schema_init.c 22.8 KB
Newer Older
1
2
3
/* schema_init.c - init builtin schema */
/* $OpenLDAP$ */
/*
Kurt Zeilenga's avatar
Kurt Zeilenga committed
4
 * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
 */

#include "portable.h"

#include <stdio.h>

#include <ac/ctype.h>
#include <ac/string.h>
#include <ac/socket.h>

#include "slap.h"
#include "ldap_pvt.h"

19
#define berValidate blobValidate
20
static int
21
blobValidate(
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
	Syntax *syntax,
	struct berval *in )
{
	/* any value allowed */
	return 0;
}

static int
UTF8StringValidate(
	Syntax *syntax,
	struct berval *in )
{
	ber_len_t count;
	int len;
	unsigned char *u = in->bv_val;

38
	for( count = in->bv_len; count > 0; count-=len, u+=len ) {
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
		/* get the length indicated by the first byte */
		len = LDAP_UTF8_CHARLEN( u );

		/* should not be zero */
		if( len == 0 ) return -1;

		/* make sure len corresponds with the offset
			to the next character */
		if( LDAP_UTF8_OFFSET( u ) != len ) return -1;
	}

	if( count != 0 ) return -1;

	return 0;
}

static int
UTF8StringNormalize(
57
	unsigned use,
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q, *s;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( ldap_utf8_isspace( p ) ) {
		LDAP_UTF8_INCR( p );
	}

	if( *p ) {
		ch_free( newval );
		return 1;
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;
	s = NULL;

	while ( *p ) {
		int len;

		if ( ldap_utf8_isspace( p ) ) {
			len = LDAP_UTF8_COPY(q,p);
			s=q;
			p+=len;
			q+=len;

			/* Ignore the extra whitespace */
			while ( ldap_utf8_isspace( p ) ) {
				LDAP_UTF8_INCR( p );
			}
		} else {
			len = LDAP_UTF8_COPY(q,p);
			s=NULL;
			p+=len;
			q+=len;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !ldap_utf8_isspace(newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( s != NULL ) {
		q = s;
	}

	/* cannot end with a space */
	assert( !ldap_utf8_isspace( LDAP_UTF8_PREV(q) ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
129
	*normalized = newval;
130
131
132
133

	return 0;
}

134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
static int
oidValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	if( val->bv_len == 0 ) return 0;

	if( isdigit(val->bv_val[0]) ) {
		int dot = 0;
		for(i=1; i < val->bv_len; i++) {
			if( val->bv_val[i] == '.' ) {
				if( dot++ ) return 1;
			} else if ( isdigit(val->bv_val[i]) ) {
				dot = 0;
			} else {
				return 1;
			}
		}

		return !dot ? 0 : 1;

	} else if( isalpha(val->bv_val[0]) ) {
		for(i=1; i < val->bv_len; i++) {
			if( !isalpha(val->bv_val[i] ) ) {
				return 1;
			}
		}

		return 0;
	}
	
	return 1;
}

170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
static int
integerValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
		if( !isdigit(val->bv_val[i]) ) return -1;
	}

	return 0;
}

static int
printableStringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
		if( !isprint(val->bv_val[i]) ) return -1;
	}

	return 0;
}

198
static int
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
IA5StringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
		if( !isascii(val->bv_val[i]) ) return -1;
	}

	return 0;
}

static int
IA5StringConvert(
	Syntax *syntax,
	struct berval *in,
	struct berval **out )
{
218
219
	ldap_unicode_t *u;
	ber_len_t i, len = in->bv_len;
220
221
	struct berval *bv = ch_malloc( sizeof(struct berval) );

222
223
224
225
	bv->bv_len = len * sizeof( ldap_unicode_t );
	bv->bv_val = (char *) u = ch_malloc( bv->bv_len + sizeof( ldap_unicode_t ) );;

	for(i=0; i < len; i++ ) {
226
227
228
229
		/*
		 * IA5StringValidate should have been called to ensure
		 * input is limited to IA5.
		 */
230
		u[i] = in->bv_val[i];
231
	}
232
	u[i] = 0;
233
234
235
236
237
238
239

	*out = bv;
	return 0;
}

static int
IA5StringNormalize(
240
	unsigned use,
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( isspace( *p++ ) ) {
		/* EMPTY */  ;
	}

	if( *p ) {
		ch_free( newval );
		return 1;
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;

	while ( *p ) {
		if ( isspace( *p ) ) {
			*q++ = *p++;

			/* Ignore the extra whitespace */
			while ( isspace( *p++ ) ) {
				/* EMPTY */  ;
			}
		} else {
			*q++ = *p++;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !isspace(*newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( isspace( q[-1] ) ) {
		--q;
	}

	/* cannot end with a space */
	assert( !isspace( q[-1] ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
303
	*normalized = newval;
304
305
306
307
308
309

	return 0;
}

static int
caseExactIA5Match(
310
	unsigned use,
311
312
313
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
314
	void *assertedValue )
315
{
316
317
	return strcmp( value->bv_val,
		((struct berval *) assertedValue)->bv_val );
318
319
320
321
}

static int
caseIgnoreIA5Match(
322
	unsigned use,
323
324
325
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
326
	void *assertedValue )
327
{
328
329
	return strcasecmp( value->bv_val,
		((struct berval *) assertedValue)->bv_val );
330
331
}

332
333
334
335
336
337
338
339
340
341
342
343
344
345
static int
objectClassMatch(
	unsigned use,
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
	void *assertedValue )
{
	ObjectClass *oc = oc_find( value->bv_val );
	ObjectClass *asserted = oc_find( ((struct berval *) assertedValue)->bv_val );

	return oc == NULL || oc != asserted;
}

346
347
struct syntax_defs_rec {
	char *sd_desc;
348
	int sd_flags;
349
350
351
352
353
	slap_syntax_validate_func *sd_validate;
	slap_syntax_transform_func *sd_ber2str;
	slap_syntax_transform_func *sd_str2ber;
};

354
355
#define X_BINARY "X-BINARY-TRANSFER-REQUIRED 'TRUE' "
#define X_NOT_H_R "X-NOT-HUMAN-READABLE 'TRUE' "
356

357
struct syntax_defs_rec syntax_defs[] = {
358
359
360
361
	{"( 1.3.6.1.4.1.1466.115.121.1.1 DESC 'ACI Item' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.2 DESC 'Access Point' " X_NOT_H_R ")",
		0, NULL, NULL, NULL},
362
	{"( 1.3.6.1.4.1.1466.115.121.1.3 DESC 'Attribute Type Description' )",
363
		0, NULL, NULL, NULL},
364
365
366
367
	{"( 1.3.6.1.4.1.1466.115.121.1.4 DESC 'Audio' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, blobValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.5 DESC 'Binary' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BER, berValidate, NULL, NULL},
368
	{"( 1.3.6.1.4.1.1466.115.121.1.6 DESC 'Bit String' )",
369
		0, NULL, NULL, NULL},
370
	{"( 1.3.6.1.4.1.1466.115.121.1.7 DESC 'Boolean' )",
371
		0, NULL, NULL, NULL},
372
373
374
375
376
377
	{"( 1.3.6.1.4.1.1466.115.121.1.8 DESC 'Certificate' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.9 DESC 'Certificate List' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
Kurt Zeilenga's avatar
Kurt Zeilenga committed
378
379
	{"( 1.3.6.1.4.1.1466.115.121.1.10 DESC 'Certificate Pair' "
		X_BINARY X_NOT_H_R ")",
380
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
381
382
	{"( 1.3.6.1.4.1.1466.115.121.1.11 DESC 'Country String' )",
		0, NULL, NULL, NULL},
383
	{"( 1.3.6.1.4.1.1466.115.121.1.12 DESC 'DN' )",
384
		0, blobValidate, NULL, NULL},
385
	{"( 1.3.6.1.4.1.1466.115.121.1.13 DESC 'Data Quality' )",
386
		0, NULL, NULL, NULL},
387
	{"( 1.3.6.1.4.1.1466.115.121.1.14 DESC 'Delivery Method' )",
388
		0, NULL, NULL, NULL},
389
	{"( 1.3.6.1.4.1.1466.115.121.1.15 DESC 'Directory String' )",
390
		0, UTF8StringValidate, NULL, NULL},
391
	{"( 1.3.6.1.4.1.1466.115.121.1.16 DESC 'DIT Content Rule Description' )",
392
		0, NULL, NULL, NULL},
393
	{"( 1.3.6.1.4.1.1466.115.121.1.17 DESC 'DIT Structure Rule Description' )",
394
		0, NULL, NULL, NULL},
395
	{"( 1.3.6.1.4.1.1466.115.121.1.19 DESC 'DSA Quality' )",
396
		0, NULL, NULL, NULL},
397
	{"( 1.3.6.1.4.1.1466.115.121.1.20 DESC 'DSE Type' )",
398
		0, NULL, NULL, NULL},
399
	{"( 1.3.6.1.4.1.1466.115.121.1.21 DESC 'Enhanced Guide' )",
400
		0, NULL, NULL, NULL},
401
	{"( 1.3.6.1.4.1.1466.115.121.1.22 DESC 'Facsimile Telephone Number' )",
402
		0, blobValidate, NULL, NULL},
403
404
	{"( 1.3.6.1.4.1.1466.115.121.1.23 DESC 'Fax' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
405
	{"( 1.3.6.1.4.1.1466.115.121.1.24 DESC 'Generalized Time' )",
406
		0, NULL, NULL, NULL},
407
	{"( 1.3.6.1.4.1.1466.115.121.1.25 DESC 'Guide' )",
408
		0, NULL, NULL, NULL},
409
	{"( 1.3.6.1.4.1.1466.115.121.1.26 DESC 'IA5 String' )",
410
		0, IA5StringValidate, NULL, NULL},
411
	{"( 1.3.6.1.4.1.1466.115.121.1.27 DESC 'Integer' )",
412
		0, integerValidate, NULL, NULL},
413
414
	{"( 1.3.6.1.4.1.1466.115.121.1.28 DESC 'JPEG' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
415
	{"( 1.3.6.1.4.1.1466.115.121.1.29 DESC 'Master And Shadow Access Points' )",
416
		0, NULL, NULL, NULL},
417
	{"( 1.3.6.1.4.1.1466.115.121.1.30 DESC 'Matching Rule Description' )",
418
		0, NULL, NULL, NULL},
419
	{"( 1.3.6.1.4.1.1466.115.121.1.31 DESC 'Matching Rule Use Description' )",
420
		0, NULL, NULL, NULL},
421
	{"( 1.3.6.1.4.1.1466.115.121.1.32 DESC 'Mail Preference' )",
422
		0, NULL, NULL, NULL},
423
	{"( 1.3.6.1.4.1.1466.115.121.1.33 DESC 'MHS OR Address' )",
424
		0, NULL, NULL, NULL},
425
	{"( 1.3.6.1.4.1.1466.115.121.1.34 DESC 'Name And Optional UID' )",
426
		0, NULL, NULL, NULL},
427
	{"( 1.3.6.1.4.1.1466.115.121.1.35 DESC 'Name Form Description' )",
428
		0, NULL, NULL, NULL},
429
430
431
	{"( 1.3.6.1.4.1.1466.115.121.1.36 DESC 'Numeric String' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.37 DESC 'Object Class Description' )",
432
		0, NULL, NULL, NULL},
433
	{"( 1.3.6.1.4.1.1466.115.121.1.38 DESC 'OID' )",
434
		0, oidValidate, NULL, NULL},
435
	{"( 1.3.6.1.4.1.1466.115.121.1.39 DESC 'Other Mailbox' )",
436
		0, NULL, NULL, NULL},
437
	{"( 1.3.6.1.4.1.1466.115.121.1.40 DESC 'Octet String' )",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
438
		0, blobValidate, NULL, NULL},
439
	{"( 1.3.6.1.4.1.1466.115.121.1.41 DESC 'Postal Address' )",
440
		0, blobValidate, NULL, NULL},
441
	{"( 1.3.6.1.4.1.1466.115.121.1.42 DESC 'Protocol Information' )",
442
		0, NULL, NULL, NULL},
443
	{"( 1.3.6.1.4.1.1466.115.121.1.43 DESC 'Presentation Address' )",
444
		0, NULL, NULL, NULL},
445
	{"( 1.3.6.1.4.1.1466.115.121.1.44 DESC 'Printable String' )",
446
		0, printableStringValidate, NULL, NULL},
447
448
449
	{"( 1.3.6.1.4.1.1466.115.121.1.49 DESC 'Supported Algorithm' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
450
	{"( 1.3.6.1.4.1.1466.115.121.1.50 DESC 'Telephone Number' )",
451
		0, blobValidate, NULL, NULL},
452
453
454
455
456
	{"( 1.3.6.1.4.1.1466.115.121.1.51 DESC 'Teletex Terminal Identifier' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.52 DESC 'Telex Number' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.53 DESC 'UTC Time' )",
457
		0, NULL, NULL, NULL},
458
	{"( 1.3.6.1.4.1.1466.115.121.1.54 DESC 'LDAP Syntax Description' )",
459
		0, NULL, NULL, NULL},
460
	{"( 1.3.6.1.4.1.1466.115.121.1.55 DESC 'Modify Rights' )",
461
		0, NULL, NULL, NULL},
462
	{"( 1.3.6.1.4.1.1466.115.121.1.56 DESC 'LDAP Schema Definition' )",
463
		0, NULL, NULL, NULL},
464
	{"( 1.3.6.1.4.1.1466.115.121.1.57 DESC 'LDAP Schema Description' )",
465
		0, NULL, NULL, NULL},
466
	{"( 1.3.6.1.4.1.1466.115.121.1.58 DESC 'Substring Assertion' )",
467
		0, NULL, NULL, NULL},
468

469
	/* OpenLDAP Experimental Syntaxes */
470
	{"( " SLAPD_OID_ACI_SYNTAX " DESC 'OpenLDAP Experimental ACI' )",
471
472
		0, NULL, NULL, NULL},

473
	{NULL, 0, NULL, NULL, NULL}
474
475
476
};

struct mrule_defs_rec {
477
	char *						mrd_desc;
478
	unsigned					mrd_usage;
479
480
481
482
483
	slap_mr_convert_func *		mrd_convert;
	slap_mr_normalize_func *	mrd_normalize;
	slap_mr_match_func *		mrd_match;
	slap_mr_indexer_func *		mrd_indexer;
	slap_mr_filter_func *		mrd_filter;
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
};

/*
 * Other matching rules in X.520 that we do not use:
 *
 * 2.5.13.9		numericStringOrderingMatch
 * 2.5.13.13	booleanMatch
 * 2.5.13.15	integerOrderingMatch
 * 2.5.13.18	octetStringOrderingMatch
 * 2.5.13.19	octetStringSubstringsMatch
 * 2.5.13.25	uTCTimeMatch
 * 2.5.13.26	uTCTimeOrderingMatch
 * 2.5.13.31	directoryStringFirstComponentMatch
 * 2.5.13.32	wordMatch
 * 2.5.13.33	keywordMatch
 * 2.5.13.34	certificateExactMatch
 * 2.5.13.35	certificateMatch
 * 2.5.13.36	certificatePairExactMatch
 * 2.5.13.37	certificatePairMatch
 * 2.5.13.38	certificateListExactMatch
 * 2.5.13.39	certificateListMatch
 * 2.5.13.40	algorithmIdentifierMatch
 * 2.5.13.41	storedPrefixMatch
 * 2.5.13.42	attributeCertificateMatch
 * 2.5.13.43	readerAndKeyIDMatch
 * 2.5.13.44	attributeIntegrityMatch
 */

/* recycled matching functions */
#define caseIgnoreMatch caseIgnoreIA5Match
#define caseExactMatch caseExactIA5Match

/* unimplemented matching functions */
#define objectIdentifierMatch NULL
#define distinguishedNameMatch NULL
#define caseIgnoreOrderingMatch NULL
#define caseIgnoreSubstringsMatch NULL
#define caseExactOrderingMatch NULL
#define caseExactSubstringsMatch NULL
#define numericStringMatch NULL
#define numericStringSubstringsMatch NULL
#define caseIgnoreListMatch NULL
Kurt Zeilenga's avatar
Kurt Zeilenga committed
526
#define caseIgnoreListSubstringsMatch NULL
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
#define integerMatch NULL
#define bitStringMatch NULL
#define octetStringMatch NULL
#define telephoneNumberMatch NULL
#define telephoneNumberSubstringsMatch NULL
#define presentationAddressMatch NULL
#define uniqueMemberMatch NULL
#define protocolInformationMatch NULL
#define generalizedTimeMatch NULL
#define generalizedTimeOrderingMatch NULL
#define integerFirstComponentMatch NULL
#define objectIdentifierFirstComponentMatch NULL
#define caseIgnoreIA5SubstringsMatch NULL

struct mrule_defs_rec mrule_defs[] = {
	{"( 2.5.13.0 NAME 'objectIdentifierMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
544
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
545
		NULL, NULL, objectIdentifierMatch, NULL, NULL},
546
547
548

	{"( 2.5.13.1 NAME 'distinguishedNameMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )",
549
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
550
		NULL, NULL, distinguishedNameMatch, NULL, NULL},
551
552
553

	{"( 2.5.13.2 NAME 'caseIgnoreMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
554
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
555
		NULL, UTF8StringNormalize, caseIgnoreMatch, NULL, NULL},
556
557
558

	{"( 2.5.13.3 NAME 'caseIgnoreOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
559
		SLAP_MR_ORDERING,
560
		NULL, UTF8StringNormalize, caseIgnoreOrderingMatch, NULL, NULL},
561
562
563

	{"( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
564
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
565
		NULL, UTF8StringNormalize, caseIgnoreSubstringsMatch, NULL, NULL},
566
567
568
569

	/* Next three are not in the RFC's, but are needed for compatibility */
	{"( 2.5.13.5 NAME 'caseExactMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
570
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
571
		NULL, UTF8StringNormalize, caseExactMatch, NULL, NULL},
572
573
574

	{"( 2.5.13.6 NAME 'caseExactOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
575
		SLAP_MR_ORDERING,
576
		NULL, UTF8StringNormalize, caseExactOrderingMatch, NULL, NULL},
577
578
579

	{"( 2.5.13.7 NAME 'caseExactSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
580
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
581
		NULL, UTF8StringNormalize, caseExactSubstringsMatch, NULL, NULL},
582
583
584

	{"( 2.5.13.8 NAME 'numericStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.36 )",
585
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
586
		NULL, NULL, numericStringMatch, NULL, NULL},
587
588
589

	{"( 2.5.13.10 NAME 'numericStringSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
590
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
591
		NULL, NULL, numericStringSubstringsMatch, NULL, NULL},
592
593
594

	{"( 2.5.13.11 NAME 'caseIgnoreListMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )",
595
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
596
		NULL, NULL, caseIgnoreListMatch, NULL, NULL},
597

Kurt Zeilenga's avatar
Kurt Zeilenga committed
598
599
600
601
602
	{"( 2.5.13.12 NAME 'caseIgnoreListSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
		NULL, NULL, caseIgnoreListSubstringsMatch, NULL, NULL},

603
604
	{"( 2.5.13.14 NAME 'integerMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
605
		SLAP_MR_NONE | SLAP_MR_EXT,
606
		NULL, NULL, integerMatch, NULL, NULL},
607
608
609

	{"( 2.5.13.16 NAME 'bitStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )",
610
		SLAP_MR_NONE | SLAP_MR_EXT,
611
		NULL, NULL, bitStringMatch, NULL, NULL},
612
613
614

	{"( 2.5.13.17 NAME 'octetStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )",
615
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
616
		NULL, NULL, octetStringMatch, NULL, NULL},
617
618
619

	{"( 2.5.13.20 NAME 'telephoneNumberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.50 )",
620
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
621
		NULL, NULL, telephoneNumberMatch, NULL, NULL},
622
623
624

	{"( 2.5.13.21 NAME 'telephoneNumberSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
625
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
626
		NULL, NULL, telephoneNumberSubstringsMatch, NULL, NULL},
627
628
629

	{"( 2.5.13.22 NAME 'presentationAddressMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.43 )",
630
		SLAP_MR_NONE | SLAP_MR_EXT,
631
		NULL, NULL, presentationAddressMatch, NULL, NULL},
632
633
634

	{"( 2.5.13.23 NAME 'uniqueMemberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )",
635
		SLAP_MR_NONE | SLAP_MR_EXT,
636
		NULL, NULL, uniqueMemberMatch, NULL, NULL},
637
638
639

	{"( 2.5.13.24 NAME 'protocolInformationMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.42 )",
640
		SLAP_MR_NONE | SLAP_MR_EXT,
641
		NULL, NULL, protocolInformationMatch, NULL, NULL},
642
643
644

	{"( 2.5.13.27 NAME 'generalizedTimeMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
645
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
646
		NULL, NULL, generalizedTimeMatch, NULL, NULL},
647
648
649

	{"( 2.5.13.28 NAME 'generalizedTimeOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
650
		SLAP_MR_ORDERING,
651
		NULL, NULL, generalizedTimeOrderingMatch, NULL, NULL},
652
653
654

	{"( 2.5.13.29 NAME 'integerFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
655
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
656
		NULL, NULL, integerFirstComponentMatch, NULL, NULL},
657
658
659

	{"( 2.5.13.30 NAME 'objectIdentifierFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
660
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
661
		NULL, NULL, objectIdentifierFirstComponentMatch, NULL, NULL},
662
663
664

	{"( 1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
665
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
666
		NULL, IA5StringNormalize, caseExactIA5Match, NULL, NULL},
667
668
669

	{"( 1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
670
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
671
		NULL, IA5StringNormalize, caseIgnoreIA5Match, NULL, NULL},
672
673
674

	{"( 1.3.6.1.4.1.1466.109.114.3 NAME 'caseIgnoreIA5SubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
675
		SLAP_MR_SUBSTR,
676
		NULL, IA5StringNormalize, caseIgnoreIA5SubstringsMatch, NULL, NULL},
677

678
	{NULL, SLAP_MR_NONE, NULL, NULL, NULL}
679
680
};

681
682
static int schema_init_done = 0;

683
684
685
686
687
688
int
schema_init( void )
{
	int		res;
	int		i;

689
690
	/* we should only be called once (from main) */
	assert( schema_init_done == 0 );
691
692
693

	for ( i=0; syntax_defs[i].sd_desc != NULL; i++ ) {
		res = register_syntax( syntax_defs[i].sd_desc,
694
		    syntax_defs[i].sd_flags,
695
696
697
698
699
700
701
		    syntax_defs[i].sd_validate,
		    syntax_defs[i].sd_ber2str,
			syntax_defs[i].sd_str2ber );

		if ( res ) {
			fprintf( stderr, "schema_init: Error registering syntax %s\n",
				 syntax_defs[i].sd_desc );
702
			return -1;
703
704
705
706
		}
	}

	for ( i=0; mrule_defs[i].mrd_desc != NULL; i++ ) {
707
708
709
710
711
712
713
		if( mrule_defs[i].mrd_usage == SLAP_MR_NONE ) {
			fprintf( stderr,
				"schema_init: Ingoring unusable matching rule %s\n",
				 mrule_defs[i].mrd_desc );
			continue;
		}

714
715
		res = register_matching_rule(
			mrule_defs[i].mrd_desc,
716
			mrule_defs[i].mrd_usage,
717
718
			mrule_defs[i].mrd_convert,
			mrule_defs[i].mrd_normalize,
719
720
721
		    mrule_defs[i].mrd_match,
			mrule_defs[i].mrd_indexer,
			mrule_defs[i].mrd_filter );
722
723
724
725
726

		if ( res ) {
			fprintf( stderr,
				"schema_init: Error registering matching rule %s\n",
				 mrule_defs[i].mrd_desc );
727
			return -1;
728
729
730
731
732
		}
	}
	schema_init_done = 1;
	return( 0 );
}
733
734

#ifdef SLAPD_SCHEMA_NOT_COMPAT
735
736
struct slap_internal_schema slap_schema;

737
738
739
740
741
742
743
744
745
struct slap_schema_oc_map {
	char *ssom_name;
	size_t ssom_offset;
} oc_map[] = {
	{ "alias", offsetof(struct slap_internal_schema, si_oc_alias) },
	{ "referral", offsetof(struct slap_internal_schema, si_oc_referral) },
	{ NULL, 0 }
};

746
struct slap_schema_ad_map {
747
	char *ssam_name;
748
	slap_mr_match_func *ssam_match;
749
750
	size_t ssam_offset;
} ad_map[] = {
751
	{ "objectClass", objectClassMatch,
752
753
		offsetof(struct slap_internal_schema, si_ad_objectClass) },

754
	{ "creatorsName", NULL,
755
		offsetof(struct slap_internal_schema, si_ad_creatorsName) },
756
	{ "createTimestamp", NULL,
757
		offsetof(struct slap_internal_schema, si_ad_createTimestamp) },
758
	{ "modifiersName", NULL,
759
		offsetof(struct slap_internal_schema, si_ad_modifiersName) },
760
	{ "modifyTimestamp", NULL,
761
		offsetof(struct slap_internal_schema, si_ad_modifyTimestamp) },
762

763
	{ "subschemaSubentry", NULL,
764
765
		offsetof(struct slap_internal_schema, si_ad_subschemaSubentry) },

766
	{ "namingContexts", NULL,
767
		offsetof(struct slap_internal_schema, si_ad_namingContexts) },
768
	{ "supportedControl", NULL,
769
		offsetof(struct slap_internal_schema, si_ad_supportedControl) },
770
	{ "supportedExtension", NULL,
771
		offsetof(struct slap_internal_schema, si_ad_supportedExtension) },
772
	{ "supportedLDAPVersion", NULL,
773
		offsetof(struct slap_internal_schema, si_ad_supportedLDAPVersion) },
774
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND
775
	{ "supportedACIMechanisms", NULL,
776
777
778
		offsetof(struct slap_internal_schema, si_ad_supportedACIMechanisms) },

#endif
779
	{ "supportedSASLMechanisms", NULL,
780
781
		offsetof(struct slap_internal_schema, si_ad_supportedSASLMechanisms) },

782
	{ "attributeTypes", NULL,
783
		offsetof(struct slap_internal_schema, si_ad_attributeTypes) },
784
	{ "ldapSyntaxes", NULL,
785
		offsetof(struct slap_internal_schema, si_ad_ldapSyntaxes) },
786
	{ "matchingRules", NULL,
787
		offsetof(struct slap_internal_schema, si_ad_matchingRules) },
788
	{ "objectClasses", NULL,
789
790
		offsetof(struct slap_internal_schema, si_ad_objectClasses) },

791
	{ "ref", NULL,
792
793
		offsetof(struct slap_internal_schema, si_ad_ref) },

794
	{ "entry", NULL,
795
		offsetof(struct slap_internal_schema, si_ad_entry) },
796
	{ "children", NULL,
797
		offsetof(struct slap_internal_schema, si_ad_children) },
798

799
	{ "userPassword", NULL,
800
		offsetof(struct slap_internal_schema, si_ad_userPassword) },
801
	{ "authPassword", NULL,
802
803
		offsetof(struct slap_internal_schema, si_ad_authPassword) },
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND
804
	{ "krbName", NULL,
805
806
807
		offsetof(struct slap_internal_schema, si_ad_krbName) },
#endif

808
	{ NULL, NULL, 0 }
809
810
};

811
812
813
814
815
816
#endif

int
schema_prep( void )
{
#ifdef SLAPD_SCHEMA_NOT_COMPAT
817
	int i;
818
819
820
821
822
#endif
	/* we should only be called once after schema_init() was called */
	assert( schema_init_done == 1 );

#ifdef SLAPD_SCHEMA_NOT_COMPAT
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
	for( i=0; oc_map[i].ssom_name; i++ ) {
		ObjectClass ** ocp = (ObjectClass **)
			&(((char *) &slap_schema)[oc_map[i].ssom_offset]);

		*ocp = oc_find( oc_map[i].ssom_name );

		if( *ocp == NULL ) {
			fprintf( stderr,
				"No objectClass \"%s\" defined in schema\n",
				oc_map[i].ssom_name );
			return LDAP_OBJECT_CLASS_VIOLATION;
		}
	}

	for( i=0; ad_map[i].ssam_name; i++ ) {
Kurt Zeilenga's avatar
Kurt Zeilenga committed
838
		int rc;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
839
		const char *text;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
840
841

		AttributeDescription ** adp = (AttributeDescription **)
842
			&(((char *) &slap_schema)[ad_map[i].ssam_offset]);
Kurt Zeilenga's avatar
Kurt Zeilenga committed
843
844
845

		*adp = NULL;

846
		rc = slap_str2ad( ad_map[i].ssam_name, adp, &text );
847

848
849
850
		if( rc != LDAP_SUCCESS ) {
			fprintf( stderr,
				"No attribute \"%s\" defined in schema\n",
851
				ad_map[i].ssam_name );
852
853
			return rc;
		}
854
855
856
857
858

		if( ad_map[i].ssam_match ) {
			/* install custom matching routine */
			(*adp)->ad_type->sat_equality->smr_match = ad_map[i].ssam_match;
		}
859
860
861
862
863
864
	}
#endif

	++schema_init_done;
	return 0;
}