Skip to content
GitLab
Menu
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
Menu
Open sidebar
openldap
OpenLDAP
Commits
fa9bf235
Commit
fa9bf235
authored
Mar 31, 2003
by
Howard Chu
Browse files
Minor cleanup
parent
2fdbc553
Changes
17
Hide whitespace changes
Inline
Side-by-side
servers/slapd/abandon.c
View file @
fa9bf235
...
...
@@ -103,7 +103,7 @@ do_abandon( Operation *op, SlapReply *rs )
done:
op
->
o
q_abandon
.
rs
_msgid
=
id
;
op
->
o
rn
_msgid
=
id
;
for
(
i
=
0
;
i
<
nbackends
;
i
++
)
{
op
->
o_bd
=
&
backends
[
i
];
...
...
servers/slapd/add.c
View file @
fa9bf235
...
...
@@ -288,7 +288,7 @@ do_add( Operation *op, SlapReply *rs )
}
#endif
/* LDAP_SLAPI */
op
->
o
q_add
.
rs
_e
=
e
;
op
->
o
ra
_e
=
e
;
if
(
(
op
->
o_bd
->
be_add
)(
op
,
rs
)
==
0
)
{
#ifdef SLAPD_MULTIMASTER
if
(
!
repl_user
)
...
...
servers/slapd/backend.c
View file @
fa9bf235
...
...
@@ -650,7 +650,7 @@ be_isroot_pw( Operation *op )
#endif
#endif
result
=
lutil_passwd
(
&
op
->
o_bd
->
be_rootpw
,
&
op
->
o
q_bind
.
rb_cred
,
NULL
);
result
=
lutil_passwd
(
&
op
->
o_bd
->
be_rootpw
,
&
op
->
orb_cred
,
NULL
);
#if defined( SLAPD_CRYPT ) || defined( SLAPD_SPASSWD )
#ifdef SLAPD_SPASSWD
...
...
@@ -686,8 +686,7 @@ backend_unbind( Operation *op, SlapReply *rs )
Slapi_PBlock
*
pb
=
op
->
o_pb
;
int
rc
;
slapi_x_connection_set_pb
(
pb
,
op
->
o_conn
);
slapi_x_operation_set_pb
(
pb
,
op
);
slapi_x_pblock_set_operation
(
pb
,
op
);
#endif
/* defined( LDAP_SLAPI ) */
for
(
i
=
0
;
i
<
nbackends
;
i
++
)
{
...
...
@@ -1262,13 +1261,13 @@ Attribute *backend_operational(
* and the backend supports specific operational attributes,
* add them to the attribute list
*/
if
(
opattrs
||
(
op
->
o
q_search
.
rs_attrs
&&
ad_inlist
(
slap_schema
.
si_ad_subschemaSubentry
,
op
->
o
q_search
.
rs_attrs
))
)
{
if
(
opattrs
||
(
op
->
ors_attrs
&&
ad_inlist
(
slap_schema
.
si_ad_subschemaSubentry
,
op
->
ors_attrs
))
)
{
*
ap
=
slap_operational_subschemaSubentry
(
op
->
o_bd
);
ap
=
&
(
*
ap
)
->
a_next
;
}
if
(
(
opattrs
||
op
->
o
q_search
.
rs_attrs
)
&&
op
->
o_bd
&&
op
->
o_bd
->
be_operational
!=
NULL
)
{
if
(
(
opattrs
||
op
->
ors_attrs
)
&&
op
->
o_bd
&&
op
->
o_bd
->
be_operational
!=
NULL
)
{
(
void
)
op
->
o_bd
->
be_operational
(
op
,
rs
,
opattrs
,
ap
);
}
...
...
servers/slapd/backglue.c
View file @
fa9bf235
...
...
@@ -284,11 +284,11 @@ glue_back_search ( Operation *op, SlapReply *rs )
gs
.
prevcb
=
op
->
o_callback
;
if
(
op
->
o
q_search
.
rs_tlimit
)
{
stoptime
=
slap_get_time
()
+
op
->
o
q_search
.
rs_tlimit
;
if
(
op
->
ors_tlimit
)
{
stoptime
=
slap_get_time
()
+
op
->
ors_tlimit
;
}
switch
(
op
->
o
q_search
.
rs_scope
)
{
switch
(
op
->
ors_scope
)
{
case
LDAP_SCOPE_BASE
:
op
->
o_bd
=
glue_back_select
(
b0
,
op
->
o_req_ndn
.
bv_val
);
...
...
@@ -304,9 +304,9 @@ glue_back_search ( Operation *op, SlapReply *rs )
case
LDAP_SCOPE_SUBTREE
:
op
->
o_callback
=
&
cb
;
rs
->
sr_err
=
gs
.
err
=
LDAP_UNWILLING_TO_PERFORM
;
scope0
=
op
->
o
q_search
.
rs_scope
;
slimit0
=
op
->
o
q_search
.
rs_slimit
;
tlimit0
=
op
->
o
q_search
.
rs_tlimit
;
scope0
=
op
->
ors_scope
;
slimit0
=
op
->
ors_slimit
;
tlimit0
=
op
->
ors_tlimit
;
dn
=
op
->
o_req_dn
;
ndn
=
op
->
o_req_ndn
;
...
...
@@ -317,15 +317,15 @@ glue_back_search ( Operation *op, SlapReply *rs )
if
(
!
gi
->
n
[
i
].
be
||
!
gi
->
n
[
i
].
be
->
be_search
)
continue
;
if
(
tlimit0
)
{
op
->
o
q_search
.
rs_tlimit
=
stoptime
-
slap_get_time
();
if
(
op
->
o
q_search
.
rs_tlimit
<=
0
)
{
op
->
ors_tlimit
=
stoptime
-
slap_get_time
();
if
(
op
->
ors_tlimit
<=
0
)
{
rs
->
sr_err
=
gs
.
err
=
LDAP_TIMELIMIT_EXCEEDED
;
break
;
}
}
if
(
slimit0
)
{
op
->
o
q_search
.
rs_slimit
=
slimit0
-
gs
.
nentries
;
if
(
op
->
o
q_search
.
rs_slimit
<=
0
)
{
op
->
ors_slimit
=
slimit0
-
gs
.
nentries
;
if
(
op
->
ors_slimit
<=
0
)
{
rs
->
sr_err
=
gs
.
err
=
LDAP_SIZELIMIT_EXCEEDED
;
break
;
}
...
...
@@ -340,7 +340,7 @@ glue_back_search ( Operation *op, SlapReply *rs )
op
->
o_bd
=
gi
->
n
[
i
].
be
;
if
(
scope0
==
LDAP_SCOPE_ONELEVEL
&&
dn_match
(
&
gi
->
n
[
i
].
pdn
,
&
ndn
))
{
op
->
o
q_search
.
rs_scope
=
LDAP_SCOPE_BASE
;
op
->
ors_scope
=
LDAP_SCOPE_BASE
;
op
->
o_req_dn
=
op
->
o_bd
->
be_suffix
[
0
];
op
->
o_req_ndn
=
op
->
o_bd
->
be_nsuffix
[
0
];
rs
->
sr_err
=
op
->
o_bd
->
be_search
(
op
,
rs
);
...
...
@@ -371,9 +371,9 @@ glue_back_search ( Operation *op, SlapReply *rs )
}
}
end_of_loop:
;
op
->
o
q_search
.
rs_scope
=
scope0
;
op
->
o
q_search
.
rs_slimit
=
slimit0
;
op
->
o
q_search
.
rs_tlimit
=
tlimit0
;
op
->
ors_scope
=
scope0
;
op
->
ors_slimit
=
slimit0
;
op
->
ors_tlimit
=
tlimit0
;
op
->
o_req_dn
=
dn
;
op
->
o_req_ndn
=
ndn
;
...
...
servers/slapd/bind.c
View file @
fa9bf235
...
...
@@ -121,7 +121,7 @@ do_bind(
op
->
o_protocol
=
version
;
if
(
method
!=
LDAP_AUTH_SASL
)
{
tag
=
ber_scanf
(
ber
,
/*{*/
"m}"
,
&
op
->
o
q_bind
.
rb_cred
);
tag
=
ber_scanf
(
ber
,
/*{*/
"m}"
,
&
op
->
orb_cred
);
}
else
{
tag
=
ber_scanf
(
ber
,
"{m"
/*}*/
,
&
mech
);
...
...
@@ -131,11 +131,11 @@ do_bind(
tag
=
ber_peek_tag
(
ber
,
&
len
);
if
(
tag
==
LDAP_TAG_LDAPCRED
)
{
tag
=
ber_scanf
(
ber
,
"m"
,
&
op
->
o
q_bind
.
rb_cred
);
tag
=
ber_scanf
(
ber
,
"m"
,
&
op
->
orb_cred
);
}
else
{
tag
=
LDAP_TAG_LDAPCRED
;
op
->
o
q_bind
.
rb_cred
.
bv_val
=
NULL
;
op
->
o
q_bind
.
rb_cred
.
bv_len
=
0
;
op
->
orb_cred
.
bv_val
=
NULL
;
op
->
orb_cred
.
bv_len
=
0
;
}
if
(
tag
!=
LBER_ERROR
)
{
...
...
@@ -292,8 +292,8 @@ do_bind(
ldap_pvt_thread_mutex_lock
(
&
op
->
o_conn
->
c_mutex
);
if
(
rs
->
sr_err
==
LDAP_SUCCESS
)
{
op
->
o_conn
->
c_dn
=
op
->
o
q_bind
.
rb_edn
;
if
(
op
->
o
q_bind
.
rb_edn
.
bv_len
!=
0
)
{
op
->
o_conn
->
c_dn
=
op
->
orb_edn
;
if
(
op
->
orb_edn
.
bv_len
!=
0
)
{
/* edn is always normalized already */
ber_dupbv
(
&
op
->
o_conn
->
c_ndn
,
&
op
->
o_conn
->
c_dn
);
}
...
...
@@ -302,9 +302,9 @@ do_bind(
op
->
o_conn
->
c_sasl_bind_mech
.
bv_len
=
0
;
op
->
o_conn
->
c_sasl_bind_in_progress
=
0
;
op
->
o_conn
->
c_sasl_ssf
=
op
->
o
q_bind
.
rb_ssf
;
if
(
op
->
o
q_bind
.
rb_ssf
>
op
->
o_conn
->
c_ssf
)
{
op
->
o_conn
->
c_ssf
=
op
->
o
q_bind
.
rb_ssf
;
op
->
o_conn
->
c_sasl_ssf
=
op
->
orb_ssf
;
if
(
op
->
orb_ssf
>
op
->
o_conn
->
c_ssf
)
{
op
->
o_conn
->
c_ssf
=
op
->
orb_ssf
;
}
if
(
op
->
o_conn
->
c_dn
.
bv_len
!=
0
)
{
...
...
@@ -318,20 +318,20 @@ do_bind(
"conn=%lu op=%lu BIND dn=
\"
%s
\"
mech=%s ssf=%d
\n
"
,
op
->
o_connid
,
op
->
o_opid
,
op
->
o_conn
->
c_dn
.
bv_val
?
op
->
o_conn
->
c_dn
.
bv_val
:
"<empty>"
,
op
->
o_conn
->
c_authmech
.
bv_val
,
op
->
o
q_bind
.
rb_ssf
);
op
->
o_conn
->
c_authmech
.
bv_val
,
op
->
orb_ssf
);
#ifdef NEW_LOGGING
LDAP_LOG
(
OPERATION
,
DETAIL1
,
"do_bind: SASL/%s bind: dn=
\"
%s
\"
ssf=%d
\n
"
,
op
->
o_conn
->
c_authmech
.
bv_val
,
op
->
o_conn
->
c_dn
.
bv_val
?
op
->
o_conn
->
c_dn
.
bv_val
:
"<empty>"
,
op
->
o
q_bind
.
rb_ssf
);
op
->
orb_ssf
);
#else
Debug
(
LDAP_DEBUG_TRACE
,
"do_bind: SASL/%s bind: dn=
\"
%s
\"
ssf=%d
\n
"
,
op
->
o_conn
->
c_authmech
.
bv_val
,
op
->
o_conn
->
c_dn
.
bv_val
?
op
->
o_conn
->
c_dn
.
bv_val
:
"<empty>"
,
op
->
o
q_bind
.
rb_ssf
);
op
->
orb_ssf
);
#endif
}
else
if
(
rs
->
sr_err
==
LDAP_SASL_BIND_IN_PROGRESS
)
{
...
...
@@ -366,10 +366,10 @@ do_bind(
if
(
method
==
LDAP_AUTH_SIMPLE
)
{
/* accept "anonymous" binds */
if
(
op
->
o
q_bind
.
rb_cred
.
bv_len
==
0
||
op
->
o_req_ndn
.
bv_len
==
0
)
{
if
(
op
->
orb_cred
.
bv_len
==
0
||
op
->
o_req_ndn
.
bv_len
==
0
)
{
rs
->
sr_err
=
LDAP_SUCCESS
;
if
(
op
->
o
q_bind
.
rb_cred
.
bv_len
&&
if
(
op
->
orb_cred
.
bv_len
&&
!
(
global_allows
&
SLAP_ALLOW_BIND_ANON_CRED
))
{
/* cred is not empty, disallow */
...
...
@@ -517,7 +517,7 @@ do_bind(
slapi_x_pblock_set_operation
(
pb
,
op
);
slapi_pblock_set
(
pb
,
SLAPI_BIND_TARGET
,
(
void
*
)
dn
.
bv_val
);
slapi_pblock_set
(
pb
,
SLAPI_BIND_METHOD
,
(
void
*
)
method
);
slapi_pblock_set
(
pb
,
SLAPI_BIND_CREDENTIALS
,
(
void
*
)
&
op
->
o
q_bind
.
rb_cred
);
slapi_pblock_set
(
pb
,
SLAPI_BIND_CREDENTIALS
,
(
void
*
)
&
op
->
orb_cred
);
slapi_pblock_set
(
pb
,
SLAPI_MANAGEDSAIT
,
(
void
*
)(
0
)
);
rs
->
sr_err
=
doPluginFNs
(
op
->
o_bd
,
SLAPI_PLUGIN_PRE_BIND_FN
,
pb
);
...
...
@@ -536,14 +536,14 @@ do_bind(
if
(
slapi_pblock_get
(
pb
,
SLAPI_RESULT_CODE
,
(
void
*
)
&
ldapRc
)
!=
0
)
ldapRc
=
LDAP_OTHER
;
op
->
o
q_bind
.
rb_edn
.
bv_val
=
NULL
;
op
->
o
q_bind
.
rb_edn
.
bv_len
=
0
;
op
->
orb_edn
.
bv_val
=
NULL
;
op
->
orb_edn
.
bv_len
=
0
;
if
(
rs
->
sr_err
!=
SLAPI_BIND_FAIL
&&
ldapRc
==
LDAP_SUCCESS
)
{
/* Set the new connection DN. */
if
(
rs
->
sr_err
!=
SLAPI_BIND_ANONYMOUS
)
{
slapi_pblock_get
(
pb
,
SLAPI_CONN_DN
,
(
void
*
)
&
op
->
o
q_bind
.
rb_edn
.
bv_val
);
slapi_pblock_get
(
pb
,
SLAPI_CONN_DN
,
(
void
*
)
&
op
->
orb_edn
.
bv_val
);
}
rs
->
sr_err
=
dnPrettyNormal
(
NULL
,
&
op
->
o
q_bind
.
rb_edn
,
&
op
->
o_req_dn
,
&
op
->
o_req_ndn
);
rs
->
sr_err
=
dnPrettyNormal
(
NULL
,
&
op
->
orb_edn
,
&
op
->
o_req_dn
,
&
op
->
o_req_ndn
);
ldap_pvt_thread_mutex_lock
(
&
op
->
o_conn
->
c_mutex
);
op
->
o_conn
->
c_dn
=
op
->
o_req_dn
;
op
->
o_conn
->
c_ndn
=
op
->
o_req_ndn
;
...
...
@@ -575,7 +575,7 @@ do_bind(
#endif
/* defined( LDAP_SLAPI ) */
if
(
op
->
o_bd
->
be_bind
)
{
op
->
o
q_bind
.
rb_method
=
method
;
op
->
orb_method
=
method
;
rs
->
sr_err
=
(
op
->
o_bd
->
be_bind
)(
op
,
rs
);
if
(
rs
->
sr_err
==
0
)
{
...
...
@@ -585,8 +585,8 @@ do_bind(
op
->
o_conn
->
c_authz_backend
=
op
->
o_bd
;
}
if
(
op
->
o
q_bind
.
rb_edn
.
bv_len
)
{
op
->
o_conn
->
c_dn
=
op
->
o
q_bind
.
rb_edn
;
if
(
op
->
orb_edn
.
bv_len
)
{
op
->
o_conn
->
c_dn
=
op
->
orb_edn
;
}
else
{
op
->
o_conn
->
c_dn
=
op
->
o_req_dn
;
op
->
o_req_dn
.
bv_val
=
NULL
;
...
...
@@ -624,8 +624,8 @@ do_bind(
/* send this here to avoid a race condition */
send_ldap_result
(
op
,
rs
);
}
else
if
(
op
->
o
q_bind
.
rb_edn
.
bv_val
!=
NULL
)
{
free
(
op
->
o
q_bind
.
rb_edn
.
bv_val
);
}
else
if
(
op
->
orb_edn
.
bv_val
!=
NULL
)
{
free
(
op
->
orb_edn
.
bv_val
);
}
}
else
{
...
...
servers/slapd/cancel.c
View file @
fa9bf235
...
...
@@ -30,14 +30,14 @@ int cancel_extop( Operation *op, SlapReply *rs )
BerElement
*
ber
;
int
i
;
assert
(
ber_bvcmp
(
&
slap_EXOP_CANCEL
,
&
op
->
o
q_extended
.
rs
_reqoid
)
==
0
);
assert
(
ber_bvcmp
(
&
slap_EXOP_CANCEL
,
&
op
->
o
re
_reqoid
)
==
0
);
if
(
op
->
o
q_extended
.
rs
_reqdata
==
NULL
)
{
if
(
op
->
o
re
_reqdata
==
NULL
)
{
rs
->
sr_text
=
"no message ID supplied"
;
return
LDAP_PROTOCOL_ERROR
;
}
ber
=
ber_init
(
op
->
o
q_extended
.
rs
_reqdata
);
ber
=
ber_init
(
op
->
o
re
_reqdata
);
if
(
ber
==
NULL
)
{
rs
->
sr_text
=
"internal error"
;
return
LDAP_OTHER
;
...
...
servers/slapd/compare.c
View file @
fa9bf235
...
...
@@ -38,12 +38,10 @@ do_compare(
)
{
Entry
*
entry
=
NULL
;
Entry
*
fentry
=
NULL
;
struct
berval
dn
=
{
0
,
NULL
};
struct
berval
desc
=
{
0
,
NULL
};
struct
berval
value
=
{
0
,
NULL
};
AttributeAssertion
ava
=
{
NULL
,
{
0
,
NULL
}
};
Backend
*
be
;
int
manageDSAit
;
#ifdef LDAP_SLAPI
...
...
@@ -172,8 +170,6 @@ do_compare(
goto
cleanup
;
}
fentry
=
entry
;
}
else
if
(
bvmatch
(
&
op
->
o_req_ndn
,
&
global_schemandn
)
)
{
#ifdef NEW_LOGGING
LDAP_LOG
(
OPERATION
,
ARGS
,
...
...
@@ -202,12 +198,11 @@ do_compare(
rs
->
sr_err
=
0
;
goto
cleanup
;
}
fentry
=
entry
;
}
if
(
entry
)
{
rs
->
sr_err
=
compare_entry
(
op
,
entry
,
&
ava
);
if
(
fentry
)
entry_free
(
f
entry
);
entry_free
(
entry
);
send_ldap_result
(
op
,
rs
);
...
...
@@ -289,7 +284,7 @@ do_compare(
#endif
/* defined( LDAP_SLAPI ) */
if
(
op
->
o_bd
->
be_compare
)
{
op
->
o
q_compare
.
rs
_ava
=
&
ava
;
op
->
o
rc
_ava
=
&
ava
;
op
->
o_bd
->
be_compare
(
op
,
rs
);
}
else
{
send_ldap_error
(
op
,
rs
,
LDAP_UNWILLING_TO_PERFORM
,
...
...
servers/slapd/controls.c
View file @
fa9bf235
...
...
@@ -557,11 +557,11 @@ int get_ctrls(
break
;
case
LDAP_REQ_EXTENDED
:
tagmask
=~
0L
;
assert
(
op
->
o
q_extended
.
rs
_reqoid
.
bv_val
!=
NULL
);
assert
(
op
->
o
re
_reqoid
.
bv_val
!=
NULL
);
if
(
sc
->
sc_extendedops
!=
NULL
)
{
int
i
;
for
(
i
=
0
;
sc
->
sc_extendedops
[
i
]
!=
NULL
;
i
++
)
{
if
(
strcmp
(
op
->
o
q_extended
.
rs
_reqoid
.
bv_val
,
sc
->
sc_extendedops
[
i
]
)
if
(
strcmp
(
op
->
o
re
_reqoid
.
bv_val
,
sc
->
sc_extendedops
[
i
]
)
==
0
)
{
tagmask
=
0L
;
...
...
servers/slapd/extended.c
View file @
fa9bf235
...
...
@@ -135,7 +135,7 @@ do_extended(
goto
done
;
}
if
(
ber_scanf
(
op
->
o_ber
,
"{m"
/*}*/
,
&
op
->
o
q_extended
.
rs
_reqoid
)
==
LBER_ERROR
)
{
if
(
ber_scanf
(
op
->
o_ber
,
"{m"
/*}*/
,
&
op
->
o
re
_reqoid
)
==
LBER_ERROR
)
{
#ifdef NEW_LOGGING
LDAP_LOG
(
OPERATION
,
ERR
,
"do_extended: conn %d ber_scanf failed
\n
"
,
op
->
o_connid
,
0
,
0
);
...
...
@@ -148,19 +148,19 @@ do_extended(
}
#ifdef LDAP_SLAPI
getPluginFunc
(
&
op
->
o
q_extended
.
rs
_reqoid
,
&
funcAddr
);
/* NS-SLAPI extended operation */
if
(
!
funcAddr
&&
!
(
ext
=
find_extop
(
supp_ext_list
,
&
op
->
o
q_extended
.
rs
_reqoid
)))
getPluginFunc
(
&
op
->
o
re
_reqoid
,
&
funcAddr
);
/* NS-SLAPI extended operation */
if
(
!
funcAddr
&&
!
(
ext
=
find_extop
(
supp_ext_list
,
&
op
->
o
re
_reqoid
)))
#else
if
(
!
(
ext
=
find_extop
(
supp_ext_list
,
&
op
->
o
q_extended
.
rs
_reqoid
)))
if
(
!
(
ext
=
find_extop
(
supp_ext_list
,
&
op
->
o
re
_reqoid
)))
#endif
{
#ifdef NEW_LOGGING
LDAP_LOG
(
OPERATION
,
ERR
,
"do_extended: conn %d unsupported operation
\"
%s
\"\n
"
,
op
->
o_connid
,
op
->
o
q_extended
.
rs
_reqoid
.
bv_val
,
0
);
op
->
o_connid
,
op
->
o
re
_reqoid
.
bv_val
,
0
);
#else
Debug
(
LDAP_DEBUG_ANY
,
"do_extended: unsupported operation
\"
%s
\"\n
"
,
op
->
o
q_extended
.
rs
_reqoid
.
bv_val
,
0
,
0
);
op
->
o
re
_reqoid
.
bv_val
,
0
,
0
);
#endif
send_ldap_error
(
op
,
rs
,
LDAP_PROTOCOL_ERROR
,
"unsupported extended operation"
);
...
...
@@ -204,16 +204,16 @@ do_extended(
#ifdef NEW_LOGGING
LDAP_LOG
(
OPERATION
,
DETAIL1
,
"do_extended: conn %d oid=%s
\n
."
,
op
->
o_connid
,
op
->
o
q_extended
.
rs
_reqoid
.
bv_val
,
0
);
"do_extended: conn %d oid=%s
\n
."
,
op
->
o_connid
,
op
->
o
re
_reqoid
.
bv_val
,
0
);
#else
Debug
(
LDAP_DEBUG_ARGS
,
"do_extended: oid=%s
\n
"
,
op
->
o
q_extended
.
rs
_reqoid
.
bv_val
,
0
,
0
);
Debug
(
LDAP_DEBUG_ARGS
,
"do_extended: oid=%s
\n
"
,
op
->
o
re
_reqoid
.
bv_val
,
0
,
0
);
#endif
#if defined(LDAP_SLAPI)
if
(
ext
!=
NULL
)
{
/* OpenLDAP extended operation */
#endif
/* defined(LDAP_SLAPI) */
if
(
reqdata
.
bv_val
)
op
->
o
q_extended
.
rs
_reqdata
=
&
reqdata
;
if
(
reqdata
.
bv_val
)
op
->
o
re
_reqdata
=
&
reqdata
;
rs
->
sr_err
=
(
ext
->
ext_main
)(
op
,
rs
);
if
(
rs
->
sr_err
!=
SLAPD_ABANDON
)
{
...
...
@@ -240,7 +240,7 @@ do_extended(
}
else
{
/* start of Netscape extended operation */
rs
->
sr_err
=
slapi_pblock_set
(
pb
,
SLAPI_EXT_OP_REQ_OID
,
(
void
*
)
op
->
o
q_extended
.
rs
_reqoid
.
bv_val
);
(
void
*
)
op
->
o
re
_reqoid
.
bv_val
);
if
(
rs
->
sr_err
!=
LDAP_SUCCESS
)
{
rs
->
sr_err
=
LDAP_OTHER
;
goto
done
;
...
...
@@ -377,7 +377,7 @@ whoami_extop (
{
struct
berval
*
bv
;
if
(
op
->
o
q_extended
.
rs
_reqdata
!=
NULL
)
{
if
(
op
->
o
re
_reqdata
!=
NULL
)
{
/* no request data should be provided */
rs
->
sr_text
=
"no request data expected"
;
return
LDAP_PROTOCOL_ERROR
;
...
...
servers/slapd/modify.c
View file @
fa9bf235
...
...
@@ -407,7 +407,7 @@ do_modify(
}
}
op
->
o
q_modify
.
rs
_modlist
=
modlist
;
op
->
o
rm
_modlist
=
modlist
;
if
(
(
op
->
o_bd
->
be_modify
)(
op
,
rs
)
==
0
#ifdef SLAPD_MULTIMASTER
&&
!
repl_user
...
...
servers/slapd/modrdn.c
View file @
fa9bf235
...
...
@@ -133,8 +133,8 @@ do_modrdn(
rs
->
sr_err
=
SLAPD_DISCONNECT
;
goto
cleanup
;
}
op
->
o
q_modrdn
.
rs
_newSup
=
&
pnewSuperior
;
op
->
o
q_modrdn
.
rs
_nnewSup
=
&
nnewSuperior
;
op
->
o
rr
_newSup
=
&
pnewSuperior
;
op
->
o
rr
_nnewSup
=
&
nnewSuperior
;
}
#ifdef NEW_LOGGING
...
...
@@ -216,7 +216,7 @@ do_modrdn(
/* FIXME: should have/use rdnPretty / rdnNormalize routines */
rs
->
sr_err
=
dnPrettyNormal
(
NULL
,
&
newrdn
,
&
op
->
o
q_modrdn
.
rs
_newrdn
,
&
op
->
o
q_modrdn
.
rs
_nnewrdn
);
rs
->
sr_err
=
dnPrettyNormal
(
NULL
,
&
newrdn
,
&
op
->
o
rr
_newrdn
,
&
op
->
o
rr
_nnewrdn
);
if
(
rs
->
sr_err
!=
LDAP_SUCCESS
)
{
#ifdef NEW_LOGGING
LDAP_LOG
(
OPERATION
,
INFO
,
...
...
@@ -230,20 +230,20 @@ do_modrdn(
goto
cleanup
;
}
if
(
rdnValidate
(
&
op
->
o
q_modrdn
.
rs
_newrdn
)
!=
LDAP_SUCCESS
)
{
if
(
rdnValidate
(
&
op
->
o
rr
_newrdn
)
!=
LDAP_SUCCESS
)
{
#ifdef NEW_LOGGING
LDAP_LOG
(
OPERATION
,
ERR
,
"do_modrdn: invalid rdn (%s).
\n
"
,
op
->
o
q_modrdn
.
rs
_newrdn
.
bv_val
,
0
,
0
);
"do_modrdn: invalid rdn (%s).
\n
"
,
op
->
o
rr
_newrdn
.
bv_val
,
0
,
0
);
#else
Debug
(
LDAP_DEBUG_ANY
,
"do_modrdn: invalid rdn (%s)
\n
"
,
op
->
o
q_modrdn
.
rs
_newrdn
.
bv_val
,
0
,
0
);
op
->
o
rr
_newrdn
.
bv_val
,
0
,
0
);
#endif
send_ldap_error
(
op
,
rs
,
LDAP_INVALID_DN_SYNTAX
,
"invalid new RDN"
);
goto
cleanup
;
}
if
(
op
->
o
q_modrdn
.
rs
_newSup
)
{
if
(
op
->
o
rr
_newSup
)
{
rs
->
sr_err
=
dnPrettyNormal
(
NULL
,
&
newSuperior
,
&
pnewSuperior
,
&
nnewSuperior
);
if
(
rs
->
sr_err
!=
LDAP_SUCCESS
)
{
...
...
@@ -297,7 +297,7 @@ do_modrdn(
/* Make sure that the entry being changed and the newSuperior are in
* the same backend, otherwise we return an error.
*/
if
(
op
->
o
q_modrdn
.
rs
_newSup
)
{
if
(
op
->
o
rr
_newSup
)
{
newSuperior_be
=
select_backend
(
&
nnewSuperior
,
0
,
0
);
if
(
newSuperior_be
!=
op
->
o_bd
)
{
...
...
@@ -350,7 +350,7 @@ do_modrdn(
if
(
!
op
->
o_bd
->
be_update_ndn
.
bv_len
||
repl_user
)
#endif
{
op
->
o
q_modrdn
.
rs
_deleteoldrdn
=
deloldrdn
;
op
->
o
rr
_deleteoldrdn
=
deloldrdn
;
if
(
(
op
->
o_bd
->
be_modrdn
)(
op
,
rs
)
==
0
#ifdef SLAPD_MULTIMASTER
&&
(
!
op
->
o_bd
->
be_update_ndn
.
bv_len
||
!
repl_user
)
...
...
@@ -393,8 +393,8 @@ cleanup:
free
(
op
->
o_req_dn
.
bv_val
);
free
(
op
->
o_req_ndn
.
bv_val
);
free
(
op
->
o
q_modrdn
.
rs
_newrdn
.
bv_val
);
free
(
op
->
o
q_modrdn
.
rs
_nnewrdn
.
bv_val
);
free
(
op
->
o
rr
_newrdn
.
bv_val
);
free
(
op
->
o
rr
_nnewrdn
.
bv_val
);
if
(
pnewSuperior
.
bv_val
)
free
(
pnewSuperior
.
bv_val
);
if
(
nnewSuperior
.
bv_val
)
free
(
nnewSuperior
.
bv_val
);
...
...
@@ -415,7 +415,7 @@ slap_modrdn2mods(
int
a_cnt
,
d_cnt
;
assert
(
new_rdn
!=
NULL
);
assert
(
!
op
->
o
q_modrdn
.
rs
_deleteoldrdn
||
old_rdn
!=
NULL
);
assert
(
!
op
->
o
rr
_deleteoldrdn
||
old_rdn
!=
NULL
);
/* Add new attribute values to the entry */
for
(
a_cnt
=
0
;
new_rdn
[
0
][
a_cnt
];
a_cnt
++
)
{
...
...
@@ -489,7 +489,7 @@ slap_modrdn2mods(
}
/* Remove old rdn value if required */
if
(
op
->
o
q_modrdn
.
rs
_deleteoldrdn
)
{
if
(
op
->
o
rr
_deleteoldrdn
)
{
for
(
d_cnt
=
0
;
old_rdn
[
0
][
d_cnt
];
d_cnt
++
)
{
AttributeDescription
*
desc
=
NULL
;
Modifications
*
mod_tmp
;
...
...
servers/slapd/passwd.c
View file @
fa9bf235
...
...
@@ -23,7 +23,7 @@ int passwd_extop(
Operation
*
op
,
SlapReply
*
rs
)
{
assert
(
ber_bvcmp
(
&
slap_EXOP_MODIFY_PASSWD
,
&
op
->
o
q_extended
.
rs
_reqoid
)
==
0
);
assert
(
ber_bvcmp
(
&
slap_EXOP_MODIFY_PASSWD
,
&
op
->
o
re
_reqoid
)
==
0
);
if
(
op
->
o_dn
.
bv_len
==
0
)
{
rs
->
sr_text
=
"only authenticated users may change passwords"
;
...
...
servers/slapd/repl.c
View file @
fa9bf235
...
...
@@ -207,7 +207,7 @@ replog( Operation *op )
/* assume change parameter is a Modfications* */
/* fall thru */
case
LDAP_REQ_MODIFY
:
for
(
ml
=
op
->
o
q_modify
.
rs
_modlist
;
ml
!=
NULL
;
ml
=
ml
->
sml_next
)
{
for
(
ml
=
op
->
o
rm
_modlist
;
ml
!=
NULL
;
ml
=
ml
->
sml_next
)
{
int
is_in
,
exclude
;
is_in
=
ad_inlist
(
ml
->
sml_desc
,
op
->
o_bd
->
be_replica
[
i
]
->
ri_attrs
);
...
...
@@ -228,7 +228,7 @@ replog( Operation *op )
}
break
;
case
LDAP_REQ_ADD
:
for
(
a
=
op
->
o
q_add
.
rs
_e
->
e_attrs
;
a
!=
NULL
;
a
=
a
->
a_next
)
{
for
(
a
=
op
->
o
ra
_e
->
e_attrs
;
a
!=
NULL
;
a
=
a
->
a_next
)
{
int
is_in
,
exclude
;
is_in
=
ad_inlist
(
a
->
a_desc
,
op
->
o_bd
->
be_replica
[
i
]
->
ri_attrs
);
...
...
@@ -279,7 +279,7 @@ replog1(
case
LDAP_REQ_MODIFY
:
fprintf
(
fp
,
"changetype: modify
\n
"
);
ml
=
first
?
first
:
op
->
o
q_modify
.
rs
_modlist
;
ml
=
first
?
first
:
op
->
o
rm
_modlist
;
for
(
;
ml
!=
NULL
;
ml
=
ml
->
sml_next
)
{
char
*
type
;
if
(
ri
&&
ri
->
ri_attrs
)
{
...
...
@@ -311,7 +311,7 @@ replog1(
case
LDAP_REQ_ADD
:
fprintf
(
fp
,
"changetype: add
\n
"
);
a
=
first
?
first
:
op
->
o
q_add
.
rs
_e
->
e_attrs
;
a
=
first
?
first
:
op
->
o
ra
_e
->
e_attrs
;
for
(
;
a
!=
NULL
;
a
=
a
->
a_next
)
{
if
(
ri
&&
ri
->
ri_attrs
)
{
int
is_in
=
ad_inlist
(
a
->
a_desc
,
ri
->
ri_attrs
);
...
...
@@ -356,10 +356,10 @@ replog1(
case
LDAP_REQ_MODRDN
:
fprintf
(
fp
,
"changetype: modrdn
\n
"
);
fprintf
(
fp
,
"newrdn: %s
\n
"
,
op
->
o
q_modrdn
.
rs
_newrdn
.
bv_val
);
fprintf
(
fp
,
"deleteoldrdn: %d
\n
"
,
op
->
o
q_modrdn
.
rs
_deleteoldrdn
?
1
:
0
);
if
(
op
->
o
q_modrdn
.
rs
_newSup
!=
NULL
)
{
fprintf
(
fp
,
"newsuperior: %s
\n
"
,
op
->
o
q_modrdn
.
rs
_newSup
->
bv_val
);
fprintf
(
fp
,
"newrdn: %s
\n
"
,
op
->
o
rr
_newrdn
.
bv_val
);
fprintf
(
fp
,
"deleteoldrdn: %d
\n
"
,
op
->
o
rr
_deleteoldrdn
?
1
:
0
);
if
(
op
->
o
rr
_newSup
!=
NULL
)
{
fprintf
(
fp
,
"newsuperior: %s
\n
"
,
op
->
o
rr
_newSup
->
bv_val
);
}
}
fprintf
(
fp
,
"
\n
"
);
...
...
servers/slapd/result.c
View file @
fa9bf235
...
...
@@ -609,11 +609,11 @@ slap_send_search_entry( Operation *op, SlapReply *rs )
#ifdef NEW_LOGGING
LDAP_LOG
(
OPERATION
,
ENTRY
,
"send_search_entry: conn %lu dn=
\"
%s
\"
%s
\n
"
,
op
->
o_connid
,
rs
->
sr_entry
->
e_name
.
bv_val
,
op
->
o
q_search
.
rs_attrsonly
?
" (attrsOnly)"
:
""
);
op
->
o_connid
,
rs
->
sr_entry
->
e_name
.
bv_val
,
op
->
ors_attrsonly
?
" (attrsOnly)"
:
""
);
#else
Debug
(
LDAP_DEBUG_TRACE
,
"=> send_search_entry: dn=
\"
%s
\"
%s
\n
"
,
rs
->
sr_entry
->
e_name
.
bv_val
,
op
->
o
q_search
.
rs_attrsonly
?
" (attrsOnly)"
:
""
,
0
);
rs
->
sr_entry
->
e_name
.
bv_val
,
op
->
ors_attrsonly
?
" (attrsOnly)"
:
""
,
0
);
#endif
if
(
!
access_allowed
(
op
,
rs
->
sr_entry
,
ad_entry
,
NULL
,
ACL_READ
,
NULL
)
)
...
...
@@ -789,7 +789,7 @@ slap_send_search_entry( Operation *op, SlapReply *rs )
goto
error_return
;
}
if
(
!
op
->
o
q_search
.
rs_attrsonly
)
{
if
(
!
op
->
ors_attrsonly
)
{
for
(
i
=
0
;
a
->
a_vals
[
i
].
bv_val
!=
NULL
;
i
++
)
{
if
(
!
access_allowed
(
op
,
rs
->
sr_entry
,
desc
,
&
a
->
a_vals
[
i
],
ACL_READ
,
&
acl_state
)
)
...
...
@@ -982,7 +982,7 @@ slap_send_search_entry( Operation *op, SlapReply *rs )
goto
error_return
;
}
if
(
!
op
->
o
q_search
.
rs_attrsonly
)