schema_init.c 22.1 KB
Newer Older
1
2
3
/* schema_init.c - init builtin schema */
/* $OpenLDAP$ */
/*
Kurt Zeilenga's avatar
Kurt Zeilenga committed
4
 * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
 */

#include "portable.h"

#include <stdio.h>

#include <ac/ctype.h>
#include <ac/string.h>
#include <ac/socket.h>

#include "slap.h"
#include "ldap_pvt.h"

19
20
21
22
23
24
25
26
27
static int
inValidate(
	Syntax *syntax,
	struct berval *in )
{
	/* any value allowed */
	return LDAP_OTHER;
}

28
static int
29
blobValidate(
30
31
32
33
	Syntax *syntax,
	struct berval *in )
{
	/* any value allowed */
34
	return LDAP_SUCCESS;
35
36
}

37
38
#define berValidate blobValidate

39
40
41
42
43
44
45
46
47
static int
UTF8StringValidate(
	Syntax *syntax,
	struct berval *in )
{
	ber_len_t count;
	int len;
	unsigned char *u = in->bv_val;

48
	for( count = in->bv_len; count > 0; count-=len, u+=len ) {
49
50
51
52
		/* get the length indicated by the first byte */
		len = LDAP_UTF8_CHARLEN( u );

		/* should not be zero */
53
		if( len == 0 ) return LDAP_INVALID_SYNTAX;
54
55
56

		/* make sure len corresponds with the offset
			to the next character */
57
		if( LDAP_UTF8_OFFSET( u ) != len ) return LDAP_INVALID_SYNTAX;
58
59
	}

60
	if( count != 0 ) return LDAP_INVALID_SYNTAX;
61

62
	return LDAP_SUCCESS;
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
}

static int
UTF8StringNormalize(
	Syntax *syntax,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q, *s;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( ldap_utf8_isspace( p ) ) {
		LDAP_UTF8_INCR( p );
	}

83
	if( *p == '\0' ) {
84
		ch_free( newval );
85
		return LDAP_INVALID_SYNTAX;
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;
	s = NULL;

	while ( *p ) {
		int len;

		if ( ldap_utf8_isspace( p ) ) {
			len = LDAP_UTF8_COPY(q,p);
			s=q;
			p+=len;
			q+=len;

			/* Ignore the extra whitespace */
			while ( ldap_utf8_isspace( p ) ) {
				LDAP_UTF8_INCR( p );
			}
		} else {
			len = LDAP_UTF8_COPY(q,p);
			s=NULL;
			p+=len;
			q+=len;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !ldap_utf8_isspace(newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( s != NULL ) {
		q = s;
	}

	/* cannot end with a space */
	assert( !ldap_utf8_isspace( LDAP_UTF8_PREV(q) ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
137
	*normalized = newval;
138

139
	return LDAP_SUCCESS;
140
141
}

142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
static int
oidValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	if( val->bv_len == 0 ) return 0;

	if( isdigit(val->bv_val[0]) ) {
		int dot = 0;
		for(i=1; i < val->bv_len; i++) {
			if( val->bv_val[i] == '.' ) {
				if( dot++ ) return 1;
			} else if ( isdigit(val->bv_val[i]) ) {
				dot = 0;
			} else {
159
				return LDAP_INVALID_SYNTAX;
160
161
162
			}
		}

163
		return !dot ? LDAP_SUCCESS : LDAP_INVALID_SYNTAX;
164
165
166
167

	} else if( isalpha(val->bv_val[0]) ) {
		for(i=1; i < val->bv_len; i++) {
			if( !isalpha(val->bv_val[i] ) ) {
168
				return LDAP_INVALID_SYNTAX;
169
170
171
			}
		}

172
		return LDAP_SUCCESS;
173
174
	}
	
175
	return LDAP_INVALID_SYNTAX;
176
177
}

178
179
180
181
182
183
184
185
static int
integerValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
186
		if( !isdigit(val->bv_val[i]) ) return LDAP_INVALID_SYNTAX;
187
188
	}

189
	return LDAP_SUCCESS;
190
191
192
193
194
195
196
197
198
199
}

static int
printableStringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
200
		if( !isprint(val->bv_val[i]) ) return LDAP_INVALID_SYNTAX;
201
202
	}

203
	return LDAP_SUCCESS;
204
205
}

206
static int
207
208
209
210
211
212
213
IA5StringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
214
		if( !isascii(val->bv_val[i]) ) return LDAP_INVALID_SYNTAX;
215
216
	}

217
	return LDAP_SUCCESS;
218
219
220
221
222
223
224
225
}

static int
IA5StringConvert(
	Syntax *syntax,
	struct berval *in,
	struct berval **out )
{
226
227
	ldap_unicode_t *u;
	ber_len_t i, len = in->bv_len;
228
229
	struct berval *bv = ch_malloc( sizeof(struct berval) );

230
231
232
233
	bv->bv_len = len * sizeof( ldap_unicode_t );
	bv->bv_val = (char *) u = ch_malloc( bv->bv_len + sizeof( ldap_unicode_t ) );;

	for(i=0; i < len; i++ ) {
234
235
236
237
		/*
		 * IA5StringValidate should have been called to ensure
		 * input is limited to IA5.
		 */
238
		u[i] = in->bv_val[i];
239
	}
240
	u[i] = 0;
241
242

	*out = bv;
243
	return LDAP_SUCCESS;
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
}

static int
IA5StringNormalize(
	Syntax *syntax,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( isspace( *p++ ) ) {
		/* EMPTY */  ;
	}

264
	if( *p != '\0' ) {
265
		ch_free( newval );
266
		return LDAP_INVALID_SYNTAX;
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;

	while ( *p ) {
		if ( isspace( *p ) ) {
			*q++ = *p++;

			/* Ignore the extra whitespace */
			while ( isspace( *p++ ) ) {
				/* EMPTY */  ;
			}
		} else {
			*q++ = *p++;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !isspace(*newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( isspace( q[-1] ) ) {
		--q;
	}

	/* cannot end with a space */
	assert( !isspace( q[-1] ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
309
	*normalized = newval;
310

311
	return LDAP_SUCCESS;
312
313
314
315
}

static int
caseExactIA5Match(
316
	int *match,
317
	unsigned use,
318
319
320
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
321
	void *assertedValue )
322
{
323
	*match = strcmp( value->bv_val,
324
		((struct berval *) assertedValue)->bv_val );
325
	return LDAP_SUCCESS;
326
327
}

328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
#ifdef SLAPD_SCHEMA_NOT_COMPAT
static int
caseExactIA5SubstringsMatch(
	int *matchp,
	unsigned use,
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
	void *assertedValue )
{
	int match = 0;
	SubstringsAssertion *sub = assertedValue;
	struct berval left = *value;
	int i;
	ber_len_t inlen=0;

	if( sub->sa_initial ) {
		inlen += sub->sa_initial->bv_len;
	}
	if( sub->sa_any ) {
		for(i=0; sub->sa_any[i]; i++) {
			inlen += sub->sa_final->bv_len;
		}
	}
	if( sub->sa_final ) {
		inlen += sub->sa_final->bv_len;
	}

	if( inlen > value->bv_len ) {
		match = 1;
		goto done;
	}

	if( sub->sa_initial ) {
		match = strncmp( sub->sa_initial->bv_val, left.bv_val,
			sub->sa_initial->bv_len );

		if( match != 0 ) {
			goto done;
		}

		left.bv_val += sub->sa_initial->bv_len;
		left.bv_len -= sub->sa_initial->bv_len;
	}

	if( sub->sa_final ) {
		match = strncmp( sub->sa_final->bv_val,
			&left.bv_val[left.bv_len - sub->sa_final->bv_len],
			sub->sa_final->bv_len );

		if( match != 0 ) {
			goto done;
		}

		left.bv_len -= sub->sa_final->bv_len;
	}

	if( sub->sa_any ) {
		return LDAP_OTHER;
	}

done:
	*matchp = match;
	return LDAP_SUCCESS;
}
#endif

395
396
static int
caseIgnoreIA5Match(
397
	int *match,
398
	unsigned use,
399
400
401
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
402
	void *assertedValue )
403
{
404
	*match = strcasecmp( value->bv_val,
405
		((struct berval *) assertedValue)->bv_val );
406
	return LDAP_SUCCESS;
407
408
}

409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
#ifdef SLAPD_SCHEMA_NOT_COMPAT
static int
caseIgnoreIA5SubstringsMatch(
	int *matchp,
	unsigned use,
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
	void *assertedValue )
{
	int match = 0;
	SubstringsAssertion *sub = assertedValue;
	struct berval left = *value;
	int i;
	ber_len_t inlen=0;

	if( sub->sa_initial ) {
		inlen += sub->sa_initial->bv_len;
	}
	if( sub->sa_any ) {
		for(i=0; sub->sa_any[i]; i++) {
			inlen += sub->sa_final->bv_len;
		}
	}
	if( sub->sa_final ) {
		inlen += sub->sa_final->bv_len;
	}

	if( inlen > value->bv_len ) {
		match = 1;
		goto done;
	}

	if( sub->sa_initial ) {
		match = strncasecmp( sub->sa_initial->bv_val, left.bv_val,
			sub->sa_initial->bv_len );

		if( match != 0 ) {
			goto done;
		}

		left.bv_val += sub->sa_initial->bv_len;
		left.bv_len -= sub->sa_initial->bv_len;
	}

	if( sub->sa_final ) {
		match = strncasecmp( sub->sa_final->bv_val,
			&left.bv_val[left.bv_len - sub->sa_final->bv_len],
			sub->sa_final->bv_len );

		if( match != 0 ) {
			goto done;
		}

		left.bv_len -= sub->sa_final->bv_len;
	}

	if( sub->sa_any ) {
		return LDAP_OTHER;
	}

done:
	*matchp = match;
	return LDAP_SUCCESS;
}
#endif

476
477
struct syntax_defs_rec {
	char *sd_desc;
478
	int sd_flags;
479
	slap_syntax_validate_func *sd_validate;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
480
481
482
	slap_syntax_transform_func *sd_normalize;
	slap_syntax_transform_func *sd_pretty;
#ifdef SLAPD_BINARY_CONVERSION
483
484
	slap_syntax_transform_func *sd_ber2str;
	slap_syntax_transform_func *sd_str2ber;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
485
#endif
486
487
};

488
#define X_HIDE "X-HIDE 'TRUE' "
489
490
#define X_BINARY "X-BINARY-TRANSFER-REQUIRED 'TRUE' "
#define X_NOT_H_R "X-NOT-HUMAN-READABLE 'TRUE' "
491

492
struct syntax_defs_rec syntax_defs[] = {
493
494
495
496
	{"( 1.3.6.1.4.1.1466.115.121.1.1 DESC 'ACI Item' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.2 DESC 'Access Point' " X_NOT_H_R ")",
		0, NULL, NULL, NULL},
497
	{"( 1.3.6.1.4.1.1466.115.121.1.3 DESC 'Attribute Type Description' )",
498
		0, NULL, NULL, NULL},
499
500
501
502
	{"( 1.3.6.1.4.1.1466.115.121.1.4 DESC 'Audio' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, blobValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.5 DESC 'Binary' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BER, berValidate, NULL, NULL},
503
	{"( 1.3.6.1.4.1.1466.115.121.1.6 DESC 'Bit String' )",
504
		0, NULL, NULL, NULL},
505
	{"( 1.3.6.1.4.1.1466.115.121.1.7 DESC 'Boolean' )",
506
		0, NULL, NULL, NULL},
507
508
509
510
511
512
	{"( 1.3.6.1.4.1.1466.115.121.1.8 DESC 'Certificate' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.9 DESC 'Certificate List' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
Kurt Zeilenga's avatar
Kurt Zeilenga committed
513
514
	{"( 1.3.6.1.4.1.1466.115.121.1.10 DESC 'Certificate Pair' "
		X_BINARY X_NOT_H_R ")",
515
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
516
517
	{"( 1.3.6.1.4.1.1466.115.121.1.11 DESC 'Country String' )",
		0, NULL, NULL, NULL},
518
	{"( 1.3.6.1.4.1.1466.115.121.1.12 DESC 'DN' )",
519
		0, blobValidate, NULL, NULL},
520
	{"( 1.3.6.1.4.1.1466.115.121.1.13 DESC 'Data Quality' )",
521
		0, NULL, NULL, NULL},
522
	{"( 1.3.6.1.4.1.1466.115.121.1.14 DESC 'Delivery Method' )",
523
		0, NULL, NULL, NULL},
524
	{"( 1.3.6.1.4.1.1466.115.121.1.15 DESC 'Directory String' )",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
525
		0, UTF8StringValidate, UTF8StringNormalize, NULL},
526
	{"( 1.3.6.1.4.1.1466.115.121.1.16 DESC 'DIT Content Rule Description' )",
527
		0, NULL, NULL, NULL},
528
	{"( 1.3.6.1.4.1.1466.115.121.1.17 DESC 'DIT Structure Rule Description' )",
529
		0, NULL, NULL, NULL},
530
	{"( 1.3.6.1.4.1.1466.115.121.1.19 DESC 'DSA Quality' )",
531
		0, NULL, NULL, NULL},
532
	{"( 1.3.6.1.4.1.1466.115.121.1.20 DESC 'DSE Type' )",
533
		0, NULL, NULL, NULL},
534
	{"( 1.3.6.1.4.1.1466.115.121.1.21 DESC 'Enhanced Guide' )",
535
		0, NULL, NULL, NULL},
536
	{"( 1.3.6.1.4.1.1466.115.121.1.22 DESC 'Facsimile Telephone Number' )",
537
		0, blobValidate, NULL, NULL},
538
539
	{"( 1.3.6.1.4.1.1466.115.121.1.23 DESC 'Fax' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
540
	{"( 1.3.6.1.4.1.1466.115.121.1.24 DESC 'Generalized Time' )",
541
		0, NULL, NULL, NULL},
542
	{"( 1.3.6.1.4.1.1466.115.121.1.25 DESC 'Guide' )",
543
		0, NULL, NULL, NULL},
544
	{"( 1.3.6.1.4.1.1466.115.121.1.26 DESC 'IA5 String' )",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
545
		0, IA5StringValidate, IA5StringNormalize, NULL},
546
	{"( 1.3.6.1.4.1.1466.115.121.1.27 DESC 'Integer' )",
547
		0, integerValidate, NULL, NULL},
548
549
	{"( 1.3.6.1.4.1.1466.115.121.1.28 DESC 'JPEG' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
550
	{"( 1.3.6.1.4.1.1466.115.121.1.29 DESC 'Master And Shadow Access Points' )",
551
		0, NULL, NULL, NULL},
552
	{"( 1.3.6.1.4.1.1466.115.121.1.30 DESC 'Matching Rule Description' )",
553
		0, NULL, NULL, NULL},
554
	{"( 1.3.6.1.4.1.1466.115.121.1.31 DESC 'Matching Rule Use Description' )",
555
		0, NULL, NULL, NULL},
556
	{"( 1.3.6.1.4.1.1466.115.121.1.32 DESC 'Mail Preference' )",
557
		0, NULL, NULL, NULL},
558
	{"( 1.3.6.1.4.1.1466.115.121.1.33 DESC 'MHS OR Address' )",
559
		0, NULL, NULL, NULL},
560
	{"( 1.3.6.1.4.1.1466.115.121.1.34 DESC 'Name And Optional UID' )",
561
		0, NULL, NULL, NULL},
562
	{"( 1.3.6.1.4.1.1466.115.121.1.35 DESC 'Name Form Description' )",
563
		0, NULL, NULL, NULL},
564
565
566
	{"( 1.3.6.1.4.1.1466.115.121.1.36 DESC 'Numeric String' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.37 DESC 'Object Class Description' )",
567
		0, NULL, NULL, NULL},
568
	{"( 1.3.6.1.4.1.1466.115.121.1.38 DESC 'OID' )",
569
		0, oidValidate, NULL, NULL},
570
	{"( 1.3.6.1.4.1.1466.115.121.1.39 DESC 'Other Mailbox' )",
571
		0, NULL, NULL, NULL},
572
	{"( 1.3.6.1.4.1.1466.115.121.1.40 DESC 'Octet String' )",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
573
		0, blobValidate, NULL, NULL},
574
	{"( 1.3.6.1.4.1.1466.115.121.1.41 DESC 'Postal Address' )",
575
		0, blobValidate, NULL, NULL},
576
	{"( 1.3.6.1.4.1.1466.115.121.1.42 DESC 'Protocol Information' )",
577
		0, NULL, NULL, NULL},
578
	{"( 1.3.6.1.4.1.1466.115.121.1.43 DESC 'Presentation Address' )",
579
		0, NULL, NULL, NULL},
580
	{"( 1.3.6.1.4.1.1466.115.121.1.44 DESC 'Printable String' )",
581
		0, printableStringValidate, NULL, NULL},
582
583
584
	{"( 1.3.6.1.4.1.1466.115.121.1.49 DESC 'Supported Algorithm' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
585
	{"( 1.3.6.1.4.1.1466.115.121.1.50 DESC 'Telephone Number' )",
586
		0, blobValidate, NULL, NULL},
587
588
589
590
591
	{"( 1.3.6.1.4.1.1466.115.121.1.51 DESC 'Teletex Terminal Identifier' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.52 DESC 'Telex Number' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.53 DESC 'UTC Time' )",
592
		0, NULL, NULL, NULL},
593
	{"( 1.3.6.1.4.1.1466.115.121.1.54 DESC 'LDAP Syntax Description' )",
594
		0, NULL, NULL, NULL},
595
	{"( 1.3.6.1.4.1.1466.115.121.1.55 DESC 'Modify Rights' )",
596
		0, NULL, NULL, NULL},
597
	{"( 1.3.6.1.4.1.1466.115.121.1.56 DESC 'LDAP Schema Definition' )",
598
		0, NULL, NULL, NULL},
599
	{"( 1.3.6.1.4.1.1466.115.121.1.57 DESC 'LDAP Schema Description' )",
600
		0, NULL, NULL, NULL},
601
	{"( 1.3.6.1.4.1.1466.115.121.1.58 DESC 'Substring Assertion' )",
602
		0, NULL, NULL, NULL},
603

604
	/* OpenLDAP Experimental Syntaxes */
605
	{"( 1.3.6.1.4.1.4203.666.2.1 DESC 'OpenLDAP Experimental ACI' )",
606
		0, NULL, NULL, NULL},
607
608
609
610
	{"( 1.3.6.1.4.1.4203.666.2.2 DESC 'OpenLDAP void' " X_HIDE ")" ,
		SLAP_SYNTAX_HIDE, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.4203.666.2.3 DESC 'OpenLDAP DN' " X_HIDE ")" ,
		SLAP_SYNTAX_HIDE, NULL, NULL, NULL},
611

612
	{NULL, 0, NULL, NULL, NULL}
613
614
615
};

struct mrule_defs_rec {
616
	char *						mrd_desc;
617
	unsigned					mrd_usage;
618
619
620
621
622
	slap_mr_convert_func *		mrd_convert;
	slap_mr_normalize_func *	mrd_normalize;
	slap_mr_match_func *		mrd_match;
	slap_mr_indexer_func *		mrd_indexer;
	slap_mr_filter_func *		mrd_filter;
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
};

/*
 * Other matching rules in X.520 that we do not use:
 *
 * 2.5.13.9		numericStringOrderingMatch
 * 2.5.13.13	booleanMatch
 * 2.5.13.15	integerOrderingMatch
 * 2.5.13.18	octetStringOrderingMatch
 * 2.5.13.19	octetStringSubstringsMatch
 * 2.5.13.25	uTCTimeMatch
 * 2.5.13.26	uTCTimeOrderingMatch
 * 2.5.13.31	directoryStringFirstComponentMatch
 * 2.5.13.32	wordMatch
 * 2.5.13.33	keywordMatch
 * 2.5.13.34	certificateExactMatch
 * 2.5.13.35	certificateMatch
 * 2.5.13.36	certificatePairExactMatch
 * 2.5.13.37	certificatePairMatch
 * 2.5.13.38	certificateListExactMatch
 * 2.5.13.39	certificateListMatch
 * 2.5.13.40	algorithmIdentifierMatch
 * 2.5.13.41	storedPrefixMatch
 * 2.5.13.42	attributeCertificateMatch
 * 2.5.13.43	readerAndKeyIDMatch
 * 2.5.13.44	attributeIntegrityMatch
 */

651
652
653
654
655
#ifndef SLAPD_SCHEMA_NOT_COMPAT
#define caseIgnoreIA5SubstringsMatch NULL
#define caseExactIA5SubstringsMatch NULL
#endif

656
657
/* recycled matching functions */
#define caseIgnoreMatch caseIgnoreIA5Match
658
659
#define caseIgnoreOrderingMatch caseIgnoreMatch
#define caseIgnoreSubstringsMatch caseIgnoreIA5SubstringsMatch
660
#define caseExactMatch caseExactIA5Match
661
662
#define caseExactOrderingMatch caseExactMatch
#define caseExactSubstringsMatch caseExactIA5SubstringsMatch
663
664
665
666
667
668
669

/* unimplemented matching functions */
#define objectIdentifierMatch NULL
#define distinguishedNameMatch NULL
#define numericStringMatch NULL
#define numericStringSubstringsMatch NULL
#define caseIgnoreListMatch NULL
Kurt Zeilenga's avatar
Kurt Zeilenga committed
670
#define caseIgnoreListSubstringsMatch NULL
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
#define integerMatch NULL
#define bitStringMatch NULL
#define octetStringMatch NULL
#define telephoneNumberMatch NULL
#define telephoneNumberSubstringsMatch NULL
#define presentationAddressMatch NULL
#define uniqueMemberMatch NULL
#define protocolInformationMatch NULL
#define generalizedTimeMatch NULL
#define generalizedTimeOrderingMatch NULL
#define integerFirstComponentMatch NULL
#define objectIdentifierFirstComponentMatch NULL

struct mrule_defs_rec mrule_defs[] = {
	{"( 2.5.13.0 NAME 'objectIdentifierMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
687
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
688
		NULL, NULL, objectIdentifierMatch, NULL, NULL},
689
690
691

	{"( 2.5.13.1 NAME 'distinguishedNameMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )",
692
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
693
		NULL, NULL, distinguishedNameMatch, NULL, NULL},
694
695
696

	{"( 2.5.13.2 NAME 'caseIgnoreMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
697
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
698
		NULL, NULL, caseIgnoreMatch, NULL, NULL},
699
700
701

	{"( 2.5.13.3 NAME 'caseIgnoreOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
702
		SLAP_MR_ORDERING,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
703
		NULL, NULL, caseIgnoreOrderingMatch, NULL, NULL},
704
705
706

	{"( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
707
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
708
		NULL, NULL, caseIgnoreSubstringsMatch, NULL, NULL},
709
710
711
712

	/* Next three are not in the RFC's, but are needed for compatibility */
	{"( 2.5.13.5 NAME 'caseExactMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
713
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
714
		NULL, NULL, caseExactMatch, NULL, NULL},
715
716
717

	{"( 2.5.13.6 NAME 'caseExactOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
718
		SLAP_MR_ORDERING,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
719
		NULL, NULL, caseExactOrderingMatch, NULL, NULL},
720
721
722

	{"( 2.5.13.7 NAME 'caseExactSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
723
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
724
		NULL, NULL, caseExactSubstringsMatch, NULL, NULL},
725
726
727

	{"( 2.5.13.8 NAME 'numericStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.36 )",
728
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
729
		NULL, NULL, numericStringMatch, NULL, NULL},
730
731
732

	{"( 2.5.13.10 NAME 'numericStringSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
733
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
734
		NULL, NULL, numericStringSubstringsMatch, NULL, NULL},
735
736
737

	{"( 2.5.13.11 NAME 'caseIgnoreListMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )",
738
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
739
		NULL, NULL, caseIgnoreListMatch, NULL, NULL},
740

Kurt Zeilenga's avatar
Kurt Zeilenga committed
741
742
743
744
745
	{"( 2.5.13.12 NAME 'caseIgnoreListSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
		NULL, NULL, caseIgnoreListSubstringsMatch, NULL, NULL},

746
747
	{"( 2.5.13.14 NAME 'integerMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
748
		SLAP_MR_NONE | SLAP_MR_EXT,
749
		NULL, NULL, integerMatch, NULL, NULL},
750
751
752

	{"( 2.5.13.16 NAME 'bitStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )",
753
		SLAP_MR_NONE | SLAP_MR_EXT,
754
		NULL, NULL, bitStringMatch, NULL, NULL},
755
756
757

	{"( 2.5.13.17 NAME 'octetStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )",
758
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
759
		NULL, NULL, octetStringMatch, NULL, NULL},
760
761
762

	{"( 2.5.13.20 NAME 'telephoneNumberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.50 )",
763
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
764
		NULL, NULL, telephoneNumberMatch, NULL, NULL},
765
766
767

	{"( 2.5.13.21 NAME 'telephoneNumberSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
768
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
769
		NULL, NULL, telephoneNumberSubstringsMatch, NULL, NULL},
770
771
772

	{"( 2.5.13.22 NAME 'presentationAddressMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.43 )",
773
		SLAP_MR_NONE | SLAP_MR_EXT,
774
		NULL, NULL, presentationAddressMatch, NULL, NULL},
775
776
777

	{"( 2.5.13.23 NAME 'uniqueMemberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )",
778
		SLAP_MR_NONE | SLAP_MR_EXT,
779
		NULL, NULL, uniqueMemberMatch, NULL, NULL},
780
781
782

	{"( 2.5.13.24 NAME 'protocolInformationMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.42 )",
783
		SLAP_MR_NONE | SLAP_MR_EXT,
784
		NULL, NULL, protocolInformationMatch, NULL, NULL},
785
786
787

	{"( 2.5.13.27 NAME 'generalizedTimeMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
788
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
789
		NULL, NULL, generalizedTimeMatch, NULL, NULL},
790
791
792

	{"( 2.5.13.28 NAME 'generalizedTimeOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
793
		SLAP_MR_ORDERING,
794
		NULL, NULL, generalizedTimeOrderingMatch, NULL, NULL},
795
796
797

	{"( 2.5.13.29 NAME 'integerFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
798
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
799
		NULL, NULL, integerFirstComponentMatch, NULL, NULL},
800
801
802

	{"( 2.5.13.30 NAME 'objectIdentifierFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
803
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
804
		NULL, NULL, objectIdentifierFirstComponentMatch, NULL, NULL},
805
806
807

	{"( 1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
808
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
809
		NULL, NULL, caseExactIA5Match, NULL, NULL},
810
811
812

	{"( 1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
813
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
814
		NULL, NULL, caseIgnoreIA5Match, NULL, NULL},
815
816
817

	{"( 1.3.6.1.4.1.1466.109.114.3 NAME 'caseIgnoreIA5SubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
818
		SLAP_MR_SUBSTR,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
819
		NULL, NULL, caseIgnoreIA5SubstringsMatch, NULL, NULL},
820

821
	{NULL, SLAP_MR_NONE, NULL, NULL, NULL}
822
823
824
825
826
827
828
829
};

int
schema_init( void )
{
	int		res;
	int		i;

830
831
	/* we should only be called once (from main) */
	assert( schema_init_done == 0 );
832
833
834

	for ( i=0; syntax_defs[i].sd_desc != NULL; i++ ) {
		res = register_syntax( syntax_defs[i].sd_desc,
835
		    syntax_defs[i].sd_flags,
836
		    syntax_defs[i].sd_validate,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
837
838
839
840
		    syntax_defs[i].sd_normalize,
			syntax_defs[i].sd_pretty
#ifdef SLAPD_BINARY_CONVERSION
			,
841
		    syntax_defs[i].sd_ber2str,
Kurt Zeilenga's avatar
Kurt Zeilenga committed
842
843
844
			syntax_defs[i].sd_str2ber
#endif
		);
845
846
847
848

		if ( res ) {
			fprintf( stderr, "schema_init: Error registering syntax %s\n",
				 syntax_defs[i].sd_desc );
849
			return LDAP_OTHER;
850
851
852
853
		}
	}

	for ( i=0; mrule_defs[i].mrd_desc != NULL; i++ ) {
854
855
856
857
858
859
860
		if( mrule_defs[i].mrd_usage == SLAP_MR_NONE ) {
			fprintf( stderr,
				"schema_init: Ingoring unusable matching rule %s\n",
				 mrule_defs[i].mrd_desc );
			continue;
		}

861
862
		res = register_matching_rule(
			mrule_defs[i].mrd_desc,
863
			mrule_defs[i].mrd_usage,
864
865
			mrule_defs[i].mrd_convert,
			mrule_defs[i].mrd_normalize,
866
867
868
		    mrule_defs[i].mrd_match,
			mrule_defs[i].mrd_indexer,
			mrule_defs[i].mrd_filter );
869
870
871
872
873

		if ( res ) {
			fprintf( stderr,
				"schema_init: Error registering matching rule %s\n",
				 mrule_defs[i].mrd_desc );
874
			return LDAP_OTHER;
875
876
877
		}
	}
	schema_init_done = 1;
878
	return LDAP_SUCCESS;
879
}