aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2014-03-30keywords: don't use STDERR for good infoDaniel Stenberg
2014-03-30tests: Added email unit tests to verify login credential connection re-useSteve Holme
2014-03-30tests: Corrected "APOP" authentication keywordSteve Holme
2014-03-30tests: Replaced email authentication keywords with SASL based keywordsSteve Holme
As the email protocols implement SASL authentication rather than IMAP, POP3 and SMTP specific authentication, updated the authentication keywords to reflect this.
2014-03-30tests: Added "Clear Text" authentication keywordSteve Holme
2014-03-30tests: Added "SASL" authentication keywordSteve Holme
2014-03-30imap-append.c: Fixed compilation errors on some platformsSteve Holme
In the initializer for len, there is no prototype for "strlen". In this statement, there is no prototype for "memcpy".
2014-03-30ftpserver.pl: Removed some unused variablesSteve Holme
2014-03-30ftpserver.pl: Reworked some variable names to be more meaningfulSteve Holme
2014-03-29ftpserver.pl: Corrected some indentation in senddata()Steve Holme
2014-03-29lib1513: fix callback proto to silence warningDaniel Stenberg
2014-03-29ftpserver.pl: Added fallback to <data> support when using multiple URLsSteve Holme
Added support for falling back to <data> when <data1>, <data2>, etc... don't exist in the <reply> section of a unit test.
2014-03-29ftpserver.pl: Updated email based get reply data code to use new methodSteve Holme
2014-03-29ftpserver.pl: Fixed syntax error from commit 3a29ee41Steve Holme
2014-03-29ftpserver.pl: Updated argument code in STATUS_imap() to be more meaningfulSteve Holme
2014-03-29ftpserver.pl: Introduced common method for getting a test's reply dataSteve Holme
2014-03-28smtp: Fixed login denied when server doesn't support AUTH capabilitySteve Holme
Specifying user credentials when the SMTP server doesn't support authentication would cause curl to display "No known authentication mechanisms supported!" and return CURLE_LOGIN_DENIED. Reported-by: Tom Sparrow Bug: http://curl.haxx.se/mail/lib-2014-03/0173.html
2014-03-28winbuild: added warnless.c to fix buildCody Mack
2014-03-26hostcheck: added a system include to define struct in_addrDan Fandrich
2014-03-26test1397: Fixed compilation with some SSL backendsDan Fandrich
The test is only valid when one of four SSL backends is in use, and must otherwise return success.
2014-03-26test815/816: Use authentication for both URLsDan Fandrich
The improved connection reuse logic would otherwise create a new connection for each one, which isn't supported by the test server, nor expected by the test.
2014-03-26mkhelp: generate code for --disable-manual as wellDaniel Stenberg
This allows configure --disable-manual to run and build without having to regenerate the src/tool_hugehelp.c file which otherwise is necessary since we ship tarballs with that file present. Reported-by: Remi Gacogne Bug: http://curl.haxx.se/bug/view.cgi?id=1350
2014-03-26bump: start the 7.37.0 raceDaniel Stenberg
2014-03-26RELEASE-NOTES: 7.36.0Daniel Stenberg
2014-03-25test1397: unit test for certificate name wildcard handlingRichard J. Moore
2014-03-25Curl_cert_hostcheck: strip trailing dots in host name and wildcardDaniel Stenberg
Reported-by: Richard Moore
2014-03-25Curl_cert_hostcheck: reject IP address wildcard matchesDaniel Stenberg
There are server certificates used with IP address in the CN field, but we MUST not allow wild cart certs for hostnames given as IP addresses only. Therefore we must make Curl_cert_hostcheck() fail such attempts. Bug: http://curl.haxx.se/docs/adv_20140326B.html Reported-by: Richard Moore
2014-03-25url: Fixed connection re-use when using different log-in credentialsSteve Holme
In addition to FTP, other connection based protocols such as IMAP, POP3, SMTP, SCP, SFTP and LDAP require a new connection when different log-in credentials are specified. Fixed the detection logic to include these other protocols. Bug: http://curl.haxx.se/docs/adv_20140326A.html
2014-03-25THANKS: 14 new friends from the 7.36.0 announcementDaniel Stenberg
2014-03-25RELEASE-NOTES: synced with 3ebfaf6a0399b6aDaniel Stenberg
2014-03-23tool_operate: Fixed uninitialised variable under some error situationsSteve Holme
For example when a URL is not specified or the headers file fails to open.
2014-03-22tool_parsecfg: Reworked error handling from commit fc59a9e1Steve Holme
2014-03-22tool_getparam: Removed "dead assignment" code introduced in commit 1a9b58fcSteve Holme
2014-03-22polarssl: avoid extra newlines in debug messagesGisle Vanem
The debug messages printed inside PolarSSL always seems to end with a newline. So 'infof()' should not add one. Besides the trace 'line' should be 'const'.
2014-03-20rtsp: parse "Session:" header properlyDaniel Stenberg
The parser skipped the initial letter, which presumably often is whitespace but doesn't have to be. Reported-by: Mike Hasselberg Bug: http://curl.haxx.se/mail/lib-2014-03/0134.html
2014-03-19runtests.pl: verify specified test casesDaniel Stenberg
To better allow arguments like "1 to 9999" without flooding the terminal with error messages, the given test cases range is now checked and only test numbers with existing files are actually run.
2014-03-19RELEASE-NOTES: fixed typoDan Fandrich
2014-03-19trynextip: don't store 'ai' on failed connects...Daniel Stenberg
It leads to the "next family" tries starting from the wrong point and thus fails! Bug: http://curl.haxx.se/bug/view.cgi?id=1337 Reported-by: ricker
2014-03-19RELEASE-NOTES: synced with 47f8e99e78cDaniel Stenberg
2014-03-19polarssl: fix possible handshake timeout issue in multi.Gaël PORTAY
Because of the socket is unblocking, PolarSSL does need call to getsock to get the action to perform in multi environment. In some cases, it might happen we have not received yet all data to perform the handshake. ssh_handshake returns POLARSSL_ERR_NET_WANT_READ, the state is updated but because of the getsock has not the proper #define macro to, the library never prevents to select socket for input thus the socket will never be awaken when last data is available. Thus it leads to timeout.
2014-03-18polarssl: break compatibility with version older than 1.3.Gaël PORTAY
Remove all #ifdef/else/endif macros that ensure compatibility with polarssl version previous than 1.3.
2014-03-18polarssl: drop use of 1.2 compatibility header.Gaël PORTAY
API has changed since version 1.3. A compatibility header has been created to ensure forward compatibility for code using old API: * x509 certificate structure has been renamed to from x509_cert to x509_crt * new dedicated setter for RSA certificates ssl_set_own_cert_rsa, ssl_set_own_cert is for generic keys * ssl_default_ciphersuites has been replaced by function ssl_list_ciphersuites() This patch drops the use of the compatibly header.
2014-03-18polarssl: added missing end-of-comment from previous commitDaniel Stenberg
2014-03-17polarssl: now require 1.3.0+Daniel Stenberg
Also fixed a function name change in the version requirement bump
2014-03-17polarssl: fix compilationhasufell
Rename x509_cert to x509_crt and add "compat-1.2.h" include. This would still need some more thorough conversion in order to drop "compat-1.2.h" include.
2014-03-15nss: allow to enable/disable new AES GCM cipher-suitesKamil Dudka
... if built against a new enough version of NSS
2014-03-15nss: allow to enable/disable new HMAC-SHA256 cipher-suitesKamil Dudka
... if built against a new enough version of NSS
2014-03-15nss: do not enable AES cipher-suites by defaultKamil Dudka
... but allow them to be enabled/disabled explicitly. The default policy should be maintained at the NSS level.
2014-03-15tests: made the SASL modes separate keywordsDan Fandrich
2014-03-15tests: added missing HTTP NTLM auth keywordsDan Fandrich
Also, removed an unneeded strippart