xref: /titanic_52/usr/src/lib/libldap5/sources/ldap/common/setoption.c (revision 7a4f122cf63a91c2888629e433b5f5ee7536a802)
1 /*
2  * Copyright 2003 Sun Microsystems, Inc.  All rights reserved.
3  * Use is subject to license terms.
4  */
5 
6 #pragma ident	"%Z%%M%	%I%	%E% SMI"
7 
8 /*
9  * The contents of this file are subject to the Netscape Public
10  * License Version 1.1 (the "License"); you may not use this file
11  * except in compliance with the License. You may obtain a copy of
12  * the License at http://www.mozilla.org/NPL/
13  *
14  * Software distributed under the License is distributed on an "AS
15  * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
16  * implied. See the License for the specific language governing
17  * rights and limitations under the License.
18  *
19  * The Original Code is Mozilla Communicator client code, released
20  * March 31, 1998.
21  *
22  * The Initial Developer of the Original Code is Netscape
23  * Communications Corporation. Portions created by Netscape are
24  * Copyright (C) 1998-1999 Netscape Communications Corporation. All
25  * Rights Reserved.
26  *
27  * Contributor(s):
28  */
29 /*
30  * setoption.c - ldap_set_option implementation
31  */
32 
33 #include "ldap-int.h"
34 #ifdef _SOLARIS_SDK
35 #include "solaris-priv.h"
36 #endif
37 
38 extern int nsldapi_sasl_secprops(const char *in,
39 	sasl_security_properties_t *secprops);
40 
41 #define	LDAP_SETCLR_BITOPT(ld, bit, optdata) \
42 	if (optdata != NULL) {		\
43 		(ld)->ld_options |= bit;	\
44 	} else {				\
45 		(ld)->ld_options &= ~bit;	\
46 	}
47 
48 
49 int
50 LDAP_CALL
51 ldap_set_option(LDAP *ld, int option, const void *optdata)
52 {
53 	int		rc, i;
54 	char		*matched, *errstr;
55 
56 	if (!nsldapi_initialized) {
57 		nsldapi_initialize_defaults();
58 	}
59 
60 	/*
61 	 * process global options (not associated with an LDAP session handle)
62 	 */
63 	if (option == LDAP_OPT_MEMALLOC_FN_PTRS) {
64 		struct lber_memalloc_fns	memalloc_fns;
65 
66 		/* set libldap ones via a struct copy */
67 		nsldapi_memalloc_fns = *((struct ldap_memalloc_fns *)optdata);
68 
69 		/* also set liblber memory allocation callbacks */
70 		memalloc_fns.lbermem_malloc =
71 		    nsldapi_memalloc_fns.ldapmem_malloc;
72 		memalloc_fns.lbermem_calloc =
73 		    nsldapi_memalloc_fns.ldapmem_calloc;
74 		memalloc_fns.lbermem_realloc =
75 		    nsldapi_memalloc_fns.ldapmem_realloc;
76 		memalloc_fns.lbermem_free =
77 		    nsldapi_memalloc_fns.ldapmem_free;
78 		if (ber_set_option(NULL, LBER_OPT_MEMALLOC_FN_PTRS,
79 		    &memalloc_fns) != 0) {
80 			return (-1);
81 		}
82 
83 		return (0);
84 	}
85 	/*
86 	 * LDAP_OPT_DEBUG_LEVEL is global
87 	 */
88 	if (LDAP_OPT_DEBUG_LEVEL == option) {
89 #ifdef LDAP_DEBUG
90 		ldap_debug = *((int *)optdata);
91 #endif
92 		return (0);
93 	}
94 
95 	/*
96 	 * if ld is NULL, arrange to modify our default settings
97 	 */
98 	if (ld == NULL) {
99 		ld = &nsldapi_ld_defaults;
100 #ifdef LDAP_DEBUG
101 		ldap_debug = 0;
102 #endif
103 
104 	}
105 
106 	/*
107 	 * process options that are associated with an LDAP session handle
108 	 */
109 	if (!NSLDAPI_VALID_LDAP_POINTER(ld)) {
110 		return (-1);	/* punt */
111 	}
112 
113 	rc = 0;
114 	if (ld != &nsldapi_ld_defaults &&
115 		option != LDAP_OPT_EXTRA_THREAD_FN_PTRS &&
116 		option != LDAP_OPT_THREAD_FN_PTRS) {
117 		LDAP_MUTEX_LOCK(ld, LDAP_OPTION_LOCK);
118 	}
119 	switch (option) {
120 	/* options that can be turned on and off */
121 #ifdef LDAP_DNS
122 	case LDAP_OPT_DNS:
123 		LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_DNS, optdata);
124 		break;
125 #endif
126 
127 	case LDAP_OPT_REFERRALS:
128 		LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_REFERRALS, optdata);
129 		break;
130 
131 #ifdef LDAP_SSLIO_HOOKS
132 	case LDAP_OPT_SSL:
133 		LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_SSL, optdata);
134 		break;
135 #endif
136 
137 	case LDAP_OPT_RESTART:
138 		LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_RESTART, optdata);
139 		break;
140 
141 	case LDAP_OPT_RECONNECT:
142 		LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_RECONNECT, optdata);
143 		break;
144 
145 #ifdef LDAP_ASYNC_IO
146 	case LDAP_OPT_ASYNC_CONNECT:
147 		LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_ASYNC, optdata);
148 		break;
149 #endif /* LDAP_ASYNC_IO */
150 
151 	/* fields in the LDAP structure */
152 	case LDAP_OPT_DEREF:
153 		ld->ld_deref = *((int *)optdata);
154 		break;
155 	case LDAP_OPT_SIZELIMIT:
156 		ld->ld_sizelimit = *((int *)optdata);
157 		break;
158 	case LDAP_OPT_TIMELIMIT:
159 		ld->ld_timelimit = *((int *)optdata);
160 		break;
161 	case LDAP_OPT_REFERRAL_HOP_LIMIT:
162 		ld->ld_refhoplimit = *((int *)optdata);
163 		break;
164 	case LDAP_OPT_PROTOCOL_VERSION:
165 		ld->ld_version = *((int *)optdata);
166 		if (ld->ld_defconn != NULL) {	/* also set in default conn. */
167 			ld->ld_defconn->lconn_version = ld->ld_version;
168 		}
169 		break;
170 	case LDAP_OPT_SERVER_CONTROLS:
171 		/* nsldapi_dup_controls returns -1 and sets lderrno on error */
172 		rc = nsldapi_dup_controls(ld, &ld->ld_servercontrols,
173 		    (LDAPControl **)optdata);
174 		break;
175 	case LDAP_OPT_CLIENT_CONTROLS:
176 		/* nsldapi_dup_controls returns -1 and sets lderrno on error */
177 		rc = nsldapi_dup_controls(ld, &ld->ld_clientcontrols,
178 		    (LDAPControl **)optdata);
179 		break;
180 
181 	/* rebind proc */
182 	case LDAP_OPT_REBIND_FN:
183 		ld->ld_rebind_fn = (LDAP_REBINDPROC_CALLBACK *) optdata;
184 		break;
185 	case LDAP_OPT_REBIND_ARG:
186 		ld->ld_rebind_arg = (void *) optdata;
187 		break;
188 
189 #ifdef LDAP_SSLIO_HOOKS
190 	/* i/o function pointers */
191 	case LDAP_OPT_IO_FN_PTRS:
192 		if ((rc = nsldapi_install_compat_io_fns(ld,
193 		    (struct ldap_io_fns *)optdata)) != LDAP_SUCCESS) {
194 			LDAP_SET_LDERRNO(ld, rc, NULL, NULL);
195 			rc = -1;
196 		}
197 		break;
198 
199 	/* extended i/o function pointers */
200 	case LDAP_X_OPT_EXTIO_FN_PTRS:
201 	    /* denotes use of old iofns struct (no writev) */
202 	    if (((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_size ==
203 			LDAP_X_EXTIO_FNS_SIZE_REV0) {
204 		ld->ld_extio_size = LDAP_X_EXTIO_FNS_SIZE;
205 	    ld->ld_extclose_fn =
206 		((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_close;
207 	    ld->ld_extconnect_fn =
208 		((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_connect;
209 	    ld->ld_extread_fn =
210 		((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_read;
211 	    ld->ld_extwrite_fn =
212 		((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_write;
213 	    ld->ld_extpoll_fn =
214 		((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_poll;
215 	    ld->ld_extnewhandle_fn =
216 		((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_newhandle;
217 	    ld->ld_extdisposehandle_fn =
218 		((struct ldap_x_ext_io_fns_rev0 *)optdata)->
219 		lextiof_disposehandle;
220 	    ld->ld_ext_session_arg =
221 		((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_session_arg;
222 	    ld->ld_extwritev_fn = NULL;
223 	    if (ber_sockbuf_set_option(ld->ld_sbp, LBER_SOCKBUF_OPT_EXT_IO_FNS,
224 				&(ld->ld_ext_io_fns)) != 0) {
225 			return (LDAP_LOCAL_ERROR);
226 		}
227 	    } else {
228 	    /* struct copy */
229 		ld->ld_ext_io_fns = *((struct ldap_x_ext_io_fns *)optdata);
230 	    }
231 	    if ((rc = nsldapi_install_lber_extiofns(ld, ld->ld_sbp))
232 						!= LDAP_SUCCESS) {
233 		LDAP_SET_LDERRNO(ld, rc, NULL, NULL);
234 		rc = -1;
235 	    }
236 		break;
237 #endif
238 
239 	/* thread function pointers */
240 	case LDAP_OPT_THREAD_FN_PTRS:
241 		/*
242 		 * It is only safe to set the thread function pointers
243 		 * when one thread is using the LDAP session handle.
244 		 */
245 		/* free existing mutexes (some are allocated by ldap_init()) */
246 		nsldapi_mutex_free_all(ld);
247 
248 		/* struct copy */
249 		ld->ld_thread = *((struct ldap_thread_fns *)optdata);
250 
251 		/* allocate new mutexes */
252 		nsldapi_mutex_alloc_all(ld);
253 
254 		/* LDAP_OPTION_LOCK was never locked... so just return */
255 		return (rc);
256 
257 	/* extra thread function pointers */
258 	case LDAP_OPT_EXTRA_THREAD_FN_PTRS:
259 	/* The extra thread funcs will only pick up the threadid */
260 	    ld->ld_thread2  = *((struct ldap_extra_thread_fns *)optdata);
261 
262 	/* Reset the rest of the structure preserving the threadid fn */
263 	    ld->ld_mutex_trylock_fn =  (LDAP_TF_MUTEX_TRYLOCK_CALLBACK *)NULL;
264 	    ld->ld_sema_alloc_fn = (LDAP_TF_SEMA_ALLOC_CALLBACK *) NULL;
265 	    ld->ld_sema_free_fn = (LDAP_TF_SEMA_FREE_CALLBACK *) NULL;
266 	    ld->ld_sema_wait_fn = (LDAP_TF_SEMA_WAIT_CALLBACK *) NULL;
267 	    ld->ld_sema_post_fn = (LDAP_TF_SEMA_POST_CALLBACK *) NULL;
268 
269 	/* We assume that only one thread is active when replacing */
270 	/* the threadid function.  We will now proceed and reset all */
271 	/* of the threadid/refcounts */
272 	    for (i = 0; i < LDAP_MAX_LOCK; i++) {
273 		ld->ld_mutex_threadid[i] = (void *) -1;
274 		ld->ld_mutex_refcnt[i] = 0;
275 	    }
276 
277 	    return (rc);
278 
279 	/* DNS function pointers */
280 	case LDAP_OPT_DNS_FN_PTRS:
281 		/* struct copy */
282 		ld->ld_dnsfn = *((struct ldap_dns_fns *)optdata);
283 		break;
284 
285 	/* cache function pointers */
286 	case LDAP_OPT_CACHE_FN_PTRS:
287 		/* struct copy */
288 		ld->ld_cache = *((struct ldap_cache_fns *)optdata);
289 		break;
290 	case LDAP_OPT_CACHE_STRATEGY:
291 		ld->ld_cache_strategy = *((int *)optdata);
292 		break;
293 	case LDAP_OPT_CACHE_ENABLE:
294 		ld->ld_cache_on = *((int *)optdata);
295 		break;
296 
297 	case LDAP_OPT_ERROR_NUMBER:
298 		LDAP_GET_LDERRNO(ld, &matched, &errstr);
299 		matched = nsldapi_strdup(matched);
300 		errstr = nsldapi_strdup(errstr);
301 		LDAP_SET_LDERRNO(ld, *((int *)optdata), matched, errstr);
302 		break;
303 
304 	case LDAP_OPT_ERROR_STRING:
305 		rc = LDAP_GET_LDERRNO(ld, &matched, NULL);
306 		matched = nsldapi_strdup(matched);
307 		LDAP_SET_LDERRNO(ld, rc, matched,
308 		    nsldapi_strdup((char *)optdata));
309 		rc = LDAP_SUCCESS;
310 		break;
311 
312 	case LDAP_OPT_MATCHED_DN:
313 		rc = LDAP_GET_LDERRNO(ld, NULL, &errstr);
314 		errstr = nsldapi_strdup(errstr);
315 		LDAP_SET_LDERRNO(ld, rc,
316 		    nsldapi_strdup((char *)optdata), errstr);
317 		rc = LDAP_SUCCESS;
318 		break;
319 
320 	case LDAP_OPT_PREFERRED_LANGUAGE:
321 		if (NULL != ld->ld_preferred_language) {
322 			NSLDAPI_FREE(ld->ld_preferred_language);
323 		}
324 		ld->ld_preferred_language = nsldapi_strdup((char *)optdata);
325 		break;
326 
327 	case LDAP_OPT_HOST_NAME:
328 		if (NULL != ld->ld_defhost) {
329 			NSLDAPI_FREE(ld->ld_defhost);
330 		}
331 		ld->ld_defhost = nsldapi_strdup((char *)optdata);
332 		break;
333 
334 	case LDAP_X_OPT_CONNECT_TIMEOUT:
335 		ld->ld_connect_timeout = *((int *)optdata);
336 		break;
337 
338 #ifdef _SOLARIS_SDK
339 	/* recursion prevention dns functions */
340 	case LDAP_X_OPT_DNS_SKIPDB:
341 		rc = prldap_x_install_dns_skipdb(ld, (const char *)optdata);
342 		break;
343 #endif
344 #ifdef LDAP_SASLIO_HOOKS
345 	/* SASL options */
346 	case LDAP_OPT_X_SASL_MECH:
347 		if (NULL != ld->ld_def_sasl_mech) {
348 
349 			NSLDAPI_FREE(ld->ld_def_sasl_mech);
350 		}
351 		ld->ld_def_sasl_mech = nsldapi_strdup((char *)optdata);
352 		break;
353 	case LDAP_OPT_X_SASL_REALM:
354 		if (NULL != ld->ld_def_sasl_realm) {
355 			NSLDAPI_FREE(ld->ld_def_sasl_realm);
356 		}
357 		ld->ld_def_sasl_realm = nsldapi_strdup((char *)optdata);
358 		break;
359 	case LDAP_OPT_X_SASL_AUTHCID:
360 		if (NULL != ld->ld_def_sasl_authcid) {
361 			NSLDAPI_FREE(ld->ld_def_sasl_authcid);
362 		}
363 		ld->ld_def_sasl_authcid = nsldapi_strdup((char *)optdata);
364 		break;
365 	case LDAP_OPT_X_SASL_AUTHZID:
366 		if (NULL != ld->ld_def_sasl_authzid) {
367 			NSLDAPI_FREE(ld->ld_def_sasl_authzid);
368 		}
369 		ld->ld_def_sasl_authzid = nsldapi_strdup((char *)optdata);
370 		break;
371 	case LDAP_OPT_X_SASL_SSF_EXTERNAL:
372 		{
373 		    int sc;
374 		    sasl_ssf_t extprops;
375 		    sasl_conn_t *ctx;
376 		    if (ld->ld_defconn == NULL ||
377 			ld->ld_defconn->lconn_sb == NULL) {
378 			return (-1);
379 		    }
380 		    ctx = (sasl_conn_t *)
381 				(ld->ld_defconn->lconn_sb->sb_sasl_ctx);
382 		    if (ctx == NULL) {
383 			return (-1);
384 		    }
385 		    memset(&extprops, 0L, sizeof (extprops));
386 		    extprops = * ((sasl_ssf_t *)optdata);
387 		    sc = sasl_setprop(ctx, SASL_SSF_EXTERNAL,
388 				(void *) &extprops);
389 		    if (sc != SASL_OK) {
390 			return (-1);
391 		    }
392 		}
393 		break;
394 	case LDAP_OPT_X_SASL_SECPROPS:
395 		{
396 			int sc;
397 			sc = nsldapi_sasl_secprops((char *)optdata,
398 				&ld->ld_sasl_secprops);
399 			return (sc == LDAP_SUCCESS ? 0 : -1);
400 		}
401 	case LDAP_OPT_X_SASL_SSF_MIN:
402 		ld->ld_sasl_secprops.min_ssf = *((sasl_ssf_t *)optdata);
403 		break;
404 	case LDAP_OPT_X_SASL_SSF_MAX:
405 		ld->ld_sasl_secprops.max_ssf = *((sasl_ssf_t *)optdata);
406 		break;
407 	case LDAP_OPT_X_SASL_MAXBUFSIZE:
408 		ld->ld_sasl_secprops.maxbufsize = *((sasl_ssf_t *)optdata);
409 		break;
410 	case LDAP_OPT_X_SASL_SSF:	/* read only */
411 		LDAP_SET_LDERRNO(ld, LDAP_PARAM_ERROR, NULL, NULL);
412 		rc = -1;
413 		break;
414 #endif
415 
416 	default:
417 		LDAP_SET_LDERRNO(ld, LDAP_PARAM_ERROR, NULL, NULL);
418 		rc = -1;
419 	}
420 
421 	if (ld != &nsldapi_ld_defaults) {
422 	    LDAP_MUTEX_UNLOCK(ld, LDAP_OPTION_LOCK);
423 	}
424 	return (rc);
425 }
426