- Oct 11, 2015
-
-
Erik Johansson authored
sk_X509_pop will decrease the size of the stack which means that the loop would end after having added only half of the certificates. Also make sure that the X509 certificate is freed in case SSL_CTX_add_extra_chain_cert fails.
-
- Oct 09, 2015
-
-
Daniel Stenberg authored
It makes it a clearer message for developers reaching that point without the necessary support. Thanks-by: Jay Satiro Closes #78
-
Daniel Stenberg authored
follow-up from 6f8ecea0
-
Daniel Stenberg authored
... as in the polarssl TLS backend for example it uses memory functions.
-
Jay Satiro authored
If the underlying recv called by http2_recv returns -1 then that is the value http2_recv returns to the caller.
-
- Oct 08, 2015
-
-
Svyatoslav Mishyn authored
Closes #479
-
Svyatoslav Mishyn authored
-
Svyatoslav Mishyn authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
... since some compilers don't have it and instead use other types, such as __int64. Reported by: gkinseyhpw Closes #478
-
Anders Bakken authored
Follow up to 613e5022.
-
- Oct 07, 2015
-
-
Daniel Stenberg authored
'make V=1' will make the build verbose like before
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Oct 05, 2015
-
-
Daniel Stenberg authored
-
- Oct 04, 2015
-
-
Jay Satiro authored
- If a CURLINFO option is unknown return CURLE_UNKNOWN_OPTION. Prior to this change CURLE_BAD_FUNCTION_ARGUMENT was returned on unknown. That return value is contradicted by the CURLINFO option documentation which specifies a return of CURLE_UNKNOWN_OPTION on unknown.
-
rouzier authored
Closes https://github.com/bagder/curl/pull/471
-
- Oct 02, 2015
-
-
Maksim Stsepanenka authored
Closes https://github.com/bagder/curl/pull/469
-
- Oct 01, 2015
-
-
Orange Tsai authored
Closes #466
-
- Sep 30, 2015
-
-
Jay Satiro authored
Because the 'not' operator has a very low precedence and as a result the entire statement was erroneously negated and could never be true.
-
- Sep 29, 2015
-
-
Thorsten Schöning authored
-
Daniel Stenberg authored
-
Michael Kalinin authored
- Change algorithm init to happen after OpenSSL config load. Additional algorithms may be available due to the user's config so we initialize the algorithms after the user's config is loaded. Bug: https://github.com/bagder/curl/issues/447 Reported-by: Denis Feklushkin
-
- Sep 28, 2015
-
-
Svyatoslav Mishyn authored
Closes https://github.com/bagder/curl/pull/459
-
- Sep 27, 2015
-
-
Daniel Stenberg authored
For a single-stream download from localhost, we managed to increase transfer speed from 1.6MB/sec to around 400MB/sec, mostly because of this single fix.
-
Daniel Stenberg authored
... only call it when there is data arriving for another handle than the one that is currently driving it. Improves single-stream download performance quite a lot. Thanks-to: Tatsuhiro Tsujikawa Bug: http://curl.haxx.se/mail/lib-2015-09/0097.html
-
Daniel Stenberg authored
... as otherwise a really fast pipe can "lock" one transfer for some protocols, like with HTTP/2.
-
- Sep 26, 2015
-
-
Sergei Nikulov authored
Closes #439
-
Daniel Stenberg authored
... don't try to increase the supposed file size on newlines if we don't know what file size it is! Patch-by: lzsiga
-
Tatsuhiro Tsujikawa authored
Closes #457
-
Tatsuhiro Tsujikawa authored
... for CURL_CHECK_OPTION_RT Closes #456
-
- Sep 25, 2015
-
-
Jay Satiro authored
-
- Sep 23, 2015
-
-
Jakub Zakrzewski authored
...during header checks. Otherwise some following header tests (incorrectly) fail. Closes #436
-
Jakub Zakrzewski authored
"windows.h" includes "winsock.h" what causes many redefinition errors if "winsock2.h" is included afterwards and can cause build to fail.
-
Daniel Stenberg authored
-
Mike Crowe authored
If GnuTLS fails to read the certificate then include whatever reason it provides in the failure message reported to the client. Signed-off-by: Mike Crowe <mac@mcrowe.com>
-
- Sep 22, 2015
-
-
Daniel Stenberg authored
-
Mike Crowe authored
The gnutls vtls back-end was previously ignoring any password set via CURLOPT_KEYPASSWD. Presumably this was because gnutls_certificate_set_x509_key_file did not support encrypted keys. gnutls now has a gnutls_certificate_set_x509_key_file2 function that does support encrypted keys. Let's determine at compile time whether the available gnutls supports this new function. If it does then use it to pass the password. If it does not then emit a helpful diagnostic if a password is set. This is preferable to the previous behaviour of just failing to read the certificate without giving a reason in that case. Signed-off-by: Mike Crowe <mac@mcrowe.com>
-
Daniel Stenberg authored
... even for those that don't support providing anything in the 'internals' struct member since it offers a convenient way for applications to figure this out.
-