Age | Commit message (Collapse) | Author | |
---|---|---|---|
2013-02-05 | RELEASE-NOTES: synced with 25f351424b3538 | Daniel Stenberg | |
8 more bug fixes mentioned | |||
2013-02-05 | RELEASE-NOTES: Updated following recent changes to the email protocols | Steve Holme | |
Added recent additions and fixes following the changes to imap, pop3 and smtp. Additionally added another contributor that helped to test the imap sasl changes. | |||
2013-01-28 | RELEASE-NOTES: only list Nick once | Daniel Stenberg | |
Even though he's a fine dude, once is enough for this time! | |||
2013-01-18 | RELEASE-NOTES: add references to several bugfixes+changes | Daniel Stenberg | |
2013-01-18 | RELEASE-NOTES: Added missing imap fix | Steve Holme | |
Added missing imap fix as per commit 709b3506cd9b. | |||
2013-01-18 | RELEASE-NOTES: synced with c43127414d89 | Daniel Stenberg | |
2013-01-15 | nss: fix error messages for CURLE_SSL_{CACERT,CRL}_BADFILE | Kamil Dudka | |
Do not use the error messages from NSS for errors not occurring in NSS. | |||
2013-01-11 | nss: clear session cache if a client cert from file is used | Kamil Dudka | |
This commit fixes a regression introduced in 052a08ff. NSS caches certs/keys returned by the SSL_GetClientAuthDataHook callback and if we connect second time to the same server, the cached cert/key pair is used. If we use multiple client certificates for different paths on the same server, we need to clear the session cache to force NSS to call the hook again. The commit 052a08ff prevented the session cache from being cleared if a client certificate from file was used. The condition is now fixed to cover both cases: consssl->client_nickname is not NULL if a client certificate from the NSS database is used and connssl->obj_clicert is not NULL if a client certificate from file is used. Review by: Kai Engert | |||
2012-12-27 | RELEASE-NOTES: synced with e3ed2b82e6 | Daniel Stenberg | |
2012-12-03 | nss: prevent NSS from crashing on client auth hook failure | Kamil Dudka | |
Although it is not explicitly stated in the documentation, NSS uses *pRetCert and *pRetKey even if the client authentication hook returns a failure. Namely, if we destroy *pRetCert without clearing *pRetCert afterwards, NSS destroys the certificate once again, which causes a double free. Reported by: Bob Relyea | |||
2012-11-20 | bump: start working on 7.28.2 | Daniel Stenberg | |
2012-11-20 | RELEASE-NOTES: synced with 52af6e69f079 / 7.28.1 | Daniel Stenberg | |
2012-11-20 | RELEASE-NOTES: NSS can be used for metalink hashing | Anthony Bryan | |
2012-11-19 | test2032: spurious failure caused by premature termination | Kamil Dudka | |
Bug: http://curl.haxx.se/mail/lib-2012-11/0095.html | |||
2012-11-17 | RELEASE-NOTES: synced with ee588fe08807778 | Daniel Stenberg | |
4 more bug fixes and 4 more contributors | |||
2012-11-14 | RELEASE-NOTES: synced with fa1ae0abcde | Daniel Stenberg | |
2012-11-13 | RELEASE-NOTES: synced with 7c0cbcf2f617b | Daniel Stenberg | |
2012-11-09 | tool_metalink: allow to use hash algorithms provided by NSS | Kamil Dudka | |
Fixes bug #3578163: http://sourceforge.net/tracker/?func=detail&atid=100976&aid=3578163&group_id=976 | |||
2012-11-07 | RELEASE-NOTES: synced with 487538e87a3d5e | Daniel Stenberg | |
6 new bugfixes and 3 more contributors... | |||
2012-11-06 | RELEASE-NOTES: synced with fa6d78829fd30ad | Daniel Stenberg | |
2012-10-10 | version-bump: towards 7.28.1! | Daniel Stenberg | |
2012-10-10 | RELEASE-NOTES: synced with 8373ca3641 | Daniel Stenberg | |
One bug, one contributor. Getting ready for release. | |||
2012-10-02 | RELEASE-NOTES: synced with 971f5bcedd418 | Daniel Stenberg | |
9 new bug fixes, 5 changes, 6 more contributors | |||
2012-09-12 | ssh: do not crash if MD5 fingerprint is not provided by libssh2 | Kamil Dudka | |
The MD5 fingerprint cannot be computed when running in FIPS mode. | |||
2012-09-09 | RELEASE-NOTES: synced with 6c6f1f64c2 | Daniel Stenberg | |
6 bug fixes to mention, 5 contributors | |||
2012-09-03 | RELEASE-NOTES: synced with abb0da919300e | Daniel Stenberg | |
2012-08-09 | nss: do not print misleading NSS error codes | Kamil Dudka | |
2012-08-08 | RELEASE-NOTES: synced with 0774386b23 | Daniel Stenberg | |
5 more bug fixes, one change, 6 contributors | |||
2012-08-08 | RELEASE-NOTES: added missing link | Daniel Stenberg | |
2012-08-07 | RELEASE-NOTES: synced with b4a558041fdf65c0 | Daniel Stenberg | |
2012-07-27 | version bump: start towards next release | Daniel Stenberg | |
Let's call it 7.27.1 for now, but it it probably going to become 7.28.0 when released. | |||
2012-07-27 | RELEASE-NOTES: remove mentioned of bug never in a release | Daniel Stenberg | |
The --silent bug came with 7561a0fc834c435 which was never in a release. Pointed out by Kamil Dudka | |||
2012-07-27 | RELEASE-NOTES: synced with 33b815e894fb | Daniel Stenberg | |
4 more bugfixes, 3 more contributors | |||
2012-07-22 | http: print reason phrase from HTTP status line on error | Kamil Dudka | |
Bug: https://bugzilla.redhat.com/676596 | |||
2012-07-20 | Fixed some typos in documentation | Dan Fandrich | |
2012-07-15 | RELEASE-NOTES: synced with 9d11716933616 | Daniel Stenberg | |
Fixed 6 bugs, added 3 contributors | |||
2012-07-09 | docs: switch to proper UTF-8 for text file encoding | Daniel Stenberg | |
2012-07-09 | RELEASE-NOTES: added a URL reference to cookie docs | Daniel Stenberg | |
2012-07-07 | RELEASE-NOTES: synced with 5a99bce07d | Daniel Stenberg | |
2012-06-25 | RELEASE-NOTES: link to more metalink info | Daniel Stenberg | |
2012-06-25 | RELEASE-NOTES: synced with d025af9bb576 | Daniel Stenberg | |
2012-06-13 | schannel: remove version number and identify its use with 'schannel' literal | Yang Tse | |
Version number is removed in order to make this info consistent with how we do it with other MS and Linux system libraries for which we don't provide this info. Identifier changed from 'WinSSPI' to 'schannel' given that this is the actual provider of the SSL/TLS support. libcurl can still be built with SSPI and without SCHANNEL support. | |||
2012-06-11 | sspi: Updated RELEASE-NOTES, FEATURES and THANKS | Marc Hoersken | |
2012-06-09 | pop3: Added support for apop authentication | Steve Holme | |
2012-06-08 | ssl: fix duplicated SSL handshake with multi interface and proxy | Kamil Dudka | |
Bug: https://bugzilla.redhat.com/788526 Reported by: Enrico Scholz | |||
2012-06-04 | pop3: Added support for sasl digest-md5 authentication | Steve Holme | |
2012-06-03 | RELEASE-NOTES: Added missing addition of sasl login support | Steve Holme | |
2012-06-03 | pop3: Added support for sasl cram-md5 authentication | Steve Holme | |
2012-06-03 | RELEASE-NOTES: synced with c4e3578e4bf | Daniel Stenberg | |
Also bumped the contributor number and next release is to become 7.27.0 | |||
2012-06-02 | pop3: Fixed the issue of having to supply the user name for all requests | Steve Holme | |
Previously it wasn't possible to connect to POP3 and not specify the user name as a CURLE_ACCESS_DENIED error would be returned. This error occurred because USER would be sent to the server with a blank user name if no mailbox user was specified as the server would reply with -ERR. This wasn't a problem prior to the 7.26.0 release but with the introduction of custom commands the user and/or application developer might want to issue a CAPA command without having to log in as a specific mailbox user. Additionally this fix won't send the newly introduced AUTH command if no user name is specified. |