]> git.sur5r.net Git - openldap/blob - servers/slapd/back-meta/search.c
import back-ldap/back-meta improvements from HEAD
[openldap] / servers / slapd / back-meta / search.c
1 /* $OpenLDAP$ */
2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
3  *
4  * Copyright 1999-2007 The OpenLDAP Foundation.
5  * Portions Copyright 2001-2003 Pierangelo Masarati.
6  * Portions Copyright 1999-2003 Howard Chu.
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted only as authorized by the OpenLDAP
11  * Public License.
12  *
13  * A copy of this license is available in the file LICENSE in the
14  * top-level directory of the distribution or, alternatively, at
15  * <http://www.OpenLDAP.org/license.html>.
16  */
17 /* ACKNOWLEDGEMENTS:
18  * This work was initially developed by the Howard Chu for inclusion
19  * in OpenLDAP Software and subsequently enhanced by Pierangelo
20  * Masarati.
21  */
22
23 #include "portable.h"
24
25 #include <stdio.h>
26
27 #include <ac/socket.h>
28 #include <ac/string.h>
29 #include <ac/time.h>
30
31 #include "lutil.h"
32 #include "slap.h"
33 #include "../back-ldap/back-ldap.h"
34 #include "back-meta.h"
35 #undef ldap_debug       /* silence a warning in ldap-int.h */
36 #include "ldap_log.h"
37 #include "../../../libraries/libldap/ldap-int.h"
38
39 /* IGNORE means that target does not (no longer) participate
40  * in the search;
41  * NOTREADY means the search on that target has not been initialized yet
42  */
43 #define META_MSGID_IGNORE       (-1)
44 #define META_MSGID_NEED_BIND    (-2)
45
46 static int
47 meta_send_entry(
48         Operation       *op,
49         SlapReply       *rs,
50         metaconn_t      *mc,
51         int             i,
52         LDAPMessage     *e );
53
54 typedef enum meta_search_candidate_t {
55         META_SEARCH_UNDEFINED = -2,
56         META_SEARCH_ERR = -1,
57         META_SEARCH_NOT_CANDIDATE,
58         META_SEARCH_CANDIDATE,
59         META_SEARCH_BINDING,
60         META_SEARCH_NEED_BIND
61 } meta_search_candidate_t;
62
63 /*
64  * meta_search_dobind_init()
65  *
66  * initiates bind for a candidate target of a search.
67  */
68 static meta_search_candidate_t
69 meta_search_dobind_init(
70         Operation               *op,
71         SlapReply               *rs,
72         metaconn_t              **mcp,
73         int                     candidate,
74         SlapReply               *candidates )
75 {
76         metaconn_t              *mc = *mcp;
77         metainfo_t              *mi = ( metainfo_t * )op->o_bd->be_private;
78         metatarget_t            *mt = mi->mi_targets[ candidate ];
79         metasingleconn_t        *msc = &mc->mc_conns[ candidate ];
80
81         struct berval           binddn = msc->msc_bound_ndn,
82                                 cred = msc->msc_cred;
83         int                     method;
84
85         int                     rc;
86
87         meta_search_candidate_t retcode;
88
89         Debug( LDAP_DEBUG_TRACE, "%s >>> meta_search_dobind_init[%d]\n",
90                 op->o_log_prefix, candidate, 0 );
91
92         /*
93          * all the targets are already bound as pseudoroot
94          */
95         if ( mc->mc_authz_target == META_BOUND_ALL ) {
96                 return META_SEARCH_CANDIDATE;
97         }
98
99         retcode = META_SEARCH_BINDING;
100         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
101         if ( LDAP_BACK_CONN_ISBOUND( msc ) || LDAP_BACK_CONN_ISANON( msc ) ) {
102                 /* already bound (or anonymous) */
103
104 #ifdef DEBUG_205
105                 char    buf[ SLAP_TEXT_BUFLEN ] = { '\0' };
106                 int     bound = 0;
107
108                 if ( LDAP_BACK_CONN_ISBOUND( msc ) ) {
109                         bound = 1;
110                 }
111
112                 snprintf( buf, sizeof( buf ), " mc=%p ld=%p%s DN=\"%s\"",
113                         (void *)mc, (void *)msc->msc_ld,
114                         bound ? " bound" : " anonymous",
115                         bound == 0 ? "" : msc->msc_bound_ndn.bv_val );
116                 Debug( LDAP_DEBUG_ANY, "### %s meta_search_dobind_init[%d]%s\n",
117                         op->o_log_prefix, candidate, buf );
118 #endif /* DEBUG_205 */
119
120                 retcode = META_SEARCH_CANDIDATE;
121
122         } else if ( META_BACK_CONN_CREATING( msc ) || LDAP_BACK_CONN_BINDING( msc ) ) {
123                 /* another thread is binding the target for this conn; wait */
124
125 #ifdef DEBUG_205
126                 char    buf[ SLAP_TEXT_BUFLEN ] = { '\0' };
127
128                 snprintf( buf, sizeof( buf ), " mc=%p ld=%p needbind",
129                         (void *)mc, (void *)msc->msc_ld );
130                 Debug( LDAP_DEBUG_ANY, "### %s meta_search_dobind_init[%d]%s\n",
131                         op->o_log_prefix, candidate, buf );
132 #endif /* DEBUG_205 */
133
134                 candidates[ candidate ].sr_msgid = META_MSGID_NEED_BIND;
135                 retcode = META_SEARCH_NEED_BIND;
136
137         } else {
138                 /* we'll need to bind the target for this conn */
139
140 #ifdef DEBUG_205
141                 char buf[ SLAP_TEXT_BUFLEN ];
142
143                 snprintf( buf, sizeof( buf ), " mc=%p ld=%p binding",
144                         (void *)mc, (void *)msc->msc_ld );
145                 Debug( LDAP_DEBUG_ANY, "### %s meta_search_dobind_init[%d]%s\n",
146                         op->o_log_prefix, candidate, buf );
147 #endif /* DEBUG_205 */
148
149                 if ( msc->msc_ld == NULL ) {
150                         /* for some reason (e.g. because formerly in "binding"
151                          * state, with eventual connection expiration or invalidation)
152                          * it was not initialized as expected */
153
154                         Debug( LDAP_DEBUG_ANY, "%s meta_search_dobind_init[%d] mc=%p ld=NULL\n",
155                                 op->o_log_prefix, candidate, (void *)mc );
156
157                         rc = meta_back_init_one_conn( op, rs, *mcp, candidate,
158                                 LDAP_BACK_CONN_ISPRIV( *mcp ), LDAP_BACK_DONTSEND, 0 );
159                         switch ( rc ) {
160                         case LDAP_SUCCESS:
161                                 assert( msc->msc_ld != NULL );
162                                 break;
163
164                         case LDAP_SERVER_DOWN:
165                         case LDAP_UNAVAILABLE:
166                                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
167                                 goto down;
168         
169                         default:
170                                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
171                                 goto other;
172                         }
173                 }
174
175                 LDAP_BACK_CONN_BINDING_SET( msc );
176         }
177
178         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
179
180         if ( retcode != META_SEARCH_BINDING ) {
181                 return retcode;
182         }
183
184         /* NOTE: this obsoletes pseudorootdn */
185         if ( op->o_conn != NULL &&
186                 !op->o_do_not_cache &&
187                 ( BER_BVISNULL( &msc->msc_bound_ndn ) ||
188                         BER_BVISEMPTY( &msc->msc_bound_ndn ) ||
189                         ( mt->mt_idassert_flags & LDAP_BACK_AUTH_OVERRIDE ) ) )
190         {
191                 rc = meta_back_proxy_authz_cred( mc, candidate, op, rs, LDAP_BACK_DONTSEND, &binddn, &cred, &method );
192                 if ( rc != LDAP_SUCCESS ) {
193                         goto down;
194                 }
195
196                 /* NOTE: we copy things here, even if bind didn't succeed yet,
197                  * because the connection is not shared until bind is over */
198                 if ( !BER_BVISNULL( &binddn ) ) {
199                         ber_bvreplace( &msc->msc_bound_ndn, &binddn );
200                         if ( LDAP_BACK_SAVECRED( mi ) && !BER_BVISNULL( &cred ) ) {
201                                 if ( !BER_BVISNULL( &msc->msc_cred ) ) {
202                                         memset( msc->msc_cred.bv_val, 0,
203                                                 msc->msc_cred.bv_len );
204                                 }
205                                 ber_bvreplace( &msc->msc_cred, &cred );
206                         }
207                 }
208
209                 if ( LDAP_BACK_CONN_ISBOUND( msc ) ) {
210                         /* apparently, idassert was configured with SASL bind,
211                          * so bind occurred inside meta_back_proxy_authz_cred() */
212                         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
213                         LDAP_BACK_CONN_BINDING_CLEAR( msc );
214                         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
215                         return META_SEARCH_CANDIDATE;
216                 }
217
218                 /* paranoid */
219                 switch ( method ) {
220                 case LDAP_AUTH_NONE:
221                 case LDAP_AUTH_SIMPLE:
222                         /* do a simple bind with binddn, cred */
223                         break;
224
225                 default:
226                         assert( 0 );
227                         break;
228                 }
229         }
230
231         assert( msc->msc_ld != NULL );
232
233 retry:;
234         rc = ldap_sasl_bind( msc->msc_ld, binddn.bv_val, LDAP_SASL_SIMPLE, &cred,
235                         NULL, NULL, &candidates[ candidate ].sr_msgid );
236
237 #ifdef DEBUG_205
238         {
239                 char buf[ SLAP_TEXT_BUFLEN ];
240
241                 snprintf( buf, sizeof( buf ), "meta_search_dobind_init[%d] mc=%p ld=%p rc=%d",
242                         candidate, (void *)mc, (void *)mc->mc_conns[ candidate ].msc_ld, rc );
243                 Debug( LDAP_DEBUG_ANY, "### %s %s\n",
244                         op->o_log_prefix, buf, 0 );
245         }
246 #endif /* DEBUG_205 */
247
248         switch ( rc ) {
249         case LDAP_SUCCESS:
250                 assert( candidates[ candidate ].sr_msgid >= 0 );
251                 META_BINDING_SET( &candidates[ candidate ] );
252                 return META_SEARCH_BINDING;
253
254         case LDAP_SERVER_DOWN:
255 down:;
256                 /* This is the worst thing that could happen:
257                  * the search will wait until the retry is over. */
258                 if ( !META_IS_RETRYING( &candidates[ candidate ] ) ) {
259                         META_RETRYING_SET( &candidates[ candidate ] );
260
261                         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
262
263                         assert( mc->mc_refcnt > 0 );
264                         if ( StatslogTest( LDAP_DEBUG_ANY ) ) {
265                                 char    buf[ SLAP_TEXT_BUFLEN ];
266
267                                 /* this lock is required; however,
268                                  * it's invoked only when logging is on */
269                                 ldap_pvt_thread_mutex_lock( &mt->mt_uri_mutex );
270                                 snprintf( buf, sizeof( buf ),
271                                         "retrying URI=\"%s\" DN=\"%s\"",
272                                         mt->mt_uri,
273                                         BER_BVISNULL( &msc->msc_bound_ndn ) ?
274                                                 "" : msc->msc_bound_ndn.bv_val );
275                                 ldap_pvt_thread_mutex_unlock( &mt->mt_uri_mutex );
276
277                                 Debug( LDAP_DEBUG_ANY,
278                                         "%s meta_search_dobind_init[%d]: %s.\n",
279                                         op->o_log_prefix, candidate, buf );
280                         }
281
282                         meta_clear_one_candidate( op, mc, candidate );
283                         LDAP_BACK_CONN_ISBOUND_CLEAR( msc );
284
285                         ( void )rewrite_session_delete( mt->mt_rwmap.rwm_rw, op->o_conn );
286
287                         /* mc here must be the regular mc, reset and ready for init */
288                         rc = meta_back_init_one_conn( op, rs, mc, candidate,
289                                 LDAP_BACK_CONN_ISPRIV( mc ), LDAP_BACK_DONTSEND, 0 );
290
291                         if ( rc == LDAP_SUCCESS ) {
292                                 LDAP_BACK_CONN_BINDING_SET( msc );
293                         }
294
295                         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
296
297                         if ( rc == LDAP_SUCCESS ) {
298                                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
299                                 goto retry;
300                         }
301                 }
302
303                 if ( *mcp == NULL ) {
304                         retcode = META_SEARCH_ERR;
305                         rs->sr_err = LDAP_UNAVAILABLE;
306                         break;
307                 }
308                 /* fall thru */
309
310         default:
311 other:;
312                 rs->sr_err = rc;
313                 rc = slap_map_api2result( rs );
314
315                 ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
316                 meta_clear_one_candidate( op, mc, candidate );
317                 candidates[ candidate ].sr_err = rc;
318                 if ( META_BACK_ONERR_STOP( mi ) ) {
319                         LDAP_BACK_CONN_TAINTED_SET( mc );
320                         meta_back_release_conn_lock( mi, mc, 0 );
321                         *mcp = NULL;
322                         rs->sr_err = rc;
323
324                         retcode = META_SEARCH_ERR;
325
326                 } else {
327                         retcode = META_SEARCH_NOT_CANDIDATE;
328                 }
329                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
330                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
331                 break;
332         }
333
334         return retcode;
335 }
336
337 static meta_search_candidate_t
338 meta_search_dobind_result(
339         Operation               *op,
340         SlapReply               *rs,
341         metaconn_t              **mcp,
342         int                     candidate,
343         SlapReply               *candidates,
344         LDAPMessage             *res )
345 {
346         metainfo_t              *mi = ( metainfo_t * )op->o_bd->be_private;
347         metaconn_t              *mc = *mcp;
348         metasingleconn_t        *msc = &mc->mc_conns[ candidate ];
349
350         meta_search_candidate_t retcode = META_SEARCH_NOT_CANDIDATE;
351         int                     rc;
352
353         assert( msc->msc_ld != NULL );
354
355         /* FIXME: matched? referrals? response controls? */
356         rc = ldap_parse_result( msc->msc_ld, res,
357                 &candidates[ candidate ].sr_err,
358                 NULL, NULL, NULL, NULL, 0 );
359         if ( rc != LDAP_SUCCESS ) {
360                 candidates[ candidate ].sr_err = rc;
361
362         } else {
363                 rc = slap_map_api2result( &candidates[ candidate ] );
364         }
365
366         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
367         LDAP_BACK_CONN_BINDING_CLEAR( msc );
368         if ( rc != LDAP_SUCCESS ) {
369                 meta_clear_one_candidate( op, mc, candidate );
370                 candidates[ candidate ].sr_err = rc;
371                 if ( META_BACK_ONERR_STOP( mi ) ) {
372                         LDAP_BACK_CONN_TAINTED_SET( mc );
373                         meta_back_release_conn_lock( mi, mc, 0 );
374                         *mcp = NULL;
375                         retcode = META_SEARCH_ERR;
376                         rs->sr_err = rc;
377                 }
378
379         } else {
380                 /* FIXME: check if bound as idassert authcDN! */
381                 if ( BER_BVISNULL( &msc->msc_bound_ndn )
382                         || BER_BVISEMPTY( &msc->msc_bound_ndn ) )
383                 {
384                         LDAP_BACK_CONN_ISANON_SET( msc );
385
386                 } else {
387                         LDAP_BACK_CONN_ISBOUND_SET( msc );
388                 }
389                 retcode = META_SEARCH_CANDIDATE;
390         }
391
392         candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
393         META_BINDING_CLEAR( &candidates[ candidate ] );
394
395         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
396
397         return retcode;
398 }
399
400 static meta_search_candidate_t
401 meta_back_search_start(
402         Operation               *op,
403         SlapReply               *rs,
404         dncookie                *dc,
405         metaconn_t              **mcp,
406         int                     candidate,
407         SlapReply               *candidates )
408 {
409         metainfo_t              *mi = ( metainfo_t * )op->o_bd->be_private;
410         metatarget_t            *mt = mi->mi_targets[ candidate ];
411         metasingleconn_t        *msc = &(*mcp)->mc_conns[ candidate ];
412         struct berval           realbase = op->o_req_dn;
413         int                     realscope = op->ors_scope;
414         struct berval           mbase = BER_BVNULL; 
415         struct berval           mfilter = BER_BVNULL;
416         char                    **mapped_attrs = NULL;
417         int                     rc;
418         meta_search_candidate_t retcode;
419         struct timeval          tv, *tvp = NULL;
420         int                     nretries = 1;
421         LDAPControl             **ctrls = NULL;
422
423         /* this should not happen; just in case... */
424         if ( msc->msc_ld == NULL ) {
425                 Debug( LDAP_DEBUG_ANY,
426                         "%s: meta_back_search_start candidate=%d ld=NULL%s.\n",
427                         op->o_log_prefix, candidate,
428                         META_BACK_ONERR_STOP( mi ) ? "" : " (ignored)" );
429                 candidates[ candidate ].sr_err = LDAP_OTHER;
430                 if ( META_BACK_ONERR_STOP( mi ) ) {
431                         return META_SEARCH_ERR;
432                 }
433                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
434                 return META_SEARCH_NOT_CANDIDATE;
435         }
436
437         Debug( LDAP_DEBUG_TRACE, "%s >>> meta_back_search_start[%d]\n", op->o_log_prefix, candidate, 0 );
438
439         /*
440          * modifies the base according to the scope, if required
441          */
442         if ( mt->mt_nsuffix.bv_len > op->o_req_ndn.bv_len ) {
443                 switch ( op->ors_scope ) {
444                 case LDAP_SCOPE_SUBTREE:
445                         /*
446                          * make the target suffix the new base
447                          * FIXME: this is very forgiving, because
448                          * "illegal" searchBases may be turned
449                          * into the suffix of the target; however,
450                          * the requested searchBase already passed
451                          * thru the candidate analyzer...
452                          */
453                         if ( dnIsSuffix( &mt->mt_nsuffix, &op->o_req_ndn ) ) {
454                                 realbase = mt->mt_nsuffix;
455                                 if ( mt->mt_scope == LDAP_SCOPE_SUBORDINATE ) {
456                                         realscope = LDAP_SCOPE_SUBORDINATE;
457                                 }
458
459                         } else {
460                                 /*
461                                  * this target is no longer candidate
462                                  */
463                                 retcode = META_SEARCH_NOT_CANDIDATE;
464                                 goto doreturn;
465                         }
466                         break;
467
468                 case LDAP_SCOPE_SUBORDINATE:
469                 case LDAP_SCOPE_ONELEVEL:
470                 {
471                         struct berval   rdn = mt->mt_nsuffix;
472                         rdn.bv_len -= op->o_req_ndn.bv_len + STRLENOF( "," );
473                         if ( dnIsOneLevelRDN( &rdn )
474                                         && dnIsSuffix( &mt->mt_nsuffix, &op->o_req_ndn ) )
475                         {
476                                 /*
477                                  * if there is exactly one level,
478                                  * make the target suffix the new
479                                  * base, and make scope "base"
480                                  */
481                                 realbase = mt->mt_nsuffix;
482                                 if ( op->ors_scope == LDAP_SCOPE_SUBORDINATE ) {
483                                         if ( mt->mt_scope == LDAP_SCOPE_SUBORDINATE ) {
484                                                 realscope = LDAP_SCOPE_SUBORDINATE;
485                                         } else {
486                                                 realscope = LDAP_SCOPE_SUBTREE;
487                                         }
488                                 } else {
489                                         realscope = LDAP_SCOPE_BASE;
490                                 }
491                                 break;
492                         } /* else continue with the next case */
493                 }
494
495                 case LDAP_SCOPE_BASE:
496                         /*
497                          * this target is no longer candidate
498                          */
499                         retcode = META_SEARCH_NOT_CANDIDATE;
500                         goto doreturn;
501                 }
502         }
503
504         /* initiate dobind */
505         retcode = meta_search_dobind_init( op, rs, mcp, candidate, candidates );
506
507         Debug( LDAP_DEBUG_TRACE, "%s <<< meta_search_dobind_init[%d]=%d\n", op->o_log_prefix, candidate, retcode );
508
509         if ( retcode != META_SEARCH_CANDIDATE ) {
510                 goto doreturn;
511         }
512
513         /*
514          * Rewrite the search base, if required
515          */
516         dc->target = mt;
517         dc->ctx = "searchBase";
518         switch ( ldap_back_dn_massage( dc, &realbase, &mbase ) ) {
519         case LDAP_SUCCESS:
520                 break;
521
522         case LDAP_UNWILLING_TO_PERFORM:
523                 rs->sr_err = LDAP_UNWILLING_TO_PERFORM;
524                 rs->sr_text = "Operation not allowed";
525                 send_ldap_result( op, rs );
526                 retcode = META_SEARCH_ERR;
527                 goto doreturn;
528
529         default:
530
531                 /*
532                  * this target is no longer candidate
533                  */
534                 retcode = META_SEARCH_NOT_CANDIDATE;
535                 goto doreturn;
536         }
537
538         /*
539          * Maps filter
540          */
541         rc = ldap_back_filter_map_rewrite( dc, op->ors_filter,
542                         &mfilter, BACKLDAP_MAP );
543         switch ( rc ) {
544         case LDAP_SUCCESS:
545                 break;
546
547         case LDAP_COMPARE_FALSE:
548         default:
549                 /*
550                  * this target is no longer candidate
551                  */
552                 retcode = META_SEARCH_NOT_CANDIDATE;
553                 goto done;
554         }
555
556         /*
557          * Maps required attributes
558          */
559         rc = ldap_back_map_attrs( &mt->mt_rwmap.rwm_at,
560                         op->ors_attrs, BACKLDAP_MAP, &mapped_attrs );
561         if ( rc != LDAP_SUCCESS ) {
562                 /*
563                  * this target is no longer candidate
564                  */
565                 retcode = META_SEARCH_NOT_CANDIDATE;
566                 goto done;
567         }
568
569         /* should we check return values? */
570         if ( op->ors_deref != -1 ) {
571                 assert( msc->msc_ld != NULL );
572                 (void)ldap_set_option( msc->msc_ld, LDAP_OPT_DEREF,
573                                 ( void * )&op->ors_deref );
574         }
575
576         if ( op->ors_tlimit != SLAP_NO_LIMIT ) {
577                 tv.tv_sec = op->ors_tlimit > 0 ? op->ors_tlimit : 1;
578                 tv.tv_usec = 0;
579                 tvp = &tv;
580         }
581
582 retry:;
583         ctrls = op->o_ctrls;
584         if ( ldap_back_proxy_authz_ctrl( &msc->msc_bound_ndn,
585                 mt->mt_version, &mt->mt_idassert, op, rs, &ctrls )
586                 != LDAP_SUCCESS )
587         {
588                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
589                 retcode = META_SEARCH_NOT_CANDIDATE;
590                 goto done;
591         }
592
593         /*
594          * Starts the search
595          */
596         assert( msc->msc_ld != NULL );
597         rc = ldap_search_ext( msc->msc_ld,
598                         mbase.bv_val, realscope, mfilter.bv_val,
599                         mapped_attrs, op->ors_attrsonly,
600                         ctrls, NULL, tvp, op->ors_slimit,
601                         &candidates[ candidate ].sr_msgid ); 
602         switch ( rc ) {
603         case LDAP_SUCCESS:
604                 retcode = META_SEARCH_CANDIDATE;
605                 break;
606         
607         case LDAP_SERVER_DOWN:
608                 if ( nretries && meta_back_retry( op, rs, mcp, candidate, LDAP_BACK_DONTSEND ) ) {
609                         nretries = 0;
610                         /* if the identity changed, there might be need to re-authz */
611                         (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
612                         goto retry;
613                 }
614
615                 if ( *mcp == NULL ) {
616                         retcode = META_SEARCH_ERR;
617                         break;
618                 }
619                 /* fall thru */
620
621         default:
622                 candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
623                 retcode = META_SEARCH_NOT_CANDIDATE;
624         }
625
626 done:;
627         (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
628
629         if ( mapped_attrs ) {
630                 free( mapped_attrs );
631         }
632         if ( mfilter.bv_val != op->ors_filterstr.bv_val ) {
633                 free( mfilter.bv_val );
634         }
635         if ( mbase.bv_val != realbase.bv_val ) {
636                 free( mbase.bv_val );
637         }
638
639 doreturn:;
640         Debug( LDAP_DEBUG_TRACE, "%s <<< meta_back_search_start[%d]=%d\n", op->o_log_prefix, candidate, retcode );
641
642         return retcode;
643 }
644
645 int
646 meta_back_search( Operation *op, SlapReply *rs )
647 {
648         metainfo_t      *mi = ( metainfo_t * )op->o_bd->be_private;
649         metaconn_t      *mc;
650         struct timeval  save_tv = { 0, 0 },
651                         tv;
652         time_t          stoptime = (time_t)(-1),
653                         lastres_time = slap_get_time(),
654                         timeout = 0;
655         int             rc = 0, sres = LDAP_SUCCESS;
656         char            *matched = NULL;
657         int             last = 0, ncandidates = 0,
658                         initial_candidates = 0, candidate_match = 0,
659                         needbind = 0;
660         ldap_back_send_t        sendok = LDAP_BACK_SENDERR;
661         long            i;
662         dncookie        dc;
663         int             is_ok = 0;
664         void            *savepriv;
665         SlapReply       *candidates = meta_back_candidates_get( op );
666
667         /*
668          * controls are set in ldap_back_dobind()
669          * 
670          * FIXME: in case of values return filter, we might want
671          * to map attrs and maybe rewrite value
672          */
673 getconn:;
674         mc = meta_back_getconn( op, rs, NULL, sendok );
675         if ( !mc ) {
676                 return rs->sr_err;
677         }
678
679         dc.conn = op->o_conn;
680         dc.rs = rs;
681
682         /*
683          * Inits searches
684          */
685         for ( i = 0; i < mi->mi_ntargets; i++ ) {
686                 /* reset sr_msgid; it is used in most loops
687                  * to check if that target is still to be considered */
688                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
689
690                 /* a target is marked as candidate by meta_back_getconn();
691                  * if for any reason (an error, it's over or so) it is
692                  * no longer active, sr_msgid is set to META_MSGID_IGNORE
693                  * but it remains candidate, which means it has been active
694                  * at some point during the operation.  This allows to 
695                  * use its response code and more to compute the final
696                  * response */
697                 if ( !META_IS_CANDIDATE( &candidates[ i ] ) ) {
698                         continue;
699                 }
700
701                 candidates[ i ].sr_matched = NULL;
702                 candidates[ i ].sr_text = NULL;
703                 candidates[ i ].sr_ref = NULL;
704                 candidates[ i ].sr_ctrls = NULL;
705
706                 /* get largest timeout among candidates */
707                 if ( mi->mi_targets[ i ]->mt_timeout[ SLAP_OP_SEARCH ]
708                         && mi->mi_targets[ i ]->mt_timeout[ SLAP_OP_SEARCH ] > timeout )
709                 {
710                         timeout = mi->mi_targets[ i ]->mt_timeout[ SLAP_OP_SEARCH ];
711                 }
712         }
713
714         for ( i = 0; i < mi->mi_ntargets; i++ ) {
715                 if ( !META_IS_CANDIDATE( &candidates[ i ] )
716                         || candidates[ i ].sr_err != LDAP_SUCCESS )
717                 {
718                         continue;
719                 }
720
721                 switch ( meta_back_search_start( op, rs, &dc, &mc, i, candidates ) )
722                 {
723                 case META_SEARCH_NOT_CANDIDATE:
724                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
725                         break;
726
727                 case META_SEARCH_NEED_BIND:
728                         ++needbind;
729                         /* fallthru */
730
731                 case META_SEARCH_CANDIDATE:
732                 case META_SEARCH_BINDING:
733                         candidates[ i ].sr_type = REP_INTERMEDIATE;
734                         ++ncandidates;
735                         break;
736
737                 case META_SEARCH_ERR:
738                         savepriv = op->o_private;
739                         op->o_private = (void *)i;
740                         send_ldap_result( op, rs );
741                         op->o_private = savepriv;
742                         rc = -1;
743                         goto finish;
744
745                 default:
746                         assert( 0 );
747                         break;
748                 }
749         }
750
751         if ( ncandidates > 0 && needbind == ncandidates ) {
752                 /*
753                  * give up the second time...
754                  *
755                  * NOTE: this should not occur the second time, since a fresh
756                  * connection has ben created; however, targets may also
757                  * need bind because the bind timed out or so.
758                  */
759                 if ( sendok & LDAP_BACK_BINDING ) {
760                         Debug( LDAP_DEBUG_ANY,
761                                 "%s meta_back_search: unable to initialize conn\n",
762                                 op->o_log_prefix, 0, 0 );
763                         rs->sr_err = LDAP_UNAVAILABLE;
764                         rs->sr_text = "unable to initialize connection to remote targets";
765                         send_ldap_result( op, rs );
766                         rc = -1;
767                         goto finish;
768                 }
769
770                 /* FIXME: better create a separate connection? */
771                 sendok |= LDAP_BACK_BINDING;
772
773 #ifdef DEBUG_205
774                 Debug( LDAP_DEBUG_ANY, "*** %s drop mc=%p create new connection\n",
775                         op->o_log_prefix, (void *)mc, 0 );
776 #endif /* DEBUG_205 */
777
778                 meta_back_release_conn( mi, mc );
779                 mc = NULL;
780
781                 needbind = 0;
782                 ncandidates = 0;
783
784                 goto getconn;
785         }
786
787         initial_candidates = ncandidates;
788
789         if ( StatslogTest( LDAP_DEBUG_TRACE ) ) {
790                 char    cnd[ SLAP_TEXT_BUFLEN ];
791                 int     c;
792
793                 for ( c = 0; c < mi->mi_ntargets; c++ ) {
794                         if ( META_IS_CANDIDATE( &candidates[ c ] ) ) {
795                                 cnd[ c ] = '*';
796                         } else {
797                                 cnd[ c ] = ' ';
798                         }
799                 }
800                 cnd[ c ] = '\0';
801
802                 Debug( LDAP_DEBUG_TRACE, "%s meta_back_search: ncandidates=%d "
803                         "cnd=\"%s\"\n", op->o_log_prefix, ncandidates, cnd );
804         }
805
806         if ( initial_candidates == 0 ) {
807                 /* NOTE: here we are not sending any matchedDN;
808                  * this is intended, because if the back-meta
809                  * is serving this search request, but no valid
810                  * candidate could be looked up, it means that
811                  * there is a hole in the mapping of the targets
812                  * and thus no knowledge of any remote superior
813                  * is available */
814                 Debug( LDAP_DEBUG_ANY, "%s meta_back_search: "
815                         "base=\"%s\" scope=%d: "
816                         "no candidate could be selected\n",
817                         op->o_log_prefix, op->o_req_dn.bv_val,
818                         op->ors_scope );
819
820                 /* FIXME: we're sending the first error we encounter;
821                  * maybe we should pick the worst... */
822                 rc = LDAP_NO_SUCH_OBJECT;
823                 for ( i = 0; i < mi->mi_ntargets; i++ ) {
824                         if ( META_IS_CANDIDATE( &candidates[ i ] )
825                                 && candidates[ i ].sr_err != LDAP_SUCCESS )
826                         {
827                                 rc = candidates[ i ].sr_err;
828                                 break;
829                         }
830                 }
831
832                 send_ldap_error( op, rs, rc, NULL );
833
834                 goto finish;
835         }
836
837         /* We pull apart the ber result, stuff it into a slapd entry, and
838          * let send_search_entry stuff it back into ber format. Slow & ugly,
839          * but this is necessary for version matching, and for ACL processing.
840          */
841
842         if ( op->ors_tlimit != SLAP_NO_LIMIT ) {
843                 stoptime = op->o_time + op->ors_tlimit;
844         }
845
846         /*
847          * In case there are no candidates, no cycle takes place...
848          *
849          * FIXME: we might use a queue, to better balance the load 
850          * among the candidates
851          */
852         for ( rc = 0; ncandidates > 0; ) {
853                 int     gotit = 0,
854                         doabandon = 0,
855                         alreadybound = ncandidates;
856                 time_t  curr_time = 0;
857
858                 /* check timeout */
859                 if ( timeout && lastres_time > 0
860                         && ( slap_get_time() - lastres_time ) > timeout )
861                 {
862                         doabandon = 1;
863                         rs->sr_text = "Operation timed out";
864                         rc = rs->sr_err = op->o_protocol >= LDAP_VERSION3 ?
865                                 LDAP_ADMINLIMIT_EXCEEDED : LDAP_OTHER;
866                         savepriv = op->o_private;
867                         op->o_private = (void *)i;
868                         send_ldap_result( op, rs );
869                         op->o_private = savepriv;
870                         goto finish;
871                 }
872
873                 /* check time limit */
874                 if ( op->ors_tlimit != SLAP_NO_LIMIT
875                                 && slap_get_time() > stoptime )
876                 {
877                         doabandon = 1;
878                         rc = rs->sr_err = LDAP_TIMELIMIT_EXCEEDED;
879                         savepriv = op->o_private;
880                         op->o_private = (void *)i;
881                         send_ldap_result( op, rs );
882                         op->o_private = savepriv;
883                         goto finish;
884                 }
885
886                 for ( i = 0; i < mi->mi_ntargets; i++ ) {
887                         meta_search_candidate_t retcode = META_SEARCH_UNDEFINED;
888                         metasingleconn_t        *msc = &mc->mc_conns[ i ];
889                         LDAPMessage             *res = NULL, *msg;
890
891                         /* if msgid is invalid, don't ldap_result() */
892                         if ( candidates[ i ].sr_msgid == META_MSGID_IGNORE ) {
893                                 continue;
894                         }
895
896                         /* if target still needs bind, retry */
897                         if ( candidates[ i ].sr_msgid == META_MSGID_NEED_BIND ) {
898                                 /* initiate dobind */
899                                 retcode = meta_search_dobind_init( op, rs, &mc, i, candidates );
900
901                                 Debug( LDAP_DEBUG_TRACE, "%s <<< meta_search_dobind_init[%ld]=%d\n",
902                                         op->o_log_prefix, i, retcode );
903
904                                 switch ( retcode ) {
905                                 case META_SEARCH_NEED_BIND:
906                                         alreadybound--;
907                                         /* fallthru */
908
909                                 case META_SEARCH_BINDING:
910                                         break;
911
912                                 case META_SEARCH_ERR:
913                                         candidates[ i ].sr_err = rs->sr_err;
914                                         if ( META_BACK_ONERR_STOP( mi ) ) {
915                                                 savepriv = op->o_private;
916                                                 op->o_private = (void *)i;
917                                                 send_ldap_result( op, rs );
918                                                 op->o_private = savepriv;
919                                                 goto finish;
920                                         }
921                                         /* fallthru */
922
923                                 case META_SEARCH_NOT_CANDIDATE:
924                                         /*
925                                          * When no candidates are left,
926                                          * the outer cycle finishes
927                                          */
928                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
929                                         assert( ncandidates > 0 );
930                                         --ncandidates;
931                                         break;
932
933                                 case META_SEARCH_CANDIDATE:
934                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
935                                         switch ( meta_back_search_start( op, rs, &dc, &mc, i, candidates ) )
936                                         {
937                                         case META_SEARCH_CANDIDATE:
938                                                 assert( candidates[ i ].sr_msgid >= 0 );
939                                                 break;
940
941                                         case META_SEARCH_ERR:
942                                                 candidates[ i ].sr_err = rs->sr_err;
943                                                 if ( META_BACK_ONERR_STOP( mi ) ) {
944                                                         savepriv = op->o_private;
945                                                         op->o_private = (void *)i;
946                                                         send_ldap_result( op, rs );
947                                                         op->o_private = savepriv;
948                                                         goto finish;
949                                                 }
950                                                 /* fallthru */
951
952                                         case META_SEARCH_NOT_CANDIDATE:
953                                                 /* means that meta_back_search_start()
954                                                  * failed but onerr == continue */
955                                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
956                                                 assert( ncandidates > 0 );
957                                                 --ncandidates;
958                                                 break;
959
960                                         default:
961                                                 /* impossible */
962                                                 assert( 0 );
963                                                 break;
964                                         }
965                                         break;
966
967                                 default:
968                                         /* impossible */
969                                         assert( 0 );
970                                         break;
971                                 }
972                                 continue;
973                         }
974
975                         /* check for abandon */
976                         if ( op->o_abandon || LDAP_BACK_CONN_ABANDON( mc ) ) {
977                                 break;
978                         }
979
980 #ifdef DEBUG_205
981                         if ( msc->msc_ld == NULL ) {
982                                 char    buf[ SLAP_TEXT_BUFLEN ];
983
984                                 ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
985                                 snprintf( buf, sizeof( buf ),
986                                         "%s meta_back_search[%ld] mc=%p msgid=%d%s%s%s\n",
987                                         op->o_log_prefix, (long)i, (void *)mc,
988                                         candidates[ i ].sr_msgid,
989                                         META_IS_BINDING( &candidates[ i ] ) ? " binding" : "",
990                                         LDAP_BACK_CONN_BINDING( &mc->mc_conns[ i ] ) ? " connbinding" : "",
991                                         META_BACK_CONN_CREATING( &mc->mc_conns[ i ] ) ? " conncreating" : "" );
992                                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
993                                         
994                                 Debug( LDAP_DEBUG_ANY, "!!! %s\n", buf, 0, 0 );
995                         }
996 #endif /* DEBUG_205 */
997                         
998                         /*
999                          * FIXME: handle time limit as well?
1000                          * Note that target servers are likely 
1001                          * to handle it, so at some time we'll
1002                          * get a LDAP_TIMELIMIT_EXCEEDED from
1003                          * one of them ...
1004                          */
1005                         tv = save_tv;
1006                         rc = ldap_result( msc->msc_ld, candidates[ i ].sr_msgid,
1007                                         LDAP_MSG_RECEIVED, &tv, &res );
1008                         switch ( rc ) {
1009                         case 0:
1010                                 /* FIXME: res should not need to be freed */
1011                                 assert( res == NULL );
1012                                 continue;
1013
1014                         case -1:
1015 really_bad:;
1016                                 /* something REALLY bad happened! */
1017                                 if ( candidates[ i ].sr_type == REP_INTERMEDIATE ) {
1018                                         candidates[ i ].sr_type = REP_RESULT;
1019
1020                                         if ( meta_back_retry( op, rs, &mc, i, LDAP_BACK_DONTSEND ) ) {
1021                                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1022                                                 switch ( meta_back_search_start( op, rs, &dc, &mc, i, candidates ) )
1023                                                 {
1024                                                         /* means that failed but onerr == continue */
1025                                                 case META_SEARCH_NOT_CANDIDATE:
1026                                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1027
1028                                                         assert( ncandidates > 0 );
1029                                                         --ncandidates;
1030
1031                                                         candidates[ i ].sr_err = rs->sr_err;
1032                                                         if ( META_BACK_ONERR_STOP( mi ) ) {
1033                                                                 savepriv = op->o_private;
1034                                                                 op->o_private = (void *)i;
1035                                                                 send_ldap_result( op, rs );
1036                                                                 op->o_private = savepriv;
1037                                                                 goto finish;
1038                                                         }
1039                                                         /* fall thru */
1040
1041                                                 case META_SEARCH_CANDIDATE:
1042                                                         /* get back into business... */
1043                                                         continue;
1044
1045                                                 case META_SEARCH_BINDING:
1046                                                 case META_SEARCH_NEED_BIND:
1047                                                 case META_SEARCH_UNDEFINED:
1048                                                         assert( 0 );
1049
1050                                                 default:
1051                                                         /* unrecoverable error */
1052                                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1053                                                         rc = rs->sr_err = LDAP_OTHER;
1054                                                         goto finish;
1055                                                 }
1056                                         }
1057
1058                                         candidates[ i ].sr_err = rs->sr_err;
1059                                         if ( META_BACK_ONERR_STOP( mi ) ) {
1060                                                 savepriv = op->o_private;
1061                                                 op->o_private = (void *)i;
1062                                                 send_ldap_result( op, rs );
1063                                                 op->o_private = savepriv;
1064                                                 goto finish;
1065                                         }
1066                                 }
1067
1068                                 /*
1069                                  * When no candidates are left,
1070                                  * the outer cycle finishes
1071                                  */
1072                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1073                                 assert( ncandidates > 0 );
1074                                 --ncandidates;
1075                                 rs->sr_err = candidates[ i ].sr_err;
1076                                 continue;
1077
1078                         default:
1079                                 lastres_time = slap_get_time();
1080
1081                                 /* only touch when activity actually took place... */
1082                                 if ( mi->mi_idle_timeout != 0 && msc->msc_time < lastres_time ) {
1083                                         msc->msc_time = lastres_time;
1084                                 }
1085                                 break;
1086                         }
1087
1088                         for ( msg = ldap_first_message( msc->msc_ld, res );
1089                                 msg != NULL;
1090                                 msg = ldap_next_message( msc->msc_ld, msg ) )
1091                         {
1092                                 rc = ldap_msgtype( msg );
1093                                 if ( rc == LDAP_RES_SEARCH_ENTRY ) {
1094                                         LDAPMessage     *e;
1095
1096                                         if ( candidates[ i ].sr_type == REP_INTERMEDIATE ) {
1097                                                 /* don't retry any more... */
1098                                                 candidates[ i ].sr_type = REP_RESULT;
1099                                         }
1100
1101                                         is_ok++;
1102
1103                                         e = ldap_first_entry( msc->msc_ld, msg );
1104                                         savepriv = op->o_private;
1105                                         op->o_private = (void *)i;
1106                                         rs->sr_err = meta_send_entry( op, rs, mc, i, e );
1107
1108                                         switch ( rs->sr_err ) {
1109                                         case LDAP_SIZELIMIT_EXCEEDED:
1110                                                 savepriv = op->o_private;
1111                                                 op->o_private = (void *)i;
1112                                                 send_ldap_result( op, rs );
1113                                                 op->o_private = savepriv;
1114                                                 rs->sr_err = LDAP_SUCCESS;
1115                                                 ldap_msgfree( res );
1116                                                 res = NULL;
1117                                                 goto finish;
1118
1119                                         case LDAP_UNAVAILABLE:
1120                                                 rs->sr_err = LDAP_OTHER;
1121                                                 ldap_msgfree( res );
1122                                                 res = NULL;
1123                                                 goto finish;
1124                                         }
1125                                         op->o_private = savepriv;
1126
1127                                         /* don't wait any longer... */
1128                                         gotit = 1;
1129                                         save_tv.tv_sec = 0;
1130                                         save_tv.tv_usec = 0;
1131
1132                                 } else if ( rc == LDAP_RES_SEARCH_REFERENCE ) {
1133                                         char            **references = NULL;
1134                                         int             cnt;
1135
1136                                         if ( candidates[ i ].sr_type == REP_INTERMEDIATE ) {
1137                                                 /* don't retry any more... */
1138                                                 candidates[ i ].sr_type = REP_RESULT;
1139                                         }
1140         
1141                                         is_ok++;
1142         
1143                                         rc = ldap_parse_reference( msc->msc_ld, msg,
1144                                                         &references, &rs->sr_ctrls, 0 );
1145         
1146                                         if ( rc != LDAP_SUCCESS ) {
1147                                                 continue;
1148                                         }
1149         
1150                                         if ( references == NULL ) {
1151                                                 continue;
1152                                         }
1153
1154 #ifdef ENABLE_REWRITE
1155                                         dc.ctx = "referralDN";
1156 #else /* ! ENABLE_REWRITE */
1157                                         dc.tofrom = 0;
1158                                         dc.normalized = 0;
1159 #endif /* ! ENABLE_REWRITE */
1160
1161                                         /* FIXME: merge all and return at the end */
1162         
1163                                         for ( cnt = 0; references[ cnt ]; cnt++ )
1164                                                 ;
1165         
1166                                         rs->sr_ref = ch_calloc( sizeof( struct berval ), cnt + 1 );
1167         
1168                                         for ( cnt = 0; references[ cnt ]; cnt++ ) {
1169                                                 ber_str2bv( references[ cnt ], 0, 1, &rs->sr_ref[ cnt ] );
1170                                         }
1171                                         BER_BVZERO( &rs->sr_ref[ cnt ] );
1172         
1173                                         ( void )ldap_back_referral_result_rewrite( &dc, rs->sr_ref );
1174
1175                                         if ( rs->sr_ref != NULL && !BER_BVISNULL( &rs->sr_ref[ 0 ] ) ) {
1176                                                 /* ignore return value by now */
1177                                                 savepriv = op->o_private;
1178                                                 op->o_private = (void *)i;
1179                                                 ( void )send_search_reference( op, rs );
1180                                                 op->o_private = savepriv;
1181         
1182                                                 ber_bvarray_free( rs->sr_ref );
1183                                                 rs->sr_ref = NULL;
1184                                         }
1185
1186                                         /* cleanup */
1187                                         if ( references ) {
1188                                                 ber_memvfree( (void **)references );
1189                                         }
1190
1191                                         if ( rs->sr_ctrls ) {
1192                                                 ldap_controls_free( rs->sr_ctrls );
1193                                                 rs->sr_ctrls = NULL;
1194                                         }
1195
1196                                 } else if ( rc == LDAP_RES_SEARCH_RESULT ) {
1197                                         char            buf[ SLAP_TEXT_BUFLEN ];
1198                                         char            **references = NULL;
1199
1200                                         if ( candidates[ i ].sr_type == REP_INTERMEDIATE ) {
1201                                                 /* don't retry any more... */
1202                                                 candidates[ i ].sr_type = REP_RESULT;
1203                                         }
1204         
1205                                         /* NOTE: ignores response controls
1206                                          * (and intermediate response controls
1207                                          * as well, except for those with search
1208                                          * references); this may not be correct,
1209                                          * but if they're not ignored then
1210                                          * back-meta would need to merge them
1211                                          * consistently (think of pagedResults...)
1212                                          */
1213                                         /* FIXME: response controls? */
1214                                         rs->sr_err = ldap_parse_result( msc->msc_ld,
1215                                                 msg,
1216                                                 &candidates[ i ].sr_err,
1217                                                 (char **)&candidates[ i ].sr_matched,
1218                                                 NULL /* (char **)&candidates[ i ].sr_text */ ,
1219                                                 &references,
1220                                                 NULL /* &candidates[ i ].sr_ctrls (unused) */ ,
1221                                                 0 );
1222                                         if ( rs->sr_err != LDAP_SUCCESS ) {
1223                                                 ldap_get_option( msc->msc_ld,
1224                                                         LDAP_OPT_ERROR_NUMBER,
1225                                                         &rs->sr_err );
1226                                                 sres = slap_map_api2result( rs );
1227                                                 candidates[ i ].sr_type = REP_RESULT;
1228                                                 ldap_msgfree( res );
1229                                                 res = NULL;
1230                                                 goto really_bad;
1231                                         }
1232
1233                                         /* massage matchedDN if need be */
1234                                         if ( candidates[ i ].sr_matched != NULL ) {
1235                                                 struct berval   match, mmatch;
1236
1237                                                 ber_str2bv( candidates[ i ].sr_matched,
1238                                                         0, 0, &match );
1239                                                 candidates[ i ].sr_matched = NULL;
1240
1241                                                 dc.ctx = "matchedDN";
1242                                                 dc.target = mi->mi_targets[ i ];
1243                                                 if ( !ldap_back_dn_massage( &dc, &match, &mmatch ) ) {
1244                                                         if ( mmatch.bv_val == match.bv_val ) {
1245                                                                 candidates[ i ].sr_matched
1246                                                                         = ch_strdup( mmatch.bv_val );
1247
1248                                                         } else {
1249                                                                 candidates[ i ].sr_matched = mmatch.bv_val;
1250                                                         }
1251
1252                                                         candidate_match++;
1253                                                 } 
1254                                                 ldap_memfree( match.bv_val );
1255                                         }
1256
1257                                         /* add references to array */
1258                                         if ( references ) {
1259                                                 BerVarray       sr_ref;
1260                                                 int             cnt;
1261         
1262                                                 for ( cnt = 0; references[ cnt ]; cnt++ )
1263                                                         ;
1264         
1265                                                 sr_ref = ch_calloc( sizeof( struct berval ), cnt + 1 );
1266         
1267                                                 for ( cnt = 0; references[ cnt ]; cnt++ ) {
1268                                                         ber_str2bv( references[ cnt ], 0, 1, &sr_ref[ cnt ] );
1269                                                 }
1270                                                 BER_BVZERO( &sr_ref[ cnt ] );
1271         
1272                                                 ( void )ldap_back_referral_result_rewrite( &dc, sr_ref );
1273                                         
1274                                                 /* cleanup */
1275                                                 ber_memvfree( (void **)references );
1276         
1277                                                 if ( rs->sr_v2ref == NULL ) {
1278                                                         rs->sr_v2ref = sr_ref;
1279
1280                                                 } else {
1281                                                         for ( cnt = 0; !BER_BVISNULL( &sr_ref[ cnt ] ); cnt++ ) {
1282                                                                 ber_bvarray_add( &rs->sr_v2ref, &sr_ref[ cnt ] );
1283                                                         }
1284                                                         ber_memfree( sr_ref );
1285                                                 }
1286                                         }
1287         
1288                                         rs->sr_err = candidates[ i ].sr_err;
1289                                         sres = slap_map_api2result( rs );
1290         
1291                                         if ( StatslogTest( LDAP_DEBUG_TRACE | LDAP_DEBUG_ANY ) ) {
1292                                                 snprintf( buf, sizeof( buf ),
1293                                                         "%s meta_back_search[%ld] "
1294                                                         "match=\"%s\" err=%ld",
1295                                                         op->o_log_prefix, i,
1296                                                         candidates[ i ].sr_matched ? candidates[ i ].sr_matched : "",
1297                                                         (long) candidates[ i ].sr_err );
1298                                                 if ( candidates[ i ].sr_err == LDAP_SUCCESS ) {
1299                                                         Debug( LDAP_DEBUG_TRACE, "%s.\n", buf, 0, 0 );
1300         
1301                                                 } else {
1302                                                         Debug( LDAP_DEBUG_ANY, "%s (%s).\n",
1303                                                                 buf, ldap_err2string( candidates[ i ].sr_err ), 0 );
1304                                                 }
1305                                         }
1306         
1307                                         switch ( sres ) {
1308                                         case LDAP_NO_SUCH_OBJECT:
1309                                                 /* is_ok is touched any time a valid
1310                                                  * (even intermediate) result is
1311                                                  * returned; as a consequence, if
1312                                                  * a candidate returns noSuchObject
1313                                                  * it is ignored and the candidate
1314                                                  * is simply demoted. */
1315                                                 if ( is_ok ) {
1316                                                         sres = LDAP_SUCCESS;
1317                                                 }
1318                                                 break;
1319         
1320                                         case LDAP_SUCCESS:
1321                                         case LDAP_REFERRAL:
1322                                                 is_ok++;
1323                                                 break;
1324         
1325                                         case LDAP_SIZELIMIT_EXCEEDED:
1326                                                 /* if a target returned sizelimitExceeded
1327                                                  * and the entry count is equal to the
1328                                                  * proxy's limit, the target would have
1329                                                  * returned more, and the error must be
1330                                                  * propagated to the client; otherwise,
1331                                                  * the target enforced a limit lower
1332                                                  * than what requested by the proxy;
1333                                                  * ignore it */
1334                                                 candidates[ i ].sr_err = rs->sr_err;
1335                                                 if ( rs->sr_nentries == op->ors_slimit
1336                                                         || META_BACK_ONERR_STOP( mi ) )
1337                                                 {
1338                                                         savepriv = op->o_private;
1339                                                         op->o_private = (void *)i;
1340                                                         send_ldap_result( op, rs );
1341                                                         op->o_private = savepriv;
1342                                                         ldap_msgfree( res );
1343                                                         res = NULL;
1344                                                         goto finish;
1345                                                 }
1346                                                 break;
1347         
1348                                         default:
1349                                                 candidates[ i ].sr_err = rs->sr_err;
1350                                                 if ( META_BACK_ONERR_STOP( mi ) ) {
1351                                                         savepriv = op->o_private;
1352                                                         op->o_private = (void *)i;
1353                                                         send_ldap_result( op, rs );
1354                                                         op->o_private = savepriv;
1355                                                         ldap_msgfree( res );
1356                                                         res = NULL;
1357                                                         goto finish;
1358                                                 }
1359                                                 break;
1360                                         }
1361         
1362                                         last = i;
1363                                         rc = 0;
1364         
1365                                         /*
1366                                          * When no candidates are left,
1367                                          * the outer cycle finishes
1368                                          */
1369                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1370                                         assert( ncandidates > 0 );
1371                                         --ncandidates;
1372         
1373                                 } else if ( rc == LDAP_RES_BIND ) {
1374                                         meta_search_candidate_t retcode;
1375         
1376                                         retcode = meta_search_dobind_result( op, rs, &mc, i, candidates, msg );
1377                                         if ( retcode == META_SEARCH_CANDIDATE ) {
1378                                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1379                                                 retcode = meta_back_search_start( op, rs, &dc, &mc, i, candidates );
1380                                         }
1381         
1382                                         switch ( retcode ) {
1383                                         case META_SEARCH_CANDIDATE:
1384                                                 break;
1385         
1386                                                 /* means that failed but onerr == continue */
1387                                         case META_SEARCH_NOT_CANDIDATE:
1388                                         case META_SEARCH_ERR:
1389                                                 candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1390                                                 assert( ncandidates > 0 );
1391                                                 --ncandidates;
1392         
1393                                                 candidates[ i ].sr_err = rs->sr_err;
1394                                                 if ( META_BACK_ONERR_STOP( mi ) ) {
1395                                                         savepriv = op->o_private;
1396                                                         op->o_private = (void *)i;
1397                                                         send_ldap_result( op, rs );
1398                                                         op->o_private = savepriv;
1399                                                         ldap_msgfree( res );
1400                                                         res = NULL;
1401                                                         goto finish;
1402                                                 }
1403                                                 goto free_message;
1404         
1405                                         default:
1406                                                 assert( 0 );
1407                                                 break;
1408                                         }
1409         
1410                                 } else {
1411                                         assert( 0 );
1412                                         ldap_msgfree( res );
1413                                         res = NULL;
1414                                         goto really_bad;
1415                                 }
1416                         }
1417
1418 free_message:;
1419                         ldap_msgfree( res );
1420                         res = NULL;
1421                 }
1422
1423                 /* check for abandon */
1424                 if ( op->o_abandon || LDAP_BACK_CONN_ABANDON( mc ) ) {
1425                         for ( i = 0; i < mi->mi_ntargets; i++ ) {
1426                                 if ( candidates[ i ].sr_msgid >= 0 ) {
1427                                         if ( META_IS_BINDING( &candidates[ i ] ) ) {
1428                                                 ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
1429                                                 if ( LDAP_BACK_CONN_BINDING( &mc->mc_conns[ i ] ) ) {
1430                                                         /* if still binding, destroy */
1431
1432 #ifdef DEBUG_205
1433                                                         char buf[ SLAP_TEXT_BUFLEN ];
1434
1435                                                         snprintf( buf, sizeof( buf), "%s meta_back_search(abandon) "
1436                                                                 "ldap_unbind_ext[%ld] mc=%p ld=%p",
1437                                                                 op->o_log_prefix, i, (void *)mc,
1438                                                                 (void *)mc->mc_conns[i].msc_ld );
1439
1440                                                         Debug( LDAP_DEBUG_ANY, "### %s\n", buf, 0, 0 );
1441 #endif /* DEBUG_205 */
1442
1443                                                         meta_clear_one_candidate( op, mc, i );
1444                                                 }
1445                                                 ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
1446                                                 META_BINDING_CLEAR( &candidates[ i ] );
1447                                                 
1448                                         } else {
1449                                                 (void)meta_back_cancel( mc, op, rs,
1450                                                         candidates[ i ].sr_msgid, i,
1451                                                         LDAP_BACK_DONTSEND );
1452                                         }
1453
1454                                         candidates[ i ].sr_msgid = META_MSGID_IGNORE;
1455                                         assert( ncandidates > 0 );
1456                                         --ncandidates;
1457                                 }
1458                         }
1459
1460                         if ( op->o_abandon ) {
1461                                 rc = SLAPD_ABANDON;
1462                         }
1463
1464                         /* let send_ldap_result play cleanup handlers (ITS#4645) */
1465                         break;
1466                 }
1467
1468                 /* if no entry was found during this loop,
1469                  * set a minimal timeout */
1470                 if ( ncandidates > 0 && gotit == 0 ) {
1471                         if ( save_tv.tv_sec == 0 && save_tv.tv_usec == 0 ) {
1472                                 save_tv.tv_usec = LDAP_BACK_RESULT_UTIMEOUT/initial_candidates;
1473
1474                                 /* arbitrarily limit to something between 1 and 2 minutes */
1475                         } else if ( ( stoptime == -1 && save_tv.tv_sec < 60 )
1476                                 || save_tv.tv_sec < ( stoptime - slap_get_time() ) / ( 2 * ncandidates ) )
1477                         {
1478                                 /* double the timeout */
1479                                 lutil_timermul( &save_tv, 2, &save_tv );
1480                         }
1481
1482                         if ( alreadybound == 0 ) {
1483                                 tv = save_tv;
1484                                 (void)select( 0, NULL, NULL, NULL, &tv );
1485
1486                         } else {
1487                                 ldap_pvt_thread_yield();
1488                         }
1489                 }
1490         }
1491
1492         if ( rc == -1 ) {
1493                 /*
1494                  * FIXME: need a better strategy to handle errors
1495                  */
1496                 if ( mc ) {
1497                         rc = meta_back_op_result( mc, op, rs, META_TARGET_NONE,
1498                                 -1, stoptime != -1 ? (stoptime - slap_get_time()) : 0,
1499                                 LDAP_BACK_SENDERR );
1500                 } else {
1501                         rc = rs->sr_err;
1502                 }
1503                 goto finish;
1504         }
1505
1506         /*
1507          * Rewrite the matched portion of the search base, if required
1508          * 
1509          * FIXME: only the last one gets caught!
1510          */
1511         savepriv = op->o_private;
1512         op->o_private = (void *)(long)mi->mi_ntargets;
1513         if ( candidate_match > 0 ) {
1514                 struct berval   pmatched = BER_BVNULL;
1515
1516                 /* we use the first one */
1517                 for ( i = 0; i < mi->mi_ntargets; i++ ) {
1518                         if ( META_IS_CANDIDATE( &candidates[ i ] )
1519                                         && candidates[ i ].sr_matched != NULL )
1520                         {
1521                                 struct berval   bv, pbv;
1522                                 int             rc;
1523
1524                                 /* if we got success, and this target
1525                                  * returned noSuchObject, and its suffix
1526                                  * is a superior of the searchBase,
1527                                  * ignore the matchedDN */
1528                                 if ( sres == LDAP_SUCCESS
1529                                         && candidates[ i ].sr_err == LDAP_NO_SUCH_OBJECT
1530                                         && op->o_req_ndn.bv_len > mi->mi_targets[ i ]->mt_nsuffix.bv_len )
1531                                 {
1532                                         free( (char *)candidates[ i ].sr_matched );
1533                                         candidates[ i ].sr_matched = NULL;
1534                                         continue;
1535                                 }
1536
1537                                 ber_str2bv( candidates[ i ].sr_matched, 0, 0, &bv );
1538                                 rc = dnPretty( NULL, &bv, &pbv, op->o_tmpmemctx );
1539
1540                                 if ( rc == LDAP_SUCCESS ) {
1541
1542                                         /* NOTE: if they all are superiors
1543                                          * of the baseDN, the shorter is also 
1544                                          * superior of the longer... */
1545                                         if ( pbv.bv_len > pmatched.bv_len ) {
1546                                                 if ( !BER_BVISNULL( &pmatched ) ) {
1547                                                         op->o_tmpfree( pmatched.bv_val, op->o_tmpmemctx );
1548                                                 }
1549                                                 pmatched = pbv;
1550                                                 op->o_private = (void *)i;
1551
1552                                         } else {
1553                                                 op->o_tmpfree( pbv.bv_val, op->o_tmpmemctx );
1554                                         }
1555                                 }
1556
1557                                 if ( candidates[ i ].sr_matched != NULL ) {
1558                                         free( (char *)candidates[ i ].sr_matched );
1559                                         candidates[ i ].sr_matched = NULL;
1560                                 }
1561                         }
1562                 }
1563
1564                 if ( !BER_BVISNULL( &pmatched ) ) {
1565                         matched = pmatched.bv_val;
1566                 }
1567
1568         } else if ( sres == LDAP_NO_SUCH_OBJECT ) {
1569                 matched = op->o_bd->be_suffix[ 0 ].bv_val;
1570         }
1571
1572         /*
1573          * In case we returned at least one entry, we return LDAP_SUCCESS
1574          * otherwise, the latter error code we got
1575          */
1576
1577         if ( sres == LDAP_SUCCESS ) {
1578                 if ( rs->sr_v2ref ) {
1579                         sres = LDAP_REFERRAL;
1580                 }
1581
1582                 if ( META_BACK_ONERR_REPORT( mi ) ) {
1583                         /*
1584                          * Report errors, if any
1585                          *
1586                          * FIXME: we should handle error codes and return the more 
1587                          * important/reasonable
1588                          */
1589                         for ( i = 0; i < mi->mi_ntargets; i++ ) {
1590                                 if ( !META_IS_CANDIDATE( &candidates[ i ] ) ) {
1591                                         continue;
1592                                 }
1593
1594                                 if ( candidates[ i ].sr_err != LDAP_SUCCESS
1595                                         && candidates[ i ].sr_err != LDAP_NO_SUCH_OBJECT )
1596                                 {
1597                                         sres = candidates[ i ].sr_err;
1598                                         break;
1599                                 }
1600                         }
1601                 }
1602         }
1603
1604         rs->sr_err = sres;
1605         rs->sr_matched = matched;
1606         rs->sr_ref = ( sres == LDAP_REFERRAL ? rs->sr_v2ref : NULL );
1607         send_ldap_result( op, rs );
1608         op->o_private = savepriv;
1609         rs->sr_matched = NULL;
1610         rs->sr_ref = NULL;
1611
1612 finish:;
1613         if ( matched && matched != op->o_bd->be_suffix[ 0 ].bv_val ) {
1614                 op->o_tmpfree( matched, op->o_tmpmemctx );
1615         }
1616
1617         if ( rs->sr_v2ref ) {
1618                 ber_bvarray_free( rs->sr_v2ref );
1619         }
1620
1621         for ( i = 0; i < mi->mi_ntargets; i++ ) {
1622                 if ( !META_IS_CANDIDATE( &candidates[ i ] ) ) {
1623                         continue;
1624                 }
1625
1626                 if ( mc && META_IS_BINDING( &candidates[ i ] ) ) {
1627                         ldap_pvt_thread_mutex_lock( &mi->mi_conninfo.lai_mutex );
1628                         if ( LDAP_BACK_CONN_BINDING( &mc->mc_conns[ i ] ) ) {
1629                                 assert( candidates[ i ].sr_msgid >= 0 );
1630                                 assert( mc->mc_conns[ i ].msc_ld != NULL );
1631
1632 #ifdef DEBUG_205
1633                                 Debug( LDAP_DEBUG_ANY, "### %s meta_back_search(cleanup) "
1634                                         "ldap_unbind_ext[%ld] ld=%p\n",
1635                                         op->o_log_prefix, i, (void *)mc->mc_conns[i].msc_ld );
1636 #endif /* DEBUG_205 */
1637
1638                                 /* if still binding, destroy */
1639                                 meta_clear_one_candidate( op, mc, i );
1640                         }
1641                         ldap_pvt_thread_mutex_unlock( &mi->mi_conninfo.lai_mutex );
1642                         META_BINDING_CLEAR( &candidates[ i ] );
1643                 }
1644
1645                 if ( candidates[ i ].sr_matched ) {
1646                         free( (char *)candidates[ i ].sr_matched );
1647                         candidates[ i ].sr_matched = NULL;
1648                 }
1649
1650                 if ( candidates[ i ].sr_text ) {
1651                         ldap_memfree( (char *)candidates[ i ].sr_text );
1652                         candidates[ i ].sr_text = NULL;
1653                 }
1654
1655                 if ( candidates[ i ].sr_ref ) {
1656                         ber_bvarray_free( candidates[ i ].sr_ref );
1657                         candidates[ i ].sr_ref = NULL;
1658                 }
1659
1660                 if ( candidates[ i ].sr_ctrls ) {
1661                         ldap_controls_free( candidates[ i ].sr_ctrls );
1662                         candidates[ i ].sr_ctrls = NULL;
1663                 }
1664
1665                 if ( META_BACK_TGT_QUARANTINE( mi->mi_targets[ i ] ) ) {
1666                         meta_back_quarantine( op, &candidates[ i ], i );
1667                 }
1668
1669                 /* only in case of timelimit exceeded, if the timelimit exceeded because
1670                  * one contacted target never responded, invalidate the connection
1671                  * NOTE: should we quarantine the target as well?  right now, the connection
1672                  * is invalidated; the next time it will be recreated and the target
1673                  * will be quarantined if it cannot be contacted */
1674                 if ( mi->mi_idle_timeout != 0
1675                         && rs->sr_err == LDAP_TIMELIMIT_EXCEEDED
1676                         && op->o_time > mc->mc_conns[ i ].msc_time )
1677                 {
1678                         /* don't let anyone else use this expired connection */
1679                         LDAP_BACK_CONN_TAINTED_SET( mc );
1680                 }
1681         }
1682
1683         if ( mc ) {
1684                 meta_back_release_conn( mi, mc );
1685         }
1686
1687         return rs->sr_err;
1688 }
1689
1690 static int
1691 meta_send_entry(
1692         Operation       *op,
1693         SlapReply       *rs,
1694         metaconn_t      *mc,
1695         int             target,
1696         LDAPMessage     *e )
1697 {
1698         metainfo_t              *mi = ( metainfo_t * )op->o_bd->be_private;
1699         struct berval           a, mapped;
1700         Entry                   ent = { 0 };
1701         BerElement              ber = *e->lm_ber;
1702         Attribute               *attr, **attrp;
1703         struct berval           bdn,
1704                                 dn = BER_BVNULL;
1705         const char              *text;
1706         dncookie                dc;
1707         int                     rc;
1708
1709         if ( ber_scanf( &ber, "{m{", &bdn ) == LBER_ERROR ) {
1710                 return LDAP_DECODING_ERROR;
1711         }
1712
1713         /*
1714          * Rewrite the dn of the result, if needed
1715          */
1716         dc.target = mi->mi_targets[ target ];
1717         dc.conn = op->o_conn;
1718         dc.rs = rs;
1719         dc.ctx = "searchResult";
1720
1721         rs->sr_err = ldap_back_dn_massage( &dc, &bdn, &dn );
1722         if ( rs->sr_err != LDAP_SUCCESS) {
1723                 return rs->sr_err;
1724         }
1725
1726         /*
1727          * Note: this may fail if the target host(s) schema differs
1728          * from the one known to the meta, and a DN with unknown
1729          * attributes is returned.
1730          * 
1731          * FIXME: should we log anything, or delegate to dnNormalize?
1732          */
1733         rc = dnPrettyNormal( NULL, &dn, &ent.e_name, &ent.e_nname,
1734                 op->o_tmpmemctx );
1735         if ( dn.bv_val != bdn.bv_val ) {
1736                 free( dn.bv_val );
1737         }
1738         BER_BVZERO( &dn );
1739
1740         if ( rc != LDAP_SUCCESS ) {
1741                 return LDAP_INVALID_DN_SYNTAX;
1742         }
1743
1744         /*
1745          * cache dn
1746          */
1747         if ( mi->mi_cache.ttl != META_DNCACHE_DISABLED ) {
1748                 ( void )meta_dncache_update_entry( &mi->mi_cache,
1749                                 &ent.e_nname, target );
1750         }
1751
1752         attrp = &ent.e_attrs;
1753
1754         dc.ctx = "searchAttrDN";
1755         while ( ber_scanf( &ber, "{m", &a ) != LBER_ERROR ) {
1756                 int                             last = 0;
1757                 slap_syntax_validate_func       *validate;
1758                 slap_syntax_transform_func      *pretty;
1759
1760                 ldap_back_map( &mi->mi_targets[ target ]->mt_rwmap.rwm_at, 
1761                                 &a, &mapped, BACKLDAP_REMAP );
1762                 if ( BER_BVISNULL( &mapped ) || mapped.bv_val[0] == '\0' ) {
1763                         ( void )ber_scanf( &ber, "x" /* [W] */ );
1764                         continue;
1765                 }
1766                 attr = ( Attribute * )ch_calloc( 1, sizeof( Attribute ) );
1767                 if ( attr == NULL ) {
1768                         continue;
1769                 }
1770                 if ( slap_bv2ad( &mapped, &attr->a_desc, &text )
1771                                 != LDAP_SUCCESS) {
1772                         if ( slap_bv2undef_ad( &mapped, &attr->a_desc, &text,
1773                                 SLAP_AD_PROXIED ) != LDAP_SUCCESS )
1774                         {
1775                                 char    buf[ SLAP_TEXT_BUFLEN ];
1776
1777                                 snprintf( buf, sizeof( buf ),
1778                                         "%s meta_send_entry(\"%s\"): "
1779                                         "slap_bv2undef_ad(%s): %s\n",
1780                                         op->o_log_prefix, ent.e_name.bv_val,
1781                                         mapped.bv_val, text );
1782
1783                                 Debug( LDAP_DEBUG_ANY, "%s", buf, 0, 0 );
1784                                 ch_free( attr );
1785                                 continue;
1786                         }
1787                 }
1788
1789                 /* no subschemaSubentry */
1790                 if ( attr->a_desc == slap_schema.si_ad_subschemaSubentry
1791                         || attr->a_desc == slap_schema.si_ad_entryDN )
1792                 {
1793
1794                         /* 
1795                          * We eat target's subschemaSubentry because
1796                          * a search for this value is likely not
1797                          * to resolve to the appropriate backend;
1798                          * later, the local subschemaSubentry is
1799                          * added.
1800                          *
1801                          * We also eat entryDN because the frontend
1802                          * will reattach it without checking if already
1803                          * present...
1804                          */
1805                         ( void )ber_scanf( &ber, "x" /* [W] */ );
1806
1807                         ch_free(attr);
1808                         continue;
1809                 }
1810
1811                 if ( ber_scanf( &ber, "[W]", &attr->a_vals ) == LBER_ERROR 
1812                                 || attr->a_vals == NULL )
1813                 {
1814                         attr->a_vals = (struct berval *)&slap_dummy_bv;
1815
1816                 } else {
1817                         for ( last = 0; !BER_BVISNULL( &attr->a_vals[ last ] ); ++last )
1818                                 ;
1819                 }
1820
1821                 validate = attr->a_desc->ad_type->sat_syntax->ssyn_validate;
1822                 pretty = attr->a_desc->ad_type->sat_syntax->ssyn_pretty;
1823
1824                 if ( !validate && !pretty ) {
1825                         attr_free( attr );
1826                         goto next_attr;
1827                 }
1828
1829                 if ( attr->a_desc == slap_schema.si_ad_objectClass
1830                                 || attr->a_desc == slap_schema.si_ad_structuralObjectClass )
1831                 {
1832                         struct berval   *bv;
1833
1834                         for ( bv = attr->a_vals; !BER_BVISNULL( bv ); bv++ ) {
1835                                 ldap_back_map( &mi->mi_targets[ target ]->mt_rwmap.rwm_oc,
1836                                                 bv, &mapped, BACKLDAP_REMAP );
1837                                 if ( BER_BVISNULL( &mapped ) || mapped.bv_val[0] == '\0') {
1838                                         free( bv->bv_val );
1839                                         BER_BVZERO( bv );
1840                                         if ( --last < 0 ) {
1841                                                 break;
1842                                         }
1843                                         *bv = attr->a_vals[ last ];
1844                                         BER_BVZERO( &attr->a_vals[ last ] );
1845                                         bv--;
1846
1847                                 } else if ( mapped.bv_val != bv->bv_val ) {
1848                                         free( bv->bv_val );
1849                                         ber_dupbv( bv, &mapped );
1850                                 }
1851                         }
1852                 /*
1853                  * It is necessary to try to rewrite attributes with
1854                  * dn syntax because they might be used in ACLs as
1855                  * members of groups; since ACLs are applied to the
1856                  * rewritten stuff, no dn-based subecj clause could
1857                  * be used at the ldap backend side (see
1858                  * http://www.OpenLDAP.org/faq/data/cache/452.html)
1859                  * The problem can be overcome by moving the dn-based
1860                  * ACLs to the target directory server, and letting
1861                  * everything pass thru the ldap backend.
1862                  */
1863                 } else {
1864                         int     i;
1865
1866                         if ( attr->a_desc->ad_type->sat_syntax ==
1867                                 slap_schema.si_syn_distinguishedName )
1868                         {
1869                                 ldap_dnattr_result_rewrite( &dc, attr->a_vals );
1870
1871                         } else if ( attr->a_desc == slap_schema.si_ad_ref ) {
1872                                 ldap_back_referral_result_rewrite( &dc, attr->a_vals );
1873
1874                         }
1875
1876                         for ( i = 0; i < last; i++ ) {
1877                                 struct berval   pval;
1878                                 int             rc;
1879
1880                                 if ( pretty ) {
1881                                         rc = pretty( attr->a_desc->ad_type->sat_syntax,
1882                                                 &attr->a_vals[i], &pval, NULL );
1883
1884                                 } else {
1885                                         rc = validate( attr->a_desc->ad_type->sat_syntax,
1886                                                 &attr->a_vals[i] );
1887                                 }
1888
1889                                 if ( rc ) {
1890                                         LBER_FREE( attr->a_vals[i].bv_val );
1891                                         if ( --last == i ) {
1892                                                 BER_BVZERO( &attr->a_vals[ i ] );
1893                                                 break;
1894                                         }
1895                                         attr->a_vals[i] = attr->a_vals[last];
1896                                         BER_BVZERO( &attr->a_vals[last] );
1897                                         i--;
1898                                         continue;
1899                                 }
1900
1901                                 if ( pretty ) {
1902                                         LBER_FREE( attr->a_vals[i].bv_val );
1903                                         attr->a_vals[i] = pval;
1904                                 }
1905                         }
1906
1907                         if ( last == 0 && attr->a_vals != &slap_dummy_bv ) {
1908                                 attr_free( attr );
1909                                 goto next_attr;
1910                         }
1911                 }
1912
1913                 if ( last && attr->a_desc->ad_type->sat_equality &&
1914                         attr->a_desc->ad_type->sat_equality->smr_normalize )
1915                 {
1916                         int i;
1917
1918                         attr->a_nvals = ch_malloc( ( last + 1 ) * sizeof( struct berval ) );
1919                         for ( i = 0; i<last; i++ ) {
1920                                 attr->a_desc->ad_type->sat_equality->smr_normalize(
1921                                         SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX,
1922                                         attr->a_desc->ad_type->sat_syntax,
1923                                         attr->a_desc->ad_type->sat_equality,
1924                                         &attr->a_vals[i], &attr->a_nvals[i],
1925                                         NULL );
1926                         }
1927                         BER_BVZERO( &attr->a_nvals[i] );
1928
1929                 } else {
1930                         attr->a_nvals = attr->a_vals;
1931                 }
1932
1933                 *attrp = attr;
1934                 attrp = &attr->a_next;
1935 next_attr:;
1936         }
1937         rs->sr_entry = &ent;
1938         rs->sr_attrs = op->ors_attrs;
1939         rs->sr_flags = 0;
1940         rs->sr_err = LDAP_SUCCESS;
1941         rc = send_search_entry( op, rs );
1942         switch ( rc ) {
1943         case LDAP_UNAVAILABLE:
1944                 rc = LDAP_OTHER;
1945                 break;
1946         }
1947         rs->sr_entry = NULL;
1948         rs->sr_attrs = NULL;
1949         
1950         if ( !BER_BVISNULL( &ent.e_name ) ) {
1951                 free( ent.e_name.bv_val );
1952                 BER_BVZERO( &ent.e_name );
1953         }
1954         if ( !BER_BVISNULL( &ent.e_nname ) ) {
1955                 free( ent.e_nname.bv_val );
1956                 BER_BVZERO( &ent.e_nname );
1957         }
1958         entry_clean( &ent );
1959
1960         return rc;
1961 }
1962