#
b1c7fc05 |
| 15-Feb-2015 |
Nick Zitzmann |
By request, change the name of "curl_darwinssl.[ch]" to "darwinssl.[ch]"
|
#
761d5166 |
| 07-Feb-2015 |
Steve Holme |
schannel: Removed curl_ prefix from source files Removed the curl_ prefix from the schannel source files as discussed with Marc and Daniel at FOSDEM.
|
#
8bb3443a |
| 17-Jan-2015 |
Steve Holme |
vtls: Separate the SSL backend definition from the API setup Slight code cleanup as the SSL backend #define is mixed up with the API function setup.
|
#
30ef1a07 |
| 17-Jan-2015 |
Steve Holme |
vtls: Fixed compilation errors when SSL not used Fixed the following warning and error from commit 3af90a6e19 when SSL is not being used: url.c:2004: warning C4013: 'Curl_ssl_ce
vtls: Fixed compilation errors when SSL not used Fixed the following warning and error from commit 3af90a6e19 when SSL is not being used: url.c:2004: warning C4013: 'Curl_ssl_cert_status_request' undefined; assuming extern returning int error LNK2019: unresolved external symbol Curl_ssl_cert_status_request referenced in function Curl_setopt
show more ...
|
Revision tags: curl-7_40_0, curl-7_39_0, curl-7_38_0, curl-7_37_1 |
|
#
3af90a6e |
| 16-Jun-2014 |
Alessandro Ghedini |
url: add CURLOPT_SSL_VERIFYSTATUS option This option can be used to enable/disable certificate status verification using the "Certificate Status Request" TLS extension defined in RFC6066
url: add CURLOPT_SSL_VERIFYSTATUS option This option can be used to enable/disable certificate status verification using the "Certificate Status Request" TLS extension defined in RFC6066 section 8. This also adds the CURLE_SSL_INVALIDCERTSTATUS error, to be used when the certificate status verification fails, and the Curl_ssl_cert_status_request() function, used to check whether the SSL backend supports the status_request extension.
show more ...
|
#
fe43a662 |
| 26-Dec-2014 |
Steve Holme |
vtls: Use CURLcode for Curl_ssl_init_certinfo() return type The return type for this function was 0 on success and 1 on error. This was then examined by the calling functions and, in mos
vtls: Use CURLcode for Curl_ssl_init_certinfo() return type The return type for this function was 0 on success and 1 on error. This was then examined by the calling functions and, in most cases, used to return CURLE_OUT_OF_MEMORY. Instead use CURLcode for the return type and return the out of memory error directly, propagating it up the call stack.
show more ...
|
#
6cb7b0c0 |
| 25-Dec-2014 |
Steve Holme |
vtls: Use bool for Curl_ssl_getsessionid() return type The return type of this function is a boolean value, and even uses a bool internally, so use bool in the function declaration as we
vtls: Use bool for Curl_ssl_getsessionid() return type The return type of this function is a boolean value, and even uses a bool internally, so use bool in the function declaration as well as the variables that store the return value, to avoid any confusion.
show more ...
|
#
be1a5051 |
| 24-Nov-2014 |
moparisthebest |
SSL: Add PEM format support for public key pinning
|
#
bfc63bfb |
| 09-Nov-2014 |
Steve Holme |
vtls.h: Fixed compiler warning when compiled without SSL vtls.c:185:46: warning: unused parameter 'data'
|
#
357ff4d1 |
| 13-Oct-2014 |
Patrick Monnerat |
Factorize pinned public key code into generic file handling and backend specific
|
#
265b9a2e |
| 13-Oct-2014 |
Patrick Monnerat |
vtls: remove QsoSSL
|
#
8fdf832e |
| 13-Oct-2014 |
Patrick Monnerat |
vtls/*: deprecate have_curlssl_md5sum and set-up default md5sum implementation
|
#
6637b237 |
| 09-Oct-2014 |
Daniel Stenberg |
vtls: have vtls.h include the backend header files It turned out some features were not enabled in the build since for example url.c #ifdefs on features that are defined on a per-backend
vtls: have vtls.h include the backend header files It turned out some features were not enabled in the build since for example url.c #ifdefs on features that are defined on a per-backend basis but vtls.h didn't include the backend headers. CURLOPT_CERTINFO was one such feature that was accidentally disabled.
show more ...
|
#
cac1dd58 |
| 03-Aug-2014 |
Dan Fandrich |
ssl: provide Curl_ssl_backend even if no SSL library is available
|
#
a439e438 |
| 31-Jul-2014 |
Daniel Stenberg |
ssl: generalize how the ssl backend identifier is set Each backend now defines CURL_SSL_BACKEND accordingly. Added the *AXTLS one which was missing previously.
|
#
01a01688 |
| 30-Jul-2014 |
Daniel Stenberg |
vtls: repair build without TLS support ... by defining Curl_ssl_random() properly
|
#
8dfd2208 |
| 03-Jun-2014 |
Daniel Stenberg |
vtls: make the random function mandatory in the TLS backend To force each backend implementation to really attempt to provide proper random. If a proper random function is missing, then
vtls: make the random function mandatory in the TLS backend To force each backend implementation to really attempt to provide proper random. If a proper random function is missing, then we can explicitly make use of the default one we use when TLS support is missing. This commit makes sure it works for darwinssl, gnutls, nss and openssl.
show more ...
|
Revision tags: curl-7_37_0, curl-7_36_0 |
|
#
e95ca7ce |
| 20-Mar-2014 |
Daniel Stenberg |
NTLM: set a fake entropy for debug builds with CURL_ENTROPY set Curl_rand() will return a dummy and repatable random value for this case. Makes it possible to write test cases that verif
NTLM: set a fake entropy for debug builds with CURL_ENTROPY set Curl_rand() will return a dummy and repatable random value for this case. Makes it possible to write test cases that verify output. Also, fake timestamp with CURL_FORCETIME set. Only when built debug enabled of course. Curl_ssl_random() was not used anymore so it has been removed. Curl_rand() is enough. create_digest_md5_message: generate base64 instead of hex string curl_sasl: also fix memory leaks in some OOM situations
show more ...
|
#
316f79ce |
| 20-May-2014 |
Fabian Frank |
ALPN: fix typo in http/1.1 identifier According to https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-05 it is "http/1.1" and not "http/1.0".
|
#
4d8db595 |
| 04-Feb-2014 |
Fabian Frank |
gtls: add ALPN support Add ALPN support when using GnuTLS >= 3.2.0. This allows libcurl to negotiate HTTP/2.0 for https connections when built with GnuTLS. See: http://w
gtls: add ALPN support Add ALPN support when using GnuTLS >= 3.2.0. This allows libcurl to negotiate HTTP/2.0 for https connections when built with GnuTLS. See: http://www.gnutls.org/manual/gnutls.html#Application-Layer-Protocol-Negotiation-_0028ALPN_0029 http://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-04
show more ...
|
Revision tags: curl-7_35_0 |
|
#
11e8066e |
| 17-Dec-2013 |
Daniel Stenberg |
vtls: renamed sslgen.[ch] to vtls.[ch]
|