From 7731832751ab9f3c6ddeb66f186d3d7fa1934a6d Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sat, 27 Apr 2024 13:11:40 +0200 Subject: Adding upstream version 2.4.57+dfsg. Signed-off-by: Daniel Baumann --- servers/slapd/mra.c | 231 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 231 insertions(+) create mode 100644 servers/slapd/mra.c (limited to 'servers/slapd/mra.c') diff --git a/servers/slapd/mra.c b/servers/slapd/mra.c new file mode 100644 index 0000000..d6ea475 --- /dev/null +++ b/servers/slapd/mra.c @@ -0,0 +1,231 @@ +/* mra.c - routines for dealing with extensible matching rule assertions */ +/* $OpenLDAP$ */ +/* This work is part of OpenLDAP Software . + * + * Copyright 1998-2021 The OpenLDAP Foundation. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in the file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * . + */ + +#include "portable.h" + +#include + +#include +#include + +#include "slap.h" + +#ifdef LDAP_COMP_MATCH +#include "component.h" +#endif + +void +mra_free( + Operation *op, + MatchingRuleAssertion *mra, + int freeit ) +{ +#ifdef LDAP_COMP_MATCH + /* free component assertion */ + if ( mra->ma_rule->smr_usage & SLAP_MR_COMPONENT && mra->ma_cf ) { + component_free( mra->ma_cf ); + } +#endif + /* op->o_tmpfree( mra->ma_value.bv_val, op->o_tmpmemctx ); */ + ch_free( mra->ma_value.bv_val ); + if ( mra->ma_desc && mra->ma_desc->ad_flags & SLAP_DESC_TEMPORARY ) + op->o_tmpfree( mra->ma_desc, op->o_tmpmemctx ); + if ( freeit ) op->o_tmpfree( (char *) mra, op->o_tmpmemctx ); +} + +int +get_mra( + Operation *op, + BerElement *ber, + Filter *f, + const char **text ) +{ + int rc; + ber_tag_t tag, rtag; + ber_len_t length; + struct berval type = BER_BVNULL; + struct berval value = BER_BVNULL; + struct berval rule_text = BER_BVNULL; + MatchingRuleAssertion ma = { 0 }; +#ifdef LDAP_COMP_MATCH + AttributeAliasing* aa = NULL; +#endif + + rtag = ber_scanf( ber, "{t" /*"}"*/, &tag ); + + if( rtag == LBER_ERROR ) { + Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); + + *text = "Error parsing matching rule assertion"; + return SLAPD_DISCONNECT; + } + + if ( tag == LDAP_FILTER_EXT_OID ) { + rtag = ber_scanf( ber, "m", &rule_text ); + if ( rtag == LBER_ERROR ) { + Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf for mr\n", 0, 0, 0 ); + + *text = "Error parsing matching rule in matching rule assertion"; + return SLAPD_DISCONNECT; + } + + rtag = ber_scanf( ber, "t", &tag ); + if( rtag == LBER_ERROR ) { + Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); + + *text = "Error parsing matching rule assertion"; + return SLAPD_DISCONNECT; + } + } + + if ( tag == LDAP_FILTER_EXT_TYPE ) { + rtag = ber_scanf( ber, "m", &type ); + if ( rtag == LBER_ERROR ) { + Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf for ad\n", 0, 0, 0 ); + + *text = "Error parsing attribute description in matching rule assertion"; + return SLAPD_DISCONNECT; + } + + rtag = ber_scanf( ber, "t", &tag ); + if( rtag == LBER_ERROR ) { + Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); + + *text = "Error parsing matching rule assertion"; + return SLAPD_DISCONNECT; + } + } + + if ( tag != LDAP_FILTER_EXT_VALUE ) { + Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf missing value\n", 0, 0, 0 ); + + *text = "Missing value in matching rule assertion"; + return SLAPD_DISCONNECT; + } + + rtag = ber_scanf( ber, "m", &value ); + + if( rtag == LBER_ERROR ) { + Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); + + *text = "Error decoding value in matching rule assertion"; + return SLAPD_DISCONNECT; + } + + tag = ber_peek_tag( ber, &length ); + + if ( tag == LDAP_FILTER_EXT_DNATTRS ) { + rtag = ber_scanf( ber, /*"{"*/ "b}", &ma.ma_dnattrs ); + } else { + rtag = ber_scanf( ber, /*"{"*/ "}" ); + } + + if( rtag == LBER_ERROR ) { + Debug( LDAP_DEBUG_ANY, " get_mra ber_scanf\n", 0, 0, 0 ); + + *text = "Error decoding dnattrs matching rule assertion"; + return SLAPD_DISCONNECT; + } + + if( type.bv_val != NULL ) { + rc = slap_bv2ad( &type, &ma.ma_desc, text ); + if( rc != LDAP_SUCCESS ) { + f->f_choice |= SLAPD_FILTER_UNDEFINED; + rc = slap_bv2undef_ad( &type, &ma.ma_desc, text, + SLAP_AD_PROXIED|SLAP_AD_NOINSERT ); + + if( rc != LDAP_SUCCESS ) { + ma.ma_desc = slap_bv2tmp_ad( &type, op->o_tmpmemctx ); + rc = LDAP_SUCCESS; + } + } + } + + if( rule_text.bv_val != NULL ) { + ma.ma_rule = mr_bvfind( &rule_text ); + if( ma.ma_rule == NULL ) { + *text = "matching rule not recognized"; + return LDAP_INAPPROPRIATE_MATCHING; + } + } + + if ( ma.ma_rule == NULL ) { + /* + * Need either type or rule ... + */ + if ( ma.ma_desc == NULL ) { + *text = "no matching rule or type"; + return LDAP_INAPPROPRIATE_MATCHING; + } + + if ( ma.ma_desc->ad_type->sat_equality != NULL && + ma.ma_desc->ad_type->sat_equality->smr_usage & SLAP_MR_EXT ) + { + /* no matching rule was provided, use the attribute's + equality rule if it supports extensible matching. */ + ma.ma_rule = ma.ma_desc->ad_type->sat_equality; + + } else { + *text = "no appropriate rule to use for type"; + return LDAP_INAPPROPRIATE_MATCHING; + } + } + + if ( ma.ma_desc != NULL ) { + if( !mr_usable_with_at( ma.ma_rule, ma.ma_desc->ad_type ) ) { + *text = "matching rule use with this attribute not appropriate"; + return LDAP_INAPPROPRIATE_MATCHING; + } + + } + + /* + * Normalize per matching rule + */ + rc = asserted_value_validate_normalize( ma.ma_desc, + ma.ma_rule, + SLAP_MR_EXT|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX, + &value, &ma.ma_value, text, op->o_tmpmemctx ); + + if( rc != LDAP_SUCCESS ) return rc; + +#ifdef LDAP_COMP_MATCH + /* Check If this attribute is aliased */ + if ( is_aliased_attribute && ma.ma_desc && ( aa = is_aliased_attribute ( ma.ma_desc ) ) ) { + rc = get_aliased_filter ( op, &ma, aa, text ); + if ( rc != LDAP_SUCCESS ) return rc; + } + else if ( ma.ma_rule && ma.ma_rule->smr_usage & SLAP_MR_COMPONENT ) { + /* Matching Rule for Component Matching */ + rc = get_comp_filter( op, &ma.ma_value, &ma.ma_cf, text ); + if ( rc != LDAP_SUCCESS ) return rc; + } +#endif + + length = sizeof(ma); + /* Append rule_text to end of struct */ + if (rule_text.bv_val) length += rule_text.bv_len + 1; + f->f_mra = op->o_tmpalloc( length, op->o_tmpmemctx ); + *f->f_mra = ma; + if (rule_text.bv_val) { + f->f_mra->ma_rule_text.bv_len = rule_text.bv_len; + f->f_mra->ma_rule_text.bv_val = (char *)(f->f_mra+1); + AC_MEMCPY(f->f_mra->ma_rule_text.bv_val, rule_text.bv_val, + rule_text.bv_len+1); + } + + return LDAP_SUCCESS; +} -- cgit v1.2.3