- Jul 31, 2014
-
-
Daniel Stenberg authored
-
Michael Wallner authored
-
Marcel Raad authored
This function is available for every Windows version since Windows 95/NT. reference: http://msdn.microsoft.com/en-us/library/windows/desktop/aa379942.aspx
-
Daniel Stenberg authored
... and has been so since 2005
-
Daniel Stenberg authored
Each backend now defines CURL_SSL_BACKEND accordingly. Added the *AXTLS one which was missing previously.
-
- Jul 30, 2014
-
-
Dan Fandrich authored
-
Dan Fandrich authored
It's an enum so a macro test won't work. The CyaSSL changelog doesn't say exactly when this error code was introduced, but it's likely to be 2.7.0.
-
Dan Fandrich authored
-
Dan Fandrich authored
-
Dan Fandrich authored
Under these circumstances, the connection hasn't been fully established and smtp_connect hasn't been called, yet smtp_done still calls the state machine which dereferences the NULL conn pointer in struct pingpong.
-
Daniel Stenberg authored
... by defining Curl_ssl_random() properly
-
Daniel Stenberg authored
This now provides a weak random function since PolarSSL doesn't have a quick and easy way to provide a good one. It does however provide the framework to make one so it _can_ and _should_ be done...
-
Michael Wallner authored
-
Daniel Stenberg authored
I couldn't find any dedicated function in its API to get a "good" random with.
-
Daniel Stenberg authored
ASN_NO_SIGNER_E didn't exist back then!
-
- Jul 29, 2014
-
-
Daniel Stenberg authored
To force each backend implementation to really attempt to provide proper random. If a proper random function is missing, then we can explicitly make use of the default one we use when TLS support is missing. This commit makes sure it works for darwinssl, gnutls, nss and openssl.
-
- Jul 28, 2014
-
-
Daniel Stenberg authored
... with permission from David Shaw
-
Kamil Dudka authored
The minimal required version of NSS is 3.14.x so it does not make sense to check for NSS 3.12.0+ at run time.
-
Anthon Pang authored
Removing defines, even obsolete ones that haven't been used for a very long time, still break a lot of applications. Bug: https://github.com/bagder/curl/pull/106
-
- Jul 26, 2014
-
-
Fabian Keil authored
-
Fabian Keil authored
-
Fabian Keil authored
If a non-standard $TESTDIR is used the file may not be necessary. Previously a "missing" file resulted in the warning: readline() on closed filehandle D at ./runtests.pl line 4940.
-
Fabian Keil authored
-
- Jul 25, 2014
-
-
Daniel Stenberg authored
Bug: http://curl.haxx.se/mail/lib-2014-07/0337.html Reported-by: Spork Schivago
-
Daniel Stenberg authored
-
Daniel Stenberg authored
This is now used by the http2 code. It has two different symbols at the end of the base64 table to make the output "url safe". Bug: https://github.com/tatsuhiro-t/nghttp2/issues/62
-
- Jul 24, 2014
-
-
Marcel Raad authored
Curl_base64_decode allocates the output string by itself and two other strings were not freed either.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Sergey Nikulov authored
Bug: https://github.com/bagder/curl/pull/105
-
- Jul 23, 2014
-
-
Patrick Monnerat authored
-
Daniel Stenberg authored
... to aid when for example prefixed with a space or other weird character.
-
Patrick Monnerat authored
-
Marcel Raad authored
warning C4267: '=' : conversion from 'size_t' to 'long', possible loss of data The member connection_id of struct connectdata is a long (always a 32-bit signed integer on Visual C++) and the member next_connection_id of struct conncache is a size_t, so one of them should be changed to match the other. This patch the size_t in struct conncache to long (the less invasive change as that variable is only ever used in a single code line). Bug: http://curl.haxx.se/bug/view.cgi?id=1399
-
Daniel Stenberg authored
-
Daniel Stenberg authored
1 - fixes the warnings when built without http2 support 2 - adds CURLE_HTTP2, a new error code for errors detected by nghttp2 basically when they are about http2 specific things.
-
- Jul 22, 2014
-
-
Dan Fandrich authored
CyaSSL 3.0.0 returns a unique error code if no CA cert is available, so translate that into CURLE_SSL_CACERT_BADFILE when peer verification is requested.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
No longer necessary after Michael Osipov's rework
-
Daniel Stenberg authored
-