On Mon, Feb 23, 2009 at 7:41 AM, Jouni Mäkeläinen
<jouni.makelai...@twinkle.fi> wrote:
>>>    if (!encrypted_sso_str || apr_strnatcmp(encrypted_sso_str, "false") ==
>>> 0) {
>>>        if (apr_strnatcasecmp(ap_auth_type(r), "auth_xxx") == 0) {
>> NULL != ap_auth_type(r)?
> Code is supposed to test, if the required auth type matches (set with 
> AuthType directive) with the auth type ("auth_xxx") that module handles. Now 
> ap_auth_type(r) seems to return pointer to memory location, that causes 
> segmentation fault when accessed (for example in sprintf("Auth type: %s", 
> ap_auth_type(r)).
>

I'm suggesting that you need to make sure you don't follow a null pointer,

> I don't call apr_match_glob() directly, but assumed that ap_auth_type(r) call 
> caused the execution of the glob function.

I don't think so --  it's a very simple getter (and ap_auth_type would
still be in the stack in that case)

-- 
Eric Covener
cove...@gmail.com

Reply via email to