fi
])
dnl --------------------------------------------------------------------
-dnl Check for version compatility with back-bdb
+dnl Check for version compatibility with back-bdb
AC_DEFUN([OL_BDB_COMPAT],
[AC_CACHE_CHECK([if Berkeley DB version supported by BDB/HDB backends], [ol_cv_bdb_compat],[
AC_EGREP_CPP(__db_version_compat,[
dnl
dnl defines ol_cv_header linux_threads to 'yes' or 'no'
dnl 'no' implies pthreads.h is not LinuxThreads or pthreads.h
-dnl doesn't exists. Existance of pthread.h should separately
+dnl doesn't exist. Existence of pthread.h should separately
dnl checked.
dnl
AC_DEFUN([OL_HEADER_GNU_PTH_PTHREAD_H], [
dnl
dnl defines ol_cv_header linux_threads to 'yes' or 'no'
dnl 'no' implies pthreads.h is not LinuxThreads or pthreads.h
-dnl doesn't exists. Existance of pthread.h should separately
+dnl doesn't exist. Existence of pthread.h should separately
dnl checked.
dnl
AC_DEFUN([OL_HEADER_LINUX_THREADS], [
])dnl
dnl
dnl --------------------------------------------------------------------
-dnl Check for Cyrus SASL version compatility
+dnl Check for Cyrus SASL version compatibility
AC_DEFUN([OL_SASL_COMPAT],
[AC_CACHE_CHECK([Cyrus SASL library version], [ol_cv_sasl_compat],[
AC_EGREP_CPP(__sasl_compat,[
eval `echo h:help,$opt_alias |\
sed -e 's/-/_/g' -e 's/\([a-zA-Z0-9]\):\([^,]*\),*/opt_ALIAS_\2=\1;/g'`
-# interate over argument line
+# iterate over argument line
opt_PREV=''
while [ $# -gt 0 ]; do
# special option stops processing
eval "opt_${opt_OPT}=yes"
;;
':' )
- # option with argument (multiple occurances override)
+ # option with argument (multiple occurrences override)
eval "opt_${opt_OPT}=\"\$opt_ARG\""
;;
'+' )
- # option with argument (multiple occurances append)
+ # option with argument (multiple occurrences append)
eval "opt_${opt_OPT}=\"\$opt_${opt_OPT}\${ASC_NL}\$opt_ARG\""
;;
* )
fprintf( stderr, _(" -E sasl=(a[utomatic]|i[nteractive]|q[uiet]>\tSASL mode (defaults to automatic if any other -E option provided, otherwise none))\n"));
fprintf( stderr, _(" -E mech=<mech>\tSASL mechanism (default "" e.g. Simple)\n"));
fprintf( stderr, _(" -E realm=<realm>\tSASL Realm (defaults to none)\n"));
- fprintf( stderr, _(" -E authcid=<authcid>\tSASL Authenication Identity (defaults to USER)\n"));
+ fprintf( stderr, _(" -E authcid=<authcid>\tSASL Authentication Identity (defaults to USER)\n"));
fprintf( stderr, _(" -E authzid=<authzid>\tSASL Authorization Identity (defaults to none)\n"));
fprintf( stderr, _(" -E secprops=<secprops>\tSASL Security Properties (defaults to none)\n"));
tool_common_usage();
# validate options
if test $ol_enable_slapd = no ; then
- dnl SLAPD was specificallly disabled
+ dnl SLAPD was specifically disabled
if test $ol_enable_slapi = yes ; then
AC_MSG_WARN([slapd disabled, ignoring --enable-slapi argument])
fi
if test "${ac_cv_header_winsock_h}" != yes; then
dnl Select arg types
- dnl (if this detection becomes permenent, it and the select() detection
+ dnl (if this detection becomes permanent, it and the select() detection
dnl should be done before the yielding select test)
AC_FUNC_SELECT_ARGTYPES
fi
AC_DEFINE(HAVE_PTHREAD_DETACH,1,
[define if you have pthread_detach function])
- dnl Check for setconcurreny functions
+ dnl Check for setconcurrency functions
AC_CHECK_FUNCS( \
pthread_setconcurrency \
pthread_getconcurrency \
ol_with_yielding_select=yes
fi
- dnl Check for setconcurreny functions
+ dnl Check for setconcurrency functions
AC_CHECK_FUNCS( \
thr_setconcurrency \
thr_getconcurrency \
AC_DEFINE(HAVE_TCPD,1, [define if you have -lwrap])
WRAP_LIBS="-lwrap"
elif test $ol_enable_wrappers = yes ; then
- AC_MSG_ERROR([could not find TCP wrappers, select apppropriate options or disable])
+ AC_MSG_ERROR([could not find TCP wrappers, select appropriate options or disable])
else
AC_MSG_WARN([could not find TCP wrappers, support disabled])
WRAP_LIBS=""
Installation:
=============
-Just run the "configure" script with the apropriate options. Especially
+Just run the "configure" script with the appropriate options. Especially
these two options can be imported, if you didn't install the OpenLDAP-
libraries in the default place:
C-libraries are located.
--with-ldap-includes=<path to ldap include files> : To tell configure
where the OpenLDAP include files are located.
---enable-debug to enable compliation with debugging symbols and stderr
+--enable-debug to enable compilation with debugging symbols and stderr
output
(run "configure --help" to see all possible command line options)
WARN_IF_DOC_ERROR = YES
-# This WARN_NO_PARAMDOC option can be abled to get warnings for
+# This WARN_NO_PARAMDOC option can be enabled to get warnings for
# functions that are documented, but have no documentation for their parameters
# or return value. If set to NO (the default) doxygen will only warn about
# wrong or incomplete parameter documentation, but not about the absence of
# If the REFERENCES_LINK_SOURCE tag is set to YES (the default)
# and SOURCE_BROWSER tag is set to YES, then the hyperlinks from
# functions in REFERENCES_RELATION and REFERENCED_BY_RELATION lists will
-# link to the source code. Otherwise they will link to the documentstion.
+# link to the source code. Otherwise they will link to the documentation.
REFERENCES_LINK_SOURCE = YES
lc->bind("cn=Manager,o=Organisation,c=DE" , "secret",cons);
std::cout << lc->getHost() << std::endl;
bool result = lc->compare("cn=Manager,o=Organisation,c=DE",
- LDAPAttribute("cn","Manaer"));
+ LDAPAttribute("cn","Manager"));
std::cout << "Compare: " << result << std::endl;
LDAPAttributeList* attrs=new LDAPAttributeList();
*/
static const int SEARCH_SUB=2;
- /** Construtor that initializes a connection to a server
- * @param hostname Name (or IP-Adress) of the destination host
+ /** Constructor that initializes a connection to a server
+ * @param hostname Name (or IP-Address) of the destination host
* @param port Port the LDAP server is running on
* @param cons Default constraints to use with operations over
* this connection
* error that occured.
* This method does a simple (username, password) bind to the server.
* Other, saver, authentcation methods are provided later
- * @param dn the distiguished name to bind as
+ * @param dn the distinguished name to bind as
* @param passwd cleartext password to use
*/
LDAPMessageQueue* bind(const std::string& dn="",
* @throws LDAPException If the Request could not be sent to the
* destination server, a LDAPException-object contains the
* error that occured.
- * @param dn Distiguished Name of the Entry to modify
+ * @param dn Distinguished Name of the Entry to modify
* @param modlist A set of modification that should be applied
* to the Entry
* @param cons A set of constraints that should be used with this
* error that occured.
* @param oid The dotted decimal representation of the extended
* Operation that should be performed
- * @param value The data asociated with this operation
+ * @param value The data associated with this operation
* @param cons A set of constraints that should be used with this
* request
*/
void setValues(const StringList& values);
/**
- * For interal use only.
+ * For internal use only.
* This method is used to translate the values of the Attribute to
* 0-terminated Array of BerValue-structs as used by the C-API
* @return The Values of the Attribute as an 0-terminated Array of
using namespace std;
-// little helper function for doing case insensitve string comparison
+// little helper function for doing case insensitive string comparison
bool nocase_compare(char c1, char c2);
LDAPAttributeList::LDAPAttributeList(){
DEBUG(LDAP_DEBUG_CONSTRUCT,
- "LDAPAttributeList::LDAPAttributList( )" << endl);
+ "LDAPAttributeList::LDAPAttributeList( )" << endl);
}
LDAPAttributeList::LDAPAttributeList(const LDAPAttributeList& al){
DEBUG(LDAP_DEBUG_CONSTRUCT,
- "LDAPAttributeList::LDAPAttributList(&)" << endl);
+ "LDAPAttributeList::LDAPAttributeList(&)" << endl);
m_attrs=al.m_attrs;
}
LDAPAttributeList::LDAPAttributeList(const LDAPAsynConnection *ld,
LDAPMessage *msg){
DEBUG(LDAP_DEBUG_CONSTRUCT,
- "LDAPAttributeList::LDAPAttributList()" << endl);
+ "LDAPAttributeList::LDAPAttributeList()" << endl);
BerElement *ptr=0;
char *name=ldap_first_attribute(ld->getSessionHandle(), msg, &ptr);
/*
}
LDAPAttributeList::~LDAPAttributeList(){
- DEBUG(LDAP_DEBUG_DESTROY,"LDAPAttributeList::~LDAPAttributList()" << endl);
+ DEBUG(LDAP_DEBUG_DESTROY,"LDAPAttributeList::~LDAPAttributeList()" << endl);
}
size_t LDAPAttributeList::size() const{
*
* During execution of this constructor no network communication
* is performed. Just some internal data structure are initialized
- * @param hostname Name (or IP-Adress) of the destination host
+ * @param hostname Name (or IP-Address) of the destination host
* @param port Port the LDAP server is running on
* @param cons Default constraints to use with operations over
* this connection
~LDAPConnection();
/**
- * Initzializes a synchronous connection to a server.
+ * Initializes a synchronous connection to a server.
*
* There is actually no
* communication to the server. Just the object is initialized
* Performs a simple authentication with the server
*
* @throws LDAPReferralException if a referral is received
- * @throws LDAPException for any other error occuring during the
+ * @throws LDAPException for any other error occurring during the
* operation
* @param dn The name of the entry to bind as
* @param passwd The cleartext password for the entry
void unbind();
/**
- * Performs a COMPARE-operation on an entery of the destination
+ * Performs a COMPARE-operation on an entry of the destination
* server.
*
* @throws LDAPReferralException if a referral is received
- * @throws LDAPException for any other error occuring during the
+ * @throws LDAPException for any other error occurring during the
* operation
* @param dn Distinguished name of the entry for which the compare
* should be performed
*
* This method performs the DELETE operation on the server
* @throws LDAPReferralException if a referral is received
- * @throws LDAPException for any other error occuring during the
+ * @throws LDAPException for any other error occurring during the
* operation
* @param dn Distinguished name of the entry that should be deleted
* @param cons A set of constraints that should be used with this
* Use this method to perform the ADD-operation
*
* @throws LDAPReferralException if a referral is received
- * @throws LDAPException for any other error occuring during the
+ * @throws LDAPException for any other error occurring during the
* operation
* @param le the entry to add to the directory
* @param cons A set of constraints that should be used with this
* To modify the attributes of an entry, this method can be used
*
* @throws LDAPReferralException if a referral is received
- * @throws LDAPException for any other error occuring during the
+ * @throws LDAPException for any other error occurring during the
* operation
* @param dn The DN of the entry which should be modified
* @param mods A set of modifications for that entry.
/**
* This method performs the ModDN-operation.
*
- * It can be used to rename or move an entry by modifing its DN.
+ * It can be used to rename or move an entry by modifying its DN.
*
* @throws LDAPReferralException if a referral is received
- * @throws LDAPException for any other error occuring during the
+ * @throws LDAPException for any other error occurring during the
* operation
* @param dn The DN that should be modified
* @param newRDN If the RDN of the entry should be modified the
* This method can be used for the sync. SEARCH-operation.
*
* @throws LDAPReferralException if a referral is received
- * @throws LDAPException for any other error occuring during the
+ * @throws LDAPException for any other error occurring during the
* operation
* @param base The distinguished name of the starting point for the
* search
* This method is for extended LDAP-Operations.
*
* @throws LDAPReferralException if a referral is received
- * @throws LDAPException for any other error occuring during the
+ * @throws LDAPException for any other error occurring during the
* operation
* @param oid The Object Identifier of the Extended Operation that
* should be performed.
}
LDAPControl** LDAPConstraints::getSrvCtrlsArray() const {
- DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getSrvCtrlsArray()" << endl);
+ DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getSrvCtrlsArray()" << endl);
if(m_serverControls){
return m_serverControls->toLDAPControlArray();
}else{
}
LDAPControl** LDAPConstraints::getClCtrlsArray() const {
- DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getClCtrlsArray()" << endl);
+ DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getClCtrlsArray()" << endl);
if(m_clientControls){
return m_clientControls->toLDAPControlArray();
}else{
}
timeval* LDAPConstraints::getTimeoutStruct() const {
- DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getTimeoutStruct()" << endl);
+ DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getTimeoutStruct()" << endl);
if(m_maxTime == LDAP_NO_LIMIT){
return 0;
}else{
}
bool LDAPConstraints::getReferralChase() const {
- DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getReferralChase()" << endl);
+ DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getReferralChase()" << endl);
return m_referralChase;
}
int LDAPConstraints::getHopLimit() const{
- DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getHopLimit()" << endl);
+ DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getHopLimit()" << endl);
return m_HopLimit;
}
* For internal use only
*
* This constructor creates a new LDAPControlSet for a
- * 0-terminiated array of LDAPControl-structures as used by the
+ * 0-terminated array of LDAPControl-structures as used by the
* C-API
* @param controls: pointer to a 0-terminated array of pointers to
- * LDAPControll-structures
+ * LDAPControl-structures
* @note: untested til now. Due to lack of server that return
* Controls
*/
* Used internally only.
*
* The constructor is used internally to create a LDAPEntry from
- * the C-API's data structurs.
+ * the C-API's data structures.
*/
LDAPEntry(const LDAPAsynConnection *ld, LDAPMessage *msg);
/**
* Constructs a LDAPException-object from the parameters
* @param res_code A valid LDAP result code.
- * @param err_string An addional error message for the error
- * that happend (optional)
+ * @param err_string An additional error message for the error
+ * that happened (optional)
*/
LDAPException(int res_code,
const std::string& err_string=std::string()) throw();
/**
* Constructs a LDAPException-object from the error state of a
* LDAPAsynConnection-object
- * @param lc A LDAP-Connection for that an error has happend. The
+ * @param lc A LDAP-Connection for that an error has happened. The
* Constructor tries to read its error state.
*/
LDAPException(const LDAPAsynConnection *lc) throw();
const std::string& getResultMsg() const throw();
/**
- * @return The addional error message of the error (if it was set)
+ * @return The additional error message of the error (if it was set)
*/
const std::string& getServerMsg() const throw();
static const int EXTENDED_REQUEST=LDAP_REQ_EXTENDED;
/**
- * The destructor has no implemenation, because this is an abstract
+ * The destructor has no implementation, because this is an abstract
* class.
*/
virtual ~LDAPMsg() {}
* DEL_RESPONSE <BR>
* MODDN_RESPONSE <BR>
* COMPARE_RESPONSE <BR>
- * EXTENDED_REPONSE <BR>
+ * EXTENDED_RESPONSE <BR>
*/
int getMessageType();
#include <LDAPRebindAuth.h>
/**
- * Just an abstract class to provide a mechnism for rebind to another
+ * Just an abstract class to provide a mechanism for rebind to another
* server when chasing referrals. Clients have to implement a class
* derived from this. To use authentication other than anonymous for
* referral chasing
#include<string>
/**
- * This class represent Authenication information for the case that the
+ * This class represent Authentication information for the case that the
* library is chasing referrals.
*
* The LDAPRebind::getRebindAuth() method returns an object of this type.
*
* Each request that is sent to a LDAP-server by this library is
* represented by a special object that contains the parameters and some
- * other info of the request. This virtual class is the common base classe
+ * other info of the request. This virtual class is the common base class
* for these specialized request classes.
*/
class LDAPRequest{
static const int ALIAS_DEREFERENCING_PROBLEM = 36;
- static const int INAPPROPRIATE_AUTENTICATION = 48;
+ static const int INAPPROPRIATE_AUTHENTICATION = 48;
static const int INVALID_CREDENTIALS = 49;
static const int INSUFFICIENT_ACCESS = 50;
static const int BUSY = 51;
std::string resToString() const;
/**
- * In some case of error the server may return addional error
+ * In some case of error the server may return additional error
* messages.
* @returns The additional error message returned by the server.
*/
const std::string& getMatchedDN() const;
/**
- * @returns If the result code is REFERRAL this methode returns the
+ * @returns If the result code is REFERRAL this method returns the
* URLs of the referral that was sent by the server.
*/
const LDAPUrlList& getReferralUrls() const;
/**
* Set the Protocol Scheme of the URL
- * @param host The Protcol scheme. Allowed values are
+ * @param host The Protocol scheme. Allowed values are
* ldap,ldapi,ldaps and cldap
*/
void setScheme( const std::string &scheme );
/**
* Set the Attributes part of the URL
- * @param attrs StringList constaining the List of Attributes
+ * @param attrs StringList containing the List of Attributes
*/
void setAttrs( const StringList &attrs);
void setExtensions( const StringList &ext);
protected :
/**
* Split the url string that is associated with this Object into
- * it components. The compontens of the URL can be access via the
+ * it components. The components of the URL can be access via the
* get...() methods.
* (this function is mostly for internal use and gets called
* automatically whenever necessary)
{
std::ostringstream err;
err << "Line " << this->m_lineNumber
- << ": Unsuported LDIF Version";
+ << ": Unsupported LDIF Version";
throw( std::runtime_error(err.str()) );
}
continue;
{
std::ostringstream err;
err << "Line " << this->m_lineNumber
- << ": \"include\" not yet suppported.";
+ << ": \"include\" not yet supported.";
throw( std::runtime_error(err.str()) );
}
}
m_addSeparator = true;
} else {
std::ostringstream err;
- err << "Unsuported LDIF Version";
+ err << "Unsupported LDIF Version";
throw( std::runtime_error(err.str()) );
}
}
-Package rersion 2.0:
+Package version 2.0:
- Detects OpenLDAP 2.0 and builds correctly with it.
- Increment major version to 2, library file to libldaptcl2.0.so.
- Can now perform add/delete/replace modifications in a single command.
into its component parts. \fB-nonames\fR strips off the attribute names,
and -list returns a list suitable for \fBarray set\fR.
.PP
-Finally, the last form, described in more detail below, refers genericly
+Finally, the last form, described in more detail below, refers generically
to how the command created by the first two examples is used.
.SH DESCRIPTION
are also shared, and ldaptcl.so is itself created with the correct flags
(eg. -R for Solaris). In short there's a lot of details to make this part
work, but it should work out of the box for Solaris. Other systems may
-require that LD_LIBRARY_PATH or other appropraite environment variables
+require that LD_LIBRARY_PATH or other appropriate environment variables
be set at build and/or runtime.
An asynchronous interface should be provided with callbacks.
*
* Process one result return from an LDAP search.
*
- * Paramaters:
+ * Parameters:
* o interp - Tcl interpreter; Errors are returned in result.
* o ldap - LDAP structure pointer.
* o entry - LDAP message pointer.
*
* Perform an LDAP search.
*
- * Paramaters:
+ * Parameters:
* o interp - Tcl interpreter; Errors are returned in result.
* o ldap - LDAP structure pointer.
* o base - Base DN from which to perform search.
Automated updates of group memberships.
cloak (overlay)
- Hide specific attributes unless explicitely requested
+ Hide specific attributes unless explicitly requested
comp_match (plugin)
Component Matching rules (RFC 3687).
.B allop-URI <ldapURI>
Specify the base and the scope of search operations that trigger the overlay.
By default, it is "ldap:///??base", i.e. it only applies to the rootDSE.
-This requires the overlay to be instantited as global.
+This requires the overlay to be instantiated as global.
.SH EXAMPLES
.LP
/*
** Adds a group to the internal list from the passed entry.
-** scan specifies whether to add all maching members to the group.
+** scan specifies whether to add all matching members to the group.
** modify specifies whether to modify the given group entry (when modify == 0),
** or to modify the group entry in the database (when modify == 1 and e = NULL and ndn != NULL).
** agi - pointer to the groups and the attribute definitions
}
/* For each group:
- 1. check if the orginal entry's DN is in the group.
- 2. chceck if the any of the group filter's base DN is a suffix of the new DN
+ 1. check if the original entry's DN is in the group.
+ 2. check if the any of the group filter's base DN is a suffix of the new DN
If 1 and 2 are both false, we do nothing.
If 1 and 2 is true, we remove the old DN from the group, and add the new DN.
}
if ( age->age_modrdn_olddnmodified ) {
- /* Resquest already marked this group to be updated */
+ /* Request already marked this group to be updated */
is_olddn = 1;
is_value_refresh = 1;
age->age_modrdn_olddnmodified = 0;
}
/*
-** When modifing a group, we must deny any modifications to the member attribute,
+** When modifying a group, we must deny any modifications to the member attribute,
** because the group would be inconsistent.
*/
static int
-/* cloak.c - Overlay to hide some attribute except if explicitely requested */
+/* cloak.c - Overlay to hide some attribute except if explicitly requested */
/* $OpenLDAP$ */
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
*
.B cloak
overlay to
.BR slapd (8)
-allows the server to hide specific attributes, unless explicitely requested
+allows the server to hide specific attributes, unless explicitly requested
by the client. This improve performance when a client requests all attributes
and get a huge binary attribute that is of no interest for it.
This behavior is disabled when the \fImanageDSAit\fP
/* Copyright 2004 IBM Corporation
* All rights reserved.
- * Redisribution and use in source and binary forms, with or without
- * modification, are permitted only as authorizd by the OpenLADP
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted only as authorized by the OpenLDAP
* Public License.
*/
/* ACKNOWLEDGEMENTS
/* Copyright 2004 IBM Corporation
* All rights reserved.
- * Redisribution and use in source and binary forms, with or without
- * modification, are permitted only as authorizd by the OpenLADP
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted only as authorized by the OpenLDAP
* Public License.
*/
/* ACKNOWLEDGEMENTS
ComponentInt *a, *b;
if( oid ) {
- /* check if this ASN type's matching rule is overrided */
+ /* check if this ASN type's matching rule is overridden */
mr = retrieve_matching_rule(oid, csi_attr->csi_comp_desc->cd_type_id );
- /* if existing function is overrided, call the overriding
+ /* if existing function is overridden, call the overriding
function*/
if ( mr )
return component_value_match( mr, csi_attr , csi_assert );
}
/*
- * Component BER Decoder : PrintiableString
+ * Component BER Decoder : PrintableString
*/
int
/*
- * OID and its corresponding decoder can be registerd with this func.
+ * OID and its corresponding decoder can be registered with this func.
* If contained types constrained by <select> are used,
* their OID and decoder MUST be registered, otherwise it will return no entry.
* An open type(ANY type) also need be registered.
/* Copyright 2004 IBM Corporation
* All rights reserved.
- * Redisribution and use in source and binary forms, with or without
- * modification, are permitted only as authorizd by the OpenLADP
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted only as authorized by the OpenLDAP
* Public License.
*/
/* ACKNOWLEDGEMENTS
#define FreeComponentBool(v) NULL
/*
- * ENUMERTED
+ * ENUMERATED
*/
typedef struct ComponentEnum {
void* syntax;
/* Copyright 2004 IBM Corporation
* All rights reserved.
- * Redisribution and use in source and binary forms, with or without
- * modification, are permitted only as authorizd by the OpenLADP
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted only as authorized by the OpenLDAP
* Public License.
*/
/* ACKNOWLEDGEMENTS
if ( !cr )
return comp_test_one_component ( attr_nm, assert_nm, csi_attr, ca );
- /* Extracting the component refrenced by ca->ca_comp_ref */
+ /* Extracting the component referenced by ca->ca_comp_ref */
csi_attr = (ComponentSyntaxInfo*)csi_attr->csi_comp_desc->cd_extract_i( attr_nm, cr, csi_attr );
if ( !csi_attr ) return LDAP_INVALID_SYNTAX;
/* perform matching, considering the type of a Component Reference(CR)*/
* 1) If so, look up the corresponding decoder in the mapping
* table(OID to decoder) by <select>
* and then decode the OCTET/BIT STRING with the decoder
- * Finially, extreact the target component with the remaining CR.
+ * Finally, extract the target component with the remaining CR.
* 2) If not, just return the current component, It SHOULD not be
* extracted further, because the component MUST be BIT/OCTET
* string.
if ( !odm || !odm->BER_Decode )
return LDAP_PROTOCOL_ERROR;
- /* current componet MUST be either BIT or OCTET STRING */
+ /* current component MUST be either BIT or OCTET STRING */
if ( csi_attr->csi_comp_desc->cd_type_id != BASICTYPE_BITSTRING ) {
bv.bv_val = ((ComponentBits*)csi_attr)->value.bits;
bv.bv_len = ((ComponentBits*)csi_attr)->value.bitLen;
Some broken client tend to implement modifications as replace operations
where all attributes are replaced, most of the time by the same values
they had before. This can cause undesirable load on logs, ACL evaluation,
-or replication trafic.
+or replication traffic.
This overlay detects idempotent replace operations and filter them out.
.SH CONFIGURATION
#define GCC_VERSION(major, minor) \
((__GNUC__ > (major)) || (__GNUC__ == (major) && __GNUC_MINOR__ >= (minor)))
-/* These are macros to use some gcc-specific flags in case the're available
+/* These are macros to use some gcc-specific flags in case they're available
and otherwise define them to empty strings. This allows us to give
the compiler some extra information.
See http://gcc.gnu.org/onlinedocs/gcc/Attribute-Syntax.html
}
-/* These are functions and macors for performing common operations in
+/* These are functions and macros for performing common operations in
the nslcd request/response protocol. */
/* returns a socket to the server or NULL on error (see errno),
INT32 - 32-bit integer value
TYPE - a typed field that is transferred using sizeof()
STRING - a string length (32bit) followed by the string value (not
- null-terminted) the string itself is assumed to be UTF-8
+ null-terminated) the string itself is assumed to be UTF-8
STRINGLIST - a 32-bit number noting the number of strings followed by
the strings one at a time
Furthermore the ADDRESS compound data type is defined as:
INT32 type of address: e.g. AF_INET or AF_INET6
- INT32 lenght of address
+ INT32 length of address
RAW the address itself
With the ADDRESSLIST using the same construct as with STRINGLIST.
STRING password
and the result value consists of:
INT32 authc NSLCD_PAM_* result code
- STRING user name (the cannonical user name)
+ STRING user name (the canonical user name)
INT32 authz NSLCD_PAM_* result code
STRING authorisation error message
If the username is empty in this request an attempt is made to
errno = ETIME;
return -1;
}
- /* sanitiy check for moving clock */
+ /* sanity check for moving clock */
if (t > timeout)
t = timeout;
/* wait for activity */
uint8_t *tmp;
size_t newsz;
const uint8_t *ptr = (const uint8_t *)buf;
- /* keep filling the buffer until we have bufferred everything */
+ /* keep filling the buffer until we have buffered everything */
while (count > 0)
{
/* figure out free size in buffer */
/*
* Define the followingsha2_* types to types of the correct length on
- * the native archtecture. Most BSD systems and Linux define u_intXX_t
+ * the native architecture. Most BSD systems and Linux define u_intXX_t
* types. Machines with very recent ANSI C headers, can use the
- * uintXX_t definintions from inttypes.h by defining SHA2_USE_INTTYPES_H
+ * uintXX_t definitions from inttypes.h by defining SHA2_USE_INTTYPES_H
* during compile or in the sha.h header file.
*
* Machines that support neither u_intXX_t nor inttypes.h's uintXX_t
If successful, the function returns the length in bytes of
the UTF-8 output character.
- If utf8char is NULL, count is ignored and the funtion
+ If utf8char is NULL, count is ignored and the function
returns the number of bytes that would be written to the
output char.
written to mbstr, excluding the null termination
character, if any.
- If mbstr is NULL, count is ignored and the funtion
+ If mbstr is NULL, count is ignored and the function
returns the number of bytes required for the output string,
excluding the NULL.
other than as "work in progress."
The OpenLDAP Project maintains copies of I-D for which we find
-interesting. Existance here does not necessarily imply any support
+interesting. Existence here does not necessarily imply any support
nor any plans to support for the I-D. The I-Ds found in this
directory may be stale, expired, or otherwise out of date.
show.
Let's say we want to allow members of the {{F:sudoadm}} group to write to the
-{{F:ou=suders}} branch of our tree. But our group definition now is using {{F:memberUid}} for
+{{F:ou=sudoers}} branch of our tree. But our group definition now is using {{F:memberUid}} for
the group members:
> dn: cn=sudoadm,ou=group,dc=example,dc=com
Modify operation attempts to change the structural class of the entry.
-> Instanstantiation of abstract objectClass.
+> Instantiation of abstract objectClass.
An abstract class is not subordinate to any listed structural or auxiliary class.
with your version of OpenLDAP software so that you're looking at
documentation that matches the code. While the OpenLDAP web site
also provides the manual pages for convenience, you can not assume
-that they corresond to the particular version you're running.
+that they correspond to the particular version you're running.
P2[notoc] Acknowledgments
.{{S: }}
+{{B:Import the configuration database}}
-. You are now ready to import your configration database for use by
+. You are now ready to import your configuration database for use by
{{slapd}}(8), by running the command:
..{{EX: su root -c /usr/local/sbin/slapadd -n 0 -F /usr/local/etc/slapd.d -l /usr/local/etc/openldap/slapd.ldif}}
So in our above example, if the user's name were "adamson", the
authentication request DN would be:
-> uid=adamsom,cn=example.com,cn=kerberos_v4,cn=auth
+> uid=adamson,cn=example.com,cn=kerberos_v4,cn=auth
This authentication request DN can be used directly ACLs or,
alternatively, mapped prior to use. See the section {{SECT:Mapping
LDAP authentication using the {{TERM:SASL}} {{TERM:EXTERNAL}} mechanism.
TLS is defined in {{REF:RFC4346}}.
-Note: For generating certifcates, please reference {{URL:http://www.openldap.org/faq/data/cache/185.html}}
+Note: For generating certificates, please reference {{URL:http://www.openldap.org/faq/data/cache/185.html}}
H2: TLS Certificates
> certutil -d <path> -A -n "name of CA cert" -t CT,, -a -i /path/to/cacertfile.pem
-. This command will add a CA certficate stored in the PEM (ASCII) formatted
+. This command will add a CA certificate stored in the PEM (ASCII) formatted
. file named /path/to/cacertfile.pem. {{EX:-t CT,,}} means that the certificate is
. trusted to be a CA issuing certs for use in TLS clients and servers.
a file that contains the password for the key for the certificate specified with
{{EX:TLSCertificateFile}}. The modutil command can be used to turn off password
protection for the cert/key database. For example, if {{EX:TLSCACertificatePath}}
-specifes /etc/openldap/certdb as the location of the cert/key database, use
+specifies /etc/openldap/certdb as the location of the cert/key database, use
modutil to change the password to the empty string:
> modutil -dbdir /etc/openldap/certdb -changepw 'NSS Certificate DB'
sodipodi:role="line"
x="19"
y="194.40942"
- id="tspan5518">with mode set to 'resfreshOnly'</tspan></text>
+ id="tspan5518">with mode set to 'refreshOnly'</tspan></text>
<text
xml:space="preserve"
style="font-size:16px;font-style:normal;font-weight:normal;fill:#000000;fill-opacity:1;stroke:none;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;font-family:Bitstream Vera Sans"
operations above.
Please note that ldapexop behaves differently for the same extended operation
-when it was given as an OID or as a specialliy named operation:
+when it was given as an OID or as a specially named operation:
Calling ldapexop with the OID of the \fBwhoami\fP (RFC 4532) extended operation
.nf
If the value is set to \fBstop\fP, the search is terminated as soon
as an error is returned by one target, and the error is immediately
propagated to the client.
-If the value is set to \fBreport\fP, the search is continuated to the end
+If the value is set to \fBreport\fP, the search is continued to the end
but, in case at least one target returned an error code, the first
non-success error code is returned.
a file that contains the password for the key for the certificate specified with
olcTLSCertificateFile. The modutil command can be used to turn off password
protection for the cert/key database. For example, if olcTLSCACertificatePath
-specifes /etc/openldap/certdb as the location of the cert/key database, use
+specifies /etc/openldap/certdb as the location of the cert/key database, use
modutil to change the password to the empty string:
.nf
modutil \-dbdir /etc/openldap/certdb \-changepw 'NSS Certificate DB'
.B idassert\-authcDN
above.
This directive is obsoleted by the
-.B crendentials
+.B credentials
arg of
.B idassert\-bind
when \fIbindmethod\fP=\fBsimple\fP, and will be dismissed in the future.
If the value is set to \fBstop\fP, the search is terminated as soon
as an error is returned by one target, and the error is immediately
propagated to the client.
-If the value is set to \fBreport\fP, the search is continuated to the end
+If the value is set to \fBreport\fP, the search is continued to the end
but, in case at least one target returned an error code, the first
non-success error code is returned.
1, 0, userid FROM unixusers
UNION
SELECT (2000000000+groupnummer),
- UPPER(CONCAT(CONCAT('cn=',groupnaam),',o=MyCompany,c=NL')),
+ UPPER(CONCAT(CONCAT('cn=',groupname),',o=MyCompany,c=NL')),
2, 0, groupnummer FROM groups;
.fi
a replacement of other data storage backends, but rather a gateway
to existing RDBMS storages that need to be published in LDAP form.
.LP
-The \fBhasSubordintes\fP operational attribute is honored by back-sql
+The \fBhasSubordinates\fP operational attribute is honored by back-sql
in search results and in compare operations; it is partially honored
also in filtering. Owing to design limitations, a (brain-dead?) filter
of the form
a file that contains the password for the key for the certificate specified with
TLSCertificateFile. The modutil command can be used to turn off password
protection for the cert/key database. For example, if TLSCACertificatePath
-specifes /etc/openldap/certdb as the location of the cert/key database, use
+specifies /etc/openldap/certdb as the location of the cert/key database, use
modutil to change the password to the empty string:
.nf
modutil \-dbdir /etc/openldap/certdb \-changepw 'NSS Certificate DB'
.TP
.B \-c
Enable continue (ignore errors) mode.
-Multiple occorrences of
+Multiple occurrences of
.B \-c
make
.BR slapcat (8)
*/
/*
- * This file works in confunction with OpenLDAP configure system.
+ * This file works in conjunction with OpenLDAP configure system.
* If you do no like the values below, adjust your configure options.
*/
**
** If you fail to define LDAP_THREAD_SAFE when linking with
** -lldap_r or define LDAP_THREAD_SAFE when linking with -lldap,
-** provided header definations and declarations may be incorrect.
+** provided header definitions and declarations may be incorrect.
**
*/
LDAP_F (ber_len_t) ldap_utf8_strcspn( const char* str, const char *set);
/* span characters in set, return bytes spanned */
LDAP_F (ber_len_t) ldap_utf8_strspn( const char* str, const char *set);
-/* return first occurance of character in string */
+/* return first occurrence of character in string */
LDAP_F (char *) ldap_utf8_strchr( const char* str, const char *chr);
/* return first character of set in string */
LDAP_F (char *) ldap_utf8_strpbrk( const char* str, const char *set);
int deloldrdn, LDAPControl **controls,
int log_change );
Slapi_PBlock *slapi_rename_internal( const char * olddn, const char *newrdn,
- const char *newsuperior, int delolrdn,
+ const char *newsuperior, int deloldrdn,
LDAPControl **controls, int log_change );
void slapi_free_search_results_internal(Slapi_PBlock *pb);
#define SLAPI_PLUGIN_DESCRIPTION 12
#define SLAPI_PLUGIN_IDENTITY 13
-/* internal opreations params */
+/* internal operations params */
#define SLAPI_PLUGIN_INTOP_RESULT 15
#define SLAPI_PLUGIN_INTOP_SEARCH_ENTRIES 16
#define SLAPI_PLUGIN_INTOP_SEARCH_REFERRALS 17
return LBER_OPT_SUCCESS;
case LBER_OPT_MEMORY_INUSE:
- /* The memory inuse is a global variable on kernal implementations.
+ /* The memory inuse is a global variable on kernel implementations.
* This means that memory debug is shared by all LDAP processes
* so for this variable to have much meaning, only one LDAP process
* should be running and memory inuse should be initialized to zero
return LBER_OPT_SUCCESS;
case LBER_OPT_MEMORY_INUSE:
- /* The memory inuse is a global variable on kernal implementations.
+ /* The memory inuse is a global variable on kernel implementations.
* This means that memory debug is shared by all LDAP processes
* so for this variable to have much meaning, only one LDAP process
* should be running and memory inuse should be initialized to zero
* <http://www.OpenLDAP.org/license.html>.
*/
/* ACKNOWLEDGEMENTS:
- * This program was orignally developed by Kurt D. Zeilenga for inclusion in
+ * This program was originally developed by Kurt D. Zeilenga for inclusion in
* OpenLDAP Software.
*/
#include "portable.h"
/*
* A delete request looks like this:
- * DelRequet ::= DistinguishedName,
+ * DelRequest ::= DistinguishedName,
*/
BerElement *
/*
* A delete request looks like this:
- * DelRequet ::= DistinguishedName,
+ * DelRequest ::= DistinguishedName,
*/
Debug( LDAP_DEBUG_TRACE, "ldap_delete\n", 0, 0, 0 );
/* need to clean out misc items */
if( tag != LBER_ERROR ) {
if( lm->lm_msgtype == LDAP_RES_BIND ) {
- /* look for sasl result creditials */
+ /* look for sasl result credentials */
if ( ber_peek_tag( ber, &len ) == LDAP_TAG_SASL_RES_CREDS ) {
/* skip 'em */
tag = ber_scanf( ber, "x" );
* Sort of UFN for DCE DNs: a slash ('/') separated
* global->local DN with no types; strictly speaking,
* the naming context should be a domain, which is
- * written in DNS-style, e.g. dot-deparated.
+ * written in DNS-style, e.g. dot-separated.
*
* Example:
*
pkt_len = 4 + wrapped.length;
- /* Grow the packet buffer if neccessary */
+ /* Grow the packet buffer if necessary */
if ( dst->buf_size < pkt_len &&
ber_pvt_sb_grow_buffer( dst, pkt_len ) < 0 )
{
return -1;
}
- /* Grow the packet buffer if neccessary */
+ /* Grow the packet buffer if necessary */
if ( dst->buf_size < unwrapped.length &&
ber_pvt_sb_grow_buffer( dst, unwrapped.length ) < 0 )
{
* <http://www.OpenLDAP.org/license.html>.
*/
/* ACKNOWLEDGEMENTS:
- * This program was orignally developed by Kurt D. Zeilenga for inclusion in
+ * This program was originally developed by Kurt D. Zeilenga for inclusion in
* OpenLDAP Software.
*/
ctrl (IN) The address of an
LDAPControl structure, either obtained
- by running thorugh the list of response controls or
+ by running through the list of response controls or
by a call to ldap_control_find().
exptimep (OUT) This result parameter is filled in with the number of seconds before
free_and_return:
if( referralsp != NULL ) {
- /* provide references regradless of return code */
+ /* provide references regardless of return code */
*referralsp = refs;
} else {
* The array will be free'd by this function when no longer needed
* (IN) sref != 0 if following search reference
* (OUT) errstrp = Place to return a string of referrals which could not be followed
- * (OUT) hadrefp = 1 if sucessfully followed referral
+ * (OUT) hadrefp = 1 if successfully followed referral
*
* Return value - number of referrals followed
*
ldap_return_request( ld, lr, 0 );
return( -1 ); /* fatal error */
}
- lr->lr_res_errno = LDAP_SUCCESS; /* sucessfully chased referral */
+ lr->lr_res_errno = LDAP_SUCCESS; /* successfully chased referral */
if ( lr->lr_res_matched ) {
LDAP_FREE( lr->lr_res_matched );
lr->lr_res_matched = NULL;
ret = sb_sasl_generic_pkt_length(p, (unsigned char *) p->sec_buf_in.buf_base,
sbiod->sbiod_sb->sb_debug );
- /* Grow the packet buffer if neccessary */
+ /* Grow the packet buffer if necessary */
if ( ( p->sec_buf_in.buf_size < (ber_len_t) ret ) &&
ber_pvt_sb_grow_buffer( &p->sec_buf_in, ret ) < 0 )
{
/*
* Strictly speaking, doing this here accepts whsp before the
- * ( at the begining of an oidlist, but this is harmless. Also,
+ * ( at the beginning of an oidlist, but this is harmless. Also,
* we are very liberal in what we accept as an OID. Maybe
* refine later.
*/
The pointer is updated to point to the next character
after the sortkey being parsed.
- key (OUT) Points to the address of an LDAPSortKey stucture
+ key (OUT) Points to the address of an LDAPSortKey structure
which has been allocated by this routine and
initialized with information from the next sortkey.
---------------------------------------------------------------------------*/
}
break;
- case 'b': /* asynch bind */
+ case 'b': /* async bind */
method = LDAP_AUTH_SIMPLE;
get_line( dn, sizeof(dn), stdin, "dn? " );
strcat( dn, dnsuffix );
(ciphers_def[i].strength & strength) ||
(ciphers_def[i].version & protocol)) &&
(cipher_list[i] != -1)) {
- /* Enable the NULL ciphers only if explicity
+ /* Enable the NULL ciphers only if explicitly
* requested */
if (ciphers_def[i].attr & SSL_eNULL) {
if (mask & SSL_eNULL)
}
/*
- * Currently mutiple MozNSS contexts share one certificate storage. When the
+ * Currently multiple MozNSS contexts share one certificate storage. When the
* certdb is being opened, only new certificates are added to the storage.
* When different databases are used, conflicting nicknames make the
* certificate lookup by the nickname impossible. In addition a token
*/
subject = X509_get_subject_name( cert );
issuer = X509_get_issuer_name( cert );
- /* X509_NAME_oneline, if passed a NULL buf, allocate memomry */
+ /* X509_NAME_oneline, if passed a NULL buf, allocate memory */
sname = X509_NAME_oneline( subject, NULL, 0 );
iname = X509_NAME_oneline( issuer, NULL, 0 );
if ( !ok ) certerr = (char *)X509_verify_cert_error_string( errnum );
* <http://www.OpenLDAP.org/license.html>.
*/
/* ACKNOWLEDGEMENTS:
- * This program was orignally developed by Kurt D. Zeilenga for inclusion in
+ * This program was originally developed by Kurt D. Zeilenga for inclusion in
* OpenLDAP Software.
*/
* <http://www.OpenLDAP.org/license.html>.
*/
/* ACKNOWLEDGEMENTS:
- * This program was orignally developed by Kurt D. Zeilenga for inclusion
+ * This program was originally developed by Kurt D. Zeilenga for inclusion
* in OpenLDAP Software.
*/
* <http://www.OpenLDAP.org/license.html>.
*/
/* ACKNOWLEDGEMENTS:
- * This program was orignally developed by Kurt D. Zeilenga for inclusion in
+ * This program was originally developed by Kurt D. Zeilenga for inclusion in
* OpenLDAP Software.
*/
contentCount INTEGER (0 .. maxInt),
virtualListViewResult ENUMERATED {
success (0),
- operatonsError (1),
+ operationsError (1),
unwillingToPerform (53),
insufficientAccessRights (50),
busy (51),
* <http://www.OpenLDAP.org/license.html>.
*/
/* ACKNOWLEDGEMENTS:
- * This program was orignally developed by Kurt D. Zeilenga for inclusion in
+ * This program was originally developed by Kurt D. Zeilenga for inclusion in
* OpenLDAP Software.
*/
* Currently they don't check if the calling thread is the one
* that has the lock, just that there is a reader or writer.
*
- * Basically sufficent for testing that places that should have
+ * Basically sufficient for testing that places that should have
* a lock are caught.
*/
* noabort - Do not abort() on errors.
* noerror - Do not report errors. Implies noabort.
* nocount - Do not report counts of unreleased resources.
- * nosync - Disable tests that use synchronizaion and thus
+ * nosync - Disable tests that use synchronization and thus
* clearly affect thread scheduling:
* Implies nocount, and cancels threadID if that is set.
* Note that if you turn on tracethreads or malloc
#else /* LDAP_THREAD_DEBUG_THREAD_ID */
/*
- * Thread ID tracking. Currently acieves little.
+ * Thread ID tracking. Currently achieves little.
* Should be either expanded or deleted.
*/
ldap_pvt_thread_cond_t ltp_cond;
/* ltp_pause == 0 ? <p_pending_list : &empty_pending_list,
- * maintaned to reduce work for pool_wrapper()
+ * maintained to reduce work for pool_wrapper()
*/
ldap_int_tpool_plist_t *ltp_work_list;
# Croatian, Czech, Danish, Dutch, Esperanto, Farsi, Finnish, French, German,
# Greek, Hungarian, Italian, Japanese, Japanese-en (Japanese with English
# messages), Korean, Korean-en, Lithuanian, Norwegian, Macedonian, Persian,
-# Polish, Portuguese, Romanian, Russian, Serbian, Serbian-Cyrilic, Slovak,
+# Polish, Portuguese, Romanian, Russian, Serbian, Serbian-Cyrillic, Slovak,
# Slovene, Spanish, Swedish, Ukrainian, and Vietnamese.
OUTPUT_LANGUAGE = English
# parses. With this tag you can assign which parser to use for a given extension.
# Doxygen has a built-in mapping, but you can override or extend it using this
# tag. The format is ext=language, where ext is a file extension, and language
-# is one of the parsers supported by doxygen: IDL, Java, Javascript, CSharp, C,
+# is one of the parsers supported by doxygen: IDL, Java, JavaScript, CSharp, C,
# C++, D, PHP, Objective-C, Python, Fortran, VHDL, C, C++. For instance to make
# doxygen treat .inc files as Fortran files (default is PHP), and .f files as C
# (default is Fortran), use: inc=Fortran f=C. Note that for custom extensions
WARN_IF_DOC_ERROR = YES
-# This WARN_NO_PARAMDOC option can be abled to get warnings for
+# This WARN_NO_PARAMDOC option can be enabled to get warnings for
# functions that are documented, but have no documentation for their parameters
# or return value. If set to NO (the default) doxygen will only warn about
# wrong or incomplete parameter documentation, but not about the absence of
FORMULA_FONTSIZE = 10
-# Use the FORMULA_TRANPARENT tag to determine whether or not the images
+# Use the FORMULA_TRANSPARENT tag to determine whether or not the images
# generated for formulas are transparent PNGs. Transparent PNGs are
# not supported properly for IE 6.0, but are supported on all modern browsers.
# Note that when changing this option you need to delete any form_*.png files
# When the SERVER_BASED_SEARCH tag is enabled the search engine will be
# implemented using a PHP enabled web server instead of at the web client
-# using Javascript. Doxygen will generate the search PHP script and index
+# using JavaScript. Doxygen will generate the search PHP script and index
# file to put on the web server. The advantage of the server
# based approach is that it scales better to large projects and allows
# full text search. The disadvances is that it is more difficult to setup
* <li>#MDB_NOTLS
* Don't use Thread-Local Storage. Tie reader locktable slots to
* #MDB_txn objects instead of to threads. I.e. #mdb_txn_reset() keeps
- * the slot reseved for the #MDB_txn object. A thread may use parallel
+ * the slot reserved for the #MDB_txn object. A thread may use parallel
* read-only transactions. A read-only transaction may span threads if
* the user synchronizes its use. Applications that multiplex many
* user threads over individual OS threads need this option. Such an
void ucstring_free(ucstring_t *string)
- This function will deallocate the memory used by the string, incuding the
+ This function will deallocate the memory used by the string, including the
string itself.
-----------------------------------------------------------------------------
.sp
int uccomp_hangul(unsigned long *str, int len)
.sp
-int uccanoncomp(unsiged long *str, int len)
+int uccanoncomp(unsigned long *str, int len)
.nf
struct ucnumber {
int numerator;
.TP 4
.BR ucstring_free()
-This function will deallocate the memory used by the string, incuding the
+This function will deallocate the memory used by the string, including the
string itself.
.TP 4
Assumptions:
- o Search pattern and text already normalized in some fasion.
+ o Search pattern and text already normalized in some fashion.
o Upper, lower, and title case conversions are one-to-one.
utbm_compile(pattern, patternlen, flags, pat);
/*
- * Find the first occurance of the search pattern in the text.
+ * Find the first occurrence of the search pattern in the text.
*/
if (utbm_exec(pat, text, textlen, &match_start, &match_end))
printf("MATCH: %ld %ld\n", match_start, match_end);
/*
* lutil_entropy() provides nbytes of entropy in buf.
- * Quality offerred is suitable for one-time uses, such as "once" keys.
+ * Quality offered is suitable for one-time uses, such as "once" keys.
* Values may not be suitable for multi-time uses.
*
* Note: Callers are encouraged to provide additional bytes of
/*
* OK means there were no errors or special return codes;
* if res is defined, it means the rule matched and we
- * got a sucessful rewriting
+ * got a successful rewriting
*/
case REWRITE_REGEXEC_OK:
{
ad = NULL;
text = NULL;
- /* openldap 2.1 aci compabitibility [entry] -> entry */
+ /* openldap 2.1 aci compatibility [entry] -> entry */
if ( ber_bvstrcasecmp( &attr, &aci_bv[ ACI_BV_BR_ENTRY ] ) == 0 ) {
ad = &adstatic;
adstatic.ad_cname = aci_bv[ ACI_BV_ENTRY ];
- /* openldap 2.1 aci compabitibility [children] -> children */
+ /* openldap 2.1 aci compatibility [children] -> children */
} else if ( ber_bvstrcasecmp( &attr, &aci_bv[ ACI_BV_BR_CHILDREN ] ) == 0 ) {
ad = &adstatic;
adstatic.ad_cname = aci_bv[ ACI_BV_CHILDREN ];
- /* openldap 2.1 aci compabitibility [all] -> only [all] */
+ /* openldap 2.1 aci compatibility [all] -> only [all] */
} else if ( ber_bvstrcasecmp( &attr, &aci_bv[ ACI_BV_BR_ALL ] ) == 0 ) {
ber_memfree_x( nattrs.bv_val, ctx );
nattrs = aci_bv[ ACI_BV_BR_ALL ];
*err = cname;
if ( !at->at_usage && at->at_no_user_mod ) {
- /* user attribute must be modifable */
+ /* user attribute must be modifiable */
code = SLAP_SCHERR_ATTR_BAD_USAGE;
goto error_return;
}
/*
* Inherit definitions from superiors. We only check the
* direct superior since that one has already inherited from
- * its own superiorss
+ * its own superiors
*/
if ( sat->sat_sup ) {
Syntax *syn = syn_find(sat->sat_sup->sat_syntax->ssyn_oid);
#define META_BACK_CFG_MAX_PENDING_OPS 0x80
#define META_BACK_CFG_MAX_TARGET_CONNS 0xFF
/* the interval of the timeout checking loop in microseconds
- * possibly make this configurabe? */
+ * possibly make this configurable? */
#define META_BACK_CFG_MAX_TIMEOUT_LOOP 0x70000
slap_mask_t mt_rep_flags;
int mt_timeout_ops;
hosts = ldap_str2charray( hostlist, " " );
if( hosts == NULL ) {
- Debug( LDAP_DEBUG_TRACE, "DNSSRV: str2charrary error\n", 0, 0, 0 );
+ Debug( LDAP_DEBUG_TRACE, "DNSSRV: str2charray error\n", 0, 0, 0 );
rs->sr_text = "problem processing DNS SRV records for DN";
goto done;
}
hosts = ldap_str2charray( hostlist, " " );
if( hosts == NULL ) {
- Debug( LDAP_DEBUG_TRACE, "DNSSRV: str2charrary error\n", 0, 0, 0 );
+ Debug( LDAP_DEBUG_TRACE, "DNSSRV: str2charray error\n", 0, 0, 0 );
send_ldap_error( op, rs, LDAP_OTHER,
"problem processing DNS SRV records for DN" );
goto done;
Note that, as the remote servers may have been updated by some direct
operation, this mechanism does not guarantee the uniqueness of the result.
So write operations will require to skip the cache search and to perform
-the exaustive search of all the URIs unless some hint mechanism is provided
+the exhaustive search of all the URIs unless some hint mechanism is provided
to the backend (e.g. a server is read-only).
Again, the lag between the fetching of the required DN and the actual
nothing to say; all the open handles related to the connection are reset.
- search
-if updates are to be strictly honored, a search operation is performed agaist
+if updates are to be strictly honored, a search operation is performed against
each URI. Note that this needs be performed also when the backend suffix
is used as base. In case the base is stricter, the URI pool may be restricted
by performing a cache DN fetch of the base first.
/*
* Connection monitoring subsystem:
- * Tries to mimick what the cn=connections,cn=monitor subsystem does
+ * Tries to mimic what the cn=connections,cn=monitor subsystem does
* by creating volatile entries for each connection and populating them
* according to the information attached to the connection.
* At this moment the only exposed information is the DN used to bind it.
rc = mbe->register_database( be, &li->li_monitor_info.lmi_ndn );
if ( rc != 0 ) {
Debug( LDAP_DEBUG_ANY, "ldap_back_monitor_db_open: "
- "failed to register the databse with back-monitor\n",
+ "failed to register the database with back-monitor\n",
0, 0, 0 );
}
}
return -1;
}
- /* everyting is ready, can register already */
+ /* everything is ready, can register already */
if ( monitor_subsys_is_opened() ) {
return monitor_back_register_subsys( ms );
}
/*
* accept all operational attributes;
- * this includes modifersName and modifyTimestamp
+ * this includes modifiersName and modifyTimestamp
* if lastmod is "on"
*/
if ( is_at_operational( mod->sm_desc->ad_type ) ) {
static ConfigOCs nullocs[] = {
{ "( OLcfgDbOc:8.1 "
"NAME 'olcNullConfig' "
- "DESC 'Null backend ocnfiguration' "
+ "DESC 'Null backend configuration' "
"SUP olcDatabaseConfig "
"MAY ( olcDbBindAllowed $ olcDbDoSearch ) )",
Cft_Database, nullcfg },
* DN that was configured for this backend, but it's
* better than nothing.
*
- * should be a configuratable item
+ * should be a configurable item
*/
BER_BVSTR( &val, "organizationalUnit" );
attr_merge_one( &e, ad_objectClass, &val, NULL );
val.bv_len = STRLENOF("uid=,") + ( pwlen + be->be_suffix[0].bv_len );
val.bv_val = ch_malloc( val.bv_len + 1 );
- /* rdn attribute type should be a configuratable item */
+ /* rdn attribute type should be a configurable item */
sprintf( val.bv_val, "uid=%s,%s",
pw->pw_name, be->be_suffix[0].bv_val );
*all* configuration file directives have been read
- the interface for the search method is improved to
- pass the scope, deferencing policy, size limit, etc.
+ pass the scope, dereferencing policy, size limit, etc.
See SampleLDAP.pm for details.
These changes were sponsored by myinternet Limited.
bi->bi_connection_init = 0;
bi->bi_connection_destroy = 0;
- /* injecting code from perl_back_open, because using fonction reference (bi->bi_open) is not functional */
+ /* injecting code from perl_back_open, because using function reference (bi->bi_open) is not functional */
Debug( LDAP_DEBUG_TRACE, "perl backend open\n", 0, 0, 0 );
if( PERL_INTERPRETER != NULL ) {
backsql_BindParamStr( sth, colnum, SQL_PARAM_INPUT,
"", 0 );
Debug( LDAP_DEBUG_TRACE, "backsql_add(): "
- "create_proc hint (%s) not avalable\n",
+ "create_proc hint (%s) not available\n",
oc->bom_create_hint->ad_cname.bv_val,
0, 0 );
}
-1) driver name comparison for MS SQL Server workaround is realy kinda dirty
+1) driver name comparison for MS SQL Server workaround is really kinda dirty
hack, but for now i don't know how to code it more carefully
2) another dirty hack: length of LONGVARCHAR and LONGVARBINARY fields is
currently set to MAX_ATTR_LEN. Maybe such fields must be handled with
if ( rc != 0 || vat == NULL ) {
Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): "
"attribute \"%s\" is not defined "
- "for objectlass \"%s\"\n",
+ "for objectclass \"%s\"\n",
an->an_name.bv_val,
BACKSQL_OC_NAME( bsi->bsi_oc ), 0 );
continue;
This document briefly describes the steps that are required to prepare
a quick'n'dirty installation of back-sql and of the related RDBMS
and ODBC; Examples are provided, but by no means they pretent
-to represent an exaustive source of info about how to setup the ODBC;
+to represent an exhaustive source of info about how to setup the ODBC;
refer to the docs for any problem or detail.
Currently, the system has been tested with IBM db2, PostgreSQL and MySQL;
# (c) Copyright 1996-1998, TimesTen Performance Software.
# All rights reserved.
## Note: This file was contributed by Sam Drake of TimesTen Performance
-## Software for use and redistribution as an intregal part of
+## Software for use and redistribution as an integral part of
## OpenLDAP Software. -Kdz
CPLUSPLUS = CC
// (c) Copyright 1999-2001 TimesTen Performance Software. All rights reserved.
//// Note: This file was contributed by Sam Drake of TimesTen Performance
-//// Software for use and redistribution as an intregal part of
+//// Software for use and redistribution as an integral part of
//// OpenLDAP Software. -Kdz
#include <stdlib.h>
if ( vat == NULL ) {
/* search anyway; other parts of the filter
- * may succeeed */
+ * may succeed */
backsql_strfcat_x( &bsi->bsi_flt_where,
bsi->bsi_op->o_tmpmemctx,
"l",
static ConfigOCs wtocs[] = {
{ "( OLcfgDbOc:9.1 "
"NAME 'olcWtConfig' "
- "DESC 'Wt backend ocnfiguration' "
+ "DESC 'Wt backend configuration' "
"SUP olcDatabaseConfig "
"MUST olcDbDirectory "
"MAY ( olcWtConfig $ olcDbIndex ) )",
goto return_results;
}
- /* begen transaction */
+ /* begin transaction */
rc = wc->session->begin_transaction(wc->session, NULL);
if( rc ) {
Debug( LDAP_DEBUG_TRACE,
gotit = 1;
}
- /* overlays can be instanciated multiple times, use
+ /* overlays can be instantiated multiple times, use
* be_ctrls[ cid ] as an instance counter, so that the
* overlay's controls are only really disabled after the
* last instance called overlay_register_control() */
}
if ( !gotit ) {
- /* overlays can be instanciated multiple times, use
+ /* overlays can be instantiated multiple times, use
* be_ctrls[ cid ] as an instance counter, so that the
* overlay's controls are only really unregistered after the
* last instance called overlay_register_control() */
assert( mr != NULL );
if ( mr->smr_compat_syntaxes ) {
- /* count esisting */
+ /* count existing */
for ( n = 0;
mr->smr_compat_syntaxes[ n ];
n++ )
*/
/*
* Authors: Neil Dunbar <neil.dunbar@hp.com>
- * Emmannuel Dreyfus <manu@netbsd.org>
+ * Emmanuel Dreyfus <manu@netbsd.org>
*/
#include "portable.h"
/*
* Linked list of attribute constraints which we should enforce.
* This is probably a sub optimal structure - some form of sorted
- * array would be better if the number of attributes contrained is
+ * array would be better if the number of attributes constrained is
* likely to be much bigger than 4 or 5. We stick with a list for
* the moment.
*/
rc = 0;
break;
case SLAP_CONFIG_ADD:
- /* fallthrough to LDAP_MOD_ADD */
+ /* fallthru to LDAP_MOD_ADD */
case LDAP_MOD_ADD:
Debug(LDAP_DEBUG_TRACE, "==> ppolicy_cf_default add\n", 0, 0, 0);
if ( pi->def_policy.bv_val ) {
}
break;
case SLAP_CONFIG_ADD:
- /* fallthrough to LDAP_MOD_ADD */
+ /* fallthru to LDAP_MOD_ADD */
case LDAP_MOD_ADD:
switch ( c->type ) {
case REFINT_ATTRS:
* "pdn" may be untouched if no massaging occurred and its value was not null;
* "ndn" may be untouched if no massaging occurred and its value was not null;
* if no massage occurred and "ndn" value was not null, it is filled
- * with the normaized value of "pdn", much like ndn = dnNormalize( pdn )
+ * with the normalized value of "pdn", much like ndn = dnNormalize( pdn )
*/
int
rwm_dn_massage_pretty_normalize(
return;
/* RFC 2891: If critical then send the entries iff they were
- * succesfully sorted. If non-critical send all entries
+ * successfully sorted. If non-critical send all entries
* whether they were sorted or not.
*/
if ( (op->o_ctrlflag[sss_cid] != SLAP_CONTROL_CRITICAL) ||
rc = 0;
break;
- case SLAP_CONFIG_ADD: /* fallthrough */
+ case SLAP_CONFIG_ADD: /* fallthru */
case LDAP_MOD_ADD:
if ( legacy ) {
snprintf( c->cr_msg, sizeof( c->cr_msg ),
LDAP_SLAPD_F (int) slap_sasl_external( Connection *c,
slap_ssf_t ssf, /* relative strength of external security */
- struct berval *authid ); /* asserted authenication id */
+ struct berval *authid ); /* asserted authentication id */
LDAP_SLAPD_F (int) slap_sasl_reset( Connection *c );
LDAP_SLAPD_F (int) slap_sasl_close( Connection *c );
#
# This document and translations of it may be copied and furnished
# to others, and derivative works that comment on or otherwise explain
-# it or assist in its implmentation may be prepared, copied, published
+# it or assist in its implementation may be prepared, copied, published
# and distributed, in whole or in part, without restriction of any
# kind, provided that the above copyright notice and this paragraph
# are included on all such copies and derivative works. However,
DESC 'RFC1274: Single Level Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.13 SIN
GLE-VALUE )
olcAttributeTypes: ( 0.9.2342.19200300.100.1.51 NAME 'subtreeMinimumQualit
- y' DESC 'RFC1274: Subtree Mininum Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
+ y' DESC 'RFC1274: Subtree Minimum Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
13 SINGLE-VALUE )
olcAttributeTypes: ( 0.9.2342.19200300.100.1.52 NAME 'subtreeMaximumQualit
- y' DESC 'RFC1274: Subtree Maximun Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
+ y' DESC 'RFC1274: Subtree Maximum Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
13 SINGLE-VALUE )
olcAttributeTypes: ( 0.9.2342.19200300.100.1.53 NAME 'personalSignature' D
ESC 'RFC1274: Personal Signature (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.
# 9.3.25. SOA Record
#
# The SOA Record attribute type specifies a type SOA (Start of
-# Authority) DNS resorce record [6] [7].
+# Authority) DNS resource record [6] [7].
#
# sOARecord ATTRIBUTE
# WITH ATTRIBUTE-SYNTAX
# ::= {pilotAttributeType 51}
#
attributetype ( 0.9.2342.19200300.100.1.51 NAME 'subtreeMinimumQuality'
- DESC 'RFC1274: Subtree Mininum Quality'
+ DESC 'RFC1274: Subtree Minimum Quality'
SYNTAX 1.3.6.1.4.1.1466.115.121.1.13 SINGLE-VALUE )
# 9.3.42. Subtree Maximum Quality
# ::= {pilotAttributeType 52}
#
attributetype ( 0.9.2342.19200300.100.1.52 NAME 'subtreeMaximumQuality'
- DESC 'RFC1274: Subtree Maximun Quality'
+ DESC 'RFC1274: Subtree Maximum Quality'
SYNTAX 1.3.6.1.4.1.1466.115.121.1.13 SINGLE-VALUE )
# 9.3.43. Personal Signature
#
# Application Working Group M. Ansari
# INTERNET-DRAFT Sun Microsystems, Inc.
-# Expires Febuary 2003 L. Howard
+# Expires February 2003 L. Howard
# PADL Software Pty. Ltd.
# B. Joslin [ed.]
# Hewlett-Packard Company
olcObjectIdentifier: {35}PolicySyntax 1.3.6.1.4.1.4203.666.11.10.2.5
olcObjectIdentifier: {36}RoleSyntax 1.3.6.1.4.1.4203.666.11.10.2.6
olcLdapSyntaxes: {0}( 1.3.6.1.4.1.4203.666.11.10.2.4 DESC 'X.509 PMI attribute
- cartificate path: SEQUENCE OF AttributeCertificate' X-SUBST '1.3.6.1.4.1.146
+ certificate path: SEQUENCE OF AttributeCertificate' X-SUBST '1.3.6.1.4.1.146
6.115.121.1.15' )
olcLdapSyntaxes: {1}( 1.3.6.1.4.1.4203.666.11.10.2.5 DESC 'X.509 PMI policy sy
ntax' X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
## AttCertPath
ldapsyntax ( 1.3.6.1.4.1.4203.666.11.10.2.4
NAME 'AttCertPath'
- DESC 'X.509 PMI attribute cartificate path: SEQUENCE OF AttributeCertificate'
+ DESC 'X.509 PMI attribute certificate path: SEQUENCE OF AttributeCertificate'
X-SUBST '1.3.6.1.4.1.1466.115.121.1.15' )
##
## PolicySyntax
# This attribute indicates whether users can change their own
# passwords, although the change operation is still subject to access
# control. If this attribute is not present, a value of "TRUE" is
-# assumed. This attribute is intended to be used in the absense of an
+# assumed. This attribute is intended to be used in the absence of an
# access control mechanism.
attributetype ( 1.3.6.1.4.1.42.2.27.8.1.14
* bi_close() is called from backend_shutdown()
* bi_destroy: called to destroy each database, called
* once during shutdown after all bi_db_destroy calls.
- * bi_destory() is called from backend_destroy()
+ * bi_destroy() is called from backend_destroy()
*/
BI_init *bi_init;
BI_config *bi_config;
* called only by backend_shutdown()
* bi_db_destroy: called to destroy each database
* called once per database during shutdown AFTER all
- * bi_close calls but before bi_destory calls.
- * called only by backend_destory()
+ * bi_close calls but before bi_destroy calls.
+ * called only by backend_destroy()
*/
BI_db_init *bi_db_init;
BI_db_config *bi_db_config;
BI_op_extended *bi_extended;
BI_op_cancel *bi_op_cancel;
- /* Auxilary Functions */
+ /* Auxiliary Functions */
BI_operational *bi_operational;
BI_chk_referrals *bi_chk_referrals;
BI_chk_controls *bi_chk_controls;
*
* Output:
*
- * Return Values: a pointer to a newly created Slapi_PBlock structrue or
+ * Return Values: a pointer to a newly created Slapi_PBlock structure or
* NULL - function failed
*
* Messages: None
*
* Output: pFuncAddr - the function address of the requested function name.
*
- * Return Values: a pointer to a newly created ExtendOp structrue or
+ * Return Values: a pointer to a newly created ExtendOp structure or
* NULL - function failed
*
* Messages: None
#define SLAPI_PLUGIN_DB_TEST_FN 227
#define SLAPI_PLUGIN_DB_NO_ACL 250
-/* OpenLDAP private parametrs */
+/* OpenLDAP private parameters */
#define SLAPI_PLUGIN_COMPUTE_EVALUATOR_FN 1200
#define SLAPI_PLUGIN_COMPUTE_SEARCH_REWRITER_FN 1201
if ( slapi_over_initialized == 0 ) {
int rc;
- /* do global initializaiton */
+ /* do global initialization */
ldap_pvt_thread_mutex_init( &slapi_hn_mutex );
ldap_pvt_thread_mutex_init( &slapi_time_mutex );
ldap_pvt_thread_mutex_init( &slapi_printmessage_mutex );
request = "delete";
break;
}
- /* backend does not support delete, fallthrough */
+ /* backend does not support delete, fallthru */
case LDAP_REQ_MODRDN:
fprintf( stderr, "%s: request 0x%lx not supported (line=%lu)\n",
For example, if an issue only appears with a certain database type, the
test itself should only run when invoked for that database type;
otherwise, if the issue appears whatever backend is used, the test should
-be parametric, so that it is run with the backend selected at run-time
+be parameteric, so that it is run with the backend selected at run-time
via the "-b" switch of the "run" script.
Regression tests are prepared on a voluntary basis, so don't expect all
# ITS#4632: syncprov now wants this on (ITS#4613); however, since checks
# are in place to prevent lastmod operational attrs to be added twice,
-# this shuld make no harm
+# this should cause no harm
lastmod on
# HACK: use the RootDN of the monitor database as UpdateDN so ACLs apply
EOTUNIQ2
RC=$?
if test $RC != $RCODEconstraint ; then
- echo "olcUniqueAttribtue single deletion hit the wrong value"
+ echo "olcUniqueAttribute single deletion hit the wrong value"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit -1
fi
sleep 1
-echo "Testing attribute value regex subsitution..."
+echo "Testing attribute value regex substitution..."
for i in 0 1 2 3 4 5; do
$LDAPSEARCH -s base -b "$MONITOR" -h $LOCALHOST -p $PORT1 \
'objectclass=*' > /dev/null 2>&1
# order is "sid2 < sid3 < sid1". When site1 master starts it is likely
# to sync with central master before it syncs with site1 master. When
# central master syncs with site1 master they will share the sid1 and
-# sid3 CSNs, the additonal sid2 CSN hold by site1 master will be the
+# sid3 CSNs, the additional sid2 CSN hold by site1 master will be the
# oldest. Central master will not receive the changes made on site1
# master unless it completely ignores the CSNs presented by central
# master.
exit $RC
fi
-# Test done, now some more intialization...
+# Test done, now some more initialization...
echo "Adding syncrepl consumer on central search..."
$LDAPMODIFY -D cn=config -H $URI4 -y $CONFIGPWF <<EOF >> $TESTOUT 2>&1
fi
nCSN=`echo "$CSN1" | wc -l`
if test "$nCSN" -ne 1 ; then
- echo "ERROR: Wrong contextCSN count on provder, should be 1"
+ echo "ERROR: Wrong contextCSN count on provider, should be 1"
echo "$CSN1"
test $KILLSERVERS != no && kill -HUP $KILLPIDS
exit 1