History log of /curl/lib/curl_sasl.c (Results 51 – 75 of 178)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
Revision tags: curl-7_50_1, curl-7_50_0, curl-7_49_1, curl-7_49_0, curl-7_48_0
# 00417fd6 20-Mar-2016 Steve Holme

sasl: Added calls to Curl_auth_is_<mechansism>_supported()

Hooked up the SASL authentication layer to query the new 'is mechanism
supported' functions when deciding what mechanism to use

sasl: Added calls to Curl_auth_is_<mechansism>_supported()

Hooked up the SASL authentication layer to query the new 'is mechanism
supported' functions when deciding what mechanism to use.

For now existing functionality is maintained.

show more ...


# 434f8d03 21-Jun-2016 Daniel Stenberg

internals: rename the SessionHandle struct to Curl_easy


# 4f45240b 29-Apr-2016 Daniel Stenberg

lib: include curl_printf.h as one of the last headers

curl_printf.h defines printf to curl_mprintf, etc. This can cause
problems with external headers which may use
__attribute__((fo

lib: include curl_printf.h as one of the last headers

curl_printf.h defines printf to curl_mprintf, etc. This can cause
problems with external headers which may use
__attribute__((format(printf, ...))) markers etc.

To avoid that they cause problems with system includes, we include
curl_printf.h after any system headers. That makes the three last
headers to always be, and we keep them in this order:

curl_printf.h
curl_memory.h
memdebug.h

None of them include system headers, they all do funny #defines.

Reported-by: David Benjamin

Fixes #743

show more ...


# f044cbe6 09-Apr-2016 Steve Holme

sasl: Fixed compilation errors from commit 9d89a0387

...when GSS-API or Windows SSPI are not used.


# 9d89a038 08-Apr-2016 Steve Holme

ftp/imap/pop3/smtp: Allow the service name to be overridden

Allow the service name to be overridden for DIGIST-MD5 and Kerberos 5
authentication in FTP, IMAP, POP3 and SMTP.


# e655ae0c 03-Apr-2016 Steve Holme

curl_sasl: Fixed potential null pointer utilisation

Although this should never happen due to the relationship between the
'mech' and 'resp' variables, and the way they are allocated toge

curl_sasl: Fixed potential null pointer utilisation

Although this should never happen due to the relationship between the
'mech' and 'resp' variables, and the way they are allocated together,
it does cause problems for code analysis tools:

V595 The 'mech' pointer was utilized before it was verified against
nullptr. Check lines: 376, 381. curl_sasl.c 376

Bug: https://github.com/curl/curl/issues/745
Reported-by: Alexis La Goutte

show more ...


# ced0cbb5 02-Apr-2016 Steve Holme

krb5: Moved host from Curl_auth_create_gssapi_user_message() to be argument

For consistency with the spnego and oauth2 code moved the setting of
the host name outside of the Curl_auth_cr

krb5: Moved host from Curl_auth_create_gssapi_user_message() to be argument

For consistency with the spnego and oauth2 code moved the setting of
the host name outside of the Curl_auth_create_gssapi_user_messag()
function.

This will allow us to more easily override it in the future.

show more ...


# 58a7bc96 13-Mar-2016 Steve Holme

vauth: Refactored function names after move to new vauth directory

Renamed all the SASL functions that moved to the new vauth directory to
include the correct module name.


Revision tags: curl-7_47_1, curl-7_47_0, curl-7_46_0, curl-7_45_0
# 70e56939 12-Sep-2015 Steve Holme

vauth: Moved the OAuth 2.0 authentication code to the new vauth directory


# 6012fa5a 12-Sep-2015 Steve Holme

vauth: Moved the NTLM authentication code to the new vauth directory


# 51358a3f 12-Sep-2015 Steve Holme

vauth: Moved the DIGEST authentication code to the new vauth directory


# ec5b8dc6 12-Sep-2015 Steve Holme

vauth: Moved the CRAM-MD5 authentication code to the new vauth directory


# 6101e358 12-Sep-2015 Steve Holme

vauth: Moved the ClearText authentication code to the new vauth directory


# 685fee38 12-Sep-2015 Steve Holme

vauth: Moved Curl_sasl_build_spn() to create the initial vauth source files


# c142e731 19-Mar-2016 Steve Holme

ftp/imap/pop3/smtp: Fixed compilation warning when /Wall enabled

warning C4706: assignment within conditional expression


# 3c6238b3 14-Mar-2016 Daniel Stenberg

curl_sasl.c: minor code indent fixes


# e4a0a9ef 12-Mar-2016 Steve Holme

digest: Use boolean based success code for Curl_sasl_digest_get_pair()

Rather than use a 0 and 1 integer base result code use a TRUE / FALSE
based success code.


# a7a653fd 12-Mar-2016 Steve Holme

digest: Corrected some typos in comments


# dbb90e7e 12-Mar-2016 Steve Holme

ntlm: Corrected some typos in function descriptions


# 3fa220a6 19-Feb-2016 Emil Lerner

curl_sasl: Fix memory leak in digest parser

If any parameter in a HTTP DIGEST challenge message is present multiple
times, memory allocated for all but the last entry should be freed.

curl_sasl: Fix memory leak in digest parser

If any parameter in a HTTP DIGEST challenge message is present multiple
times, memory allocated for all but the last entry should be freed.

Bug: https://github.com/curl/curl/pull/667

show more ...


# 4af40b36 02-Feb-2016 Daniel Stenberg

URLs: change all http:// URLs to https://


# 88f585c3 15-Nov-2015 Daniel Stenberg

sasl; fix checksrc warnings


# ee04bee8 05-Sep-2015 Steve Holme

oauth2: Support OAUTHBEARER failures sent as continuation responses

According to RFC7628 a failure message may be sent by the server in a
base64 encoded JSON string as a continuation res

oauth2: Support OAUTHBEARER failures sent as continuation responses

According to RFC7628 a failure message may be sent by the server in a
base64 encoded JSON string as a continuation response.

Currently only implemented for OAUTHBEARER and not XAUTH2.

show more ...


# febda2f3 05-Sep-2015 Steve Holme

oauth2: Added support for OAUTHBEARER SASL mechanism to IMAP, POP3 and SNMP

OAUTHBEARER is now the official "registered" SASL mechanism name for
OAuth 2.0. However, we don't want to drop

oauth2: Added support for OAUTHBEARER SASL mechanism to IMAP, POP3 and SNMP

OAUTHBEARER is now the official "registered" SASL mechanism name for
OAuth 2.0. However, we don't want to drop support for XOAUTH2 as some
servers won't support the new mechanism yet.

show more ...


# 1f82df91 12-Nov-2015 Steve Holme

sasl: Re-introduced XOAUTH2 in the default enabled authentication mechanism

Following the fix in commit d6d58dd558 it is necessary to re-introduce
XOAUTH2 in the default enabled authenti

sasl: Re-introduced XOAUTH2 in the default enabled authentication mechanism

Following the fix in commit d6d58dd558 it is necessary to re-introduce
XOAUTH2 in the default enabled authentication mechanism, which was
removed in commit 7b2012f262, otherwise users will have to specify
AUTH=XOAUTH2 in the URL.

Note: OAuth 2.0 will only be used when the bearer is specified.

show more ...


12345678