]> git.sur5r.net Git - openldap/blob - servers/slapd/back-ldap/search.c
allow undefined attrs to be "proxied" (ITS#3959)
[openldap] / servers / slapd / back-ldap / search.c
1 /* search.c - ldap backend search function */
2 /* $OpenLDAP$ */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4  *
5  * Copyright 1999-2005 The OpenLDAP Foundation.
6  * Portions Copyright 1999-2003 Howard Chu.
7  * Portions Copyright 2000-2003 Pierangelo Masarati.
8  * All rights reserved.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted only as authorized by the OpenLDAP
12  * Public License.
13  *
14  * A copy of this license is available in the file LICENSE in the
15  * top-level directory of the distribution or, alternatively, at
16  * <http://www.OpenLDAP.org/license.html>.
17  */
18 /* ACKNOWLEDGEMENTS:
19  * This work was initially developed by the Howard Chu for inclusion
20  * in OpenLDAP Software and subsequently enhanced by Pierangelo
21  * Masarati.
22  */
23
24 #include "portable.h"
25
26 #include <stdio.h>
27
28 #include <ac/socket.h>
29 #include <ac/string.h>
30 #include <ac/time.h>
31
32 #include "slap.h"
33 #include "back-ldap.h"
34 #undef ldap_debug       /* silence a warning in ldap-int.h */
35 #include "../../../libraries/libldap/ldap-int.h"
36
37 #include "lutil.h"
38
39 static int
40 ldap_build_entry( Operation *op, LDAPMessage *e, Entry *ent,
41          struct berval *bdn );
42
43 /*
44  * Quick'n'dirty rewrite of filter in case of error, to deal with
45  * <draft-zeilenga-ldap-t-f>.
46  */
47 static int
48 ldap_back_munge_filter(
49         Operation       *op,
50         struct berval   *filter )
51 {
52         struct ldapinfo *li = (struct ldapinfo *) op->o_bd->be_private;
53
54         char            *ptr;
55         int             gotit = 0;
56
57         Debug( LDAP_DEBUG_ARGS, "=> ldap_back_munge_filter \"%s\"\n",
58                         filter->bv_val, 0, 0 );
59
60         for ( ptr = strstr( filter->bv_val, "(?=" ); 
61                         ptr;
62                         ptr = strstr( ptr, "(?=" ) )
63         {
64                 static struct berval
65                         bv_true = BER_BVC( "(?=true)" ),
66                         bv_false = BER_BVC( "(?=false)" ),
67                         bv_undefined = BER_BVC( "(?=undefined)" ),
68                         bv_t = BER_BVC( "(&)" ),
69                         bv_f = BER_BVC( "(|)" ),
70                         bv_T = BER_BVC( "(objectClass=*)" ),
71                         bv_F = BER_BVC( "(!(objectClass=*))" );
72                 struct berval   *oldbv = NULL,
73                                 *newbv = NULL,
74                                 oldfilter = BER_BVNULL;
75
76                 if ( strncmp( ptr, bv_true.bv_val, bv_true.bv_len ) == 0 ) {
77                         oldbv = &bv_true;
78                         if ( li->flags & LDAP_BACK_F_SUPPORT_T_F ) {
79                                 newbv = &bv_t;
80
81                         } else {
82                                 newbv = &bv_T;
83                         }
84
85                 } else if ( strncmp( ptr, bv_false.bv_val, bv_false.bv_len ) == 0 )
86                 {
87                         oldbv = &bv_false;
88                         if ( li->flags & LDAP_BACK_F_SUPPORT_T_F ) {
89                                 newbv = &bv_f;
90
91                         } else {
92                                 newbv = &bv_F;
93                         }
94
95                 } else if ( strncmp( ptr, bv_undefined.bv_val, bv_undefined.bv_len ) == 0 )
96                 {
97                         oldbv = &bv_undefined;
98                         newbv = &bv_F;
99
100                 } else {
101                         gotit = 0;
102                         goto done;
103                 }
104
105                 oldfilter = *filter;
106                 if ( newbv->bv_len > oldbv->bv_len ) {
107                         filter->bv_len += newbv->bv_len - oldbv->bv_len;
108                         if ( filter->bv_val == op->ors_filterstr.bv_val ) {
109                                 filter->bv_val = op->o_tmpalloc( filter->bv_len + 1,
110                                                 op->o_tmpmemctx );
111
112                                 AC_MEMCPY( filter->bv_val, op->ors_filterstr.bv_val,
113                                                 op->ors_filterstr.bv_len + 1 );
114
115                         } else {
116                                 filter->bv_val = op->o_tmprealloc( filter->bv_val,
117                                                 filter->bv_len + 1, op->o_tmpmemctx );
118                         }
119
120                         ptr = filter->bv_val + ( ptr - oldfilter.bv_val );
121                 }
122
123                 AC_MEMCPY( &ptr[ newbv->bv_len ],
124                                 &ptr[ oldbv->bv_len ], 
125                                 oldfilter.bv_len - ( ptr - filter->bv_val ) - oldbv->bv_len + 1 );
126                 AC_MEMCPY( ptr, newbv->bv_val, newbv->bv_len );
127
128                 ptr += newbv->bv_len;
129                 gotit = 1;
130         }
131
132 done:;
133         Debug( LDAP_DEBUG_ARGS, "<= ldap_back_munge_filter \"%s\" (%d)\n",
134                         filter->bv_val, gotit, 0 );
135
136         return gotit;
137 }
138
139 int
140 ldap_back_search(
141                 Operation       *op,
142                 SlapReply       *rs )
143 {
144         struct ldapconn *lc;
145         struct timeval  tv;
146         time_t          stoptime;
147         LDAPMessage     *res,
148                         *e;
149         int             rc = 0,
150                         msgid; 
151         struct berval   match = BER_BVNULL,
152                         filter = BER_BVNULL;
153         int             i;
154         char            **attrs = NULL;
155         int             freetext = 0;
156         int             do_retry = 1;
157         LDAPControl     **ctrls = NULL;
158
159         lc = ldap_back_getconn( op, rs, LDAP_BACK_SENDERR );
160         if ( !lc || !ldap_back_dobind( lc, op, rs, LDAP_BACK_SENDERR ) ) {
161                 return rs->sr_err;
162         }
163
164         /*
165          * FIXME: in case of values return filter, we might want
166          * to map attrs and maybe rewrite value
167          */
168
169         /* should we check return values? */
170         if ( op->ors_deref != -1 ) {
171                 ldap_set_option( lc->lc_ld, LDAP_OPT_DEREF,
172                                 (void *)&op->ors_deref );
173         }
174
175         if ( op->ors_tlimit != SLAP_NO_LIMIT ) {
176                 tv.tv_sec = op->ors_tlimit;
177                 tv.tv_usec = 0;
178                 stoptime = op->o_time + op->ors_tlimit;
179
180         } else {
181                 tv.tv_sec = 0;
182                 tv.tv_usec = 100000;
183         }
184
185         if ( op->ors_attrs ) {
186                 for ( i = 0; !BER_BVISNULL( &op->ors_attrs[i].an_name ); i++ )
187                         /* just count attrs */ ;
188
189                 attrs = ch_malloc( ( i + 1 )*sizeof( char * ) );
190                 if ( attrs == NULL ) {
191                         rs->sr_err = LDAP_NO_MEMORY;
192                         rc = -1;
193                         goto finish;
194                 }
195         
196                 for ( i = 0; !BER_BVISNULL( &op->ors_attrs[i].an_name ); i++ ) {
197                         attrs[ i ] = op->ors_attrs[i].an_name.bv_val;
198                 }
199                 attrs[ i ] = NULL;
200         }
201
202         ctrls = op->o_ctrls;
203         rc = ldap_back_proxy_authz_ctrl( lc, op, rs, &ctrls );
204         if ( rc != LDAP_SUCCESS ) {
205                 goto finish;
206         }
207
208         /* deal with <draft-zeilenga-ldap-t-f> filters */
209         filter = op->ors_filterstr;
210 retry:
211         rs->sr_err = ldap_search_ext( lc->lc_ld, op->o_req_ndn.bv_val,
212                         op->ors_scope, filter.bv_val,
213                         attrs, op->ors_attrsonly, ctrls, NULL,
214                         tv.tv_sec ? &tv : NULL,
215                         op->ors_slimit, &msgid );
216
217         if ( rs->sr_err != LDAP_SUCCESS ) {
218 fail:;
219                 switch ( rs->sr_err ) {
220                 case LDAP_SERVER_DOWN:
221                         if ( do_retry ) {
222                                 do_retry = 0;
223                                 if ( ldap_back_retry( lc, op, rs, LDAP_BACK_DONTSEND ) ) {
224                                         goto retry;
225                                 }
226                         }
227                         rc = ldap_back_op_result( lc, op, rs, msgid, LDAP_BACK_DONTSEND );
228                         ldap_back_freeconn( op, lc );
229                         lc = NULL;
230                         goto finish;
231
232                 case LDAP_FILTER_ERROR:
233                         if ( ldap_back_munge_filter( op, &filter ) ) {
234                                 goto retry;
235                         }
236
237                         /* invalid filters return success with no data */
238                         rs->sr_err = LDAP_SUCCESS;
239                         rs->sr_text = NULL;
240                         goto finish;
241                 
242                 default:
243                         rs->sr_err = slap_map_api2result( rs );
244                         rs->sr_text = NULL;
245                         goto finish;
246                 }
247         }
248
249         /* We pull apart the ber result, stuff it into a slapd entry, and
250          * let send_search_entry stuff it back into ber format. Slow & ugly,
251          * but this is necessary for version matching, and for ACL processing.
252          */
253
254         for ( rc = 0; rc != -1; rc = ldap_result( lc->lc_ld, msgid, 0, &tv, &res ) )
255         {
256                 /* check for abandon */
257                 if ( op->o_abandon ) {
258                         if ( rc > 0 ) {
259                                 ldap_msgfree( res );
260                         }
261                         ldap_abandon_ext( lc->lc_ld, msgid, NULL, NULL );
262                         rc = SLAPD_ABANDON;
263                         goto finish;
264                 }
265
266                 if ( rc == 0 ) {
267                         tv.tv_sec = 0;
268                         tv.tv_usec = 100000;
269                         ldap_pvt_thread_yield();
270
271                         /* check time limit */
272                         if ( op->ors_tlimit != SLAP_NO_LIMIT
273                                         && slap_get_time() > stoptime )
274                         {
275                                 ldap_abandon_ext( lc->lc_ld, msgid, NULL, NULL );
276                                 rc = rs->sr_err = LDAP_TIMELIMIT_EXCEEDED;
277                                 goto finish;
278                         }
279
280                 } else if ( rc == LDAP_RES_SEARCH_ENTRY ) {
281                         Entry           ent = { 0 };
282                         struct berval   bdn = BER_BVNULL;
283                         int             abort = 0;
284
285                         do_retry = 0;
286
287                         e = ldap_first_entry( lc->lc_ld, res );
288                         rc = ldap_build_entry( op, e, &ent, &bdn );
289                         if ( rc == LDAP_SUCCESS ) {
290                                 rs->sr_entry = &ent;
291                                 rs->sr_attrs = op->ors_attrs;
292                                 rs->sr_operational_attrs = NULL;
293                                 rs->sr_flags = 0;
294                                 abort = send_search_entry( op, rs );
295                                 if ( !BER_BVISNULL( &ent.e_name ) ) {
296                                         assert( ent.e_name.bv_val != bdn.bv_val );
297                                         free( ent.e_name.bv_val );
298                                         BER_BVZERO( &ent.e_name );
299                                 }
300                                 if ( !BER_BVISNULL( &ent.e_nname ) ) {
301                                         free( ent.e_nname.bv_val );
302                                         BER_BVZERO( &ent.e_nname );
303                                 }
304                                 entry_clean( &ent );
305                         }
306                         ldap_msgfree( res );
307                         if ( abort ) {
308                                 ldap_abandon_ext( lc->lc_ld, msgid, NULL, NULL );
309                                 goto finish;
310                         }
311
312                 } else if ( rc == LDAP_RES_SEARCH_REFERENCE ) {
313                         char            **references = NULL;
314
315                         do_retry = 0;
316                         rc = ldap_parse_reference( lc->lc_ld, res,
317                                         &references, &rs->sr_ctrls, 1 );
318
319                         if ( rc != LDAP_SUCCESS ) {
320                                 continue;
321                         }
322
323                         /* FIXME: there MUST be at least one */
324                         if ( references && references[ 0 ] && references[ 0 ][ 0 ] ) {
325                                 int             cnt;
326
327                                 for ( cnt = 0; references[ cnt ]; cnt++ )
328                                         /* NO OP */ ;
329
330                                 /* FIXME: there MUST be at least one */
331                                 rs->sr_ref = ch_malloc( ( cnt + 1 ) * sizeof( struct berval ) );
332
333                                 for ( cnt = 0; references[ cnt ]; cnt++ ) {
334                                         ber_str2bv( references[ cnt ], 0, 0, &rs->sr_ref[ cnt ] );
335                                 }
336                                 BER_BVZERO( &rs->sr_ref[ cnt ] );
337
338                                 /* ignore return value by now */
339                                 ( void )send_search_reference( op, rs );
340
341                         } else {
342                                 Debug( LDAP_DEBUG_ANY,
343                                         "%s ldap_back_search: "
344                                         "got SEARCH_REFERENCE "
345                                         "with no referrals\n",
346                                         op->o_log_prefix, 0, 0 );
347                         }
348
349                         /* cleanup */
350                         if ( references ) {
351                                 ldap_value_free( references );
352                                 ch_free( rs->sr_ref );
353                                 rs->sr_ref = NULL;
354                         }
355
356                         if ( rs->sr_ctrls ) {
357                                 ldap_controls_free( rs->sr_ctrls );
358                                 rs->sr_ctrls = NULL;
359                         }
360
361                 } else {
362                         char            **references = NULL;
363
364                         rc = ldap_parse_result( lc->lc_ld, res, &rs->sr_err,
365                                         &match.bv_val, (char **)&rs->sr_text,
366                                         &references, &rs->sr_ctrls, 1 );
367                         freetext = 1;
368                         if ( rc != LDAP_SUCCESS ) {
369                                 rs->sr_err = rc;
370                         }
371                         rs->sr_err = slap_map_api2result( rs );
372
373                         if ( references && references[ 0 ] && references[ 0 ][ 0 ] ) {
374                                 int     cnt;
375
376                                 if ( rs->sr_err != LDAP_REFERRAL ) {
377                                         /* FIXME: error */
378                                         Debug( LDAP_DEBUG_ANY,
379                                                 "%s ldap_back_search: "
380                                                 "got referrals with %d\n",
381                                                 op->o_log_prefix,
382                                                 rs->sr_err, 0 );
383                                         rs->sr_err = LDAP_REFERRAL;
384                                 }
385
386                                 for ( cnt = 0; references[ cnt ]; cnt++ )
387                                         /* NO OP */ ;
388                                 
389                                 rs->sr_ref = ch_malloc( ( cnt + 1 ) * sizeof( struct berval ) );
390
391                                 for ( cnt = 0; references[ cnt ]; cnt++ ) {
392                                         /* duplicating ...*/
393                                         ber_str2bv( references[ cnt ], 0, 1, &rs->sr_ref[ cnt ] );
394                                 }
395                                 BER_BVZERO( &rs->sr_ref[ cnt ] );
396                         }
397
398                         if ( match.bv_val != NULL ) {
399                                 if ( match.bv_val[ 0 ] == '\0' ) {
400                                         LDAP_FREE( match.bv_val );
401                                         BER_BVZERO( &match );
402                                 } else {
403                                         match.bv_len = strlen( match.bv_val );
404                                 }
405                         }
406
407                         /* cleanup */
408                         if ( references ) {
409                                 ldap_value_free( references );
410                         }
411
412                         rc = 0;
413                         break;
414                 }
415         }
416
417         if ( rc == -1 ) {
418                 if ( do_retry ) {
419                         do_retry = 0;
420                         if ( ldap_back_retry( lc, op, rs, LDAP_BACK_SENDERR ) ) {
421                                 goto retry;
422                         }
423                 }
424                 rs->sr_err = LDAP_SERVER_DOWN;
425                 goto fail;
426         }
427
428         /*
429          * Rewrite the matched portion of the search base, if required
430          */
431         if ( !BER_BVISNULL( &match ) && !BER_BVISEMPTY( &match ) ) {
432                 rs->sr_matched = match.bv_val;
433         }
434
435         if ( rs->sr_v2ref ) {
436                 rs->sr_err = LDAP_REFERRAL;
437         }
438
439 finish:;
440         if ( rc != SLAPD_ABANDON ) {
441                 send_ldap_result( op, rs );
442         }
443
444         (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
445
446         if ( rs->sr_ctrls ) {
447                 ldap_controls_free( rs->sr_ctrls );
448                 rs->sr_ctrls = NULL;
449         }
450
451         if ( match.bv_val ) {
452                 rs->sr_matched = NULL;
453                 LDAP_FREE( match.bv_val );
454         }
455
456         if ( !BER_BVISNULL( &filter ) && filter.bv_val != op->ors_filterstr.bv_val ) {
457                 op->o_tmpfree( filter.bv_val, op->o_tmpmemctx );
458         }
459
460         if ( rs->sr_text ) {
461                 if ( freetext ) {
462                         LDAP_FREE( (char *)rs->sr_text );
463                 }
464                 rs->sr_text = NULL;
465         }
466
467         if ( rs->sr_ref ) {
468                 ber_bvarray_free( rs->sr_ref );
469                 rs->sr_ref = NULL;
470         }
471
472         if ( attrs ) {
473                 ch_free( attrs );
474         }
475
476         if ( lc != NULL ) {
477                 ldap_back_release_conn( op, rs, lc );
478         }
479
480         return rc;
481 }
482
483 static int
484 ldap_build_entry(
485                 Operation       *op,
486                 LDAPMessage     *e,
487                 Entry           *ent,
488                 struct berval   *bdn )
489 {
490         struct berval   a;
491         BerElement      ber = *e->lm_ber;
492         Attribute       *attr, **attrp;
493         const char      *text;
494         int             last;
495
496         /* safe assumptions ... */
497         assert( ent != NULL );
498         BER_BVZERO( &ent->e_bv );
499
500         if ( ber_scanf( &ber, "{m{", bdn ) == LBER_ERROR ) {
501                 return LDAP_DECODING_ERROR;
502         }
503
504         /*
505          * Note: this may fail if the target host(s) schema differs
506          * from the one known to the meta, and a DN with unknown
507          * attributes is returned.
508          * 
509          * FIXME: should we log anything, or delegate to dnNormalize?
510          */
511         /* Note: if the distinguished values or the naming attributes
512          * change, should we massage them as well?
513          */
514         if ( dnPrettyNormal( NULL, bdn, &ent->e_name, &ent->e_nname,
515                 op->o_tmpmemctx ) != LDAP_SUCCESS )
516         {
517                 return LDAP_INVALID_DN_SYNTAX;
518         }
519
520         attrp = &ent->e_attrs;
521
522         while ( ber_scanf( &ber, "{m", &a ) != LBER_ERROR ) {
523                 int                             i;
524                 slap_syntax_validate_func       *validate;
525                 slap_syntax_transform_func      *pretty;
526
527                 attr = (Attribute *)ch_malloc( sizeof( Attribute ) );
528                 if ( attr == NULL ) {
529                         continue;
530                 }
531                 attr->a_flags = 0;
532                 attr->a_next = 0;
533                 attr->a_desc = NULL;
534                 if ( slap_bv2ad( &a, &attr->a_desc, &text ) 
535                                 != LDAP_SUCCESS )
536                 {
537                         if ( slap_bv2undef_ad( &a, &attr->a_desc, &text,
538                                 SLAP_AD_PROXIED ) != LDAP_SUCCESS )
539                         {
540                                 Debug( LDAP_DEBUG_ANY, 
541                                         "%s ldap_build_entry: "
542                                         "slap_bv2undef_ad(%s): %s\n",
543                                         op->o_log_prefix, a.bv_val, text );
544                                 ch_free( attr );
545                                 continue;
546                         }
547                 }
548
549                 /* no subschemaSubentry */
550                 if ( attr->a_desc == slap_schema.si_ad_subschemaSubentry
551                         || attr->a_desc == slap_schema.si_ad_entryDN )
552                 {
553
554                         /* 
555                          * We eat target's subschemaSubentry because
556                          * a search for this value is likely not
557                          * to resolve to the appropriate backend;
558                          * later, the local subschemaSubentry is
559                          * added.
560                          *
561                          * We also eat entryDN because the frontend
562                          * will reattach it without checking if already
563                          * present...
564                          */
565                         ( void )ber_scanf( &ber, "x" /* [W] */ );
566
567                         ch_free( attr );
568                         continue;
569                 }
570                 
571                 if ( ber_scanf( &ber, "[W]", &attr->a_vals ) == LBER_ERROR
572                                 || attr->a_vals == NULL )
573                 {
574                         /*
575                          * Note: attr->a_vals can be null when using
576                          * values result filter
577                          */
578                         attr->a_vals = (struct berval *)&slap_dummy_bv;
579                         last = 0;
580
581                 } else {
582                         for ( last = 0; !BER_BVISNULL( &attr->a_vals[ last ] ); last++ )
583                                 /* just count vals */ ;
584                 }
585
586                 validate = attr->a_desc->ad_type->sat_syntax->ssyn_validate;
587                 pretty = attr->a_desc->ad_type->sat_syntax->ssyn_pretty;
588
589                 if ( !validate && !pretty ) {
590                         attr->a_nvals = NULL;
591                         attr_free( attr );
592                         goto next_attr;
593                 }
594
595                 for ( i = 0; i < last; i++ ) {
596                         struct berval   pval;
597                         int             rc;
598
599                         if ( pretty ) {
600                                 rc = pretty( attr->a_desc->ad_type->sat_syntax,
601                                         &attr->a_vals[i], &pval, NULL );
602
603                         } else {
604                                 rc = validate( attr->a_desc->ad_type->sat_syntax,
605                                         &attr->a_vals[i] );
606                         }
607
608                         if ( rc != LDAP_SUCCESS ) {
609                                 /* check if, by chance, it's an undefined objectClass */
610                                 if ( attr->a_desc == slap_schema.si_ad_objectClass &&
611                                                 oc_bvfind_undef( &attr->a_vals[i] ) != NULL )
612                                 {
613                                         ber_dupbv( &pval, &attr->a_vals[i] );
614
615                                 } else {
616                                         attr->a_nvals = NULL;
617                                         attr_free( attr );
618                                         goto next_attr;
619                                 }
620                         }
621
622                         if ( pretty ) {
623                                 LBER_FREE( attr->a_vals[i].bv_val );
624                                 attr->a_vals[i] = pval;
625                         }
626                 }
627
628                 if ( last && attr->a_desc->ad_type->sat_equality &&
629                                 attr->a_desc->ad_type->sat_equality->smr_normalize )
630                 {
631                         attr->a_nvals = ch_malloc( ( last + 1 )*sizeof( struct berval ) );
632                         for ( i = 0; i < last; i++ ) {
633                                 int             rc;
634
635                                 /*
636                                  * check that each value is valid per syntax
637                                  * and pretty if appropriate
638                                  */
639                                 rc = attr->a_desc->ad_type->sat_equality->smr_normalize(
640                                         SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX,
641                                         attr->a_desc->ad_type->sat_syntax,
642                                         attr->a_desc->ad_type->sat_equality,
643                                         &attr->a_vals[i], &attr->a_nvals[i],
644                                         NULL );
645
646                                 if ( rc != LDAP_SUCCESS ) {
647                                         BER_BVZERO( &attr->a_nvals[i] );
648                                         ch_free( attr );
649                                         goto next_attr;
650                                 }
651                         }
652                         BER_BVZERO( &attr->a_nvals[i] );
653
654                 } else {
655                         attr->a_nvals = attr->a_vals;
656                 }
657                 *attrp = attr;
658                 attrp = &attr->a_next;
659
660 next_attr:;
661         }
662
663         return LDAP_SUCCESS;
664 }
665
666 /* return 0 IFF we can retrieve the entry with ndn
667  */
668 int
669 ldap_back_entry_get(
670                 Operation               *op,
671                 struct berval           *ndn,
672                 ObjectClass             *oc,
673                 AttributeDescription    *at,
674                 int                     rw,
675                 Entry                   **ent
676 )
677 {
678         struct ldapconn *lc;
679         int             rc = 1,
680                         do_not_cache;
681         struct berval   bdn;
682         LDAPMessage     *result = NULL,
683                         *e = NULL;
684         char            *gattr[3];
685         char            *filter = NULL;
686         SlapReply       rs;
687         int             do_retry = 1;
688         LDAPControl     **ctrls = NULL;
689
690         /* Tell getconn this is a privileged op */
691         do_not_cache = op->o_do_not_cache;
692         op->o_do_not_cache = 1;
693         lc = ldap_back_getconn( op, &rs, LDAP_BACK_DONTSEND );
694         if ( !lc || !ldap_back_dobind( lc, op, &rs, LDAP_BACK_DONTSEND ) ) {
695                 op->o_do_not_cache = do_not_cache;
696                 return rs.sr_err;
697         }
698         op->o_do_not_cache = do_not_cache;
699
700         if ( at ) {
701                 if ( oc && at != slap_schema.si_ad_objectClass ) {
702                         gattr[0] = slap_schema.si_ad_objectClass->ad_cname.bv_val;
703                         gattr[1] = at->ad_cname.bv_val;
704                         gattr[2] = NULL;
705
706                 } else {
707                         gattr[0] = at->ad_cname.bv_val;
708                         gattr[1] = NULL;
709                 }
710         }
711
712         if ( oc ) {
713                 char    *ptr;
714
715                 filter = ch_malloc( STRLENOF( "(objectclass=)" ) 
716                                 + oc->soc_cname.bv_len + 1 );
717                 ptr = lutil_strcopy( filter, "(objectclass=" );
718                 ptr = lutil_strcopy( ptr, oc->soc_cname.bv_val );
719                 *ptr++ = ')';
720                 *ptr++ = '\0';
721         }
722
723         ctrls = op->o_ctrls;
724         rc = ldap_back_proxy_authz_ctrl( lc, op, &rs, &ctrls );
725         if ( rc != LDAP_SUCCESS ) {
726                 goto cleanup;
727         }
728         
729 retry:
730         rc = ldap_search_ext_s( lc->lc_ld, ndn->bv_val, LDAP_SCOPE_BASE, filter,
731                                 at ? gattr : NULL, 0, ctrls, NULL,
732                                 LDAP_NO_LIMIT, LDAP_NO_LIMIT, &result );
733         if ( rc != LDAP_SUCCESS ) {
734                 if ( rc == LDAP_SERVER_DOWN && do_retry ) {
735                         do_retry = 0;
736                         if ( ldap_back_retry( lc, op, &rs, LDAP_BACK_DONTSEND ) ) {
737                                 goto retry;
738                         }
739                 }
740                 goto cleanup;
741         }
742
743         e = ldap_first_entry( lc->lc_ld, result );
744         if ( e == NULL ) {
745                 goto cleanup;
746         }
747
748         *ent = ch_calloc( 1, sizeof( Entry ) );
749
750         rc = ldap_build_entry( op, e, *ent, &bdn );
751
752         if ( rc != LDAP_SUCCESS ) {
753                 ch_free( *ent );
754                 *ent = NULL;
755         }
756
757 cleanup:
758         (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
759
760         if ( result ) {
761                 ldap_msgfree( result );
762         }
763
764         if ( filter ) {
765                 ch_free( filter );
766         }
767
768         if ( lc != NULL ) {
769                 ldap_back_release_conn( op, &rs, lc );
770         }
771
772         return rc;
773 }
774