1. 11 Apr, 2013 1 commit
  2. 09 Apr, 2013 1 commit
  3. 08 Apr, 2013 4 commits
  4. 05 Apr, 2013 1 commit
  5. 31 Mar, 2013 1 commit
  6. 27 Mar, 2013 2 commits
  7. 23 Mar, 2013 1 commit
  8. 19 Mar, 2013 1 commit
  9. 12 Mar, 2013 2 commits
  10. 09 Mar, 2013 1 commit
  11. 08 Mar, 2013 1 commit
  12. 07 Mar, 2013 3 commits
  13. 06 Mar, 2013 1 commit
  14. 16 Feb, 2013 1 commit
  15. 10 Feb, 2013 2 commits
  16. 07 Feb, 2013 1 commit
  17. 06 Feb, 2013 2 commits
  18. 05 Feb, 2013 2 commits
  19. 28 Jan, 2013 1 commit
  20. 18 Jan, 2013 2 commits
  21. 17 Jan, 2013 1 commit
  22. 15 Jan, 2013 1 commit
  23. 11 Jan, 2013 1 commit
    • Kamil Dudka's avatar
      nss: clear session cache if a client cert from file is used · b36f1d26
      Kamil Dudka authored
      This commit fixes a regression introduced in 052a08ff.
      
      NSS caches certs/keys returned by the SSL_GetClientAuthDataHook callback
      and if we connect second time to the same server, the cached cert/key
      pair is used.  If we use multiple client certificates for different
      paths on the same server, we need to clear the session cache to force
      NSS to call the hook again.  The commit 052a08ff prevented the session
      cache from being cleared if a client certificate from file was used.
      
      The condition is now fixed to cover both cases: consssl->client_nickname
      is not NULL if a client certificate from the NSS database is used and
      connssl->obj_clicert is not NULL if a client certificate from file is
      used.
      
      Review by: Kai Engert
      b36f1d26
  24. 27 Dec, 2012 1 commit
  25. 03 Dec, 2012 1 commit
    • Kamil Dudka's avatar
      nss: prevent NSS from crashing on client auth hook failure · 68d2830e
      Kamil Dudka authored
      Although it is not explicitly stated in the documentation, NSS uses
      *pRetCert and *pRetKey even if the client authentication hook returns
      a failure.  Namely, if we destroy *pRetCert without clearing *pRetCert
      afterwards, NSS destroys the certificate once again, which causes a
      double free.
      
      Reported by: Bob Relyea
      68d2830e
  26. 20 Nov, 2012 2 commits
  27. 19 Nov, 2012 2 commits