]> git.sur5r.net Git - openldap/commitdiff
Check components of extensible match filter sooner than later.
authorKurt Zeilenga <kurt@openldap.org>
Tue, 12 Mar 2002 23:07:07 +0000 (23:07 +0000)
committerKurt Zeilenga <kurt@openldap.org>
Tue, 12 Mar 2002 23:07:07 +0000 (23:07 +0000)
servers/slapd/filterentry.c
servers/slapd/mra.c
servers/slapd/passwd.c

index 706e774841d2b27352eb4c35a18d386bf386e64b..af513e29c565ca7035d0529a0ca3db57d1ab9c12 100644 (file)
@@ -227,38 +227,12 @@ static int test_mra_filter(
 {
        Attribute       *a;
 
-       if( mra->ma_desc == NULL || mra->ma_dnattrs ) {
-               return LDAP_INAPPROPRIATE_MATCHING;
-       }
-
        if( !access_allowed( be, conn, op, e,
                mra->ma_desc, &mra->ma_value, ACL_SEARCH, NULL ) )
        {
                return LDAP_INSUFFICIENT_ACCESS;
        }
 
-       /* no matching rule was provided, use the attribute's
-          equality rule if it supports extensible matching. */
-       if( mra->ma_rule == NULL && 
-               mra->ma_desc->ad_type->sat_equality &&
-               mra->ma_desc->ad_type->sat_equality->smr_usage & SLAP_MR_EXT )
-       {
-               mra->ma_rule = mra->ma_desc->ad_type->sat_equality;
-
-       } else {
-               return LDAP_INAPPROPRIATE_MATCHING;
-       }
-
-       /* check to see if the matching rule is appropriate for
-          the syntax of the attribute.  This check will need
-          to be extended to support other kinds of extensible
-          matching rules */
-       if( strcmp(mra->ma_rule->smr_syntax->ssyn_oid,
-               mra->ma_desc->ad_type->sat_syntax->ssyn_oid) != 0)
-       {
-               return LDAP_INAPPROPRIATE_MATCHING;
-       }
-
        for(a = attrs_find( e->e_attrs, mra->ma_desc );
                a != NULL;
                a = attrs_find( a->a_next, mra->ma_desc ) )
index 0223e44704764d5108e56a61718714554ff11057..f3107156aaca9902143b41d1f6229300dcbcf65a 100644 (file)
 
 void
 mra_free(
-    MatchingRuleAssertion *mra,
-    int        freeit
+       MatchingRuleAssertion *mra,
+       int     freeit
 )
 {
-#if 0  /* no longer a malloc'd string */
-       ch_free( mra->ma_rule_text.bv_val );
-#endif
        ch_free( mra->ma_value.bv_val );
        if ( freeit ) {
                ch_free( (char *) mra );
@@ -32,22 +29,23 @@ mra_free(
 
 int
 get_mra(
-    BerElement *ber,
-    MatchingRuleAssertion      **mra,
+       BerElement      *ber,
+       MatchingRuleAssertion   **mra,
        const char **text
 )
 {
        int rc, tag;
        ber_len_t length;
-       struct berval type, value;
+       struct berval type = { 0, NULL }, value;
        MatchingRuleAssertion *ma;
 
        ma = ch_malloc( sizeof( MatchingRuleAssertion ) );
        ma->ma_rule = NULL;
-       ma->ma_rule_text.bv_val = NULL;
        ma->ma_rule_text.bv_len = 0;
+       ma->ma_rule_text.bv_val = NULL;
        ma->ma_desc = NULL;
        ma->ma_dnattrs = 0;
+       ma->ma_value.bv_len = 0;
        ma->ma_value.bv_val = NULL;
 
        rc = ber_scanf( ber, "{t", &tag );
@@ -79,10 +77,8 @@ get_mra(
                        mra_free( ma, 1 );
                        return SLAPD_DISCONNECT;
                }
-               ma->ma_rule = mr_bvfind( &ma->ma_rule_text );
 
                rc = ber_scanf( ber, "t", &tag );
-
                if( rc == LBER_ERROR ) {
 #ifdef NEW_LOGGING
                        LDAP_LOG(( "operation", LDAP_LEVEL_ERR,
@@ -111,15 +107,7 @@ get_mra(
                        return SLAPD_DISCONNECT;
                }
 
-               rc = slap_bv2ad( &type, &ma->ma_desc, text );
-
-               if( rc != LDAP_SUCCESS ) {
-                       mra_free( ma, 1 );
-                       return rc;
-               }
-
                rc = ber_scanf( ber, "t", &tag );
-
                if( rc == LBER_ERROR ) {
 #ifdef NEW_LOGGING
                        LDAP_LOG(( "operation", LDAP_LEVEL_ERR,
@@ -162,25 +150,12 @@ get_mra(
                return SLAPD_DISCONNECT;
        }
 
-       /*
-        * OK, if no matching rule, normalize for equality, otherwise
-        * normalize for the matching rule.
-        */
-       rc = value_validate_normalize( ma->ma_desc, SLAP_MR_EQUALITY,
-               &value, &ma->ma_value, text );
-
-       if( rc != LDAP_SUCCESS ) {
-               mra_free( ma, 1 );
-               return rc;
-       }
-
        tag = ber_peek_tag( ber, &length );
 
        if ( tag == LDAP_FILTER_EXT_DNATTRS ) {
                rc = ber_scanf( ber, "b}", &ma->ma_dnattrs );
        } else {
                rc = ber_scanf( ber, "}" );
-               ma->ma_dnattrs = 0;
        }
 
        if( rc == LBER_ERROR ) {
@@ -196,8 +171,69 @@ get_mra(
                return SLAPD_DISCONNECT;
        }
 
-       *mra = ma;
+       if( ma->ma_dnattrs ) {
+               *text = "matching with \":dn\" not supported";
+               return LDAP_INAPPROPRIATE_MATCHING;
+       }
+
+       if( type.bv_val != NULL ) {
+               rc = slap_bv2ad( &type, &ma->ma_desc, text );
+               if( rc != LDAP_SUCCESS ) {
+                       mra_free( ma, 1 );
+                       return rc;
+               }
+
+       } else {
+               *text = "matching without attribute description rule not supported";
+               return LDAP_INAPPROPRIATE_MATCHING;
+       }
+
+       if( ma->ma_rule_text.bv_val != NULL ) {
+               ma->ma_rule = mr_bvfind( &ma->ma_rule_text );
+               if( ma->ma_rule == NULL ) {
+                       mra_free( ma, 1 );
+                       *text = "matching rule not recognized";
+                       return LDAP_INAPPROPRIATE_MATCHING;
+               }
+       }
+
+       if( ma->ma_desc != NULL &&
+               ma->ma_desc->ad_type->sat_equality != NULL &&
+               ma->ma_desc->ad_type->sat_equality->smr_usage & SLAP_MR_EXT )
+       {
+               /* no matching rule was provided, use the attribute's
+                  equality rule if it supports extensible matching. */
+               ma->ma_rule = ma->ma_desc->ad_type->sat_equality;
+
+       } else {
+               mra_free( ma, 1 );
+               return LDAP_INAPPROPRIATE_MATCHING;
+       }
 
+       /* check to see if the matching rule is appropriate for
+          the syntax of the attribute.  This check will need
+          to be extended to support other kinds of extensible
+          matching rules */
+       if( strcmp( ma->ma_rule->smr_syntax->ssyn_oid,
+               ma->ma_desc->ad_type->sat_syntax->ssyn_oid ) != 0 )
+       {
+               mra_free( ma, 1 );
+               return LDAP_INAPPROPRIATE_MATCHING;
+       }
+
+       /*
+        * OK, if no matching rule, normalize for equality, otherwise
+        * normalize for the matching rule.
+        */
+       rc = value_validate_normalize( ma->ma_desc, SLAP_MR_EQUALITY,
+               &value, &ma->ma_value, text );
+
+       if( rc != LDAP_SUCCESS ) {
+               mra_free( ma, 1 );
+               return rc;
+       }
+
+       *mra = ma;
        return LDAP_SUCCESS;
 }
 
index 147c9b41f64303bc1f86b1c87e042f09e4952dfc..8382f284aec89f51f88501c72564b4787f2fba81 100644 (file)
@@ -151,7 +151,7 @@ int slap_passwd_parse( struct berval *reqdata,
                        goto decoding_error;
                }
 
-               tag = ber_peek_tag( ber, &len);
+               tag = ber_peek_tag( ber, &len );
        }
 
        if( tag == LDAP_TAG_EXOP_MODIFY_PASSWD_NEW ) {