static int authzid_conn_insert( Connection *c, char flag ) { authzid_conn_t *ac; int rc; ldap_pvt_thread_mutex_lock( &authzid_mutex ); ac = authzid_conn_find( c ); if ( ac ) { ldap_pvt_thread_mutex_unlock( &authzid_mutex ); return -1; } ac = SLAP_MALLOC( sizeof( authzid_conn_t ) ); ac->conn = c; ac->refcnt = 0; ac->authzid_flag = flag; rc = avl_insert( &authzid_tree, (caddr_t)ac, authzid_conn_cmp, authzid_conn_dup ); ldap_pvt_thread_mutex_unlock( &authzid_mutex ); return rc; }
static int test_ava_filter( Operation *op, Entry *e, AttributeAssertion *ava, int type ) { int rc; Attribute *a; #ifdef LDAP_COMP_MATCH int i, num_attr_vals = 0; AttributeAliasing *a_alias = NULL; #endif if ( !access_allowed( op, e, ava->aa_desc, &ava->aa_value, ACL_SEARCH, NULL ) ) { return LDAP_INSUFFICIENT_ACCESS; } if ( ava->aa_desc == slap_schema.si_ad_hasSubordinates && op && op->o_bd && op->o_bd->be_has_subordinates ) { int hasSubordinates; struct berval hs; if( type != LDAP_FILTER_EQUALITY && type != LDAP_FILTER_APPROX ) { /* No other match is allowed */ return LDAP_INAPPROPRIATE_MATCHING; } if ( op->o_bd->be_has_subordinates( op, e, &hasSubordinates ) != LDAP_SUCCESS ) { return LDAP_OTHER; } if ( hasSubordinates == LDAP_COMPARE_TRUE ) { hs = slap_true_bv; } else if ( hasSubordinates == LDAP_COMPARE_FALSE ) { hs = slap_false_bv; } else { return LDAP_OTHER; } if ( bvmatch( &ava->aa_value, &hs ) ) return LDAP_COMPARE_TRUE; return LDAP_COMPARE_FALSE; } if ( ava->aa_desc == slap_schema.si_ad_entryDN ) { MatchingRule *mr; int match; const char *text; if( type != LDAP_FILTER_EQUALITY && type != LDAP_FILTER_APPROX ) { /* No other match is allowed */ return LDAP_INAPPROPRIATE_MATCHING; } mr = slap_schema.si_ad_entryDN->ad_type->sat_equality; assert( mr != NULL ); rc = value_match( &match, slap_schema.si_ad_entryDN, mr, SLAP_MR_EXT, &e->e_nname, &ava->aa_value, &text ); if( rc != LDAP_SUCCESS ) return rc; if( match == 0 ) return LDAP_COMPARE_TRUE; return LDAP_COMPARE_FALSE; } rc = LDAP_COMPARE_FALSE; #ifdef LDAP_COMP_MATCH if ( is_aliased_attribute && ava->aa_cf ) { a_alias = is_aliased_attribute ( ava->aa_desc ); if ( a_alias ) ava->aa_desc = a_alias->aa_aliased_ad; else ava->aa_cf = NULL; } #endif for(a = attrs_find( e->e_attrs, ava->aa_desc ); a != NULL; a = attrs_find( a->a_next, ava->aa_desc ) ) { int use; MatchingRule *mr; struct berval *bv; if (( ava->aa_desc != a->a_desc ) && !access_allowed( op, e, a->a_desc, &ava->aa_value, ACL_SEARCH, NULL )) { rc = LDAP_INSUFFICIENT_ACCESS; continue; } use = SLAP_MR_EQUALITY; switch ( type ) { case LDAP_FILTER_APPROX: use = SLAP_MR_EQUALITY_APPROX; mr = a->a_desc->ad_type->sat_approx; if( mr != NULL ) break; /* fallthru: use EQUALITY matching rule if no APPROX rule */ case LDAP_FILTER_EQUALITY: /* use variable set above so fall thru use is not clobbered */ mr = a->a_desc->ad_type->sat_equality; break; case LDAP_FILTER_GE: case LDAP_FILTER_LE: use = SLAP_MR_ORDERING; mr = a->a_desc->ad_type->sat_ordering; break; default: mr = NULL; } if( mr == NULL ) { rc = LDAP_INAPPROPRIATE_MATCHING; continue; } /* We have no Sort optimization for Approx matches */ if (( a->a_flags & SLAP_ATTR_SORTED_VALS ) && type != LDAP_FILTER_APPROX ) { unsigned slot; int ret; /* For Ordering matches, we just need to do one comparison with * either the first (least) or last (greatest) value. */ if ( use == SLAP_MR_ORDERING ) { const char *text; int match, which; which = (type == LDAP_FILTER_LE) ? 0 : a->a_numvals-1; ret = value_match( &match, a->a_desc, mr, use, &a->a_nvals[which], &ava->aa_value, &text ); if ( ret != LDAP_SUCCESS ) return ret; if (( type == LDAP_FILTER_LE && match <= 0 ) || ( type == LDAP_FILTER_GE && match >= 0 )) return LDAP_COMPARE_TRUE; continue; } /* Only Equality will get here */ ret = attr_valfind( a, use | SLAP_MR_ASSERTED_VALUE_NORMALIZED_MATCH | SLAP_MR_ATTRIBUTE_VALUE_NORMALIZED_MATCH, &ava->aa_value, &slot, NULL ); if ( ret == LDAP_SUCCESS ) return LDAP_COMPARE_TRUE; else if ( ret != LDAP_NO_SUCH_ATTRIBUTE ) return ret; #if 0 /* The following is useful if we want to know which values * matched an ordering test. But here we don't care, we just * want to know if any value did, and that is checked above. */ if ( ret == LDAP_NO_SUCH_ATTRIBUTE ) { /* If insertion point is not the end of the list, there was * at least one value greater than the assertion. */ if ( type == LDAP_FILTER_GE && slot < a->a_numvals ) return LDAP_COMPARE_TRUE; /* Likewise, if insertion point is not the head of the list, * there was at least one value less than the assertion. */ if ( type == LDAP_FILTER_LE && slot > 0 ) return LDAP_COMPARE_TRUE; return LDAP_COMPARE_FALSE; } #endif continue; } #ifdef LDAP_COMP_MATCH if ( nibble_mem_allocator && ava->aa_cf && !a->a_comp_data ) { /* Component Matching */ for ( num_attr_vals = 0; a->a_vals[num_attr_vals].bv_val != NULL; num_attr_vals++ ); if ( num_attr_vals <= 0 )/* no attribute value */ return LDAP_INAPPROPRIATE_MATCHING; num_attr_vals++;/* for NULL termination */ /* following malloced will be freed by comp_tree_free () */ a->a_comp_data = SLAP_MALLOC( sizeof( ComponentData ) + sizeof( ComponentSyntaxInfo* )*num_attr_vals ); if ( !a->a_comp_data ) { return LDAP_NO_MEMORY; } a->a_comp_data->cd_tree = (ComponentSyntaxInfo**)((char*)a->a_comp_data + sizeof(ComponentData)); i = num_attr_vals; for ( ; i ; i-- ) { a->a_comp_data->cd_tree[ i-1 ] = (ComponentSyntaxInfo*)NULL; } a->a_comp_data->cd_mem_op = nibble_mem_allocator ( 1024*10*(num_attr_vals-1), 1024 ); if ( a->a_comp_data->cd_mem_op == NULL ) { free ( a->a_comp_data ); a->a_comp_data = NULL; return LDAP_OPERATIONS_ERROR; } } i = 0; #endif for ( bv = a->a_nvals; !BER_BVISNULL( bv ); bv++ ) { int ret, match; const char *text; #ifdef LDAP_COMP_MATCH if( attr_converter && ava->aa_cf && a->a_comp_data ) { /* Check if decoded component trees are already linked */ struct berval cf_bv = { 20, "componentFilterMatch" }; MatchingRule* cf_mr = mr_bvfind( &cf_bv ); MatchingRuleAssertion mra; mra.ma_cf = ava->aa_cf; if ( a->a_comp_data->cd_tree[i] == NULL ) a->a_comp_data->cd_tree[i] = attr_converter (a, a->a_desc->ad_type->sat_syntax, (a->a_vals + i)); /* decoding error */ if ( !a->a_comp_data->cd_tree[i] ) { free_ComponentData ( a ); return LDAP_OPERATIONS_ERROR; } ret = value_match( &match, a->a_desc, cf_mr, SLAP_MR_COMPONENT, (struct berval*)a->a_comp_data->cd_tree[i++], (void*)&mra, &text ); if ( ret == LDAP_INAPPROPRIATE_MATCHING ) { /* cached component tree is broken, just remove it */ free_ComponentData ( a ); return ret; } if ( a_alias ) ava->aa_desc = a_alias->aa_aliasing_ad; } else #endif { ret = ordered_value_match( &match, a->a_desc, mr, use, bv, &ava->aa_value, &text ); } if( ret != LDAP_SUCCESS ) { rc = ret; break; } switch ( type ) { case LDAP_FILTER_EQUALITY: case LDAP_FILTER_APPROX: if ( match == 0 ) return LDAP_COMPARE_TRUE; break; case LDAP_FILTER_GE: if ( match >= 0 ) return LDAP_COMPARE_TRUE; break; case LDAP_FILTER_LE: if ( match <= 0 ) return LDAP_COMPARE_TRUE; break; } } } #ifdef LDAP_COMP_MATCH if ( a_alias ) ava->aa_desc = a_alias->aa_aliasing_ad; #endif return rc; }
static int test_mra_filter( Operation *op, Entry *e, MatchingRuleAssertion *mra ) { Attribute *a; void *memctx; BER_MEMFREE_FN *memfree; #ifdef LDAP_COMP_MATCH int i, num_attr_vals = 0; #endif if ( op == NULL ) { memctx = NULL; memfree = slap_sl_free; } else { memctx = op->o_tmpmemctx; memfree = op->o_tmpfree; } if ( mra->ma_desc ) { /* * if ma_desc is available, then we're filtering for * one attribute, and SEARCH permissions can be checked * directly. */ if ( !access_allowed( op, e, mra->ma_desc, &mra->ma_value, ACL_SEARCH, NULL ) ) { return LDAP_INSUFFICIENT_ACCESS; } if ( mra->ma_desc == slap_schema.si_ad_entryDN ) { int ret, rc; const char *text; rc = value_match( &ret, slap_schema.si_ad_entryDN, mra->ma_rule, SLAP_MR_EXT, &e->e_nname, &mra->ma_value, &text ); if( rc != LDAP_SUCCESS ) return rc; if ( ret == 0 ) return LDAP_COMPARE_TRUE; return LDAP_COMPARE_FALSE; } for ( a = attrs_find( e->e_attrs, mra->ma_desc ); a != NULL; a = attrs_find( a->a_next, mra->ma_desc ) ) { struct berval *bv; int normalize_attribute = 0; #ifdef LDAP_COMP_MATCH /* Component Matching */ if ( mra->ma_cf && mra->ma_rule->smr_usage & SLAP_MR_COMPONENT ) { num_attr_vals = 0; if ( !a->a_comp_data ) { num_attr_vals = a->a_numvals; if ( num_attr_vals <= 0 ) { /* no attribute value */ return LDAP_INAPPROPRIATE_MATCHING; } num_attr_vals++; /* following malloced will be freed by comp_tree_free () */ a->a_comp_data = SLAP_MALLOC( sizeof( ComponentData ) + sizeof( ComponentSyntaxInfo* )*num_attr_vals ); if ( !a->a_comp_data ) return LDAP_NO_MEMORY; a->a_comp_data->cd_tree = (ComponentSyntaxInfo**) ((char*)a->a_comp_data + sizeof(ComponentData)); a->a_comp_data->cd_tree[num_attr_vals - 1] = (ComponentSyntaxInfo*) NULL; a->a_comp_data->cd_mem_op = nibble_mem_allocator( 1024*16, 1024 ); } } #endif /* If ma_rule is not the same as the attribute's * normal rule, then we can't use the a_nvals. */ if ( mra->ma_rule == a->a_desc->ad_type->sat_equality ) { bv = a->a_nvals; } else { bv = a->a_vals; normalize_attribute = 1; } #ifdef LDAP_COMP_MATCH i = 0; #endif for ( ; !BER_BVISNULL( bv ); bv++ ) { int ret; int rc; const char *text; #ifdef LDAP_COMP_MATCH if ( mra->ma_cf && mra->ma_rule->smr_usage & SLAP_MR_COMPONENT ) { /* Check if decoded component trees are already linked */ if ( num_attr_vals ) { a->a_comp_data->cd_tree[i] = attr_converter( a, a->a_desc->ad_type->sat_syntax, bv ); } /* decoding error */ if ( !a->a_comp_data->cd_tree[i] ) { return LDAP_OPERATIONS_ERROR; } rc = value_match( &ret, a->a_desc, mra->ma_rule, SLAP_MR_COMPONENT, (struct berval*)a->a_comp_data->cd_tree[i++], (void*)mra, &text ); } else #endif { struct berval nbv = BER_BVNULL; if ( normalize_attribute && mra->ma_rule->smr_normalize ) { /* Document: RFC 4511 4.5.1. Search Request ... If the type field is present and the matchingRule is present, the matchValue is compared against entry attributes of the specified type. In this case, the matchingRule MUST be one suitable for use with the specified type (see [RFC4517]), otherwise the filter item is Undefined. In this case, since the matchingRule requires the assertion value to be normalized, we normalize the attribute value according to the syntax of the matchingRule. This should likely be done inside value_match(), by passing the appropriate flags, but this is not done at present. See ITS#3406. */ if ( mra->ma_rule->smr_normalize( SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX, mra->ma_rule->smr_syntax, mra->ma_rule, bv, &nbv, memctx ) != LDAP_SUCCESS ) { /* FIXME: stop processing? */ continue; } } else { nbv = *bv; } rc = value_match( &ret, a->a_desc, mra->ma_rule, SLAP_MR_EXT, &nbv, &mra->ma_value, &text ); if ( nbv.bv_val != bv->bv_val ) { memfree( nbv.bv_val, memctx ); } } if ( rc != LDAP_SUCCESS ) return rc; if ( ret == 0 ) return LDAP_COMPARE_TRUE; } } } else { /* * No attribute description: test all */ for ( a = e->e_attrs; a != NULL; a = a->a_next ) { struct berval *bv, value; const char *text = NULL; int rc; int normalize_attribute = 0; /* check if matching is appropriate */ if ( !mr_usable_with_at( mra->ma_rule, a->a_desc->ad_type ) ) { continue; } /* normalize for equality */ rc = asserted_value_validate_normalize( a->a_desc, mra->ma_rule, SLAP_MR_EXT|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX, &mra->ma_value, &value, &text, memctx ); if ( rc != LDAP_SUCCESS ) continue; /* check search access */ if ( !access_allowed( op, e, a->a_desc, &value, ACL_SEARCH, NULL ) ) { memfree( value.bv_val, memctx ); continue; } #ifdef LDAP_COMP_MATCH /* Component Matching */ if ( mra->ma_cf && mra->ma_rule->smr_usage & SLAP_MR_COMPONENT ) { int ret; rc = value_match( &ret, a->a_desc, mra->ma_rule, SLAP_MR_COMPONENT, (struct berval*)a, (void*)mra, &text ); if ( rc != LDAP_SUCCESS ) break; if ( ret == 0 ) { rc = LDAP_COMPARE_TRUE; break; } } #endif /* check match */ if ( mra->ma_rule == a->a_desc->ad_type->sat_equality ) { bv = a->a_nvals; } else { bv = a->a_vals; normalize_attribute = 1; } for ( ; !BER_BVISNULL( bv ); bv++ ) { int ret; struct berval nbv = BER_BVNULL; if ( normalize_attribute && mra->ma_rule->smr_normalize ) { /* see comment above */ if ( mra->ma_rule->smr_normalize( SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX, mra->ma_rule->smr_syntax, mra->ma_rule, bv, &nbv, memctx ) != LDAP_SUCCESS ) { /* FIXME: stop processing? */ continue; } } else { nbv = *bv; } rc = value_match( &ret, a->a_desc, mra->ma_rule, SLAP_MR_EXT, &nbv, &value, &text ); if ( nbv.bv_val != bv->bv_val ) { memfree( nbv.bv_val, memctx ); } if ( rc != LDAP_SUCCESS ) break; if ( ret == 0 ) { rc = LDAP_COMPARE_TRUE; break; } } memfree( value.bv_val, memctx ); if ( rc != LDAP_SUCCESS ) return rc; } } /* check attrs in DN AVAs if required */ if ( mra->ma_dnattrs && !BER_BVISEMPTY( &e->e_nname ) ) { LDAPDN dn = NULL; int iRDN, iAVA; int rc; /* parse and pretty the dn */ rc = dnPrettyDN( NULL, &e->e_name, &dn, memctx ); if ( rc != LDAP_SUCCESS ) { return LDAP_INVALID_SYNTAX; } /* for each AVA of each RDN ... */ for ( iRDN = 0; dn[ iRDN ]; iRDN++ ) { LDAPRDN rdn = dn[ iRDN ]; for ( iAVA = 0; rdn[ iAVA ]; iAVA++ ) { LDAPAVA *ava = rdn[ iAVA ]; struct berval *bv = &ava->la_value, value = BER_BVNULL, nbv = BER_BVNULL; AttributeDescription *ad = (AttributeDescription *)ava->la_private; int ret; const char *text; assert( ad != NULL ); if ( mra->ma_desc ) { /* have a mra type? check for subtype */ if ( !is_ad_subtype( ad, mra->ma_desc ) ) { continue; } value = mra->ma_value; } else { const char *text = NULL; /* check if matching is appropriate */ if ( !mr_usable_with_at( mra->ma_rule, ad->ad_type ) ) { continue; } /* normalize for equality */ rc = asserted_value_validate_normalize( ad, mra->ma_rule, SLAP_MR_EXT|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX, &mra->ma_value, &value, &text, memctx ); if ( rc != LDAP_SUCCESS ) continue; /* check search access */ if ( !access_allowed( op, e, ad, &value, ACL_SEARCH, NULL ) ) { memfree( value.bv_val, memctx ); continue; } } if ( mra->ma_rule->smr_normalize ) { /* see comment above */ if ( mra->ma_rule->smr_normalize( SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX, mra->ma_rule->smr_syntax, mra->ma_rule, bv, &nbv, memctx ) != LDAP_SUCCESS ) { /* FIXME: stop processing? */ rc = LDAP_SUCCESS; ret = -1; goto cleanup; } } else { nbv = *bv; } /* check match */ rc = value_match( &ret, ad, mra->ma_rule, SLAP_MR_EXT, &nbv, &value, &text ); cleanup:; if ( !BER_BVISNULL( &value ) && value.bv_val != mra->ma_value.bv_val ) { memfree( value.bv_val, memctx ); } if ( !BER_BVISNULL( &nbv ) && nbv.bv_val != bv->bv_val ) { memfree( nbv.bv_val, memctx ); } if ( rc == LDAP_SUCCESS && ret == 0 ) rc = LDAP_COMPARE_TRUE; if ( rc != LDAP_SUCCESS ) { ldap_dnfree_x( dn, memctx ); return rc; } } } ldap_dnfree_x( dn, memctx ); } return LDAP_COMPARE_FALSE; }
BerVarray get_entry_referrals( Backend *be, Connection *conn, Operation *op, Entry *e ) { Attribute *attr; BerVarray refs; unsigned i; struct berval *iv, *jv; AttributeDescription *ad_ref = slap_schema.si_ad_ref; attr = attr_find( e->e_attrs, ad_ref ); if( attr == NULL ) return NULL; for( i=0; attr->a_vals[i].bv_val != NULL; i++ ) { /* count references */ } if( i < 1 ) return NULL; refs = SLAP_MALLOC( (i + 1) * sizeof(struct berval)); if( refs == NULL ) { #ifdef NEW_LOGGING LDAP_LOG( OPERATION, CRIT, "get_entry_referrals: SLAP_MALLOC failed\n", 0, 0, 0 ); #else Debug( LDAP_DEBUG_ANY, "get_entry_referrals: SLAP_MALLOC failed\n", 0, 0, 0 ); #endif return NULL; } for( iv=attr->a_vals, jv=refs; iv->bv_val != NULL; iv++ ) { unsigned k; ber_dupbv( jv, iv ); /* trim the label */ for( k=0; k<jv->bv_len; k++ ) { if( isspace( (unsigned char) jv->bv_val[k] ) ) { jv->bv_val[k] = '\0'; jv->bv_len = k; break; } } if( jv->bv_len > 0 ) { jv++; } else { free( jv->bv_val ); } } if( jv == refs ) { free( refs ); refs = NULL; } else { jv->bv_val = NULL; } /* we should check that a referral value exists... */ return refs; }
/* * This routine generates the DN appropriate to return in * an LDAP referral. */ static char * referral_dn_muck( const char * refDN, struct berval * baseDN, struct berval * targetDN ) { int rc; struct berval bvin; struct berval nrefDN = { 0, NULL }; struct berval nbaseDN = { 0, NULL }; struct berval ntargetDN = { 0, NULL }; if( !baseDN ) { /* no base, return target */ return targetDN ? ch_strdup( targetDN->bv_val ) : NULL; } if( refDN ) { bvin.bv_val = (char *)refDN; bvin.bv_len = strlen( refDN ); rc = dnPretty2( NULL, &bvin, &nrefDN ); if( rc != LDAP_SUCCESS ) { /* Invalid refDN */ return NULL; } } if( !targetDN ) { /* continuation reference * if refDN present return refDN * else return baseDN */ return nrefDN.bv_len ? nrefDN.bv_val : ch_strdup( baseDN->bv_val ); } rc = dnPretty2( NULL, targetDN, &ntargetDN ); if( rc != LDAP_SUCCESS ) { /* Invalid targetDN */ ch_free( nrefDN.bv_val ); return NULL; } if( nrefDN.bv_len ) { rc = dnPretty2( NULL, baseDN, &nbaseDN ); if( rc != LDAP_SUCCESS ) { /* Invalid baseDN */ ch_free( nrefDN.bv_val ); ch_free( ntargetDN.bv_val ); return NULL; } if( dn_match( &nbaseDN, &nrefDN ) ) { ch_free( nrefDN.bv_val ); ch_free( nbaseDN.bv_val ); return ntargetDN.bv_val; } { struct berval muck; if( ntargetDN.bv_len < nbaseDN.bv_len ) { ch_free( nrefDN.bv_val ); ch_free( nbaseDN.bv_val ); return ntargetDN.bv_val; } rc = strcasecmp( &ntargetDN.bv_val[ntargetDN.bv_len-nbaseDN.bv_len], nbaseDN.bv_val ); if( rc ) { /* target not subordinate to base */ ch_free( nrefDN.bv_val ); ch_free( nbaseDN.bv_val ); return ntargetDN.bv_val; } muck.bv_len = ntargetDN.bv_len + nrefDN.bv_len - nbaseDN.bv_len; muck.bv_val = SLAP_MALLOC( muck.bv_len + 1 ); if( muck.bv_val == NULL ) { #ifdef NEW_LOGGING LDAP_LOG( OPERATION, CRIT, "referral_dn_muck: SLAP_MALLOC failed\n", 0, 0, 0 ); #else Debug( LDAP_DEBUG_ANY, "referral_dn_muck: SLAP_MALLOC failed\n", 0, 0, 0 ); #endif return NULL; } strncpy( muck.bv_val, ntargetDN.bv_val, ntargetDN.bv_len-nbaseDN.bv_len ); strcpy( &muck.bv_val[ntargetDN.bv_len-nbaseDN.bv_len], nrefDN.bv_val ); ch_free( nrefDN.bv_val ); ch_free( nbaseDN.bv_val ); ch_free( ntargetDN.bv_val ); return muck.bv_val; } } ch_free( nrefDN.bv_val ); return ntargetDN.bv_val; }
BerVarray referral_rewrite( BerVarray in, struct berval *base, struct berval *target, int scope ) { int i; BerVarray refs; struct berval *iv, *jv; if( in == NULL ) return NULL; for( i=0; in[i].bv_val != NULL ; i++ ) { /* just count them */ } if( i < 1 ) return NULL; refs = SLAP_MALLOC( (i+1) * sizeof( struct berval ) ); if( refs == NULL ) { #ifdef NEW_LOGGING LDAP_LOG( OPERATION, CRIT, "referral_rewrite: SLAP_MALLOC failed\n", 0, 0, 0 ); #else Debug( LDAP_DEBUG_ANY, "referral_rewrite: SLAP_MALLOC failed\n", 0, 0, 0 ); #endif return NULL; } for( iv=in,jv=refs; iv->bv_val != NULL ; iv++ ) { LDAPURLDesc *url; int rc = ldap_url_parse_ext( iv->bv_val, &url ); if( rc == LDAP_URL_ERR_BADSCHEME ) { ber_dupbv( jv++, iv ); continue; } else if( rc != LDAP_URL_SUCCESS ) { continue; } { char *dn = url->lud_dn; url->lud_dn = referral_dn_muck( ( dn && *dn ) ? dn : NULL, base, target ); ldap_memfree( dn ); } if( url->lud_scope == LDAP_SCOPE_DEFAULT ) { url->lud_scope = scope; } jv->bv_val = ldap_url_desc2str( url ); jv->bv_len = strlen( jv->bv_val ); ldap_free_urldesc( url ); jv++; } if( jv == refs ) { ch_free( refs ); refs = NULL; } else { jv->bv_val = NULL; } return refs; }