[Pkg-openldap-devel] Bug#473796: Bug#473796: TLS fails completely

Petter Reinholdtsen pere at hungry.com
Sun Jul 27 20:22:48 UTC 2008


tags 473796 + patch
thanks

Here is what I believe is the correct patch to solve this problem.  It
is from upstream.  I'm testing this patch in Debian Edu now.

diff -u openldap-2.4.10/debian/patches/series openldap-2.4.10/debian/patches/series
--- openldap-2.4.10/debian/patches/series
+++ openldap-2.4.10/debian/patches/series
@@ -12,0 +13 @@
+gnutls-keylength -p0
--- openldap-2.4.10.orig/debian/patches/gnutls-keylength
+++ openldap-2.4.10/debian/patches/gnutls-keylength
@@ -0,0 +1,19 @@
+Downloaded from
+http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls.c.diff?r1=1.160&r2=1.161&hideattic=1&sortbydate=0
+Solve http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473796
+===================================================================
+RCS file: /repo/OpenLDAP/pkg/ldap/libraries/libldap/tls.c,v
+retrieving revision 1.160
+retrieving revision 1.161
+diff -u -r1.160 -r1.161
+--- libraries/libldap/tls.c	2008/06/24 18:14:30	1.160
++++ libraries/libldap/tls.c	2008/06/30 21:32:35	1.161
+@@ -2795,7 +2795,7 @@
+ 	gnutls_cipher_algorithm_t c;
+ 
+ 	c = gnutls_cipher_get( session->session );
+-	return gnutls_cipher_get_key_size( c );
++	return gnutls_cipher_get_key_size( c ) * 8;
+ #else
+ 	return 0;
+ #endif

Happy hacking,
-- 
Petter Reinholdtsen





More information about the Pkg-openldap-devel mailing list