Skip to content
Snippets Groups Projects
  1. Jun 26, 2012
  2. Jun 07, 2012
  3. Jun 05, 2012
  4. May 30, 2012
    • Jan Vcelak's avatar
      ITS#7276 MozNSS: allow CA certdb together with PEM CA bundle file · df1d118d
      Jan Vcelak authored and Howard Chu's avatar Howard Chu committed
      Prior to this patch, if TLS_CACERTDIR was set to Mozilla NSS certificate
      database and TLS_CACERT was set to a PEM bundle file with CA
      certificates, the PEM file content was not loaded.
      
      With this patch and the same settings, OpenLDAP can verify certificates
      which are signed by CAs stored both in certdb and PEM bundle file.
      df1d118d
  5. Mar 09, 2012
  6. Jan 26, 2012
  7. Jan 01, 2012
  8. Sep 30, 2011
  9. Aug 24, 2011
    • Howard Chu's avatar
      ITS#7022 cleanup prev commit · 6546ecd3
      Howard Chu authored
      6546ecd3
    • Rich Megginson's avatar
      ITS#7022 NSS_Init* functions are not thread safe · a7aac14d
      Rich Megginson authored and Howard Chu's avatar Howard Chu committed
      The NSS_InitContext et. al, and their corresponding shutdown functions,
      are not thread safe.  There can only be one thread at a time calling
      these functions.  Protect the calls with a mutex.  Create the mutex
      using a PR_CallOnce to ensure that the mutex is only created once and
      not used before created.  Move the registration of the nss shutdown
      callback to also use a PR_CallOnce.  Removed the call to
      SSL_ClearSessionCache() because it is always called at shutdown, and we must
      not call it more than once.
      a7aac14d
  10. Jul 28, 2011
    • Rich Megginson's avatar
      ITS#7002 MozNSS: fix VerifyCert allow/try behavior · 210b156e
      Rich Megginson authored and Howard Chu's avatar Howard Chu committed
      If the olcTLSVerifyClient is set to a value other than "never", the server
      should request that the client send a client certificate for possible use
      with client cert auth (e.g. SASL/EXTERNAL).
      If set to "allow", if the client sends a cert, and there are problems with
      it, the server will warn about problems, but will allow the SSL session to
      proceed without a client cert.
      If set to "try", if the client sends a cert, and there are problems with
      it, the server will warn about those problems, and shutdown the SSL session.
      If set to "demand" or "hard", the client must send a cert, and the server
      will shutdown the SSL session if there are problems.
      I added a new member of the tlsm context structure - tc_warn_only - if this
      is set, tlsm_verify_cert will only warn about errors, and only if TRACE
      level debug is set.  This allows the server to warn but allow bad certs
      if "allow" is set, and warn and fail if "try" is set.
      210b156e
    • Rich Megginson's avatar
      ITS#7001 MozNSS: free the return of tlsm_find_and_verify_cert_key · fb4b4f74
      Rich Megginson authored and Howard Chu's avatar Howard Chu committed
      If tlsm_find_and_verify_cert_key finds the cert and/or key, and it fails
      to verify them, it will leave them allocated for the caller to dispose of.
      There were a couple of places that were not disposing of the cert and key
      upon error.
      fb4b4f74
  11. Jul 21, 2011
  12. Jun 29, 2011
  13. Jun 21, 2011
    • Rich Megginson's avatar
      ITS#6862 MozNSS - workaround PR_SetEnv bug · 5e467e48
      Rich Megginson authored and Howard Chu's avatar Howard Chu committed
      5e467e48
    • Rich Megginson's avatar
      ITS#6975 MozNSS - allow cacertdir in most cases · d78cf816
      Rich Megginson authored and Howard Chu's avatar Howard Chu committed
      OpenLDAP built with OpenSSL allows most any value of cacertdir - directory
      is a file, directory does not contain any CA certs, directory does not
      exist - users expect if they specify TLS_REQCERT=never, no matter what
      the TLS_CACERTDIR setting is, TLS/SSL will just work.
      TLS_CACERT, on the other hand, is a hard error.  Even if TLS_REQCERT=never,
      if TLS_CACERT is specified and is not a valid CA cert file, TLS/SSL will
      fail.  This patch makes CACERT errors hard errors, and makes CACERTDIR
      errors "soft" errors.  The code checks CACERT first and, even though
      the function will return an error, checks CACERTDIR anyway so that if the
      user sets TRACE mode they will get CACERTDIR processing messages.
      d78cf816
  14. Mar 16, 2011
  15. Jan 29, 2011
  16. Jan 27, 2011
  17. Jan 05, 2011
  18. Dec 24, 2010
  19. Dec 11, 2010
  20. Dec 06, 2010
  21. Nov 15, 2010
  22. Oct 29, 2010
  23. Jul 21, 2010
  24. Jul 14, 2010
  25. Apr 13, 2010
  26. Apr 12, 2010
Loading