- Mar 12, 2013
-
-
Kamil Dudka authored
-
- Mar 09, 2013
-
-
Daniel Stenberg authored
8 more bugfixes, one change and a bunch of contributors
-
- Mar 08, 2013
-
-
Daniel Stenberg authored
-
- Mar 07, 2013
-
-
Daniel Stenberg authored
-
Steve Holme authored
With all the recent imap changes it wasn't clear what new features and fixes should be included in the release notes.
-
Nick Zitzmann authored
-
- Mar 06, 2013
-
-
Kamil Dudka authored
The option needs to be set on the SSL socket. Setting it on the model takes no effect. Note that the non-blocking mode is still not enabled for the handshake because the code is not yet ready for that.
-
- Feb 16, 2013
-
-
Daniel Stenberg authored
-
- Feb 10, 2013
-
-
Steve Holme authored
-
Steve Holme authored
-
- Feb 07, 2013
-
-
Steve Holme authored
-
- Feb 06, 2013
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Feb 05, 2013
-
-
Daniel Stenberg authored
8 more bug fixes mentioned
-
Steve Holme authored
Added recent additions and fixes following the changes to imap, pop3 and smtp. Additionally added another contributor that helped to test the imap sasl changes.
-
- Jan 28, 2013
-
-
Daniel Stenberg authored
Even though he's a fine dude, once is enough for this time!
-
- Jan 18, 2013
-
-
Daniel Stenberg authored
-
Steve Holme authored
Added missing imap fix as per commit 709b3506.
-
- Jan 17, 2013
-
-
Daniel Stenberg authored
-
- Jan 15, 2013
-
-
Kamil Dudka authored
Do not use the error messages from NSS for errors not occurring in NSS.
-
- Jan 11, 2013
-
-
Kamil Dudka authored
This commit fixes a regression introduced in 052a08ff. NSS caches certs/keys returned by the SSL_GetClientAuthDataHook callback and if we connect second time to the same server, the cached cert/key pair is used. If we use multiple client certificates for different paths on the same server, we need to clear the session cache to force NSS to call the hook again. The commit 052a08ff prevented the session cache from being cleared if a client certificate from file was used. The condition is now fixed to cover both cases: consssl->client_nickname is not NULL if a client certificate from the NSS database is used and connssl->obj_clicert is not NULL if a client certificate from file is used. Review by: Kai Engert
-
- Dec 27, 2012
-
-
Daniel Stenberg authored
-
- Dec 03, 2012
-
-
Kamil Dudka authored
Although it is not explicitly stated in the documentation, NSS uses *pRetCert and *pRetKey even if the client authentication hook returns a failure. Namely, if we destroy *pRetCert without clearing *pRetCert afterwards, NSS destroys the certificate once again, which causes a double free. Reported by: Bob Relyea
-
- Nov 20, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Nov 19, 2012
-
-
Anthony Bryan authored
-
Kamil Dudka authored
Bug: http://curl.haxx.se/mail/lib-2012-11/0095.html
-
- Nov 17, 2012
-
-
Daniel Stenberg authored
4 more bug fixes and 4 more contributors
-
- Nov 14, 2012
-
-
Daniel Stenberg authored
-
- Nov 13, 2012
-
-
Daniel Stenberg authored
-
- Nov 09, 2012
-
-
Kamil Dudka authored
Fixes bug #3578163: http://sourceforge.net/tracker/?func=detail&atid=100976&aid=3578163&group_id=976
-
- Nov 07, 2012
-
-
Daniel Stenberg authored
6 new bugfixes and 3 more contributors...
-
- Nov 06, 2012
-
-
Daniel Stenberg authored
-
- Oct 10, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
One bug, one contributor. Getting ready for release.
-
- Oct 02, 2012
-
-
Daniel Stenberg authored
9 new bug fixes, 5 changes, 6 more contributors
-
- Sep 12, 2012
-
-
Kamil Dudka authored
The MD5 fingerprint cannot be computed when running in FIPS mode.
-
- Sep 09, 2012
-
-
Daniel Stenberg authored
6 bug fixes to mention, 5 contributors
-
- Sep 03, 2012
-
-
Daniel Stenberg authored
-
- Aug 09, 2012
-
-
Kamil Dudka authored
-