- Aug 02, 2016
-
-
Daniel Stenberg authored
CVE-2016-5420 Bug: https://curl.haxx.se/docs/adv_20160803B.html
-
Daniel Stenberg authored
CVE-2016-5419 Bug: https://curl.haxx.se/docs/adv_20160803A.html Reported-by: Bru Rom Contributions-by: Eric Rescorla and Ray Satiro
-
- Jun 22, 2016
-
-
Daniel Stenberg authored
-
Jay Satiro authored
Prior to this change we called Curl_ssl_getsessionid and Curl_ssl_addsessionid regardless of whether session ID reusing was enabled. According to comments that is in case session ID reuse was disabled but then later enabled. The old way was not intuitive and probably not something users expected. When a user disables session ID caching I'd guess they don't expect the session ID to be cached anyway in case the caching is later enabled.
-
- Jun 01, 2016
-
-
Ivan Avdeev authored
Sessionid cache management is inseparable from managing individual session lifetimes. E.g. for reference-counted sessions (like those in SChannel and OpenSSL engines) every session addition and removal should be accompanied with refcount increment and decrement respectively. Failing to do so synchronously leads to a race condition that causes symptoms like use-after-free and memory corruption. This commit: - makes existing session cache locking explicit, thus allowing individual engines to manage lock's scope. - fixes OpenSSL and SChannel engines by putting refcount management inside this lock's scope in relevant places. - adds these explicit locking calls to other engines that use sessionid cache to accommodate for this change. Note, however, that it is unknown whether any of these engines could also have this race. Bug: https://github.com/curl/curl/issues/815 Fixes #815 Closes #847
-
- May 01, 2016
-
-
Daniel Stenberg authored
to make it obvious to users trying to use the feature with TLS backends not supporting it. Discussed in #781 Reported-by: Travis Burtrum
-
- Apr 17, 2016
-
-
Michael Kaufmann authored
Makes curl connect to the given host+port instead of the host+port found in the URL.
-
- Feb 04, 2016
-
-
Viktor Szakats authored
-
- Feb 02, 2016
-
-
Daniel Stenberg authored
-
- Oct 20, 2015
-
-
Daniel Stenberg authored
... noticed with mbedTLS.
-
- Sep 20, 2015
-
-
Jay Satiro authored
- Change the designator name we use to show the base64 encoded sha256 hash of the server's public key from 'pinnedpubkey' to 'public key hash'. Though the server's public key hash is only shown when comparing pinned public key hashes, the server's hash may not match one of the pinned.
-
- Sep 19, 2015
-
-
Daniel Hwang authored
Add a "pinnedpubkey" section to the "Server Certificate" verbose Bug: https://github.com/bagder/curl/issues/410 Reported-by: W. Mark Kubacki Closes #430 Closes #410
-
- Jul 01, 2015
-
-
Travis Burtrum authored
-
- Mar 27, 2015
-
-
Jay Satiro authored
-
- Mar 25, 2015
-
-
Daniel Stenberg authored
... since the funciton can fail on OOM. Check this return code. Coverity CID 1291705.
-
- Mar 24, 2015
-
-
Dan Fandrich authored
This header file must be included after all header files except memdebug.h, as it does similar memory function redefinitions and can be similarly affected by conflicting definitions in system or dependent library headers.
-
Dan Fandrich authored
This is a strange combination of options, but is allowed.
-
- Mar 20, 2015
-
-
Alessandro Ghedini authored
This option can be used to enable/disable TLS False Start defined in the RFC draft-bmoeller-tls-falsestart.
-
- Mar 16, 2015
-
-
Markus Elfring authored
The function "free" is documented in the way that no action shall occur for a passed null pointer. It is therefore not needed that a function caller repeats a corresponding check. http://stackoverflow.com/questions/18775608/free-a-null-pointer-anyway-or-check-first This issue was fixed by using the software Coccinelle 1.0.0-rc24. Signed-off-by:
Markus Elfring <elfring@users.sourceforge.net>
-
- Mar 03, 2015
-
-
Daniel Stenberg authored
No need to use _MPRINTF_REPLACE internally.
-
- Jan 16, 2015
-
-
Alessandro Ghedini authored
This option can be used to enable/disable certificate status verification using the "Certificate Status Request" TLS extension defined in RFC6066 section 8. This also adds the CURLE_SSL_INVALIDCERTSTATUS error, to be used when the certificate status verification fails, and the Curl_ssl_cert_status_request() function, used to check whether the SSL backend supports the status_request extension.
-
- Dec 26, 2014
-
-
Steve Holme authored
Otherwise Curl_ssl_init_certinfo() can fail and set the num_of_certs member variable to the requested count, which could then be used incorrectly as libcurl closes down.
-
Steve Holme authored
The return type for this function was 0 on success and 1 on error. This was then examined by the calling functions and, in most cases, used to return CURLE_OUT_OF_MEMORY. Instead use CURLcode for the return type and return the out of memory error directly, propagating it up the call stack.
-
- Dec 25, 2014
-
-
Steve Holme authored
The return type of this function is a boolean value, and even uses a bool internally, so use bool in the function declaration as well as the variables that store the return value, to avoid any confusion.
-
- Nov 24, 2014
-
-
Travis Burtrum authored
-
- Oct 29, 2014
-
-
Steve Holme authored
conversion from 'size_t' to 'unsigned int', possible loss of data
-
- Oct 24, 2014
-
-
Daniel Stenberg authored
... for the local variable name in functions holding the return code. Using the same name universally makes code easier to read and follow. Also, unify code for checking for CURLcode errors with: if(result) or if(!result) instead of if(result == CURLE_OK), if(CURLE_OK == result) or if(result != CURLE_OK)
-
- Oct 23, 2014
-
-
Daniel Stenberg authored
This is not actually used uninitialized but we silence warnings. Bug: http://curl.haxx.se/bug/view.cgi?id=1437 Reported-by: Julien
-
- Oct 13, 2014
-
-
Patrick Monnerat authored
-
Patrick Monnerat authored
-
Patrick Monnerat authored
-
- Oct 09, 2014
-
-
Daniel Stenberg authored
It turned out some features were not enabled in the build since for example url.c #ifdefs on features that are defined on a per-backend basis but vtls.h didn't include the backend headers. CURLOPT_CERTINFO was one such feature that was accidentally disabled.
-
- Aug 03, 2014
-
-
Dan Fandrich authored
-
- Jul 31, 2014
-
-
Daniel Stenberg authored
Each backend now defines CURL_SSL_BACKEND accordingly. Added the *AXTLS one which was missing previously.
-
- Jul 29, 2014
-
-
Daniel Stenberg authored
To force each backend implementation to really attempt to provide proper random. If a proper random function is missing, then we can explicitly make use of the default one we use when TLS support is missing. This commit makes sure it works for darwinssl, gnutls, nss and openssl.
-
- Jun 11, 2014
-
-
Daniel Stenberg authored
Curl_rand() will return a dummy and repatable random value for this case. Makes it possible to write test cases that verify output. Also, fake timestamp with CURL_FORCETIME set. Only when built debug enabled of course. Curl_ssl_random() was not used anymore so it has been removed. Curl_rand() is enough. create_digest_md5_message: generate base64 instead of hex string curl_sasl: also fix memory leaks in some OOM situations
-
Steve Holme authored
-
- Dec 20, 2013
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-