Your IP : 172.28.240.42


Current Path : /usr/lib/apache2/modules/
Upload File :
Current File : //usr/lib/apache2/modules/mod_authnz_ldap.so

ELF>@q@8@ZZ ii i  HlHl Hl $$Ptd0W0W0WQtdRtdii i   GNU*j4	C7`e9 0@	9;>BE|qXdL	8~G)qFixR e\xp?V7+ r/J"ee'p p p ? p h	8<__gmon_start___init_fini__cxa_finalize_Jv_RegisterClassesauthnz_ldap_moduleapr_ldap_url_parseapr_pstrdupstrlenapr_pallocstrcpymemsetstrcasecmpstrncasecmpgetpidap_log_errorap_register_providerap_hook_post_configap_hook_auth_checkerap_hook_optional_fn_retrieveapr_dynamic_fn_retrieveapr_thread_mutex_createapr_array_makeapr_array_pushapr_hash_getapr_pstrndupap_find_linked_moduleap_server_root_relativeap_pcfg_openfileapr_hash_makeap_cfg_getlineap_getword_confap_str_tolowerapr_hash_setap_cfg_closefile__stack_chk_failapr_table_getapr_xlate_openapr_xlate_conv_bufferapr_snprintfstrchrap_log_rerrorldap_err2stringapr_pstrcat__ctype_toupper_locapr_table_setnstrcmpap_requiresap_getword_whiteapr_pool_cleanup_nullapr_pool_cleanup_registerapr_thread_mutex_lockapr_thread_mutex_unlockap_getwordap_note_basic_auth_failureap_set_string_slotap_set_flag_slotlibldap_r-2.4.so.2libpthread.so.0libc.so.6_edata__bss_start_endmod_authnz_ldap.soOPENLDAP_2.4_2GLIBC_2.4GLIBC_2.2.5GLIBC_2.3 ii
ui	ii
 j (0j >@j >Hj `j Lhj >j PQj >j Qj ?j Qj ?k HRk 1?(k  S0k M?Pk SXk d?xk Tk ~?k "k Uk ?k xUk ?k @!k @Vk ?l pl Vp p 0p K=Xp xp @j p pj 6j 6k 6j "j "8k "`k "k "o o (o <o .o 50n 8n @n Hn Pn Xn `n hn 	pn 
xn n n 
n n n n n n n n n n n n n n o o o o   o !(o #0o $8o %@o &Ho 'Po )Xo *`o +ho ,po -xo /o 0o 1o 2o 3o 4o 5o 7o 8H?U&H5W %W @%W h%W h%W h%W h%W h%W h%W h%W hp%W h`%W h	P%zW h
@%rW h0%jW h %bW h
%ZW h%RW h%JW h%BW h%:W h%2W h%*W h%"W h%W h%W hp%
W h`%W hP%V h@%V h0%V h %V h%V h%V h%V h %V h!%V h"%V h#%V h$%V h%%V h&%V h'p%V h(`%V h)P%zV h*@%rV h+0%jV h, %bV h-%ZV h.%RV h/%JV h0%BV h1HH5V HtHÐU=V HATSubH=(V tH=?V H+P L%P HV L)HHH9s DHHV AHV H9rvV [A\]fH=O UHtHU Ht]H=O @]ÐH>V 1Hffffff.H
YU HGHHcIH@PH1fDAWAVAUIATIUHSHLHH8HL$xHT$p-t!HD$xHHĈ[]A\A]A^A_H}8LH{ HCHIHD$pHxH}8ItwIHD$pLHpsLfA Hs LHT$pLs Hr H!HtH}8HT$pHC0HB(HH8HxAt#AfDHAHxuAMcIH}8L1LHHT$pHC@HJ(H1Ht?AE1DMIH}8IIHT$pINHB(J40HC@HuHHC81z0CHHr8HV>(H}8HCPMtkH= L4H=i L-H= Lt H= LH#ǃH5^ L\tHD$pǃ|PǃDщS(H5Ht$hP0HH8Ht HtHHHEHP(L%HtL"HP DxLpHL$`HT$XNHt$hHL$`L
"HT$XLEHH=$1H\$0Ht$@HL$8HT$ 1ɺLd$(D|$Lt$Ll$1HT$pHHrHtH}8HT$pHC 5@HHC8H}8HIHCPHAD	fHD$pPǃDщS(HMHT$hHrHSPǃǃL9K H
oHjH5hH[H=$
116HK H=
1H=
11H#H=HH=H*Q H=HQ H= HQ H=!H	Q H=&HP H=)HP HP HfUHSHHHǺ@@1Ht
Ht	fHtH{H+H1H
HHǃHC HC`HCHChHCpCXǃCǃCtHCxǃH[]@Hx@
DfH@fHfffff.UH=HSHHHtqH5H"t^H=
HtkH=HthH=Ht5H5tHHtH[]fCXH1[]CXH1[]CX1DCX1DH\$Hl$HH(HH
~H\$Hl$ H(@HT$nHT$H{8HHHE1fH\$HHl$H(HHH5tH=9N HHHHtHH\$Hl$ H(L@HHD$;HHt$v{-tHH\$Hl$ H(úHHH=M HHBHHtH\$Hl$HLd$Lt$ILl$HX L5sL dH%(H$( 1HAPH=HIcVL,uH1MtXLLHIH|$HHtzL
H=wI1L,$H$( dH3%(H$0 H$8 L$@ L$H L$P HX fDLHl$ H|L @HT$ HF|$ #Hl$tHt$LEHI:HD$8tHt$L#H=L HHLIcVHCPL
H=eIع8NHкH$1H|$H5L?HHK 1HL
H=I1ɲL,$7DL
H=I1ɺOwUHHH5S1H&HtmH}H5t';Hu@QtH;t,uH}H1YHt HMH5J H|$HHD\$HH[]f.AWMAVIAUMATUHSHH(H5H;HMI[H;LxIH=-J tpHHHItYLLH;HT@HD$HHT$H$H$1HLD$HT$HLLHD$#MEH6 LH1LHA4$H\@tOI9wHf@t:H=@Ht\HI9vA$IHA4$I9wHI9sH([]A\A]A^A_fDHHHfE))EH([]A\A]A^A_@M?Ht$H;Iff.AWAVAUIATUHSH L%G dH%(H$ 1H`H?IcT$Ht$PHD$`HHD$h+HH@IIcT$HhL4Ћu*H$ dH3%(HĘ []A\A]A^A_ÐD$LLt$XHs H^DKXHLChHK`S($G LcIL
H=&$11ILd$MM2H|$PeHT$PLKPLC8H$1HMH=NG thHHHItQLmH}Ld@HD$pLLd$xL1HLD$xHT$pHLLIJMEHD$`LK@DCHHK0HSLHD$HD$hLd$HHD$H$H$F AL_F Al$LSpDuhMgPIH`pHT$PL
H=$I11ɾLl$ HT$Ld$H\$fDMoPIH`HT$PL
H=`$11ILt$ HT$Ll$H\$xA AT$0o1A^L
H=$I11ɺ(]L
$I1ɺH=1LD L
$I1ɺELt$XcHt$hH}Ht$PIH}IFCtt
IH@HS@HH|$`HLHAE1E1@H}H511|P
HƄtLHH
T$0HD$@HL$8Ht$@T$0HL$8H~LAHHWuHD$`LJ($H{xHS@HtJ4*HT$0HT$0t J"ID$Ht7MIGHD$`H}AJ4(H@HS@EH[xu@HT$PL
,H=$I11ɾ
HT$HtCL
H=$I1ɺ1H\$PAWE1AVAUATUHSH HA DdH%(H$ 1HcBHhHHT$@H`HHItLxHDŽ$HDŽ$AD$DA1ML|$HII߉IA9\$MutIEH}Ht$xHD$xH=HƹuLL|$HHs H=	DKXHLChHK`S($A H
@ H}H6HI;H@YH@Ht8u/HHL
H=
I1ɺH$1H|$@	E\$E
HKP1Ld$H1Ld$@Lt$@HL$XAfDHL$HAID9qHt$@I7tIGH}Ht$xHD$xH=
HI$HY
9P
HSLL$xLLC8Hz@ 
*IUPHD$0HT$(HL$0HT$(L
$I辿HL$HT$1ɺOIUPHD$0HT$(6HL$0HT$(L
u$IHL$HT$1ɺH=m1HD$x8H}Ht$xHSILC8I$LH? kL
H=$I11ɺ?1H$ dH34%(%HĨ []A\A]A^A_@[L
H=$I11ɺRDH=HI$H	9	HSDLLD$xH> 	_IMPHT$xHD$8HT$(HL$0Ht$8HL$0L
HT$(H=$I1Ht$HL$HT$1ɺ;H=HAHDH@EHD$PII$H8HT$xHT$(HT$(L
H=\
$11I	HT$HDHE_HT$P1L|$`Dt$lAMIIHT$PI$HL$0HT$(HL$0HT$(H=	L
$I1HL$HL$PHT$HL$1H= MHSM$LHL$xHЃAIIMPHT$xHD$8HT$(HL$0Ht$8HL$0L
HT$(H=,	$I1Ht$HL$HT$1ɺIHD9xDHL$xEIvHt$PD.fDH{'HH5	H0HH	HH{dDH=	HEI$Hx8oHD$x8mL|$PDt$`MMIZ9I^PIL
H=$11IALd$H\$HD$x8hH}Ht$x=H}Ht$xI*H2L
H=1ɉ$I13H\$Ld$IUIMILH: /L
H=7$I11ɺ:c1H=xHƸ8`I$H:HT$x:<HT$(ZHT$(L
H=1ɉ$I1SHT$IT$LL$XLC8HL$xH$HvH$LK@DCHHK0HSH$HD$H$HHt$LH$9 ufH$HT$(HT$(L
H=$I1ɾ`1HT$-HSDLL$I$H"9 ;IUPHD$0HT$(.HL$0HT$(L
H=$I1xHL$HT$1ɺfID$Ht	8H@ID$L
$I1ɺbH=1@{
MNOs_L
H=$I11ɺHfDLd$(HT$(MePIHL
fH=Z$I11ɺLt$Ld$H\$w13ML|$`Dt$lL
H=11I5H$H@LKPLC81HHHD$8H$HD$8LK@DCHHK0HHSHt$H$H$Ht$L6 t@IEPL
I1ɺH$XMLL|$PMDt$`H}H
5 HH@HD$@HhHt$@HcQH4H$H}HT$@HH@HBnL
$I1ɺKL
TH=$I11ɺ1DL
H=p$I11ɺ1XL
q$I1ɺ$L
H=$I11ɺF1L
$I1ɺgL

$I1ɺ)DL
eH=$I11ɺi1IUPHD$0HT$(HT$(HL$0L
[H=O$I1pHT$H$HL$1HT$dL
H=$I11ɺ.oL

$I1ɺLUHSHH0- HtH#- HHHuH[]ÐHHlocalhostnot using SSLbasesubtreeunknownonelevel(null)uidobjectclass=*NONESTARTTLSldapsmod_authnz_ldap.c0ldapauthnuldap_connection_closeuldap_connection_finduldap_cache_comparednuldap_cache_compareuldap_cache_checkuseriduldap_cache_getuserdnuldap_ssl_supportedneveroffsearchingfindingalwaysonISO-8859-1util_ldap.cutf-8accept-language(&(%s)(%s=*()\AUTHENTICATE_ldap-uniquememberldap-userldap-dnldap-groupldap-attributeldap-filtermod_authz_user.cAuthLDAPURLAuthLDAPBindDNAuthLDAPBindPasswordAuthLDAPBindAuthoritativeAuthLDAPRemoteUserIsDNAuthLDAPRemoteUserAttributeAuthzLDAPAuthoritativeAuthLDAPCompareDNOnServerAuthLDAPGroupAttributeAuthLDAPGroupAttributeIsDNAuthLDAPDereferenceAliasesAuthLDAPCharsetConfigInvalid LDAP connection mode setting: must be one of NONE, SSL, or TLS/STARTTLS[%d] auth_ldap url parse: `%s', Host: %s, Port: %d, DN: %s, attrib: %s, scope: %s, filter: %s, connection mode: %sUnrecognized value for AuthLDAPAliasDereference directiveToo many AuthLDAPGroupAttribute directivesModule mod_ldap missing. Mod_ldap (aka. util_ldap) must be loaded in order for mod_auth_ldap to function properlyInvalid charset conversion config path %scould not open charset conversion config file %s.could not find the UTF-8 charset in the file %s.[%d] auth_ldap authenticate: using URL %s[%d] auth_ldap authenticate: no sec->host - weird...?[%d] auth_ldap authenticate: no password specified[%d] auth_ldap authenticate: no user specified[%d] auth_ldap authenticate: user %s authentication failed; URI %s [%s][%s] (not authoritative)[%d] auth_ldap authenticate: user %s authentication failed; URI %s [%s][%s][%d] auth_ldap authenticate: REMOTE_USER was to be set with attribute '%s', but this attribute was not requested for in the LDAP query for the user. REMOTE_USER will fall back to username or DN as appropriate.[%d] auth_ldap authenticate: accepting %s[%d] auth_ldap authorise: no sec->host - weird...?ldap authorize: Userid is blank, AuthType=%sldap authorize: Creating LDAP req structureauth_ldap authorise: User DN not found, %s[%d] auth_ldap authorise: require user: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: require user: authorisation successful[%d] auth_ldap authorise: require user: authorisation failed [%s][%s][%d] auth_ldap authorise: require dn: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: require dn: authorisation successful[%d] auth_ldap authorise: require dn "%s": LDAP error [%s][%s][%d] auth_ldap authorise: require group: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: require group: testing for group membership in "%s"[%d] auth_ldap authorise: require group: testing for %s: %s (%s)[%d] auth_ldap authorise: require group: authorisation successful (attribute %s) [%s][%s][%d] auth_ldap authorise: require group "%s": authorisation failed [%s][%s][%d] auth_ldap authorise: require ldap-attribute: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: checking attribute %s has value %s[%d] auth_ldap authorise: require attribute: authorisation successful[%d] auth_ldap authorise: require attribute: authorisation failed [%s][%s][%d] auth_ldap authorise: require ldap-filter: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: checking filter %s[%d] auth_ldap authorise: checking dn match %s[%d] auth_ldap authorise: require ldap-filter: authorisation successful[%d] auth_ldap authorise: require ldap-filter: %s authorisation failed [%s][%s][%d] auth_ldap authorise: require ldap-filter: authorisation failed [%s][%s][%d] auth_ldap authorise: agreeing because non-restricted[%d] auth_ldap authorise: declining to authorise (not authoritative)[%d] auth_ldap authorise: authorisation denied[%d] auth_ldap authorise: declining to authorise (no ldap requirements)URL to define LDAP connection. This should be an RFC 2255 complaint
URL of the form ldap://host[:port]/basedn[?attrib[?scope[?filter]]].
<ul>
<li>Host is the name of the LDAP server. Use a space separated list of hosts 
to specify redundant servers.
<li>Port is optional, and specifies the port to connect to.
<li>basedn specifies the base DN to start searches from
<li>Attrib specifies what attribute to search for in the directory. If not provided, it defaults to <b>uid</b>.
<li>Scope is the scope of the search, and can be either <b>sub</b> or <b>one</b>. If not provided, the default is <b>sub</b>.
<li>Filter is a filter to use in the search. If not provided, defaults to <b>(objectClass=*)</b>.
</ul>
Searches are performed using the attribute and the filter combined. For example, assume that the
LDAP URL is <b>ldap://ldap.airius.com/ou=People, o=Airius?uid?sub?(posixid=*)</b>. Searches will
be done using the filter <b>(&((posixid=*))(uid=<i>username</i>))</b>, where <i>username</i>
is the user name passed by the HTTP client. The search will be a subtree search on the branch <b>ou=People, o=Airius</b>.DN to use to bind to LDAP server. If not provided, will do an anonymous bind.Password to use to bind to LDAP server. If not provided, will do an anonymous bind.Set to 'on' to return failures when user-specific bind fails - defaults to on.Set to 'on' to set the REMOTE_USER environment variable to be the full DN of the remote user. By default, this is set to off, meaning that the REMOTE_USER variable will contain whatever value the remote user sent.Override the user supplied username and place the contents of this attribute in the REMOTE_USER environment variable.Set to 'off' to allow access control to be passed along to lower modules if the UserID and/or group is not known to this moduleSet to 'on' to force auth_ldap to do DN compares (for the "require dn" directive) using the server, and set it 'off' to do the compares locally (at the expense of possible false matches). See the documentation for a complete description of this option.A list of attributes used to define group membership - defaults to member and uniquememberIf set to 'on', auth_ldap uses the DN that is retrieved from the server forsubsequent group comparisons. If set to 'off', auth_ldap uses the stringprovided by the client directly. Defaults to 'on'.Determines how aliases are handled during a search. Can bo one of thevalues "never", "searching", "finding", or "always". Defaults to always.Character set conversion configuration file. If omitted, character setconversion is disabled.;  @`H `x@8` @zRx$x0FJw?;*3$"DPDL\XLt`OBBB E(D0D8Mf
8A0A(B BBBH`m`HK,0RAID 
AAED$`APJ p
AACK
CAAK
CAAl^MD0b
E$(HI0~
Io
A$yMML@
G$ANF0{DAdBEE E(A0D8G`B
8A0A(B BBBGY
8A0A(B BBBELlBBB E(A0D8GA
8A0A(B BBBBLXBEB B(A0D8GA
8A0A(B BBBE(>>L>`PQ>hQ?pQ?tHR1?x SM?Sd?T~?"U?xU?@!@V?pV8
<o0
n 
	oooo(o#Hl fv&6FVfv&6FVfv&6FVfvp 1K=22PA@j mod_authnz_ldap.so8'.shstrtab.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.ctors.dtors.jcr.data.rel.ro.dynamic.got.data.bss.gnu_debuglink$o<(0008o((~Eo`T

^
h88cPP0nX#t<<z2<<H0W0WWWi ii ij j j  j( Hl Hln np p p pXpp