Browse Source

Resolves: bug 476891
Bug Description: Replication: Server to Server Connection Error: SASL(-1): generic failure: All-whitespace username.
Reviewed by: nkinder (Thanks!)
Fix Description: My earlier fix for this bug broke GSSAPI - it would cause the username and authid to only be freed under certain conditions e.g. if the krb creds were still valid, the code would not free the username and authid, so they would be passed via SASL instead of the principal name. This fix just makes sure username and authid are always freed, under all circumstances.
Platforms tested: RHEL5, Fedora 9
Flag Day: no
Doc impact: no

Rich Megginson 17 years ago
parent
commit
59c1881e73
1 changed files with 1 additions and 1 deletions
  1. 1 1
      ldap/servers/slapd/util.c

+ 1 - 1
ldap/servers/slapd/util.c

@@ -1946,11 +1946,11 @@ set_krb5_creds(
                         cc_env_name);
     }
 
+cleanup:
     /* use NULL as username and authid */
     slapi_ch_free_string(&vals->username);
     slapi_ch_free_string(&vals->authid);
 
-cleanup:
     krb5_free_unparsed_name(ctx, princ_name);
     if (kt) { /* NULL not allowed */
         krb5_kt_close(ctx, kt);