Commit Graph

19678 Commits

Author SHA1 Message Date
Howard Chu
890d4c6216 ITS#7003 fix typo 2011-07-28 13:48:08 -07:00
Jan Vcelak
e8ac17e17c ITS#6998 MozNSS: when cert not required, ignore issuer expiration
When server certificate is not required in a TLS session (e.g.
TLS_REQCERT is set to 'never'), ignore expired issuer certificate error
and do not terminate the connection.
2011-07-21 11:59:06 -07:00
Howard Chu
8eecc9a017 Only return requested attrs in sssvlv response 2011-07-18 12:53:23 -07:00
Howard Chu
db106f89e6 ITS#6985 fix sssvlv target offset, ordering match 2011-07-18 12:41:51 -07:00
Pierangelo Masarati
c86677ef41 blind fix build on solaris native compilers (ITS#6992) 2011-07-08 08:48:59 +02:00
Pierangelo Masarati
c0b669e14f fix config emit (ITS#6986) 2011-07-07 08:16:23 +02:00
Howard Chu
c02e681121 ITS#6982 fix md5 memset invocation 2011-07-01 22:55:06 -07:00
Pierangelo Masarati
8df4c357be authTimestamp should be manageable (ITS#6873) 2011-06-30 21:55:28 +02:00
Pierangelo Masarati
92f4a3b2a7 response tag is [1] according to RFC 2589 (ITS#6886) 2011-06-30 21:24:12 +02:00
Rich Megginson
d944920fd3 ITS#6980 free the result of SSL_PeerCertificate
In tlsm_auth_cert_handler, we get the peer's cert from the socket using
SSL_PeerCertificate.  This value is allocated and/or cached.  We must
destroy it using CERT_DestroyCertificate.
2011-06-29 16:56:26 -07:00
Howard Chu
7ee3dee647 ITS#6828 set ld_errno on connect failures 2011-06-27 18:43:31 -07:00
Rein Tollevik
ffa8eca405 Merge branch 'master' of ssh://git-master.openldap.org/~git/git/openldap 2011-06-27 14:21:35 +02:00
Rein Tollevik
62861cae0e ITS#6716 Extend test where consumer/provider holds CSNs with differing SIDs. 2011-06-27 14:17:39 +02:00
Howard Chu
230f433ec7 ITS#6872 re-enable test058 2011-06-27 04:48:25 -07:00
Howard Chu
ebf07016ef ITS#6872 fix test058 breakage from prev patch 2011-06-27 04:46:43 -07:00
Howard Chu
052ac2f64a ITS#6828 silence warning in prev commit 2011-06-24 18:03:11 -07:00
Howard Chu
d76be4828c ITS#6977 fix verbose check in client tools 2011-06-23 17:10:37 -07:00
Howard Chu
d0973003f7 ITS#6978 bail out on invalid input 2011-06-23 13:17:08 -07:00
Howard Chu
b1f26a8b17 Fix NO_THREADS typo 2011-06-22 20:03:24 -07:00
Quanah Gibson-Mount
15ae0134ee Disable test058 until it someone can track down what's wrong with it 2011-06-22 15:16:08 -07:00
Howard Chu
b0fcec8d65 ITS#6716 Use sorted CSNs in syncrepl too 2011-06-22 00:32:00 -07:00
Howard Chu
6da3e3473c ITS#6716 use sorted CSNs, fix sessionlog
track a CSN per SID in the log->sl_mincsn
2011-06-22 00:30:13 -07:00
Howard Chu
249422aa28 ITS#6716 Keep CSN lists sorted by SID 2011-06-21 22:35:14 -07:00
Howard Chu
ceefe132a8 ITS#6817 fix RE24 build breakage
Should SLAP_AUTH_DN be #defined in release now?
2011-06-21 17:05:53 -07:00
Rich Megginson
5e467e4899 ITS#6862 MozNSS - workaround PR_SetEnv bug 2011-06-21 15:58:49 -07:00
Rich Megginson
d78cf81648 ITS#6975 MozNSS - allow cacertdir in most cases
OpenLDAP built with OpenSSL allows most any value of cacertdir - directory
is a file, directory does not contain any CA certs, directory does not
exist - users expect if they specify TLS_REQCERT=never, no matter what
the TLS_CACERTDIR setting is, TLS/SSL will just work.
TLS_CACERT, on the other hand, is a hard error.  Even if TLS_REQCERT=never,
if TLS_CACERT is specified and is not a valid CA cert file, TLS/SSL will
fail.  This patch makes CACERT errors hard errors, and makes CACERTDIR
errors "soft" errors.  The code checks CACERT first and, even though
the function will return an error, checks CACERTDIR anyway so that if the
user sets TRACE mode they will get CACERTDIR processing messages.
2011-06-21 15:56:55 -07:00
Howard Chu
ae24a1a6ac ITS#6973 need limits_check if overlay is global 2011-06-21 02:40:38 -07:00
Jan Vcelak
65e163d268 ITS#6947 Handle missing '\n' termination in LDIF input 2011-06-20 18:18:34 -07:00
Ondrej Kuznik
6f43600731 ITS#6974 (Re)moving stray cleanup code. 2011-06-20 18:13:36 -07:00
Hallvard Furuseth
e25bce9124 Tweak back-ldif messages about CRC checksums. 2011-06-20 21:53:05 +02:00
Hallvard Furuseth
06fe436053 Cleanup back-ldif CRC code.
Handle interrupted write() again.  Fix warnings/types.  #ifdef LDAP_DEBUG.
2011-06-20 21:45:03 +02:00
Howard Chu
05ca8c3710 More fixes, add test script 2011-06-20 11:05:08 -07:00
Howard Chu
48cdd54d9a Fix missing si_syncCookie numcsns 2011-06-20 06:51:33 -07:00
Howard Chu
480f0c16ff More tweaks for delta-mmr 2011-06-20 04:27:11 -07:00
Howard Chu
67bbad6e70 delta-mmr conflict resolution 2011-06-19 20:14:03 -07:00
Howard Chu
237a686107 More for conflict detection 2011-06-19 20:13:59 -07:00
Howard Chu
95d7adcd6d Setup delta-mmr using an overlay 2011-06-19 20:13:51 -07:00
Ralf Haferkamp
1e4faaf1bd Additional getter methods for LDAPModification 2011-06-15 15:28:55 +02:00
Howard Chu
0a9f51f58d ITS#6657/6691 use proper SQL length data type 2011-06-13 13:54:56 -07:00
Quanah Gibson-Mount
9578bf0145 ITS#6971 correct option is --enable-wrappers 2011-06-13 13:46:01 -07:00
Howard Chu
de395ddad3 ITS#6944 limit op cache to 10 ops per thread 2011-06-10 03:27:40 -07:00
Howard Chu
9f7d119ce3 Add LDAP_OPT_X_TLS_PACKAGE
to return the name of the underlying TLS implementation
2011-06-10 02:11:26 -07:00
Howard Chu
329e7937e6 ITS#6892 shortcut for non-replicated ops 2011-06-10 01:44:30 -07:00
Howard Chu
d1b38bd12b ITS#6967 normalize schema RDN 2011-06-10 01:35:19 -07:00
Howard Chu
6f715114ff Add CRC32 checksum to back-ldif files
Currently just logs a complaint on checksum mismatch. Could get
more obnoxious later.
2011-06-09 21:09:41 -07:00
Howard Chu
214d7e3750 Fix prev commit 2011-06-09 18:07:13 -07:00
Howard Chu
a4a7ffdf5c Try to discourage editing back-ldif files 2011-06-09 17:59:08 -07:00
Howard Chu
68c7d375da Revert "ITS#6688 enforce search ACL in back-perl"
This reverts commit 53bb95a2e3.
Code was working as designed/documented. Changing now will
probably break other users.
2011-06-09 15:37:11 -07:00
Howard Chu
53bb95a2e3 ITS#6688 enforce search ACL in back-perl 2011-06-09 15:25:32 -07:00
Quanah Gibson-Mount
6b95e5941c ITS#6889 regenerate configure 2011-06-09 11:05:09 -07:00