3 * Copyright 1998-1999 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright (c) 1995 Regents of the University of Michigan.
10 * Redistribution and use in source and binary forms are permitted
11 * provided that this notice is preserved and that due credit is given
12 * to the University of Michigan at Ann Arbor. The name of the University
13 * may not be used to endorse or promote products derived from this
14 * software without specific prior written permission. This software
15 * is provided ``as is'' without express or implied warranty.
22 #include <ac/string.h>
23 #include <ac/socket.h>
31 Connection *conn, /* where to send results */
32 Operation *op /* info about the op to which we're responding */
36 ber_int_t scope, deref, attrsonly;
37 ber_int_t sizelimit, timelimit;
38 char *base = NULL, *nbase = NULL, *fstr = NULL;
39 Filter *filter = NULL;
45 Debug( LDAP_DEBUG_TRACE, "do_search\n", 0, 0, 0 );
48 * Parse the search request. It looks like this:
50 * SearchRequest := [APPLICATION 3] SEQUENCE {
51 * baseObject DistinguishedName,
57 * derefAliases ENUMERATED {
58 * neverDerefaliases (0),
59 * derefInSearching (1),
60 * derefFindingBaseObj (2),
61 * alwaysDerefAliases (3)
63 * sizelimit INTEGER (0 .. 65535),
64 * timelimit INTEGER (0 .. 65535),
67 * attributes SEQUENCE OF AttributeType
71 /* baseObject, scope, derefAliases, sizelimit, timelimit, attrsOnly */
72 if ( ber_scanf( op->o_ber, "{aiiiib" /*}*/,
73 &base, &scope, &deref, &sizelimit,
74 &timelimit, &attrsonly ) == LBER_ERROR ) {
75 send_ldap_disconnect( conn, op,
76 LDAP_PROTOCOL_ERROR, "decoding error" );
77 rc = SLAPD_DISCONNECT;
83 case LDAP_SCOPE_ONELEVEL:
84 case LDAP_SCOPE_SUBTREE:
87 send_ldap_result( conn, op, rc = LDAP_PROTOCOL_ERROR,
88 NULL, "invalid scope", NULL, NULL );
93 case LDAP_DEREF_NEVER:
94 case LDAP_DEREF_FINDING:
95 case LDAP_DEREF_SEARCHING:
96 case LDAP_DEREF_ALWAYS:
99 send_ldap_result( conn, op, rc = LDAP_PROTOCOL_ERROR,
100 NULL, "invalid deref", NULL, NULL );
104 nbase = ch_strdup( base );
106 if( dn_normalize( nbase ) == NULL ) {
107 send_ldap_result( conn, op, rc = LDAP_INVALID_DN_SYNTAX,
108 NULL, "invalid DN", NULL, NULL );
112 Debug( LDAP_DEBUG_ARGS, "SRCH \"%s\" %d %d", base, scope, deref );
113 Debug( LDAP_DEBUG_ARGS, " %d %d %d\n", sizelimit, timelimit,
116 /* filter - returns a "normalized" version */
117 if ( (rc = get_filter( conn, op->o_ber, &filter, &fstr, &text )) != LDAP_SUCCESS ) {
118 if( rc == SLAPD_DISCONNECT ) {
119 send_ldap_disconnect( conn, op,
120 LDAP_PROTOCOL_ERROR, text );
122 send_ldap_result( conn, op, rc,
123 NULL, text, NULL, NULL );
128 Debug( LDAP_DEBUG_ARGS, " filter: %s\n", fstr, 0, 0 );
131 if ( ber_scanf( op->o_ber, /*{*/ "{v}}", &attrs ) == LBER_ERROR ) {
132 send_ldap_disconnect( conn, op,
133 LDAP_PROTOCOL_ERROR, "decoding attrs error" );
134 rc = SLAPD_DISCONNECT;
138 if( (rc = get_ctrls( conn, op, 1 )) != LDAP_SUCCESS ) {
139 Debug( LDAP_DEBUG_ANY, "do_search: get_ctrls failed\n", 0, 0, 0 );
145 Debug( LDAP_DEBUG_ARGS, " attrs:", 0, 0, 0 );
147 if ( attrs != NULL ) {
148 for ( i = 0; attrs[i] != NULL; i++ ) {
149 #ifndef SLAPD_SCHEMA_NOT_COMPAT
150 attr_normalize( attrs[i] );
152 Debug( LDAP_DEBUG_ARGS, " %s", attrs[i], 0, 0 );
156 Debug( LDAP_DEBUG_ARGS, "\n", 0, 0, 0 );
158 Statslog( LDAP_DEBUG_STATS,
159 "conn=%ld op=%d SRCH base=\"%s\" scope=%d filter=\"%s\"\n",
160 op->o_connid, op->o_opid, base, scope, fstr );
162 if ( scope == LDAP_SCOPE_BASE ) {
163 #if defined( SLAPD_MONITOR_DN )
164 if ( strcmp( nbase, SLAPD_MONITOR_DN ) == 0 ) {
165 monitor_info( conn, op, attrs, attrsonly );
170 #if defined( SLAPD_CONFIG_DN )
171 if ( strcmp( nbase, SLAPD_CONFIG_DN ) == 0 ) {
172 config_info( conn, op, attrs, attrsonly );
177 #if defined( SLAPD_SCHEMA_DN )
178 if ( strcmp( nbase, SLAPD_SCHEMA_DN ) == 0 ) {
179 schema_info( conn, op, attrs, attrsonly );
184 if ( strcmp( nbase, LDAP_ROOT_DSE ) == 0 ) {
185 root_dse_info( conn, op, attrs, attrsonly );
191 * We could be serving multiple database backends. Select the
192 * appropriate one, or send a referral to our "referral server"
193 * if we don't hold it.
195 if ( (be = select_backend( nbase )) == NULL ) {
196 send_ldap_result( conn, op, rc = LDAP_REFERRAL,
197 NULL, NULL, default_referral, NULL );
202 /* make sure this backend recongizes critical controls */
203 rc = backend_check_controls( be, conn, op, &text ) ;
205 if( rc != LDAP_SUCCESS ) {
206 send_ldap_result( conn, op, rc,
207 NULL, text, NULL, NULL );
211 /* deref the base if needed */
212 nbase = suffix_alias( be, nbase );
214 /* actually do the search and send the result(s) */
215 if ( be->be_search ) {
216 (*be->be_search)( be, conn, op, base, nbase, scope, deref, sizelimit,
217 timelimit, filter, fstr, attrs, attrsonly );
219 send_ldap_result( conn, op, rc = LDAP_UNWILLING_TO_PERFORM,
220 NULL, "search function not implemented", NULL, NULL );
224 if( base != NULL) free( base );
225 if( nbase != NULL) free( nbase );
226 if( fstr != NULL) free( fstr );
227 if( filter != NULL) filter_free( filter );
228 if ( attrs != NULL ) {
229 charray_free( attrs );