schema_init.c 22.2 KB
Newer Older
1
2
3
/* schema_init.c - init builtin schema */
/* $OpenLDAP$ */
/*
Kurt Zeilenga's avatar
Kurt Zeilenga committed
4
 * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
 */

#include "portable.h"

#include <stdio.h>

#include <ac/ctype.h>
#include <ac/string.h>
#include <ac/socket.h>

#include "slap.h"
#include "ldap_pvt.h"

19
#define berValidate blobValidate
20
static int
21
blobValidate(
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
	Syntax *syntax,
	struct berval *in )
{
	/* any value allowed */
	return 0;
}

static int
UTF8StringValidate(
	Syntax *syntax,
	struct berval *in )
{
	ber_len_t count;
	int len;
	unsigned char *u = in->bv_val;

38
	for( count = in->bv_len; count > 0; count-=len, u+=len ) {
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
		/* get the length indicated by the first byte */
		len = LDAP_UTF8_CHARLEN( u );

		/* should not be zero */
		if( len == 0 ) return -1;

		/* make sure len corresponds with the offset
			to the next character */
		if( LDAP_UTF8_OFFSET( u ) != len ) return -1;
	}

	if( count != 0 ) return -1;

	return 0;
}

static int
UTF8StringNormalize(
57
	unsigned use,
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q, *s;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( ldap_utf8_isspace( p ) ) {
		LDAP_UTF8_INCR( p );
	}

	if( *p ) {
		ch_free( newval );
		return 1;
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;
	s = NULL;

	while ( *p ) {
		int len;

		if ( ldap_utf8_isspace( p ) ) {
			len = LDAP_UTF8_COPY(q,p);
			s=q;
			p+=len;
			q+=len;

			/* Ignore the extra whitespace */
			while ( ldap_utf8_isspace( p ) ) {
				LDAP_UTF8_INCR( p );
			}
		} else {
			len = LDAP_UTF8_COPY(q,p);
			s=NULL;
			p+=len;
			q+=len;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !ldap_utf8_isspace(newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( s != NULL ) {
		q = s;
	}

	/* cannot end with a space */
	assert( !ldap_utf8_isspace( LDAP_UTF8_PREV(q) ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
	normalized = &newval;

	return 0;
}

134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
static int
oidValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	if( val->bv_len == 0 ) return 0;

	if( isdigit(val->bv_val[0]) ) {
		int dot = 0;
		for(i=1; i < val->bv_len; i++) {
			if( val->bv_val[i] == '.' ) {
				if( dot++ ) return 1;
			} else if ( isdigit(val->bv_val[i]) ) {
				dot = 0;
			} else {
				return 1;
			}
		}

		return !dot ? 0 : 1;

	} else if( isalpha(val->bv_val[0]) ) {
		for(i=1; i < val->bv_len; i++) {
			if( !isalpha(val->bv_val[i] ) ) {
				return 1;
			}
		}

		return 0;
	}
	
	return 1;
}

170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
static int
integerValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
		if( !isdigit(val->bv_val[i]) ) return -1;
	}

	return 0;
}

static int
printableStringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
		if( !isprint(val->bv_val[i]) ) return -1;
	}

	return 0;
}

198
static int
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
IA5StringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
		if( !isascii(val->bv_val[i]) ) return -1;
	}

	return 0;
}

static int
IA5StringConvert(
	Syntax *syntax,
	struct berval *in,
	struct berval **out )
{
218
219
	ldap_unicode_t *u;
	ber_len_t i, len = in->bv_len;
220
221
	struct berval *bv = ch_malloc( sizeof(struct berval) );

222
223
224
225
	bv->bv_len = len * sizeof( ldap_unicode_t );
	bv->bv_val = (char *) u = ch_malloc( bv->bv_len + sizeof( ldap_unicode_t ) );;

	for(i=0; i < len; i++ ) {
226
227
228
229
		/*
		 * IA5StringValidate should have been called to ensure
		 * input is limited to IA5.
		 */
230
		u[i] = in->bv_val[i];
231
	}
232
	u[i] = 0;
233
234
235
236
237
238
239

	*out = bv;
	return 0;
}

static int
IA5StringNormalize(
240
	unsigned use,
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( isspace( *p++ ) ) {
		/* EMPTY */  ;
	}

	if( *p ) {
		ch_free( newval );
		return 1;
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;

	while ( *p ) {
		if ( isspace( *p ) ) {
			*q++ = *p++;

			/* Ignore the extra whitespace */
			while ( isspace( *p++ ) ) {
				/* EMPTY */  ;
			}
		} else {
			*q++ = *p++;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !isspace(*newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( isspace( q[-1] ) ) {
		--q;
	}

	/* cannot end with a space */
	assert( !isspace( q[-1] ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
	normalized = &newval;

	return 0;
}

static int
caseExactIA5Match(
310
	unsigned use,
311
312
313
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
314
	void *assertedValue )
315
{
316
317
	return strcmp( value->bv_val,
		((struct berval *) assertedValue)->bv_val );
318
319
320
321
}

static int
caseIgnoreIA5Match(
322
	unsigned use,
323
324
325
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
326
	void *assertedValue )
327
{
328
329
	return strcasecmp( value->bv_val,
		((struct berval *) assertedValue)->bv_val );
330
331
332
333
}

struct syntax_defs_rec {
	char *sd_desc;
334
	int sd_flags;
335
336
337
338
339
	slap_syntax_validate_func *sd_validate;
	slap_syntax_transform_func *sd_ber2str;
	slap_syntax_transform_func *sd_str2ber;
};

340
341
#define X_BINARY "X-BINARY-TRANSFER-REQUIRED 'TRUE' "
#define X_NOT_H_R "X-NOT-HUMAN-READABLE 'TRUE' "
342

343
struct syntax_defs_rec syntax_defs[] = {
344
345
346
347
	{"( 1.3.6.1.4.1.1466.115.121.1.1 DESC 'ACI Item' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.2 DESC 'Access Point' " X_NOT_H_R ")",
		0, NULL, NULL, NULL},
348
	{"( 1.3.6.1.4.1.1466.115.121.1.3 DESC 'Attribute Type Description' )",
349
		0, NULL, NULL, NULL},
350
351
352
353
	{"( 1.3.6.1.4.1.1466.115.121.1.4 DESC 'Audio' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, blobValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.5 DESC 'Binary' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BER, berValidate, NULL, NULL},
354
	{"( 1.3.6.1.4.1.1466.115.121.1.6 DESC 'Bit String' )",
355
		0, NULL, NULL, NULL},
356
	{"( 1.3.6.1.4.1.1466.115.121.1.7 DESC 'Boolean' )",
357
		0, NULL, NULL, NULL},
358
359
360
361
362
363
	{"( 1.3.6.1.4.1.1466.115.121.1.8 DESC 'Certificate' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.9 DESC 'Certificate List' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
Kurt Zeilenga's avatar
Kurt Zeilenga committed
364
365
	{"( 1.3.6.1.4.1.1466.115.121.1.10 DESC 'Certificate Pair' "
		X_BINARY X_NOT_H_R ")",
366
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
367
368
	{"( 1.3.6.1.4.1.1466.115.121.1.11 DESC 'Country String' )",
		0, NULL, NULL, NULL},
369
	{"( 1.3.6.1.4.1.1466.115.121.1.12 DESC 'DN' )",
370
		0, blobValidate, NULL, NULL},
371
	{"( 1.3.6.1.4.1.1466.115.121.1.13 DESC 'Data Quality' )",
372
		0, NULL, NULL, NULL},
373
	{"( 1.3.6.1.4.1.1466.115.121.1.14 DESC 'Delivery Method' )",
374
		0, NULL, NULL, NULL},
375
	{"( 1.3.6.1.4.1.1466.115.121.1.15 DESC 'Directory String' )",
376
		0, UTF8StringValidate, NULL, NULL},
377
	{"( 1.3.6.1.4.1.1466.115.121.1.16 DESC 'DIT Content Rule Description' )",
378
		0, NULL, NULL, NULL},
379
	{"( 1.3.6.1.4.1.1466.115.121.1.17 DESC 'DIT Structure Rule Description' )",
380
		0, NULL, NULL, NULL},
381
	{"( 1.3.6.1.4.1.1466.115.121.1.19 DESC 'DSA Quality' )",
382
		0, NULL, NULL, NULL},
383
	{"( 1.3.6.1.4.1.1466.115.121.1.20 DESC 'DSE Type' )",
384
		0, NULL, NULL, NULL},
385
	{"( 1.3.6.1.4.1.1466.115.121.1.21 DESC 'Enhanced Guide' )",
386
		0, NULL, NULL, NULL},
387
	{"( 1.3.6.1.4.1.1466.115.121.1.22 DESC 'Facsimile Telephone Number' )",
388
		0, NULL, NULL, NULL},
389
390
	{"( 1.3.6.1.4.1.1466.115.121.1.23 DESC 'Fax' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
391
	{"( 1.3.6.1.4.1.1466.115.121.1.24 DESC 'Generalized Time' )",
392
		0, NULL, NULL, NULL},
393
	{"( 1.3.6.1.4.1.1466.115.121.1.25 DESC 'Guide' )",
394
		0, NULL, NULL, NULL},
395
	{"( 1.3.6.1.4.1.1466.115.121.1.26 DESC 'IA5 String' )",
396
		0, IA5StringValidate, NULL, NULL},
397
	{"( 1.3.6.1.4.1.1466.115.121.1.27 DESC 'Integer' )",
398
		0, integerValidate, NULL, NULL},
399
400
	{"( 1.3.6.1.4.1.1466.115.121.1.28 DESC 'JPEG' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
401
	{"( 1.3.6.1.4.1.1466.115.121.1.29 DESC 'Master And Shadow Access Points' )",
402
		0, NULL, NULL, NULL},
403
	{"( 1.3.6.1.4.1.1466.115.121.1.30 DESC 'Matching Rule Description' )",
404
		0, NULL, NULL, NULL},
405
	{"( 1.3.6.1.4.1.1466.115.121.1.31 DESC 'Matching Rule Use Description' )",
406
		0, NULL, NULL, NULL},
407
	{"( 1.3.6.1.4.1.1466.115.121.1.32 DESC 'Mail Preference' )",
408
		0, NULL, NULL, NULL},
409
	{"( 1.3.6.1.4.1.1466.115.121.1.33 DESC 'MHS OR Address' )",
410
		0, NULL, NULL, NULL},
411
	{"( 1.3.6.1.4.1.1466.115.121.1.34 DESC 'Name And Optional UID' )",
412
		0, NULL, NULL, NULL},
413
	{"( 1.3.6.1.4.1.1466.115.121.1.35 DESC 'Name Form Description' )",
414
		0, NULL, NULL, NULL},
415
416
417
	{"( 1.3.6.1.4.1.1466.115.121.1.36 DESC 'Numeric String' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.37 DESC 'Object Class Description' )",
418
		0, NULL, NULL, NULL},
419
	{"( 1.3.6.1.4.1.1466.115.121.1.38 DESC 'OID' )",
420
		0, oidValidate, NULL, NULL},
421
	{"( 1.3.6.1.4.1.1466.115.121.1.39 DESC 'Other Mailbox' )",
422
		0, NULL, NULL, NULL},
423
	{"( 1.3.6.1.4.1.1466.115.121.1.40 DESC 'Octet String' )",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
424
		0, blobValidate, NULL, NULL},
425
	{"( 1.3.6.1.4.1.1466.115.121.1.41 DESC 'Postal Address' )",
426
		0, blobValidate, NULL, NULL},
427
	{"( 1.3.6.1.4.1.1466.115.121.1.42 DESC 'Protocol Information' )",
428
		0, NULL, NULL, NULL},
429
	{"( 1.3.6.1.4.1.1466.115.121.1.43 DESC 'Presentation Address' )",
430
		0, NULL, NULL, NULL},
431
	{"( 1.3.6.1.4.1.1466.115.121.1.44 DESC 'Printable String' )",
432
		0, printableStringValidate, NULL, NULL},
433
434
435
	{"( 1.3.6.1.4.1.1466.115.121.1.49 DESC 'Supported Algorithm' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
436
	{"( 1.3.6.1.4.1.1466.115.121.1.50 DESC 'Telephone Number' )",
437
		0, blobValidate, NULL, NULL},
438
439
440
441
442
	{"( 1.3.6.1.4.1.1466.115.121.1.51 DESC 'Teletex Terminal Identifier' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.52 DESC 'Telex Number' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.53 DESC 'UTC Time' )",
443
		0, NULL, NULL, NULL},
444
	{"( 1.3.6.1.4.1.1466.115.121.1.54 DESC 'LDAP Syntax Description' )",
445
		0, NULL, NULL, NULL},
446
	{"( 1.3.6.1.4.1.1466.115.121.1.55 DESC 'Modify Rights' )",
447
		0, NULL, NULL, NULL},
448
	{"( 1.3.6.1.4.1.1466.115.121.1.56 DESC 'LDAP Schema Definition' )",
449
		0, NULL, NULL, NULL},
450
	{"( 1.3.6.1.4.1.1466.115.121.1.57 DESC 'LDAP Schema Description' )",
451
		0, NULL, NULL, NULL},
452
	{"( 1.3.6.1.4.1.1466.115.121.1.58 DESC 'Substring Assertion' )",
453
		0, NULL, NULL, NULL},
454

455
	/* OpenLDAP Experimental Syntaxes */
456
	{"( " SLAPD_OID_ACI_SYNTAX " DESC 'OpenLDAP Experimental ACI' )",
457
458
		0, NULL, NULL, NULL},

459
	{NULL, 0, NULL, NULL, NULL}
460
461
462
};

struct mrule_defs_rec {
463
	char *						mrd_desc;
464
	unsigned					mrd_usage;
465
466
467
468
469
	slap_mr_convert_func *		mrd_convert;
	slap_mr_normalize_func *	mrd_normalize;
	slap_mr_match_func *		mrd_match;
	slap_mr_indexer_func *		mrd_indexer;
	slap_mr_filter_func *		mrd_filter;
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
};

/*
 * Other matching rules in X.520 that we do not use:
 *
 * 2.5.13.9		numericStringOrderingMatch
 * 2.5.13.13	booleanMatch
 * 2.5.13.15	integerOrderingMatch
 * 2.5.13.18	octetStringOrderingMatch
 * 2.5.13.19	octetStringSubstringsMatch
 * 2.5.13.25	uTCTimeMatch
 * 2.5.13.26	uTCTimeOrderingMatch
 * 2.5.13.31	directoryStringFirstComponentMatch
 * 2.5.13.32	wordMatch
 * 2.5.13.33	keywordMatch
 * 2.5.13.34	certificateExactMatch
 * 2.5.13.35	certificateMatch
 * 2.5.13.36	certificatePairExactMatch
 * 2.5.13.37	certificatePairMatch
 * 2.5.13.38	certificateListExactMatch
 * 2.5.13.39	certificateListMatch
 * 2.5.13.40	algorithmIdentifierMatch
 * 2.5.13.41	storedPrefixMatch
 * 2.5.13.42	attributeCertificateMatch
 * 2.5.13.43	readerAndKeyIDMatch
 * 2.5.13.44	attributeIntegrityMatch
 */

/* recycled matching functions */
#define caseIgnoreMatch caseIgnoreIA5Match
#define caseExactMatch caseExactIA5Match

/* unimplemented matching functions */
#define objectIdentifierMatch NULL
#define distinguishedNameMatch NULL
#define caseIgnoreOrderingMatch NULL
#define caseIgnoreSubstringsMatch NULL
#define caseExactOrderingMatch NULL
#define caseExactSubstringsMatch NULL
#define numericStringMatch NULL
#define numericStringSubstringsMatch NULL
#define caseIgnoreListMatch NULL
Kurt Zeilenga's avatar
Kurt Zeilenga committed
512
#define caseIgnoreListSubstringsMatch NULL
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
#define integerMatch NULL
#define bitStringMatch NULL
#define octetStringMatch NULL
#define telephoneNumberMatch NULL
#define telephoneNumberSubstringsMatch NULL
#define presentationAddressMatch NULL
#define uniqueMemberMatch NULL
#define protocolInformationMatch NULL
#define generalizedTimeMatch NULL
#define generalizedTimeOrderingMatch NULL
#define integerFirstComponentMatch NULL
#define objectIdentifierFirstComponentMatch NULL
#define caseIgnoreIA5SubstringsMatch NULL

struct mrule_defs_rec mrule_defs[] = {
	{"( 2.5.13.0 NAME 'objectIdentifierMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
530
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
531
		NULL, NULL, objectIdentifierMatch, NULL, NULL},
532
533
534

	{"( 2.5.13.1 NAME 'distinguishedNameMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )",
535
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
536
		NULL, NULL, distinguishedNameMatch, NULL, NULL},
537
538
539

	{"( 2.5.13.2 NAME 'caseIgnoreMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
540
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
541
		NULL, UTF8StringNormalize, caseIgnoreMatch, NULL, NULL},
542
543
544

	{"( 2.5.13.3 NAME 'caseIgnoreOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
545
		SLAP_MR_ORDERING,
546
		NULL, UTF8StringNormalize, caseIgnoreOrderingMatch, NULL, NULL},
547
548
549

	{"( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
550
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
551
		NULL, UTF8StringNormalize, caseIgnoreSubstringsMatch, NULL, NULL},
552
553
554
555

	/* Next three are not in the RFC's, but are needed for compatibility */
	{"( 2.5.13.5 NAME 'caseExactMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
556
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
557
		NULL, UTF8StringNormalize, caseExactMatch, NULL, NULL},
558
559
560

	{"( 2.5.13.6 NAME 'caseExactOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
561
		SLAP_MR_ORDERING,
562
		NULL, UTF8StringNormalize, caseExactOrderingMatch, NULL, NULL},
563
564
565

	{"( 2.5.13.7 NAME 'caseExactSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
566
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
567
		NULL, UTF8StringNormalize, caseExactSubstringsMatch, NULL, NULL},
568
569
570

	{"( 2.5.13.8 NAME 'numericStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.36 )",
571
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
572
		NULL, NULL, numericStringMatch, NULL, NULL},
573
574
575

	{"( 2.5.13.10 NAME 'numericStringSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
576
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
577
		NULL, NULL, numericStringSubstringsMatch, NULL, NULL},
578
579
580

	{"( 2.5.13.11 NAME 'caseIgnoreListMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )",
581
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
582
		NULL, NULL, caseIgnoreListMatch, NULL, NULL},
583

Kurt Zeilenga's avatar
Kurt Zeilenga committed
584
585
586
587
588
	{"( 2.5.13.12 NAME 'caseIgnoreListSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
		NULL, NULL, caseIgnoreListSubstringsMatch, NULL, NULL},

589
590
	{"( 2.5.13.14 NAME 'integerMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
591
		SLAP_MR_NONE | SLAP_MR_EXT,
592
		NULL, NULL, integerMatch, NULL, NULL},
593
594
595

	{"( 2.5.13.16 NAME 'bitStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )",
596
		SLAP_MR_NONE | SLAP_MR_EXT,
597
		NULL, NULL, bitStringMatch, NULL, NULL},
598
599
600

	{"( 2.5.13.17 NAME 'octetStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )",
601
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
602
		NULL, NULL, octetStringMatch, NULL, NULL},
603
604
605

	{"( 2.5.13.20 NAME 'telephoneNumberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.50 )",
606
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
607
		NULL, NULL, telephoneNumberMatch, NULL, NULL},
608
609
610

	{"( 2.5.13.21 NAME 'telephoneNumberSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
611
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
612
		NULL, NULL, telephoneNumberSubstringsMatch, NULL, NULL},
613
614
615

	{"( 2.5.13.22 NAME 'presentationAddressMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.43 )",
616
		SLAP_MR_NONE | SLAP_MR_EXT,
617
		NULL, NULL, presentationAddressMatch, NULL, NULL},
618
619
620

	{"( 2.5.13.23 NAME 'uniqueMemberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )",
621
		SLAP_MR_NONE | SLAP_MR_EXT,
622
		NULL, NULL, uniqueMemberMatch, NULL, NULL},
623
624
625

	{"( 2.5.13.24 NAME 'protocolInformationMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.42 )",
626
		SLAP_MR_NONE | SLAP_MR_EXT,
627
		NULL, NULL, protocolInformationMatch, NULL, NULL},
628
629
630

	{"( 2.5.13.27 NAME 'generalizedTimeMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
631
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
632
		NULL, NULL, generalizedTimeMatch, NULL, NULL},
633
634
635

	{"( 2.5.13.28 NAME 'generalizedTimeOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
636
		SLAP_MR_ORDERING,
637
		NULL, NULL, generalizedTimeOrderingMatch, NULL, NULL},
638
639
640

	{"( 2.5.13.29 NAME 'integerFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
641
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
642
		NULL, NULL, integerFirstComponentMatch, NULL, NULL},
643
644
645

	{"( 2.5.13.30 NAME 'objectIdentifierFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
646
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
647
		NULL, NULL, objectIdentifierFirstComponentMatch, NULL, NULL},
648
649
650

	{"( 1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
651
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
652
		NULL, IA5StringNormalize, caseExactIA5Match, NULL, NULL},
653
654
655

	{"( 1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
656
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
657
		NULL, IA5StringNormalize, caseIgnoreIA5Match, NULL, NULL},
658
659
660

	{"( 1.3.6.1.4.1.1466.109.114.3 NAME 'caseIgnoreIA5SubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
661
		SLAP_MR_SUBSTR,
662
		NULL, IA5StringNormalize, caseIgnoreIA5SubstringsMatch, NULL, NULL},
663

664
	{NULL, SLAP_MR_NONE, NULL, NULL, NULL}
665
666
};

667
668
static int schema_init_done = 0;

669
670
671
672
673
674
int
schema_init( void )
{
	int		res;
	int		i;

675
676
	/* we should only be called once (from main) */
	assert( schema_init_done == 0 );
677
678
679

	for ( i=0; syntax_defs[i].sd_desc != NULL; i++ ) {
		res = register_syntax( syntax_defs[i].sd_desc,
680
		    syntax_defs[i].sd_flags,
681
682
683
684
685
686
687
		    syntax_defs[i].sd_validate,
		    syntax_defs[i].sd_ber2str,
			syntax_defs[i].sd_str2ber );

		if ( res ) {
			fprintf( stderr, "schema_init: Error registering syntax %s\n",
				 syntax_defs[i].sd_desc );
688
			return -1;
689
690
691
692
		}
	}

	for ( i=0; mrule_defs[i].mrd_desc != NULL; i++ ) {
693
694
695
696
697
698
699
		if( mrule_defs[i].mrd_usage == SLAP_MR_NONE ) {
			fprintf( stderr,
				"schema_init: Ingoring unusable matching rule %s\n",
				 mrule_defs[i].mrd_desc );
			continue;
		}

700
701
		res = register_matching_rule(
			mrule_defs[i].mrd_desc,
702
			mrule_defs[i].mrd_usage,
703
704
			mrule_defs[i].mrd_convert,
			mrule_defs[i].mrd_normalize,
705
706
707
		    mrule_defs[i].mrd_match,
			mrule_defs[i].mrd_indexer,
			mrule_defs[i].mrd_filter );
708
709
710
711
712

		if ( res ) {
			fprintf( stderr,
				"schema_init: Error registering matching rule %s\n",
				 mrule_defs[i].mrd_desc );
713
			return -1;
714
715
716
717
718
		}
	}
	schema_init_done = 1;
	return( 0 );
}
719
720

#ifdef SLAPD_SCHEMA_NOT_COMPAT
721
722
struct slap_internal_schema slap_schema;

723
724
725
726
727
728
729
730
731
struct slap_schema_oc_map {
	char *ssom_name;
	size_t ssom_offset;
} oc_map[] = {
	{ "alias", offsetof(struct slap_internal_schema, si_oc_alias) },
	{ "referral", offsetof(struct slap_internal_schema, si_oc_referral) },
	{ NULL, 0 }
};

732
struct slap_schema_ad_map {
733
734
735
	char *ssam_name;
	size_t ssam_offset;
} ad_map[] = {
736
737
738
739
740
741
742
743
744
745
746
	{ "objectClass",
		offsetof(struct slap_internal_schema, si_ad_objectClass) },

	{ "creatorsName",
		offsetof(struct slap_internal_schema, si_ad_creatorsName) },
	{ "createTimestamp",
		offsetof(struct slap_internal_schema, si_ad_createTimestamp) },
	{ "modifiersName",
		offsetof(struct slap_internal_schema, si_ad_modifiersName) },
	{ "modifyTimestamp",
		offsetof(struct slap_internal_schema, si_ad_modifyTimestamp) },
747
748
749
750

	{ "subschemaSubentry",
		offsetof(struct slap_internal_schema, si_ad_subschemaSubentry) },

751
752
753
754
755
756
757
758
	{ "namingContexts",
		offsetof(struct slap_internal_schema, si_ad_namingContexts) },
	{ "supportedControl",
		offsetof(struct slap_internal_schema, si_ad_supportedControl) },
	{ "supportedExtension",
		offsetof(struct slap_internal_schema, si_ad_supportedExtension) },
	{ "supportedLDAPVersion",
		offsetof(struct slap_internal_schema, si_ad_supportedLDAPVersion) },
759
760
761
762
763
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND
	{ "supportedACIMechanisms",
		offsetof(struct slap_internal_schema, si_ad_supportedACIMechanisms) },

#endif
764
765
766
	{ "supportedSASLMechanisms",
		offsetof(struct slap_internal_schema, si_ad_supportedSASLMechanisms) },

767
768
769
770
771
772
773
774
775
	{ "attributeTypes",
		offsetof(struct slap_internal_schema, si_ad_attributeTypes) },
	{ "ldapSyntaxes",
		offsetof(struct slap_internal_schema, si_ad_ldapSyntaxes) },
	{ "matchingRules",
		offsetof(struct slap_internal_schema, si_ad_matchingRules) },
	{ "objectClasses",
		offsetof(struct slap_internal_schema, si_ad_objectClasses) },

776
777
778
779
780
781
782
	{ "ref",
		offsetof(struct slap_internal_schema, si_ad_ref) },

	{ "entry",
		offsetof(struct slap_internal_schema, si_ad_entry) },
	{ "children",
		offsetof(struct slap_internal_schema, si_ad_children) },
783
784
785
786
787
788
789
790
791
792

	{ "userPassword",
		offsetof(struct slap_internal_schema, si_ad_userPassword) },
	{ "authPassword",
		offsetof(struct slap_internal_schema, si_ad_authPassword) },
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND
	{ "krbName",
		offsetof(struct slap_internal_schema, si_ad_krbName) },
#endif

793
	{ NULL, 0 }
794
795
};

796
797
798
799
800
801
#endif

int
schema_prep( void )
{
#ifdef SLAPD_SCHEMA_NOT_COMPAT
802
	int i;
803
804
805
806
807
#endif
	/* we should only be called once after schema_init() was called */
	assert( schema_init_done == 1 );

#ifdef SLAPD_SCHEMA_NOT_COMPAT
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
	for( i=0; oc_map[i].ssom_name; i++ ) {
		ObjectClass ** ocp = (ObjectClass **)
			&(((char *) &slap_schema)[oc_map[i].ssom_offset]);

		*ocp = oc_find( oc_map[i].ssom_name );

		if( *ocp == NULL ) {
			fprintf( stderr,
				"No objectClass \"%s\" defined in schema\n",
				oc_map[i].ssom_name );
			return LDAP_OBJECT_CLASS_VIOLATION;
		}
	}

	for( i=0; ad_map[i].ssam_name; i++ ) {
Kurt Zeilenga's avatar
Kurt Zeilenga committed
823
		int rc;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
824
		const char *text;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
825
826

		AttributeDescription ** adp = (AttributeDescription **)
827
			&(((char *) &slap_schema)[ad_map[i].ssam_offset]);
Kurt Zeilenga's avatar
Kurt Zeilenga committed
828
829
830

		*adp = NULL;

831
		rc = slap_str2ad( ad_map[i].ssam_name, adp, &text );
832

833
834
835
		if( rc != LDAP_SUCCESS ) {
			fprintf( stderr,
				"No attribute \"%s\" defined in schema\n",
836
				ad_map[i].ssam_name );
837
838
			return rc;
		}
839
840
841
842
843
844
	}
#endif

	++schema_init_done;
	return 0;
}