[Pkg-openldap-devel] Bug#473796: Bug#473796: TLS fails completely
Petter Reinholdtsen
pere at hungry.com
Sun Jul 27 20:22:48 UTC 2008
tags 473796 + patch
thanks
Here is what I believe is the correct patch to solve this problem. It
is from upstream. I'm testing this patch in Debian Edu now.
diff -u openldap-2.4.10/debian/patches/series openldap-2.4.10/debian/patches/series
--- openldap-2.4.10/debian/patches/series
+++ openldap-2.4.10/debian/patches/series
@@ -12,0 +13 @@
+gnutls-keylength -p0
--- openldap-2.4.10.orig/debian/patches/gnutls-keylength
+++ openldap-2.4.10/debian/patches/gnutls-keylength
@@ -0,0 +1,19 @@
+Downloaded from
+http://www.openldap.org/devel/cvsweb.cgi/libraries/libldap/tls.c.diff?r1=1.160&r2=1.161&hideattic=1&sortbydate=0
+Solve http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473796
+===================================================================
+RCS file: /repo/OpenLDAP/pkg/ldap/libraries/libldap/tls.c,v
+retrieving revision 1.160
+retrieving revision 1.161
+diff -u -r1.160 -r1.161
+--- libraries/libldap/tls.c 2008/06/24 18:14:30 1.160
++++ libraries/libldap/tls.c 2008/06/30 21:32:35 1.161
+@@ -2795,7 +2795,7 @@
+ gnutls_cipher_algorithm_t c;
+
+ c = gnutls_cipher_get( session->session );
+- return gnutls_cipher_get_key_size( c );
++ return gnutls_cipher_get_key_size( c ) * 8;
+ #else
+ return 0;
+ #endif
Happy hacking,
--
Petter Reinholdtsen
More information about the Pkg-openldap-devel
mailing list