1 /*	$NetBSD: slapd-tester.c,v 1.3 2021/08/14 16:15:03 christos Exp $	*/
2 
3 /* $OpenLDAP$ */
4 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5  *
6  * Copyright 1999-2021 The OpenLDAP Foundation.
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted only as authorized by the OpenLDAP
11  * Public License.
12  *
13  * A copy of this license is available in file LICENSE in the
14  * top-level directory of the distribution or, alternatively, at
15  * <http://www.OpenLDAP.org/license.html>.
16  */
17 /* ACKNOWLEDGEMENTS:
18  * This work was initially developed by Kurt Spanier for inclusion
19  * in OpenLDAP Software.
20  */
21 
22 #include <sys/cdefs.h>
23 __RCSID("$NetBSD: slapd-tester.c,v 1.3 2021/08/14 16:15:03 christos Exp $");
24 
25 #include "portable.h"
26 
27 #include <stdio.h>
28 
29 #include "ac/stdlib.h"
30 
31 #include "ac/ctype.h"
32 #include "ac/dirent.h"
33 #include "ac/param.h"
34 #include "ac/socket.h"
35 #include "ac/string.h"
36 #include "ac/unistd.h"
37 #include "ac/wait.h"
38 
39 
40 #include "ldap_defaults.h"
41 #include "lutil.h"
42 
43 #include "ldap.h"
44 #include "ldap_pvt.h"
45 #include "lber_pvt.h"
46 #include "slapd-common.h"
47 
48 #ifdef _WIN32
49 #define EXE		".exe"
50 #else
51 #define EXE
52 #endif
53 
54 #define SEARCHCMD		"slapd-search" EXE
55 #define READCMD			"slapd-read" EXE
56 #define ADDCMD			"slapd-addel" EXE
57 #define MODRDNCMD		"slapd-modrdn" EXE
58 #define MODIFYCMD		"slapd-modify" EXE
59 #define BINDCMD			"slapd-bind" EXE
60 #define MAXARGS      		100
61 #define MAXREQS			5000
62 #define LOOPS			100
63 #define OUTERLOOPS		"1"
64 #define RETRIES			"0"
65 
66 #define TSEARCHFILE		"do_search.0"
67 #define TREADFILE		"do_read.0"
68 #define TADDFILE		"do_add."
69 #define TMODRDNFILE		"do_modrdn.0"
70 #define TMODIFYFILE		"do_modify.0"
71 #define TBINDFILE		"do_bind.0"
72 
73 static char *get_file_name( char *dirname, char *filename );
74 static int  get_search_filters( char *filename, char *filters[], char *attrs[], char *bases[], LDAPURLDesc *luds[] );
75 static int  get_read_entries( char *filename, char *entries[], char *filters[] );
76 static void fork_child( char *prog, char **args );
77 static void	wait4kids( int nkidval );
78 
79 static int      maxkids = 20;
80 static int      nkids;
81 
82 #ifdef HAVE_WINSOCK
83 static HANDLE	*children;
84 static char argbuf[BUFSIZ];
85 #define	ArgDup(x) strdup(strcat(strcat(strcpy(argbuf,"\""),x),"\""))
86 #else
87 #define	ArgDup(x) strdup(x)
88 #endif
89 
90 static void
usage(char * name,char opt)91 usage( char *name, char opt )
92 {
93 	if ( opt ) {
94 		fprintf( stderr, "%s: unable to handle option \'%c\'\n\n",
95 			name, opt );
96 	}
97 
98 	fprintf( stderr,
99 		"usage: %s "
100 		"-H <uri> "
101 		"-D <manager> "
102 		"-w <passwd> "
103 		"-d <datadir> "
104 		"[-i <ignore>] "
105 		"[-j <maxchild>] "
106 		"[-l {<loops>|<type>=<loops>[,...]}] "
107 		"[-L <outerloops>] "
108 		"-P <progdir> "
109 		"[-r <maxretries>] "
110 		"[-t <delay>] "
111 		"[-C] "
112 		"[-F] "
113 		"[-I] "
114 		"[-N]\n",
115 		name );
116 	exit( EXIT_FAILURE );
117 }
118 
119 int
main(int argc,char ** argv)120 main( int argc, char **argv )
121 {
122 	int		i, j;
123 	char		*uri = NULL;
124 	char		*manager = NULL;
125 	char		*passwd = NULL;
126 	char		*dirname = NULL;
127 	char		*progdir = NULL;
128 	int		loops = LOOPS;
129 	char		*outerloops = OUTERLOOPS;
130 	char		*retries = RETRIES;
131 	char		*delay = "0";
132 	DIR		*datadir;
133 	struct dirent	*file;
134 	int		friendly = 0;
135 	int		chaserefs = 0;
136 	int		noattrs = 0;
137 	int		nobind = 0;
138 	int		noinit = 1;
139 	char		*ignore = NULL;
140 	/* search */
141 	char		*sfile = NULL;
142 	char		*sreqs[MAXREQS];
143 	char		*sattrs[MAXREQS];
144 	char		*sbase[MAXREQS];
145 	LDAPURLDesc	*slud[MAXREQS];
146 	int		snum = 0;
147 	char		*sargs[MAXARGS];
148 	int		sanum;
149 	int		sextra_args = 0;
150 	char		scmd[MAXPATHLEN];
151 	int		swamp = 0;
152 	char		swampopt[sizeof("-SSS")];
153 	/* static so that its address can be used in initializer below. */
154 	static char	sloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
155 	/* read */
156 	char		*rfile = NULL;
157 	char		*rreqs[MAXREQS];
158 	int		rnum = 0;
159 	char		*rargs[MAXARGS];
160 	char		*rflts[MAXREQS];
161 	int		ranum;
162 	int		rextra_args = 0;
163 	char		rcmd[MAXPATHLEN];
164 	static char	rloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
165 	/* addel */
166 	char		*afiles[MAXREQS];
167 	int		anum = 0;
168 	char		*aargs[MAXARGS];
169 	int		aanum;
170 	char		acmd[MAXPATHLEN];
171 	static char	aloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
172 	/* modrdn */
173 	char		*nfile = NULL;
174 	char		*nreqs[MAXREQS];
175 	int		nnum = 0;
176 	char		*nargs[MAXARGS];
177 	int		nanum;
178 	char		ncmd[MAXPATHLEN];
179 	static char	nloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
180 	/* modify */
181 	char		*mfile = NULL;
182 	char		*mreqs[MAXREQS];
183 	char		*mdn[MAXREQS];
184 	int		mnum = 0;
185 	char		*margs[MAXARGS];
186 	int		manum;
187 	char		mcmd[MAXPATHLEN];
188 	static char	mloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
189 	/* bind */
190 	char		*bfile = NULL;
191 	char		*breqs[MAXREQS];
192 	char		*bcreds[MAXREQS];
193 	char		*battrs[MAXREQS];
194 	int		bnum = 0;
195 	char		*bargs[MAXARGS];
196 	int		banum;
197 	char		bcmd[MAXPATHLEN];
198 	static char	bloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
199 	char		**bargs_extra = NULL;
200 
201 	char		*friendlyOpt = NULL;
202 	int		pw_ask = 0;
203 	char		*pw_file = NULL;
204 
205 	/* extra action to do after bind... */
206 	typedef struct extra_t {
207 		char		*action;
208 		struct extra_t	*next;
209 	}		extra_t;
210 
211 	extra_t		*extra = NULL;
212 	int		nextra = 0;
213 
214 	tester_init( "slapd-tester", TESTER_TESTER );
215 
216 	sloops[0] = '\0';
217 	rloops[0] = '\0';
218 	aloops[0] = '\0';
219 	nloops[0] = '\0';
220 	mloops[0] = '\0';
221 	bloops[0] = '\0';
222 
223 	while ( ( i = getopt( argc, argv, "AB:CD:d:FH:h:Ii:j:L:l:NP:p:r:St:Ww:y:" ) ) != EOF )
224 	{
225 		switch ( i ) {
226 		case 'A':
227 			noattrs++;
228 			break;
229 
230 		case 'B': {
231 			char	**p,
232 				**b = ldap_str2charray( optarg, "," );
233 			extra_t	**epp;
234 
235 			for ( epp = &extra; *epp; epp = &(*epp)->next )
236 				;
237 
238 			for ( p = b; p[0]; p++ ) {
239 				*epp = calloc( 1, sizeof( extra_t ) );
240 				(*epp)->action = p[0];
241 				epp = &(*epp)->next;
242 				nextra++;
243 			}
244 
245 			ldap_memfree( b );
246 			} break;
247 
248 		case 'C':
249 			chaserefs++;
250 			break;
251 
252 		case 'D':		/* slapd manager */
253 			manager = ArgDup( optarg );
254 			break;
255 
256 		case 'd':		/* data directory */
257 			dirname = optarg;
258 			break;
259 
260 		case 'F':
261 			friendly++;
262 			break;
263 
264 		case 'H':		/* slapd uri */
265 			uri = optarg;
266 			break;
267 
268 		case 'I':
269 			noinit = 0;
270 			break;
271 
272 		case 'i':
273 			ignore = optarg;
274 			break;
275 
276 		case 'j':		/* the number of parallel clients */
277 			if ( lutil_atoi( &maxkids, optarg ) != 0 ) {
278 				usage( argv[0], 'j' );
279 			}
280 			break;
281 
282 		case 'l':		/* the number of loops per client */
283 			if ( !isdigit( (unsigned char) optarg[0] ) ) {
284 				char	**p,
285 					**l = ldap_str2charray( optarg, "," );
286 
287 				for ( p = l; p[0]; p++) {
288 					struct {
289 						struct berval	type;
290 						char		*buf;
291 					} types[] = {
292 						{ BER_BVC( "add=" ),	aloops },
293 						{ BER_BVC( "bind=" ),	bloops },
294 						{ BER_BVC( "modify=" ),	mloops },
295 						{ BER_BVC( "modrdn=" ),	nloops },
296 						{ BER_BVC( "read=" ),	rloops },
297 						{ BER_BVC( "search=" ),	sloops },
298 						{ BER_BVNULL,		NULL }
299 					};
300 					int	c, n;
301 
302 					for ( c = 0; types[c].type.bv_val; c++ ) {
303 						if ( strncasecmp( p[0], types[c].type.bv_val, types[c].type.bv_len ) == 0 ) {
304 							break;
305 						}
306 					}
307 
308 					if ( types[c].type.bv_val == NULL ) {
309 						usage( argv[0], 'l' );
310 					}
311 
312 					if ( lutil_atoi( &n, &p[0][types[c].type.bv_len] ) != 0 ) {
313 						usage( argv[0], 'l' );
314 					}
315 
316 					snprintf( types[c].buf, sizeof( aloops ), "%d", n );
317 				}
318 
319 				ldap_charray_free( l );
320 
321 			} else if ( lutil_atoi( &loops, optarg ) != 0 ) {
322 				usage( argv[0], 'l' );
323 			}
324 			break;
325 
326 		case 'L':		/* the number of outerloops per client */
327 			outerloops = optarg;
328 			break;
329 
330 		case 'N':
331 			nobind++;
332 			break;
333 
334 		case 'P':		/* prog directory */
335 			progdir = optarg;
336 			break;
337 
338 		case 'r':		/* the number of retries in case of error */
339 			retries = optarg;
340 			break;
341 
342 		case 'S':
343 			swamp++;
344 			break;
345 
346 		case 't':		/* the delay in seconds between each retry */
347 			delay = optarg;
348 			break;
349 
350 		case 'w':		/* the managers passwd */
351 			passwd = ArgDup( optarg );
352 			memset( optarg, '*', strlen( optarg ) );
353 			break;
354 
355 		case 'W':
356 			pw_ask++;
357 			break;
358 
359 		case 'y':
360 			pw_file = optarg;
361 			break;
362 
363 		default:
364 			usage( argv[0], '\0' );
365 			break;
366 		}
367 	}
368 
369 	if (( dirname == NULL ) || ( uri == NULL ) ||
370 			( manager == NULL ) || ( passwd == NULL ) || ( progdir == NULL ))
371 	{
372 		usage( argv[0], '\0' );
373 	}
374 
375 #ifdef HAVE_WINSOCK
376 	children = malloc( maxkids * sizeof(HANDLE) );
377 #endif
378 	/* get the file list */
379 	if ( ( datadir = opendir( dirname )) == NULL ) {
380 		fprintf( stderr, "%s: couldn't open data directory \"%s\".\n",
381 					argv[0], dirname );
382 		exit( EXIT_FAILURE );
383 	}
384 
385 	/*  look for search, read, modrdn, and add/delete files */
386 	for ( file = readdir( datadir ); file; file = readdir( datadir )) {
387 
388 		if ( !strcasecmp( file->d_name, TSEARCHFILE )) {
389 			sfile = get_file_name( dirname, file->d_name );
390 			continue;
391 		} else if ( !strcasecmp( file->d_name, TREADFILE )) {
392 			rfile = get_file_name( dirname, file->d_name );
393 			continue;
394 		} else if ( !strcasecmp( file->d_name, TMODRDNFILE )) {
395 			nfile = get_file_name( dirname, file->d_name );
396 			continue;
397 		} else if ( !strcasecmp( file->d_name, TMODIFYFILE )) {
398 			mfile = get_file_name( dirname, file->d_name );
399 			continue;
400 		} else if ( !strncasecmp( file->d_name, TADDFILE, strlen( TADDFILE ))
401 			&& ( anum < MAXREQS )) {
402 			afiles[anum++] = get_file_name( dirname, file->d_name );
403 			continue;
404 		} else if ( !strcasecmp( file->d_name, TBINDFILE )) {
405 			bfile = get_file_name( dirname, file->d_name );
406 			continue;
407 		}
408 	}
409 
410 	closedir( datadir );
411 
412 	if ( pw_ask ) {
413 		passwd = getpassphrase( _("Enter LDAP Password: ") );
414 
415 	} else if ( pw_file ) {
416 		struct berval	pw;
417 
418 		if ( lutil_get_filed_password( pw_file, &pw ) ) {
419 			exit( EXIT_FAILURE );
420 		}
421 
422 		passwd = pw.bv_val;
423 	}
424 
425 	if ( !sfile && !rfile && !nfile && !mfile && !bfile && !anum ) {
426 		fprintf( stderr, "no data files found.\n" );
427 		exit( EXIT_FAILURE );
428 	}
429 
430 	/* look for search requests */
431 	if ( sfile ) {
432 		snum = get_search_filters( sfile, sreqs, sattrs, sbase, slud );
433 		if ( snum < 0 ) {
434 			fprintf( stderr,
435 				"unable to parse file \"%s\" line %d\n",
436 				sfile, -2*(snum + 1));
437 			exit( EXIT_FAILURE );
438 		}
439 	}
440 
441 	/* look for read requests */
442 	if ( rfile ) {
443 		rnum = get_read_entries( rfile, rreqs, rflts );
444 		if ( rnum < 0 ) {
445 			fprintf( stderr,
446 				"unable to parse file \"%s\" line %d\n",
447 				rfile, -2*(rnum + 1) );
448 			exit( EXIT_FAILURE );
449 		}
450 	}
451 
452 	/* look for modrdn requests */
453 	if ( nfile ) {
454 		nnum = get_read_entries( nfile, nreqs, NULL );
455 		if ( nnum < 0 ) {
456 			fprintf( stderr,
457 				"unable to parse file \"%s\" line %d\n",
458 				nfile, -2*(nnum + 1) );
459 			exit( EXIT_FAILURE );
460 		}
461 	}
462 
463 	/* look for modify requests */
464 	if ( mfile ) {
465 		mnum = get_search_filters( mfile, mreqs, NULL, mdn, NULL );
466 		if ( mnum < 0 ) {
467 			fprintf( stderr,
468 				"unable to parse file \"%s\" line %d\n",
469 				mfile, -2*(mnum + 1) );
470 			exit( EXIT_FAILURE );
471 		}
472 	}
473 
474 	/* look for bind requests */
475 	if ( bfile ) {
476 		bnum = get_search_filters( bfile, bcreds, battrs, breqs, NULL );
477 		if ( bnum < 0 ) {
478 			fprintf( stderr,
479 				"unable to parse file \"%s\" line %d\n",
480 				bfile, -2*(bnum + 1) );
481 			exit( EXIT_FAILURE );
482 		}
483 	}
484 
485 	/* setup friendly option */
486 	switch ( friendly ) {
487 	case 0:
488 		break;
489 
490 	case 1:
491 		friendlyOpt = "-F";
492 		break;
493 
494 	default:
495 		/* NOTE: right now we don't need it more than twice */
496 	case 2:
497 		friendlyOpt = "-FF";
498 		break;
499 	}
500 
501 	/* setup swamp option */
502 	if ( swamp ) {
503 		swampopt[0] = '-';
504 		if ( swamp > 3 ) swamp = 3;
505 		swampopt[swamp + 1] = '\0';
506 		for ( ; swamp-- > 0; ) swampopt[swamp + 1] = 'S';
507 	}
508 
509 	/* setup loop options */
510 	if ( sloops[0] == '\0' ) snprintf( sloops, sizeof( sloops ), "%d", 10 * loops );
511 	if ( rloops[0] == '\0' ) snprintf( rloops, sizeof( rloops ), "%d", 20 * loops );
512 	if ( aloops[0] == '\0' ) snprintf( aloops, sizeof( aloops ), "%d", loops );
513 	if ( nloops[0] == '\0' ) snprintf( nloops, sizeof( nloops ), "%d", loops );
514 	if ( mloops[0] == '\0' ) snprintf( mloops, sizeof( mloops ), "%d", loops );
515 	if ( bloops[0] == '\0' ) snprintf( bloops, sizeof( bloops ), "%d", 20 * loops );
516 
517 	/*
518 	 * generate the search clients
519 	 */
520 
521 	sanum = 0;
522 	snprintf( scmd, sizeof scmd, "%s" LDAP_DIRSEP SEARCHCMD,
523 		progdir );
524 	sargs[sanum++] = scmd;
525 	sargs[sanum++] = "-H";
526 	sargs[sanum++] = uri;
527 	sargs[sanum++] = "-D";
528 	sargs[sanum++] = manager;
529 	sargs[sanum++] = "-w";
530 	sargs[sanum++] = passwd;
531 	sargs[sanum++] = "-l";
532 	sargs[sanum++] = sloops;
533 	sargs[sanum++] = "-L";
534 	sargs[sanum++] = outerloops;
535 	sargs[sanum++] = "-r";
536 	sargs[sanum++] = retries;
537 	sargs[sanum++] = "-t";
538 	sargs[sanum++] = delay;
539 	if ( friendly ) {
540 		sargs[sanum++] = friendlyOpt;
541 	}
542 	if ( chaserefs ) {
543 		sargs[sanum++] = "-C";
544 	}
545 	if ( noattrs ) {
546 		sargs[sanum++] = "-A";
547 	}
548 	if ( nobind ) {
549 		sargs[sanum++] = "-N";
550 	}
551 	if ( ignore ) {
552 		sargs[sanum++] = "-i";
553 		sargs[sanum++] = ignore;
554 	}
555 	if ( swamp ) {
556 		sargs[sanum++] = swampopt;
557 	}
558 	sargs[sanum++] = "-b";
559 	sargs[sanum++] = NULL;		/* will hold the search base */
560 	sargs[sanum++] = "-s";
561 	sargs[sanum++] = NULL;		/* will hold the search scope */
562 	sargs[sanum++] = "-f";
563 	sargs[sanum++] = NULL;		/* will hold the search request */
564 
565 	sargs[sanum++] = NULL;
566 	sargs[sanum++] = NULL;		/* might hold the "attr" request */
567 	sextra_args += 2;
568 
569 	sargs[sanum] = NULL;
570 
571 	/*
572 	 * generate the read clients
573 	 */
574 
575 	ranum = 0;
576 	snprintf( rcmd, sizeof rcmd, "%s" LDAP_DIRSEP READCMD,
577 		progdir );
578 	rargs[ranum++] = rcmd;
579 	rargs[ranum++] = "-H";
580 	rargs[ranum++] = uri;
581 	rargs[ranum++] = "-D";
582 	rargs[ranum++] = manager;
583 	rargs[ranum++] = "-w";
584 	rargs[ranum++] = passwd;
585 	rargs[ranum++] = "-l";
586 	rargs[ranum++] = rloops;
587 	rargs[ranum++] = "-L";
588 	rargs[ranum++] = outerloops;
589 	rargs[ranum++] = "-r";
590 	rargs[ranum++] = retries;
591 	rargs[ranum++] = "-t";
592 	rargs[ranum++] = delay;
593 	if ( friendly ) {
594 		rargs[ranum++] = friendlyOpt;
595 	}
596 	if ( chaserefs ) {
597 		rargs[ranum++] = "-C";
598 	}
599 	if ( noattrs ) {
600 		rargs[ranum++] = "-A";
601 	}
602 	if ( ignore ) {
603 		rargs[ranum++] = "-i";
604 		rargs[ranum++] = ignore;
605 	}
606 	if ( swamp ) {
607 		rargs[ranum++] = swampopt;
608 	}
609 	rargs[ranum++] = "-e";
610 	rargs[ranum++] = NULL;		/* will hold the read entry */
611 
612 	rargs[ranum++] = NULL;
613 	rargs[ranum++] = NULL;		/* might hold the filter arg */
614 	rextra_args += 2;
615 
616 	rargs[ranum] = NULL;
617 
618 	/*
619 	 * generate the modrdn clients
620 	 */
621 
622 	nanum = 0;
623 	snprintf( ncmd, sizeof ncmd, "%s" LDAP_DIRSEP MODRDNCMD,
624 		progdir );
625 	nargs[nanum++] = ncmd;
626 	nargs[nanum++] = "-H";
627 	nargs[nanum++] = uri;
628 	nargs[nanum++] = "-D";
629 	nargs[nanum++] = manager;
630 	nargs[nanum++] = "-w";
631 	nargs[nanum++] = passwd;
632 	nargs[nanum++] = "-l";
633 	nargs[nanum++] = nloops;
634 	nargs[nanum++] = "-L";
635 	nargs[nanum++] = outerloops;
636 	nargs[nanum++] = "-r";
637 	nargs[nanum++] = retries;
638 	nargs[nanum++] = "-t";
639 	nargs[nanum++] = delay;
640 	if ( friendly ) {
641 		nargs[nanum++] = friendlyOpt;
642 	}
643 	if ( chaserefs ) {
644 		nargs[nanum++] = "-C";
645 	}
646 	if ( ignore ) {
647 		nargs[nanum++] = "-i";
648 		nargs[nanum++] = ignore;
649 	}
650 	nargs[nanum++] = "-e";
651 	nargs[nanum++] = NULL;		/* will hold the modrdn entry */
652 	nargs[nanum] = NULL;
653 
654 	/*
655 	 * generate the modify clients
656 	 */
657 
658 	manum = 0;
659 	snprintf( mcmd, sizeof mcmd, "%s" LDAP_DIRSEP MODIFYCMD,
660 		progdir );
661 	margs[manum++] = mcmd;
662 	margs[manum++] = "-H";
663 	margs[manum++] = uri;
664 	margs[manum++] = "-D";
665 	margs[manum++] = manager;
666 	margs[manum++] = "-w";
667 	margs[manum++] = passwd;
668 	margs[manum++] = "-l";
669 	margs[manum++] = mloops;
670 	margs[manum++] = "-L";
671 	margs[manum++] = outerloops;
672 	margs[manum++] = "-r";
673 	margs[manum++] = retries;
674 	margs[manum++] = "-t";
675 	margs[manum++] = delay;
676 	if ( friendly ) {
677 		margs[manum++] = friendlyOpt;
678 	}
679 	if ( chaserefs ) {
680 		margs[manum++] = "-C";
681 	}
682 	if ( ignore ) {
683 		margs[manum++] = "-i";
684 		margs[manum++] = ignore;
685 	}
686 	margs[manum++] = "-e";
687 	margs[manum++] = NULL;		/* will hold the modify entry */
688 	margs[manum++] = "-a";;
689 	margs[manum++] = NULL;		/* will hold the ava */
690 	margs[manum] = NULL;
691 
692 	/*
693 	 * generate the add/delete clients
694 	 */
695 
696 	aanum = 0;
697 	snprintf( acmd, sizeof acmd, "%s" LDAP_DIRSEP ADDCMD,
698 		progdir );
699 	aargs[aanum++] = acmd;
700 	aargs[aanum++] = "-H";
701 	aargs[aanum++] = uri;
702 	aargs[aanum++] = "-D";
703 	aargs[aanum++] = manager;
704 	aargs[aanum++] = "-w";
705 	aargs[aanum++] = passwd;
706 	aargs[aanum++] = "-l";
707 	aargs[aanum++] = aloops;
708 	aargs[aanum++] = "-L";
709 	aargs[aanum++] = outerloops;
710 	aargs[aanum++] = "-r";
711 	aargs[aanum++] = retries;
712 	aargs[aanum++] = "-t";
713 	aargs[aanum++] = delay;
714 	if ( friendly ) {
715 		aargs[aanum++] = friendlyOpt;
716 	}
717 	if ( chaserefs ) {
718 		aargs[aanum++] = "-C";
719 	}
720 	if ( ignore ) {
721 		aargs[aanum++] = "-i";
722 		aargs[aanum++] = ignore;
723 	}
724 	aargs[aanum++] = "-f";
725 	aargs[aanum++] = NULL;		/* will hold the add data file */
726 	aargs[aanum] = NULL;
727 
728 	/*
729 	 * generate the bind clients
730 	 */
731 
732 	banum = 0;
733 	snprintf( bcmd, sizeof bcmd, "%s" LDAP_DIRSEP BINDCMD,
734 		progdir );
735 	bargs[banum++] = bcmd;
736 	if ( !noinit ) {
737 		bargs[banum++] = "-I";	/* init on each bind */
738 	}
739 	bargs[banum++] = "-H";
740 	bargs[banum++] = uri;
741 	bargs[banum++] = "-l";
742 	bargs[banum++] = bloops;
743 	bargs[banum++] = "-L";
744 	bargs[banum++] = outerloops;
745 	bargs[banum++] = "-r";
746 	bargs[banum++] = retries;
747 	bargs[banum++] = "-t";
748 	bargs[banum++] = delay;
749 	if ( friendly ) {
750 		bargs[banum++] = friendlyOpt;
751 	}
752 	if ( chaserefs ) {
753 		bargs[banum++] = "-C";
754 	}
755 	if ( ignore ) {
756 		bargs[banum++] = "-i";
757 		bargs[banum++] = ignore;
758 	}
759 	if ( nextra ) {
760 		bargs[banum++] = "-B";
761 		bargs_extra = &bargs[banum++];
762 	}
763 	bargs[banum++] = "-D";
764 	bargs[banum++] = NULL;
765 	bargs[banum++] = "-w";
766 	bargs[banum++] = NULL;
767 	bargs[banum] = NULL;
768 
769 #define	DOREQ(n,j) ((n) && ((maxkids > (n)) ? ((j) < maxkids ) : ((j) < (n))))
770 
771 	for ( j = 0; j < MAXREQS; j++ ) {
772 		/* search */
773 		if ( DOREQ( snum, j ) ) {
774 			int	jj = j % snum;
775 			int	x = sanum - sextra_args;
776 
777 			/* base */
778 			if ( sbase[jj] != NULL ) {
779 				sargs[sanum - 7] = sbase[jj];
780 
781 			} else {
782 				sargs[sanum - 7] = slud[jj]->lud_dn;
783 			}
784 
785 			/* scope */
786 			if ( slud[jj] != NULL ) {
787 				sargs[sanum - 5] = (char *)ldap_pvt_scope2str( slud[jj]->lud_scope );
788 
789 			} else {
790 				sargs[sanum - 5] = "sub";
791 			}
792 
793 			/* filter */
794 			if ( sreqs[jj] != NULL ) {
795 				sargs[sanum - 3] = sreqs[jj];
796 
797 			} else if ( slud[jj]->lud_filter != NULL ) {
798 				sargs[sanum - 3] = slud[jj]->lud_filter;
799 
800 			} else {
801 				sargs[sanum - 3] = "(objectClass=*)";
802 			}
803 
804 			/* extras */
805 			sargs[x] = NULL;
806 
807 			/* attr */
808 			if ( sattrs[jj] != NULL ) {
809 				sargs[x++] = "-a";
810 				sargs[x++] = sattrs[jj];
811 			}
812 
813 			/* attrs */
814 			if ( slud[jj] != NULL && slud[jj]->lud_attrs != NULL ) {
815 				int	i;
816 
817 				for ( i = 0; slud[jj]->lud_attrs[ i ] != NULL && x + i < MAXARGS - 1; i++ ) {
818 					sargs[x + i] = slud[jj]->lud_attrs[ i ];
819 				}
820 				sargs[x + i] = NULL;
821 			}
822 
823 			fork_child( scmd, sargs );
824 		}
825 
826 		/* read */
827 		if ( DOREQ( rnum, j ) ) {
828 			int	jj = j % rnum;
829 			int	x = ranum - rextra_args;
830 
831 			rargs[ranum - 3] = rreqs[jj];
832 			if ( rflts[jj] != NULL ) {
833 				rargs[x++] = "-f";
834 				rargs[x++] = rflts[jj];
835 			}
836 			rargs[x] = NULL;
837 			fork_child( rcmd, rargs );
838 		}
839 
840 		/* rename */
841 		if ( j < nnum ) {
842 			nargs[nanum - 1] = nreqs[j];
843 			fork_child( ncmd, nargs );
844 		}
845 
846 		/* modify */
847 		if ( j < mnum ) {
848 			margs[manum - 3] = mdn[j];
849 			margs[manum - 1] = mreqs[j];
850 			fork_child( mcmd, margs );
851 		}
852 
853 		/* add/delete */
854 		if ( j < anum ) {
855 			aargs[aanum - 1] = afiles[j];
856 			fork_child( acmd, aargs );
857 		}
858 
859 		/* bind */
860 		if ( DOREQ( bnum, j ) ) {
861 			int	jj = j % bnum;
862 
863 			if ( nextra ) {
864 				int	n = ((double)nextra)*rand()/(RAND_MAX + 1.0);
865 				extra_t	*e;
866 
867 				for ( e = extra; n-- > 0; e = e->next )
868 					;
869 				*bargs_extra = e->action;
870 			}
871 
872 			if ( battrs[jj] != NULL ) {
873 				bargs[banum - 3] = manager ? manager : "";
874 				bargs[banum - 1] = passwd ? passwd : "";
875 
876 				bargs[banum + 0] = "-b";
877 				bargs[banum + 1] = breqs[jj];
878 				bargs[banum + 2] = "-f";
879 				bargs[banum + 3] = bcreds[jj];
880 				bargs[banum + 4] = "-a";
881 				bargs[banum + 5] = battrs[jj];
882 				bargs[banum + 6] = NULL;
883 
884 			} else {
885 				bargs[banum - 3] = breqs[jj];
886 				bargs[banum - 1] = bcreds[jj];
887 				bargs[banum] = NULL;
888 			}
889 
890 			fork_child( bcmd, bargs );
891 			bargs[banum] = NULL;
892 		}
893 	}
894 
895 	wait4kids( -1 );
896 
897 	exit( EXIT_SUCCESS );
898 }
899 
900 static char *
get_file_name(char * dirname,char * filename)901 get_file_name( char *dirname, char *filename )
902 {
903 	char buf[MAXPATHLEN];
904 
905 	snprintf( buf, sizeof buf, "%s" LDAP_DIRSEP "%s",
906 		dirname, filename );
907 	return( strdup( buf ));
908 }
909 
910 
911 static int
get_search_filters(char * filename,char * filters[],char * attrs[],char * bases[],LDAPURLDesc * luds[])912 get_search_filters( char *filename, char *filters[], char *attrs[], char *bases[], LDAPURLDesc *luds[] )
913 {
914 	FILE    *fp;
915 	int     filter = 0;
916 
917 	if ( (fp = fopen( filename, "r" )) != NULL ) {
918 		char  line[BUFSIZ];
919 
920 		while (( filter < MAXREQS ) && ( fgets( line, BUFSIZ, fp ))) {
921 			char	*nl;
922 			int	got_URL = 0;
923 
924 			if (( nl = strchr( line, '\r' )) || ( nl = strchr( line, '\n' )))
925 				*nl = '\0';
926 
927 			if ( luds ) luds[filter] = NULL;
928 
929 			if ( luds && strncmp( line, "ldap:///", STRLENOF( "ldap:///" ) ) == 0 ) {
930 				LDAPURLDesc	*lud;
931 
932 				got_URL = 1;
933 				bases[filter] = NULL;
934 				if ( ldap_url_parse( line, &lud ) != LDAP_URL_SUCCESS ) {
935 					filter = -filter - 1;
936 					break;
937 				}
938 
939 				if ( lud->lud_dn == NULL || lud->lud_exts != NULL ) {
940 					filter = -filter - 1;
941 					ldap_free_urldesc( lud );
942 					break;
943 				}
944 
945 				luds[filter] = lud;
946 
947 			} else {
948 				bases[filter] = ArgDup( line );
949 			}
950 			if ( fgets( line, BUFSIZ, fp ) == NULL )
951 				*line = '\0';
952 			if (( nl = strchr( line, '\r' )) || ( nl = strchr( line, '\n' )))
953 				*nl = '\0';
954 
955 			filters[filter] = ArgDup( line );
956 			if ( attrs ) {
957 				if ( filters[filter][0] == '+') {
958 					char	*sep = strchr( filters[filter], ':' );
959 
960 					attrs[ filter ] = &filters[ filter ][ 1 ];
961 					if ( sep != NULL ) {
962 						sep[ 0 ] = '\0';
963 						/* NOTE: don't free this! */
964 						filters[ filter ] = &sep[ 1 ];
965 					}
966 
967 				} else {
968 					attrs[ filter ] = NULL;
969 				}
970 			}
971 			filter++;
972 
973 		}
974 		fclose( fp );
975 	}
976 
977 	return filter;
978 }
979 
980 
981 static int
get_read_entries(char * filename,char * entries[],char * filters[])982 get_read_entries( char *filename, char *entries[], char *filters[] )
983 {
984 	FILE    *fp;
985 	int     entry = 0;
986 
987 	if ( (fp = fopen( filename, "r" )) != NULL ) {
988 		char  line[BUFSIZ];
989 
990 		while (( entry < MAXREQS ) && ( fgets( line, BUFSIZ, fp ))) {
991 			char *nl;
992 
993 			if (( nl = strchr( line, '\r' )) || ( nl = strchr( line, '\n' )))
994 				*nl = '\0';
995 			if ( filters != NULL && line[0] == '+' ) {
996 				LDAPURLDesc	*lud;
997 
998 				if ( ldap_url_parse( &line[1], &lud ) != LDAP_URL_SUCCESS ) {
999 					entry = -entry - 1;
1000 					break;
1001 				}
1002 
1003 				if ( lud->lud_dn == NULL || lud->lud_dn[ 0 ] == '\0' ) {
1004 					ldap_free_urldesc( lud );
1005 					entry = -entry - 1;
1006 					break;
1007 				}
1008 
1009 				entries[entry] = ArgDup( lud->lud_dn );
1010 
1011 				if ( lud->lud_filter ) {
1012 					filters[entry] = ArgDup( lud->lud_filter );
1013 
1014 				} else {
1015 					filters[entry] = ArgDup( "(objectClass=*)" );
1016 				}
1017 				ldap_free_urldesc( lud );
1018 
1019 			} else {
1020 				if ( filters != NULL )
1021 					filters[entry] = NULL;
1022 
1023 				entries[entry] = ArgDup( line );
1024 			}
1025 
1026 			entry++;
1027 
1028 		}
1029 		fclose( fp );
1030 	}
1031 
1032 	return( entry );
1033 }
1034 
1035 #ifndef HAVE_WINSOCK
1036 static void
fork_child(char * prog,char ** args)1037 fork_child( char *prog, char **args )
1038 {
1039 	/* note: obscures global pid var; intended */
1040 	pid_t	pid;
1041 
1042 	wait4kids( maxkids );
1043 
1044 	switch ( pid = fork() ) {
1045 	case 0:		/* child */
1046 #ifdef HAVE_EBCDIC
1047 		/* The __LIBASCII execvp only handles ASCII "prog",
1048 		 * we still need to translate the arg vec ourselves.
1049 		 */
1050 		{ char *arg2[MAXREQS];
1051 		int i;
1052 
1053 		for (i=0; args[i]; i++) {
1054 			arg2[i] = ArgDup(args[i]);
1055 			__atoe(arg2[i]);
1056 		}
1057 		arg2[i] = NULL;
1058 		args = arg2; }
1059 #endif
1060 		execvp( prog, args );
1061 		tester_perror( "execvp", NULL );
1062 		{ int i;
1063 			for (i=0; args[i]; i++);
1064 			fprintf(stderr,"%d args\n", i);
1065 			for (i=0; args[i]; i++)
1066 				fprintf(stderr,"%d %s\n", i, args[i]);
1067 		}
1068 
1069 		exit( EXIT_FAILURE );
1070 		break;
1071 
1072 	case -1:	/* trouble */
1073 		tester_perror( "fork", NULL );
1074 		break;
1075 
1076 	default:	/* parent */
1077 		nkids++;
1078 		break;
1079 	}
1080 }
1081 
1082 static void
wait4kids(int nkidval)1083 wait4kids( int nkidval )
1084 {
1085 	int		status;
1086 
1087 	while ( nkids >= nkidval ) {
1088 		pid_t pid = wait( &status );
1089 
1090 		if ( WIFSTOPPED(status) ) {
1091 			fprintf( stderr,
1092 			    "stopping: child PID=%ld stopped with signal %d\n",
1093 			    (long) pid, (int) WSTOPSIG(status) );
1094 
1095 		} else if ( WIFSIGNALED(status) ) {
1096 			fprintf( stderr,
1097 			    "stopping: child PID=%ld terminated with signal %d%s\n",
1098 			    (long) pid, (int) WTERMSIG(status),
1099 #ifdef WCOREDUMP
1100 				WCOREDUMP(status) ? ", core dumped" : ""
1101 #else
1102 				""
1103 #endif
1104 				);
1105 			exit( WEXITSTATUS(status)  );
1106 
1107 		} else if ( WEXITSTATUS(status) != 0 ) {
1108 			fprintf( stderr,
1109 			    "stopping: child PID=%ld exited with status %d\n",
1110 			    (long) pid, (int) WEXITSTATUS(status) );
1111 			exit( WEXITSTATUS(status) );
1112 
1113 		} else {
1114 			nkids--;
1115 		}
1116 	}
1117 }
1118 #else
1119 
1120 static void
wait4kids(int nkidval)1121 wait4kids( int nkidval )
1122 {
1123 	int rc, i;
1124 
1125 	while ( nkids >= nkidval ) {
1126 		rc = WaitForMultipleObjects( nkids, children, FALSE, INFINITE );
1127 		for ( i=rc - WAIT_OBJECT_0; i<nkids-1; i++)
1128 			children[i] = children[i+1];
1129 		nkids--;
1130 	}
1131 }
1132 
1133 static void
fork_child(char * prog,char ** args)1134 fork_child( char *prog, char **args )
1135 {
1136 	int rc;
1137 
1138 	wait4kids( maxkids );
1139 
1140 	rc = _spawnvp( _P_NOWAIT, prog, args );
1141 
1142 	if ( rc == -1 ) {
1143 		tester_perror( "_spawnvp", NULL );
1144 	} else {
1145 		children[nkids++] = (HANDLE)rc;
1146 	}
1147 }
1148 #endif
1149