KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17
System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64
User : nobody ( 99)
PHP Version : 5.2.17
Disable Function : NONE
Directory :  /proc/21585/root/usr/lib64/python2.4/site-packages/ldap/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //proc/21585/root/usr/lib64/python2.4/site-packages/ldap/ldapobject.pyc
m
9oCc@sdZdZdddddgZeo
dkZndkZdkZdkZdkZdk	Zdk
lZd	kl
Z
lZlZd
klZdfdYZdefdYZdefd
YZdefdYZeZdS(s&
ldapobject.py - wraps class _ldap.LDAPObject
written by Michael Stroeder <michael@stroeder.com>

See http://python-ldap.sourceforge.net for details.

\$Id: ldapobject.py,v 1.92 2005/11/03 09:09:43 stroeder Exp $

Compability:
- Tested with Python 2.0+ but should work with Python 1.5.x
- LDAPObject class should be exactly the same like _ldap.LDAPObject

Usage:
Directly imported by ldap/__init__.py. The symbols of _ldap are
overridden.

Thread-lock:
Basically calls into the LDAP lib are serialized by the module-wide
lock self._ldap_object_lock.
s0.7.0t
LDAPObjecttSimpleLDAPObjecttNonblockingLDAPObjecttReconnectLDAPObjecttSmartLDAPObjectN(sSCHEMA_ATTRS(sLDAPControlsDecodeControlTuplessEncodeControlTuples(s	LDAPErrorcBs\tZdZhdei<dei<dei<dei<dei<dei	<Z
dedd	Zd
Z
dZdZd
ZeedZdZeedZeedZdZdZddeedZddeedZeidZeidZeeeidZeedZeedZdZ dZ!eedZ"eedZ#d Z$d!Z%dd"Z&eed#Z'eed$Z(d%Z)d&Z*d'd(Z+d'd)Z,eed*Z-eed+Z.ed'eed,Z/ed'd-Z0ei1d'ed.Z2e3i1d'ed/Z4e3i1d'ed0Z5d1edeed2dd3Z6d1edeed2dd4Z7d1edd5Z8d1edd6Z9d1edd2d7Z:d8Z;d9Z<eed:Z=eed;Z>d<Z?d=Z@eed>ZAd?ZBd@ZCddAZDedBZERS(Cs3
  Drop-in wrapper class around _ldap.LDAPObject
  tprotocol_versiontdereft	referralst	timelimitt	sizelimittnetwork_timeoutiicCsq||_|pti|_||_||_
|i|_t
iiti||_d|_t
i|_dS(Ni(ttrace_leveltselft_trace_levelt
trace_filetsyststdoutt_trace_filettrace_stack_limitt_trace_stack_limitturit_urit
_ldap_lockt_ldap_object_locktldapt	functionst_ldap_function_callt_ldapt
initializet_lttimeouttVERSION3R(RRRRR((t5/usr/lib64/python2.4/site-packages/ldap/ldapobject.pyt__init__:s				cCs#tiotiSntiSdS(N(Rt	LIBLDAP_RtLDAPLockt_ldap_module_lock(R((R RGs
cOswto|idjot|iid|i|iid|it	|t	|f|idjo ti
d|id|iqqn|iiy(z|||}Wd|iiXWnYtj
oM}to:|idjo*|iid	|iit|fnnXtoL|idjo<|djo+|djo|iid
t	|qsn|S(s[
    Wrapper method mainly for serializing calls into OpenLDAP libs
    and trace logs
    is*** %s - %s (%s,%s)
t.itlimittfileNis=> LDAPError - %s: %s
s=> result: %s
(NN(t	__debug__RR
RtwriteRt	__class__t__name__tfunctreprtargstkwargst	tracebacktprint_stackRRtacquiretresulttreleaset	LDAPErrortetstrtNone(RR,R.R/R6R3((R t
_ldap_callMs(@(
*"cCs?|ii|o|i|i||n||i|<dS(N(RtCLASSATTR_OPTION_MAPPINGthas_keytnamet
set_optiontvaluet__dict__(RR<R>((R t__setattr__jscCsp|ii|o|i|i|SnB|ii|o|i|Sn td|iit	|fdS(Ns%s has no attribute %s(
RR:R;R<t
get_optionR?tAttributeErrorR*R+R-(RR<((R t__getattr__ps
cCs(|i|ii|t|t|S(s
    abandon_ext(msgid[,serverctrls=None[,clientctrls=None]]) -> None    
    abandon(msgid) -> None    
        Abandons or cancels an LDAP operation in progress. The msgid should
        be the message id of an outstanding LDAP operation as returned
        by the asynchronous methods search(), modify() etc.  The caller
        can expect that the result of an abandoned operation will not be
        returned from a future call to result().
    N(RR9Rtabandon_exttmsgidtEncodeControlTuplestserverctrlstclientctrls(RRERGRH((R RDzs	cCs|i|ddS(N(RRDRER8(RRE((R tabandonscCs+|i|ii||t|t|S(s\
    add_ext(dn, modlist[,serverctrls=None[,clientctrls=None]]) -> int
        This function adds a new entry with a distinguished name
        specified by dn which means it must not already exist.
        The parameter modlist is similar to the one passed to modify(),
        except that no operation integer need be included in the tuples.
    N(	RR9Rtadd_exttdntmodlistRFRGRH(RRKRLRGRH((R RJscCs4|i||||}|i|ddd|iS(NtalliR(	RRJRKRLRGRHRER3R(RRKRLRGRHRE((R t	add_ext_sscCs|i||ddS(s2
    add(dn, modlist) -> int
        This function adds a new entry with a distinguished name
        specified by dn which means it must not already exist.
        The parameter modlist is similar to the one passed to modify(),
        except that no operation integer need be included in the tuples.
    N(RRJRKRLR8(RRKRL((R taddscCs.|i||}|i|ddd|iS(NRMiR(RRORKRLRER3R(RRKRLRE((R tadd_sstcCs+|i|ii||t|t|S(s1
    simple_bind([who='' [,cred='']]) -> int
    N(	RR9Rtsimple_bindtwhotcredRFRGRH(RRSRTRGRH((R RRscCs4|i||||}|i|ddd|iS(s4
    simple_bind_s([who='' [,cred='']]) -> None
    RMiRN(	RRRRSRTRGRHRER3R(RRSRTRGRHRE((R t
simple_bind_sscCs*|tijp
td|i||S(s(
    bind(who, cred, method) -> int
    s/Only simple bind supported in LDAPObject.bind()N(tmethodRtAUTH_SIMPLEtAssertionErrorRRRRSRT(RRSRTRV((R tbindscCs1|i|||}|i|ddd|iS(s+
    bind_s(who, cred, method) -> None
    RMiRN(RRYRSRTRVRER3R(RRSRTRVRE((R tbind_sscCs.|i|ii||t|t||S(s4
    sasl_interactive_bind_s(who, auth) -> None
    N(
RR9Rtsasl_interactive_bind_sRStauthRFRGRHt
sasl_flags(RRSR\RGRHR]((R R[scCs.|i|ii|||t|t|S(s(
    compare_ext(dn, attr, value [,serverctrls=None[,clientctrls=None]]) -> int
    compare_ext_s(dn, attr, value [,serverctrls=None[,clientctrls=None]]) -> int    
    compare(dn, attr, value) -> int
    compare_s(dn, attr, value) -> int    
        Perform an LDAP comparison between the attribute named attr of
        entry dn, and the value value. The synchronous form returns 0
        for false, or 1 for true.  The asynchronous form returns the
        message id of the initiates request, and the result of the
        asynchronous compare can be obtained using result().

        Note that this latter technique yields the answer by raising
        the exception objects COMPARE_TRUE or COMPARE_FALSE.

        A design bug in the library prevents value from containing
        nul characters.
    N(
RR9Rtcompare_extRKtattrR>RFRGRH(RRKR_R>RGRH((R R^scCsu|i|||||}y |i|ddd|i	Wn3t
ij
odSnt
ij
odSnXdS(NRMiRi(RR^RKR_R>RGRHRER3RRtCOMPARE_TRUEt
COMPARE_FALSER8(RRKR_R>RGRHRE((R t
compare_ext_ss 	cCs|i|||ddS(N(RR^RKR_R>R8(RRKR_R>((R tcomparescCs|i|||ddS(N(RRbRKR_R>R8(RRKR_R>((R t	compare_sscCs(|i|ii|t|t|S(s
    delete(dn) -> int
    delete_s(dn) -> None
    delete_ext(dn[,serverctrls=None[,clientctrls=None]]) -> int
    delete_ext_s(dn[,serverctrls=None[,clientctrls=None]]) -> None
        Performs an LDAP delete operation on dn. The asynchronous
        form returns the message id of the initiated request, and the
        result can be obtained from a subsequent call to result().
    N(RR9Rt
delete_extRKRFRGRH(RRKRGRH((R Res	cCs1|i|||}|i|ddd|iS(NRMiR(RReRKRGRHRER3R(RRKRGRHRE((R tdelete_ext_sscCs|i|ddS(N(RReRKR8(RRK((R tdeletescCs|i|ddS(N(RRfRKR8(RRK((R tdelete_sscCsg}|itipgD]!}|idjo||qq~}|o|i	t
d|dn|i
ti|dS(sk
    manage_dsa_it() -> None
    Enable or disable manageDSAit mode (see draft-zeilenga-ldap-namedref)
    s2.16.840.1.113730.3.4.2N(t_[1]RRARtOPT_SERVER_CONTROLStctcontrolTypetall_server_ctrlstenabletappendtLDAPControltcriticalR8R=(RRnRqRmRkRi((R t
manage_dsa_its
HcCs+|i|ii||t|t|S(sN
    modify_ext(dn, modlist[,serverctrls=None[,clientctrls=None]]) -> int
    N(	RR9Rt
modify_extRKRLRFRGRH(RRKRLRGRH((R RsscCs4|i||||}|i|ddd|iS(NRMiR(	RRsRKRLRGRHRER3R(RRKRLRGRHRE((R tmodify_ext_sscCs|i||ddS(s
    modify(dn, modlist) -> int
    modify_s(dn, modlist) -> None    
    modify_ext(dn, modlist[,serverctrls=None[,clientctrls=None]]) -> int
    modify_ext_s(dn, modlist[,serverctrls=None[,clientctrls=None]]) -> None
        Performs an LDAP modify operation on an entry's attributes.
        dn is the DN of the entry to modify, and modlist is the list
        of modifications to make to the entry.

        Each element of the list modlist should be a tuple of the form
        (mod_op,mod_type,mod_vals), where mod_op is the operation (one
        of MOD_ADD, MOD_DELETE, or MOD_REPLACE), mod_type is a string
        indicating the attribute type name, and mod_vals is either
        a string value or a list of string values to add, delete or
        replace respectively.  For the delete operation, mod_vals may
        be None indicating that all attributes are to be deleted.

        The asynchronous modify() returns the message id of the
        initiated request.
    N(RRsRKRLR8(RRKRL((R tmodifyscCs.|i||}|i|ddd|iS(NRMiR(RRuRKRLRER3R(RRKRLRE((R tmodify_s/sicCs|i||d|S(sg
    modrdn(dn, newrdn [,delold=1]) -> int
    modrdn_s(dn, newrdn [,delold=1]) -> None    
        Perform a modify RDN operation. These routines take dn, the
        DN of the entry whose RDN is to be changed, and newrdn, the
        new RDN to give to the entry. The optional parameter delold
        is used to specify whether the old RDN should be kept as
        an attribute of the entry or not.  The asynchronous version
        returns the initiated message id.

        This operation is emulated by rename() and rename_s() methods
        since the modrdn2* routines in the C library are deprecated.
    N(RtrenameRKtnewrdnR8tdelold(RRKRxRy((R tmodrdn3s
cCs|i||d|S(N(Rtrename_sRKRxR8Ry(RRKRxRy((R tmodrdn_sCscCs.|i|ii|||t|t|S(N(
RR9RtpasswdtusertoldpwtnewpwRFRGRH(RR~RRRGRH((R R}FscCs7|i|||||}|i|ddd|i	S(NRMiR(
RR}R~RRRGRHRER3R(RR~RRRGRHRE((R tpasswd_sIsc	Cs1|i|ii||||t|t|S(s
    rename(dn, newrdn [, newsuperior=None [,delold=1][,serverctrls=None[,clientctrls=None]]]) -> int
    rename_s(dn, newrdn [, newsuperior=None] [,delold=1][,serverctrls=None[,clientctrls=None]]) -> None
        Perform a rename entry operation. These routines take dn, the
        DN of the entry whose RDN is to be changed, newrdn, the
        new RDN, and newsuperior, the new parent DN, to give to the entry.
        If newsuperior is None then only the RDN is modified.
        The optional parameter delold is used to specify whether the
        old RDN should be kept as an attribute of the entry or not.
        The asynchronous version returns the initiated message id.

        This actually corresponds to the rename* routines in the
        LDAP-EXT C API library.
    N(RR9RRwRKRxtnewsuperiorRyRFRGRH(RRKRxRRyRGRH((R RwMscCs4|i||||}|i|ddd|iS(NRMiR(	RRwRKRxRRyRER3R(RRKRxRRyRE((R R{^scCs(|i|||\}}}||fS(s	
    result([msgid=RES_ANY [,all=1 [,timeout=None]]]) -> (result_type, result_data)

        This method is used to wait for and return the result of an
        operation previously initiated by one of the LDAP asynchronous
        operation routines (eg search(), modify(), etc.) They all
        returned an invocation identifier (a message id) upon successful
        initiation of their operation. This id is guaranteed to be
        unique across an LDAP session, and can be used to request the
        result of a specific operation via the msgid parameter of the
        result() method.

        If the result of a specific operation is required, msgid should
        be set to the invocation message id returned when the operation
        was initiated; otherwise RES_ANY should be supplied.

        The all parameter only has meaning for search() responses
        and is used to select whether a single entry of the search
        response should be returned, or to wait for all the results
        of the search before returning.

        A search response is made up of zero or more search entries
        followed by a search result. If all is 0, search entries will
        be returned one at a time as they come in, via separate calls
        to result(). If all is 1, the search response will be returned
        in its entirety, i.e. after all entries and the final search
        result have been received.

        For all set to 0, result tuples
        trickle in (with the same message id), and with the result type
        RES_SEARCH_ENTRY, until the final result which has a result
        type of RES_SEARCH_RESULT and a (usually) empty data field.
        When all is set to 1, only one result is returned, with a
        result type of RES_SEARCH_RESULT, and all the result tuples
        listed in the data field.

        The method returns a tuple of the form (result_type,
        result_data).  The result_type is one of the constants RES_*.

        See search() for a description of the search result's
        result_data, otherwise the result_data is normally meaningless.

        The result() method will block for timeout seconds, or
        indefinitely if timeout is negative.  A timeout of 0 will effect
        a poll. The timeout can be expressed as a floating-point value.
        If timeout is None the default in self.timeout is used.

        If a timeout occurs, a TIMEOUT exception is raised, unless
        polling (timeout = 0), in which case (None, None) is returned.
    N(Rtresult2RERMRtres_typetres_datat	res_msgid(RRERMRRRR((R R3bs2cCs.|i|||\}}}}|||fS(N(	Rtresult3RERMRRRRt	srv_ctrls(RRERMRRRRR((R Rs!c	Cs`|djo
|i}n|i|ii|||\}}}}t|}||||fS(N(RR8RR9RRRERMtrtypetrdatatrmsgidRGtDecodeControlTuplestdecoded_serverctrls(	RRERMRRRRRGR((R Rs


*s(objectClass=*)ic

Cs:|i|ii|||||t	|t	|||	
S(s
    search(base, scope [,filterstr='(objectClass=*)' [,attrlist=None [,attrsonly=0]]]) -> int
    search_s(base, scope [,filterstr='(objectClass=*)' [,attrlist=None [,attrsonly=0]]])
    search_st(base, scope [,filterstr='(objectClass=*)' [,attrlist=None [,attrsonly=0 [,timeout=-1]]]])
    search_ext(base,scope,[,filterstr='(objectClass=*)' [,attrlist=None [,attrsonly=0 [,serverctrls=None [,clientctrls=None [,timeout=-1 [,sizelimit=0]]]]]]])
    search_ext_s(base,scope,[,filterstr='(objectClass=*)' [,attrlist=None [,attrsonly=0 [,serverctrls=None [,clientctrls=None [,timeout=-1 [,sizelimit=0]]]]]]])

        Perform an LDAP search operation, with base as the DN of
        the entry at which to start the search, scope being one of
        SCOPE_BASE (to search the object itself), SCOPE_ONELEVEL
        (to search the object's immediate children), or SCOPE_SUBTREE
        (to search the object and all its descendants).

        filter is a string representation of the filter to
        apply in the search (see RFC 2254).

        Each result tuple is of the form (dn,entry), where dn is a
        string containing the DN (distinguished name) of the entry, and
        entry is a dictionary containing the attributes.
        Attributes types are used as string dictionary keys and attribute
        values are stored in a list as dictionary value.

        The DN in dn is extracted using the underlying ldap_get_dn(),
        which may raise an exception of the DN is malformed.

        If attrsonly is non-zero, the values of attrs will be
        meaningless (they are not transmitted in the result).

        The retrieved attributes can be limited with the attrlist
        parameter.  If attrlist is None, all the attributes of each
        entry are returned.

        serverctrls=None

        clientctrls=None

        The synchronous form with timeout, search_st() or search_ext_s(),
        will block for at most timeout seconds (or indefinitely if
        timeout is negative). A TIMEOUT exception is raised if no result is
        received within the time.

        The amount of search results retrieved can be limited with the
        sizelimit parameter if non-zero.
    N(RR9Rt
search_exttbasetscopet	filterstrtattrlistt	attrsonlyRFRGRHRR	(
RRRRRRRGRHRR	((R Rs,			c

CsD|i|||||||||		}
|i|
ddd|dS(NRMiR(
RRRRRRRRGRHRR	RER3(RRRRRRRGRHRR	RE((R tsearch_ext_ss'cCs|i|||||ddS(N(RRRRRRRR8(RRRRRR((R tsearchsc
Cs(|i|||||ddd|iS(NR(	RRRRRRRR8R(RRRRRR((R tsearch_ssc	Cs"|i|||||dd|S(N(	RRRRRRRR8R(RRRRRRR((R t	search_stscOs|i|ii||S(s
    set_cache_options(option) -> None    
        Changes the caching behaviour. Currently supported options are
            CACHE_OPT_CACHENOERRS, which suppresses caching of requests
                that resulted in an error, and
            CACHE_OPT_CACHEALLERRS, which enables caching of all requests.
        The default behaviour is not to cache requests that result in
        errors, except those that result in a SIZELIMIT_EXCEEDED exception.
    N(RR9Rtset_cache_optionsR.R/(RR.R/((R Rs	cCs|i|iiS(s
    start_tls_s() -> None    
    Negotiate TLS with server. The `version' attribute must have been
    set to VERSION3 before calling start_tls_s.
    If TLS could not be started an exception will be raised.
    N(RR9Rtstart_tls_s(R((R RscCs%|i|iit|t|S(s
    unbind() -> int    
    unbind_s() -> None
    unbind_ext() -> int    
    unbind_ext_s() -> None
        This call is used to unbind from the directory, terminate
        the current association, and free resources. Once called, the
        connection to the LDAP server is closed and the LDAP object
        is invalid. Further invocation of methods on the object will
        yield an exception.
    
        The unbind and unbind_s methods are identical, and are
        synchronous in nature
    N(RR9Rt
unbind_extRFRGRH(RRGRH((R RscCsC|i||}|djo |i|ddd|iSndS(NRMiR(RRRGRHRER8R3R(RRGRHRE((R tunbind_ext_ss
cCs|iddS(N(RRR8(R((R tunbindscCs|iddS(N(RRR8(R((R tunbind_sscCs|i|ii||S(N(RR9Rtwhoami_sRGRH(RRGRH((R RscCsL|i|ii|}|tijp|tijot	|}n|S(N(
RR9RRAtoptionR3RRjtOPT_CLIENT_CONTROLSR(RRR3((R RAs cCsI|tijp|tijot|}n|i|ii	||S(N(
RRRjRRFtinvalueRR9RR=(RRR((R R= s cCsy"|i|tiddg}WnDtititifj
o
g}nti	j
odSnXyv|oktii|dd}|i
ddgd}|djo#|o|iddSqdSq|SnWntj
odSnXdS(s
    Returns the distinguished name of the sub schema sub entry
    for a part of a DIT specified by dn.

    None as result indicates that the DN of the sub schema sub entry could
    not be determined.
    s(objectClass=*)tsubschemaSubentryiiRKRQN(RRRKRt
SCOPE_BASEtrtNO_SUCH_OBJECTtNO_SUCH_ATTRIBUTEtINSUFFICIENT_ACCESStUNDEFINED_TYPER8tcidictR6tgettsearch_subschemasubentry_dntsearch_subschemasubentry_st
IndexError(RRKR6RR((R R%s$" 
	
cCsh|pt}y|i|tid|}Wntij
odSnX|o|ddSndSdS(s1
    Returns the sub schema sub entry's data
    s(objectClass=subschema)iiN(
tattrstSCHEMA_ATTRSRRtsubschemasubentry_dnRRRRR8(RRRR((R tread_subschemasubentry_sEs

	(FR+t
__module__t__doc__RtOPT_PROTOCOL_VERSIONt	OPT_DEREFt
OPT_REFERRALSt
OPT_TIMELIMITt
OPT_SIZELIMITtOPT_NETWORK_TIMEOUTR:R8R!RR9R@RCRDRIRJRNRORPRRRURWRYRZt
SASL_QUIETR[R^RbRcRdReRfRgRhRrRsRtRuRvRzR|R}RRwR{tRES_ANYR3RRRRRRRRRRRRRRRRAR=RR(((R R+spN

				
	
	
	
						66							 cBsDtZddddZeidddZdddddZRS(NiicCs#||_ti||||dS(N(tresult_timeoutRt_result_timeoutRR!RRR(RRRRR((R R![s	icCs|i|ii|d|i}|p|Snti}g}x|ox|ddjo|djoDti||jo-|i|ii
|tid|ntid|i|ii|d|i}qOW|ddjoPn|i|dd}qEW|S(s
    is#LDAP time limit (%d secs) exceeded.f1.0000000000000001e-05iN(NN(RR9RR3RERtldap_resultRMttimet
start_timetall_resultsR8RRIRtTIMEOUTtsleeptextend(RRERMRRRR((R R3_s(!$
&s(objectClass=*)cCs4|i|||||}|i|ddd|S(NRMiR(
RRRRRRRRER3R(RRRRRRRRE((R Rvs(R+RR8R!RRR3R(((R RYscBstZdZhde<de<de<ZdeddddZd	Zd
ZdZdZ	d
Z
dZdZdZ
dZdZdZdZdZdZdZdZRS(s
  In case of server failure (ldap.SERVER_DOWN) the implementations
  of all synchronous operation methods (search_s() etc.) are doing
  an automatic reconnect and rebind and will retry the very same
  operation.
  
  This is very handy for broken LDAP server implementations
  (e.g. in Lotus Domino) which drop connections very often making
  it impossible to have a long-lasting control flow in the
  application.
  RRRiiif60.0cCs\||_h|_d|_ti|||||||_||_d|_d|_dS(s
    Parameters like SimpleLDAPObject.__init__() with these
    additional arguments:

    retry_max
        Maximum count of reconnect trials
    retry_delay
        Time span to wait between two reconnect trials
    ilN(RRRt_optionsR8t
_last_bindRR!RRRt	retry_maxt
_retry_maxtretry_delayt_retry_delayt
_start_tlst_reconnects_done(RRRRRRR((R R!s
						cCsKh}x>|iiD]-\}}|ii|p|||<qqW|S(s-return data representation for pickled objectN(tdRR?titemstktvt__transient_attrs__R;(RRRR((R t__getstate__scCs?|ii||i|_ti|_|i	|i
dS(s#set up the object from pickled dataN(RR?tupdateRRRRRRt	reconnectR(RR((R t__setstate__s
cCs7|idjo#|i\}}}|||ndS(N(RRR8R,R.R/(RR.R,R/((R t_apply_last_bindscCs7x0|iiD]\}}ti|||qWdS(sRestore all recorded optionsN(RRRRRRR=(RRR((R t_restore_optionsscCs|i}x|oto9|idjo)|iid|i|d|fnyKti	i
ti||_
|i|io|in|iWnto9|idjo)|iid|i|d|fn|d}|pnto+|idjo|iid|inti|iqXto9|idjo)|iid|i|d|fn|id|_PqWdS(Nis*** Try %d. reconnect to %s...
s*** %d. reconnect to %s failed
s=> delay %s...
sD*** %d. reconnect to %s successful, last operation will be repeated
l(RRtreconnect_counterR(R
RR)RRRRRRRRRRRRRRR(RRR((R Rs0	)

)
)cOsQy||||SWn6tij
o'|i|i||||SnXdS(N(R,RR.R/RtSERVER_DOWNRR(RR,R.R/((R t_apply_method_ss
cCs$||i|<ti|||dS(N(RRRRRR=(RRR((R R=s
cOs(|i||f|_ti|||S(N(RRUR.R/RR(RR.R/((R RUscCsti|}d|_|S(Ni(RRRtresR(RR((R Rs	cOs(|i||f|_ti|||S(s4
    sasl_interactive_bind_s(who, auth) -> None
    N(RR[R.R/RR(RR.R/((R R[scOs|iti||S(N(RRRRNR.R/(RR.R/((R RNscOs|iti||S(N(RRRRdR.R/(RR.R/((R RdscOs|iti||S(N(RRRRfR.R/(RR.R/((R RfscOs|iti||S(N(RRRRtR.R/(RR.R/((R RtscOs|iti||S(N(RRRR{R.R/(RR.R/((R R{scOs|iti||S(N(RRRRR.R/(RR.R/((R Rs(R+RRR8RR!RRRRRRR=RURR[RNRdRfRtR{R(((R R{s&!					%											c
Bs;tZdZdeddddddeeeedZRS(s
  Mainly the __init__() method does some smarter things
  like negotiating the LDAP protocol version and calling
  LDAPObject.start_tls_s().
  iiif60.0RQc
Csti||d|d|d|d|d|t	i
|_d|_y|i
||Wn]t	ij
oN|i|`|iti|i|_t	i|_|i
||nX|	djo|d djo|it	i
joQy|iWn3t	it	ifj
o|	d	joq5qSXd
|_qW|	d	jo
tdqWn|it	ijp|o|o|i
||ndS(
s
    Return LDAPObject instance by opening LDAP connection to
    LDAP host specified by LDAP URL.

    Unlike ldap.initialize() this function also trys to bind
    explicitly with the bind DN and credential given as parameter,
    probe the supported LDAP version and trys to use
    StartTLS extended operation if this was specified.

    Parameters like ReconnectLDAPObject.__init__() with these
    additional arguments:
    who,cred
        The Bind-DN and credential to use for simple bind
        right after connecting.
    start_tls
        Determines if StartTLS extended operation is tried
        on a LDAPv3 server and if the LDAP URL scheme is ldap:.
        If LDAP URL scheme is not ldap: (e.g. ldaps: or ldapi:)
        this parameter is ignored.
        0       Don't use StartTLS ext op
        1       Try StartTLS ext op but proceed when unavailable
        2       Try StartTLS ext op and re-raise exception if it fails
    tls_cacertfile

    tls_clcertfile

    tls_clkeyfile

    RRRRRiisldap:iis<StartTLS extended operation only possible on LDAPv3+ server!N(RR!RRRRRRRRRRtstarted_tlsRURSRTtPROTOCOL_ERRORRRR9RRRtVERSION2t	start_tlsRt
CONNECT_ERRORt
ValueError(RRRRRRRRSRTRttls_cacertfilet
tls_cacertdirttls_clcertfilet
tls_clkeyfile((R R!s8%
	


!(R+RRR8R!(((R Rs(Rt__version__t__all__R(R0RRRRtldap.functionstldap.schemaRt
ldap.controlsRpRRFR5RRRRR(RRRRRRFRRR0RpRRR5RRRR((R t?s	
-

0"V

Anon7 - 2021