8322 nl: misleading-indentation
[unleashed/tickless.git] / usr / src / lib / libldap5 / sources / ldap / common / setoption.c
blob0988028f1ceb315e4c6991fcace8e41ce81b23c3
1 /*
2 * Copyright 2003 Sun Microsystems, Inc. All rights reserved.
3 * Use is subject to license terms.
4 */
6 #pragma ident "%Z%%M% %I% %E% SMI"
8 /*
9 * The contents of this file are subject to the Netscape Public
10 * License Version 1.1 (the "License"); you may not use this file
11 * except in compliance with the License. You may obtain a copy of
12 * the License at http://www.mozilla.org/NPL/
14 * Software distributed under the License is distributed on an "AS
15 * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
16 * implied. See the License for the specific language governing
17 * rights and limitations under the License.
19 * The Original Code is Mozilla Communicator client code, released
20 * March 31, 1998.
22 * The Initial Developer of the Original Code is Netscape
23 * Communications Corporation. Portions created by Netscape are
24 * Copyright (C) 1998-1999 Netscape Communications Corporation. All
25 * Rights Reserved.
27 * Contributor(s):
30 * setoption.c - ldap_set_option implementation
33 #include "ldap-int.h"
34 #ifdef _SOLARIS_SDK
35 #include "solaris-priv.h"
36 #endif
38 extern int nsldapi_sasl_secprops(const char *in,
39 sasl_security_properties_t *secprops);
41 #define LDAP_SETCLR_BITOPT(ld, bit, optdata) \
42 if (optdata != NULL) { \
43 (ld)->ld_options |= bit; \
44 } else { \
45 (ld)->ld_options &= ~bit; \
49 int
50 LDAP_CALL
51 ldap_set_option(LDAP *ld, int option, const void *optdata)
53 int rc, i;
54 char *matched, *errstr;
56 if (!nsldapi_initialized) {
57 nsldapi_initialize_defaults();
61 * process global options (not associated with an LDAP session handle)
63 if (option == LDAP_OPT_MEMALLOC_FN_PTRS) {
64 struct lber_memalloc_fns memalloc_fns;
66 /* set libldap ones via a struct copy */
67 nsldapi_memalloc_fns = *((struct ldap_memalloc_fns *)optdata);
69 /* also set liblber memory allocation callbacks */
70 memalloc_fns.lbermem_malloc =
71 nsldapi_memalloc_fns.ldapmem_malloc;
72 memalloc_fns.lbermem_calloc =
73 nsldapi_memalloc_fns.ldapmem_calloc;
74 memalloc_fns.lbermem_realloc =
75 nsldapi_memalloc_fns.ldapmem_realloc;
76 memalloc_fns.lbermem_free =
77 nsldapi_memalloc_fns.ldapmem_free;
78 if (ber_set_option(NULL, LBER_OPT_MEMALLOC_FN_PTRS,
79 &memalloc_fns) != 0) {
80 return (-1);
83 return (0);
86 * LDAP_OPT_DEBUG_LEVEL is global
88 if (LDAP_OPT_DEBUG_LEVEL == option) {
89 #ifdef LDAP_DEBUG
90 ldap_debug = *((int *)optdata);
91 #endif
92 return (0);
96 * if ld is NULL, arrange to modify our default settings
98 if (ld == NULL) {
99 ld = &nsldapi_ld_defaults;
100 #ifdef LDAP_DEBUG
101 ldap_debug = 0;
102 #endif
107 * process options that are associated with an LDAP session handle
109 if (!NSLDAPI_VALID_LDAP_POINTER(ld)) {
110 return (-1); /* punt */
113 rc = 0;
114 if (ld != &nsldapi_ld_defaults &&
115 option != LDAP_OPT_EXTRA_THREAD_FN_PTRS &&
116 option != LDAP_OPT_THREAD_FN_PTRS) {
117 LDAP_MUTEX_LOCK(ld, LDAP_OPTION_LOCK);
119 switch (option) {
120 /* options that can be turned on and off */
121 #ifdef LDAP_DNS
122 case LDAP_OPT_DNS:
123 LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_DNS, optdata);
124 break;
125 #endif
127 case LDAP_OPT_REFERRALS:
128 LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_REFERRALS, optdata);
129 break;
131 #ifdef LDAP_SSLIO_HOOKS
132 case LDAP_OPT_SSL:
133 LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_SSL, optdata);
134 break;
135 #endif
137 case LDAP_OPT_RESTART:
138 LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_RESTART, optdata);
139 break;
141 case LDAP_OPT_RECONNECT:
142 LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_RECONNECT, optdata);
143 break;
145 #ifdef LDAP_ASYNC_IO
146 case LDAP_OPT_ASYNC_CONNECT:
147 LDAP_SETCLR_BITOPT(ld, LDAP_BITOPT_ASYNC, optdata);
148 break;
149 #endif /* LDAP_ASYNC_IO */
151 /* fields in the LDAP structure */
152 case LDAP_OPT_DEREF:
153 ld->ld_deref = *((int *)optdata);
154 break;
155 case LDAP_OPT_SIZELIMIT:
156 ld->ld_sizelimit = *((int *)optdata);
157 break;
158 case LDAP_OPT_TIMELIMIT:
159 ld->ld_timelimit = *((int *)optdata);
160 break;
161 case LDAP_OPT_REFERRAL_HOP_LIMIT:
162 ld->ld_refhoplimit = *((int *)optdata);
163 break;
164 case LDAP_OPT_PROTOCOL_VERSION:
165 ld->ld_version = *((int *)optdata);
166 if (ld->ld_defconn != NULL) { /* also set in default conn. */
167 ld->ld_defconn->lconn_version = ld->ld_version;
169 break;
170 case LDAP_OPT_SERVER_CONTROLS:
171 /* nsldapi_dup_controls returns -1 and sets lderrno on error */
172 rc = nsldapi_dup_controls(ld, &ld->ld_servercontrols,
173 (LDAPControl **)optdata);
174 break;
175 case LDAP_OPT_CLIENT_CONTROLS:
176 /* nsldapi_dup_controls returns -1 and sets lderrno on error */
177 rc = nsldapi_dup_controls(ld, &ld->ld_clientcontrols,
178 (LDAPControl **)optdata);
179 break;
181 /* rebind proc */
182 case LDAP_OPT_REBIND_FN:
183 ld->ld_rebind_fn = (LDAP_REBINDPROC_CALLBACK *) optdata;
184 break;
185 case LDAP_OPT_REBIND_ARG:
186 ld->ld_rebind_arg = (void *) optdata;
187 break;
189 #ifdef LDAP_SSLIO_HOOKS
190 /* i/o function pointers */
191 case LDAP_OPT_IO_FN_PTRS:
192 if ((rc = nsldapi_install_compat_io_fns(ld,
193 (struct ldap_io_fns *)optdata)) != LDAP_SUCCESS) {
194 LDAP_SET_LDERRNO(ld, rc, NULL, NULL);
195 rc = -1;
197 break;
199 /* extended i/o function pointers */
200 case LDAP_X_OPT_EXTIO_FN_PTRS:
201 /* denotes use of old iofns struct (no writev) */
202 if (((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_size ==
203 LDAP_X_EXTIO_FNS_SIZE_REV0) {
204 ld->ld_extio_size = LDAP_X_EXTIO_FNS_SIZE;
205 ld->ld_extclose_fn =
206 ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_close;
207 ld->ld_extconnect_fn =
208 ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_connect;
209 ld->ld_extread_fn =
210 ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_read;
211 ld->ld_extwrite_fn =
212 ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_write;
213 ld->ld_extpoll_fn =
214 ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_poll;
215 ld->ld_extnewhandle_fn =
216 ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_newhandle;
217 ld->ld_extdisposehandle_fn =
218 ((struct ldap_x_ext_io_fns_rev0 *)optdata)->
219 lextiof_disposehandle;
220 ld->ld_ext_session_arg =
221 ((struct ldap_x_ext_io_fns_rev0 *)optdata)->lextiof_session_arg;
222 ld->ld_extwritev_fn = NULL;
223 if (ber_sockbuf_set_option(ld->ld_sbp, LBER_SOCKBUF_OPT_EXT_IO_FNS,
224 &(ld->ld_ext_io_fns)) != 0) {
225 return (LDAP_LOCAL_ERROR);
227 } else {
228 /* struct copy */
229 ld->ld_ext_io_fns = *((struct ldap_x_ext_io_fns *)optdata);
231 if ((rc = nsldapi_install_lber_extiofns(ld, ld->ld_sbp))
232 != LDAP_SUCCESS) {
233 LDAP_SET_LDERRNO(ld, rc, NULL, NULL);
234 rc = -1;
236 break;
237 #endif
239 /* thread function pointers */
240 case LDAP_OPT_THREAD_FN_PTRS:
242 * It is only safe to set the thread function pointers
243 * when one thread is using the LDAP session handle.
245 /* free existing mutexes (some are allocated by ldap_init()) */
246 nsldapi_mutex_free_all(ld);
248 /* struct copy */
249 ld->ld_thread = *((struct ldap_thread_fns *)optdata);
251 /* allocate new mutexes */
252 nsldapi_mutex_alloc_all(ld);
254 /* LDAP_OPTION_LOCK was never locked... so just return */
255 return (rc);
257 /* extra thread function pointers */
258 case LDAP_OPT_EXTRA_THREAD_FN_PTRS:
259 /* The extra thread funcs will only pick up the threadid */
260 ld->ld_thread2 = *((struct ldap_extra_thread_fns *)optdata);
262 /* Reset the rest of the structure preserving the threadid fn */
263 ld->ld_mutex_trylock_fn = (LDAP_TF_MUTEX_TRYLOCK_CALLBACK *)NULL;
264 ld->ld_sema_alloc_fn = (LDAP_TF_SEMA_ALLOC_CALLBACK *) NULL;
265 ld->ld_sema_free_fn = (LDAP_TF_SEMA_FREE_CALLBACK *) NULL;
266 ld->ld_sema_wait_fn = (LDAP_TF_SEMA_WAIT_CALLBACK *) NULL;
267 ld->ld_sema_post_fn = (LDAP_TF_SEMA_POST_CALLBACK *) NULL;
269 /* We assume that only one thread is active when replacing */
270 /* the threadid function. We will now proceed and reset all */
271 /* of the threadid/refcounts */
272 for (i = 0; i < LDAP_MAX_LOCK; i++) {
273 ld->ld_mutex_threadid[i] = (void *) -1;
274 ld->ld_mutex_refcnt[i] = 0;
277 return (rc);
279 /* DNS function pointers */
280 case LDAP_OPT_DNS_FN_PTRS:
281 /* struct copy */
282 ld->ld_dnsfn = *((struct ldap_dns_fns *)optdata);
283 break;
285 /* cache function pointers */
286 case LDAP_OPT_CACHE_FN_PTRS:
287 /* struct copy */
288 ld->ld_cache = *((struct ldap_cache_fns *)optdata);
289 break;
290 case LDAP_OPT_CACHE_STRATEGY:
291 ld->ld_cache_strategy = *((int *)optdata);
292 break;
293 case LDAP_OPT_CACHE_ENABLE:
294 ld->ld_cache_on = *((int *)optdata);
295 break;
297 case LDAP_OPT_ERROR_NUMBER:
298 LDAP_GET_LDERRNO(ld, &matched, &errstr);
299 matched = nsldapi_strdup(matched);
300 errstr = nsldapi_strdup(errstr);
301 LDAP_SET_LDERRNO(ld, *((int *)optdata), matched, errstr);
302 break;
304 case LDAP_OPT_ERROR_STRING:
305 rc = LDAP_GET_LDERRNO(ld, &matched, NULL);
306 matched = nsldapi_strdup(matched);
307 LDAP_SET_LDERRNO(ld, rc, matched,
308 nsldapi_strdup((char *)optdata));
309 rc = LDAP_SUCCESS;
310 break;
312 case LDAP_OPT_MATCHED_DN:
313 rc = LDAP_GET_LDERRNO(ld, NULL, &errstr);
314 errstr = nsldapi_strdup(errstr);
315 LDAP_SET_LDERRNO(ld, rc,
316 nsldapi_strdup((char *)optdata), errstr);
317 rc = LDAP_SUCCESS;
318 break;
320 case LDAP_OPT_PREFERRED_LANGUAGE:
321 if (NULL != ld->ld_preferred_language) {
322 NSLDAPI_FREE(ld->ld_preferred_language);
324 ld->ld_preferred_language = nsldapi_strdup((char *)optdata);
325 break;
327 case LDAP_OPT_HOST_NAME:
328 if (NULL != ld->ld_defhost) {
329 NSLDAPI_FREE(ld->ld_defhost);
331 ld->ld_defhost = nsldapi_strdup((char *)optdata);
332 break;
334 case LDAP_X_OPT_CONNECT_TIMEOUT:
335 ld->ld_connect_timeout = *((int *)optdata);
336 break;
338 #ifdef _SOLARIS_SDK
339 /* recursion prevention dns functions */
340 case LDAP_X_OPT_DNS_SKIPDB:
341 rc = prldap_x_install_dns_skipdb(ld, (const char *)optdata);
342 break;
343 #endif
344 #ifdef LDAP_SASLIO_HOOKS
345 /* SASL options */
346 case LDAP_OPT_X_SASL_MECH:
347 if (NULL != ld->ld_def_sasl_mech) {
349 NSLDAPI_FREE(ld->ld_def_sasl_mech);
351 ld->ld_def_sasl_mech = nsldapi_strdup((char *)optdata);
352 break;
353 case LDAP_OPT_X_SASL_REALM:
354 if (NULL != ld->ld_def_sasl_realm) {
355 NSLDAPI_FREE(ld->ld_def_sasl_realm);
357 ld->ld_def_sasl_realm = nsldapi_strdup((char *)optdata);
358 break;
359 case LDAP_OPT_X_SASL_AUTHCID:
360 if (NULL != ld->ld_def_sasl_authcid) {
361 NSLDAPI_FREE(ld->ld_def_sasl_authcid);
363 ld->ld_def_sasl_authcid = nsldapi_strdup((char *)optdata);
364 break;
365 case LDAP_OPT_X_SASL_AUTHZID:
366 if (NULL != ld->ld_def_sasl_authzid) {
367 NSLDAPI_FREE(ld->ld_def_sasl_authzid);
369 ld->ld_def_sasl_authzid = nsldapi_strdup((char *)optdata);
370 break;
371 case LDAP_OPT_X_SASL_SSF_EXTERNAL:
373 int sc;
374 sasl_ssf_t extprops;
375 sasl_conn_t *ctx;
376 if (ld->ld_defconn == NULL ||
377 ld->ld_defconn->lconn_sb == NULL) {
378 return (-1);
380 ctx = (sasl_conn_t *)
381 (ld->ld_defconn->lconn_sb->sb_sasl_ctx);
382 if (ctx == NULL) {
383 return (-1);
385 memset(&extprops, 0L, sizeof (extprops));
386 extprops = * ((sasl_ssf_t *)optdata);
387 sc = sasl_setprop(ctx, SASL_SSF_EXTERNAL,
388 (void *) &extprops);
389 if (sc != SASL_OK) {
390 return (-1);
393 break;
394 case LDAP_OPT_X_SASL_SECPROPS:
396 int sc;
397 sc = nsldapi_sasl_secprops((char *)optdata,
398 &ld->ld_sasl_secprops);
399 return (sc == LDAP_SUCCESS ? 0 : -1);
401 case LDAP_OPT_X_SASL_SSF_MIN:
402 ld->ld_sasl_secprops.min_ssf = *((sasl_ssf_t *)optdata);
403 break;
404 case LDAP_OPT_X_SASL_SSF_MAX:
405 ld->ld_sasl_secprops.max_ssf = *((sasl_ssf_t *)optdata);
406 break;
407 case LDAP_OPT_X_SASL_MAXBUFSIZE:
408 ld->ld_sasl_secprops.maxbufsize = *((sasl_ssf_t *)optdata);
409 break;
410 case LDAP_OPT_X_SASL_SSF: /* read only */
411 LDAP_SET_LDERRNO(ld, LDAP_PARAM_ERROR, NULL, NULL);
412 rc = -1;
413 break;
414 #endif
416 default:
417 LDAP_SET_LDERRNO(ld, LDAP_PARAM_ERROR, NULL, NULL);
418 rc = -1;
421 if (ld != &nsldapi_ld_defaults) {
422 LDAP_MUTEX_UNLOCK(ld, LDAP_OPTION_LOCK);
424 return (rc);