summaryrefslogtreecommitdiffstats
path: root/nss_engine_io.c
Commit message (Collapse)AuthorAgeFilesLines
* Cleanup to remove a slew of trailing whitespaceRob Crittenden2015-10-021-22/+22
|
* Rework SNI client reverse proxyRob Crittenden2015-10-021-14/+41
| | | | | | | | | | | | | Add a note to the table to indicate that the handhake is complete so we don't set the extension every time data is read or written. Drop NSSHandshakeCallback() as it didn't do anything and is replaced by the proxy callback. Extend the checks around calling SetURL to match those in mod_ssl: - a hostname is available - not SSLv3 - not an IP address
* Send SNI extension mod_nss acts as a reverse proxystanda2015-10-021-0/+39
|
* Fix compatibility with RHEL 6.x (Apache 2.2.x and NSS 3.15.1)Rob Crittenden2015-10-021-0/+12
|
* Use %ld instead of %d for potentially long integer valuesRob Crittenden2015-08-271-1/+1
|
* Add RenegBufferSize optionRob Crittenden2015-06-101-4/+6
| | | | | | | Control the buffer size used on a POST when SSL renegotiation is being done. The default is 128K. Resolves BZ 1214366
* Remove an unused variableRob Crittenden2014-02-211-3/+0
|
* Apache 2.4 compatibility changesRob Crittenden2014-02-211-3/+3
|
* Always copy in client certificate and fix FakeBasicAuthRob Crittenden2011-06-141-7/+3
| | | | | | | | | When NSSOptions +FakeBasicAuth is set for a directory, and a certificate is not provided with which the BasicAuth can be Faked, and the client provides an Authorization header, the FakeBasicAuth code in mod_nss may not properly reject an attempt to spoof. BZ 702437
* Bug 669118rcritten2011-01-121-2/+2
| | | | | | | | memcpy of overlapping memory is no longer allowed by glibc. This is mod_ssl bug https://issues.apache.org/bugzilla/show_bug.cgi?id=45444 Patch ported by Stephen Gallagher.
* Revert PR_WOULD_BLOCK change and reset the NSPR error value before calllingrcritten2010-09-241-2/+2
| | | | | | | PR_Read(). In testing with TPS from dogtag this really seems to fix #620856 this time.
* Fix endless read loop in some situations when handling POST data (#620856)rcritten2010-09-171-1/+2
| | | | | | This was discovered in the dogtag TPS subsystem. I haven't been able to duplicate it outside of that but it is trivial inside. This seems to fix it and brings the code closer to what mod_ssl does here as well.
* Fix another place we should set PR_WOULD_BLOCK_ERROR during a read.rcritten2009-11-111-0/+1
|
* Return -1 on a read failure and set the appropriate NSPR error message.rcritten2009-02-191-1/+2
| | | | | | | | | | | This bug has lingered for so long since mod_nss wasn't able to be used with mod_proxy until now. What one would see with this bug is sometimes a page would work, sometimes not (just the headers would be retrieved). The problem was we were return 0 which means EOF and was interpreted by upper levels to mean the transfer was done rather than no data being available. 484380
* Resolves: 241936rcritten2007-05-311-4/+8
| | | | | | | | | | | Bring in some updates based on diffs from 2.0.59 to 2.2.4 - Do explicit TRUE/FALSE tests with sc->enabled to see if SSL is enabled. Don't depend on the fact that TRUE == 1 - Remove some dead code - Minor update to the buffer code that buffers POST data during a renegotation - Optimize setting environment variables by using a switch statement.
* Merge in changes from http://svn.apache.org/viewvc?view=rev&revision=290965rcritten2006-08-091-0/+176
| | | | | | | | | | | | | | | | | | Implement a (bounded) buffer of request body data to provide a limited but safe fix for the mod_nss renegotiation-vs-requests-with-bodies bug: * mod_nss.h (nss_io_buffer_fill): Add prototype. * nss_engine_io.c (nss_io_buffer_fill, nss_io_filter_buffer): New functions. * nss_engine_kernel.c (nss_hook_Access): If a renegotiation is needed, and the request has a non-zero content-length, or a t-e header (and 100-continue was not requested), call nss_io_buffer_fill to set aside the request body data if possible, then proceed with the negotiation. PR: 12355
* 188300rcritten2006-04-071-1/+1
| | | | Replace C++ style comments to make the Sun Forte compiler happy.
* Add support for Elliptical Curve Cryptography (ECC). This is disabledrcritten2006-03-021-2/+2
| | | | by default. To enable it, pass --enable-ecc to configure.
* Remove a debug msg that was left in on accident.rcritten2005-09-291-2/+0
|
* Earlier versions of Apache 2.0 (such as on RHEL 3) don't supportrcritten2005-06-291-0/+2
| | | | AP_BUCKET_IS_EOC. Define around it.
* Changed function and configuration names so mod_nss can peacefullyrcritten2005-05-311-65/+65
| | | | co-exist with mod_ssl.
* Initial import of mod_nssrcritten2005-05-171-0/+1194