X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=servers%2Fslapd%2Fmra.c;h=2bf8af35ae19509dd110d4a6b4025ba3c4cfeecc;hb=3c7bbd05cf91687913147b617ee36226e6e7ebf2;hp=a8f2d7fcfd87f14f0832e85f3d843867cbe0ec93;hpb=152829be87dbff64388e3771807dad467e2d1401;p=openldap diff --git a/servers/slapd/mra.c b/servers/slapd/mra.c index a8f2d7fcfd..2bf8af35ae 100644 --- a/servers/slapd/mra.c +++ b/servers/slapd/mra.c @@ -1,9 +1,18 @@ +/* mra.c - routines for dealing with extensible matching rule assertions */ /* $OpenLDAP$ */ -/* - * Copyright 1998-2003 The OpenLDAP Foundation, All Rights Reserved. - * COPYING RESTRICTIONS APPLY, see COPYRIGHT file +/* This work is part of OpenLDAP Software . + * + * Copyright 1998-2013 The OpenLDAP Foundation. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in the file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * . */ -/* mra.c - routines for dealing with extensible matching rule assertions */ #include "portable.h" @@ -14,81 +23,70 @@ #include "slap.h" +#ifdef LDAP_COMP_MATCH +#include "component.h" +#endif + void mra_free( + Operation *op, MatchingRuleAssertion *mra, - int freeit -) + int freeit ) { - ch_free( mra->ma_value.bv_val ); - if ( freeit ) { - ch_free( (char *) mra ); +#ifdef LDAP_COMP_MATCH + /* free component assertion */ + if ( mra->ma_rule->smr_usage & SLAP_MR_COMPONENT && mra->ma_cf ) { + component_free( mra->ma_cf ); } +#endif + /* op->o_tmpfree( mra->ma_value.bv_val, op->o_tmpmemctx ); */ + ch_free( mra->ma_value.bv_val ); + if ( mra->ma_desc && mra->ma_desc->ad_flags & SLAP_DESC_TEMPORARY ) + op->o_tmpfree( mra->ma_desc, op->o_tmpmemctx ); + if ( freeit ) op->o_tmpfree( (char *) mra, op->o_tmpmemctx ); } int get_mra( + Operation *op, BerElement *ber, - MatchingRuleAssertion **mra, - const char **text -) + Filter *f, + const char **text ) { int rc; ber_tag_t tag, rtag; ber_len_t length; - struct berval type = { 0, NULL }, value; - MatchingRuleAssertion *ma; - - ma = ch_malloc( sizeof( MatchingRuleAssertion ) ); - ma->ma_rule = NULL; - ma->ma_rule_text.bv_len = 0; - ma->ma_rule_text.bv_val = NULL; - ma->ma_desc = NULL; - ma->ma_dnattrs = 0; - ma->ma_value.bv_len = 0; - ma->ma_value.bv_val = NULL; + struct berval type = BER_BVNULL; + struct berval value = BER_BVNULL; + struct berval rule_text = BER_BVNULL; + MatchingRuleAssertion ma = { 0 }; +#ifdef LDAP_COMP_MATCH + AttributeAliasing* aa = NULL; +#endif - rtag = ber_scanf( ber, "{t", &tag ); + rtag = ber_scanf( ber, "{t" /*"}"*/, &tag ); if( rtag == LBER_ERROR ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "get_mra: ber_scanf (\"{t\") failure\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); -#endif *text = "Error parsing matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } if ( tag == LDAP_FILTER_EXT_OID ) { - rtag = ber_scanf( ber, "m", &ma->ma_rule_text ); + rtag = ber_scanf( ber, "m", &rule_text ); if ( rtag == LBER_ERROR ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "get_mra: ber_scanf(\"o\") failure.\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf for mr\n", 0, 0, 0 ); -#endif *text = "Error parsing matching rule in matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } rtag = ber_scanf( ber, "t", &tag ); if( rtag == LBER_ERROR ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "get_mra: ber_scanf (\"t\") failure\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); -#endif *text = "Error parsing matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } } @@ -96,12 +94,7 @@ get_mra( if ( tag == LDAP_FILTER_EXT_TYPE ) { rtag = ber_scanf( ber, "m", &type ); if ( rtag == LBER_ERROR ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "get_mra: ber_scanf (\"o\") failure.\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf for ad\n", 0, 0, 0 ); -#endif *text = "Error parsing attribute description in matching rule assertion"; return SLAPD_DISCONNECT; @@ -109,152 +102,130 @@ get_mra( rtag = ber_scanf( ber, "t", &tag ); if( rtag == LBER_ERROR ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "get_mra: ber_scanf (\"t\") failure.\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); -#endif *text = "Error parsing matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } } if ( tag != LDAP_FILTER_EXT_VALUE ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "get_mra: ber_scanf missing value\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf missing value\n", 0, 0, 0 ); -#endif *text = "Missing value in matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } rtag = ber_scanf( ber, "m", &value ); if( rtag == LBER_ERROR ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "get_mra: ber_scanf (\"o\") failure.\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); -#endif *text = "Error decoding value in matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } tag = ber_peek_tag( ber, &length ); if ( tag == LDAP_FILTER_EXT_DNATTRS ) { - rtag = ber_scanf( ber, "b}", &ma->ma_dnattrs ); + rtag = ber_scanf( ber, /*"{"*/ "b}", &ma.ma_dnattrs ); } else { - rtag = ber_scanf( ber, "}" ); + rtag = ber_scanf( ber, /*"{"*/ "}" ); } if( rtag == LBER_ERROR ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, "get_mra: ber_scanf failure\n", 0, 0, 0); -#else Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); -#endif *text = "Error decoding dnattrs matching rule assertion"; - mra_free( ma, 1 ); return SLAPD_DISCONNECT; } if( type.bv_val != NULL ) { - rc = slap_bv2ad( &type, &ma->ma_desc, text ); + rc = slap_bv2ad( &type, &ma.ma_desc, text ); if( rc != LDAP_SUCCESS ) { - mra_free( ma, 1 ); - return rc; + f->f_choice |= SLAPD_FILTER_UNDEFINED; + rc = slap_bv2undef_ad( &type, &ma.ma_desc, text, + SLAP_AD_PROXIED|SLAP_AD_NOINSERT ); + + if( rc != LDAP_SUCCESS ) { + ma.ma_desc = slap_bv2tmp_ad( &type, op->o_tmpmemctx ); + rc = LDAP_SUCCESS; + } } } - if( ma->ma_rule_text.bv_val != NULL ) { - ma->ma_rule = mr_bvfind( &ma->ma_rule_text ); - if( ma->ma_rule == NULL ) { - mra_free( ma, 1 ); + if( rule_text.bv_val != NULL ) { + ma.ma_rule = mr_bvfind( &rule_text ); + if( ma.ma_rule == NULL ) { *text = "matching rule not recognized"; return LDAP_INAPPROPRIATE_MATCHING; } } - if ( ma->ma_rule == NULL ) { + if ( ma.ma_rule == NULL ) { /* * Need either type or rule ... */ - if ( ma->ma_desc == NULL ) { - mra_free( ma, 1 ); + if ( ma.ma_desc == NULL ) { *text = "no matching rule or type"; return LDAP_INAPPROPRIATE_MATCHING; } - if ( ma->ma_desc->ad_type->sat_equality != NULL && - ma->ma_desc->ad_type->sat_equality->smr_usage & SLAP_MR_EXT ) + if ( ma.ma_desc->ad_type->sat_equality != NULL && + ma.ma_desc->ad_type->sat_equality->smr_usage & SLAP_MR_EXT ) { /* no matching rule was provided, use the attribute's equality rule if it supports extensible matching. */ - ma->ma_rule = ma->ma_desc->ad_type->sat_equality; + ma.ma_rule = ma.ma_desc->ad_type->sat_equality; } else { *text = "no appropriate rule to use for type"; - mra_free( ma, 1 ); return LDAP_INAPPROPRIATE_MATCHING; } } - if ( ma->ma_desc != NULL ) { - if( !mr_usable_with_at( ma->ma_rule, ma->ma_desc->ad_type ) ) { - mra_free( ma, 1 ); + if ( ma.ma_desc != NULL ) { + if( !mr_usable_with_at( ma.ma_rule, ma.ma_desc->ad_type ) ) { *text = "matching rule use with this attribute not appropriate"; return LDAP_INAPPROPRIATE_MATCHING; } -#ifndef SLAP_NVALUES - /* - * OK, if no matching rule, normalize for equality, otherwise - * normalize for the matching rule. - */ - rc = value_validate_normalize( ma->ma_desc, SLAP_MR_EQUALITY, - &value, &ma->ma_value, text ); - } else { - /* - * Need to normalize, but how? - */ - rc = value_validate( ma->ma_rule, &value, text ); - if ( rc == LDAP_SUCCESS ) { - ber_dupbv( &ma->ma_value, &value ); - } -#endif } -#ifdef SLAP_NVALUES /* * Normalize per matching rule */ - rc = asserted_value_validate_normalize( ma->ma_desc, - ma->ma_rule, + rc = asserted_value_validate_normalize( ma.ma_desc, + ma.ma_rule, SLAP_MR_EXT|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX, - &ma->ma_value, &value, text ); - if ( rc == LDAP_SUCCESS ) { - ber_dupbv( &ma->ma_value, &value ); + &value, &ma.ma_value, text, op->o_tmpmemctx ); + + if( rc != LDAP_SUCCESS ) return rc; + +#ifdef LDAP_COMP_MATCH + /* Check If this attribute is aliased */ + if ( is_aliased_attribute && ma.ma_desc && ( aa = is_aliased_attribute ( ma.ma_desc ) ) ) { + rc = get_aliased_filter ( op, &ma, aa, text ); + if ( rc != LDAP_SUCCESS ) return rc; + } + else if ( ma.ma_rule && ma.ma_rule->smr_usage & SLAP_MR_COMPONENT ) { + /* Matching Rule for Component Matching */ + rc = get_comp_filter( op, &ma.ma_value, &ma.ma_cf, text ); + if ( rc != LDAP_SUCCESS ) return rc; } #endif - if( rc != LDAP_SUCCESS ) { - mra_free( ma, 1 ); - return rc; + length = sizeof(ma); + /* Append rule_text to end of struct */ + if (rule_text.bv_val) length += rule_text.bv_len + 1; + f->f_mra = op->o_tmpalloc( length, op->o_tmpmemctx ); + *f->f_mra = ma; + if (rule_text.bv_val) { + f->f_mra->ma_rule_text.bv_len = rule_text.bv_len; + f->f_mra->ma_rule_text.bv_val = (char *)(f->f_mra+1); + AC_MEMCPY(f->f_mra->ma_rule_text.bv_val, rule_text.bv_val, + rule_text.bv_len+1); } - *mra = ma; return LDAP_SUCCESS; } -