diff options
Diffstat (limited to 'usr/src/lib/libldap5/sources/ldap/common/setoption.c')
-rw-r--r-- | usr/src/lib/libldap5/sources/ldap/common/setoption.c | 425 |
1 files changed, 425 insertions, 0 deletions
diff --git a/usr/src/lib/libldap5/sources/ldap/common/setoption.c b/usr/src/lib/libldap5/sources/ldap/common/setoption.c new file mode 100644 index 0000000000..0988028f1c --- /dev/null +++ b/usr/src/lib/libldap5/sources/ldap/common/setoption.c @@ -0,0 +1,425 @@ +/* + * Copyright 2003 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +/* + * The contents of this file are subject to the Netscape Public + * License Version 1.1 (the "License"); you may not use this file + * except in compliance with the License. You may obtain a copy of + * the License at http://www.mozilla.org/NPL/ + * + * Software distributed under the License is distributed on an "AS + * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or + * implied. See the License for the specific language governing + * rights and limitations under the License. + * + * The Original Code is Mozilla Communicator client code, released + * March 31, 1998. + * + * The Initial Developer of the Original Code is Netscape + * Communications Corporation. Portions created by Netscape are + * Copyright (C) 1998-1999 Netscape Communications Corporation. All + * Rights Reserved. + * + * Contributor(s): + */ +/* + * setoption.c - ldap_set_option implementation + */ + +#include "ldap-int.h" +#ifdef _SOLARIS_SDK +#include "solaris-priv.h" +#endif + +extern int nsldapi_sasl_secprops(const char *in, + sasl_security_properties_t *secprops); + +#define LDAP_SETCLR_BITOPT(ld, bit, optdata) \ + if (optdata != NULL) { \ + (ld)->ld_options |= bit; \ + } else { \ + (ld)->ld_options &= ~bit; \ + } + + +int +LDAP_CALL +ldap_set_option(LDAP *ld, int option, const void *optdata) +{ + int rc, i; + char *matched, *errstr; + + if (!nsldapi_initialized) { + nsldapi_initialize_defaults(); + } + + /* + * process global options (not associated with an LDAP session handle) + */ + if (option == LDAP_OPT_MEMALLOC_FN_PTRS) { + struct lber_memalloc_fns memalloc_fns; + + /* set libldap ones via a struct copy */ + nsldapi_memalloc_fns = *((struct ldap_memalloc_fns *)optdata); + + /* also set liblber memory allocation callbacks */ + memalloc_fns.lbermem_malloc = + nsldapi_memalloc_fns.ldapmem_malloc; + memalloc_fns.lbermem_calloc = + nsldapi_memalloc_fns.ldapmem_calloc; + memalloc_fns.lbermem_realloc = + nsldapi_memalloc_fns.ldapmem_realloc; + memalloc_fns.lbermem_free = + nsldapi_memalloc_fns.ldapmem_free; + if (ber_set_option(NULL, LBER_OPT_MEMALLOC_FN_PTRS, + &memalloc_fns) != 0) { + return (-1); + } + + return (0); + } + /* + * LDAP_OPT_DEBUG_LEVEL is global + */ + if (LDAP_OPT_DEBUG_LEVEL == option) { +#ifdef LDAP_DEBUG + ldap_debug = *((int *)optdata); +#endif + return (0); + } + + /* + * if ld is NULL, arrange to modify our default settings + */ + if (ld == NULL) { + ld = &nsldapi_ld_defaults; +#ifdef LDAP_DEBUG + ldap_debug = 0; +#endif + + } + + /* + * process options that are associated with an LDAP session handle + */ + if (!NSLDAPI_VALID_LDAP_POINTER(ld)) { + return (-1); /* punt */ + } + + rc = 0; + if (ld != &nsldapi_ld_defaults && + option != LDAP_OPT_EXTRA_THREAD_FN_PTRS && + option != LDAP_OPT_THREAD_FN_PTRS) { + LDAP_MUTEX_LOCK(ld, LDAP_OPTION_LOCK); + } + switch (option) { + /* options that can be turned on and off */ +#ifdef LDAP_DNS + case LDAP_OPT_DNS: + LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_DNS, optdata); + break; +#endif + + case LDAP_OPT_REFERRALS: + LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_REFERRALS, optdata); + break; + +#ifdef LDAP_SSLIO_HOOKS + case LDAP_OPT_SSL: + LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_SSL, optdata); + break; +#endif + + case LDAP_OPT_RESTART: + LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_RESTART, optdata); + break; + + case LDAP_OPT_RECONNECT: + LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_RECONNECT, optdata); + break; + +#ifdef LDAP_ASYNC_IO + case LDAP_OPT_ASYNC_CONNECT: + LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_ASYNC, optdata); + break; +#endif /* LDAP_ASYNC_IO */ + + /* fields in the LDAP structure */ + case LDAP_OPT_DEREF: + ld->ld_deref = *((int *)optdata); + break; + case LDAP_OPT_SIZELIMIT: + ld->ld_sizelimit = *((int *)optdata); + break; + case LDAP_OPT_TIMELIMIT: + ld->ld_timelimit = *((int *)optdata); + break; + case LDAP_OPT_REFERRAL_HOP_LIMIT: + ld->ld_refhoplimit = *((int *)optdata); + break; + case LDAP_OPT_PROTOCOL_VERSION: + ld->ld_version = *((int *)optdata); + if (ld->ld_defconn != NULL) { /* also set in default conn. */ + ld->ld_defconn->lconn_version = ld->ld_version; + } + break; + case LDAP_OPT_SERVER_CONTROLS: + /* nsldapi_dup_controls returns -1 and sets lderrno on error */ + rc = nsldapi_dup_controls(ld, &ld->ld_servercontrols, + (LDAPControl **)optdata); + break; + case LDAP_OPT_CLIENT_CONTROLS: + /* nsldapi_dup_controls returns -1 and sets lderrno on error */ + rc = nsldapi_dup_controls(ld, &ld->ld_clientcontrols, + (LDAPControl **)optdata); + break; + + /* rebind proc */ + case LDAP_OPT_REBIND_FN: + ld->ld_rebind_fn = (LDAP_REBINDPROC_CALLBACK *) optdata; + break; + case LDAP_OPT_REBIND_ARG: + ld->ld_rebind_arg = (void *) optdata; + break; + +#ifdef LDAP_SSLIO_HOOKS + /* i/o function pointers */ + case LDAP_OPT_IO_FN_PTRS: + if ((rc = nsldapi_install_compat_io_fns(ld, + (struct ldap_io_fns *)optdata)) != LDAP_SUCCESS) { + LDAP_SET_LDERRNO(ld, rc, NULL, NULL); + rc = -1; + } + break; + + /* extended i/o function pointers */ + case LDAP_X_OPT_EXTIO_FN_PTRS: + /* denotes use of old iofns struct (no writev) */ + if (((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_size == + LDAP_X_EXTIO_FNS_SIZE_REV0) { + ld->ld_extio_size = LDAP_X_EXTIO_FNS_SIZE; + ld->ld_extclose_fn = + ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_close; + ld->ld_extconnect_fn = + ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_connect; + ld->ld_extread_fn = + ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_read; + ld->ld_extwrite_fn = + ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_write; + ld->ld_extpoll_fn = + ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_poll; + ld->ld_extnewhandle_fn = + ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_newhandle; + ld->ld_extdisposehandle_fn = + ((struct ldap_x_ext_io_fns_rev0 *)optdata)-> + lextiof_disposehandle; + ld->ld_ext_session_arg = + ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_session_arg; + ld->ld_extwritev_fn = NULL; + if (ber_sockbuf_set_option(ld->ld_sbp, LBER_SOCKBUF_OPT_EXT_IO_FNS, + &(ld->ld_ext_io_fns)) != 0) { + return (LDAP_LOCAL_ERROR); + } + } else { + /* struct copy */ + ld->ld_ext_io_fns = *((struct ldap_x_ext_io_fns *)optdata); + } + if ((rc = nsldapi_install_lber_extiofns(ld, ld->ld_sbp)) + != LDAP_SUCCESS) { + LDAP_SET_LDERRNO(ld, rc, NULL, NULL); + rc = -1; + } + break; +#endif + + /* thread function pointers */ + case LDAP_OPT_THREAD_FN_PTRS: + /* + * It is only safe to set the thread function pointers + * when one thread is using the LDAP session handle. + */ + /* free existing mutexes (some are allocated by ldap_init()) */ + nsldapi_mutex_free_all(ld); + + /* struct copy */ + ld->ld_thread = *((struct ldap_thread_fns *)optdata); + + /* allocate new mutexes */ + nsldapi_mutex_alloc_all(ld); + + /* LDAP_OPTION_LOCK was never locked... so just return */ + return (rc); + + /* extra thread function pointers */ + case LDAP_OPT_EXTRA_THREAD_FN_PTRS: + /* The extra thread funcs will only pick up the threadid */ + ld->ld_thread2 = *((struct ldap_extra_thread_fns *)optdata); + + /* Reset the rest of the structure preserving the threadid fn */ + ld->ld_mutex_trylock_fn = (LDAP_TF_MUTEX_TRYLOCK_CALLBACK *)NULL; + ld->ld_sema_alloc_fn = (LDAP_TF_SEMA_ALLOC_CALLBACK *) NULL; + ld->ld_sema_free_fn = (LDAP_TF_SEMA_FREE_CALLBACK *) NULL; + ld->ld_sema_wait_fn = (LDAP_TF_SEMA_WAIT_CALLBACK *) NULL; + ld->ld_sema_post_fn = (LDAP_TF_SEMA_POST_CALLBACK *) NULL; + + /* We assume that only one thread is active when replacing */ + /* the threadid function. We will now proceed and reset all */ + /* of the threadid/refcounts */ + for (i = 0; i < LDAP_MAX_LOCK; i++) { + ld->ld_mutex_threadid[i] = (void *) -1; + ld->ld_mutex_refcnt[i] = 0; + } + + return (rc); + + /* DNS function pointers */ + case LDAP_OPT_DNS_FN_PTRS: + /* struct copy */ + ld->ld_dnsfn = *((struct ldap_dns_fns *)optdata); + break; + + /* cache function pointers */ + case LDAP_OPT_CACHE_FN_PTRS: + /* struct copy */ + ld->ld_cache = *((struct ldap_cache_fns *)optdata); + break; + case LDAP_OPT_CACHE_STRATEGY: + ld->ld_cache_strategy = *((int *)optdata); + break; + case LDAP_OPT_CACHE_ENABLE: + ld->ld_cache_on = *((int *)optdata); + break; + + case LDAP_OPT_ERROR_NUMBER: + LDAP_GET_LDERRNO(ld, &matched, &errstr); + matched = nsldapi_strdup(matched); + errstr = nsldapi_strdup(errstr); + LDAP_SET_LDERRNO(ld, *((int *)optdata), matched, errstr); + break; + + case LDAP_OPT_ERROR_STRING: + rc = LDAP_GET_LDERRNO(ld, &matched, NULL); + matched = nsldapi_strdup(matched); + LDAP_SET_LDERRNO(ld, rc, matched, + nsldapi_strdup((char *)optdata)); + rc = LDAP_SUCCESS; + break; + + case LDAP_OPT_MATCHED_DN: + rc = LDAP_GET_LDERRNO(ld, NULL, &errstr); + errstr = nsldapi_strdup(errstr); + LDAP_SET_LDERRNO(ld, rc, + nsldapi_strdup((char *)optdata), errstr); + rc = LDAP_SUCCESS; + break; + + case LDAP_OPT_PREFERRED_LANGUAGE: + if (NULL != ld->ld_preferred_language) { + NSLDAPI_FREE(ld->ld_preferred_language); + } + ld->ld_preferred_language = nsldapi_strdup((char *)optdata); + break; + + case LDAP_OPT_HOST_NAME: + if (NULL != ld->ld_defhost) { + NSLDAPI_FREE(ld->ld_defhost); + } + ld->ld_defhost = nsldapi_strdup((char *)optdata); + break; + + case LDAP_X_OPT_CONNECT_TIMEOUT: + ld->ld_connect_timeout = *((int *)optdata); + break; + +#ifdef _SOLARIS_SDK + /* recursion prevention dns functions */ + case LDAP_X_OPT_DNS_SKIPDB: + rc = prldap_x_install_dns_skipdb(ld, (const char *)optdata); + break; +#endif +#ifdef LDAP_SASLIO_HOOKS + /* SASL options */ + case LDAP_OPT_X_SASL_MECH: + if (NULL != ld->ld_def_sasl_mech) { + + NSLDAPI_FREE(ld->ld_def_sasl_mech); + } + ld->ld_def_sasl_mech = nsldapi_strdup((char *)optdata); + break; + case LDAP_OPT_X_SASL_REALM: + if (NULL != ld->ld_def_sasl_realm) { + NSLDAPI_FREE(ld->ld_def_sasl_realm); + } + ld->ld_def_sasl_realm = nsldapi_strdup((char *)optdata); + break; + case LDAP_OPT_X_SASL_AUTHCID: + if (NULL != ld->ld_def_sasl_authcid) { + NSLDAPI_FREE(ld->ld_def_sasl_authcid); + } + ld->ld_def_sasl_authcid = nsldapi_strdup((char *)optdata); + break; + case LDAP_OPT_X_SASL_AUTHZID: + if (NULL != ld->ld_def_sasl_authzid) { + NSLDAPI_FREE(ld->ld_def_sasl_authzid); + } + ld->ld_def_sasl_authzid = nsldapi_strdup((char *)optdata); + break; + case LDAP_OPT_X_SASL_SSF_EXTERNAL: + { + int sc; + sasl_ssf_t extprops; + sasl_conn_t *ctx; + if (ld->ld_defconn == NULL || + ld->ld_defconn->lconn_sb == NULL) { + return (-1); + } + ctx = (sasl_conn_t *) + (ld->ld_defconn->lconn_sb->sb_sasl_ctx); + if (ctx == NULL) { + return (-1); + } + memset(&extprops, 0L, sizeof (extprops)); + extprops = * ((sasl_ssf_t *)optdata); + sc = sasl_setprop(ctx, SASL_SSF_EXTERNAL, + (void *) &extprops); + if (sc != SASL_OK) { + return (-1); + } + } + break; + case LDAP_OPT_X_SASL_SECPROPS: + { + int sc; + sc = nsldapi_sasl_secprops((char *)optdata, + &ld->ld_sasl_secprops); + return (sc == LDAP_SUCCESS ? 0 : -1); + } + case LDAP_OPT_X_SASL_SSF_MIN: + ld->ld_sasl_secprops.min_ssf = *((sasl_ssf_t *)optdata); + break; + case LDAP_OPT_X_SASL_SSF_MAX: + ld->ld_sasl_secprops.max_ssf = *((sasl_ssf_t *)optdata); + break; + case LDAP_OPT_X_SASL_MAXBUFSIZE: + ld->ld_sasl_secprops.maxbufsize = *((sasl_ssf_t *)optdata); + break; + case LDAP_OPT_X_SASL_SSF: /* read only */ + LDAP_SET_LDERRNO(ld, LDAP_PARAM_ERROR, NULL, NULL); + rc = -1; + break; +#endif + + default: + LDAP_SET_LDERRNO(ld, LDAP_PARAM_ERROR, NULL, NULL); + rc = -1; + } + + if (ld != &nsldapi_ld_defaults) { + LDAP_MUTEX_UNLOCK(ld, LDAP_OPTION_LOCK); + } + return (rc); +} |