mirror of
https://git.openldap.org/openldap/openldap.git
synced 2026-02-18 10:07:56 -05:00
ITS#8605 - spelling fixes
* javascript * kernel * ldap * length * macros * maintained * manager * matching * maximum * mechanism * memory * method * mimic * minimum * modifiable * modifiers * modifying * multiple * necessary * normalized * objectclass * occurrence * occurring * offered * operation * original * overridden * parameter * permanent * preemptively * printable * protocol * provider * really * redistribution * referenced * refresh * regardless * registered * request * reserved * resource * response * sanity * separated * setconcurrency * should * specially * specifies * structure * structures * subordinates * substitution * succeed * successful * successfully * sudoers * sufficient * superiors * supported * synchronization * terminated * they're * through * traffic * transparent * unsigned * unsupported * version * absence * achieves * adamson * additional * address * against * appropriate * architecture * associated * async * attribute * authentication * authorized * auxiliary * available * begin * beginning * buffered * canonical * certificate * charray * check * class * compatibility * compilation * component * configurable * configuration * configure * conjunction * constraints * constructor * contained * containing * continued * control * convenience * correspond * credentials * cyrillic * database * definitions * deloldrdn * dereferencing * destroy * distinguish * documentation * emmanuel * enabled * entry * enumerated * everything * exhaustive * existence * existing * explicitly * extract * fallthru * fashion * february * finally * function * generically * groupname * happened * implementation * including * initialization * initializes * insensitive * instantiated * instantiation * integral * internal * iterate
This commit is contained in:
parent
fd5ad3ef39
commit
10566c8be3
144 changed files with 241 additions and 241 deletions
|
|
@ -534,7 +534,7 @@ if test $ac_cv_header_db_h = yes; then
|
|||
fi
|
||||
])
|
||||
dnl --------------------------------------------------------------------
|
||||
dnl Check for version compatility with back-bdb
|
||||
dnl Check for version compatibility with back-bdb
|
||||
AC_DEFUN([OL_BDB_COMPAT],
|
||||
[AC_CACHE_CHECK([if Berkeley DB version supported by BDB/HDB backends], [ol_cv_bdb_compat],[
|
||||
AC_EGREP_CPP(__db_version_compat,[
|
||||
|
|
@ -719,7 +719,7 @@ dnl Check GNU Pth pthread Header
|
|||
dnl
|
||||
dnl defines ol_cv_header linux_threads to 'yes' or 'no'
|
||||
dnl 'no' implies pthreads.h is not LinuxThreads or pthreads.h
|
||||
dnl doesn't exists. Existance of pthread.h should separately
|
||||
dnl doesn't exist. Existence of pthread.h should separately
|
||||
dnl checked.
|
||||
dnl
|
||||
AC_DEFUN([OL_HEADER_GNU_PTH_PTHREAD_H], [
|
||||
|
|
@ -750,7 +750,7 @@ dnl Check LinuxThreads Header
|
|||
dnl
|
||||
dnl defines ol_cv_header linux_threads to 'yes' or 'no'
|
||||
dnl 'no' implies pthreads.h is not LinuxThreads or pthreads.h
|
||||
dnl doesn't exists. Existance of pthread.h should separately
|
||||
dnl doesn't exist. Existence of pthread.h should separately
|
||||
dnl checked.
|
||||
dnl
|
||||
AC_DEFUN([OL_HEADER_LINUX_THREADS], [
|
||||
|
|
@ -1107,7 +1107,7 @@ AC_DEFUN([OL_FUNC_GETHOSTBYADDR_R_NARGS],
|
|||
])dnl
|
||||
dnl
|
||||
dnl --------------------------------------------------------------------
|
||||
dnl Check for Cyrus SASL version compatility
|
||||
dnl Check for Cyrus SASL version compatibility
|
||||
AC_DEFUN([OL_SASL_COMPAT],
|
||||
[AC_CACHE_CHECK([Cyrus SASL library version], [ol_cv_sasl_compat],[
|
||||
AC_EGREP_CPP(__sasl_compat,[
|
||||
|
|
|
|||
|
|
@ -317,7 +317,7 @@ eval `echo h.$opt_spec |\
|
|||
eval `echo h:help,$opt_alias |\
|
||||
sed -e 's/-/_/g' -e 's/\([a-zA-Z0-9]\):\([^,]*\),*/opt_ALIAS_\2=\1;/g'`
|
||||
|
||||
# interate over argument line
|
||||
# iterate over argument line
|
||||
opt_PREV=''
|
||||
while [ $# -gt 0 ]; do
|
||||
# special option stops processing
|
||||
|
|
@ -383,11 +383,11 @@ while [ $# -gt 0 ]; do
|
|||
eval "opt_${opt_OPT}=yes"
|
||||
;;
|
||||
':' )
|
||||
# option with argument (multiple occurances override)
|
||||
# option with argument (multiple occurrences override)
|
||||
eval "opt_${opt_OPT}=\"\$opt_ARG\""
|
||||
;;
|
||||
'+' )
|
||||
# option with argument (multiple occurances append)
|
||||
# option with argument (multiple occurrences append)
|
||||
eval "opt_${opt_OPT}=\"\$opt_${opt_OPT}\${ASC_NL}\$opt_ARG\""
|
||||
;;
|
||||
* )
|
||||
|
|
|
|||
|
|
@ -77,7 +77,7 @@ usage( void )
|
|||
fprintf( stderr, _(" -E sasl=(a[utomatic]|i[nteractive]|q[uiet]>\tSASL mode (defaults to automatic if any other -E option provided, otherwise none))\n"));
|
||||
fprintf( stderr, _(" -E mech=<mech>\tSASL mechanism (default "" e.g. Simple)\n"));
|
||||
fprintf( stderr, _(" -E realm=<realm>\tSASL Realm (defaults to none)\n"));
|
||||
fprintf( stderr, _(" -E authcid=<authcid>\tSASL Authenication Identity (defaults to USER)\n"));
|
||||
fprintf( stderr, _(" -E authcid=<authcid>\tSASL Authentication Identity (defaults to USER)\n"));
|
||||
fprintf( stderr, _(" -E authzid=<authzid>\tSASL Authorization Identity (defaults to none)\n"));
|
||||
fprintf( stderr, _(" -E secprops=<secprops>\tSASL Security Properties (defaults to none)\n"));
|
||||
tool_common_usage();
|
||||
|
|
|
|||
10
configure.in
10
configure.in
|
|
@ -422,7 +422,7 @@ dnl ----------------------------------------------------------------
|
|||
|
||||
# validate options
|
||||
if test $ol_enable_slapd = no ; then
|
||||
dnl SLAPD was specificallly disabled
|
||||
dnl SLAPD was specifically disabled
|
||||
if test $ol_enable_slapi = yes ; then
|
||||
AC_MSG_WARN([slapd disabled, ignoring --enable-slapi argument])
|
||||
fi
|
||||
|
|
@ -969,7 +969,7 @@ AC_CHECK_FUNC(select, :, AC_MSG_ERROR([select() required.]))
|
|||
|
||||
if test "${ac_cv_header_winsock_h}" != yes; then
|
||||
dnl Select arg types
|
||||
dnl (if this detection becomes permenent, it and the select() detection
|
||||
dnl (if this detection becomes permanent, it and the select() detection
|
||||
dnl should be done before the yielding select test)
|
||||
AC_FUNC_SELECT_ARGTYPES
|
||||
fi
|
||||
|
|
@ -1491,7 +1491,7 @@ pthread_rwlock_t rwlock;
|
|||
AC_DEFINE(HAVE_PTHREAD_DETACH,1,
|
||||
[define if you have pthread_detach function])
|
||||
|
||||
dnl Check for setconcurreny functions
|
||||
dnl Check for setconcurrency functions
|
||||
AC_CHECK_FUNCS( \
|
||||
pthread_setconcurrency \
|
||||
pthread_getconcurrency \
|
||||
|
|
@ -1737,7 +1737,7 @@ case $ol_with_threads in auto | yes | lwp)
|
|||
ol_with_yielding_select=yes
|
||||
fi
|
||||
|
||||
dnl Check for setconcurreny functions
|
||||
dnl Check for setconcurrency functions
|
||||
AC_CHECK_FUNCS( \
|
||||
thr_setconcurrency \
|
||||
thr_getconcurrency \
|
||||
|
|
@ -1972,7 +1972,7 @@ hosts_access(req)
|
|||
AC_DEFINE(HAVE_TCPD,1, [define if you have -lwrap])
|
||||
WRAP_LIBS="-lwrap"
|
||||
elif test $ol_enable_wrappers = yes ; then
|
||||
AC_MSG_ERROR([could not find TCP wrappers, select apppropriate options or disable])
|
||||
AC_MSG_ERROR([could not find TCP wrappers, select appropriate options or disable])
|
||||
else
|
||||
AC_MSG_WARN([could not find TCP wrappers, support disabled])
|
||||
WRAP_LIBS=""
|
||||
|
|
|
|||
|
|
@ -6,7 +6,7 @@ Headerfiles installed.
|
|||
|
||||
Installation:
|
||||
=============
|
||||
Just run the "configure" script with the apropriate options. Especially
|
||||
Just run the "configure" script with the appropriate options. Especially
|
||||
these two options can be imported, if you didn't install the OpenLDAP-
|
||||
libraries in the default place:
|
||||
|
||||
|
|
@ -14,7 +14,7 @@ libraries in the default place:
|
|||
C-libraries are located.
|
||||
--with-ldap-includes=<path to ldap include files> : To tell configure
|
||||
where the OpenLDAP include files are located.
|
||||
--enable-debug to enable compliation with debugging symbols and stderr
|
||||
--enable-debug to enable compilation with debugging symbols and stderr
|
||||
output
|
||||
(run "configure --help" to see all possible command line options)
|
||||
|
||||
|
|
|
|||
|
|
@ -463,7 +463,7 @@ WARN_IF_UNDOCUMENTED = YES
|
|||
|
||||
WARN_IF_DOC_ERROR = YES
|
||||
|
||||
# This WARN_NO_PARAMDOC option can be abled to get warnings for
|
||||
# This WARN_NO_PARAMDOC option can be enabled to get warnings for
|
||||
# functions that are documented, but have no documentation for their parameters
|
||||
# or return value. If set to NO (the default) doxygen will only warn about
|
||||
# wrong or incomplete parameter documentation, but not about the absence of
|
||||
|
|
@ -637,7 +637,7 @@ REFERENCES_RELATION = YES
|
|||
# If the REFERENCES_LINK_SOURCE tag is set to YES (the default)
|
||||
# and SOURCE_BROWSER tag is set to YES, then the hyperlinks from
|
||||
# functions in REFERENCES_RELATION and REFERENCED_BY_RELATION lists will
|
||||
# link to the source code. Otherwise they will link to the documentstion.
|
||||
# link to the source code. Otherwise they will link to the documentation.
|
||||
|
||||
REFERENCES_LINK_SOURCE = YES
|
||||
|
||||
|
|
|
|||
|
|
@ -30,7 +30,7 @@ int main(){
|
|||
lc->bind("cn=Manager,o=Organisation,c=DE" , "secret",cons);
|
||||
std::cout << lc->getHost() << std::endl;
|
||||
bool result = lc->compare("cn=Manager,o=Organisation,c=DE",
|
||||
LDAPAttribute("cn","Manaer"));
|
||||
LDAPAttribute("cn","Manager"));
|
||||
std::cout << "Compare: " << result << std::endl;
|
||||
|
||||
LDAPAttributeList* attrs=new LDAPAttributeList();
|
||||
|
|
|
|||
|
|
@ -62,8 +62,8 @@ class LDAPAsynConnection{
|
|||
*/
|
||||
static const int SEARCH_SUB=2;
|
||||
|
||||
/** Construtor that initializes a connection to a server
|
||||
* @param hostname Name (or IP-Adress) of the destination host
|
||||
/** Constructor that initializes a connection to a server
|
||||
* @param hostname Name (or IP-Address) of the destination host
|
||||
* @param port Port the LDAP server is running on
|
||||
* @param cons Default constraints to use with operations over
|
||||
* this connection
|
||||
|
|
@ -111,7 +111,7 @@ class LDAPAsynConnection{
|
|||
* error that occured.
|
||||
* This method does a simple (username, password) bind to the server.
|
||||
* Other, saver, authentcation methods are provided later
|
||||
* @param dn the distiguished name to bind as
|
||||
* @param dn the distinguished name to bind as
|
||||
* @param passwd cleartext password to use
|
||||
*/
|
||||
LDAPMessageQueue* bind(const std::string& dn="",
|
||||
|
|
@ -196,7 +196,7 @@ class LDAPAsynConnection{
|
|||
* @throws LDAPException If the Request could not be sent to the
|
||||
* destination server, a LDAPException-object contains the
|
||||
* error that occured.
|
||||
* @param dn Distiguished Name of the Entry to modify
|
||||
* @param dn Distinguished Name of the Entry to modify
|
||||
* @param modlist A set of modification that should be applied
|
||||
* to the Entry
|
||||
* @param cons A set of constraints that should be used with this
|
||||
|
|
@ -232,7 +232,7 @@ class LDAPAsynConnection{
|
|||
* error that occured.
|
||||
* @param oid The dotted decimal representation of the extended
|
||||
* Operation that should be performed
|
||||
* @param value The data asociated with this operation
|
||||
* @param value The data associated with this operation
|
||||
* @param cons A set of constraints that should be used with this
|
||||
* request
|
||||
*/
|
||||
|
|
|
|||
|
|
@ -124,7 +124,7 @@ class LDAPAttribute{
|
|||
void setValues(const StringList& values);
|
||||
|
||||
/**
|
||||
* For interal use only.
|
||||
* For internal use only.
|
||||
* This method is used to translate the values of the Attribute to
|
||||
* 0-terminated Array of BerValue-structs as used by the C-API
|
||||
* @return The Values of the Attribute as an 0-terminated Array of
|
||||
|
|
|
|||
|
|
@ -18,24 +18,24 @@
|
|||
|
||||
using namespace std;
|
||||
|
||||
// little helper function for doing case insensitve string comparison
|
||||
// little helper function for doing case insensitive string comparison
|
||||
bool nocase_compare(char c1, char c2);
|
||||
|
||||
LDAPAttributeList::LDAPAttributeList(){
|
||||
DEBUG(LDAP_DEBUG_CONSTRUCT,
|
||||
"LDAPAttributeList::LDAPAttributList( )" << endl);
|
||||
"LDAPAttributeList::LDAPAttributeList( )" << endl);
|
||||
}
|
||||
|
||||
LDAPAttributeList::LDAPAttributeList(const LDAPAttributeList& al){
|
||||
DEBUG(LDAP_DEBUG_CONSTRUCT,
|
||||
"LDAPAttributeList::LDAPAttributList(&)" << endl);
|
||||
"LDAPAttributeList::LDAPAttributeList(&)" << endl);
|
||||
m_attrs=al.m_attrs;
|
||||
}
|
||||
|
||||
LDAPAttributeList::LDAPAttributeList(const LDAPAsynConnection *ld,
|
||||
LDAPMessage *msg){
|
||||
DEBUG(LDAP_DEBUG_CONSTRUCT,
|
||||
"LDAPAttributeList::LDAPAttributList()" << endl);
|
||||
"LDAPAttributeList::LDAPAttributeList()" << endl);
|
||||
BerElement *ptr=0;
|
||||
char *name=ldap_first_attribute(ld->getSessionHandle(), msg, &ptr);
|
||||
/*
|
||||
|
|
@ -65,7 +65,7 @@ LDAPAttributeList::LDAPAttributeList(const LDAPAsynConnection *ld,
|
|||
}
|
||||
|
||||
LDAPAttributeList::~LDAPAttributeList(){
|
||||
DEBUG(LDAP_DEBUG_DESTROY,"LDAPAttributeList::~LDAPAttributList()" << endl);
|
||||
DEBUG(LDAP_DEBUG_DESTROY,"LDAPAttributeList::~LDAPAttributeList()" << endl);
|
||||
}
|
||||
|
||||
size_t LDAPAttributeList::size() const{
|
||||
|
|
|
|||
|
|
@ -43,7 +43,7 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
*
|
||||
* During execution of this constructor no network communication
|
||||
* is performed. Just some internal data structure are initialized
|
||||
* @param hostname Name (or IP-Adress) of the destination host
|
||||
* @param hostname Name (or IP-Address) of the destination host
|
||||
* @param port Port the LDAP server is running on
|
||||
* @param cons Default constraints to use with operations over
|
||||
* this connection
|
||||
|
|
@ -57,7 +57,7 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
~LDAPConnection();
|
||||
|
||||
/**
|
||||
* Initzializes a synchronous connection to a server.
|
||||
* Initializes a synchronous connection to a server.
|
||||
*
|
||||
* There is actually no
|
||||
* communication to the server. Just the object is initialized
|
||||
|
|
@ -82,7 +82,7 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
* Performs a simple authentication with the server
|
||||
*
|
||||
* @throws LDAPReferralException if a referral is received
|
||||
* @throws LDAPException for any other error occuring during the
|
||||
* @throws LDAPException for any other error occurring during the
|
||||
* operation
|
||||
* @param dn The name of the entry to bind as
|
||||
* @param passwd The cleartext password for the entry
|
||||
|
|
@ -102,11 +102,11 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
void unbind();
|
||||
|
||||
/**
|
||||
* Performs a COMPARE-operation on an entery of the destination
|
||||
* Performs a COMPARE-operation on an entry of the destination
|
||||
* server.
|
||||
*
|
||||
* @throws LDAPReferralException if a referral is received
|
||||
* @throws LDAPException for any other error occuring during the
|
||||
* @throws LDAPException for any other error occurring during the
|
||||
* operation
|
||||
* @param dn Distinguished name of the entry for which the compare
|
||||
* should be performed
|
||||
|
|
@ -126,7 +126,7 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
*
|
||||
* This method performs the DELETE operation on the server
|
||||
* @throws LDAPReferralException if a referral is received
|
||||
* @throws LDAPException for any other error occuring during the
|
||||
* @throws LDAPException for any other error occurring during the
|
||||
* operation
|
||||
* @param dn Distinguished name of the entry that should be deleted
|
||||
* @param cons A set of constraints that should be used with this
|
||||
|
|
@ -138,7 +138,7 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
* Use this method to perform the ADD-operation
|
||||
*
|
||||
* @throws LDAPReferralException if a referral is received
|
||||
* @throws LDAPException for any other error occuring during the
|
||||
* @throws LDAPException for any other error occurring during the
|
||||
* operation
|
||||
* @param le the entry to add to the directory
|
||||
* @param cons A set of constraints that should be used with this
|
||||
|
|
@ -150,7 +150,7 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
* To modify the attributes of an entry, this method can be used
|
||||
*
|
||||
* @throws LDAPReferralException if a referral is received
|
||||
* @throws LDAPException for any other error occuring during the
|
||||
* @throws LDAPException for any other error occurring during the
|
||||
* operation
|
||||
* @param dn The DN of the entry which should be modified
|
||||
* @param mods A set of modifications for that entry.
|
||||
|
|
@ -163,10 +163,10 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
/**
|
||||
* This method performs the ModDN-operation.
|
||||
*
|
||||
* It can be used to rename or move an entry by modifing its DN.
|
||||
* It can be used to rename or move an entry by modifying its DN.
|
||||
*
|
||||
* @throws LDAPReferralException if a referral is received
|
||||
* @throws LDAPException for any other error occuring during the
|
||||
* @throws LDAPException for any other error occurring during the
|
||||
* operation
|
||||
* @param dn The DN that should be modified
|
||||
* @param newRDN If the RDN of the entry should be modified the
|
||||
|
|
@ -188,7 +188,7 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
* This method can be used for the sync. SEARCH-operation.
|
||||
*
|
||||
* @throws LDAPReferralException if a referral is received
|
||||
* @throws LDAPException for any other error occuring during the
|
||||
* @throws LDAPException for any other error occurring during the
|
||||
* operation
|
||||
* @param base The distinguished name of the starting point for the
|
||||
* search
|
||||
|
|
@ -214,7 +214,7 @@ class LDAPConnection : private LDAPAsynConnection {
|
|||
* This method is for extended LDAP-Operations.
|
||||
*
|
||||
* @throws LDAPReferralException if a referral is received
|
||||
* @throws LDAPException for any other error occuring during the
|
||||
* @throws LDAPException for any other error occurring during the
|
||||
* operation
|
||||
* @param oid The Object Identifier of the Extended Operation that
|
||||
* should be performed.
|
||||
|
|
|
|||
|
|
@ -137,7 +137,7 @@ const LDAPControlSet* LDAPConstraints::getClientControls() const{
|
|||
}
|
||||
|
||||
LDAPControl** LDAPConstraints::getSrvCtrlsArray() const {
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getSrvCtrlsArray()" << endl);
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getSrvCtrlsArray()" << endl);
|
||||
if(m_serverControls){
|
||||
return m_serverControls->toLDAPControlArray();
|
||||
}else{
|
||||
|
|
@ -146,7 +146,7 @@ LDAPControl** LDAPConstraints::getSrvCtrlsArray() const {
|
|||
}
|
||||
|
||||
LDAPControl** LDAPConstraints::getClCtrlsArray() const {
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getClCtrlsArray()" << endl);
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getClCtrlsArray()" << endl);
|
||||
if(m_clientControls){
|
||||
return m_clientControls->toLDAPControlArray();
|
||||
}else{
|
||||
|
|
@ -155,7 +155,7 @@ LDAPControl** LDAPConstraints::getClCtrlsArray() const {
|
|||
}
|
||||
|
||||
timeval* LDAPConstraints::getTimeoutStruct() const {
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getTimeoutStruct()" << endl);
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getTimeoutStruct()" << endl);
|
||||
if(m_maxTime == LDAP_NO_LIMIT){
|
||||
return 0;
|
||||
}else{
|
||||
|
|
@ -167,12 +167,12 @@ timeval* LDAPConstraints::getTimeoutStruct() const {
|
|||
}
|
||||
|
||||
bool LDAPConstraints::getReferralChase() const {
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getReferralChase()" << endl);
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getReferralChase()" << endl);
|
||||
return m_referralChase;
|
||||
}
|
||||
|
||||
int LDAPConstraints::getHopLimit() const{
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPContstraints::getHopLimit()" << endl);
|
||||
DEBUG(LDAP_DEBUG_TRACE,"LDAPConstraints::getHopLimit()" << endl);
|
||||
return m_HopLimit;
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -34,10 +34,10 @@ class LDAPControlSet {
|
|||
* For internal use only
|
||||
*
|
||||
* This constructor creates a new LDAPControlSet for a
|
||||
* 0-terminiated array of LDAPControl-structures as used by the
|
||||
* 0-terminated array of LDAPControl-structures as used by the
|
||||
* C-API
|
||||
* @param controls: pointer to a 0-terminated array of pointers to
|
||||
* LDAPControll-structures
|
||||
* LDAPControl-structures
|
||||
* @note: untested til now. Due to lack of server that return
|
||||
* Controls
|
||||
*/
|
||||
|
|
|
|||
|
|
@ -37,7 +37,7 @@ class LDAPEntry{
|
|||
* Used internally only.
|
||||
*
|
||||
* The constructor is used internally to create a LDAPEntry from
|
||||
* the C-API's data structurs.
|
||||
* the C-API's data structures.
|
||||
*/
|
||||
LDAPEntry(const LDAPAsynConnection *ld, LDAPMessage *msg);
|
||||
|
||||
|
|
|
|||
|
|
@ -27,8 +27,8 @@ class LDAPException : public std::runtime_error
|
|||
/**
|
||||
* Constructs a LDAPException-object from the parameters
|
||||
* @param res_code A valid LDAP result code.
|
||||
* @param err_string An addional error message for the error
|
||||
* that happend (optional)
|
||||
* @param err_string An additional error message for the error
|
||||
* that happened (optional)
|
||||
*/
|
||||
LDAPException(int res_code,
|
||||
const std::string& err_string=std::string()) throw();
|
||||
|
|
@ -36,7 +36,7 @@ class LDAPException : public std::runtime_error
|
|||
/**
|
||||
* Constructs a LDAPException-object from the error state of a
|
||||
* LDAPAsynConnection-object
|
||||
* @param lc A LDAP-Connection for that an error has happend. The
|
||||
* @param lc A LDAP-Connection for that an error has happened. The
|
||||
* Constructor tries to read its error state.
|
||||
*/
|
||||
LDAPException(const LDAPAsynConnection *lc) throw();
|
||||
|
|
@ -58,7 +58,7 @@ class LDAPException : public std::runtime_error
|
|||
const std::string& getResultMsg() const throw();
|
||||
|
||||
/**
|
||||
* @return The addional error message of the error (if it was set)
|
||||
* @return The additional error message of the error (if it was set)
|
||||
*/
|
||||
const std::string& getServerMsg() const throw();
|
||||
|
||||
|
|
|
|||
|
|
@ -46,7 +46,7 @@ class LDAPMsg{
|
|||
static const int EXTENDED_REQUEST=LDAP_REQ_EXTENDED;
|
||||
|
||||
/**
|
||||
* The destructor has no implemenation, because this is an abstract
|
||||
* The destructor has no implementation, because this is an abstract
|
||||
* class.
|
||||
*/
|
||||
virtual ~LDAPMsg() {}
|
||||
|
|
@ -81,7 +81,7 @@ class LDAPMsg{
|
|||
* DEL_RESPONSE <BR>
|
||||
* MODDN_RESPONSE <BR>
|
||||
* COMPARE_RESPONSE <BR>
|
||||
* EXTENDED_REPONSE <BR>
|
||||
* EXTENDED_RESPONSE <BR>
|
||||
*/
|
||||
int getMessageType();
|
||||
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@
|
|||
#include <LDAPRebindAuth.h>
|
||||
|
||||
/**
|
||||
* Just an abstract class to provide a mechnism for rebind to another
|
||||
* Just an abstract class to provide a mechanism for rebind to another
|
||||
* server when chasing referrals. Clients have to implement a class
|
||||
* derived from this. To use authentication other than anonymous for
|
||||
* referral chasing
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@
|
|||
#include<string>
|
||||
|
||||
/**
|
||||
* This class represent Authenication information for the case that the
|
||||
* This class represent Authentication information for the case that the
|
||||
* library is chasing referrals.
|
||||
*
|
||||
* The LDAPRebind::getRebindAuth() method returns an object of this type.
|
||||
|
|
|
|||
|
|
@ -19,7 +19,7 @@ class LDAPUrl;
|
|||
*
|
||||
* Each request that is sent to a LDAP-server by this library is
|
||||
* represented by a special object that contains the parameters and some
|
||||
* other info of the request. This virtual class is the common base classe
|
||||
* other info of the request. This virtual class is the common base class
|
||||
* for these specialized request classes.
|
||||
*/
|
||||
class LDAPRequest{
|
||||
|
|
|
|||
|
|
@ -59,7 +59,7 @@ class LDAPResult : public LDAPMsg{
|
|||
|
||||
static const int ALIAS_DEREFERENCING_PROBLEM = 36;
|
||||
|
||||
static const int INAPPROPRIATE_AUTENTICATION = 48;
|
||||
static const int INAPPROPRIATE_AUTHENTICATION = 48;
|
||||
static const int INVALID_CREDENTIALS = 49;
|
||||
static const int INSUFFICIENT_ACCESS = 50;
|
||||
static const int BUSY = 51;
|
||||
|
|
@ -125,7 +125,7 @@ class LDAPResult : public LDAPMsg{
|
|||
std::string resToString() const;
|
||||
|
||||
/**
|
||||
* In some case of error the server may return addional error
|
||||
* In some case of error the server may return additional error
|
||||
* messages.
|
||||
* @returns The additional error message returned by the server.
|
||||
*/
|
||||
|
|
@ -141,7 +141,7 @@ class LDAPResult : public LDAPMsg{
|
|||
const std::string& getMatchedDN() const;
|
||||
|
||||
/**
|
||||
* @returns If the result code is REFERRAL this methode returns the
|
||||
* @returns If the result code is REFERRAL this method returns the
|
||||
* URLs of the referral that was sent by the server.
|
||||
*/
|
||||
const LDAPUrlList& getReferralUrls() const;
|
||||
|
|
|
|||
|
|
@ -85,7 +85,7 @@ class LDAPUrl{
|
|||
|
||||
/**
|
||||
* Set the Protocol Scheme of the URL
|
||||
* @param host The Protcol scheme. Allowed values are
|
||||
* @param host The Protocol scheme. Allowed values are
|
||||
* ldap,ldapi,ldaps and cldap
|
||||
*/
|
||||
void setScheme( const std::string &scheme );
|
||||
|
|
@ -120,7 +120,7 @@ class LDAPUrl{
|
|||
|
||||
/**
|
||||
* Set the Attributes part of the URL
|
||||
* @param attrs StringList constaining the List of Attributes
|
||||
* @param attrs StringList containing the List of Attributes
|
||||
*/
|
||||
void setAttrs( const StringList &attrs);
|
||||
void setExtensions( const StringList &ext);
|
||||
|
|
@ -146,7 +146,7 @@ class LDAPUrl{
|
|||
protected :
|
||||
/**
|
||||
* Split the url string that is associated with this Object into
|
||||
* it components. The compontens of the URL can be access via the
|
||||
* it components. The components of the URL can be access via the
|
||||
* get...() methods.
|
||||
* (this function is mostly for internal use and gets called
|
||||
* automatically whenever necessary)
|
||||
|
|
|
|||
|
|
@ -75,7 +75,7 @@ int LdifReader::readNextRecord( bool first )
|
|||
{
|
||||
std::ostringstream err;
|
||||
err << "Line " << this->m_lineNumber
|
||||
<< ": Unsuported LDIF Version";
|
||||
<< ": Unsupported LDIF Version";
|
||||
throw( std::runtime_error(err.str()) );
|
||||
}
|
||||
continue;
|
||||
|
|
@ -98,7 +98,7 @@ int LdifReader::readNextRecord( bool first )
|
|||
{
|
||||
std::ostringstream err;
|
||||
err << "Line " << this->m_lineNumber
|
||||
<< ": \"include\" not yet suppported.";
|
||||
<< ": \"include\" not yet supported.";
|
||||
throw( std::runtime_error(err.str()) );
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -22,7 +22,7 @@ LdifWriter::LdifWriter( std::ostream& output, int version ) :
|
|||
m_addSeparator = true;
|
||||
} else {
|
||||
std::ostringstream err;
|
||||
err << "Unsuported LDIF Version";
|
||||
err << "Unsupported LDIF Version";
|
||||
throw( std::runtime_error(err.str()) );
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,4 +1,4 @@
|
|||
Package rersion 2.0:
|
||||
Package version 2.0:
|
||||
- Detects OpenLDAP 2.0 and builds correctly with it.
|
||||
- Increment major version to 2, library file to libldaptcl2.0.so.
|
||||
- Can now perform add/delete/replace modifications in a single command.
|
||||
|
|
|
|||
|
|
@ -32,7 +32,7 @@ The \fBexplode\fR form provides a means (via ldap_explode(3)) to explode a DN
|
|||
into its component parts. \fB-nonames\fR strips off the attribute names,
|
||||
and -list returns a list suitable for \fBarray set\fR.
|
||||
.PP
|
||||
Finally, the last form, described in more detail below, refers genericly
|
||||
Finally, the last form, described in more detail below, refers generically
|
||||
to how the command created by the first two examples is used.
|
||||
.SH DESCRIPTION
|
||||
|
||||
|
|
@ -374,7 +374,7 @@ The \fBldap init\fR syntax fails to return anything useful. Use
|
|||
are also shared, and ldaptcl.so is itself created with the correct flags
|
||||
(eg. -R for Solaris). In short there's a lot of details to make this part
|
||||
work, but it should work out of the box for Solaris. Other systems may
|
||||
require that LD_LIBRARY_PATH or other appropraite environment variables
|
||||
require that LD_LIBRARY_PATH or other appropriate environment variables
|
||||
be set at build and/or runtime.
|
||||
|
||||
An asynchronous interface should be provided with callbacks.
|
||||
|
|
|
|||
|
|
@ -170,7 +170,7 @@ LDAP_ErrorStringToCode(Tcl_Interp *interp, char *s)
|
|||
*
|
||||
* Process one result return from an LDAP search.
|
||||
*
|
||||
* Paramaters:
|
||||
* Parameters:
|
||||
* o interp - Tcl interpreter; Errors are returned in result.
|
||||
* o ldap - LDAP structure pointer.
|
||||
* o entry - LDAP message pointer.
|
||||
|
|
@ -268,7 +268,7 @@ LDAP_ProcessOneSearchResult (interp, ldap, entry, destArrayNameObj, evalCodeObj)
|
|||
*
|
||||
* Perform an LDAP search.
|
||||
*
|
||||
* Paramaters:
|
||||
* Parameters:
|
||||
* o interp - Tcl interpreter; Errors are returned in result.
|
||||
* o ldap - LDAP structure pointer.
|
||||
* o base - Base DN from which to perform search.
|
||||
|
|
|
|||
|
|
@ -21,7 +21,7 @@ autogroup (overlay)
|
|||
Automated updates of group memberships.
|
||||
|
||||
cloak (overlay)
|
||||
Hide specific attributes unless explicitely requested
|
||||
Hide specific attributes unless explicitly requested
|
||||
|
||||
comp_match (plugin)
|
||||
Component Matching rules (RFC 3687).
|
||||
|
|
|
|||
|
|
@ -24,7 +24,7 @@ directive.
|
|||
.B allop-URI <ldapURI>
|
||||
Specify the base and the scope of search operations that trigger the overlay.
|
||||
By default, it is "ldap:///??base", i.e. it only applies to the rootDSE.
|
||||
This requires the overlay to be instantited as global.
|
||||
This requires the overlay to be instantiated as global.
|
||||
|
||||
.SH EXAMPLES
|
||||
.LP
|
||||
|
|
|
|||
|
|
@ -581,7 +581,7 @@ autogroup_add_members_from_filter( Operation *op, Entry *e, autogroup_entry_t *a
|
|||
|
||||
/*
|
||||
** Adds a group to the internal list from the passed entry.
|
||||
** scan specifies whether to add all maching members to the group.
|
||||
** scan specifies whether to add all matching members to the group.
|
||||
** modify specifies whether to modify the given group entry (when modify == 0),
|
||||
** or to modify the group entry in the database (when modify == 1 and e = NULL and ndn != NULL).
|
||||
** agi - pointer to the groups and the attribute definitions
|
||||
|
|
@ -1167,8 +1167,8 @@ autogroup_response( Operation *op, SlapReply *rs )
|
|||
}
|
||||
|
||||
/* For each group:
|
||||
1. check if the orginal entry's DN is in the group.
|
||||
2. chceck if the any of the group filter's base DN is a suffix of the new DN
|
||||
1. check if the original entry's DN is in the group.
|
||||
2. check if the any of the group filter's base DN is a suffix of the new DN
|
||||
|
||||
If 1 and 2 are both false, we do nothing.
|
||||
If 1 and 2 is true, we remove the old DN from the group, and add the new DN.
|
||||
|
|
@ -1193,7 +1193,7 @@ autogroup_response( Operation *op, SlapReply *rs )
|
|||
}
|
||||
|
||||
if ( age->age_modrdn_olddnmodified ) {
|
||||
/* Resquest already marked this group to be updated */
|
||||
/* Request already marked this group to be updated */
|
||||
is_olddn = 1;
|
||||
is_value_refresh = 1;
|
||||
age->age_modrdn_olddnmodified = 0;
|
||||
|
|
@ -1508,7 +1508,7 @@ autogroup_memberOf_filter( Filter *f, BerValue *dn, AttributeDescription *member
|
|||
}
|
||||
|
||||
/*
|
||||
** When modifing a group, we must deny any modifications to the member attribute,
|
||||
** When modifying a group, we must deny any modifications to the member attribute,
|
||||
** because the group would be inconsistent.
|
||||
*/
|
||||
static int
|
||||
|
|
|
|||
|
|
@ -1,4 +1,4 @@
|
|||
/* cloak.c - Overlay to hide some attribute except if explicitely requested */
|
||||
/* cloak.c - Overlay to hide some attribute except if explicitly requested */
|
||||
/* $OpenLDAP$ */
|
||||
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
||||
*
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@ The
|
|||
.B cloak
|
||||
overlay to
|
||||
.BR slapd (8)
|
||||
allows the server to hide specific attributes, unless explicitely requested
|
||||
allows the server to hide specific attributes, unless explicitly requested
|
||||
by the client. This improve performance when a client requests all attributes
|
||||
and get a huge binary attribute that is of no interest for it.
|
||||
This behavior is disabled when the \fImanageDSAit\fP
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
/* Copyright 2004 IBM Corporation
|
||||
* All rights reserved.
|
||||
* Redisribution and use in source and binary forms, with or without
|
||||
* modification, are permitted only as authorizd by the OpenLADP
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted only as authorized by the OpenLDAP
|
||||
* Public License.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
/* Copyright 2004 IBM Corporation
|
||||
* All rights reserved.
|
||||
* Redisribution and use in source and binary forms, with or without
|
||||
* modification, are permitted only as authorizd by the OpenLADP
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted only as authorized by the OpenLDAP
|
||||
* Public License.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS
|
||||
|
|
@ -717,9 +717,9 @@ MatchingComponentInt(char* oid, ComponentSyntaxInfo* csi_attr,
|
|||
ComponentInt *a, *b;
|
||||
|
||||
if( oid ) {
|
||||
/* check if this ASN type's matching rule is overrided */
|
||||
/* check if this ASN type's matching rule is overridden */
|
||||
mr = retrieve_matching_rule(oid, csi_attr->csi_comp_desc->cd_type_id );
|
||||
/* if existing function is overrided, call the overriding
|
||||
/* if existing function is overridden, call the overriding
|
||||
function*/
|
||||
if ( mr )
|
||||
return component_value_match( mr, csi_attr , csi_assert );
|
||||
|
|
@ -1319,7 +1319,7 @@ BDecComponentOid ( void* mem_op, GenBuf *b, AsnTag tagId, AsnLen len, void *v,
|
|||
}
|
||||
|
||||
/*
|
||||
* Component BER Decoder : PrintiableString
|
||||
* Component BER Decoder : PrintableString
|
||||
*/
|
||||
|
||||
int
|
||||
|
|
@ -2022,7 +2022,7 @@ InstallAnyByComponentInt (int anyId, ComponentInt intId, unsigned int size,
|
|||
|
||||
|
||||
/*
|
||||
* OID and its corresponding decoder can be registerd with this func.
|
||||
* OID and its corresponding decoder can be registered with this func.
|
||||
* If contained types constrained by <select> are used,
|
||||
* their OID and decoder MUST be registered, otherwise it will return no entry.
|
||||
* An open type(ANY type) also need be registered.
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
/* Copyright 2004 IBM Corporation
|
||||
* All rights reserved.
|
||||
* Redisribution and use in source and binary forms, with or without
|
||||
* modification, are permitted only as authorizd by the OpenLADP
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted only as authorized by the OpenLDAP
|
||||
* Public License.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS
|
||||
|
|
@ -103,7 +103,7 @@ int MatchingComponentBool (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInf
|
|||
#define FreeComponentBool(v) NULL
|
||||
|
||||
/*
|
||||
* ENUMERTED
|
||||
* ENUMERATED
|
||||
*/
|
||||
typedef struct ComponentEnum {
|
||||
void* syntax;
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
/* Copyright 2004 IBM Corporation
|
||||
* All rights reserved.
|
||||
* Redisribution and use in source and binary forms, with or without
|
||||
* modification, are permitted only as authorizd by the OpenLADP
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted only as authorized by the OpenLDAP
|
||||
* Public License.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS
|
||||
|
|
@ -602,7 +602,7 @@ comp_test_components( void* attr_nm, void* assert_nm, ComponentSyntaxInfo* csi_a
|
|||
|
||||
if ( !cr )
|
||||
return comp_test_one_component ( attr_nm, assert_nm, csi_attr, ca );
|
||||
/* Extracting the component refrenced by ca->ca_comp_ref */
|
||||
/* Extracting the component referenced by ca->ca_comp_ref */
|
||||
csi_attr = (ComponentSyntaxInfo*)csi_attr->csi_comp_desc->cd_extract_i( attr_nm, cr, csi_attr );
|
||||
if ( !csi_attr ) return LDAP_INVALID_SYNTAX;
|
||||
/* perform matching, considering the type of a Component Reference(CR)*/
|
||||
|
|
@ -632,7 +632,7 @@ comp_test_components( void* attr_nm, void* assert_nm, ComponentSyntaxInfo* csi_a
|
|||
* 1) If so, look up the corresponding decoder in the mapping
|
||||
* table(OID to decoder) by <select>
|
||||
* and then decode the OCTET/BIT STRING with the decoder
|
||||
* Finially, extreact the target component with the remaining CR.
|
||||
* Finally, extract the target component with the remaining CR.
|
||||
* 2) If not, just return the current component, It SHOULD not be
|
||||
* extracted further, because the component MUST be BIT/OCTET
|
||||
* string.
|
||||
|
|
@ -652,7 +652,7 @@ comp_test_components( void* attr_nm, void* assert_nm, ComponentSyntaxInfo* csi_a
|
|||
if ( !odm || !odm->BER_Decode )
|
||||
return LDAP_PROTOCOL_ERROR;
|
||||
|
||||
/* current componet MUST be either BIT or OCTET STRING */
|
||||
/* current component MUST be either BIT or OCTET STRING */
|
||||
if ( csi_attr->csi_comp_desc->cd_type_id != BASICTYPE_BITSTRING ) {
|
||||
bv.bv_val = ((ComponentBits*)csi_attr)->value.bits;
|
||||
bv.bv_len = ((ComponentBits*)csi_attr)->value.bitLen;
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@ ETCDIR/slapd.conf
|
|||
Some broken client tend to implement modifications as replace operations
|
||||
where all attributes are replaced, most of the time by the same values
|
||||
they had before. This can cause undesirable load on logs, ACL evaluation,
|
||||
or replication trafic.
|
||||
or replication traffic.
|
||||
|
||||
This overlay detects idempotent replace operations and filter them out.
|
||||
.SH CONFIGURATION
|
||||
|
|
|
|||
|
|
@ -26,7 +26,7 @@
|
|||
#define GCC_VERSION(major, minor) \
|
||||
((__GNUC__ > (major)) || (__GNUC__ == (major) && __GNUC_MINOR__ >= (minor)))
|
||||
|
||||
/* These are macros to use some gcc-specific flags in case the're available
|
||||
/* These are macros to use some gcc-specific flags in case they're available
|
||||
and otherwise define them to empty strings. This allows us to give
|
||||
the compiler some extra information.
|
||||
See http://gcc.gnu.org/onlinedocs/gcc/Attribute-Syntax.html
|
||||
|
|
|
|||
|
|
@ -327,7 +327,7 @@ static void debug_dump(const void *ptr, size_t size)
|
|||
}
|
||||
|
||||
|
||||
/* These are functions and macors for performing common operations in
|
||||
/* These are functions and macros for performing common operations in
|
||||
the nslcd request/response protocol. */
|
||||
|
||||
/* returns a socket to the server or NULL on error (see errno),
|
||||
|
|
|
|||
|
|
@ -52,13 +52,13 @@
|
|||
INT32 - 32-bit integer value
|
||||
TYPE - a typed field that is transferred using sizeof()
|
||||
STRING - a string length (32bit) followed by the string value (not
|
||||
null-terminted) the string itself is assumed to be UTF-8
|
||||
null-terminated) the string itself is assumed to be UTF-8
|
||||
STRINGLIST - a 32-bit number noting the number of strings followed by
|
||||
the strings one at a time
|
||||
|
||||
Furthermore the ADDRESS compound data type is defined as:
|
||||
INT32 type of address: e.g. AF_INET or AF_INET6
|
||||
INT32 lenght of address
|
||||
INT32 length of address
|
||||
RAW the address itself
|
||||
With the ADDRESSLIST using the same construct as with STRINGLIST.
|
||||
|
||||
|
|
@ -212,7 +212,7 @@
|
|||
STRING password
|
||||
and the result value consists of:
|
||||
INT32 authc NSLCD_PAM_* result code
|
||||
STRING user name (the cannonical user name)
|
||||
STRING user name (the canonical user name)
|
||||
INT32 authz NSLCD_PAM_* result code
|
||||
STRING authorisation error message
|
||||
If the username is empty in this request an attempt is made to
|
||||
|
|
|
|||
|
|
@ -170,7 +170,7 @@ static int tio_wait(int fd, short events, int timeout,
|
|||
errno = ETIME;
|
||||
return -1;
|
||||
}
|
||||
/* sanitiy check for moving clock */
|
||||
/* sanity check for moving clock */
|
||||
if (t > timeout)
|
||||
t = timeout;
|
||||
/* wait for activity */
|
||||
|
|
@ -422,7 +422,7 @@ int tio_write(TFILE *fp, const void *buf, size_t count)
|
|||
uint8_t *tmp;
|
||||
size_t newsz;
|
||||
const uint8_t *ptr = (const uint8_t *)buf;
|
||||
/* keep filling the buffer until we have bufferred everything */
|
||||
/* keep filling the buffer until we have buffered everything */
|
||||
while (count > 0)
|
||||
{
|
||||
/* figure out free size in buffer */
|
||||
|
|
|
|||
|
|
@ -92,9 +92,9 @@
|
|||
|
||||
/*
|
||||
* Define the followingsha2_* types to types of the correct length on
|
||||
* the native archtecture. Most BSD systems and Linux define u_intXX_t
|
||||
* the native architecture. Most BSD systems and Linux define u_intXX_t
|
||||
* types. Machines with very recent ANSI C headers, can use the
|
||||
* uintXX_t definintions from inttypes.h by defining SHA2_USE_INTTYPES_H
|
||||
* uintXX_t definitions from inttypes.h by defining SHA2_USE_INTTYPES_H
|
||||
* during compile or in the sha.h header file.
|
||||
*
|
||||
* Machines that support neither u_intXX_t nor inttypes.h's uintXX_t
|
||||
|
|
|
|||
|
|
@ -176,7 +176,7 @@ Return Value:
|
|||
If successful, the function returns the length in bytes of
|
||||
the UTF-8 output character.
|
||||
|
||||
If utf8char is NULL, count is ignored and the funtion
|
||||
If utf8char is NULL, count is ignored and the function
|
||||
returns the number of bytes that would be written to the
|
||||
output char.
|
||||
|
||||
|
|
@ -272,7 +272,7 @@ Return Value:
|
|||
written to mbstr, excluding the null termination
|
||||
character, if any.
|
||||
|
||||
If mbstr is NULL, count is ignored and the funtion
|
||||
If mbstr is NULL, count is ignored and the function
|
||||
returns the number of bytes required for the output string,
|
||||
excluding the NULL.
|
||||
|
||||
|
|
|
|||
|
|
@ -8,7 +8,7 @@ inappropriate to use I-Ds as reference material or to cite them
|
|||
other than as "work in progress."
|
||||
|
||||
The OpenLDAP Project maintains copies of I-D for which we find
|
||||
interesting. Existance here does not necessarily imply any support
|
||||
interesting. Existence here does not necessarily imply any support
|
||||
nor any plans to support for the I-D. The I-Ds found in this
|
||||
directory may be stale, expired, or otherwise out of date.
|
||||
|
||||
|
|
|
|||
|
|
@ -1228,7 +1228,7 @@ With sets, however, it's also possible to use simple names in group ACLs, as thi
|
|||
show.
|
||||
|
||||
Let's say we want to allow members of the {{F:sudoadm}} group to write to the
|
||||
{{F:ou=suders}} branch of our tree. But our group definition now is using {{F:memberUid}} for
|
||||
{{F:ou=sudoers}} branch of our tree. But our group definition now is using {{F:memberUid}} for
|
||||
the group members:
|
||||
|
||||
> dn: cn=sudoadm,ou=group,dc=example,dc=com
|
||||
|
|
|
|||
|
|
@ -210,7 +210,7 @@ class chain.
|
|||
|
||||
Modify operation attempts to change the structural class of the entry.
|
||||
|
||||
> Instanstantiation of abstract objectClass.
|
||||
> Instantiation of abstract objectClass.
|
||||
|
||||
An abstract class is not subordinate to any listed structural or auxiliary class.
|
||||
|
||||
|
|
|
|||
|
|
@ -54,7 +54,7 @@ you should use the manual pages that were installed on your system
|
|||
with your version of OpenLDAP software so that you're looking at
|
||||
documentation that matches the code. While the OpenLDAP web site
|
||||
also provides the manual pages for convenience, you can not assume
|
||||
that they corresond to the particular version you're running.
|
||||
that they correspond to the particular version you're running.
|
||||
|
||||
P2[notoc] Acknowledgments
|
||||
|
||||
|
|
|
|||
|
|
@ -185,7 +185,7 @@ specified olcDbDirectory must exist prior to starting {{slapd}}(8).
|
|||
|
||||
.{{S: }}
|
||||
+{{B:Import the configuration database}}
|
||||
. You are now ready to import your configration database for use by
|
||||
. You are now ready to import your configuration database for use by
|
||||
{{slapd}}(8), by running the command:
|
||||
|
||||
..{{EX: su root -c /usr/local/sbin/slapadd -n 0 -F /usr/local/etc/slapd.d -l /usr/local/etc/openldap/slapd.ldif}}
|
||||
|
|
|
|||
|
|
@ -208,7 +208,7 @@ DN}} of the form
|
|||
So in our above example, if the user's name were "adamson", the
|
||||
authentication request DN would be:
|
||||
|
||||
> uid=adamsom,cn=example.com,cn=kerberos_v4,cn=auth
|
||||
> uid=adamson,cn=example.com,cn=kerberos_v4,cn=auth
|
||||
|
||||
This authentication request DN can be used directly ACLs or,
|
||||
alternatively, mapped prior to use. See the section {{SECT:Mapping
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@ integrity and confidentiality protections and to support
|
|||
LDAP authentication using the {{TERM:SASL}} {{TERM:EXTERNAL}} mechanism.
|
||||
TLS is defined in {{REF:RFC4346}}.
|
||||
|
||||
Note: For generating certifcates, please reference {{URL:http://www.openldap.org/faq/data/cache/185.html}}
|
||||
Note: For generating certificates, please reference {{URL:http://www.openldap.org/faq/data/cache/185.html}}
|
||||
|
||||
H2: TLS Certificates
|
||||
|
||||
|
|
@ -96,7 +96,7 @@ files. The {{certutil}} command can be used to add a {{TERM:CA}} certificate:
|
|||
|
||||
> certutil -d <path> -A -n "name of CA cert" -t CT,, -a -i /path/to/cacertfile.pem
|
||||
|
||||
. This command will add a CA certficate stored in the PEM (ASCII) formatted
|
||||
. This command will add a CA certificate stored in the PEM (ASCII) formatted
|
||||
. file named /path/to/cacertfile.pem. {{EX:-t CT,,}} means that the certificate is
|
||||
. trusted to be a CA issuing certs for use in TLS clients and servers.
|
||||
|
||||
|
|
@ -134,7 +134,7 @@ When using Mozilla NSS, this directive specifies the name of
|
|||
a file that contains the password for the key for the certificate specified with
|
||||
{{EX:TLSCertificateFile}}. The modutil command can be used to turn off password
|
||||
protection for the cert/key database. For example, if {{EX:TLSCACertificatePath}}
|
||||
specifes /etc/openldap/certdb as the location of the cert/key database, use
|
||||
specifies /etc/openldap/certdb as the location of the cert/key database, use
|
||||
modutil to change the password to the empty string:
|
||||
|
||||
> modutil -dbdir /etc/openldap/certdb -changepw 'NSS Certificate DB'
|
||||
|
|
|
|||
|
|
@ -4631,7 +4631,7 @@
|
|||
sodipodi:role="line"
|
||||
x="19"
|
||||
y="194.40942"
|
||||
id="tspan5518">with mode set to 'resfreshOnly'</tspan></text>
|
||||
id="tspan5518">with mode set to 'refreshOnly'</tspan></text>
|
||||
<text
|
||||
xml:space="preserve"
|
||||
style="font-size:16px;font-style:normal;font-weight:normal;fill:#000000;fill-opacity:1;stroke:none;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;font-family:Bitstream Vera Sans"
|
||||
|
|
|
|||
|
Before Width: | Height: | Size: 152 KiB After Width: | Height: | Size: 152 KiB |
|
|
@ -90,7 +90,7 @@ or using the additional parameters in the case of the specially named extended
|
|||
operations above.
|
||||
|
||||
Please note that ldapexop behaves differently for the same extended operation
|
||||
when it was given as an OID or as a specialliy named operation:
|
||||
when it was given as an OID or as a specially named operation:
|
||||
|
||||
Calling ldapexop with the OID of the \fBwhoami\fP (RFC 4532) extended operation
|
||||
.nf
|
||||
|
|
|
|||
|
|
@ -116,7 +116,7 @@ trying to return as much data as possible.
|
|||
If the value is set to \fBstop\fP, the search is terminated as soon
|
||||
as an error is returned by one target, and the error is immediately
|
||||
propagated to the client.
|
||||
If the value is set to \fBreport\fP, the search is continuated to the end
|
||||
If the value is set to \fBreport\fP, the search is continued to the end
|
||||
but, in case at least one target returned an error code, the first
|
||||
non-success error code is returned.
|
||||
|
||||
|
|
|
|||
|
|
@ -925,7 +925,7 @@ When using Mozilla NSS, olcTLSCertificateKeyFile specifies the name of
|
|||
a file that contains the password for the key for the certificate specified with
|
||||
olcTLSCertificateFile. The modutil command can be used to turn off password
|
||||
protection for the cert/key database. For example, if olcTLSCACertificatePath
|
||||
specifes /etc/openldap/certdb as the location of the cert/key database, use
|
||||
specifies /etc/openldap/certdb as the location of the cert/key database, use
|
||||
modutil to change the password to the empty string:
|
||||
.nf
|
||||
modutil \-dbdir /etc/openldap/certdb \-changepw 'NSS Certificate DB'
|
||||
|
|
|
|||
|
|
@ -674,7 +674,7 @@ Password used with the
|
|||
.B idassert\-authcDN
|
||||
above.
|
||||
This directive is obsoleted by the
|
||||
.B crendentials
|
||||
.B credentials
|
||||
arg of
|
||||
.B idassert\-bind
|
||||
when \fIbindmethod\fP=\fBsimple\fP, and will be dismissed in the future.
|
||||
|
|
|
|||
|
|
@ -132,7 +132,7 @@ trying to return as much data as possible.
|
|||
If the value is set to \fBstop\fP, the search is terminated as soon
|
||||
as an error is returned by one target, and the error is immediately
|
||||
propagated to the client.
|
||||
If the value is set to \fBreport\fP, the search is continuated to the end
|
||||
If the value is set to \fBreport\fP, the search is continued to the end
|
||||
but, in case at least one target returned an error code, the first
|
||||
non-success error code is returned.
|
||||
|
||||
|
|
|
|||
|
|
@ -541,7 +541,7 @@ like this (by Robin Elfrink):
|
|||
1, 0, userid FROM unixusers
|
||||
UNION
|
||||
SELECT (2000000000+groupnummer),
|
||||
UPPER(CONCAT(CONCAT('cn=',groupnaam),',o=MyCompany,c=NL')),
|
||||
UPPER(CONCAT(CONCAT('cn=',groupname),',o=MyCompany,c=NL')),
|
||||
2, 0, groupnummer FROM groups;
|
||||
.fi
|
||||
|
||||
|
|
@ -643,7 +643,7 @@ As previously stated, this backend should not be considered
|
|||
a replacement of other data storage backends, but rather a gateway
|
||||
to existing RDBMS storages that need to be published in LDAP form.
|
||||
.LP
|
||||
The \fBhasSubordintes\fP operational attribute is honored by back-sql
|
||||
The \fBhasSubordinates\fP operational attribute is honored by back-sql
|
||||
in search results and in compare operations; it is partially honored
|
||||
also in filtering. Owing to design limitations, a (brain-dead?) filter
|
||||
of the form
|
||||
|
|
|
|||
|
|
@ -1157,7 +1157,7 @@ When using Mozilla NSS, TLSCertificateKeyFile specifies the name of
|
|||
a file that contains the password for the key for the certificate specified with
|
||||
TLSCertificateFile. The modutil command can be used to turn off password
|
||||
protection for the cert/key database. For example, if TLSCACertificatePath
|
||||
specifes /etc/openldap/certdb as the location of the cert/key database, use
|
||||
specifies /etc/openldap/certdb as the location of the cert/key database, use
|
||||
modutil to change the password to the empty string:
|
||||
.nf
|
||||
modutil \-dbdir /etc/openldap/certdb \-changepw 'NSS Certificate DB'
|
||||
|
|
|
|||
|
|
@ -82,7 +82,7 @@ option.
|
|||
.TP
|
||||
.B \-c
|
||||
Enable continue (ignore errors) mode.
|
||||
Multiple occorrences of
|
||||
Multiple occurrences of
|
||||
.B \-c
|
||||
make
|
||||
.BR slapcat (8)
|
||||
|
|
|
|||
|
|
@ -14,7 +14,7 @@
|
|||
*/
|
||||
|
||||
/*
|
||||
* This file works in confunction with OpenLDAP configure system.
|
||||
* This file works in conjunction with OpenLDAP configure system.
|
||||
* If you do no like the values below, adjust your configure options.
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -47,7 +47,7 @@
|
|||
**
|
||||
** If you fail to define LDAP_THREAD_SAFE when linking with
|
||||
** -lldap_r or define LDAP_THREAD_SAFE when linking with -lldap,
|
||||
** provided header definations and declarations may be incorrect.
|
||||
** provided header definitions and declarations may be incorrect.
|
||||
**
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -75,7 +75,7 @@ LDAP_F (int) ldap_utf8_isspace( const char * );
|
|||
LDAP_F (ber_len_t) ldap_utf8_strcspn( const char* str, const char *set);
|
||||
/* span characters in set, return bytes spanned */
|
||||
LDAP_F (ber_len_t) ldap_utf8_strspn( const char* str, const char *set);
|
||||
/* return first occurance of character in string */
|
||||
/* return first occurrence of character in string */
|
||||
LDAP_F (char *) ldap_utf8_strchr( const char* str, const char *chr);
|
||||
/* return first character of set in string */
|
||||
LDAP_F (char *) ldap_utf8_strpbrk( const char* str, const char *set);
|
||||
|
|
|
|||
|
|
@ -343,7 +343,7 @@ Slapi_PBlock *slapi_modrdn_internal( char * olddn, char * newrdn,
|
|||
int deloldrdn, LDAPControl **controls,
|
||||
int log_change );
|
||||
Slapi_PBlock *slapi_rename_internal( const char * olddn, const char *newrdn,
|
||||
const char *newsuperior, int delolrdn,
|
||||
const char *newsuperior, int deloldrdn,
|
||||
LDAPControl **controls, int log_change );
|
||||
void slapi_free_search_results_internal(Slapi_PBlock *pb);
|
||||
|
||||
|
|
@ -555,7 +555,7 @@ int slapi_x_backend_get_flags( const Slapi_Backend *be, unsigned long *flags );
|
|||
#define SLAPI_PLUGIN_DESCRIPTION 12
|
||||
#define SLAPI_PLUGIN_IDENTITY 13
|
||||
|
||||
/* internal opreations params */
|
||||
/* internal operations params */
|
||||
#define SLAPI_PLUGIN_INTOP_RESULT 15
|
||||
#define SLAPI_PLUGIN_INTOP_SEARCH_ENTRIES 16
|
||||
#define SLAPI_PLUGIN_INTOP_SEARCH_REFERRALS 17
|
||||
|
|
|
|||
|
|
@ -49,7 +49,7 @@ ber_get_option(
|
|||
return LBER_OPT_SUCCESS;
|
||||
|
||||
case LBER_OPT_MEMORY_INUSE:
|
||||
/* The memory inuse is a global variable on kernal implementations.
|
||||
/* The memory inuse is a global variable on kernel implementations.
|
||||
* This means that memory debug is shared by all LDAP processes
|
||||
* so for this variable to have much meaning, only one LDAP process
|
||||
* should be running and memory inuse should be initialized to zero
|
||||
|
|
@ -145,7 +145,7 @@ ber_set_option(
|
|||
return LBER_OPT_SUCCESS;
|
||||
|
||||
case LBER_OPT_MEMORY_INUSE:
|
||||
/* The memory inuse is a global variable on kernal implementations.
|
||||
/* The memory inuse is a global variable on kernel implementations.
|
||||
* This means that memory debug is shared by all LDAP processes
|
||||
* so for this variable to have much meaning, only one LDAP process
|
||||
* should be running and memory inuse should be initialized to zero
|
||||
|
|
|
|||
|
|
@ -15,7 +15,7 @@
|
|||
* <http://www.OpenLDAP.org/license.html>.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS:
|
||||
* This program was orignally developed by Kurt D. Zeilenga for inclusion in
|
||||
* This program was originally developed by Kurt D. Zeilenga for inclusion in
|
||||
* OpenLDAP Software.
|
||||
*/
|
||||
#include "portable.h"
|
||||
|
|
|
|||
|
|
@ -28,7 +28,7 @@
|
|||
|
||||
/*
|
||||
* A delete request looks like this:
|
||||
* DelRequet ::= DistinguishedName,
|
||||
* DelRequest ::= DistinguishedName,
|
||||
*/
|
||||
|
||||
BerElement *
|
||||
|
|
@ -157,7 +157,7 @@ ldap_delete( LDAP *ld, LDAP_CONST char *dn )
|
|||
|
||||
/*
|
||||
* A delete request looks like this:
|
||||
* DelRequet ::= DistinguishedName,
|
||||
* DelRequest ::= DistinguishedName,
|
||||
*/
|
||||
|
||||
Debug( LDAP_DEBUG_TRACE, "ldap_delete\n", 0, 0, 0 );
|
||||
|
|
|
|||
|
|
@ -322,7 +322,7 @@ ldap_parse_result(
|
|||
/* need to clean out misc items */
|
||||
if( tag != LBER_ERROR ) {
|
||||
if( lm->lm_msgtype == LDAP_RES_BIND ) {
|
||||
/* look for sasl result creditials */
|
||||
/* look for sasl result credentials */
|
||||
if ( ber_peek_tag( ber, &len ) == LDAP_TAG_SASL_RES_CREDS ) {
|
||||
/* skip 'em */
|
||||
tag = ber_scanf( ber, "x" );
|
||||
|
|
|
|||
|
|
@ -3198,7 +3198,7 @@ int ldap_dn2bv_x( LDAPDN dn, struct berval *bv, unsigned flags, void *ctx )
|
|||
* Sort of UFN for DCE DNs: a slash ('/') separated
|
||||
* global->local DN with no types; strictly speaking,
|
||||
* the naming context should be a domain, which is
|
||||
* written in DNS-style, e.g. dot-deparated.
|
||||
* written in DNS-style, e.g. dot-separated.
|
||||
*
|
||||
* Example:
|
||||
*
|
||||
|
|
|
|||
|
|
@ -204,7 +204,7 @@ sb_sasl_gssapi_encode(
|
|||
|
||||
pkt_len = 4 + wrapped.length;
|
||||
|
||||
/* Grow the packet buffer if neccessary */
|
||||
/* Grow the packet buffer if necessary */
|
||||
if ( dst->buf_size < pkt_len &&
|
||||
ber_pvt_sb_grow_buffer( dst, pkt_len ) < 0 )
|
||||
{
|
||||
|
|
@ -281,7 +281,7 @@ sb_sasl_gssapi_decode(
|
|||
return -1;
|
||||
}
|
||||
|
||||
/* Grow the packet buffer if neccessary */
|
||||
/* Grow the packet buffer if necessary */
|
||||
if ( dst->buf_size < unwrapped.length &&
|
||||
ber_pvt_sb_grow_buffer( dst, unwrapped.length ) < 0 )
|
||||
{
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@
|
|||
* <http://www.OpenLDAP.org/license.html>.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS:
|
||||
* This program was orignally developed by Kurt D. Zeilenga for inclusion in
|
||||
* This program was originally developed by Kurt D. Zeilenga for inclusion in
|
||||
* OpenLDAP Software.
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -81,7 +81,7 @@ ldap_create_passwordpolicy_control( LDAP *ld,
|
|||
|
||||
ctrl (IN) The address of an
|
||||
LDAPControl structure, either obtained
|
||||
by running thorugh the list of response controls or
|
||||
by running through the list of response controls or
|
||||
by a call to ldap_control_find().
|
||||
|
||||
exptimep (OUT) This result parameter is filled in with the number of seconds before
|
||||
|
|
|
|||
|
|
@ -118,7 +118,7 @@ ldap_parse_reference(
|
|||
free_and_return:
|
||||
|
||||
if( referralsp != NULL ) {
|
||||
/* provide references regradless of return code */
|
||||
/* provide references regardless of return code */
|
||||
*referralsp = refs;
|
||||
|
||||
} else {
|
||||
|
|
|
|||
|
|
@ -1073,7 +1073,7 @@ static int ldap_int_nextref(
|
|||
* The array will be free'd by this function when no longer needed
|
||||
* (IN) sref != 0 if following search reference
|
||||
* (OUT) errstrp = Place to return a string of referrals which could not be followed
|
||||
* (OUT) hadrefp = 1 if sucessfully followed referral
|
||||
* (OUT) hadrefp = 1 if successfully followed referral
|
||||
*
|
||||
* Return value - number of referrals followed
|
||||
*
|
||||
|
|
|
|||
|
|
@ -809,7 +809,7 @@ nextresp2:
|
|||
ldap_return_request( ld, lr, 0 );
|
||||
return( -1 ); /* fatal error */
|
||||
}
|
||||
lr->lr_res_errno = LDAP_SUCCESS; /* sucessfully chased referral */
|
||||
lr->lr_res_errno = LDAP_SUCCESS; /* successfully chased referral */
|
||||
if ( lr->lr_res_matched ) {
|
||||
LDAP_FREE( lr->lr_res_matched );
|
||||
lr->lr_res_matched = NULL;
|
||||
|
|
|
|||
|
|
@ -697,7 +697,7 @@ sb_sasl_generic_read( Sockbuf_IO_Desc *sbiod, void *buf, ber_len_t len)
|
|||
ret = sb_sasl_generic_pkt_length(p, (unsigned char *) p->sec_buf_in.buf_base,
|
||||
sbiod->sbiod_sb->sb_debug );
|
||||
|
||||
/* Grow the packet buffer if neccessary */
|
||||
/* Grow the packet buffer if necessary */
|
||||
if ( ( p->sec_buf_in.buf_size < (ber_len_t) ret ) &&
|
||||
ber_pvt_sb_grow_buffer( &p->sec_buf_in, ret ) < 0 )
|
||||
{
|
||||
|
|
|
|||
|
|
@ -1341,7 +1341,7 @@ parse_oids(const char **sp, int *code, const int allow_quoted)
|
|||
|
||||
/*
|
||||
* Strictly speaking, doing this here accepts whsp before the
|
||||
* ( at the begining of an oidlist, but this is harmless. Also,
|
||||
* ( at the beginning of an oidlist, but this is harmless. Also,
|
||||
* we are very liberal in what we accept as an OID. Maybe
|
||||
* refine later.
|
||||
*/
|
||||
|
|
|
|||
|
|
@ -87,7 +87,7 @@ static int countKeys(char *keyString)
|
|||
The pointer is updated to point to the next character
|
||||
after the sortkey being parsed.
|
||||
|
||||
key (OUT) Points to the address of an LDAPSortKey stucture
|
||||
key (OUT) Points to the address of an LDAPSortKey structure
|
||||
which has been allocated by this routine and
|
||||
initialized with information from the next sortkey.
|
||||
---------------------------------------------------------------------------*/
|
||||
|
|
|
|||
|
|
@ -402,7 +402,7 @@ main( int argc, char **argv )
|
|||
}
|
||||
break;
|
||||
|
||||
case 'b': /* asynch bind */
|
||||
case 'b': /* async bind */
|
||||
method = LDAP_AUTH_SIMPLE;
|
||||
get_line( dn, sizeof(dn), stdin, "dn? " );
|
||||
strcat( dn, dnsuffix );
|
||||
|
|
|
|||
|
|
@ -624,7 +624,7 @@ nss_parse_ciphers(const char *cipherstr, int cipher_list[ciphernum])
|
|||
(ciphers_def[i].strength & strength) ||
|
||||
(ciphers_def[i].version & protocol)) &&
|
||||
(cipher_list[i] != -1)) {
|
||||
/* Enable the NULL ciphers only if explicity
|
||||
/* Enable the NULL ciphers only if explicitly
|
||||
* requested */
|
||||
if (ciphers_def[i].attr & SSL_eNULL) {
|
||||
if (mask & SSL_eNULL)
|
||||
|
|
@ -1592,7 +1592,7 @@ tlsm_get_certdb_prefix( const char *certdir, char **realcertdir, char **prefix )
|
|||
}
|
||||
|
||||
/*
|
||||
* Currently mutiple MozNSS contexts share one certificate storage. When the
|
||||
* Currently multiple MozNSS contexts share one certificate storage. When the
|
||||
* certdb is being opened, only new certificates are added to the storage.
|
||||
* When different databases are used, conflicting nicknames make the
|
||||
* certificate lookup by the nickname impossible. In addition a token
|
||||
|
|
|
|||
|
|
@ -1196,7 +1196,7 @@ tlso_verify_cb( int ok, X509_STORE_CTX *ctx )
|
|||
*/
|
||||
subject = X509_get_subject_name( cert );
|
||||
issuer = X509_get_issuer_name( cert );
|
||||
/* X509_NAME_oneline, if passed a NULL buf, allocate memomry */
|
||||
/* X509_NAME_oneline, if passed a NULL buf, allocate memory */
|
||||
sname = X509_NAME_oneline( subject, NULL, 0 );
|
||||
iname = X509_NAME_oneline( issuer, NULL, 0 );
|
||||
if ( !ok ) certerr = (char *)X509_verify_cert_error_string( errnum );
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@
|
|||
* <http://www.OpenLDAP.org/license.html>.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS:
|
||||
* This program was orignally developed by Kurt D. Zeilenga for inclusion in
|
||||
* This program was originally developed by Kurt D. Zeilenga for inclusion in
|
||||
* OpenLDAP Software.
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@
|
|||
* <http://www.OpenLDAP.org/license.html>.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS:
|
||||
* This program was orignally developed by Kurt D. Zeilenga for inclusion
|
||||
* This program was originally developed by Kurt D. Zeilenga for inclusion
|
||||
* in OpenLDAP Software.
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@
|
|||
* <http://www.OpenLDAP.org/license.html>.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS:
|
||||
* This program was orignally developed by Kurt D. Zeilenga for inclusion in
|
||||
* This program was originally developed by Kurt D. Zeilenga for inclusion in
|
||||
* OpenLDAP Software.
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -272,7 +272,7 @@ ldap_create_vlv_control(
|
|||
contentCount INTEGER (0 .. maxInt),
|
||||
virtualListViewResult ENUMERATED {
|
||||
success (0),
|
||||
operatonsError (1),
|
||||
operationsError (1),
|
||||
unwillingToPerform (53),
|
||||
insufficientAccessRights (50),
|
||||
busy (51),
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@
|
|||
* <http://www.OpenLDAP.org/license.html>.
|
||||
*/
|
||||
/* ACKNOWLEDGEMENTS:
|
||||
* This program was orignally developed by Kurt D. Zeilenga for inclusion in
|
||||
* This program was originally developed by Kurt D. Zeilenga for inclusion in
|
||||
* OpenLDAP Software.
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -397,7 +397,7 @@ int ldap_pvt_thread_rdwr_wunlock( ldap_pvt_thread_rdwr_t *rwlock )
|
|||
* Currently they don't check if the calling thread is the one
|
||||
* that has the lock, just that there is a reader or writer.
|
||||
*
|
||||
* Basically sufficent for testing that places that should have
|
||||
* Basically sufficient for testing that places that should have
|
||||
* a lock are caught.
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -70,7 +70,7 @@
|
|||
* noabort - Do not abort() on errors.
|
||||
* noerror - Do not report errors. Implies noabort.
|
||||
* nocount - Do not report counts of unreleased resources.
|
||||
* nosync - Disable tests that use synchronizaion and thus
|
||||
* nosync - Disable tests that use synchronization and thus
|
||||
* clearly affect thread scheduling:
|
||||
* Implies nocount, and cancels threadID if that is set.
|
||||
* Note that if you turn on tracethreads or malloc
|
||||
|
|
@ -513,7 +513,7 @@ typedef void ldap_debug_thread_t;
|
|||
#else /* LDAP_THREAD_DEBUG_THREAD_ID */
|
||||
|
||||
/*
|
||||
* Thread ID tracking. Currently acieves little.
|
||||
* Thread ID tracking. Currently achieves little.
|
||||
* Should be either expanded or deleted.
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -111,7 +111,7 @@ struct ldap_int_thread_poolq_s {
|
|||
ldap_pvt_thread_cond_t ltp_cond;
|
||||
|
||||
/* ltp_pause == 0 ? <p_pending_list : &empty_pending_list,
|
||||
* maintaned to reduce work for pool_wrapper()
|
||||
* maintained to reduce work for pool_wrapper()
|
||||
*/
|
||||
ldap_int_tpool_plist_t *ltp_work_list;
|
||||
|
||||
|
|
|
|||
|
|
@ -57,7 +57,7 @@ CREATE_SUBDIRS = NO
|
|||
# Croatian, Czech, Danish, Dutch, Esperanto, Farsi, Finnish, French, German,
|
||||
# Greek, Hungarian, Italian, Japanese, Japanese-en (Japanese with English
|
||||
# messages), Korean, Korean-en, Lithuanian, Norwegian, Macedonian, Persian,
|
||||
# Polish, Portuguese, Romanian, Russian, Serbian, Serbian-Cyrilic, Slovak,
|
||||
# Polish, Portuguese, Romanian, Russian, Serbian, Serbian-Cyrillic, Slovak,
|
||||
# Slovene, Spanish, Swedish, Ukrainian, and Vietnamese.
|
||||
|
||||
OUTPUT_LANGUAGE = English
|
||||
|
|
@ -211,7 +211,7 @@ OPTIMIZE_OUTPUT_VHDL = NO
|
|||
# parses. With this tag you can assign which parser to use for a given extension.
|
||||
# Doxygen has a built-in mapping, but you can override or extend it using this
|
||||
# tag. The format is ext=language, where ext is a file extension, and language
|
||||
# is one of the parsers supported by doxygen: IDL, Java, Javascript, CSharp, C,
|
||||
# is one of the parsers supported by doxygen: IDL, Java, JavaScript, CSharp, C,
|
||||
# C++, D, PHP, Objective-C, Python, Fortran, VHDL, C, C++. For instance to make
|
||||
# doxygen treat .inc files as Fortran files (default is PHP), and .f files as C
|
||||
# (default is Fortran), use: inc=Fortran f=C. Note that for custom extensions
|
||||
|
|
@ -550,7 +550,7 @@ WARN_IF_UNDOCUMENTED = YES
|
|||
|
||||
WARN_IF_DOC_ERROR = YES
|
||||
|
||||
# This WARN_NO_PARAMDOC option can be abled to get warnings for
|
||||
# This WARN_NO_PARAMDOC option can be enabled to get warnings for
|
||||
# functions that are documented, but have no documentation for their parameters
|
||||
# or return value. If set to NO (the default) doxygen will only warn about
|
||||
# wrong or incomplete parameter documentation, but not about the absence of
|
||||
|
|
@ -1051,7 +1051,7 @@ EXT_LINKS_IN_WINDOW = NO
|
|||
|
||||
FORMULA_FONTSIZE = 10
|
||||
|
||||
# Use the FORMULA_TRANPARENT tag to determine whether or not the images
|
||||
# Use the FORMULA_TRANSPARENT tag to determine whether or not the images
|
||||
# generated for formulas are transparent PNGs. Transparent PNGs are
|
||||
# not supported properly for IE 6.0, but are supported on all modern browsers.
|
||||
# Note that when changing this option you need to delete any form_*.png files
|
||||
|
|
@ -1071,7 +1071,7 @@ SEARCHENGINE = YES
|
|||
|
||||
# When the SERVER_BASED_SEARCH tag is enabled the search engine will be
|
||||
# implemented using a PHP enabled web server instead of at the web client
|
||||
# using Javascript. Doxygen will generate the search PHP script and index
|
||||
# using JavaScript. Doxygen will generate the search PHP script and index
|
||||
# file to put on the web server. The advantage of the server
|
||||
# based approach is that it scales better to large projects and allows
|
||||
# full text search. The disadvances is that it is more difficult to setup
|
||||
|
|
|
|||
|
|
@ -576,7 +576,7 @@ int mdb_env_create(MDB_env **env);
|
|||
* <li>#MDB_NOTLS
|
||||
* Don't use Thread-Local Storage. Tie reader locktable slots to
|
||||
* #MDB_txn objects instead of to threads. I.e. #mdb_txn_reset() keeps
|
||||
* the slot reseved for the #MDB_txn object. A thread may use parallel
|
||||
* the slot reserved for the #MDB_txn object. A thread may use parallel
|
||||
* read-only transactions. A read-only transaction may span threads if
|
||||
* the user synchronizes its use. Applications that multiplex many
|
||||
* user threads over individual OS threads need this option. Such an
|
||||
|
|
|
|||
|
|
@ -44,7 +44,7 @@ ucstring_t *ucstring_create(unsigned long *source, unsigned long start,
|
|||
|
||||
void ucstring_free(ucstring_t *string)
|
||||
|
||||
This function will deallocate the memory used by the string, incuding the
|
||||
This function will deallocate the memory used by the string, including the
|
||||
string itself.
|
||||
|
||||
-----------------------------------------------------------------------------
|
||||
|
|
|
|||
|
|
@ -26,7 +26,7 @@ int uccomp(unsigned long ch1, unsigned long ch2, unsigned long *comp)
|
|||
.sp
|
||||
int uccomp_hangul(unsigned long *str, int len)
|
||||
.sp
|
||||
int uccanoncomp(unsiged long *str, int len)
|
||||
int uccanoncomp(unsigned long *str, int len)
|
||||
.nf
|
||||
struct ucnumber {
|
||||
int numerator;
|
||||
|
|
|
|||
|
|
@ -53,7 +53,7 @@ ustring_set_cursor_motion().
|
|||
|
||||
.TP 4
|
||||
.BR ucstring_free()
|
||||
This function will deallocate the memory used by the string, incuding the
|
||||
This function will deallocate the memory used by the string, including the
|
||||
string itself.
|
||||
|
||||
.TP 4
|
||||
|
|
|
|||
|
|
@ -33,7 +33,7 @@ Boyer-Moore searches on Unicode UCS2 text (handles high and low surrogates).
|
|||
|
||||
Assumptions:
|
||||
|
||||
o Search pattern and text already normalized in some fasion.
|
||||
o Search pattern and text already normalized in some fashion.
|
||||
|
||||
o Upper, lower, and title case conversions are one-to-one.
|
||||
|
||||
|
|
@ -94,7 +94,7 @@ Sample pseudo-code fragment.
|
|||
utbm_compile(pattern, patternlen, flags, pat);
|
||||
|
||||
/*
|
||||
* Find the first occurance of the search pattern in the text.
|
||||
* Find the first occurrence of the search pattern in the text.
|
||||
*/
|
||||
if (utbm_exec(pat, text, textlen, &match_start, &match_end))
|
||||
printf("MATCH: %ld %ld\n", match_start, match_end);
|
||||
|
|
|
|||
|
|
@ -36,7 +36,7 @@
|
|||
|
||||
/*
|
||||
* lutil_entropy() provides nbytes of entropy in buf.
|
||||
* Quality offerred is suitable for one-time uses, such as "once" keys.
|
||||
* Quality offered is suitable for one-time uses, such as "once" keys.
|
||||
* Values may not be suitable for multi-time uses.
|
||||
*
|
||||
* Note: Callers are encouraged to provide additional bytes of
|
||||
|
|
|
|||
|
|
@ -311,7 +311,7 @@ rewrite_context_apply(
|
|||
/*
|
||||
* OK means there were no errors or special return codes;
|
||||
* if res is defined, it means the rule matched and we
|
||||
* got a sucessful rewriting
|
||||
* got a successful rewriting
|
||||
*/
|
||||
case REWRITE_REGEXEC_OK:
|
||||
|
||||
|
|
|
|||
|
|
@ -1220,17 +1220,17 @@ OpenLDAPaciNormalizeRight(
|
|||
{
|
||||
ad = NULL;
|
||||
text = NULL;
|
||||
/* openldap 2.1 aci compabitibility [entry] -> entry */
|
||||
/* openldap 2.1 aci compatibility [entry] -> entry */
|
||||
if ( ber_bvstrcasecmp( &attr, &aci_bv[ ACI_BV_BR_ENTRY ] ) == 0 ) {
|
||||
ad = &adstatic;
|
||||
adstatic.ad_cname = aci_bv[ ACI_BV_ENTRY ];
|
||||
|
||||
/* openldap 2.1 aci compabitibility [children] -> children */
|
||||
/* openldap 2.1 aci compatibility [children] -> children */
|
||||
} else if ( ber_bvstrcasecmp( &attr, &aci_bv[ ACI_BV_BR_CHILDREN ] ) == 0 ) {
|
||||
ad = &adstatic;
|
||||
adstatic.ad_cname = aci_bv[ ACI_BV_CHILDREN ];
|
||||
|
||||
/* openldap 2.1 aci compabitibility [all] -> only [all] */
|
||||
/* openldap 2.1 aci compatibility [all] -> only [all] */
|
||||
} else if ( ber_bvstrcasecmp( &attr, &aci_bv[ ACI_BV_BR_ALL ] ) == 0 ) {
|
||||
ber_memfree_x( nattrs.bv_val, ctx );
|
||||
nattrs = aci_bv[ ACI_BV_BR_ALL ];
|
||||
|
|
|
|||
|
|
@ -659,7 +659,7 @@ at_add(
|
|||
*err = cname;
|
||||
|
||||
if ( !at->at_usage && at->at_no_user_mod ) {
|
||||
/* user attribute must be modifable */
|
||||
/* user attribute must be modifiable */
|
||||
code = SLAP_SCHERR_ATTR_BAD_USAGE;
|
||||
goto error_return;
|
||||
}
|
||||
|
|
@ -725,7 +725,7 @@ at_add(
|
|||
/*
|
||||
* Inherit definitions from superiors. We only check the
|
||||
* direct superior since that one has already inherited from
|
||||
* its own superiorss
|
||||
* its own superiors
|
||||
*/
|
||||
if ( sat->sat_sup ) {
|
||||
Syntax *syn = syn_find(sat->sat_sup->sat_syntax->ssyn_oid);
|
||||
|
|
|
|||
|
|
@ -425,7 +425,7 @@ typedef struct a_metatarget_t {
|
|||
#define META_BACK_CFG_MAX_PENDING_OPS 0x80
|
||||
#define META_BACK_CFG_MAX_TARGET_CONNS 0xFF
|
||||
/* the interval of the timeout checking loop in microseconds
|
||||
* possibly make this configurabe? */
|
||||
* possibly make this configurable? */
|
||||
#define META_BACK_CFG_MAX_TIMEOUT_LOOP 0x70000
|
||||
slap_mask_t mt_rep_flags;
|
||||
int mt_timeout_ops;
|
||||
|
|
|
|||
|
|
@ -85,7 +85,7 @@ dnssrv_back_referrals(
|
|||
hosts = ldap_str2charray( hostlist, " " );
|
||||
|
||||
if( hosts == NULL ) {
|
||||
Debug( LDAP_DEBUG_TRACE, "DNSSRV: str2charrary error\n", 0, 0, 0 );
|
||||
Debug( LDAP_DEBUG_TRACE, "DNSSRV: str2charray error\n", 0, 0, 0 );
|
||||
rs->sr_text = "problem processing DNS SRV records for DN";
|
||||
goto done;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -93,7 +93,7 @@ dnssrv_back_search(
|
|||
hosts = ldap_str2charray( hostlist, " " );
|
||||
|
||||
if( hosts == NULL ) {
|
||||
Debug( LDAP_DEBUG_TRACE, "DNSSRV: str2charrary error\n", 0, 0, 0 );
|
||||
Debug( LDAP_DEBUG_TRACE, "DNSSRV: str2charray error\n", 0, 0, 0 );
|
||||
send_ldap_error( op, rs, LDAP_OTHER,
|
||||
"problem processing DNS SRV records for DN" );
|
||||
goto done;
|
||||
|
|
|
|||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue