Skip to content
  1. Nov 24, 2016
    • Daniel Stenberg's avatar
    • Daniel Stenberg's avatar
    • Daniel Stenberg's avatar
    • Daniel Stenberg's avatar
      checksrc: verify ASTERISKNOSPACE · ec0a5c96
      Daniel Stenberg authored
      Detects (char*) and 'char*foo' uses.
      ec0a5c96
    • Daniel Stenberg's avatar
      dbadaebf
    • Daniel Stenberg's avatar
      checksrc: add ASTERISKSPACE · bc7e0847
      Daniel Stenberg authored
      Verifies a 'char *name' style, with no space after the asterisk.
      bc7e0847
    • Daniel Stenberg's avatar
      openssl: remove dead code · 74ffa040
      Daniel Stenberg authored
      Coverity CID 1394666
      74ffa040
    • Okhin Vasilij's avatar
      HTTPS-proxy: fixed mbedtls and polishing · c6da05a5
      Okhin Vasilij authored
      c6da05a5
    • Daniel Stenberg's avatar
      darwinssl: adopted to the HTTPS proxy changes · 49765cd7
      Daniel Stenberg authored
      It builds and runs all test cases. No adaptations for actual HTTPS proxy
      support has been made.
      49765cd7
    • Daniel Stenberg's avatar
      gtls: fix indent to silence compiler warning · 8b435265
      Daniel Stenberg authored
      vtls/gtls.c: In function ‘Curl_gtls_data_pending’:
      vtls/gtls.c:1429:3: error: this ‘if’ clause does not guard... [-Werror=misleading-indentation]
         if(conn->proxy_ssl[connindex].session &&
            ^~
            vtls/gtls.c:1433:5: note: ...this statement, but the latter is misleadingly indented as if it is guarded by the ‘if’
                 return res;
      8b435265
    • Thomas Glanzmann's avatar
      mbedtls: Fix compile errors · 8cb872df
      Thomas Glanzmann authored
      8cb872df
    • Alex Rousskov's avatar
      proxy: Support HTTPS proxy and SOCKS+HTTP(s) · cb4e2be7
      Alex Rousskov authored
      * HTTPS proxies:
      
      An HTTPS proxy receives all transactions over an SSL/TLS connection.
      Once a secure connection with the proxy is established, the user agent
      uses the proxy as usual, including sending CONNECT requests to instruct
      the proxy to establish a [usually secure] TCP tunnel with an origin
      server. HTTPS proxies protect nearly all aspects of user-proxy
      communications as opposed to HTTP proxies that receive all requests
      (including CONNECT requests) in vulnerable clear text.
      
      With HTTPS proxies, it is possible to have two concurrent _nested_
      SSL/TLS sessions: the "outer" one between the user agent and the proxy
      and the "inner" one between the user agent and the origin server
      (through the proxy). This change adds supports for such nested sessions
      as well.
      
      A secure connection with a proxy requires its own set of the usual SSL
      options (their actual descriptions differ and need polishing, see TODO):
      
        --proxy-cacert FILE        CA certificate to verify peer against
        --proxy-capath DIR         CA directory to verify peer against
        --proxy-cert CERT[:PASSWD] Client certificate file and password
        --proxy-cert-type TYPE     Certificate file type (DER/PEM/ENG)
        --proxy-ciphers LIST       SSL ciphers to use
        --proxy-crlfile FILE       Get a CRL list in PEM format from the file
        --proxy-insecure           Allow connections to proxies with bad certs
        --proxy-key KEY            Private key file name
        --proxy-key-type TYPE      Private key file type (DER/PEM/ENG)
        --proxy-pass PASS          Pass phrase for the private key
        --proxy-ssl-allow-beast    Allow security flaw to improve interop
        --proxy-sslv2              Use SSLv2
        --proxy-sslv3              Use SSLv3
        --proxy-tlsv1              Use TLSv1
        --proxy-tlsuser USER       TLS username
        --proxy-tlspassword STRING TLS password
        --proxy-tlsauthtype STRING TLS authentication type (default SRP)
      
      All --proxy-foo options are independent from their --foo counterparts,
      except --proxy-crlfile which defaults to --crlfile and --proxy-capath
      which defaults to --capath.
      
      Curl now also supports %{proxy_ssl_verify_result} --write-out variable,
      similar to the existing %{ssl_verify_result} variable.
      
      Supported backends: OpenSSL, GnuTLS, and NSS.
      
      * A SOCKS proxy + HTTP/HTTPS proxy combination:
      
      If both --socks* and --proxy options are given, Curl first connects to
      the SOCKS proxy and then connects (through SOCKS) to the HTTP or HTTPS
      proxy.
      
      TODO: Update documentation for the new APIs and --proxy-* options.
      Look for "Added in 7.XXX" marks.
      cb4e2be7
    • Patrick Monnerat's avatar
      Declare endian read functions argument as a const pointer. · 8034d8fc
      Patrick Monnerat authored
      This is done for all functions of the form Curl_read[136][624]_[lb]e.
      8034d8fc
    • Patrick Monnerat's avatar
  2. Nov 22, 2016
  3. Nov 21, 2016
  4. Nov 19, 2016
  5. Nov 18, 2016
    • Marcel Raad's avatar
      lib: fix compiler warnings after de4de4e3 · 21aa32d3
      Marcel Raad authored
      Visual C++ now complains about implicitly casting time_t (64-bit) to
      long (32-bit). Fix this by changing some variables from long to time_t,
      or explicitly casting to long where the public interface would be
      affected.
      
      Closes #1131
      21aa32d3
  6. Nov 17, 2016
  7. Nov 16, 2016
  8. Nov 15, 2016
  9. Nov 14, 2016
  10. Nov 13, 2016