#
742196bd |
| 13-May-2024 |
Daniel Stenberg |
vauth: make two functions void that always just returned OK Removes the need to check return values when they can never fail. Pointed out by CodeSonar Closes #13621
|
#
e92edfbe |
| 20-Jul-2023 |
Wyatt O'Day |
lib: add ability to disable auths individually Both with configure and cmake Closes #11490
|
#
127eb0d8 |
| 21-May-2023 |
Daniel Stenberg |
misc: fix spelling mistakes Reported-by: musvaage on github Fixes #11171 Closes #11172
|
#
2bc1d775 |
| 02-Jan-2023 |
Daniel Stenberg |
copyright: update all copyright lines and remove year ranges - they are mostly pointless in all major jurisdictions - many big corporations and projects already don't use them - save
copyright: update all copyright lines and remove year ranges - they are mostly pointless in all major jurisdictions - many big corporations and projects already don't use them - saves us from pointless churn - git keeps history for us - the year range is kept in COPYING checksrc is updated to allow non-year using copyright statements Closes #10205
show more ...
|
#
4484270a |
| 26-Oct-2022 |
Ayesh Karunaratne |
misc: typo and grammar fixes - Replace `Github` with `GitHub`. - Replace `windows` with `Windows` - Replace `advice` with `advise` where a verb is used. - A few fixes on removing
misc: typo and grammar fixes - Replace `Github` with `GitHub`. - Replace `windows` with `Windows` - Replace `advice` with `advise` where a verb is used. - A few fixes on removing repeated words. - Replace `a HTTP` with `an HTTP` Closes #9802
show more ...
|
#
72652c06 |
| 26-Sep-2022 |
Patrick Monnerat |
http, vauth: always provide Curl_allow_auth_to_host() functionality This function is currently located in the lib/http.c module and is therefore disabled by the CURL_DISABLE_HTTP conditi
http, vauth: always provide Curl_allow_auth_to_host() functionality This function is currently located in the lib/http.c module and is therefore disabled by the CURL_DISABLE_HTTP conditional token. As it may be called by TLS backends, disabling HTTP results in an undefined reference error at link time. Move this function to vauth/vauth.c to always provide it and rename it as Curl_auth_allowed_to_host() to respect the vauth module naming convention. Closes #9600
show more ...
|
#
c9061f24 |
| 31-Aug-2022 |
Viktor Szakats |
misc: spelling fixes Found using codespell 2.2.1. Also delete the redundant protocol designator from an archive.org URL. Reviewed-by: Daniel Stenberg Closes #9403
|
#
ad9bc597 |
| 17-May-2022 |
max.mehl |
copyright: make repository REUSE compliant Add licensing and copyright information for all files in this repository. This either happens in the file itself as a comment header or in the
copyright: make repository REUSE compliant Add licensing and copyright information for all files in this repository. This either happens in the file itself as a comment header or in the file `.reuse/dep5`. This commit also adds a Github workflow to check pull requests and adapts copyright.pl to the changes. Closes #8869
show more ...
|
#
26101421 |
| 03-Feb-2022 |
Daniel Stenberg |
lib: remove support for CURL_DOES_CONVERSIONS TPF was the only user and support for that was dropped. Closes #8378
|
#
396a2d7f |
| 16-Aug-2021 |
Patrick Monnerat |
auth: use sasl authzid option in kerberos ... instead of deriving it from active ticket. Closes #7008
|
Revision tags: curl-7_76_1, curl-7_76_0 |
|
#
19ea52da |
| 17-Mar-2021 |
Patrick Monnerat |
vauth: factor base64 conversions out of authentication procedures Input challenges and returned messages are now in binary. Conversions from/to base64 are performed by callers (currently
vauth: factor base64 conversions out of authentication procedures Input challenges and returned messages are now in binary. Conversions from/to base64 are performed by callers (currently curl_sasl.c and http_ntlm.c). Closes #6654
show more ...
|
#
85e69756 |
| 27-Mar-2021 |
Daniel Stenberg |
copyright: update copyright year ranges to 2021 Reviewed-by: Emil Engler Closes #6802
|
Revision tags: curl-7_75_0 |
|
#
3eebbfe8 |
| 24-Dec-2020 |
Simon Josefsson |
sasl: support SCRAM-SHA-1 and SCRAM-SHA-256 via libgsasl Closes #6372
|
Revision tags: curl-7_74_0 |
|
#
ac0a88fd |
| 05-Nov-2020 |
Daniel Stenberg |
copyright: fix year ranges Follow-up from 4d2f8006777
|
#
4d2f8006 |
| 04-Nov-2020 |
Daniel Stenberg |
curl.se: new home Closes #6172
|
Revision tags: curl-7_73_0, tiny-curl-7_72_0, curl-7_72_0, curl-7_71_1, curl-7_71_0, curl-7_70_0, curl-7_69_1, curl-7_69_0, curl-7_68_0, curl-7_67_0 |
|
#
89d972f2 |
| 23-Sep-2019 |
Daniel Stenberg |
vauth: The parameter 'status' must be surrounded by parentheses PVS-Studio warning Fixes #4402
|
Revision tags: curl-7_66_0, curl-7_65_3, curl-7_65_2, curl-7_65_1, curl-7_65_0 |
|
#
52dfab65 |
| 11-May-2019 |
Steve Holme |
auth: Rename the various authentication clean up functions For consistency and to a avoid confusion. Closes #3869
|
#
762a292f |
| 10-Apr-2019 |
Steve Holme |
vauth/cleartext: Update the PLAIN login function signature to match RFC 4616 Functionally this doesn't change anything as we still use the username for both the authorisation identity an
vauth/cleartext: Update the PLAIN login function signature to match RFC 4616 Functionally this doesn't change anything as we still use the username for both the authorisation identity and the authentication identity. Closes #3757
show more ...
|
Revision tags: curl-7_64_1, curl-7_64_0 |
|
#
6227e2bd |
| 16-Dec-2018 |
Mert Yazıcıoğlu |
vauth/oauth2: Fix OAUTHBEARER token generation OAUTHBEARER tokens were incorrectly generated in a format similar to XOAUTH2 tokens. These changes make OAUTHBEARER tokens conform to the
vauth/oauth2: Fix OAUTHBEARER token generation OAUTHBEARER tokens were incorrectly generated in a format similar to XOAUTH2 tokens. These changes make OAUTHBEARER tokens conform to the RFC7628. Fixes: #2487 Reported-by: Paolo Mossino Closes https://github.com/curl/curl/pull/3377
show more ...
|
Revision tags: curl-7_63_0, curl-7_62_0, curl-7_61_1, curl-7_61_0, curl-7_60_0, curl-7_59_0, curl-7_58_0, curl-7_57_0, curl-7_56_1, curl-7_56_0, curl-7_55_1, curl-7_55_0 |
|
#
bc4b8c97 |
| 08-Jul-2017 |
toughengineer |
ntlm_sspi: fix authentication using Credential Manager If you pass empty user/pass asking curl to use Windows Credential Storage (as stated in the docs) and it has valid credentials for
ntlm_sspi: fix authentication using Credential Manager If you pass empty user/pass asking curl to use Windows Credential Storage (as stated in the docs) and it has valid credentials for the domain, e.g. curl -v -u : --ntlm example.com currently authentication fails. This change fixes it by providing proper SPN string to the SSPI API calls. Fixes https://github.com/curl/curl/issues/1622 Closes https://github.com/curl/curl/pull/1660
show more ...
|
#
6869d65f |
| 02-Sep-2017 |
Patrick Monnerat |
Curl_base64_encode: always call with a real data handle. Some calls in different modules were setting the data handle to NULL, causing segmentation faults when using builds that enable c
Curl_base64_encode: always call with a real data handle. Some calls in different modules were setting the data handle to NULL, causing segmentation faults when using builds that enable character code conversions.
show more ...
|
Revision tags: curl-7_54_1, curl-7_54_0, curl-7_53_1, curl-7_53_0, curl-7_52_1, curl-7_52_0, curl-7_51_0, curl-7_50_3, curl-7_50_2 |
|
#
a78c61a4 |
| 21-Aug-2016 |
Steve Holme |
sasl: Don't use GSSAPI authentication when domain name not specified Only choose the GSSAPI authentication mechanism when the user name contains a Windows domain name or the user is a va
sasl: Don't use GSSAPI authentication when domain name not specified Only choose the GSSAPI authentication mechanism when the user name contains a Windows domain name or the user is a valid UPN. Fixes #718
show more ...
|
Revision tags: curl-7_50_1, curl-7_50_0, curl-7_49_1, curl-7_49_0, curl-7_48_0 |
|
#
a0f21294 |
| 20-Mar-2016 |
Steve Holme |
vauth: Introduced Curl_auth_is_<mechansism>_supported() functions As Windows SSPI authentication calls fail when a particular mechanism isn't available, introduced these functions for DI
vauth: Introduced Curl_auth_is_<mechansism>_supported() functions As Windows SSPI authentication calls fail when a particular mechanism isn't available, introduced these functions for DIGEST, NTLM, Kerberos 5 and Negotiate to allow both HTTP and SASL authentication the opportunity to query support for a supported mechanism before selecting it. For now each function returns TRUE to maintain compatability with the existing code when called.
show more ...
|
#
3fc84591 |
| 22-Jul-2016 |
Steve Holme |
vauth.h: No need to query HAVE_GSSAPI || USE_WINDOWS_SSPI for SPNEGO As SPNEGO is only defined when these pre-processor variables are defined there is no need to query them explicitly.
|
#
25bf71ab |
| 22-Jul-2016 |
Steve Holme |
spnego: Corrected miss-placed * in Curl_auth_spnego_cleanup() declaration Typo introduced in commit ad5e9bfd5d.
|