schema_init.c 22.9 KB
Newer Older
1
2
3
/* schema_init.c - init builtin schema */
/* $OpenLDAP$ */
/*
Kurt Zeilenga's avatar
Kurt Zeilenga committed
4
 * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
 */

#include "portable.h"

#include <stdio.h>

#include <ac/ctype.h>
#include <ac/string.h>
#include <ac/socket.h>

#include "slap.h"
#include "ldap_pvt.h"

19
#define berValidate blobValidate
20
static int
21
blobValidate(
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
	Syntax *syntax,
	struct berval *in )
{
	/* any value allowed */
	return 0;
}

static int
UTF8StringValidate(
	Syntax *syntax,
	struct berval *in )
{
	ber_len_t count;
	int len;
	unsigned char *u = in->bv_val;

38
	for( count = in->bv_len; count > 0; count-=len, u+=len ) {
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
		/* get the length indicated by the first byte */
		len = LDAP_UTF8_CHARLEN( u );

		/* should not be zero */
		if( len == 0 ) return -1;

		/* make sure len corresponds with the offset
			to the next character */
		if( LDAP_UTF8_OFFSET( u ) != len ) return -1;
	}

	if( count != 0 ) return -1;

	return 0;
}

static int
UTF8StringNormalize(
57
	unsigned use,
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q, *s;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( ldap_utf8_isspace( p ) ) {
		LDAP_UTF8_INCR( p );
	}

	if( *p ) {
		ch_free( newval );
		return 1;
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;
	s = NULL;

	while ( *p ) {
		int len;

		if ( ldap_utf8_isspace( p ) ) {
			len = LDAP_UTF8_COPY(q,p);
			s=q;
			p+=len;
			q+=len;

			/* Ignore the extra whitespace */
			while ( ldap_utf8_isspace( p ) ) {
				LDAP_UTF8_INCR( p );
			}
		} else {
			len = LDAP_UTF8_COPY(q,p);
			s=NULL;
			p+=len;
			q+=len;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !ldap_utf8_isspace(newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( s != NULL ) {
		q = s;
	}

	/* cannot end with a space */
	assert( !ldap_utf8_isspace( LDAP_UTF8_PREV(q) ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
129
	*normalized = newval;
130
131
132
133

	return 0;
}

134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
static int
oidValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	if( val->bv_len == 0 ) return 0;

	if( isdigit(val->bv_val[0]) ) {
		int dot = 0;
		for(i=1; i < val->bv_len; i++) {
			if( val->bv_val[i] == '.' ) {
				if( dot++ ) return 1;
			} else if ( isdigit(val->bv_val[i]) ) {
				dot = 0;
			} else {
				return 1;
			}
		}

		return !dot ? 0 : 1;

	} else if( isalpha(val->bv_val[0]) ) {
		for(i=1; i < val->bv_len; i++) {
			if( !isalpha(val->bv_val[i] ) ) {
				return 1;
			}
		}

		return 0;
	}
	
	return 1;
}

170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
static int
integerValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
		if( !isdigit(val->bv_val[i]) ) return -1;
	}

	return 0;
}

static int
printableStringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
		if( !isprint(val->bv_val[i]) ) return -1;
	}

	return 0;
}

198
static int
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
IA5StringValidate(
	Syntax *syntax,
	struct berval *val )
{
	ber_len_t i;

	for(i=0; i < val->bv_len; i++) {
		if( !isascii(val->bv_val[i]) ) return -1;
	}

	return 0;
}

static int
IA5StringConvert(
	Syntax *syntax,
	struct berval *in,
	struct berval **out )
{
218
219
	ldap_unicode_t *u;
	ber_len_t i, len = in->bv_len;
220
221
	struct berval *bv = ch_malloc( sizeof(struct berval) );

222
223
224
225
	bv->bv_len = len * sizeof( ldap_unicode_t );
	bv->bv_val = (char *) u = ch_malloc( bv->bv_len + sizeof( ldap_unicode_t ) );;

	for(i=0; i < len; i++ ) {
226
227
228
229
		/*
		 * IA5StringValidate should have been called to ensure
		 * input is limited to IA5.
		 */
230
		u[i] = in->bv_val[i];
231
	}
232
	u[i] = 0;
233
234
235
236
237
238
239

	*out = bv;
	return 0;
}

static int
IA5StringNormalize(
240
	unsigned use,
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *val,
	struct berval **normalized )
{
	struct berval *newval;
	char *p, *q;

	newval = ch_malloc( sizeof( struct berval ) );

	p = val->bv_val;

	/* Ignore initial whitespace */
	while ( isspace( *p++ ) ) {
		/* EMPTY */  ;
	}

	if( *p ) {
		ch_free( newval );
		return 1;
	}

	newval->bv_val = ch_strdup( p );
	p = q = newval->bv_val;

	while ( *p ) {
		if ( isspace( *p ) ) {
			*q++ = *p++;

			/* Ignore the extra whitespace */
			while ( isspace( *p++ ) ) {
				/* EMPTY */  ;
			}
		} else {
			*q++ = *p++;
		}
	}

	assert( *newval->bv_val );
	assert( newval->bv_val < p );
	assert( p <= q );

	/* cannot start with a space */
	assert( !isspace(*newval->bv_val) );

	/*
	 * If the string ended in space, backup the pointer one
	 * position.  One is enough because the above loop collapsed
	 * all whitespace to a single space.
	 */

	if ( isspace( q[-1] ) ) {
		--q;
	}

	/* cannot end with a space */
	assert( !isspace( q[-1] ) );

	/* null terminate */
	*q = '\0';

	newval->bv_len = q - newval->bv_val;
303
	*normalized = newval;
304
305
306
307
308
309

	return 0;
}

static int
caseExactIA5Match(
310
	int *match,
311
	unsigned use,
312
313
314
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
315
	void *assertedValue )
316
{
317
	*match = strcmp( value->bv_val,
318
		((struct berval *) assertedValue)->bv_val );
319
	return LDAP_SUCCESS;
320
321
322
323
}

static int
caseIgnoreIA5Match(
324
	int *match,
325
	unsigned use,
326
327
328
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
329
	void *assertedValue )
330
{
331
	*match = strcasecmp( value->bv_val,
332
		((struct berval *) assertedValue)->bv_val );
333
	return LDAP_SUCCESS;
334
335
}

336
337
static int
objectClassMatch(
338
	int *match,
339
340
341
342
343
344
345
346
347
	unsigned use,
	Syntax *syntax,
	MatchingRule *mr,
	struct berval *value,
	void *assertedValue )
{
	ObjectClass *oc = oc_find( value->bv_val );
	ObjectClass *asserted = oc_find( ((struct berval *) assertedValue)->bv_val );

348
349
	*match = ( oc == NULL || oc != asserted );
	return LDAP_SUCCESS;
350
351
}

352
353
struct syntax_defs_rec {
	char *sd_desc;
354
	int sd_flags;
355
356
357
358
359
	slap_syntax_validate_func *sd_validate;
	slap_syntax_transform_func *sd_ber2str;
	slap_syntax_transform_func *sd_str2ber;
};

360
361
#define X_BINARY "X-BINARY-TRANSFER-REQUIRED 'TRUE' "
#define X_NOT_H_R "X-NOT-HUMAN-READABLE 'TRUE' "
362

363
struct syntax_defs_rec syntax_defs[] = {
364
365
366
367
	{"( 1.3.6.1.4.1.1466.115.121.1.1 DESC 'ACI Item' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.2 DESC 'Access Point' " X_NOT_H_R ")",
		0, NULL, NULL, NULL},
368
	{"( 1.3.6.1.4.1.1466.115.121.1.3 DESC 'Attribute Type Description' )",
369
		0, NULL, NULL, NULL},
370
371
372
373
	{"( 1.3.6.1.4.1.1466.115.121.1.4 DESC 'Audio' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, blobValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.5 DESC 'Binary' " X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BER, berValidate, NULL, NULL},
374
	{"( 1.3.6.1.4.1.1466.115.121.1.6 DESC 'Bit String' )",
375
		0, NULL, NULL, NULL},
376
	{"( 1.3.6.1.4.1.1466.115.121.1.7 DESC 'Boolean' )",
377
		0, NULL, NULL, NULL},
378
379
380
381
382
383
	{"( 1.3.6.1.4.1.1466.115.121.1.8 DESC 'Certificate' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.9 DESC 'Certificate List' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
Kurt Zeilenga's avatar
Kurt Zeilenga committed
384
385
	{"( 1.3.6.1.4.1.1466.115.121.1.10 DESC 'Certificate Pair' "
		X_BINARY X_NOT_H_R ")",
386
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
387
388
	{"( 1.3.6.1.4.1.1466.115.121.1.11 DESC 'Country String' )",
		0, NULL, NULL, NULL},
389
	{"( 1.3.6.1.4.1.1466.115.121.1.12 DESC 'DN' )",
390
		0, blobValidate, NULL, NULL},
391
	{"( 1.3.6.1.4.1.1466.115.121.1.13 DESC 'Data Quality' )",
392
		0, NULL, NULL, NULL},
393
	{"( 1.3.6.1.4.1.1466.115.121.1.14 DESC 'Delivery Method' )",
394
		0, NULL, NULL, NULL},
395
	{"( 1.3.6.1.4.1.1466.115.121.1.15 DESC 'Directory String' )",
396
		0, UTF8StringValidate, NULL, NULL},
397
	{"( 1.3.6.1.4.1.1466.115.121.1.16 DESC 'DIT Content Rule Description' )",
398
		0, NULL, NULL, NULL},
399
	{"( 1.3.6.1.4.1.1466.115.121.1.17 DESC 'DIT Structure Rule Description' )",
400
		0, NULL, NULL, NULL},
401
	{"( 1.3.6.1.4.1.1466.115.121.1.19 DESC 'DSA Quality' )",
402
		0, NULL, NULL, NULL},
403
	{"( 1.3.6.1.4.1.1466.115.121.1.20 DESC 'DSE Type' )",
404
		0, NULL, NULL, NULL},
405
	{"( 1.3.6.1.4.1.1466.115.121.1.21 DESC 'Enhanced Guide' )",
406
		0, NULL, NULL, NULL},
407
	{"( 1.3.6.1.4.1.1466.115.121.1.22 DESC 'Facsimile Telephone Number' )",
408
		0, blobValidate, NULL, NULL},
409
410
	{"( 1.3.6.1.4.1.1466.115.121.1.23 DESC 'Fax' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
411
	{"( 1.3.6.1.4.1.1466.115.121.1.24 DESC 'Generalized Time' )",
412
		0, NULL, NULL, NULL},
413
	{"( 1.3.6.1.4.1.1466.115.121.1.25 DESC 'Guide' )",
414
		0, NULL, NULL, NULL},
415
	{"( 1.3.6.1.4.1.1466.115.121.1.26 DESC 'IA5 String' )",
416
		0, IA5StringValidate, NULL, NULL},
417
	{"( 1.3.6.1.4.1.1466.115.121.1.27 DESC 'Integer' )",
418
		0, integerValidate, NULL, NULL},
419
420
	{"( 1.3.6.1.4.1.1466.115.121.1.28 DESC 'JPEG' " X_NOT_H_R ")",
		SLAP_SYNTAX_BLOB, NULL, NULL, NULL},
421
	{"( 1.3.6.1.4.1.1466.115.121.1.29 DESC 'Master And Shadow Access Points' )",
422
		0, NULL, NULL, NULL},
423
	{"( 1.3.6.1.4.1.1466.115.121.1.30 DESC 'Matching Rule Description' )",
424
		0, NULL, NULL, NULL},
425
	{"( 1.3.6.1.4.1.1466.115.121.1.31 DESC 'Matching Rule Use Description' )",
426
		0, NULL, NULL, NULL},
427
	{"( 1.3.6.1.4.1.1466.115.121.1.32 DESC 'Mail Preference' )",
428
		0, NULL, NULL, NULL},
429
	{"( 1.3.6.1.4.1.1466.115.121.1.33 DESC 'MHS OR Address' )",
430
		0, NULL, NULL, NULL},
431
	{"( 1.3.6.1.4.1.1466.115.121.1.34 DESC 'Name And Optional UID' )",
432
		0, NULL, NULL, NULL},
433
	{"( 1.3.6.1.4.1.1466.115.121.1.35 DESC 'Name Form Description' )",
434
		0, NULL, NULL, NULL},
435
436
437
	{"( 1.3.6.1.4.1.1466.115.121.1.36 DESC 'Numeric String' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.37 DESC 'Object Class Description' )",
438
		0, NULL, NULL, NULL},
439
	{"( 1.3.6.1.4.1.1466.115.121.1.38 DESC 'OID' )",
440
		0, oidValidate, NULL, NULL},
441
	{"( 1.3.6.1.4.1.1466.115.121.1.39 DESC 'Other Mailbox' )",
442
		0, NULL, NULL, NULL},
443
	{"( 1.3.6.1.4.1.1466.115.121.1.40 DESC 'Octet String' )",
Kurt Zeilenga's avatar
Kurt Zeilenga committed
444
		0, blobValidate, NULL, NULL},
445
	{"( 1.3.6.1.4.1.1466.115.121.1.41 DESC 'Postal Address' )",
446
		0, blobValidate, NULL, NULL},
447
	{"( 1.3.6.1.4.1.1466.115.121.1.42 DESC 'Protocol Information' )",
448
		0, NULL, NULL, NULL},
449
	{"( 1.3.6.1.4.1.1466.115.121.1.43 DESC 'Presentation Address' )",
450
		0, NULL, NULL, NULL},
451
	{"( 1.3.6.1.4.1.1466.115.121.1.44 DESC 'Printable String' )",
452
		0, printableStringValidate, NULL, NULL},
453
454
455
	{"( 1.3.6.1.4.1.1466.115.121.1.49 DESC 'Supported Algorithm' "
		X_BINARY X_NOT_H_R ")",
		SLAP_SYNTAX_BINARY|SLAP_SYNTAX_BER, berValidate, NULL, NULL},
456
	{"( 1.3.6.1.4.1.1466.115.121.1.50 DESC 'Telephone Number' )",
457
		0, blobValidate, NULL, NULL},
458
459
460
461
462
	{"( 1.3.6.1.4.1.1466.115.121.1.51 DESC 'Teletex Terminal Identifier' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.52 DESC 'Telex Number' )",
		0, NULL, NULL, NULL},
	{"( 1.3.6.1.4.1.1466.115.121.1.53 DESC 'UTC Time' )",
463
		0, NULL, NULL, NULL},
464
	{"( 1.3.6.1.4.1.1466.115.121.1.54 DESC 'LDAP Syntax Description' )",
465
		0, NULL, NULL, NULL},
466
	{"( 1.3.6.1.4.1.1466.115.121.1.55 DESC 'Modify Rights' )",
467
		0, NULL, NULL, NULL},
468
	{"( 1.3.6.1.4.1.1466.115.121.1.56 DESC 'LDAP Schema Definition' )",
469
		0, NULL, NULL, NULL},
470
	{"( 1.3.6.1.4.1.1466.115.121.1.57 DESC 'LDAP Schema Description' )",
471
		0, NULL, NULL, NULL},
472
	{"( 1.3.6.1.4.1.1466.115.121.1.58 DESC 'Substring Assertion' )",
473
		0, NULL, NULL, NULL},
474

475
	/* OpenLDAP Experimental Syntaxes */
476
	{"( " SLAPD_OID_ACI_SYNTAX " DESC 'OpenLDAP Experimental ACI' )",
477
478
		0, NULL, NULL, NULL},

479
	{NULL, 0, NULL, NULL, NULL}
480
481
482
};

struct mrule_defs_rec {
483
	char *						mrd_desc;
484
	unsigned					mrd_usage;
485
486
487
488
489
	slap_mr_convert_func *		mrd_convert;
	slap_mr_normalize_func *	mrd_normalize;
	slap_mr_match_func *		mrd_match;
	slap_mr_indexer_func *		mrd_indexer;
	slap_mr_filter_func *		mrd_filter;
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
};

/*
 * Other matching rules in X.520 that we do not use:
 *
 * 2.5.13.9		numericStringOrderingMatch
 * 2.5.13.13	booleanMatch
 * 2.5.13.15	integerOrderingMatch
 * 2.5.13.18	octetStringOrderingMatch
 * 2.5.13.19	octetStringSubstringsMatch
 * 2.5.13.25	uTCTimeMatch
 * 2.5.13.26	uTCTimeOrderingMatch
 * 2.5.13.31	directoryStringFirstComponentMatch
 * 2.5.13.32	wordMatch
 * 2.5.13.33	keywordMatch
 * 2.5.13.34	certificateExactMatch
 * 2.5.13.35	certificateMatch
 * 2.5.13.36	certificatePairExactMatch
 * 2.5.13.37	certificatePairMatch
 * 2.5.13.38	certificateListExactMatch
 * 2.5.13.39	certificateListMatch
 * 2.5.13.40	algorithmIdentifierMatch
 * 2.5.13.41	storedPrefixMatch
 * 2.5.13.42	attributeCertificateMatch
 * 2.5.13.43	readerAndKeyIDMatch
 * 2.5.13.44	attributeIntegrityMatch
 */

/* recycled matching functions */
#define caseIgnoreMatch caseIgnoreIA5Match
#define caseExactMatch caseExactIA5Match

/* unimplemented matching functions */
#define objectIdentifierMatch NULL
#define distinguishedNameMatch NULL
#define caseIgnoreOrderingMatch NULL
#define caseIgnoreSubstringsMatch NULL
#define caseExactOrderingMatch NULL
#define caseExactSubstringsMatch NULL
#define numericStringMatch NULL
#define numericStringSubstringsMatch NULL
#define caseIgnoreListMatch NULL
Kurt Zeilenga's avatar
Kurt Zeilenga committed
532
#define caseIgnoreListSubstringsMatch NULL
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
#define integerMatch NULL
#define bitStringMatch NULL
#define octetStringMatch NULL
#define telephoneNumberMatch NULL
#define telephoneNumberSubstringsMatch NULL
#define presentationAddressMatch NULL
#define uniqueMemberMatch NULL
#define protocolInformationMatch NULL
#define generalizedTimeMatch NULL
#define generalizedTimeOrderingMatch NULL
#define integerFirstComponentMatch NULL
#define objectIdentifierFirstComponentMatch NULL
#define caseIgnoreIA5SubstringsMatch NULL

struct mrule_defs_rec mrule_defs[] = {
	{"( 2.5.13.0 NAME 'objectIdentifierMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
550
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
551
		NULL, NULL, objectIdentifierMatch, NULL, NULL},
552
553
554

	{"( 2.5.13.1 NAME 'distinguishedNameMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )",
555
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
556
		NULL, NULL, distinguishedNameMatch, NULL, NULL},
557
558
559

	{"( 2.5.13.2 NAME 'caseIgnoreMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
560
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
561
		NULL, UTF8StringNormalize, caseIgnoreMatch, NULL, NULL},
562
563
564

	{"( 2.5.13.3 NAME 'caseIgnoreOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
565
		SLAP_MR_ORDERING,
566
		NULL, UTF8StringNormalize, caseIgnoreOrderingMatch, NULL, NULL},
567
568
569

	{"( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
570
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
571
		NULL, UTF8StringNormalize, caseIgnoreSubstringsMatch, NULL, NULL},
572
573
574
575

	/* Next three are not in the RFC's, but are needed for compatibility */
	{"( 2.5.13.5 NAME 'caseExactMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
576
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
577
		NULL, UTF8StringNormalize, caseExactMatch, NULL, NULL},
578
579
580

	{"( 2.5.13.6 NAME 'caseExactOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )",
581
		SLAP_MR_ORDERING,
582
		NULL, UTF8StringNormalize, caseExactOrderingMatch, NULL, NULL},
583
584
585

	{"( 2.5.13.7 NAME 'caseExactSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
586
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
587
		NULL, UTF8StringNormalize, caseExactSubstringsMatch, NULL, NULL},
588
589
590

	{"( 2.5.13.8 NAME 'numericStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.36 )",
591
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
592
		NULL, NULL, numericStringMatch, NULL, NULL},
593
594
595

	{"( 2.5.13.10 NAME 'numericStringSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
596
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
597
		NULL, NULL, numericStringSubstringsMatch, NULL, NULL},
598
599
600

	{"( 2.5.13.11 NAME 'caseIgnoreListMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.41 )",
601
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
602
		NULL, NULL, caseIgnoreListMatch, NULL, NULL},
603

Kurt Zeilenga's avatar
Kurt Zeilenga committed
604
605
606
607
608
	{"( 2.5.13.12 NAME 'caseIgnoreListSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
		NULL, NULL, caseIgnoreListSubstringsMatch, NULL, NULL},

609
610
	{"( 2.5.13.14 NAME 'integerMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
611
		SLAP_MR_NONE | SLAP_MR_EXT,
612
		NULL, NULL, integerMatch, NULL, NULL},
613
614
615

	{"( 2.5.13.16 NAME 'bitStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.6 )",
616
		SLAP_MR_NONE | SLAP_MR_EXT,
617
		NULL, NULL, bitStringMatch, NULL, NULL},
618
619
620

	{"( 2.5.13.17 NAME 'octetStringMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 )",
621
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
622
		NULL, NULL, octetStringMatch, NULL, NULL},
623
624
625

	{"( 2.5.13.20 NAME 'telephoneNumberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.50 )",
626
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
627
		NULL, NULL, telephoneNumberMatch, NULL, NULL},
628
629
630

	{"( 2.5.13.21 NAME 'telephoneNumberSubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.58 )",
631
		SLAP_MR_SUBSTR | SLAP_MR_EXT,
632
		NULL, NULL, telephoneNumberSubstringsMatch, NULL, NULL},
633
634
635

	{"( 2.5.13.22 NAME 'presentationAddressMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.43 )",
636
		SLAP_MR_NONE | SLAP_MR_EXT,
637
		NULL, NULL, presentationAddressMatch, NULL, NULL},
638
639
640

	{"( 2.5.13.23 NAME 'uniqueMemberMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.34 )",
641
		SLAP_MR_NONE | SLAP_MR_EXT,
642
		NULL, NULL, uniqueMemberMatch, NULL, NULL},
643
644
645

	{"( 2.5.13.24 NAME 'protocolInformationMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.42 )",
646
		SLAP_MR_NONE | SLAP_MR_EXT,
647
		NULL, NULL, protocolInformationMatch, NULL, NULL},
648
649
650

	{"( 2.5.13.27 NAME 'generalizedTimeMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
651
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
652
		NULL, NULL, generalizedTimeMatch, NULL, NULL},
653
654
655

	{"( 2.5.13.28 NAME 'generalizedTimeOrderingMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 )",
656
		SLAP_MR_ORDERING,
657
		NULL, NULL, generalizedTimeOrderingMatch, NULL, NULL},
658
659
660

	{"( 2.5.13.29 NAME 'integerFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 )",
661
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
662
		NULL, NULL, integerFirstComponentMatch, NULL, NULL},
663
664
665

	{"( 2.5.13.30 NAME 'objectIdentifierFirstComponentMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.38 )",
666
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
667
		NULL, NULL, objectIdentifierFirstComponentMatch, NULL, NULL},
668
669
670

	{"( 1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
671
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
672
		NULL, IA5StringNormalize, caseExactIA5Match, NULL, NULL},
673
674
675

	{"( 1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
676
		SLAP_MR_EQUALITY | SLAP_MR_EXT,
677
		NULL, IA5StringNormalize, caseIgnoreIA5Match, NULL, NULL},
678
679
680

	{"( 1.3.6.1.4.1.1466.109.114.3 NAME 'caseIgnoreIA5SubstringsMatch' "
		"SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )",
681
		SLAP_MR_SUBSTR,
682
		NULL, IA5StringNormalize, caseIgnoreIA5SubstringsMatch, NULL, NULL},
683

684
	{NULL, SLAP_MR_NONE, NULL, NULL, NULL}
685
686
};

687
688
static int schema_init_done = 0;

689
690
691
692
693
694
int
schema_init( void )
{
	int		res;
	int		i;

695
696
	/* we should only be called once (from main) */
	assert( schema_init_done == 0 );
697
698
699

	for ( i=0; syntax_defs[i].sd_desc != NULL; i++ ) {
		res = register_syntax( syntax_defs[i].sd_desc,
700
		    syntax_defs[i].sd_flags,
701
702
703
704
705
706
707
		    syntax_defs[i].sd_validate,
		    syntax_defs[i].sd_ber2str,
			syntax_defs[i].sd_str2ber );

		if ( res ) {
			fprintf( stderr, "schema_init: Error registering syntax %s\n",
				 syntax_defs[i].sd_desc );
708
			return -1;
709
710
711
712
		}
	}

	for ( i=0; mrule_defs[i].mrd_desc != NULL; i++ ) {
713
714
715
716
717
718
719
		if( mrule_defs[i].mrd_usage == SLAP_MR_NONE ) {
			fprintf( stderr,
				"schema_init: Ingoring unusable matching rule %s\n",
				 mrule_defs[i].mrd_desc );
			continue;
		}

720
721
		res = register_matching_rule(
			mrule_defs[i].mrd_desc,
722
			mrule_defs[i].mrd_usage,
723
724
			mrule_defs[i].mrd_convert,
			mrule_defs[i].mrd_normalize,
725
726
727
		    mrule_defs[i].mrd_match,
			mrule_defs[i].mrd_indexer,
			mrule_defs[i].mrd_filter );
728
729
730
731
732

		if ( res ) {
			fprintf( stderr,
				"schema_init: Error registering matching rule %s\n",
				 mrule_defs[i].mrd_desc );
733
			return -1;
734
735
736
737
738
		}
	}
	schema_init_done = 1;
	return( 0 );
}
739
740

#ifdef SLAPD_SCHEMA_NOT_COMPAT
741
742
struct slap_internal_schema slap_schema;

743
744
745
746
747
748
749
750
751
struct slap_schema_oc_map {
	char *ssom_name;
	size_t ssom_offset;
} oc_map[] = {
	{ "alias", offsetof(struct slap_internal_schema, si_oc_alias) },
	{ "referral", offsetof(struct slap_internal_schema, si_oc_referral) },
	{ NULL, 0 }
};

752
struct slap_schema_ad_map {
753
	char *ssam_name;
754
	slap_mr_match_func *ssam_match;
755
756
	size_t ssam_offset;
} ad_map[] = {
757
	{ "objectClass", objectClassMatch,
758
759
		offsetof(struct slap_internal_schema, si_ad_objectClass) },

760
	{ "creatorsName", NULL,
761
		offsetof(struct slap_internal_schema, si_ad_creatorsName) },
762
	{ "createTimestamp", NULL,
763
		offsetof(struct slap_internal_schema, si_ad_createTimestamp) },
764
	{ "modifiersName", NULL,
765
		offsetof(struct slap_internal_schema, si_ad_modifiersName) },
766
	{ "modifyTimestamp", NULL,
767
		offsetof(struct slap_internal_schema, si_ad_modifyTimestamp) },
768

769
	{ "subschemaSubentry", NULL,
770
771
		offsetof(struct slap_internal_schema, si_ad_subschemaSubentry) },

772
	{ "namingContexts", NULL,
773
		offsetof(struct slap_internal_schema, si_ad_namingContexts) },
774
	{ "supportedControl", NULL,
775
		offsetof(struct slap_internal_schema, si_ad_supportedControl) },
776
	{ "supportedExtension", NULL,
777
		offsetof(struct slap_internal_schema, si_ad_supportedExtension) },
778
	{ "supportedLDAPVersion", NULL,
779
		offsetof(struct slap_internal_schema, si_ad_supportedLDAPVersion) },
780
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND
781
	{ "supportedACIMechanisms", NULL,
782
783
784
		offsetof(struct slap_internal_schema, si_ad_supportedACIMechanisms) },

#endif
785
	{ "supportedSASLMechanisms", NULL,
786
787
		offsetof(struct slap_internal_schema, si_ad_supportedSASLMechanisms) },

788
	{ "attributeTypes", NULL,
789
		offsetof(struct slap_internal_schema, si_ad_attributeTypes) },
790
	{ "ldapSyntaxes", NULL,
791
		offsetof(struct slap_internal_schema, si_ad_ldapSyntaxes) },
792
	{ "matchingRules", NULL,
793
		offsetof(struct slap_internal_schema, si_ad_matchingRules) },
794
	{ "objectClasses", NULL,
795
796
		offsetof(struct slap_internal_schema, si_ad_objectClasses) },

797
	{ "ref", NULL,
798
799
		offsetof(struct slap_internal_schema, si_ad_ref) },

800
	{ "entry", NULL,
801
		offsetof(struct slap_internal_schema, si_ad_entry) },
802
	{ "children", NULL,
803
		offsetof(struct slap_internal_schema, si_ad_children) },
804

805
	{ "userPassword", NULL,
806
		offsetof(struct slap_internal_schema, si_ad_userPassword) },
807
	{ "authPassword", NULL,
808
809
		offsetof(struct slap_internal_schema, si_ad_authPassword) },
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND
810
	{ "krbName", NULL,
811
812
813
		offsetof(struct slap_internal_schema, si_ad_krbName) },
#endif

814
	{ NULL, NULL, 0 }
815
816
};

817
818
819
820
821
822
#endif

int
schema_prep( void )
{
#ifdef SLAPD_SCHEMA_NOT_COMPAT
823
	int i;
824
825
826
827
828
#endif
	/* we should only be called once after schema_init() was called */
	assert( schema_init_done == 1 );

#ifdef SLAPD_SCHEMA_NOT_COMPAT
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
	for( i=0; oc_map[i].ssom_name; i++ ) {
		ObjectClass ** ocp = (ObjectClass **)
			&(((char *) &slap_schema)[oc_map[i].ssom_offset]);

		*ocp = oc_find( oc_map[i].ssom_name );

		if( *ocp == NULL ) {
			fprintf( stderr,
				"No objectClass \"%s\" defined in schema\n",
				oc_map[i].ssom_name );
			return LDAP_OBJECT_CLASS_VIOLATION;
		}
	}

	for( i=0; ad_map[i].ssam_name; i++ ) {
Kurt Zeilenga's avatar
Kurt Zeilenga committed
844
		int rc;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
845
		const char *text;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
846
847

		AttributeDescription ** adp = (AttributeDescription **)
848
			&(((char *) &slap_schema)[ad_map[i].ssam_offset]);
Kurt Zeilenga's avatar
Kurt Zeilenga committed
849
850
851

		*adp = NULL;

852
		rc = slap_str2ad( ad_map[i].ssam_name, adp, &text );
853

854
855
856
		if( rc != LDAP_SUCCESS ) {
			fprintf( stderr,
				"No attribute \"%s\" defined in schema\n",
857
				ad_map[i].ssam_name );
858
859
			return rc;
		}
860
861
862
863
864

		if( ad_map[i].ssam_match ) {
			/* install custom matching routine */
			(*adp)->ad_type->sat_equality->smr_match = ad_map[i].ssam_match;
		}
865
866
867
868
869
870
	}
#endif

	++schema_init_done;
	return 0;
}