Skip to content
Snippets Groups Projects
  1. Feb 19, 2007
  2. Feb 16, 2007
  3. Feb 05, 2007
    • Daniel Stenberg's avatar
      - Michael Wallner provided a patch that adds support for CURLOPT_TIMEOUT_MS · 91386937
      Daniel Stenberg authored
        and CURLOPT_CONNECTTIMEOUT_MS that, as their names should hint, do the
        timeouts with millisecond resolution instead. The only restriction to that
        is the alarm() (sometimes) used to abort name resolves as that uses full
        seconds. I fixed the FTP response timeout part of the patch.
      
        Internally we now count and keep the timeouts in milliseconds but it also
        means we multiply set timeouts with 1000. The effect of this is that no
        timeout can be set to more than 2^31 milliseconds (on 32 bit systems), which
        equals 24.86 days.  We probably couldn't before either since the code did
        *1000 on the timeout values on several places already.
      91386937
  4. Jan 05, 2007
  5. Dec 16, 2006
  6. Nov 11, 2006
  7. Oct 21, 2006
  8. Aug 16, 2006
  9. May 05, 2006
  10. May 04, 2006
    • Daniel Stenberg's avatar
      Mark Eichin submitted bug report #1480821 · 758f6eed
      Daniel Stenberg authored
      (http://curl.haxx.se/bug/view.cgi?id=1480821) He found and identified a
      problem with how libcurl dealt with GnuTLS and a case where gnutls returned
      GNUTLS_E_AGAIN indicating it would block. It would then return an unexpected
      return code, making Curl_ssl_send() confuse the upper layer - causing random
      28 bytes trash data to get inserted in the transfered stream.
      
      The proper fix was to make the Curl_gtls_send() function return the proper
      return codes that the callers would expect. The Curl_ossl_send() function
      already did this.
      758f6eed
  11. Nov 13, 2005
  12. Nov 11, 2005
  13. Oct 22, 2005
    • Daniel Stenberg's avatar
      Dima Barsky reported a problem with GnuTLS-enabled libcurl in bug report · c890149c
      Daniel Stenberg authored
        #1334338 (http://curl.haxx.se/bug/view.cgi?id=1334338). When reading an SSL
        stream from a server and the server requests a "rehandshake", the current
        code simply returns this as an error. I have no good way to test this, but
        I've added a crude attempt of dealing with this situation slightly better -
        it makes a blocking handshake if this happens. Done like this because fixing
        this the "proper" way (that would handshake asynchronously) will require
        quite some work and I really need a good way to test this to do such a
        change.
      c890149c
  14. Aug 24, 2005
  15. Apr 22, 2005
  16. Apr 13, 2005
  17. Apr 09, 2005
  18. Apr 07, 2005
    • Daniel Stenberg's avatar
      Unfortunately, if a ca file name is set the function fails for whatever reason · b9f1d439
      Daniel Stenberg authored
      (missing file, bad file, etc), gnutls will no longer handshake properly but it
      just loops forever. Therefore, we must return error if we get an error when
      setting the CA cert file name. This is not the same behaviour as with OpenSSL.
      
      Question/report posted to the help-gnutls mailing list, April 8 2005.
      b9f1d439
    • Daniel Stenberg's avatar
      GnuTLS support added. There's now a "generic" SSL layer that we use all over · 6e619393
      Daniel Stenberg authored
      internally, with code provided by sslgen.c. All SSL-layer-specific code is
      then written in ssluse.c (for OpenSSL) and gtls.c (for GnuTLS).
      
      As far as possible, internals should not need to know what SSL layer that is
      in use. Building with GnuTLS currently makes two test cases fail.
      
      TODO.gnutls contains a few known outstanding issues for the GnuTLS support.
      
      GnuTLS support is enabled with configure --with-gnutls
      6e619393
Loading