const char *desc = b->a_dn_at->ad_cname->bv_val;
Debug( LDAP_DEBUG_ACL, "<= check a_dn_at: %s\n",
- b->a_dn_at, 0, 0);
+ desc, 0, 0);
bv.bv_val = op->o_ndn;
bv.bv_len = strlen( bv.bv_val );
fprintf( stderr,
"%s: line %d: group: \"%s\" not allowed by \"%s\"\n",
fname, lineno,
- b->a_group_at->ad_type,
+ b->a_group_at->ad_cname->bv_val,
b->a_group_oc->soc_oid );
acl_usage();
}
fprintf( stderr, " group: %s", b->a_group_pat );
if ( b->a_group_oc ) {
- fprintf( stderr, " objectClass: %s", b->a_group_oc );
+ fprintf( stderr, " objectClass: %s",
+ b->a_group_oc->soc_oclass.oc_oid );
if ( b->a_group_at ) {
fprintf( stderr, " attributeType: %s", b->a_group_at->ad_cname->bv_val );
#ifdef SLAPD_EXT_FILTERS
case LDAP_FILTER_EXT:
Debug( LDAP_DEBUG_FILTER, " EXT\n", 0, 0, 0 );
-#if SLAPD_SCHEMA_NOT_COMPAT
rc = test_mra_filter( be, conn, op, e, f->f_mra );
-#else
- rc = LDAP_UNWILLING_TO_PERFORM;
-#endif
break;
#endif
AttributeDescription *objectClass = slap_schema.si_ad_objectClass;
assert(!( e == NULL || oc == NULL ));
- if( e == NULL || oc == NULL
- ) {
+ if( e == NULL || oc == NULL ) {
return 0;
}
/* no objectClass attribute */
Debug( LDAP_DEBUG_ANY, "is_entry_objectclass(\"%s\", \"%s\") "
"no objectClass attribute\n",
- e->e_dn == NULL ? "" : e->e_dn, oc, 0 );
+ e->e_dn == NULL ? "" : e->e_dn,
+ oc->soc_oclass.oc_oid, 0 );
return 0;
}
if ( ! access_allowed( be, conn, op, e, desc, NULL, ACL_READ ) ) {
Debug( LDAP_DEBUG_ACL, "acl: access to attribute %s not allowed\n",
- desc, 0, 0 );
+ desc->ad_cname->bv_val, 0, 0 );
continue;
}
{
Debug( LDAP_DEBUG_ACL,
"acl: access to attribute %s, value %d not allowed\n",
- desc, i, 0 );
+ desc->ad_cname->bv_val, i, 0 );
continue;
}
if ( ! access_allowed( be, conn, op, e, desc, NULL, ACL_READ ) ) {
Debug( LDAP_DEBUG_ACL, "acl: access to attribute %s not allowed\n",
- desc, 0, 0 );
+ desc->ad_cname->bv_val, 0, 0 );
continue;
}
{
Debug( LDAP_DEBUG_ACL,
"acl: access to attribute %s, value %d not allowed\n",
- desc, i, 0 );
+ desc->ad_cname->bv_val, i, 0 );
continue;
}