#
676ac46f |
| 19-Feb-2015 |
Alessandro Ghedini |
gtls: fix build with HTTP2
|
#
5d5c78b4 |
| 17-Jan-2015 |
Steve Holme |
vtls: Removed unimplemented overrides of curlssl_close_all() Carrying on from commit 037cd0d991, removed the following unimplemented instances of curlssl_close_all(): Curl_axtls
vtls: Removed unimplemented overrides of curlssl_close_all() Carrying on from commit 037cd0d991, removed the following unimplemented instances of curlssl_close_all(): Curl_axtls_close_all() Curl_darwinssl_close_all() Curl_cyassl_close_all() Curl_gskit_close_all() Curl_gtls_close_all() Curl_nss_close_all() Curl_polarssl_close_all()
show more ...
|
#
a4065ebf |
| 16-Jan-2015 |
Daniel Stenberg |
copyright years: after OCSP stapling changes
|
Revision tags: curl-7_40_0, curl-7_39_0, curl-7_38_0, curl-7_37_1 |
|
#
f13669a3 |
| 16-Jun-2014 |
Alessandro Ghedini |
gtls: add support for the Certificate Status Request TLS extension Also known as "status_request" or OCSP stapling, defined in RFC6066 section 8. This requires GnuTLS 3.1.3 or highe
gtls: add support for the Certificate Status Request TLS extension Also known as "status_request" or OCSP stapling, defined in RFC6066 section 8. This requires GnuTLS 3.1.3 or higher to build, however it's recommended to use at least GnuTLS 3.3.11 since previous versions had a bug that caused the OCSP response verfication to fail even on valid responses.
show more ...
|
#
6cb7b0c0 |
| 25-Dec-2014 |
Steve Holme |
vtls: Use bool for Curl_ssl_getsessionid() return type The return type of this function is a boolean value, and even uses a bool internally, so use bool in the function declaration as we
vtls: Use bool for Curl_ssl_getsessionid() return type The return type of this function is a boolean value, and even uses a bool internally, so use bool in the function declaration as well as the variables that store the return value, to avoid any confusion.
show more ...
|
#
8830df8b |
| 24-Dec-2014 |
Steve Holme |
gtls: Use preferred 'CURLcode result'
|
#
680d5fd0 |
| 08-Dec-2014 |
Daniel Stenberg |
http2: avoid logging neg "failure" if h2 was not requested
|
#
9f5744a7 |
| 23-Oct-2014 |
Daniel Stenberg |
gnutls: removed dead code Bug: http://curl.haxx.se/bug/view.cgi?id=1437 Reported-by: Julien
|
#
9d64ab7d |
| 13-Oct-2014 |
Daniel Stenberg |
pinning: minor code style policing
|
#
357ff4d1 |
| 13-Oct-2014 |
Patrick Monnerat |
Factorize pinned public key code into generic file handling and backend specific
|
#
e644866c |
| 01-Oct-2014 |
moparisthebest |
GnuTLS: Implement public key pinning
|
#
4d4dd7ae |
| 03-Aug-2014 |
Dan Fandrich |
gtls: only define Curl_gtls_seed if Nettle is not being used
|
#
8dfd2208 |
| 03-Jun-2014 |
Daniel Stenberg |
vtls: make the random function mandatory in the TLS backend To force each backend implementation to really attempt to provide proper random. If a proper random function is missing, then
vtls: make the random function mandatory in the TLS backend To force each backend implementation to really attempt to provide proper random. If a proper random function is missing, then we can explicitly make use of the default one we use when TLS support is missing. This commit makes sure it works for darwinssl, gnutls, nss and openssl.
show more ...
|
#
f069b40f |
| 15-Jul-2014 |
Daniel Stenberg |
gnutls: fix compiler warning conversion to 'int' from 'long int' may alter its value
|
#
9087b7e8 |
| 14-Jul-2014 |
Dan Fandrich |
gnutls: detect lack of SRP support in GnuTLS at run-time and try without Reported-by: David Woodhouse
|
#
98866008 |
| 14-Jul-2014 |
David Woodhouse |
gnutls: handle IP address in cert name check Before GnuTLS 3.3.6, the gnutls_x509_crt_check_hostname() function didn't actually check IP addresses in SubjectAltName, even though it was
gnutls: handle IP address in cert name check Before GnuTLS 3.3.6, the gnutls_x509_crt_check_hostname() function didn't actually check IP addresses in SubjectAltName, even though it was explicitly documented as doing so. So do it ourselves...
show more ...
|
#
425459b8 |
| 12-Jul-2014 |
Dan Fandrich |
gnutls: improved error message if setting cipher list fails Reported-by: David Woodhouse
|
#
efc71583 |
| 11-Jul-2014 |
Dan Fandrich |
gnutls: fixed a couple of uninitialized variable references
|
#
3d2e1724 |
| 11-Jul-2014 |
Dan Fandrich |
gnutls: fixed compilation against versions < 2.12.0 The AES-GCM ciphers were added to GnuTLS as late as ver. 3.0.1 but the code path in which they're referenced here is only ever used fo
gnutls: fixed compilation against versions < 2.12.0 The AES-GCM ciphers were added to GnuTLS as late as ver. 3.0.1 but the code path in which they're referenced here is only ever used for somewhat older GnuTLS versions. This caused undeclared identifier errors when compiling against those.
show more ...
|
#
447c31ce |
| 11-Jul-2014 |
Dan Fandrich |
gnutls: explicitly added SRP to the priority string This seems to have become necessary for SRP support to work starting with GnuTLS ver. 2.99.0. Since support for SRP was added to GnuTL
gnutls: explicitly added SRP to the priority string This seems to have become necessary for SRP support to work starting with GnuTLS ver. 2.99.0. Since support for SRP was added to GnuTLS before the function that takes this priority string, there should be no issue with backward compatibility.
show more ...
|
#
baf8b57b |
| 11-Jul-2014 |
Dan Fandrich |
gnutls: ignore invalid certificate dates with VERIFYPEER disabled This makes the behaviour consistent with what happens if a date can be extracted from the certificate but is expired.
|
#
b99f8e8b |
| 27-May-2014 |
Daniel Stenberg |
gnutls: allow building with nghttp2 but without ALPN support It might not be the most useful combo, but...
|
Revision tags: curl-7_37_0 |
|
#
345bfab5 |
| 29-Apr-2014 |
Alessandro Ghedini |
gnutls: don't use deprecated type names anymore
|
#
386ed2d5 |
| 22-Apr-2014 |
Daniel Stenberg |
gtls: fix NULL pointer dereference gnutls_x509_crt_import() must not be called with a NULL certificate Bug: http://curl.haxx.se/mail/lib-2014-04/0145.html Reported-by: Damian Di
gtls: fix NULL pointer dereference gnutls_x509_crt_import() must not be called with a NULL certificate Bug: http://curl.haxx.se/mail/lib-2014-04/0145.html Reported-by: Damian Dixon
show more ...
|
#
ef813c70 |
| 31-Mar-2014 |
Daniel Stenberg |
http2: remove _DRAFT09 from the NPN_HTTP2 enum We're progressing throught drafts so there's no point in having a fixed one in a symbol that'll survive.
|