- Jan 17, 2013
-
-
Daniel Stenberg authored
-
- Jan 15, 2013
-
-
Kamil Dudka authored
Do not use the error messages from NSS for errors not occurring in NSS.
-
- Jan 11, 2013
-
-
Kamil Dudka authored
This commit fixes a regression introduced in 052a08ff. NSS caches certs/keys returned by the SSL_GetClientAuthDataHook callback and if we connect second time to the same server, the cached cert/key pair is used. If we use multiple client certificates for different paths on the same server, we need to clear the session cache to force NSS to call the hook again. The commit 052a08ff prevented the session cache from being cleared if a client certificate from file was used. The condition is now fixed to cover both cases: consssl->client_nickname is not NULL if a client certificate from the NSS database is used and connssl->obj_clicert is not NULL if a client certificate from file is used. Review by: Kai Engert
-
- Dec 27, 2012
-
-
Daniel Stenberg authored
-
- Dec 03, 2012
-
-
Kamil Dudka authored
Although it is not explicitly stated in the documentation, NSS uses *pRetCert and *pRetKey even if the client authentication hook returns a failure. Namely, if we destroy *pRetCert without clearing *pRetCert afterwards, NSS destroys the certificate once again, which causes a double free. Reported by: Bob Relyea
-
- Nov 20, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Nov 19, 2012
-
-
Anthony Bryan authored
-
Kamil Dudka authored
Bug: http://curl.haxx.se/mail/lib-2012-11/0095.html
-
- Nov 17, 2012
-
-
Daniel Stenberg authored
4 more bug fixes and 4 more contributors
-
- Nov 14, 2012
-
-
Daniel Stenberg authored
-
- Nov 13, 2012
-
-
Daniel Stenberg authored
-
- Nov 09, 2012
-
-
Kamil Dudka authored
Fixes bug #3578163: http://sourceforge.net/tracker/?func=detail&atid=100976&aid=3578163&group_id=976
-
- Nov 07, 2012
-
-
Daniel Stenberg authored
6 new bugfixes and 3 more contributors...
-
- Nov 06, 2012
-
-
Daniel Stenberg authored
-
- Oct 10, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
One bug, one contributor. Getting ready for release.
-
- Oct 02, 2012
-
-
Daniel Stenberg authored
9 new bug fixes, 5 changes, 6 more contributors
-
- Sep 12, 2012
-
-
Kamil Dudka authored
The MD5 fingerprint cannot be computed when running in FIPS mode.
-
- Sep 09, 2012
-
-
Daniel Stenberg authored
6 bug fixes to mention, 5 contributors
-
- Sep 03, 2012
-
-
Daniel Stenberg authored
-
- Aug 09, 2012
-
-
Kamil Dudka authored
-
- Aug 08, 2012
-
-
Daniel Stenberg authored
5 more bug fixes, one change, 6 contributors
-
Daniel Stenberg authored
-
- Aug 07, 2012
-
-
Daniel Stenberg authored
-
- Jul 27, 2012
-
-
Daniel Stenberg authored
Let's call it 7.27.1 for now, but it it probably going to become 7.28.0 when released.
-
- Jul 26, 2012
-
-
Daniel Stenberg authored
The --silent bug came with 7561a0fc which was never in a release. Pointed out by Kamil Dudka
-
Daniel Stenberg authored
4 more bugfixes, 3 more contributors
-
- Jul 22, 2012
-
-
Kamil Dudka authored
Bug: https://bugzilla.redhat.com/676596
-
- Jul 20, 2012
-
-
Dan Fandrich authored
-
- Jul 15, 2012
-
-
Daniel Stenberg authored
Fixed 6 bugs, added 3 contributors
-
- Jul 09, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Jul 07, 2012
-
-
Daniel Stenberg authored
-
- Jun 25, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Jun 13, 2012
-
-
Yang Tse authored
Version number is removed in order to make this info consistent with how we do it with other MS and Linux system libraries for which we don't provide this info. Identifier changed from 'WinSSPI' to 'schannel' given that this is the actual provider of the SSL/TLS support. libcurl can still be built with SSPI and without SCHANNEL support.
-
- Jun 11, 2012
-
-
Marc Hoersken authored
-
- Jun 09, 2012
-
-
Steve Holme authored
-
- Jun 08, 2012
-
-
Kamil Dudka authored
Bug: https://bugzilla.redhat.com/788526 Reported by: Enrico Scholz
-