Displaying 4 results from an estimated 4 matches for "valid_client_cert".
2004 Oct 21
2
test51 dumping core
...st *) 0xffffffff
        list = (char **) 0x3c006414
        name = 0x0
        arg = 0x0
        initial_resp = 0xcfbefe38 "X???8?\036\n\001"
        initial_resp_data = (void *) 0xcfbefecc
        initial_resp_len = 0
        id = 1006715072
        buf = (buffer_t *) 0x3c014080
        valid_client_cert = 0
#1  0x1c00570f in auth_client_input_auth (conn=0x0, args=0x8b824024 "")
    at auth-client-connection.c:196
        mech = (struct mech_module *) 0x5
        request = (struct auth_request *) 0x1
        list = (char **) 0xa1efc38
        name = 0x0
        arg = 0xd0bd985 "\203?...
2013 Dec 03
1
Different settings for SSL/non-SSL protocols
Good time of the day!
It is possible to setup dovecot with different requirements for SSL and
non-SSL protocols?
What would I like to do:
pop3/imap non-SSL = allowed plain text authentication.
pop3/imap with SSL = allowed plain text authentication with required
valid SSL certificates.
I need to allow access from any IP address for first group of users,
which have valid SSL certificates. And
2005 Mar 30
2
test65 killed by SIGSEV
...name = 0x806e130 "resp"
        arg = 0x806e160 "\200?\006\b\016"
        initial_resp = 0x806e0de "AGRvdmV0ZXN0AHBhc3M="
        initial_resp_data = (const void *) 0x646975
        initial_resp_len = 0
        id = 1
        buf = (buffer_t *) 0x806e160
        valid_client_cert = 0
---Type <return> to continue, or q <return> to quit---
#5  0x0804f8b2 in auth_client_input (context=0x80785c0)
    at auth-client-connection.c:144
        conn = (struct auth_client_connection *) 0x80785c0
        line = 0x8081017 "AUTH\t1\tPLAIN\tservice=IMAP\tsecured\tlip=127...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...;pool, value);
+
 	else if (strcmp(key, "original_username") == 0)
 		request->original_username = p_strdup(request->pool, value);
 	else if (strcmp(key, "cert_username") == 0) {
@@ -188,7 +199,8 @@
 	else if (strcmp(key, "valid-client-cert") == 0)
 		request->valid_client_cert = TRUE;
 	else if (strcmp(key, "skip_password_check") == 0) {
-		i_assert(request->master_user !=  NULL);
+		i_assert(request->master_user !=  NULL ||
+			 request->submit_user !=  NULL);  /* APPLE - urlauth */
 		request->skip_password_check = TRUE;
 	} else if (strcmp(key, &...