- Aug 13, 2009
-
-
Daniel Stenberg authored
-
- Aug 12, 2009
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
mail posted to the http-state mailing list, from Adam Barth, and is said to be the set of date formats the Chrome browser code is tested against: http://www.ietf.org/mail-archive/web/http-state/current/msg00129.html libcurl parses most of them identically, but not all of them.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
sending of the TSIZE option. I don't like fixing bugs just hours before a release, but since it was broken and the patch fixes this for him I decided to get it in anyway.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
bugs we know about that will appear in the next release (too)
-
- Aug 11, 2009
-
-
Daniel Stenberg authored
each test, so that the test suite can now be used to actually test the verification of cert names etc. This made an error show up in the OpenSSL- specific code where it would attempt to match the CN field even if a subjectAltName exists that doesn't match. This is now fixed and verified in test 311.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
(http://curl.haxx.se/bug/view.cgi?id=2835196), fixing a few compiler warnings when mixing ints and bools.
-
Dan Fandrich authored
config.h issue hasn't been completely solved. This will save some effort for someone desperate to use curl on Android.
-
Patrick Monnerat authored
Fix OS400 makefile for tests to use the new Makefile.inc in libtest Update the OS400 wrappers and RPG binding according to the current CVS source state
-
Daniel Stenberg authored
now since we won't manage to get them done for 7.19.6.
-
Dan Fandrich authored
-
- Aug 09, 2009
-
-
Dan Fandrich authored
torture tests to fail.
-
- Aug 07, 2009
-
-
Guenter Knauf authored
fix cast for some systems which are broken due to absense of socklen_t, therefore now use curl_socklen_t.
-
- Aug 06, 2009
-
-
Guenter Knauf authored
-
Guenter Knauf authored
-
Guenter Knauf authored
POSIX.1-2001. Note that RFC 2553 defines a prototype where the last parameter cnt is of type size_t. Many systems follow RFC 2553. Glibc 2.0 and 2.1 have size_t, but 2.2 has socklen_t.
-
- Aug 04, 2009
-
-
Daniel Stenberg authored
-
- Aug 03, 2009
-
-
Daniel Stenberg authored
-
Gisle Vanem authored
-
Gisle Vanem authored
-
Daniel Stenberg authored
ares_cancel() is used, to be ARES_ECANCELLED instead of ARES_ETIMEOUT to better allow the callback to know what's happening.
-
Daniel Stenberg authored
yet another issue not yet sorted out
-
Daniel Stenberg authored
-
Daniel Stenberg authored
fails to get inited by other means. This fixes a case of when the c-ares init fails when internet access is fone.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
and the name length differ in those cases and thus leave the matching function unmodified from before, as the matching functions never have to bother with the zero bytes in legitimate cases. Peter Sylvester helped me realize that this fix is slightly better as it leaves more code unmodified and makes the detection a bit more obvious in the code.
-
- Aug 02, 2009
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Cantor. My previous attempt was half-baked and didn't cover the normal CN case.
-
Daniel Stenberg authored
-
- Aug 01, 2009
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
should introduce an option to disable SNI, but as we're in feature freeze now I've addressed the obvious bug here (pointed out by Peter Sylvester): we shouldn't try to enable SNI when SSLv2 or SSLv3 is explicitly selected. Code for OpenSSL and GnuTLS was fixed. NSS doesn't seem to have a particular option for SNI, or are we simply not using it?
-
Daniel Stenberg authored
(http://curl.haxx.se/bug/view.cgi?id=2829955) mentioning the recent SSL cert verification flaw found and exploited by Moxie Marlinspike. The presentation he did at Black Hat is available here: https://www.blackhat.com/html/bh-usa-09/bh-usa-09-archives.html#Marlinspike Apparently at least one CA allowed a subjectAltName or CN that contain a zero byte, and thus clients that assumed they would never have zero bytes were exploited to OK a certificate that didn't actually match the site. Like if the name in the cert was "example.com\0theatualsite.com", libcurl would happily verify that cert for example.com. libcurl now better use the length of the extracted name, not assuming it is zero terminated.
-
Daniel Stenberg authored
only in some OpenSSL installs - like on Windows) isn't thread-safe and we agreed that moving it to the global_init() function is a decent way to deal with this situation.
-
Daniel Stenberg authored
CURLOPT_NOPROXY to "*", or to a host that should not use a proxy, I actually could still end up using a proxy if a proxy environment variable was set.
-
Daniel Stenberg authored
-