- Aug 10, 2011
-
-
Pierangelo Masarati authored
-
Pierangelo Masarati authored
-
Pierangelo Masarati authored
-
- Jul 29, 2011
-
-
Howard Chu authored
-
- Jul 28, 2011
-
-
If the olcTLSVerifyClient is set to a value other than "never", the server should request that the client send a client certificate for possible use with client cert auth (e.g. SASL/EXTERNAL). If set to "allow", if the client sends a cert, and there are problems with it, the server will warn about problems, but will allow the SSL session to proceed without a client cert. If set to "try", if the client sends a cert, and there are problems with it, the server will warn about those problems, and shutdown the SSL session. If set to "demand" or "hard", the client must send a cert, and the server will shutdown the SSL session if there are problems. I added a new member of the tlsm context structure - tc_warn_only - if this is set, tlsm_verify_cert will only warn about errors, and only if TRACE level debug is set. This allows the server to warn but allow bad certs if "allow" is set, and warn and fail if "try" is set.
-
If tlsm_find_and_verify_cert_key finds the cert and/or key, and it fails to verify them, it will leave them allocated for the caller to dispose of. There were a couple of places that were not disposing of the cert and key upon error.
-
Howard Chu authored
-
Howard Chu authored
-
- Jul 21, 2011
-
-
When server certificate is not required in a TLS session (e.g. TLS_REQCERT is set to 'never'), ignore expired issuer certificate error and do not terminate the connection.
-
- Jul 18, 2011
-
-
Howard Chu authored
-
Howard Chu authored
-
- Jul 08, 2011
-
-
Pierangelo Masarati authored
-
- Jul 07, 2011
-
-
Pierangelo Masarati authored
-
- Jul 02, 2011
-
-
Howard Chu authored
-
- Jun 30, 2011
-
-
Pierangelo Masarati authored
-
Pierangelo Masarati authored
-
- Jun 29, 2011
-
-
In tlsm_auth_cert_handler, we get the peer's cert from the socket using SSL_PeerCertificate. This value is allocated and/or cached. We must destroy it using CERT_DestroyCertificate.
-
- Jun 28, 2011
-
-
Howard Chu authored
-
- Jun 27, 2011
-
-
Rein Tollevik authored
-
Howard Chu authored
-
Howard Chu authored
- Jun 25, 2011
-
-
Howard Chu authored
-
- Jun 24, 2011
-
-
Howard Chu authored
-
- Jun 23, 2011
-
-
Howard Chu authored
-
Howard Chu authored
-
- Jun 22, 2011
-
-
Quanah Gibson-Mount authored
-
Howard Chu authored
-
Howard Chu authored
track a CSN per SID in the log->sl_mincsn
-
Howard Chu authored
-
Howard Chu authored
Should SLAP_AUTH_DN be #defined in release now?
-
- Jun 21, 2011
-
-
-
OpenLDAP built with OpenSSL allows most any value of cacertdir - directory is a file, directory does not contain any CA certs, directory does not exist - users expect if they specify TLS_REQCERT=never, no matter what the TLS_CACERTDIR setting is, TLS/SSL will just work. TLS_CACERT, on the other hand, is a hard error. Even if TLS_REQCERT=never, if TLS_CACERT is specified and is not a valid CA cert file, TLS/SSL will fail. This patch makes CACERT errors hard errors, and makes CACERTDIR errors "soft" errors. The code checks CACERT first and, even though the function will return an error, checks CACERTDIR anyway so that if the user sets TRACE mode they will get CACERTDIR processing messages.
-
Howard Chu authored
-
-
-
- Jun 20, 2011
-
-
Hallvard Furuseth authored
-
Hallvard Furuseth authored
Handle interrupted write() again. Fix warnings/types. #ifdef LDAP_DEBUG.
-
Howard Chu authored
-
Howard Chu authored
-