openldap/servers/slapd/back-ldbm/search.c

670 lines
16 KiB
C
Raw Normal View History

1998-08-09 08:43:13 +08:00
/* search.c - ldbm backend search function */
/* $OpenLDAP$ */
1999-08-07 07:07:46 +08:00
/*
2003-01-04 04:20:47 +08:00
* Copyright 1998-2003 The OpenLDAP Foundation, All Rights Reserved.
1999-08-07 07:07:46 +08:00
* COPYING RESTRICTIONS APPLY, see COPYRIGHT file
*/
1998-08-09 08:43:13 +08:00
1998-10-25 09:41:42 +08:00
#include "portable.h"
1998-08-09 08:43:13 +08:00
#include <stdio.h>
1998-10-25 09:41:42 +08:00
#include <ac/string.h>
#include <ac/socket.h>
1998-08-09 08:43:13 +08:00
#include "slap.h"
#include "back-ldbm.h"
#include "proto-back-ldbm.h"
1998-08-09 08:43:13 +08:00
static ID_BLOCK *base_candidate(
Backend *be, Entry *e );
static ID_BLOCK *search_candidates(
Backend *be, Entry *e, Filter *filter,
int scope, int deref, int manageDSAit );
1998-08-09 08:43:13 +08:00
int
ldbm_back_search(
Operation *op,
SlapReply *rs )
1998-08-09 08:43:13 +08:00
{
struct ldbminfo *li = (struct ldbminfo *) op->o_bd->be_private;
int rc, err;
2000-05-29 06:38:21 +08:00
const char *text = NULL;
1998-08-09 08:43:13 +08:00
time_t stoptime;
ID_BLOCK *candidates;
ID id, cursor;
1998-08-09 08:43:13 +08:00
Entry *e;
Entry *matched = NULL;
2001-12-30 18:47:28 +08:00
struct berval realbase = { 0, NULL };
int manageDSAit = get_manageDSAit( op );
int cscope = LDAP_SCOPE_DEFAULT;
#ifdef LDAP_CACHING
Entry cache_base_entry;
#endif /* LDAP_CACHING */
struct slap_limits_set *limit = NULL;
int isroot = 0;
2001-01-18 01:01:19 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, ENTRY, "ldbm_back_search: enter\n", 0, 0, 0 );
2001-01-18 01:01:19 +08:00
#else
Debug(LDAP_DEBUG_TRACE, "=> ldbm_back_search\n", 0, 0, 0);
2001-01-18 01:01:19 +08:00
#endif
/* grab giant lock for reading */
ldap_pvt_thread_rdwr_rlock(&li->li_giant_rwlock);
#ifndef LDAP_CACHING
if ( op->o_req_ndn.bv_len == 0 ) {
/* DIT root special case */
e = (Entry *) &slap_entry_root;
/* need normalized dn below */
2001-12-30 18:47:28 +08:00
ber_dupbv( &realbase, &e->e_nname );
#else /* LDAP_CACHING */
if ( op->o_caching_on || op->o_req_ndn.bv_len == 0 ) {
if (op->o_req_ndn.bv_len == 0) {
e = (Entry *) &slap_entry_root;
/* need normalized dn below */
ber_dupbv( &realbase, &e->e_nname );
} else {
2003-03-31 22:01:34 +08:00
if ((op->oq_search.rs_scope == LDAP_SCOPE_BASE)
&& (e = dn2entry_r( op->o_bd, &op->o_req_ndn, &matched )))
{
2003-03-31 22:01:34 +08:00
candidates = base_candidate(op->o_bd, e);
cache_return_entry_r( &li->li_cache, e );
goto searchit;
}
2003-03-31 22:01:34 +08:00
cache_base_entry.e_nname = op->o_req_ndn;
e = &cache_base_entry;
}
#endif /* LDAP_CACHING */
candidates = search_candidates( op->o_bd, e, op->oq_search.rs_filter,
op->oq_search.rs_scope, op->oq_search.rs_deref,
manageDSAit || get_domainScope(op) );
goto searchit;
} else if ( op->oq_search.rs_deref & LDAP_DEREF_FINDING ) {
/* deref dn and get entry with reader lock */
e = deref_dn_r( op->o_bd, &op->o_req_ndn, &rs->sr_err, &matched, &rs->sr_text );
1998-08-09 08:43:13 +08:00
if( rs->sr_err == LDAP_NO_SUCH_OBJECT ) rs->sr_err = LDAP_REFERRAL;
2001-04-13 07:02:20 +08:00
} else {
/* get entry with reader lock */
e = dn2entry_r( op->o_bd, &op->o_req_ndn, &matched );
rs->sr_err = e != NULL ? LDAP_SUCCESS : LDAP_REFERRAL;
rs->sr_text = NULL;
}
if ( e == NULL ) {
struct berval matched_dn = { 0, NULL };
if ( matched != NULL ) {
BerVarray erefs;
ber_dupbv( &matched_dn, &matched->e_name );
erefs = is_entry_referral( matched )
? get_entry_referrals( op, matched )
: NULL;
cache_return_entry_r( &li->li_cache, matched );
2001-04-13 07:02:20 +08:00
if( erefs ) {
rs->sr_ref = referral_rewrite( erefs, &matched_dn,
&op->o_req_dn, op->oq_search.rs_scope );
ber_bvarray_free( erefs );
}
} else {
rs->sr_ref = referral_rewrite( default_referral,
NULL, &op->o_req_dn, op->oq_search.rs_scope );
}
ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock);
rs->sr_matched = matched_dn.bv_val;
send_ldap_result( op, rs );
ber_bvarray_free( rs->sr_ref );
ber_memfree( matched_dn.bv_val );
return 1;
}
if (!manageDSAit && is_entry_referral( e ) ) {
/* entry is a referral, don't allow add */
struct berval matched_dn;
BerVarray erefs;
ber_dupbv( &matched_dn, &e->e_name );
erefs = get_entry_referrals( op, e );
rs->sr_ref = NULL;
cache_return_entry_r( &li->li_cache, e );
ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock);
2001-01-18 01:01:19 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, INFO,
"ldbm_search: entry (%s) is a referral.\n",
e->e_dn, 0, 0 );
2001-01-18 01:01:19 +08:00
#else
2000-09-25 14:49:27 +08:00
Debug( LDAP_DEBUG_TRACE,
"ldbm_search: entry is referral\n",
0, 0, 0 );
2001-01-18 01:01:19 +08:00
#endif
if( erefs ) {
rs->sr_ref = referral_rewrite( erefs, &matched_dn,
&op->o_req_dn, op->oq_search.rs_scope );
ber_bvarray_free( erefs );
}
rs->sr_matched = matched_dn.bv_val;
if( rs->sr_ref ) {
rs->sr_err = LDAP_REFERRAL;
send_ldap_result( op, rs );
ber_bvarray_free( rs->sr_ref );
} else {
send_ldap_error( op, rs, LDAP_OTHER,
"bad referral object" );
}
ber_memfree( matched_dn.bv_val );
return 1;
}
2000-06-17 10:00:30 +08:00
if ( is_entry_alias( e ) ) {
/* don't deref */
op->oq_search.rs_deref = LDAP_DEREF_NEVER;
2000-06-17 10:00:30 +08:00
}
if ( op->oq_search.rs_scope == LDAP_SCOPE_BASE ) {
cscope = LDAP_SCOPE_BASE;
candidates = base_candidate( op->o_bd, e );
1998-08-09 08:43:13 +08:00
} else {
cscope = ( op->oq_search.rs_scope != LDAP_SCOPE_SUBTREE )
? LDAP_SCOPE_BASE : LDAP_SCOPE_SUBTREE;
candidates = search_candidates( op->o_bd, e, op->oq_search.rs_filter,
op->oq_search.rs_scope, op->oq_search.rs_deref, manageDSAit );
1998-08-09 08:43:13 +08:00
}
/* need normalized dn below */
2001-12-30 18:47:28 +08:00
ber_dupbv( &realbase, &e->e_nname );
2000-05-28 03:21:28 +08:00
cache_return_entry_r( &li->li_cache, e );
searchit:
1998-08-09 08:43:13 +08:00
if ( candidates == NULL ) {
/* no candidates */
2001-01-18 01:01:19 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, INFO,
"ldbm_search: no candidates\n" , 0, 0, 0);
2001-01-18 01:01:19 +08:00
#else
2000-09-25 14:49:27 +08:00
Debug( LDAP_DEBUG_TRACE, "ldbm_search: no candidates\n",
0, 0, 0 );
2001-01-18 01:01:19 +08:00
#endif
#ifdef LDAP_CACHING
if ( op->o_caching_on ) {
ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock);
}
#endif /* LDAP_CACHING */
2001-01-18 01:01:19 +08:00
rs->sr_err = LDAP_SUCCESS;
send_ldap_result( op, rs );
1998-08-09 08:43:13 +08:00
#ifdef LDAP_CACHING
if ( op->o_caching_on ) {
ldap_pvt_thread_rdwr_rlock(&li->li_giant_rwlock);
}
#endif /* LDAP_CACHING */
rc = 1;
goto done;
}
/* if not root, get appropriate limits */
#ifndef LDAP_CACHING
if ( be_isroot( op->o_bd, &op->o_ndn ) )
#else /* LDAP_CACHING */
if ( op->o_caching_on || be_isroot( op->o_bd, &op->o_ndn ) )
#endif /* LDAP_CACHING */
{
/*
* FIXME: I'd consider this dangerous if someone
* uses isroot for anything but handling limits
*/
isroot = 1;
} else {
( void ) get_limits( op->o_bd, &op->o_ndn, &limit );
}
/* if candidates exceed to-be-checked entries, abort */
if ( !isroot && limit->lms_s_unchecked != -1 ) {
2001-12-09 10:34:45 +08:00
if ( ID_BLOCK_NIDS( candidates ) > (unsigned) limit->lms_s_unchecked ) {
send_ldap_error( op, rs, LDAP_ADMINLIMIT_EXCEEDED,
NULL );
rc = 0;
goto done;
}
}
2001-11-13 01:12:43 +08:00
/* if root an no specific limit is required, allow unlimited search */
if ( isroot ) {
if ( op->oq_search.rs_tlimit == 0 ) {
op->oq_search.rs_tlimit = -1;
}
if ( op->oq_search.rs_slimit == 0 ) {
op->oq_search.rs_slimit = -1;
2001-11-13 01:12:43 +08:00
}
2001-11-13 01:12:43 +08:00
} else {
/* if no limit is required, use soft limit */
if ( op->oq_search.rs_tlimit <= 0 ) {
op->oq_search.rs_tlimit = limit->lms_t_soft;
2001-11-13 01:12:43 +08:00
/* if requested limit higher than hard limit, abort */
} else if ( op->oq_search.rs_tlimit > limit->lms_t_hard ) {
2001-11-13 01:12:43 +08:00
/* no hard limit means use soft instead */
if ( limit->lms_t_hard == 0
&& limit->lms_t_soft > -1
&& op->oq_search.rs_tlimit > limit->lms_t_soft ) {
op->oq_search.rs_tlimit = limit->lms_t_soft;
2001-11-13 01:12:43 +08:00
/* positive hard limit means abort */
} else if ( limit->lms_t_hard > 0 ) {
send_ldap_error( op, rs,
LDAP_ADMINLIMIT_EXCEEDED,
NULL );
2001-11-13 01:12:43 +08:00
rc = 0;
goto done;
}
2001-11-13 01:12:43 +08:00
/* negative hard limit means no limit */
}
2001-11-13 01:12:43 +08:00
/* if no limit is required, use soft limit */
if ( op->oq_search.rs_slimit <= 0 ) {
op->oq_search.rs_slimit = limit->lms_s_soft;
2001-11-13 01:12:43 +08:00
/* if requested limit higher than hard limit, abort */
} else if ( op->oq_search.rs_slimit > limit->lms_s_hard ) {
2001-11-13 01:12:43 +08:00
/* no hard limit means use soft instead */
if ( limit->lms_s_hard == 0
&& limit->lms_s_soft > -1
&& op->oq_search.rs_slimit > limit->lms_s_soft ) {
op->oq_search.rs_slimit = limit->lms_s_soft;
2001-11-13 01:12:43 +08:00
/* positive hard limit means abort */
} else if ( limit->lms_s_hard > 0 ) {
send_ldap_error( op, rs,
LDAP_ADMINLIMIT_EXCEEDED,
NULL );
2001-11-13 01:12:43 +08:00
rc = 0;
goto done;
}
2001-11-13 01:12:43 +08:00
/* negative hard limit means no limit */
}
}
2001-11-13 01:12:43 +08:00
/* compute it anyway; root does not use it */
stoptime = op->o_time + op->oq_search.rs_tlimit;
rs->sr_attrs = op->oq_search.rs_attrs;
2001-11-13 01:12:43 +08:00
for ( id = idl_firstid( candidates, &cursor ); id != NOID;
id = idl_nextid( candidates, &cursor ) )
{
int scopeok = 0;
int result = 0;
1998-08-09 08:43:13 +08:00
/* check for abandon */
if ( op->o_abandon ) {
rc = 0;
goto done;
1998-08-09 08:43:13 +08:00
}
1998-08-09 08:43:13 +08:00
/* check time limit */
if ( op->oq_search.rs_tlimit != -1 && slap_get_time() > stoptime ) {
rs->sr_err = LDAP_TIMELIMIT_EXCEEDED;
send_ldap_result( op, rs );
rc = 0;
goto done;
1998-08-09 08:43:13 +08:00
}
/* get the entry with reader lock */
e = id2entry_r( op->o_bd, id );
if ( e == NULL ) {
2001-01-18 01:01:19 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, INFO,
"ldbm_search: candidate %ld not found.\n", id, 0, 0 );
2001-01-18 01:01:19 +08:00
#else
2000-09-25 14:49:27 +08:00
Debug( LDAP_DEBUG_TRACE,
"ldbm_search: candidate %ld not found\n",
id, 0, 0 );
2001-01-18 01:01:19 +08:00
#endif
goto loop_continue;
}
rs->sr_entry = e;
#ifdef LDAP_CACHING
if ( !op->o_caching_on ) {
#endif /* LDAP_CACHING */
if ( op->oq_search.rs_deref & LDAP_DEREF_SEARCHING && is_entry_alias( e ) ) {
Entry *matched;
int err;
const char *text;
e = deref_entry_r( op->o_bd, e, &err, &matched, &text );
if( e == NULL ) {
e = matched;
goto loop_continue;
}
if( e->e_id == id ) {
/* circular loop */
goto loop_continue;
}
/* need to skip alias which deref into scope */
if( op->oq_search.rs_scope & LDAP_SCOPE_ONELEVEL ) {
struct berval pdn;
dnParent( &e->e_nname, &pdn );
if ( ber_bvcmp( &pdn, &realbase ) ) {
goto loop_continue;
}
2001-12-30 18:47:28 +08:00
} else if ( dnIsSuffix( &e->e_nname, &realbase ) ) {
/* alias is within scope */
2001-01-18 01:01:19 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, DETAIL1,
"ldbm_search: alias \"%s\" in subtree\n", e->e_dn, 0, 0 );
2001-01-18 01:01:19 +08:00
#else
2000-09-25 14:49:27 +08:00
Debug( LDAP_DEBUG_TRACE,
"ldbm_search: alias \"%s\" in subtree\n",
e->e_dn, 0, 0 );
2001-01-18 01:01:19 +08:00
#endif
goto loop_continue;
}
rs->sr_entry = e;
scopeok = 1;
1998-08-09 08:43:13 +08:00
}
/*
* if it's a referral, add it to the list of referrals. only do
* this for non-base searches, and don't check the filter
* explicitly here since it's only a candidate anyway.
1998-08-09 08:43:13 +08:00
*/
if ( !manageDSAit && op->oq_search.rs_scope != LDAP_SCOPE_BASE &&
is_entry_referral( e ) )
1998-08-09 08:43:13 +08:00
{
struct berval dn;
/* check scope */
if ( !scopeok && op->oq_search.rs_scope == LDAP_SCOPE_ONELEVEL ) {
if ( !be_issuffix( op->o_bd, &e->e_nname ) ) {
dnParent( &e->e_nname, &dn );
scopeok = dn_match( &dn, &realbase );
} else {
2001-12-30 18:47:28 +08:00
scopeok = (realbase.bv_len == 0);
}
1998-08-09 08:43:13 +08:00
} else if ( !scopeok && op->oq_search.rs_scope == LDAP_SCOPE_SUBTREE ) {
2001-12-30 18:47:28 +08:00
scopeok = dnIsSuffix( &e->e_nname, &realbase );
} else {
scopeok = 1;
}
if( scopeok ) {
BerVarray erefs = get_entry_referrals( op, e );
rs->sr_ref = referral_rewrite( erefs,
&e->e_name, NULL,
op->oq_search.rs_scope == LDAP_SCOPE_SUBTREE
2001-12-08 06:28:46 +08:00
? LDAP_SCOPE_SUBTREE
: LDAP_SCOPE_BASE );
send_search_reference( op, rs );
ber_bvarray_free( rs->sr_ref );
rs->sr_ref = NULL;
} else {
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, DETAIL2,
"ldbm_search: candidate referral %ld scope not okay\n",
id, 0, 0 );
#else
Debug( LDAP_DEBUG_TRACE,
"ldbm_search: candidate referral %ld scope not okay\n",
id, 0, 0 );
#endif
}
1998-08-09 08:43:13 +08:00
goto loop_continue;
}
#ifdef LDAP_CACHING
}
#endif /* LDAP_CACHING */
/* if it matches the filter and scope, send it */
result = test_filter( op, e, op->oq_search.rs_filter );
if ( result == LDAP_COMPARE_TRUE ) {
struct berval dn;
/* check scope */
if ( !scopeok && op->oq_search.rs_scope == LDAP_SCOPE_ONELEVEL ) {
if ( !be_issuffix( op->o_bd, &e->e_nname ) ) {
dnParent( &e->e_nname, &dn );
scopeok = dn_match( &dn, &realbase );
} else {
2001-12-30 18:47:28 +08:00
scopeok = (realbase.bv_len == 0);
1998-08-09 08:43:13 +08:00
}
} else if ( !scopeok && op->oq_search.rs_scope == LDAP_SCOPE_SUBTREE ) {
2001-12-30 18:47:28 +08:00
scopeok = dnIsSuffix( &e->e_nname, &realbase );
} else {
scopeok = 1;
}
if ( scopeok ) {
/* check size limit */
if ( --op->oq_search.rs_slimit == -1 ) {
cache_return_entry_r( &li->li_cache, e );
rs->sr_err = LDAP_SIZELIMIT_EXCEEDED;
send_ldap_result( op, rs );
rc = 0;
goto done;
}
1998-08-09 08:43:13 +08:00
if (e) {
#ifdef LDAP_CACHING
if ( op->o_caching_on ) {
ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock);
cache_return_entry_r( &li->li_cache, e );
}
#endif /* LDAP_CACHING */
result = send_search_entry( op, rs );
#ifdef LDAP_CACHING
if ( op->o_caching_on ) {
ldap_pvt_thread_rdwr_rlock( &li->li_giant_rwlock );
}
#endif /* LDAP_CACHING */
2000-06-17 09:22:55 +08:00
switch (result) {
case 0: /* entry sent ok */
break;
case 1: /* entry not sent */
break;
case -1: /* connection closed */
cache_return_entry_r( &li->li_cache, e );
rc = 0;
goto done;
1998-08-09 08:43:13 +08:00
}
}
} else {
2001-01-18 01:01:19 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, DETAIL2,
"ldbm_search: candidate entry %ld scope not okay\n",
id, 0, 0 );
2001-01-18 01:01:19 +08:00
#else
2000-09-25 14:49:27 +08:00
Debug( LDAP_DEBUG_TRACE,
"ldbm_search: candidate entry %ld scope not okay\n",
id, 0, 0 );
2001-01-18 01:01:19 +08:00
#endif
1998-08-09 08:43:13 +08:00
}
} else {
2001-01-18 01:01:19 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, DETAIL2,
"ldbm_search: candidate entry %ld does not match filter\n",
id, 0, 0 );
2001-01-18 01:01:19 +08:00
#else
2000-09-25 14:49:27 +08:00
Debug( LDAP_DEBUG_TRACE,
"ldbm_search: candidate entry %ld does not match filter\n",
id, 0, 0 );
2001-01-18 01:01:19 +08:00
#endif
1998-08-09 08:43:13 +08:00
}
loop_continue:
1998-10-27 01:37:35 +08:00
if( e != NULL ) {
/* free reader lock */
#ifndef LDAP_CACHING
cache_return_entry_r( &li->li_cache, e );
#else /* LDAP_CACHING */
if ( !op->o_caching_on ) {
cache_return_entry_r( &li->li_cache, e );
}
#endif /* LDAP_CACHING */
}
1998-08-09 08:43:13 +08:00
ldap_pvt_thread_yield();
1998-08-09 08:43:13 +08:00
}
rs->sr_err = rs->sr_v2ref ? LDAP_REFERRAL : LDAP_SUCCESS;
rs->sr_ref = rs->sr_v2ref;
send_ldap_result( op, rs );
rc = 0;
done:
ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock);
1999-08-26 08:51:27 +08:00
if( candidates != NULL )
idl_free( candidates );
1998-08-09 08:43:13 +08:00
if( rs->sr_v2ref ) ber_bvarray_free( rs->sr_v2ref );
2001-12-30 18:47:28 +08:00
if( realbase.bv_val ) free( realbase.bv_val );
return rc;
1998-08-09 08:43:13 +08:00
}
static ID_BLOCK *
base_candidate(
1998-08-09 08:43:13 +08:00
Backend *be,
Entry *e )
1998-08-09 08:43:13 +08:00
{
ID_BLOCK *idl;
2001-01-18 01:01:19 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, ENTRY, "base_candidate: base (%s)\n", e->e_dn, 0, 0 );
2001-01-18 01:01:19 +08:00
#else
Debug(LDAP_DEBUG_TRACE, "base_candidates: base: \"%s\"\n",
e->e_dn, 0, 0);
2001-01-18 01:01:19 +08:00
#endif
1998-08-09 08:43:13 +08:00
idl = idl_alloc( 1 );
idl_insert( &idl, e->e_id, 1 );
return( idl );
}
static ID_BLOCK *
search_candidates(
1998-08-09 08:43:13 +08:00
Backend *be,
Entry *e,
1998-08-09 08:43:13 +08:00
Filter *filter,
int scope,
int deref,
int manageDSAit )
1998-08-09 08:43:13 +08:00
{
ID_BLOCK *candidates;
Filter f, fand, rf, af, xf;
AttributeAssertion aa_ref, aa_alias;
struct berval bv_ref = { sizeof("referral")-1, "referral" };
struct berval bv_alias = { sizeof("alias")-1, "alias" };
2001-01-18 01:01:19 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, DETAIL1,
2001-01-18 01:01:19 +08:00
"search_candidates: base (%s) scope %d deref %d\n",
e->e_ndn, scope, deref );
2001-01-18 01:01:19 +08:00
#else
2000-09-25 14:49:27 +08:00
Debug(LDAP_DEBUG_TRACE,
"search_candidates: base=\"%s\" s=%d d=%d\n",
e->e_ndn, scope, deref );
2001-01-18 01:01:19 +08:00
#endif
xf.f_or = filter;
xf.f_choice = LDAP_FILTER_OR;
xf.f_next = NULL;
if( !manageDSAit ) {
/* match referrals */
rf.f_choice = LDAP_FILTER_EQUALITY;
rf.f_ava = &aa_ref;
rf.f_av_desc = slap_schema.si_ad_objectClass;
rf.f_av_value = bv_ref;
rf.f_next = xf.f_or;
xf.f_or = &rf;
}
if( deref & LDAP_DEREF_SEARCHING ) {
/* match aliases */
af.f_choice = LDAP_FILTER_EQUALITY;
af.f_ava = &aa_alias;
af.f_av_desc = slap_schema.si_ad_objectClass;
af.f_av_value = bv_alias;
af.f_next = xf.f_or;
xf.f_or = &af;
}
f.f_next = NULL;
f.f_choice = LDAP_FILTER_AND;
f.f_and = &fand;
fand.f_choice = scope == LDAP_SCOPE_SUBTREE
? SLAPD_FILTER_DN_SUBTREE
: SLAPD_FILTER_DN_ONE;
2001-12-27 07:37:59 +08:00
fand.f_dn = &e->e_nname;
fand.f_next = xf.f_or == filter ? filter : &xf ;
candidates = filter_candidates( be, &f );
2000-05-28 03:21:28 +08:00
1998-08-09 08:43:13 +08:00
return( candidates );
}