Quanah Gibson-Mount pushed to branch master at openldap / OpenLDAP
Commits:
9d90f55c by Ondřej Kuzník at 2025-06-23T16:47:48+00:00
ITS#9343 Fix uninitialised variable
- - - - -
dad90d66 by Ondřej Kuzník at 2025-06-23T16:47:48+00:00
ITS#7981 Move default hash selection to slap_passwd_hash_type
- - - - -
d0d07810 by Ondřej Kuzník at 2025-06-23T16:47:48+00:00
ITS#7981 Allow setting a default hash per policy
- - - - -
40683654 by Ondřej Kuzník at 2025-06-23T16:47:48+00:00
ITS#10254 Fix password_scheme to return full hash specification
- - - - -
dcd60d1d by Ondřej Kuzník at 2025-06-23T16:47:48+00:00
ITS#10254 Let slapo-ppolicy rehash user's password
- - - - -
2 changed files:
- servers/slapd/overlays/ppolicy.c
- servers/slapd/passwd.c
View it on GitLab: https://git.openldap.org/openldap/openldap/-/compare/14d47146b0442df85bd949…
--
View it on GitLab: https://git.openldap.org/openldap/openldap/-/compare/14d47146b0442df85bd949…
You're receiving this email because of your account on git.openldap.org.
Quanah Gibson-Mount pushed to branch master at openldap / OpenLDAP
Commits:
f00339df by jinyaoguo at 2025-06-20T14:52:19+00:00
ITS#10344 Ensure the first argument passed to ber_dupbv_x is not NULL.
- - - - -
ddea2bc6 by jinyaoguo at 2025-06-20T14:52:19+00:00
ITS#10343 Fix a memory leak in function slap_uuidstr_from_normalized
- - - - -
8cf18124 by jinyaoguo at 2025-06-20T14:52:19+00:00
ITS#10348 Relase memory allocated from ch_malloc in 2 error handling branches.
- - - - -
b4ed8cf7 by Ondřej Kuzník at 2025-06-20T14:52:19+00:00
ITS#10349 Free bv_effective if unused
- - - - -
47e9cd73 by Ondřej Kuzník at 2025-06-20T14:52:19+00:00
ITS#10349 Do not leak memberof_t
- - - - -
dda3ab74 by Ondřej Kuzník at 2025-06-20T14:52:19+00:00
ITS#10345 Remove spurious strdup
- - - - -
9496132d by Ondřej Kuzník at 2025-06-20T14:52:19+00:00
ITS#10347 Be explicit about managing attr_bv storage
- - - - -
8 changed files:
- contrib/slapd-modules/allowed/allowed.c
- contrib/slapd-modules/comp_match/init.c
- contrib/slapd-modules/rbac/rbac.c
- servers/slapd/back-ldap/monitor.c
- servers/slapd/overlays/memberof.c
- servers/slapd/schema_init.c
- servers/slapd/schema_prep.c
- servers/slapd/syncrepl.c
View it on GitLab: https://git.openldap.org/openldap/openldap/-/compare/76e149280958c5d9fd9587…
--
View it on GitLab: https://git.openldap.org/openldap/openldap/-/compare/76e149280958c5d9fd9587…
You're receiving this email because of your account on git.openldap.org.
Quanah Gibson-Mount pushed to branch master at openldap / OpenLDAP
Commits:
76b9c476 by Michael Kourlas at 2025-06-19T13:49:40+00:00
ITS#10330 do not poll socket in ldap_int_tls_start if no timeout set
This probably had no effect, but is unnecessary.
- - - - -
585e6aa9 by Michael Kourlas at 2025-06-19T13:49:40+00:00
ITS#10330 keep socket non-blocking during polling in ldap_int_tls_start
During TLS negotiation, if a timeout is set, ldap_int_tls_start sets the
socket to non-blocking and calls ldap_int_poll in a loop if
ldap_int_tls_connect does not succeed the first time it is called.
However, ldap_int_poll sets the socket back to blocking and we currently
do not set it back to non-blocking. This means that a subsequent call to
ldap_int_tls_connect may hang and the configured timeout will not be
enforced. To fix this, we now set the socket back to non-blocking after
ldap_int_poll is called.
- - - - -
1 changed file:
- libraries/libldap/tls2.c
View it on GitLab: https://git.openldap.org/openldap/openldap/-/compare/e77ab14f0c7547a4048042…
--
View it on GitLab: https://git.openldap.org/openldap/openldap/-/compare/e77ab14f0c7547a4048042…
You're receiving this email because of your account on git.openldap.org.