This is the patched class. It must be replaced at $(TOMCAT_HOME)/server/lib/tomcat-jk2.jar jar-file.
You simply need to un-jar the file tomcat-jk2.jar and replace JkCoyoteHandler.class with the patched one. Thanks to Thorvald Natvig. ------------------------------------------------------------------ Jos� Antonio Tarifa Lorenzo Departamento de Desarrollo Compa��a Operadora del Mercado Espa�ol de Electricidad, S.A. c/Alfonso XI, 6 4� Planta. 28014 Madrid email: [EMAIL PROTECTED] ------------------------------------------------------------------ -----Mensaje original----- De: Ramsay Domloge [mailto:[EMAIL PROTECTED] Enviado el: martes, 25 de marzo de 2003 19:01 Para: Tomcat Users List Asunto: Re: Fix for SEVERE: Certificate convertion failed, bug in Tomcat-connectors-4.1.24 Thank God! I have been stuck on this for 10 days now, and I have been going a bit loopy! I really need to apply this patch *today*, but I'm having difficulty getting hold of all the sourcecode that I need to apply the patch to.... I would *really* appreciate it if you could help me out here and give me a little more info on what I need to do; where to get the sourcecode and what I need to build a new Tomcat, etc etc. I am supposed to be delivering this project at the end of the week and this bug has held me back 10 days... my boss is going loopy! Thanks in advance, Ramsay Thorvald Natvig wrote: >For those that have been suffering problems using 2-way authenticating >with the JK2 Coyote connector, this patch should fix the problem. It's not >a good fix, but it's a fix nonetheless. > > > >------------------------------------------------------------------------ > >--- >jakarta-tomcat-connectors-4.1.24-src/jk/java/org/apache/jk/server/JkCoyoteHandler.java > 2003-03-19 10:21:04.000000000 +0100 >+++ >jakarta-tomcat-connectors-4.1.24-src-new/jk/java/org/apache/jk/server/JkCoyoteHandler.java > 2003-03-25 17:10:54.000000000 +0100 >@@ -384,7 +384,7 @@ > // Extract SSL certificate information (if requested) > MessageBytes certString = > (MessageBytes)req.getNote(WorkerEnv.SSL_CERT_NOTE); > if( certString != null ) { >- byte[] certData = certString.getByteChunk().getBytes(); >+ byte[] certData = certString.toString().getBytes(); > ByteArrayInputStream bais = new ByteArrayInputStream(certData); > > // Fill the first element. > > >------------------------------------------------------------------------ > >--------------------------------------------------------------------- >To unsubscribe, e-mail: [EMAIL PROTECTED] >For additional commands, e-mail: [EMAIL PROTECTED] > ============================================================================ A R K E M E D I A T E C H N O L O G I E S L T D VIEW POINT BASING VIEW BASINGSTOKE HAMPSHIRE RG21 4RG http://www.arkemedia.com mailto:[EMAIL PROTECTED] Tel : +44 1256 869 200 Fax : +44 1256 329 119 ============================================================================ The information in this e-mail and in any attachments is confidential and is intended solely for the attention and use of the named addressee(s). ============================================================================ If you are not the intended recipient, or a person responsible for passing it on to the intended recipient, you are not authorised to hold a copy of this information and you must therefore not disclose, copy, distribute, or retain this message or any part of it. MAILTO:[EMAIL PROTECTED] ============================================================================
jk.zip
Description: jk.zip
--------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
