3 * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright (c) 1995 Regents of the University of Michigan.
10 * Redistribution and use in source and binary forms are permitted
11 * provided that this notice is preserved and that due credit is given
12 * to the University of Michigan at Ann Arbor. The name of the University
13 * may not be used to endorse or promote products derived from this
14 * software without specific prior written permission. This software
15 * is provided ``as is'' without express or implied warranty.
22 #include <ac/string.h>
23 #include <ac/socket.h>
30 Connection *conn, /* where to send results */
31 Operation *op /* info about the op to which we're responding */
34 ber_int_t scope, deref, attrsonly;
35 ber_int_t sizelimit, timelimit;
36 char *base = NULL, *nbase = NULL, *fstr = NULL;
37 Filter *filter = NULL;
42 struct berval **urls = NULL;
44 Debug( LDAP_DEBUG_TRACE, "do_search\n", 0, 0, 0 );
47 * Parse the search request. It looks like this:
49 * SearchRequest := [APPLICATION 3] SEQUENCE {
50 * baseObject DistinguishedName,
56 * derefAliases ENUMERATED {
57 * neverDerefaliases (0),
58 * derefInSearching (1),
59 * derefFindingBaseObj (2),
60 * alwaysDerefAliases (3)
62 * sizelimit INTEGER (0 .. 65535),
63 * timelimit INTEGER (0 .. 65535),
66 * attributes SEQUENCE OF AttributeType
70 /* baseObject, scope, derefAliases, sizelimit, timelimit, attrsOnly */
71 if ( ber_scanf( op->o_ber, "{aiiiib" /*}*/,
72 &base, &scope, &deref, &sizelimit,
73 &timelimit, &attrsonly ) == LBER_ERROR ) {
74 send_ldap_disconnect( conn, op,
75 LDAP_PROTOCOL_ERROR, "decoding error" );
76 rc = SLAPD_DISCONNECT;
82 case LDAP_SCOPE_ONELEVEL:
83 case LDAP_SCOPE_SUBTREE:
86 send_ldap_result( conn, op, rc = LDAP_PROTOCOL_ERROR,
87 NULL, "invalid scope", NULL, NULL );
92 case LDAP_DEREF_NEVER:
93 case LDAP_DEREF_FINDING:
94 case LDAP_DEREF_SEARCHING:
95 case LDAP_DEREF_ALWAYS:
98 send_ldap_result( conn, op, rc = LDAP_PROTOCOL_ERROR,
99 NULL, "invalid deref", NULL, NULL );
103 nbase = ch_strdup( base );
105 if( dn_normalize( nbase ) == NULL ) {
106 send_ldap_result( conn, op, rc = LDAP_INVALID_DN_SYNTAX,
107 NULL, "invalid DN", NULL, NULL );
111 Debug( LDAP_DEBUG_ARGS, "SRCH \"%s\" %d %d", base, scope, deref );
112 Debug( LDAP_DEBUG_ARGS, " %d %d %d\n", sizelimit, timelimit,
115 /* filter - returns a "normalized" version */
116 rc = get_filter( conn, op->o_ber, &filter, &fstr, &text );
117 if( rc != LDAP_SUCCESS ) {
118 if( rc == SLAPD_DISCONNECT ) {
119 send_ldap_disconnect( conn, op,
120 LDAP_PROTOCOL_ERROR, text );
122 send_ldap_result( conn, op, rc,
123 NULL, text, NULL, NULL );
128 Debug( LDAP_DEBUG_ARGS, " filter: %s\n", fstr, 0, 0 );
131 if ( ber_scanf( op->o_ber, /*{*/ "{v}}", &attrs ) == LBER_ERROR ) {
132 send_ldap_disconnect( conn, op,
133 LDAP_PROTOCOL_ERROR, "decoding attrs error" );
134 rc = SLAPD_DISCONNECT;
138 if( (rc = get_ctrls( conn, op, 1 )) != LDAP_SUCCESS ) {
139 Debug( LDAP_DEBUG_ANY, "do_search: get_ctrls failed\n", 0, 0, 0 );
145 Debug( LDAP_DEBUG_ARGS, " attrs:", 0, 0, 0 );
147 if ( attrs != NULL ) {
148 for ( i = 0; attrs[i] != NULL; i++ ) {
149 Debug( LDAP_DEBUG_ARGS, " %s", attrs[i], 0, 0 );
153 Debug( LDAP_DEBUG_ARGS, "\n", 0, 0, 0 );
155 Statslog( LDAP_DEBUG_STATS,
156 "conn=%ld op=%d SRCH base=\"%s\" scope=%d filter=\"%s\"\n",
157 op->o_connid, op->o_opid, base, scope, fstr );
159 if ( scope == LDAP_SCOPE_BASE ) {
162 if ( strcasecmp( nbase, LDAP_ROOT_DSE ) == 0 ) {
163 rc = root_dse_info( &entry, &text );
166 #if defined( SLAPD_MONITOR_DN )
167 else if ( strcasecmp( nbase, SLAPD_MONITOR_DN ) == 0 ) {
168 rc = monitor_info( &entry, &text );
172 #if defined( SLAPD_CONFIG_DN )
173 else if ( strcasecmp( nbase, SLAPD_CONFIG_DN ) == 0 ) {
174 rc = config_info( &entry, &text );
178 #if defined( SLAPD_SCHEMA_DN )
179 else if ( strcasecmp( nbase, SLAPD_SCHEMA_DN ) == 0 ) {
180 rc= schema_info( &entry, &text );
184 if( rc != LDAP_SUCCESS ) {
185 send_ldap_result( conn, op, rc,
186 NULL, text, NULL, NULL );
189 } else if ( entry != NULL ) {
190 rc = test_filter( NULL, conn, op,
193 if( rc == LDAP_COMPARE_TRUE ) {
194 send_search_entry( &backends[0], conn, op,
195 entry, attrs, attrsonly, NULL );
199 send_ldap_result( conn, op, LDAP_SUCCESS,
200 NULL, NULL, NULL, NULL );
207 * We could be serving multiple database backends. Select the
208 * appropriate one, or send a referral to our "referral server"
209 * if we don't hold it.
211 if ( (be = select_backend( nbase )) == NULL ) {
212 send_ldap_result( conn, op, rc = LDAP_REFERRAL,
213 NULL, NULL, default_referral, NULL );
218 /* make sure this backend recongizes critical controls */
219 rc = backend_check_controls( be, conn, op, &text ) ;
220 if( rc != LDAP_SUCCESS ) {
221 send_ldap_result( conn, op, rc,
222 NULL, text, NULL, NULL );
226 /* check for referrals */
227 rc = backend_check_referrals( be, conn, op, &urls, &text );
228 if ( rc != LDAP_SUCCESS ) {
229 send_ldap_result( conn, op, rc,
230 NULL, text, urls, NULL );
231 ber_bvecfree( urls );
235 /* deref the base if needed */
236 nbase = suffix_alias( be, nbase );
238 /* actually do the search and send the result(s) */
239 if ( be->be_search ) {
240 (*be->be_search)( be, conn, op, base, nbase, scope, deref, sizelimit,
241 timelimit, filter, fstr, attrs, attrsonly );
243 send_ldap_result( conn, op, rc = LDAP_UNWILLING_TO_PERFORM,
244 NULL, "operation not supported within namingContext", NULL, NULL );
248 if( base != NULL) free( base );
249 if( nbase != NULL) free( nbase );
250 if( fstr != NULL) free( fstr );
251 if( filter != NULL) filter_free( filter );
252 if ( attrs != NULL ) {
253 charray_free( attrs );