1/* config.c - configuration file handling routines */
2/* $OpenLDAP$ */
3/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4 *
5 * Copyright 1998-2011 The OpenLDAP Foundation.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted only as authorized by the OpenLDAP
10 * Public License.
11 *
12 * A copy of this license is available in the file LICENSE in the
13 * top-level directory of the distribution or, alternatively, at
14 * <http://www.OpenLDAP.org/license.html>.
15 */
16/* Portions Copyright (c) 1995 Regents of the University of Michigan.
17 * All rights reserved.
18 *
19 * Redistribution and use in source and binary forms are permitted
20 * provided that this notice is preserved and that due credit is given
21 * to the University of Michigan at Ann Arbor. The name of the University
22 * may not be used to endorse or promote products derived from this
23 * software without specific prior written permission. This software
24 * is provided ``as is'' without express or implied warranty.
25 */
26
27#include "portable.h"
28
29#include <stdio.h>
30
31#include <ac/string.h>
32#include <ac/ctype.h>
33#include <ac/signal.h>
34#include <ac/socket.h>
35#include <ac/errno.h>
36#include <ac/unistd.h>
37
38#include <sys/types.h>
39#include <sys/stat.h>
40
41#ifndef S_ISREG
42#define	S_ISREG(m)	(((m) & _S_IFMT) == _S_IFREG)
43#endif
44
45#include "slap.h"
46#ifdef LDAP_SLAPI
47#include "slapi/slapi.h"
48#endif
49#include "lutil.h"
50#include "lutil_ldap.h"
51#include "config.h"
52
53#define ARGS_STEP	512
54
55/*
56 * defaults for various global variables
57 */
58slap_mask_t		global_allows = 0;
59slap_mask_t		global_disallows = 0;
60int		global_gentlehup = 0;
61int		global_idletimeout = 0;
62int		global_writetimeout = 0;
63char	*global_host = NULL;
64struct berval global_host_bv = BER_BVNULL;
65char	*global_realm = NULL;
66char	*sasl_host = NULL;
67char		**default_passwd_hash = NULL;
68struct berval default_search_base = BER_BVNULL;
69struct berval default_search_nbase = BER_BVNULL;
70
71ber_len_t sockbuf_max_incoming = SLAP_SB_MAX_INCOMING_DEFAULT;
72ber_len_t sockbuf_max_incoming_auth= SLAP_SB_MAX_INCOMING_AUTH;
73
74int	slap_conn_max_pending = SLAP_CONN_MAX_PENDING_DEFAULT;
75int	slap_conn_max_pending_auth = SLAP_CONN_MAX_PENDING_AUTH;
76
77char   *slapd_pid_file  = NULL;
78char   *slapd_args_file = NULL;
79
80int use_reverse_lookup = 0;
81
82#ifdef LDAP_SLAPI
83int slapi_plugins_used = 0;
84#endif
85
86static int fp_getline(FILE *fp, ConfigArgs *c);
87static void fp_getline_init(ConfigArgs *c);
88
89static char	*strtok_quote(char *line, char *sep, char **quote_ptr);
90static char *strtok_quote_ldif(char **line);
91
92ConfigArgs *
93new_config_args( BackendDB *be, const char *fname, int lineno, int argc, char **argv )
94{
95	ConfigArgs *c;
96	c = ch_calloc( 1, sizeof( ConfigArgs ) );
97	if ( c == NULL ) return(NULL);
98	c->be     = be;
99	c->fname  = fname;
100	c->argc   = argc;
101	c->argv   = argv;
102	c->lineno = lineno;
103	snprintf( c->log, sizeof( c->log ), "%s: line %d", fname, lineno );
104	return(c);
105}
106
107void
108init_config_argv( ConfigArgs *c )
109{
110	c->argv = ch_calloc( ARGS_STEP + 1, sizeof( *c->argv ) );
111	c->argv_size = ARGS_STEP + 1;
112}
113
114ConfigTable *config_find_keyword(ConfigTable *Conf, ConfigArgs *c) {
115	int i;
116
117	for(i = 0; Conf[i].name; i++)
118		if( (Conf[i].length && (!strncasecmp(c->argv[0], Conf[i].name, Conf[i].length))) ||
119			(!strcasecmp(c->argv[0], Conf[i].name)) ) break;
120	if ( !Conf[i].name ) return NULL;
121	return Conf+i;
122}
123
124int config_check_vals(ConfigTable *Conf, ConfigArgs *c, int check_only ) {
125	int rc, arg_user, arg_type, arg_syn, iarg;
126	unsigned uiarg;
127	long larg;
128	unsigned long ularg;
129	ber_len_t barg;
130
131	if(Conf->arg_type == ARG_IGNORED) {
132		Debug(LDAP_DEBUG_CONFIG, "%s: keyword <%s> ignored\n",
133			c->log, Conf->name, 0);
134		return(0);
135	}
136	arg_type = Conf->arg_type & ARGS_TYPES;
137	arg_user = Conf->arg_type & ARGS_USERLAND;
138	arg_syn = Conf->arg_type & ARGS_SYNTAX;
139
140	if((arg_type == ARG_DN) && c->argc == 1) {
141		c->argc = 2;
142		c->argv[1] = "";
143	}
144	if(Conf->min_args && (c->argc < Conf->min_args)) {
145		snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> missing <%s> argument",
146			c->argv[0], Conf->what ? Conf->what : "" );
147		Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: keyword %s\n", c->log, c->cr_msg, 0 );
148		return(ARG_BAD_CONF);
149	}
150	if(Conf->max_args && (c->argc > Conf->max_args)) {
151		char	*ignored = " ignored";
152
153		snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> extra cruft after <%s>",
154			c->argv[0], Conf->what );
155
156		ignored = "";
157		Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s%s.\n",
158				c->log, c->cr_msg, ignored );
159		return(ARG_BAD_CONF);
160	}
161	if((arg_syn & ARG_DB) && !c->be) {
162		snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> only allowed within database declaration",
163			c->argv[0] );
164		Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: keyword %s\n",
165			c->log, c->cr_msg, 0);
166		return(ARG_BAD_CONF);
167	}
168	if((arg_syn & ARG_PRE_BI) && c->bi) {
169		snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> must occur before any backend %sdeclaration",
170			c->argv[0], (arg_syn & ARG_PRE_DB) ? "or database " : "" );
171		Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: keyword %s\n",
172			c->log, c->cr_msg, 0 );
173		return(ARG_BAD_CONF);
174	}
175	if((arg_syn & ARG_PRE_DB) && c->be && c->be != frontendDB) {
176		snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> must occur before any database declaration",
177			c->argv[0] );
178		Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: keyword %s\n",
179			c->log, c->cr_msg, 0);
180		return(ARG_BAD_CONF);
181	}
182	if((arg_syn & ARG_PAREN) && *c->argv[1] != '(' /*')'*/) {
183		snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> old format not supported", c->argv[0] );
184		Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s\n",
185			c->log, c->cr_msg, 0);
186		return(ARG_BAD_CONF);
187	}
188	if(arg_type && !Conf->arg_item && !(arg_syn & ARG_OFFSET)) {
189		snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> invalid config_table, arg_item is NULL",
190			c->argv[0] );
191		Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s\n",
192			c->log, c->cr_msg, 0);
193		return(ARG_BAD_CONF);
194	}
195	c->type = arg_user;
196	memset(&c->values, 0, sizeof(c->values));
197	if(arg_type == ARG_STRING) {
198		assert( c->argc == 2 );
199		if ( !check_only )
200			c->value_string = ch_strdup(c->argv[1]);
201	} else if(arg_type == ARG_BERVAL) {
202		assert( c->argc == 2 );
203		if ( !check_only )
204			ber_str2bv( c->argv[1], 0, 1, &c->value_bv );
205	} else if(arg_type == ARG_DN) {
206		struct berval bv;
207		assert( c->argc == 2 );
208		ber_str2bv( c->argv[1], 0, 0, &bv );
209		rc = dnPrettyNormal( NULL, &bv, &c->value_dn, &c->value_ndn, NULL );
210		if ( rc != LDAP_SUCCESS ) {
211			snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> invalid DN %d (%s)",
212				c->argv[0], rc, ldap_err2string( rc ));
213			Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s\n" , c->log, c->cr_msg, 0);
214			return(ARG_BAD_CONF);
215		}
216		if ( check_only ) {
217			ch_free( c->value_ndn.bv_val );
218			ch_free( c->value_dn.bv_val );
219		}
220	} else if(arg_type == ARG_ATDESC) {
221		const char *text = NULL;
222		assert( c->argc == 2 );
223		c->value_ad = NULL;
224		rc = slap_str2ad( c->argv[1], &c->value_ad, &text );
225		if ( rc != LDAP_SUCCESS ) {
226			snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> invalid AttributeDescription %d (%s)",
227				c->argv[0], rc, text );
228			Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s\n" , c->log, c->cr_msg, 0);
229			return(ARG_BAD_CONF);
230		}
231	} else {	/* all numeric */
232		int j;
233		iarg = 0; larg = 0; barg = 0;
234		switch(arg_type) {
235			case ARG_INT:
236				assert( c->argc == 2 );
237				if ( lutil_atoix( &iarg, c->argv[1], 0 ) != 0 ) {
238					snprintf( c->cr_msg, sizeof( c->cr_msg ),
239						"<%s> unable to parse \"%s\" as int",
240						c->argv[0], c->argv[1] );
241					Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s\n",
242						c->log, c->cr_msg, 0);
243					return(ARG_BAD_CONF);
244				}
245				break;
246			case ARG_UINT:
247				assert( c->argc == 2 );
248				if ( lutil_atoux( &uiarg, c->argv[1], 0 ) != 0 ) {
249					snprintf( c->cr_msg, sizeof( c->cr_msg ),
250						"<%s> unable to parse \"%s\" as unsigned int",
251						c->argv[0], c->argv[1] );
252					Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s\n",
253						c->log, c->cr_msg, 0);
254					return(ARG_BAD_CONF);
255				}
256				break;
257			case ARG_LONG:
258				assert( c->argc == 2 );
259				if ( lutil_atolx( &larg, c->argv[1], 0 ) != 0 ) {
260					snprintf( c->cr_msg, sizeof( c->cr_msg ),
261						"<%s> unable to parse \"%s\" as long",
262						c->argv[0], c->argv[1] );
263					Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s\n",
264						c->log, c->cr_msg, 0);
265					return(ARG_BAD_CONF);
266				}
267				break;
268			case ARG_ULONG:
269				assert( c->argc == 2 );
270				if ( lutil_atoulx( &ularg, c->argv[1], 0 ) != 0 ) {
271					snprintf( c->cr_msg, sizeof( c->cr_msg ),
272						"<%s> unable to parse \"%s\" as unsigned long",
273						c->argv[0], c->argv[1] );
274					Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s\n",
275						c->log, c->cr_msg, 0);
276					return(ARG_BAD_CONF);
277				}
278				break;
279			case ARG_BER_LEN_T: {
280				unsigned long	l;
281				assert( c->argc == 2 );
282				if ( lutil_atoulx( &l, c->argv[1], 0 ) != 0 ) {
283					snprintf( c->cr_msg, sizeof( c->cr_msg ),
284						"<%s> unable to parse \"%s\" as ber_len_t",
285						c->argv[0], c->argv[1] );
286					Debug(LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE, "%s: %s\n",
287						c->log, c->cr_msg, 0);
288					return(ARG_BAD_CONF);
289				}
290				barg = (ber_len_t)l;
291				} break;
292			case ARG_ON_OFF:
293				/* note: this is an explicit exception
294				 * to the "need exactly 2 args" rule */
295				if (c->argc == 1) {
296					iarg = 1;
297				} else if ( !strcasecmp(c->argv[1], "on") ||
298					!strcasecmp(c->argv[1], "true") ||
299					!strcasecmp(c->argv[1], "yes") )
300				{
301					iarg = 1;
302				} else if ( !strcasecmp(c->argv[1], "off") ||
303					!strcasecmp(c->argv[1], "false") ||
304					!strcasecmp(c->argv[1], "no") )
305				{
306					iarg = 0;
307				} else {
308					snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> invalid value",
309						c->argv[0] );
310					Debug(LDAP_DEBUG_ANY|LDAP_DEBUG_NONE, "%s: %s\n",
311						c->log, c->cr_msg, 0 );
312					return(ARG_BAD_CONF);
313				}
314				break;
315		}
316		j = (arg_type & ARG_NONZERO) ? 1 : 0;
317		if(iarg < j && larg < j && barg < (unsigned)j ) {
318			larg = larg ? larg : (barg ? (long)barg : iarg);
319			snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> invalid value",
320				c->argv[0] );
321			Debug(LDAP_DEBUG_ANY|LDAP_DEBUG_NONE, "%s: %s\n",
322				c->log, c->cr_msg, 0 );
323			return(ARG_BAD_CONF);
324		}
325		switch(arg_type) {
326			case ARG_ON_OFF:
327			case ARG_INT:		c->value_int = iarg;		break;
328			case ARG_UINT:		c->value_uint = uiarg;		break;
329			case ARG_LONG:		c->value_long = larg;		break;
330			case ARG_ULONG:		c->value_ulong = ularg;		break;
331			case ARG_BER_LEN_T:	c->value_ber_t = barg;		break;
332		}
333	}
334	return 0;
335}
336
337int config_set_vals(ConfigTable *Conf, ConfigArgs *c) {
338	int rc, arg_type;
339	void *ptr = NULL;
340
341	arg_type = Conf->arg_type;
342	if(arg_type & ARG_MAGIC) {
343		if(!c->be) c->be = frontendDB;
344		c->cr_msg[0] = '\0';
345		rc = (*((ConfigDriver*)Conf->arg_item))(c);
346#if 0
347		if(c->be == frontendDB) c->be = NULL;
348#endif
349		if(rc) {
350			if ( !c->cr_msg[0] ) {
351				snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> handler exited with %d",
352					c->argv[0], rc );
353				Debug(LDAP_DEBUG_CONFIG, "%s: %s!\n",
354					c->log, c->cr_msg, 0 );
355			}
356			return(ARG_BAD_CONF);
357		}
358		return(0);
359	}
360	if(arg_type & ARG_OFFSET) {
361		if (c->be && c->table == Cft_Database)
362			ptr = c->be->be_private;
363		else if (c->bi)
364			ptr = c->bi->bi_private;
365		else {
366			snprintf( c->cr_msg, sizeof( c->cr_msg ), "<%s> offset is missing base pointer",
367				c->argv[0] );
368			Debug(LDAP_DEBUG_CONFIG, "%s: %s!\n",
369				c->log, c->cr_msg, 0);
370			return(ARG_BAD_CONF);
371		}
372		ptr = (void *)((char *)ptr + (long)Conf->arg_item);
373	} else if (arg_type & ARGS_TYPES) {
374		ptr = Conf->arg_item;
375	}
376	if(arg_type & ARGS_TYPES)
377		switch(arg_type & ARGS_TYPES) {
378			case ARG_ON_OFF:
379			case ARG_INT: 		*(int*)ptr = c->value_int;			break;
380			case ARG_UINT: 		*(unsigned*)ptr = c->value_uint;			break;
381			case ARG_LONG:  	*(long*)ptr = c->value_long;			break;
382			case ARG_ULONG:  	*(unsigned long*)ptr = c->value_ulong;			break;
383			case ARG_BER_LEN_T: 	*(ber_len_t*)ptr = c->value_ber_t;			break;
384			case ARG_STRING: {
385				char *cc = *(char**)ptr;
386				if(cc) {
387					if ((arg_type & ARG_UNIQUE) && c->op == SLAP_CONFIG_ADD ) {
388						Debug(LDAP_DEBUG_CONFIG, "%s: already set %s!\n",
389							c->log, Conf->name, 0 );
390						return(ARG_BAD_CONF);
391					}
392					ch_free(cc);
393				}
394				*(char **)ptr = c->value_string;
395				break;
396				}
397			case ARG_BERVAL:
398				*(struct berval *)ptr = c->value_bv;
399				break;
400			case ARG_ATDESC:
401				*(AttributeDescription **)ptr = c->value_ad;
402				break;
403		}
404	return(0);
405}
406
407int config_add_vals(ConfigTable *Conf, ConfigArgs *c) {
408	int rc, arg_type;
409
410	arg_type = Conf->arg_type;
411	if(arg_type == ARG_IGNORED) {
412		Debug(LDAP_DEBUG_CONFIG, "%s: keyword <%s> ignored\n",
413			c->log, Conf->name, 0);
414		return(0);
415	}
416	rc = config_check_vals( Conf, c, 0 );
417	if ( rc ) return rc;
418	return config_set_vals( Conf, c );
419}
420
421int
422config_del_vals(ConfigTable *cf, ConfigArgs *c)
423{
424	int rc = 0;
425
426	/* If there is no handler, just ignore it */
427	if ( cf->arg_type & ARG_MAGIC ) {
428		c->argv[0] = cf->ad->ad_cname.bv_val;
429		c->op = LDAP_MOD_DELETE;
430		c->type = cf->arg_type & ARGS_USERLAND;
431		rc = (*((ConfigDriver*)cf->arg_item))(c);
432	}
433	return rc;
434}
435
436int
437config_get_vals(ConfigTable *cf, ConfigArgs *c)
438{
439	int rc = 0;
440	struct berval bv;
441	void *ptr;
442
443	if ( cf->arg_type & ARG_IGNORED ) {
444		return 1;
445	}
446
447	memset(&c->values, 0, sizeof(c->values));
448	c->rvalue_vals = NULL;
449	c->rvalue_nvals = NULL;
450	c->op = SLAP_CONFIG_EMIT;
451	c->type = cf->arg_type & ARGS_USERLAND;
452
453	if ( cf->arg_type & ARG_MAGIC ) {
454		rc = (*((ConfigDriver*)cf->arg_item))(c);
455		if ( rc ) return rc;
456	} else {
457		if ( cf->arg_type & ARG_OFFSET ) {
458			if (c->be && c->table == Cft_Database)
459				ptr = c->be->be_private;
460			else if ( c->bi )
461				ptr = c->bi->bi_private;
462			else
463				return 1;
464			ptr = (void *)((char *)ptr + (long)cf->arg_item);
465		} else {
466			ptr = cf->arg_item;
467		}
468
469		switch(cf->arg_type & ARGS_TYPES) {
470		case ARG_ON_OFF:
471		case ARG_INT:	c->value_int = *(int *)ptr; break;
472		case ARG_UINT:	c->value_uint = *(unsigned *)ptr; break;
473		case ARG_LONG:	c->value_long = *(long *)ptr; break;
474		case ARG_ULONG:	c->value_ulong = *(unsigned long *)ptr; break;
475		case ARG_BER_LEN_T:	c->value_ber_t = *(ber_len_t *)ptr; break;
476		case ARG_STRING:
477			if ( *(char **)ptr )
478				c->value_string = ch_strdup(*(char **)ptr);
479			break;
480		case ARG_BERVAL:
481			c->value_bv = *((struct berval *)ptr); break;
482		case ARG_ATDESC:
483			c->value_ad = *(AttributeDescription **)ptr; break;
484		}
485	}
486	if ( cf->arg_type & ARGS_TYPES) {
487		bv.bv_len = 0;
488		bv.bv_val = c->log;
489		switch(cf->arg_type & ARGS_TYPES) {
490		case ARG_INT: bv.bv_len = snprintf(bv.bv_val, sizeof( c->log ), "%d", c->value_int); break;
491		case ARG_UINT: bv.bv_len = snprintf(bv.bv_val, sizeof( c->log ), "%u", c->value_uint); break;
492		case ARG_LONG: bv.bv_len = snprintf(bv.bv_val, sizeof( c->log ), "%ld", c->value_long); break;
493		case ARG_ULONG: bv.bv_len = snprintf(bv.bv_val, sizeof( c->log ), "%lu", c->value_ulong); break;
494		case ARG_BER_LEN_T: bv.bv_len = snprintf(bv.bv_val, sizeof( c->log ), "%ld", c->value_ber_t); break;
495		case ARG_ON_OFF: bv.bv_len = snprintf(bv.bv_val, sizeof( c->log ), "%s",
496			c->value_int ? "TRUE" : "FALSE"); break;
497		case ARG_STRING:
498			if ( c->value_string && c->value_string[0]) {
499				ber_str2bv( c->value_string, 0, 0, &bv);
500			} else {
501				return 1;
502			}
503			break;
504		case ARG_BERVAL:
505			if ( !BER_BVISEMPTY( &c->value_bv )) {
506				bv = c->value_bv;
507			} else {
508				return 1;
509			}
510			break;
511		case ARG_ATDESC:
512			if ( c->value_ad ) {
513				bv = c->value_ad->ad_cname;
514			} else {
515				return 1;
516			}
517			break;
518		default:
519			bv.bv_val = NULL;
520			break;
521		}
522		if (bv.bv_val == c->log && bv.bv_len >= sizeof( c->log ) ) {
523			return 1;
524		}
525		if (( cf->arg_type & ARGS_TYPES ) == ARG_STRING ) {
526			ber_bvarray_add(&c->rvalue_vals, &bv);
527		} else if ( !BER_BVISNULL( &bv ) ) {
528			value_add_one(&c->rvalue_vals, &bv);
529		}
530		/* else: maybe c->rvalue_vals already set? */
531	}
532	return rc;
533}
534
535int
536init_config_attrs(ConfigTable *ct) {
537	int i, code;
538
539	for (i=0; ct[i].name; i++ ) {
540		if ( !ct[i].attribute ) continue;
541		code = register_at( ct[i].attribute, &ct[i].ad, 1 );
542		if ( code ) {
543			fprintf( stderr, "init_config_attrs: register_at failed\n" );
544			return code;
545		}
546	}
547
548	return 0;
549}
550
551int
552init_config_ocs( ConfigOCs *ocs ) {
553	int i, code;
554
555	for (i=0;ocs[i].co_def;i++) {
556		code = register_oc( ocs[i].co_def, &ocs[i].co_oc, 1 );
557		if ( code ) {
558			fprintf( stderr, "init_config_ocs: register_oc failed\n" );
559			return code;
560		}
561	}
562	return 0;
563}
564
565/* Split an LDIF line into space-separated tokens. Words may be grouped
566 * by quotes. A quoted string may begin in the middle of a word, but must
567 * end at the end of the word (be followed by whitespace or EOS). Any other
568 * quotes are passed through unchanged. All other characters are passed
569 * through unchanged.
570 */
571static char *
572strtok_quote_ldif( char **line )
573{
574	char *beg, *ptr, *quote=NULL;
575	int inquote=0;
576
577	ptr = *line;
578
579	if ( !ptr || !*ptr )
580		return NULL;
581
582	while( isspace( (unsigned char) *ptr )) ptr++;
583
584	if ( *ptr == '"' ) {
585		inquote = 1;
586		ptr++;
587	}
588
589	beg = ptr;
590
591	for (;*ptr;ptr++) {
592		if ( *ptr == '"' ) {
593			if ( inquote && ( !ptr[1] || isspace((unsigned char) ptr[1]))) {
594				*ptr++ = '\0';
595				break;
596			}
597			inquote = 1;
598			quote = ptr;
599			continue;
600		}
601		if ( inquote )
602			continue;
603		if ( isspace( (unsigned char) *ptr )) {
604			*ptr++ = '\0';
605			break;
606		}
607	}
608	if ( quote ) {
609		while ( quote < ptr ) {
610			*quote = quote[1];
611			quote++;
612		}
613	}
614	if ( !*ptr ) {
615		*line = NULL;
616	} else {
617		while ( isspace( (unsigned char) *ptr )) ptr++;
618		*line = ptr;
619	}
620	return beg;
621}
622
623static void
624config_parse_ldif( ConfigArgs *c )
625{
626	char *next;
627	c->tline = ch_strdup(c->line);
628	next = c->tline;
629
630	while ((c->argv[c->argc] = strtok_quote_ldif( &next )) != NULL) {
631		c->argc++;
632		if ( c->argc >= c->argv_size ) {
633			char **tmp = ch_realloc( c->argv, (c->argv_size + ARGS_STEP) *
634				sizeof( *c->argv ));
635			c->argv = tmp;
636			c->argv_size += ARGS_STEP;
637		}
638	}
639	c->argv[c->argc] = NULL;
640}
641
642int
643config_parse_vals(ConfigTable *ct, ConfigArgs *c, int valx)
644{
645	int 	rc = 0;
646
647	snprintf( c->log, sizeof( c->log ), "%s: value #%d",
648		ct->ad->ad_cname.bv_val, valx );
649	c->argc = 1;
650	c->argv[0] = ct->ad->ad_cname.bv_val;
651
652	if ( ( ct->arg_type & ARG_QUOTE ) && c->line[ 0 ] != '"' ) {
653		c->argv[c->argc] = c->line;
654		c->argc++;
655		c->argv[c->argc] = NULL;
656		c->tline = NULL;
657	} else {
658		config_parse_ldif( c );
659	}
660	rc = config_check_vals( ct, c, 1 );
661	ch_free( c->tline );
662	c->tline = NULL;
663
664	if ( rc )
665		rc = LDAP_CONSTRAINT_VIOLATION;
666
667	return rc;
668}
669
670int
671config_parse_add(ConfigTable *ct, ConfigArgs *c, int valx)
672{
673	int	rc = 0;
674
675	snprintf( c->log, sizeof( c->log ), "%s: value #%d",
676		ct->ad->ad_cname.bv_val, valx );
677	c->argc = 1;
678	c->argv[0] = ct->ad->ad_cname.bv_val;
679
680	if ( ( ct->arg_type & ARG_QUOTE ) && c->line[ 0 ] != '"' ) {
681		c->argv[c->argc] = c->line;
682		c->argc++;
683		c->argv[c->argc] = NULL;
684		c->tline = NULL;
685	} else {
686		config_parse_ldif( c );
687	}
688	c->op = LDAP_MOD_ADD;
689	rc = config_add_vals( ct, c );
690	ch_free( c->tline );
691
692	return rc;
693}
694
695int
696read_config_file(const char *fname, int depth, ConfigArgs *cf, ConfigTable *cft)
697{
698	FILE *fp;
699	ConfigTable *ct;
700	ConfigArgs *c;
701	int rc;
702	struct stat s;
703
704	c = ch_calloc( 1, sizeof( ConfigArgs ) );
705	if ( c == NULL ) {
706		return 1;
707	}
708
709	if ( depth ) {
710		memcpy( c, cf, sizeof( ConfigArgs ) );
711	} else {
712		c->depth = depth; /* XXX */
713		c->bi = NULL;
714		c->be = NULL;
715	}
716
717	c->valx = -1;
718	c->fname = fname;
719	init_config_argv( c );
720
721	if ( stat( fname, &s ) != 0 ) {
722		ldap_syslog = 1;
723		Debug(LDAP_DEBUG_ANY,
724		    "could not stat config file \"%s\": %s (%d)\n",
725		    fname, strerror(errno), errno);
726		ch_free( c );
727		return(1);
728	}
729
730	if ( !S_ISREG( s.st_mode ) ) {
731		ldap_syslog = 1;
732		Debug(LDAP_DEBUG_ANY,
733		    "regular file expected, got \"%s\"\n",
734		    fname, 0, 0 );
735		ch_free( c );
736		return(1);
737	}
738
739	fp = fopen( fname, "r" );
740	if ( fp == NULL ) {
741		ldap_syslog = 1;
742		Debug(LDAP_DEBUG_ANY,
743		    "could not open config file \"%s\": %s (%d)\n",
744		    fname, strerror(errno), errno);
745		ch_free( c );
746		return(1);
747	}
748
749	Debug(LDAP_DEBUG_CONFIG, "reading config file %s\n", fname, 0, 0);
750
751	fp_getline_init(c);
752
753	c->tline = NULL;
754
755	while ( fp_getline( fp, c ) ) {
756		/* skip comments and blank lines */
757		if ( c->line[0] == '#' || c->line[0] == '\0' ) {
758			continue;
759		}
760
761		snprintf( c->log, sizeof( c->log ), "%s: line %d",
762				c->fname, c->lineno );
763
764		c->argc = 0;
765		ch_free( c->tline );
766		if ( config_fp_parse_line( c ) ) {
767			rc = 1;
768			goto done;
769		}
770
771		if ( c->argc < 1 ) {
772			Debug( LDAP_DEBUG_ANY, "%s: bad config line.\n",
773				c->log, 0, 0);
774			rc = 1;
775			goto done;
776		}
777
778		c->op = SLAP_CONFIG_ADD;
779
780		ct = config_find_keyword( cft, c );
781		if ( ct ) {
782			c->table = Cft_Global;
783			rc = config_add_vals( ct, c );
784			if ( !rc ) continue;
785
786			if ( rc & ARGS_USERLAND ) {
787				/* XXX a usertype would be opaque here */
788				Debug(LDAP_DEBUG_CONFIG, "%s: unknown user type <%s>\n",
789					c->log, c->argv[0], 0);
790				rc = 1;
791				goto done;
792
793			} else if ( rc == ARG_BAD_CONF ) {
794				rc = 1;
795				goto done;
796			}
797
798		} else if ( c->bi && !c->be ) {
799			rc = SLAP_CONF_UNKNOWN;
800			if ( c->bi->bi_cf_ocs ) {
801				ct = config_find_keyword( c->bi->bi_cf_ocs->co_table, c );
802				if ( ct ) {
803					c->table = c->bi->bi_cf_ocs->co_type;
804					rc = config_add_vals( ct, c );
805				}
806			}
807			if ( c->bi->bi_config && rc == SLAP_CONF_UNKNOWN ) {
808				rc = (*c->bi->bi_config)(c->bi, c->fname, c->lineno,
809					c->argc, c->argv);
810			}
811			if ( rc ) {
812				switch(rc) {
813				case SLAP_CONF_UNKNOWN:
814					Debug( LDAP_DEBUG_ANY, "%s: unknown directive "
815						"<%s> inside backend info definition.\n",
816						c->log, *c->argv, 0);
817				default:
818					rc = 1;
819					goto done;
820				}
821			}
822
823		} else if ( c->be && c->be != frontendDB ) {
824			rc = SLAP_CONF_UNKNOWN;
825			if ( c->be->be_cf_ocs ) {
826				ct = config_find_keyword( c->be->be_cf_ocs->co_table, c );
827				if ( ct ) {
828					c->table = c->be->be_cf_ocs->co_type;
829					rc = config_add_vals( ct, c );
830				}
831			}
832			if ( c->be->be_config && rc == SLAP_CONF_UNKNOWN ) {
833				rc = (*c->be->be_config)(c->be, c->fname, c->lineno,
834					c->argc, c->argv);
835			}
836			if ( rc == SLAP_CONF_UNKNOWN && SLAP_ISGLOBALOVERLAY( frontendDB ) )
837			{
838				/* global overlays may need
839				 * definitions inside other databases...
840				 */
841				rc = (*frontendDB->be_config)( frontendDB,
842					c->fname, (int)c->lineno, c->argc, c->argv );
843			}
844
845			switch ( rc ) {
846			case 0:
847				break;
848
849			case SLAP_CONF_UNKNOWN:
850				Debug( LDAP_DEBUG_ANY, "%s: unknown directive "
851					"<%s> inside backend database definition.\n",
852					c->log, *c->argv, 0);
853
854			default:
855				rc = 1;
856				goto done;
857			}
858
859		} else if ( frontendDB->be_config ) {
860			rc = (*frontendDB->be_config)( frontendDB,
861				c->fname, (int)c->lineno, c->argc, c->argv);
862			if ( rc ) {
863				switch(rc) {
864				case SLAP_CONF_UNKNOWN:
865					Debug( LDAP_DEBUG_ANY, "%s: unknown directive "
866						"<%s> inside global database definition.\n",
867						c->log, *c->argv, 0);
868
869				default:
870					rc = 1;
871					goto done;
872				}
873			}
874
875		} else {
876			Debug( LDAP_DEBUG_ANY, "%s: unknown directive "
877				"<%s> outside backend info and database definitions.\n",
878				c->log, *c->argv, 0);
879			rc = 1;
880			goto done;
881		}
882	}
883
884	rc = 0;
885
886done:
887	if ( cf ) {
888		cf->be = c->be;
889		cf->bi = c->bi;
890	}
891	ch_free(c->tline);
892	fclose(fp);
893	ch_free(c->argv);
894	ch_free(c);
895	return(rc);
896}
897
898/* restrictops, allows, disallows, requires, loglevel */
899
900int
901bverb_to_mask(struct berval *bword, slap_verbmasks *v) {
902	int i;
903	for(i = 0; !BER_BVISNULL(&v[i].word); i++) {
904		if(!ber_bvstrcasecmp(bword, &v[i].word)) break;
905	}
906	return(i);
907}
908
909int
910verb_to_mask(const char *word, slap_verbmasks *v) {
911	struct berval	bword;
912	ber_str2bv( word, 0, 0, &bword );
913	return bverb_to_mask( &bword, v );
914}
915
916int
917verbs_to_mask(int argc, char *argv[], slap_verbmasks *v, slap_mask_t *m) {
918	int i, j;
919	for(i = 1; i < argc; i++) {
920		j = verb_to_mask(argv[i], v);
921		if(BER_BVISNULL(&v[j].word)) return i;
922		while (!v[j].mask) j--;
923		*m |= v[j].mask;
924	}
925	return(0);
926}
927
928/* Mask keywords that represent multiple bits should occur before single
929 * bit keywords in the verbmasks array.
930 */
931int
932mask_to_verbs(slap_verbmasks *v, slap_mask_t m, BerVarray *bva) {
933	int i, rc = 1;
934
935	if (m) {
936		for (i=0; !BER_BVISNULL(&v[i].word); i++) {
937			if (!v[i].mask) continue;
938			if (( m & v[i].mask ) == v[i].mask ) {
939				value_add_one( bva, &v[i].word );
940				rc = 0;
941				m ^= v[i].mask;
942				if ( !m ) break;
943			}
944		}
945	}
946	return rc;
947}
948
949/* Return the verbs as a single string, separated by delim */
950int
951mask_to_verbstring(slap_verbmasks *v, slap_mask_t m0, char delim, struct berval *bv)
952{
953	int i, rc = 1;
954
955	BER_BVZERO( bv );
956	if (m0) {
957		slap_mask_t m = m0;
958		char *ptr;
959		for (i=0; !BER_BVISNULL(&v[i].word); i++) {
960			if (!v[i].mask) continue;
961			if (( m & v[i].mask ) == v[i].mask ) {
962				bv->bv_len += v[i].word.bv_len + 1;
963				rc = 0;
964				m ^= v[i].mask;
965				if ( !m ) break;
966			}
967		}
968		bv->bv_val = ch_malloc(bv->bv_len);
969		bv->bv_len--;
970		ptr = bv->bv_val;
971		m = m0;
972		for (i=0; !BER_BVISNULL(&v[i].word); i++) {
973			if (!v[i].mask) continue;
974			if (( m & v[i].mask ) == v[i].mask ) {
975				ptr = lutil_strcopy(ptr, v[i].word.bv_val);
976				*ptr++ = delim;
977				m ^= v[i].mask;
978				if ( !m ) break;
979			}
980		}
981		ptr[-1] = '\0';
982	}
983	return rc;
984}
985
986/* Parse a verbstring */
987int
988verbstring_to_mask(slap_verbmasks *v, char *str, char delim, slap_mask_t *m) {
989	int j;
990	char *d;
991	struct berval bv;
992
993	do {
994		bv.bv_val = str;
995		d = strchr( str, delim );
996		if ( d )
997			bv.bv_len = d - str;
998		else
999			bv.bv_len = strlen( str );
1000		j = bverb_to_mask( &bv, v );
1001		if(BER_BVISNULL(&v[j].word)) return 1;
1002		while (!v[j].mask) j--;
1003		*m |= v[j].mask;
1004		str += bv.bv_len + 1;
1005	} while ( d );
1006	return(0);
1007}
1008
1009int
1010slap_verbmasks_init( slap_verbmasks **vp, slap_verbmasks *v )
1011{
1012	int		i;
1013
1014	assert( *vp == NULL );
1015
1016	for ( i = 0; !BER_BVISNULL( &v[ i ].word ); i++ ) /* EMPTY */;
1017
1018	*vp = ch_calloc( i + 1, sizeof( slap_verbmasks ) );
1019
1020	for ( i = 0; !BER_BVISNULL( &v[ i ].word ); i++ ) {
1021		ber_dupbv( &(*vp)[ i ].word, &v[ i ].word );
1022		*((slap_mask_t *)&(*vp)[ i ].mask) = v[ i ].mask;
1023	}
1024
1025	BER_BVZERO( &(*vp)[ i ].word );
1026
1027	return 0;
1028}
1029
1030int
1031slap_verbmasks_destroy( slap_verbmasks *v )
1032{
1033	int		i;
1034
1035	assert( v != NULL );
1036
1037	for ( i = 0; !BER_BVISNULL( &v[ i ].word ); i++ ) {
1038		ch_free( v[ i ].word.bv_val );
1039	}
1040
1041	ch_free( v );
1042
1043	return 0;
1044}
1045
1046int
1047slap_verbmasks_append(
1048	slap_verbmasks	**vp,
1049	slap_mask_t	m,
1050	struct berval	*v,
1051	slap_mask_t	*ignore )
1052{
1053	int	i;
1054
1055	if ( !m ) {
1056		return LDAP_OPERATIONS_ERROR;
1057	}
1058
1059	for ( i = 0; !BER_BVISNULL( &(*vp)[ i ].word ); i++ ) {
1060		if ( !(*vp)[ i ].mask ) continue;
1061
1062		if ( ignore != NULL ) {
1063			int	j;
1064
1065			for ( j = 0; ignore[ j ] != 0; j++ ) {
1066				if ( (*vp)[ i ].mask == ignore[ j ] ) {
1067					goto check_next;
1068				}
1069			}
1070		}
1071
1072		if ( ( m & (*vp)[ i ].mask ) == (*vp)[ i ].mask ) {
1073			if ( ber_bvstrcasecmp( v, &(*vp)[ i ].word ) == 0 ) {
1074				/* already set; ignore */
1075				return LDAP_SUCCESS;
1076			}
1077			/* conflicts */
1078			return LDAP_TYPE_OR_VALUE_EXISTS;
1079		}
1080
1081		if ( m & (*vp)[ i ].mask ) {
1082			/* conflicts */
1083			return LDAP_CONSTRAINT_VIOLATION;
1084		}
1085check_next:;
1086	}
1087
1088	*vp = ch_realloc( *vp, sizeof( slap_verbmasks ) * ( i + 2 ) );
1089	ber_dupbv( &(*vp)[ i ].word, v );
1090	*((slap_mask_t *)&(*vp)[ i ].mask) = m;
1091	BER_BVZERO( &(*vp)[ i + 1 ].word );
1092
1093	return LDAP_SUCCESS;
1094}
1095
1096int
1097enum_to_verb(slap_verbmasks *v, slap_mask_t m, struct berval *bv) {
1098	int i;
1099
1100	for (i=0; !BER_BVISNULL(&v[i].word); i++) {
1101		if ( m == v[i].mask ) {
1102			if ( bv != NULL ) {
1103				*bv = v[i].word;
1104			}
1105			return i;
1106		}
1107	}
1108	return -1;
1109}
1110
1111/* register a new verbmask */
1112static int
1113slap_verbmask_register( slap_verbmasks *vm_, slap_verbmasks **vmp, struct berval *bv, int mask )
1114{
1115	slap_verbmasks	*vm = *vmp;
1116	int		i;
1117
1118	/* check for duplicate word */
1119	/* NOTE: we accept duplicate codes; the first occurrence will be used
1120	 * when mapping from mask to verb */
1121	i = verb_to_mask( bv->bv_val, vm );
1122	if ( !BER_BVISNULL( &vm[ i ].word ) ) {
1123		return -1;
1124	}
1125
1126	for ( i = 0; !BER_BVISNULL( &vm[ i ].word ); i++ )
1127		;
1128
1129	if ( vm == vm_ ) {
1130		/* first time: duplicate array */
1131		vm = ch_calloc( i + 2, sizeof( slap_verbmasks ) );
1132		for ( i = 0; !BER_BVISNULL( &vm_[ i ].word ); i++ )
1133		{
1134			ber_dupbv( &vm[ i ].word, &vm_[ i ].word );
1135			*((slap_mask_t*)&vm[ i ].mask) = vm_[ i ].mask;
1136		}
1137
1138	} else {
1139		vm = ch_realloc( vm, (i + 2) * sizeof( slap_verbmasks ) );
1140	}
1141
1142	ber_dupbv( &vm[ i ].word, bv );
1143	*((slap_mask_t*)&vm[ i ].mask) = mask;
1144
1145	BER_BVZERO( &vm[ i+1 ].word );
1146
1147	*vmp = vm;
1148
1149	return i;
1150}
1151
1152static slap_verbmasks slap_ldap_response_code_[] = {
1153	{ BER_BVC("success"),				LDAP_SUCCESS },
1154
1155	{ BER_BVC("operationsError"),			LDAP_OPERATIONS_ERROR },
1156	{ BER_BVC("protocolError"),			LDAP_PROTOCOL_ERROR },
1157	{ BER_BVC("timelimitExceeded"),			LDAP_TIMELIMIT_EXCEEDED },
1158	{ BER_BVC("sizelimitExceeded"),			LDAP_SIZELIMIT_EXCEEDED },
1159	{ BER_BVC("compareFalse"),			LDAP_COMPARE_FALSE },
1160	{ BER_BVC("compareTrue"),			LDAP_COMPARE_TRUE },
1161
1162	{ BER_BVC("authMethodNotSupported"),		LDAP_AUTH_METHOD_NOT_SUPPORTED },
1163	{ BER_BVC("strongAuthNotSupported"),		LDAP_STRONG_AUTH_NOT_SUPPORTED },
1164	{ BER_BVC("strongAuthRequired"),		LDAP_STRONG_AUTH_REQUIRED },
1165	{ BER_BVC("strongerAuthRequired"),		LDAP_STRONGER_AUTH_REQUIRED },
1166#if 0 /* not LDAPv3 */
1167	{ BER_BVC("partialResults"),			LDAP_PARTIAL_RESULTS },
1168#endif
1169
1170	{ BER_BVC("referral"),				LDAP_REFERRAL },
1171	{ BER_BVC("adminlimitExceeded"),		LDAP_ADMINLIMIT_EXCEEDED },
1172	{ BER_BVC("unavailableCriticalExtension"),	LDAP_UNAVAILABLE_CRITICAL_EXTENSION },
1173	{ BER_BVC("confidentialityRequired"),		LDAP_CONFIDENTIALITY_REQUIRED },
1174	{ BER_BVC("saslBindInProgress"),		LDAP_SASL_BIND_IN_PROGRESS },
1175
1176	{ BER_BVC("noSuchAttribute"),			LDAP_NO_SUCH_ATTRIBUTE },
1177	{ BER_BVC("undefinedType"),			LDAP_UNDEFINED_TYPE },
1178	{ BER_BVC("inappropriateMatching"),		LDAP_INAPPROPRIATE_MATCHING },
1179	{ BER_BVC("constraintViolation"),		LDAP_CONSTRAINT_VIOLATION },
1180	{ BER_BVC("typeOrValueExists"),			LDAP_TYPE_OR_VALUE_EXISTS },
1181	{ BER_BVC("invalidSyntax"),			LDAP_INVALID_SYNTAX },
1182
1183	{ BER_BVC("noSuchObject"),			LDAP_NO_SUCH_OBJECT },
1184	{ BER_BVC("aliasProblem"),			LDAP_ALIAS_PROBLEM },
1185	{ BER_BVC("invalidDnSyntax"),			LDAP_INVALID_DN_SYNTAX },
1186#if 0 /* not LDAPv3 */
1187	{ BER_BVC("isLeaf"),				LDAP_IS_LEAF },
1188#endif
1189	{ BER_BVC("aliasDerefProblem"),			LDAP_ALIAS_DEREF_PROBLEM },
1190
1191	{ BER_BVC("proxyAuthzFailure"),			LDAP_X_PROXY_AUTHZ_FAILURE },
1192	{ BER_BVC("inappropriateAuth"),			LDAP_INAPPROPRIATE_AUTH },
1193	{ BER_BVC("invalidCredentials"),		LDAP_INVALID_CREDENTIALS },
1194	{ BER_BVC("insufficientAccess"),		LDAP_INSUFFICIENT_ACCESS },
1195
1196	{ BER_BVC("busy"),				LDAP_BUSY },
1197	{ BER_BVC("unavailable"),			LDAP_UNAVAILABLE },
1198	{ BER_BVC("unwillingToPerform"),		LDAP_UNWILLING_TO_PERFORM },
1199	{ BER_BVC("loopDetect"),			LDAP_LOOP_DETECT },
1200
1201	{ BER_BVC("namingViolation"),			LDAP_NAMING_VIOLATION },
1202	{ BER_BVC("objectClassViolation"),		LDAP_OBJECT_CLASS_VIOLATION },
1203	{ BER_BVC("notAllowedOnNonleaf"),		LDAP_NOT_ALLOWED_ON_NONLEAF },
1204	{ BER_BVC("notAllowedOnRdn"),			LDAP_NOT_ALLOWED_ON_RDN },
1205	{ BER_BVC("alreadyExists"),			LDAP_ALREADY_EXISTS },
1206	{ BER_BVC("noObjectClassMods"),			LDAP_NO_OBJECT_CLASS_MODS },
1207	{ BER_BVC("resultsTooLarge"),			LDAP_RESULTS_TOO_LARGE },
1208	{ BER_BVC("affectsMultipleDsas"),		LDAP_AFFECTS_MULTIPLE_DSAS },
1209
1210	{ BER_BVC("other"),				LDAP_OTHER },
1211
1212	/* extension-specific */
1213
1214	{ BER_BVC("cupResourcesExhausted"),		LDAP_CUP_RESOURCES_EXHAUSTED },
1215	{ BER_BVC("cupSecurityViolation"),		LDAP_CUP_SECURITY_VIOLATION },
1216	{ BER_BVC("cupInvalidData"),			LDAP_CUP_INVALID_DATA },
1217	{ BER_BVC("cupUnsupportedScheme"),		LDAP_CUP_UNSUPPORTED_SCHEME },
1218	{ BER_BVC("cupReloadRequired"),			LDAP_CUP_RELOAD_REQUIRED },
1219
1220	{ BER_BVC("cancelled"),				LDAP_CANCELLED },
1221	{ BER_BVC("noSuchOperation"),			LDAP_NO_SUCH_OPERATION },
1222	{ BER_BVC("tooLate"),				LDAP_TOO_LATE },
1223	{ BER_BVC("cannotCancel"),			LDAP_CANNOT_CANCEL },
1224
1225	{ BER_BVC("assertionFailed"),			LDAP_ASSERTION_FAILED },
1226
1227	{ BER_BVC("proxiedAuthorizationDenied"),	LDAP_PROXIED_AUTHORIZATION_DENIED },
1228
1229	{ BER_BVC("syncRefreshRequired"),		LDAP_SYNC_REFRESH_REQUIRED },
1230
1231	{ BER_BVC("noOperation"),			LDAP_X_NO_OPERATION },
1232
1233	{ BER_BVNULL,				0 }
1234};
1235
1236slap_verbmasks *slap_ldap_response_code = slap_ldap_response_code_;
1237
1238int
1239slap_ldap_response_code_register( struct berval *bv, int err )
1240{
1241	return slap_verbmask_register( slap_ldap_response_code_,
1242		&slap_ldap_response_code, bv, err );
1243}
1244
1245#ifdef HAVE_TLS
1246static slap_verbmasks tlskey[] = {
1247	{ BER_BVC("no"),	SB_TLS_OFF },
1248	{ BER_BVC("yes"),	SB_TLS_ON },
1249	{ BER_BVC("critical"),	SB_TLS_CRITICAL },
1250	{ BER_BVNULL, 0 }
1251};
1252
1253static slap_verbmasks crlkeys[] = {
1254		{ BER_BVC("none"),	LDAP_OPT_X_TLS_CRL_NONE },
1255		{ BER_BVC("peer"),	LDAP_OPT_X_TLS_CRL_PEER },
1256		{ BER_BVC("all"),	LDAP_OPT_X_TLS_CRL_ALL },
1257		{ BER_BVNULL, 0 }
1258	};
1259
1260static slap_verbmasks vfykeys[] = {
1261		{ BER_BVC("never"),	LDAP_OPT_X_TLS_NEVER },
1262		{ BER_BVC("demand"),	LDAP_OPT_X_TLS_DEMAND },
1263		{ BER_BVC("try"),	LDAP_OPT_X_TLS_TRY },
1264		{ BER_BVC("hard"),	LDAP_OPT_X_TLS_HARD },
1265		{ BER_BVNULL, 0 }
1266	};
1267#endif
1268
1269static slap_verbmasks methkey[] = {
1270	{ BER_BVC("none"),	LDAP_AUTH_NONE },
1271	{ BER_BVC("simple"),	LDAP_AUTH_SIMPLE },
1272#ifdef HAVE_CYRUS_SASL
1273	{ BER_BVC("sasl"),	LDAP_AUTH_SASL },
1274#endif
1275	{ BER_BVNULL, 0 }
1276};
1277
1278static slap_verbmasks versionkey[] = {
1279	{ BER_BVC("2"),		LDAP_VERSION2 },
1280	{ BER_BVC("3"),		LDAP_VERSION3 },
1281	{ BER_BVNULL, 0 }
1282};
1283
1284static int
1285slap_keepalive_parse(
1286	struct berval *val,
1287	void *bc,
1288	slap_cf_aux_table *tab0,
1289	const char *tabmsg,
1290	int unparse )
1291{
1292	if ( unparse ) {
1293		slap_keepalive *sk = (slap_keepalive *)bc;
1294		int rc = snprintf( val->bv_val, val->bv_len, "%d:%d:%d",
1295			sk->sk_idle, sk->sk_probes, sk->sk_interval );
1296		if ( rc < 0 ) {
1297			return -1;
1298		}
1299
1300		if ( (unsigned)rc >= val->bv_len ) {
1301			return -1;
1302		}
1303
1304		val->bv_len = rc;
1305
1306	} else {
1307		char *s = val->bv_val;
1308		char *next;
1309		slap_keepalive *sk = (slap_keepalive *)bc;
1310		slap_keepalive sk2;
1311
1312		if ( s[0] == ':' ) {
1313			sk2.sk_idle = 0;
1314			s++;
1315
1316		} else {
1317			sk2.sk_idle = strtol( s, &next, 10 );
1318			if ( next == s || next[0] != ':' ) {
1319				return -1;
1320			}
1321
1322			if ( sk2.sk_idle < 0 ) {
1323				return -1;
1324			}
1325
1326			s = ++next;
1327		}
1328
1329		if ( s[0] == ':' ) {
1330			sk2.sk_probes = 0;
1331			s++;
1332
1333		} else {
1334			sk2.sk_probes = strtol( s, &next, 10 );
1335			if ( next == s || next[0] != ':' ) {
1336				return -1;
1337			}
1338
1339			if ( sk2.sk_probes < 0 ) {
1340				return -1;
1341			}
1342
1343			s = ++next;
1344		}
1345
1346		if ( s == '\0' ) {
1347			sk2.sk_interval = 0;
1348			s++;
1349
1350		} else {
1351			sk2.sk_interval = strtol( s, &next, 10 );
1352			if ( next == s || next[0] != '\0' ) {
1353				return -1;
1354			}
1355
1356			if ( sk2.sk_interval < 0 ) {
1357				return -1;
1358			}
1359		}
1360
1361		*sk = sk2;
1362
1363		ber_memfree( val->bv_val );
1364		BER_BVZERO( val );
1365	}
1366
1367	return 0;
1368}
1369
1370static int
1371slap_sb_uri(
1372	struct berval *val,
1373	void *bcp,
1374	slap_cf_aux_table *tab0,
1375	const char *tabmsg,
1376	int unparse )
1377{
1378	slap_bindconf *bc = bcp;
1379	if ( unparse ) {
1380		if ( bc->sb_uri.bv_len >= val->bv_len )
1381			return -1;
1382		val->bv_len = bc->sb_uri.bv_len;
1383		AC_MEMCPY( val->bv_val, bc->sb_uri.bv_val, val->bv_len );
1384	} else {
1385		bc->sb_uri = *val;
1386#ifdef HAVE_TLS
1387		if ( ldap_is_ldaps_url( val->bv_val ))
1388			bc->sb_tls_do_init = 1;
1389#endif
1390	}
1391	return 0;
1392}
1393
1394static slap_cf_aux_table bindkey[] = {
1395	{ BER_BVC("uri="), 0, 'x', 1, slap_sb_uri },
1396	{ BER_BVC("version="), offsetof(slap_bindconf, sb_version), 'i', 0, versionkey },
1397	{ BER_BVC("bindmethod="), offsetof(slap_bindconf, sb_method), 'i', 0, methkey },
1398	{ BER_BVC("timeout="), offsetof(slap_bindconf, sb_timeout_api), 'i', 0, NULL },
1399	{ BER_BVC("network-timeout="), offsetof(slap_bindconf, sb_timeout_net), 'i', 0, NULL },
1400	{ BER_BVC("binddn="), offsetof(slap_bindconf, sb_binddn), 'b', 1, (slap_verbmasks *)dnNormalize },
1401	{ BER_BVC("credentials="), offsetof(slap_bindconf, sb_cred), 'b', 1, NULL },
1402	{ BER_BVC("saslmech="), offsetof(slap_bindconf, sb_saslmech), 'b', 0, NULL },
1403	{ BER_BVC("secprops="), offsetof(slap_bindconf, sb_secprops), 's', 0, NULL },
1404	{ BER_BVC("realm="), offsetof(slap_bindconf, sb_realm), 'b', 0, NULL },
1405	{ BER_BVC("authcID="), offsetof(slap_bindconf, sb_authcId), 'b', 1, NULL },
1406	{ BER_BVC("authzID="), offsetof(slap_bindconf, sb_authzId), 'b', 1, (slap_verbmasks *)authzNormalize },
1407	{ BER_BVC("keepalive="), offsetof(slap_bindconf, sb_keepalive), 'x', 0, (slap_verbmasks *)slap_keepalive_parse },
1408#ifdef HAVE_TLS
1409	/* NOTE: replace "13" with the actual index
1410	 * of the first TLS-related line */
1411#define aux_TLS (bindkey+13)	/* beginning of TLS keywords */
1412
1413	{ BER_BVC("starttls="), offsetof(slap_bindconf, sb_tls), 'i', 0, tlskey },
1414	{ BER_BVC("tls_cert="), offsetof(slap_bindconf, sb_tls_cert), 's', 1, NULL },
1415	{ BER_BVC("tls_key="), offsetof(slap_bindconf, sb_tls_key), 's', 1, NULL },
1416	{ BER_BVC("tls_cacert="), offsetof(slap_bindconf, sb_tls_cacert), 's', 1, NULL },
1417	{ BER_BVC("tls_cacertdir="), offsetof(slap_bindconf, sb_tls_cacertdir), 's', 1, NULL },
1418	{ BER_BVC("tls_reqcert="), offsetof(slap_bindconf, sb_tls_reqcert), 's', 0, NULL },
1419	{ BER_BVC("tls_cipher_suite="), offsetof(slap_bindconf, sb_tls_cipher_suite), 's', 0, NULL },
1420	{ BER_BVC("tls_protocol_min="), offsetof(slap_bindconf, sb_tls_protocol_min), 's', 0, NULL },
1421#ifdef HAVE_OPENSSL_CRL
1422	{ BER_BVC("tls_crlcheck="), offsetof(slap_bindconf, sb_tls_crlcheck), 's', 0, NULL },
1423#endif
1424#endif
1425	{ BER_BVNULL, 0, 0, 0, NULL }
1426};
1427
1428/*
1429 * 's':	char *
1430 * 'b':	struct berval; if !NULL, normalize using ((slap_mr_normalize_func *)aux)
1431 * 'i':	int; if !NULL, compute using ((slap_verbmasks *)aux)
1432 * 'u':	unsigned
1433 * 'I':	long
1434 * 'U':	unsigned long
1435 */
1436
1437int
1438slap_cf_aux_table_parse( const char *word, void *dst, slap_cf_aux_table *tab0, LDAP_CONST char *tabmsg )
1439{
1440	int rc = SLAP_CONF_UNKNOWN;
1441	slap_cf_aux_table *tab;
1442
1443	for ( tab = tab0; !BER_BVISNULL( &tab->key ); tab++ ) {
1444		if ( !strncasecmp( word, tab->key.bv_val, tab->key.bv_len ) ) {
1445			char **cptr;
1446			int *iptr, j;
1447			unsigned *uptr;
1448			long *lptr;
1449			unsigned long *ulptr;
1450			struct berval *bptr;
1451			const char *val = word + tab->key.bv_len;
1452
1453			switch ( tab->type ) {
1454			case 's':
1455				cptr = (char **)((char *)dst + tab->off);
1456				*cptr = ch_strdup( val );
1457				rc = 0;
1458				break;
1459
1460			case 'b':
1461				bptr = (struct berval *)((char *)dst + tab->off);
1462				if ( tab->aux != NULL ) {
1463					struct berval	dn;
1464					slap_mr_normalize_func *normalize = (slap_mr_normalize_func *)tab->aux;
1465
1466					ber_str2bv( val, 0, 0, &dn );
1467					rc = normalize( 0, NULL, NULL, &dn, bptr, NULL );
1468
1469				} else {
1470					ber_str2bv( val, 0, 1, bptr );
1471					rc = 0;
1472				}
1473				break;
1474
1475			case 'i':
1476				iptr = (int *)((char *)dst + tab->off);
1477
1478				if ( tab->aux != NULL ) {
1479					slap_verbmasks *aux = (slap_verbmasks *)tab->aux;
1480
1481					assert( aux != NULL );
1482
1483					rc = 1;
1484					for ( j = 0; !BER_BVISNULL( &aux[j].word ); j++ ) {
1485						if ( !strcasecmp( val, aux[j].word.bv_val ) ) {
1486							*iptr = aux[j].mask;
1487							rc = 0;
1488							break;
1489						}
1490					}
1491
1492				} else {
1493					rc = lutil_atoix( iptr, val, 0 );
1494				}
1495				break;
1496
1497			case 'u':
1498				uptr = (unsigned *)((char *)dst + tab->off);
1499
1500				rc = lutil_atoux( uptr, val, 0 );
1501				break;
1502
1503			case 'I':
1504				lptr = (long *)((char *)dst + tab->off);
1505
1506				rc = lutil_atolx( lptr, val, 0 );
1507				break;
1508
1509			case 'U':
1510				ulptr = (unsigned long *)((char *)dst + tab->off);
1511
1512				rc = lutil_atoulx( ulptr, val, 0 );
1513				break;
1514
1515			case 'x':
1516				if ( tab->aux != NULL ) {
1517					struct berval value;
1518					slap_cf_aux_table_parse_x *func = (slap_cf_aux_table_parse_x *)tab->aux;
1519
1520					ber_str2bv( val, 0, 1, &value );
1521
1522					rc = func( &value, (void *)((char *)dst + tab->off), tab, tabmsg, 0 );
1523
1524				} else {
1525					rc = 1;
1526				}
1527				break;
1528			}
1529
1530			if ( rc ) {
1531				Debug( LDAP_DEBUG_ANY, "invalid %s value %s\n",
1532					tabmsg, word, 0 );
1533			}
1534
1535			return rc;
1536		}
1537	}
1538
1539	return rc;
1540}
1541
1542int
1543slap_cf_aux_table_unparse( void *src, struct berval *bv, slap_cf_aux_table *tab0 )
1544{
1545	char buf[AC_LINE_MAX], *ptr;
1546	slap_cf_aux_table *tab;
1547	struct berval tmp;
1548
1549	ptr = buf;
1550	for (tab = tab0; !BER_BVISNULL(&tab->key); tab++ ) {
1551		char **cptr;
1552		int *iptr, i;
1553		unsigned *uptr;
1554		long *lptr;
1555		unsigned long *ulptr;
1556		struct berval *bptr;
1557
1558		cptr = (char **)((char *)src + tab->off);
1559
1560		switch ( tab->type ) {
1561		case 'b':
1562			bptr = (struct berval *)((char *)src + tab->off);
1563			cptr = &bptr->bv_val;
1564
1565		case 's':
1566			if ( *cptr ) {
1567				*ptr++ = ' ';
1568				ptr = lutil_strcopy( ptr, tab->key.bv_val );
1569				if ( tab->quote ) *ptr++ = '"';
1570				ptr = lutil_strcopy( ptr, *cptr );
1571				if ( tab->quote ) *ptr++ = '"';
1572			}
1573			break;
1574
1575		case 'i':
1576			iptr = (int *)((char *)src + tab->off);
1577
1578			if ( tab->aux != NULL ) {
1579				slap_verbmasks *aux = (slap_verbmasks *)tab->aux;
1580
1581				for ( i = 0; !BER_BVISNULL( &aux[i].word ); i++ ) {
1582					if ( *iptr == aux[i].mask ) {
1583						*ptr++ = ' ';
1584						ptr = lutil_strcopy( ptr, tab->key.bv_val );
1585						ptr = lutil_strcopy( ptr, aux[i].word.bv_val );
1586						break;
1587					}
1588				}
1589
1590			} else {
1591				*ptr++ = ' ';
1592				ptr = lutil_strcopy( ptr, tab->key.bv_val );
1593				ptr += snprintf( ptr, sizeof( buf ) - ( ptr - buf ), "%d", *iptr );
1594			}
1595			break;
1596
1597		case 'u':
1598			uptr = (unsigned *)((char *)src + tab->off);
1599			*ptr++ = ' ';
1600			ptr = lutil_strcopy( ptr, tab->key.bv_val );
1601			ptr += snprintf( ptr, sizeof( buf ) - ( ptr - buf ), "%u", *uptr );
1602			break;
1603
1604		case 'I':
1605			lptr = (long *)((char *)src + tab->off);
1606			*ptr++ = ' ';
1607			ptr = lutil_strcopy( ptr, tab->key.bv_val );
1608			ptr += snprintf( ptr, sizeof( buf ) - ( ptr - buf ), "%ld", *lptr );
1609			break;
1610
1611		case 'U':
1612			ulptr = (unsigned long *)((char *)src + tab->off);
1613			*ptr++ = ' ';
1614			ptr = lutil_strcopy( ptr, tab->key.bv_val );
1615			ptr += snprintf( ptr, sizeof( buf ) - ( ptr - buf ), "%lu", *ulptr );
1616			break;
1617
1618		case 'x':
1619			{
1620				char *saveptr=ptr;
1621				*ptr++ = ' ';
1622				ptr = lutil_strcopy( ptr, tab->key.bv_val );
1623				if ( tab->quote ) *ptr++ = '"';
1624				if ( tab->aux != NULL ) {
1625					struct berval value;
1626					slap_cf_aux_table_parse_x *func = (slap_cf_aux_table_parse_x *)tab->aux;
1627					int rc;
1628
1629					value.bv_val = ptr;
1630					value.bv_len = buf + sizeof( buf ) - ptr;
1631
1632					rc = func( &value, (void *)((char *)src + tab->off), tab, "(unparse)", 1 );
1633					if ( rc == 0 ) {
1634						if (value.bv_len) {
1635							ptr += value.bv_len;
1636						} else {
1637							ptr = saveptr;
1638							break;
1639						}
1640					}
1641				}
1642				if ( tab->quote ) *ptr++ = '"';
1643			}
1644			break;
1645
1646		default:
1647			assert( 0 );
1648		}
1649	}
1650	tmp.bv_val = buf;
1651	tmp.bv_len = ptr - buf;
1652	ber_dupbv( bv, &tmp );
1653	return 0;
1654}
1655
1656int
1657slap_tls_get_config( LDAP *ld, int opt, char **val )
1658{
1659#ifdef HAVE_TLS
1660	slap_verbmasks *keys;
1661	int i, ival;
1662
1663	*val = NULL;
1664	switch( opt ) {
1665	case LDAP_OPT_X_TLS_CRLCHECK:
1666		keys = crlkeys;
1667		break;
1668	case LDAP_OPT_X_TLS_REQUIRE_CERT:
1669		keys = vfykeys;
1670		break;
1671	case LDAP_OPT_X_TLS_PROTOCOL_MIN: {
1672		char buf[8];
1673		ldap_pvt_tls_get_option( ld, opt, &ival );
1674		snprintf( buf, sizeof( buf ), "%d.%d",
1675			( ival >> 8 ) & 0xff, ival & 0xff );
1676		*val = ch_strdup( buf );
1677		return 0;
1678		}
1679	default:
1680		return -1;
1681	}
1682	ldap_pvt_tls_get_option( ld, opt, &ival );
1683	for (i=0; !BER_BVISNULL(&keys[i].word); i++) {
1684		if (keys[i].mask == ival) {
1685			*val = ch_strdup( keys[i].word.bv_val );
1686			return 0;
1687		}
1688	}
1689#endif
1690	return -1;
1691}
1692
1693int
1694bindconf_tls_parse( const char *word, slap_bindconf *bc )
1695{
1696#ifdef HAVE_TLS
1697	if ( slap_cf_aux_table_parse( word, bc, aux_TLS, "tls config" ) == 0 ) {
1698		bc->sb_tls_do_init = 1;
1699		return 0;
1700	}
1701#endif
1702	return -1;
1703}
1704
1705int
1706bindconf_tls_unparse( slap_bindconf *bc, struct berval *bv )
1707{
1708#ifdef HAVE_TLS
1709	return slap_cf_aux_table_unparse( bc, bv, aux_TLS );
1710#endif
1711	return -1;
1712}
1713
1714int
1715bindconf_parse( const char *word, slap_bindconf *bc )
1716{
1717#ifdef HAVE_TLS
1718	/* Detect TLS config changes explicitly */
1719	if ( bindconf_tls_parse( word, bc ) == 0 ) {
1720		return 0;
1721	}
1722#endif
1723	return slap_cf_aux_table_parse( word, bc, bindkey, "bind config" );
1724}
1725
1726int
1727bindconf_unparse( slap_bindconf *bc, struct berval *bv )
1728{
1729	return slap_cf_aux_table_unparse( bc, bv, bindkey );
1730}
1731
1732void bindconf_free( slap_bindconf *bc ) {
1733	if ( !BER_BVISNULL( &bc->sb_uri ) ) {
1734		ch_free( bc->sb_uri.bv_val );
1735		BER_BVZERO( &bc->sb_uri );
1736	}
1737	if ( !BER_BVISNULL( &bc->sb_binddn ) ) {
1738		ch_free( bc->sb_binddn.bv_val );
1739		BER_BVZERO( &bc->sb_binddn );
1740	}
1741	if ( !BER_BVISNULL( &bc->sb_cred ) ) {
1742		ch_free( bc->sb_cred.bv_val );
1743		BER_BVZERO( &bc->sb_cred );
1744	}
1745	if ( !BER_BVISNULL( &bc->sb_saslmech ) ) {
1746		ch_free( bc->sb_saslmech.bv_val );
1747		BER_BVZERO( &bc->sb_saslmech );
1748	}
1749	if ( bc->sb_secprops ) {
1750		ch_free( bc->sb_secprops );
1751		bc->sb_secprops = NULL;
1752	}
1753	if ( !BER_BVISNULL( &bc->sb_realm ) ) {
1754		ch_free( bc->sb_realm.bv_val );
1755		BER_BVZERO( &bc->sb_realm );
1756	}
1757	if ( !BER_BVISNULL( &bc->sb_authcId ) ) {
1758		ch_free( bc->sb_authcId.bv_val );
1759		BER_BVZERO( &bc->sb_authcId );
1760	}
1761	if ( !BER_BVISNULL( &bc->sb_authzId ) ) {
1762		ch_free( bc->sb_authzId.bv_val );
1763		BER_BVZERO( &bc->sb_authzId );
1764	}
1765#ifdef HAVE_TLS
1766	if ( bc->sb_tls_cert ) {
1767		ch_free( bc->sb_tls_cert );
1768		bc->sb_tls_cert = NULL;
1769	}
1770	if ( bc->sb_tls_key ) {
1771		ch_free( bc->sb_tls_key );
1772		bc->sb_tls_key = NULL;
1773	}
1774	if ( bc->sb_tls_cacert ) {
1775		ch_free( bc->sb_tls_cacert );
1776		bc->sb_tls_cacert = NULL;
1777	}
1778	if ( bc->sb_tls_cacertdir ) {
1779		ch_free( bc->sb_tls_cacertdir );
1780		bc->sb_tls_cacertdir = NULL;
1781	}
1782	if ( bc->sb_tls_reqcert ) {
1783		ch_free( bc->sb_tls_reqcert );
1784		bc->sb_tls_reqcert = NULL;
1785	}
1786	if ( bc->sb_tls_cipher_suite ) {
1787		ch_free( bc->sb_tls_cipher_suite );
1788		bc->sb_tls_cipher_suite = NULL;
1789	}
1790	if ( bc->sb_tls_protocol_min ) {
1791		ch_free( bc->sb_tls_protocol_min );
1792		bc->sb_tls_protocol_min = NULL;
1793	}
1794#ifdef HAVE_OPENSSL_CRL
1795	if ( bc->sb_tls_crlcheck ) {
1796		ch_free( bc->sb_tls_crlcheck );
1797		bc->sb_tls_crlcheck = NULL;
1798	}
1799#endif
1800	if ( bc->sb_tls_ctx ) {
1801		ldap_pvt_tls_ctx_free( bc->sb_tls_ctx );
1802		bc->sb_tls_ctx = NULL;
1803	}
1804#endif
1805}
1806
1807void
1808bindconf_tls_defaults( slap_bindconf *bc )
1809{
1810#ifdef HAVE_TLS
1811	if ( bc->sb_tls_do_init ) {
1812		if ( !bc->sb_tls_cacert )
1813			ldap_pvt_tls_get_option( slap_tls_ld, LDAP_OPT_X_TLS_CACERTFILE,
1814				&bc->sb_tls_cacert );
1815		if ( !bc->sb_tls_cacertdir )
1816			ldap_pvt_tls_get_option( slap_tls_ld, LDAP_OPT_X_TLS_CACERTDIR,
1817				&bc->sb_tls_cacertdir );
1818		if ( !bc->sb_tls_cert )
1819			ldap_pvt_tls_get_option( slap_tls_ld, LDAP_OPT_X_TLS_CERTFILE,
1820				&bc->sb_tls_cert );
1821		if ( !bc->sb_tls_key )
1822			ldap_pvt_tls_get_option( slap_tls_ld, LDAP_OPT_X_TLS_KEYFILE,
1823				&bc->sb_tls_key );
1824		if ( !bc->sb_tls_cipher_suite )
1825			ldap_pvt_tls_get_option( slap_tls_ld, LDAP_OPT_X_TLS_CIPHER_SUITE,
1826				&bc->sb_tls_cipher_suite );
1827		if ( !bc->sb_tls_reqcert )
1828			bc->sb_tls_reqcert = ch_strdup("demand");
1829#ifdef HAVE_OPENSSL_CRL
1830		if ( !bc->sb_tls_crlcheck )
1831			slap_tls_get_config( slap_tls_ld, LDAP_OPT_X_TLS_CRLCHECK,
1832				&bc->sb_tls_crlcheck );
1833#endif
1834	}
1835#endif
1836}
1837
1838#ifdef HAVE_TLS
1839static struct {
1840	const char *key;
1841	size_t offset;
1842	int opt;
1843} bindtlsopts[] = {
1844	{ "tls_cert", offsetof(slap_bindconf, sb_tls_cert), LDAP_OPT_X_TLS_CERTFILE },
1845	{ "tls_key", offsetof(slap_bindconf, sb_tls_key), LDAP_OPT_X_TLS_KEYFILE },
1846	{ "tls_cacert", offsetof(slap_bindconf, sb_tls_cacert), LDAP_OPT_X_TLS_CACERTFILE },
1847	{ "tls_cacertdir", offsetof(slap_bindconf, sb_tls_cacertdir), LDAP_OPT_X_TLS_CACERTDIR },
1848	{ "tls_cipher_suite", offsetof(slap_bindconf, sb_tls_cipher_suite), LDAP_OPT_X_TLS_CIPHER_SUITE },
1849	{ "tls_protocol_min", offsetof(slap_bindconf, sb_tls_protocol_min), LDAP_OPT_X_TLS_PROTOCOL_MIN },
1850	{0, 0}
1851};
1852
1853int bindconf_tls_set( slap_bindconf *bc, LDAP *ld )
1854{
1855	int i, rc, newctx = 0, res = 0;
1856	char *ptr = (char *)bc, **word;
1857
1858	bc->sb_tls_do_init = 0;
1859
1860	for (i=0; bindtlsopts[i].opt; i++) {
1861		word = (char **)(ptr + bindtlsopts[i].offset);
1862		if ( *word ) {
1863			rc = ldap_set_option( ld, bindtlsopts[i].opt, *word );
1864			if ( rc ) {
1865				Debug( LDAP_DEBUG_ANY,
1866					"bindconf_tls_set: failed to set %s to %s\n",
1867						bindtlsopts[i].key, *word, 0 );
1868				res = -1;
1869			} else
1870				newctx = 1;
1871		}
1872	}
1873	if ( bc->sb_tls_reqcert ) {
1874		rc = ldap_int_tls_config( ld, LDAP_OPT_X_TLS_REQUIRE_CERT,
1875			bc->sb_tls_reqcert );
1876		if ( rc ) {
1877			Debug( LDAP_DEBUG_ANY,
1878				"bindconf_tls_set: failed to set tls_reqcert to %s\n",
1879					bc->sb_tls_reqcert, 0, 0 );
1880			res = -1;
1881		} else
1882			newctx = 1;
1883	}
1884	if ( bc->sb_tls_protocol_min ) {
1885		rc = ldap_int_tls_config( ld, LDAP_OPT_X_TLS_PROTOCOL_MIN,
1886			bc->sb_tls_protocol_min );
1887		if ( rc ) {
1888			Debug( LDAP_DEBUG_ANY,
1889				"bindconf_tls_set: failed to set tls_protocol_min to %s\n",
1890					bc->sb_tls_protocol_min, 0, 0 );
1891			res = -1;
1892		} else
1893			newctx = 1;
1894	}
1895#ifdef HAVE_OPENSSL_CRL
1896	if ( bc->sb_tls_crlcheck ) {
1897		rc = ldap_int_tls_config( ld, LDAP_OPT_X_TLS_CRLCHECK,
1898			bc->sb_tls_crlcheck );
1899		if ( rc ) {
1900			Debug( LDAP_DEBUG_ANY,
1901				"bindconf_tls_set: failed to set tls_crlcheck to %s\n",
1902					bc->sb_tls_crlcheck, 0, 0 );
1903			res = -1;
1904		} else
1905			newctx = 1;
1906	}
1907#endif
1908	if ( newctx ) {
1909		int opt = 0;
1910
1911		if ( bc->sb_tls_ctx ) {
1912			ldap_pvt_tls_ctx_free( bc->sb_tls_ctx );
1913			bc->sb_tls_ctx = NULL;
1914		}
1915		rc = ldap_set_option( ld, LDAP_OPT_X_TLS_NEWCTX, &opt );
1916		if ( rc )
1917			res = rc;
1918		else
1919			ldap_get_option( ld, LDAP_OPT_X_TLS_CTX, &bc->sb_tls_ctx );
1920	}
1921
1922	return res;
1923}
1924#endif
1925
1926/*
1927 * connect to a client using the bindconf data
1928 * note: should move "version" into bindconf...
1929 */
1930int
1931slap_client_connect( LDAP **ldp, slap_bindconf *sb )
1932{
1933	LDAP		*ld = NULL;
1934	int		rc;
1935	struct timeval tv;
1936
1937	/* Init connection to master */
1938	rc = ldap_initialize( &ld, sb->sb_uri.bv_val );
1939	if ( rc != LDAP_SUCCESS ) {
1940		Debug( LDAP_DEBUG_ANY,
1941			"slap_client_connect: "
1942			"ldap_initialize(%s) failed (%d)\n",
1943			sb->sb_uri.bv_val, rc, 0 );
1944		return rc;
1945	}
1946
1947	if ( sb->sb_version != 0 ) {
1948		ldap_set_option( ld, LDAP_OPT_PROTOCOL_VERSION,
1949			(const void *)&sb->sb_version );
1950	}
1951
1952	if ( sb->sb_timeout_api ) {
1953		tv.tv_sec = sb->sb_timeout_api;
1954		tv.tv_usec = 0;
1955		ldap_set_option( ld, LDAP_OPT_TIMEOUT, &tv );
1956	}
1957
1958	if ( sb->sb_timeout_net ) {
1959		tv.tv_sec = sb->sb_timeout_net;
1960		tv.tv_usec = 0;
1961		ldap_set_option( ld, LDAP_OPT_NETWORK_TIMEOUT, &tv );
1962	}
1963
1964	if ( sb->sb_keepalive.sk_idle ) {
1965		ldap_set_option( ld, LDAP_OPT_X_KEEPALIVE_IDLE, &sb->sb_keepalive.sk_idle );
1966	}
1967
1968	if ( sb->sb_keepalive.sk_probes ) {
1969		ldap_set_option( ld, LDAP_OPT_X_KEEPALIVE_PROBES, &sb->sb_keepalive.sk_probes );
1970	}
1971
1972	if ( sb->sb_keepalive.sk_interval ) {
1973		ldap_set_option( ld, LDAP_OPT_X_KEEPALIVE_INTERVAL, &sb->sb_keepalive.sk_interval );
1974	}
1975
1976#ifdef HAVE_TLS
1977	if ( sb->sb_tls_do_init ) {
1978		rc = bindconf_tls_set( sb, ld );
1979
1980	} else if ( sb->sb_tls_ctx ) {
1981		rc = ldap_set_option( ld, LDAP_OPT_X_TLS_CTX,
1982			sb->sb_tls_ctx );
1983	}
1984
1985	if ( rc ) {
1986		Debug( LDAP_DEBUG_ANY,
1987			"slap_client_connect: "
1988			"URI=%s TLS context initialization failed (%d)\n",
1989			sb->sb_uri.bv_val, rc, 0 );
1990		return rc;
1991	}
1992#endif
1993
1994	/* Bind */
1995	if ( sb->sb_tls ) {
1996		rc = ldap_start_tls_s( ld, NULL, NULL );
1997		if ( rc != LDAP_SUCCESS ) {
1998			Debug( LDAP_DEBUG_ANY,
1999				"slap_client_connect: URI=%s "
2000				"%s, ldap_start_tls failed (%d)\n",
2001				sb->sb_uri.bv_val,
2002				sb->sb_tls == SB_TLS_CRITICAL ?
2003					"Error" : "Warning",
2004				rc );
2005			if ( sb->sb_tls == SB_TLS_CRITICAL ) {
2006				goto done;
2007			}
2008		}
2009	}
2010
2011	if ( sb->sb_method == LDAP_AUTH_SASL ) {
2012#ifdef HAVE_CYRUS_SASL
2013		void *defaults;
2014
2015		if ( sb->sb_secprops != NULL ) {
2016			rc = ldap_set_option( ld,
2017				LDAP_OPT_X_SASL_SECPROPS, sb->sb_secprops);
2018
2019			if( rc != LDAP_OPT_SUCCESS ) {
2020				Debug( LDAP_DEBUG_ANY,
2021					"slap_client_connect: "
2022					"error, ldap_set_option "
2023					"(%s,SECPROPS,\"%s\") failed!\n",
2024					sb->sb_uri.bv_val, sb->sb_secprops, 0 );
2025				goto done;
2026			}
2027		}
2028
2029		defaults = lutil_sasl_defaults( ld,
2030			sb->sb_saslmech.bv_val,
2031			sb->sb_realm.bv_val,
2032			sb->sb_authcId.bv_val,
2033			sb->sb_cred.bv_val,
2034			sb->sb_authzId.bv_val );
2035		if ( defaults == NULL ) {
2036			rc = LDAP_OTHER;
2037			goto done;
2038		}
2039
2040		rc = ldap_sasl_interactive_bind_s( ld,
2041				sb->sb_binddn.bv_val,
2042				sb->sb_saslmech.bv_val,
2043				NULL, NULL,
2044				LDAP_SASL_QUIET,
2045				lutil_sasl_interact,
2046				defaults );
2047
2048		lutil_sasl_freedefs( defaults );
2049
2050		/* FIXME: different error behaviors according to
2051		 *	1) return code
2052		 *	2) on err policy : exit, retry, backoff ...
2053		 */
2054		if ( rc != LDAP_SUCCESS ) {
2055			static struct berval bv_GSSAPI = BER_BVC( "GSSAPI" );
2056
2057			Debug( LDAP_DEBUG_ANY, "slap_client_connect: URI=%s "
2058				"ldap_sasl_interactive_bind_s failed (%d)\n",
2059				sb->sb_uri.bv_val, rc, 0 );
2060
2061			/* FIXME (see above comment) */
2062			/* if Kerberos credentials cache is not active, retry */
2063			if ( ber_bvcmp( &sb->sb_saslmech, &bv_GSSAPI ) == 0 &&
2064				rc == LDAP_LOCAL_ERROR )
2065			{
2066				rc = LDAP_SERVER_DOWN;
2067			}
2068
2069			goto done;
2070		}
2071#else /* HAVE_CYRUS_SASL */
2072		/* Should never get here, we trapped this at config time */
2073		assert(0);
2074		Debug( LDAP_DEBUG_SYNC, "not compiled with SASL support\n", 0, 0, 0 );
2075		rc = LDAP_OTHER;
2076		goto done;
2077#endif
2078
2079	} else if ( sb->sb_method == LDAP_AUTH_SIMPLE ) {
2080		rc = ldap_sasl_bind_s( ld,
2081			sb->sb_binddn.bv_val, LDAP_SASL_SIMPLE,
2082			&sb->sb_cred, NULL, NULL, NULL );
2083		if ( rc != LDAP_SUCCESS ) {
2084			Debug( LDAP_DEBUG_ANY, "slap_client_connect: "
2085				"URI=%s DN=\"%s\" "
2086				"ldap_sasl_bind_s failed (%d)\n",
2087				sb->sb_uri.bv_val, sb->sb_binddn.bv_val, rc );
2088			goto done;
2089		}
2090	}
2091
2092done:;
2093	if ( rc ) {
2094		if ( ld ) {
2095			ldap_unbind_ext( ld, NULL, NULL );
2096			*ldp = NULL;
2097		}
2098
2099	} else {
2100		*ldp = ld;
2101	}
2102
2103	return rc;
2104}
2105
2106/* -------------------------------------- */
2107
2108
2109static char *
2110strtok_quote( char *line, char *sep, char **quote_ptr )
2111{
2112	int		inquote;
2113	char		*tmp;
2114	static char	*next;
2115
2116	*quote_ptr = NULL;
2117	if ( line != NULL ) {
2118		next = line;
2119	}
2120	while ( *next && strchr( sep, *next ) ) {
2121		next++;
2122	}
2123
2124	if ( *next == '\0' ) {
2125		next = NULL;
2126		return( NULL );
2127	}
2128	tmp = next;
2129
2130	for ( inquote = 0; *next; ) {
2131		switch ( *next ) {
2132		case '"':
2133			if ( inquote ) {
2134				inquote = 0;
2135			} else {
2136				inquote = 1;
2137			}
2138			AC_MEMCPY( next, next + 1, strlen( next + 1 ) + 1 );
2139			break;
2140
2141		case '\\':
2142			if ( next[1] )
2143				AC_MEMCPY( next,
2144					    next + 1, strlen( next + 1 ) + 1 );
2145			next++;		/* dont parse the escaped character */
2146			break;
2147
2148		default:
2149			if ( ! inquote ) {
2150				if ( strchr( sep, *next ) != NULL ) {
2151					*quote_ptr = next;
2152					*next++ = '\0';
2153					return( tmp );
2154				}
2155			}
2156			next++;
2157			break;
2158		}
2159	}
2160
2161	return( tmp );
2162}
2163
2164static char	buf[AC_LINE_MAX];
2165static char	*line;
2166static size_t lmax, lcur;
2167
2168#define CATLINE( buf ) \
2169	do { \
2170		size_t len = strlen( buf ); \
2171		while ( lcur + len + 1 > lmax ) { \
2172			lmax += AC_LINE_MAX; \
2173			line = (char *) ch_realloc( line, lmax ); \
2174		} \
2175		strcpy( line + lcur, buf ); \
2176		lcur += len; \
2177	} while( 0 )
2178
2179static void
2180fp_getline_init(ConfigArgs *c) {
2181	c->lineno = -1;
2182	buf[0] = '\0';
2183}
2184
2185static int
2186fp_getline( FILE *fp, ConfigArgs *c )
2187{
2188	char	*p;
2189
2190	lcur = 0;
2191	CATLINE(buf);
2192	c->lineno++;
2193
2194	/* avoid stack of bufs */
2195	if ( strncasecmp( line, "include", STRLENOF( "include" ) ) == 0 ) {
2196		buf[0] = '\0';
2197		c->line = line;
2198		return(1);
2199	}
2200
2201	while ( fgets( buf, sizeof( buf ), fp ) ) {
2202		p = strchr( buf, '\n' );
2203		if ( p ) {
2204			if ( p > buf && p[-1] == '\r' ) {
2205				--p;
2206			}
2207			*p = '\0';
2208		}
2209		/* XXX ugly */
2210		c->line = line;
2211		if ( line[0]
2212				&& ( p = line + strlen( line ) - 1 )[0] == '\\'
2213				&& p[-1] != '\\' )
2214		{
2215			p[0] = '\0';
2216			lcur--;
2217
2218		} else {
2219			if ( !isspace( (unsigned char)buf[0] ) ) {
2220				return(1);
2221			}
2222			buf[0] = ' ';
2223		}
2224		CATLINE(buf);
2225		c->lineno++;
2226	}
2227
2228	buf[0] = '\0';
2229	c->line = line;
2230	return(line[0] ? 1 : 0);
2231}
2232
2233int
2234config_fp_parse_line(ConfigArgs *c)
2235{
2236	char *token;
2237	static char *const hide[] = {
2238		"rootpw", "replica", "syncrepl",  /* in slapd */
2239		"acl-bind", "acl-method", "idassert-bind",  /* in back-ldap */
2240		"acl-passwd", "bindpw",  /* in back-<ldap/meta> */
2241		"pseudorootpw",  /* in back-meta */
2242		"dbpasswd",  /* in back-sql */
2243		NULL
2244	};
2245	char *quote_ptr;
2246	int i = (int)(sizeof(hide)/sizeof(hide[0])) - 1;
2247
2248	c->tline = ch_strdup(c->line);
2249	token = strtok_quote(c->tline, " \t", &quote_ptr);
2250
2251	if(token) for(i = 0; hide[i]; i++) if(!strcasecmp(token, hide[i])) break;
2252	if(quote_ptr) *quote_ptr = ' ';
2253	Debug(LDAP_DEBUG_CONFIG, "line %d (%s%s)\n", c->lineno,
2254		hide[i] ? hide[i] : c->line, hide[i] ? " ***" : "");
2255	if(quote_ptr) *quote_ptr = '\0';
2256
2257	for(;; token = strtok_quote(NULL, " \t", &quote_ptr)) {
2258		if(c->argc >= c->argv_size) {
2259			char **tmp;
2260			tmp = ch_realloc(c->argv, (c->argv_size + ARGS_STEP) * sizeof(*c->argv));
2261			if(!tmp) {
2262				Debug(LDAP_DEBUG_ANY, "line %d: out of memory\n", c->lineno, 0, 0);
2263				return -1;
2264			}
2265			c->argv = tmp;
2266			c->argv_size += ARGS_STEP;
2267		}
2268		if(token == NULL)
2269			break;
2270		c->argv[c->argc++] = token;
2271	}
2272	c->argv[c->argc] = NULL;
2273	return(0);
2274}
2275
2276void
2277config_destroy( )
2278{
2279	ucdata_unload( UCDATA_ALL );
2280	if ( frontendDB ) {
2281		/* NOTE: in case of early exit, frontendDB can be NULL */
2282		if ( frontendDB->be_schemandn.bv_val )
2283			free( frontendDB->be_schemandn.bv_val );
2284		if ( frontendDB->be_schemadn.bv_val )
2285			free( frontendDB->be_schemadn.bv_val );
2286		if ( frontendDB->be_acl )
2287			acl_destroy( frontendDB->be_acl );
2288	}
2289	free( line );
2290	if ( slapd_args_file )
2291		free ( slapd_args_file );
2292	if ( slapd_pid_file )
2293		free ( slapd_pid_file );
2294	if ( default_passwd_hash )
2295		ldap_charray_free( default_passwd_hash );
2296}
2297
2298char **
2299slap_str2clist( char ***out, char *in, const char *brkstr )
2300{
2301	char	*str;
2302	char	*s;
2303	char	*lasts;
2304	int	i, j;
2305	char	**new;
2306
2307	/* find last element in list */
2308	for (i = 0; *out && (*out)[i]; i++);
2309
2310	/* protect the input string from strtok */
2311	str = ch_strdup( in );
2312
2313	if ( *str == '\0' ) {
2314		free( str );
2315		return( *out );
2316	}
2317
2318	/* Count words in string */
2319	j=1;
2320	for ( s = str; *s; s++ ) {
2321		if ( strchr( brkstr, *s ) != NULL ) {
2322			j++;
2323		}
2324	}
2325
2326	*out = ch_realloc( *out, ( i + j + 1 ) * sizeof( char * ) );
2327	new = *out + i;
2328	for ( s = ldap_pvt_strtok( str, brkstr, &lasts );
2329		s != NULL;
2330		s = ldap_pvt_strtok( NULL, brkstr, &lasts ) )
2331	{
2332		*new = ch_strdup( s );
2333		new++;
2334	}
2335
2336	*new = NULL;
2337	free( str );
2338	return( *out );
2339}
2340
2341int config_generic_wrapper( Backend *be, const char *fname, int lineno,
2342	int argc, char **argv )
2343{
2344	ConfigArgs c = { 0 };
2345	ConfigTable *ct;
2346	int rc;
2347
2348	c.be = be;
2349	c.fname = fname;
2350	c.lineno = lineno;
2351	c.argc = argc;
2352	c.argv = argv;
2353	c.valx = -1;
2354	c.line = line;
2355	c.op = SLAP_CONFIG_ADD;
2356	snprintf( c.log, sizeof( c.log ), "%s: line %d", fname, lineno );
2357
2358	rc = SLAP_CONF_UNKNOWN;
2359	ct = config_find_keyword( be->be_cf_ocs->co_table, &c );
2360	if ( ct ) {
2361		c.table = be->be_cf_ocs->co_type;
2362		rc = config_add_vals( ct, &c );
2363	}
2364	return rc;
2365}
2366
2367/* See if the given URL (in plain and parsed form) matches
2368 * any of the server's listener addresses. Return matching
2369 * Listener or NULL for no match.
2370 */
2371Listener *config_check_my_url( const char *url, LDAPURLDesc *lud )
2372{
2373	Listener **l = slapd_get_listeners();
2374	int i, isMe;
2375
2376	/* Try a straight compare with Listener strings */
2377	for ( i=0; l && l[i]; i++ ) {
2378		if ( !strcasecmp( url, l[i]->sl_url.bv_val )) {
2379			return l[i];
2380		}
2381	}
2382
2383	isMe = 0;
2384	/* If hostname is empty, or is localhost, or matches
2385	 * our hostname, this url refers to this host.
2386	 * Compare it against listeners and ports.
2387	 */
2388	if ( !lud->lud_host || !lud->lud_host[0] ||
2389		!strncasecmp("localhost", lud->lud_host,
2390			STRLENOF("localhost")) ||
2391		!strcasecmp( global_host, lud->lud_host )) {
2392
2393		for ( i=0; l && l[i]; i++ ) {
2394			LDAPURLDesc *lu2;
2395			ldap_url_parse( l[i]->sl_url.bv_val, &lu2 );
2396			do {
2397				if ( strcasecmp( lud->lud_scheme,
2398					lu2->lud_scheme ))
2399					break;
2400				if ( lud->lud_port != lu2->lud_port )
2401					break;
2402				/* Listener on ANY address */
2403				if ( !lu2->lud_host || !lu2->lud_host[0] ) {
2404					isMe = 1;
2405					break;
2406				}
2407				/* URL on ANY address */
2408				if ( !lud->lud_host || !lud->lud_host[0] ) {
2409					isMe = 1;
2410					break;
2411				}
2412				/* Listener has specific host, must
2413				 * match it
2414				 */
2415				if ( !strcasecmp( lud->lud_host,
2416					lu2->lud_host )) {
2417					isMe = 1;
2418					break;
2419				}
2420			} while(0);
2421			ldap_free_urldesc( lu2 );
2422			if ( isMe ) {
2423				return l[i];
2424			}
2425		}
2426	}
2427	return NULL;
2428}
2429