- 21 Aug, 2020 2 commits
-
-
Add an option to specify how subjectAlternativeNames should be handled when validating the names in a server certificate.
-
Howard Chu authored
Requires OpenSSL 1.0.2 or newer
-
- 27 Apr, 2020 2 commits
-
-
Howard Chu authored
-
Howard Chu authored
Implemented for OpenSSL, GnuTLS just stubbed
-
- 23 Apr, 2020 1 commit
-
-
Isaac Boukris authored
Add LDAP_OPT_X_SASL_CBINDING option to define the binding type to use, defaults to "none". Add "tls-endpoint" binding type implementing "tls-server-end-point" from RCF 5929, which is compatible with Windows. Fix "tls-unique" to include the prefix in the bindings as per RFC 5056.
-
- 20 Apr, 2020 2 commits
-
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
- 12 Apr, 2020 1 commit
-
-
Howard Chu authored
Always retry ldap_int_tls_connect() if it didn't complete, regardless of blocking or non-blocking socket. Code from ITS#7428 was wrong to only retry for async.
-
- 09 Jan, 2020 1 commit
-
-
Quanah Gibson-Mount authored
-
- 12 Jun, 2019 1 commit
-
-
Ondřej Kuzník authored
-
- 11 Jun, 2019 1 commit
-
-
This can be done by setting them to an empty string value.
-
- 28 Feb, 2019 1 commit
-
-
- 19 Feb, 2019 1 commit
-
-
Ondřej Kuzník authored
-
- 15 Feb, 2019 1 commit
-
-
Ondřej Kuzník authored
-
- 14 Jan, 2019 1 commit
-
-
Quanah Gibson-Mount authored
-
- 22 Oct, 2018 1 commit
-
-
- 22 Mar, 2018 1 commit
-
-
Quanah Gibson-Mount authored
-
- 13 Nov, 2017 1 commit
-
-
Ondřej Kuzník authored
-
- 06 Oct, 2017 2 commits
-
-
Ian Puleston authored
-
Jan Vcelak authored
If multiple servers are specified, the connection to the first one succeeds, and the hostname verification fails, *tls_session is not dropped, but reused when connecting to the second server. This is a problem with Mozilla NSS backend because another handshake cannot be performed on the same file descriptor. From this reason, hostname checking was moved into ldap_int_tls_connect() before connection error handling.
-
- 26 Sep, 2017 1 commit
-
-
Quanah Gibson-Mount authored
-
- 09 Apr, 2017 1 commit
-
-
Howard Chu authored
Add get_option support, allow delete by setting a NULL arg.
-
- 08 Apr, 2017 1 commit
-
-
Howard Chu authored
Instead of loading from files.
-
- 03 Jan, 2017 1 commit
-
-
Quanah Gibson-Mount authored
-
- 29 Jan, 2016 1 commit
-
-
Quanah Gibson-Mount authored
-
- 11 Feb, 2015 1 commit
-
-
Quanah Gibson-Mount authored
-
- 25 Jan, 2014 1 commit
-
-
Kurt Zeilenga authored
-
- 19 Sep, 2013 1 commit
-
-
Quanah Gibson-Mount authored
-
- 10 Sep, 2013 1 commit
-
-
Howard Chu authored
retrieve peer cert for an active TLS session
-
- 09 Sep, 2013 1 commit
-
-
Howard Chu authored
Add LDAP_OPT_X_TLS_VERSION / LDAP_OPT_X_TLS_CIPHER for retrieving from an LDAP session handle. Update ldap_get_option(3).
-
- 07 Sep, 2013 2 commits
-
-
Howard Chu authored
Note: I could not test the MozNSS patch due to the absence of NSS PEM support on my machine. Given the review comments in https://bugzilla.mozilla.org/show_bug.cgi?id=402712 I doubt that trustworthy PEM support will be appearing for MozNSS any time soon.
-
Howard Chu authored
-
- 27 Aug, 2013 1 commit
-
-
Howard Chu authored
Currently only implemented for OpenSSL. Needs an option to set the criticality flag.
-
- 02 Jan, 2013 1 commit
-
-
Kurt Zeilenga authored
-
- 21 Nov, 2012 1 commit
-
-
Ralf Haferkamp authored
If a timeout is set, perform the SSL Handshake using non-blocking IO. This way we can timeout if SSL Handshake gets stuck for whatever reason. This code is currently hidden behind #ifdefs (LDAP_USE_NON_BLOCKING_TLS) and disabled by default as there seem to be some problems using NON-blocking I/O during the TLS Handshake when linking against NSS (either a bug in NSS itself of in tls_m.c, see discussion on -devel) This patch adds an additional parameter to ldap_int_poll() in order to indicate if we're waiting in order to perform a read or write operation.
-
- 01 Jan, 2012 1 commit
-
-
Kurt Zeilenga authored
-
- 09 Sep, 2011 1 commit
-
-
Howard Chu authored
Unfortunately automated checkers don't seem to read the documentation for how APIs are expected to be used, and the C declaration syntax isn't expressive enough to encode the documented usage.
-
- 24 Aug, 2011 1 commit
-
-
If server certificate hostname does not match the server hostname, connection is closed even if client has set TLS_REQCERT to 'allow'. This is wrong - the documentation says, that bad certificates are being ignored when TLS_REQCERT is set to 'allow'.
-
- 10 Jun, 2011 1 commit
-
-
Howard Chu authored
to return the name of the underlying TLS implementation
-
- 05 Jan, 2011 1 commit
-
-
Kurt Zeilenga authored
-