summaryrefslogtreecommitdiffstats
path: root/runtime/nsdsel_gtls.c
Commit message (Collapse)AuthorAgeFilesLines
* Merge branch 'v4-stable' into v5-stableRainer Gerhards2012-01-161-16/+14
|\ | | | | | | | | | | | | | | Conflicts: runtime/debug.h runtime/obj.c runtime/parser.h runtime/wti.h
| * license changesRainer Gerhards2012-01-161-16/+14
| |
* | bugfix: memory leak in imtcp & subsystems under some circumstancesRainer Gerhards2011-06-101-0/+1
|/ | | | | | | | | This leak is tied to error conditions which lead to incorrect cleanup of some data structures. Note: this is a backport from v6. In v5, we currently do not have the toolchain to verify the original problem and that it is solved. So this patch is preliminary and subject to change as work progresses.
* bugfix(important): problem in TLS handling could cause rsyslog to loopv3.22.3Rainer Gerhards2010-11-241-0/+17
| | | | | | ... in a tight loop, effectively disabling functionality and bearing the risk of unresponsiveness of the whole system. Bug tracker: http://bugzilla.adiscon.com/show_bug.cgi?id=194
* cleanup of debugging messages (removed no longer needed ones)Rainer Gerhards2008-07-141-2/+0
|
* fixed invalid state checking inside gtls retry handlerRainer Gerhards2008-06-251-1/+1
|
* gnu error status must be set after retry operationRainer Gerhards2008-06-241-0/+2
| | | | ... otherwise, we check an invalid error state.
* added support for EGAIN while trying to receive data on gTLS sessionRainer Gerhards2008-06-241-1/+21
| | | | | | | | | This maps to bugzilla bug 83: http://bugzilla.adiscon.com/show_bug.cgi?id=83 This is the first test version, posted to user for repro of the problem. It contains code to handle the case, HOWEVER, I have not been able to test it in a scenario where a retry actually happens while receiving (I dont't get this in my environment). So I assume it is buggy and will probably not work.
* implemented x509/certvalid "authentication"Rainer Gerhards2008-05-211-1/+1
|
* changed default GnuTLS key material to more reasonable valuesRainer Gerhards2008-05-201-1/+0
| | | | | We now also provide everything to sign with a common CA. NOTE: none of this is for production use!
* first implementation of TLS server client authentication checkRainer Gerhards2008-05-191-4/+5
| | | | | | | The TLS server now checks the client fingerprint. This works, but is highly experimental. Needs to be refined for practice. Also: - implemented permittedPeers helper construct to store names - changed omfwd implementation to use new permittedPeers
* Merge branch 'master' into ietf-tlsRainer Gerhards2008-05-161-0/+6
|\
| * fixed potential uninitialzed var access (highly improbable)Rainer Gerhards2008-05-161-0/+2
| |
| * bugfix: TLS server went into an endless loop in some situations.Rainer Gerhards2008-05-151-0/+4
| | | | | | | | Thanks to Michael Biebl for reporting the problem.
* | client provides x.509 and server prints fingerprintRainer Gerhards2008-05-151-0/+3
|/
* server's X509 cert fingerprint is obtained by client on connectRainer Gerhards2008-05-081-2/+2
|
* added a bit of doc (at least something...)Rainer Gerhards2008-05-081-0/+4
|
* restructured netstrm driver layerRainer Gerhards2008-04-301-30/+5
| | | | | | | the new structure prevents repetitive loads and unloads of driver files; it also has less overhead The "select" and regular driver are now contained in a single file.
* server handshake now works with nonblocking socketsRainer Gerhards2008-04-301-2/+70
|
* made gtls server driver work in plain tcp modeRainer Gerhards2008-04-251-3/+17
|
* added select() driver for GnuTlsRainer Gerhards2008-04-241-0/+170