schema_init.c 24.1 KB
Newer Older
1
2
3
/* schema_init.c - init builtin schema */
/* $OpenLDAP$ */
/*
Kurt Zeilenga's avatar
Kurt Zeilenga committed
4
 * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
 */

#include "portable.h"

#include <stdio.h>

#include <ac/ctype.h>
#include <ac/string.h>
#include <ac/socket.h>

#include "slap.h"
#include "ldap_pvt.h"

19
20
21
22
23
24
25
26
27
static int
inValidate(
	Syntax *syntax,
	struct berval *in )
{
	/* any value allowed */
	return LDAP_OTHER;
}

28
static int
29
blobValidate(
30
31
32
33
	Syntax *syntax,
	struct berval *in )
{
	/* any value allowed */
34
	return LDAP_SUCCESS;
35
36
}

37
38
#define berValidate blobValidate

39
40
41
42
43
44
45
46
47
static int
UTF8StringValidate(
	Syntax *syntax,
	struct berval *in )
{
	ber_len_t count;
	int len;
	unsigned char *u = in->bv_val;

48
	for( count = in->bv_len; count > 0; count-=len, u+=len ) {
49
50
51
52
		/* get the length indicated by the first byte */
		len = LDAP_UTF8_CHARLEN( u );

		/* should not be zero */
53
		if( len == 0 ) return LDAP_INVALID_SYNTAX;
54
55
56

		/* make sure len corresponds with the offset
			to the next character */
57
		if( LDAP_UTF8_OFFSET( u ) != len ) return LDAP_INVALID_SYNTAX;
58
59
	}

60
	if( count != 0 ) return LDAP_INVALID_SYNTAX;
61

62
	return LDAP_SUCCESS;
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
}

static int
UTF8StringNormalize(
	Syntax *syntax,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q, *s;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( ldap_utf8_isspace( p ) ) {
		LDAP_UTF8_INCR( p );
	}

83
	if( *p == '\0' ) {
84
		ch_free( newval );
85
		return LDAP_INVALID_SYNTAX;
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;
	s = NULL;

	while ( *p ) {
		int len;

		if ( ldap_utf8_isspace( p ) ) {
			len = LDAP_UTF8_COPY(q,p);
			s=q;
			p+=len;
			q+=len;

			/* Ignore the extra whitespace */
			while ( ldap_utf8_isspace( p ) ) {
				LDAP_UTF8_INCR( p );
			}
		} else {
			len = LDAP_UTF8_COPY(q,p);
			s=NULL;
			p+=len;
			q+=len;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !ldap_utf8_isspace(newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( s != NULL ) {
		q = s;
	}

	/* cannot end with a space */
	assert( !ldap_utf8_isspace( LDAP_UTF8_PREV(q) ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
137
	*normalized = newval;
138

139
	return LDAP_SUCCESS;
140
141
}

142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
static int
oidValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	if( val->bv_len == 0 ) return 0;

	if( isdigit(val->bv_val[0]) ) {
		int dot = 0;
		for(i=1; i < val->bv_len; i++) {
			if( val->bv_val[i] == '.' ) {
				if( dot++ ) return 1;
			} else if ( isdigit(val->bv_val[i]) ) {
				dot = 0;
			} else {
159
				return LDAP_INVALID_SYNTAX;
160
161
162
			}
		}

163
		return !dot ? LDAP_SUCCESS : LDAP_INVALID_SYNTAX;
164
165
166
167

	} else if( isalpha(val->bv_val[0]) ) {
		for(i=1; i < val->bv_len; i++) {
			if( !isalpha(val->bv_val[i] ) ) {
168
				return LDAP_INVALID_SYNTAX;
169
170
171
			}
		}

172
		return LDAP_SUCCESS;
173
174
	}
	
175
	return LDAP_INVALID_SYNTAX;
176
177
}

178
179
180
181
182
183
184
185
static int
integerValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
186
		if( !isdigit(val->bv_val[i]) ) return LDAP_INVALID_SYNTAX;
187
188
	}

189
	return LDAP_SUCCESS;
190
191
192
193
194
195
196
197
198
199
}

static int
printableStringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
200
		if( !isprint(val->bv_val[i]) ) return LDAP_INVALID_SYNTAX;
201
202
	}

203
	return LDAP_SUCCESS;
204
205
}

206
static int
207
208
209
210
211
212
213
IA5StringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
214
		if( !isascii(val->bv_val[i]) ) return LDAP_INVALID_SYNTAX;
215
216
	}

217
	return LDAP_SUCCESS;
218
219
220
221
222
223
224
225
}

static int
IA5StringConvert(
	Syntax *syntax,
	struct berval *in,
	struct berval **out )
{
226
227
	ldap_unicode_t *u;
	ber_len_t i, len = in->bv_len;
228
229
	struct berval *bv = ch_malloc( sizeof(struct berval) );

230
231
232
233
	bv->bv_len = len * sizeof( ldap_unicode_t );
	bv->bv_val = (char *) u = ch_malloc( bv->bv_len + sizeof( ldap_unicode_t ) );;

	for(i=0; i < len; i++ ) {
234
235
236
237
		/*
		 * IA5StringValidate should have been called to ensure
		 * input is limited to IA5.
		 */
238
		u[i] = in->bv_val[i];
239
	}
240
	u[i] = 0;
241
242

	*out = bv;
243
	return LDAP_SUCCESS;
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
}

static int
IA5StringNormalize(
	Syntax *syntax,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( isspace( *p++ ) ) {
		/* EMPTY */  ;
	}

264
	if( *p != '\0' ) {
265
		ch_free( newval );
266
		return LDAP_INVALID_SYNTAX;
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;

	while ( *p ) {
		if ( isspace( *p ) ) {
			*q++ = *p++;

			/* Ignore the extra whitespace */
			while ( isspace( *p++ ) ) {
				/* EMPTY */  ;
			}
		} else {
			*q++ = *p++;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !isspace(*newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( isspace( q[-1] ) ) {
		--q;
	}

	/* cannot end with a space */
	assert( !isspace( q[-1] ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
309
	*normalized = newval;
310

311
	return LDAP_SUCCESS;
312
313
314
315
}

static int
caseExactIA5Match(
316
	int *match,
317
	unsigned use,
318
319
320
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
321
	void *assertedValue )
322
{
323
	*match = strcmp( value->bv_val,
324
		((struct berval *) assertedValue)->bv_val );
325
	return LDAP_SUCCESS;
326
327
}

328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
#ifdef SLAPD_SCHEMA_NOT_COMPAT
static int
caseExactIA5SubstringsMatch(
	int *matchp,
	unsigned use,
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
	void *assertedValue )
{
	int match = 0;
	SubstringsAssertion *sub = assertedValue;
	struct berval left = *value;
	int i;
	ber_len_t inlen=0;

	if( sub->sa_initial ) {
		inlen += sub->sa_initial->bv_len;
	}
	if( sub->sa_any ) {
		for(i=0; sub->sa_any[i]; i++) {
			inlen += sub->sa_final->bv_len;
		}
	}
	if( sub->sa_final ) {
		inlen += sub->sa_final->bv_len;
	}

	if( inlen > value->bv_len ) {
		match = 1;
		goto done;
	}

	if( sub->sa_initial ) {
		match = strncmp( sub->sa_initial->bv_val, left.bv_val,
			sub->sa_initial->bv_len );

		if( match != 0 ) {
			goto done;
		}

		left.bv_val += sub->sa_initial->bv_len;
		left.bv_len -= sub->sa_initial->bv_len;
371
		inlen -= sub->sa_initial->bv_len;
372
373
374
375
376
377
378
379
380
381
382
383
	}

	if( sub->sa_final ) {
		match = strncmp( sub->sa_final->bv_val,
			&left.bv_val[left.bv_len - sub->sa_final->bv_len],
			sub->sa_final->bv_len );

		if( match != 0 ) {
			goto done;
		}

		left.bv_len -= sub->sa_final->bv_len;
384
		inlen -= sub->sa_initial->bv_len;
385
386
387
	}

	if( sub->sa_any ) {
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
		for(i=0; sub->sa_any[i]; i++) {
			ber_len_t idx;
			char *p;

retry:
			if( inlen < left.bv_len ) {
				/* not enough length */
				match = 1;
				goto done;
			}

			if( sub->sa_any[i]->bv_len == 0 ) {
				continue;
			}

			p = strchr( left.bv_val, *sub->sa_any[i]->bv_val );

			if( p == NULL ) {
				match = 1;
				goto done;
			}

			idx = p - left.bv_val;
			assert( idx < left.bv_len );

			if( idx >= left.bv_len ) {
				/* this shouldn't happen */
				return LDAP_OTHER;
			}

			left.bv_val = p;
			left.bv_len -= idx;

			if( sub->sa_any[i]->bv_len > left.bv_len ) {
				/* not enough left */
				match = 1;
				goto done;
			}

			match = strncmp( left.bv_val,
				sub->sa_any[i]->bv_val,
				sub->sa_any[i]->bv_len );


			if( match != 0 ) {
				goto retry;
			}

			left.bv_val += sub->sa_any[i]->bv_len;
			left.bv_len -= sub->sa_any[i]->bv_len;
		}
439
440
441
442
443
444
445
446
	}

done:
	*matchp = match;
	return LDAP_SUCCESS;
}
#endif

447
448
static int
caseIgnoreIA5Match(
449
	int *match,
450
	unsigned use,
451
452
453
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
454
	void *assertedValue )
455
{
456
	*match = strcasecmp( value->bv_val,
457
		((struct berval *) assertedValue)->bv_val );
458
	return LDAP_SUCCESS;
459
460
}

461
#ifdef SLAPD_SCHEMA_NOT_COMPAT
462
463
464
465
466
467
468
469
470
471
472
473
474
475
static char *strcasechr( const char *str, int c )
{
	char *lower = strchr( str, TOLOWER(c) );
	char *upper = strchr( str, TOUPPER(c) );

	if( lower && upper ) {
		return lower < upper ? lower : upper;
	} else if ( lower ) {
		return lower;
	} else {
		return upper;
	}
}

476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
static int
caseIgnoreIA5SubstringsMatch(
	int *matchp,
	unsigned use,
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
	void *assertedValue )
{
	int match = 0;
	SubstringsAssertion *sub = assertedValue;
	struct berval left = *value;
	int i;
	ber_len_t inlen=0;

	if( sub->sa_initial ) {
		inlen += sub->sa_initial->bv_len;
	}
	if( sub->sa_any ) {
		for(i=0; sub->sa_any[i]; i++) {
			inlen += sub->sa_final->bv_len;
		}
	}
	if( sub->sa_final ) {
		inlen += sub->sa_final->bv_len;
	}

	if( inlen > value->bv_len ) {
		match = 1;
		goto done;
	}

	if( sub->sa_initial ) {
		match = strncasecmp( sub->sa_initial->bv_val, left.bv_val,
			sub->sa_initial->bv_len );

		if( match != 0 ) {
			goto done;
		}

		left.bv_val += sub->sa_initial->bv_len;
		left.bv_len -= sub->sa_initial->bv_len;
	}

	if( sub->sa_final ) {
		match = strncasecmp( sub->sa_final->bv_val,
			&left.bv_val[left.bv_len - sub->sa_final->bv_len],
			sub->sa_final->bv_len );

		if( match != 0 ) {
			goto done;
		}

		left.bv_len -= sub->sa_final->bv_len;
	}

	if( sub->sa_any ) {
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
		for(i=0; sub->sa_any[i]; i++) {
			ber_len_t idx;
			char *p;

retry:
			if( inlen < left.bv_len ) {
				/* not enough length */
				match = 1;
				goto done;
			}

			if( sub->sa_any[i]->bv_len == 0 ) {
				continue;
			}

			p = strcasechr( left.bv_val, *sub->sa_any[i]->bv_val );

			if( p == NULL ) {
				match = 1;
				goto done;
			}

			idx = p - left.bv_val;
			assert( idx < left.bv_len );

			if( idx >= left.bv_len ) {
				/* this shouldn't happen */
				return LDAP_OTHER;
			}

			left.bv_val = p;
			left.bv_len -= idx;

			if( sub->sa_any[i]->bv_len > left.bv_len ) {
				/* not enough left */
				match = 1;
				goto done;
			}

			match = strncasecmp( left.bv_val,
				sub->sa_any[i]->bv_val,
				sub->sa_any[i]->bv_len );


			if( match != 0 ) {
				goto retry;
			}

			left.bv_val += sub->sa_any[i]->bv_len;
			left.bv_len -= sub->sa_any[i]->bv_len;
		}
584
585
586
587
588
589
590
591
	}

done:
	*matchp = match;
	return LDAP_SUCCESS;
}
#endif

592
593
struct syntax_defs_rec {
	char *sd_desc;
594
	int sd_flags;
595
	slap_syntax_validate_func *sd_validate;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
596
597
598
	slap_syntax_transform_func *sd_normalize;
	slap_syntax_transform_func *sd_pretty;
#ifdef SLAPD_BINARY_CONVERSION
599
600
	slap_syntax_transform_func *sd_ber2str;
	slap_syntax_transform_func *sd_str2ber;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
601
#endif
602
603
};

604
#define X_HIDE "X-HIDE 'TRUE' "
605
606
#define X_BINARY "X-BINARY-TRANSFER-REQUIRED 'TRUE' "
#define X_NOT_H_R "X-NOT-HUMAN-READABLE 'TRUE' "
607

608
struct syntax_defs_rec syntax_defs[] = {
609
610
611
612
	{"( 1.3.6.1.4.1.1466.115.121.1.1 DESC 'ACI Item' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.2 DESC 'Access Point' " X_NOT_H_R ")",
		0, NULL, NULL, NULL},
613
	{"( 1.3.6.1.4.1.1466.115.121.1.3 DESC 'Attribute Type Description' )",
614
		0, NULL, NULL, NULL},
615
616
617
618
	{"( 1.3.6.1.4.1.1466.115.121.1.4 DESC 'Audio' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, blobValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.5 DESC 'Binary' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BER, berValidate, NULL, NULL},
619
	{"( 1.3.6.1.4.1.1466.115.121.1.6 DESC 'Bit String' )",
620
		0, NULL, NULL, NULL},
621
	{"( 1.3.6.1.4.1.1466.115.121.1.7 DESC 'Boolean' )",
622
		0, NULL, NULL, NULL},
623
624
625
626
627
628
	{"( 1.3.6.1.4.1.1466.115.121.1.8 DESC 'Certificate' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.9 DESC 'Certificate List' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
Kurt Zeilenga's avatar
Kurt Zeilenga committed
629
630
	{"( 1.3.6.1.4.1.1466.115.121.1.10 DESC 'Certificate Pair' "
		X_BINARY X_NOT_H_R ")",
631
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
632
633
	{"( 1.3.6.1.4.1.1466.115.121.1.11 DESC 'Country String' )",
		0, NULL, NULL, NULL},
634
	{"( 1.3.6.1.4.1.1466.115.121.1.12 DESC 'DN' )",
635
		0, blobValidate, NULL, NULL},
636
	{"( 1.3.6.1.4.1.1466.115.121.1.13 DESC 'Data Quality' )",
637
		0, NULL, NULL, NULL},
638
	{"( 1.3.6.1.4.1.1466.115.121.1.14 DESC 'Delivery Method' )",
639
		0, NULL, NULL, NULL},
640
	{"( 1.3.6.1.4.1.1466.115.121.1.15 DESC 'Directory String' )",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
641
		0, UTF8StringValidate, UTF8StringNormalize, NULL},
642
	{"( 1.3.6.1.4.1.1466.115.121.1.16 DESC 'DIT Content Rule Description' )",
643
		0, NULL, NULL, NULL},
644
	{"( 1.3.6.1.4.1.1466.115.121.1.17 DESC 'DIT Structure Rule Description' )",
645
		0, NULL, NULL, NULL},
646
	{"( 1.3.6.1.4.1.1466.115.121.1.19 DESC 'DSA Quality' )",
647
		0, NULL, NULL, NULL},
648
	{"( 1.3.6.1.4.1.1466.115.121.1.20 DESC 'DSE Type' )",
649
		0, NULL, NULL, NULL},
650
	{"( 1.3.6.1.4.1.1466.115.121.1.21 DESC 'Enhanced Guide' )",
651
		0, NULL, NULL, NULL},
652
	{"( 1.3.6.1.4.1.1466.115.121.1.22 DESC 'Facsimile Telephone Number' )",
653
		0, blobValidate, NULL, NULL},
654
655
	{"( 1.3.6.1.4.1.1466.115.121.1.23 DESC 'Fax' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
656
	{"( 1.3.6.1.4.1.1466.115.121.1.24 DESC 'Generalized Time' )",
657
		0, NULL, NULL, NULL},
658
	{"( 1.3.6.1.4.1.1466.115.121.1.25 DESC 'Guide' )",
659
		0, NULL, NULL, NULL},
660
	{"( 1.3.6.1.4.1.1466.115.121.1.26 DESC 'IA5 String' )",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
661
		0, IA5StringValidate, IA5StringNormalize, NULL},
662
	{"( 1.3.6.1.4.1.1466.115.121.1.27 DESC 'Integer' )",
663
		0, integerValidate, NULL, NULL},
664
665
	{"( 1.3.6.1.4.1.1466.115.121.1.28 DESC 'JPEG' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
666
	{"( 1.3.6.1.4.1.1466.115.121.1.29 DESC 'Master And Shadow Access Points' )",
667
		0, NULL, NULL, NULL},
668
	{"( 1.3.6.1.4.1.1466.115.121.1.30 DESC 'Matching Rule Description' )",
669
		0, NULL, NULL, NULL},
670
	{"( 1.3.6.1.4.1.1466.115.121.1.31 DESC 'Matching Rule Use Description' )",
671
		0, NULL, NULL, NULL},
672
	{"( 1.3.6.1.4.1.1466.115.121.1.32 DESC 'Mail Preference' )",
673
		0, NULL, NULL, NULL},
674
	{"( 1.3.6.1.4.1.1466.115.121.1.33 DESC 'MHS OR Address' )",
675
		0, NULL, NULL, NULL},
676
	{"( 1.3.6.1.4.1.1466.115.121.1.34 DESC 'Name And Optional UID' )",
677
		0, NULL, NULL, NULL},
678
	{"( 1.3.6.1.4.1.1466.115.121.1.35 DESC 'Name Form Description' )",
679
		0, NULL, NULL, NULL},
680
681
682
	{"( 1.3.6.1.4.1.1466.115.121.1.36 DESC 'Numeric String' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.37 DESC 'Object Class Description' )",
683
		0, NULL, NULL, NULL},
684
	{"( 1.3.6.1.4.1.1466.115.121.1.38 DESC 'OID' )",
685
		0, oidValidate, NULL, NULL},
686
	{"( 1.3.6.1.4.1.1466.115.121.1.39 DESC 'Other Mailbox' )",
687
		0, NULL, NULL, NULL},
688
	{"( 1.3.6.1.4.1.1466.115.121.1.40 DESC 'Octet String' )",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
689
		0, blobValidate, NULL, NULL},
690
	{"( 1.3.6.1.4.1.1466.115.121.1.41 DESC 'Postal Address' )",
691
		0, blobValidate, NULL, NULL},
692
	{"( 1.3.6.1.4.1.1466.115.121.1.42 DESC 'Protocol Information' )",
693
		0, NULL, NULL, NULL},
694
	{"( 1.3.6.1.4.1.1466.115.121.1.43 DESC 'Presentation Address' )",
695
		0, NULL, NULL, NULL},
696
	{"( 1.3.6.1.4.1.1466.115.121.1.44 DESC 'Printable String' )",
697
		0, printableStringValidate, NULL, NULL},
698
699
700
	{"( 1.3.6.1.4.1.1466.115.121.1.49 DESC 'Supported Algorithm' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
701
	{"( 1.3.6.1.4.1.1466.115.121.1.50 DESC 'Telephone Number' )",
702
		0, blobValidate, NULL, NULL},
703
704
705
706
707
	{"( 1.3.6.1.4.1.1466.115.121.1.51 DESC 'Teletex Terminal Identifier' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.52 DESC 'Telex Number' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.53 DESC 'UTC Time' )",
708
		0, NULL, NULL, NULL},
709
	{"( 1.3.6.1.4.1.1466.115.121.1.54 DESC 'LDAP Syntax Description' )",
710
		0, NULL, NULL, NULL},
711
	{"( 1.3.6.1.4.1.1466.115.121.1.55 DESC 'Modify Rights' )",
712
		0, NULL, NULL, NULL},
713
	{"( 1.3.6.1.4.1.1466.115.121.1.56 DESC 'LDAP Schema Definition' )",
714
		0, NULL, NULL, NULL},
715
	{"( 1.3.6.1.4.1.1466.115.121.1.57 DESC 'LDAP Schema Description' )",
716
		0, NULL, NULL, NULL},
717
	{"( 1.3.6.1.4.1.1466.115.121.1.58 DESC 'Substring Assertion' )",
718
		0, NULL, NULL, NULL},
719

720
	/* OpenLDAP Experimental Syntaxes */
721
	{"( 1.3.6.1.4.1.4203.666.2.1 DESC 'OpenLDAP Experimental ACI' )",
722
		0, NULL, NULL, NULL},
723
724
725
726
	{"( 1.3.6.1.4.1.4203.666.2.2 DESC 'OpenLDAP void' " X_HIDE ")" ,
		SLAP_SYNTAX_HIDE, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.4203.666.2.3 DESC 'OpenLDAP DN' " X_HIDE ")" ,
		SLAP_SYNTAX_HIDE, NULL, NULL, NULL},
727

728
	{NULL, 0, NULL, NULL, NULL}
729
730
731
};

struct mrule_defs_rec {
732
	char *						mrd_desc;
733
	unsigned					mrd_usage;
734
735
736
737
738
	slap_mr_convert_func *		mrd_convert;
	slap_mr_normalize_func *	mrd_normalize;
	slap_mr_match_func *		mrd_match;
	slap_mr_indexer_func *		mrd_indexer;
	slap_mr_filter_func *		mrd_filter;
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
};

/*
 * Other matching rules in X.520 that we do not use:
 *
 * 2.5.13.9		numericStringOrderingMatch
 * 2.5.13.13	booleanMatch
 * 2.5.13.15	integerOrderingMatch
 * 2.5.13.18	octetStringOrderingMatch
 * 2.5.13.19	octetStringSubstringsMatch
 * 2.5.13.25	uTCTimeMatch
 * 2.5.13.26	uTCTimeOrderingMatch
 * 2.5.13.31	directoryStringFirstComponentMatch
 * 2.5.13.32	wordMatch
 * 2.5.13.33	keywordMatch
 * 2.5.13.34	certificateExactMatch
 * 2.5.13.35	certificateMatch
 * 2.5.13.36	certificatePairExactMatch
 * 2.5.13.37	certificatePairMatch
 * 2.5.13.38	certificateListExactMatch
 * 2.5.13.39	certificateListMatch
 * 2.5.13.40	algorithmIdentifierMatch
 * 2.5.13.41	storedPrefixMatch
 * 2.5.13.42	attributeCertificateMatch
 * 2.5.13.43	readerAndKeyIDMatch
 * 2.5.13.44	attributeIntegrityMatch
 */

767
768
769
770
771
#ifndef SLAPD_SCHEMA_NOT_COMPAT
#define caseIgnoreIA5SubstringsMatch NULL
#define caseExactIA5SubstringsMatch NULL
#endif

772
773
/* recycled matching functions */
#define caseIgnoreMatch caseIgnoreIA5Match
774
775
#define caseIgnoreOrderingMatch caseIgnoreMatch
#define caseIgnoreSubstringsMatch caseIgnoreIA5SubstringsMatch
776
#define caseExactMatch caseExactIA5Match
777
778
#define caseExactOrderingMatch caseExactMatch
#define caseExactSubstringsMatch caseExactIA5SubstringsMatch
779
780
781
782
783
784
785

/* unimplemented matching functions */
#define objectIdentifierMatch NULL
#define distinguishedNameMatch NULL
#define numericStringMatch NULL
#define numericStringSubstringsMatch NULL
#define caseIgnoreListMatch NULL
Kurt Zeilenga's avatar
Kurt Zeilenga committed
786
#define caseIgnoreListSubstringsMatch NULL
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
#define integerMatch NULL
#define bitStringMatch NULL
#define octetStringMatch NULL
#define telephoneNumberMatch NULL
#define telephoneNumberSubstringsMatch NULL
#define presentationAddressMatch NULL
#define uniqueMemberMatch NULL
#define protocolInformationMatch NULL
#define generalizedTimeMatch NULL
#define generalizedTimeOrderingMatch NULL
#define integerFirstComponentMatch NULL
#define objectIdentifierFirstComponentMatch NULL

struct mrule_defs_rec mrule_defs[] = {
	{"( 2.5.13.0 NAME 'objectIdentifierMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
803
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
804
		NULL, NULL, objectIdentifierMatch, NULL, NULL},
805
806
807

	{"( 2.5.13.1 NAME 'distinguishedNameMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )",
808
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
809
		NULL, NULL, distinguishedNameMatch, NULL, NULL},
810
811
812

	{"( 2.5.13.2 NAME 'caseIgnoreMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
813
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
814
		NULL, NULL, caseIgnoreMatch, NULL, NULL},
815
816
817

	{"( 2.5.13.3 NAME 'caseIgnoreOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
818
		SLAP_MR_ORDERING,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
819
		NULL, NULL, caseIgnoreOrderingMatch, NULL, NULL},
820
821
822

	{"( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
823
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
824
		NULL, NULL, caseIgnoreSubstringsMatch, NULL, NULL},
825
826
827
828

	/* Next three are not in the RFC's, but are needed for compatibility */
	{"( 2.5.13.5 NAME 'caseExactMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
829
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
830
		NULL, NULL, caseExactMatch, NULL, NULL},
831
832
833

	{"( 2.5.13.6 NAME 'caseExactOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
834
		SLAP_MR_ORDERING,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
835
		NULL, NULL, caseExactOrderingMatch, NULL, NULL},
836
837
838

	{"( 2.5.13.7 NAME 'caseExactSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
839
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
840
		NULL, NULL, caseExactSubstringsMatch, NULL, NULL},
841
842
843

	{"( 2.5.13.8 NAME 'numericStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.36 )",
844
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
845
		NULL, NULL, numericStringMatch, NULL, NULL},
846
847
848

	{"( 2.5.13.10 NAME 'numericStringSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
849
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
850
		NULL, NULL, numericStringSubstringsMatch, NULL, NULL},
851
852
853

	{"( 2.5.13.11 NAME 'caseIgnoreListMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )",
854
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
855
		NULL, NULL, caseIgnoreListMatch, NULL, NULL},
856

Kurt Zeilenga's avatar
Kurt Zeilenga committed
857
858
859
860
861
	{"( 2.5.13.12 NAME 'caseIgnoreListSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
		NULL, NULL, caseIgnoreListSubstringsMatch, NULL, NULL},

862
863
	{"( 2.5.13.14 NAME 'integerMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
864
		SLAP_MR_NONE | SLAP_MR_EXT,
865
		NULL, NULL, integerMatch, NULL, NULL},
866
867
868

	{"( 2.5.13.16 NAME 'bitStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )",
869
		SLAP_MR_NONE | SLAP_MR_EXT,
870
		NULL, NULL, bitStringMatch, NULL, NULL},
871
872
873

	{"( 2.5.13.17 NAME 'octetStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )",
874
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
875
		NULL, NULL, octetStringMatch, NULL, NULL},
876
877
878

	{"( 2.5.13.20 NAME 'telephoneNumberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.50 )",
879
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
880
		NULL, NULL, telephoneNumberMatch, NULL, NULL},
881
882
883

	{"( 2.5.13.21 NAME 'telephoneNumberSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
884
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
885
		NULL, NULL, telephoneNumberSubstringsMatch, NULL, NULL},
886
887
888

	{"( 2.5.13.22 NAME 'presentationAddressMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.43 )",
889
		SLAP_MR_NONE | SLAP_MR_EXT,
890
		NULL, NULL, presentationAddressMatch, NULL, NULL},
891
892
893

	{"( 2.5.13.23 NAME 'uniqueMemberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )",
894
		SLAP_MR_NONE | SLAP_MR_EXT,
895
		NULL, NULL, uniqueMemberMatch, NULL, NULL},
896
897
898

	{"( 2.5.13.24 NAME 'protocolInformationMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.42 )",
899
		SLAP_MR_NONE | SLAP_MR_EXT,
900
		NULL, NULL, protocolInformationMatch, NULL, NULL},
901
902
903

	{"( 2.5.13.27 NAME 'generalizedTimeMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
904
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
905
		NULL, NULL, generalizedTimeMatch, NULL, NULL},
906
907
908

	{"( 2.5.13.28 NAME 'generalizedTimeOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
909
		SLAP_MR_ORDERING,
910
		NULL, NULL, generalizedTimeOrderingMatch, NULL, NULL},
911
912
913

	{"( 2.5.13.29 NAME 'integerFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
914
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
915
		NULL, NULL, integerFirstComponentMatch, NULL, NULL},
916
917
918

	{"( 2.5.13.30 NAME 'objectIdentifierFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
919
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
920
		NULL, NULL, objectIdentifierFirstComponentMatch, NULL, NULL},
921
922
923

	{"( 1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
924
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
925
		NULL, NULL, caseExactIA5Match, NULL, NULL},
926
927
928

	{"( 1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
929
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
930
		NULL, NULL, caseIgnoreIA5Match, NULL, NULL},
931
932
933

	{"( 1.3.6.1.4.1.1466.109.114.3 NAME 'caseIgnoreIA5SubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
934
		SLAP_MR_SUBSTR,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
935
		NULL, NULL, caseIgnoreIA5SubstringsMatch, NULL, NULL},
936

937
	{NULL, SLAP_MR_NONE, NULL, NULL, NULL}
938
939
940
941
942
943
944
945
};

int
schema_init( void )
{
	int		res;
	int		i;

946
947
	/* we should only be called once (from main) */
	assert( schema_init_done == 0 );
948
949
950

	for ( i=0; syntax_defs[i].sd_desc != NULL; i++ ) {
		res = register_syntax( syntax_defs[i].sd_desc,
951
		    syntax_defs[i].sd_flags,
952
		    syntax_defs[i].sd_validate,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
953
954
955
956
		    syntax_defs[i].sd_normalize,
			syntax_defs[i].sd_pretty
#ifdef SLAPD_BINARY_CONVERSION
			,
957
		    syntax_defs[i].sd_ber2str,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
958
959
960
			syntax_defs[i].sd_str2ber
#endif
		);
961
962
963
964

		if ( res ) {
			fprintf( stderr, "schema_init: Error registering syntax %s\n",
				 syntax_defs[i].sd_desc );
965
			return LDAP_OTHER;
966
967
968
969
		}
	}

	for ( i=0; mrule_defs[i].mrd_desc != NULL; i++ ) {
970
971
972
973
974
975
976
		if( mrule_defs[i].mrd_usage == SLAP_MR_NONE ) {
			fprintf( stderr,
				"schema_init: Ingoring unusable matching rule %s\n",
				 mrule_defs[i].mrd_desc );
			continue;
		}

977
978
		res = register_matching_rule(
			mrule_defs[i].mrd_desc,
979
			mrule_defs[i].mrd_usage,
980
981
			mrule_defs[i].mrd_convert,
			mrule_defs[i].mrd_normalize,
982
983
984
		    mrule_defs[i].mrd_match,
			mrule_defs[i].mrd_indexer,
			mrule_defs[i].mrd_filter );
985
986
987
988
989

		if ( res ) {
			fprintf( stderr,
				"schema_init: Error registering matching rule %s\n",
				 mrule_defs[i].mrd_desc );
990
			return LDAP_OTHER;
991
992
993
		}
	}
	schema_init_done = 1;
994
	return LDAP_SUCCESS;
995
}