Skip to content
  1. Mar 19, 2014
    • Gaël PORTAY's avatar
      polarssl: fix possible handshake timeout issue in multi. · 47f8e99e
      Gaël PORTAY authored
      Because of the socket is unblocking, PolarSSL does need call to getsock to
      get the action to perform in multi environment.
      
      In some cases, it might happen we have not received yet all data to perform
      the handshake. ssh_handshake returns POLARSSL_ERR_NET_WANT_READ, the state
      is updated but because of the getsock has not the proper #define macro to,
      the library never prevents to select socket for input thus the socket will
      never be awaken when last data is available. Thus it leads to timeout.
      47f8e99e
  2. Mar 18, 2014
  3. Mar 17, 2014
  4. Mar 15, 2014
  5. Mar 14, 2014
  6. Mar 10, 2014
  7. Mar 09, 2014
  8. Mar 06, 2014
  9. Mar 05, 2014
    • Daniel Stenberg's avatar
      remote_port: allow connect to port 0 · 219a0fbe
      Daniel Stenberg authored
      Port number zero is perfectly allowed to connect to. I moved to storing
      the remote port number in an int so that -1 means undefined and 0-65535
      can be used for legitimate port numbers.
      219a0fbe
  10. Mar 03, 2014
  11. Mar 02, 2014
  12. Feb 28, 2014
  13. Feb 24, 2014
    • Marc Hoersken's avatar
      curl_schannel.c: Updated copyright years · e904b15f
      Marc Hoersken authored
      e904b15f
    • David Ryskalczyk's avatar
      winssl: Enable hostname verification of IP address using SAN or CN · 63fc8ee7
      David Ryskalczyk authored
      Original commit message was:
       Don't omit CN verification in SChannel when an IP address is used.
      
      Side-effect of this change:
       SChannel and CryptoAPI do not support the iPAddress subjectAltName
       according to RFC 2818. If present, SChannel will first compare the
       IP address to the dNSName subjectAltNames and then fallback to the
       most specific Common Name in the Subject field of the certificate.
      
       This means that after this change curl will not connect to SSL/TLS
       hosts as long as the IP address is not specified in the SAN or CN
       of the server certificate or the verifyhost option is disabled.
      63fc8ee7
  14. Feb 23, 2014
  15. Feb 22, 2014
  16. Feb 19, 2014
  17. Feb 18, 2014
  18. Feb 17, 2014
    • Tatsuhiro Tsujikawa's avatar
      http2: Support HTTP POST/PUT · 035b91a2
      Tatsuhiro Tsujikawa authored
      This patch enables HTTP POST/PUT in HTTP2.
      We disabled Expect header field and  chunked transfer encoding
      since HTTP2 forbids them.
      In HTTP1, Curl sends small upload data with request headers, but
      HTTP2 requires upload data must be in DATA frame separately.
      So we added some conditionals to achieve this.
      035b91a2
    • Daniel Stenberg's avatar
      multi: ignore sigpipe internally · 854aca54
      Daniel Stenberg authored
      When the multi API is used we must also ignore SIGPIPE signals when
      caused by things we do, like they can easily be generated by OpenSSL.
      854aca54
    • Dan Fandrich's avatar
      configure: Fix the --disable-crypto-auth option · 184c3e2d
      Dan Fandrich authored
      It now disables NTLM and GSS authentication methods, and produces
      compilable code when SSL is enabled.
      184c3e2d