]> git.sur5r.net Git - openldap/blob - servers/slapd/back-meta/search.c
implement search timeout when the remote server does not respond in the specified...
[openldap] / servers / slapd / back-meta / search.c
1 /* $OpenLDAP$ */
2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
3  *
4  * Copyright 1999-2007 The OpenLDAP Foundation.
5  * Portions Copyright 2001-2003 Pierangelo Masarati.
6  * Portions Copyright 1999-2003 Howard Chu.
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted only as authorized by the OpenLDAP
11  * Public License.
12  *
13  * A copy of this license is available in the file LICENSE in the
14  * top-level directory of the distribution or, alternatively, at
15  * <http://www.OpenLDAP.org/license.html>.
16  */
17 /* ACKNOWLEDGEMENTS:
18  * This work was initially developed by the Howard Chu for inclusion
19  * in OpenLDAP Software and subsequently enhanced by Pierangelo
20  * Masarati.
21  */
22
23 #include "portable.h"
24
25 #include <stdio.h>
26
27 #include <ac/socket.h>
28 #include <ac/string.h>
29 #include <ac/time.h>
30
31 #include "lutil.h"
32 #include "slap.h"
33 #include "../back-ldap/back-ldap.h"
34 #include "back-meta.h"
35 #undef ldap_debug       /* silence a warning in ldap-int.h */
36 #include "ldap_log.h"
37 #include "../../../libraries/libldap/ldap-int.h"
38
39 /* IGNORE means that target does not (no longer) participate
40  * in the search;
41  * NOTREADY means the search on that target has not been initialized yet
42  */
43 #define META_MSGID_IGNORE       (-1)
44 #define META_MSGID_NEED_BIND    (-2)
45 #define META_MSGID_CONNECTING   (-3)
46
47 static int
48 meta_send_entry(
49         Operation       *op,
50         SlapReply       *rs,
51         metaconn_t      *mc,
52         int             i,
53         LDAPMessage     *e );
54
55 typedef enum meta_search_candidate_t {
56         META_SEARCH_UNDEFINED = -2,
57         META_SEARCH_ERR = -1,
58         META_SEARCH_NOT_CANDIDATE,
59         META_SEARCH_CANDIDATE,
60         META_SEARCH_BINDING,
61         META_SEARCH_NEED_BIND,
62         META_SEARCH_CONNECTING
63 } meta_search_candidate_t;
64
65 /*
66  * meta_search_dobind_init()
67  *
68  * initiates bind for a candidate target of a search.
69  */
70 static meta_search_candidate_t
71 meta_search_dobind_init(
72         Operation               *op,
73         SlapReply               *rs,
74         metaconn_t              **mcp,
75         int                     candidate,
76         SlapReply               *candidates )
77 {
78         metaconn_t              *mc = *mcp;
79         metainfo_t              *mi = ( metainfo_t * )op->o_bd->be_private;
80         metatarget_t            *mt = mi->mi_targets[ candidate ];
81         metasingleconn_t        *msc = &mc->mc_conns[ candidate ];
82
83         struct berval           binddn = msc->msc_bound_ndn,
84                                 cred = msc->msc_cred;
85         int                     method;
86
87         int                     rc;
88
89         meta_search_candidate_t retcode;
90
91         Debug( LDAP_DEBUG_TRACE, "%s >>> meta_search_dobind_init[%d]\n",
92                 op->o_log_prefix, candidate, 0 );
93
94         /*
95          * all the targets are already bound as pseudoroot
96          */
97         if ( mc->mc_authz_target == META_BOUND_ALL ) {
98                 return META_SEARCH_CANDIDATE;
99         }
100
101         retcode = META_SEARCH_BINDING;
102         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
103         if ( LDAP_BACK_CONN_ISBOUND( msc ) || LDAP_BACK_CONN_ISANON( msc ) ) {
104                 /* already bound (or anonymous) */
105
106 #ifdef DEBUG_205
107                 char    buf[ SLAP_TEXT_BUFLEN ] = { '\0' };
108                 int     bound = 0;
109
110                 if ( LDAP_BACK_CONN_ISBOUND( msc ) ) {
111                         bound = 1;
112                 }
113
114                 snprintf( buf, sizeof( buf ), " mc=%p ld=%p%s DN=\"%s\"",
115                         (void *)mc, (void *)msc->msc_ld,
116                         bound ? " bound" : " anonymous",
117                         bound == 0 ? "" : msc->msc_bound_ndn.bv_val );
118                 Debug( LDAP_DEBUG_ANY, "### %s meta_search_dobind_init[%d]%s\n",
119                         op->o_log_prefix, candidate, buf );
120 #endif /* DEBUG_205 */
121
122                 retcode = META_SEARCH_CANDIDATE;
123
124         } else if ( META_BACK_CONN_CREATING( msc ) || LDAP_BACK_CONN_BINDING( msc ) ) {
125                 /* another thread is binding the target for this conn; wait */
126
127 #ifdef DEBUG_205
128                 char    buf[ SLAP_TEXT_BUFLEN ] = { '\0' };
129
130                 snprintf( buf, sizeof( buf ), " mc=%p ld=%p needbind",
131                         (void *)mc, (void *)msc->msc_ld );
132                 Debug( LDAP_DEBUG_ANY, "### %s meta_search_dobind_init[%d]%s\n",
133                         op->o_log_prefix, candidate, buf );
134 #endif /* DEBUG_205 */
135
136                 candidates[ candidate ].sr_msgid = META_MSGID_NEED_BIND;
137                 retcode = META_SEARCH_NEED_BIND;
138
139         } else {
140                 /* we'll need to bind the target for this conn */
141
142 #ifdef DEBUG_205
143                 char buf[ SLAP_TEXT_BUFLEN ];
144
145                 snprintf( buf, sizeof( buf ), " mc=%p ld=%p binding",
146                         (void *)mc, (void *)msc->msc_ld );
147                 Debug( LDAP_DEBUG_ANY, "### %s meta_search_dobind_init[%d]%s\n",
148                         op->o_log_prefix, candidate, buf );
149 #endif /* DEBUG_205 */
150
151                 if ( msc->msc_ld == NULL ) {
152                         /* for some reason (e.g. because formerly in "binding"
153                          * state, with eventual connection expiration or invalidation)
154                          * it was not initialized as expected */
155
156                         Debug( LDAP_DEBUG_ANY, "%s meta_search_dobind_init[%d] mc=%p ld=NULL\n",
157                                 op->o_log_prefix, candidate, (void *)mc );
158
159                         rc = meta_back_init_one_conn( op, rs, *mcp, candidate,
160                                 LDAP_BACK_CONN_ISPRIV( *mcp ), LDAP_BACK_DONTSEND, 0 );
161                         switch ( rc ) {
162                         case LDAP_SUCCESS:
163                                 assert( msc->msc_ld != NULL );
164                                 break;
165
166                         case LDAP_SERVER_DOWN:
167                         case LDAP_UNAVAILABLE:
168                                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
169                                 goto down;
170         
171                         default:
172                                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
173                                 goto other;
174                         }
175                 }
176
177                 LDAP_BACK_CONN_BINDING_SET( msc );
178         }
179
180         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
181
182         if ( retcode != META_SEARCH_BINDING ) {
183                 return retcode;
184         }
185
186         /* NOTE: this obsoletes pseudorootdn */
187         if ( op->o_conn != NULL &&
188                 !op->o_do_not_cache &&
189                 ( BER_BVISNULL( &msc->msc_bound_ndn ) ||
190                         BER_BVISEMPTY( &msc->msc_bound_ndn ) ||
191                         ( mt->mt_idassert_flags & LDAP_BACK_AUTH_OVERRIDE ) ) )
192         {
193                 rc = meta_back_proxy_authz_cred( mc, candidate, op, rs, LDAP_BACK_DONTSEND, &binddn, &cred, &method );
194                 if ( rc != LDAP_SUCCESS ) {
195                         goto down;
196                 }
197
198                 /* NOTE: we copy things here, even if bind didn't succeed yet,
199                  * because the connection is not shared until bind is over */
200                 if ( !BER_BVISNULL( &binddn ) ) {
201                         ber_bvreplace( &msc->msc_bound_ndn, &binddn );
202                         if ( LDAP_BACK_SAVECRED( mi ) && !BER_BVISNULL( &cred ) ) {
203                                 if ( !BER_BVISNULL( &msc->msc_cred ) ) {
204                                         memset( msc->msc_cred.bv_val, 0,
205                                                 msc->msc_cred.bv_len );
206                                 }
207                                 ber_bvreplace( &msc->msc_cred, &cred );
208                         }
209                 }
210
211                 if ( LDAP_BACK_CONN_ISBOUND( msc ) ) {
212                         /* apparently, idassert was configured with SASL bind,
213                          * so bind occurred inside meta_back_proxy_authz_cred() */
214                         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
215                         LDAP_BACK_CONN_BINDING_CLEAR( msc );
216                         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
217                         return META_SEARCH_CANDIDATE;
218                 }
219
220                 /* paranoid */
221                 switch ( method ) {
222                 case LDAP_AUTH_NONE:
223                 case LDAP_AUTH_SIMPLE:
224                         /* do a simple bind with binddn, cred */
225                         break;
226
227                 default:
228                         assert( 0 );
229                         break;
230                 }
231         }
232
233         assert( msc->msc_ld != NULL );
234
235         /* connect must be async */
236 retry:;
237         ldap_set_option( msc->msc_ld, LDAP_OPT_CONNECT_ASYNC, LDAP_OPT_ON );
238
239         rc = ldap_sasl_bind( msc->msc_ld, binddn.bv_val, LDAP_SASL_SIMPLE, &cred,
240                         NULL, NULL, &candidates[ candidate ].sr_msgid );
241
242 #ifdef DEBUG_205
243         {
244                 char buf[ SLAP_TEXT_BUFLEN ];
245
246                 snprintf( buf, sizeof( buf ), "meta_search_dobind_init[%d] mc=%p ld=%p rc=%d",
247                         candidate, (void *)mc, (void *)mc->mc_conns[ candidate ].msc_ld, rc );
248                 Debug( LDAP_DEBUG_ANY, "### %s %s\n",
249                         op->o_log_prefix, buf, 0 );
250         }
251 #endif /* DEBUG_205 */
252
253         switch ( rc ) {
254         case LDAP_SUCCESS:
255                 assert( candidates[ candidate ].sr_msgid >= 0 );
256                 META_BINDING_SET( &candidates[ candidate ] );
257                 return META_SEARCH_BINDING;
258
259         case LDAP_X_CONNECTING:
260                 /* must retry, same conn */
261                 candidates[ candidate ].sr_msgid = META_MSGID_CONNECTING;
262                 ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
263                 LDAP_BACK_CONN_BINDING_CLEAR( msc );
264                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
265                 return META_SEARCH_CONNECTING;
266
267         case LDAP_SERVER_DOWN:
268 down:;
269                 /* This is the worst thing that could happen:
270                  * the search will wait until the retry is over. */
271                 if ( !META_IS_RETRYING( &candidates[ candidate ] ) ) {
272                         META_RETRYING_SET( &candidates[ candidate ] );
273
274                         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
275
276                         assert( mc->mc_refcnt > 0 );
277                         if ( LogTest( LDAP_DEBUG_ANY ) ) {
278                                 char    buf[ SLAP_TEXT_BUFLEN ];
279
280                                 /* this lock is required; however,
281                                  * it's invoked only when logging is on */
282                                 ldap_pvt_thread_mutex_lock( &mt->mt_uri_mutex );
283                                 snprintf( buf, sizeof( buf ),
284                                         "retrying URI=\"%s\" DN=\"%s\"",
285                                         mt->mt_uri,
286                                         BER_BVISNULL( &msc->msc_bound_ndn ) ?
287                                                 "" : msc->msc_bound_ndn.bv_val );
288                                 ldap_pvt_thread_mutex_unlock( &mt->mt_uri_mutex );
289
290                                 Debug( LDAP_DEBUG_ANY,
291                                         "%s meta_search_dobind_init[%d]: %s.\n",
292                                         op->o_log_prefix, candidate, buf );
293                         }
294
295                         meta_clear_one_candidate( op, mc, candidate );
296                         LDAP_BACK_CONN_ISBOUND_CLEAR( msc );
297
298                         ( void )rewrite_session_delete( mt->mt_rwmap.rwm_rw, op->o_conn );
299
300                         /* mc here must be the regular mc, reset and ready for init */
301                         rc = meta_back_init_one_conn( op, rs, mc, candidate,
302                                 LDAP_BACK_CONN_ISPRIV( mc ), LDAP_BACK_DONTSEND, 0 );
303
304                         if ( rc == LDAP_SUCCESS ) {
305                                 LDAP_BACK_CONN_BINDING_SET( msc );
306                         }
307
308                         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
309
310                         if ( rc == LDAP_SUCCESS ) {
311                                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
312                                 goto retry;
313                         }
314                 }
315
316                 if ( *mcp == NULL ) {
317                         retcode = META_SEARCH_ERR;
318                         rs->sr_err = LDAP_UNAVAILABLE;
319                         break;
320                 }
321                 /* fall thru */
322
323         default:
324 other:;
325                 rs->sr_err = rc;
326                 rc = slap_map_api2result( rs );
327
328                 ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
329                 meta_clear_one_candidate( op, mc, candidate );
330                 candidates[ candidate ].sr_err = rc;
331                 if ( META_BACK_ONERR_STOP( mi ) ) {
332                         LDAP_BACK_CONN_TAINTED_SET( mc );
333                         meta_back_release_conn_lock( mi, mc, 0 );
334                         *mcp = NULL;
335                         rs->sr_err = rc;
336
337                         retcode = META_SEARCH_ERR;
338
339                 } else {
340                         retcode = META_SEARCH_NOT_CANDIDATE;
341                 }
342                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
343                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
344                 break;
345         }
346
347         return retcode;
348 }
349
350 static meta_search_candidate_t
351 meta_search_dobind_result(
352         Operation               *op,
353         SlapReply               *rs,
354         metaconn_t              **mcp,
355         int                     candidate,
356         SlapReply               *candidates,
357         LDAPMessage             *res )
358 {
359         metainfo_t              *mi = ( metainfo_t * )op->o_bd->be_private;
360         metaconn_t              *mc = *mcp;
361         metasingleconn_t        *msc = &mc->mc_conns[ candidate ];
362
363         meta_search_candidate_t retcode = META_SEARCH_NOT_CANDIDATE;
364         int                     rc;
365
366         assert( msc->msc_ld != NULL );
367
368         /* FIXME: matched? referrals? response controls? */
369         rc = ldap_parse_result( msc->msc_ld, res,
370                 &candidates[ candidate ].sr_err,
371                 NULL, NULL, NULL, NULL, 0 );
372         if ( rc != LDAP_SUCCESS ) {
373                 candidates[ candidate ].sr_err = rc;
374
375         } else {
376                 rc = slap_map_api2result( &candidates[ candidate ] );
377         }
378
379         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
380         LDAP_BACK_CONN_BINDING_CLEAR( msc );
381         if ( rc != LDAP_SUCCESS ) {
382                 meta_clear_one_candidate( op, mc, candidate );
383                 candidates[ candidate ].sr_err = rc;
384                 if ( META_BACK_ONERR_STOP( mi ) ) {
385                         LDAP_BACK_CONN_TAINTED_SET( mc );
386                         meta_back_release_conn_lock( mi, mc, 0 );
387                         *mcp = NULL;
388                         retcode = META_SEARCH_ERR;
389                         rs->sr_err = rc;
390                 }
391
392         } else {
393                 /* FIXME: check if bound as idassert authcDN! */
394                 if ( BER_BVISNULL( &msc->msc_bound_ndn )
395                         || BER_BVISEMPTY( &msc->msc_bound_ndn ) )
396                 {
397                         LDAP_BACK_CONN_ISANON_SET( msc );
398
399                 } else {
400                         LDAP_BACK_CONN_ISBOUND_SET( msc );
401                 }
402                 retcode = META_SEARCH_CANDIDATE;
403
404                 /* connect must be async */
405                 ldap_set_option( msc->msc_ld, LDAP_OPT_CONNECT_ASYNC, LDAP_OPT_OFF );
406         }
407
408         candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
409         META_BINDING_CLEAR( &candidates[ candidate ] );
410
411         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
412
413         return retcode;
414 }
415
416 static meta_search_candidate_t
417 meta_back_search_start(
418         Operation               *op,
419         SlapReply               *rs,
420         dncookie                *dc,
421         metaconn_t              **mcp,
422         int                     candidate,
423         SlapReply               *candidates )
424 {
425         metainfo_t              *mi = ( metainfo_t * )op->o_bd->be_private;
426         metatarget_t            *mt = mi->mi_targets[ candidate ];
427         metasingleconn_t        *msc = &(*mcp)->mc_conns[ candidate ];
428         struct berval           realbase = op->o_req_dn;
429         int                     realscope = op->ors_scope;
430         struct berval           mbase = BER_BVNULL; 
431         struct berval           mfilter = BER_BVNULL;
432         char                    **mapped_attrs = NULL;
433         int                     rc;
434         meta_search_candidate_t retcode;
435         struct timeval          tv, *tvp = NULL;
436         int                     nretries = 1;
437         LDAPControl             **ctrls = NULL;
438
439         /* this should not happen; just in case... */
440         if ( msc->msc_ld == NULL ) {
441                 Debug( LDAP_DEBUG_ANY,
442                         "%s: meta_back_search_start candidate=%d ld=NULL%s.\n",
443                         op->o_log_prefix, candidate,
444                         META_BACK_ONERR_STOP( mi ) ? "" : " (ignored)" );
445                 candidates[ candidate ].sr_err = LDAP_OTHER;
446                 if ( META_BACK_ONERR_STOP( mi ) ) {
447                         return META_SEARCH_ERR;
448                 }
449                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
450                 return META_SEARCH_NOT_CANDIDATE;
451         }
452
453         Debug( LDAP_DEBUG_TRACE, "%s >>> meta_back_search_start[%d]\n", op->o_log_prefix, candidate, 0 );
454
455         /*
456          * modifies the base according to the scope, if required
457          */
458         if ( mt->mt_nsuffix.bv_len > op->o_req_ndn.bv_len ) {
459                 switch ( op->ors_scope ) {
460                 case LDAP_SCOPE_SUBTREE:
461                         /*
462                          * make the target suffix the new base
463                          * FIXME: this is very forgiving, because
464                          * "illegal" searchBases may be turned
465                          * into the suffix of the target; however,
466                          * the requested searchBase already passed
467                          * thru the candidate analyzer...
468                          */
469                         if ( dnIsSuffix( &mt->mt_nsuffix, &op->o_req_ndn ) ) {
470                                 realbase = mt->mt_nsuffix;
471                                 if ( mt->mt_scope == LDAP_SCOPE_SUBORDINATE ) {
472                                         realscope = LDAP_SCOPE_SUBORDINATE;
473                                 }
474
475                         } else {
476                                 /*
477                                  * this target is no longer candidate
478                                  */
479                                 retcode = META_SEARCH_NOT_CANDIDATE;
480                                 goto doreturn;
481                         }
482                         break;
483
484                 case LDAP_SCOPE_SUBORDINATE:
485                 case LDAP_SCOPE_ONELEVEL:
486                 {
487                         struct berval   rdn = mt->mt_nsuffix;
488                         rdn.bv_len -= op->o_req_ndn.bv_len + STRLENOF( "," );
489                         if ( dnIsOneLevelRDN( &rdn )
490                                         && dnIsSuffix( &mt->mt_nsuffix, &op->o_req_ndn ) )
491                         {
492                                 /*
493                                  * if there is exactly one level,
494                                  * make the target suffix the new
495                                  * base, and make scope "base"
496                                  */
497                                 realbase = mt->mt_nsuffix;
498                                 if ( op->ors_scope == LDAP_SCOPE_SUBORDINATE ) {
499                                         if ( mt->mt_scope == LDAP_SCOPE_SUBORDINATE ) {
500                                                 realscope = LDAP_SCOPE_SUBORDINATE;
501                                         } else {
502                                                 realscope = LDAP_SCOPE_SUBTREE;
503                                         }
504                                 } else {
505                                         realscope = LDAP_SCOPE_BASE;
506                                 }
507                                 break;
508                         } /* else continue with the next case */
509                 }
510
511                 case LDAP_SCOPE_BASE:
512                         /*
513                          * this target is no longer candidate
514                          */
515                         retcode = META_SEARCH_NOT_CANDIDATE;
516                         goto doreturn;
517                 }
518         }
519
520         /* initiate dobind */
521         retcode = meta_search_dobind_init( op, rs, mcp, candidate, candidates );
522
523         Debug( LDAP_DEBUG_TRACE, "%s <<< meta_search_dobind_init[%d]=%d\n", op->o_log_prefix, candidate, retcode );
524
525         if ( retcode != META_SEARCH_CANDIDATE ) {
526                 goto doreturn;
527         }
528
529         /*
530          * Rewrite the search base, if required
531          */
532         dc->target = mt;
533         dc->ctx = "searchBase";
534         switch ( ldap_back_dn_massage( dc, &realbase, &mbase ) ) {
535         case LDAP_SUCCESS:
536                 break;
537
538         case LDAP_UNWILLING_TO_PERFORM:
539                 rs->sr_err = LDAP_UNWILLING_TO_PERFORM;
540                 rs->sr_text = "Operation not allowed";
541                 send_ldap_result( op, rs );
542                 retcode = META_SEARCH_ERR;
543                 goto doreturn;
544
545         default:
546
547                 /*
548                  * this target is no longer candidate
549                  */
550                 retcode = META_SEARCH_NOT_CANDIDATE;
551                 goto doreturn;
552         }
553
554         /*
555          * Maps filter
556          */
557         rc = ldap_back_filter_map_rewrite( dc, op->ors_filter,
558                         &mfilter, BACKLDAP_MAP );
559         switch ( rc ) {
560         case LDAP_SUCCESS:
561                 break;
562
563         case LDAP_COMPARE_FALSE:
564         default:
565                 /*
566                  * this target is no longer candidate
567                  */
568                 retcode = META_SEARCH_NOT_CANDIDATE;
569                 goto done;
570         }
571
572         /*
573          * Maps required attributes
574          */
575         rc = ldap_back_map_attrs( &mt->mt_rwmap.rwm_at,
576                         op->ors_attrs, BACKLDAP_MAP, &mapped_attrs );
577         if ( rc != LDAP_SUCCESS ) {
578                 /*
579                  * this target is no longer candidate
580                  */
581                 retcode = META_SEARCH_NOT_CANDIDATE;
582                 goto done;
583         }
584
585         /* should we check return values? */
586         if ( op->ors_deref != -1 ) {
587                 assert( msc->msc_ld != NULL );
588                 (void)ldap_set_option( msc->msc_ld, LDAP_OPT_DEREF,
589                                 ( void * )&op->ors_deref );
590         }
591
592         if ( op->ors_tlimit != SLAP_NO_LIMIT ) {
593                 tv.tv_sec = op->ors_tlimit > 0 ? op->ors_tlimit : 1;
594                 tv.tv_usec = 0;
595                 tvp = &tv;
596         }
597
598 retry:;
599         ctrls = op->o_ctrls;
600         if ( ldap_back_proxy_authz_ctrl( &msc->msc_bound_ndn,
601                 mt->mt_version, &mt->mt_idassert, op, rs, &ctrls )
602                 != LDAP_SUCCESS )
603         {
604                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
605                 retcode = META_SEARCH_NOT_CANDIDATE;
606                 goto done;
607         }
608
609         /*
610          * Starts the search
611          */
612         assert( msc->msc_ld != NULL );
613         rc = ldap_search_ext( msc->msc_ld,
614                         mbase.bv_val, realscope, mfilter.bv_val,
615                         mapped_attrs, op->ors_attrsonly,
616                         ctrls, NULL, tvp, op->ors_slimit,
617                         &candidates[ candidate ].sr_msgid ); 
618         switch ( rc ) {
619         case LDAP_SUCCESS:
620                 retcode = META_SEARCH_CANDIDATE;
621                 break;
622         
623         case LDAP_SERVER_DOWN:
624                 if ( nretries && meta_back_retry( op, rs, mcp, candidate, LDAP_BACK_DONTSEND ) ) {
625                         nretries = 0;
626                         /* if the identity changed, there might be need to re-authz */
627                         (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
628                         goto retry;
629                 }
630
631                 if ( *mcp == NULL ) {
632                         retcode = META_SEARCH_ERR;
633                         break;
634                 }
635                 /* fall thru */
636
637         default:
638                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
639                 retcode = META_SEARCH_NOT_CANDIDATE;
640         }
641
642 done:;
643         (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
644
645         if ( mapped_attrs ) {
646                 free( mapped_attrs );
647         }
648         if ( mfilter.bv_val != op->ors_filterstr.bv_val ) {
649                 free( mfilter.bv_val );
650         }
651         if ( mbase.bv_val != realbase.bv_val ) {
652                 free( mbase.bv_val );
653         }
654
655 doreturn:;
656         Debug( LDAP_DEBUG_TRACE, "%s <<< meta_back_search_start[%d]=%d\n", op->o_log_prefix, candidate, retcode );
657
658         return retcode;
659 }
660
661 int
662 meta_back_search( Operation *op, SlapReply *rs )
663 {
664         metainfo_t      *mi = ( metainfo_t * )op->o_bd->be_private;
665         metaconn_t      *mc;
666         struct timeval  save_tv = { 0, 0 },
667                         tv;
668         time_t          stoptime = (time_t)(-1),
669                         lastres_time = slap_get_time();
670         int             rc = 0, sres = LDAP_SUCCESS;
671         char            *matched = NULL;
672         int             last = 0, ncandidates = 0,
673                         initial_candidates = 0, candidate_match = 0,
674                         needbind = 0;
675         ldap_back_send_t        sendok = LDAP_BACK_SENDERR;
676         long            i;
677         dncookie        dc;
678         int             is_ok = 0;
679         void            *savepriv;
680         SlapReply       *candidates = meta_back_candidates_get( op );
681
682         /*
683          * controls are set in ldap_back_dobind()
684          * 
685          * FIXME: in case of values return filter, we might want
686          * to map attrs and maybe rewrite value
687          */
688 getconn:;
689         mc = meta_back_getconn( op, rs, NULL, sendok );
690         if ( !mc ) {
691                 return rs->sr_err;
692         }
693
694         dc.conn = op->o_conn;
695         dc.rs = rs;
696
697         /*
698          * Inits searches
699          */
700         for ( i = 0; i < mi->mi_ntargets; i++ ) {
701                 /* reset sr_msgid; it is used in most loops
702                  * to check if that target is still to be considered */
703                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
704
705                 /* a target is marked as candidate by meta_back_getconn();
706                  * if for any reason (an error, it's over or so) it is
707                  * no longer active, sr_msgid is set to META_MSGID_IGNORE
708                  * but it remains candidate, which means it has been active
709                  * at some point during the operation.  This allows to 
710                  * use its response code and more to compute the final
711                  * response */
712                 if ( !META_IS_CANDIDATE( &candidates[ i ] ) ) {
713                         continue;
714                 }
715
716                 candidates[ i ].sr_matched = NULL;
717                 candidates[ i ].sr_text = NULL;
718                 candidates[ i ].sr_ref = NULL;
719                 candidates[ i ].sr_ctrls = NULL;
720         }
721
722         for ( i = 0; i < mi->mi_ntargets; i++ ) {
723                 if ( !META_IS_CANDIDATE( &candidates[ i ] )
724                         || candidates[ i ].sr_err != LDAP_SUCCESS )
725                 {
726                         continue;
727                 }
728
729                 switch ( meta_back_search_start( op, rs, &dc, &mc, i, candidates ) )
730                 {
731                 case META_SEARCH_NOT_CANDIDATE:
732                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
733                         break;
734
735                 case META_SEARCH_NEED_BIND:
736                         ++needbind;
737                         /* fallthru */
738
739                 case META_SEARCH_CONNECTING:
740                 case META_SEARCH_CANDIDATE:
741                 case META_SEARCH_BINDING:
742                         candidates[ i ].sr_type = REP_INTERMEDIATE;
743                         ++ncandidates;
744                         break;
745
746                 case META_SEARCH_ERR:
747                         savepriv = op->o_private;
748                         op->o_private = (void *)i;
749                         send_ldap_result( op, rs );
750                         op->o_private = savepriv;
751                         rc = -1;
752                         goto finish;
753
754                 default:
755                         assert( 0 );
756                         break;
757                 }
758         }
759
760         if ( ncandidates > 0 && needbind == ncandidates ) {
761                 /*
762                  * give up the second time...
763                  *
764                  * NOTE: this should not occur the second time, since a fresh
765                  * connection has ben created; however, targets may also
766                  * need bind because the bind timed out or so.
767                  */
768                 if ( sendok & LDAP_BACK_BINDING ) {
769                         Debug( LDAP_DEBUG_ANY,
770                                 "%s meta_back_search: unable to initialize conn\n",
771                                 op->o_log_prefix, 0, 0 );
772                         rs->sr_err = LDAP_UNAVAILABLE;
773                         rs->sr_text = "unable to initialize connection to remote targets";
774                         send_ldap_result( op, rs );
775                         rc = -1;
776                         goto finish;
777                 }
778
779                 /* FIXME: better create a separate connection? */
780                 sendok |= LDAP_BACK_BINDING;
781
782 #ifdef DEBUG_205
783                 Debug( LDAP_DEBUG_ANY, "*** %s drop mc=%p create new connection\n",
784                         op->o_log_prefix, (void *)mc, 0 );
785 #endif /* DEBUG_205 */
786
787                 meta_back_release_conn( mi, mc );
788                 mc = NULL;
789
790                 needbind = 0;
791                 ncandidates = 0;
792
793                 goto getconn;
794         }
795
796         initial_candidates = ncandidates;
797
798         if ( LogTest( LDAP_DEBUG_TRACE ) ) {
799                 char    cnd[ SLAP_TEXT_BUFLEN ];
800                 int     c;
801
802                 for ( c = 0; c < mi->mi_ntargets; c++ ) {
803                         if ( META_IS_CANDIDATE( &candidates[ c ] ) ) {
804                                 cnd[ c ] = '*';
805                         } else {
806                                 cnd[ c ] = ' ';
807                         }
808                 }
809                 cnd[ c ] = '\0';
810
811                 Debug( LDAP_DEBUG_TRACE, "%s meta_back_search: ncandidates=%d "
812                         "cnd=\"%s\"\n", op->o_log_prefix, ncandidates, cnd );
813         }
814
815         if ( initial_candidates == 0 ) {
816                 /* NOTE: here we are not sending any matchedDN;
817                  * this is intended, because if the back-meta
818                  * is serving this search request, but no valid
819                  * candidate could be looked up, it means that
820                  * there is a hole in the mapping of the targets
821                  * and thus no knowledge of any remote superior
822                  * is available */
823                 Debug( LDAP_DEBUG_ANY, "%s meta_back_search: "
824                         "base=\"%s\" scope=%d: "
825                         "no candidate could be selected\n",
826                         op->o_log_prefix, op->o_req_dn.bv_val,
827                         op->ors_scope );
828
829                 /* FIXME: we're sending the first error we encounter;
830                  * maybe we should pick the worst... */
831                 rc = LDAP_NO_SUCH_OBJECT;
832                 for ( i = 0; i < mi->mi_ntargets; i++ ) {
833                         if ( META_IS_CANDIDATE( &candidates[ i ] )
834                                 && candidates[ i ].sr_err != LDAP_SUCCESS )
835                         {
836                                 rc = candidates[ i ].sr_err;
837                                 break;
838                         }
839                 }
840
841                 send_ldap_error( op, rs, rc, NULL );
842
843                 goto finish;
844         }
845
846         /* We pull apart the ber result, stuff it into a slapd entry, and
847          * let send_search_entry stuff it back into ber format. Slow & ugly,
848          * but this is necessary for version matching, and for ACL processing.
849          */
850
851         if ( op->ors_tlimit != SLAP_NO_LIMIT ) {
852                 stoptime = op->o_time + op->ors_tlimit;
853         }
854
855         /*
856          * In case there are no candidates, no cycle takes place...
857          *
858          * FIXME: we might use a queue, to better balance the load 
859          * among the candidates
860          */
861         for ( rc = 0; ncandidates > 0; ) {
862                 int     gotit = 0,
863                         doabandon = 0,
864                         alreadybound = ncandidates;
865                 time_t  curr_time = 0;
866
867                 /* check timeout */
868                 if ( mi->mi_timeout[ SLAP_OP_SEARCH ]
869                         && lastres_time > 0
870                         && ( slap_get_time() - lastres_time ) > mi->mi_timeout[ SLAP_OP_SEARCH ] )
871                 {
872                         doabandon = 1;
873                         rs->sr_text = "Operation timed out";
874                         rc = rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED;
875                         savepriv = op->o_private;
876                         op->o_private = (void *)i;
877                         send_ldap_result( op, rs );
878                         op->o_private = savepriv;
879                         goto finish;
880                 }
881
882                 /* check time limit */
883                 if ( op->ors_tlimit != SLAP_NO_LIMIT
884                                 && slap_get_time() > stoptime )
885                 {
886                         doabandon = 1;
887                         rc = rs->sr_err = LDAP_TIMELIMIT_EXCEEDED;
888                         savepriv = op->o_private;
889                         op->o_private = (void *)i;
890                         send_ldap_result( op, rs );
891                         op->o_private = savepriv;
892                         goto finish;
893                 }
894
895                 for ( i = 0; i < mi->mi_ntargets; i++ ) {
896                         meta_search_candidate_t retcode = META_SEARCH_UNDEFINED;
897                         metasingleconn_t        *msc = &mc->mc_conns[ i ];
898                         LDAPMessage             *res = NULL, *msg;
899
900                         /* if msgid is invalid, don't ldap_result() */
901                         if ( candidates[ i ].sr_msgid == META_MSGID_IGNORE ) {
902                                 continue;
903                         }
904
905                         /* if target still needs bind, retry */
906                         if ( candidates[ i ].sr_msgid == META_MSGID_NEED_BIND
907                                 || candidates[ i ].sr_msgid == META_MSGID_CONNECTING )
908                         {
909                                 /* initiate dobind */
910                                 retcode = meta_search_dobind_init( op, rs, &mc, i, candidates );
911
912                                 Debug( LDAP_DEBUG_TRACE, "%s <<< meta_search_dobind_init[%ld]=%d\n",
913                                         op->o_log_prefix, i, retcode );
914
915                                 switch ( retcode ) {
916                                 case META_SEARCH_NEED_BIND:
917                                         alreadybound--;
918                                         /* fallthru */
919
920                                 case META_SEARCH_CONNECTING:
921                                 case META_SEARCH_BINDING:
922                                         break;
923
924                                 case META_SEARCH_ERR:
925                                         candidates[ i ].sr_err = rs->sr_err;
926                                         if ( META_BACK_ONERR_STOP( mi ) ) {
927                                                 savepriv = op->o_private;
928                                                 op->o_private = (void *)i;
929                                                 send_ldap_result( op, rs );
930                                                 op->o_private = savepriv;
931                                                 goto finish;
932                                         }
933                                         /* fallthru */
934
935                                 case META_SEARCH_NOT_CANDIDATE:
936                                         /*
937                                          * When no candidates are left,
938                                          * the outer cycle finishes
939                                          */
940                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
941                                         assert( ncandidates > 0 );
942                                         --ncandidates;
943                                         break;
944
945                                 case META_SEARCH_CANDIDATE:
946                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
947                                         switch ( meta_back_search_start( op, rs, &dc, &mc, i, candidates ) )
948                                         {
949                                         case META_SEARCH_CANDIDATE:
950                                                 assert( candidates[ i ].sr_msgid >= 0 );
951                                                 break;
952
953                                         case META_SEARCH_ERR:
954                                                 candidates[ i ].sr_err = rs->sr_err;
955                                                 if ( META_BACK_ONERR_STOP( mi ) ) {
956                                                         savepriv = op->o_private;
957                                                         op->o_private = (void *)i;
958                                                         send_ldap_result( op, rs );
959                                                         op->o_private = savepriv;
960                                                         goto finish;
961                                                 }
962                                                 /* fallthru */
963
964                                         case META_SEARCH_NOT_CANDIDATE:
965                                                 /* means that meta_back_search_start()
966                                                  * failed but onerr == continue */
967                                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
968                                                 assert( ncandidates > 0 );
969                                                 --ncandidates;
970                                                 break;
971
972                                         default:
973                                                 /* impossible */
974                                                 assert( 0 );
975                                                 break;
976                                         }
977                                         break;
978
979                                 default:
980                                         /* impossible */
981                                         assert( 0 );
982                                         break;
983                                 }
984                                 continue;
985                         }
986
987                         /* check for abandon */
988                         if ( op->o_abandon || LDAP_BACK_CONN_ABANDON( mc ) ) {
989                                 break;
990                         }
991
992 #ifdef DEBUG_205
993                         if ( msc->msc_ld == NULL ) {
994                                 char    buf[ SLAP_TEXT_BUFLEN ];
995
996                                 ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
997                                 snprintf( buf, sizeof( buf ),
998                                         "%s meta_back_search[%ld] mc=%p msgid=%d%s%s%s\n",
999                                         op->o_log_prefix, (long)i, (void *)mc,
1000                                         candidates[ i ].sr_msgid,
1001                                         META_IS_BINDING( &candidates[ i ] ) ? " binding" : "",
1002                                         LDAP_BACK_CONN_BINDING( &mc->mc_conns[ i ] ) ? " connbinding" : "",
1003                                         META_BACK_CONN_CREATING( &mc->mc_conns[ i ] ) ? " conncreating" : "" );
1004                                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
1005                                         
1006                                 Debug( LDAP_DEBUG_ANY, "!!! %s\n", buf, 0, 0 );
1007                         }
1008 #endif /* DEBUG_205 */
1009                         
1010                         /*
1011                          * FIXME: handle time limit as well?
1012                          * Note that target servers are likely 
1013                          * to handle it, so at some time we'll
1014                          * get a LDAP_TIMELIMIT_EXCEEDED from
1015                          * one of them ...
1016                          */
1017                         tv = save_tv;
1018                         rc = ldap_result( msc->msc_ld, candidates[ i ].sr_msgid,
1019                                         LDAP_MSG_RECEIVED, &tv, &res );
1020                         switch ( rc ) {
1021                         case 0:
1022                                 /* FIXME: res should not need to be freed */
1023                                 assert( res == NULL );
1024                                 continue;
1025
1026                         case -1:
1027 really_bad:;
1028                                 /* something REALLY bad happened! */
1029                                 if ( candidates[ i ].sr_type == REP_INTERMEDIATE ) {
1030                                         candidates[ i ].sr_type = REP_RESULT;
1031
1032                                         if ( meta_back_retry( op, rs, &mc, i, LDAP_BACK_DONTSEND ) ) {
1033                                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1034                                                 switch ( meta_back_search_start( op, rs, &dc, &mc, i, candidates ) )
1035                                                 {
1036                                                         /* means that failed but onerr == continue */
1037                                                 case META_SEARCH_NOT_CANDIDATE:
1038                                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1039
1040                                                         assert( ncandidates > 0 );
1041                                                         --ncandidates;
1042
1043                                                         candidates[ i ].sr_err = rs->sr_err;
1044                                                         if ( META_BACK_ONERR_STOP( mi ) ) {
1045                                                                 savepriv = op->o_private;
1046                                                                 op->o_private = (void *)i;
1047                                                                 send_ldap_result( op, rs );
1048                                                                 op->o_private = savepriv;
1049                                                                 goto finish;
1050                                                         }
1051                                                         /* fall thru */
1052
1053                                                 case META_SEARCH_CANDIDATE:
1054                                                         /* get back into business... */
1055                                                         continue;
1056
1057                                                 case META_SEARCH_BINDING:
1058                                                 case META_SEARCH_CONNECTING:
1059                                                 case META_SEARCH_NEED_BIND:
1060                                                 case META_SEARCH_UNDEFINED:
1061                                                         assert( 0 );
1062
1063                                                 default:
1064                                                         /* unrecoverable error */
1065                                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1066                                                         rc = rs->sr_err = LDAP_OTHER;
1067                                                         goto finish;
1068                                                 }
1069                                         }
1070
1071                                         candidates[ i ].sr_err = rs->sr_err;
1072                                         if ( META_BACK_ONERR_STOP( mi ) ) {
1073                                                 savepriv = op->o_private;
1074                                                 op->o_private = (void *)i;
1075                                                 send_ldap_result( op, rs );
1076                                                 op->o_private = savepriv;
1077                                                 goto finish;
1078                                         }
1079                                 }
1080
1081                                 /*
1082                                  * When no candidates are left,
1083                                  * the outer cycle finishes
1084                                  */
1085                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1086                                 assert( ncandidates > 0 );
1087                                 --ncandidates;
1088                                 rs->sr_err = candidates[ i ].sr_err;
1089                                 continue;
1090
1091                         default:
1092                                 lastres_time = slap_get_time();
1093
1094                                 /* only touch when activity actually took place... */
1095                                 if ( mi->mi_idle_timeout != 0 && msc->msc_time < lastres_time ) {
1096                                         msc->msc_time = lastres_time;
1097                                 }
1098                                 break;
1099                         }
1100
1101                         for ( msg = ldap_first_message( msc->msc_ld, res );
1102                                 msg != NULL;
1103                                 msg = ldap_next_message( msc->msc_ld, msg ) )
1104                         {
1105                                 rc = ldap_msgtype( msg );
1106                                 if ( rc == LDAP_RES_SEARCH_ENTRY ) {
1107                                         LDAPMessage     *e;
1108
1109                                         if ( candidates[ i ].sr_type == REP_INTERMEDIATE ) {
1110                                                 /* don't retry any more... */
1111                                                 candidates[ i ].sr_type = REP_RESULT;
1112                                         }
1113
1114                                         is_ok++;
1115
1116                                         e = ldap_first_entry( msc->msc_ld, msg );
1117                                         savepriv = op->o_private;
1118                                         op->o_private = (void *)i;
1119                                         rs->sr_err = meta_send_entry( op, rs, mc, i, e );
1120
1121                                         switch ( rs->sr_err ) {
1122                                         case LDAP_SIZELIMIT_EXCEEDED:
1123                                                 savepriv = op->o_private;
1124                                                 op->o_private = (void *)i;
1125                                                 send_ldap_result( op, rs );
1126                                                 op->o_private = savepriv;
1127                                                 rs->sr_err = LDAP_SUCCESS;
1128                                                 ldap_msgfree( res );
1129                                                 res = NULL;
1130                                                 goto finish;
1131
1132                                         case LDAP_UNAVAILABLE:
1133                                                 rs->sr_err = LDAP_OTHER;
1134                                                 ldap_msgfree( res );
1135                                                 res = NULL;
1136                                                 goto finish;
1137                                         }
1138                                         op->o_private = savepriv;
1139
1140                                         /* don't wait any longer... */
1141                                         gotit = 1;
1142                                         save_tv.tv_sec = 0;
1143                                         save_tv.tv_usec = 0;
1144
1145                                 } else if ( rc == LDAP_RES_SEARCH_REFERENCE ) {
1146                                         char            **references = NULL;
1147                                         int             cnt;
1148
1149                                         if ( candidates[ i ].sr_type == REP_INTERMEDIATE ) {
1150                                                 /* don't retry any more... */
1151                                                 candidates[ i ].sr_type = REP_RESULT;
1152                                         }
1153         
1154                                         is_ok++;
1155         
1156                                         rc = ldap_parse_reference( msc->msc_ld, msg,
1157                                                         &references, &rs->sr_ctrls, 0 );
1158         
1159                                         if ( rc != LDAP_SUCCESS ) {
1160                                                 continue;
1161                                         }
1162         
1163                                         if ( references == NULL ) {
1164                                                 continue;
1165                                         }
1166
1167 #ifdef ENABLE_REWRITE
1168                                         dc.ctx = "referralDN";
1169 #else /* ! ENABLE_REWRITE */
1170                                         dc.tofrom = 0;
1171                                         dc.normalized = 0;
1172 #endif /* ! ENABLE_REWRITE */
1173
1174                                         /* FIXME: merge all and return at the end */
1175         
1176                                         for ( cnt = 0; references[ cnt ]; cnt++ )
1177                                                 ;
1178         
1179                                         rs->sr_ref = ch_calloc( sizeof( struct berval ), cnt + 1 );
1180         
1181                                         for ( cnt = 0; references[ cnt ]; cnt++ ) {
1182                                                 ber_str2bv( references[ cnt ], 0, 1, &rs->sr_ref[ cnt ] );
1183                                         }
1184                                         BER_BVZERO( &rs->sr_ref[ cnt ] );
1185         
1186                                         ( void )ldap_back_referral_result_rewrite( &dc, rs->sr_ref );
1187
1188                                         if ( rs->sr_ref != NULL && !BER_BVISNULL( &rs->sr_ref[ 0 ] ) ) {
1189                                                 /* ignore return value by now */
1190                                                 savepriv = op->o_private;
1191                                                 op->o_private = (void *)i;
1192                                                 ( void )send_search_reference( op, rs );
1193                                                 op->o_private = savepriv;
1194         
1195                                                 ber_bvarray_free( rs->sr_ref );
1196                                                 rs->sr_ref = NULL;
1197                                         }
1198
1199                                         /* cleanup */
1200                                         if ( references ) {
1201                                                 ber_memvfree( (void **)references );
1202                                         }
1203
1204                                         if ( rs->sr_ctrls ) {
1205                                                 ldap_controls_free( rs->sr_ctrls );
1206                                                 rs->sr_ctrls = NULL;
1207                                         }
1208
1209                                 } else if ( rc == LDAP_RES_SEARCH_RESULT ) {
1210                                         char            buf[ SLAP_TEXT_BUFLEN ];
1211                                         char            **references = NULL;
1212
1213                                         if ( candidates[ i ].sr_type == REP_INTERMEDIATE ) {
1214                                                 /* don't retry any more... */
1215                                                 candidates[ i ].sr_type = REP_RESULT;
1216                                         }
1217         
1218                                         /* NOTE: ignores response controls
1219                                          * (and intermediate response controls
1220                                          * as well, except for those with search
1221                                          * references); this may not be correct,
1222                                          * but if they're not ignored then
1223                                          * back-meta would need to merge them
1224                                          * consistently (think of pagedResults...)
1225                                          */
1226                                         /* FIXME: response controls? */
1227                                         rs->sr_err = ldap_parse_result( msc->msc_ld,
1228                                                 msg,
1229                                                 &candidates[ i ].sr_err,
1230                                                 (char **)&candidates[ i ].sr_matched,
1231                                                 NULL /* (char **)&candidates[ i ].sr_text */ ,
1232                                                 &references,
1233                                                 NULL /* &candidates[ i ].sr_ctrls (unused) */ ,
1234                                                 0 );
1235                                         if ( rs->sr_err != LDAP_SUCCESS ) {
1236                                                 ldap_get_option( msc->msc_ld,
1237                                                         LDAP_OPT_ERROR_NUMBER,
1238                                                         &rs->sr_err );
1239                                                 sres = slap_map_api2result( rs );
1240                                                 candidates[ i ].sr_type = REP_RESULT;
1241                                                 ldap_msgfree( res );
1242                                                 res = NULL;
1243                                                 goto really_bad;
1244                                         }
1245
1246                                         /* massage matchedDN if need be */
1247                                         if ( candidates[ i ].sr_matched != NULL ) {
1248                                                 struct berval   match, mmatch;
1249
1250                                                 ber_str2bv( candidates[ i ].sr_matched,
1251                                                         0, 0, &match );
1252                                                 candidates[ i ].sr_matched = NULL;
1253
1254                                                 dc.ctx = "matchedDN";
1255                                                 dc.target = mi->mi_targets[ i ];
1256                                                 if ( !ldap_back_dn_massage( &dc, &match, &mmatch ) ) {
1257                                                         if ( mmatch.bv_val == match.bv_val ) {
1258                                                                 candidates[ i ].sr_matched
1259                                                                         = ch_strdup( mmatch.bv_val );
1260
1261                                                         } else {
1262                                                                 candidates[ i ].sr_matched = mmatch.bv_val;
1263                                                         }
1264
1265                                                         candidate_match++;
1266                                                 } 
1267                                                 ldap_memfree( match.bv_val );
1268                                         }
1269
1270                                         /* add references to array */
1271                                         if ( references ) {
1272                                                 BerVarray       sr_ref;
1273                                                 int             cnt;
1274         
1275                                                 for ( cnt = 0; references[ cnt ]; cnt++ )
1276                                                         ;
1277         
1278                                                 sr_ref = ch_calloc( sizeof( struct berval ), cnt + 1 );
1279         
1280                                                 for ( cnt = 0; references[ cnt ]; cnt++ ) {
1281                                                         ber_str2bv( references[ cnt ], 0, 1, &sr_ref[ cnt ] );
1282                                                 }
1283                                                 BER_BVZERO( &sr_ref[ cnt ] );
1284         
1285                                                 ( void )ldap_back_referral_result_rewrite( &dc, sr_ref );
1286                                         
1287                                                 /* cleanup */
1288                                                 ber_memvfree( (void **)references );
1289         
1290                                                 if ( rs->sr_v2ref == NULL ) {
1291                                                         rs->sr_v2ref = sr_ref;
1292
1293                                                 } else {
1294                                                         for ( cnt = 0; !BER_BVISNULL( &sr_ref[ cnt ] ); cnt++ ) {
1295                                                                 ber_bvarray_add( &rs->sr_v2ref, &sr_ref[ cnt ] );
1296                                                         }
1297                                                         ber_memfree( sr_ref );
1298                                                 }
1299                                         }
1300         
1301                                         rs->sr_err = candidates[ i ].sr_err;
1302                                         sres = slap_map_api2result( rs );
1303         
1304                                         if ( LogTest( LDAP_DEBUG_TRACE | LDAP_DEBUG_ANY ) ) {
1305                                                 snprintf( buf, sizeof( buf ),
1306                                                         "%s meta_back_search[%ld] "
1307                                                         "match=\"%s\" err=%ld",
1308                                                         op->o_log_prefix, i,
1309                                                         candidates[ i ].sr_matched ? candidates[ i ].sr_matched : "",
1310                                                         (long) candidates[ i ].sr_err );
1311                                                 if ( candidates[ i ].sr_err == LDAP_SUCCESS ) {
1312                                                         Debug( LDAP_DEBUG_TRACE, "%s.\n", buf, 0, 0 );
1313         
1314                                                 } else {
1315                                                         Debug( LDAP_DEBUG_ANY, "%s (%s).\n",
1316                                                                 buf, ldap_err2string( candidates[ i ].sr_err ), 0 );
1317                                                 }
1318                                         }
1319         
1320                                         switch ( sres ) {
1321                                         case LDAP_NO_SUCH_OBJECT:
1322                                                 /* is_ok is touched any time a valid
1323                                                  * (even intermediate) result is
1324                                                  * returned; as a consequence, if
1325                                                  * a candidate returns noSuchObject
1326                                                  * it is ignored and the candidate
1327                                                  * is simply demoted. */
1328                                                 if ( is_ok ) {
1329                                                         sres = LDAP_SUCCESS;
1330                                                 }
1331                                                 break;
1332         
1333                                         case LDAP_SUCCESS:
1334                                         case LDAP_REFERRAL:
1335                                                 is_ok++;
1336                                                 break;
1337         
1338                                         case LDAP_SIZELIMIT_EXCEEDED:
1339                                                 /* if a target returned sizelimitExceeded
1340                                                  * and the entry count is equal to the
1341                                                  * proxy's limit, the target would have
1342                                                  * returned more, and the error must be
1343                                                  * propagated to the client; otherwise,
1344                                                  * the target enforced a limit lower
1345                                                  * than what requested by the proxy;
1346                                                  * ignore it */
1347                                                 candidates[ i ].sr_err = rs->sr_err;
1348                                                 if ( rs->sr_nentries == op->ors_slimit
1349                                                         || META_BACK_ONERR_STOP( mi ) )
1350                                                 {
1351                                                         savepriv = op->o_private;
1352                                                         op->o_private = (void *)i;
1353                                                         send_ldap_result( op, rs );
1354                                                         op->o_private = savepriv;
1355                                                         ldap_msgfree( res );
1356                                                         res = NULL;
1357                                                         goto finish;
1358                                                 }
1359                                                 break;
1360         
1361                                         default:
1362                                                 candidates[ i ].sr_err = rs->sr_err;
1363                                                 if ( META_BACK_ONERR_STOP( mi ) ) {
1364                                                         savepriv = op->o_private;
1365                                                         op->o_private = (void *)i;
1366                                                         send_ldap_result( op, rs );
1367                                                         op->o_private = savepriv;
1368                                                         ldap_msgfree( res );
1369                                                         res = NULL;
1370                                                         goto finish;
1371                                                 }
1372                                                 break;
1373                                         }
1374         
1375                                         last = i;
1376                                         rc = 0;
1377         
1378                                         /*
1379                                          * When no candidates are left,
1380                                          * the outer cycle finishes
1381                                          */
1382                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1383                                         assert( ncandidates > 0 );
1384                                         --ncandidates;
1385         
1386                                 } else if ( rc == LDAP_RES_BIND ) {
1387                                         meta_search_candidate_t retcode;
1388         
1389                                         retcode = meta_search_dobind_result( op, rs, &mc, i, candidates, msg );
1390                                         if ( retcode == META_SEARCH_CANDIDATE ) {
1391                                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1392                                                 retcode = meta_back_search_start( op, rs, &dc, &mc, i, candidates );
1393                                         }
1394         
1395                                         switch ( retcode ) {
1396                                         case META_SEARCH_CANDIDATE:
1397                                                 break;
1398         
1399                                                 /* means that failed but onerr == continue */
1400                                         case META_SEARCH_NOT_CANDIDATE:
1401                                         case META_SEARCH_ERR:
1402                                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1403                                                 assert( ncandidates > 0 );
1404                                                 --ncandidates;
1405         
1406                                                 candidates[ i ].sr_err = rs->sr_err;
1407                                                 if ( META_BACK_ONERR_STOP( mi ) ) {
1408                                                         savepriv = op->o_private;
1409                                                         op->o_private = (void *)i;
1410                                                         send_ldap_result( op, rs );
1411                                                         op->o_private = savepriv;
1412                                                         ldap_msgfree( res );
1413                                                         res = NULL;
1414                                                         goto finish;
1415                                                 }
1416                                                 goto free_message;
1417         
1418                                         default:
1419                                                 assert( 0 );
1420                                                 break;
1421                                         }
1422         
1423                                 } else {
1424                                         assert( 0 );
1425                                         ldap_msgfree( res );
1426                                         res = NULL;
1427                                         goto really_bad;
1428                                 }
1429                         }
1430
1431 free_message:;
1432                         ldap_msgfree( res );
1433                         res = NULL;
1434                 }
1435
1436                 /* check for abandon */
1437                 if ( op->o_abandon || LDAP_BACK_CONN_ABANDON( mc ) ) {
1438                         for ( i = 0; i < mi->mi_ntargets; i++ ) {
1439                                 if ( candidates[ i ].sr_msgid >= 0 ) {
1440                                         if ( META_IS_BINDING( &candidates[ i ] ) ) {
1441                                                 ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
1442                                                 if ( LDAP_BACK_CONN_BINDING( &mc->mc_conns[ i ] ) ) {
1443                                                         /* if still binding, destroy */
1444
1445 #ifdef DEBUG_205
1446                                                         char buf[ SLAP_TEXT_BUFLEN ];
1447
1448                                                         snprintf( buf, sizeof( buf), "%s meta_back_search(abandon) "
1449                                                                 "ldap_unbind_ext[%ld] mc=%p ld=%p",
1450                                                                 op->o_log_prefix, i, (void *)mc,
1451                                                                 (void *)mc->mc_conns[i].msc_ld );
1452
1453                                                         Debug( LDAP_DEBUG_ANY, "### %s\n", buf, 0, 0 );
1454 #endif /* DEBUG_205 */
1455
1456                                                         meta_clear_one_candidate( op, mc, i );
1457                                                 }
1458                                                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
1459                                                 META_BINDING_CLEAR( &candidates[ i ] );
1460                                                 
1461                                         } else {
1462                                                 (void)meta_back_cancel( mc, op, rs,
1463                                                         candidates[ i ].sr_msgid, i,
1464                                                         LDAP_BACK_DONTSEND );
1465                                         }
1466
1467                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1468                                         assert( ncandidates > 0 );
1469                                         --ncandidates;
1470                                 }
1471                         }
1472
1473                         if ( op->o_abandon ) {
1474                                 rc = SLAPD_ABANDON;
1475                         }
1476
1477                         /* let send_ldap_result play cleanup handlers (ITS#4645) */
1478                         break;
1479                 }
1480
1481                 /* if no entry was found during this loop,
1482                  * set a minimal timeout */
1483                 if ( ncandidates > 0 && gotit == 0 ) {
1484                         if ( save_tv.tv_sec == 0 && save_tv.tv_usec == 0 ) {
1485                                 save_tv.tv_usec = LDAP_BACK_RESULT_UTIMEOUT/initial_candidates;
1486
1487                                 /* arbitrarily limit to something between 1 and 2 minutes */
1488                         } else if ( ( stoptime == -1 && save_tv.tv_sec < 60 )
1489                                 || save_tv.tv_sec < ( stoptime - slap_get_time() ) / ( 2 * ncandidates ) )
1490                         {
1491                                 /* double the timeout */
1492                                 lutil_timermul( &save_tv, 2, &save_tv );
1493                         }
1494
1495                         if ( alreadybound == 0 ) {
1496                                 tv = save_tv;
1497                                 (void)select( 0, NULL, NULL, NULL, &tv );
1498
1499                         } else {
1500                                 ldap_pvt_thread_yield();
1501                         }
1502                 }
1503         }
1504
1505         if ( rc == -1 ) {
1506                 /*
1507                  * FIXME: need a better strategy to handle errors
1508                  */
1509                 if ( mc ) {
1510                         rc = meta_back_op_result( mc, op, rs, META_TARGET_NONE,
1511                                 -1, stoptime != -1 ? (stoptime - slap_get_time()) : 0,
1512                                 LDAP_BACK_SENDERR );
1513                 } else {
1514                         rc = rs->sr_err;
1515                 }
1516                 goto finish;
1517         }
1518
1519         /*
1520          * Rewrite the matched portion of the search base, if required
1521          * 
1522          * FIXME: only the last one gets caught!
1523          */
1524         savepriv = op->o_private;
1525         op->o_private = (void *)(long)mi->mi_ntargets;
1526         if ( candidate_match > 0 ) {
1527                 struct berval   pmatched = BER_BVNULL;
1528
1529                 /* we use the first one */
1530                 for ( i = 0; i < mi->mi_ntargets; i++ ) {
1531                         if ( META_IS_CANDIDATE( &candidates[ i ] )
1532                                         && candidates[ i ].sr_matched != NULL )
1533                         {
1534                                 struct berval   bv, pbv;
1535                                 int             rc;
1536
1537                                 /* if we got success, and this target
1538                                  * returned noSuchObject, and its suffix
1539                                  * is a superior of the searchBase,
1540                                  * ignore the matchedDN */
1541                                 if ( sres == LDAP_SUCCESS
1542                                         && candidates[ i ].sr_err == LDAP_NO_SUCH_OBJECT
1543                                         && op->o_req_ndn.bv_len > mi->mi_targets[ i ]->mt_nsuffix.bv_len )
1544                                 {
1545                                         free( (char *)candidates[ i ].sr_matched );
1546                                         candidates[ i ].sr_matched = NULL;
1547                                         continue;
1548                                 }
1549
1550                                 ber_str2bv( candidates[ i ].sr_matched, 0, 0, &bv );
1551                                 rc = dnPretty( NULL, &bv, &pbv, op->o_tmpmemctx );
1552
1553                                 if ( rc == LDAP_SUCCESS ) {
1554
1555                                         /* NOTE: if they all are superiors
1556                                          * of the baseDN, the shorter is also 
1557                                          * superior of the longer... */
1558                                         if ( pbv.bv_len > pmatched.bv_len ) {
1559                                                 if ( !BER_BVISNULL( &pmatched ) ) {
1560                                                         op->o_tmpfree( pmatched.bv_val, op->o_tmpmemctx );
1561                                                 }
1562                                                 pmatched = pbv;
1563                                                 op->o_private = (void *)i;
1564
1565                                         } else {
1566                                                 op->o_tmpfree( pbv.bv_val, op->o_tmpmemctx );
1567                                         }
1568                                 }
1569
1570                                 if ( candidates[ i ].sr_matched != NULL ) {
1571                                         free( (char *)candidates[ i ].sr_matched );
1572                                         candidates[ i ].sr_matched = NULL;
1573                                 }
1574                         }
1575                 }
1576
1577                 if ( !BER_BVISNULL( &pmatched ) ) {
1578                         matched = pmatched.bv_val;
1579                 }
1580
1581         } else if ( sres == LDAP_NO_SUCH_OBJECT ) {
1582                 matched = op->o_bd->be_suffix[ 0 ].bv_val;
1583         }
1584
1585         /*
1586          * In case we returned at least one entry, we return LDAP_SUCCESS
1587          * otherwise, the latter error code we got
1588          */
1589
1590         if ( sres == LDAP_SUCCESS ) {
1591                 if ( rs->sr_v2ref ) {
1592                         sres = LDAP_REFERRAL;
1593                 }
1594
1595                 if ( META_BACK_ONERR_REPORT( mi ) ) {
1596                         /*
1597                          * Report errors, if any
1598                          *
1599                          * FIXME: we should handle error codes and return the more 
1600                          * important/reasonable
1601                          */
1602                         for ( i = 0; i < mi->mi_ntargets; i++ ) {
1603                                 if ( !META_IS_CANDIDATE( &candidates[ i ] ) ) {
1604                                         continue;
1605                                 }
1606
1607                                 if ( candidates[ i ].sr_err != LDAP_SUCCESS
1608                                         && candidates[ i ].sr_err != LDAP_NO_SUCH_OBJECT )
1609                                 {
1610                                         sres = candidates[ i ].sr_err;
1611                                         break;
1612                                 }
1613                         }
1614                 }
1615         }
1616
1617         rs->sr_err = sres;
1618         rs->sr_matched = matched;
1619         rs->sr_ref = ( sres == LDAP_REFERRAL ? rs->sr_v2ref : NULL );
1620         send_ldap_result( op, rs );
1621         op->o_private = savepriv;
1622         rs->sr_matched = NULL;
1623         rs->sr_ref = NULL;
1624
1625 finish:;
1626         if ( matched && matched != op->o_bd->be_suffix[ 0 ].bv_val ) {
1627                 op->o_tmpfree( matched, op->o_tmpmemctx );
1628         }
1629
1630         if ( rs->sr_v2ref ) {
1631                 ber_bvarray_free( rs->sr_v2ref );
1632         }
1633
1634         for ( i = 0; i < mi->mi_ntargets; i++ ) {
1635                 if ( !META_IS_CANDIDATE( &candidates[ i ] ) ) {
1636                         continue;
1637                 }
1638
1639                 if ( mc && META_IS_BINDING( &candidates[ i ] ) ) {
1640                         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
1641                         if ( LDAP_BACK_CONN_BINDING( &mc->mc_conns[ i ] ) ) {
1642                                 assert( candidates[ i ].sr_msgid >= 0 );
1643                                 assert( mc->mc_conns[ i ].msc_ld != NULL );
1644
1645 #ifdef DEBUG_205
1646                                 Debug( LDAP_DEBUG_ANY, "### %s meta_back_search(cleanup) "
1647                                         "ldap_unbind_ext[%ld] ld=%p\n",
1648                                         op->o_log_prefix, i, (void *)mc->mc_conns[i].msc_ld );
1649 #endif /* DEBUG_205 */
1650
1651                                 /* if still binding, destroy */
1652                                 meta_clear_one_candidate( op, mc, i );
1653                         }
1654                         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
1655                         META_BINDING_CLEAR( &candidates[ i ] );
1656                 }
1657
1658                 if ( candidates[ i ].sr_matched ) {
1659                         free( (char *)candidates[ i ].sr_matched );
1660                         candidates[ i ].sr_matched = NULL;
1661                 }
1662
1663                 if ( candidates[ i ].sr_text ) {
1664                         ldap_memfree( (char *)candidates[ i ].sr_text );
1665                         candidates[ i ].sr_text = NULL;
1666                 }
1667
1668                 if ( candidates[ i ].sr_ref ) {
1669                         ber_bvarray_free( candidates[ i ].sr_ref );
1670                         candidates[ i ].sr_ref = NULL;
1671                 }
1672
1673                 if ( candidates[ i ].sr_ctrls ) {
1674                         ldap_controls_free( candidates[ i ].sr_ctrls );
1675                         candidates[ i ].sr_ctrls = NULL;
1676                 }
1677
1678                 if ( META_BACK_TGT_QUARANTINE( mi->mi_targets[ i ] ) ) {
1679                         meta_back_quarantine( op, &candidates[ i ], i );
1680                 }
1681
1682                 /* only in case of timelimit exceeded, if the timelimit exceeded because
1683                  * one contacted target never responded, invalidate the connection
1684                  * NOTE: should we quarantine the target as well?  right now, the connection
1685                  * is invalidated; the next time it will be recreated and the target
1686                  * will be quarantined if it cannot be contacted */
1687                 if ( mi->mi_idle_timeout != 0
1688                         && rs->sr_err == LDAP_TIMELIMIT_EXCEEDED
1689                         && op->o_time > mc->mc_conns[ i ].msc_time )
1690                 {
1691                         /* don't let anyone else use this expired connection */
1692                         LDAP_BACK_CONN_TAINTED_SET( mc );
1693                 }
1694         }
1695
1696         if ( mc ) {
1697                 meta_back_release_conn( mi, mc );
1698         }
1699
1700         return rs->sr_err;
1701 }
1702
1703 static int
1704 meta_send_entry(
1705         Operation       *op,
1706         SlapReply       *rs,
1707         metaconn_t      *mc,
1708         int             target,
1709         LDAPMessage     *e )
1710 {
1711         metainfo_t              *mi = ( metainfo_t * )op->o_bd->be_private;
1712         struct berval           a, mapped;
1713         Entry                   ent = { 0 };
1714         BerElement              ber = *e->lm_ber;
1715         Attribute               *attr, **attrp;
1716         struct berval           bdn,
1717                                 dn = BER_BVNULL;
1718         const char              *text;
1719         dncookie                dc;
1720         int                     rc;
1721
1722         if ( ber_scanf( &ber, "{m{", &bdn ) == LBER_ERROR ) {
1723                 return LDAP_DECODING_ERROR;
1724         }
1725
1726         /*
1727          * Rewrite the dn of the result, if needed
1728          */
1729         dc.target = mi->mi_targets[ target ];
1730         dc.conn = op->o_conn;
1731         dc.rs = rs;
1732         dc.ctx = "searchResult";
1733
1734         rs->sr_err = ldap_back_dn_massage( &dc, &bdn, &dn );
1735         if ( rs->sr_err != LDAP_SUCCESS) {
1736                 return rs->sr_err;
1737         }
1738
1739         /*
1740          * Note: this may fail if the target host(s) schema differs
1741          * from the one known to the meta, and a DN with unknown
1742          * attributes is returned.
1743          * 
1744          * FIXME: should we log anything, or delegate to dnNormalize?
1745          */
1746         rc = dnPrettyNormal( NULL, &dn, &ent.e_name, &ent.e_nname,
1747                 op->o_tmpmemctx );
1748         if ( dn.bv_val != bdn.bv_val ) {
1749                 free( dn.bv_val );
1750         }
1751         BER_BVZERO( &dn );
1752
1753         if ( rc != LDAP_SUCCESS ) {
1754                 return LDAP_INVALID_DN_SYNTAX;
1755         }
1756
1757         /*
1758          * cache dn
1759          */
1760         if ( mi->mi_cache.ttl != META_DNCACHE_DISABLED ) {
1761                 ( void )meta_dncache_update_entry( &mi->mi_cache,
1762                                 &ent.e_nname, target );
1763         }
1764
1765         attrp = &ent.e_attrs;
1766
1767         dc.ctx = "searchAttrDN";
1768         while ( ber_scanf( &ber, "{m", &a ) != LBER_ERROR ) {
1769                 int                             last = 0;
1770                 slap_syntax_validate_func       *validate;
1771                 slap_syntax_transform_func      *pretty;
1772
1773                 ldap_back_map( &mi->mi_targets[ target ]->mt_rwmap.rwm_at, 
1774                                 &a, &mapped, BACKLDAP_REMAP );
1775                 if ( BER_BVISNULL( &mapped ) || mapped.bv_val[0] == '\0' ) {
1776                         ( void )ber_scanf( &ber, "x" /* [W] */ );
1777                         continue;
1778                 }
1779                 attr = attr_alloc( NULL );
1780                 if ( attr == NULL ) {
1781                         continue;
1782                 }
1783                 if ( slap_bv2ad( &mapped, &attr->a_desc, &text )
1784                                 != LDAP_SUCCESS) {
1785                         if ( slap_bv2undef_ad( &mapped, &attr->a_desc, &text,
1786                                 SLAP_AD_PROXIED ) != LDAP_SUCCESS )
1787                         {
1788                                 char    buf[ SLAP_TEXT_BUFLEN ];
1789
1790                                 snprintf( buf, sizeof( buf ),
1791                                         "%s meta_send_entry(\"%s\"): "
1792                                         "slap_bv2undef_ad(%s): %s\n",
1793                                         op->o_log_prefix, ent.e_name.bv_val,
1794                                         mapped.bv_val, text );
1795
1796                                 Debug( LDAP_DEBUG_ANY, "%s", buf, 0, 0 );
1797                                 attr_free( attr );
1798                                 continue;
1799                         }
1800                 }
1801
1802                 /* no subschemaSubentry */
1803                 if ( attr->a_desc == slap_schema.si_ad_subschemaSubentry
1804                         || attr->a_desc == slap_schema.si_ad_entryDN )
1805                 {
1806
1807                         /* 
1808                          * We eat target's subschemaSubentry because
1809                          * a search for this value is likely not
1810                          * to resolve to the appropriate backend;
1811                          * later, the local subschemaSubentry is
1812                          * added.
1813                          *
1814                          * We also eat entryDN because the frontend
1815                          * will reattach it without checking if already
1816                          * present...
1817                          */
1818                         ( void )ber_scanf( &ber, "x" /* [W] */ );
1819
1820                         attr_free(attr);
1821                         continue;
1822                 }
1823
1824                 if ( ber_scanf( &ber, "[W]", &attr->a_vals ) == LBER_ERROR 
1825                                 || attr->a_vals == NULL )
1826                 {
1827                         attr->a_vals = (struct berval *)&slap_dummy_bv;
1828
1829                 } else {
1830                         for ( last = 0; !BER_BVISNULL( &attr->a_vals[ last ] ); ++last )
1831                                 ;
1832                 }
1833
1834                 validate = attr->a_desc->ad_type->sat_syntax->ssyn_validate;
1835                 pretty = attr->a_desc->ad_type->sat_syntax->ssyn_pretty;
1836
1837                 if ( !validate && !pretty ) {
1838                         attr_free( attr );
1839                         goto next_attr;
1840                 }
1841
1842                 if ( attr->a_desc == slap_schema.si_ad_objectClass
1843                                 || attr->a_desc == slap_schema.si_ad_structuralObjectClass )
1844                 {
1845                         struct berval   *bv;
1846
1847                         for ( bv = attr->a_vals; !BER_BVISNULL( bv ); bv++ ) {
1848                                 ldap_back_map( &mi->mi_targets[ target ]->mt_rwmap.rwm_oc,
1849                                                 bv, &mapped, BACKLDAP_REMAP );
1850                                 if ( BER_BVISNULL( &mapped ) || mapped.bv_val[0] == '\0') {
1851                                         free( bv->bv_val );
1852                                         BER_BVZERO( bv );
1853                                         if ( --last < 0 ) {
1854                                                 break;
1855                                         }
1856                                         *bv = attr->a_vals[ last ];
1857                                         BER_BVZERO( &attr->a_vals[ last ] );
1858                                         bv--;
1859
1860                                 } else if ( mapped.bv_val != bv->bv_val ) {
1861                                         free( bv->bv_val );
1862                                         ber_dupbv( bv, &mapped );
1863                                 }
1864                         }
1865                 /*
1866                  * It is necessary to try to rewrite attributes with
1867                  * dn syntax because they might be used in ACLs as
1868                  * members of groups; since ACLs are applied to the
1869                  * rewritten stuff, no dn-based subecj clause could
1870                  * be used at the ldap backend side (see
1871                  * http://www.OpenLDAP.org/faq/data/cache/452.html)
1872                  * The problem can be overcome by moving the dn-based
1873                  * ACLs to the target directory server, and letting
1874                  * everything pass thru the ldap backend.
1875                  */
1876                 } else {
1877                         int     i;
1878
1879                         if ( attr->a_desc->ad_type->sat_syntax ==
1880                                 slap_schema.si_syn_distinguishedName )
1881                         {
1882                                 ldap_dnattr_result_rewrite( &dc, attr->a_vals );
1883
1884                         } else if ( attr->a_desc == slap_schema.si_ad_ref ) {
1885                                 ldap_back_referral_result_rewrite( &dc, attr->a_vals );
1886
1887                         }
1888
1889                         for ( i = 0; i < last; i++ ) {
1890                                 struct berval   pval;
1891                                 int             rc;
1892
1893                                 if ( pretty ) {
1894                                         rc = pretty( attr->a_desc->ad_type->sat_syntax,
1895                                                 &attr->a_vals[i], &pval, NULL );
1896
1897                                 } else {
1898                                         rc = validate( attr->a_desc->ad_type->sat_syntax,
1899                                                 &attr->a_vals[i] );
1900                                 }
1901
1902                                 if ( rc ) {
1903                                         LBER_FREE( attr->a_vals[i].bv_val );
1904                                         if ( --last == i ) {
1905                                                 BER_BVZERO( &attr->a_vals[ i ] );
1906                                                 break;
1907                                         }
1908                                         attr->a_vals[i] = attr->a_vals[last];
1909                                         BER_BVZERO( &attr->a_vals[last] );
1910                                         i--;
1911                                         continue;
1912                                 }
1913
1914                                 if ( pretty ) {
1915                                         LBER_FREE( attr->a_vals[i].bv_val );
1916                                         attr->a_vals[i] = pval;
1917                                 }
1918                         }
1919
1920                         if ( last == 0 && attr->a_vals != &slap_dummy_bv ) {
1921                                 attr_free( attr );
1922                                 goto next_attr;
1923                         }
1924                 }
1925
1926                 if ( last && attr->a_desc->ad_type->sat_equality &&
1927                         attr->a_desc->ad_type->sat_equality->smr_normalize )
1928                 {
1929                         int i;
1930
1931                         attr->a_nvals = ch_malloc( ( last + 1 ) * sizeof( struct berval ) );
1932                         for ( i = 0; i<last; i++ ) {
1933                                 attr->a_desc->ad_type->sat_equality->smr_normalize(
1934                                         SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX,
1935                                         attr->a_desc->ad_type->sat_syntax,
1936                                         attr->a_desc->ad_type->sat_equality,
1937                                         &attr->a_vals[i], &attr->a_nvals[i],
1938                                         NULL );
1939                         }
1940                         BER_BVZERO( &attr->a_nvals[i] );
1941
1942                 } else {
1943                         attr->a_nvals = attr->a_vals;
1944                 }
1945
1946                 *attrp = attr;
1947                 attrp = &attr->a_next;
1948 next_attr:;
1949         }
1950         rs->sr_entry = &ent;
1951         rs->sr_attrs = op->ors_attrs;
1952         rs->sr_flags = 0;
1953         rs->sr_err = LDAP_SUCCESS;
1954         rc = send_search_entry( op, rs );
1955         switch ( rc ) {
1956         case LDAP_UNAVAILABLE:
1957                 rc = LDAP_OTHER;
1958                 break;
1959         }
1960         rs->sr_entry = NULL;
1961         rs->sr_attrs = NULL;
1962         
1963         if ( !BER_BVISNULL( &ent.e_name ) ) {
1964                 free( ent.e_name.bv_val );
1965                 BER_BVZERO( &ent.e_name );
1966         }
1967         if ( !BER_BVISNULL( &ent.e_nname ) ) {
1968                 free( ent.e_nname.bv_val );
1969                 BER_BVZERO( &ent.e_nname );
1970         }
1971         entry_clean( &ent );
1972
1973         return rc;
1974 }
1975