Skip to content
Snippets Groups Projects
  1. Aug 02, 2016
  2. Jun 22, 2016
  3. Jun 01, 2016
    • Ivan Avdeev's avatar
      vtls: fix ssl session cache race condition · 31c521b0
      Ivan Avdeev authored
      Sessionid cache management is inseparable from managing individual
      session lifetimes. E.g. for reference-counted sessions (like those in
      SChannel and OpenSSL engines) every session addition and removal
      should be accompanied with refcount increment and decrement
      respectively. Failing to do so synchronously leads to a race condition
      that causes symptoms like use-after-free and memory corruption.
      This commit:
       - makes existing session cache locking explicit, thus allowing
         individual engines to manage lock's scope.
       - fixes OpenSSL and SChannel engines by putting refcount management
         inside this lock's scope in relevant places.
       - adds these explicit locking calls to other engines that use
         sessionid cache to accommodate for this change. Note, however,
         that it is unknown whether any of these engines could also have
         this race.
      
      Bug: https://github.com/curl/curl/issues/815
      Fixes #815
      Closes #847
      31c521b0
  4. May 01, 2016
  5. Apr 17, 2016
  6. Feb 04, 2016
  7. Feb 02, 2016
  8. Oct 20, 2015
  9. Sep 20, 2015
    • Jay Satiro's avatar
      vtls: Change designator name for server's pubkey hash · 47b7d658
      Jay Satiro authored
      - Change the designator name we use to show the base64 encoded sha256
      hash of the server's public key from 'pinnedpubkey' to
      'public key hash'.
      
      Though the server's public key hash is only shown when comparing pinned
      public key hashes, the server's hash may not match one of the pinned.
      47b7d658
  10. Sep 19, 2015
  11. Jul 01, 2015
  12. Mar 27, 2015
  13. Mar 25, 2015
  14. Mar 24, 2015
  15. Mar 20, 2015
  16. Mar 16, 2015
  17. Mar 03, 2015
  18. Jan 16, 2015
    • Alessandro Ghedini's avatar
      url: add CURLOPT_SSL_VERIFYSTATUS option · 3af90a6e
      Alessandro Ghedini authored
      This option can be used to enable/disable certificate status verification using
      the "Certificate Status Request" TLS extension defined in RFC6066 section 8.
      
      This also adds the CURLE_SSL_INVALIDCERTSTATUS error, to be used when the
      certificate status verification fails, and the Curl_ssl_cert_status_request()
      function, used to check whether the SSL backend supports the status_request
      extension.
      3af90a6e
  19. Dec 26, 2014
  20. Dec 25, 2014
  21. Nov 24, 2014
  22. Oct 29, 2014
  23. Oct 24, 2014
    • Daniel Stenberg's avatar
      code cleanup: we prefer 'CURLcode result' · 0eb3d15c
      Daniel Stenberg authored
      ... for the local variable name in functions holding the return
      code. Using the same name universally makes code easier to read and
      follow.
      
      Also, unify code for checking for CURLcode errors with:
      
       if(result) or if(!result)
      
      instead of
      
       if(result == CURLE_OK), if(CURLE_OK == result) or if(result != CURLE_OK)
      0eb3d15c
  24. Oct 23, 2014
  25. Oct 13, 2014
  26. Oct 09, 2014
    • Daniel Stenberg's avatar
      vtls: have vtls.h include the backend header files · 6637b237
      Daniel Stenberg authored
      It turned out some features were not enabled in the build since for
      example url.c #ifdefs on features that are defined on a per-backend
      basis but vtls.h didn't include the backend headers.
      
      CURLOPT_CERTINFO was one such feature that was accidentally disabled.
      6637b237
  27. Aug 03, 2014
  28. Jul 31, 2014
  29. Jul 29, 2014
    • Daniel Stenberg's avatar
      vtls: make the random function mandatory in the TLS backend · 8dfd2208
      Daniel Stenberg authored
      To force each backend implementation to really attempt to provide proper
      random. If a proper random function is missing, then we can explicitly
      make use of the default one we use when TLS support is missing.
      
      This commit makes sure it works for darwinssl, gnutls, nss and openssl.
      8dfd2208
  30. Jun 11, 2014
  31. Dec 20, 2013
Loading