]> git.sur5r.net Git - openldap/blob - servers/slapd/back-ldap/search.c
ITS#4832 fix unint'd var
[openldap] / servers / slapd / back-ldap / search.c
1 /* search.c - ldap backend search function */
2 /* $OpenLDAP$ */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4  *
5  * Copyright 1999-2007 The OpenLDAP Foundation.
6  * Portions Copyright 1999-2003 Howard Chu.
7  * Portions Copyright 2000-2003 Pierangelo Masarati.
8  * All rights reserved.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted only as authorized by the OpenLDAP
12  * Public License.
13  *
14  * A copy of this license is available in the file LICENSE in the
15  * top-level directory of the distribution or, alternatively, at
16  * <http://www.OpenLDAP.org/license.html>.
17  */
18 /* ACKNOWLEDGEMENTS:
19  * This work was initially developed by the Howard Chu for inclusion
20  * in OpenLDAP Software and subsequently enhanced by Pierangelo
21  * Masarati.
22  */
23
24 #include "portable.h"
25
26 #include <stdio.h>
27
28 #include <ac/socket.h>
29 #include <ac/string.h>
30 #include <ac/time.h>
31
32 #include "slap.h"
33 #include "back-ldap.h"
34 #undef ldap_debug       /* silence a warning in ldap-int.h */
35 #include "../../../libraries/libldap/ldap-int.h"
36
37 #include "lutil.h"
38
39 static int
40 ldap_build_entry( Operation *op, LDAPMessage *e, Entry *ent,
41          struct berval *bdn );
42
43 /*
44  * Quick'n'dirty rewrite of filter in case of error, to deal with
45  * <draft-zeilenga-ldap-t-f>.
46  */
47 static int
48 ldap_back_munge_filter(
49         Operation       *op,
50         struct berval   *filter )
51 {
52         ldapinfo_t      *li = (ldapinfo_t *) op->o_bd->be_private;
53
54         char            *ptr;
55         int             gotit = 0;
56
57         Debug( LDAP_DEBUG_ARGS, "=> ldap_back_munge_filter \"%s\"\n",
58                         filter->bv_val, 0, 0 );
59
60         for ( ptr = strstr( filter->bv_val, "(?=" ); 
61                         ptr;
62                         ptr = strstr( ptr, "(?=" ) )
63         {
64                 static struct berval
65                         bv_true = BER_BVC( "(?=true)" ),
66                         bv_false = BER_BVC( "(?=false)" ),
67                         bv_undefined = BER_BVC( "(?=undefined)" ),
68                         bv_t = BER_BVC( "(&)" ),
69                         bv_f = BER_BVC( "(|)" ),
70                         bv_T = BER_BVC( "(objectClass=*)" ),
71                         bv_F = BER_BVC( "(!(objectClass=*))" );
72                 struct berval   *oldbv = NULL,
73                                 *newbv = NULL,
74                                 oldfilter = BER_BVNULL;
75
76                 if ( strncmp( ptr, bv_true.bv_val, bv_true.bv_len ) == 0 ) {
77                         oldbv = &bv_true;
78                         if ( LDAP_BACK_T_F( li ) ) {
79                                 newbv = &bv_t;
80
81                         } else {
82                                 newbv = &bv_T;
83                         }
84
85                 } else if ( strncmp( ptr, bv_false.bv_val, bv_false.bv_len ) == 0 )
86                 {
87                         oldbv = &bv_false;
88                         if ( LDAP_BACK_T_F( li ) ) {
89                                 newbv = &bv_f;
90
91                         } else {
92                                 newbv = &bv_F;
93                         }
94
95                 } else if ( strncmp( ptr, bv_undefined.bv_val, bv_undefined.bv_len ) == 0 )
96                 {
97                         oldbv = &bv_undefined;
98                         newbv = &bv_F;
99
100                 } else {
101                         gotit = 0;
102                         goto done;
103                 }
104
105                 oldfilter = *filter;
106                 if ( newbv->bv_len > oldbv->bv_len ) {
107                         filter->bv_len += newbv->bv_len - oldbv->bv_len;
108                         if ( filter->bv_val == op->ors_filterstr.bv_val ) {
109                                 filter->bv_val = op->o_tmpalloc( filter->bv_len + 1,
110                                                 op->o_tmpmemctx );
111
112                                 AC_MEMCPY( filter->bv_val, op->ors_filterstr.bv_val,
113                                                 op->ors_filterstr.bv_len + 1 );
114
115                         } else {
116                                 filter->bv_val = op->o_tmprealloc( filter->bv_val,
117                                                 filter->bv_len + 1, op->o_tmpmemctx );
118                         }
119
120                         ptr = filter->bv_val + ( ptr - oldfilter.bv_val );
121                 }
122
123                 AC_MEMCPY( &ptr[ newbv->bv_len ],
124                                 &ptr[ oldbv->bv_len ], 
125                                 oldfilter.bv_len - ( ptr - filter->bv_val ) - oldbv->bv_len + 1 );
126                 AC_MEMCPY( ptr, newbv->bv_val, newbv->bv_len );
127
128                 ptr += newbv->bv_len;
129                 gotit = 1;
130         }
131
132 done:;
133         Debug( LDAP_DEBUG_ARGS, "<= ldap_back_munge_filter \"%s\" (%d)\n",
134                         filter->bv_val, gotit, 0 );
135
136         return gotit;
137 }
138
139 int
140 ldap_back_search(
141                 Operation       *op,
142                 SlapReply       *rs )
143 {
144         ldapinfo_t      *li = (ldapinfo_t *) op->o_bd->be_private;
145
146         ldapconn_t      *lc = NULL;
147         struct timeval  tv;
148         time_t          stoptime = (time_t)(-1);
149         LDAPMessage     *res,
150                         *e;
151         int             rc = 0,
152                         msgid; 
153         struct berval   match = BER_BVNULL,
154                         filter = BER_BVNULL;
155         int             free_filter = 0;
156         int             i;
157         char            **attrs = NULL;
158         int             freetext = 0;
159         int             do_retry = 1, dont_retry = 0;
160         LDAPControl     **ctrls = NULL;
161         /* FIXME: shouldn't this be null? */
162         const char      *save_matched = rs->sr_matched;
163
164         if ( !ldap_back_dobind( &lc, op, rs, LDAP_BACK_SENDERR ) ) {
165                 return rs->sr_err;
166         }
167
168         /*
169          * FIXME: in case of values return filter, we might want
170          * to map attrs and maybe rewrite value
171          */
172
173         /* should we check return values? */
174         if ( op->ors_deref != -1 ) {
175                 ldap_set_option( lc->lc_ld, LDAP_OPT_DEREF,
176                                 (void *)&op->ors_deref );
177         }
178
179         if ( op->ors_tlimit != SLAP_NO_LIMIT ) {
180                 tv.tv_sec = op->ors_tlimit;
181                 tv.tv_usec = 0;
182                 stoptime = op->o_time + op->ors_tlimit;
183
184         } else {
185                 LDAP_BACK_TV_SET( &tv );
186         }
187
188         if ( op->ors_attrs ) {
189                 for ( i = 0; !BER_BVISNULL( &op->ors_attrs[i].an_name ); i++ )
190                         /* just count attrs */ ;
191
192                 attrs = ch_malloc( ( i + 1 )*sizeof( char * ) );
193                 if ( attrs == NULL ) {
194                         rs->sr_err = LDAP_NO_MEMORY;
195                         rc = -1;
196                         goto finish;
197                 }
198         
199                 for ( i = 0; !BER_BVISNULL( &op->ors_attrs[i].an_name ); i++ ) {
200                         attrs[ i ] = op->ors_attrs[i].an_name.bv_val;
201                 }
202                 attrs[ i ] = NULL;
203         }
204
205         ctrls = op->o_ctrls;
206         rc = ldap_back_proxy_authz_ctrl( &lc->lc_bound_ndn,
207                 li->li_version, &li->li_idassert, op, rs, &ctrls );
208         if ( rc != LDAP_SUCCESS ) {
209                 goto finish;
210         }
211
212         /* deal with <draft-zeilenga-ldap-t-f> filters */
213         filter = op->ors_filterstr;
214 retry:
215         rs->sr_err = ldap_search_ext( lc->lc_ld, op->o_req_dn.bv_val,
216                         op->ors_scope, filter.bv_val,
217                         attrs, op->ors_attrsonly, ctrls, NULL,
218                         tv.tv_sec ? &tv : NULL,
219                         op->ors_slimit, &msgid );
220
221         if ( rs->sr_err != LDAP_SUCCESS ) {
222                 switch ( rs->sr_err ) {
223                 case LDAP_SERVER_DOWN:
224                         if ( do_retry ) {
225                                 do_retry = 0;
226                                 if ( ldap_back_retry( &lc, op, rs, LDAP_BACK_DONTSEND ) ) {
227                                         goto retry;
228                                 }
229                         }
230
231                         if ( lc == NULL ) {
232                                 /* reset by ldap_back_retry ... */
233                                 rs->sr_err = slap_map_api2result( rs );
234
235                         } else {
236                                 rc = ldap_back_op_result( lc, op, rs, msgid, 0, LDAP_BACK_DONTSEND );
237                         }
238                                 
239                         goto finish;
240
241                 case LDAP_FILTER_ERROR:
242                         if ( ldap_back_munge_filter( op, &filter ) ) {
243                                 free_filter = 1;
244                                 goto retry;
245                         }
246
247                         /* invalid filters return success with no data */
248                         rs->sr_err = LDAP_SUCCESS;
249                         rs->sr_text = NULL;
250                         goto finish;
251                 
252                 default:
253                         rs->sr_err = slap_map_api2result( rs );
254                         rs->sr_text = NULL;
255                         goto finish;
256                 }
257         }
258
259         /* if needed, initialize timeout */
260         if ( li->li_timeout[ SLAP_OP_SEARCH ] ) {
261                 if ( tv.tv_sec == 0 || tv.tv_sec > li->li_timeout[ SLAP_OP_SEARCH ] ) {
262                         tv.tv_sec = li->li_timeout[ SLAP_OP_SEARCH ];
263                         tv.tv_usec = 0;
264                 }
265         }
266
267         /* We pull apart the ber result, stuff it into a slapd entry, and
268          * let send_search_entry stuff it back into ber format. Slow & ugly,
269          * but this is necessary for version matching, and for ACL processing.
270          */
271
272         for ( rc = -2; rc != -1; rc = ldap_result( lc->lc_ld, msgid, LDAP_MSG_ONE, &tv, &res ) )
273         {
274                 /* check for abandon */
275                 if ( op->o_abandon || LDAP_BACK_CONN_ABANDON( lc ) ) {
276                         if ( rc > 0 ) {
277                                 ldap_msgfree( res );
278                         }
279                         (void)ldap_back_cancel( lc, op, rs, msgid, LDAP_BACK_DONTSEND );
280                         rc = SLAPD_ABANDON;
281                         goto finish;
282                 }
283
284                 if ( rc == 0 || rc == -2 ) {
285                         ldap_pvt_thread_yield();
286
287                         /* check timeout */
288                         if ( li->li_timeout[ SLAP_OP_SEARCH ] ) {
289                                 if ( rc == 0 ) {
290                                         (void)ldap_back_cancel( lc, op, rs, msgid, LDAP_BACK_DONTSEND );
291                                         rs->sr_text = "Operation timed out";
292                                         rc = rs->sr_err = op->o_protocol >= LDAP_VERSION3 ?
293                                                 LDAP_ADMINLIMIT_EXCEEDED : LDAP_OTHER;
294                                         goto finish;
295                                 }
296
297                         } else {
298                                 LDAP_BACK_TV_SET( &tv );
299                         }
300
301                         /* check time limit */
302                         if ( op->ors_tlimit != SLAP_NO_LIMIT
303                                         && slap_get_time() > stoptime )
304                         {
305                                 (void)ldap_back_cancel( lc, op, rs, msgid, LDAP_BACK_DONTSEND );
306                                 rc = rs->sr_err = LDAP_TIMELIMIT_EXCEEDED;
307                                 goto finish;
308                         }
309                         continue;
310
311                 } else {
312                         /* only touch when activity actually took place... */
313                         if ( li->li_idle_timeout && lc ) {
314                                 lc->lc_time = op->o_time;
315                         }
316
317                         /* don't retry any more */
318                         dont_retry = 1;
319                 }
320
321
322                 if ( rc == LDAP_RES_SEARCH_ENTRY ) {
323                         Entry           ent = { 0 };
324                         struct berval   bdn = BER_BVNULL;
325
326                         do_retry = 0;
327
328                         e = ldap_first_entry( lc->lc_ld, res );
329                         rc = ldap_build_entry( op, e, &ent, &bdn );
330                         if ( rc == LDAP_SUCCESS ) {
331                                 rs->sr_entry = &ent;
332                                 rs->sr_attrs = op->ors_attrs;
333                                 rs->sr_operational_attrs = NULL;
334                                 rs->sr_flags = 0;
335                                 rs->sr_err = LDAP_SUCCESS;
336                                 rc = rs->sr_err = send_search_entry( op, rs );
337                                 if ( !BER_BVISNULL( &ent.e_name ) ) {
338                                         assert( ent.e_name.bv_val != bdn.bv_val );
339                                         op->o_tmpfree( ent.e_name.bv_val, op->o_tmpmemctx );
340                                         BER_BVZERO( &ent.e_name );
341                                 }
342                                 if ( !BER_BVISNULL( &ent.e_nname ) ) {
343                                         op->o_tmpfree( ent.e_nname.bv_val, op->o_tmpmemctx );
344                                         BER_BVZERO( &ent.e_nname );
345                                 }
346                                 entry_clean( &ent );
347                         }
348                         ldap_msgfree( res );
349                         if ( rc != LDAP_SUCCESS ) {
350                                 if ( rc == LDAP_UNAVAILABLE ) {
351                                         rc = rs->sr_err = LDAP_OTHER;
352                                 } else {
353                                         (void)ldap_back_cancel( lc, op, rs, msgid, LDAP_BACK_DONTSEND );
354                                 }
355                                 goto finish;
356                         }
357
358                 } else if ( rc == LDAP_RES_SEARCH_REFERENCE ) {
359                         char            **references = NULL;
360
361                         do_retry = 0;
362                         rc = ldap_parse_reference( lc->lc_ld, res,
363                                         &references, &rs->sr_ctrls, 1 );
364
365                         if ( rc != LDAP_SUCCESS ) {
366                                 continue;
367                         }
368
369                         /* FIXME: there MUST be at least one */
370                         if ( references && references[ 0 ] && references[ 0 ][ 0 ] ) {
371                                 int             cnt;
372
373                                 for ( cnt = 0; references[ cnt ]; cnt++ )
374                                         /* NO OP */ ;
375
376                                 /* FIXME: there MUST be at least one */
377                                 rs->sr_ref = op->o_tmpalloc( ( cnt + 1 ) * sizeof( struct berval ),
378                                         op->o_tmpmemctx );
379
380                                 for ( cnt = 0; references[ cnt ]; cnt++ ) {
381                                         ber_str2bv( references[ cnt ], 0, 0, &rs->sr_ref[ cnt ] );
382                                 }
383                                 BER_BVZERO( &rs->sr_ref[ cnt ] );
384
385                                 /* ignore return value by now */
386                                 ( void )send_search_reference( op, rs );
387
388                         } else {
389                                 Debug( LDAP_DEBUG_ANY,
390                                         "%s ldap_back_search: "
391                                         "got SEARCH_REFERENCE "
392                                         "with no referrals\n",
393                                         op->o_log_prefix, 0, 0 );
394                         }
395
396                         /* cleanup */
397                         if ( references ) {
398                                 ber_memvfree( (void **)references );
399                                 op->o_tmpfree( rs->sr_ref, op->o_tmpmemctx );
400                                 rs->sr_ref = NULL;
401                         }
402
403                         if ( rs->sr_ctrls ) {
404                                 ldap_controls_free( rs->sr_ctrls );
405                                 rs->sr_ctrls = NULL;
406                         }
407
408                 } else {
409                         char            **references = NULL, *err = NULL;
410
411                         rc = ldap_parse_result( lc->lc_ld, res, &rs->sr_err,
412                                         &match.bv_val, &err,
413                                         &references, &rs->sr_ctrls, 1 );
414                         if ( rc != LDAP_SUCCESS ) {
415                                 rs->sr_err = rc;
416                         }
417                         rs->sr_err = slap_map_api2result( rs );
418                         if ( err ) {
419                                 rs->sr_text = err;
420                                 freetext = 1;
421                         }
422
423                         if ( references && references[ 0 ] && references[ 0 ][ 0 ] ) {
424                                 int     cnt;
425
426                                 if ( rs->sr_err != LDAP_REFERRAL ) {
427                                         /* FIXME: error */
428                                         Debug( LDAP_DEBUG_ANY,
429                                                 "%s ldap_back_search: "
430                                                 "got referrals with %d\n",
431                                                 op->o_log_prefix,
432                                                 rs->sr_err, 0 );
433                                         rs->sr_err = LDAP_REFERRAL;
434                                 }
435
436                                 for ( cnt = 0; references[ cnt ]; cnt++ )
437                                         /* NO OP */ ;
438                                 
439                                 rs->sr_ref = op->o_tmpalloc( ( cnt + 1 ) * sizeof( struct berval ),
440                                         op->o_tmpmemctx );
441
442                                 for ( cnt = 0; references[ cnt ]; cnt++ ) {
443                                         /* duplicating ...*/
444                                         ber_str2bv( references[ cnt ], 0, 1, &rs->sr_ref[ cnt ] );
445                                 }
446                                 BER_BVZERO( &rs->sr_ref[ cnt ] );
447                         }
448
449                         if ( match.bv_val != NULL ) {
450                                 match.bv_len = strlen( match.bv_val );
451                         }
452
453                         /* cleanup */
454                         if ( references ) {
455                                 ber_memvfree( (void **)references );
456                         }
457
458                         rc = 0;
459                         break;
460                 }
461
462                 /* if needed, restore timeout */
463                 if ( li->li_timeout[ SLAP_OP_SEARCH ] ) {
464                         if ( tv.tv_sec == 0 || tv.tv_sec > li->li_timeout[ SLAP_OP_SEARCH ] ) {
465                                 tv.tv_sec = li->li_timeout[ SLAP_OP_SEARCH ];
466                                 tv.tv_usec = 0;
467                         }
468                 }
469         }
470
471         if ( rc == -1 && dont_retry == 0 ) {
472                 if ( do_retry ) {
473                         do_retry = 0;
474                         if ( ldap_back_retry( &lc, op, rs, LDAP_BACK_DONTSEND ) ) {
475                                 goto retry;
476                         }
477                 }
478                 rs->sr_err = LDAP_SERVER_DOWN;
479                 rs->sr_err = slap_map_api2result( rs );
480                 goto finish;
481         }
482
483         /*
484          * Rewrite the matched portion of the search base, if required
485          */
486         if ( !BER_BVISNULL( &match ) && !BER_BVISEMPTY( &match ) ) {
487                 struct berval   pmatch;
488
489                 if ( dnPretty( NULL, &match, &pmatch, op->o_tmpmemctx ) == LDAP_SUCCESS ) {
490                         rs->sr_matched = pmatch.bv_val;
491                         LDAP_FREE( match.bv_val );
492
493                 } else {
494                         rs->sr_matched = match.bv_val;
495                 }
496         }
497
498         if ( rs->sr_v2ref ) {
499                 rs->sr_err = LDAP_REFERRAL;
500         }
501
502 finish:;
503         if ( LDAP_BACK_QUARANTINE( li ) ) {
504                 ldap_back_quarantine( op, rs );
505         }
506
507 #if 0
508         /* let send_ldap_result play cleanup handlers (ITS#4645) */
509         if ( rc != SLAPD_ABANDON )
510 #endif
511         {
512                 send_ldap_result( op, rs );
513         }
514
515         (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
516
517         if ( rs->sr_ctrls ) {
518                 ldap_controls_free( rs->sr_ctrls );
519                 rs->sr_ctrls = NULL;
520         }
521
522         if ( rs->sr_matched != NULL && rs->sr_matched != save_matched ) {
523                 if ( rs->sr_matched != match.bv_val ) {
524                         ber_memfree_x( (char *)rs->sr_matched, op->o_tmpmemctx );
525
526                 } else {
527                         LDAP_FREE( match.bv_val );
528                 }
529                 rs->sr_matched = save_matched;
530         }
531
532         if ( free_filter ) {
533                 op->o_tmpfree( filter.bv_val, op->o_tmpmemctx );
534         }
535
536         if ( rs->sr_text ) {
537                 if ( freetext ) {
538                         LDAP_FREE( (char *)rs->sr_text );
539                 }
540                 rs->sr_text = NULL;
541         }
542
543         if ( rs->sr_ref ) {
544                 ber_bvarray_free_x( rs->sr_ref, op->o_tmpmemctx );
545                 rs->sr_ref = NULL;
546         }
547
548         if ( attrs ) {
549                 ch_free( attrs );
550         }
551
552         if ( lc != NULL ) {
553                 ldap_back_release_conn( li, lc );
554         }
555
556         return rs->sr_err;
557 }
558
559 static int
560 ldap_build_entry(
561                 Operation       *op,
562                 LDAPMessage     *e,
563                 Entry           *ent,
564                 struct berval   *bdn )
565 {
566         struct berval   a;
567         BerElement      ber = *e->lm_ber;
568         Attribute       *attr, **attrp;
569         const char      *text;
570         int             last;
571
572         /* safe assumptions ... */
573         assert( ent != NULL );
574         BER_BVZERO( &ent->e_bv );
575
576         if ( ber_scanf( &ber, "{m{", bdn ) == LBER_ERROR ) {
577                 return LDAP_DECODING_ERROR;
578         }
579
580         /*
581          * Note: this may fail if the target host(s) schema differs
582          * from the one known to the meta, and a DN with unknown
583          * attributes is returned.
584          * 
585          * FIXME: should we log anything, or delegate to dnNormalize?
586          */
587         /* Note: if the distinguished values or the naming attributes
588          * change, should we massage them as well?
589          */
590         if ( dnPrettyNormal( NULL, bdn, &ent->e_name, &ent->e_nname,
591                 op->o_tmpmemctx ) != LDAP_SUCCESS )
592         {
593                 return LDAP_INVALID_DN_SYNTAX;
594         }
595
596         attrp = &ent->e_attrs;
597
598         while ( ber_scanf( &ber, "{m", &a ) != LBER_ERROR ) {
599                 int                             i;
600                 slap_syntax_validate_func       *validate;
601                 slap_syntax_transform_func      *pretty;
602
603                 attr = attr_alloc( NULL );
604                 if ( attr == NULL ) {
605                         continue;
606                 }
607                 if ( slap_bv2ad( &a, &attr->a_desc, &text ) 
608                                 != LDAP_SUCCESS )
609                 {
610                         if ( slap_bv2undef_ad( &a, &attr->a_desc, &text,
611                                 SLAP_AD_PROXIED ) != LDAP_SUCCESS )
612                         {
613                                 Debug( LDAP_DEBUG_ANY, 
614                                         "%s ldap_build_entry: "
615                                         "slap_bv2undef_ad(%s): %s\n",
616                                         op->o_log_prefix, a.bv_val, text );
617                                 attr_free( attr );
618                                 continue;
619                         }
620                 }
621
622                 /* no subschemaSubentry */
623                 if ( attr->a_desc == slap_schema.si_ad_subschemaSubentry
624                         || attr->a_desc == slap_schema.si_ad_entryDN )
625                 {
626
627                         /* 
628                          * We eat target's subschemaSubentry because
629                          * a search for this value is likely not
630                          * to resolve to the appropriate backend;
631                          * later, the local subschemaSubentry is
632                          * added.
633                          *
634                          * We also eat entryDN because the frontend
635                          * will reattach it without checking if already
636                          * present...
637                          */
638                         ( void )ber_scanf( &ber, "x" /* [W] */ );
639
640                         attr_free( attr );
641                         continue;
642                 }
643                 
644                 if ( ber_scanf( &ber, "[W]", &attr->a_vals ) == LBER_ERROR
645                                 || attr->a_vals == NULL )
646                 {
647                         /*
648                          * Note: attr->a_vals can be null when using
649                          * values result filter
650                          */
651                         attr->a_vals = (struct berval *)&slap_dummy_bv;
652                         last = 0;
653
654                 } else {
655                         for ( last = 0; !BER_BVISNULL( &attr->a_vals[ last ] ); last++ )
656                                 /* just count vals */ ;
657                 }
658
659                 validate = attr->a_desc->ad_type->sat_syntax->ssyn_validate;
660                 pretty = attr->a_desc->ad_type->sat_syntax->ssyn_pretty;
661
662                 if ( !validate && !pretty ) {
663                         attr->a_nvals = NULL;
664                         attr_free( attr );
665                         goto next_attr;
666                 }
667
668                 for ( i = 0; i < last; i++ ) {
669                         struct berval   pval;
670                         int             rc;
671
672                         if ( pretty ) {
673                                 rc = pretty( attr->a_desc->ad_type->sat_syntax,
674                                         &attr->a_vals[i], &pval, NULL );
675
676                         } else {
677                                 rc = validate( attr->a_desc->ad_type->sat_syntax,
678                                         &attr->a_vals[i] );
679                         }
680
681                         if ( rc != LDAP_SUCCESS ) {
682                                 /* check if, by chance, it's an undefined objectClass */
683                                 if ( attr->a_desc == slap_schema.si_ad_objectClass &&
684                                                 oc_bvfind_undef( &attr->a_vals[i] ) != NULL )
685                                 {
686                                         ber_dupbv( &pval, &attr->a_vals[i] );
687
688                                 } else {
689                                         attr->a_nvals = NULL;
690                                         attr_free( attr );
691                                         goto next_attr;
692                                 }
693                         }
694
695                         if ( pretty ) {
696                                 LBER_FREE( attr->a_vals[i].bv_val );
697                                 attr->a_vals[i] = pval;
698                         }
699                 }
700
701                 if ( last && attr->a_desc->ad_type->sat_equality &&
702                                 attr->a_desc->ad_type->sat_equality->smr_normalize )
703                 {
704                         attr->a_nvals = ch_malloc( ( last + 1 )*sizeof( struct berval ) );
705                         for ( i = 0; i < last; i++ ) {
706                                 int             rc;
707
708                                 /*
709                                  * check that each value is valid per syntax
710                                  * and pretty if appropriate
711                                  */
712                                 rc = attr->a_desc->ad_type->sat_equality->smr_normalize(
713                                         SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX,
714                                         attr->a_desc->ad_type->sat_syntax,
715                                         attr->a_desc->ad_type->sat_equality,
716                                         &attr->a_vals[i], &attr->a_nvals[i],
717                                         NULL );
718
719                                 if ( rc != LDAP_SUCCESS ) {
720                                         BER_BVZERO( &attr->a_nvals[i] );
721                                         attr_free( attr );
722                                         goto next_attr;
723                                 }
724                         }
725                         BER_BVZERO( &attr->a_nvals[i] );
726
727                 } else {
728                         attr->a_nvals = attr->a_vals;
729                 }
730                 *attrp = attr;
731                 attrp = &attr->a_next;
732
733 next_attr:;
734         }
735
736         return LDAP_SUCCESS;
737 }
738
739 /* return 0 IFF we can retrieve the entry with ndn
740  */
741 int
742 ldap_back_entry_get(
743                 Operation               *op,
744                 struct berval           *ndn,
745                 ObjectClass             *oc,
746                 AttributeDescription    *at,
747                 int                     rw,
748                 Entry                   **ent )
749 {
750         ldapinfo_t      *li = (ldapinfo_t *) op->o_bd->be_private;
751
752         ldapconn_t      *lc = NULL;
753         int             rc = 1,
754                         do_not_cache;
755         struct berval   bdn;
756         LDAPMessage     *result = NULL,
757                         *e = NULL;
758         char            *attr[3], **attrp = NULL;
759         char            *filter = NULL;
760         SlapReply       rs;
761         int             do_retry = 1;
762         LDAPControl     **ctrls = NULL;
763
764         *ent = NULL;
765
766         /* Tell getconn this is a privileged op */
767         do_not_cache = op->o_do_not_cache;
768         op->o_do_not_cache = 1;
769         if ( !ldap_back_dobind( &lc, op, &rs, LDAP_BACK_DONTSEND ) ) {
770                 op->o_do_not_cache = do_not_cache;
771                 return rs.sr_err;
772         }
773         op->o_do_not_cache = do_not_cache;
774
775         if ( at ) {
776                 attrp = attr;
777                 if ( oc && at != slap_schema.si_ad_objectClass ) {
778                         attr[0] = slap_schema.si_ad_objectClass->ad_cname.bv_val;
779                         attr[1] = at->ad_cname.bv_val;
780                         attr[2] = NULL;
781
782                 } else {
783                         attr[0] = at->ad_cname.bv_val;
784                         attr[1] = NULL;
785                 }
786         }
787
788         if ( oc ) {
789                 char    *ptr;
790
791                 filter = ch_malloc( STRLENOF( "(objectclass=)" ) 
792                                 + oc->soc_cname.bv_len + 1 );
793                 ptr = lutil_strcopy( filter, "(objectclass=" );
794                 ptr = lutil_strcopy( ptr, oc->soc_cname.bv_val );
795                 *ptr++ = ')';
796                 *ptr++ = '\0';
797         }
798
799 retry:
800         ctrls = op->o_ctrls;
801         rc = ldap_back_proxy_authz_ctrl( &lc->lc_bound_ndn,
802                 li->li_version, &li->li_idassert, op, &rs, &ctrls );
803         if ( rc != LDAP_SUCCESS ) {
804                 goto cleanup;
805         }
806         
807         rc = ldap_search_ext_s( lc->lc_ld, ndn->bv_val, LDAP_SCOPE_BASE, filter,
808                                 attrp, 0, ctrls, NULL,
809                                 NULL, LDAP_NO_LIMIT, &result );
810         if ( rc != LDAP_SUCCESS ) {
811                 if ( rc == LDAP_SERVER_DOWN && do_retry ) {
812                         do_retry = 0;
813                         if ( ldap_back_retry( &lc, op, &rs, LDAP_BACK_DONTSEND ) ) {
814                                 /* if the identity changed, there might be need to re-authz */
815                                 (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
816                                 goto retry;
817                         }
818                 }
819                 goto cleanup;
820         }
821
822         e = ldap_first_entry( lc->lc_ld, result );
823         if ( e == NULL ) {
824                 /* the entry exists, but it doesn't match the filter? */
825                 goto cleanup;
826         }
827
828         *ent = entry_alloc();
829         if ( *ent == NULL ) {
830                 rc = LDAP_NO_MEMORY;
831                 goto cleanup;
832         }
833
834         rc = ldap_build_entry( op, e, *ent, &bdn );
835
836         if ( rc != LDAP_SUCCESS ) {
837                 entry_free( *ent );
838                 *ent = NULL;
839         }
840
841 cleanup:
842         (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
843
844         if ( result ) {
845                 ldap_msgfree( result );
846         }
847
848         if ( filter ) {
849                 ch_free( filter );
850         }
851
852         if ( lc != NULL ) {
853                 ldap_back_release_conn( li, lc );
854         }
855
856         return rc;
857 }
858