1999-09-09 03:06:24 +08:00
|
|
|
/* $OpenLDAP$ */
|
2003-11-27 09:17:14 +08:00
|
|
|
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
|
|
|
*
|
2021-01-12 03:25:53 +08:00
|
|
|
* Copyright 1998-2021 The OpenLDAP Foundation.
|
2003-11-27 09:17:14 +08:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted only as authorized by the OpenLDAP
|
|
|
|
* Public License.
|
|
|
|
*
|
|
|
|
* A copy of this license is available in the file LICENSE in the
|
|
|
|
* top-level directory of the distribution or, alternatively, at
|
|
|
|
* <http://www.OpenLDAP.org/license.html>.
|
1999-08-07 07:07:46 +08:00
|
|
|
*/
|
2003-11-27 09:17:14 +08:00
|
|
|
/* Portions Copyright (c) 1995 Regents of the University of Michigan.
|
1998-08-09 08:43:13 +08:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms are permitted
|
|
|
|
* provided that this notice is preserved and that due credit is given
|
|
|
|
* to the University of Michigan at Ann Arbor. The name of the University
|
|
|
|
* may not be used to endorse or promote products derived from this
|
|
|
|
* software without specific prior written permission. This software
|
|
|
|
* is provided ``as is'' without express or implied warranty.
|
|
|
|
*/
|
|
|
|
|
1998-10-25 09:41:42 +08:00
|
|
|
#include "portable.h"
|
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
#include <stdio.h>
|
1998-10-25 09:41:42 +08:00
|
|
|
#include <ac/socket.h>
|
2003-05-15 19:43:33 +08:00
|
|
|
#include <ac/string.h>
|
1998-10-25 09:41:42 +08:00
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
#include "slap.h"
|
|
|
|
|
1999-07-02 05:20:45 +08:00
|
|
|
int
|
1998-08-09 08:43:13 +08:00
|
|
|
do_compare(
|
2003-03-30 17:03:54 +08:00
|
|
|
Operation *op,
|
2004-06-23 11:09:13 +08:00
|
|
|
SlapReply *rs )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
2004-04-07 12:11:43 +08:00
|
|
|
struct berval dn = BER_BVNULL;
|
|
|
|
struct berval desc = BER_BVNULL;
|
|
|
|
struct berval value = BER_BVNULL;
|
2007-09-16 01:38:53 +08:00
|
|
|
AttributeAssertion ava = ATTRIBUTEASSERTION_INIT;
|
2000-02-07 05:09:44 +08:00
|
|
|
|
2007-07-23 11:51:42 +08:00
|
|
|
Debug( LDAP_DEBUG_TRACE, "%s do_compare\n",
|
2019-02-16 00:49:52 +08:00
|
|
|
op->o_log_prefix );
|
1998-08-09 08:43:13 +08:00
|
|
|
/*
|
|
|
|
* Parse the compare request. It looks like this:
|
|
|
|
*
|
|
|
|
* CompareRequest := [APPLICATION 14] SEQUENCE {
|
|
|
|
* entry DistinguishedName,
|
|
|
|
* ava SEQUENCE {
|
|
|
|
* type AttributeType,
|
|
|
|
* value AttributeValue
|
|
|
|
* }
|
|
|
|
* }
|
|
|
|
*/
|
|
|
|
|
2002-01-06 14:11:01 +08:00
|
|
|
if ( ber_scanf( op->o_ber, "{m" /*}*/, &dn ) == LBER_ERROR ) {
|
2007-07-23 11:51:42 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "%s do_compare: ber_scanf failed\n",
|
2019-02-16 00:49:52 +08:00
|
|
|
op->o_log_prefix );
|
2003-03-30 17:03:54 +08:00
|
|
|
send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" );
|
2000-03-01 07:48:01 +08:00
|
|
|
return SLAPD_DISCONNECT;
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
1999-07-01 06:43:27 +08:00
|
|
|
|
2002-01-06 14:11:01 +08:00
|
|
|
if ( ber_scanf( op->o_ber, "{mm}", &desc, &value ) == LBER_ERROR ) {
|
2007-07-23 11:51:42 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "%s do_compare: get ava failed\n",
|
2019-02-16 00:49:52 +08:00
|
|
|
op->o_log_prefix );
|
2003-03-30 17:03:54 +08:00
|
|
|
send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" );
|
|
|
|
return SLAPD_DISCONNECT;
|
2000-01-25 08:05:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if ( ber_scanf( op->o_ber, /*{*/ "}" ) == LBER_ERROR ) {
|
2007-07-23 11:51:42 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "%s do_compare: ber_scanf failed\n",
|
2019-02-16 00:49:52 +08:00
|
|
|
op->o_log_prefix );
|
2003-03-30 17:03:54 +08:00
|
|
|
send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" );
|
|
|
|
return SLAPD_DISCONNECT;
|
2000-01-25 08:05:36 +08:00
|
|
|
}
|
|
|
|
|
2003-03-30 17:03:54 +08:00
|
|
|
if( get_ctrls( op, rs, 1 ) != LDAP_SUCCESS ) {
|
2007-07-23 11:51:42 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "%s do_compare: get_ctrls failed\n",
|
2019-02-16 00:49:52 +08:00
|
|
|
op->o_log_prefix );
|
1999-09-19 09:29:45 +08:00
|
|
|
goto cleanup;
|
1999-07-01 06:43:27 +08:00
|
|
|
}
|
|
|
|
|
2004-06-23 11:09:13 +08:00
|
|
|
rs->sr_err = dnPrettyNormal( NULL, &dn, &op->o_req_dn, &op->o_req_ndn,
|
|
|
|
op->o_tmpmemctx );
|
2003-03-30 17:03:54 +08:00
|
|
|
if( rs->sr_err != LDAP_SUCCESS ) {
|
2007-07-23 11:51:42 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "%s do_compare: invalid dn (%s)\n",
|
2019-02-16 00:49:52 +08:00
|
|
|
op->o_log_prefix, dn.bv_val );
|
2003-03-30 17:03:54 +08:00
|
|
|
send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid DN" );
|
2000-09-09 00:59:15 +08:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2019-02-16 00:49:52 +08:00
|
|
|
Debug( LDAP_DEBUG_STATS,
|
2007-07-23 11:51:42 +08:00
|
|
|
"%s CMP dn=\"%s\" attr=\"%s\"\n",
|
|
|
|
op->o_log_prefix, op->o_req_dn.bv_val,
|
2019-02-16 00:49:52 +08:00
|
|
|
desc.bv_val );
|
2007-07-23 11:51:42 +08:00
|
|
|
|
2003-03-30 17:03:54 +08:00
|
|
|
rs->sr_err = slap_bv2ad( &desc, &ava.aa_desc, &rs->sr_text );
|
|
|
|
if( rs->sr_err != LDAP_SUCCESS ) {
|
2005-08-26 05:14:26 +08:00
|
|
|
rs->sr_err = slap_bv2undef_ad( &desc, &ava.aa_desc,
|
|
|
|
&rs->sr_text,
|
|
|
|
SLAP_AD_PROXIED|SLAP_AD_NOINSERT );
|
|
|
|
if( rs->sr_err != LDAP_SUCCESS ) {
|
|
|
|
send_ldap_result( op, rs );
|
|
|
|
goto cleanup;
|
|
|
|
}
|
2001-10-25 14:18:11 +08:00
|
|
|
}
|
|
|
|
|
2003-03-30 17:03:54 +08:00
|
|
|
rs->sr_err = asserted_value_validate_normalize( ava.aa_desc,
|
2003-02-27 09:54:43 +08:00
|
|
|
ava.aa_desc->ad_type->sat_equality,
|
|
|
|
SLAP_MR_EQUALITY|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX,
|
2003-04-11 09:29:28 +08:00
|
|
|
&value, &ava.aa_value, &rs->sr_text, op->o_tmpmemctx );
|
2003-03-30 17:03:54 +08:00
|
|
|
if( rs->sr_err != LDAP_SUCCESS ) {
|
|
|
|
send_ldap_result( op, rs );
|
2001-11-11 07:34:03 +08:00
|
|
|
goto cleanup;
|
2001-10-25 14:18:11 +08:00
|
|
|
}
|
|
|
|
|
2004-07-27 05:26:34 +08:00
|
|
|
op->orc_ava = &ava;
|
|
|
|
|
2007-07-23 11:51:42 +08:00
|
|
|
Debug( LDAP_DEBUG_ARGS,
|
|
|
|
"do_compare: dn (%s) attr (%s) value (%s)\n",
|
|
|
|
op->o_req_dn.bv_val,
|
|
|
|
ava.aa_desc->ad_cname.bv_val, ava.aa_value.bv_val );
|
|
|
|
|
2004-07-27 05:26:34 +08:00
|
|
|
op->o_bd = frontendDB;
|
|
|
|
rs->sr_err = frontendDB->be_compare( op, rs );
|
2017-01-17 05:21:33 +08:00
|
|
|
if ( rs->sr_err == SLAPD_ASYNCOP ) {
|
|
|
|
/* skip cleanup */
|
|
|
|
return rs->sr_err;
|
|
|
|
}
|
2004-07-27 05:26:34 +08:00
|
|
|
|
|
|
|
cleanup:;
|
|
|
|
op->o_tmpfree( op->o_req_dn.bv_val, op->o_tmpmemctx );
|
|
|
|
op->o_tmpfree( op->o_req_ndn.bv_val, op->o_tmpmemctx );
|
2005-08-03 07:22:10 +08:00
|
|
|
if ( !BER_BVISNULL( &ava.aa_value ) ) {
|
2004-07-27 05:26:34 +08:00
|
|
|
op->o_tmpfree( ava.aa_value.bv_val, op->o_tmpmemctx );
|
|
|
|
}
|
|
|
|
|
|
|
|
return rs->sr_err;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
fe_op_compare( Operation *op, SlapReply *rs )
|
|
|
|
{
|
2006-01-15 01:47:54 +08:00
|
|
|
Entry *entry = NULL;
|
2007-07-23 11:51:42 +08:00
|
|
|
AttributeAssertion *ava = op->orc_ava;
|
2006-01-15 01:47:54 +08:00
|
|
|
BackendDB *bd = op->o_bd;
|
2004-07-27 05:26:34 +08:00
|
|
|
|
2007-07-23 08:47:31 +08:00
|
|
|
if( strcasecmp( op->o_req_ndn.bv_val, LDAP_ROOT_DSE ) == 0 ) {
|
2003-03-30 17:03:54 +08:00
|
|
|
if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
|
|
|
|
send_ldap_result( op, rs );
|
2001-10-25 14:18:11 +08:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2003-03-30 17:03:54 +08:00
|
|
|
rs->sr_err = root_dse_info( op->o_conn, &entry, &rs->sr_text );
|
|
|
|
if( rs->sr_err != LDAP_SUCCESS ) {
|
|
|
|
send_ldap_result( op, rs );
|
2001-10-25 14:18:11 +08:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2004-07-27 05:26:34 +08:00
|
|
|
} else if ( bvmatch( &op->o_req_ndn, &frontendDB->be_schemandn ) ) {
|
2003-03-30 17:03:54 +08:00
|
|
|
if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
|
|
|
|
send_ldap_result( op, rs );
|
|
|
|
rs->sr_err = 0;
|
2001-10-25 14:18:11 +08:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2003-03-30 17:03:54 +08:00
|
|
|
rs->sr_err = schema_info( &entry, &rs->sr_text );
|
|
|
|
if( rs->sr_err != LDAP_SUCCESS ) {
|
|
|
|
send_ldap_result( op, rs );
|
|
|
|
rs->sr_err = 0;
|
2001-10-25 14:18:11 +08:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if( entry ) {
|
2010-12-24 05:36:57 +08:00
|
|
|
rs->sr_err = slap_compare_entry( op, entry, ava );
|
2003-03-31 15:49:34 +08:00
|
|
|
entry_free( entry );
|
2001-10-25 14:18:11 +08:00
|
|
|
|
2003-03-30 17:03:54 +08:00
|
|
|
send_ldap_result( op, rs );
|
2001-10-25 14:18:11 +08:00
|
|
|
|
2004-06-23 11:09:13 +08:00
|
|
|
if( rs->sr_err == LDAP_COMPARE_TRUE ||
|
|
|
|
rs->sr_err == LDAP_COMPARE_FALSE )
|
|
|
|
{
|
|
|
|
rs->sr_err = LDAP_SUCCESS;
|
2001-10-25 14:18:11 +08:00
|
|
|
}
|
|
|
|
|
2000-03-02 06:59:34 +08:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2000-06-16 09:19:30 +08:00
|
|
|
/*
|
|
|
|
* We could be serving multiple database backends. Select the
|
|
|
|
* appropriate one, or send a referral to our "referral server"
|
|
|
|
* if we don't hold it.
|
|
|
|
*/
|
2007-07-13 11:18:20 +08:00
|
|
|
op->o_bd = select_backend( &op->o_req_ndn, 0 );
|
2004-06-23 11:09:13 +08:00
|
|
|
if ( op->o_bd == NULL ) {
|
2004-10-06 13:51:38 +08:00
|
|
|
rs->sr_ref = referral_rewrite( default_referral,
|
2003-03-30 17:03:54 +08:00
|
|
|
NULL, &op->o_req_dn, LDAP_SCOPE_DEFAULT );
|
2001-10-26 10:05:14 +08:00
|
|
|
|
2003-03-30 17:03:54 +08:00
|
|
|
rs->sr_err = LDAP_REFERRAL;
|
2004-10-06 13:51:38 +08:00
|
|
|
if (!rs->sr_ref) rs->sr_ref = default_referral;
|
2006-01-15 01:47:54 +08:00
|
|
|
op->o_bd = bd;
|
2003-03-30 17:03:54 +08:00
|
|
|
send_ldap_result( op, rs );
|
2001-10-26 10:05:14 +08:00
|
|
|
|
2004-10-06 13:51:38 +08:00
|
|
|
if (rs->sr_ref != default_referral) ber_bvarray_free( rs->sr_ref );
|
2003-03-30 17:03:54 +08:00
|
|
|
rs->sr_err = 0;
|
2000-06-16 09:19:30 +08:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2000-08-29 02:38:48 +08:00
|
|
|
/* check restrictions */
|
2003-03-30 17:03:54 +08:00
|
|
|
if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
|
|
|
|
send_ldap_result( op, rs );
|
2000-06-16 09:19:30 +08:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check for referrals */
|
2003-03-30 17:03:54 +08:00
|
|
|
if( backend_check_referrals( op, rs ) != LDAP_SUCCESS ) {
|
2000-06-16 09:19:30 +08:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2006-08-23 04:29:14 +08:00
|
|
|
if ( SLAP_SHADOW(op->o_bd) && get_dontUseCopy(op) ) {
|
|
|
|
/* don't use shadow copy */
|
|
|
|
send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
|
|
|
|
"copy not used" );
|
|
|
|
|
2007-07-23 11:51:42 +08:00
|
|
|
} else if ( ava->aa_desc == slap_schema.si_ad_entryDN ) {
|
2004-09-07 13:00:33 +08:00
|
|
|
send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
|
|
|
|
"entryDN compare not supported" );
|
|
|
|
|
2007-07-23 11:51:42 +08:00
|
|
|
} else if ( ava->aa_desc == slap_schema.si_ad_subschemaSubentry ) {
|
2004-09-07 13:00:33 +08:00
|
|
|
send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
|
|
|
|
"subschemaSubentry compare not supported" );
|
|
|
|
|
2005-01-27 07:19:48 +08:00
|
|
|
#ifndef SLAP_COMPARE_IN_FRONTEND
|
2007-07-23 11:51:42 +08:00
|
|
|
} else if ( ava->aa_desc == slap_schema.si_ad_hasSubordinates
|
2004-09-07 13:00:33 +08:00
|
|
|
&& op->o_bd->be_has_subordinates )
|
2004-07-31 18:42:28 +08:00
|
|
|
{
|
|
|
|
int rc, hasSubordinates = LDAP_SUCCESS;
|
|
|
|
|
2004-09-07 13:00:33 +08:00
|
|
|
rc = be_entry_get_rw( op, &op->o_req_ndn, NULL, NULL, 0, &entry );
|
2004-07-31 18:42:28 +08:00
|
|
|
if ( rc == 0 && entry ) {
|
2005-01-27 07:19:48 +08:00
|
|
|
if ( ! access_allowed( op, entry,
|
2007-07-23 11:51:42 +08:00
|
|
|
ava->aa_desc, &ava->aa_value, ACL_COMPARE, NULL ) )
|
2005-01-27 07:19:48 +08:00
|
|
|
{
|
|
|
|
rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
rc = rs->sr_err = op->o_bd->be_has_subordinates( op,
|
|
|
|
entry, &hasSubordinates );
|
|
|
|
be_entry_release_r( op, entry );
|
|
|
|
}
|
2004-07-31 18:42:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if ( rc == 0 ) {
|
|
|
|
int asserted;
|
|
|
|
|
2007-07-23 11:51:42 +08:00
|
|
|
asserted = bvmatch( &ava->aa_value, &slap_true_bv )
|
2004-07-31 18:42:28 +08:00
|
|
|
? LDAP_COMPARE_TRUE : LDAP_COMPARE_FALSE;
|
|
|
|
if ( hasSubordinates == asserted ) {
|
|
|
|
rs->sr_err = LDAP_COMPARE_TRUE;
|
2005-01-27 07:19:48 +08:00
|
|
|
|
2004-07-31 18:42:28 +08:00
|
|
|
} else {
|
|
|
|
rs->sr_err = LDAP_COMPARE_FALSE;
|
|
|
|
}
|
2005-01-27 07:19:48 +08:00
|
|
|
|
|
|
|
} else {
|
|
|
|
/* return error only if "disclose"
|
|
|
|
* is granted on the object */
|
|
|
|
if ( backend_access( op, NULL, &op->o_req_ndn,
|
|
|
|
slap_schema.si_ad_entry,
|
|
|
|
NULL, ACL_DISCLOSE, NULL ) == LDAP_INSUFFICIENT_ACCESS )
|
|
|
|
{
|
|
|
|
rs->sr_err = LDAP_NO_SUCH_OBJECT;
|
|
|
|
}
|
2004-07-31 18:42:28 +08:00
|
|
|
}
|
2005-01-27 07:19:48 +08:00
|
|
|
|
2004-07-31 18:42:28 +08:00
|
|
|
send_ldap_result( op, rs );
|
|
|
|
|
2005-01-27 07:19:48 +08:00
|
|
|
if ( rc == 0 ) {
|
|
|
|
rs->sr_err = LDAP_SUCCESS;
|
|
|
|
}
|
2004-09-07 13:00:33 +08:00
|
|
|
|
2004-07-31 18:42:28 +08:00
|
|
|
} else if ( op->o_bd->be_compare ) {
|
2005-01-31 06:06:38 +08:00
|
|
|
rs->sr_err = op->o_bd->be_compare( op, rs );
|
2004-07-31 18:42:28 +08:00
|
|
|
|
2005-01-27 07:19:48 +08:00
|
|
|
#endif /* ! SLAP_COMPARE_IN_FRONTEND */
|
1998-08-09 08:43:13 +08:00
|
|
|
} else {
|
2005-01-31 06:06:38 +08:00
|
|
|
rs->sr_err = SLAP_CB_CONTINUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( rs->sr_err == SLAP_CB_CONTINUE ) {
|
2005-01-27 07:19:48 +08:00
|
|
|
/* do our best to compare that AVA
|
|
|
|
*
|
|
|
|
* NOTE: this code is used only
|
|
|
|
* if SLAP_COMPARE_IN_FRONTEND
|
|
|
|
* is #define'd (it's not by default)
|
|
|
|
* or if op->o_bd->be_compare is NULL.
|
|
|
|
*
|
|
|
|
* FIXME: one potential issue is that
|
|
|
|
* if SLAP_COMPARE_IN_FRONTEND overlays
|
|
|
|
* are not executed for compare. */
|
|
|
|
BerVarray vals = NULL;
|
|
|
|
int rc = LDAP_OTHER;
|
|
|
|
|
|
|
|
rs->sr_err = backend_attribute( op, NULL, &op->o_req_ndn,
|
2007-07-23 11:51:42 +08:00
|
|
|
ava->aa_desc, &vals, ACL_COMPARE );
|
2005-01-27 07:19:48 +08:00
|
|
|
switch ( rs->sr_err ) {
|
|
|
|
default:
|
|
|
|
/* return error only if "disclose"
|
|
|
|
* is granted on the object */
|
|
|
|
if ( backend_access( op, NULL, &op->o_req_ndn,
|
|
|
|
slap_schema.si_ad_entry,
|
|
|
|
NULL, ACL_DISCLOSE, NULL )
|
|
|
|
== LDAP_INSUFFICIENT_ACCESS )
|
|
|
|
{
|
|
|
|
rs->sr_err = LDAP_NO_SUCH_OBJECT;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case LDAP_SUCCESS:
|
|
|
|
if ( value_find_ex( op->oq_compare.rs_ava->aa_desc,
|
|
|
|
SLAP_MR_ATTRIBUTE_VALUE_NORMALIZED_MATCH |
|
|
|
|
SLAP_MR_ASSERTED_VALUE_NORMALIZED_MATCH,
|
2007-07-23 11:51:42 +08:00
|
|
|
vals, &ava->aa_value, op->o_tmpmemctx ) == 0 )
|
2005-01-27 07:19:48 +08:00
|
|
|
{
|
|
|
|
rs->sr_err = LDAP_COMPARE_TRUE;
|
|
|
|
break;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
rs->sr_err = LDAP_COMPARE_FALSE;
|
|
|
|
}
|
|
|
|
rc = LDAP_SUCCESS;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
send_ldap_result( op, rs );
|
|
|
|
|
|
|
|
if ( rc == 0 ) {
|
|
|
|
rs->sr_err = LDAP_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( vals ) {
|
|
|
|
ber_bvarray_free_x( vals, op->o_tmpmemctx );
|
|
|
|
}
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
2000-02-01 01:59:10 +08:00
|
|
|
|
2004-07-27 05:26:34 +08:00
|
|
|
cleanup:;
|
2006-01-15 01:47:54 +08:00
|
|
|
op->o_bd = bd;
|
2003-03-30 17:03:54 +08:00
|
|
|
return rs->sr_err;
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
2001-10-25 14:18:11 +08:00
|
|
|
|
2010-12-24 05:36:57 +08:00
|
|
|
int slap_compare_entry(
|
2001-10-25 14:18:11 +08:00
|
|
|
Operation *op,
|
|
|
|
Entry *e,
|
|
|
|
AttributeAssertion *ava )
|
|
|
|
{
|
2005-03-20 04:14:14 +08:00
|
|
|
int rc = LDAP_COMPARE_FALSE;
|
2001-10-25 14:18:11 +08:00
|
|
|
Attribute *a;
|
|
|
|
|
2003-03-30 17:03:54 +08:00
|
|
|
if ( ! access_allowed( op, e,
|
2002-02-09 13:14:17 +08:00
|
|
|
ava->aa_desc, &ava->aa_value, ACL_COMPARE, NULL ) )
|
2001-10-25 14:18:11 +08:00
|
|
|
{
|
2005-03-20 04:14:14 +08:00
|
|
|
rc = LDAP_INSUFFICIENT_ACCESS;
|
|
|
|
goto done;
|
2001-10-25 14:18:11 +08:00
|
|
|
}
|
|
|
|
|
2010-12-24 05:53:05 +08:00
|
|
|
if ( get_assert( op ) &&
|
|
|
|
( test_filter( op, e, get_assertion( op )) != LDAP_COMPARE_TRUE ))
|
|
|
|
{
|
|
|
|
rc = LDAP_ASSERTION_FAILED;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2004-09-18 06:07:29 +08:00
|
|
|
a = attrs_find( e->e_attrs, ava->aa_desc );
|
2005-03-20 04:14:14 +08:00
|
|
|
if( a == NULL ) {
|
|
|
|
rc = LDAP_NO_SUCH_ATTRIBUTE;
|
|
|
|
goto done;
|
|
|
|
}
|
2004-09-18 06:07:29 +08:00
|
|
|
|
2010-12-24 05:36:57 +08:00
|
|
|
for(;
|
2001-10-25 14:18:11 +08:00
|
|
|
a != NULL;
|
|
|
|
a = attrs_find( a->a_next, ava->aa_desc ))
|
|
|
|
{
|
2004-09-18 06:07:29 +08:00
|
|
|
if (( ava->aa_desc != a->a_desc ) && ! access_allowed( op,
|
|
|
|
e, a->a_desc, &ava->aa_value, ACL_COMPARE, NULL ) )
|
|
|
|
{
|
|
|
|
rc = LDAP_INSUFFICIENT_ACCESS;
|
|
|
|
break;
|
|
|
|
}
|
2001-10-25 14:18:11 +08:00
|
|
|
|
2007-09-24 13:02:31 +08:00
|
|
|
if ( attr_valfind( a,
|
2003-03-17 02:10:16 +08:00
|
|
|
SLAP_MR_ATTRIBUTE_VALUE_NORMALIZED_MATCH |
|
|
|
|
SLAP_MR_ASSERTED_VALUE_NORMALIZED_MATCH,
|
2007-09-24 13:02:31 +08:00
|
|
|
&ava->aa_value, NULL, op->o_tmpmemctx ) == 0 )
|
2003-02-27 09:54:43 +08:00
|
|
|
{
|
2001-10-25 14:18:11 +08:00
|
|
|
rc = LDAP_COMPARE_TRUE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-03-20 04:14:14 +08:00
|
|
|
done:
|
|
|
|
if( rc != LDAP_COMPARE_TRUE && rc != LDAP_COMPARE_FALSE ) {
|
|
|
|
if ( ! access_allowed( op, e,
|
|
|
|
slap_schema.si_ad_entry, NULL, ACL_DISCLOSE, NULL ) )
|
|
|
|
{
|
|
|
|
rc = LDAP_NO_SUCH_OBJECT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-10-25 14:18:11 +08:00
|
|
|
return rc;
|
|
|
|
}
|