| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271 |
- /** BEGIN COPYRIGHT BLOCK
- * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
- * Copyright (C) 2009 Red Hat, Inc.
- * All rights reserved.
- *
- * License: GPL (version 3 or any later version).
- * See LICENSE for details.
- * END COPYRIGHT BLOCK **/
- #ifdef HAVE_CONFIG_H
- # include <config.h>
- #endif
- /* nameoptuid.c - Name And Optional UID syntax routines */
- #include <stdio.h>
- #include <string.h>
- #include <sys/types.h>
- #include "syntax.h"
- static int nameoptuid_filter_ava( Slapi_PBlock *pb, struct berval *bvfilter,
- Slapi_Value **bvals, int ftype, Slapi_Value **retVal );
- static int nameoptuid_filter_sub( Slapi_PBlock *pb, char *initial, char **any,
- char *final, Slapi_Value **bvals );
- static int nameoptuid_values2keys( Slapi_PBlock *pb, Slapi_Value **val,
- Slapi_Value ***ivals, int ftype );
- static int nameoptuid_assertion2keys_ava( Slapi_PBlock *pb, Slapi_Value *val,
- Slapi_Value ***ivals, int ftype );
- static int nameoptuid_assertion2keys_sub( Slapi_PBlock *pb, char *initial, char **any,
- char *final, Slapi_Value ***ivals );
- static int nameoptuid_compare(struct berval *v1, struct berval *v2);
- static int nameoptuid_validate(struct berval *val);
- static void nameoptuid_normalize(
- Slapi_PBlock *pb,
- char *s,
- int trim_spaces,
- char **alt
- );
- /* the first name is the official one from RFC 4517 */
- static char *names[] = { "Name And Optional UID", "nameoptuid", NAMEANDOPTIONALUID_SYNTAX_OID, 0 };
- static Slapi_PluginDesc pdesc = { "nameoptuid-syntax", VENDOR, DS_PACKAGE_VERSION,
- "Name And Optional UID attribute syntax plugin" };
- static const char *uniqueMemberMatch_names[] = {"uniqueMemberMatch", "2.5.13.23", NULL};
- static struct mr_plugin_def mr_plugin_table[] = {
- {{"2.5.13.23", NULL, "uniqueMemberMatch", "The uniqueMemberMatch rule compares an assertion value of the Name "
- "And Optional UID syntax to an attribute value of a syntax (e.g., the "
- "Name And Optional UID syntax) whose corresponding ASN.1 type is "
- "NameAndOptionalUID. "
- "The rule evaluates to TRUE if and only if the <distinguishedName> "
- "components of the assertion value and attribute value match according "
- "to the distinguishedNameMatch rule and either, (1) the <BitString> "
- "component is absent from both the attribute value and assertion "
- "value, or (2) the <BitString> component is present in both the "
- "attribute value and the assertion value and the <BitString> component "
- "of the assertion value matches the <BitString> component of the "
- "attribute value according to the bitStringMatch rule. "
- "Note that this matching rule has been altered from its description in "
- "X.520 [X.520] in order to make the matching rule commutative. Server "
- "implementors should consider using the original X.520 semantics "
- "(where the matching was less exact) for approximate matching of "
- "attributes with uniqueMemberMatch as the equality matching rule.",
- NAMEANDOPTIONALUID_SYNTAX_OID, 0, NULL /* no other syntaxes supported */}, /* matching rule desc */
- {"uniqueMemberMatch-mr", VENDOR, DS_PACKAGE_VERSION, "uniqueMemberMatch matching rule plugin"}, /* plugin desc */
- uniqueMemberMatch_names, /* matching rule name/oid/aliases */
- NULL, NULL, nameoptuid_filter_ava, NULL, nameoptuid_values2keys,
- nameoptuid_assertion2keys_ava, NULL, nameoptuid_compare},
- };
- static size_t mr_plugin_table_size = sizeof(mr_plugin_table)/sizeof(mr_plugin_table[0]);
- static int
- matching_rule_plugin_init(Slapi_PBlock *pb)
- {
- return syntax_matching_rule_plugin_init(pb, mr_plugin_table, mr_plugin_table_size);
- }
- static int
- register_matching_rule_plugins()
- {
- return syntax_register_matching_rule_plugins(mr_plugin_table, mr_plugin_table_size, matching_rule_plugin_init);
- }
- int
- nameoptuid_init( Slapi_PBlock *pb )
- {
- int rc, flags;
- LDAPDebug( LDAP_DEBUG_PLUGIN, "=> nameoptuid_init\n", 0, 0, 0 );
- rc = slapi_pblock_set( pb, SLAPI_PLUGIN_VERSION,
- (void *) SLAPI_PLUGIN_VERSION_01 );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_DESCRIPTION,
- (void *)&pdesc );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_FILTER_AVA,
- (void *) nameoptuid_filter_ava );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_FILTER_SUB,
- (void *) nameoptuid_filter_sub );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_VALUES2KEYS,
- (void *) nameoptuid_values2keys );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_ASSERTION2KEYS_AVA,
- (void *) nameoptuid_assertion2keys_ava );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_ASSERTION2KEYS_SUB,
- (void *) nameoptuid_assertion2keys_sub );
- flags = SLAPI_PLUGIN_SYNTAX_FLAG_ORDERING;
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_FLAGS,
- (void *) &flags );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_NAMES,
- (void *) names );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_OID,
- (void *) NAMEANDOPTIONALUID_SYNTAX_OID );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_COMPARE,
- (void *) nameoptuid_compare );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_VALIDATE,
- (void *) nameoptuid_validate );
- rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_SYNTAX_NORMALIZE,
- (void *) nameoptuid_normalize );
- rc |= register_matching_rule_plugins();
- LDAPDebug( LDAP_DEBUG_PLUGIN, "<= nameoptuid_init %d\n", rc, 0, 0 );
- return( rc );
- }
- static int
- nameoptuid_filter_ava(
- Slapi_PBlock *pb,
- struct berval *bvfilter,
- Slapi_Value **bvals,
- int ftype,
- Slapi_Value **retVal
- )
- {
- int filter_normalized = 0;
- int syntax = SYNTAX_CIS | SYNTAX_DN;
- if (pb) {
- slapi_pblock_get( pb, SLAPI_PLUGIN_SYNTAX_FILTER_NORMALIZED,
- &filter_normalized );
- if (filter_normalized) {
- syntax |= SYNTAX_NORM_FILT;
- }
- }
- return( string_filter_ava( bvfilter, bvals, syntax, ftype, retVal ) );
- }
- static int
- nameoptuid_filter_sub(
- Slapi_PBlock *pb,
- char *initial,
- char **any,
- char *final,
- Slapi_Value **bvals
- )
- {
- return( string_filter_sub( pb, initial, any, final, bvals,
- SYNTAX_CIS | SYNTAX_DN ) );
- }
- static int
- nameoptuid_values2keys(
- Slapi_PBlock *pb,
- Slapi_Value **vals,
- Slapi_Value ***ivals,
- int ftype
- )
- {
- return( string_values2keys( pb, vals, ivals, SYNTAX_CIS | SYNTAX_DN,
- ftype ) );
- }
- static int
- nameoptuid_assertion2keys_ava(
- Slapi_PBlock *pb,
- Slapi_Value *val,
- Slapi_Value ***ivals,
- int ftype
- )
- {
- return(string_assertion2keys_ava( pb, val, ivals,
- SYNTAX_CIS | SYNTAX_DN, ftype ));
- }
- static int
- nameoptuid_assertion2keys_sub(
- Slapi_PBlock *pb,
- char *initial,
- char **any,
- char *final,
- Slapi_Value ***ivals
- )
- {
- return( string_assertion2keys_sub( pb, initial, any, final, ivals,
- SYNTAX_CIS | SYNTAX_DN ) );
- }
- static int nameoptuid_compare(
- struct berval *v1,
- struct berval *v2
- )
- {
- return value_cmp(v1, v2, SYNTAX_CIS | SYNTAX_DN, 3 /* Normalise both values */);
- }
- static int
- nameoptuid_validate(
- struct berval *val
- )
- {
- int rc = 0; /* assume the value is valid */
- int got_sharp = 0;
- const char *p = NULL;
- const char *start = NULL;
- const char *end = NULL;
- /* Per RFC4517:
- *
- * NameAndOptionalUID = distinguishedName [ SHARP BitString ]
- */
- /* Don't allow a 0 length string */
- if ((val == NULL) || (val->bv_len == 0)) {
- rc = 1;
- goto exit;
- }
- start = &(val->bv_val[0]);
- end = &(val->bv_val[val->bv_len - 1]);
- /* Find the last SHARP in the value that may be separating
- * the distinguishedName from the optional BitString. */
- for (p = end; p >= start + 1; p--) {
- if (IS_SHARP(*p)) {
- got_sharp = 1;
- break;
- }
- }
- if (got_sharp) {
- /* Try to validate everything after the sharp as
- * a BitString. If this fails, we may still have
- * a valid value since a sharp is allowed in a
- * distinguishedName. If we don't find a valid
- * BitString, just validate the entire value as
- * a distinguishedName. */
- if ((rc = bitstring_validate_internal(p + 1, end)) != 0) {
- rc = distinguishedname_validate(start, end);
- } else {
- rc = distinguishedname_validate(start, p - 1);
- }
- } else {
- /* No optional BitString is present, so validate
- * the entire value as a distinguishedName. */
- rc = distinguishedname_validate(start, end);
- }
- exit:
- return rc;
- }
- static void nameoptuid_normalize(
- Slapi_PBlock *pb,
- char *s,
- int trim_spaces,
- char **alt
- )
- {
- value_normalize_ext(s, SYNTAX_CIS | SYNTAX_DN, trim_spaces, alt);
- return;
- }
|