1 /* $NetBSD: add.c,v 1.1.1.6 2018/02/06 01:53:15 christos Exp $ */ 2 3 /* $OpenLDAP$ */ 4 /* This work is part of OpenLDAP Software <http://www.openldap.org/>. 5 * 6 * Copyright 1998-2017 The OpenLDAP Foundation. 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted only as authorized by the OpenLDAP 11 * Public License. 12 * 13 * A copy of this license is available in the file LICENSE in the 14 * top-level directory of the distribution or, alternatively, at 15 * <http://www.OpenLDAP.org/license.html>. 16 */ 17 /* Portions Copyright (c) 1995 Regents of the University of Michigan. 18 * All rights reserved. 19 * 20 * Redistribution and use in source and binary forms are permitted 21 * provided that this notice is preserved and that due credit is given 22 * to the University of Michigan at Ann Arbor. The name of the University 23 * may not be used to endorse or promote products derived from this 24 * software without specific prior written permission. This software 25 * is provided ``as is'' without express or implied warranty. 26 */ 27 28 #include <sys/cdefs.h> 29 __RCSID("$NetBSD: add.c,v 1.1.1.6 2018/02/06 01:53:15 christos Exp $"); 30 31 #include "portable.h" 32 33 #include <stdio.h> 34 #include <ac/string.h> 35 #include <ac/time.h> 36 #include <ac/socket.h> 37 38 #include "lutil.h" 39 #include "slap.h" 40 41 int 42 do_add( Operation *op, SlapReply *rs ) 43 { 44 BerElement *ber = op->o_ber; 45 char *last; 46 struct berval dn = BER_BVNULL; 47 ber_len_t len; 48 ber_tag_t tag; 49 Modifications *modlist = NULL; 50 Modifications **modtail = &modlist; 51 Modifications tmp; 52 char textbuf[ SLAP_TEXT_BUFLEN ]; 53 size_t textlen = sizeof( textbuf ); 54 int rc = 0; 55 int freevals = 1; 56 OpExtraDB oex; 57 58 Debug( LDAP_DEBUG_TRACE, "%s do_add\n", 59 op->o_log_prefix, 0, 0 ); 60 61 /* 62 * Parse the add request. It looks like this: 63 * 64 * AddRequest := [APPLICATION 14] SEQUENCE { 65 * name DistinguishedName, 66 * attrs SEQUENCE OF SEQUENCE { 67 * type AttributeType, 68 * values SET OF AttributeValue 69 * } 70 * } 71 */ 72 73 /* get the name */ 74 if ( ber_scanf( ber, "{m", /*}*/ &dn ) == LBER_ERROR ) { 75 Debug( LDAP_DEBUG_ANY, "%s do_add: ber_scanf failed\n", 76 op->o_log_prefix, 0, 0 ); 77 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" ); 78 return SLAPD_DISCONNECT; 79 } 80 81 Debug( LDAP_DEBUG_ARGS, "%s do_add: dn (%s)\n", 82 op->o_log_prefix, dn.bv_val, 0 ); 83 84 /* get the attrs */ 85 for ( tag = ber_first_element( ber, &len, &last ); tag != LBER_DEFAULT; 86 tag = ber_next_element( ber, &len, last ) ) 87 { 88 Modifications *mod; 89 ber_tag_t rtag; 90 91 tmp.sml_nvalues = NULL; 92 93 rtag = ber_scanf( ber, "{m{W}}", &tmp.sml_type, &tmp.sml_values ); 94 95 if ( rtag == LBER_ERROR ) { 96 Debug( LDAP_DEBUG_ANY, "%s do_add: decoding error\n", 97 op->o_log_prefix, 0, 0 ); 98 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" ); 99 rs->sr_err = SLAPD_DISCONNECT; 100 goto done; 101 } 102 103 if ( tmp.sml_values == NULL ) { 104 Debug( LDAP_DEBUG_ANY, "%s do_add: no values for type %s\n", 105 op->o_log_prefix, tmp.sml_type.bv_val, 0 ); 106 send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, 107 "no values for attribute type" ); 108 goto done; 109 } 110 111 mod = (Modifications *) ch_malloc( sizeof(Modifications) ); 112 mod->sml_op = LDAP_MOD_ADD; 113 mod->sml_flags = 0; 114 mod->sml_next = NULL; 115 mod->sml_desc = NULL; 116 mod->sml_type = tmp.sml_type; 117 mod->sml_values = tmp.sml_values; 118 mod->sml_nvalues = NULL; 119 120 *modtail = mod; 121 modtail = &mod->sml_next; 122 } 123 124 if ( ber_scanf( ber, /*{*/ "}") == LBER_ERROR ) { 125 Debug( LDAP_DEBUG_ANY, "%s do_add: ber_scanf failed\n", 126 op->o_log_prefix, 0, 0 ); 127 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" ); 128 rs->sr_err = SLAPD_DISCONNECT; 129 goto done; 130 } 131 132 if ( get_ctrls( op, rs, 1 ) != LDAP_SUCCESS ) { 133 Debug( LDAP_DEBUG_ANY, "%s do_add: get_ctrls failed\n", 134 op->o_log_prefix, 0, 0 ); 135 goto done; 136 } 137 138 rs->sr_err = dnPrettyNormal( NULL, &dn, &op->o_req_dn, &op->o_req_ndn, 139 op->o_tmpmemctx ); 140 141 if ( rs->sr_err != LDAP_SUCCESS ) { 142 Debug( LDAP_DEBUG_ANY, "%s do_add: invalid dn (%s)\n", 143 op->o_log_prefix, dn.bv_val, 0 ); 144 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid DN" ); 145 goto done; 146 } 147 148 op->ora_e = entry_alloc(); 149 ber_dupbv( &op->ora_e->e_name, &op->o_req_dn ); 150 ber_dupbv( &op->ora_e->e_nname, &op->o_req_ndn ); 151 152 Statslog( LDAP_DEBUG_STATS, "%s ADD dn=\"%s\"\n", 153 op->o_log_prefix, op->o_req_dn.bv_val, 0, 0, 0 ); 154 155 if ( modlist == NULL ) { 156 send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, 157 "no attributes provided" ); 158 goto done; 159 } 160 161 if ( dn_match( &op->ora_e->e_nname, &slap_empty_bv ) ) { 162 /* protocolError may be a more appropriate error */ 163 send_ldap_error( op, rs, LDAP_ALREADY_EXISTS, 164 "root DSE already exists" ); 165 goto done; 166 167 } else if ( dn_match( &op->ora_e->e_nname, &frontendDB->be_schemandn ) ) { 168 send_ldap_error( op, rs, LDAP_ALREADY_EXISTS, 169 "subschema subentry already exists" ); 170 goto done; 171 } 172 173 rs->sr_err = slap_mods_check( op, modlist, &rs->sr_text, 174 textbuf, textlen, NULL ); 175 176 if ( rs->sr_err != LDAP_SUCCESS ) { 177 send_ldap_result( op, rs ); 178 goto done; 179 } 180 181 /* temporary; remove if not invoking backend function */ 182 op->ora_modlist = modlist; 183 184 /* call this so global overlays/SLAPI have access to ora_e */ 185 rs->sr_err = slap_mods2entry( op->ora_modlist, &op->ora_e, 186 1, 0, &rs->sr_text, textbuf, textlen ); 187 if ( rs->sr_err != LDAP_SUCCESS ) { 188 send_ldap_result( op, rs ); 189 goto done; 190 } 191 192 freevals = 0; 193 194 oex.oe.oe_key = (void *)do_add; 195 oex.oe_db = NULL; 196 LDAP_SLIST_INSERT_HEAD(&op->o_extra, &oex.oe, oe_next); 197 198 op->o_bd = frontendDB; 199 rc = frontendDB->be_add( op, rs ); 200 LDAP_SLIST_REMOVE(&op->o_extra, &oex.oe, OpExtra, oe_next); 201 202 #ifdef LDAP_X_TXN 203 if ( rc == LDAP_X_TXN_SPECIFY_OKAY ) { 204 /* skip cleanup */ 205 return rc; 206 } else 207 #endif 208 if ( rc == 0 ) { 209 if ( op->ora_e != NULL && oex.oe_db != NULL ) { 210 BackendDB *bd = op->o_bd; 211 212 op->o_bd = oex.oe_db; 213 214 be_entry_release_w( op, op->ora_e ); 215 216 op->ora_e = NULL; 217 op->o_bd = bd; 218 } 219 } 220 221 done:; 222 if ( modlist != NULL ) { 223 /* in case of error, free the values as well */ 224 slap_mods_free( modlist, freevals ); 225 } 226 227 if ( op->ora_e != NULL ) { 228 entry_free( op->ora_e ); 229 } 230 op->o_tmpfree( op->o_req_dn.bv_val, op->o_tmpmemctx ); 231 op->o_tmpfree( op->o_req_ndn.bv_val, op->o_tmpmemctx ); 232 233 return rc; 234 } 235 236 int 237 fe_op_add( Operation *op, SlapReply *rs ) 238 { 239 Modifications **modtail = &op->ora_modlist; 240 int rc = 0; 241 BackendDB *op_be, *bd = op->o_bd; 242 char textbuf[ SLAP_TEXT_BUFLEN ]; 243 size_t textlen = sizeof( textbuf ); 244 245 /* 246 * We could be serving multiple database backends. Select the 247 * appropriate one, or send a referral to our "referral server" 248 * if we don't hold it. 249 */ 250 op->o_bd = select_backend( &op->ora_e->e_nname, 1 ); 251 if ( op->o_bd == NULL ) { 252 op->o_bd = bd; 253 rs->sr_ref = referral_rewrite( default_referral, 254 NULL, &op->ora_e->e_name, LDAP_SCOPE_DEFAULT ); 255 if ( !rs->sr_ref ) rs->sr_ref = default_referral; 256 if ( rs->sr_ref ) { 257 rs->sr_err = LDAP_REFERRAL; 258 send_ldap_result( op, rs ); 259 260 if ( rs->sr_ref != default_referral ) { 261 ber_bvarray_free( rs->sr_ref ); 262 } 263 } else { 264 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM, 265 "no global superior knowledge" ); 266 } 267 goto done; 268 } 269 270 /* If we've got a glued backend, check the real backend */ 271 op_be = op->o_bd; 272 if ( SLAP_GLUE_INSTANCE( op->o_bd )) { 273 op->o_bd = select_backend( &op->ora_e->e_nname, 0 ); 274 } 275 276 /* check restrictions */ 277 if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) { 278 send_ldap_result( op, rs ); 279 goto done; 280 } 281 282 /* check for referrals */ 283 if( backend_check_referrals( op, rs ) != LDAP_SUCCESS ) { 284 goto done; 285 } 286 287 rs->sr_err = slap_mods_obsolete_check( op, op->ora_modlist, 288 &rs->sr_text, textbuf, textlen ); 289 290 if ( rs->sr_err != LDAP_SUCCESS ) { 291 send_ldap_result( op, rs ); 292 goto done; 293 } 294 295 /* 296 * do the add if 1 && (2 || 3) 297 * 1) there is an add function implemented in this backend; 298 * 2) this backend is master for what it holds; 299 * 3) it's a replica and the dn supplied is the updatedn. 300 */ 301 if ( op->o_bd->be_add ) { 302 /* do the update here */ 303 int repl_user = be_isupdate( op ); 304 if ( !SLAP_SINGLE_SHADOW(op->o_bd) || repl_user ) { 305 int update = !BER_BVISEMPTY( &op->o_bd->be_update_ndn ); 306 307 op->o_bd = op_be; 308 309 if ( !update ) { 310 rs->sr_err = slap_mods_no_user_mod_check( op, op->ora_modlist, 311 &rs->sr_text, textbuf, textlen ); 312 313 if ( rs->sr_err != LDAP_SUCCESS ) { 314 send_ldap_result( op, rs ); 315 goto done; 316 } 317 } 318 319 if ( !repl_user ) { 320 /* go to the last mod */ 321 for ( modtail = &op->ora_modlist; 322 *modtail != NULL; 323 modtail = &(*modtail)->sml_next ) 324 { 325 assert( (*modtail)->sml_op == LDAP_MOD_ADD ); 326 assert( (*modtail)->sml_desc != NULL ); 327 } 328 329 330 /* check for unmodifiable attributes */ 331 rs->sr_err = slap_mods_no_repl_user_mod_check( op, 332 op->ora_modlist, &rs->sr_text, textbuf, textlen ); 333 if ( rs->sr_err != LDAP_SUCCESS ) { 334 send_ldap_result( op, rs ); 335 goto done; 336 } 337 } 338 339 rc = op->o_bd->be_add( op, rs ); 340 if ( rc == LDAP_SUCCESS ) { 341 OpExtra *oex; 342 /* NOTE: be_entry_release_w() is 343 * called by do_add(), so that global 344 * overlays on the way back can 345 * at least read the entry */ 346 LDAP_SLIST_FOREACH(oex, &op->o_extra, oe_next) { 347 if ( oex->oe_key == (void *)do_add ) { 348 ((OpExtraDB *)oex)->oe_db = op->o_bd; 349 break; 350 } 351 } 352 } 353 354 } else { 355 BerVarray defref = NULL; 356 357 defref = op->o_bd->be_update_refs 358 ? op->o_bd->be_update_refs : default_referral; 359 360 if ( defref != NULL ) { 361 rs->sr_ref = referral_rewrite( defref, 362 NULL, &op->ora_e->e_name, LDAP_SCOPE_DEFAULT ); 363 if ( rs->sr_ref == NULL ) rs->sr_ref = defref; 364 rs->sr_err = LDAP_REFERRAL; 365 if (!rs->sr_ref) rs->sr_ref = default_referral; 366 send_ldap_result( op, rs ); 367 368 if ( rs->sr_ref != default_referral ) { 369 ber_bvarray_free( rs->sr_ref ); 370 } 371 } else { 372 send_ldap_error( op, rs, 373 LDAP_UNWILLING_TO_PERFORM, 374 "shadow context; no update referral" ); 375 } 376 } 377 } else { 378 Debug( LDAP_DEBUG_ARGS, "do_add: no backend support\n", 0, 0, 0 ); 379 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM, 380 "operation not supported within namingContext" ); 381 } 382 383 done:; 384 op->o_bd = bd; 385 return rc; 386 } 387 388 int 389 slap_mods2entry( 390 Modifications *mods, 391 Entry **e, 392 int initial, 393 int dup, 394 const char **text, 395 char *textbuf, size_t textlen ) 396 { 397 Attribute **tail; 398 int i; 399 400 if ( initial ) { 401 assert( (*e)->e_attrs == NULL ); 402 } 403 404 for ( tail = &(*e)->e_attrs; *tail != NULL; tail = &(*tail)->a_next ) 405 ; 406 407 *text = textbuf; 408 409 for( ; mods != NULL; mods = mods->sml_next ) { 410 Attribute *attr; 411 412 assert( mods->sml_desc != NULL ); 413 414 attr = attr_find( (*e)->e_attrs, mods->sml_desc ); 415 416 if( attr != NULL ) { 417 #define SLURPD_FRIENDLY 418 #ifdef SLURPD_FRIENDLY 419 int j; 420 421 if ( !initial ) { 422 /* 423 * This check allows overlays to override operational 424 * attributes by setting them directly in the entry. 425 * We assume slap_mods_no_user_mod_check() was called 426 * with the user modifications. 427 */ 428 *text = NULL; 429 return LDAP_SUCCESS; 430 } 431 432 i = attr->a_numvals; 433 j = mods->sml_numvals; 434 attr->a_numvals += j; 435 j++; /* NULL */ 436 437 attr->a_vals = ch_realloc( attr->a_vals, 438 sizeof( struct berval ) * (i+j) ); 439 440 /* checked for duplicates in slap_mods_check */ 441 442 if ( dup ) { 443 for ( j = 0; mods->sml_values[j].bv_val; j++ ) { 444 ber_dupbv( &attr->a_vals[i+j], &mods->sml_values[j] ); 445 } 446 BER_BVZERO( &attr->a_vals[i+j] ); 447 j++; 448 } else { 449 AC_MEMCPY( &attr->a_vals[i], mods->sml_values, 450 sizeof( struct berval ) * j ); 451 } 452 453 if( mods->sml_nvalues ) { 454 attr->a_nvals = ch_realloc( attr->a_nvals, 455 sizeof( struct berval ) * (i+j) ); 456 if ( dup ) { 457 for ( j = 0; mods->sml_nvalues[j].bv_val; j++ ) { 458 ber_dupbv( &attr->a_nvals[i+j], &mods->sml_nvalues[j] ); 459 } 460 BER_BVZERO( &attr->a_nvals[i+j] ); 461 } else { 462 AC_MEMCPY( &attr->a_nvals[i], mods->sml_nvalues, 463 sizeof( struct berval ) * j ); 464 } 465 } else { 466 attr->a_nvals = attr->a_vals; 467 } 468 469 continue; 470 #else 471 snprintf( textbuf, textlen, 472 "attribute '%s' provided more than once", 473 mods->sml_desc->ad_cname.bv_val ); 474 *text = textbuf; 475 return LDAP_TYPE_OR_VALUE_EXISTS; 476 #endif 477 } 478 479 attr = attr_alloc( mods->sml_desc ); 480 481 /* move values to attr structure */ 482 i = mods->sml_numvals; 483 attr->a_numvals = mods->sml_numvals; 484 if ( dup ) { 485 attr->a_vals = (BerVarray) ch_calloc( i+1, sizeof( BerValue )); 486 for ( i = 0; mods->sml_values[i].bv_val; i++ ) { 487 ber_dupbv( &attr->a_vals[i], &mods->sml_values[i] ); 488 } 489 BER_BVZERO( &attr->a_vals[i] ); 490 } else { 491 attr->a_vals = mods->sml_values; 492 } 493 494 if ( mods->sml_nvalues ) { 495 if ( dup ) { 496 i = mods->sml_numvals; 497 attr->a_nvals = (BerVarray) ch_calloc( i+1, sizeof( BerValue )); 498 for ( i = 0; mods->sml_nvalues[i].bv_val; i++ ) { 499 ber_dupbv( &attr->a_nvals[i], &mods->sml_nvalues[i] ); 500 } 501 BER_BVZERO( &attr->a_nvals[i] ); 502 } else { 503 attr->a_nvals = mods->sml_nvalues; 504 } 505 } else { 506 attr->a_nvals = attr->a_vals; 507 } 508 509 *tail = attr; 510 tail = &attr->a_next; 511 } 512 513 *text = NULL; 514 515 return LDAP_SUCCESS; 516 } 517 518 int 519 slap_entry2mods( 520 Entry *e, 521 Modifications **mods, 522 const char **text, 523 char *textbuf, size_t textlen ) 524 { 525 Modifications *modhead = NULL; 526 Modifications *mod; 527 Modifications **modtail = &modhead; 528 Attribute *a_new; 529 AttributeDescription *a_new_desc; 530 int i, count; 531 532 a_new = e->e_attrs; 533 534 while ( a_new != NULL ) { 535 a_new_desc = a_new->a_desc; 536 mod = (Modifications *) ch_malloc( sizeof( Modifications )); 537 538 mod->sml_op = LDAP_MOD_REPLACE; 539 mod->sml_flags = 0; 540 541 mod->sml_type = a_new_desc->ad_cname; 542 543 count = a_new->a_numvals; 544 mod->sml_numvals = a_new->a_numvals; 545 546 mod->sml_values = (struct berval*) ch_malloc( 547 (count+1) * sizeof( struct berval) ); 548 549 /* see slap_mods_check() comments... 550 * if a_vals == a_nvals, there is no normalizer. 551 * in this case, mod->sml_nvalues must be left NULL. 552 */ 553 if ( a_new->a_vals != a_new->a_nvals ) { 554 mod->sml_nvalues = (struct berval*) ch_malloc( 555 (count+1) * sizeof( struct berval) ); 556 } else { 557 mod->sml_nvalues = NULL; 558 } 559 560 for ( i = 0; i < count; i++ ) { 561 ber_dupbv(mod->sml_values+i, a_new->a_vals+i); 562 if ( mod->sml_nvalues ) { 563 ber_dupbv( mod->sml_nvalues+i, a_new->a_nvals+i ); 564 } 565 } 566 567 mod->sml_values[count].bv_val = NULL; 568 mod->sml_values[count].bv_len = 0; 569 570 if ( mod->sml_nvalues ) { 571 mod->sml_nvalues[count].bv_val = NULL; 572 mod->sml_nvalues[count].bv_len = 0; 573 } 574 575 mod->sml_desc = a_new_desc; 576 mod->sml_next =NULL; 577 *modtail = mod; 578 modtail = &mod->sml_next; 579 a_new = a_new->a_next; 580 } 581 582 *mods = modhead; 583 584 return LDAP_SUCCESS; 585 } 586 587 int slap_add_opattrs( 588 Operation *op, 589 const char **text, 590 char *textbuf, 591 size_t textlen, 592 int manage_ctxcsn ) 593 { 594 struct berval name, timestamp, csn = BER_BVNULL; 595 struct berval nname, tmp; 596 char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; 597 char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ]; 598 Attribute *a; 599 600 if ( SLAP_LASTMOD( op->o_bd ) ) { 601 char *ptr; 602 int gotcsn = 0; 603 604 timestamp.bv_val = timebuf; 605 a = attr_find( op->ora_e->e_attrs, slap_schema.si_ad_entryCSN ); 606 if ( a ) { 607 gotcsn = 1; 608 csn = a->a_vals[0]; 609 } 610 if ( BER_BVISEMPTY( &op->o_csn )) { 611 if ( !gotcsn ) { 612 csn.bv_val = csnbuf; 613 csn.bv_len = sizeof(csnbuf); 614 slap_get_csn( op, &csn, manage_ctxcsn ); 615 } else { 616 if ( manage_ctxcsn ) 617 slap_queue_csn( op, &csn ); 618 } 619 } else { 620 csn = op->o_csn; 621 } 622 ptr = ber_bvchr( &csn, '#' ); 623 if ( ptr ) { 624 timestamp.bv_len = STRLENOF("YYYYMMDDHHMMSSZ"); 625 AC_MEMCPY( timebuf, csn.bv_val, timestamp.bv_len ); 626 timebuf[timestamp.bv_len-1] = 'Z'; 627 timebuf[timestamp.bv_len] = '\0'; 628 } else { 629 time_t now = slap_get_time(); 630 631 timestamp.bv_len = sizeof(timebuf); 632 633 slap_timestamp( &now, ×tamp ); 634 } 635 636 if ( BER_BVISEMPTY( &op->o_dn ) ) { 637 BER_BVSTR( &name, SLAPD_ANONYMOUS ); 638 nname = name; 639 } else { 640 name = op->o_dn; 641 nname = op->o_ndn; 642 } 643 644 a = attr_find( op->ora_e->e_attrs, 645 slap_schema.si_ad_entryUUID ); 646 if ( !a ) { 647 char uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ]; 648 649 tmp.bv_len = lutil_uuidstr( uuidbuf, sizeof( uuidbuf ) ); 650 tmp.bv_val = uuidbuf; 651 652 attr_merge_normalize_one( op->ora_e, 653 slap_schema.si_ad_entryUUID, &tmp, op->o_tmpmemctx ); 654 } 655 656 a = attr_find( op->ora_e->e_attrs, 657 slap_schema.si_ad_creatorsName ); 658 if ( !a ) { 659 attr_merge_one( op->ora_e, 660 slap_schema.si_ad_creatorsName, &name, &nname ); 661 } 662 663 a = attr_find( op->ora_e->e_attrs, 664 slap_schema.si_ad_createTimestamp ); 665 if ( !a ) { 666 attr_merge_one( op->ora_e, 667 slap_schema.si_ad_createTimestamp, ×tamp, NULL ); 668 } 669 670 if ( !gotcsn ) { 671 attr_merge_one( op->ora_e, 672 slap_schema.si_ad_entryCSN, &csn, NULL ); 673 } 674 675 a = attr_find( op->ora_e->e_attrs, 676 slap_schema.si_ad_modifiersName ); 677 if ( !a ) { 678 attr_merge_one( op->ora_e, 679 slap_schema.si_ad_modifiersName, &name, &nname ); 680 } 681 682 a = attr_find( op->ora_e->e_attrs, 683 slap_schema.si_ad_modifyTimestamp ); 684 if ( !a ) { 685 attr_merge_one( op->ora_e, 686 slap_schema.si_ad_modifyTimestamp, ×tamp, NULL ); 687 } 688 } 689 690 return LDAP_SUCCESS; 691 } 692