Entry *found = NULL;
slap_overinst *on = (slap_overinst *) op->o_bd->bd_info;
int rc;
- AclCheck ak = { op->ora_e. slap_schema.si_ad_entry, NULL, ACL_WRITE };
toAdd = op->oq_add.rs_e;
addpartial.on_bi.bi_type, toAdd->e_nname.bv_val,0);
/* if the user doesn't have access, fall through to the normal ADD */
- if(!access_allowed(op, &ak ))
+ if(!access_allowed(op, toAdd, slap_schema.si_ad_entry,
+ NULL, ACL_WRITE, NULL))
{
return SLAP_CB_CONTINUE;
}
slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
lastmod_info_t *lmi = (lastmod_info_t *)on->on_bi.bi_private;
Attribute *a;
- AclCheck ak;
ldap_pvt_thread_mutex_lock( &lmi->lmi_entry_mutex );
goto return_results;
}
- ak.ak_e = lmi->lmi_e;
- ak.ak_desc = op->oq_compare.rs_ava->aa_desc;
- ak.ak_val = &op->oq_compare.rs_ava->aa_value;
- ak.ak_access = ACL_COMPARE;
- ak.ak_state = NULL;
- rs->sr_err = access_allowed( op, &ak );
+ rs->sr_err = access_allowed( op, lmi->lmi_e, op->oq_compare.rs_ava->aa_desc,
+ &op->oq_compare.rs_ava->aa_value, ACL_COMPARE, NULL );
if ( ! rs->sr_err ) {
rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
goto return_results;