- Jul 16, 1999
-
-
Julio Sánchez Fernández authored
to exhaust all protocol units received from the transport layer. I think this is the necessary fix for the TLS-data-ready/ socket-not-ready issue, but I have not experimented that problem yet, so I am unsure about its effectiveness. Now, do we need something like that for connection_write? How would we go about implementing it?
-
Julio Sánchez Fernández authored
-
Hallvard Furuseth authored
-
Julio Sánchez Fernández authored
connection_init so that we get into the select() logic. Make use of new flags in the connection. BTW, and before I forget, it sort of works. I have connected with a Netscape client using a secure connection and did a failed search (my test database is empty), but the trace looked correct. Make sure you have your CA certificate in your Netscape preinstalled. Otherwise, the connection fails with error 0xFFFFFFFF that is rather uninformative.
-
Julio Sánchez Fernández authored
section (that is, not SASL). The second to indicate that we need to do SSL_accept on this connection.
-
Julio Sánchez Fernández authored
-
Julio Sánchez Fernández authored
former is a pseudo attribute type used internally by slapd to represent the distinguished name of an entry and its existance should not be visible. The latter is an "abstract" attribute type that is not meant to exist in practice except as supertype of other dn-valued types. So, the definition of attribute type 2.5.4.49 has been changed to be just distinguishedName. Work on the OPENLDAP_DEVEL_SCHEMA branch will treat pseudo attributes especially and will not be visible to the clients.
-
Julio Sánchez Fernández authored
-
Kurt Zeilenga authored
Includes support for update referral for each replicated backend. Reworked replication test to use update referral. Includes major rewrite of response encoding codes (result.c). Includes reworked alias support and eliminates old suffix alias codes (can be emulated using named alias). Includes (untested) support for the Manage DSA IT control. Works in LDAPv2 world. Still testing in LDAPv3 world. Added default referral (test009) test.
-
Kurt Zeilenga authored
-
- Jul 15, 1999
-
-
Julio Sánchez Fernández authored
-
Julio Sánchez Fernández authored
-
Julio Sánchez Fernández authored
the default context is initialized before the config file is read, so the locations are not know at context initialization.
-
- Jul 14, 1999
-
-
Julio Sánchez Fernández authored
taken care of. The second, however, on remove_old_locks is unclear.
-
Julio Sánchez Fernández authored
Init the TLS environment if necessary. Lots of things needed here, in particular, preparing properly the default context.
-
Julio Sánchez Fernández authored
use TLS right away or not on that connection.
-
Julio Sánchez Fernández authored
Only bind on TLS port if explicitly requested with -T, otherwise all kind of conflicts happen when running tests.
-
Julio Sánchez Fernández authored
Bind and listen on TLS port too
-
Julio Sánchez Fernández authored
Extend slapd_args with TLS info
-
- Jul 13, 1999
-
-
Julio Sánchez Fernández authored
Include $(TLS_LIBS)
-
Kurt Zeilenga authored
-
Hallvard Furuseth authored
-
Hallvard Furuseth authored
-
Hallvard Furuseth authored
-
Hallvard Furuseth authored
-
Hallvard Furuseth authored
-
Hallvard Furuseth authored
-
- Jul 09, 1999
-
-
Kurt Zeilenga authored
-
- Jul 07, 1999
-
-
Kurt Zeilenga authored
-
Kurt Zeilenga authored
-
Kurt Zeilenga authored
-
Kurt Zeilenga authored
-
Kurt Zeilenga authored
-
- Jul 05, 1999
-
-
Kurt Zeilenga authored
-
Kurt Zeilenga authored
-
Kurt Zeilenga authored
-
Kurt Zeilenga authored
-
- Jul 04, 1999
-
-
Kurt Zeilenga authored
Fix broken ACL macros. Fix o_dn/o_ndn == NULL vs "".
-
Kurt Zeilenga authored
-
Kurt Zeilenga authored
of a bind request and, upon failure, are left "anonymous." Rework ACL code to hide access testing within macros to facilate additions and eventual redesign. Addition of #ifdef SLAPD_ACLAUTH to conditional include EXPERIMENTAL "auth" access controls. Adds ACL_AUTH "auth" access level (above none, below "compare"). bind requires anonymous access at this level or above access to "entry"/"userPassword"/"krbName". This allows administrators to restrict which entries can be bound to. (This will likely become default behavior after testing has completed).
-