- Aug 01, 2016
-
-
Thomas Glanzmann authored
This patch is necessary so that curl compiles if MBEDTLS_DEBUG is defined. Bug: https://curl.haxx.se/mail/lib-2016-08/0001.html
-
- Jun 22, 2016
-
-
Daniel Stenberg authored
-
Jay Satiro authored
Prior to this change we called Curl_ssl_getsessionid and Curl_ssl_addsessionid regardless of whether session ID reusing was enabled. According to comments that is in case session ID reuse was disabled but then later enabled. The old way was not intuitive and probably not something users expected. When a user disables session ID caching I'd guess they don't expect the session ID to be cached anyway in case the caching is later enabled.
-
- Jun 01, 2016
-
-
Ivan Avdeev authored
Sessionid cache management is inseparable from managing individual session lifetimes. E.g. for reference-counted sessions (like those in SChannel and OpenSSL engines) every session addition and removal should be accompanied with refcount increment and decrement respectively. Failing to do so synchronously leads to a race condition that causes symptoms like use-after-free and memory corruption. This commit: - makes existing session cache locking explicit, thus allowing individual engines to manage lock's scope. - fixes OpenSSL and SChannel engines by putting refcount management inside this lock's scope in relevant places. - adds these explicit locking calls to other engines that use sessionid cache to accommodate for this change. Note, however, that it is unknown whether any of these engines could also have this race. Bug: https://github.com/curl/curl/issues/815 Fixes #815 Closes #847
-
- May 30, 2016
-
-
Renaud Lehoux authored
Closes #838
-
- May 24, 2016
-
-
Daniel Stenberg authored
Regression from the previous *printf() rearrangements, this file missed to include the correct header to make sure snprintf() works universally. Reported-by: Moti Avrahami Bug: https://curl.haxx.se/mail/lib-2016-05/0196.html
-
- May 17, 2016
-
-
Daniel Stenberg authored
...as otherwise the TLS libs will skip the CN/SAN check and just allow connection to any server. curl previously skipped this function when SNI wasn't used or when connecting to an IP address specified host. CVE-2016-3739 Bug: https://curl.haxx.se/docs/adv_20160518A.html Reported-by: Moti Avrahami
-
- May 09, 2016
-
-
Daniel Stenberg authored
Only protocols that actually have a protocol registered for ALPN and NPN should try to get that negotiated in the TLS handshake. That is only HTTPS (well, http/1.1 and http/2) right now. Previously ALPN and NPN would wrongly be used in all handshakes if libcurl was built with it enabled. Reported-by: Jay Satiro Fixes #789
-
- Apr 28, 2016
-
-
Jay Satiro authored
This also fixes PolarSSL session resume. Prior to this change the TLS session information wasn't properly saved and restored for PolarSSL and mbedTLS. Bug: https://curl.haxx.se/mail/lib-2016-01/0070.html Reported-by: Thomas Glanzmann Bug: https://curl.haxx.se/mail/lib-2016-04/0095.html Reported-by: Moti Avrahami
-
- Apr 25, 2016
-
-
Daniel Stenberg authored
-
- Apr 07, 2016
-
-
Damien Vielpeau authored
-
Daniel Stenberg authored
... as otherwise we might get stuck thinking there's no more data to handle. Reported-by: Damien Vielpeau Fixes #737
-
Daniel Stenberg authored
-
Daniel Stenberg authored
mbedtls_ is the prefix used by the mbedTLS library itself so we should avoid using that for our private functions.
-
- Apr 03, 2016
-
-
Daniel Stenberg authored
-
- Mar 19, 2016
-
-
Daniel Stenberg authored
vtls/mbedtls.h:67:36: warning: implicit declaration of function ‘mbedtls_sha256’ [-Wimplicit-function-declaration]
-
- Mar 06, 2016
-
-
Jay Satiro authored
Prior to this change when a single protocol CURL_SSLVERSION_ was specified by the user that version was set only as the minimum version but not as the maximum version as well.
-
- Feb 10, 2016
-
-
Daniel Stenberg authored
-
- Feb 09, 2016
-
-
Rafael Antonio authored
Closes #626
-
Daniel Stenberg authored
Since we didn't keep the input argument around after having called mbedtls, it could end up accessing the wrong memory when figuring out the ALPN protocols. Closes #642
-
- Feb 02, 2016
-
-
Daniel Stenberg authored
-
- Jan 18, 2016
-
-
Jay Satiro authored
- Switch from verifying a pinned public key in a callback during the certificate verification to inline after the certificate verification. The callback method had three problems: 1. If a pinned public key didn't match, CURLE_SSL_PINNEDPUBKEYNOTMATCH was not returned. 2. If peer certificate verification was disabled the pinned key verification did not take place as it should. 3. (related to #2) If there was no certificate of depth 0 the callback would not have checked the pinned public key. Though all those problems could have been fixed it would have made the code more complex. Instead we now verify inline after the certificate verification in mbedtls_connect_step2. Ref: http://curl.haxx.se/mail/lib-2016-01/0047.html Ref: https://github.com/bagder/curl/pull/601
-
- Jan 09, 2016
-
-
Thomas Glanzmann authored
-
- Jan 07, 2016
-
-
Jay Satiro authored
- Fix ALPN reply detection. - Wrap nghttp2 code in ifdef USE_NGHTTP2. Prior to this change ALPN and HTTP/2 did not work properly in mbedTLS.
-
- Dec 13, 2015
-
-
Daniel Stenberg authored
... and stick to 1.1 for HTTP. This is in line with what browsers do and should have very little risk.
-
- Oct 29, 2015
-
-
Daniel Stenberg authored
CID 1332129
-
Daniel Stenberg authored
CID 1332128
-
- Oct 23, 2015
-
-
Daniel Stenberg authored
Global private symbols MUST start with Curl_!
-
Dmitry S. Baikov authored
Closes #505
-
- Oct 22, 2015
-
-
m-gardet authored
Closes #502
-
- Oct 20, 2015
-
-
Jonas Minnberg authored
closes #496
-