- Feb 10, 2013
-
-
Steve Holme authored
-
Steve Holme authored
-
- Feb 07, 2013
-
-
Steve Holme authored
-
- Feb 06, 2013
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Feb 05, 2013
-
-
Daniel Stenberg authored
8 more bug fixes mentioned
-
Steve Holme authored
Added recent additions and fixes following the changes to imap, pop3 and smtp. Additionally added another contributor that helped to test the imap sasl changes.
-
- Jan 28, 2013
-
-
Daniel Stenberg authored
Even though he's a fine dude, once is enough for this time!
-
- Jan 18, 2013
-
-
Daniel Stenberg authored
-
Steve Holme authored
Added missing imap fix as per commit 709b3506.
-
- Jan 17, 2013
-
-
Daniel Stenberg authored
-
- Jan 15, 2013
-
-
Kamil Dudka authored
Do not use the error messages from NSS for errors not occurring in NSS.
-
- Jan 11, 2013
-
-
Kamil Dudka authored
This commit fixes a regression introduced in 052a08ff. NSS caches certs/keys returned by the SSL_GetClientAuthDataHook callback and if we connect second time to the same server, the cached cert/key pair is used. If we use multiple client certificates for different paths on the same server, we need to clear the session cache to force NSS to call the hook again. The commit 052a08ff prevented the session cache from being cleared if a client certificate from file was used. The condition is now fixed to cover both cases: consssl->client_nickname is not NULL if a client certificate from the NSS database is used and connssl->obj_clicert is not NULL if a client certificate from file is used. Review by: Kai Engert
-
- Dec 27, 2012
-
-
Daniel Stenberg authored
-
- Dec 03, 2012
-
-
Kamil Dudka authored
Although it is not explicitly stated in the documentation, NSS uses *pRetCert and *pRetKey even if the client authentication hook returns a failure. Namely, if we destroy *pRetCert without clearing *pRetCert afterwards, NSS destroys the certificate once again, which causes a double free. Reported by: Bob Relyea
-
- Nov 20, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Nov 19, 2012
-
-
Anthony Bryan authored
-
Kamil Dudka authored
Bug: http://curl.haxx.se/mail/lib-2012-11/0095.html
-
- Nov 17, 2012
-
-
Daniel Stenberg authored
4 more bug fixes and 4 more contributors
-
- Nov 14, 2012
-
-
Daniel Stenberg authored
-
- Nov 13, 2012
-
-
Daniel Stenberg authored
-
- Nov 09, 2012
-
-
Kamil Dudka authored
Fixes bug #3578163: http://sourceforge.net/tracker/?func=detail&atid=100976&aid=3578163&group_id=976
-
- Nov 07, 2012
-
-
Daniel Stenberg authored
6 new bugfixes and 3 more contributors...
-
- Nov 06, 2012
-
-
Daniel Stenberg authored
-
- Oct 10, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
One bug, one contributor. Getting ready for release.
-
- Oct 02, 2012
-
-
Daniel Stenberg authored
9 new bug fixes, 5 changes, 6 more contributors
-
- Sep 12, 2012
-
-
Kamil Dudka authored
The MD5 fingerprint cannot be computed when running in FIPS mode.
-
- Sep 09, 2012
-
-
Daniel Stenberg authored
6 bug fixes to mention, 5 contributors
-
- Sep 03, 2012
-
-
Daniel Stenberg authored
-
- Aug 09, 2012
-
-
Kamil Dudka authored
-
- Aug 08, 2012
-
-
Daniel Stenberg authored
5 more bug fixes, one change, 6 contributors
-
Daniel Stenberg authored
-
- Aug 07, 2012
-
-
Daniel Stenberg authored
-
- Jul 27, 2012
-
-
Daniel Stenberg authored
Let's call it 7.27.1 for now, but it it probably going to become 7.28.0 when released.
-
- Jul 26, 2012
-
-
Daniel Stenberg authored
The --silent bug came with 7561a0fc which was never in a release. Pointed out by Kamil Dudka
-
Daniel Stenberg authored
4 more bugfixes, 3 more contributors
-
- Jul 22, 2012
-
-
Kamil Dudka authored
Bug: https://bugzilla.redhat.com/676596
-
- Jul 20, 2012
-
-
Dan Fandrich authored
-