diff options
| author | Daniel Stenberg <daniel@haxx.se> | 2009-02-17 12:18:34 +0000 | 
|---|---|---|
| committer | Daniel Stenberg <daniel@haxx.se> | 2009-02-17 12:18:34 +0000 | 
| commit | a24fe59ee46316b3fd7de937f2845dfe7ae530c1 (patch) | |
| tree | 2a4f9b6a2ce6514d31ea447868f7426f942231a2 | |
| parent | 4ad296c60b1188e21e861e800a84eee32f986a9e (diff) | |
- Kamil Dudka made NSS-powered builds compile and run again!
| -rw-r--r-- | CHANGES | 2 | ||||
| -rw-r--r-- | RELEASE-NOTES | 4 | ||||
| -rw-r--r-- | lib/nss.c | 5 | 
3 files changed, 8 insertions, 3 deletions
@@ -7,6 +7,8 @@                                    Changelog  Daniel Stenberg (17 Feb 2009) +- Kamil Dudka made NSS-powered builds compile and run again! +  - A second follow-up change by Andre Guibert de Bruet to fix a related memory    leak like that fixed on the 14th. When zlib returns failure, we need to    cleanup properly before returning error. diff --git a/RELEASE-NOTES b/RELEASE-NOTES index ebd3c3a42..f9d6ca3db 100644 --- a/RELEASE-NOTES +++ b/RELEASE-NOTES @@ -34,6 +34,7 @@ This release includes the following bugfixes:   o CURLINFO_CONTENT_LENGTH_DOWNLOAD size from file:// "transfers" with     CURLOPT_NOBODY set true   o memory leak on some libz errors for content encodings + o NSS-enabled build is repaired  This release includes the following known bugs: @@ -44,6 +45,7 @@ advice from friends like these:   Lisa Xu, Daniel Fandrich, Craig A West, Alexey Borzov, Sharad Gupta,   Peter Sylvester, Chad Monroe, Markus Moeller, Yang Tse, Scott Cantor, - Patrick Scott, Hidemoto Nakada, Jocelyn Jaubert, Andre Guibert de Bruet + Patrick Scott, Hidemoto Nakada, Jocelyn Jaubert, Andre Guibert de Bruet, + Kamil Dudka          Thanks! (and sorry if I forgot to mention someone) @@ -1140,7 +1140,7 @@ CURLcode Curl_nss_connect(struct connectdata *conn, int sockindex)        n = strrchr(data->set.str[STRING_CERT], '/');        if(n) {          n++; /* skip last slash */ -        nickname = aprintf(nickname, "PEM Token #%d:%s", 1, n); +        nickname = aprintf("PEM Token #%d:%s", 1, n);          if(!nickname)            return CURLE_OUT_OF_MEMORY; @@ -1171,7 +1171,8 @@ CURLcode Curl_nss_connect(struct connectdata *conn, int sockindex)      if(SSL_GetClientAuthDataHook(model,                                   (SSLGetClientAuthData) SelectClientCert, -                                 (void *)connssl) != SECSuccess) { +                                 (void *)connssl->client_nickname) != +       SECSuccess) {        curlerr = CURLE_SSL_CERTPROBLEM;        goto error;      }  | 
