connection.c 37.8 KB
Newer Older
1
/* $OpenLDAP$ */
Kurt Zeilenga's avatar
Kurt Zeilenga committed
2
/*
Kurt Zeilenga's avatar
Kurt Zeilenga committed
3
 * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
Kurt Zeilenga's avatar
Kurt Zeilenga committed
4
5
6
 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
 */

Kurt Zeilenga's avatar
Kurt Zeilenga committed
7
#include "portable.h"
Kurt Zeilenga's avatar
Kurt Zeilenga committed
8
9

#include <stdio.h>
Kurt Zeilenga's avatar
Kurt Zeilenga committed
10
#include <limits.h>
Kurt Zeilenga's avatar
Kurt Zeilenga committed
11

12
#include <ac/socket.h>
Kurt Zeilenga's avatar
Kurt Zeilenga committed
13
14
15
#include <ac/errno.h>
#include <ac/string.h>
#include <ac/time.h>
Pierangelo Masarati's avatar
Pierangelo Masarati committed
16
#include <ac/unistd.h>
Kurt Zeilenga's avatar
Kurt Zeilenga committed
17

Kurt Zeilenga's avatar
Kurt Zeilenga committed
18
#include "ldap_pvt.h"
Kurt Zeilenga's avatar
Kurt Zeilenga committed
19
#include "lutil.h"
Kurt Zeilenga's avatar
Kurt Zeilenga committed
20
21
#include "slap.h"

22
23
24
/* protected by connections_mutex */
static ldap_pvt_thread_mutex_t connections_mutex;
static Connection *connections = NULL;
25
static unsigned long conn_nextid = 0;
26

27
/* structure state (protected by connections_mutex) */
28
29
30
#define SLAP_C_UNINITIALIZED	0x00	/* MUST BE ZERO (0) */
#define SLAP_C_UNUSED			0x01
#define SLAP_C_USED				0x02
31
32

/* connection state (protected by c_mutex ) */
33
34
35
36
37
#define SLAP_C_INVALID			0x00	/* MUST BE ZERO (0) */
#define SLAP_C_INACTIVE			0x01	/* zero threads */
#define SLAP_C_ACTIVE			0x02	/* one or more threads */
#define SLAP_C_BINDING			0x03	/* binding */
#define SLAP_C_CLOSING			0x04	/* closing */
38

39
40
41
const char *
connection_state2str( int state )
{
42
43
44
45
46
47
48
49
50
51
52
	switch( state ) {
	case SLAP_C_INVALID:	return "!";		
	case SLAP_C_INACTIVE:	return "|";		
	case SLAP_C_ACTIVE:		return "";			
	case SLAP_C_BINDING:	return "B";
	case SLAP_C_CLOSING:	return "C";			
	}

	return "?";
}

53
static Connection* connection_get( ber_socket_t s );
54
55

static int connection_input( Connection *c );
56
static void connection_close( Connection *c );
57

58
59
static int connection_op_activate( Connection *conn, Operation *op );
static int connection_resched( Connection *conn );
60
static void connection_abandon( Connection *conn );
61
static void connection_destroy( Connection *c );
62

Kurt Zeilenga's avatar
Kurt Zeilenga committed
63
64
65
66
67
struct co_arg {
	Connection	*co_conn;
	Operation	*co_op;
};

68
69
70
71
72
73
74
/*
 * Initialize connection management infrastructure.
 */
int connections_init(void)
{
	assert( connections == NULL );

75
	if( connections != NULL) {
76
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
77
78
		LDAP_LOG( CONNECTION, INFO,
			   "connections_init:  already initialized.\n", 0, 0, 0 );
79
#else
80
81
		Debug( LDAP_DEBUG_ANY, "connections_init: already initialized.\n",
			0, 0, 0 );
82
#endif
83
84
85
86
87
88
89
90
91
		return -1;
	}

	/* should check return of every call */
	ldap_pvt_thread_mutex_init( &connections_mutex );

	connections = (Connection *) calloc( dtblsize, sizeof(Connection) );

	if( connections == NULL ) {
92
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
93
94
95
		LDAP_LOG( CONNECTION, ERR,
			   "connections_init: allocation (%d * %ld) of connection "
			   "array failed\n", dtblsize, (long) sizeof(Connection), 0 );
96
#else
97
		Debug( LDAP_DEBUG_ANY,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
98
			"connections_init: allocation (%d*%ld) of connection array failed\n",
99
			dtblsize, (long) sizeof(Connection), 0 );
100
#endif
101
102
103
		return -1;
	}

104
105
106
    assert( connections[0].c_struct_state == SLAP_C_UNINITIALIZED );
    assert( connections[dtblsize-1].c_struct_state == SLAP_C_UNINITIALIZED );

107
108
109
110
111
112
113
114
	/*
	 * per entry initialization of the Connection array initialization
	 * will be done by connection_init()
	 */ 

	return 0;
}

115
116
117
118
119
/*
 * Destroy connection management infrastructure.
 */
int connections_destroy(void)
{
120
	ber_socket_t i;
121
122
123
124

	/* should check return of every call */

	if( connections == NULL) {
125
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
126
127
		LDAP_LOG( CONNECTION, INFO,
			   "connections_destroy: nothing to destroy.\n", 0, 0, 0 );
128
#else
129
130
		Debug( LDAP_DEBUG_ANY, "connections_destroy: nothing to destroy.\n",
			0, 0, 0 );
131
#endif
132
133
134
135
		return -1;
	}

	for ( i = 0; i < dtblsize; i++ ) {
136
		if( connections[i].c_struct_state != SLAP_C_UNINITIALIZED ) {
137
			ber_sockbuf_free( connections[i].c_sb );
138
139
140
141
			ldap_pvt_thread_mutex_destroy( &connections[i].c_mutex );
			ldap_pvt_thread_mutex_destroy( &connections[i].c_write_mutex );
			ldap_pvt_thread_cond_destroy( &connections[i].c_write_cv );
		}
142
143
144
145
146
147
148
149
150
151
152
153
154
155
	}

	free( connections );
	connections = NULL;

	ldap_pvt_thread_mutex_destroy( &connections_mutex );
	return 0;
}

/*
 * shutdown all connections
 */
int connections_shutdown(void)
{
156
	ber_socket_t i;
157
158
159
160
161
162
163
164
165

	ldap_pvt_thread_mutex_lock( &connections_mutex );

	for ( i = 0; i < dtblsize; i++ ) {
		if( connections[i].c_struct_state != SLAP_C_USED ) {
			continue;
		}

		ldap_pvt_thread_mutex_lock( &connections[i].c_mutex );
166
167

		/* connections_mutex and c_mutex are locked */
168
169
		connection_closing( &connections[i] );
		connection_close( &connections[i] );
170

171
172
173
174
		ldap_pvt_thread_mutex_unlock( &connections[i].c_mutex );
	}

	ldap_pvt_thread_mutex_unlock( &connections_mutex );
Kurt Zeilenga's avatar
Kurt Zeilenga committed
175
176

	return 0;
177
178
}

179
180
181
182
183
184
185
186
187
/*
 * Timeout idle connections.
 */
int connections_timeout_idle(time_t now)
{
	int i = 0;
	int connindex;
	Connection* c;

Gary Williams's avatar
Gary Williams committed
188
	for( c = connection_first( &connindex );
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
		c != NULL;
		c = connection_next( c, &connindex ) )
	{
		if( difftime( c->c_activitytime+global_idletimeout, now) < 0 ) {
			/* close it */
			connection_closing( c );
			connection_close( c );
			i++;
		}
	}
	connection_done( c );

	return i;
}

204
static Connection* connection_get( ber_socket_t s )
205
{
206
207
	/* connections_mutex should be locked by caller */

208
209
	Connection *c;

210
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
211
	LDAP_LOG( CONNECTION, ENTRY, "connection_get: socket %ld\n", (long)s, 0, 0 );
212
#else
213
	Debug( LDAP_DEBUG_ARGS,
214
215
		"connection_get(%ld)\n",
		(long) s, 0, 0 );
216
#endif
217
218
219

	assert( connections != NULL );

220
	if(s == AC_SOCKET_INVALID) {
221
222
223
224
225
		return NULL;
	}

#ifndef HAVE_WINSOCK
	c = &connections[s];
226

Kurt Zeilenga's avatar
Kurt Zeilenga committed
227
	assert( c->c_struct_state != SLAP_C_UNINITIALIZED );
228

229
#else
230
	c = NULL;
231
	{
232
		ber_socket_t i, sd;
233
234

		for(i=0; i<dtblsize; i++) {
Gary Williams's avatar
NT port    
Gary Williams committed
235
			if( connections[i].c_struct_state == SLAP_C_UNINITIALIZED ) {
236
				assert( connections[i].c_conn_state == SLAP_C_INVALID );
Kurt Zeilenga's avatar
Kurt Zeilenga committed
237
				assert( connections[i].c_sb == 0 );
238
239
240
				break;
			}

241
242
243
			ber_sockbuf_ctrl( connections[i].c_sb,
				LBER_SB_OPT_GET_FD, &sd );

Gary Williams's avatar
NT port    
Gary Williams committed
244
			if( connections[i].c_struct_state == SLAP_C_UNUSED ) {
245
				assert( connections[i].c_conn_state == SLAP_C_INVALID );
246
				assert( sd == AC_SOCKET_INVALID );
247
248
249
				continue;
			}

250
251
252
			/* state can actually change from used -> unused by resched,
			 * so don't assert details here.
			 */
253

254
			if( sd == s ) {
Gary Williams's avatar
NT port    
Gary Williams committed
255
				c = &connections[i];
256
257
258
259
260
				break;
			}
		}
	}
#endif
261

262
	if( c != NULL ) {
263
264
		ber_socket_t	sd;

Kurt Zeilenga's avatar
Kurt Zeilenga committed
265
266
		ldap_pvt_thread_mutex_lock( &c->c_mutex );

267
		ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_GET_FD, &sd );
268
269
		if( c->c_struct_state != SLAP_C_USED ) {
			/* connection must have been closed due to resched */
270

271
			assert( c->c_conn_state == SLAP_C_INVALID );
272
			assert( sd == AC_SOCKET_INVALID );
273

274
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
275
276
			LDAP_LOG( CONNECTION, ARGS, 
				"connection_get:  connection %d not used\n", s, 0, 0 );
277
#else
278
			Debug( LDAP_DEBUG_TRACE,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
279
280
				"connection_get(%d): connection not used\n",
				s, 0, 0 );
281
#endif
282

283
			ldap_pvt_thread_mutex_unlock( &c->c_mutex );
284
285
286
			return NULL;
		}

287
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
288
289
		LDAP_LOG( CONNECTION, RESULTS, 
			"connection_get: get for %d got connid %lu\n", s, c->c_connid, 0 );
290
#else
291
		Debug( LDAP_DEBUG_TRACE,
Pierangelo Masarati's avatar
Pierangelo Masarati committed
292
			"connection_get(%d): got connid=%lu\n",
293
			s, c->c_connid, 0 );
294
#endif
Kurt Zeilenga's avatar
Kurt Zeilenga committed
295

296
297
		c->c_n_get++;

Kurt Zeilenga's avatar
Kurt Zeilenga committed
298
299
		assert( c->c_struct_state == SLAP_C_USED );
		assert( c->c_conn_state != SLAP_C_INVALID );
300
		assert( sd != AC_SOCKET_INVALID );
301

302
303
304
305
306
307
308
#ifdef SLAPD_MONITOR
		c->c_activitytime = slap_get_time();
#else
		if( global_idletimeout > 0 ) {
			c->c_activitytime = slap_get_time();
		}
#endif
309
	}
Kurt Zeilenga's avatar
Kurt Zeilenga committed
310

311
312
313
314
315
316
317
318
319
	return c;
}

static void connection_return( Connection *c )
{
	ldap_pvt_thread_mutex_unlock( &c->c_mutex );
}

long connection_init(
320
	ber_socket_t s,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
321
322
323
324
	const char* url,
	const char* dnsname,
	const char* peername,
	const char* sockname,
325
	int tls_udp_option,
326
	slap_ssf_t ssf,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
327
	const char *authid )
328
{
329
	unsigned long id;
330
	Connection *c;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
331

332
333
	assert( connections != NULL );

Kurt Zeilenga's avatar
Kurt Zeilenga committed
334
335
336
337
	assert( dnsname != NULL );
	assert( peername != NULL );
	assert( sockname != NULL );

Kurt Zeilenga's avatar
Kurt Zeilenga committed
338
#ifndef HAVE_TLS
339
	assert( tls_udp_option != 1 );
Kurt Zeilenga's avatar
Kurt Zeilenga committed
340
341
#endif

342
	if( s == AC_SOCKET_INVALID ) {
343
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
344
345
		LDAP_LOG( CONNECTION, INFO, 
			   "connection_init: init of socket %ld invalid.\n", (long)s, 0, 0 );
346
#else
Gary Williams's avatar
Gary Williams committed
347
348
349
		Debug( LDAP_DEBUG_ANY,
		       "connection_init(%ld): invalid.\n",
		       (long) s, 0, 0 );
350
#endif
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
		return -1;
	}

	assert( s >= 0 );
#ifndef HAVE_WINSOCK
	assert( s < dtblsize );
#endif

	ldap_pvt_thread_mutex_lock( &connections_mutex );

#ifndef HAVE_WINSOCK
	c = &connections[s];

#else
	{
Howard Chu's avatar
Howard Chu committed
366
		ber_socket_t	i;
367

368
369
		c = NULL;

Gary Williams's avatar
Gary Williams committed
370
371
	for( i=0; i < dtblsize; i++) {
		ber_socket_t	sd;
372

Gary Williams's avatar
Gary Williams committed
373
374
375
376
377
	    if( connections[i].c_struct_state == SLAP_C_UNINITIALIZED ) {
		assert( connections[i].c_sb == 0 );
		c = &connections[i];
		break;
	    }
Gary Williams's avatar
NT port    
Gary Williams committed
378

379
380
			sd = AC_SOCKET_INVALID;
			if (connections[i].c_sb != NULL)
Gary Williams's avatar
Gary Williams committed
381
			ber_sockbuf_ctrl( connections[i].c_sb, LBER_SB_OPT_GET_FD, &sd );
382
	    
Gary Williams's avatar
Gary Williams committed
383
384
385
386
387
388
389
390
391
392
393
394
	    if( connections[i].c_struct_state == SLAP_C_UNUSED ) {
		assert( sd == AC_SOCKET_INVALID );
		c = &connections[i];
		break;
	    }

	    assert( connections[i].c_struct_state == SLAP_C_USED );
	    assert( connections[i].c_conn_state != SLAP_C_INVALID );
	    assert( sd != AC_SOCKET_INVALID );
	}

	if( c == NULL ) {
395
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
396
		LDAP_LOG( CONNECTION, INFO, 
Gary Williams's avatar
Gary Williams committed
397
			   "connection_init: skt %d	 connection table full (%d/%d)\n",
Julius Enarusai's avatar
   
Julius Enarusai committed
398
			   s, i, dtblsize );
399
#else
Gary Williams's avatar
Gary Williams committed
400
		Debug( LDAP_DEBUG_ANY,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
401
				"connection_init(%d): connection table full (%d/%d)\n",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
402
				s, i, dtblsize);
403
#endif
Gary Williams's avatar
Gary Williams committed
404
405
406
	    ldap_pvt_thread_mutex_unlock( &connections_mutex );
	    return -1;
	}
Gary Williams's avatar
NT port    
Gary Williams committed
407
    }
408
409
#endif

Gary Williams's avatar
NT port    
Gary Williams committed
410
    assert( c != NULL );
411

412
	if( c->c_struct_state == SLAP_C_UNINITIALIZED ) {
413
414
		c->c_authmech.bv_val = NULL;
		c->c_authmech.bv_len = 0;
415
416
417
418
		c->c_dn.bv_val = NULL;
		c->c_dn.bv_len = 0;
		c->c_ndn.bv_val = NULL;
		c->c_ndn.bv_len = 0;
419
		c->c_groups = NULL;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
420

421
422
423
424
425
426
427
428
		c->c_listener_url.bv_val = NULL;
		c->c_listener_url.bv_len = 0;
		c->c_peer_domain.bv_val = NULL;
		c->c_peer_domain.bv_len = 0;
		c->c_peer_name.bv_val = NULL;
		c->c_peer_name.bv_len = 0;
		c->c_sock_name.bv_val = NULL;
		c->c_sock_name.bv_len = 0;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
429

430
431
		LDAP_STAILQ_INIT(&c->c_ops);
		LDAP_STAILQ_INIT(&c->c_pending_ops);
432

433
434
		c->c_sasl_bind_mech.bv_val = NULL;
		c->c_sasl_bind_mech.bv_len = 0;
435
		c->c_sasl_context = NULL;
436
		c->c_sasl_extra = NULL;
437

438
439
440
		c->c_sb = ber_sockbuf_alloc( );

		{
441
			ber_len_t max = sockbuf_max_incoming;
442
443
444
			ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_MAX_INCOMING, &max );
		}

Kurt Zeilenga's avatar
Kurt Zeilenga committed
445
		c->c_currentber = NULL;
446

447
448
449
450
		/* should check status of thread calls */
		ldap_pvt_thread_mutex_init( &c->c_mutex );
		ldap_pvt_thread_mutex_init( &c->c_write_mutex );
		ldap_pvt_thread_cond_init( &c->c_write_cv );
451

452
453
		c->c_struct_state = SLAP_C_UNUSED;
	}
454

Gary Williams's avatar
NT port    
Gary Williams committed
455
    ldap_pvt_thread_mutex_lock( &c->c_mutex );
456

Gary Williams's avatar
NT port    
Gary Williams committed
457
    assert( c->c_struct_state == SLAP_C_UNUSED );
458
459
460
    assert( c->c_authmech.bv_val == NULL );
    assert( c->c_dn.bv_val == NULL );
    assert( c->c_ndn.bv_val == NULL );
461
    assert( c->c_groups == NULL );
462
463
464
465
    assert( c->c_listener_url.bv_val == NULL );
    assert( c->c_peer_domain.bv_val == NULL );
    assert( c->c_peer_name.bv_val == NULL );
    assert( c->c_sock_name.bv_val == NULL );
466
467
    assert( LDAP_STAILQ_EMPTY(&c->c_ops) );
    assert( LDAP_STAILQ_EMPTY(&c->c_pending_ops) );
468
	assert( c->c_sasl_bind_mech.bv_val == NULL );
469
	assert( c->c_sasl_context == NULL );
470
	assert( c->c_sasl_extra == NULL );
Kurt Zeilenga's avatar
Kurt Zeilenga committed
471
	assert( c->c_currentber == NULL );
472

473
474
475
476
	ber_str2bv( url, 0, 1, &c->c_listener_url );
	ber_str2bv( dnsname, 0, 1, &c->c_peer_domain );
	ber_str2bv( peername, 0, 1, &c->c_peer_name );
	ber_str2bv( sockname, 0, 1, &c->c_sock_name );
477

Gary Williams's avatar
NT port    
Gary Williams committed
478
479
480
481
    c->c_n_ops_received = 0;
    c->c_n_ops_executing = 0;
    c->c_n_ops_pending = 0;
    c->c_n_ops_completed = 0;
482
483
484
485

	c->c_n_get = 0;
	c->c_n_read = 0;
	c->c_n_write = 0;
486

487
488
	/* set to zero until bind, implies LDAP_VERSION3 */
	c->c_protocol = 0;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
489

490
491
492
493
494
495
496
#ifdef SLAPD_MONITOR
	c->c_activitytime = c->c_starttime = slap_get_time();
#else
	if( global_idletimeout > 0 ) {
		c->c_activitytime = c->c_starttime = slap_get_time();
	}
#endif
497

498
499
500
501
502
503
504
505
506
507
508
#ifdef LDAP_CONNECTIONLESS
	c->c_is_udp = 0;
	if (tls_udp_option == 2)
	{
		c->c_is_udp = 1;
#ifdef LDAP_DEBUG
	ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_debug,
		LBER_SBIOD_LEVEL_PROVIDER, (void*)"udp_" );
#endif
	ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_udp,
		LBER_SBIOD_LEVEL_PROVIDER, (void *)&s );
509
510
	ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_readahead,
		LBER_SBIOD_LEVEL_PROVIDER, NULL );
511
512
513
	} else
#endif
	{
514
#ifdef LDAP_DEBUG
Kurt Zeilenga's avatar
Kurt Zeilenga committed
515
516
517
518
519
	ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_debug,
		LBER_SBIOD_LEVEL_PROVIDER, (void*)"tcp_" );
#endif
	ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_tcp,
		LBER_SBIOD_LEVEL_PROVIDER, (void *)&s );
520
	}
Kurt Zeilenga's avatar
Kurt Zeilenga committed
521
522
523
524

#ifdef LDAP_DEBUG
	ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_debug,
		INT_MAX, (void*)"ldap_" );
525
#endif
526

Kurt Zeilenga's avatar
Kurt Zeilenga committed
527
528
529
	if( ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_NONBLOCK,
		c /* non-NULL */ ) < 0 )
	{
530
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
531
		LDAP_LOG( CONNECTION, INFO, 
Pierangelo Masarati's avatar
Pierangelo Masarati committed
532
			   "connection_init: conn %lu  set nonblocking failed\n",
Julius Enarusai's avatar
   
Julius Enarusai committed
533
			   c->c_connid, 0, 0 );
534
#else
Kurt Zeilenga's avatar
Kurt Zeilenga committed
535
536
		Debug( LDAP_DEBUG_ANY,
			"connection_init(%d, %s): set nonblocking failed\n",
Pierangelo Masarati's avatar
Pierangelo Masarati committed
537
			s, c->c_peer_name.bv_val, 0 );
538
#endif
Kurt Zeilenga's avatar
Kurt Zeilenga committed
539
	}
540

Gary Williams's avatar
NT port    
Gary Williams committed
541
    id = c->c_connid = conn_nextid++;
542

Gary Williams's avatar
NT port    
Gary Williams committed
543
544
    c->c_conn_state = SLAP_C_INACTIVE;
    c->c_struct_state = SLAP_C_USED;
545

546
547
548
	c->c_ssf = c->c_transport_ssf = ssf;
	c->c_tls_ssf = 0;

Kurt Zeilenga's avatar
Kurt Zeilenga committed
549
#ifdef HAVE_TLS
550
    if ( tls_udp_option == 1 ) {
551
552
	    c->c_is_tls = 1;
	    c->c_needs_tls_accept = 1;
553
554
555
    } else {
	    c->c_is_tls = 0;
	    c->c_needs_tls_accept = 0;
556
    }
Kurt Zeilenga's avatar
Kurt Zeilenga committed
557
#endif
558

559
560
	slap_sasl_open( c );
	slap_sasl_external( c, ssf, authid );
561

Gary Williams's avatar
NT port    
Gary Williams committed
562
563
    ldap_pvt_thread_mutex_unlock( &c->c_mutex );
    ldap_pvt_thread_mutex_unlock( &connections_mutex );
564

565
566
    backend_connection_init(c);

Gary Williams's avatar
NT port    
Gary Williams committed
567
    return id;
568
569
}

570
571
void connection2anonymous( Connection *c )
{
572
573
	assert( connections != NULL );
	assert( c != NULL );
574

575
576
577
578
579
	{
		ber_len_t max = sockbuf_max_incoming;
		ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_MAX_INCOMING, &max );
	}

580
581
582
	if(c->c_authmech.bv_val != NULL ) {
		free(c->c_authmech.bv_val);
		c->c_authmech.bv_val = NULL;
583
	}
584
	c->c_authmech.bv_len = 0;
585

586
587
588
589
590
591
592
593
594
595
	if(c->c_dn.bv_val != NULL) {
		free(c->c_dn.bv_val);
		c->c_dn.bv_val = NULL;
	}
	c->c_dn.bv_len = 0;
	if(c->c_ndn.bv_val != NULL) {
		free(c->c_ndn.bv_val);
		c->c_ndn.bv_val = NULL;
	}
	c->c_ndn.bv_len = 0;
596
597

	c->c_authz_backend = NULL;
598
	
599
	{
600
601
602
603
604
605
		GroupAssertion *g, *n;
		for (g = c->c_groups; g; g=n) {
			n = g->ga_next;
			free(g);
		}
		c->c_groups = NULL;
606
	}
607
608
}

609
610
611
static void
connection_destroy( Connection *c )
{
612
	/* note: connections_mutex should be locked by caller */
613
    ber_socket_t	sd;
Pierangelo Masarati's avatar
Pierangelo Masarati committed
614
    unsigned long	connid;
615

Gary Williams's avatar
NT port    
Gary Williams committed
616
617
618
619
    assert( connections != NULL );
    assert( c != NULL );
    assert( c->c_struct_state != SLAP_C_UNUSED );
    assert( c->c_conn_state != SLAP_C_INVALID );
620
    assert( LDAP_STAILQ_EMPTY(&c->c_ops) );
621

Pierangelo Masarati's avatar
Pierangelo Masarati committed
622
623
624
    /* only for stats (print -1 as "%lu" may give unexpected results ;) */
    connid = c->c_connid;

625
626
    backend_connection_destroy(c);

Gary Williams's avatar
NT port    
Gary Williams committed
627
    c->c_protocol = 0;
628
    c->c_connid = -1;
629

630
    c->c_activitytime = c->c_starttime = 0;
631

632
633
	connection2anonymous( c );

634
635
636
	if(c->c_listener_url.bv_val != NULL) {
		free(c->c_listener_url.bv_val);
		c->c_listener_url.bv_val = NULL;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
637
	}
638
	c->c_listener_url.bv_len = 0;
639

640
641
642
	if(c->c_peer_domain.bv_val != NULL) {
		free(c->c_peer_domain.bv_val);
		c->c_peer_domain.bv_val = NULL;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
643
	}
644
645
	c->c_peer_domain.bv_len = 0;
	if(c->c_peer_name.bv_val != NULL) {
Pierangelo Masarati's avatar
Pierangelo Masarati committed
646
#ifdef LDAP_PF_LOCAL
647
648
649
650
651
		/*
		 * If peer was a domain socket, unlink. Mind you,
		 * they may be un-named. Should we leave this to
		 * the client?
		 */
Pierangelo Masarati's avatar
Pierangelo Masarati committed
652
653
654
655
656
		if (strncmp(c->c_peer_name.bv_val, "PATH=", 
					sizeof("PATH=") - 1) == 0) {
			char *path = c->c_peer_name.bv_val 
				+ sizeof("PATH=") - 1;
			if (path[0] != '\0') {
657
658
659
				(void)unlink(path);
			}
		}
Kurt Zeilenga's avatar
Kurt Zeilenga committed
660
#endif /* LDAP_PF_LOCAL */
661

662
663
		free(c->c_peer_name.bv_val);
		c->c_peer_name.bv_val = NULL;
664
	}
665
666
667
668
	c->c_peer_name.bv_len = 0;
	if(c->c_sock_name.bv_val != NULL) {
		free(c->c_sock_name.bv_val);
		c->c_sock_name.bv_val = NULL;
669
	}
670
	c->c_sock_name.bv_len = 0;
671

672
	c->c_sasl_bind_in_progress = 0;
673
674
675
	if(c->c_sasl_bind_mech.bv_val != NULL) {
		free(c->c_sasl_bind_mech.bv_val);
		c->c_sasl_bind_mech.bv_val = NULL;
676
	}
677
	c->c_sasl_bind_mech.bv_len = 0;
678
679

	slap_sasl_close( c );
680

Kurt Zeilenga's avatar
Kurt Zeilenga committed
681
682
683
684
685
	if ( c->c_currentber != NULL ) {
		ber_free( c->c_currentber, 1 );
		c->c_currentber = NULL;
	}

686
687
	ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_GET_FD, &sd );
	if ( sd != AC_SOCKET_INVALID ) {
688
		slapd_remove( sd, 0 );
689
690

		Statslog( LDAP_DEBUG_STATS,
Pierangelo Masarati's avatar
Pierangelo Masarati committed
691
		    "conn=%lu fd=%d closed\n",
Pierangelo Masarati's avatar
Pierangelo Masarati committed
692
			connid, sd, 0, 0, 0 );
693
694
	}

Gary Williams's avatar
Gary Williams committed
695
	ber_sockbuf_free( c->c_sb );
696

697
	c->c_sb = ber_sockbuf_alloc( );
698

699
	{
700
		ber_len_t max = sockbuf_max_incoming;
701
702
703
		ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_MAX_INCOMING, &max );
	}

704
705
    c->c_conn_state = SLAP_C_INVALID;
    c->c_struct_state = SLAP_C_UNUSED;
706
707
}

708
709
int connection_state_closing( Connection *c )
{
710
711
	/* c_mutex must be locked by caller */

712
	int state;
713
714
715
	assert( c != NULL );
	assert( c->c_struct_state == SLAP_C_USED );

716
717
718
719
720
	state = c->c_conn_state;

	assert( state != SLAP_C_INVALID );

	return state == SLAP_C_CLOSING;
721
722
}

723
724
725
726
727
728
static void connection_abandon( Connection *c )
{
	/* c_mutex must be locked by caller */

	Operation *o;

729
	LDAP_STAILQ_FOREACH(o, &c->c_ops, o_next) {
730
731
732
733
		o->o_abandon = 1;
	}

	/* remove pending operations */
734
735
736
	while ( (o = LDAP_STAILQ_FIRST( &c->c_pending_ops )) != NULL) {
		LDAP_STAILQ_REMOVE_HEAD( &c->c_pending_ops, o_next );
		LDAP_STAILQ_NEXT(o, o_next) = NULL;
737
738
739
740
		slap_op_free( o );
	}
}

741
742
743
744
745
746
747
void connection_closing( Connection *c )
{
	assert( connections != NULL );
	assert( c != NULL );
	assert( c->c_struct_state == SLAP_C_USED );
	assert( c->c_conn_state != SLAP_C_INVALID );

748
749
	/* c_mutex must be locked by caller */

750
	if( c->c_conn_state != SLAP_C_CLOSING ) {
751
752
753
		ber_socket_t	sd;

		ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_GET_FD, &sd );
754
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
755
		LDAP_LOG( CONNECTION, DETAIL1, 
Pierangelo Masarati's avatar
Pierangelo Masarati committed
756
			   "connection_closing: conn %lu readying socket %d for close.\n",
Julius Enarusai's avatar
   
Julius Enarusai committed
757
			   c->c_connid, sd, 0 );
758
#else
759
		Debug( LDAP_DEBUG_TRACE,
Pierangelo Masarati's avatar
Pierangelo Masarati committed
760
			"connection_closing: readying conn=%lu sd=%d for close\n",
761
			c->c_connid, sd, 0 );
762
#endif
Kurt Zeilenga's avatar
Kurt Zeilenga committed
763
764
765
		/* update state to closing */
		c->c_conn_state = SLAP_C_CLOSING;

766
		/* don't listen on this port anymore */
767
		slapd_clr_read( sd, 1 );
768
769

		/* abandon active operations */
770
		connection_abandon( c );
771
772

		/* wake write blocked operations */
773
		slapd_clr_write( sd, 1 );
774
		ldap_pvt_thread_cond_signal( &c->c_write_cv );
775
776
777
	}
}

778
779
static void connection_close( Connection *c )
{
780
781
	ber_socket_t	sd;

782
783
784
785
786
	assert( connections != NULL );
	assert( c != NULL );
	assert( c->c_struct_state == SLAP_C_USED );
	assert( c->c_conn_state == SLAP_C_CLOSING );

787
	/* note: connections_mutex and c_mutex should be locked by caller */
788

789
	ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_GET_FD, &sd );
790
	if( !LDAP_STAILQ_EMPTY(&c->c_ops) ) {
791
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
792
		LDAP_LOG( CONNECTION, DETAIL1, 
Pierangelo Masarati's avatar
Pierangelo Masarati committed
793
			   "connection_close: conn %lu  deferring sd %d\n",
Julius Enarusai's avatar
   
Julius Enarusai committed
794
			   c->c_connid, sd, 0 );
795
#else
796
		Debug( LDAP_DEBUG_TRACE,
Pierangelo Masarati's avatar
Pierangelo Masarati committed
797
			"connection_close: deferring conn=%lu sd=%d\n",
798
			c->c_connid, sd, 0 );
799
#endif
800
801
802
		return;
	}

803
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
804
805
	LDAP_LOG( CONNECTION, RESULTS, 
		   "connection_close: conn %lu  sd %d\n", c->c_connid, sd, 0 );
806
#else
Pierangelo Masarati's avatar
Pierangelo Masarati committed
807
	Debug( LDAP_DEBUG_TRACE, "connection_close: conn=%lu sd=%d\n",
808
		c->c_connid, sd, 0 );
809
#endif
810
811
812
	connection_destroy( c );
}

813
unsigned long connections_nextid(void)
814
{
815
	unsigned long id;
816
817
818
819
820
821
822
823
824
825
826
	assert( connections != NULL );

	ldap_pvt_thread_mutex_lock( &connections_mutex );

	id = conn_nextid;

	ldap_pvt_thread_mutex_unlock( &connections_mutex );

	return id;
}

827
Connection* connection_first( ber_socket_t *index )
828
829
{
	assert( connections != NULL );
830
	assert( index != NULL );
831
832
833

	ldap_pvt_thread_mutex_lock( &connections_mutex );

834
	*index = 0;
835

836
	return connection_next(NULL, index);
837
838
}

839
Connection* connection_next( Connection *c, ber_socket_t *index )
840
841
{
	assert( connections != NULL );
842
843
	assert( index != NULL );
	assert( *index <= dtblsize );
844
845
846
847
848
849
850

	if( c != NULL ) {
		ldap_pvt_thread_mutex_unlock( &c->c_mutex );
	}

	c = NULL;

851
852
853
	for(; *index < dtblsize; (*index)++) {
		if( connections[*index].c_struct_state == SLAP_C_UNINITIALIZED ) {
			assert( connections[*index].c_conn_state == SLAP_C_INVALID );
854
855
856
857
858
859
860
#ifndef HAVE_WINSOCK
			continue;
#else
			break;
#endif
		}

861
862
863
		if( connections[*index].c_struct_state == SLAP_C_USED ) {
			assert( connections[*index].c_conn_state != SLAP_C_INVALID );
			c = &connections[(*index)++];
864
865
866
			break;
		}

867
868
		assert( connections[*index].c_struct_state == SLAP_C_UNUSED );
		assert( connections[*index].c_conn_state == SLAP_C_INVALID );
869
870
871
872
873
874
875
876
877
	}

	if( c != NULL ) {
		ldap_pvt_thread_mutex_lock( &c->c_mutex );
	}

	return c;
}

878
void connection_done( Connection *c )
879
880
881
882
883
884
885
886
887
888
{
	assert( connections != NULL );

	if( c != NULL ) {
		ldap_pvt_thread_mutex_unlock( &c->c_mutex );
	}

	ldap_pvt_thread_mutex_unlock( &connections_mutex );
}

Kurt Zeilenga's avatar
Kurt Zeilenga committed
889
890
891
892
893
894
/*
 * connection_activity - handle the request operation op on connection
 * conn.  This routine figures out what kind of operation it is and
 * calls the appropriate stub to handle it.
 */

895
#ifdef SLAPD_MONITOR
896
897
898
899
900
901
#define INCR_OP(var,index) \
	do { \
		ldap_pvt_thread_mutex_lock( &num_ops_mutex ); \
		(var)[(index)]++; \
		ldap_pvt_thread_mutex_unlock( &num_ops_mutex ); \
	} while (0)
902
903
904
#else /* !SLAPD_MONITOR */
#define INCR_OP(var,index) 
#endif /* !SLAPD_MONITOR */
905

906
907
static void *
connection_operation( void *arg_v )
Kurt Zeilenga's avatar
Kurt Zeilenga committed
908
{
909
	int rc;
910
	struct co_arg	*arg = arg_v;
911
912
913
914
	ber_tag_t tag = arg->co_op->o_tag;
#ifdef SLAPD_MONITOR
	ber_tag_t oldtag = tag;
#endif /* SLAPD_MONITOR */
915
	Connection *conn = arg->co_conn;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
916

Kurt Zeilenga's avatar
Kurt Zeilenga committed
917
918
919
	ldap_pvt_thread_mutex_lock( &num_ops_mutex );
	num_ops_initiated++;
	ldap_pvt_thread_mutex_unlock( &num_ops_mutex );
Kurt Zeilenga's avatar
Kurt Zeilenga committed
920

921
	if( conn->c_sasl_bind_in_progress && tag != LDAP_REQ_BIND ) {
922
#ifdef NEW_LOGGING
Julius Enarusai's avatar
   
Julius Enarusai committed
923
924
925
		LDAP_LOG( CONNECTION, ERR, 
			"connection_operation: conn %lu SASL bind in progress (tag=%ld).\n",
			conn->c_connid, (long)tag, 0 );
926
#else
927
928
929
		Debug( LDAP_DEBUG_ANY, "connection_operation: "
			"error: SASL bind in progress (tag=%ld).\n",
			(long) tag, 0, 0 );
930
#endif
931
932
		send_ldap_result( conn, arg->co_op,
			rc = LDAP_OPERATIONS_ERROR,
933
934
935
936
			NULL, "SASL bind in progress", NULL, NULL );
		goto operations_error;
	}

937
	switch ( tag ) {
Kurt Zeilenga's avatar
Kurt Zeilenga committed
938
	case LDAP_REQ_BIND:
Pierangelo Masarati's avatar