]> git.sur5r.net Git - openldap/commitdiff
Import control ifdefs from HEAD
authorKurt Zeilenga <kurt@openldap.org>
Mon, 18 Feb 2002 19:49:56 +0000 (19:49 +0000)
committerKurt Zeilenga <kurt@openldap.org>
Mon, 18 Feb 2002 19:49:56 +0000 (19:49 +0000)
servers/slapd/back-bdb/init.c [new file with mode: 0644]
servers/slapd/controls.c [new file with mode: 0644]

diff --git a/servers/slapd/back-bdb/init.c b/servers/slapd/back-bdb/init.c
new file mode 100644 (file)
index 0000000..ccd08dc
--- /dev/null
@@ -0,0 +1,511 @@
+/* init.c - initialize bdb backend */
+/* $OpenLDAP$ */
+/*
+ * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
+ * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
+ */
+
+#include "portable.h"
+
+#include <stdio.h>
+#include <ac/string.h>
+#include <ac/unistd.h>
+#include <ac/stdlib.h>
+
+#include <lutil.h>
+
+#include "back-bdb.h"
+#include "external.h"
+
+static struct bdbi_database {
+       char *file;
+       char *name;
+       int type;
+       int flags;
+} bdbi_databases[] = {
+       { "id2entry" BDB_SUFFIX, "id2entry", DB_BTREE, 0 },
+#ifdef BDB_HIER
+       { "id2parent" BDB_SUFFIX, "id2parent", DB_BTREE, 0 },
+#else
+       { "dn2id" BDB_SUFFIX, "dn2id", DB_BTREE, 0 },
+#endif
+       { NULL, NULL, 0, 0 }
+};
+
+struct berval bdb_uuid = { 0, NULL };
+
+static int
+bdb_open( BackendInfo *bi )
+{
+       return 0;
+}
+
+#if 0
+static int
+bdb_destroy( BackendInfo *bi )
+{
+       return 0;
+}
+
+static int
+bdb_close( BackendInfo *bi )
+{
+       /* terminate the underlying database system */
+       return 0;
+}
+#endif
+
+static int
+bdb_db_init( BackendDB *be )
+{
+       struct bdb_info *bdb;
+
+       Debug( LDAP_DEBUG_ANY,
+               "bdb_db_init: Initializing BDB database\n",
+               0, 0, 0 );
+
+       /* indicate system schema supported */
+       be->be_flags |=
+#ifdef BDB_SUBENTRIES
+               SLAP_BFLAG_SUBENTRIES |
+#endif
+#ifdef BDB_ALIASES
+               SLAP_BFLAG_ALIASES |
+#endif
+               SLAP_BFLAG_REFERRALS;
+
+       /* allocate backend-database-specific stuff */
+       bdb = (struct bdb_info *) ch_calloc( 1, sizeof(struct bdb_info) );
+
+       /* DBEnv parameters */
+       bdb->bi_dbenv_home = ch_strdup( SLAPD_DEFAULT_DB_DIR );
+       bdb->bi_dbenv_xflags = 0;
+       bdb->bi_dbenv_mode = SLAPD_DEFAULT_DB_MODE;
+
+       bdb->bi_cache.c_maxsize = DEFAULT_CACHE_SIZE;
+
+#ifndef NO_THREADS
+#if 0
+       bdb->bi_lock_detect = DB_LOCK_NORUN;
+#else
+       bdb->bi_lock_detect = DB_LOCK_DEFAULT;
+#endif
+#endif
+
+       ldap_pvt_thread_mutex_init( &bdb->bi_database_mutex );
+       ldap_pvt_thread_mutex_init( &bdb->bi_lastid_mutex );
+       ldap_pvt_thread_mutex_init( &bdb->bi_cache.c_mutex );
+#ifdef BDB_HIER
+       ldap_pvt_thread_rdwr_init( &bdb->bi_tree_rdwr );
+#endif
+
+       be->be_private = bdb;
+       return 0;
+}
+
+#if 0 /* ifndef NO_THREADS */
+static void *lock_detect_task( void *arg )
+{
+       struct bdb_info *bdb = (struct bdb_info *) arg;
+
+       while( bdb->bi_dbenv != NULL ) {
+               int rc;
+               int aborted;
+               sleep( bdb->bi_lock_detect_seconds );
+
+               rc = LOCK_DETECT( bdb->bi_dbenv, 0,
+                       bdb->bi_lock_detect, &aborted );
+
+               if( rc != 0 ) {
+                       break;
+               }
+
+               Debug( LDAP_DEBUG_ANY,
+                       "bdb_lock_detect: aborted %d locks\n",
+                       aborted, 0, 0 );
+       }
+
+       return NULL;
+}
+#endif
+
+int
+bdb_bt_compare(
+       DB *db, 
+       const DBT *usrkey,
+       const DBT *curkey
+)
+{
+       unsigned char *u, *c;
+       int i;
+
+       u = usrkey->data;
+       c = curkey->data;
+
+#ifdef WORDS_BIGENDIAN
+       for( i = 0; i < sizeof(ID); i++)
+#else
+       for( i = sizeof(ID)-1; i >= 0; i--)
+#endif
+       {
+               if( u[i] - c[i] )
+                       return u[i] - c[i];
+       }
+       return 0;
+}
+
+static int
+bdb_db_open( BackendDB *be )
+{
+       int rc, i;
+       struct bdb_info *bdb = (struct bdb_info *) be->be_private;
+       u_int32_t flags;
+
+       Debug( LDAP_DEBUG_ARGS,
+               "bdb_db_open: %s\n",
+               be->be_suffix[0]->bv_val, 0, 0 );
+
+       /* we should check existance of dbenv_home and db_directory */
+
+       rc = db_env_create( &bdb->bi_dbenv, 0 );
+       if( rc != 0 ) {
+               Debug( LDAP_DEBUG_ANY,
+                       "bdb_db_open: db_env_create failed: %s (%d)\n",
+                       db_strerror(rc), rc, 0 );
+               return rc;
+       }
+
+       flags = DB_INIT_MPOOL | DB_THREAD | DB_CREATE
+               | DB_INIT_LOCK | DB_INIT_LOG | DB_INIT_TXN | DB_RECOVER;
+
+       bdb->bi_dbenv->set_errpfx( bdb->bi_dbenv, be->be_suffix[0]->bv_val );
+       bdb->bi_dbenv->set_errcall( bdb->bi_dbenv, bdb_errcall );
+#ifndef NO_THREADS
+       bdb->bi_dbenv->set_lk_detect( bdb->bi_dbenv, bdb->bi_lock_detect );
+#endif
+
+#ifdef BDB_SUBDIRS
+       {
+               char dir[MAXPATHLEN];
+               size_t len = strlen( bdb->bi_dbenv_home );
+
+               strcpy( dir, bdb->bi_dbenv_home );
+               strcat( &dir[len], BDB_TMP_SUBDIR );
+               
+               rc = bdb->bi_dbenv->set_tmp_dir( bdb->bi_dbenv, dir );
+               if( rc != 0 ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bdb_db_open: set_tmp_dir(%s) failed: %s (%d)\n",
+                               dir, db_strerror(rc), rc );
+                       return rc;
+               }
+
+               strcat( &dir[len], BDB_LG_SUBDIR );
+
+               rc = bdb->bi_dbenv->set_lg_dir( bdb->bi_dbenv, dir );
+               if( rc != 0 ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bdb_db_open: set_lg_dir(%s) failed: %s (%d)\n",
+                               dir, db_strerror(rc), rc );
+                       return rc;
+               }
+
+               strcat( &dir[len], BDB_DATA_SUBDIR );
+
+               rc = bdb->bi_dbenv->set_data_dir( bdb->bi_dbenv, dir );
+               if( rc != 0 ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bdb_db_open: set_data_dir(%s) failed: %s (%d)\n",
+                               dir, db_strerror(rc), rc );
+                       return rc;
+               }
+       }
+#endif
+
+       Debug( LDAP_DEBUG_TRACE,
+               "bdb_db_open: dbenv_open(%s)\n",
+               bdb->bi_dbenv_home, 0, 0);
+
+       rc = bdb->bi_dbenv->open( bdb->bi_dbenv,
+               bdb->bi_dbenv_home,
+               flags,
+               bdb->bi_dbenv_mode );
+       if( rc != 0 ) {
+               Debug( LDAP_DEBUG_ANY,
+                       "bdb_db_open: dbenv_open failed: %s (%d)\n",
+                       db_strerror(rc), rc, 0 );
+               return rc;
+       }
+
+       if( bdb->bi_dbenv_xflags != 0 ) {
+               rc = bdb->bi_dbenv->set_flags( bdb->bi_dbenv,
+                       bdb->bi_dbenv_xflags, 1);
+               if( rc != 0 ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bdb_db_open: dbenv_set_flags failed: %s (%d)\n",
+                               db_strerror(rc), rc, 0 );
+                       return rc;
+               }
+       }
+
+       flags = DB_THREAD | DB_CREATE | bdb->bi_db_opflags;
+
+       bdb->bi_databases = (struct bdb_db_info **) ch_malloc(
+               BDB_INDICES * sizeof(struct bdb_db_info *) );
+
+       /* open (and create) main database */
+       for( i = 0; bdbi_databases[i].name; i++ ) {
+               struct bdb_db_info *db;
+
+               db = (struct bdb_db_info *) ch_calloc(1, sizeof(struct bdb_db_info));
+
+               rc = db_create( &db->bdi_db, bdb->bi_dbenv, 0 );
+               if( rc != 0 ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bdb_db_open: db_create(%s) failed: %s (%d)\n",
+                               bdb->bi_dbenv_home, db_strerror(rc), rc );
+                       return rc;
+               }
+
+               if( i == BDB_ID2ENTRY ) {
+                       rc = db->bdi_db->set_bt_compare( db->bdi_db,
+                               bdb_bt_compare );
+                       rc = db->bdi_db->set_pagesize( db->bdi_db,
+                               BDB_ID2ENTRY_PAGESIZE );
+               } else {
+#ifdef BDB_HIER
+                       rc = db->bdi_db->set_bt_compare( db->bdi_db,
+                               bdb_bt_compare );
+#elif defined(BDB_IDL_MULTI)
+                       rc = db->bdi_db->set_flags( db->bdi_db, 
+                               DB_DUP | DB_DUPSORT );
+                       rc = db->bdi_db->set_dup_compare( db->bdi_db,
+                               bdb_bt_compare );
+#endif
+                       rc = db->bdi_db->set_pagesize( db->bdi_db,
+                               BDB_PAGESIZE );
+               }
+
+               rc = db->bdi_db->open( db->bdi_db,
+                       bdbi_databases[i].file,
+               /*      bdbi_databases[i].name, */ NULL,
+                       bdbi_databases[i].type,
+                       bdbi_databases[i].flags | flags,
+                       bdb->bi_dbenv_mode );
+
+               if( rc != 0 ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bdb_db_open: db_open(%s) failed: %s (%d)\n",
+                               bdb->bi_dbenv_home, db_strerror(rc), rc );
+                       return rc;
+               }
+
+               db->bdi_name = bdbi_databases[i].name;
+               bdb->bi_databases[i] = db;
+       }
+
+       bdb->bi_databases[i] = NULL;
+       bdb->bi_ndatabases = i;
+
+       /* get nextid */
+       rc = bdb_last_id( be, NULL );
+       if( rc != 0 ) {
+               Debug( LDAP_DEBUG_ANY,
+                       "bdb_db_open: last_id(%s) failed: %s (%d)\n",
+                       bdb->bi_dbenv_home, db_strerror(rc), rc );
+               return rc;
+       }
+
+       /* <insert> open (and create) index databases */
+#ifdef BDB_HIER
+       rc = bdb_build_tree( be );
+#endif
+
+#if 0 /* ifndef NO_THREADS */
+       if( bdb->bi_lock_detect != DB_LOCK_NORUN ) {
+               /* listener as a separate THREAD */
+               rc = ldap_pvt_thread_create( &bdb->bi_lock_detect_tid,
+                       1, lock_detect_task, bdb );
+       }
+#endif
+       return 0;
+}
+
+static int
+bdb_db_close( BackendDB *be )
+{
+       int rc;
+       struct bdb_info *bdb = (struct bdb_info *) be->be_private;
+       struct bdb_db_info *db;
+
+       while( bdb->bi_ndatabases-- ) {
+               db = bdb->bi_databases[bdb->bi_ndatabases];
+               rc = db->bdi_db->close( db->bdi_db, 0 );
+               /* Lower numbered names are not strdup'd */
+               if( bdb->bi_ndatabases >= BDB_NDB )
+                       free( db->bdi_name );
+               free( db );
+       }
+       free( bdb->bi_databases );
+       bdb_attr_index_destroy( bdb->bi_attrs );
+
+       bdb_cache_release_all (&bdb->bi_cache);
+
+       return 0;
+}
+
+static int
+bdb_db_destroy( BackendDB *be )
+{
+       int rc;
+       struct bdb_info *bdb = (struct bdb_info *) be->be_private;
+
+       /* close db environment */
+       if( bdb->bi_dbenv ) {
+               /* force a checkpoint */
+               rc = TXN_CHECKPOINT( bdb->bi_dbenv, 0, 0, DB_FORCE );
+               if( rc != 0 ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bdb_db_destroy: txn_checkpoint failed: %s (%d)\n",
+                               db_strerror(rc), rc, 0 );
+               }
+
+               bdb_cache_release_all (&bdb->bi_cache);
+
+               rc = bdb->bi_dbenv->close( bdb->bi_dbenv, 0 );
+               bdb->bi_dbenv = NULL;
+               if( rc != 0 ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bdb_db_destroy: close failed: %s (%d)\n",
+                               db_strerror(rc), rc, 0 );
+                       return rc;
+               }
+       }
+
+       return 0;
+}
+
+#ifdef SLAPD_BDB_DYNAMIC
+int back_bdb_LTX_init_module( int argc, char *argv[] ) {
+       BackendInfo bi;
+
+       memset( &bi, '\0', sizeof(bi) );
+       bi.bi_type = "bdb";
+       bi.bi_init = bdb_initialize;
+
+       backend_add( &bi );
+       return 0;
+}
+#endif /* SLAPD_BDB_DYNAMIC */
+
+int
+bdb_initialize(
+       BackendInfo     *bi
+)
+{
+       static char *controls[] = {
+               LDAP_CONTROL_MANAGEDSAIT,
+#ifdef LDAP_CONTROL_SUBENTRIES
+               LDAP_CONTROL_SUBENTRIES,
+#endif
+#ifdef LDAP_CONTROL_NOOP
+               LDAP_CONTROL_NOOP,
+#endif
+               NULL
+       };
+
+       bi->bi_controls = controls;
+
+       /* initialize the underlying database system */
+       Debug( LDAP_DEBUG_TRACE, "bdb_open: initialize BDB backend\n",
+               0, 0, 0 );
+
+       {       /* version check */
+               int major, minor, patch;
+               char *version = db_version( &major, &minor, &patch );
+
+               if( major != DB_VERSION_MAJOR ||
+                       minor != DB_VERSION_MINOR ||
+                       patch < DB_VERSION_PATCH )
+               {
+                       Debug( LDAP_DEBUG_ANY,
+                               "bdb_open: version mismatch\n"
+                               "\texpected: " DB_VERSION_STRING "\n"
+                               "\tgot: %s \n", version, 0, 0 );
+               }
+
+               Debug( LDAP_DEBUG_ANY, "bdb_open: %s\n",
+                       version, 0, 0 );
+       }
+
+#if 0
+       db_env_set_func_malloc( ch_malloc );
+       db_env_set_func_realloc( ch_realloc );
+       db_env_set_func_free( ch_free );
+#endif
+
+       db_env_set_func_yield( ldap_pvt_thread_yield );
+
+       {
+               static char uuidbuf[40];
+
+               bdb_uuid.bv_len = lutil_uuidstr( uuidbuf, sizeof( uuidbuf ));
+               bdb_uuid.bv_val = uuidbuf;
+       }
+
+       bi->bi_open = 0;
+       bi->bi_close = 0;
+       bi->bi_config = 0;
+       bi->bi_destroy = 0;
+
+       bi->bi_db_init = bdb_db_init;
+       bi->bi_db_config = bdb_db_config;
+       bi->bi_db_open = bdb_db_open;
+       bi->bi_db_close = bdb_db_close;
+       bi->bi_db_destroy = bdb_db_destroy;
+
+       bi->bi_op_add = bdb_add;
+       bi->bi_op_bind = bdb_bind;
+       bi->bi_op_compare = bdb_compare;
+       bi->bi_op_delete = bdb_delete;
+       bi->bi_op_modify = bdb_modify;
+       bi->bi_op_modrdn = bdb_modrdn;
+       bi->bi_op_search = bdb_search;
+
+       bi->bi_op_unbind = 0;
+       bi->bi_op_abandon = 0;
+
+       bi->bi_extended = bdb_extended;
+
+#if 0
+       /*
+        * these routines (and their callers) are not yet designed
+        * to work with transaction.  Using them may cause deadlock.
+        */
+       bi->bi_acl_group = bdb_group;
+       bi->bi_acl_attribute = bdb_attribute;
+#else
+       bi->bi_acl_group = 0;
+       bi->bi_acl_attribute = 0;
+#endif
+
+       bi->bi_chk_referrals = bdb_referrals;
+       bi->bi_entry_release_rw = bdb_entry_release;
+
+       /*
+        * hooks for slap tools
+        */
+       bi->bi_tool_entry_open = bdb_tool_entry_open;
+       bi->bi_tool_entry_close = bdb_tool_entry_close;
+       bi->bi_tool_entry_first = bdb_tool_entry_next;
+       bi->bi_tool_entry_next = bdb_tool_entry_next;
+       bi->bi_tool_entry_get = bdb_tool_entry_get;
+       bi->bi_tool_entry_put = bdb_tool_entry_put;
+       bi->bi_tool_entry_reindex = bdb_tool_entry_reindex;
+       bi->bi_tool_sync = 0;
+
+       bi->bi_connection_init = 0;
+       bi->bi_connection_destroy = 0;
+
+       return 0;
+}
diff --git a/servers/slapd/controls.c b/servers/slapd/controls.c
new file mode 100644 (file)
index 0000000..7c3bf61
--- /dev/null
@@ -0,0 +1,444 @@
+/* $OpenLDAP$ */
+/* 
+ * Copyright 1999-2002 The OpenLDAP Foundation.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms are permitted only
+ * as authorized by the OpenLDAP Public License.  A copy of this
+ * license is available at http://www.OpenLDAP.org/license.html or
+ * in file LICENSE in the top-level directory of the distribution.
+ */
+#include "portable.h"
+
+#include <stdio.h>
+
+#include <ac/string.h>
+#include <ac/socket.h>
+
+#include "slap.h"
+
+#include "../../libraries/liblber/lber-int.h"
+
+#define SLAP_CTRL_FRONTEND     0x80000000U
+
+#define SLAP_CTRL_OPFLAGS      0x0000FFFFU
+#define SLAP_CTRL_ABANDON      0x00000001U
+#define SLAP_CTRL_ADD          0x00002002U
+#define SLAP_CTRL_BIND         0x00000004U
+#define SLAP_CTRL_COMPARE      0x00001008U
+#define SLAP_CTRL_DELETE       0x00002010U
+#define SLAP_CTRL_MODIFY       0x00002020U
+#define SLAP_CTRL_RENAME       0x00002040U
+#define SLAP_CTRL_SEARCH       0x00001080U
+#define SLAP_CTRL_UNBIND       0x00000100U
+
+#define SLAP_CTRL_INTROGATE    (SLAP_CTRL_COMPARE|SLAP_CTRL_SEARCH)
+#define SLAP_CTRL_UPDATE \
+       (SLAP_CTRL_ADD|SLAP_CTRL_DELETE|SLAP_CTRL_MODIFY|SLAP_CTRL_RENAME)
+#define SLAP_CTRL_ACCESS       (SLAP_CTRL_INTROGATE|SLAP_CTRL_UPDATE)
+
+typedef int (SLAP_CTRL_PARSE_FN) LDAP_P((
+       Connection *conn,
+       Operation *op,
+       LDAPControl *ctrl,
+       const char **text ));
+
+static SLAP_CTRL_PARSE_FN parseManageDSAit;
+static SLAP_CTRL_PARSE_FN parseSubentries;
+static SLAP_CTRL_PARSE_FN parseNoOp;
+
+static struct slap_control {
+       char *sc_oid;
+       slap_mask_t sc_mask;
+       char **sc_extendedops;
+       SLAP_CTRL_PARSE_FN *sc_parse;
+
+} supportedControls[] = {
+       { LDAP_CONTROL_MANAGEDSAIT,
+               SLAP_CTRL_ACCESS, NULL,
+               parseManageDSAit },
+#ifdef LDAP_CONTROL_SUBENTRIES
+       { LDAP_CONTROL_SUBENTRIES,
+               SLAP_CTRL_SEARCH, NULL,
+               parseSubentries },
+#endif
+#ifdef LDAP_CONTROL_NOOP
+       { LDAP_CONTROL_NOOP,
+               SLAP_CTRL_UPDATE, NULL,
+               parseNoOp },
+#endif
+       { NULL }
+};
+
+char *
+get_supported_ctrl(int index)
+{
+       return supportedControls[index].sc_oid;
+}
+
+static struct slap_control *
+find_ctrl( const char *oid )
+{
+       int i;
+       for( i=0; supportedControls[i].sc_oid; i++ ) {
+               if( strcmp( oid, supportedControls[i].sc_oid ) == 0 ) {
+                       return &supportedControls[i];
+               }
+       }
+       return NULL;
+}
+
+int get_ctrls(
+       Connection *conn,
+       Operation *op,
+       int sendres )
+{
+       int nctrls;
+       ber_tag_t tag;
+       ber_len_t len;
+       char *opaque;
+       BerElement *ber = op->o_ber;
+       struct slap_control *sc;
+       int rc = LDAP_SUCCESS;
+       const char *errmsg = NULL;
+
+       len = ber_pvt_ber_remaining(ber);
+
+       if( len == 0) {
+               /* no controls */
+               rc = LDAP_SUCCESS;
+               return rc;
+       }
+
+       if(( tag = ber_peek_tag( ber, &len )) != LDAP_TAG_CONTROLS ) {
+               if( tag == LBER_ERROR ) {
+                       rc = SLAPD_DISCONNECT;
+                       errmsg = "unexpected data in PDU";
+               }
+
+               goto return_results;
+       }
+
+#ifdef NEW_LOGGING
+       LDAP_LOG(( "operation", LDAP_LEVEL_ENTRY,
+               "get_ctrls: conn %d\n", conn->c_connid ));
+#else
+       Debug( LDAP_DEBUG_TRACE, "=> get_ctrls\n", 0, 0, 0 );
+#endif
+       if( op->o_protocol < LDAP_VERSION3 ) {
+               rc = SLAPD_DISCONNECT;
+               errmsg = "controls require LDAPv3";
+               goto return_results;
+       }
+
+       /* one for first control, one for termination */
+       op->o_ctrls = ch_malloc( 2 * sizeof(LDAPControl *) );
+
+#if 0
+       if( op->ctrls == NULL ) {
+               rc = LDAP_NO_MEMORY;
+               errmsg = "no memory";
+               goto return_results;
+       }
+#endif
+
+       op->o_ctrls[nctrls=0] = NULL;
+
+       /* step through each element */
+       for( tag = ber_first_element( ber, &len, &opaque );
+               tag != LBER_ERROR;
+               tag = ber_next_element( ber, &len, opaque ) )
+       {
+               LDAPControl *c;
+               LDAPControl **tctrls;
+
+               c = ch_calloc( 1, sizeof(LDAPControl) );
+
+#if 0
+               if( c == NULL ) {
+                       ldap_controls_free(op->o_ctrls);
+                       op->o_ctrls = NULL;
+
+                       rc = LDAP_NO_MEMORY;
+                       errmsg = "no memory";
+                       goto return_results;
+               }
+#endif
+
+               /* allocate pointer space for current controls (nctrls)
+                * + this control + extra NULL
+                */
+               tctrls = ch_realloc( op->o_ctrls,
+                       (nctrls+2) * sizeof(LDAPControl *));
+
+#if 0
+               if( tctrls == NULL ) {
+                       ch_free( c );
+                       ldap_controls_free(op->o_ctrls);
+                       op->o_ctrls = NULL;
+
+                       rc = LDAP_NO_MEMORY;
+                       errmsg = "no memory";
+                       goto return_results;
+               }
+#endif
+               op->o_ctrls = tctrls;
+
+               op->o_ctrls[nctrls++] = c;
+               op->o_ctrls[nctrls] = NULL;
+
+               tag = ber_scanf( ber, "{a" /*}*/, &c->ldctl_oid );
+
+               if( tag == LBER_ERROR ) {
+#ifdef NEW_LOGGING
+                       LDAP_LOG(( "operation", LDAP_LEVEL_INFO,
+                               "get_ctrls: conn %d get OID failed.\n",
+                               conn->c_connid ));
+#else
+                       Debug( LDAP_DEBUG_TRACE, "=> get_ctrls: get oid failed.\n",
+                               0, 0, 0 );
+#endif
+                       ldap_controls_free( op->o_ctrls );
+                       op->o_ctrls = NULL;
+                       rc = SLAPD_DISCONNECT;
+                       errmsg = "decoding controls error";
+                       goto return_results;
+               }
+
+               tag = ber_peek_tag( ber, &len );
+
+               if( tag == LBER_BOOLEAN ) {
+                       ber_int_t crit;
+                       tag = ber_scanf( ber, "b", &crit );
+
+                       if( tag == LBER_ERROR ) {
+#ifdef NEW_LOGGING
+                               LDAP_LOG(( "operation", LDAP_LEVEL_INFO,
+                                       "get_ctrls: conn %d get crit failed.\n",
+                                       conn->c_connid ));
+#else
+                               Debug( LDAP_DEBUG_TRACE, "=> get_ctrls: get crit failed.\n",
+                                       0, 0, 0 );
+#endif
+                               ldap_controls_free( op->o_ctrls );
+                               op->o_ctrls = NULL;
+                               rc = SLAPD_DISCONNECT;
+                               errmsg = "decoding controls error";
+                               goto return_results;
+                       }
+
+                       c->ldctl_iscritical = (crit != 0);
+                       tag = ber_peek_tag( ber, &len );
+               }
+
+               if( tag == LBER_OCTETSTRING ) {
+                       tag = ber_scanf( ber, "o", &c->ldctl_value );
+
+                       if( tag == LBER_ERROR ) {
+#ifdef NEW_LOGGING
+                               LDAP_LOG(( "operation", LDAP_LEVEL_INFO, "get_ctrls: conn %d: "
+                                       "%s (%scritical): get value failed.\n",
+                                       conn->c_connid,
+                                       c->ldctl_oid ? c->ldctl_oid : "(NULL)",
+                                       c->ldctl_iscritical ? "" : "non" ));
+#else
+                               Debug( LDAP_DEBUG_TRACE, "=> get_ctrls: conn %d: "
+                                       "%s (%scritical): get value failed.\n",
+                                       conn->c_connid,
+                                       c->ldctl_oid ? c->ldctl_oid : "(NULL)",
+                                       c->ldctl_iscritical ? "" : "non" );
+#endif
+                               ldap_controls_free( op->o_ctrls );
+                               op->o_ctrls = NULL;
+                               rc = SLAPD_DISCONNECT;
+                               errmsg = "decoding controls error";
+                               goto return_results;
+                       }
+               }
+
+#ifdef NEW_LOGGING
+               LDAP_LOG(( "operation", LDAP_LEVEL_INFO,
+                       "get_ctrls: conn %d oid=\"%s\" (%scritical)\n",
+                       conn->c_connid,
+                       c->ldctl_oid ? c->ldctl_oid : "(NULL)",
+                       c->ldctl_iscritical ? "" : "non" ));
+#else
+               Debug( LDAP_DEBUG_TRACE, "=> get_ctrls: oid=\"%s\" (%scritical)\n",
+                       c->ldctl_oid ? c->ldctl_oid : "(NULL)",
+                       c->ldctl_iscritical ? "" : "non",
+                       0 );
+#endif
+
+               sc = find_ctrl( c->ldctl_oid );
+               if( sc != NULL ) {
+                       /* recognized control */
+                       slap_mask_t tagmask;
+                       switch( op->o_tag ) {
+                       case LDAP_REQ_ADD:
+                               tagmask = SLAP_CTRL_ADD;
+                               break;
+                       case LDAP_REQ_BIND:
+                               tagmask = SLAP_CTRL_BIND;
+                               break;
+                       case LDAP_REQ_COMPARE:
+                               tagmask = SLAP_CTRL_COMPARE;
+                               break;
+                       case LDAP_REQ_DELETE:
+                               tagmask = SLAP_CTRL_DELETE;
+                               break;
+                       case LDAP_REQ_MODIFY:
+                               tagmask = SLAP_CTRL_MODIFY;
+                               break;
+                       case LDAP_REQ_RENAME:
+                               tagmask = SLAP_CTRL_RENAME;
+                               break;
+                       case LDAP_REQ_SEARCH:
+                               tagmask = SLAP_CTRL_SEARCH;
+                               break;
+                       case LDAP_REQ_UNBIND:
+                               tagmask = SLAP_CTRL_UNBIND;
+                               break;
+                       case LDAP_REQ_EXTENDED:
+                               /* FIXME: check list of extended operations */
+                               tagmask = ~0U;
+                               break;
+                       default:
+                               rc = LDAP_OTHER;
+                               errmsg = "controls internal error";
+                               goto return_results;
+                       }
+
+                       if (( sc->sc_mask & tagmask ) == tagmask ) {
+                               /* available extension */
+
+                               if( !sc->sc_parse ) {
+                                       rc = LDAP_OTHER;
+                                       errmsg = "not yet implemented";
+                                       goto return_results;
+                               }
+
+                               rc = sc->sc_parse( conn, op, c, &errmsg );
+
+                               if( rc != LDAP_SUCCESS ) goto return_results;
+
+                               if( sc->sc_mask & SLAP_CTRL_FRONTEND ) {
+                                       /* kludge to disable backend_control() check */
+                                       c->ldctl_iscritical = 0;
+                               }
+
+                       } else if( c->ldctl_iscritical ) {
+                               /* unavailable CRITICAL control */
+                               rc = LDAP_UNAVAILABLE_CRITICAL_EXTENSION;
+                               errmsg = "critical extension is unavailable";
+                               goto return_results;
+                       }
+
+               } else if( c->ldctl_iscritical ) {
+                       /* unrecognized CRITICAL control */
+                       rc = LDAP_UNAVAILABLE_CRITICAL_EXTENSION;
+                       errmsg = "critical extension is not recognized";
+                       goto return_results;
+               }
+       }
+
+return_results:
+#ifdef NEW_LOGGING
+       LDAP_LOG(( "operation", LDAP_LEVEL_RESULTS,
+               "get_ctrls: conn=%d     n=%d rc=%d err=%s\n",
+               conn->c_connid, nctrls, rc, errmsg ? errmsg : "" ));
+#else
+       Debug( LDAP_DEBUG_TRACE, "<= get_ctrls: n=%d rc=%d err=%s\n",
+               nctrls, rc, errmsg ? errmsg : "");
+#endif
+
+       if( sendres && rc != LDAP_SUCCESS ) {
+               if( rc == SLAPD_DISCONNECT ) {
+                       send_ldap_disconnect( conn, op, LDAP_PROTOCOL_ERROR, errmsg );
+               } else {
+                       send_ldap_result( conn, op, rc,
+                               NULL, errmsg, NULL, NULL );
+               }
+       }
+
+       return rc;
+}
+
+static int parseManageDSAit (
+       Connection *conn,
+       Operation *op,
+       LDAPControl *ctrl,
+       const char **text )
+{
+       if ( op->o_managedsait != SLAP_NO_CONTROL ) {
+               *text = "manageDSAit control specified multiple times";
+               return LDAP_PROTOCOL_ERROR;
+       }
+
+       if ( ctrl->ldctl_value.bv_len ) {
+               *text = "manageDSAit control value not empty";
+               return LDAP_PROTOCOL_ERROR;
+       }
+
+       op->o_managedsait = ctrl->ldctl_iscritical
+               ? SLAP_CRITICAL_CONTROL
+               : SLAP_NONCRITICAL_CONTROL;
+
+       return LDAP_SUCCESS;
+}
+
+#ifdef LDAP_CONTROL_SUBENTRIES
+static int parseSubentries (
+       Connection *conn,
+       Operation *op,
+       LDAPControl *ctrl,
+       const char **text )
+{
+       if ( op->o_subentries != SLAP_NO_CONTROL ) {
+               *text = "subentries control specified multiple times";
+               return LDAP_PROTOCOL_ERROR;
+       }
+
+       /* FIXME: should use BER library */
+       if( ( ctrl->ldctl_value.bv_len != 3 )
+               && ( ctrl->ldctl_value.bv_val[0] != 0x01 )
+               && ( ctrl->ldctl_value.bv_val[1] != 0x01 ))
+       {
+               *text = "subentries control value encoding is bogus";
+               return LDAP_PROTOCOL_ERROR;
+       }
+
+       op->o_subentries = ctrl->ldctl_iscritical
+               ? SLAP_CRITICAL_CONTROL
+               : SLAP_NONCRITICAL_CONTROL;
+
+       op->o_subentries_visibility = (ctrl->ldctl_value.bv_val[2] != 0x00);
+
+       return LDAP_SUCCESS;
+}
+#endif
+
+#ifdef LDAP_CONTROL_NOOP
+static int parseNoOp (
+       Connection *conn,
+       Operation *op,
+       LDAPControl *ctrl,
+       const char **text )
+{
+       if ( op->o_noop != SLAP_NO_CONTROL ) {
+               *text = "noop control specified multiple times";
+               return LDAP_PROTOCOL_ERROR;
+       }
+
+       if ( ctrl->ldctl_value.bv_len ) {
+               *text = "noop control value not empty";
+               return LDAP_PROTOCOL_ERROR;
+       }
+
+       op->o_noop = ctrl->ldctl_iscritical
+               ? SLAP_CRITICAL_CONTROL
+               : SLAP_NONCRITICAL_CONTROL;
+
+       return LDAP_SUCCESS;
+}
+#endif
+