /* Append rule_text to end of struct */ + if (rule_text.bv_val) length += rule_text.bv_len + 1; + *mra = op->o_tmpalloc( length, op->o_tmpmemctx ); + **mra = ma; + if (rule_text.bv_val) { + (*mra)->ma_rule_text.bv_len = rule_text.bv_len; + (*mra)->ma_rule_text.bv_val = (char *)(*mra+1); + AC_MEMCPY((*mra)->ma_rule_text.bv_val, rule_text.bv_val, + rule_text.bv_len+1); + } + return LDAP_SUCCESS; } -