1. 11 Oct, 2015 1 commit
  2. 09 Oct, 2015 4 commits
  3. 08 Oct, 2015 6 commits
  4. 07 Oct, 2015 4 commits
  5. 05 Oct, 2015 1 commit
  6. 04 Oct, 2015 2 commits
  7. 02 Oct, 2015 1 commit
  8. 01 Oct, 2015 1 commit
  9. 30 Sep, 2015 1 commit
    • Jay Satiro's avatar
      runtests: Fix pid check in checkdied · c6ff538e
      Jay Satiro authored
      Because the 'not' operator has a very low precedence and as a result the
      entire statement was erroneously negated and could never be true.
      c6ff538e
  10. 29 Sep, 2015 3 commits
  11. 28 Sep, 2015 1 commit
  12. 27 Sep, 2015 3 commits
  13. 26 Sep, 2015 4 commits
  14. 25 Sep, 2015 1 commit
  15. 23 Sep, 2015 4 commits
  16. 22 Sep, 2015 3 commits
    • Daniel Stenberg's avatar
      RELEASE-NOTES: synced with 6b56901b · 684bf308
      Daniel Stenberg authored
      684bf308
    • Mike Crowe's avatar
      gnutls: Support CURLOPT_KEYPASSWD · 6b56901b
      Mike Crowe authored
      
      
      The gnutls vtls back-end was previously ignoring any password set via
      CURLOPT_KEYPASSWD. Presumably this was because
      gnutls_certificate_set_x509_key_file did not support encrypted keys.
      
      gnutls now has a gnutls_certificate_set_x509_key_file2 function that
      does support encrypted keys. Let's determine at compile time whether the
      available gnutls supports this new function. If it does then use it to
      pass the password. If it does not then emit a helpful diagnostic if a
      password is set. This is preferable to the previous behaviour of just
      failing to read the certificate without giving a reason in that case.
      
      Signed-off-by: default avatarMike Crowe <mac@mcrowe.com>
      6b56901b
    • Daniel Stenberg's avatar
      CURLINFO_TLS_SESSION: always return backend info · 7362008c
      Daniel Stenberg authored
      ... even for those that don't support providing anything in the
      'internals' struct member since it offers a convenient way for
      applications to figure this out.
      7362008c