Lines Matching +defs:val +defs:to
4 * The contents of this file are subject to the terms of the
52 * The following are from libldap. Used to check if an attribute value
108 * mapping to the original mappped type. Either way, the DN will be
116 * is mapped to
175 * No attribute mapping. attrs[i] is going to be copied
176 * later. Restore "type\0value\0" back to
224 * mapping to the original mappped type. Either way, the DN will be
231 * is converted to
355 char *val = NS_LDAP_ATTR_VAL_SERVER_UNKNOWN;
361 val = NS_LDAP_ATTR_VAL_SERVER_ODSEE;
364 val = NS_LDAP_ATTR_VAL_SERVER_AD;
367 val = NS_LDAP_ATTR_VAL_SERVER_OPENLDAP;
370 val = NS_LDAP_ATTR_VAL_SERVER_OID;
373 val = NS_LDAP_ATTR_VAL_SERVER_UNKNOWN;
389 apair[i]->attrvalue[0] = strdup(val);
416 * Free the data structure used to track the processing of attributes
443 * machine to collect the next range of the attribute values.
447 * be created and added to the range_attr list in the
449 * TRUE, the control structure will be updated to have
492 * No more to be done.
724 * add 1 for "gecos" 1 to N attribute mapping,
762 * To speed up group member DN processing, we need to
822 * appended to it in __s_api_getEntry.
867 * for "gecos" 1 to N mapping,
870 * and append it to the end of the attribute list
894 * 1 to N attribute mapping processing
901 * need to know the number and order of the
967 * Need to process group member or memberof in DN format ?
1103 /* special processing for gecos 1 to up to 3 attribute mapping */
1113 * attribute which "gecos" attribute mapped to
1170 * realloc to add "," and
1239 * Attribute name in entry may be mapped to a different name
1240 * due to attribute mapping. The one containing range
1242 * one saved in ns_ldap_range attr_t to find duplicate.
1347 * current one to the end of it.
1369 * The attribute value array itself needs to be
1371 * pointers to these strings have just been
1441 const char *from, char **to)
1456 * We are not going to perform DN to domain mapping
1463 if (from == NULL || from[0] == '\0' || to == NULL)
1466 *to = NULL;
1485 *to = strdup(sptr->ldap_ret.ldap_u.buff);
1491 const char *from, const char *to)
1506 * We are not going to perform DN to domain mapping
1514 (to == NULL) || (to[0] == '\0'))
1527 to);
1547 /* if no space(s) to remove, return */
1728 * attributes that need to be passed to the
1730 * pointer "info->from_name" points to the locations
1734 * to indicate where these names start and end.
1736 * point to locations within the input filter string,
1737 * and are used at the end of this function to
1816 * for each valid "=" found, get the name to
1823 * look at the left side of "=" to see
1828 * Note that filter_c_next may not point to the
1830 * it points to the end of the last name processed + 2
1861 * ocname is the one needs to be mapped
1863 * skip spaces after "=" to find start
1902 * <key> is the one needs to be mapped
1928 * try to find automount's
2133 * validate filter to make sure it's legal
2210 * Reset rc to NS_LDAP_SUCCESS.
2245 * otherwise, reset the connection user to get ready
2246 * to use a new connection.
2265 * Reset rc to NS_LDAP_SUCCESS.
2299 /* set it up to use a connection opened for referral */
2326 * Reset rc to NS_LDAP_SUCCESS.
2585 /* add to referral list */
2621 /* add to referral list */
2671 /* add to referral list */
2740 /* add to referral list */
2794 * Attempt to obtain remnants of ldap responses and free them. If remnants are
2795 * not obtained within a certain time period tell the server we wish to abandon
2798 * Note that we do not initially tell the server to abandon the request as that
2799 * can be an expensive operation for the server, while it is cheap for us to
2802 * If something was to remain in libldap queue as a result of some error then
2816 * We need to cleanup the rest of response (if there is such)
2835 * If there was timeout then we will send ABANDON request to
2836 * LDAP server to decrease load.
2847 * This state machine performs one or more LDAP searches to a given
2900 * Set the flag to get ldap account management controls.
2956 * Free results if any, reset to the first
2999 * cookie->err_rc must be set to the ldap error code,
3000 * on exit, cookie->new_state will be set to the next
3001 * state to go, LDAP_ERROR, REINIT, or NEXT_SESSION.
3026 * LDAP SERVER_DOWN is due to idle timeout or
3111 * Do search if more range of values to get.
3113 * cookie and go to the NEXT_RESULT state to
3135 * Change/save the search related data in cookie to
3178 /* Server no good, may need to unwind request & retry */
3234 * have been retrieved, go back to
3254 * converted to ldap error code to see if it's a retry-able
3255 * error, if so, go to REINIT or NEXT_SESSION to retry.
3256 * Otherwise, go to DROP_SESSION then return to LDAP_ERROR
3257 * to exit the state machine.
3297 * Server no good, may need to unwind
3315 * does not want to block on ldap_result().
3390 * to the attribute type, then search the
3391 * same DN entry again to get the entire
3394 * to the NEXT_RESULT state to remove the
3396 * result message to prevent memory leaks.
3487 * to the attribute type, then search the
3488 * same entry again to get the rest of the
3619 "Connection to server lost."),
3688 * check the calling process' privilege to ensure it's
3689 * allowed to perform such operation.
3704 * to use privilege credentials.
3712 * privilege process to read shadow data.
3737 * We do not want to reuse connection (hence
3802 /* see if need to follow referrals */
3887 /* check_shadow() may add extra value to cookie->i_flags */
3934 * __ns_ldap_list_batch_end(). Add the cookie to our
3946 * If state machine init failed then copy error to the caller
3953 /* Copy results back to user */
3987 * __ns_ldap_list performs one or more LDAP searches to a given
4009 * support this. If you want to use this option call the API
4021 * handles 'extra_info_attr' and returns 'extra_info'. This is to allow
4022 * internal libsldap data, such as server type, to be requested/retured.
4046 * support this. If you want to use this option call the API
4065 * __ns_ldap_list_sort performs one or more LDAP searches to a given
4150 /* see if need to follow referrals */
4196 /* no need to perform attribute mapping on the DN */
4216 /* Copy results back to user */
4254 * __ns_ldap_read_dn reads a specific DN using LDAP search to a given
4306 * Add a LDAP search request to the batch.
4349 * to reinit and retry (max 3 times) on retriable LDAP errors.
4396 * to process all the requests added to the batch. The results (and errors)
4421 * to use that connection for ldap_search_ext or ldap_result.
4505 * This means that search_state_machine needs to do
4509 * the caller to process results from other cookies
4547 * find_domainname performs one or more LDAP searches to
4574 /* see if need to follow referrals */
4646 * __s_api_find_domainname performs one or more LDAP searches to
4780 /* see if need to follow referrals */
4803 /* check_shadow() may add extra value to cookie->i_flags */
4903 * handles 'extra_info_attr' and returns 'extra_info'. This is to allow
4904 * internal libsldap data, such as server type, to be requested/retured.
4999 /* Copy results back to user */
5189 * we want to retrieve the DN as it appears in LDAP
5244 * the domain parameter needs to be used in case domain is not local, if
5245 * this routine is to support multi domain setups, it needs lots of work...
5268 * we want to retrieve the DN as it appears in LDAP
5365 * removing rdn one by one from left to right
5393 * If it's nscd, ask cache manager to save the
5394 * dn to domain mapping(s)
5517 * to AAA. So dn could appers as
5522 * This function is called to covert the mapped attr back to
5546 * Check to see if there is a mapped attribute for auto_xxx
5581 gettext("Attribute nisMapName is mapped to an "
5660 * before adding to the directory
5733 static int unescape_filterval(char *val);
5735 static int adj_substring_filter(char *val);
5789 * the x. We have to find the paren matching
5942 /* now we have "(filter)" with str pointing to it */
6101 * sequences within the null-terminated string 'val'.
6103 * If 'val' contains invalid escape sequences we return -1.
6107 unescape_filterval(char *val)
6114 for (s = val; *s; s++) {
6149 * convert character 'c' that represents a hexadecimal digit to an integer.
6169 adj_substring_filter(char *val)
6173 for (; val != NULL; val = nextstar) {
6174 if ((nextstar = find_star(val)) != NULL) {
6178 if (*val != '\0') {
6179 if (unescape_filterval(val) < 0) {
6214 * Set the account management request control that needs to be sent to server.
6215 * This control is required to get the account management information of
6216 * a user to do local account checking.
6257 * servers (see below comments for parse_acct_cont_resp_msg() to get more
6262 * +b: TRUE if inactive due to account inactivation
6294 * Look at what more_info BER element is/are left to be decoded.
6378 * server 5.2p4 (see below comments for parse_acct_cont_resp_msg() to get more
6415 /* this is a success case, break to exit */
6465 * **** This function needs to be moved to libldap library ****
6466 * parse_acct_cont_resp_msg() parses the message received by server according to
6483 * #define used to make the difference between coding style as done
6587 /* this is a success case, break to exit */
6595 * left to be decoded.
6615 * Nothing else to decode; this is valid and we
6625 * Look at what more_info BER element is/are left to
6668 /* see if need to follow referrals */
6755 /* Copy results back to user */
6779 * request to do a search on the server for the user in question. The
6781 * Input params: username of whose account mgmt information is to be got
6782 * pointer to hold the parsed account management information