- Oct 17, 2011
-
-
Kamil Dudka authored
Do not use artificial nicknames for certificates from files.
-
Kamil Dudka authored
... instead of nicknames, which are not unique.
-
- Sep 03, 2011
-
-
Yang Tse authored
-
- Aug 15, 2011
-
-
Kamil Dudka authored
Bug: https://bugzilla.redhat.com/728562
-
- Jul 26, 2011
-
-
Yang Tse authored
-
- Apr 27, 2011
-
-
Daniel Stenberg authored
By the use of a the new lib/checksrc.pl script that checks that our basic source style rules are followed.
-
- Apr 19, 2011
-
-
Daniel Stenberg authored
Massively reduce #ifdefs all over (23 #ifdef lines less so far) Moved conversion-specific code to non-ascii.c
-
- Apr 08, 2011
-
-
Kamil Dudka authored
In case a client certificate is used, invalidate SSL session cache at the end of a session. This forces NSS to ask for a new client certificate when connecting second time to the same host. Bug: https://bugzilla.redhat.com/689031
-
- Apr 04, 2011
-
-
Kamil Dudka authored
The bug was introduced in 806dbb02 (a wrong value was passed in as the first argument to the default callback in our wrapper).
-
- Mar 15, 2011
-
-
Kamil Dudka authored
When NSS-powered libcurl connected to a SSL server with CURLOPT_SSL_VERIFYPEER equal to zero, NSS remembered that the peer certificate was accepted by libcurl and did not ask the second time when connecting to the same server with CURLOPT_SSL_VERIFYPEER equal to one. This patch turns off the SSL session cache for the particular SSL socket if peer verification is disabled. In order to avoid any performance impact, the peer verification is completely skipped in that case, which makes it even faster than before. Bug: https://bugzilla.redhat.com/678580
-
- Feb 22, 2011
-
-
Kamil Dudka authored
Flaw introduced in fc77790b and present in curl-7.21.4. Bug: https://bugzilla.redhat.com/669702#c16
-
- Feb 17, 2011
-
-
Kamil Dudka authored
-
- Feb 16, 2011
-
-
Daniel Stenberg authored
-
- Jan 27, 2011
-
-
Kamil Dudka authored
... in case more than one CA is loaded. Bug: https://bugzilla.redhat.com/670802
-
- Jan 18, 2011
-
-
Kamil Dudka authored
... and update the curl.1 and curl_easy_setopt.3 man pages such that they do not suggest to use an OpenSSL utility if curl is not built against OpenSSL. Bug: https://bugzilla.redhat.com/669702
-
- Jan 04, 2011
-
-
Daniel Stenberg authored
As the function doesn't really use the connectdata struct but only the SessionHanadle struct I modified what argument it wants.
-
Kamil Dudka authored
Bug: https://bugzilla.redhat.com/623663
-
- Jan 02, 2011
-
-
Daniel Stenberg authored
Since some systems don't have PATH_MAX and it isn't that clever to assume a fixed maximum path length, the code now allocates buffer space instead of using stack. Reported by: Samuel Thibault Bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608521
-
- Jun 30, 2010
-
-
Kamil Dudka authored
When configured with '--without-ssl --with-nss', NTLM authentication now uses NSS crypto library for MD5 and DES. For MD4 we have a local implementation in that case. More details are available at https://bugzilla.redhat.com/603783 In order to get it working, curl_global_init() must be called with CURL_GLOBAL_SSL or CURL_GLOBAL_ALL. That's necessary because NSS needs to be initialized globally and we do so only when the NSS library is actually required by protocol. The mentioned call of curl_global_init() is responsible for creating of the initialization mutex. There was also slightly changed the NSS initialization scenario, in particular, loading of the NSS PEM module. It used to be loaded always right after the NSS library was initialized. Now the library is initialized as soon as any SSL or NTLM is required, while the PEM module is prevented from being loaded until the SSL is actually required.
-
- May 11, 2010
-
-
Howard Chu authored
FTP(S) use two connections that can be set to different recv and send functions independently, so by introducing recv+send pairs in the same manner we already have sockets/connections we can work with FTPS fine. This commit fixes the FTPS regression introduced in change d64bd82b.
-
Kamil Dudka authored
-
Kamil Dudka authored
-
- May 07, 2010
-
-
Howard Chu authored
Howard Chu brought the bulk work of this patch that properly moves out the sending and recving of data to the parts of the code that are properly responsible for the various ways of doing so. Daniel Stenberg assisted with polishing a few bits and fixed some minor flaws in the original patch. Another upside of this patch is that we now abuse CURLcodes less with the "magic" -1 return codes and instead use CURLE_AGAIN more consistently.
-
- Apr 24, 2010
-
-
Kamil Dudka authored
-
- Apr 06, 2010
-
-
Kamil Dudka authored
-
- Apr 04, 2010
-
-
Kamil Dudka authored
-
- Mar 31, 2010
-
-
Guenter Knauf authored
-
- Mar 24, 2010
-
-
Daniel Stenberg authored
-
- Feb 17, 2010
-
-
Daniel Stenberg authored
-
- Dec 02, 2009
-
-
Kamil Dudka authored
-
- Nov 12, 2009
-
-
Kamil Dudka authored
a broken TLS server. However it does not happen if SSL version is selected manually. The approach was originally taken from PSM. Kaspar Brand helped me to complete the patch. Original bug reports: https://bugzilla.redhat.com/525496 https://bugzilla.redhat.com/527771
-
Kamil Dudka authored
closed NSPR descriptor. The issue was hard to find, reported several times before and always closed unresolved. More info at the RH bug: https://bugzilla.redhat.com/534176
-
- Nov 05, 2009
-
-
Kamil Dudka authored
in non-blocking mode.
-
- Oct 28, 2009
-
-
Daniel Stenberg authored
false positive on a leaked socket, so this introduces a way to tell the system that the socket is indeed closed without explicitly closing it!
-
- Oct 18, 2009
-
-
Daniel Stenberg authored
libcurl called NSS to close the SSL "session" it also closed the actual socket.
-
- Oct 07, 2009
-
-
Kamil Dudka authored
-
- Sep 21, 2009
-
-
Guenter Knauf authored
added support for new SQLite cert database format: added a runtime check for version 3.12.0, and depending on the result add 'sql:' prefix to cert database directory so that newer SQLIte database format works.
-
Guenter Knauf authored
added aditional check for the directory specified with SSL_DIR, and fall back to hardcoded directory if not a valid directory.
-
- Sep 08, 2009
-
-
Guenter Knauf authored
-
- Sep 06, 2009
-
-
Guenter Knauf authored
-