Skip to content
  1. Oct 27, 2013
    • Steve Holme's avatar
      email: Added initial support for cancelling authentication · 7de4cc35
      Steve Holme authored
      Should a client application fail to decode an authentication message
      received from a server, or not support any of the parameters given by
      the server in the message, then the authentication phrase should be
      cancelled gracefully by the client rather than simply terminating the
      connection.
      
      The authentication phrase should be cancelled by simply sending a '*'
      to the server, in response to erroneous data being received, as per
      RFC-3501, RFC-4954 and RFC-5034.
      
      This patch adds the necessary state machine constants and appropriate
      response handlers in order to add this functionality for the CRAM-MD5,
      DIGEST-MD5 and NTLM authentication mechanisms.
      7de4cc35
    • Steve Holme's avatar
      email: Moved authentication message parsing into a separate function · aa0eaef4
      Steve Holme authored
      ...in preparation for upcoming modifications.
      aa0eaef4
  2. Oct 26, 2013
  3. Oct 25, 2013
  4. Oct 23, 2013
  5. Oct 21, 2013
  6. Oct 18, 2013
  7. Oct 17, 2013
  8. Oct 16, 2013
  9. Oct 15, 2013
    • Steve Holme's avatar
      SSL: Corrected typo from commit 87861c9b · e7452415
      Steve Holme authored
      e7452415
    • Steve Holme's avatar
      SSL: Fixed OpenSSL builds prior to v1.0.1 · 87861c9b
      Steve Holme authored
      Commit ad34a2d5 relies on definitions that are only present in
      OpenSSL v1.0.1 and up. This quick fix allows the builds that use
      older versions of OpenSSL to continue building.
      87861c9b
    • Paul Donohue's avatar
    • Tyler Hall's avatar
      ssh: Handle successful SSH_USERAUTH_NONE · 0218a737
      Tyler Hall authored
      
      
      According to the documentation for libssh2_userauth_list(), a NULL
      return value is not necessarily an error. You must call
      libssh2_userauth_authenticated() to determine if the SSH_USERAUTH_NONE
      request was successful.
      
      This fixes a segv when using sftp on a server that allows logins with an
      empty password. When NULL was interpreted as an error, it would
      free the session but not flag an error since the libssh2 errno would be
      clear. This resulted in dereferencing a NULL session pointer.
      
      Signed-off-by: default avatarTyler Hall <tylerwhall@gmail.com>
      0218a737
    • Gergely Nagy's avatar
      SSL: protocol version can be specified more precisely · ad34a2d5
      Gergely Nagy authored
      CURL_SSLVERSION_TLSv1_0, CURL_SSLVERSION_TLSv1_1,
      CURL_SSLVERSION_TLSv1_2 enum values are added to force exact TLS version
      (CURL_SSLVERSION_TLSv1 means TLS 1.x).
      
      axTLS:
      axTLS only supports TLS 1.0 and 1.1 but it cannot be set that only one
      of these should be used, so we don't allow the new enum values.
      
      darwinssl:
      Added support for the new enum values.
      
      SChannel:
      Added support for the new enum values.
      
      CyaSSL:
      Added support for the new enum values.
      Bug: The original CURL_SSLVERSION_TLSv1 value enables only TLS 1.0 (it
      did the same before this commit), because CyaSSL cannot be configured to
      use TLS 1.0-1.2.
      
      GSKit:
      GSKit doesn't seem to support TLS 1.1 and TLS 1.2, so we do not allow
      those values.
      Bugfix: There was a typo that caused wrong SSL versions to be passed to
      GSKit.
      
      NSS:
      TLS minor version cannot be set, so we don't allow the new enum values.
      
      QsoSSL:
      TLS minor version cannot be set, so we don't allow the new enum values.
      
      OpenSSL:
      Added support for the new enum values.
      Bugfix: The original CURL_SSLVERSION_TLSv1 value enabled only TLS 1.0,
      now it enables 1.0-1.2.
      
      Command-line tool:
      Added command line options for the new values.
      ad34a2d5
  10. Oct 14, 2013
  11. Oct 13, 2013
  12. Oct 12, 2013
  13. Oct 09, 2013
  14. Oct 07, 2013
  15. Oct 03, 2013
  16. Oct 02, 2013
  17. Sep 28, 2013
  18. Sep 25, 2013
  19. Sep 24, 2013
  20. Sep 21, 2013
  21. Sep 20, 2013
    • Steve Holme's avatar
      pop3: Added basic SASL XOAUTH2 support · 18db7438
      Steve Holme authored
      Added the ability to use an XOAUTH2 bearer token [RFC6750] with POP3 for
      authentication using RFC6749 "OAuth 2.0 Authorization Framework".
      
      The bearer token is expected to be valid for the user specified in
      conn->user. If CURLOPT_XOAUTH2_BEARER is defined and the connection has
      an advertised auth mechanism of "XOAUTH2", the user and access token are
      formatted as a base64 encoded string and sent to the server as
      "AUTH XOAUTH2 <bearer token>".
      18db7438
  22. Sep 19, 2013
    • Nick Zitzmann's avatar
      darwinssl: enable BEAST workaround on iOS 7 & later · 6f78aaad
      Nick Zitzmann authored
      iOS 7 finally added the option to enable 1/n-1 when using TLS 1.0
      and a CBC cipher, so we now always turn that on unless the user
      manually turns it off using CURLSSLOPT_ALLOW_BEAST.
      
      It appears Apple also added some new PSK ciphers, but no interface to
      use them yet, so we at least support printing them if we find them.
      6f78aaad
  23. Sep 17, 2013