mirror of
https://git.openldap.org/openldap/openldap.git
synced 2024-12-15 03:01:09 +08:00
c02d7e2cb6
Submitted by Gabor Gombas <gombasg@inf.elte.hu>
582 lines
12 KiB
C
582 lines
12 KiB
C
/* $OpenLDAP$ */
|
|
/*
|
|
* Copyright 1998-1999 The OpenLDAP Foundation, All Rights Reserved.
|
|
* COPYING RESTRICTIONS APPLY, see COPYRIGHT file
|
|
*/
|
|
|
|
#include "portable.h"
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <ac/stdlib.h>
|
|
|
|
#include <ac/socket.h>
|
|
#include <ac/string.h>
|
|
#include <ac/time.h>
|
|
|
|
#include "ldap-int.h"
|
|
|
|
static const LDAPAPIFeatureInfo features[] = {
|
|
#ifdef LDAP_API_FEATURE_X_OPENLDAP
|
|
{ /* OpenLDAP Extensions API Feature */
|
|
LDAP_FEATURE_INFO_VERSION,
|
|
"X_OPENLDAP",
|
|
LDAP_API_FEATURE_X_OPENLDAP
|
|
},
|
|
#endif
|
|
|
|
#ifdef LDAP_API_FEATURE_THREAD_SAFE
|
|
{ /* Basic Thread Safe */
|
|
LDAP_FEATURE_INFO_VERSION,
|
|
"THREAD_SAFE",
|
|
LDAP_API_FEATURE_THREAD_SAFE
|
|
},
|
|
#endif
|
|
#ifdef LDAP_API_FEATURE_SESSION_THREAD_SAFE
|
|
{ /* Session Thread Safe */
|
|
LDAP_FEATURE_INFO_VERSION,
|
|
"SESSION_THREAD_SAFE",
|
|
LDAP_API_FEATURE_SESSION_THREAD_SAFE
|
|
},
|
|
#endif
|
|
#ifdef LDAP_API_FEATURE_OPERATION_THREAD_SAFE
|
|
{ /* Operation Thread Safe */
|
|
LDAP_FEATURE_INFO_VERSION,
|
|
"OPERATION_THREAD_SAFE",
|
|
LDAP_API_FEATURE_OPERATION_THREAD_SAFE
|
|
},
|
|
#endif
|
|
#ifdef LDAP_API_FEATURE_X_OPENLDAP_REENTRANT
|
|
{ /* OpenLDAP Reentrant */
|
|
LDAP_FEATURE_INFO_VERSION,
|
|
"X_OPENLDAP_REENTRANT",
|
|
LDAP_API_FEATURE_X_OPENLDAP_REENTRANT
|
|
},
|
|
#endif
|
|
#if defined( LDAP_API_FEATURE_X_OPENLDAP_THREAD_SAFE ) && \
|
|
defined( LDAP_THREAD_SAFE )
|
|
{ /* OpenLDAP Thread Safe */
|
|
LDAP_FEATURE_INFO_VERSION,
|
|
"X_OPENLDAP_THREAD_SAFE",
|
|
LDAP_API_FEATURE_X_OPENLDAP_THREAD_SAFE
|
|
},
|
|
#endif
|
|
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_DNS
|
|
{ /* DNS */
|
|
LDAP_FEATURE_INFO_VERSION,
|
|
"X_OPENLDAP_V2_DNS",
|
|
LDAP_API_FEATURE_X_OPENLDAP_V2_DNS
|
|
},
|
|
#endif
|
|
#ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_REFERRALS
|
|
{ /* V2 Referrals */
|
|
LDAP_FEATURE_INFO_VERSION,
|
|
"X_OPENLDAP_V2_REFERRALS",
|
|
LDAP_API_FEATURE_X_OPENLDAP_V2_REFERRALS
|
|
},
|
|
#endif
|
|
{0, NULL, 0}
|
|
};
|
|
|
|
int
|
|
ldap_get_option(
|
|
LDAP *ld,
|
|
int option,
|
|
void *outvalue)
|
|
{
|
|
const struct ldapoptions *lo;
|
|
|
|
if( ldap_int_global_options.ldo_valid != LDAP_INITIALIZED ) {
|
|
ldap_int_initialize();
|
|
}
|
|
|
|
if(ld == NULL) {
|
|
lo = &ldap_int_global_options;
|
|
|
|
} else {
|
|
assert( LDAP_VALID( ld ) );
|
|
|
|
if( !LDAP_VALID( ld ) ) {
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
|
|
lo = &ld->ld_options;
|
|
}
|
|
|
|
if(outvalue == NULL) {
|
|
/* no place to get to */
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
|
|
switch(option) {
|
|
case LDAP_OPT_API_INFO: {
|
|
struct ldapapiinfo *info = (struct ldapapiinfo *) outvalue;
|
|
|
|
if(info == NULL) {
|
|
/* outvalue must point to an apiinfo structure */
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
|
|
if(info->ldapai_info_version != LDAP_API_INFO_VERSION) {
|
|
/* api info version mismatch */
|
|
info->ldapai_info_version = LDAP_API_INFO_VERSION;
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
|
|
info->ldapai_api_version = LDAP_API_VERSION;
|
|
info->ldapai_api_version = LDAP_API_VERSION;
|
|
info->ldapai_protocol_version = LDAP_VERSION_MAX;
|
|
|
|
if(features[0].ldapaif_name == NULL) {
|
|
info->ldapai_extensions = NULL;
|
|
} else {
|
|
int i;
|
|
info->ldapai_extensions = LDAP_MALLOC(sizeof(char *) *
|
|
sizeof(features)/sizeof(LDAPAPIFeatureInfo));
|
|
|
|
for(i=0; features[i].ldapaif_name != NULL; i++) {
|
|
info->ldapai_extensions[i] =
|
|
LDAP_STRDUP(features[i].ldapaif_name);
|
|
}
|
|
|
|
info->ldapai_extensions[i] = NULL;
|
|
}
|
|
|
|
info->ldapai_vendor_name = LDAP_STRDUP(LDAP_VENDOR_NAME);
|
|
info->ldapai_vendor_version = LDAP_VENDOR_VERSION;
|
|
|
|
return LDAP_OPT_SUCCESS;
|
|
} break;
|
|
|
|
case LDAP_OPT_DESC:
|
|
if(ld == NULL) {
|
|
/* bad param */
|
|
break;
|
|
}
|
|
|
|
* (ber_socket_t *) outvalue = ber_pvt_sb_get_desc( &(ld->ld_sb) );
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_TIMEOUT:
|
|
/* the caller has to free outvalue ! */
|
|
if ( ldap_int_timeval_dup( outvalue, lo->ldo_tm_api) != 0 )
|
|
{
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_NETWORK_TIMEOUT:
|
|
/* the caller has to free outvalue ! */
|
|
if ( ldap_int_timeval_dup( outvalue, lo->ldo_tm_net ) != 0 )
|
|
{
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_DEREF:
|
|
* (int *) outvalue = lo->ldo_deref;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_SIZELIMIT:
|
|
* (int *) outvalue = lo->ldo_sizelimit;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_TIMELIMIT:
|
|
* (int *) outvalue = lo->ldo_timelimit;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_REFERRALS:
|
|
* (int *) outvalue = (int) LDAP_BOOL_GET(lo, LDAP_BOOL_REFERRALS);
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_RESTART:
|
|
* (int *) outvalue = (int) LDAP_BOOL_GET(lo, LDAP_BOOL_RESTART);
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_DNS: /* LDAPv2 */
|
|
* (int *) outvalue = (int) LDAP_BOOL_GET(lo, LDAP_BOOL_DNS);
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_PROTOCOL_VERSION:
|
|
* (int *) outvalue = lo->ldo_version;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_SERVER_CONTROLS:
|
|
* (LDAPControl ***) outvalue =
|
|
ldap_controls_dup( lo->ldo_sctrls );
|
|
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_CLIENT_CONTROLS:
|
|
* (LDAPControl ***) outvalue =
|
|
ldap_controls_dup( lo->ldo_cctrls );
|
|
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_HOST_NAME:
|
|
* (char **) outvalue = ldap_url_list2hosts(lo->ldo_defludp);
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_URI:
|
|
* (char **) outvalue = ldap_url_list2urls(lo->ldo_defludp);
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_ERROR_NUMBER:
|
|
if(ld == NULL) {
|
|
/* bad param */
|
|
break;
|
|
}
|
|
* (int *) outvalue = ld->ld_errno;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_ERROR_STRING:
|
|
if(ld == NULL) {
|
|
/* bad param */
|
|
break;
|
|
}
|
|
|
|
if( ld->ld_error == NULL ) {
|
|
* (char **) outvalue = NULL;
|
|
} else {
|
|
* (char **) outvalue = LDAP_STRDUP(ld->ld_error);
|
|
}
|
|
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_MATCHED_DN:
|
|
if(ld == NULL) {
|
|
/* bad param */
|
|
break;
|
|
}
|
|
|
|
if( ld->ld_matched == NULL ) {
|
|
* (char **) outvalue = NULL;
|
|
} else {
|
|
* (char **) outvalue = LDAP_STRDUP(ld->ld_matched);
|
|
}
|
|
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_API_FEATURE_INFO: {
|
|
LDAPAPIFeatureInfo *info = (LDAPAPIFeatureInfo *) outvalue;
|
|
int i;
|
|
|
|
if(info == NULL) return LDAP_OPT_ERROR;
|
|
|
|
if(info->ldapaif_info_version != LDAP_FEATURE_INFO_VERSION) {
|
|
/* api info version mismatch */
|
|
info->ldapaif_info_version = LDAP_FEATURE_INFO_VERSION;
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
|
|
if(info->ldapaif_name == NULL) return LDAP_OPT_ERROR;
|
|
|
|
for(i=0; features[i].ldapaif_name != NULL; i++) {
|
|
if(!strcmp(info->ldapaif_name, features[i].ldapaif_name)) {
|
|
info->ldapaif_version =
|
|
features[i].ldapaif_version;
|
|
return LDAP_OPT_SUCCESS;
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
|
|
case LDAP_OPT_DEBUG_LEVEL:
|
|
* (int *) outvalue = lo->ldo_debug;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
default:
|
|
#ifdef HAVE_TLS
|
|
if ( ldap_pvt_tls_get_option((struct ldapoptions *)lo, option, outvalue ) == 0 )
|
|
return LDAP_OPT_SUCCESS;
|
|
#endif
|
|
#ifdef HAVE_CYRUS_SASL
|
|
if ( ldap_pvt_sasl_get_option(ld, option, outvalue ) == 0 )
|
|
return LDAP_OPT_SUCCESS;
|
|
#endif
|
|
/* bad param */
|
|
break;
|
|
}
|
|
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
|
|
int
|
|
ldap_set_option(
|
|
LDAP *ld,
|
|
int option,
|
|
LDAP_CONST void *invalue)
|
|
{
|
|
struct ldapoptions *lo;
|
|
|
|
if( ldap_int_global_options.ldo_valid != LDAP_INITIALIZED ) {
|
|
ldap_int_initialize();
|
|
}
|
|
|
|
if(ld == NULL) {
|
|
lo = &ldap_int_global_options;
|
|
|
|
} else {
|
|
assert( LDAP_VALID( ld ) );
|
|
|
|
if( !LDAP_VALID( ld ) ) {
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
|
|
lo = &ld->ld_options;
|
|
}
|
|
|
|
switch(option) {
|
|
case LDAP_OPT_REFERRALS:
|
|
if(invalue == LDAP_OPT_OFF) {
|
|
LDAP_BOOL_CLR(lo, LDAP_BOOL_REFERRALS);
|
|
} else {
|
|
LDAP_BOOL_SET(lo, LDAP_BOOL_REFERRALS);
|
|
}
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_RESTART:
|
|
if(invalue == LDAP_OPT_OFF) {
|
|
LDAP_BOOL_CLR(lo, LDAP_BOOL_RESTART);
|
|
} else {
|
|
LDAP_BOOL_SET(lo, LDAP_BOOL_RESTART);
|
|
}
|
|
return LDAP_OPT_SUCCESS;
|
|
}
|
|
|
|
/* options which can withstand invalue == NULL */
|
|
switch ( option ) {
|
|
case LDAP_OPT_SERVER_CONTROLS: {
|
|
LDAPControl *const *controls =
|
|
(LDAPControl *const *) invalue;
|
|
|
|
ldap_controls_free( lo->ldo_sctrls );
|
|
|
|
if( controls == NULL || *controls == NULL ) {
|
|
lo->ldo_sctrls = NULL;
|
|
return LDAP_OPT_SUCCESS;
|
|
}
|
|
|
|
lo->ldo_sctrls = ldap_controls_dup( controls );
|
|
|
|
if(lo->ldo_sctrls == NULL) {
|
|
/* memory allocation error ? */
|
|
break;
|
|
}
|
|
} return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_CLIENT_CONTROLS: {
|
|
LDAPControl *const *controls =
|
|
(LDAPControl *const *) invalue;
|
|
|
|
ldap_controls_free( lo->ldo_cctrls );
|
|
|
|
if( controls == NULL || *controls == NULL ) {
|
|
lo->ldo_cctrls = NULL;
|
|
return LDAP_OPT_SUCCESS;
|
|
}
|
|
|
|
lo->ldo_cctrls = ldap_controls_dup( controls );
|
|
|
|
if(lo->ldo_cctrls == NULL) {
|
|
/* memory allocation error ? */
|
|
break;
|
|
}
|
|
} return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_TIMEOUT: {
|
|
const struct timeval *tv =
|
|
(const struct timeval *) invalue;
|
|
|
|
if ( lo->ldo_tm_api != NULL ) {
|
|
LDAP_FREE( lo->ldo_tm_api );
|
|
lo->ldo_tm_api = NULL;
|
|
}
|
|
|
|
if ( ldap_int_timeval_dup( &lo->ldo_tm_api, tv ) != 0 ) {
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
} return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_NETWORK_TIMEOUT: {
|
|
const struct timeval *tv =
|
|
(const struct timeval *) invalue;
|
|
|
|
if ( lo->ldo_tm_net != NULL ) {
|
|
LDAP_FREE( lo->ldo_tm_net );
|
|
lo->ldo_tm_net = NULL;
|
|
}
|
|
|
|
if ( ldap_int_timeval_dup( &lo->ldo_tm_net, tv ) != 0 ) {
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
} return LDAP_OPT_SUCCESS;
|
|
}
|
|
|
|
if(invalue == NULL) {
|
|
/* no place to set from */
|
|
return LDAP_OPT_ERROR;
|
|
}
|
|
|
|
/* options which cannot withstand invalue == NULL */
|
|
|
|
switch(option) {
|
|
case LDAP_OPT_API_INFO:
|
|
case LDAP_OPT_DESC:
|
|
/* READ ONLY */
|
|
break;
|
|
|
|
case LDAP_OPT_DEREF:
|
|
lo->ldo_deref = * (const int *) invalue;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_SIZELIMIT:
|
|
lo->ldo_sizelimit = * (const int *) invalue;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_TIMELIMIT:
|
|
lo->ldo_timelimit = * (const int *) invalue;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_PROTOCOL_VERSION: {
|
|
int vers = * (const int *) invalue;
|
|
if (vers < LDAP_VERSION_MIN || vers > LDAP_VERSION_MAX) {
|
|
/* not supported */
|
|
break;
|
|
}
|
|
lo->ldo_version = vers;
|
|
} return LDAP_OPT_SUCCESS;
|
|
|
|
|
|
case LDAP_OPT_HOST_NAME: {
|
|
const char *host = (const char *) invalue;
|
|
LDAPURLDesc *ludlist = NULL;
|
|
int rc = LDAP_OPT_SUCCESS;
|
|
|
|
if(host != NULL) {
|
|
rc = ldap_url_parsehosts(&ludlist, host);
|
|
|
|
} else if(ld == NULL) {
|
|
/*
|
|
* must want global default returned
|
|
* to initial condition.
|
|
*/
|
|
rc = ldap_url_parselist(&ludlist, "ldap://localhost/");
|
|
|
|
} else {
|
|
/*
|
|
* must want the session default
|
|
* updated to the current global default
|
|
*/
|
|
ludlist = ldap_url_duplist(
|
|
ldap_int_global_options.ldo_defludp);
|
|
if (ludlist == NULL)
|
|
rc = LDAP_NO_MEMORY;
|
|
}
|
|
|
|
if (rc == LDAP_OPT_SUCCESS) {
|
|
if (lo->ldo_defludp != NULL)
|
|
ldap_free_urllist(lo->ldo_defludp);
|
|
lo->ldo_defludp = ludlist;
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
case LDAP_OPT_URI: {
|
|
const char *urls = (const char *) invalue;
|
|
LDAPURLDesc *ludlist = NULL;
|
|
int rc = LDAP_OPT_SUCCESS;
|
|
|
|
if(urls != NULL) {
|
|
rc = ldap_url_parselist(&ludlist, urls);
|
|
|
|
} else if(ld == NULL) {
|
|
/*
|
|
* must want global default returned
|
|
* to initial condition.
|
|
*/
|
|
rc = ldap_url_parselist(&ludlist, "ldap://localhost/");
|
|
|
|
} else {
|
|
/*
|
|
* must want the session default
|
|
* updated to the current global default
|
|
*/
|
|
ludlist = ldap_url_duplist(
|
|
ldap_int_global_options.ldo_defludp);
|
|
if (ludlist == NULL)
|
|
rc = LDAP_NO_MEMORY;
|
|
}
|
|
|
|
if (rc == LDAP_OPT_SUCCESS) {
|
|
if (lo->ldo_defludp != NULL)
|
|
ldap_free_urllist(lo->ldo_defludp);
|
|
lo->ldo_defludp = ludlist;
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
case LDAP_OPT_ERROR_NUMBER: {
|
|
int err = * (const int *) invalue;
|
|
|
|
if(ld == NULL) {
|
|
/* need a struct ldap */
|
|
break;
|
|
}
|
|
|
|
ld->ld_errno = err;
|
|
} return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_ERROR_STRING: {
|
|
const char *err = (const char *) invalue;
|
|
|
|
if(ld == NULL) {
|
|
/* need a struct ldap */
|
|
break;
|
|
}
|
|
|
|
if( ld->ld_error ) {
|
|
LDAP_FREE(ld->ld_error);
|
|
}
|
|
|
|
ld->ld_error = LDAP_STRDUP(err);
|
|
} return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_MATCHED_DN: {
|
|
const char *err = (const char *) invalue;
|
|
|
|
if(ld == NULL) {
|
|
/* need a struct ldap */
|
|
break;
|
|
}
|
|
|
|
if( ld->ld_matched ) {
|
|
LDAP_FREE(ld->ld_matched);
|
|
}
|
|
|
|
ld->ld_matched = LDAP_STRDUP(err);
|
|
} return LDAP_OPT_SUCCESS;
|
|
|
|
case LDAP_OPT_API_FEATURE_INFO:
|
|
/* read-only */
|
|
break;
|
|
|
|
case LDAP_OPT_DEBUG_LEVEL:
|
|
lo->ldo_debug = * (const int *) invalue;
|
|
return LDAP_OPT_SUCCESS;
|
|
|
|
default:
|
|
#ifdef HAVE_TLS
|
|
if ( ldap_pvt_tls_set_option( lo, option, (void *)invalue ) == 0 )
|
|
return LDAP_OPT_SUCCESS;
|
|
#endif
|
|
#ifdef HAVE_CYRUS_SASL
|
|
if ( ldap_pvt_sasl_set_option( ld, option, (void *)invalue ) == 0 )
|
|
return LDAP_OPT_SUCCESS;
|
|
#endif
|
|
/* bad param */
|
|
break;
|
|
}
|
|
return LDAP_OPT_ERROR;
|
|
}
|