]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/aclparse.c
Partial sync with HEAD:
[openldap] / servers / slapd / aclparse.c
index 2b9042665eb7e7bbe21d30ab0e4ccb633be62fb8..64abc4c3945d7e11874e627176e01b9e76d3acc9 100644 (file)
@@ -1,8 +1,27 @@
 /* aclparse.c - routines to parse and check acl's */
 /* $OpenLDAP$ */
-/*
- * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
- * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
+/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
+ *
+ * Copyright 1998-2006 The OpenLDAP Foundation.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted only as authorized by the OpenLDAP
+ * Public License.
+ *
+ * A copy of this license is available in the file LICENSE in the
+ * top-level directory of the distribution or, alternatively, at
+ * <http://www.OpenLDAP.org/license.html>.
+ */
+/* Portions Copyright (c) 1995 Regents of the University of Michigan.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms are permitted
+ * provided that this notice is preserved and that due credit is given
+ * to the University of Michigan at Ann Arbor. The name of the University
+ * may not be used to endorse or promote products derived from this
+ * software without specific prior written permission. This software
+ * is provided ``as is'' without express or implied warranty.
  */
 
 #include "portable.h"
 #include <ac/unistd.h>
 
 #include "slap.h"
+#include "lber_pvt.h"
+#include "lutil.h"
+
+static const char style_base[] = "base";
+char *style_strings[] = {
+       "regex",
+       "expand",
+       "exact",
+       "one",
+       "subtree",
+       "children",
+       "level",
+       "attrof",
+       "anonymous",
+       "users",
+       "self",
+       "ip",
+       "path",
+       NULL
+};
 
 static void            split(char *line, int splitchar, char **left, char **right);
 static void            access_append(Access **l, Access *a);
-static void            acl_usage(void) LDAP_GCCATTR((noreturn));
+static int             acl_usage(void);
 
-static char            *acl_regex_normalized_dn(const char *pattern);
+static void            acl_regex_normalized_dn(const char *src, struct berval *pat);
 
 #ifdef LDAP_DEBUG
 static void            print_acl(Backend *be, AccessControl *a);
-static void            print_access(Access *b);
 #endif
 
+static int             check_scope( BackendDB *be, AccessControl *a );
+
+#ifdef SLAP_DYNACL
 static int
+slap_dynacl_config(
+       const char *fname,
+       int lineno,
+       Access *b,
+       const char *name,
+       const char *opts,
+       slap_style_t sty,
+       const char *right )
+{
+       slap_dynacl_t   *da, *tmp;
+       int             rc = 0;
+
+       for ( da = b->a_dynacl; da; da = da->da_next ) {
+               if ( strcasecmp( da->da_name, name ) == 0 ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "%s: line %d: dynacl \"%s\" already specified.\n",
+                               fname, lineno, name );
+                       return acl_usage();
+               }
+       }
+
+       da = slap_dynacl_get( name );
+       if ( da == NULL ) {
+               return -1;
+       }
+
+       tmp = ch_malloc( sizeof( slap_dynacl_t ) );
+       *tmp = *da;
+
+       if ( tmp->da_parse ) {
+               rc = ( *tmp->da_parse )( fname, lineno, opts, sty, right, &tmp->da_private );
+               if ( rc ) {
+                       ch_free( tmp );
+                       return rc;
+               }
+       }
+
+       tmp->da_next = b->a_dynacl;
+       b->a_dynacl = tmp;
+
+       return 0;
+}
+#endif /* SLAP_DYNACL */
+
+static void
 regtest(const char *fname, int lineno, char *pat) {
        int e;
        regex_t re;
 
-       char buf[512];
-       unsigned size;
+       char            buf[ SLAP_TEXT_BUFLEN ];
+       unsigned        size;
 
        char *sp;
        char *dp;
@@ -64,37 +150,183 @@ regtest(const char *fname, int lineno, char *pat) {
        }
 
        *dp = '\0';
-       if ( size >= (sizeof(buf)-1) ) {
-               fprintf( stderr,
+       if ( size >= (sizeof(buf) - 1) ) {
+               Debug( LDAP_DEBUG_ANY,
                        "%s: line %d: regular expression \"%s\" too large\n",
                        fname, lineno, pat );
-               acl_usage();
+               (void)acl_usage();
+               exit( EXIT_FAILURE );
        }
 
        if ((e = regcomp(&re, buf, REG_EXTENDED|REG_ICASE))) {
-               char error[512];
+               char error[ SLAP_TEXT_BUFLEN ];
+
                regerror(e, &re, error, sizeof(error));
-               fprintf( stderr,
-                       "%s: line %d: regular expression \"%s\" bad because of %s\n",
-                       fname, lineno, pat, error );
+
+               snprintf( buf, sizeof( buf ),
+                       "regular expression \"%s\" bad because of %s",
+                       pat, error );
+               Debug( LDAP_DEBUG_ANY,
+                       "%s: line %d: %s\n",
+                       fname, lineno, buf );
                acl_usage();
-               return(0);
+               exit( EXIT_FAILURE );
        }
        regfree(&re);
-       return(1);
 }
 
-void
+/*
+ * Experimental
+ *
+ * Check if the pattern of an ACL, if any, matches the scope
+ * of the backend it is defined within.
+ */
+#define        ACL_SCOPE_UNKNOWN       (-2)
+#define        ACL_SCOPE_ERR           (-1)
+#define        ACL_SCOPE_OK            (0)
+#define        ACL_SCOPE_PARTIAL       (1)
+#define        ACL_SCOPE_WARN          (2)
+
+static int
+check_scope( BackendDB *be, AccessControl *a )
+{
+       ber_len_t       patlen;
+       struct berval   dn;
+
+       dn = be->be_nsuffix[0];
+
+       if ( BER_BVISEMPTY( &dn ) ) {
+               return ACL_SCOPE_OK;
+       }
+
+       if ( !BER_BVISEMPTY( &a->acl_dn_pat ) ||
+                       a->acl_dn_style != ACL_STYLE_REGEX )
+       {
+               slap_style_t    style = a->acl_dn_style;
+
+               if ( style == ACL_STYLE_REGEX ) {
+                       char            dnbuf[SLAP_LDAPDN_MAXLEN + 2];
+                       char            rebuf[SLAP_LDAPDN_MAXLEN + 1];
+                       ber_len_t       rebuflen;
+                       regex_t         re;
+                       int             rc;
+                       
+                       /* add trailing '$' to database suffix to form
+                        * a simple trial regex pattern "<suffix>$" */
+                       AC_MEMCPY( dnbuf, be->be_nsuffix[0].bv_val,
+                               be->be_nsuffix[0].bv_len );
+                       dnbuf[be->be_nsuffix[0].bv_len] = '$';
+                       dnbuf[be->be_nsuffix[0].bv_len + 1] = '\0';
+
+                       if ( regcomp( &re, dnbuf, REG_EXTENDED|REG_ICASE ) ) {
+                               return ACL_SCOPE_WARN;
+                       }
+
+                       /* remove trailing ')$', if any, from original
+                        * regex pattern */
+                       rebuflen = a->acl_dn_pat.bv_len;
+                       AC_MEMCPY( rebuf, a->acl_dn_pat.bv_val, rebuflen + 1 );
+                       if ( rebuf[rebuflen - 1] == '$' ) {
+                               rebuf[--rebuflen] = '\0';
+                       }
+                       while ( rebuflen > be->be_nsuffix[0].bv_len && rebuf[rebuflen - 1] == ')' ) {
+                               rebuf[--rebuflen] = '\0';
+                       }
+                       if ( rebuflen == be->be_nsuffix[0].bv_len ) {
+                               rc = ACL_SCOPE_WARN;
+                               goto regex_done;
+                       }
+
+                       /* not a clear indication of scoping error, though */
+                       rc = regexec( &re, rebuf, 0, NULL, 0 )
+                               ? ACL_SCOPE_WARN : ACL_SCOPE_OK;
+
+regex_done:;
+                       regfree( &re );
+                       return rc;
+               }
+
+               patlen = a->acl_dn_pat.bv_len;
+               /* If backend suffix is longer than pattern,
+                * it is a potential mismatch (in the sense
+                * that a superior naming context could
+                * match */
+               if ( dn.bv_len > patlen ) {
+                       /* base is blatantly wrong */
+                       if ( style == ACL_STYLE_BASE ) return ACL_SCOPE_ERR;
+
+                       /* a style of one can be wrong if there is
+                        * more than one level between the suffix
+                        * and the pattern */
+                       if ( style == ACL_STYLE_ONE ) {
+                               ber_len_t       rdnlen = 0;
+                               int             sep = 0;
+
+                               if ( patlen > 0 ) {
+                                       if ( !DN_SEPARATOR( dn.bv_val[dn.bv_len - patlen - 1] )) {
+                                               return ACL_SCOPE_ERR;
+                                       }
+                                       sep = 1;
+                               }
+
+                               rdnlen = dn_rdnlen( NULL, &dn );
+                               if ( rdnlen != dn.bv_len - patlen - sep )
+                                       return ACL_SCOPE_ERR;
+                       }
+
+                       /* if the trailing part doesn't match,
+                        * then it's an error */
+                       if ( strcmp( a->acl_dn_pat.bv_val,
+                               &dn.bv_val[dn.bv_len - patlen] ) != 0 )
+                       {
+                               return ACL_SCOPE_ERR;
+                       }
+
+                       return ACL_SCOPE_PARTIAL;
+               }
+
+               switch ( style ) {
+               case ACL_STYLE_BASE:
+               case ACL_STYLE_ONE:
+               case ACL_STYLE_CHILDREN:
+               case ACL_STYLE_SUBTREE:
+                       break;
+
+               default:
+                       assert( 0 );
+                       break;
+               }
+
+               if ( dn.bv_len < patlen &&
+                       !DN_SEPARATOR( a->acl_dn_pat.bv_val[patlen - dn.bv_len - 1] ))
+               {
+                       return ACL_SCOPE_ERR;
+               }
+
+               if ( strcmp( &a->acl_dn_pat.bv_val[patlen - dn.bv_len], dn.bv_val )
+                       != 0 )
+               {
+                       return ACL_SCOPE_ERR;
+               }
+
+               return ACL_SCOPE_OK;
+       }
+
+       return ACL_SCOPE_UNKNOWN;
+}
+
+int
 parse_acl(
-    Backend    *be,
-    const char *fname,
-    int                lineno,
-    int                argc,
-    char       **argv
-)
+       Backend *be,
+       const char      *fname,
+       int             lineno,
+       int             argc,
+       char            **argv,
+       int             pos )
 {
        int             i;
        char            *left, *right, *style;
+       struct berval   bv;
        AccessControl   *a;
        Access  *b;
        int rc;
@@ -105,17 +337,12 @@ parse_acl(
                /* to clause - select which entries are protected */
                if ( strcasecmp( argv[i], "to" ) == 0 ) {
                        if ( a != NULL ) {
-                               fprintf( stderr,
-               "%s: line %d: only one to clause allowed in access line\n",
-                                   fname, lineno );
-                               acl_usage();
+                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                       "only one to clause allowed in access line\n",
+                                   fname, lineno, 0 );
+                               return acl_usage();
                        }
                        a = (AccessControl *) ch_calloc( 1, sizeof(AccessControl) );
-                       a->acl_filter = NULL;
-                       a->acl_dn_pat = NULL;
-                       a->acl_attrs  = NULL;
-                       a->acl_access = NULL;
-                       a->acl_next   = NULL;
                        for ( ++i; i < argc; i++ ) {
                                if ( strcasecmp( argv[i], "by" ) == 0 ) {
                                        i--;
@@ -123,15 +350,17 @@ parse_acl(
                                }
 
                                if ( strcasecmp( argv[i], "*" ) == 0 ) {
-                                       if( a->acl_dn_pat != NULL ) {
-                                               fprintf( stderr,
+                                       if ( !BER_BVISEMPTY( &a->acl_dn_pat ) ||
+                                               a->acl_dn_style != ACL_STYLE_REGEX )
+                                       {
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: dn pattern"
                                                        " already specified in to clause.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
-                                       a->acl_dn_pat = ch_strdup( "*" );
+                                       ber_str2bv( "*", STRLENOF( "*" ), 1, &a->acl_dn_pat );
                                        continue;
                                }
 
@@ -139,108 +368,354 @@ parse_acl(
                                split( left, '.', &left, &style );
 
                                if ( right == NULL ) {
-                                       fprintf( stderr,
-       "%s: line %d: missing \"=\" in \"%s\" in to clause\n",
+                                       Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                               "missing \"=\" in \"%s\" in to clause\n",
                                            fname, lineno, left );
-                                       acl_usage();
+                                       return acl_usage();
                                }
 
                                if ( strcasecmp( left, "dn" ) == 0 ) {
-                                       if( a->acl_dn_pat != NULL ) {
-                                               fprintf( stderr,
+                                       if ( !BER_BVISEMPTY( &a->acl_dn_pat ) ||
+                                               a->acl_dn_style != ACL_STYLE_REGEX )
+                                       {
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: dn pattern"
                                                        " already specified in to clause.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
-                                       if ( style == NULL || *style == '\0'
-                                               || strcasecmp( style, "regex" ) == 0 )
+                                       if ( style == NULL || *style == '\0' ||
+                                               strcasecmp( style, "baseObject" ) == 0 ||
+                                               strcasecmp( style, "base" ) == 0 ||
+                                               strcasecmp( style, "exact" ) == 0 )
+                                       {
+                                               a->acl_dn_style = ACL_STYLE_BASE;
+                                               ber_str2bv( right, 0, 1, &a->acl_dn_pat );
+
+                                       } else if ( strcasecmp( style, "oneLevel" ) == 0 ||
+                                               strcasecmp( style, "one" ) == 0 )
+                                       {
+                                               a->acl_dn_style = ACL_STYLE_ONE;
+                                               ber_str2bv( right, 0, 1, &a->acl_dn_pat );
+
+                                       } else if ( strcasecmp( style, "subtree" ) == 0 ||
+                                               strcasecmp( style, "sub" ) == 0 )
                                        {
+                                               if( *right == '\0' ) {
+                                                       ber_str2bv( "*", STRLENOF( "*" ), 1, &a->acl_dn_pat );
+
+                                               } else {
+                                                       a->acl_dn_style = ACL_STYLE_SUBTREE;
+                                                       ber_str2bv( right, 0, 1, &a->acl_dn_pat );
+                                               }
+
+                                       } else if ( strcasecmp( style, "children" ) == 0 ) {
+                                               a->acl_dn_style = ACL_STYLE_CHILDREN;
+                                               ber_str2bv( right, 0, 1, &a->acl_dn_pat );
+
+                                       } else if ( strcasecmp( style, "regex" ) == 0 ) {
                                                a->acl_dn_style = ACL_STYLE_REGEX;
-                                               if ( strcmp(right, "*") == 0 
+
+                                               if ( *right == '\0' ) {
+                                                       /* empty regex should match empty DN */
+                                                       a->acl_dn_style = ACL_STYLE_BASE;
+                                                       ber_str2bv( right, 0, 1, &a->acl_dn_pat );
+
+                                               } else if ( strcmp(right, "*") == 0 
                                                        || strcmp(right, ".*") == 0 
                                                        || strcmp(right, ".*$") == 0 
                                                        || strcmp(right, "^.*") == 0 
-                                                       || strcmp(right, "^.*$$") == 0
+                                                       || strcmp(right, "^.*$") == 0
                                                        || strcmp(right, ".*$$") == 0 
                                                        || strcmp(right, "^.*$$") == 0 )
                                                {
-                                                       a->acl_dn_pat = ch_strdup( "*" );
+                                                       ber_str2bv( "*", STRLENOF("*"), 1, &a->acl_dn_pat );
 
                                                } else {
-                                                       a->acl_dn_pat = acl_regex_normalized_dn( right );
+                                                       acl_regex_normalized_dn( right, &a->acl_dn_pat );
                                                }
-                                       } else if ( strcasecmp( style, "base" ) == 0 ) {
-                                               a->acl_dn_style = ACL_STYLE_BASE;
-                                               a->acl_dn_pat = ch_strdup( right );
-
-                                       } else if ( strcasecmp( style, "one" ) == 0 ) {
-                                               a->acl_dn_style = ACL_STYLE_ONE;
-                                               a->acl_dn_pat = ch_strdup( right );
-
-                                       } else if ( strcasecmp( style, "subtree" ) == 0 ) {
-                                               a->acl_dn_style = ACL_STYLE_SUBTREE;
-                                               a->acl_dn_pat = ch_strdup( right );
-
-                                       } else if ( strcasecmp( style, "children" ) == 0 ) {
-                                               a->acl_dn_style = ACL_STYLE_CHILDREN;
-                                               a->acl_dn_pat = ch_strdup( right );
 
                                        } else {
-                                               fprintf( stderr,
-       "%s: line %d: unknown dn style \"%s\" in to clause\n",
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "unknown dn style \"%s\" in to clause\n",
                                                    fname, lineno, style );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
 
                                        continue;
                                }
 
                                if ( strcasecmp( left, "filter" ) == 0 ) {
-                                       if ( (a->acl_filter = str2filter(
-                                           right )) == NULL ) {
-                                               fprintf( stderr,
+                                       if ( (a->acl_filter = str2filter( right )) == NULL ) {
+                                               Debug( LDAP_DEBUG_ANY,
                                "%s: line %d: bad filter \"%s\" in to clause\n",
                                                    fname, lineno, right );
-                                               acl_usage();
+                                               return acl_usage();
+                                       }
+
+                               } else if ( strcasecmp( left, "attr" ) == 0             /* TOLERATED */
+                                               || strcasecmp( left, "attrs" ) == 0 )   /* DOCUMENTED */
+                               {
+                                       if ( strcasecmp( left, "attr" ) == 0 ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: \"attr\" "
+                                                       "is deprecated (and undocumented); "
+                                                       "use \"attrs\" instead.\n",
+                                                       fname, lineno, 0 );
+                                       }
+
+                                       a->acl_attrs = str2anlist( a->acl_attrs,
+                                               right, "," );
+                                       if ( a->acl_attrs == NULL ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                               "%s: line %d: unknown attr \"%s\" in to clause\n",
+                                                   fname, lineno, right );
+                                               return acl_usage();
+                                       }
+
+                               } else if ( strncasecmp( left, "val", 3 ) == 0 ) {
+                                       struct berval   bv;
+                                       char            *mr;
+                                       
+                                       if ( !BER_BVISEMPTY( &a->acl_attrval ) ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                               "%s: line %d: attr val already specified in to clause.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
+                                       }
+                                       if ( a->acl_attrs == NULL || !BER_BVISEMPTY( &a->acl_attrs[1].an_name ) )
+                                       {
+                                               Debug( LDAP_DEBUG_ANY,
+                               "%s: line %d: attr val requires a single attribute.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
+                                       }
+
+                                       ber_str2bv( right, 0, 0, &bv );
+                                       a->acl_attrval_style = ACL_STYLE_BASE;
+
+                                       mr = strchr( left, '/' );
+                                       if ( mr != NULL ) {
+                                               mr[ 0 ] = '\0';
+                                               mr++;
+
+                                               a->acl_attrval_mr = mr_find( mr );
+                                               if ( a->acl_attrval_mr == NULL ) {
+                                                       Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                               "invalid matching rule \"%s\".\n",
+                                                               fname, lineno, mr );
+                                                       return acl_usage();
+                                               }
+
+                                               if( !mr_usable_with_at( a->acl_attrval_mr, a->acl_attrs[ 0 ].an_desc->ad_type ) )
+                                               {
+                                                       char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                                       snprintf( buf, sizeof( buf ),
+                                                               "matching rule \"%s\" use "
+                                                               "with attr \"%s\" not appropriate.",
+                                                               mr, a->acl_attrs[ 0 ].an_name.bv_val );
+                                                               
+
+                                                       Debug( LDAP_DEBUG_ANY, "%s: line %d: %s\n",
+                                                               fname, lineno, buf );
+                                                       return acl_usage();
+                                               }
                                        }
+                                       
+                                       if ( style != NULL ) {
+                                               if ( strcasecmp( style, "regex" ) == 0 ) {
+                                                       int e = regcomp( &a->acl_attrval_re, bv.bv_val,
+                                                               REG_EXTENDED | REG_ICASE | REG_NOSUB );
+                                                       if ( e ) {
+                                                               char    err[SLAP_TEXT_BUFLEN],
+                                                                       buf[ SLAP_TEXT_BUFLEN ];
+
+                                                               regerror( e, &a->acl_attrval_re, err, sizeof( err ) );
+
+                                                               snprintf( buf, sizeof( buf ),
+                                                                       "regular expression \"%s\" bad because of %s",
+                                                                       right, err );
+
+                                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: %s\n",
+                                                                       fname, lineno, buf );
+                                                               return acl_usage();
+                                                       }
+                                                       a->acl_attrval_style = ACL_STYLE_REGEX;
 
-                               } else if ( strncasecmp( left, "attr", 4 ) == 0 ) {
-                                       char    **alist;
+                                               } else {
+                                                       /* FIXME: if the attribute has DN syntax, we might
+                                                        * allow one, subtree and children styles as well */
+                                                       if ( !strcasecmp( style, "base" ) ||
+                                                               !strcasecmp( style, "exact" ) ) {
+                                                               a->acl_attrval_style = ACL_STYLE_BASE;
+
+                                                       } else if ( a->acl_attrs[0].an_desc->ad_type->
+                                                               sat_syntax == slap_schema.si_syn_distinguishedName )
+                                                       {
+                                                               if ( !strcasecmp( style, "baseObject" ) ||
+                                                                       !strcasecmp( style, "base" ) )
+                                                               {
+                                                                       a->acl_attrval_style = ACL_STYLE_BASE;
+                                                               } else if ( !strcasecmp( style, "onelevel" ) ||
+                                                                       !strcasecmp( style, "one" ) )
+                                                               {
+                                                                       a->acl_attrval_style = ACL_STYLE_ONE;
+                                                               } else if ( !strcasecmp( style, "subtree" ) ||
+                                                                       !strcasecmp( style, "sub" ) )
+                                                               {
+                                                                       a->acl_attrval_style = ACL_STYLE_SUBTREE;
+                                                               } else if ( !strcasecmp( style, "children" ) ) {
+                                                                       a->acl_attrval_style = ACL_STYLE_CHILDREN;
+                                                               } else {
+                                                                       char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                                                       /* FIXME: should be an error */
+
+                                                                       snprintf( buf, sizeof( buf ),
+                                                                               "unknown val.<style> \"%s\" "
+                                                                               "for attributeType \"%s\" with DN syntax"
+#ifndef SLAPD_CONF_UNKNOWN_BAILOUT
+                                                                               "; using \"base\""
+#endif /* ! SLAPD_CONF_UNKNOWN_BAILOUT */
+                                                                               SLAPD_CONF_UNKNOWN_IGNORED ".",
+                                                                               style,
+                                                                               a->acl_attrs[0].an_desc->ad_cname.bv_val );
+
+                                                                       Debug( LDAP_DEBUG_CONFIG | LDAP_DEBUG_ACL, 
+                                                                               "%s: line %d: %s\n",
+                                                                               fname, lineno, buf );
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+                                                                       return acl_usage();
+#endif /* SLAPD_CONF_UNKNOWN_BAILOUT */
+                                                                       a->acl_attrval_style = ACL_STYLE_BASE;
+                                                               }
+
+                                                               rc = dnNormalize( 0, NULL, NULL, &bv, &a->acl_attrval, NULL );
+                                                               if ( rc != LDAP_SUCCESS ) {
+                                                                       char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                                                       snprintf( buf, sizeof( buf ),
+                                                                               "unable to normalize DN \"%s\" "
+                                                                               "for attributeType \"%s\" (%d).",
+                                                                               bv.bv_val,
+                                                                               a->acl_attrs[0].an_desc->ad_cname.bv_val,
+                                                                               rc );
+                                                                       Debug( LDAP_DEBUG_ANY, 
+                                                                               "%s: line %d: %s\n",
+                                                                               fname, lineno, buf );
+                                                                       return acl_usage();
+                                                               }
+
+                                                       } else {
+                                                               char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                                               /* FIXME: should be an error */
+
+                                                               snprintf( buf, sizeof( buf ),
+                                                                       "unknown val.<style> \"%s\" "
+                                                                       "for attributeType \"%s\""
+#ifndef SLAPD_CONF_UNKNOWN_BAILOUT
+                                                                       "; using \"exact\""
+#endif /* ! SLAPD_CONF_UNKNOWN_BAILOUT */
+                                                                       SLAPD_CONF_UNKNOWN_IGNORED ".",
+                                                                       style, a->acl_attrs[0].an_desc->ad_cname.bv_val );
+                                                               Debug( LDAP_DEBUG_CONFIG | LDAP_DEBUG_ACL, 
+                                                                       "%s: line %d: %s\n",
+                                                                       fname, lineno, buf );
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+                                                               return acl_usage();
+#endif /* SLAPD_CONF_UNKNOWN_BAILOUT */
+                                                               a->acl_attrval_style = ACL_STYLE_BASE;
+                                                       }
+                                               }
+                                       }
 
-                                       alist = str2charray( right, "," );
-                                       charray_merge( &a->acl_attrs, alist );
-                                       charray_free( alist );
+                                       /* Check for appropriate matching rule */
+                                       if ( a->acl_attrval_style == ACL_STYLE_REGEX ) {
+                                               ber_dupbv( &a->acl_attrval, &bv );
+
+                                       } else if ( BER_BVISNULL( &a->acl_attrval ) ) {
+                                               int             rc;
+                                               const char      *text;
+
+                                               if ( a->acl_attrval_mr == NULL ) {
+                                                       a->acl_attrval_mr = a->acl_attrs[ 0 ].an_desc->ad_type->sat_equality;
+                                               }
+
+                                               if ( a->acl_attrval_mr == NULL ) {
+                                                       Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                               "attr \"%s\" does not have an EQUALITY matching rule.\n",
+                                                               fname, lineno, a->acl_attrs[ 0 ].an_name.bv_val );
+                                                       return acl_usage();
+                                               }
+
+                                               rc = asserted_value_validate_normalize(
+                                                       a->acl_attrs[ 0 ].an_desc,
+                                                       a->acl_attrval_mr,
+                                                       SLAP_MR_EQUALITY|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX,
+                                                       &bv,
+                                                       &a->acl_attrval,
+                                                       &text,
+                                                       NULL );
+                                               if ( rc != LDAP_SUCCESS ) {
+                                                       char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                                       snprintf( buf, sizeof( buf ), "%s: line %d: "
+                                                               " attr \"%s\" normalization failed (%d: %s)",
+                                                               a->acl_attrs[ 0 ].an_name.bv_val, rc, text );
+                                                       Debug( LDAP_DEBUG_ANY, "%s: line %d: %s.\n",
+                                                               fname, lineno, buf );
+                                                       return acl_usage();
+                                               }
+                                       }
 
                                } else {
-                                       fprintf( stderr,
+                                       Debug( LDAP_DEBUG_ANY,
                                                "%s: line %d: expecting <what> got \"%s\"\n",
                                            fname, lineno, left );
-                                       acl_usage();
+                                       return acl_usage();
                                }
                        }
 
-                       if ( a->acl_dn_pat != NULL && strcmp(a->acl_dn_pat, "*") == 0) {
-                               free( a->acl_dn_pat );
-                               a->acl_dn_pat = NULL;
+                       if ( !BER_BVISNULL( &a->acl_dn_pat ) && 
+                                       ber_bvccmp( &a->acl_dn_pat, '*' ) )
+                       {
+                               free( a->acl_dn_pat.bv_val );
+                               BER_BVZERO( &a->acl_dn_pat );
+                               a->acl_dn_style = ACL_STYLE_REGEX;
                        }
                        
-                       if( a->acl_dn_pat != NULL ) {
-                               if ( a->acl_dn_style != ACL_STYLE_REGEX )
-                               {
-                                       dn_normalize(a->acl_dn_pat);
+                       if ( !BER_BVISEMPTY( &a->acl_dn_pat ) ||
+                                       a->acl_dn_style != ACL_STYLE_REGEX ) 
+                       {
+                               if ( a->acl_dn_style != ACL_STYLE_REGEX ) {
+                                       struct berval bv;
+                                       rc = dnNormalize( 0, NULL, NULL, &a->acl_dn_pat, &bv, NULL);
+                                       if ( rc != LDAP_SUCCESS ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: bad DN \"%s\" in to DN clause\n",
+                                                       fname, lineno, a->acl_dn_pat.bv_val );
+                                               return acl_usage();
+                                       }
+                                       free( a->acl_dn_pat.bv_val );
+                                       a->acl_dn_pat = bv;
 
                                } else {
-                                       int e = regcomp( &a->acl_dn_re, a->acl_dn_pat,
-                                                        REG_EXTENDED | REG_ICASE );
+                                       int e = regcomp( &a->acl_dn_re, a->acl_dn_pat.bv_val,
+                                               REG_EXTENDED | REG_ICASE );
                                        if ( e ) {
-                                               char buf[512];
-                                               regerror( e, &a->acl_dn_re, buf, sizeof(buf) );
-                                               fprintf( stderr,
-                                       "%s: line %d: regular expression \"%s\" bad because of %s\n",
-                                                        fname, lineno, right, buf );
-                                               acl_usage();
+                                               char    err[ SLAP_TEXT_BUFLEN ],
+                                                       buf[ SLAP_TEXT_BUFLEN ];
+
+                                               regerror( e, &a->acl_dn_re, err, sizeof( err ) );
+                                               snprintf( buf, sizeof( buf ),
+                                                       "regular expression \"%s\" bad because of %s",
+                                                       right, err );
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: %s\n",
+                                                       fname, lineno, buf );
+                                               return acl_usage();
                                        }
                                }
                        }
@@ -248,10 +723,10 @@ parse_acl(
                /* by clause - select who has what access to entries */
                } else if ( strcasecmp( argv[i], "by" ) == 0 ) {
                        if ( a == NULL ) {
-                               fprintf( stderr,
-                                       "%s: line %d: to clause required before by clause in access line\n",
-                                   fname, lineno );
-                               acl_usage();
+                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                       "to clause required before by clause in access line\n",
+                                       fname, lineno, 0 );
+                               return acl_usage();
                        }
 
                        /*
@@ -263,67 +738,200 @@ parse_acl(
                        ACL_INVALIDATE( b->a_access_mask );
 
                        if ( ++i == argc ) {
-                               fprintf( stderr,
-                           "%s: line %d: premature eol: expecting <who>\n",
-                                   fname, lineno );
-                               acl_usage();
+                               Debug( LDAP_DEBUG_ANY,
+                                       "%s: line %d: premature EOL: expecting <who>\n",
+                                       fname, lineno, 0 );
+                               return acl_usage();
                        }
 
                        /* get <who> */
                        for ( ; i < argc; i++ ) {
-                               char *pat;
-                               slap_style_t sty = ACL_STYLE_REGEX;
+                               slap_style_t    sty = ACL_STYLE_REGEX;
+                               char            *style_modifier = NULL;
+                               char            *style_level = NULL;
+                               int             level = 0;
+                               int             expand = 0;
+                               slap_dn_access  *bdn = &b->a_dn;
+                               int             is_realdn = 0;
 
                                split( argv[i], '=', &left, &right );
                                split( left, '.', &left, &style );
-                               if ( style == NULL || *style == '\0'
-                                       || strcasecmp( style, "regex" ) == 0 )
+                               if ( style ) {
+                                       split( style, ',', &style, &style_modifier );
+
+                                       if ( strncasecmp( style, "level", STRLENOF( "level" ) ) == 0 ) {
+                                               split( style, '{', &style, &style_level );
+                                               if ( style_level != NULL ) {
+                                                       char *p = strchr( style_level, '}' );
+                                                       if ( p == NULL ) {
+                                                               Debug( LDAP_DEBUG_ANY,
+                                                                       "%s: line %d: premature eol: "
+                                                                       "expecting closing '}' in \"level{n}\"\n",
+                                                                       fname, lineno, 0 );
+                                                               return acl_usage();
+                                                       } else if ( p == style_level ) {
+                                                               Debug( LDAP_DEBUG_ANY,
+                                                                       "%s: line %d: empty level "
+                                                                       "in \"level{n}\"\n",
+                                                                       fname, lineno, 0 );
+                                                               return acl_usage();
+                                                       }
+                                                       p[0] = '\0';
+                                               }
+                                       }
+                               }
+
+                               if ( style == NULL || *style == '\0' ||
+                                       strcasecmp( style, "exact" ) == 0 ||
+                                       strcasecmp( style, "baseObject" ) == 0 ||
+                                       strcasecmp( style, "base" ) == 0 )
                                {
-                                       sty = ACL_STYLE_REGEX;
-                               } else if ( strcasecmp( style, "exact" ) == 0 ) {
-                                       sty = ACL_STYLE_EXACT;
-                               } else if ( strcasecmp( style, "base" ) == 0 ) {
                                        sty = ACL_STYLE_BASE;
-                               } else if ( strcasecmp( style, "one" ) == 0 ) {
+
+                               } else if ( strcasecmp( style, "onelevel" ) == 0 ||
+                                       strcasecmp( style, "one" ) == 0 )
+                               {
                                        sty = ACL_STYLE_ONE;
-                               } else if ( strcasecmp( style, "subtree" ) == 0 ) {
+
+                               } else if ( strcasecmp( style, "subtree" ) == 0 ||
+                                       strcasecmp( style, "sub" ) == 0 )
+                               {
                                        sty = ACL_STYLE_SUBTREE;
+
                                } else if ( strcasecmp( style, "children" ) == 0 ) {
                                        sty = ACL_STYLE_CHILDREN;
+
+                               } else if ( strcasecmp( style, "level" ) == 0 )
+                               {
+                                       if ( lutil_atoi( &level, style_level ) != 0 ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: unable to parse level "
+                                                       "in \"level{n}\"\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
+                                       }
+
+                                       sty = ACL_STYLE_LEVEL;
+
+                               } else if ( strcasecmp( style, "regex" ) == 0 ) {
+                                       sty = ACL_STYLE_REGEX;
+
+                               } else if ( strcasecmp( style, "expand" ) == 0 ) {
+                                       sty = ACL_STYLE_EXPAND;
+
+                               } else if ( strcasecmp( style, "ip" ) == 0 ) {
+                                       sty = ACL_STYLE_IP;
+
+                               } else if ( strcasecmp( style, "path" ) == 0 ) {
+                                       sty = ACL_STYLE_PATH;
+#ifndef LDAP_PF_LOCAL
+                                       Debug( LDAP_DEBUG_CONFIG | LDAP_DEBUG_ACL,
+                                               "%s: line %d: "
+                                               "\"path\" style modifier is useless without local"
+                                               SLAPD_CONF_UNKNOWN_IGNORED ".\n",
+                                               fname, lineno, 0 );
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+                                       return acl_usage();
+#endif /* SLAPD_CONF_UNKNOWN_BAILOUT */
+#endif /* LDAP_PF_LOCAL */
+
                                } else {
-                                       fprintf( stderr,
+                                       Debug( LDAP_DEBUG_ANY,
                                                "%s: line %d: unknown style \"%s\" in by clause\n",
-                                           fname, lineno, style );
-                                       acl_usage();
+                                               fname, lineno, style );
+                                       return acl_usage();
                                }
 
-                               if ( strcasecmp( argv[i], "*" ) == 0 ) {
-                                       pat = ch_strdup( "*" );
+                               if ( style_modifier &&
+                                       strcasecmp( style_modifier, "expand" ) == 0 )
+                               {
+                                       switch ( sty ) {
+                                       case ACL_STYLE_REGEX:
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "\"regex\" style implies "
+                                                       "\"expand\" modifier" 
+                                                       SLAPD_CONF_UNKNOWN_IGNORED ".\n",
+                                                       fname, lineno, 0 );
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+                                               return acl_usage();
+#endif /* SLAPD_CONF_UNKNOWN_BAILOUT */
+                                               break;
+
+                                       case ACL_STYLE_EXPAND:
+                                               break;
+
+                                       default:
+                                               /* we'll see later if it's pertinent */
+                                               expand = 1;
+                                               break;
+                                       }
+                               }
+
+                               /* expand in <who> needs regex in <what> */
+                               if ( ( sty == ACL_STYLE_EXPAND || expand )
+                                               && a->acl_dn_style != ACL_STYLE_REGEX )
+                               {
+                                       Debug( LDAP_DEBUG_CONFIG | LDAP_DEBUG_ACL, "%s: line %d: "
+                                               "\"expand\" style or modifier used "
+                                               "in conjunction with "
+                                               "a non-regex <what> clause"
+                                               SLAPD_CONF_UNKNOWN_IGNORED ".\n",
+                                               fname, lineno, 0 );
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+                                               return acl_usage();
+#endif /* SLAPD_CONF_UNKNOWN_BAILOUT */
+                               }
+
+                               if ( strncasecmp( left, "real", STRLENOF( "real" ) ) == 0 ) {
+                                       is_realdn = 1;
+                                       bdn = &b->a_realdn;
+                                       left += STRLENOF( "real" );
+                               }
 
-                               } else if ( strcasecmp( argv[i], "anonymous" ) == 0 ) {
-                                       pat = ch_strdup( "anonymous" );
+                               if ( strcasecmp( left, "*" ) == 0 ) {
+                                       if ( is_realdn ) {
+                                               return acl_usage();
+                                       }
+
+                                       ber_str2bv( "*", STRLENOF( "*" ), 1, &bv );
+                                       sty = ACL_STYLE_REGEX;
 
-                               } else if ( strcasecmp( argv[i], "self" ) == 0 ) {
-                                       pat = ch_strdup( "self" );
+                               } else if ( strcasecmp( left, "anonymous" ) == 0 ) {
+                                       ber_str2bv("anonymous", STRLENOF( "anonymous" ), 1, &bv);
+                                       sty = ACL_STYLE_ANONYMOUS;
 
-                               } else if ( strcasecmp( argv[i], "users" ) == 0 ) {
-                                       pat = ch_strdup( "users" );
+                               } else if ( strcasecmp( left, "users" ) == 0 ) {
+                                       ber_str2bv("users", STRLENOF( "users" ), 1, &bv);
+                                       sty = ACL_STYLE_USERS;
+
+                               } else if ( strcasecmp( left, "self" ) == 0 ) {
+                                       ber_str2bv("self", STRLENOF( "self" ), 1, &bv);
+                                       sty = ACL_STYLE_SELF;
 
                                } else if ( strcasecmp( left, "dn" ) == 0 ) {
                                        if ( sty == ACL_STYLE_REGEX ) {
-                                               b->a_dn_style = ACL_STYLE_REGEX;
-                                               if( right == NULL ) {
+                                               bdn->a_style = ACL_STYLE_REGEX;
+                                               if ( right == NULL ) {
                                                        /* no '=' */
-                                                       pat = ch_strdup( "users" );
+                                                       ber_str2bv("users",
+                                                               STRLENOF( "users" ),
+                                                               1, &bv);
+                                                       bdn->a_style = ACL_STYLE_USERS;
 
                                                } else if (*right == '\0' ) {
                                                        /* dn="" */
-                                                       pat = ch_strdup( "anonymous" );
+                                                       ber_str2bv("anonymous",
+                                                               STRLENOF( "anonymous" ),
+                                                               1, &bv);
+                                                       bdn->a_style = ACL_STYLE_ANONYMOUS;
 
                                                } else if ( strcmp( right, "*" ) == 0 ) {
                                                        /* dn=* */
                                                        /* any or users?  users for now */
-                                                       pat = ch_strdup( "users" );
+                                                       ber_str2bv("users",
+                                                               STRLENOF( "users" ),
+                                                               1, &bv);
+                                                       bdn->a_style = ACL_STYLE_USERS;
 
                                                } else if ( strcmp( right, ".+" ) == 0
                                                        || strcmp( right, "^.+" ) == 0
@@ -332,7 +940,10 @@ parse_acl(
                                                        || strcmp( right, ".+$$" ) == 0
                                                        || strcmp( right, "^.+$$" ) == 0 )
                                                {
-                                                       pat = ch_strdup( "users" );
+                                                       ber_str2bv("users",
+                                                               STRLENOF( "users" ),
+                                                               1, &bv);
+                                                       bdn->a_style = ACL_STYLE_USERS;
 
                                                } else if ( strcmp( right, ".*" ) == 0
                                                        || strcmp( right, "^.*" ) == 0
@@ -341,531 +952,936 @@ parse_acl(
                                                        || strcmp( right, ".*$$" ) == 0
                                                        || strcmp( right, "^.*$$" ) == 0 )
                                                {
-                                                       pat = ch_strdup( "*" );
+                                                       ber_str2bv("*",
+                                                               STRLENOF( "*" ),
+                                                               1, &bv);
 
                                                } else {
-                                                       pat = acl_regex_normalized_dn( right );
-                                                       regtest(fname, lineno, pat);
+                                                       acl_regex_normalized_dn( right, &bv );
+                                                       if ( !ber_bvccmp( &bv, '*' ) ) {
+                                                               regtest( fname, lineno, bv.bv_val );
+                                                       }
                                                }
+
                                        } else if ( right == NULL || *right == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n",
-                                                   fname, lineno, left );
-                                               acl_usage();
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "missing \"=\" in (or value after) \"%s\" "
+                                                       "in by clause\n",
+                                                       fname, lineno, left );
+                                               return acl_usage();
 
                                        } else {
-                                               pat = ch_strdup( right );
+                                               ber_str2bv( right, 0, 1, &bv );
                                        }
 
                                } else {
-                                       pat = NULL;
+                                       BER_BVZERO( &bv );
                                }
 
-                               if( pat != NULL ) {
-                                       if( b->a_dn_pat.bv_len != 0 ) {
-                                               fprintf( stderr,
-                                                   "%s: line %d: dn pattern already specified.\n",
-                                                   fname, lineno );
-                                               acl_usage();
+                               if ( !BER_BVISNULL( &bv ) ) {
+                                       if ( !BER_BVISEMPTY( &bdn->a_pat ) ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: dn pattern already specified.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
-                                       b->a_dn_pat.bv_val = pat;
-                                       b->a_dn_pat.bv_len = strlen( pat );
-                                       b->a_dn_style = sty;
-                                       if ( sty != ACL_STYLE_REGEX )
-                                               dn_normalize(pat);
+                                       if ( sty != ACL_STYLE_REGEX &&
+                                                       sty != ACL_STYLE_ANONYMOUS &&
+                                                       sty != ACL_STYLE_USERS &&
+                                                       sty != ACL_STYLE_SELF &&
+                                                       expand == 0 )
+                                       {
+                                               rc = dnNormalize(0, NULL, NULL,
+                                                       &bv, &bdn->a_pat, NULL);
+                                               if ( rc != LDAP_SUCCESS ) {
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: bad DN \"%s\" in by DN clause\n",
+                                                               fname, lineno, bv.bv_val );
+                                                       return acl_usage();
+                                               }
+                                               free( bv.bv_val );
+                                               if ( sty == ACL_STYLE_BASE
+                                                       && be != NULL
+                                                       && !BER_BVISNULL( &be->be_rootndn )
+                                                       && dn_match( &bdn->a_pat, &be->be_rootndn ) )
+                                               {
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: rootdn is always granted "
+                                                               "unlimited privileges.\n",
+                                                               fname, lineno, 0 );
+                                               }
+
+                                       } else {
+                                               bdn->a_pat = bv;
+                                       }
+                                       bdn->a_style = sty;
+                                       if ( expand ) {
+                                               char    *exp;
+                                               int     gotit = 0;
+
+                                               for ( exp = strchr( bdn->a_pat.bv_val, '$' );
+                                                               exp && (ber_len_t)(exp - bdn->a_pat.bv_val)
+                                                                       < bdn->a_pat.bv_len;
+                                                               exp = strchr( exp, '$' ) )
+                                               {
+                                                       if ( isdigit( exp[ 1 ] ) ) {
+                                                               gotit = 1;
+                                                               break;
+                                                       }
+                                               }
+
+                                               if ( gotit == 1 ) {
+                                                       bdn->a_expand = expand;
+
+                                               } else {
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: \"expand\" used "
+                                                               "with no expansions in \"pattern\""
+                                                               SLAPD_CONF_UNKNOWN_IGNORED ".\n",
+                                                               fname, lineno, 0 );
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+                                                       return acl_usage();
+#endif /* SLAPD_CONF_UNKNOWN_BAILOUT */
+                                               } 
+                                       }
+                                       if ( sty == ACL_STYLE_SELF ) {
+                                               bdn->a_self_level = level;
+
+                                       } else {
+                                               if ( level < 0 ) {
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: bad negative level \"%d\" "
+                                                               "in by DN clause\n",
+                                                               fname, lineno, level );
+                                                       return acl_usage();
+                                               } else if ( level == 1 ) {
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: \"onelevel\" should be used "
+                                                               "instead of \"level{1}\" in by DN clause\n",
+                                                               fname, lineno, 0 );
+                                               } else if ( level == 0 && sty == ACL_STYLE_LEVEL ) {
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: \"base\" should be used "
+                                                               "instead of \"level{0}\" in by DN clause\n",
+                                                               fname, lineno, 0 );
+                                               }
+
+                                               bdn->a_level = level;
+                                       }
                                        continue;
                                }
 
                                if ( strcasecmp( left, "dnattr" ) == 0 ) {
-                                       if ( right == NULL || right[ 0 ] == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n",
+                                       if ( right == NULL || right[0] == '\0' ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "missing \"=\" in (or value after) \"%s\" "
+                                                       "in by clause\n",
                                                        fname, lineno, left );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
 
-                                       if( b->a_dn_at != NULL ) {
-                                               fprintf( stderr,
+                                       if( bdn->a_at != NULL ) {
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: dnattr already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
-                                       rc = slap_str2ad( right, &b->a_dn_at, &text );
+                                       rc = slap_str2ad( right, &bdn->a_at, &text );
 
                                        if( rc != LDAP_SUCCESS ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: dnattr \"%s\": %s\n",
-                                                       fname, lineno, right, text );
-                                               acl_usage();
+                                               char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                               snprintf( buf, sizeof( buf ),
+                                                       "dnattr \"%s\": %s",
+                                                       right, text );
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: %s\n",
+                                                       fname, lineno, buf );
+                                               return acl_usage();
                                        }
 
 
-                                       if( !is_at_syntax( b->a_dn_at->ad_type,
+                                       if( !is_at_syntax( bdn->a_at->ad_type,
                                                SLAPD_DN_SYNTAX ) &&
-                                               !is_at_syntax( b->a_dn_at->ad_type,
+                                               !is_at_syntax( bdn->a_at->ad_type,
                                                SLAPD_NAMEUID_SYNTAX ))
                                        {
-                                               fprintf( stderr,
-                                                       "%s: line %d: dnattr \"%s\": "
+                                               char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                               snprintf( buf, sizeof( buf ),
+                                                       "dnattr \"%s\": "
                                                        "inappropriate syntax: %s\n",
-                                                       fname, lineno, right,
-                                                       b->a_dn_at->ad_type->sat_syntax_oid );
-                                               acl_usage();
+                                                       right,
+                                                       bdn->a_at->ad_type->sat_syntax_oid );
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: %s\n",
+                                                       fname, lineno, buf );
+                                               return acl_usage();
                                        }
 
-                                       continue;
-                               }
+                                       if( bdn->a_at->ad_type->sat_equality == NULL ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: dnattr \"%s\": "
+                                                       "inappropriate matching (no EQUALITY)\n",
+                                                       fname, lineno, right );
+                                               return acl_usage();
+                                       }
 
-                               if (sty != ACL_STYLE_REGEX && sty != ACL_STYLE_BASE) {
-                                       fprintf( stderr,
-                                               "%s: line %d: inappropriate style \"%s\" in by clause\n",
-                                           fname, lineno, style );
-                                       acl_usage();
+                                       continue;
                                }
 
-                               if ( strncasecmp( left, "group", sizeof("group")-1 ) == 0 ) {
+                               if ( strncasecmp( left, "group", STRLENOF( "group" ) ) == 0 ) {
                                        char *name = NULL;
                                        char *value = NULL;
 
-                                       if ( right == NULL || right[ 0 ] == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n",
+                                       switch ( sty ) {
+                                       case ACL_STYLE_REGEX:
+                                               /* legacy, tolerated */
+                                               Debug( LDAP_DEBUG_CONFIG | LDAP_DEBUG_ACL,
+                                                       "%s: line %d: "
+                                                       "deprecated group style \"regex\"; "
+                                                       "use \"expand\" instead.\n",
+                                                       fname, lineno, 0 );
+                                               sty = ACL_STYLE_EXPAND;
+                                               break;
+
+                                       case ACL_STYLE_BASE:
+                                               /* legal, traditional */
+                                       case ACL_STYLE_EXPAND:
+                                               /* legal, substring expansion; supersedes regex */
+                                               break;
+
+                                       default:
+                                               /* unknown */
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                       fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( right == NULL || right[0] == '\0' ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: "
+                                                       "missing \"=\" in (or value after) \"%s\" "
+                                                       "in by clause.\n",
                                                        fname, lineno, left );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
 
-                                       if( b->a_group_pat != NULL ) {
-                                               fprintf( stderr,
+                                       if ( !BER_BVISEMPTY( &b->a_group_pat ) ) {
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: group pattern already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
-                                       /* format of string is "group/objectClassValue/groupAttrName" */
-                                       if ((value = strchr(left, '/')) != NULL) {
+                                       /* format of string is
+                                               "group/objectClassValue/groupAttrName" */
+                                       if ( ( value = strchr(left, '/') ) != NULL ) {
                                                *value++ = '\0';
-                                               if (*value
-                                                       && (name = strchr(value, '/')) != NULL)
-                                               {
+                                               if ( *value && ( name = strchr( value, '/' ) ) != NULL ) {
                                                        *name++ = '\0';
                                                }
                                        }
 
                                        b->a_group_style = sty;
-                                       if (sty == ACL_STYLE_REGEX) {
-                                               char *tmp = acl_regex_normalized_dn( right );
-                                               regtest(fname, lineno, tmp);
-                                               b->a_group_pat = tmp;
+                                       if ( sty == ACL_STYLE_EXPAND ) {
+                                               acl_regex_normalized_dn( right, &bv );
+                                               if ( !ber_bvccmp( &bv, '*' ) ) {
+                                                       regtest( fname, lineno, bv.bv_val );
+                                               }
+                                               b->a_group_pat = bv;
+
                                        } else {
-                                               b->a_group_pat = ch_strdup( right );
-                                               dn_normalize(b->a_group_pat);
+                                               ber_str2bv( right, 0, 0, &bv );
+                                               rc = dnNormalize( 0, NULL, NULL, &bv,
+                                                       &b->a_group_pat, NULL );
+                                               if ( rc != LDAP_SUCCESS ) {
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: bad DN \"%s\".\n",
+                                                               fname, lineno, right );
+                                                       return acl_usage();
+                                               }
                                        }
 
-                                       if (value && *value) {
+                                       if ( value && *value ) {
                                                b->a_group_oc = oc_find( value );
                                                *--value = '/';
 
-                                               if( b->a_group_oc == NULL ) {
-                                                       fprintf( stderr,
+                                               if ( b->a_group_oc == NULL ) {
+                                                       Debug( LDAP_DEBUG_ANY,
                                                                "%s: line %d: group objectclass "
-                                                               "\"%s\" unknown\n",
+                                                               "\"%s\" unknown.\n",
                                                                fname, lineno, value );
-                                                       acl_usage();
+                                                       return acl_usage();
                                                }
+
                                        } else {
-                                               b->a_group_oc = oc_find(SLAPD_GROUP_CLASS);
+                                               b->a_group_oc = oc_find( SLAPD_GROUP_CLASS );
 
                                                if( b->a_group_oc == NULL ) {
-                                                       fprintf( stderr,
+                                                       Debug( LDAP_DEBUG_ANY,
                                                                "%s: line %d: group default objectclass "
-                                                               "\"%s\" unknown\n",
+                                                               "\"%s\" unknown.\n",
                                                                fname, lineno, SLAPD_GROUP_CLASS );
-                                                       acl_usage();
+                                                       return acl_usage();
                                                }
                                        }
 
-                                       if( is_object_subclass( b->a_group_oc,
-                                               slap_schema.si_oc_referral ) )
+                                       if ( is_object_subclass( slap_schema.si_oc_referral,
+                                               b->a_group_oc ) )
                                        {
-                                               fprintf( stderr,
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: group objectclass \"%s\" "
-                                                       "is subclass of referral\n",
+                                                       "is subclass of referral.\n",
                                                        fname, lineno, value );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
 
-                                       if( is_object_subclass( b->a_group_oc,
-                                               slap_schema.si_oc_alias ) )
+                                       if ( is_object_subclass( slap_schema.si_oc_alias,
+                                               b->a_group_oc ) )
                                        {
-                                               fprintf( stderr,
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: group objectclass \"%s\" "
-                                                       "is subclass of alias\n",
+                                                       "is subclass of alias.\n",
                                                        fname, lineno, value );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
 
-                                       if (name && *name) {
+                                       if ( name && *name ) {
                                                rc = slap_str2ad( name, &b->a_group_at, &text );
 
                                                if( rc != LDAP_SUCCESS ) {
-                                                       fprintf( stderr,
-                                                               "%s: line %d: group \"%s\": %s\n",
-                                                               fname, lineno, right, text );
-                                                       acl_usage();
+                                                       char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                                       snprintf( buf, sizeof( buf ),
+                                                               "group \"%s\": %s.",
+                                                               right, text );
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: %s\n",
+                                                               fname, lineno, buf );
+                                                       return acl_usage();
                                                }
                                                *--name = '/';
+
                                        } else {
                                                rc = slap_str2ad( SLAPD_GROUP_ATTR, &b->a_group_at, &text );
 
-                                               if( rc != LDAP_SUCCESS ) {
-                                                       fprintf( stderr,
-                                                               "%s: line %d: group \"%s\": %s\n",
-                                                               fname, lineno, SLAPD_GROUP_ATTR, text );
-                                                       acl_usage();
+                                               if ( rc != LDAP_SUCCESS ) {
+                                                       char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                                       snprintf( buf, sizeof( buf ),
+                                                               "group \"%s\": %s.",
+                                                               SLAPD_GROUP_ATTR, text );
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: %s\n",
+                                                               fname, lineno, buf );
+                                                       return acl_usage();
                                                }
                                        }
 
-                                       if( !is_at_syntax( b->a_group_at->ad_type,
+                                       if ( !is_at_syntax( b->a_group_at->ad_type,
                                                SLAPD_DN_SYNTAX ) &&
-                                           !is_at_syntax( b->a_group_at->ad_type,
-                                               SLAPD_NAMEUID_SYNTAX ) )
+                                               !is_at_syntax( b->a_group_at->ad_type,
+                                               SLAPD_NAMEUID_SYNTAX ) &&
+                                               !is_at_subtype( b->a_group_at->ad_type, slap_schema.si_ad_labeledURI->ad_type ) )
                                        {
-                                               fprintf( stderr,
-                                                       "%s: line %d: group \"%s\": inappropriate syntax: %s\n",
-                                                       fname, lineno, right,
+                                               char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                               snprintf( buf, sizeof( buf ),
+                                                       "group \"%s\": inappropriate syntax: %s.",
+                                                       right,
                                                        b->a_group_at->ad_type->sat_syntax_oid );
-                                               acl_usage();
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: %s\n",
+                                                       fname, lineno, buf );
+                                               return acl_usage();
                                        }
 
 
                                        {
                                                int rc;
-                                               struct berval val;
-                                               struct berval *vals[2];
-
-                                               val.bv_val = b->a_group_oc->soc_oid;
-                                               val.bv_len = strlen(val.bv_val);
-                                               vals[0] = &val;
-                                               vals[1] = NULL;
+                                               struct berval vals[2];
 
+                                               ber_str2bv( b->a_group_oc->soc_oid, 0, 0, &vals[0] );
+                                               BER_BVZERO( &vals[1] );
 
-                                               rc = oc_check_allowed( b->a_group_at->ad_type, vals, NULL );
+                                               rc = oc_check_allowed( b->a_group_at->ad_type,
+                                                       vals, NULL );
 
                                                if( rc != 0 ) {
-                                                       fprintf( stderr,
-                                                               "%s: line %d: group: \"%s\" not allowed by \"%s\"\n",
-                                                               fname, lineno,
+                                                       char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                                       snprintf( buf, sizeof( buf ),
+                                                               "group: \"%s\" not allowed by \"%s\".",
                                                                b->a_group_at->ad_cname.bv_val,
                                                                b->a_group_oc->soc_oid );
-                                                       acl_usage();
+                                                       Debug( LDAP_DEBUG_ANY, "%s: line %d: %s\n",
+                                                               fname, lineno, buf );
+                                                       return acl_usage();
                                                }
                                        }
                                        continue;
                                }
 
                                if ( strcasecmp( left, "peername" ) == 0 ) {
-                                       if ( right == NULL || right[ 0 ] == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n",
+                                       switch ( sty ) {
+                                       case ACL_STYLE_REGEX:
+                                       case ACL_STYLE_BASE:
+                                               /* legal, traditional */
+                                       case ACL_STYLE_EXPAND:
+                                               /* cheap replacement to regex for simple expansion */
+                                       case ACL_STYLE_IP:
+                                       case ACL_STYLE_PATH:
+                                               /* legal, peername specific */
+                                               break;
+
+                                       default:
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                   fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( right == NULL || right[0] == '\0' ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "missing \"=\" in (or value after) \"%s\" "
+                                                       "in by clause.\n",
                                                        fname, lineno, left );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
 
-                                       if( b->a_peername_pat != NULL ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: peername pattern already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                       if ( !BER_BVISEMPTY( &b->a_peername_pat ) ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "peername pattern already specified.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        b->a_peername_style = sty;
-                                       if (sty == ACL_STYLE_REGEX) {
-                                               char *tmp = acl_regex_normalized_dn( right );
-                                               regtest(fname, lineno, tmp);
-                                               b->a_peername_pat = tmp;
+                                       if ( sty == ACL_STYLE_REGEX ) {
+                                               acl_regex_normalized_dn( right, &bv );
+                                               if ( !ber_bvccmp( &bv, '*' ) ) {
+                                                       regtest( fname, lineno, bv.bv_val );
+                                               }
+                                               b->a_peername_pat = bv;
+
                                        } else {
-                                               b->a_peername_pat = ch_strdup( right );
+                                               ber_str2bv( right, 0, 1, &b->a_peername_pat );
+
+                                               if ( sty == ACL_STYLE_IP ) {
+                                                       char            *addr = NULL,
+                                                                       *mask = NULL,
+                                                                       *port = NULL;
+
+                                                       split( right, '{', &addr, &port );
+                                                       split( addr, '%', &addr, &mask );
+
+                                                       b->a_peername_addr = inet_addr( addr );
+                                                       if ( b->a_peername_addr == (unsigned long)(-1) ) {
+                                                               /* illegal address */
+                                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                                       "illegal peername address \"%s\".\n",
+                                                                       fname, lineno, addr );
+                                                               return acl_usage();
+                                                       }
+
+                                                       b->a_peername_mask = (unsigned long)(-1);
+                                                       if ( mask != NULL ) {
+                                                               b->a_peername_mask = inet_addr( mask );
+                                                               if ( b->a_peername_mask ==
+                                                                       (unsigned long)(-1) )
+                                                               {
+                                                                       /* illegal mask */
+                                                                       Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                                               "illegal peername address mask "
+                                                                               "\"%s\".\n",
+                                                                               fname, lineno, mask );
+                                                                       return acl_usage();
+                                                               }
+                                                       } 
+
+                                                       b->a_peername_port = -1;
+                                                       if ( port ) {
+                                                               char    *end = NULL;
+
+                                                               b->a_peername_port = strtol( port, &end, 10 );
+                                                               if ( end == port || end[0] != '}' ) {
+                                                                       /* illegal port */
+                                                                       Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                                               "illegal peername port specification "
+                                                                               "\"{%s}\".\n",
+                                                                               fname, lineno, port );
+                                                                       return acl_usage();
+                                                               }
+                                                       }
+                                               }
                                        }
                                        continue;
                                }
 
                                if ( strcasecmp( left, "sockname" ) == 0 ) {
-                                       if ( right == NULL || right[ 0 ] == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n",
+                                       switch ( sty ) {
+                                       case ACL_STYLE_REGEX:
+                                       case ACL_STYLE_BASE:
+                                               /* legal, traditional */
+                                       case ACL_STYLE_EXPAND:
+                                               /* cheap replacement to regex for simple expansion */
+                                               break;
+
+                                       default:
+                                               /* unknown */
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause\n",
+                                                   fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( right == NULL || right[0] == '\0' ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "missing \"=\" in (or value after) \"%s\" "
+                                                       "in by clause\n",
                                                        fname, lineno, left );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
 
-                                       if( b->a_sockname_pat != NULL ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: sockname pattern already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                       if ( !BER_BVISNULL( &b->a_sockname_pat ) ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "sockname pattern already specified.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        b->a_sockname_style = sty;
-                                       if (sty == ACL_STYLE_REGEX) {
-                                               char *tmp = acl_regex_normalized_dn( right );
-                                               regtest(fname, lineno, tmp);
-                                               b->a_sockname_pat = tmp;
+                                       if ( sty == ACL_STYLE_REGEX ) {
+                                               acl_regex_normalized_dn( right, &bv );
+                                               if ( !ber_bvccmp( &bv, '*' ) ) {
+                                                       regtest( fname, lineno, bv.bv_val );
+                                               }
+                                               b->a_sockname_pat = bv;
+                                               
                                        } else {
-                                               b->a_sockname_pat = ch_strdup( right );
+                                               ber_str2bv( right, 0, 1, &b->a_sockname_pat );
                                        }
                                        continue;
                                }
 
                                if ( strcasecmp( left, "domain" ) == 0 ) {
-                                       if ( right == NULL || right[ 0 ] == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n",
+                                       switch ( sty ) {
+                                       case ACL_STYLE_REGEX:
+                                       case ACL_STYLE_BASE:
+                                       case ACL_STYLE_SUBTREE:
+                                               /* legal, traditional */
+                                               break;
+
+                                       case ACL_STYLE_EXPAND:
+                                               /* tolerated: means exact,expand */
+                                               if ( expand ) {
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: "
+                                                               "\"expand\" modifier "
+                                                               "with \"expand\" style.\n",
+                                                               fname, lineno, 0 );
+                                               }
+                                               sty = ACL_STYLE_BASE;
+                                               expand = 1;
+                                               break;
+
+                                       default:
+                                               /* unknown */
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                   fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( right == NULL || right[0] == '\0' ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "missing \"=\" in (or value after) \"%s\" "
+                                                       "in by clause.\n",
                                                        fname, lineno, left );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
 
-                                       if( b->a_domain_pat != NULL ) {
-                                               fprintf( stderr,
+                                       if ( !BER_BVISEMPTY( &b->a_domain_pat ) ) {
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: domain pattern already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        b->a_domain_style = sty;
-                                       if (sty == ACL_STYLE_REGEX) {
-                                               char *tmp = acl_regex_normalized_dn( right );
-                                               regtest(fname, lineno, tmp);
-                                               b->a_domain_pat = tmp;
+                                       b->a_domain_expand = expand;
+                                       if ( sty == ACL_STYLE_REGEX ) {
+                                               acl_regex_normalized_dn( right, &bv );
+                                               if ( !ber_bvccmp( &bv, '*' ) ) {
+                                                       regtest( fname, lineno, bv.bv_val );
+                                               }
+                                               b->a_domain_pat = bv;
+
                                        } else {
-                                               b->a_domain_pat = ch_strdup( right );
+                                               ber_str2bv( right, 0, 1, &b->a_domain_pat );
                                        }
                                        continue;
                                }
 
                                if ( strcasecmp( left, "sockurl" ) == 0 ) {
-                                       if ( right == NULL || right[ 0 ] == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n",
+                                       switch ( sty ) {
+                                       case ACL_STYLE_REGEX:
+                                       case ACL_STYLE_BASE:
+                                               /* legal, traditional */
+                                       case ACL_STYLE_EXPAND:
+                                               /* cheap replacement to regex for simple expansion */
+                                               break;
+
+                                       default:
+                                               /* unknown */
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                   fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( right == NULL || right[0] == '\0' ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "missing \"=\" in (or value after) \"%s\" "
+                                                       "in by clause.\n",
                                                        fname, lineno, left );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
 
-                                       if( b->a_sockurl_pat != NULL ) {
-                                               fprintf( stderr,
+                                       if ( !BER_BVISEMPTY( &b->a_sockurl_pat ) ) {
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: sockurl pattern already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        b->a_sockurl_style = sty;
-                                       if (sty == ACL_STYLE_REGEX) {
-                                               char *tmp = acl_regex_normalized_dn( right );
-                                               regtest(fname, lineno, tmp);
-                                               b->a_sockurl_pat = tmp;
+                                       if ( sty == ACL_STYLE_REGEX ) {
+                                               acl_regex_normalized_dn( right, &bv );
+                                               if ( !ber_bvccmp( &bv, '*' ) ) {
+                                                       regtest( fname, lineno, bv.bv_val );
+                                               }
+                                               b->a_sockurl_pat = bv;
+                                               
                                        } else {
-                                               b->a_sockurl_pat = ch_strdup( right );
+                                               ber_str2bv( right, 0, 1, &b->a_sockurl_pat );
                                        }
                                        continue;
                                }
 
                                if ( strcasecmp( left, "set" ) == 0 ) {
-                                       if( b->a_set_pat != NULL ) {
-                                               fprintf( stderr,
+                                       switch ( sty ) {
+                                               /* deprecated */
+                                       case ACL_STYLE_REGEX:
+                                               Debug( LDAP_DEBUG_CONFIG | LDAP_DEBUG_ACL,
+                                                       "%s: line %d: "
+                                                       "deprecated set style "
+                                                       "\"regex\" in <by> clause; "
+                                                       "use \"expand\" instead.\n",
+                                                       fname, lineno, 0 );
+                                               sty = ACL_STYLE_EXPAND;
+                                               /* FALLTHRU */
+                                               
+                                       case ACL_STYLE_BASE:
+                                       case ACL_STYLE_EXPAND:
+                                               break;
+
+                                       default:
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                       fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( !BER_BVISEMPTY( &b->a_set_pat ) ) {
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: set attribute already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        if ( right == NULL || *right == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: no set is defined\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: no set is defined.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        b->a_set_style = sty;
-                                       b->a_set_pat = ch_strdup(right);
+                                       ber_str2bv( right, 0, 1, &b->a_set_pat );
 
                                        continue;
                                }
 
+#ifdef SLAP_DYNACL
+                               {
+                                       char            *name = NULL,
+                                                       *opts = NULL;
+                                       
+                                       if ( strcasecmp( left, "aci" ) == 0 ) {
+                                               name = "aci";
+                                               
+                                       } else if ( strncasecmp( left, "dynacl/", STRLENOF( "dynacl/" ) ) == 0 ) {
+                                               name = &left[ STRLENOF( "dynacl/" ) ];
+                                               opts = strchr( name, '/' );
+                                               if ( opts ) {
+                                                       opts[ 0 ] = '\0';
+                                                       opts++;
+                                               }
+                                       }
+
+                                       if ( name ) {
+                                               if ( slap_dynacl_config( fname, lineno, b, name, opts, sty, right ) ) {
+                                                       Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                               "unable to configure dynacl \"%s\".\n",
+                                                               fname, lineno, name );
+                                                       return acl_usage();
+                                               }
+
+                                               continue;
+                                       }
+                               }
+#else /* ! SLAP_DYNACL */
+
 #ifdef SLAPD_ACI_ENABLED
                                if ( strcasecmp( left, "aci" ) == 0 ) {
+                                       if (sty != ACL_STYLE_REGEX && sty != ACL_STYLE_BASE) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                   fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
                                        if( b->a_aci_at != NULL ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: aci attribute already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: ACI attribute already specified.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        if ( right != NULL && *right != '\0' ) {
                                                rc = slap_str2ad( right, &b->a_aci_at, &text );
 
                                                if( rc != LDAP_SUCCESS ) {
-                                                       fprintf( stderr,
-                                                               "%s: line %d: aci \"%s\": %s\n",
-                                                               fname, lineno, right, text );
-                                                       acl_usage();
+                                                       char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                                       snprintf( buf, sizeof( buf ),
+                                                               "aci \"%s\": %s.",
+                                                               right, text );
+                                                       Debug( LDAP_DEBUG_ANY,
+                                                               "%s: line %d: %s\n",
+                                                               fname, lineno, buf );
+                                                       return acl_usage();
                                                }
 
                                        } else {
-                                               rc = slap_str2ad( SLAPD_ACI_ATTR, &b->a_aci_at, &text );
-
-                                               if( rc != LDAP_SUCCESS ) {
-                                                       fprintf( stderr,
-                                                               "%s: line %d: aci \"%s\": %s\n",
-                                                               fname, lineno, SLAPD_ACI_ATTR, text );
-                                                       acl_usage();
-                                               }
+                                               b->a_aci_at = slap_ad_aci;
                                        }
 
                                        if( !is_at_syntax( b->a_aci_at->ad_type,
                                                SLAPD_ACI_SYNTAX) )
                                        {
-                                               fprintf( stderr,
-                                                       "%s: line %d: aci \"%s\": inappropriate syntax: %s\n",
-                                                       fname, lineno, right,
+                                               char    buf[ SLAP_TEXT_BUFLEN ];
+
+                                               snprintf( buf, sizeof( buf ),
+                                                       "ACI \"%s\": inappropriate syntax: %s.",
+                                                       right,
                                                        b->a_aci_at->ad_type->sat_syntax_oid );
-                                               acl_usage();
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: %s\n",
+                                                       fname, lineno, buf );
+                                               return acl_usage();
                                        }
 
                                        continue;
                                }
 #endif /* SLAPD_ACI_ENABLED */
+#endif /* ! SLAP_DYNACL */
 
                                if ( strcasecmp( left, "ssf" ) == 0 ) {
-                                       if( b->a_authz.sai_ssf ) {
-                                               fprintf( stderr,
+                                       if ( sty != ACL_STYLE_REGEX && sty != ACL_STYLE_BASE ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                   fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( b->a_authz.sai_ssf ) {
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: ssf attribute already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        if ( right == NULL || *right == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: no ssf is defined\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: no ssf is defined.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
-                                       b->a_authz.sai_ssf = atoi( right );
+                                       if ( lutil_atou( &b->a_authz.sai_ssf, right ) != 0 ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: unable to parse ssf value (%s).\n",
+                                                       fname, lineno, right );
+                                               return acl_usage();
+                                       }
 
-                                       if( !b->a_authz.sai_ssf ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: invalid ssf value (%s)\n",
+                                       if ( !b->a_authz.sai_ssf ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: invalid ssf value (%s).\n",
                                                        fname, lineno, right );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
                                        continue;
                                }
 
                                if ( strcasecmp( left, "transport_ssf" ) == 0 ) {
-                                       if( b->a_authz.sai_transport_ssf ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: transport_ssf attribute already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                       if ( sty != ACL_STYLE_REGEX && sty != ACL_STYLE_BASE ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                       fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( b->a_authz.sai_transport_ssf ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "transport_ssf attribute already specified.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        if ( right == NULL || *right == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: no transport_ssf is defined\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: no transport_ssf is defined.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
-                                       b->a_authz.sai_transport_ssf = atoi( right );
+                                       if ( lutil_atou( &b->a_authz.sai_transport_ssf, right ) != 0 ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "unable to parse transport_ssf value (%s).\n",
+                                                       fname, lineno, right );
+                                               return acl_usage();
+                                       }
 
-                                       if( !b->a_authz.sai_transport_ssf ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: invalid transport_ssf value (%s)\n",
+                                       if ( !b->a_authz.sai_transport_ssf ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: invalid transport_ssf value (%s).\n",
                                                        fname, lineno, right );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
                                        continue;
                                }
 
                                if ( strcasecmp( left, "tls_ssf" ) == 0 ) {
-                                       if( b->a_authz.sai_tls_ssf ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: tls_ssf attribute already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                       if ( sty != ACL_STYLE_REGEX && sty != ACL_STYLE_BASE ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                       fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( b->a_authz.sai_tls_ssf ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "tls_ssf attribute already specified.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        if ( right == NULL || *right == '\0' ) {
-                                               fprintf( stderr,
+                                               Debug( LDAP_DEBUG_ANY,
                                                        "%s: line %d: no tls_ssf is defined\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
-                                       b->a_authz.sai_tls_ssf = atoi( right );
+                                       if ( lutil_atou( &b->a_authz.sai_tls_ssf, right ) != 0 ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "unable to parse tls_ssf value (%s).\n",
+                                                       fname, lineno, right );
+                                               return acl_usage();
+                                       }
 
-                                       if( !b->a_authz.sai_tls_ssf ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: invalid tls_ssf value (%s)\n",
+                                       if ( !b->a_authz.sai_tls_ssf ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: invalid tls_ssf value (%s).\n",
                                                        fname, lineno, right );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
                                        continue;
                                }
 
                                if ( strcasecmp( left, "sasl_ssf" ) == 0 ) {
-                                       if( b->a_authz.sai_sasl_ssf ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: sasl_ssf attribute already specified.\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                       if ( sty != ACL_STYLE_REGEX && sty != ACL_STYLE_BASE ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "inappropriate style \"%s\" in by clause.\n",
+                                                       fname, lineno, style );
+                                               return acl_usage();
+                                       }
+
+                                       if ( b->a_authz.sai_sasl_ssf ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "sasl_ssf attribute already specified.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
                                        if ( right == NULL || *right == '\0' ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: no sasl_ssf is defined\n",
-                                                       fname, lineno );
-                                               acl_usage();
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: no sasl_ssf is defined.\n",
+                                                       fname, lineno, 0 );
+                                               return acl_usage();
                                        }
 
-                                       b->a_authz.sai_sasl_ssf = atoi( right );
+                                       if ( lutil_atou( &b->a_authz.sai_sasl_ssf, right ) != 0 ) {
+                                               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                                                       "unable to parse sasl_ssf value (%s).\n",
+                                                       fname, lineno, right );
+                                               return acl_usage();
+                                       }
 
-                                       if( !b->a_authz.sai_sasl_ssf ) {
-                                               fprintf( stderr,
-                                                       "%s: line %d: invalid sasl_ssf value (%s)\n",
+                                       if ( !b->a_authz.sai_sasl_ssf ) {
+                                               Debug( LDAP_DEBUG_ANY,
+                                                       "%s: line %d: invalid sasl_ssf value (%s).\n",
                                                        fname, lineno, right );
-                                               acl_usage();
+                                               return acl_usage();
                                        }
                                        continue;
                                }
 
-                               if( right != NULL ) {
+                               if ( right != NULL ) {
                                        /* unsplit */
                                        right[-1] = '=';
                                }
                                break;
                        }
 
-                       if( i == argc || ( strcasecmp( left, "stop" ) == 0 )) { 
+                       if ( i == argc || ( strcasecmp( left, "stop" ) == 0 ) ) { 
                                /* out of arguments or plain stop */
 
-                               ACL_PRIV_ASSIGN(b->a_access_mask, ACL_PRIV_ADDITIVE);
+                               ACL_PRIV_ASSIGN( b->a_access_mask, ACL_PRIV_ADDITIVE );
                                b->a_type = ACL_STOP;
 
                                access_append( &a->acl_access, b );
                                continue;
                        }
 
-                       if( strcasecmp( left, "continue" ) == 0 ) {
+                       if ( strcasecmp( left, "continue" ) == 0 ) {
                                /* plain continue */
 
-                               ACL_PRIV_ASSIGN(b->a_access_mask, ACL_PRIV_ADDITIVE);
+                               ACL_PRIV_ASSIGN( b->a_access_mask, ACL_PRIV_ADDITIVE );
                                b->a_type = ACL_CONTINUE;
 
                                access_append( &a->acl_access, b );
                                continue;
                        }
 
-                       if( strcasecmp( left, "break" ) == 0 ) {
+                       if ( strcasecmp( left, "break" ) == 0 ) {
                                /* plain continue */
 
                                ACL_PRIV_ASSIGN(b->a_access_mask, ACL_PRIV_ADDITIVE);
@@ -878,7 +1894,7 @@ parse_acl(
                        if ( strcasecmp( left, "by" ) == 0 ) {
                                /* we've gone too far */
                                --i;
-                               ACL_PRIV_ASSIGN(b->a_access_mask, ACL_PRIV_ADDITIVE);
+                               ACL_PRIV_ASSIGN( b->a_access_mask, ACL_PRIV_ADDITIVE );
                                b->a_type = ACL_STOP;
 
                                access_append( &a->acl_access, b );
@@ -886,34 +1902,38 @@ parse_acl(
                        }
 
                        /* get <access> */
-                       if( strncasecmp( left, "self", 4 ) == 0 ) {
+                       if ( strncasecmp( left, "self", STRLENOF( "self" ) ) == 0 ) {
                                b->a_dn_self = 1;
-                               ACL_PRIV_ASSIGN( b->a_access_mask, str2accessmask( &left[4] ) );
+                               ACL_PRIV_ASSIGN( b->a_access_mask, str2accessmask( &left[ STRLENOF( "self" ) ] ) );
+
+                       } else if ( strncasecmp( left, "realself", STRLENOF( "realself" ) ) == 0 ) {
+                               b->a_realdn_self = 1;
+                               ACL_PRIV_ASSIGN( b->a_access_mask, str2accessmask( &left[ STRLENOF( "realself" ) ] ) );
 
                        } else {
                                ACL_PRIV_ASSIGN( b->a_access_mask, str2accessmask( left ) );
                        }
 
-                       if( ACL_IS_INVALID( b->a_access_mask ) ) {
-                               fprintf( stderr,
-                                       "%s: line %d: expecting <access> got \"%s\"\n",
+                       if ( ACL_IS_INVALID( b->a_access_mask ) ) {
+                               Debug( LDAP_DEBUG_ANY,
+                                       "%s: line %d: expecting <access> got \"%s\".\n",
                                        fname, lineno, left );
-                               acl_usage();
+                               return acl_usage();
                        }
 
                        b->a_type = ACL_STOP;
 
-                       if( ++i == argc ) {
+                       if ( ++i == argc ) {
                                /* out of arguments or plain stop */
                                access_append( &a->acl_access, b );
                                continue;
                        }
 
-                       if( strcasecmp( argv[i], "continue" ) == 0 ) {
+                       if ( strcasecmp( argv[i], "continue" ) == 0 ) {
                                /* plain continue */
                                b->a_type = ACL_CONTINUE;
 
-                       } else if( strcasecmp( argv[i], "break" ) == 0 ) {
+                       } else if ( strcasecmp( argv[i], "break" ) == 0 ) {
                                /* plain continue */
                                b->a_type = ACL_BREAK;
 
@@ -925,43 +1945,103 @@ parse_acl(
                        access_append( &a->acl_access, b );
 
                } else {
-                       fprintf( stderr,
-                   "%s: line %d: expecting \"to\" or \"by\" got \"%s\"\n",
-                           fname, lineno, argv[i] );
-                       acl_usage();
+                       Debug( LDAP_DEBUG_ANY,
+                               "%s: line %d: expecting \"to\" "
+                               "or \"by\" got \"%s\"\n",
+                               fname, lineno, argv[i] );
+                       return acl_usage();
                }
        }
 
        /* if we have no real access clause, complain and do nothing */
        if ( a == NULL ) {
-                       fprintf( stderr,
-                               "%s: line %d: warning: no access clause(s) specified in access line\n",
-                           fname, lineno );
+               Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                       "warning: no access clause(s) "
+                       "specified in access line"
+                       SLAPD_CONF_UNKNOWN_IGNORED ".\n",
+                       fname, lineno, 0 );
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+               return acl_usage();
+#endif /* SLAPD_CONF_UNKNOWN_BAILOUT */
 
        } else {
 #ifdef LDAP_DEBUG
-               if (ldap_debug & LDAP_DEBUG_ACL)
-                       print_acl(be, a);
+               if ( ldap_debug & LDAP_DEBUG_ACL ) {
+                       print_acl( be, a );
+               }
 #endif
        
                if ( a->acl_access == NULL ) {
-                       fprintf( stderr,
-                       "%s: line %d: warning: no by clause(s) specified in access line\n",
-                           fname, lineno );
+                       Debug( LDAP_DEBUG_ANY, "%s: line %d: "
+                               "warning: no by clause(s) "
+                               "specified in access line"
+                               SLAPD_CONF_UNKNOWN_IGNORED ".\n",
+                               fname, lineno, 0 );
+#ifdef SLAPD_CONF_UNKNOWN_BAILOUT
+                       return acl_usage();
+#endif /* SLAPD_CONF_UNKNOWN_BAILOUT */
                }
 
                if ( be != NULL ) {
-                       acl_append( &be->be_acl, a );
+                       if ( be->be_nsuffix == NULL ) {
+                               Debug( LDAP_DEBUG_ACL, "%s: line %d: warning: "
+                                       "scope checking needs suffix before ACLs.\n",
+                                       fname, lineno, 0 );
+                               /* go ahead, since checking is not authoritative */
+                       } else if ( !BER_BVISNULL( &be->be_nsuffix[ 1 ] ) ) {
+                               Debug( LDAP_DEBUG_ACL, "%s: line %d: warning: "
+                                       "scope checking only applies to single-valued "
+                                       "suffix databases\n",
+                                       fname, lineno, 0 );
+                               /* go ahead, since checking is not authoritative */
+                       } else {
+                               switch ( check_scope( be, a ) ) {
+                               case ACL_SCOPE_UNKNOWN:
+                                       Debug( LDAP_DEBUG_ACL, "%s: line %d: warning: "
+                                               "cannot assess the validity of the ACL scope within "
+                                               "backend naming context\n",
+                                               fname, lineno, 0 );
+                                       break;
+
+                               case ACL_SCOPE_WARN:
+                                       Debug( LDAP_DEBUG_ACL, "%s: line %d: warning: "
+                                               "ACL could be out of scope within backend naming context\n",
+                                               fname, lineno, 0 );
+                                       break;
+
+                               case ACL_SCOPE_PARTIAL:
+                                       Debug( LDAP_DEBUG_ACL, "%s: line %d: warning: "
+                                               "ACL appears to be partially out of scope within "
+                                               "backend naming context\n",
+                                               fname, lineno, 0 );
+                                       break;
+       
+                               case ACL_SCOPE_ERR:
+                                       Debug( LDAP_DEBUG_ACL, "%s: line %d: warning: "
+                                               "ACL appears to be out of scope within "
+                                               "backend naming context\n",
+                                               fname, lineno, 0 );
+                                       break;
+
+                               default:
+                                       break;
+                               }
+                       }
+                       acl_append( &be->be_acl, a, pos );
+
                } else {
-                       acl_append( &global_acl, a );
+                       acl_append( &frontendDB->be_acl, a, pos );
                }
        }
+
+       return 0;
 }
 
 char *
-accessmask2str( slap_mask_t mask, char *buf )
+accessmask2str( slap_mask_t mask, char *buf, int debug )
 {
-       int none=1;
+       int     none = 1;
+       char    *ptr = buf;
 
        assert( buf != NULL );
 
@@ -973,76 +2053,114 @@ accessmask2str( slap_mask_t mask, char *buf )
 
        if ( ACL_IS_LEVEL( mask ) ) {
                if ( ACL_LVL_IS_NONE(mask) ) {
-                       strcat( buf, "none" );
+                       ptr = lutil_strcopy( ptr, "none" );
+
+               } else if ( ACL_LVL_IS_DISCLOSE(mask) ) {
+                       ptr = lutil_strcopy( ptr, "disclose" );
 
                } else if ( ACL_LVL_IS_AUTH(mask) ) {
-                       strcat( buf, "auth" );
+                       ptr = lutil_strcopy( ptr, "auth" );
 
                } else if ( ACL_LVL_IS_COMPARE(mask) ) {
-                       strcat( buf, "compare" );
+                       ptr = lutil_strcopy( ptr, "compare" );
 
                } else if ( ACL_LVL_IS_SEARCH(mask) ) {
-                       strcat( buf, "search" );
+                       ptr = lutil_strcopy( ptr, "search" );
 
                } else if ( ACL_LVL_IS_READ(mask) ) {
-                       strcat( buf, "read" );
+                       ptr = lutil_strcopy( ptr, "read" );
 
                } else if ( ACL_LVL_IS_WRITE(mask) ) {
-                       strcat( buf, "write" );
+                       ptr = lutil_strcopy( ptr, "write" );
+
+               } else if ( ACL_LVL_IS_WADD(mask) ) {
+                       ptr = lutil_strcopy( ptr, "add" );
+
+               } else if ( ACL_LVL_IS_WDEL(mask) ) {
+                       ptr = lutil_strcopy( ptr, "delete" );
+
+               } else if ( ACL_LVL_IS_MANAGE(mask) ) {
+                       ptr = lutil_strcopy( ptr, "manage" );
+
                } else {
-                       strcat( buf, "unknown" );
+                       ptr = lutil_strcopy( ptr, "unknown" );
                }
                
-               strcat(buf, " (");
+               if ( !debug ) {
+                       *ptr = '\0';
+                       return buf;
+               }
+               *ptr++ = '(';
        }
 
        if( ACL_IS_ADDITIVE( mask ) ) {
-               strcat( buf, "+" );
+               *ptr++ = '+';
 
        } else if( ACL_IS_SUBTRACTIVE( mask ) ) {
-               strcat( buf, "-" );
+               *ptr++ = '-';
 
        } else {
-               strcat( buf, "=" );
+               *ptr++ = '=';
        }
 
+       if ( ACL_PRIV_ISSET(mask, ACL_PRIV_MANAGE) ) {
+               none = 0;
+               *ptr++ = 'm';
+       } 
+
        if ( ACL_PRIV_ISSET(mask, ACL_PRIV_WRITE) ) {
                none = 0;
-               strcat( buf, "w" );
+               *ptr++ = 'w';
+
+       } else if ( ACL_PRIV_ISSET(mask, ACL_PRIV_WADD) ) {
+               none = 0;
+               *ptr++ = 'a';
+
+       } else if ( ACL_PRIV_ISSET(mask, ACL_PRIV_WDEL) ) {
+               none = 0;
+               *ptr++ = 'z';
        } 
 
        if ( ACL_PRIV_ISSET(mask, ACL_PRIV_READ) ) {
                none = 0;
-               strcat( buf, "r" );
+               *ptr++ = 'r';
        } 
 
        if ( ACL_PRIV_ISSET(mask, ACL_PRIV_SEARCH) ) {
                none = 0;
-               strcat( buf, "s" );
+               *ptr++ = 's';
        } 
 
        if ( ACL_PRIV_ISSET(mask, ACL_PRIV_COMPARE) ) {
                none = 0;
-               strcat( buf, "c" );
+               *ptr++ = 'c';
        } 
 
        if ( ACL_PRIV_ISSET(mask, ACL_PRIV_AUTH) ) {
                none = 0;
-               strcat( buf, "x" );
+               *ptr++ = 'x';
+       } 
+
+       if ( ACL_PRIV_ISSET(mask, ACL_PRIV_DISCLOSE) ) {
+               none = 0;
+               *ptr++ = 'd';
        } 
 
        if ( none && ACL_PRIV_ISSET(mask, ACL_PRIV_NONE) ) {
                none = 0;
-               strcat( buf, "n" );
+               *ptr++ = '0';
        } 
 
        if ( none ) {
-               strcat( buf, "0" );
+               ptr = buf;
        }
 
        if ( ACL_IS_LEVEL( mask ) ) {
-               strcat(buf, ")");
-       } 
+               *ptr++ = ')';
+       }
+
+       *ptr = '\0';
+
        return buf;
 }
 
@@ -1069,21 +2187,33 @@ str2accessmask( const char *str )
                }
 
                for( i=1; str[i] != '\0'; i++ ) {
-                       if( TOLOWER(str[i]) == 'w' ) {
+                       if( TOLOWER((unsigned char) str[i]) == 'm' ) {
+                               ACL_PRIV_SET(mask, ACL_PRIV_MANAGE);
+
+                       } else if( TOLOWER((unsigned char) str[i]) == 'w' ) {
                                ACL_PRIV_SET(mask, ACL_PRIV_WRITE);
 
-                       } else if( TOLOWER(str[i]) == 'r' ) {
+                       } else if( TOLOWER((unsigned char) str[i]) == 'a' ) {
+                               ACL_PRIV_SET(mask, ACL_PRIV_WADD);
+
+                       } else if( TOLOWER((unsigned char) str[i]) == 'z' ) {
+                               ACL_PRIV_SET(mask, ACL_PRIV_WDEL);
+
+                       } else if( TOLOWER((unsigned char) str[i]) == 'r' ) {
                                ACL_PRIV_SET(mask, ACL_PRIV_READ);
 
-                       } else if( TOLOWER(str[i]) == 's' ) {
+                       } else if( TOLOWER((unsigned char) str[i]) == 's' ) {
                                ACL_PRIV_SET(mask, ACL_PRIV_SEARCH);
 
-                       } else if( TOLOWER(str[i]) == 'c' ) {
+                       } else if( TOLOWER((unsigned char) str[i]) == 'c' ) {
                                ACL_PRIV_SET(mask, ACL_PRIV_COMPARE);
 
-                       } else if( TOLOWER(str[i]) == 'x' ) {
+                       } else if( TOLOWER((unsigned char) str[i]) == 'x' ) {
                                ACL_PRIV_SET(mask, ACL_PRIV_AUTH);
 
+                       } else if( TOLOWER((unsigned char) str[i]) == 'd' ) {
+                               ACL_PRIV_SET(mask, ACL_PRIV_DISCLOSE);
+
                        } else if( str[i] != '0' ) {
                                ACL_INVALIDATE(mask);
                                return mask;
@@ -1096,6 +2226,9 @@ str2accessmask( const char *str )
        if ( strcasecmp( str, "none" ) == 0 ) {
                ACL_LVL_ASSIGN_NONE(mask);
 
+       } else if ( strcasecmp( str, "disclose" ) == 0 ) {
+               ACL_LVL_ASSIGN_DISCLOSE(mask);
+
        } else if ( strcasecmp( str, "auth" ) == 0 ) {
                ACL_LVL_ASSIGN_AUTH(mask);
 
@@ -1108,9 +2241,18 @@ str2accessmask( const char *str )
        } else if ( strcasecmp( str, "read" ) == 0 ) {
                ACL_LVL_ASSIGN_READ(mask);
 
+       } else if ( strcasecmp( str, "add" ) == 0 ) {
+               ACL_LVL_ASSIGN_WADD(mask);
+
+       } else if ( strcasecmp( str, "delete" ) == 0 ) {
+               ACL_LVL_ASSIGN_WDEL(mask);
+
        } else if ( strcasecmp( str, "write" ) == 0 ) {
                ACL_LVL_ASSIGN_WRITE(mask);
 
+       } else if ( strcasecmp( str, "manage" ) == 0 ) {
+               ACL_LVL_ASSIGN_MANAGE(mask);
+
        } else {
                ACL_INVALIDATE( mask );
        }
@@ -1118,72 +2260,103 @@ str2accessmask( const char *str )
        return mask;
 }
 
-static void
+static int
 acl_usage( void )
 {
-       fprintf( stderr, "\n"
+       char *access =
                "<access clause> ::= access to <what> "
-                               "[ by <who> <access> [ <control> ] ]+ \n"
-               "<what> ::= * | [dn[.<dnstyle>]=<regex>] [filter=<ldapfilter>] [attrs=<attrlist>]\n"
-               "<attrlist> ::= <attr> | <attr> , <attrlist>\n"
-               "<attr> ::= <attrname> | entry | children\n"
-               "<who> ::= [ * | anonymous | users | self | dn[.<dnstyle>]=<regex> ]\n"
+                               "[ by <who> <access> [ <control> ] ]+ \n";
+       char *what =
+               "<what> ::= * | [dn[.<dnstyle>]=<DN>] [filter=<filter>] [attrs=<attrspec>]\n"
+               "<attrspec> ::= <attrname> [val[/<matchingRule>][.<attrstyle>]=<value>] | <attrlist>\n"
+               "<attrlist> ::= <attr> [ , <attrlist> ]\n"
+               "<attr> ::= <attrname> | @<objectClass> | !<objectClass> | entry | children\n";
+
+       char *who =
+               "<who> ::= [ * | anonymous | users | self | dn[.<dnstyle>]=<DN> ]\n"
+                       "\t[ realanonymous | realusers | realself | realdn[.<dnstyle>]=<DN> ]\n"
                        "\t[dnattr=<attrname>]\n"
-                       "\t[group[/<objectclass>[/<attrname>]][.<style>]=<regex>]\n"
-                       "\t[peername[.<style>]=<regex>] [sockname[.<style>]=<regex>]\n"
-                       "\t[domain[.<style>]=<regex>] [sockurl[.<style>]=<regex>]\n"
+                       "\t[realdnattr=<attrname>]\n"
+                       "\t[group[/<objectclass>[/<attrname>]][.<style>]=<group>]\n"
+                       "\t[peername[.<peernamestyle>]=<peer>] [sockname[.<style>]=<name>]\n"
+                       "\t[domain[.<domainstyle>]=<domain>] [sockurl[.<style>]=<url>]\n"
+#ifdef SLAP_DYNACL
+                       "\t[dynacl/<name>[/<options>][.<dynstyle>][=<pattern>]]\n"
+#else /* ! SLAP_DYNACL */
 #ifdef SLAPD_ACI_ENABLED
-                       "\t[aci=<attrname>]\n"
-#endif
+                       "\t[aci[=<attrname>]]\n"
+#endif /* SLAPD_ACI_ENABLED */
+#endif /* ! SLAP_DYNACL */
                        "\t[ssf=<n>] [transport_ssf=<n>] [tls_ssf=<n>] [sasl_ssf=<n>]\n"
-               "<dnstyle> ::= regex | base | exact (alias of base) | one | sub | children\n"
-               "<style> ::= regex | base | exact (alias of base)\n"
-               "<groupflags> ::= R\n"
-               "<access> ::= [self]{<level>|<priv>}\n"
-               "<level> ::= none | auth | compare | search | read | write\n"
-               "<priv> ::= {=|+|-}{w|r|s|c|x}+\n"
+               "<style> ::= exact | regex | base(Object)\n"
+               "<dnstyle> ::= base(Object) | one(level) | sub(tree) | children | "
+                       "exact | regex\n"
+               "<attrstyle> ::= exact | regex | base(Object) | one(level) | "
+                       "sub(tree) | children\n"
+               "<peernamestyle> ::= exact | regex | ip | path\n"
+               "<domainstyle> ::= exact | regex | base(Object) | sub(tree)\n"
+               "<access> ::= [[real]self]{<level>|<priv>}\n"
+               "<level> ::= none|disclose|auth|compare|search|read|{write|add|delete}|manage\n"
+               "<priv> ::= {=|+|-}{0|d|x|c|s|r|{w|a|z}|m}+\n"
                "<control> ::= [ stop | continue | break ]\n"
-               );
-       exit( EXIT_FAILURE );
+#ifdef SLAP_DYNACL
+#ifdef SLAPD_ACI_ENABLED
+               "dynacl:\n"
+               "\t<name>=ACI\t<pattern>=<attrname>\n"
+#endif /* SLAPD_ACI_ENABLED */
+#endif /* ! SLAP_DYNACL */
+               "";
+
+       Debug( LDAP_DEBUG_ANY, "%s%s%s\n", access, what, who );
+
+       return 1;
 }
 
 /*
+ * Set pattern to a "normalized" DN from src.
  * At present it simply eats the (optional) space after 
  * a RDN separator (,)
  * Eventually will evolve in a more complete normalization
  */
-static char *
+static void
 acl_regex_normalized_dn(
-       const char *pattern
-)
+       const char *src,
+       struct berval *pattern )
 {
        char *str, *p;
+       ber_len_t len;
 
-       str = ch_strdup( pattern );
+       str = ch_strdup( src );
+       len = strlen( src );
 
-       if ( str == NULL ) {
-               return( NULL );
-       }
-
-       for ( p = str; p[ 0 ]; p++ ) {
+       for ( p = str; p && p[0]; p++ ) {
                /* escape */
-               if ( p[ 0 ] == '\\' ) {
+               if ( p[0] == '\\' && p[1] ) {
+                       /* 
+                        * if escaping a hex pair we should
+                        * increment p twice; however, in that 
+                        * case the second hex number does 
+                        * no harm
+                        */
                        p++;
                }
 
-               if ( p[ 0 ] == ',' ) {
-                       if ( p[ 1 ] == ' ' ) {
-                               char *q;
+               if ( p[0] == ',' && p[1] == ' ' ) {
+                       char *q;
                        
-                               for ( q = &p[ 2 ]; q[ 0 ] == ' '; q++ ) {
-                                       /* DO NOTHING */ ;
-                               }
-                               AC_MEMCPY( &p[ 1 ], &q[ 0 ], strlen( q ) + 1 );
+                       /*
+                        * too much space should be an error if we are pedantic
+                        */
+                       for ( q = &p[2]; q[0] == ' '; q++ ) {
+                               /* DO NOTHING */ ;
                        }
+                       AC_MEMCPY( p+1, q, len-(q-str)+1);
                }
        }
+       pattern->bv_val = str;
+       pattern->bv_len = p - str;
 
-       return( str );
+       return;
 }
 
 static void
@@ -1191,8 +2364,7 @@ split(
     char       *line,
     int                splitchar,
     char       **left,
-    char       **right
-)
+    char       **right )
 {
        *left = line;
        if ( (*right = strchr( line, splitchar )) != NULL ) {
@@ -1203,38 +2375,69 @@ split(
 static void
 access_append( Access **l, Access *a )
 {
-       for ( ; *l != NULL; l = &(*l)->a_next )
-               ;       /* NULL */
+       for ( ; *l != NULL; l = &(*l)->a_next ) {
+               ;       /* Empty */
+       }
 
        *l = a;
 }
 
 void
-acl_append( AccessControl **l, AccessControl *a )
+acl_append( AccessControl **l, AccessControl *a, int pos )
 {
-       for ( ; *l != NULL; l = &(*l)->acl_next )
-               ;       /* NULL */
+       int i;
 
+       for (i=0 ; i != pos && *l != NULL; l = &(*l)->acl_next, i++ ) {
+               ;       /* Empty */
+       }
+       if ( *l && a )
+               a->acl_next = *l;
        *l = a;
 }
 
 static void
 access_free( Access *a )
 {
-       if ( a->a_dn_pat.bv_val )
-               free ( a->a_dn_pat.bv_val );
-       if ( a->a_peername_pat )
-               free ( a->a_peername_pat );
-       if ( a->a_sockname_pat )
-               free ( a->a_sockname_pat );
-       if ( a->a_domain_pat )
-               free ( a->a_domain_pat );
-       if ( a->a_sockurl_pat )
-               free ( a->a_sockurl_pat );
-       if ( a->a_set_pat )
-               free ( a->a_set_pat );
-       if ( a->a_group_pat )
-               free ( a->a_group_pat );
+       if ( !BER_BVISNULL( &a->a_dn_pat ) ) {
+               free( a->a_dn_pat.bv_val );
+       }
+       if ( !BER_BVISNULL( &a->a_realdn_pat ) ) {
+               free( a->a_realdn_pat.bv_val );
+       }
+       if ( !BER_BVISNULL( &a->a_peername_pat ) ) {
+               free( a->a_peername_pat.bv_val );
+       }
+       if ( !BER_BVISNULL( &a->a_sockname_pat ) ) {
+               free( a->a_sockname_pat.bv_val );
+       }
+       if ( !BER_BVISNULL( &a->a_domain_pat ) ) {
+               free( a->a_domain_pat.bv_val );
+       }
+       if ( !BER_BVISNULL( &a->a_sockurl_pat ) ) {
+               free( a->a_sockurl_pat.bv_val );
+       }
+       if ( !BER_BVISNULL( &a->a_set_pat ) ) {
+               free( a->a_set_pat.bv_val );
+       }
+       if ( !BER_BVISNULL( &a->a_group_pat ) ) {
+               free( a->a_group_pat.bv_val );
+       }
+#ifdef SLAP_DYNACL
+       if ( a->a_dynacl != NULL ) {
+               slap_dynacl_t   *da;
+               for ( da = a->a_dynacl; da; ) {
+                       slap_dynacl_t   *tmp = da;
+
+                       da = da->da_next;
+
+                       if ( tmp->da_destroy ) {
+                               tmp->da_destroy( tmp->da_private );
+                       }
+
+                       ch_free( tmp );
+               }
+       }
+#endif /* SLAP_DYNACL */
        free( a );
 }
 
@@ -1242,14 +2445,24 @@ void
 acl_free( AccessControl *a )
 {
        Access *n;
+       AttributeName *an;
 
-       if ( a->acl_filter )
+       if ( a->acl_filter ) {
                filter_free( a->acl_filter );
-       if ( a->acl_dn_pat )
-               free ( a->acl_dn_pat );
-       if ( a->acl_attrs )
-               charray_free( a->acl_attrs );
-       for (; a->acl_access; a->acl_access = n) {
+       }
+       if ( !BER_BVISNULL( &a->acl_dn_pat ) ) {
+               if ( a->acl_dn_style == ACL_STYLE_REGEX ) {
+                       regfree( &a->acl_dn_re );
+               }
+               free ( a->acl_dn_pat.bv_val );
+       }
+       if ( a->acl_attrs ) {
+               for ( an = a->acl_attrs; !BER_BVISNULL( &an->an_name ); an++ ) {
+                       free( an->an_name.bv_val );
+               }
+               free( a->acl_attrs );
+       }
+       for ( ; a->acl_access; a->acl_access = n ) {
                n = a->acl_access->a_next;
                access_free( a->acl_access );
        }
@@ -1268,7 +2481,7 @@ acl_destroy( AccessControl *a, AccessControl *end )
 {
        AccessControl *n;
 
-       for (; a && a!= end; a=n) {
+       for ( ; a && a != end; a = n ) {
                n = a->acl_next;
                acl_free( a );
        }
@@ -1280,6 +2493,9 @@ access2str( slap_access_t access )
        if ( access == ACL_NONE ) {
                return "none";
 
+       } else if ( access == ACL_DISCLOSE ) {
+               return "disclose";
+
        } else if ( access == ACL_AUTH ) {
                return "auth";
 
@@ -1294,6 +2510,16 @@ access2str( slap_access_t access )
 
        } else if ( access == ACL_WRITE ) {
                return "write";
+
+       } else if ( access == ACL_WADD ) {
+               return "add";
+
+       } else if ( access == ACL_WDEL ) {
+               return "delete";
+
+       } else if ( access == ACL_MANAGE ) {
+               return "manage";
+
        }
 
        return "unknown";
@@ -1305,6 +2531,14 @@ str2access( const char *str )
        if ( strcasecmp( str, "none" ) == 0 ) {
                return ACL_NONE;
 
+       } else if ( strcasecmp( str, "disclose" ) == 0 ) {
+#ifndef SLAP_ACL_HONOR_DISCLOSE
+               Debug( LDAP_DEBUG_ACL, "str2access: warning, "
+                       "\"disclose\" privilege disabled.\n",
+               0, 0, 0 );
+#endif /* SLAP_ACL_HONOR_DISCLOSE */
+               return ACL_DISCLOSE;
+
        } else if ( strcasecmp( str, "auth" ) == 0 ) {
                return ACL_AUTH;
 
@@ -1319,163 +2553,321 @@ str2access( const char *str )
 
        } else if ( strcasecmp( str, "write" ) == 0 ) {
                return ACL_WRITE;
+
+       } else if ( strcasecmp( str, "add" ) == 0 ) {
+               return ACL_WADD;
+
+       } else if ( strcasecmp( str, "delete" ) == 0 ) {
+               return ACL_WDEL;
+
+       } else if ( strcasecmp( str, "manage" ) == 0 ) {
+               return ACL_MANAGE;
        }
 
        return( ACL_INVALID_ACCESS );
 }
 
-#ifdef LDAP_DEBUG
-
-static char *style_strings[5] = {
-                       "regex",
-                       "base",
-                       "one",
-                       "subtree",
-                       "children"
-               };
+#define ACLBUF_MAXLEN  8192
 
+static char aclbuf[ACLBUF_MAXLEN];
 
-static void
-print_access( Access *b )
+static char *
+dnaccess2text( slap_dn_access *bdn, char *ptr, int is_realdn )
 {
-       char maskbuf[ACCESSMASK_MAXLEN];
+       *ptr++ = ' ';
 
-       fprintf( stderr, "\tby" );
+       if ( is_realdn ) {
+               ptr = lutil_strcopy( ptr, "real" );
+       }
 
-       if ( b->a_dn_pat.bv_len != 0 ) {
-               if( strcmp(b->a_dn_pat.bv_val, "*") == 0
-                       || strcmp(b->a_dn_pat.bv_val, "users") == 0 
-                       || strcmp(b->a_dn_pat.bv_val, "anonymous") == 0 
-                       || strcmp(b->a_dn_pat.bv_val, "self") == 0 )
-               {
-                       fprintf( stderr, " %s", b->a_dn_pat.bv_val );
+       if ( ber_bvccmp( &bdn->a_pat, '*' ) ||
+               bdn->a_style == ACL_STYLE_ANONYMOUS ||
+               bdn->a_style == ACL_STYLE_USERS ||
+               bdn->a_style == ACL_STYLE_SELF )
+       {
+               if ( is_realdn ) {
+                       assert( ! ber_bvccmp( &bdn->a_pat, '*' ) );
+               }
+                       
+               ptr = lutil_strcopy( ptr, bdn->a_pat.bv_val );
+               if ( bdn->a_style == ACL_STYLE_SELF && bdn->a_self_level != 0 ) {
+                       int n = sprintf( ptr, ".level{%d}", bdn->a_self_level );
+                       if ( n > 0 ) {
+                               ptr += n;
+                       } /* else ? */
+               }
 
-               } else {
-                       fprintf( stderr, " dn.%s=%s", style_strings[b->a_dn_style], b->a_dn_pat.bv_val );
+       } else {
+               ptr = lutil_strcopy( ptr, "dn." );
+               if ( bdn->a_style == ACL_STYLE_BASE )
+                       ptr = lutil_strcopy( ptr, style_base );
+               else 
+                       ptr = lutil_strcopy( ptr, style_strings[bdn->a_style] );
+               if ( bdn->a_style == ACL_STYLE_LEVEL ) {
+                       int n = sprintf( ptr, "{%d}", bdn->a_level );
+                       if ( n > 0 ) {
+                               ptr += n;
+                       } /* else ? */
+               }
+               if ( bdn->a_expand ) {
+                       ptr = lutil_strcopy( ptr, ",expand" );
                }
+               *ptr++ = '=';
+               *ptr++ = '"';
+               ptr = lutil_strcopy( ptr, bdn->a_pat.bv_val );
+               *ptr++ = '"';
        }
+       return ptr;
+}
 
-       if ( b->a_dn_at != NULL ) {
-               fprintf( stderr, " dnattr=%s", b->a_dn_at->ad_cname.bv_val );
+static char *
+access2text( Access *b, char *ptr )
+{
+       char maskbuf[ACCESSMASK_MAXLEN];
+
+       ptr = lutil_strcopy( ptr, "\tby" );
+
+       if ( !BER_BVISEMPTY( &b->a_dn_pat ) ) {
+               ptr = dnaccess2text( &b->a_dn, ptr, 0 );
+       }
+       if ( b->a_dn_at ) {
+               ptr = lutil_strcopy( ptr, " dnattr=" );
+               ptr = lutil_strcopy( ptr, b->a_dn_at->ad_cname.bv_val );
        }
 
-       if ( b->a_group_pat != NULL ) {
-               fprintf( stderr, " group=%s", b->a_group_pat );
+       if ( !BER_BVISEMPTY( &b->a_realdn_pat ) ) {
+               ptr = dnaccess2text( &b->a_realdn, ptr, 1 );
+       }
+       if ( b->a_realdn_at ) {
+               ptr = lutil_strcopy( ptr, " realdnattr=" );
+               ptr = lutil_strcopy( ptr, b->a_realdn_at->ad_cname.bv_val );
+       }
 
-               if ( b->a_group_oc ) {
-                       fprintf( stderr, " objectClass: %s",
-                               b->a_group_oc->soc_oclass.oc_oid );
+       if ( !BER_BVISEMPTY( &b->a_group_pat ) ) {
+               ptr = lutil_strcopy( ptr, " group/" );
+               ptr = lutil_strcopy( ptr, b->a_group_oc ?
+                       b->a_group_oc->soc_cname.bv_val : SLAPD_GROUP_CLASS );
+               *ptr++ = '/';
+               ptr = lutil_strcopy( ptr, b->a_group_at ?
+                       b->a_group_at->ad_cname.bv_val : SLAPD_GROUP_ATTR );
+               *ptr++ = '.';
+               ptr = lutil_strcopy( ptr, style_strings[b->a_group_style] );
+               *ptr++ = '=';
+               *ptr++ = '"';
+               ptr = lutil_strcopy( ptr, b->a_group_pat.bv_val );
+               *ptr++ = '"';
+       }
 
-                       if ( b->a_group_at ) {
-                               fprintf( stderr, " attributeType: %s", b->a_group_at->ad_cname.bv_val );
-                       }
-               }
-    }
+       if ( !BER_BVISEMPTY( &b->a_peername_pat ) ) {
+               ptr = lutil_strcopy( ptr, " peername" );
+               *ptr++ = '.';
+               ptr = lutil_strcopy( ptr, style_strings[b->a_peername_style] );
+               *ptr++ = '=';
+               *ptr++ = '"';
+               ptr = lutil_strcopy( ptr, b->a_peername_pat.bv_val );
+               *ptr++ = '"';
+       }
 
-       if ( b->a_peername_pat != NULL ) {
-               fprintf( stderr, " peername=%s", b->a_peername_pat );
+       if ( !BER_BVISEMPTY( &b->a_sockname_pat ) ) {
+               ptr = lutil_strcopy( ptr, " sockname" );
+               *ptr++ = '.';
+               ptr = lutil_strcopy( ptr, style_strings[b->a_sockname_style] );
+               *ptr++ = '=';
+               *ptr++ = '"';
+               ptr = lutil_strcopy( ptr, b->a_sockname_pat.bv_val );
+               *ptr++ = '"';
        }
 
-       if ( b->a_sockname_pat != NULL ) {
-               fprintf( stderr, " sockname=%s", b->a_sockname_pat );
+       if ( !BER_BVISEMPTY( &b->a_domain_pat ) ) {
+               ptr = lutil_strcopy( ptr, " domain" );
+               *ptr++ = '.';
+               ptr = lutil_strcopy( ptr, style_strings[b->a_domain_style] );
+               if ( b->a_domain_expand ) {
+                       ptr = lutil_strcopy( ptr, ",expand" );
+               }
+               *ptr++ = '=';
+               ptr = lutil_strcopy( ptr, b->a_domain_pat.bv_val );
        }
 
-       if ( b->a_domain_pat != NULL ) {
-               fprintf( stderr, " domain=%s", b->a_domain_pat );
+       if ( !BER_BVISEMPTY( &b->a_sockurl_pat ) ) {
+               ptr = lutil_strcopy( ptr, " sockurl" );
+               *ptr++ = '.';
+               ptr = lutil_strcopy( ptr, style_strings[b->a_sockurl_style] );
+               *ptr++ = '=';
+               *ptr++ = '"';
+               ptr = lutil_strcopy( ptr, b->a_sockurl_pat.bv_val );
+               *ptr++ = '"';
        }
 
-       if ( b->a_sockurl_pat != NULL ) {
-               fprintf( stderr, " sockurl=%s", b->a_sockurl_pat );
+       if ( !BER_BVISEMPTY( &b->a_set_pat ) ) {
+               ptr = lutil_strcopy( ptr, " set" );
+               *ptr++ = '.';
+               ptr = lutil_strcopy( ptr, style_strings[b->a_set_style] );
+               *ptr++ = '=';
+               *ptr++ = '"';
+               ptr = lutil_strcopy( ptr, b->a_set_pat.bv_val );
+               *ptr++ = '"';
        }
 
+#ifdef SLAP_DYNACL
+       if ( b->a_dynacl ) {
+               slap_dynacl_t   *da;
+
+               for ( da = b->a_dynacl; da; da = da->da_next ) {
+                       if ( da->da_unparse ) {
+                               struct berval bv = BER_BVNULL;
+                               (void)( *da->da_unparse )( da->da_private, &bv );
+                               assert( !BER_BVISNULL( &bv ) );
+                               ptr = lutil_strcopy( ptr, bv.bv_val );
+                               ch_free( bv.bv_val );
+                       }
+               }
+       }
+#else /* ! SLAP_DYNACL */
 #ifdef SLAPD_ACI_ENABLED
        if ( b->a_aci_at != NULL ) {
-               fprintf( stderr, " aci=%s", b->a_aci_at->ad_cname.bv_val );
+               ptr = lutil_strcopy( ptr, " aci=" );
+               ptr = lutil_strcopy( ptr, b->a_aci_at->ad_cname.bv_val );
        }
 #endif
+#endif /* SLAP_DYNACL */
 
        /* Security Strength Factors */
        if ( b->a_authz.sai_ssf ) {
-               fprintf( stderr, " ssf=%u",
+               ptr += sprintf( ptr, " ssf=%u", 
                        b->a_authz.sai_ssf );
        }
        if ( b->a_authz.sai_transport_ssf ) {
-               fprintf( stderr, " transport_ssf=%u",
+               ptr += sprintf( ptr, " transport_ssf=%u",
                        b->a_authz.sai_transport_ssf );
        }
        if ( b->a_authz.sai_tls_ssf ) {
-               fprintf( stderr, " tls_ssf=%u",
+               ptr += sprintf( ptr, " tls_ssf=%u",
                        b->a_authz.sai_tls_ssf );
        }
        if ( b->a_authz.sai_sasl_ssf ) {
-               fprintf( stderr, " sasl_ssf=%u",
+               ptr += sprintf( ptr, " sasl_ssf=%u",
                        b->a_authz.sai_sasl_ssf );
        }
 
-       fprintf( stderr, " %s%s",
-               b->a_dn_self ? "self" : "",
-               accessmask2str( b->a_access_mask, maskbuf ) );
+       *ptr++ = ' ';
+       if ( b->a_dn_self ) {
+               ptr = lutil_strcopy( ptr, "self" );
+       } else if ( b->a_realdn_self ) {
+               ptr = lutil_strcopy( ptr, "realself" );
+       }
+       ptr = lutil_strcopy( ptr, accessmask2str( b->a_access_mask, maskbuf, 0 ));
+       if ( !maskbuf[0] ) ptr--;
 
        if( b->a_type == ACL_BREAK ) {
-               fprintf( stderr, " break" );
+               ptr = lutil_strcopy( ptr, " break" );
 
        } else if( b->a_type == ACL_CONTINUE ) {
-               fprintf( stderr, " continue" );
+               ptr = lutil_strcopy( ptr, " continue" );
 
        } else if( b->a_type != ACL_STOP ) {
-               fprintf( stderr, " unknown-control" );
+               ptr = lutil_strcopy( ptr, " unknown-control" );
+       } else {
+               if ( !maskbuf[0] ) ptr = lutil_strcopy( ptr, " stop" );
        }
+       *ptr++ = '\n';
 
-       fprintf( stderr, "\n" );
+       return ptr;
 }
 
-
-static void
-print_acl( Backend *be, AccessControl *a )
+void
+acl_unparse( AccessControl *a, struct berval *bv )
 {
-       int             to = 0;
        Access  *b;
+       char    *ptr;
+       int     to = 0;
+
+       bv->bv_val = aclbuf;
+       bv->bv_len = 0;
 
-       fprintf( stderr, "%s ACL: access to",
-               be == NULL ? "Global" : "Backend" );
+       ptr = bv->bv_val;
 
-       if ( a->acl_dn_pat != NULL ) {
+       ptr = lutil_strcopy( ptr, "to" );
+       if ( !BER_BVISNULL( &a->acl_dn_pat ) ) {
                to++;
-               fprintf( stderr, " dn.%s=%s\n",
-                       style_strings[a->acl_dn_style], a->acl_dn_pat );
+               ptr = lutil_strcopy( ptr, " dn." );
+               if ( a->acl_dn_style == ACL_STYLE_BASE )
+                       ptr = lutil_strcopy( ptr, style_base );
+               else
+                       ptr = lutil_strcopy( ptr, style_strings[a->acl_dn_style] );
+               *ptr++ = '=';
+               *ptr++ = '"';
+               ptr = lutil_strcopy( ptr, a->acl_dn_pat.bv_val );
+               ptr = lutil_strcopy( ptr, "\"\n" );
        }
 
        if ( a->acl_filter != NULL ) {
+               struct berval   bv = BER_BVNULL;
+
                to++;
-               fprintf( stderr, " filter=" );
-               filter_print( a->acl_filter );
-               fprintf( stderr, "\n" );
+               filter2bv( a->acl_filter, &bv );
+               ptr = lutil_strcopy( ptr, " filter=\"" );
+               ptr = lutil_strcopy( ptr, bv.bv_val );
+               *ptr++ = '"';
+               *ptr++ = '\n';
+               ch_free( bv.bv_val );
        }
 
        if ( a->acl_attrs != NULL ) {
-               int     i, first = 1;
+               int     first = 1;
+               AttributeName *an;
                to++;
 
-               fprintf( stderr, " attrs=" );
-               for ( i = 0; a->acl_attrs[i] != NULL; i++ ) {
-                       if ( ! first ) {
-                               fprintf( stderr, "," );
+               ptr = lutil_strcopy( ptr, " attrs=" );
+               for ( an = a->acl_attrs; an && !BER_BVISNULL( &an->an_name ); an++ ) {
+                       if ( ! first ) *ptr++ = ',';
+                       if (an->an_oc) {
+                               *ptr++ = an->an_oc_exclude ? '!' : '@';
+                               ptr = lutil_strcopy( ptr, an->an_oc->soc_cname.bv_val );
+
+                       } else {
+                               ptr = lutil_strcopy( ptr, an->an_name.bv_val );
                        }
-                       fprintf( stderr, a->acl_attrs[i] );
                        first = 0;
                }
-               fprintf(  stderr, "\n" );
+               *ptr++ = '\n';
+       }
+
+       if ( !BER_BVISEMPTY( &a->acl_attrval ) ) {
+               to++;
+               ptr = lutil_strcopy( ptr, " val." );
+               if ( a->acl_attrval_style == ACL_STYLE_BASE &&
+                       a->acl_attrs[0].an_desc->ad_type->sat_syntax ==
+                               slap_schema.si_syn_distinguishedName )
+                       ptr = lutil_strcopy( ptr, style_base );
+               else
+                       ptr = lutil_strcopy( ptr, style_strings[a->acl_attrval_style] );
+               *ptr++ = '=';
+               *ptr++ = '"';
+               ptr = lutil_strcopy( ptr, a->acl_attrval.bv_val );
+               *ptr++ = '"';
+               *ptr++ = '\n';
        }
 
        if( !to ) {
-               fprintf( stderr, " *\n" );
+               ptr = lutil_strcopy( ptr, " *\n" );
        }
 
        for ( b = a->acl_access; b != NULL; b = b->a_next ) {
-               print_access( b );
+               ptr = access2text( b, ptr );
        }
-
-       fprintf( stderr, "\n" );
+       *ptr = '\0';
+       bv->bv_len = ptr - bv->bv_val;
 }
 
+#ifdef LDAP_DEBUG
+static void
+print_acl( Backend *be, AccessControl *a )
+{
+       struct berval bv;
+
+       acl_unparse( a, &bv );
+       fprintf( stderr, "%s ACL: access %s\n",
+               be == NULL ? "Global" : "Backend", bv.bv_val );
+}
 #endif /* LDAP_DEBUG */