[Date Prev][Date Next] [Chronological] [Thread] [Top]

(ITS#3861) Crash when trying to change password (with BACK-SQL)



Full_Name: Preston A. Elder
Version: 2.3.4
OS: Linux (2.6.12)
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (71.241.153.69)


I'm trying to change my user's password via. a web script, openldap keeps
aborting, in the same place.

The user is valid.  I will paste 2 VERY verbose dumps.  The first is of the app
requesting information about my user (uid=prez).  As you can see, it succeeds,
and returns the info.  The second is of the actual attempt to modify the
password.  This causes the assertion to trigger.

== BEGIN DUMP 1 ===============================================
connection_get(10)
connection_get(10): got connid=1
connection_read(10): checking for input on id=1
ber_get_next
ldap_read: want=8, got=8
  0000:  30 33 02 01 04 63 2e 04                            03...c..
ldap_read: want=45, got=45
  0000:  0e 64 63 3d 67 6f 74 68  2c 64 63 3d 6e 65 74 0a   .dc=goth,dc=net.
  0010:  01 02 0a 01 00 02 01 00  02 01 00 01 01 00 a3 0b   ................
  0020:  04 03 75 69 64 04 04 70  72 65 7a 30 00            ..uid..prez0.
ber_get_next: tag 0x30 len 51 contents:
ber_dump: buf=0x8020d400 ptr=0x8020d400 end=0x8020d433 len=51
  0000:  02 01 04 63 2e 04 0e 64  63 3d 67 6f 74 68 2c 64   ...c...dc=goth,d
  0010:  63 3d 6e 65 74 0a 01 02  0a 01 00 02 01 00 02 01   c=net...........
  0020:  00 01 01 00 a3 0b 04 03  75 69 64 04 04 70 72 65   ........uid..pre
  0030:  7a 30 00                                           z0.
ber_get_next
ldap_read: want=8 error=Resource temporarily unavailable
ber_get_next on fd 10 failed errno=11 (Resource temporarily unavailable)
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 active_threads=0 tvp=NULL
do_search
ber_scanf fmt ({miiiib) ber:
ber_dump: buf=0x8020d400 ptr=0x8020d403 end=0x8020d433 len=48
  0000:  63 2e 04 0e 64 63 3d 67  6f 74 68 2c 64 63 3d 6e   c...dc=goth,dc=n
  0010:  65 74 0a 01 02 0a 01 00  02 01 00 02 01 00 01 01   et..............
  0020:  00 a3 0b 04 03 75 69 64  04 04 70 72 65 7a 30 00   .....uid..prez0.
>>> dnPrettyNormal: <dc=goth,dc=net>
=> ldap_bv2dn(dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <dc=goth,dc=net>, <dc=goth,dc=net>
SRCH "dc=goth,dc=net" 2 0    0 0 0
begin get_filter
EQUALITY
ber_scanf fmt ({mm}) ber:
ber_dump: buf=0x8020d400 ptr=0x8020d424 end=0x8020d433 len=15
  0000:  a3 0b 04 03 75 69 64 04  04 70 72 65 7a 30 00      ....uid..prez0.
end get_filter 0
    filter: (uid=prez)
ber_scanf fmt ({M}}) ber:
ber_dump: buf=0x8020d400 ptr=0x8020d431 end=0x8020d433 len=2
  0000:  00 00                                              ..
    attrs:
==> limits_get: conn=1 op=3 dn="uid=prez,ou=people,dc=goth,dc=net"
==>backsql_search(): base="dc=goth,dc=net", filter="(uid=prez)", scope=2,
deref=0, attrsonly=0, attributes to load: all
==>backsql_get_db_conn()
<==backsql_get_db_conn()
==>backsql_dn2id("dc=goth,dc=net") matched expected
   backsql_dn2id("dc=goth,dc=net"): id_query "SELECT id,keyval,oc_map_id,dn FROM
ldap_entries WHERE upper(dn)=upper(?)"
   backsql_dn2id("dc=goth,dc=net"): id=1 keyval=1 oc_id=1 dn=dc=goth,dc=net
>>> dnPrettyNormal: <dc=goth,dc=net>
=> ldap_bv2dn(dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <dc=goth,dc=net>, <dc=goth,dc=net>
<==backsql_dn2id("dc=goth,dc=net"): err=0
==>backsql_id2entry()
backsql_id2entry(): retrieving all attributes
==>backsql_get_attr_vals(): oc="dcObject" attr="dc" keyval=1
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="dcObject" attr="objectClass" keyval=1
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
<==backsql_id2entry()
==>backsql_oc_get_candidates(): oc="gnUser"
==>backsql_srch_query()
==>backsql_process_filter()
==>backsql_process_filter_attr(uid)
<==backsql_process_filter_attr(uid)
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,gnUser.id,text('gnUser') AS objectClass,ldap_entries.dn AS dn
FROM ldap_entries,gnUser WHERE gnUser.id=ldap_entries.keyval AND
ldap_entries.oc_map_id=? AND 9=9 AND (upper(gnUser.userid)='PREZ')
Constructed query: SELECT DISTINCT ldap_entries.id,gnUser.id,text('gnUser') AS
objectClass,ldap_entries.dn AS dn Fd=? AND 9=9 AND
(upper(gnUser.userid)='PREZ')
id: '6'
>>> dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>
=> ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>,
<uid=prez,ou=people,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=9, keyval=7
dn="uid=prez,ou=people,dc=goth,dc=net"
<==backsql_oc_get_candidates(): 1
==>backsql_oc_get_candidates(): oc="dcObject"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,dcObject.id,text('dcObject') AS objectClass,ldap_entries.dn AS
dn FROM ldap_entries,dcObject WHERE dcObject.id=ldap_entries.keyval AND
ldap_entries.oc_map_id=? AND 9=9 AND 7=7
Constructed query: SELECT DISTINCT ldap_entries.id,dcObject.id,text('dcObject')
AS objectClass,ldap_entries.dn AS dn FROM ldap_entries,dcObject WHERE
dcObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND 7=7
id: '1'
>>> dnPrettyNormal: <dc=goth,dc=net>
=> ldap_bv2dn(dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <dc=goth,dc=net>, <dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=1, keyval=1 dn="dc=goth,dc=net"
<==backsql_oc_get_candidates(): 1
==>backsql_oc_get_candidates(): oc="posixGroup"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,posixGroup.id,text('posixGroup') AS objectClass,ldap_entries.dn
AS dn FROM ldap_entries,posixGroup WHERE posixGroup.id=ldap_entries.keyval AND
ldap_entries.oc_map_id=? AND 9=9 AND 7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,posixGroup.id,text('posixGroup') AS objectClass,ldap_entries.dn
AS dn FROM ldap_entries,posixGroup WHERE posixGroup.id=ldap_entries.keyval AND
ldap_entries.oc_map_id=? AND 9=9 AND 7=7
id: '3'
>>> dnPrettyNormal: <cn=admin,ou=groups,dc=goth,dc=net>
=> ldap_bv2dn(cn=admin,ou=groups,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(cn=admin,ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=admin,ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=admin,ou=groups,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <cn=admin,ou=groups,dc=goth,dc=net>,
<cn=admin,ou=groups,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=7, keyval=1
dn="cn=admin,ou=groups,dc=goth,dc=net"
>>> dnPrettyNormal: <cn=goth.net,ou=groups,dc=goth,dc=net>
=> ldap_bv2dn(cn=goth.net,ou=groups,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(cn=goth.net,ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=goth.net,ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=goth.net,ou=groups,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <cn=goth.net,ou=groups,dc=goth,dc=net>,
<cn=goth.net,ou=groups,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=8, keyval=2
dn="cn=goth.net,ou=groups,dc=goth,dc=net"
<==backsql_oc_get_candidates(): 2
==>backsql_oc_get_candidates(): oc="posixAccount"
==>backsql_srch_query()
==>backsql_process_filter()
==>backsql_process_filter_attr(uid)
<==backsql_process_filter_attr(uid)
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,posixAccount.id,text('posixAccount') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,posixAccount WHERE
posixAccount.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(posixAccount.userid)='PREZ')
Constructed query: SELECT DISTINCT
ldap_entries.id,posixAccount.id,text('posixAccount') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,posixAccount WHERE
posixAccount.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(posixAccount.userid)='PREZ')
id: '9'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="gnPendingUser"
==>backsql_srch_query()
==>backsql_process_filter()
==>backsql_process_filter_attr(uid)
<==backsql_process_filter_attr(uid)
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,gnPendingUser.id,text('gnPendingUser') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnPendingUser WHERE
gnPendingUser.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(gnPendingUser.userid)='PREZ')
Constructed query: SELECT DISTINCT
ldap_entries.id,gnPendingUser.id,text('gnPendingUser') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnPendingUser WHERE
gnPendingUser.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(gnPendingUser.userid)='PREZ')
id: '7'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="shadowAccount"
==>backsql_srch_query()
==>backsql_process_filter()
==>backsql_process_filter_attr(uid)
<==backsql_process_filter_attr(uid)
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,shadowAccount.id,text('shadowAccount') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,shadowAccount WHERE
shadowAccount.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(shadowAccount.userid)='PREZ')
Constructed query: SELECT DISTINCT
ldap_entries.id,shadowAccount.id,text('shadowAccount') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,shadowAccount WHERE
shadowAccount.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
(upper(shadowAccount.userid)='PREZ')
id: '10'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="gnOrganization"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,gnOrganization.id,text('gnOrganization') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnOrganization WHERE
gnOrganization.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,gnOrganization.id,text('gnOrganization') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnOrganization WHERE
gnOrganization.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
7=7
id: '4'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="gnSecurityObject"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT
DISTecurityObject.id,text('gnSecurityObject') AS objectClass,ldap_entries.dn AS
dn FROM ldap_entries,gnSecurityObject WHERE
gnSecurityObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,gnSecurityObject.id,text('gnSecurityObject') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,gnSecurityObject WHERE
gnSecurityObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9 AND
7=7
id: '5'
>>> dnPrettyNormal: <cn=root,ou=dsa,dc=goth,dc=net>
=> ldap_bv2dn(cn=root,ou=dsa,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(cn=root,ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=root,ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=root,ou=dsa,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <cn=root,ou=dsa,dc=goth,dc=net>,
<cn=root,ou=dsa,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=5, keyval=1
dn="cn=root,ou=dsa,dc=goth,dc=net"
>>> dnPrettyNormal: <cn=nssldap,ou=dsa,dc=goth,dc=net>
=> ldap_bv2dn(cn=nssldap,ou=dsa,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(cn=nssldap,ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=nssldap,ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(cn=nssldap,ou=dsa,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <cn=nssldap,ou=dsa,dc=goth,dc=net>,
<cn=nssldap,ou=dsa,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=6, keyval=2
dn="cn=nssldap,ou=dsa,dc=goth,dc=net"
<==backsql_oc_get_candidates(): 2
==>backsql_oc_get_candidates(): oc="organizationalUnit"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,organizationalUnit.id,text('organizationalUnit') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,organizationalUnit WHERE
organizationalUnit.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9
AND 7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,organizationalUnit.id,text('organizationalUnit') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,organizationalUnit WHERE
organizationalUnit.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9
AND 7=7
id: '2'
>>> dnPrettyNormal: <ou=people,dc=goth,dc=net>
=> ldap_bv2dn(ou=people,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=people,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <ou=people,dc=goth,dc=net>, <ou=people,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=2, keyval=1
dn="ou=people,dc=goth,dc=net"
>>> dnPrettyNormal: <ou=groups,dc=goth,dc=net>
=> ldap_bv2dn(ou=groups,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=groups,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=groups,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <ou=groups,dc=goth,dc=net>, <ou=groups,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=3, keyval=2
dn="ou=groups,dc=goth,dc=net"
>>> dnPrettyNormal: <ou=dsa,dc=goth,dc=net>
=> ldap_bv2dn(ou=dsa,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=dsa,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(ou=dsa,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <ou=dsa,dc=goth,dc=net>, <ou=dsa,dc=goth,dc=net>
backsql_oc_get_candidates(): added entry id=4, keyval=3
dn="ou=dsa,dc=goth,dc=net"
<==backsql_oc_get_candidates(): 3
==>backsql_oc_get_candidates(): oc="domainRelatedObject"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,domainRelatedObject.id,text('domainRelatedObject') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,domainRelatedObject WHERE
domainRelatedObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9
AND 7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,domainRelatedObject.id,text('domainRelatedObject') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,domainRelatedObject WHERE
domainRelatedObject.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND 9=9
AND 7=7
id: '8'
<==backsql_oc_get_candidates(): 0
==>backsql_oc_get_candidates(): oc="inetLocalMailRecipient"
==>backsql_srch_query()
==>backsql_process_filter()
<==backsql_process_filter() succeeded
<==backsql_srch_query() returns SELECT DISTINCT
ldap_entries.id,inetLocalMailRecipient.id,text('inetLocalMailRecipient') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,inetLocalMailRecipient WHERE
inetLocalMailRecipient.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND
9=9 AND 7=7
Constructed query: SELECT DISTINCT
ldap_entries.id,inetLocalMailRecipient.id,text('inetLocalMailRecipient') AS
objectClass,ldap_entries.dn AS dn FROM ldap_entries,inetLocalMailRecipient WHERE
inetLocalMailRecipient.id=ldap_entries.keyval AND ldap_entries.oc_map_id=? AND
9=9 AND 7=7
id: '11'
<==backsql_oc_get_candidates(): 0
backsql_search(): loading data for entry id=9, oc_id=6, keyval=7
==>backsql_id2entry()
backsql_id2entry(): retrieving all attributes
==>backsql_get_attr_vals(): oc="gnUser" attr="c" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="l" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="cn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="sn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="st" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uid" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mail" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="title" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="street" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="gidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="givenName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowMax" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="labeledURI" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="lastUpdate" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="loginShell" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="postalCode" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="description" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="displayName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="objectClass" keyval=7
backsql_get_attr_vals(): number of values in query: 2
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="creationTime" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="userPassword" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="homeDirectory" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="telephoneNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailLocalAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowLastChange" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailRoutingAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="facsimileTelephoneNumber"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationAnswer"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationQuestion"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
<==backsql_id2entry()
=> test_filter
    EQUALITY
=> access_allowed: search access to "uid=prez,ou=people,dc=goth,dc=net" "uid"
requested=> acl_get: [2] attr uid
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "uid"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: search access granted by read(=rscxd)
<= test_filter 6
=> send_search_entry: conn 1 dn="uid=prez,ou=people,dc=goth,dc=net"
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "entry"
requested=> acl_get: [2] attr entry
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "entry"
requested
=> acl_mask: to all values by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"objectClass" requested
=> acl_get: [2] attr objectClass
access_allowed: no res from state (objectClass)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"objectClass" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "cn"
requested
=> acl_get: [4] attr cn
access_allowed: no res from state (cn)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "cn"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying write(=wrscxd) (stop)
<= acl_mask: [2] mask: write(=wrscxd)
=> access_allowed: reaccess_allowed: read access to
"uid=prez,ou=people,dc=goth,dc=net" "sn" requested
=> dn: [6] dc=goth,dc=net
=> acl_get: [7] attr sn
access_allowed: no res from state (sn)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "sn"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "uid"
requested
=> acl_get: [2] attr uid
access_allowed: no res from state (uid)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "uid"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "mail"
requested
=> acl_get: [3] attr mail
access_allowed: no res from state (mail)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "mail"
requested=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying write(=wrscxd) (stop)
<= acl_mask: [2] mask: write(=wrscxd)
=> access_allowed: read access granted by write(=wrscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net" "title"
requested=> acl_get: [4] attr title
access_allowed: no res from state (title)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr "title"
requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying write(=wrscxd) (stop)
<= acl_mask: [2] mask: write(=wrscxd)
=> access_allowed: read access granted by write(=wrscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"gidNumber" requested
=> acl_get: [2] attr gidNumber
access_allowed: no res from state (gidNumber)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"gidNumber" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"givenName" requested
=> dn: [6] dc=goth,dc=net
=> acl_get: [7] attr givenName
access_allowed: no res from state (givenName)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"givenName" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"uidNumber" requested
=> acl_get: [2] attr uidNumber
access_allowed: no res from state (uidNumber)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"uidNumber" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"lastUpdate" requested
=> dn: [6] dc=goth,dc=net
=> acl_get: [7] attr lastUpdate
access_allowed: no res from state (lastUpdate)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"lastUpdate" requ)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"loginShell" requested
=> acl_get: [2] attr loginShell
access_allowed: no res from state (loginShell)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"loginShell" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"displayName" requested
=> acl_get: [4] attr displayName
access_allowed: no res from state (displayName)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"displayName" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying write(=wrscxd) (stop)
<= acl_mask: [2] mask: write(=wrscxd)
=> access_allowed: read access granted by write(=wrscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"creationTime" requested
=> dn: [6] dc=goth,dc=net
=> acl_get: [7] attr creationTime
access_allowed: no res from state (creationTime)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"creationTime" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"userPassword" requested
=> acl_get: [1] attr userPassword
access_allowed: no res from state (userPassword)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"userPassword" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: cn=nssldap,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [3] applying write(=wrscxd) (stop)
<= acl_mask: [3] mask: write(=wrscxd)
=> access_allowed: read access granted by write(=wrscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"homeDirectory" requested
=> acl_get: [2] attr homeDirectory
access_allowed: no res from state (homeDirectory)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"homeDirectory" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access to "uid=prez,ou=people,dc=goth,dc=net"
"mailLocalAddress" requested
=> acl_get: [2] attr mailLocalAddress
access_allowed: no res from state (mailLocalAddress)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"mailLocalAddress" requested
=> acl_mask: to value by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: *
<= acl_mask: [2] applying read(=rscxd) (stop)
<= acl_mask: [2] mask: read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
ber_flush: 508 bytes to sd 10
  0000:  30 82 01 f8 02 01 04 64  82 01 f1 04 21 75 69 64   0......d....!uid
  0010:  3d 70 72 65 7a 2c 6f 75  3d 70 65 6f 70 6c 65 2c   =prez,ou=people,
  0020:  64 63 3d 67 6f 74 68 2c  64 63 3d 6e 65 74 30 82   dc=goth,dc=net0.
  0030:  01 ca 30 34 04 0b 6f 62  6a 65 63 74 43 6c 61 73   ..04..objectClas
  0040:  73 31 25 04 06 67 6e 55  73 65 72 04 0c 70 6f 73   s1%..gnUser..pos
  0050:  69 78 41 63 63 6f 75 6e  74 04 0d 73 68 61 64 6f   ixAccount..shado
  0060:  77 41 63 63 6f 75 6e 74  30 0c 04 02 63 6e 31 06   wAccount0...cn1.
  0070:  04 04 50 72 65 5a 30 0d  04 02 73 6e 31 07 04 05   ..PreZ0...sn1...
  0080:  45 6c 64 65 72 30 0d 04  03 75 69 64 31 06 04 04   Elder0...uid1...
  0090:  70 72 65 7a 30 17 04 04  6d 61 69 6c 31 0f 04 0d   prez0...mail1...
  00a0:  70 72 65 7a 40 67 6f 74  68 2e 6e 65 74 30 20 04   prez@goth.net0 .
  00b0:  05 74 69 74 6c 65 31 17  04 15 53 79 73 74 65 6d   .title1...System
  00c0:  73 20 41 64 6d 69 6e 69  73 74 72 61 74 6f 72 30   s Administrator0
  00d0:  13 04 09 67 69 64 4e 75  6d 62 65 72 31 06 04 04   ...gidNumber1...
  00e0:  31 30 30 30 30 16 04 09  67 69 76 65 6e 4e 61 6d   10000...givenNam
  00f0:  65 31 09 04 07 50 72 65  73 74 6f 6e 30 13 04 09   e1...Preston0...
  0100:  75 69 64 4e 75 6d 62 65  72 31 06 04 04 31 30 30   uidNumber1...100
  0110:  30 30 1a 04 0a 6c 61 73  74 55 70 64 61 74 65 31   00...lastUpdate1
  0120:  0c 04 0a 31 31 32 31 32  33 37 36 39 31 30 19 04   ...11212376910..
  0130:  0a 6c 6f 67 69 6e 53 68  65 6c 6c 31 0b 04 09 2f   .loginShell1.../
  0140:  62 69 6e 2f 62 61 73 68  30 15 04 0b 64 69 73 70   bin/bash0...disp
  0150:  6c 61 79 4e 61 6d 65 31  06 04 04 50 72 65 5a 30   layName1...PreZ0
  0160:  1c 04 0c 63 72 65 61 74  69 6f 6e 54 69 6d 65 31   ...creationTime1
  0170:  0c 04 0a 31 31 32 31 32  33 35 35 38 32 30 33 04   ...112123558203.
  0180:  0c 75 73 65 72 50 61 73  73 77 6f 72 64 31 23 04   .userPassword1#.
  0190:  21 7b 53 48 41 7d 42 78  58 43 52 4e 2b 36 +ZMJz+gdED4wntx
  01b0:  63 3d 30 23 04 0d 68 6f  6d 65 44 69 72 65 63 74   c=0#..homeDirect
  01c0:  6f 72 79 31 12 04 10 2f  68 6f 6d 65 2f 61 64 6d   ory1.../home/adm
  01d0:  69 6e 2f 70 72 65 7a 30  23 04 10 6d 61 69 6c 4c   in/prez0#..mailL
  01e0:  6f 63 61 6c 41 64 64 72  65 73 73 31 0f 04 0d 70   ocalAddress1...p
  01f0:  72 65 7a 40 67 6f 74 68  2e 6e 65 74               rez@goth.net
ldap_write: want=508, written=508
  0000:  30 82 01 f8 02 01 04 64  82 01 f1 04 21 75 69 64   0......d....!uid
  0010:  3d 70 72 65 7a 2c 6f 75  3d 70 65 6f 70 6c 65 2c   =prez,ou=people,
  0020:  64 63 3d 67 6f 74 68 2c  64 63 3d 6e 65 74 30 82   dc=goth,dc=net0.
  0030:  01 ca 30 34 04 0b 6f 62  6a 65 63 74 43 6c 61 73   ..04..objectClas
  0040:  73 31 25 04 06 67 6e 55  73 65 72 04 0c 70 6f 73   s1%..gnUser..pos
  0050:  69 78 41 63 63 6f 75 6e  74 04 0d 73 68 61 64 6f   ixAccount..shado
  0060:  77 41 63 63 6f 75 6e 74  30 0c 04 02 63 6e 31 06   wAccount0...cn1.
  0070:  04 04 50 72 65 5a 30 0d  04 02 73 6e 31 07 04 05   ..PreZ0...sn1...
  0080:  45 6c 64 65 72 30 0d 04  03 75 69 64 31 06 04 04   Elder0...uid1...
  0090:  70 72 65 7a 30 17 04 04  6d 61 69 6c 31 0f 04 0d   prez0...mail1...
  00a0:  70 72 65 7a 40 67 6f 74  68 2e 6e 65 74 30 20 04   prez@goth.net0 .
  00b0:  05 74 69 74 6c 65 31 17  04 15 53 79 73 74 65 6d   .title1...System
  00c0:  73 20 41 64 6d 69 6e 69  73 74 72 61 74 6f 72 30   s Administrator0
  00d0:  13 04 09 67 69 64 4e 75  6d 62 65 72 31 06 04 04   ...gidNumber1...
  00e0:  31 30 30 30 30 16 04 09  67 69 76 65 6e 4e 61 6d   10000...givenNam
  00f0:  65 31 09 04 07 50 72 65  73 74 6f 6e 30 13 04 09   e1...Preston0...
  0100:  75 69 64 4e 75 6d 62 65  72 31 06 04 04 31 30 30   uidNumber1...100
  0110:  30 30 1a 04 0a 6c 61 73  74 55 70 64 61 74 65 31   00...lastUpdate1
  0120:  0c 04 0a 31 31 32 31 32  33 37 36 39 31 30 19 04   ...11212376910..
  0130:  0a 6c 6f 67 69 6e 53 68  65 6c 6c 31 0b 04 09 2f   .loginShell1.../
  0140:  62 69 6e 2f 62 61 73 68  30 15 04 0b 64 69 73 70   bin/bash0...disp
  0150:  6c 61 79 4e 61 6d 65 31  06 04 04 50 72 65 5a 30   layName1...PreZ0
  0160:  1c 04 0c 63 72 65 61 74  69 6f 6e 54 69 6d 65 31   ...creationTime1
  0170:  0c 04 0a 31 31 32 31 32  33 35 35 38 32 30 33 04   ...112123558203.
  0180:  0c 75 73 65 72 50 61 73  73 77 6f 72 64 31 23 04   .userPassword1#.
  0190:  21 7b 53 48 41 7d 42 78  58 43 52 4e 2b 36 31 57   !{SHA}BxXCRN+61W
  01a0:  45 2b 5a 4d 4a 7a 2b 67  64 45 44 34 77 6e 74 78   E+ZMJz+gdED4wntx
  01b0:  63 3d 30 23 04 0d 68 6f  6d 65 44 69 72 65 63 74   c=0#..homeDirect
  01c0:  6f 72 79 31 12 04 10 2f  68 6f 6d 65 2f 61 64 6d   ory1.../home/adm
  01d0:  69 6e 2f 70 72 65 7a 30  23 04 10 6d 61 69 6c 4c   in/prez0#..mailL
  01e0:  6f 63 61 6c 41 64 64 72  65 73 73 31 0f 04 0d 70   ocalAddress1...p
  01f0:  72 65 7a 40 67 6f 74 68  2e 6e 65 74               rez@goth.net
<= send_search_entry: conn 1 exit.
== END DUMP 1 =================================================

== BEGIN DUMP 2 ===============================================
daemon: activity on 1 descriptors
daemon: activity on: 10r
daemon: read activity on 10
connection_get(10)
connection_get(10): got connid=1
connection_read(10): checking for input on id=1
ber_get_next
ldap_read: want=8, got=8
  0000:  30 64 02 01 05 66 5f 04                            0d...f_.
ldap_read: want=94, got=94
  0000:  21 75 69 64 3d 70 72 65  7a 2c 6f 75 3d 70 65 6f   !uid=prez,ou=peo
  0010:  70 6c 65 2c 64 63 3d 67  6f 74 68 2c 64 63 3d 6e   ple,dc=goth,dc=n
  0020:  65 74 30 3a 30 38 0a 01  02 30 33 04 0c 75 73 65   et0:08...03..use
  0030:  72 70 61 73 73 77 6f 72  64 31 23 04 21 7b 53 48   rpassword1#.!{SH
  0040:  41 7d 47 43 66 31 72 4b  71 71 49 6d 38 32 74 5a   A}GCf1rKqqIm82tZ
  0050:  6d 65 6a 79 32 52 51 58  36 7a 69 68 4d 3d         mejy2RQX6zihM=
ber_get_next: tag 0x30 len 100 contents:
ber_dump: buf=0x801f8368 ptr=0x801f8368 end=0x801f83cc len=100
  0000:  02 01 05 66 5f 04 21 75  69 64 3d 70 72 65 7a 2c   ...f_.!uid=prez,
  0010:  6f 75 3d 70 65 6f 70 6c  65 2c 64 63 3d 67 6f 74   ou=people,dc=got
  0020:  68 2c 64 63 3d 6e 65 74  30 3a 30 38 0a 01 02 30   h,dc=net0:08...0
  0030:  33 04 0c 75 73 65 72 70  61 73 73 77 6f 72 64 31   3..userpassword1
  0040:  23 04 21 7b 53 48 41 7d  47 43 66 31 72 4b 71 71   #.!{SHA}GCf1rKqq
  0050:  49 6d 38 32 74 5a 6d 65  6a 79 32 52 51 58 36 7a   Im82tZmejy2RQX6z
  0060:  69 68 4d 3d                                        ihM=
ber_get_next
ldap_read: want=8 error=Resource temporarily unavailable
ber_get_next on fd 10 failed errno=11 (Resource temporarily unavailable)
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 active_threads=0 tvp=NULL
do_modify
ber_scanf fmt ({m) ber:
ber_dump: buf=0x801f8368 ptr=0x801f836b end=0x801f83cc len=97
  0000:  66 5f 04 21 75 69 64 3d  70 72 65 7a 2c 6f 75 3d   f_.!uid=prez,ou=
  0010:  70 65 6f 70 6c 65 2c 64  63 3d 67 6f 74 68 2c 64   people,dc=goth,d
  0020:  63 3d 6e 65 74 30 3a 30  38 0a 01 02 30 33 04 0c   c=net0:08...03..
  0030:  75 73 65 72 70 61 73 73  77 6f 72 64 31 23 04 21   userpassword1#.!
  0040:  7b 53 48 41 7d 47 43 66  31 72 4b 71 71 49 6d 38   {SHA}GCf1rKqqIm8
  0050:  32 74 5a 6d 65 6a 79 32  52 51 58 36 7a 69 68 4d   2tZmejy2RQX6zihM
  0060:  3d                                                 =
do_modify: dn (uid=prez,ou=people,dc=goth,dc=net)
ber_scanf fmt ({i{m[W]}}) ber:
ber_dump: buf=0x801f8368 ptr=0x801f8392 end=0x801f83cc len=58
  0000:  30 38 0a 01 02 30 33 04  0c 75 73 65 72 70 61 73   08...03..userpas
  0010:  73 77 6f 72 64 31 23 04  21 7b 53 48 41 7d 47 43   sword1#.!{SHA}GC
  0020:  66 31 72 4b 71 71 49 6d  38 32 74 5a 6d 65 6a 79   f1rKqqIm82tZmejy
  0030:  32 52 51 58 36 7a 69 68  4d 3d                     2RQX6zihM=
>>> dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>
=> ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>,
<uid=prez,ou=people,dc=goth,dc=net>
modifications:
        replace: userpassword
                one value, length 33
==>backsql_modify(): modifying entry "uid=prez,ou=people,dc=goth,dc=net"
==>backsql_get_db_conn()
<==backsql_get_db_conn()
==>backsql_dn2id("uid=prez,ou=people,dc=goth,dc=net") matched expected
   backsql_dn2id("uid=prez,ou=people,dc=goth,dc=net"): id_query "SELECT
id,keyval,oc_map_id,dn FROM ldap_entries WHERE upper(dn)=upper(?)"
   backsql_dn2id("uid=prez,ou=people,dc=goth,dc=net"): id=9 keyval=7 oc_id=6
dn=uid=prez,ou=people,dc=goth,dc=net
>>> dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>
=> ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net,0)
ldap_err2string
<= ldap_bv2dn(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
=> ldap_dn2bv(272)
ldap_err2string
<= ldap_dn2bv(uid=prez,ou=people,dc=goth,dc=net)=0 Success
<<< dnPrettyNormal: <uid=prez,ou=people,dc=goth,dc=net>,
<uid=prez,ou=people,dc=goth,dc=net>
<==backsql_dn2id("uid=prez,ou=people,dc=goth,dc=net"): err=0
==>backsql_id2entry()
backsql_id2entry(): retrieving all attributes
==>backsql_get_attr_vals(): oc="gnUser" attr="c" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="l" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="cn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="sn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="st" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uid" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mail" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="title" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="street" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="gidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="givenName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowMax" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="labeledURI" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="lastUpdate" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="loginShell" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="postalCode" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="description" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="displayName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="objectClass" keyval=7
backsql_get_attr_vals(): number of values in query: 2
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="creationTime" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="userPassword" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="homeDirectory" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="telephoneNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailLocalAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowLastChange" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailRoutingAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="facsimileTelephoneNumber"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationAnswer"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationQuestion"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
<==backsql_id2entry()
   backsql_modify(): modifying entry "uid=prez,ou=people,dc=goth,dc=net" (id=9)
=> access_allowed: delete access to "uid=prez,ou=people,dc=goth,dc=net"
"userPassword" requested
=> acl_get: [1] attr userPassword
access_allowed: no res from state (userPassword)
=> acl_mask: access to entry "uid=prez,ou=people,dc=goth,dc=net", attr
"userPassword" requested
=> acl_mask: to all values by "uid=prez,ou=people,dc=goth,dc=net", (=0)
<= check a_dn_pat: cn=root,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: cn=nssldap,ou=dsa,dc=goth,dc=net
<= check a_dn_pat: self
<= acl_mask: [3] applying write(=wrscxd) (stop)
<= acl_mask: [3] mask: write(=wrscxd)
=> access_allowed: delete access granted by write(=wrscxd)
==>backsql_modify_internal(): traversing modifications list
   backsql_modify_internal(): modifying attribute "userPassword" (replace)
according to mappings for objectClass "gnUser"
   backsql_modify_internal(): replacing values for attribute "userPassword"
   backsql_modify_internal(): delete procedure is not defined for attribute
"userPassword" - adding only
   backsql_modify_internal(): adding new values for attribute "userPassword"
   backsql_modify_internal(): arg2="7"
   backsql_modify_internal(): arg1="{SHA}GCf1rKqqIm82tZmejy2RQX6zihM=";
executing "select set_gnUser_userPassword(?,?)"
<==backsql_modify_internal(): 0
==>backsql_id2entry()
backsql_id2entry(): retrieving all attributes
==>backsql_get_attr_vals(): oc="gnUser" attr="c" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="l" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="cn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="sn" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="st" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uid" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mail" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="title" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="street" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="gidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="givenName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowMax" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="uidNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="labeledURI" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="lastUpdate" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="loginShell" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="postalCode" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="description" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="displayName" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="objectClass" keyval=7
backsql_get_attr_vals(): number of values in query: 2
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="creationTime" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="userPassword" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="homeDirectory" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="telephoneNumber" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailLocalAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="shadowLastChange" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="mailRoutingAddress" keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="facsimileTelephoneNumber"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationAnswer"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
==>backsql_get_attr_vals(): oc="gnUser" attr="passwordVerificationQuestion"
keyval=7
backsql_get_attr_vals(): number of values in query: 1
<==backsql_get_attr_vals()
<==backsql_id2entry()
slapd: schema_check.c:83: entry_schema_check: Assertion `a->a_vals[0].bv_val !=
((void *)0)' failed.
Aborted
== END DUMP 2 =================================================