/* * Copyright (c) 2003 by International Business Machines, Inc. * * International Business Machines, Inc. (hereinafter called IBM) grants * permission under its copyrights to use, copy, modify, and distribute this * Software with or without fee, provided that the above copyright notice and * all paragraphs of this notice appear in all copies, and that the name of IBM * not be used in connection with the marketing of any product incorporating * the Software or modifications thereof, without specific, written prior * permission. * * THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES, * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A * PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL, * DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN * IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES. * * * This software is based on the backends back-ldap and back-meta, implemented * by Howard Chu , Mark Valence * , Pierangelo Masarati and other * contributors. * * The original copyright statements follow. * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved. * COPYING RESTRICTIONS APPLY, see COPYRIGHT file * * Copyright 2001, Pierangelo Masarati, All rights reserved. * * This work has been developed to fulfill the requirements * of SysNet s.n.c. and it has been donated * to the OpenLDAP Foundation in the hope that it may be useful * to the Open Source community, but WITHOUT ANY WARRANTY. * * Permission is granted to anyone to use this software for any purpose * on any computer system, and to alter it and redistribute it, subject * to the following restrictions: * * 1. The author and SysNet s.n.c. are not responsible for the consequences * of use of this software, no matter how awful, even if they arise from * flaws in it. * * 2. The origin of this software must not be misrepresented, either by * explicit claim or by omission. Since few users ever read sources, * credits should appear in the documentation. * * 3. Altered versions must be plainly marked as such, and must not be * misrepresented as being the original software. Since few users * ever read sources, credits should appear in the documentation. * SysNet s.n.c. cannot be responsible for the consequences of the * alterations. * * 4. This notice may not be removed or altered. * * * This software is based on the backend back-ldap, implemented * by Howard Chu , and modified by Mark Valence * , Pierangelo Masarati and other * contributors. The contribution of the original software to the present * implementation is acknowledged in this copyright statement. * * A special acknowledgement goes to Howard for the overall architecture * (and for borrowing large pieces of code), and to Mark, who implemented * from scratch the attribute/objectclass mapping. * * The original copyright statement follows. * * Copyright 1999, Howard Chu, All rights reserved. * * Permission is granted to anyone to use this software for any purpose * on any computer system, and to alter it and redistribute it, subject * to the following restrictions: * * 1. The author is not responsible for the consequences of use of this * software, no matter how awful, even if they arise from flaws in it. * * 2. The origin of this software must not be misrepresented, either by * explicit claim or by omission. Since few users ever read sources, * credits should appear in the documentation. * * 3. Altered versions must be plainly marked as such, and must not be * misrepresented as being the original software. Since few users * ever read sources, credits should appear in the * documentation. * * 4. This notice may not be removed or altered. * */ #include "portable.h" #include #include #include #include #include "ldap_pvt.h" #include "lutil.h" #include "slap.h" #include "../back-ldap/back-ldap.h" #include "back-meta.h" #undef ldap_debug /* silence a warning in ldap-int.h */ #include "ldap_log.h" #include "../../../libraries/libldap/ldap-int.h" #ifdef LDAP_CACHING static Entry* meta_create_entry( Backend *be, struct metaconn *lc, int target, LDAPMessage *e, struct exception* result ); static int is_one_level_rdn( const char *rdn, int from ); static struct metaconn* metaConnect( struct metainfo* li, Connection* conn, Operation* op, int op_type, struct berval* nbase, struct exception* result ); static void add_filter_attrs( AttributeName** newattrs, AttributeName* attrs, AttributeName* filter_attrs ); static int handleLdapResult( struct metaconn* lc, Operation* op, int* msgid, Backend* be, AttributeName* attrs, int attrsonly, int candidates, int cacheable, Entry*** entry_array, int curr_limit, int slimit, struct exception* result ); static Entry* get_result_entry( Backend* be, struct metaconn* lc, struct metasingleconn* lsc, int* msgid, int i, struct timeval* tv, struct exception* result ); static void rewriteSession( struct rewrite_info* info, const char* rewriteContext, const char* string, const void* cookie, char** base, struct exception* result ); static int get_attr_set( AttributeName* attrs, query_manager* qm, int num ); static int attrscmp( AttributeName* attrs_in, AttributeName* attrs ); static char* cache_entries( Entry** entry_array, cache_manager* cm, Backend* be, Connection* conn, struct exception* result ); static int is_temp_answerable( int attr_set, struct berval* tempstr, query_manager* qm, int template_id ); static void consistency_check( Backend* be, Backend* glue_be, Connection* conn ); static int cache_back_sentry( Backend* be, Connection* conn, Operation* op, Entry* e, AttributeName* attrs, int attrsonly, LDAPControl** ctrls ); int meta_back_cache_search( Backend *be, Connection *conn, Operation *op, struct berval *base, struct berval *nbase, int scope, int deref, int slimit, int tlimit, Filter *filt, struct berval *filterstr, AttributeName *attributes, int attrsonly ) { struct metainfo *li = ( struct metainfo * )be->be_private; struct metaconn *lc; struct metasingleconn *lsc; cache_manager* cm = li->cm; query_manager* qm = cm->qm; time_t curr_time; int count, rc = 0, *msgid = NULL; char *mbase = NULL; char *cbase = NULL; char *uuid; int i = -1, last = 0, candidates = 0, op_type; struct berval mfilter; struct berval cachebase = { 0L, NULL }; struct berval ncachebase = { 0L, NULL }; struct berval cache_suffix; struct berval tempstr = { 0L, NULL }; AttributeName *filter_attrs = NULL; AttributeName *new_attrs = NULL; AttributeName *attrs = NULL; Entry *e; Entry **entry_array = NULL; Query query; int attr_set = -1; int template_id = -1; int answerable = 0; int cacheable = 0; int num_entries = 0; int curr_limit; int fattr_cnt=0; struct exception result[1]; Filter* filter = str2filter(filterstr->bv_val); slap_callback cb = {NULL, NULL, cache_back_sentry, NULL}; cb.sc_private = be; if (attributes) { for ( count=0; attributes[ count ].an_name.bv_val; count++ ) ; attrs = (AttributeName*)malloc( ( count + 1 ) * sizeof(AttributeName)); for ( count=0; attributes[ count ].an_name.bv_val; count++ ) { ber_dupbv(&attrs[ count ].an_name, &attributes[ count ].an_name); attrs[count].an_desc = attributes[count].an_desc; } attrs[ count ].an_name.bv_val = NULL; attrs[ count ].an_name.bv_len = 0; } result->type = SUCCESS; result->rc = 0; ldap_pvt_thread_mutex_lock(&cm->cache_mutex); cm->threads++; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Threads++ = %d\n", cm->threads, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Threads++ = %d\n", cm->threads, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_unlock(&cm->cache_mutex); filter2template(filter, &tempstr, &filter_attrs, &fattr_cnt, result); if (result->type != SUCCESS) goto Catch; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "query template of incoming query = %s\n", tempstr.bv_val, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "query template of incoming query = %s\n", tempstr.bv_val, 0, 0 ); #endif /* !NEW_LOGGING */ curr_limit = cm->num_entries_limit ; /* find attr set */ attr_set = get_attr_set(attrs, qm, cm->numattrsets); query.filter = filter; query.attrs = attrs; query.base = *base; query.scope = scope; /* check for query containment */ if (attr_set > -1) { for (i=0; inumtemplates; i++) { /* find if template i can potentially answer tempstr */ if (!is_temp_answerable(attr_set, &tempstr, qm, i)) continue; if (attr_set == qm->templates[i].attr_set_index) { cacheable = 1; template_id = i; } #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL2, "Entering QC, querystr = %s\n", filterstr->bv_val, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_NONE, "Entering QC, querystr = %s\n", filterstr->bv_val, 0, 0 ); #endif /* !NEW_LOGGING */ answerable = (*(qm->qcfunc))(qm, &query, i); if (answerable) break; } } if (answerable) { #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "QUERY ANSWERABLE\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "QUERY ANSWERABLE\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ rewriteSession(li->rwinfo, "cacheBase", base->bv_val, conn, &cbase, result); if (result->type != SUCCESS) { ldap_pvt_thread_rdwr_runlock(&qm->templates[i].t_rwlock); goto Catch; } if ( cbase == NULL ) { cachebase = *base; } else { cachebase.bv_val = cbase; cachebase.bv_len = strlen(cbase); } dnNormalize(NULL, &cachebase, &ncachebase); op->o_caching_on = 1; op->o_callback = &cb; li->glue_be->be_search(li->glue_be, conn, op, &cachebase, &ncachebase, scope, deref, slimit, tlimit, filter, filterstr, attrs, attrsonly); ber_memfree( ncachebase.bv_val ); if ( cachebase.bv_val != base->bv_val ) { /* free only if rewritten */ free( cachebase.bv_val ); } ldap_pvt_thread_rdwr_runlock(&qm->templates[i].t_rwlock); } else { #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "QUERY NOT ANSWERABLE\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "QUERY NOT ANSWERABLE\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ if ( scope == LDAP_SCOPE_BASE ) { op_type = META_OP_REQUIRE_SINGLE; } else { op_type = META_OP_ALLOW_MULTIPLE; } lc = metaConnect(li, conn, op, op_type, nbase, result); if (result->type != SUCCESS) goto Catch; ldap_pvt_thread_mutex_lock(&cm->cache_mutex); if (cm->num_cached_queries >= cm->max_queries) { cacheable = 0; } ldap_pvt_thread_mutex_unlock(&cm->cache_mutex); if (cacheable) { #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "QUERY TEMPLATE CACHEABLE\n", 0, 0, 0); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "QUERY TEMPLATE CACHEABLE\n", 0, 0, 0); #endif /* !NEW_LOGGING */ add_filter_attrs(&new_attrs, attrs, filter_attrs); } else { new_attrs = attrs; } free(filter_attrs); /* * Array of message id of each target */ msgid = ch_calloc( sizeof( int ), li->ntargets ); if ( msgid == NULL ) { result->type = CONN_ERR; goto Catch; } /* if (slimit > 0 && (slimit <= cm->num_entries_limit)) slimit = cm->num_entries_limit; */ /* * Inits searches */ for ( i = 0, lsc = lc->conns; !META_LAST(lsc); ++i, ++lsc ) { char *realbase = ( char * )base->bv_val; int realscope = scope; ber_len_t suffixlen; char *mapped_filter, **mapped_attrs; /* FIXME: Check for more than one targets */ if ( meta_back_is_candidate( &li->targets[i]->suffix, nbase )) lsc->candidate = META_CANDIDATE; if ( lsc->candidate != META_CANDIDATE ) continue; if ( deref != -1 ) { ldap_set_option( lsc->ld, LDAP_OPT_DEREF, ( void * )&deref); } if ( tlimit != -1 ) { ldap_set_option( lsc->ld, LDAP_OPT_TIMELIMIT, ( void * )&tlimit); } if ( slimit != -1 ) { ldap_set_option( lsc->ld, LDAP_OPT_SIZELIMIT, ( void * )&slimit); } /* * modifies the base according to the scope, if required */ suffixlen = li->targets[ i ]->suffix.bv_len; if ( suffixlen > nbase->bv_len ) { switch ( scope ) { case LDAP_SCOPE_SUBTREE: /* * make the target suffix the new base * FIXME: this is very forgiving, * because illegal bases may be turned * into the suffix of the target. */ if ( dnIsSuffix( &li->targets[ i ]->suffix, nbase ) ) { realbase = li->targets[i]->suffix.bv_val; } else { /* * this target is no longer * candidate */ lsc->candidate = META_NOT_CANDIDATE; continue; } break; case LDAP_SCOPE_ONELEVEL: if ( is_one_level_rdn( li->targets[ i ]->suffix.bv_val, suffixlen - nbase->bv_len - 1 ) && dnIsSuffix( &li->targets[ i ]->suffix, nbase ) ) { /* * if there is exactly one * level, make the target suffix * the new base, and make scope * "base" */ realbase = li->targets[i]->suffix.bv_val; realscope = LDAP_SCOPE_BASE; break; } /* else continue with the next case */ case LDAP_SCOPE_BASE: /* * this target is no longer candidate */ lsc->candidate = META_NOT_CANDIDATE; continue; } } /* * Rewrite the search base, if required */ rewriteSession(li->targets[i]->rwinfo, "searchBase", realbase, conn, &mbase, result); if (result->type != SUCCESS) goto Catch; if ( mbase == NULL ) { mbase = realbase; } /* * Rewrite the search filter, if required */ rewriteSession( li->targets[i]->rwinfo, "searchFilter", filterstr->bv_val, conn, &mfilter.bv_val, result); if (result->type != SUCCESS) goto Catch; if ( mfilter.bv_val != NULL && mfilter.bv_val[ 0 ] != '\0') { mfilter.bv_len = strlen( mfilter.bv_val ); } else { if ( mfilter.bv_val != NULL ) { free( mfilter.bv_val ); } mfilter = *filterstr; } /* * Maps attributes in filter */ mapped_filter = ldap_back_map_filter( &li->targets[i]->at_map, &li->targets[i]->oc_map, &mfilter, 0 ); if ( mapped_filter == NULL ) { mapped_filter = ( char * )mfilter.bv_val; } else { if ( mfilter.bv_val != filterstr->bv_val ) { free( mfilter.bv_val ); } } mfilter.bv_val = NULL; mfilter.bv_len = 0; /* * Maps required attributes */ mapped_attrs = ldap_back_map_attrs( &li->targets[ i ]->at_map, new_attrs, 0 ); if ( mapped_attrs == NULL && new_attrs) { for ( count=0; new_attrs[ count ].an_name.bv_val; count++) ; mapped_attrs = ch_malloc( ( count + 1 ) * sizeof(char *)); for ( count=0; new_attrs[ count ].an_name.bv_val; count++ ) { mapped_attrs[ count ] = new_attrs[count].an_name.bv_val; } mapped_attrs[ count ] = NULL; } /* * Starts the search */ msgid[ i ] = ldap_search( lsc->ld, mbase, realscope, mapped_filter, mapped_attrs, attrsonly ); if ( msgid[ i ] == -1 ) { lsc->candidate = META_NOT_CANDIDATE; continue; } if ( mapped_attrs ) { free( mapped_attrs ); mapped_attrs = NULL; } if ( mapped_filter != filterstr->bv_val ) { free( mapped_filter ); mapped_filter = NULL; } if ( mbase != realbase ) { free( mbase ); mbase = NULL; } ++candidates; } num_entries = handleLdapResult(lc, op, msgid, be, attrs, attrsonly, candidates, cacheable, &entry_array, curr_limit, slimit, result); if (result->type != SUCCESS) goto Catch; if (cacheable && (num_entries <= curr_limit)) { #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "QUERY CACHEABLE\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "QUERY CACHEABLE\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ uuid = cache_entries(entry_array, cm, li->glue_be, conn, result); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Added query %s UUID %s ENTRIES %d\n", filterstr->bv_val, uuid, num_entries ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Added query %s UUID %s ENTRIES %d\n", filterstr->bv_val, uuid, num_entries ); #endif /* !NEW_LOGGING */ if (result->type != SUCCESS) goto Catch; (*(qm->addfunc))(qm, &query, template_id, uuid, result); if (result->type != SUCCESS) goto Catch; filter = 0; attrs = 0; } } Catch:; switch (result->type) { case SUCCESS: rc=0; break; case FILTER_ERR: #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Invalid template error\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Invalid template error\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ break; case CONN_ERR: rc = -1; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Could not connect to a remote server\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Could not connect to a remote server\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ send_ldap_result(conn, op, LDAP_OTHER, NULL, "Connection error", NULL, NULL ); break; case RESULT_ERR: rc = -1; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Error in handling ldap_result\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Error in handling ldap_result\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ break; case REWRITING_ERR: rc = -1; if (result->rc == REWRITE_REGEXEC_UNWILLING) { send_ldap_result( conn, op, LDAP_UNWILLING_TO_PERFORM, NULL, "Unwilling to perform", NULL, NULL ); } else { send_ldap_result( conn, op, LDAP_OTHER, NULL, "Rewrite error", NULL, NULL ); } break; case MERGE_ERR: rc = -1; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Error in merging entry \n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Error in merging entry \n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ break; case REMOVE_ERR: rc = -1; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Error in removing query \n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Error in removing query \n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ break; default: /* assert(0); */ break; } ldap_pvt_thread_mutex_lock(&cm->consistency_mutex); curr_time = slap_get_time(); if (curr_time - cm->consistency_time > cm->consistency_cycle_time) { cm->consistency_time = curr_time; consistency_check(be, li->glue_be, conn); } ldap_pvt_thread_mutex_unlock(&cm->consistency_mutex); if ( msgid ) { ch_free( msgid ); } if (entry_array) { for (i=0; (e = entry_array[i]); i++) { entry_free(e); } free(entry_array); } if (filter) filter_free(filter); if (new_attrs) { if (new_attrs != attrs) free(new_attrs); } if (attrs) free(attrs); if (tempstr.bv_val ) { free(tempstr.bv_val); } ldap_pvt_thread_mutex_lock(&cm->cache_mutex); cm->threads--; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Threads-- = %d\n", cm->threads, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Threads-- = %d\n", cm->threads, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_unlock(&cm->cache_mutex); return rc; } static Entry* meta_create_entry ( Backend *be, struct metaconn *lc, int target, LDAPMessage *e, struct exception* result ) { struct metainfo *li = ( struct metainfo * )be->be_private; struct berval a, mapped; Entry* ent; BerElement ber = *e->lm_ber; Attribute *attr, **attrp; struct berval dummy = { 0, NULL }; struct berval *bv, bdn; const char *text; char* ename = NULL; if ( ber_scanf( &ber, "{m{", &bdn ) == LBER_ERROR ) { result->type = CREATE_ENTRY_ERR; return NULL; } ent = (Entry*)malloc(sizeof(Entry)); /* * Rewrite the dn of the result, if needed */ rewriteSession( li->targets[ target ]->rwinfo, "searchResult", bdn.bv_val, lc->conn, &ent->e_name.bv_val, result ); if (result->type != SUCCESS) { return NULL; } if ( ent->e_name.bv_val == NULL ) { ber_dupbv(&(ent->e_name), &bdn); } else { #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "[rw] searchResult[%d]: \"%s\" -> \"%s\"\n", target, bdn.bv_val, ent->e_name.bv_val ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ARGS, "rw> searchResult[%d]: \"%s\"" " -> \"%s\"\n", target, bdn.bv_val, ent->e_name.bv_val ); #endif /* !NEW_LOGGING */ ent->e_name.bv_len = strlen( ent->e_name.bv_val ); } /* * Note: this may fail if the target host(s) schema differs * from the one known to the meta, and a DN with unknown * attributes is returned. * * FIXME: should we log anything, or delegate to dnNormalize? */ dnNormalize( 0, NULL, NULL, &ent->e_name, &ent->e_nname ); /* if ( dnNormalize( 0, NULL, NULL, &ent->e_name, &ent->e_nname ) != LDAP_SUCCESS ) { return LDAP_INVALID_DN_SYNTAX; } */ /* * cache dn */ if ( li->cache.ttl != META_DNCACHE_DISABLED ) { meta_dncache_update_entry( &li->cache, &ent->e_nname, target ); } ent->e_id = 0; ent->e_attrs = 0; ent->e_private = 0; ent->e_bv.bv_val = 0; attrp = &ent->e_attrs; while ( ber_scanf( &ber, "{m", &a ) != LBER_ERROR ) { ldap_back_map( &li->targets[ target ]->at_map, &a, &mapped, 1 ); if ( mapped.bv_val == NULL ) { continue; } attr = ( Attribute * )ch_malloc( sizeof( Attribute ) ); if ( attr == NULL ) { continue; } attr->a_flags = 0; attr->a_next = 0; attr->a_desc = NULL; if ( slap_bv2ad( &mapped, &attr->a_desc, &text ) != LDAP_SUCCESS) { if ( slap_bv2undef_ad( &mapped, &attr->a_desc, &text ) != LDAP_SUCCESS) { #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "slap_bv2undef_ad(%s): %s\n", mapped.bv_val, text, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "slap_bv2undef_ad(%s): " "%s\n%s", mapped.bv_val, text, "" ); #endif /* !NEW_LOGGING */ ch_free( attr ); continue; } } /* no subschemaSubentry */ if ( attr->a_desc == slap_schema.si_ad_subschemaSubentry ) { ch_free(attr); continue; } if ( ber_scanf( &ber, "[W]", &attr->a_vals ) == LBER_ERROR || attr->a_vals == NULL ) { attr->a_vals = &dummy; } else if ( attr->a_desc == slap_schema.si_ad_objectClass || attr->a_desc == slap_schema.si_ad_structuralObjectClass) { int i, last; for ( last = 0; attr->a_vals[ last ].bv_val; ++last ) ; for ( i = 0, bv = attr->a_vals; bv->bv_val; bv++,i++ ) { ldap_back_map( &li->targets[ target]->oc_map, bv, &mapped, 1 ); if ( mapped.bv_val == NULL ) { free( bv->bv_val ); bv->bv_val = NULL; if ( --last < 0 ) { break; } *bv = attr->a_vals[ last ]; attr->a_vals[ last ].bv_val = NULL; i--; } else if ( mapped.bv_val != bv->bv_val ) { free( bv->bv_val ); ber_dupbv( bv, &mapped ); } } /* * It is necessary to try to rewrite attributes with * dn syntax because they might be used in ACLs as * members of groups; since ACLs are applied to the * rewritten stuff, no dn-based subecj clause could * be used at the ldap backend side (see * http://www.OpenLDAP.org/faq/data/cache/452.html) * The problem can be overcome by moving the dn-based * ACLs to the target directory server, and letting * everything pass thru the ldap backend. */ } else if ( strcmp( attr->a_desc->ad_type->sat_syntax->ssyn_oid, SLAPD_DN_SYNTAX ) == 0 ) { int i; for ( i = 0, bv = attr->a_vals; bv->bv_val; bv++,i++ ) { char *newval; rewriteSession(li->targets[ target ]->rwinfo, "searchResult", bv->bv_val, lc->conn, &newval, result); if (result->type != SUCCESS) { /* FIXME : Handle error */ result->type = SUCCESS; } else { /* left as is */ if ( newval == NULL ) { break; } #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "[rw] searchResult on " "attr=%s: \"%s\" -> \"%s\"\n", attr->a_desc->ad_type-> sat_cname.bv_val, bv->bv_val, newval ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ARGS, "rw> searchResult on attr=%s:" " \"%s\" -> \"%s\"\n", attr->a_desc->ad_type-> sat_cname.bv_val, bv->bv_val, newval ); #endif /* !NEW_LOGGING */ free( bv->bv_val ); bv->bv_val = newval; bv->bv_len = strlen( newval ); } } } *attrp = attr; attrp = &attr->a_next; } return ent; } static int is_one_level_rdn( const char *rdn, int from ) { for ( ; from--; ) { if ( DN_SEPARATOR( rdn[ from ] ) ) { return 0; } } return 1; } static struct metaconn* metaConnect( struct metainfo* li, Connection* conn, Operation* op, int op_type, struct berval* nbase, struct exception* result) { struct metaconn* lc; result->type = SUCCESS; lc = meta_back_getconn( conn, op, op_type, nbase, NULL ); if (!lc) { result->type = CONN_ERR; return 0; } return lc; } static void add_filter_attrs( AttributeName** new_attrs, AttributeName* attrs, AttributeName* filter_attrs ) { struct berval all_user = { sizeof(LDAP_ALL_USER_ATTRIBUTES) -1, LDAP_ALL_USER_ATTRIBUTES }; struct berval all_op = { sizeof(LDAP_ALL_OPERATIONAL_ATTRIBUTES) -1, LDAP_ALL_OPERATIONAL_ATTRIBUTES}; int alluser = 0; int allop = 0; int i; int count; /* duplicate attrs */ for (count=0; attrs[count].an_name.bv_val; count++) ; *new_attrs = (AttributeName*)(malloc((count+1)*sizeof(AttributeName))); for (i=0; iad_type) && allop ) continue; else if (alluser) continue; *new_attrs = (AttributeName*)(realloc(*new_attrs, (count+2)*sizeof(AttributeName))); (*new_attrs)[count].an_name.bv_val = filter_attrs[i].an_name.bv_val; (*new_attrs)[count].an_name.bv_len = filter_attrs[i].an_name.bv_len; (*new_attrs)[count].an_desc = filter_attrs[i].an_desc; (*new_attrs)[count+1].an_name.bv_val = NULL; (*new_attrs)[count+1].an_name.bv_len = 0; count++; } } static int handleLdapResult( struct metaconn* lc, Operation* op, int* msgid, Backend* be, AttributeName* attrs, int attrsonly, int candidates, int cacheable, Entry*** entry_array, int curr_limit, int slimit, struct exception* result) { Entry *entry; char *match = NULL, *err = NULL, *cache_ename = NULL; int sres; int mres = LDAP_SUCCESS; int num_entries = 0, count, i, rc; struct timeval tv = {0, 0}; struct metasingleconn* lsc; struct metainfo *li = ( struct metainfo * )be->be_private; result->rc = 0; result->type = SUCCESS; for ( count = 0, rc = 0; candidates > 0; ) { int ab, gotit = 0; /* check for abandon */ ab = op->o_abandon; for ( i = 0, lsc = lc->conns; !META_LAST(lsc); lsc++, i++ ) { if ( lsc->candidate != META_CANDIDATE ) { continue; } if ( ab ) { ldap_abandon( lsc->ld, msgid[ i ] ); result->type = ABANDON_ERR; break; } if ( slimit > 0 && num_entries == slimit ) { result->type = SLIMIT_ERR; break; } if ((entry = get_result_entry(be, lc, lsc, msgid, i, &tv, result))) { send_search_entry( be, lc->conn, op, entry, attrs, attrsonly, NULL ); if ((cacheable) && (num_entries < curr_limit)) { rewriteSession( li->rwinfo, "cacheResult", entry->e_name.bv_val, lc->conn, &cache_ename, result ); free(entry->e_name.bv_val); if (result->type != SUCCESS) { return 0; } ber_str2bv(cache_ename, strlen(cache_ename), 0, &entry->e_name); ber_dupbv(&entry->e_nname, &entry->e_name); *entry_array = (Entry**)realloc( *entry_array, (( num_entries+2 ) * sizeof( Entry* ))); (*entry_array)[num_entries] = entry; (*entry_array)[num_entries+1] = NULL; } num_entries++; gotit = 1; } else if (result->type == REWRITING_ERR) { return 0; } else if (result->type == TIMEOUT_ERR) { result->type = SUCCESS; continue; } else if (result->type == CREATE_ENTRY_ERR) { break; } else if (result->rc == -1) { break; } else { sres = ldap_back_map_result(result->rc); if (mres == LDAP_SUCCESS && sres != LDAP_SUCCESS) { mres = sres; ldap_get_option(lsc->ld, LDAP_OPT_ERROR_STRING, &err); ldap_get_option(lsc->ld, LDAP_OPT_MATCHED_DN, &match); } lsc->candidate = META_NOT_CANDIDATE; candidates--; result->type = SUCCESS; } } switch (result->type) { case RESULT_ERR: #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "ldap_result error, rc = -1\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "ldap_result error, rc = -1\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ send_search_result( lc->conn, op, LDAP_OTHER, NULL, NULL, NULL, NULL, num_entries ); return 0; case CREATE_ENTRY_ERR: #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Error in parsing result \n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Error in parsing result \n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ send_search_result( lc->conn, op, LDAP_OTHER, NULL, NULL, NULL, NULL, num_entries ); result->type = RESULT_ERR; return 0; case SLIMIT_ERR: #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Size limit exceeded \n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Size limit exceeded \n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ send_search_result( lc->conn, op, LDAP_SIZELIMIT_EXCEEDED, NULL, NULL, NULL, NULL, num_entries ); result->type = RESULT_ERR; return 0; case ABANDON_ERR: #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "search operation abandoned \n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "search operation abandoned \n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ result->type = RESULT_ERR; return 0; default: /* assert( 0 ); */ break; } if ( gotit == 0 ) { tv.tv_sec = 0; tv.tv_usec = 100000; ldap_pvt_thread_yield(); } else { tv.tv_sec = 0; tv.tv_usec = 0; } } send_search_result( lc->conn, op, mres, match, err, NULL, NULL, num_entries ); if (err) free(err); if (match) free(match); result->type = (mres == LDAP_SUCCESS) ? SUCCESS : RESULT_ERR; return num_entries; } static Entry* get_result_entry( Backend* be, struct metaconn* lc, struct metasingleconn* lsc, int* msgid, int i, struct timeval* tv, struct exception* result) { Entry* entry; LDAPMessage *res, *e; int rc; int sres = LDAP_SUCCESS; rc = ldap_result( lsc->ld, msgid[ i ], 0, tv, &res ); if ( rc == 0 ) { result->type = TIMEOUT_ERR; return NULL; } else if ( rc == -1 ) { result->rc = -1; result->type = RESULT_ERR; return NULL; } else if ( rc == LDAP_RES_SEARCH_ENTRY ) { e = ldap_first_entry( lsc->ld, res ); entry = meta_create_entry(be, lc, i, e, result); if (!entry) { return NULL; } ldap_msgfree( res ); result->type = SUCCESS; return entry; } else { sres = ldap_result2error( lsc->ld, res, 1 ); result->rc = sres; result->type = RESULT_ERR; return NULL; } } static void rewriteSession( struct rewrite_info* info, const char* rewriteContext, const char* string, const void* cookie, char** base, struct exception* result) { int rc = rewrite_session(info, rewriteContext, string, cookie, base); if (rc != REWRITE_REGEXEC_OK) { result->rc = rc; result->type = REWRITING_ERR; if (strcmp(rewriteContext, "searchBase") == 0) #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Problem in rewriting search base\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Problem in rewriting search base\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ if (strcmp(rewriteContext, "searchFilter") == 0) #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Problem in rewriting search filter\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Problem in rewriting search filter\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ if (strcmp(rewriteContext, "searchResult") == 0) #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Problem in rewriting DN, or DN syntax " "attributes of search result\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Problem in rewriting DN, or DN syntax " "attributes of search result\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ if (strcmp(rewriteContext, "cacheBase") == 0) #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Problem in rewriting search base with " "cache base\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Problem in rewriting search base with " "cache base\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ if (strcmp(rewriteContext, "cacheResult") == 0) #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Problem in rewriting DN for cached entries\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Problem in rewriting DN for cached entries\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ if (strcmp(rewriteContext, "cacheReturn") == 0) #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Problem in rewriting DN for answerable " "entries\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Problem in rewriting DN for answerable " "entries\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ } else { result->type = SUCCESS; } } static int get_attr_set( AttributeName* attrs, query_manager* qm, int num ) { int i; for (i=0; iattr_sets[i].attrs)) return i; } return -1; } static int attrscmp( AttributeName* attrs_in, AttributeName* attrs) { int i, count1, count2; if ((attrs_in==NULL) || (attrs==NULL)) return 1; for ( count1=0; attrs_in && attrs_in[count1].an_name.bv_val != NULL; count1++ ) ; for ( count2=0; attrs && attrs[count2].an_name.bv_val != NULL; count2++) ; if ( count1 != count2 ) return 0; for ( i=0; iqm; result->type = SUCCESS; query_uuid.bv_len = lutil_uuidstr(uuidbuf, sizeof(uuidbuf)); query_uuid.bv_val = ch_strdup(uuidbuf); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "UUID for query being added = %s\n", uuidbuf, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "UUID for query being added = %s\n", uuidbuf, 0, 0 ); #endif /* !NEW_LOGGING */ for ( i=0; ( entry_array && (e=entry_array[i]) ); i++ ) { #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL2, "LOCKING REMOVE MUTEX\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_NONE, "LOCKING REMOVE MUTEX\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_lock(&cm->remove_mutex); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL2, "LOCKED REMOVE MUTEX\n", 0, 0, 0); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_NONE, "LOCKED REMOVE MUTEX\n", 0, 0, 0); #endif /* !NEW_LOGGING */ if ( cm->cache_size > (cm->thresh_hi) ) { while(cm->cache_size > (cm->thresh_lo)) { crpid = cache_replacement(qm); if (crpid == NULL) { result->type = REMOVE_ERR; } else { strcpy(crpuuid, crpid); crp_uuid.bv_val = crpuuid; crp_uuid.bv_len = strlen(crpuuid); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Removing query UUID %s\n", crpuuid, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Removing query UUID %s\n", crpuuid, 0, 0 ); #endif /* !NEW_LOGGING */ return_val = remove_query_data(be, conn, &crp_uuid, result); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "QUERY REMOVED, SIZE=%d\n", return_val, 0, 0); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "QUERY REMOVED, SIZE=%d\n", return_val, 0, 0); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_lock( &cm->cache_mutex ); cm->total_entries -= result->rc; cm->num_cached_queries--; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "STORED QUERIES = %lu\n", cm->num_cached_queries, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "STORED QUERIES = %lu\n", cm->num_cached_queries, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_unlock( &cm->cache_mutex ); cm->cache_size = (return_val > cm->cache_size) ? 0 : (cm->cache_size-return_val); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "QUERY REMOVED, CACHE SIZE=" "%lu bytes %d entries\n", cm->cache_size, cm->total_entries, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "QUERY REMOVED, CACHE SIZE=" "%lu bytes %d entries\n", cm->cache_size, cm->total_entries, 0 ); #endif /* !NEW_LOGGING */ } } } return_val = merge_entry(be, conn, e, &query_uuid, result); cm->cache_size += return_val; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "ENTRY ADDED/MERGED, CACHE SIZE=%lu bytes\n", cm->cache_size, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "ENTRY ADDED/MERGED, CACHE SIZE=%lu bytes\n", cm->cache_size, 0, 0 ); #endif /* !NEW_LOGGING */ #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL2, "UNLOCKING REMOVE MUTEX\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_NONE, "UNLOCKING REMOVE MUTEX\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_unlock(&cm->remove_mutex); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL2, "UNLOCKED REMOVE MUTEX\n", 0, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_NONE, "UNLOCKED REMOVE MUTEX\n", 0, 0, 0 ); #endif /* !NEW_LOGGING */ if (result->type != SUCCESS) return 0; ldap_pvt_thread_mutex_lock(&cm->cache_mutex); cm->total_entries += result->rc; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "ENTRY ADDED/MERGED, SIZE=%d, CACHED ENTRIES=%d\n", return_val, cm->total_entries, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "ENTRY ADDED/MERGED, SIZE=%d, CACHED ENTRIES=%d\n", return_val, cm->total_entries, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_unlock(&cm->cache_mutex); } ldap_pvt_thread_mutex_lock(&cm->cache_mutex); cm->num_cached_queries++; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "STORED QUERIES = %lu\n", cm->num_cached_queries, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "STORED QUERIES = %lu\n", cm->num_cached_queries, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_unlock(&cm->cache_mutex); return query_uuid.bv_val; } static int is_temp_answerable( int attr_set, struct berval* tempstr, query_manager* qm, int template_id ) { int i; int* id_array; char* str; int result = 0; i = qm->templates[template_id].attr_set_index; str = qm->templates[template_id].querystr; if (attr_set == i) { result = 1; } else { id_array = qm->attr_sets[attr_set].ID_array; while (*id_array != -1) { if (*id_array == i) result = 1; id_array++; } } if (!result) return 0; if (strcasecmp(str, tempstr->bv_val) == 0) return 1; return 0; } static void consistency_check(Backend* be, Backend* glue_be, Connection* conn) { struct metainfo *li = ( struct metainfo * )be->be_private; cache_manager* cm = li->cm; query_manager* qm = cm->qm; CachedQuery* query, *query_prev; time_t curr_time; struct berval uuid; struct exception result; int i, return_val; QueryTemplate* templ; for (i=0; qm->templates[i].querystr; i++) { templ = qm->templates + i; query = templ->query_last; curr_time = slap_get_time(); ldap_pvt_thread_mutex_lock(&cm->remove_mutex); while (query && (query->expiry_time < curr_time)) { ldap_pvt_thread_mutex_lock(&qm->lru_mutex); remove_query(qm, query); ldap_pvt_thread_mutex_unlock(&qm->lru_mutex); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Lock CR index = %d\n", i, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Lock CR index = %d\n", i, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_rdwr_wlock(&templ->t_rwlock); remove_from_template(query, templ); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "TEMPLATE %d QUERIES-- %d\n", i, templ->no_of_queries, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "TEMPLATE %d QUERIES-- %d\n", i, templ->no_of_queries, 0 ); #endif /* !NEW_LOGGING */ #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "Unlock CR index = %d\n", i, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "Unlock CR index = %d\n", i, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_rdwr_wunlock(&templ->t_rwlock); uuid.bv_val = query->q_uuid; uuid.bv_len = strlen(query->q_uuid); return_val = remove_query_data(glue_be, conn, &uuid, &result); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "STALE QUERY REMOVED, SIZE=%d\n", return_val, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "STALE QUERY REMOVED, SIZE=%d\n", return_val, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_lock(&cm->cache_mutex); cm->total_entries -= result.rc; cm->num_cached_queries--; #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "STORED QUERIES = %lu\n", cm->num_cached_queries, 0, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "STORED QUERIES = %lu\n", cm->num_cached_queries, 0, 0 ); #endif /* !NEW_LOGGING */ ldap_pvt_thread_mutex_unlock(&cm->cache_mutex); cm->cache_size = (return_val > cm->cache_size) ? 0: (cm->cache_size-return_val); #ifdef NEW_LOGGING LDAP_LOG( BACK_META, DETAIL1, "STALE QUERY REMOVED, CACHE SIZE=%lu bytes %d " "entries\n", cm->cache_size, cm->total_entries, 0 ); #else /* !NEW_LOGGING */ Debug( LDAP_DEBUG_ANY, "STALE QUERY REMOVED, CACHE SIZE=%lu bytes %d " "entries\n", cm->cache_size, cm->total_entries, 0 ); #endif /* !NEW_LOGGING */ query_prev = query; query = query->prev; free_query(query_prev); } ldap_pvt_thread_mutex_unlock(&cm->remove_mutex); } } static int cache_back_sentry( Backend* glue_be, Connection* conn, Operation* op, Entry* e, AttributeName* attrs, int attrsonly, LDAPControl** ctrls ) { slap_callback* cb = op->o_callback; Backend* be = (Backend*)(cb->sc_private); struct metainfo *li = ( struct metainfo * )be->be_private; char* ename = NULL; struct exception result; struct berval dn; struct berval ndn; dn = e->e_name; ndn = e->e_nname; rewriteSession( li->rwinfo, "cacheReturn", e->e_name.bv_val, conn, &ename, &result ); ber_str2bv(ename, strlen(ename), 0, &e->e_name); ber_dupbv(&e->e_nname, &e->e_name); op->o_callback = NULL; send_search_entry(be, conn, op, e, attrs, attrsonly, ctrls); e->e_name = dn; e->e_nname = ndn; op->o_callback = cb; return 0; } #endif