1/* $NetBSD: result.c,v 1.3 2021/08/14 16:15:01 christos Exp $ */ 2 3/* result.c - sock backend result reading function */ 4/* $OpenLDAP$ */ 5/* This work is part of OpenLDAP Software <http://www.openldap.org/>. 6 * 7 * Copyright 2007-2021 The OpenLDAP Foundation. 8 * All rights reserved. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted only as authorized by the OpenLDAP 12 * Public License. 13 * 14 * A copy of this license is available in the file LICENSE in the 15 * top-level directory of the distribution or, alternatively, at 16 * <http://www.OpenLDAP.org/license.html>. 17 */ 18/* ACKNOWLEDGEMENTS: 19 * This work was initially developed by Brian Candler for inclusion 20 * in OpenLDAP Software. 21 */ 22 23#include <sys/cdefs.h> 24__RCSID("$NetBSD: result.c,v 1.3 2021/08/14 16:15:01 christos Exp $"); 25 26#include "portable.h" 27 28#include <stdio.h> 29 30#include <ac/errno.h> 31#include <ac/string.h> 32#include <ac/socket.h> 33#include <ac/unistd.h> 34 35#include "slap.h" 36#include "back-sock.h" 37 38/* 39 * FIXME: make a RESULT section compulsory from the socket response. 40 * Otherwise, a partial/aborted response is treated as 'success'. 41 * This is a divergence from the back-shell protocol, but makes things 42 * more robust. 43 */ 44 45int 46sock_read_and_send_results( 47 Operation *op, 48 SlapReply *rs, 49 FILE *fp ) 50{ 51 int bsize, len; 52 char *buf, *bp; 53 char line[BUFSIZ]; 54 char ebuf[128]; 55 56 (void) fflush(fp); 57 /* read in the result and send it along */ 58 buf = (char *) ch_malloc( BUFSIZ ); 59 buf[0] = '\0'; 60 bsize = BUFSIZ; 61 bp = buf; 62 while ( !feof(fp) ) { 63 errno = 0; 64 if ( fgets( line, sizeof(line), fp ) == NULL ) { 65 int saved_errno = errno; 66 if ( errno == EINTR ) continue; 67 68 Debug( LDAP_DEBUG_ANY, "sock: fgets failed: %s (%d)\n", 69 AC_STRERROR_R(saved_errno, ebuf, sizeof ebuf), saved_errno ); 70 break; 71 } 72 73 Debug( LDAP_DEBUG_SHELL, "sock search reading line (%s)\n", 74 line ); 75 76 /* ignore lines beginning with # (LDIFv1 comments) */ 77 if ( *line == '#' ) { 78 continue; 79 } 80 81 /* ignore lines beginning with DEBUG: */ 82 if ( strncasecmp( line, "DEBUG:", 6 ) == 0 ) { 83 continue; 84 } 85 86 if ( strncasecmp( line, "CONTINUE", 8 ) == 0 ) { 87 struct sockinfo *si = (struct sockinfo *) op->o_bd->be_private; 88 /* Only valid when operating as an overlay! */ 89 assert( si->si_ops != 0 ); 90 rs->sr_err = SLAP_CB_CONTINUE; 91 goto skip; 92 } 93 94 len = strlen( line ); 95 while ( bp + len + 1 - buf > bsize ) { 96 size_t offset = bp - buf; 97 bsize += BUFSIZ; 98 buf = (char *) ch_realloc( buf, bsize ); 99 bp = &buf[offset]; 100 } 101 strcpy( bp, line ); 102 bp += len; 103 104 /* line marked the end of an entry or result */ 105 if ( *line == '\n' ) { 106 if ( strncasecmp( buf, "RESULT", 6 ) == 0 ) { 107 break; 108 } 109 110 if ( (rs->sr_entry = str2entry( buf )) == NULL ) { 111 Debug( LDAP_DEBUG_ANY, "str2entry(%s) failed\n", 112 buf ); 113 } else { 114 rs->sr_attrs = op->oq_search.rs_attrs; 115 rs->sr_flags = REP_ENTRY_MODIFIABLE; 116 send_search_entry( op, rs ); 117 entry_free( rs->sr_entry ); 118 rs->sr_attrs = NULL; 119 } 120 121 bp = buf; 122 } 123 } 124 (void) str2result( buf, &rs->sr_err, (char **)&rs->sr_matched, (char **)&rs->sr_text ); 125 126 /* otherwise, front end will send this result */ 127 if ( rs->sr_err != 0 || op->o_tag != LDAP_REQ_BIND ) { 128 send_ldap_result( op, rs ); 129 } 130 131skip: 132 ch_free( buf ); 133 134 return( rs->sr_err ); 135} 136 137void 138sock_print_suffixes( 139 FILE *fp, 140 Backend *be 141) 142{ 143 int i; 144 145 for ( i = 0; be->be_suffix[i].bv_val != NULL; i++ ) { 146 fprintf( fp, "suffix: %s\n", be->be_suffix[i].bv_val ); 147 } 148} 149 150void 151sock_print_conn( 152 FILE *fp, 153 Connection *conn, 154 struct sockinfo *si 155) 156{ 157 if ( conn == NULL ) return; 158 159 if( si->si_extensions & SOCK_EXT_BINDDN ) { 160 fprintf( fp, "binddn: %s\n", 161 conn->c_dn.bv_len ? conn->c_dn.bv_val : "" ); 162 } 163 if( si->si_extensions & SOCK_EXT_PEERNAME ) { 164 fprintf( fp, "peername: %s\n", 165 conn->c_peer_name.bv_len ? conn->c_peer_name.bv_val : "" ); 166 } 167 if( si->si_extensions & SOCK_EXT_SSF ) { 168 fprintf( fp, "ssf: %d\n", conn->c_ssf ); 169 } 170 if( si->si_extensions & SOCK_EXT_CONNID ) { 171 fprintf( fp, "connid: %lu\n", conn->c_connid ); 172 } 173} 174