summaryrefslogtreecommitdiff
path: root/usr/src/lib/libldap5/sources/ldap/common/setoption.c
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/lib/libldap5/sources/ldap/common/setoption.c')
-rw-r--r--usr/src/lib/libldap5/sources/ldap/common/setoption.c425
1 files changed, 425 insertions, 0 deletions
diff --git a/usr/src/lib/libldap5/sources/ldap/common/setoption.c b/usr/src/lib/libldap5/sources/ldap/common/setoption.c
new file mode 100644
index 0000000000..0988028f1c
--- /dev/null
+++ b/usr/src/lib/libldap5/sources/ldap/common/setoption.c
@@ -0,0 +1,425 @@
+/*
+ * Copyright 2003 Sun Microsystems, Inc. All rights reserved.
+ * Use is subject to license terms.
+ */
+
+#pragma ident "%Z%%M% %I% %E% SMI"
+
+/*
+ * The contents of this file are subject to the Netscape Public
+ * License Version 1.1 (the "License"); you may not use this file
+ * except in compliance with the License. You may obtain a copy of
+ * the License at http://www.mozilla.org/NPL/
+ *
+ * Software distributed under the License is distributed on an "AS
+ * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
+ * implied. See the License for the specific language governing
+ * rights and limitations under the License.
+ *
+ * The Original Code is Mozilla Communicator client code, released
+ * March 31, 1998.
+ *
+ * The Initial Developer of the Original Code is Netscape
+ * Communications Corporation. Portions created by Netscape are
+ * Copyright (C) 1998-1999 Netscape Communications Corporation. All
+ * Rights Reserved.
+ *
+ * Contributor(s):
+ */
+/*
+ * setoption.c - ldap_set_option implementation
+ */
+
+#include "ldap-int.h"
+#ifdef _SOLARIS_SDK
+#include "solaris-priv.h"
+#endif
+
+extern int nsldapi_sasl_secprops(const char *in,
+ sasl_security_properties_t *secprops);
+
+#define LDAP_SETCLR_BITOPT(ld, bit, optdata) \
+ if (optdata != NULL) { \
+ (ld)->ld_options |= bit; \
+ } else { \
+ (ld)->ld_options &= ~bit; \
+ }
+
+
+int
+LDAP_CALL
+ldap_set_option(LDAP *ld, int option, const void *optdata)
+{
+ int rc, i;
+ char *matched, *errstr;
+
+ if (!nsldapi_initialized) {
+ nsldapi_initialize_defaults();
+ }
+
+ /*
+ * process global options (not associated with an LDAP session handle)
+ */
+ if (option == LDAP_OPT_MEMALLOC_FN_PTRS) {
+ struct lber_memalloc_fns memalloc_fns;
+
+ /* set libldap ones via a struct copy */
+ nsldapi_memalloc_fns = *((struct ldap_memalloc_fns *)optdata);
+
+ /* also set liblber memory allocation callbacks */
+ memalloc_fns.lbermem_malloc =
+ nsldapi_memalloc_fns.ldapmem_malloc;
+ memalloc_fns.lbermem_calloc =
+ nsldapi_memalloc_fns.ldapmem_calloc;
+ memalloc_fns.lbermem_realloc =
+ nsldapi_memalloc_fns.ldapmem_realloc;
+ memalloc_fns.lbermem_free =
+ nsldapi_memalloc_fns.ldapmem_free;
+ if (ber_set_option(NULL, LBER_OPT_MEMALLOC_FN_PTRS,
+ &memalloc_fns) != 0) {
+ return (-1);
+ }
+
+ return (0);
+ }
+ /*
+ * LDAP_OPT_DEBUG_LEVEL is global
+ */
+ if (LDAP_OPT_DEBUG_LEVEL == option) {
+#ifdef LDAP_DEBUG
+ ldap_debug = *((int *)optdata);
+#endif
+ return (0);
+ }
+
+ /*
+ * if ld is NULL, arrange to modify our default settings
+ */
+ if (ld == NULL) {
+ ld = &nsldapi_ld_defaults;
+#ifdef LDAP_DEBUG
+ ldap_debug = 0;
+#endif
+
+ }
+
+ /*
+ * process options that are associated with an LDAP session handle
+ */
+ if (!NSLDAPI_VALID_LDAP_POINTER(ld)) {
+ return (-1); /* punt */
+ }
+
+ rc = 0;
+ if (ld != &nsldapi_ld_defaults &&
+ option != LDAP_OPT_EXTRA_THREAD_FN_PTRS &&
+ option != LDAP_OPT_THREAD_FN_PTRS) {
+ LDAP_MUTEX_LOCK(ld, LDAP_OPTION_LOCK);
+ }
+ switch (option) {
+ /* options that can be turned on and off */
+#ifdef LDAP_DNS
+ case LDAP_OPT_DNS:
+ LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_DNS, optdata);
+ break;
+#endif
+
+ case LDAP_OPT_REFERRALS:
+ LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_REFERRALS, optdata);
+ break;
+
+#ifdef LDAP_SSLIO_HOOKS
+ case LDAP_OPT_SSL:
+ LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_SSL, optdata);
+ break;
+#endif
+
+ case LDAP_OPT_RESTART:
+ LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_RESTART, optdata);
+ break;
+
+ case LDAP_OPT_RECONNECT:
+ LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_RECONNECT, optdata);
+ break;
+
+#ifdef LDAP_ASYNC_IO
+ case LDAP_OPT_ASYNC_CONNECT:
+ LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_ASYNC, optdata);
+ break;
+#endif /* LDAP_ASYNC_IO */
+
+ /* fields in the LDAP structure */
+ case LDAP_OPT_DEREF:
+ ld->ld_deref = *((int *)optdata);
+ break;
+ case LDAP_OPT_SIZELIMIT:
+ ld->ld_sizelimit = *((int *)optdata);
+ break;
+ case LDAP_OPT_TIMELIMIT:
+ ld->ld_timelimit = *((int *)optdata);
+ break;
+ case LDAP_OPT_REFERRAL_HOP_LIMIT:
+ ld->ld_refhoplimit = *((int *)optdata);
+ break;
+ case LDAP_OPT_PROTOCOL_VERSION:
+ ld->ld_version = *((int *)optdata);
+ if (ld->ld_defconn != NULL) { /* also set in default conn. */
+ ld->ld_defconn->lconn_version = ld->ld_version;
+ }
+ break;
+ case LDAP_OPT_SERVER_CONTROLS:
+ /* nsldapi_dup_controls returns -1 and sets lderrno on error */
+ rc = nsldapi_dup_controls(ld, &ld->ld_servercontrols,
+ (LDAPControl **)optdata);
+ break;
+ case LDAP_OPT_CLIENT_CONTROLS:
+ /* nsldapi_dup_controls returns -1 and sets lderrno on error */
+ rc = nsldapi_dup_controls(ld, &ld->ld_clientcontrols,
+ (LDAPControl **)optdata);
+ break;
+
+ /* rebind proc */
+ case LDAP_OPT_REBIND_FN:
+ ld->ld_rebind_fn = (LDAP_REBINDPROC_CALLBACK *) optdata;
+ break;
+ case LDAP_OPT_REBIND_ARG:
+ ld->ld_rebind_arg = (void *) optdata;
+ break;
+
+#ifdef LDAP_SSLIO_HOOKS
+ /* i/o function pointers */
+ case LDAP_OPT_IO_FN_PTRS:
+ if ((rc = nsldapi_install_compat_io_fns(ld,
+ (struct ldap_io_fns *)optdata)) != LDAP_SUCCESS) {
+ LDAP_SET_LDERRNO(ld, rc, NULL, NULL);
+ rc = -1;
+ }
+ break;
+
+ /* extended i/o function pointers */
+ case LDAP_X_OPT_EXTIO_FN_PTRS:
+ /* denotes use of old iofns struct (no writev) */
+ if (((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_size ==
+ LDAP_X_EXTIO_FNS_SIZE_REV0) {
+ ld->ld_extio_size = LDAP_X_EXTIO_FNS_SIZE;
+ ld->ld_extclose_fn =
+ ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_close;
+ ld->ld_extconnect_fn =
+ ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_connect;
+ ld->ld_extread_fn =
+ ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_read;
+ ld->ld_extwrite_fn =
+ ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_write;
+ ld->ld_extpoll_fn =
+ ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_poll;
+ ld->ld_extnewhandle_fn =
+ ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_newhandle;
+ ld->ld_extdisposehandle_fn =
+ ((struct ldap_x_ext_io_fns_rev0 *)optdata)->
+ lextiof_disposehandle;
+ ld->ld_ext_session_arg =
+ ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_session_arg;
+ ld->ld_extwritev_fn = NULL;
+ if (ber_sockbuf_set_option(ld->ld_sbp, LBER_SOCKBUF_OPT_EXT_IO_FNS,
+ &(ld->ld_ext_io_fns)) != 0) {
+ return (LDAP_LOCAL_ERROR);
+ }
+ } else {
+ /* struct copy */
+ ld->ld_ext_io_fns = *((struct ldap_x_ext_io_fns *)optdata);
+ }
+ if ((rc = nsldapi_install_lber_extiofns(ld, ld->ld_sbp))
+ != LDAP_SUCCESS) {
+ LDAP_SET_LDERRNO(ld, rc, NULL, NULL);
+ rc = -1;
+ }
+ break;
+#endif
+
+ /* thread function pointers */
+ case LDAP_OPT_THREAD_FN_PTRS:
+ /*
+ * It is only safe to set the thread function pointers
+ * when one thread is using the LDAP session handle.
+ */
+ /* free existing mutexes (some are allocated by ldap_init()) */
+ nsldapi_mutex_free_all(ld);
+
+ /* struct copy */
+ ld->ld_thread = *((struct ldap_thread_fns *)optdata);
+
+ /* allocate new mutexes */
+ nsldapi_mutex_alloc_all(ld);
+
+ /* LDAP_OPTION_LOCK was never locked... so just return */
+ return (rc);
+
+ /* extra thread function pointers */
+ case LDAP_OPT_EXTRA_THREAD_FN_PTRS:
+ /* The extra thread funcs will only pick up the threadid */
+ ld->ld_thread2 = *((struct ldap_extra_thread_fns *)optdata);
+
+ /* Reset the rest of the structure preserving the threadid fn */
+ ld->ld_mutex_trylock_fn = (LDAP_TF_MUTEX_TRYLOCK_CALLBACK *)NULL;
+ ld->ld_sema_alloc_fn = (LDAP_TF_SEMA_ALLOC_CALLBACK *) NULL;
+ ld->ld_sema_free_fn = (LDAP_TF_SEMA_FREE_CALLBACK *) NULL;
+ ld->ld_sema_wait_fn = (LDAP_TF_SEMA_WAIT_CALLBACK *) NULL;
+ ld->ld_sema_post_fn = (LDAP_TF_SEMA_POST_CALLBACK *) NULL;
+
+ /* We assume that only one thread is active when replacing */
+ /* the threadid function. We will now proceed and reset all */
+ /* of the threadid/refcounts */
+ for (i = 0; i < LDAP_MAX_LOCK; i++) {
+ ld->ld_mutex_threadid[i] = (void *) -1;
+ ld->ld_mutex_refcnt[i] = 0;
+ }
+
+ return (rc);
+
+ /* DNS function pointers */
+ case LDAP_OPT_DNS_FN_PTRS:
+ /* struct copy */
+ ld->ld_dnsfn = *((struct ldap_dns_fns *)optdata);
+ break;
+
+ /* cache function pointers */
+ case LDAP_OPT_CACHE_FN_PTRS:
+ /* struct copy */
+ ld->ld_cache = *((struct ldap_cache_fns *)optdata);
+ break;
+ case LDAP_OPT_CACHE_STRATEGY:
+ ld->ld_cache_strategy = *((int *)optdata);
+ break;
+ case LDAP_OPT_CACHE_ENABLE:
+ ld->ld_cache_on = *((int *)optdata);
+ break;
+
+ case LDAP_OPT_ERROR_NUMBER:
+ LDAP_GET_LDERRNO(ld, &matched, &errstr);
+ matched = nsldapi_strdup(matched);
+ errstr = nsldapi_strdup(errstr);
+ LDAP_SET_LDERRNO(ld, *((int *)optdata), matched, errstr);
+ break;
+
+ case LDAP_OPT_ERROR_STRING:
+ rc = LDAP_GET_LDERRNO(ld, &matched, NULL);
+ matched = nsldapi_strdup(matched);
+ LDAP_SET_LDERRNO(ld, rc, matched,
+ nsldapi_strdup((char *)optdata));
+ rc = LDAP_SUCCESS;
+ break;
+
+ case LDAP_OPT_MATCHED_DN:
+ rc = LDAP_GET_LDERRNO(ld, NULL, &errstr);
+ errstr = nsldapi_strdup(errstr);
+ LDAP_SET_LDERRNO(ld, rc,
+ nsldapi_strdup((char *)optdata), errstr);
+ rc = LDAP_SUCCESS;
+ break;
+
+ case LDAP_OPT_PREFERRED_LANGUAGE:
+ if (NULL != ld->ld_preferred_language) {
+ NSLDAPI_FREE(ld->ld_preferred_language);
+ }
+ ld->ld_preferred_language = nsldapi_strdup((char *)optdata);
+ break;
+
+ case LDAP_OPT_HOST_NAME:
+ if (NULL != ld->ld_defhost) {
+ NSLDAPI_FREE(ld->ld_defhost);
+ }
+ ld->ld_defhost = nsldapi_strdup((char *)optdata);
+ break;
+
+ case LDAP_X_OPT_CONNECT_TIMEOUT:
+ ld->ld_connect_timeout = *((int *)optdata);
+ break;
+
+#ifdef _SOLARIS_SDK
+ /* recursion prevention dns functions */
+ case LDAP_X_OPT_DNS_SKIPDB:
+ rc = prldap_x_install_dns_skipdb(ld, (const char *)optdata);
+ break;
+#endif
+#ifdef LDAP_SASLIO_HOOKS
+ /* SASL options */
+ case LDAP_OPT_X_SASL_MECH:
+ if (NULL != ld->ld_def_sasl_mech) {
+
+ NSLDAPI_FREE(ld->ld_def_sasl_mech);
+ }
+ ld->ld_def_sasl_mech = nsldapi_strdup((char *)optdata);
+ break;
+ case LDAP_OPT_X_SASL_REALM:
+ if (NULL != ld->ld_def_sasl_realm) {
+ NSLDAPI_FREE(ld->ld_def_sasl_realm);
+ }
+ ld->ld_def_sasl_realm = nsldapi_strdup((char *)optdata);
+ break;
+ case LDAP_OPT_X_SASL_AUTHCID:
+ if (NULL != ld->ld_def_sasl_authcid) {
+ NSLDAPI_FREE(ld->ld_def_sasl_authcid);
+ }
+ ld->ld_def_sasl_authcid = nsldapi_strdup((char *)optdata);
+ break;
+ case LDAP_OPT_X_SASL_AUTHZID:
+ if (NULL != ld->ld_def_sasl_authzid) {
+ NSLDAPI_FREE(ld->ld_def_sasl_authzid);
+ }
+ ld->ld_def_sasl_authzid = nsldapi_strdup((char *)optdata);
+ break;
+ case LDAP_OPT_X_SASL_SSF_EXTERNAL:
+ {
+ int sc;
+ sasl_ssf_t extprops;
+ sasl_conn_t *ctx;
+ if (ld->ld_defconn == NULL ||
+ ld->ld_defconn->lconn_sb == NULL) {
+ return (-1);
+ }
+ ctx = (sasl_conn_t *)
+ (ld->ld_defconn->lconn_sb->sb_sasl_ctx);
+ if (ctx == NULL) {
+ return (-1);
+ }
+ memset(&extprops, 0L, sizeof (extprops));
+ extprops = * ((sasl_ssf_t *)optdata);
+ sc = sasl_setprop(ctx, SASL_SSF_EXTERNAL,
+ (void *) &extprops);
+ if (sc != SASL_OK) {
+ return (-1);
+ }
+ }
+ break;
+ case LDAP_OPT_X_SASL_SECPROPS:
+ {
+ int sc;
+ sc = nsldapi_sasl_secprops((char *)optdata,
+ &ld->ld_sasl_secprops);
+ return (sc == LDAP_SUCCESS ? 0 : -1);
+ }
+ case LDAP_OPT_X_SASL_SSF_MIN:
+ ld->ld_sasl_secprops.min_ssf = *((sasl_ssf_t *)optdata);
+ break;
+ case LDAP_OPT_X_SASL_SSF_MAX:
+ ld->ld_sasl_secprops.max_ssf = *((sasl_ssf_t *)optdata);
+ break;
+ case LDAP_OPT_X_SASL_MAXBUFSIZE:
+ ld->ld_sasl_secprops.maxbufsize = *((sasl_ssf_t *)optdata);
+ break;
+ case LDAP_OPT_X_SASL_SSF: /* read only */
+ LDAP_SET_LDERRNO(ld, LDAP_PARAM_ERROR, NULL, NULL);
+ rc = -1;
+ break;
+#endif
+
+ default:
+ LDAP_SET_LDERRNO(ld, LDAP_PARAM_ERROR, NULL, NULL);
+ rc = -1;
+ }
+
+ if (ld != &nsldapi_ld_defaults) {
+ LDAP_MUTEX_UNLOCK(ld, LDAP_OPTION_LOCK);
+ }
+ return (rc);
+}