- 21 Aug, 2020 1 commit
-
-
Add an option to specify how subjectAlternativeNames should be handled when validating the names in a server certificate.
-
- 04 Jul, 2020 2 commits
-
-
Ryan Tandy authored
-
Ryan Tandy authored
-
- 23 Apr, 2020 2 commits
-
-
Reported-by: Ryan Tandy @ryan
-
Isaac Boukris authored
Add LDAP_OPT_X_SASL_CBINDING option to define the binding type to use, defaults to "none". Add "tls-endpoint" binding type implementing "tls-server-end-point" from RCF 5929, which is compatible with Windows. Fix "tls-unique" to include the prefix in the bindings as per RFC 5056.
-
- 13 Apr, 2020 1 commit
-
-
Quanah Gibson-Mount authored
-
- 10 Apr, 2020 1 commit
-
-
Quanah Gibson-Mount authored
-
- 09 Jan, 2020 1 commit
-
-
Quanah Gibson-Mount authored
-
- 28 Feb, 2019 1 commit
-
-
This option instructs try_read1msg to not free the connection on read error or on Notice of disconnections, but leave it to the caller. It is needed, for example, by back-asyncmeta, who expects to have control on when its target connections are freed. Must be used with caution.
-
- 19 Feb, 2019 1 commit
-
-
Ondřej Kuzník authored
-
- 15 Feb, 2019 1 commit
-
-
- 14 Jan, 2019 1 commit
-
-
Quanah Gibson-Mount authored
-
- 22 Mar, 2018 1 commit
-
-
Quanah Gibson-Mount authored
-
- 13 Nov, 2017 2 commits
-
-
Ondřej Kuzník authored
-
Ondřej Kuzník authored
-
- 08 Apr, 2017 1 commit
-
-
Howard Chu authored
Instead of loading from files.
-
- 03 Jan, 2017 1 commit
-
-
Quanah Gibson-Mount authored
-
- 29 Jan, 2016 1 commit
-
-
Quanah Gibson-Mount authored
-
- 02 Oct, 2015 2 commits
-
-
Howard Chu authored
extended ops
-
Howard Chu authored
Basic ops except abandon and unbind; since they get no reply it's not important for the caller to know their msgID.
-
- 18 Aug, 2015 1 commit
-
-
- 16 Jul, 2015 1 commit
-
-
Howard Chu authored
-
- 11 Feb, 2015 2 commits
-
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
- 25 Jan, 2014 2 commits
-
-
Kurt Zeilenga authored
-
Kurt Zeilenga authored
-
- 07 Sep, 2013 1 commit
-
-
Howard Chu authored
-
- 27 Aug, 2013 1 commit
-
-
Howard Chu authored
Currently only implemented for OpenSSL. Needs an option to set the criticality flag.
-
- 24 Apr, 2013 1 commit
-
-
Howard Chu authored
It was introduced for Cyrus 1.5 in 2001; we've been on 2.x since 2002 and Cyrus does its own locking when needed.
-
- 02 Jan, 2013 1 commit
-
-
Kurt Zeilenga authored
-
- 21 Nov, 2012 1 commit
-
-
Ralf Haferkamp authored
If a timeout is set, perform the SSL Handshake using non-blocking IO. This way we can timeout if SSL Handshake gets stuck for whatever reason. This code is currently hidden behind #ifdefs (LDAP_USE_NON_BLOCKING_TLS) and disabled by default as there seem to be some problems using NON-blocking I/O during the TLS Handshake when linking against NSS (either a bug in NSS itself of in tls_m.c, see discussion on -devel) This patch adds an additional parameter to ldap_int_poll() in order to indicate if we're waiting in order to perform a read or write operation.
-
- 23 Jul, 2012 1 commit
-
-
- 30 May, 2012 1 commit
-
-
Not protecting the accesses to ldap_int_hostname could lead to a double free.
-
- 20 Feb, 2012 1 commit
-
-
Howard Chu authored
-
- 24 Jan, 2012 3 commits
-
-
Howard Chu authored
-
Howard Chu authored
-
Howard Chu authored
Move mutexes to end of structs, so libldap can ignore them
-
- 01 Jan, 2012 1 commit
-
-
Kurt Zeilenga authored
-
- 09 Jun, 2011 1 commit
-
-
Howard Chu authored
-
- 20 Jan, 2011 1 commit
-
-
Hallvard Furuseth authored
-