[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
(ITS#3861) Crash when trying to change password (with BACK-SQL)
Full_Name: Preston A. Elder
Version: 2.3.4
OS: Linux (2.6.12)
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (71.241.153.69)
I'm trying to change my user's password via. a web script, openldap keeps
aborting, in the same place.
The user is valid. I will paste 2 VERY verbose dumps. The first is of the app
requesting information about my user (uid=prez). As you can see, it succeeds,
and returns the info. The second is of the actual attempt to modify the
password. This causes the assertion to trigger.
== BEGIN DUMP 1 ===============================================
connection_get(10)
connection_get(10): got connid=1
connection_read(10): checking for input on id=1
ber_get_next
ldap_read: want=8, got=8
0000: 30 33 02 01 04 63 2e 04 03...c..
ldap_read: want=45, got=45
0000: 0e 64 63 3d 67 6f 74 68 2c 64 63 3d 6e 65 74 0a .dc=goth,dc=net.
0010: 01 02 0a 01 00 02 01 00 02 01 00 01 01 00 a3 0b ................
0020: 04 03 75 69 64 04 04 70 72 65 7a 30 00 ..uid..prez0.
ber_get_next: tag 0x30 len 51 contents:
ber_dump: buf=0x8020d400 ptr=0x8020d400 end=0x8020d433 len=51
0000: 02 01 04 63 2e 04 0e 64 63 3d 67 6f 74 68 2c 64 ...c...dc=goth,d
0010: 63 3d 6e 65 74 0a 01 02 0a 01 00 02 01 00 02 01 c=net...........
0020: 00 01 01 00 a3 0b 04 03 75 69 64 04 04 70 72 65 ........uid..pre
0030: 7a 30 00 z0.
ber_get_next
ldap_read: want=8 error=Resource temporarily unavailable
ber_get_next on fd 10 failed errno=11 (Resource temporarily unavailable)
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 active_threads=0 tvp=NULL
do_search
ber_scanf fmt ({miiiib) ber:
ber_dump: buf=0x8020d400 ptr=0x8020d403 end=0x8020d433 len=48
0000: 63 2e 04 0e 64 63 3d 67 6f 74 68 2c 64 63 3d 6e c...dc=goth,dc=n
0010: 65 74 0a 01 02 0a 01 00 02 01 00 02 01 00 01 01 et..............
0020: 00 a3 0b 04 03 75 69 64 04 04 70 72 65 7a 30 00 .....uid..prez0.
>>> dnPrettyNormal: <dc=goth,dc=net>
=> ldap_bv2dn(dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <dc=goth,dc=net>, <dc=goth,dc=net>
SRCH "dc=goth,dc=net" 2 0 0 0 0
begin get_filter
EQUALITY
ber_scanf fmt ({mm}) ber:
ber_dump: buf=0x8020d400 ptr=0x8020d424 end=0x8020d433 len=15
0000: a3 0b 04 03 75 69 64 04 04 70 72 65 7a 30 00 ....uid..prez0.
end get_filter 0
filter: (uid=prez)
ber_scanf fmt ({M}}) ber:
ber_dump: buf=0x8020d400 ptr=0x8020d431 end=0x8020d433 len=2
0000: 00 00 ..
attrs:
==> limits_get: conn=1 op=3 dn="uid=prez,ou=people,dc=goth,dc=net"
==>backsql_search(): base="dc=goth,dc=net", filter="(uid=prez)", scope=2,
deref=0, attrsonly=0, attributes to load: all
==>backsql_get_db_conn()
<==backsql_get_db_conn()
==>backsql_dn2id("dc=goth,dc=net") matched expected
backsql_dn2id("dc=goth,dc=net"): id_query "SELECT id,keyval,oc_map_id,dn FROM
ldap_entries WHERE upper(dn)=upper(?)"
backsql_dn2id("dc=goth,dc=net"): id=1 keyval=1 oc_id=1 dn=dc=goth,dc=net
>>> dnPrettyNormal: <dc=goth,dc=net>
=> ldap_bv2dn(dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <dc=goth,dc=net>, <dc=goth,dc=net>
<==backsql_dn2id("dc=goth,dc=net"): err=0
==>backsql_id2entry()
backsql_id2entry(): retrieving all attributes
==>backsql_get_attr_vals(): oc="dcObject" attr="dc" keyval=1
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="dcObject" attr="objectClass" keyval=1
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
<==backsql_id2entry()
==>backsql_oc_get_candidates(): oc="gnUser"
==>backsql_srch_query()
==>backsql_process_filter()
==>backsql_process_filter_attr(uid)
<==backsql_process_filter_attr(uid)
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,gnUser.id,text('gnUser') AS objectClass,ldap_entries.dn AS dn
FROM ldap_entries,gnUser WHERE gnUser.id=ldap_entries.keyval AND
ldap_entries.oc_map_id=? AND 9=9 AND (upper(gnUser.userid)='PREZ')
Constructed query: SELECT DISTINCT ldap_entries.id,gnUser.id,text('gnUser') AS
objectClass,ldap_entries.dn AS dn Fd=? AND 9=9 AND
(upper(gnUser.userid)='PREZ')
id: '6'
>>> dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>
=> ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>,
<uid=prez,ou=people,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=9, keyval=7
dn="uid=prez,ou=people,dc=goth,dc=net"
<==backsql_oc_get_candidates(): 1
==>backsql_oc_get_candidates(): oc="dcObject"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,dcObject.id,text('dcObject') AS objectClass,ldap_entries.dn AS
dn FROM ldap_entries,dcObject WHERE dcObject.id=ldap_entries.keyval AND
ldap_entries.oc_map_id=? AND 9=9 AND 7=7
Constructed query: SELECT DISTINCT ldap_entries.id,dcObject.id,text('dcObject')
AS objectClass,ldap_entries.dn AS dn FROM ldap_entries,dcObject WHERE
dcObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND 7=7
id: '1'
>>> dnPrettyNormal: <dc=goth,dc=net>
=> ldap_bv2dn(dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <dc=goth,dc=net>, <dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=1, keyval=1 dn="dc=goth,dc=net"
<==backsql_oc_get_candidates(): 1
==>backsql_oc_get_candidates(): oc="posixGroup"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,posixGroup.id,text('posixGroup') AS objectClass,ldap_entries.dn
AS dn FROM ldap_entries,posixGroup WHERE posixGroup.id=ldap_entries.keyval AND
ldap_entries.oc_map_id=? AND 9=9 AND 7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,posixGroup.id,text('posixGroup') AS objectClass,ldap_entries.dn
AS dn FROM ldap_entries,posixGroup WHERE posixGroup.id=ldap_entries.keyval AND
ldap_entries.oc_map_id=? AND 9=9 AND 7=7
id: '3'
>>> dnPrettyNormal: <cn=admin,ou=groups,dc=goth,dc=net>
=> ldap_bv2dn(cn=admin,ou=groups,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(cn=admin,ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=admin,ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=admin,ou=groups,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <cn=admin,ou=groups,dc=goth,dc=net>,
<cn=admin,ou=groups,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=7, keyval=1
dn="cn=admin,ou=groups,dc=goth,dc=net"
>>> dnPrettyNormal: <cn=goth.net,ou=groups,dc=goth,dc=net>
=> ldap_bv2dn(cn=goth.net,ou=groups,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(cn=goth.net,ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=goth.net,ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=goth.net,ou=groups,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <cn=goth.net,ou=groups,dc=goth,dc=net>,
<cn=goth.net,ou=groups,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=8, keyval=2
dn="cn=goth.net,ou=groups,dc=goth,dc=net"
<==backsql_oc_get_candidates(): 2
==>backsql_oc_get_candidates(): oc="posixAccount"
==>backsql_srch_query()
==>backsql_process_filter()
==>backsql_process_filter_attr(uid)
<==backsql_process_filter_attr(uid)
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,posixAccount.id,text('posixAccount') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,posixAccount WHERE
posixAccount.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(posixAccount.userid)='PREZ')
Constructed query: SELECT DISTINCT
ldap_entries.id,posixAccount.id,text('posixAccount') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,posixAccount WHERE
posixAccount.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(posixAccount.userid)='PREZ')
id: '9'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="gnPendingUser"
==>backsql_srch_query()
==>backsql_process_filter()
==>backsql_process_filter_attr(uid)
<==backsql_process_filter_attr(uid)
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,gnPendingUser.id,text('gnPendingUser') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnPendingUser WHERE
gnPendingUser.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(gnPendingUser.userid)='PREZ')
Constructed query: SELECT DISTINCT
ldap_entries.id,gnPendingUser.id,text('gnPendingUser') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnPendingUser WHERE
gnPendingUser.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(gnPendingUser.userid)='PREZ')
id: '7'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="shadowAccount"
==>backsql_srch_query()
==>backsql_process_filter()
==>backsql_process_filter_attr(uid)
<==backsql_process_filter_attr(uid)
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,shadowAccount.id,text('shadowAccount') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,shadowAccount WHERE
shadowAccount.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(shadowAccount.userid)='PREZ')
Constructed query: SELECT DISTINCT
ldap_entries.id,shadowAccount.id,text('shadowAccount') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,shadowAccount WHERE
shadowAccount.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(shadowAccount.userid)='PREZ')
id: '10'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="gnOrganization"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,gnOrganization.id,text('gnOrganization') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnOrganization WHERE
gnOrganization.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,gnOrganization.id,text('gnOrganization') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnOrganization WHERE
gnOrganization.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
7=7
id: '4'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="gnSecurityObject"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT
DISTecurityObject.id,text('gnSecurityObject') AS objectClass,ldap_entries.dn AS
dn FROM ldap_entries,gnSecurityObject WHERE
gnSecurityObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,gnSecurityObject.id,text('gnSecurityObject') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnSecurityObject WHERE
gnSecurityObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
7=7
id: '5'
>>> dnPrettyNormal: <cn=root,ou=dsa,dc=goth,dc=net>
=> ldap_bv2dn(cn=root,ou=dsa,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(cn=root,ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=root,ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=root,ou=dsa,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <cn=root,ou=dsa,dc=goth,dc=net>,
<cn=root,ou=dsa,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=5, keyval=1
dn="cn=root,ou=dsa,dc=goth,dc=net"
>>> dnPrettyNormal: <cn=nssldap,ou=dsa,dc=goth,dc=net>
=> ldap_bv2dn(cn=nssldap,ou=dsa,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(cn=nssldap,ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=nssldap,ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=nssldap,ou=dsa,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <cn=nssldap,ou=dsa,dc=goth,dc=net>,
<cn=nssldap,ou=dsa,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=6, keyval=2
dn="cn=nssldap,ou=dsa,dc=goth,dc=net"
<==backsql_oc_get_candidates(): 2
==>backsql_oc_get_candidates(): oc="organizationalUnit"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,organizationalUnit.id,text('organizationalUnit') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,organizationalUnit WHERE
organizationalUnit.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9
AND 7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,organizationalUnit.id,text('organizationalUnit') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,organizationalUnit WHERE
organizationalUnit.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9
AND 7=7
id: '2'
>>> dnPrettyNormal: <ou=people,dc=goth,dc=net>
=> ldap_bv2dn(ou=people,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=people,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <ou=people,dc=goth,dc=net>, <ou=people,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=2, keyval=1
dn="ou=people,dc=goth,dc=net"
>>> dnPrettyNormal: <ou=groups,dc=goth,dc=net>
=> ldap_bv2dn(ou=groups,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=groups,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <ou=groups,dc=goth,dc=net>, <ou=groups,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=3, keyval=2
dn="ou=groups,dc=goth,dc=net"
>>> dnPrettyNormal: <ou=dsa,dc=goth,dc=net>
=> ldap_bv2dn(ou=dsa,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=dsa,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <ou=dsa,dc=goth,dc=net>, <ou=dsa,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=4, keyval=3
dn="ou=dsa,dc=goth,dc=net"
<==backsql_oc_get_candidates(): 3
==>backsql_oc_get_candidates(): oc="domainRelatedObject"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,domainRelatedObject.id,text('domainRelatedObject') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,domainRelatedObject WHERE
domainRelatedObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9
AND 7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,domainRelatedObject.id,text('domainRelatedObject') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,domainRelatedObject WHERE
domainRelatedObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9
AND 7=7
id: '8'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="inetLocalMailRecipient"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,inetLocalMailRecipient.id,text('inetLocalMailRecipient') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,inetLocalMailRecipient WHERE
inetLocalMailRecipient.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND
9=9 AND 7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,inetLocalMailRecipient.id,text('inetLocalMailRecipient') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,inetLocalMailRecipient WHERE
inetLocalMailRecipient.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND
9=9 AND 7=7
id: '11'
<==backsql_oc_get_candidates(): 0
backsql_search(): loading data for entry id=9, oc_id=6, keyval=7
==>backsql_id2entry()
backsql_id2entry(): retrieving all attributes
==>backsql_get_attr_vals(): oc="gnUser" attr="c" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="l" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="cn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="sn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="st" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uid" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mail" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="title" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="street" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="gidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="givenName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowMax" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="labeledURI" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="lastUpdate" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="loginShell" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="postalCode" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="description" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="displayName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="objectClass" keyval=7
backsql_get_attr_vals(): number of values in query: 2
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="creationTime" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="userPassword" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="homeDirectory" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="telephoneNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailLocalAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowLastChange" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailRoutingAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="facsimileTelephoneNumber"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationAnswer"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationQuestion"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
<==backsql_id2entry()
=> test_filter
EQUALITY
=> access_allowed: search access to "uid=prez,ou=people,dc=goth,dc=net" "uid"
requested=> acl_get: [2] attr uid
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "uid"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: search access granted by read(=rscxd)
<= test_filter 6
=> send_search_entry: conn 1 dn="uid=prez,ou=people,dc=goth,dc=net"
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "entry"
requested=> acl_get: [2] attr entry
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "entry"
requested
=> acl_mask: to all values by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"objectClass" requested
=> acl_get: [2] attr objectClass
access_allowed: no res from state (objectClass)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"objectClass" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "cn"
requested
=> acl_get: [4] attr cn
access_allowed: no res from state (cn)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "cn"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying write(=wrscxd) (stop)
<= acl_mask: [2] mask: write(=wrscxd)
=> access_allowed: reaccess_allowed: read access to
"uid=prez,ou=people,dc=goth,dc=net" "sn" requested
=> dn: [6] dc=goth,dc=net
=> acl_get: [7] attr sn
access_allowed: no res from state (sn)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "sn"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "uid"
requested
=> acl_get: [2] attr uid
access_allowed: no res from state (uid)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "uid"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "mail"
requested
=> acl_get: [3] attr mail
access_allowed: no res from state (mail)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "mail"
requested=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying write(=wrscxd) (stop)
<= acl_mask: [2] mask: write(=wrscxd)
=> access_allowed: read access granted by write(=wrscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "title"
requested=> acl_get: [4] attr title
access_allowed: no res from state (title)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "title"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying write(=wrscxd) (stop)
<= acl_mask: [2] mask: write(=wrscxd)
=> access_allowed: read access granted by write(=wrscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"gidNumber" requested
=> acl_get: [2] attr gidNumber
access_allowed: no res from state (gidNumber)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"gidNumber" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"givenName" requested
=> dn: [6] dc=goth,dc=net
=> acl_get: [7] attr givenName
access_allowed: no res from state (givenName)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"givenName" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"uidNumber" requested
=> acl_get: [2] attr uidNumber
access_allowed: no res from state (uidNumber)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"uidNumber" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"lastUpdate" requested
=> dn: [6] dc=goth,dc=net
=> acl_get: [7] attr lastUpdate
access_allowed: no res from state (lastUpdate)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"lastUpdate" requ)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"loginShell" requested
=> acl_get: [2] attr loginShell
access_allowed: no res from state (loginShell)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"loginShell" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"displayName" requested
=> acl_get: [4] attr displayName
access_allowed: no res from state (displayName)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"displayName" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying write(=wrscxd) (stop)
<= acl_mask: [2] mask: write(=wrscxd)
=> access_allowed: read access granted by write(=wrscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"creationTime" requested
=> dn: [6] dc=goth,dc=net
=> acl_get: [7] attr creationTime
access_allowed: no res from state (creationTime)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"creationTime" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"userPassword" requested
=> acl_get: [1] attr userPassword
access_allowed: no res from state (userPassword)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"userPassword" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: cn=nssldap,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [3] applying write(=wrscxd) (stop)
<= acl_mask: [3] mask: write(=wrscxd)
=> access_allowed: read access granted by write(=wrscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"homeDirectory" requested
=> acl_get: [2] attr homeDirectory
access_allowed: no res from state (homeDirectory)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"homeDirectory" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"mailLocalAddress" requested
=> acl_get: [2] attr mailLocalAddress
access_allowed: no res from state (mailLocalAddress)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"mailLocalAddress" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
ber_flush: 508 bytes to sd 10
0000: 30 82 01 f8 02 01 04 64 82 01 f1 04 21 75 69 64 0......d....!uid
0010: 3d 70 72 65 7a 2c 6f 75 3d 70 65 6f 70 6c 65 2c =prez,ou=people,
0020: 64 63 3d 67 6f 74 68 2c 64 63 3d 6e 65 74 30 82 dc=goth,dc=net0.
0030: 01 ca 30 34 04 0b 6f 62 6a 65 63 74 43 6c 61 73 ..04..objectClas
0040: 73 31 25 04 06 67 6e 55 73 65 72 04 0c 70 6f 73 s1%..gnUser..pos
0050: 69 78 41 63 63 6f 75 6e 74 04 0d 73 68 61 64 6f ixAccount..shado
0060: 77 41 63 63 6f 75 6e 74 30 0c 04 02 63 6e 31 06 wAccount0...cn1.
0070: 04 04 50 72 65 5a 30 0d 04 02 73 6e 31 07 04 05 ..PreZ0...sn1...
0080: 45 6c 64 65 72 30 0d 04 03 75 69 64 31 06 04 04 Elder0...uid1...
0090: 70 72 65 7a 30 17 04 04 6d 61 69 6c 31 0f 04 0d prez0...mail1...
00a0: 70 72 65 7a 40 67 6f 74 68 2e 6e 65 74 30 20 04 prez@goth.net0 .
00b0: 05 74 69 74 6c 65 31 17 04 15 53 79 73 74 65 6d .title1...System
00c0: 73 20 41 64 6d 69 6e 69 73 74 72 61 74 6f 72 30 s Administrator0
00d0: 13 04 09 67 69 64 4e 75 6d 62 65 72 31 06 04 04 ...gidNumber1...
00e0: 31 30 30 30 30 16 04 09 67 69 76 65 6e 4e 61 6d 10000...givenNam
00f0: 65 31 09 04 07 50 72 65 73 74 6f 6e 30 13 04 09 e1...Preston0...
0100: 75 69 64 4e 75 6d 62 65 72 31 06 04 04 31 30 30 uidNumber1...100
0110: 30 30 1a 04 0a 6c 61 73 74 55 70 64 61 74 65 31 00...lastUpdate1
0120: 0c 04 0a 31 31 32 31 32 33 37 36 39 31 30 19 04 ...11212376910..
0130: 0a 6c 6f 67 69 6e 53 68 65 6c 6c 31 0b 04 09 2f .loginShell1.../
0140: 62 69 6e 2f 62 61 73 68 30 15 04 0b 64 69 73 70 bin/bash0...disp
0150: 6c 61 79 4e 61 6d 65 31 06 04 04 50 72 65 5a 30 layName1...PreZ0
0160: 1c 04 0c 63 72 65 61 74 69 6f 6e 54 69 6d 65 31 ...creationTime1
0170: 0c 04 0a 31 31 32 31 32 33 35 35 38 32 30 33 04 ...112123558203.
0180: 0c 75 73 65 72 50 61 73 73 77 6f 72 64 31 23 04 .userPassword1#.
0190: 21 7b 53 48 41 7d 42 78 58 43 52 4e 2b 36 +ZMJz+gdED4wntx
01b0: 63 3d 30 23 04 0d 68 6f 6d 65 44 69 72 65 63 74 c=0#..homeDirect
01c0: 6f 72 79 31 12 04 10 2f 68 6f 6d 65 2f 61 64 6d ory1.../home/adm
01d0: 69 6e 2f 70 72 65 7a 30 23 04 10 6d 61 69 6c 4c in/prez0#..mailL
01e0: 6f 63 61 6c 41 64 64 72 65 73 73 31 0f 04 0d 70 ocalAddress1...p
01f0: 72 65 7a 40 67 6f 74 68 2e 6e 65 74 rez@goth.net
ldap_write: want=508, written=508
0000: 30 82 01 f8 02 01 04 64 82 01 f1 04 21 75 69 64 0......d....!uid
0010: 3d 70 72 65 7a 2c 6f 75 3d 70 65 6f 70 6c 65 2c =prez,ou=people,
0020: 64 63 3d 67 6f 74 68 2c 64 63 3d 6e 65 74 30 82 dc=goth,dc=net0.
0030: 01 ca 30 34 04 0b 6f 62 6a 65 63 74 43 6c 61 73 ..04..objectClas
0040: 73 31 25 04 06 67 6e 55 73 65 72 04 0c 70 6f 73 s1%..gnUser..pos
0050: 69 78 41 63 63 6f 75 6e 74 04 0d 73 68 61 64 6f ixAccount..shado
0060: 77 41 63 63 6f 75 6e 74 30 0c 04 02 63 6e 31 06 wAccount0...cn1.
0070: 04 04 50 72 65 5a 30 0d 04 02 73 6e 31 07 04 05 ..PreZ0...sn1...
0080: 45 6c 64 65 72 30 0d 04 03 75 69 64 31 06 04 04 Elder0...uid1...
0090: 70 72 65 7a 30 17 04 04 6d 61 69 6c 31 0f 04 0d prez0...mail1...
00a0: 70 72 65 7a 40 67 6f 74 68 2e 6e 65 74 30 20 04 prez@goth.net0 .
00b0: 05 74 69 74 6c 65 31 17 04 15 53 79 73 74 65 6d .title1...System
00c0: 73 20 41 64 6d 69 6e 69 73 74 72 61 74 6f 72 30 s Administrator0
00d0: 13 04 09 67 69 64 4e 75 6d 62 65 72 31 06 04 04 ...gidNumber1...
00e0: 31 30 30 30 30 16 04 09 67 69 76 65 6e 4e 61 6d 10000...givenNam
00f0: 65 31 09 04 07 50 72 65 73 74 6f 6e 30 13 04 09 e1...Preston0...
0100: 75 69 64 4e 75 6d 62 65 72 31 06 04 04 31 30 30 uidNumber1...100
0110: 30 30 1a 04 0a 6c 61 73 74 55 70 64 61 74 65 31 00...lastUpdate1
0120: 0c 04 0a 31 31 32 31 32 33 37 36 39 31 30 19 04 ...11212376910..
0130: 0a 6c 6f 67 69 6e 53 68 65 6c 6c 31 0b 04 09 2f .loginShell1.../
0140: 62 69 6e 2f 62 61 73 68 30 15 04 0b 64 69 73 70 bin/bash0...disp
0150: 6c 61 79 4e 61 6d 65 31 06 04 04 50 72 65 5a 30 layName1...PreZ0
0160: 1c 04 0c 63 72 65 61 74 69 6f 6e 54 69 6d 65 31 ...creationTime1
0170: 0c 04 0a 31 31 32 31 32 33 35 35 38 32 30 33 04 ...112123558203.
0180: 0c 75 73 65 72 50 61 73 73 77 6f 72 64 31 23 04 .userPassword1#.
0190: 21 7b 53 48 41 7d 42 78 58 43 52 4e 2b 36 31 57 !{SHA}BxXCRN+61W
01a0: 45 2b 5a 4d 4a 7a 2b 67 64 45 44 34 77 6e 74 78 E+ZMJz+gdED4wntx
01b0: 63 3d 30 23 04 0d 68 6f 6d 65 44 69 72 65 63 74 c=0#..homeDirect
01c0: 6f 72 79 31 12 04 10 2f 68 6f 6d 65 2f 61 64 6d ory1.../home/adm
01d0: 69 6e 2f 70 72 65 7a 30 23 04 10 6d 61 69 6c 4c in/prez0#..mailL
01e0: 6f 63 61 6c 41 64 64 72 65 73 73 31 0f 04 0d 70 ocalAddress1...p
01f0: 72 65 7a 40 67 6f 74 68 2e 6e 65 74 rez@goth.net
<= send_search_entry: conn 1 exit.
== END DUMP 1 =================================================
== BEGIN DUMP 2 ===============================================
daemon: activity on 1 descriptors
daemon: activity on: 10r
daemon: read activity on 10
connection_get(10)
connection_get(10): got connid=1
connection_read(10): checking for input on id=1
ber_get_next
ldap_read: want=8, got=8
0000: 30 64 02 01 05 66 5f 04 0d...f_.
ldap_read: want=94, got=94
0000: 21 75 69 64 3d 70 72 65 7a 2c 6f 75 3d 70 65 6f !uid=prez,ou=peo
0010: 70 6c 65 2c 64 63 3d 67 6f 74 68 2c 64 63 3d 6e ple,dc=goth,dc=n
0020: 65 74 30 3a 30 38 0a 01 02 30 33 04 0c 75 73 65 et0:08...03..use
0030: 72 70 61 73 73 77 6f 72 64 31 23 04 21 7b 53 48 rpassword1#.!{SH
0040: 41 7d 47 43 66 31 72 4b 71 71 49 6d 38 32 74 5a A}GCf1rKqqIm82tZ
0050: 6d 65 6a 79 32 52 51 58 36 7a 69 68 4d 3d mejy2RQX6zihM=
ber_get_next: tag 0x30 len 100 contents:
ber_dump: buf=0x801f8368 ptr=0x801f8368 end=0x801f83cc len=100
0000: 02 01 05 66 5f 04 21 75 69 64 3d 70 72 65 7a 2c ...f_.!uid=prez,
0010: 6f 75 3d 70 65 6f 70 6c 65 2c 64 63 3d 67 6f 74 ou=people,dc=got
0020: 68 2c 64 63 3d 6e 65 74 30 3a 30 38 0a 01 02 30 h,dc=net0:08...0
0030: 33 04 0c 75 73 65 72 70 61 73 73 77 6f 72 64 31 3..userpassword1
0040: 23 04 21 7b 53 48 41 7d 47 43 66 31 72 4b 71 71 #.!{SHA}GCf1rKqq
0050: 49 6d 38 32 74 5a 6d 65 6a 79 32 52 51 58 36 7a Im82tZmejy2RQX6z
0060: 69 68 4d 3d ihM=
ber_get_next
ldap_read: want=8 error=Resource temporarily unavailable
ber_get_next on fd 10 failed errno=11 (Resource temporarily unavailable)
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 active_threads=0 tvp=NULL
do_modify
ber_scanf fmt ({m) ber:
ber_dump: buf=0x801f8368 ptr=0x801f836b end=0x801f83cc len=97
0000: 66 5f 04 21 75 69 64 3d 70 72 65 7a 2c 6f 75 3d f_.!uid=prez,ou=
0010: 70 65 6f 70 6c 65 2c 64 63 3d 67 6f 74 68 2c 64 people,dc=goth,d
0020: 63 3d 6e 65 74 30 3a 30 38 0a 01 02 30 33 04 0c c=net0:08...03..
0030: 75 73 65 72 70 61 73 73 77 6f 72 64 31 23 04 21 userpassword1#.!
0040: 7b 53 48 41 7d 47 43 66 31 72 4b 71 71 49 6d 38 {SHA}GCf1rKqqIm8
0050: 32 74 5a 6d 65 6a 79 32 52 51 58 36 7a 69 68 4d 2tZmejy2RQX6zihM
0060: 3d =
do_modify: dn (uid=prez,ou=people,dc=goth,dc=net)
ber_scanf fmt ({i{m[W]}}) ber:
ber_dump: buf=0x801f8368 ptr=0x801f8392 end=0x801f83cc len=58
0000: 30 38 0a 01 02 30 33 04 0c 75 73 65 72 70 61 73 08...03..userpas
0010: 73 77 6f 72 64 31 23 04 21 7b 53 48 41 7d 47 43 sword1#.!{SHA}GC
0020: 66 31 72 4b 71 71 49 6d 38 32 74 5a 6d 65 6a 79 f1rKqqIm82tZmejy
0030: 32 52 51 58 36 7a 69 68 4d 3d 2RQX6zihM=
>>> dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>
=> ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>,
<uid=prez,ou=people,dc=goth,dc=net>
modifications:
replace: userpassword
one value, length 33
==>backsql_modify(): modifying entry "uid=prez,ou=people,dc=goth,dc=net"
==>backsql_get_db_conn()
<==backsql_get_db_conn()
==>backsql_dn2id("uid=prez,ou=people,dc=goth,dc=net") matched expected
backsql_dn2id("uid=prez,ou=people,dc=goth,dc=net"): id_query "SELECT
id,keyval,oc_map_id,dn FROM ldap_entries WHERE upper(dn)=upper(?)"
backsql_dn2id("uid=prez,ou=people,dc=goth,dc=net"): id=9 keyval=7 oc_id=6
dn=uid=prez,ou=people,dc=goth,dc=net
>>> dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>
=> ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>,
<uid=prez,ou=people,dc=goth,dc=net>
<==backsql_dn2id("uid=prez,ou=people,dc=goth,dc=net"): err=0
==>backsql_id2entry()
backsql_id2entry(): retrieving all attributes
==>backsql_get_attr_vals(): oc="gnUser" attr="c" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="l" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="cn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="sn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="st" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uid" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mail" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="title" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="street" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="gidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="givenName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowMax" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="labeledURI" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="lastUpdate" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="loginShell" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="postalCode" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="description" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="displayName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="objectClass" keyval=7
backsql_get_attr_vals(): number of values in query: 2
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="creationTime" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="userPassword" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="homeDirectory" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="telephoneNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailLocalAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowLastChange" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailRoutingAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="facsimileTelephoneNumber"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationAnswer"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationQuestion"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
<==backsql_id2entry()
backsql_modify(): modifying entry "uid=prez,ou=people,dc=goth,dc=net" (id=9)
=> access_allowed: delete access to "uid=prez,ou=people,dc=goth,dc=net"
"userPassword" requested
=> acl_get: [1] attr userPassword
access_allowed: no res from state (userPassword)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"userPassword" requested
=> acl_mask: to all values by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: cn=nssldap,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [3] applying write(=wrscxd) (stop)
<= acl_mask: [3] mask: write(=wrscxd)
=> access_allowed: delete access granted by write(=wrscxd)
==>backsql_modify_internal(): traversing modifications list
backsql_modify_internal(): modifying attribute "userPassword" (replace)
according to mappings for objectClass "gnUser"
backsql_modify_internal(): replacing values for attribute "userPassword"
backsql_modify_internal(): delete procedure is not defined for attribute
"userPassword" - adding only
backsql_modify_internal(): adding new values for attribute "userPassword"
backsql_modify_internal(): arg2="7"
backsql_modify_internal(): arg1="{SHA}GCf1rKqqIm82tZmejy2RQX6zihM=";
executing "select set_gnUser_userPassword(?,?)"
<==backsql_modify_internal(): 0
==>backsql_id2entry()
backsql_id2entry(): retrieving all attributes
==>backsql_get_attr_vals(): oc="gnUser" attr="c" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="l" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="cn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="sn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="st" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uid" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mail" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="title" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="street" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="gidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="givenName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowMax" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="labeledURI" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="lastUpdate" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="loginShell" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="postalCode" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="description" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="displayName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="objectClass" keyval=7
backsql_get_attr_vals(): number of values in query: 2
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="creationTime" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="userPassword" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="homeDirectory" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="telephoneNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailLocalAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowLastChange" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailRoutingAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="facsimileTelephoneNumber"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationAnswer"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationQuestion"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
<==backsql_id2entry()
slapd: schema_check.c:83: entry_schema_check: Assertion `a->a_vals[0].bv_val !=
((void *)0)' failed.
Aborted
== END DUMP 2 =================================================