- Jan 20, 2015
-
-
Chris Young authored
There is an issue with conflicting "struct timeval" definitions with certain AmigaOS releases and C libraries, depending on what gets included when. It's a minor difference - the OS one is unsigned, whereas the common structure has signed elements. If the OS one ends up getting defined, this causes a timing calculation error in curl. It's easy enough to resolve this at the curl end, by casting the potentially errorneous calculation to a signed long.
-
- Jan 19, 2015
-
-
Daniel Stenberg authored
... of the other cert verification checks so that you can set verifyhost and verifypeer to FALSE and still check the public key. Bug: http://curl.haxx.se/bug/view.cgi?id=1471 Reported-by: Kyle J. McKay
-
- Jan 18, 2015
-
-
Steve Holme authored
For consistency with other USE_WIN32_ defines as well as the USE_OPENLDAP define.
-
Steve Holme authored
Use a dynamicly allocated buffer for the temporary SPN variable similar to how the SASL GSS-API code does, rather than using a fixed buffer of 2048 characters.
-
Steve Holme authored
-
Steve Holme authored
-
- Jan 17, 2015
-
-
Daniel Stenberg authored
-
Steve Holme authored
-
Steve Holme authored
Carrying on from commit 037cd0d9, removed the following unimplemented instances of curlssl_close_all(): Curl_axtls_close_all() Curl_darwinssl_close_all() Curl_cyassl_close_all() Curl_gskit_close_all() Curl_gtls_close_all() Curl_nss_close_all() Curl_polarssl_close_all()
-
Steve Holme authored
Slight code cleanup as the SSL backend #define is mixed up with the API function setup.
-
Steve Holme authored
Fixed the following warning and error from commit 3af90a6e when SSL is not being used: url.c:2004: warning C4013: 'Curl_ssl_cert_status_request' undefined; assuming extern returning int error LNK2019: unresolved external symbol Curl_ssl_cert_status_request referenced in function Curl_setopt
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
Use the same variable name as other areas of SSPI code.
-
Steve Holme authored
Use the SECURITY_STATUS typedef rather than a unsigned long for the QuerySecurityPackageInfo() return and rename the variable as per other areas of SSPI code.
-
Steve Holme authored
-
- Jan 16, 2015
-
-
Steve Holme authored
Missed Curl_read64_be() in commit bb12d444 :(
-
Daniel Stenberg authored
-
Alessandro Ghedini authored
Also known as "status_request" or OCSP stapling, defined in RFC6066 section 8. This requires NSS 3.15 or higher.
-
Alessandro Ghedini authored
Also known as "status_request" or OCSP stapling, defined in RFC6066 section 8. This requires GnuTLS 3.1.3 or higher to build, however it's recommended to use at least GnuTLS 3.3.11 since previous versions had a bug that caused the OCSP response verfication to fail even on valid responses.
-
Alessandro Ghedini authored
This option can be used to enable/disable certificate status verification using the "Certificate Status Request" TLS extension defined in RFC6066 section 8. This also adds the CURLE_SSL_INVALIDCERTSTATUS error, to be used when the certificate status verification fails, and the Curl_ssl_cert_status_request() function, used to check whether the SSL backend supports the status_request extension.
-
Steve Holme authored
Bug: http://curl.haxx.se/mail/lib-2015-01/0094.html Reported-by: John E. Malmberg
-
- Jan 14, 2015
-
-
Daniel Stenberg authored
Reported-by: Mohammad AlSaleh Bug: http://curl.haxx.se/mail/lib-2015-01/0065.html
-
- Jan 12, 2015
-
-
Marc Hoersken authored
If the session is still used by active SSL/TLS connections, it cannot be closed yet. Thus we mark the session as not being cached any longer so that the reference counting mechanism in Curl_schannel_shutdown is used to close and free the session. Reported-by: Jean-Francois Durand
-
- Jan 09, 2015
-
-
Daniel Stenberg authored
-
Steve Holme authored
Better code reuse and consistency in calls to gss_import_name().
-
Viktor Szakats authored
-
- Jan 08, 2015
-
-
Daniel Stenberg authored
... instead of trying PASV, since PASV can't work with IPv6. Reported-by: Vojtěch Král
-
Daniel Stenberg authored
... and make sure we can connect the data connection to a host name that is longer than 48 bytes. Also simplifies the code somewhat by re-using the original host name more, as it is likely still in the DNS cache. Original-Patch-by: Vojtěch Král Bug: http://curl.haxx.se/bug/view.cgi?id=1468
-
Guenter Knauf authored
-
Steve Holme authored
Bug: http://curl.haxx.se/bug/view.cgi?id=1469 Reported-by: Thomas Klausner
-
Viktor Szakats authored
-
- Jan 07, 2015
-
-
Daniel Stenberg authored
...to avoid a session ID getting cached without certificate checking and then after a subsequent _enabling_ of the check libcurl could still re-use the session done without cert checks. Bug: http://curl.haxx.se/docs/adv_20150108A.html Reported-by: Marc Hesse
-
Daniel Stenberg authored
Bug: http://curl.haxx.se/docs/adv_20150108B.html Reported-by: Andrey Labunets
-
Steve Holme authored
-
Steve Holme authored
-
Daniel Stenberg authored
Also, remove the log output of the resolved name is NOT in the cache in the spirit of only telling when something is actually happening.
-
Steve Holme authored
Reported-by: Michael Osipov
-
- Jan 05, 2015
-
-
Dan Fandrich authored
-
- Jan 04, 2015
-
-
Steve Holme authored
Otherwise, the fixes in the previous commits would only be applicable to IDN and SSPI based builds and not others such as OpenSSL with LDAP enabled.
-