- 19 Jan, 2015 1 commit
-
-
Linus Nordberg authored
-
- 16 Jan, 2015 8 commits
-
-
Linus Nordberg authored
Conflicts: ChangeLog
-
Linus Nordberg authored
Patch by Stephen Röttger.
-
Linus Nordberg authored
Patch by Stephen Röttger.
-
Linus Nordberg authored
Patch by Stephen Röttger.
-
Linus Nordberg authored
Patch by Stephen Röttger.
-
Linus Nordberg authored
Patch by Christian Hesse.
-
Linus Nordberg authored
Conflicts: radsecproxy.c
-
Linus Nordberg authored
Conflicts: radmsg.h
-
- 14 Jan, 2015 2 commits
-
-
Linus Nordberg authored
-
Linus Nordberg authored
Conflicts: ChangeLog
-
- 06 Sep, 2013 3 commits
-
-
Linus Nordberg authored
-
Linus Nordberg authored
Also when copying of the first attribute fails.
-
Linus Nordberg authored
Doh! Closes RADSECPROXY-53.
-
- 05 Sep, 2013 2 commits
-
-
Linus Nordberg authored
-
Linus Nordberg authored
Closes RADSECPROXY-52.
-
- 04 Sep, 2013 2 commits
-
-
Linus Nordberg authored
-
Linus Nordberg authored
Some of these were revived in 4c163b1e bc they were supposedly not generated when running autogen.sh. That's not the case (any more) so let's avoid checking in generated files. Note that these files will be included in tar balls made from make dist.
-
- 02 Sep, 2013 19 commits
-
-
Linus Nordberg authored
-
Linus Nordberg authored
-
Linus Nordberg authored
-
Linus Nordberg authored
Patch by Fabian Mauchle.
-
Linus Nordberg authored
Also signal the "client writer" (clientwr()). Together, this should result in TLS connections being cleaned up properly. Patch by Fabian Mauchle.
-
Linus Nordberg authored
Also, don't select() at all if SSL_pending() says there's data to read. Patch by Fabian Mauchle.
-
Linus Nordberg authored
They are pointers into static struct hash *rewriteconfs and should live forever. Patch by Fabian Mauchle.
-
Linus Nordberg authored
Also, in a lame attempt att giving credit for last commit where I failed at doing that: 4920ff44 is a patch from Fabian Mauchle.
-
Linus Nordberg authored
-
Linus Nordberg authored
-
Linus Nordberg authored
Have free(3) call sbrk(2) when there's 4 MB to free (default on Linux seems to be 128). Patch by Fabian Mauchle. Conflicts: configure.ac
-
Linus Nordberg authored
On Linux, the default stack size is typically 8 MB. Patch by Fabian Mauchle.
-
Linus Nordberg authored
Closes RADSECPROXY-51.
-
Linus Nordberg authored
-
Linus Nordberg authored
-
Linus Nordberg authored
Spotted by Simon Lundström.
-
Linus Nordberg authored
Bug found by Simon Lundström and jocar. Conflicts: radsecproxy-hash.c
-
Linus Nordberg authored
That interface is a bit surprising. radsecproxy-hash(1) was indeed bitten by it. Also, make _format_hash() behave consistently even when out_len < 3. Conflicts: fticks_hashmac.c
-
Linus Nordberg authored
1.6.2 is already released but correct ChangeLog info is good.
-
- 25 Oct, 2012 2 commits
-
-
Linus Nordberg authored
-
Linus Nordberg authored
-
- 22 Oct, 2012 1 commit
-
-
Linus Nordberg authored
Commit db965c9b addressed TLS clients only. When verifying DTLS clients, don't consider config blocks with CA settings ('tls') which differ from the one used for verifying the certificate chain. Original issue reported and analysed by Ralf Paffrath. DTLS being vulnerable reported by Raphael Geisser. Addresses issue RADSECPROXY-43, CVE-2012-4523.
-