"Juan A. Diaz" <[EMAIL PROTECTED]> writes:
>
> Bug description: afserver can authorise/deny clients based on whether
> the client provided a valid SSL certificate or not, 
>
> [0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440985
>
> The attached patch was sent to me for that specifically. If you want to
> add this patch in a new relese please let me know so that I can
> re-package it.

My apologies--I seem to have a minor bug in my patch; where the patch reads:

--- apf-0.8.2/src/server_configuration_struct.c	2006-01-25 17:46:48.000000000 -0500
+++ patched/apf-0.8.2/src/server_configuration_struct.c	2007-09-20 15:53:50.000000000 -0400
@@ -66,6 +66,14 @@
     free((*sc)->certificateFile);
     (*sc)->certificateFile = NULL;
   }
+  if ((*sc)->cacertificateFile) {
+    free((*sc)->cacertificateFile);
+    (*sc)->cacertificateFile = NULL;
+  }
+  if ((*sc)->cacertificateFile) {
+    free((*sc)->cacertificatePath);
+    (*sc)->cacertificateFile = NULL;
+  }
   if ((*sc)->keysFile) {
     free((*sc)->keysFile);
     (*sc)->keysFile = NULL;
... it should read:

--- apf-0.8.2/src/server_configuration_struct.c	2006-01-25 17:46:48.000000000 -0500
+++ patched/apf-0.8.2/src/server_configuration_struct.c	2007-09-20 15:53:50.000000000 -0400
@@ -66,6 +66,14 @@
     free((*sc)->certificateFile);
     (*sc)->certificateFile = NULL;
   }
+  if ((*sc)->cacertificateFile) {
+    free((*sc)->cacertificateFile);
+    (*sc)->cacertificateFile = NULL;
+  }
+  if ((*sc)->cacertificatePath) {
+    free((*sc)->cacertificatePath);
+    (*sc)->cacertificatePath = NULL;
+  }
   if ((*sc)->keysFile) {
     free((*sc)->keysFile);
     (*sc)->keysFile = NULL;
-- 
Don't be afraid to ask (Lf.((Lx.xx) (Lr.f(rr)))).

Reply via email to