"Juan A. Diaz" <[EMAIL PROTECTED]> writes: > > Bug description: afserver can authorise/deny clients based on whether > the client provided a valid SSL certificate or not, > > [0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440985 > > The attached patch was sent to me for that specifically. If you want to > add this patch in a new relese please let me know so that I can > re-package it.
My apologies--I seem to have a minor bug in my patch; where the patch reads:
--- apf-0.8.2/src/server_configuration_struct.c 2006-01-25 17:46:48.000000000 -0500 +++ patched/apf-0.8.2/src/server_configuration_struct.c 2007-09-20 15:53:50.000000000 -0400 @@ -66,6 +66,14 @@ free((*sc)->certificateFile); (*sc)->certificateFile = NULL; } + if ((*sc)->cacertificateFile) { + free((*sc)->cacertificateFile); + (*sc)->cacertificateFile = NULL; + } + if ((*sc)->cacertificateFile) { + free((*sc)->cacertificatePath); + (*sc)->cacertificateFile = NULL; + } if ((*sc)->keysFile) { free((*sc)->keysFile); (*sc)->keysFile = NULL;
... it should read:
--- apf-0.8.2/src/server_configuration_struct.c 2006-01-25 17:46:48.000000000 -0500 +++ patched/apf-0.8.2/src/server_configuration_struct.c 2007-09-20 15:53:50.000000000 -0400 @@ -66,6 +66,14 @@ free((*sc)->certificateFile); (*sc)->certificateFile = NULL; } + if ((*sc)->cacertificateFile) { + free((*sc)->cacertificateFile); + (*sc)->cacertificateFile = NULL; + } + if ((*sc)->cacertificatePath) { + free((*sc)->cacertificatePath); + (*sc)->cacertificatePath = NULL; + } if ((*sc)->keysFile) { free((*sc)->keysFile); (*sc)->keysFile = NULL;
-- Don't be afraid to ask (Lf.((Lx.xx) (Lr.f(rr)))).