summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* Commit Debian 3.0 (quilt) metadataHEADdebian/0.0.5-5archive/debian/0.0.5-5masterSam Hartman2019-01-02
| | | | [dgit (3.11~deb9u1) quilt-fixup]
* Merge branch 'debian' into dgitSam Hartman2019-01-02
|\
| * ReleaseSam Hartman2019-01-02
| |
| * Remove assertionSam Hartman2019-01-02
| | | | | | | | | | | | | | OpenSSL has removed the crypto locking primitives, so CRYPTO_get_locking_function always returns NULL. To support older and newer OpenSSL, continue to set a locking function, but don't assert if we have already initialized and the locking function returns null.
* | Commit Debian 3.0 (quilt) metadatadebian/0.0.5-4archive/debian/0.0.5-4Sam Hartman2017-08-12
| | | | | | | | [dgit (3.12) quilt-fixup]
* | Merge remote-tracking branch 'dgit/dgit/sid' into dgitSam Hartman2017-08-12
|\ \ | |/ |/|
| * debian-changesSam Hartman2016-12-19
| | | | | | Gbp-Pq: Name debian-changes
| * libradsec (0.0.5-3) unstable; urgency=mediumSam Hartman2016-12-19
| |\ | | | | | | | | | | | | | | | | | | * Build depend on openssl 1.0, Closes: #828410 * Update standards version to 3.9.8 (no changes) [dgit import unpatched libradsec 0.0.5-3]
| | * Import libradsec_0.0.5-3.debian.tar.xzSam Hartman2016-12-19
| | | | | | | | [dgit import tarball libradsec 0.0.5-3 libradsec_0.0.5-3.debian.tar.xz]
| * Import libradsec_0.0.5.orig.tar.gzSam Hartman2014-08-24
| | | | [dgit import orig libradsec_0.0.5.orig.tar.gz]
* Release to unstableSam Hartman2017-08-12
|
* Permit the ssl locking callback to be unusedSam Hartman2017-08-12
| | | | | | Sufficiently modern ssl does not need a locking callback so crypto_set_locking_cb is a no-op. That leads to the locking callback being an unused static function. Let gcc know this is OK.
* Improve tlscommon.c for openssl 1.1Sam Hartman2017-08-12
| | | | | | | | | | | | * Pass in tls_method so that all versions of TLS can be supported * Disable sslv3; we should also disable TLS1 but that might be an issue since previous versions only supported TLS1 * We need to look at the ASN1 deprecated warnings, but figuring out a fix that works both for Centos and Debian is more time than I wanted to spend. The deprecated warning seems OK there, so make it not an error at least for now.
* memset the entire valuepair, not just the initial chunkSam Hartman2017-08-12
|
* Make names array with constant pointer; cdecl fixSam Hartman2017-08-12
|
* Build depend on openssl 1.0, Closes: #828410Sam Hartman2016-12-19
| | | | | * Build depend on openssl 1.0, Closes: #828410 * Update standards version to 3.9.8 (no changes)
* Fix typosSam Hartman2014-10-07
|
* Include license for radsecproxy/radsecproxy.h, Thanks Thorsten AlteholzSam Hartman2014-10-07
|
* Add bmulti-arch linesSam Hartman2014-08-24
|
* Remove redundant patchSam Hartman2014-08-24
|
* parallelSam Hartman2014-08-24
|
* DH compat level 9Sam Hartman2014-08-24
| | | | | | multiarch install Add misc:depends
* Fix dependencies and homepageSam Hartman2014-08-23
|
* Update vcs-gitSam Hartman2014-08-23
|
* enable dh-autoreconfSam Hartman2014-08-23
|
* Single debian patchSam Hartman2014-08-23
|
* git build-packageSam Hartman2014-08-23
|
* 0.0.5-1Sam Hartman2014-08-23
|
* move debian directory upSam Hartman2014-03-06
|
* Merge remote-tracking branch 'origin/master' into debianSam Hartman2014-03-06
|\ | | | | | | In particular update root of tree
| * Move lib to the root.Linus Nordberg2014-02-05
| |
| * Move .gitignore to lib/ in preparation for moving lib to the root.Linus Nordberg2014-02-05
| |
* | Update copyrightSam Hartman2014-02-13
| |
* | Merge tag 'libradsec-0.0.5' into debianSam Hartman2014-02-11
|\| | | | | | | | | | | | | | | libradsec-0.0.5 Conflicts: lib/conf.c lib/radius/Makefile.am
| * Ready for libradsec-0.0.5.Linus Nordberg2014-02-03
| |
| * Add PRNG improvements to CHANGES.Linus Nordberg2014-02-03
| |
| * Update documentation with info on multithread protection.Linus Nordberg2013-12-20
| |
| * Detect POSIX threads at configure time and use them for OpenSSL.Linus Nordberg2013-12-20
| |
| * Don't use deprecated 'INCLUDES' variable in Makefile.am files.Linus Nordberg2013-12-20
| |
| * Remove unused code.Linus Nordberg2013-12-20
| |
| * Improve initialisation of OpenSSL PRNG.Linus Nordberg2013-12-20
| | | | | | | | Basic idea taken from Tor.
| * Bump version number.Linus Nordberg2013-12-18
| |
| * Distribute new CHANGES file.Linus Nordberg2013-12-18
| |
| * Update documentation and configure.ac for libradsec-0.0.4.Linus Nordberg2013-12-18
| |
| * Clarify README.Linus Nordberg2013-12-18
| |
| * Add a debug printout when dropping an incoming response message.Linus Nordberg2013-11-18
| | | | | | | | Also, terminate another debug message with \n.
| * Avoid leaking memory when receiving a bad response.Linus Nordberg2013-11-18
| | | | | | | | | | | | | | | | A badly authenticated response message or one that didn't decode or decrypt correctly was never freed. If caller didn't pass pkt_out, any response was leaked as well. As a bonus, the code is now readable too.
| * Stop rs_request_send() from leaking RSE_TIMEOUT_CONN and RSE_TIMEOUT_IO.Linus Nordberg2013-11-18
| | | | | | | | | | | | | | | | If sending or receiving time out, pop the error off the stack before continuing the loop. Push a new error, RS_TIMEOUT, before timing out for real. Addresses LIBRADSEC-3.
| * Disable/delete events in the timeout callback.Linus Nordberg2013-11-18
| | | | | | | | | | | | | | | | | | | | | | | | | | Without this, the sequence (1) send (successfully) (2) receive (timeout) (3) resend (successfully) will have the read event from (2) trigger a read in (3) and the response is lost. Addresses LIBRADSEC-3.
| * Make sure that configure without --enable-tls works.Linus Nordberg2013-11-15
| | | | | | | | | | Also, --disable-tls, --enable-tls and --enable-tls=no. Closes LIBRADSEC-2.