LDAP_SCHEMA


HOME

LDAP_SCHEMA

NAME
LIBRARY
SYNOPSIS
DESCRIPTION
SEE ALSO
ACKNOWLEDGEMENTS

NAME

ldap_str2syntax, ldap_syntax2str, ldap_syntax2name, ldap_syntax_free, ldap_str2matchingrule, ldap_matchingrule2str, ldap_matchingrule2name, ldap_matchingrule_free, ldap_str2attributetype, ldap_attributetype2str, ldap_attributetype2name, ldap_attributetype_free, ldap_str2objectclass, ldap_objectclass2str, ldap_objectclass2name, ldap_objectclass_free, ldap_scherr2str − Schema definition handling routines

LIBRARY

OpenLDAP LDAP (libldap, −lldap)

SYNOPSIS

#include <ldap.h>
#include <ldap_schema.h>

LDAPSyntax * ldap_str2syntax(s, code, errp, flags)
const char * s;
int * code;
const char ** errp;
const int flags;

char * ldap_syntax2str(syn)
const LDAPSyntax * syn;

const char * ldap_syntax2name(syn)
LDAPSyntax * syn;

ldap_syntax_free(syn)
LDAPSyntax * syn;

LDAPMatchingRule * ldap_str2matchingrule(s, code, errp, flags)
const char * s;
int * code;
const char ** errp;
const int flags;

char * ldap_matchingrule2str(mr);
const LDAPMatchingRule * mr;

const char * ldap_matchingrule2name(mr)
LDAPMatchingRule * mr;

ldap_matchingrule_free(mr)
LDAPMatchingRule * mr;

LDAPAttributeType * ldap_str2attributetype(s, code, errp, flags)
const char * s;
int * code;
const char ** errp;
const int flags;

char * ldap_attributetype2str(at)
const LDAPAttributeType * at;

const char * ldap_attributetype2name(at)
LDAPAttributeType * at;

ldap_attributetype_free(at)
LDAPAttributeType * at;

LDAPObjectClass * ldap_str2objectclass(s, code, errp, flags)
const char * s;
int * code;
const char ** errp;
const int flags;

char * ldap_objectclass2str(oc)
const LDAPObjectClass * oc;

const char * ldap_objectclass2name(oc)
LDAPObjectClass * oc;

ldap_objectclass_free(oc)
LDAPObjectClass * oc;

char * ldap_scherr2str(code)
int code;

DESCRIPTION

These routines are used to parse schema definitions in the syntax defined in RFC 4512 into structs and handle these structs. These routines handle four kinds of definitions: syntaxes, matching rules, attribute types and object classes. For each definition kind, four routines are provided.

ldap_str2xxx() takes a definition in RFC 4512 format in argument s as a NUL-terminated string and returns, if possible, a pointer to a newly allocated struct of the appropriate kind. The caller is responsible for freeing the struct by calling ldap_xxx_free() when not needed any longer. The routine returns NULL if some problem happened. In this case, the integer pointed at by argument code will receive an error code (see below the description of ldap_scherr2str() for an explanation of the values) and a pointer to a NUL-terminated string will be placed where requested by argument errp , indicating where in argument s the error happened, so it must not be freed by the caller. Argument flags is a bit mask of parsing options controlling the relaxation of the syntax recognized. The following values are defined:
LDAP_SCHEMA_ALLOW_NONE

strict parsing according to RFC 4512.

LDAP_SCHEMA_ALLOW_NO_OID

permit definitions that do not contain an initial OID.

LDAP_SCHEMA_ALLOW_QUOTED

permit quotes around some items that should not have them.

LDAP_SCHEMA_ALLOW_DESCR

permit a descr instead of a numeric OID in places where the syntax expect the latter.

LDAP_SCHEMA_ALLOW_DESCR_PREFIX

permit that the initial numeric OID contains a prefix in descr format.

LDAP_SCHEMA_ALLOW_ALL

be very liberal, include all options.

The structures returned are as follows:

typedef struct ldap_schema_extension_item {

char *lsei_name;

/* Extension name */

char **lsei_values;

/* Extension values */

} LDAPSchemaExtensionItem;

typedef struct ldap_syntax {

char *syn_oid;

/* OID */

char **syn_names;

/* Names */

char *syn_desc;

/* Description */

LDAPSchemaExtensionItem **syn_extensions; /* Extension */

} LDAPSyntax;

typedef struct ldap_matchingrule {

char *mr_oid;

/* OID */

char **mr_names;

/* Names */

char *mr_desc;

/* Description */

int mr_obsolete;

/* Is obsolete? */

char *mr_syntax_oid;

/* Syntax of asserted values */

LDAPSchemaExtensionItem **mr_extensions; /* Extensions */

} LDAPMatchingRule;

typedef struct ldap_attributetype {

char *at_oid;

/* OID */

char **at_names;

/* Names */

char *at_desc;

/* Description */

int at_obsolete;

/* Is obsolete? */

char *at_sup_oid;

/* OID of superior type */

char *at_equality_oid;

/* OID of equality matching rule */

char *at_ordering_oid;

/* OID of ordering matching rule */

char *at_substr_oid;

/* OID of substrings matching rule */

char *at_syntax_oid;

/* OID of syntax of values */

int at_syntax_len;

/* Suggested minimum maximum length */

int at_single_value;

/* Is single-valued? */

int at_collective;

/* Is collective? */

int at_no_user_mod;

/* Are changes forbidden through LDAP? */

int at_usage;

/* Usage, see below */

LDAPSchemaExtensionItem **at_extensions; /* Extensions */

} LDAPAttributeType;

typedef struct ldap_objectclass {

char *oc_oid;

/* OID */

char **oc_names;

/* Names */

char *oc_desc;

/* Description */

int oc_obsolete;

/* Is obsolete? */

char **oc_sup_oids;

/* OIDs of superior classes */

int oc_kind;

/* Kind, see below */

char **oc_at_oids_must;

/* OIDs of required attribute types */

char **oc_at_oids_may;

/* OIDs of optional attribute types */

LDAPSchemaExtensionItem **oc_extensions; /* Extensions */

} LDAPObjectClass;

Some integer fields (those described with a question mark) have a truth value, for these fields the possible values are:
LDAP_SCHEMA_NO

The answer to the question is no.

LDAP_SCHEMA_YES

The answer to the question is yes.

For attribute types, the following usages are possible:
LDAP_SCHEMA_USER_APPLICATIONS

the attribute type is non-operational.

LDAP_SCHEMA_DIRECTORY_OPERATION

the attribute type is operational and is pertinent to the directory itself, i.e. it has the same value on all servers that master the entry containing this attribute type.

LDAP_SCHEMA_DISTRIBUTED_OPERATION

the attribute type is operational and is pertinent to replication, shadowing or other distributed directory aspect. TBC.

LDAP_SCHEMA_DSA_OPERATION

the attribute type is operational and is pertinent to the directory server itself, i.e. it may have different values for the same entry when retrieved from different servers that master the entry.

Object classes can be of three kinds:
LDAP_SCHEMA_ABSTRACT

the object class is abstract, i.e. there cannot be entries of this class alone.

LDAP_SCHEMA_STRUCTURAL

the object class is structural, i.e. it describes the main role of the entry. On some servers, once the entry is created the set of structural object classes assigned cannot be changed: none of those present can be removed and none other can be added.

LDAP_SCHEMA_AUXILIARY

the object class is auxiliary, i.e. it is intended to go with other, structural, object classes. These can be added or removed at any time if attribute types are added or removed at the same time as needed by the set of object classes resulting from the operation.

Routines ldap_xxx2name() return a canonical name for the definition.

Routines ldap_xxx2str() return a string representation in the format described by RFC 4512 of the struct passed in the argument. The string is a newly allocated string that must be freed by the caller. These routines may return NULL if no memory can be allocated for the string.

ldap_scherr2str() returns a NUL-terminated string with a text description of the error found. This is a pointer to a static area, so it must not be freed by the caller. The argument code comes from one of the parsing routines and can adopt the following values:
LDAP_SCHERR_OUTOFMEM

Out of memory.

LDAP_SCHERR_UNEXPTOKEN

Unexpected token.

LDAP_SCHERR_NOLEFTPAREN

Missing opening parenthesis.

LDAP_SCHERR_NORIGHTPAREN

Missing closing parenthesis.

LDAP_SCHERR_NODIGIT

Expecting digit.

LDAP_SCHERR_BADNAME

Expecting a name.

LDAP_SCHERR_BADDESC

Bad description.

LDAP_SCHERR_BADSUP

Bad superiors.

LDAP_SCHERR_DUPOPT

Duplicate option.

LDAP_SCHERR_EMPTY

Unexpected end of data.

SEE ALSO

ldap(3)

ACKNOWLEDGEMENTS

OpenLDAP Software is developed and maintained by The OpenLDAP Project <http://www.openldap.org/>. OpenLDAP Software is derived from University of Michigan LDAP 3.3 Release.



More Linux Commands

manpages/XtSetArg.3.html
XtSetArg(3) - set and merge ArgLists - Linux manual page....
The XtSetArg function is usually used in a highly stylized manner to minimize the probability of making a mistake; for example: Arg args[20]; int n; n = 0; XtSe

manpages/Mail::SPF::Term.3pm.html
Mail::SPF::Term(3pm) - SPF record term class (Man Page).....
An object of class Mail::SPF::Term represents a term within an SPF record. Mail::SPF::Term cannot be instantiated directly. Create an instance of a concrete sub

manpages/Xutf8TextListToTextProperty.3.html
Xutf8TextListToTextProperty(3) - convert text lists and text
The XmbTextListToTextProperty, XwcTextListToTextProperty and Xutf8TextListToTextProperty functions set the specified XTextProperty value to a set of null-separa

manpages/slk_label_sp.3ncurses.html
slk_label_sp(3ncurses) - curses screen-pointer extension....
This implementation can be configured to provide a set of functions which improve the ability to manage multiple screens. This feature can be added to any of th

manpages/XSetWindowBackground.3.html
XSetWindowBackground(3) - change window attributes (ManPage)
Depending on the valuemask, the XChangeWindowAttributes function uses the window attributes in the XSetWindowAttributes structure to change the specified window

manpages/foomatic-rip.1.html
foomatic-rip(1) - Universal print filter/RIP wrapper........
foomatic-rip is a universal print filter which can be used as CUPS filter or stand-alone for spooler-less, direct printing. It has the following features: It tr

manpages/tk_optionMenu.n.html
tk_optionMenu(n) - Create an option menubutton and its menu
This procedure creates an option menubutton whose name is pathName, plus an associated menu. Together they allow the user to select one of the values given by t

manpages/Tk_GetVRootGeometry.3.html
Tk_GetVRootGeometry(3) - Get location and size of virtual ro
Tk_GetVRootGeometry returns geometry information about the virtual root window associated with tkwin. The associated virtual root is the one in which tkwins nea

manpages/systemd.snapshot.5.html
systemd.snapshot(5) - systemd snapshot units (Man Page).....
Snapshot units are not configured via unit configuration files. Nonetheless they are named similar to filenames. A unit whose name ends in .snapshot refers to a

manpages/unwrapdiff.1.html
unwrapdiff(1) - demangle word-wrapped patches (Man Page)....
unwrapdiff demangles patches that have been word-wrapped, in an attempt to make them useful. The corrected diff is sent to standard output. Note that you will p

manpages/getsid.2.html
getsid(2) - get session ID (System calls - Linux man page)
getsid(0) returns the session ID of the calling process. getsid(p) returns the session ID of the process with process ID p. (The session ID of a process is the

manpages/gnutls_x509_crt_set_crl_dist_points2.3.html
gnutls_x509_crt_set_crl_dist_points2(3) - API function......
gnutls_x509_crt_set_crl_dist_points2.3 - This function will set the CRL distribution points certificate extension. RETURNS On success, GNUTLS_E_SUCCESS (0) is r





We can't live, work or learn in freedom unless the software we use is free.