Age | Commit message (Collapse) | Author | |
---|---|---|---|
2013-04-26 | url: initialize speed-check data for file:// protocol | Zdenek Pavlas | |
... in order to prevent an artificial timeout event based on stale speed-check data from a previous network transfer. This commit fixes a regression caused by 9dd85bced56f6951107f69e581c872c1e7e3e58e. Bug: https://bugzilla.redhat.com/906031 | |||
2013-04-24 | RELEASE-NOTES: synced with a8c92cb60890 | Steve Holme | |
2013-04-20 | RELEASE-NOTES: synced with d535c4a2e1f7 | Steve Holme | |
2013-04-13 | RELEASE-NOTES: Removed erroneous spaces | Steve Holme | |
2013-04-13 | RELEASE-NOTES: synced with 8723cade21fb | Steve Holme | |
2013-04-12 | bump: start working towards next release | Daniel Stenberg | |
2013-04-12 | RELEASE-NOTES: cleaned up for 7.30 (synced with 5c5e1a1cd20) | Daniel Stenberg | |
Most notable the security advisory: http://curl.haxx.se/docs/adv_20130412.html | |||
2013-04-09 | RELEASe-NOTES: synced with 29fdb2700f797 | Daniel Stenberg | |
added "tcpkeepalive on Mac OS X" | |||
2013-04-08 | darwinssl: disable insecure ciphers by default | Nick Zitzmann | |
I noticed that aria2's SecureTransport code disables insecure ciphers such as NULL, anonymous, IDEA, and weak-key ciphers used by SSLv3 and later. That's a good idea, and now we do the same thing in order to prevent curl from accessing a "secure" site that only negotiates insecure ciphersuites. | |||
2013-04-08 | RELEASE-NOTES: Corrected duplicate NTLM memory leaks | Steve Holme | |
2013-04-08 | RELEASE-NOTES: Removed trailing full stop | Steve Holme | |
2013-04-08 | RELEASE-NOTES: sync with 704a5dfca9 | Daniel Stenberg | |
2013-04-05 | RELEASE-NOTES: synced with 5e722b2d09087 | Daniel Stenberg | |
3 more bug fixes, 6 more contributors | |||
2013-04-01 | RELEASE-NOTES: synced with 0614b902136 | Daniel Stenberg | |
2013-03-27 | RELEASE-NOTES: Corrected typo | Steve Holme | |
2013-03-27 | RELEASE-NOTES: add two references | Daniel Stenberg | |
2013-03-23 | RELEASE-NOTES: synced with bc6037ed3ec02 | Daniel Stenberg | |
More changes, bugfixes and contributors! | |||
2013-03-19 | darwinssl: disable ECC ciphers under Mountain Lion by default | Nick Zitzmann | |
I found out that ECC doesn't work as of OS X 10.8.3, so those ciphers are turned off until the next point release of OS X. | |||
2013-03-12 | curl_global_init: accept the CURL_GLOBAL_ACK_EINTR flag | Zdenek Pavlas | |
The flag can be used in pycurl-based applications where using the multi interface would not be acceptable because of the performance lost caused by implementing the select() loop in python. Bug: http://curl.haxx.se/bug/view.cgi?id=1168 Downstream Bug: https://bugzilla.redhat.com/919127 | |||
2013-03-12 | easy: do not ignore poll() failures other than EINTR | Kamil Dudka | |
2013-03-09 | RELEASE-NOTES: synced with ca3c0ed3a9c | Daniel Stenberg | |
8 more bugfixes, one change and a bunch of contributors | |||
2013-03-08 | RELEASE-NOTES: mention that krb4 is up for consideration | Daniel Stenberg | |
2013-03-07 | version bump: the next release will be 7.30.0 | Daniel Stenberg | |
2013-03-07 | RELEASE-NOTES: Added missing imap fixes and additions | Steve Holme | |
With all the recent imap changes it wasn't clear what new features and fixes should be included in the release notes. | |||
2013-03-06 | RELEASE-NOTES: brought this up-to-date with the latest changes | Nick Zitzmann | |
2013-03-06 | nss: fix misplaced code enabling non-blocking socket mode | Kamil Dudka | |
The option needs to be set on the SSL socket. Setting it on the model takes no effect. Note that the non-blocking mode is still not enabled for the handshake because the code is not yet ready for that. | |||
2013-02-16 | Guile-curl: a new libcurl binding | Daniel Stenberg | |
2013-02-10 | RELEASE-NOTES: Updated following the recent imap/pop3/smtp changes | Steve Holme | |
2013-02-10 | RELEASE-NOTES: synced with 92f7606f29b704 | Steve Holme | |
2013-02-07 | RELEASE-NOTES: Added new imap features | Steve Holme | |
2013-02-06 | 7.29.1: onwards! | Daniel Stenberg | |
2013-02-06 | RELEASE-NOTES: mention the SASL buffer overflow | Daniel Stenberg | |
2013-02-05 | RELEASE-NOTES: synced with 25f351424b3538 | Daniel Stenberg | |
8 more bug fixes mentioned | |||
2013-02-05 | RELEASE-NOTES: Updated following recent changes to the email protocols | Steve Holme | |
Added recent additions and fixes following the changes to imap, pop3 and smtp. Additionally added another contributor that helped to test the imap sasl changes. | |||
2013-01-28 | RELEASE-NOTES: only list Nick once | Daniel Stenberg | |
Even though he's a fine dude, once is enough for this time! | |||
2013-01-18 | RELEASE-NOTES: add references to several bugfixes+changes | Daniel Stenberg | |
2013-01-18 | RELEASE-NOTES: Added missing imap fix | Steve Holme | |
Added missing imap fix as per commit 709b3506cd9b. | |||
2013-01-18 | RELEASE-NOTES: synced with c43127414d89 | Daniel Stenberg | |
2013-01-15 | nss: fix error messages for CURLE_SSL_{CACERT,CRL}_BADFILE | Kamil Dudka | |
Do not use the error messages from NSS for errors not occurring in NSS. | |||
2013-01-11 | nss: clear session cache if a client cert from file is used | Kamil Dudka | |
This commit fixes a regression introduced in 052a08ff. NSS caches certs/keys returned by the SSL_GetClientAuthDataHook callback and if we connect second time to the same server, the cached cert/key pair is used. If we use multiple client certificates for different paths on the same server, we need to clear the session cache to force NSS to call the hook again. The commit 052a08ff prevented the session cache from being cleared if a client certificate from file was used. The condition is now fixed to cover both cases: consssl->client_nickname is not NULL if a client certificate from the NSS database is used and connssl->obj_clicert is not NULL if a client certificate from file is used. Review by: Kai Engert | |||
2012-12-27 | RELEASE-NOTES: synced with e3ed2b82e6 | Daniel Stenberg | |
2012-12-03 | nss: prevent NSS from crashing on client auth hook failure | Kamil Dudka | |
Although it is not explicitly stated in the documentation, NSS uses *pRetCert and *pRetKey even if the client authentication hook returns a failure. Namely, if we destroy *pRetCert without clearing *pRetCert afterwards, NSS destroys the certificate once again, which causes a double free. Reported by: Bob Relyea | |||
2012-11-20 | bump: start working on 7.28.2 | Daniel Stenberg | |
2012-11-20 | RELEASE-NOTES: synced with 52af6e69f079 / 7.28.1 | Daniel Stenberg | |
2012-11-20 | RELEASE-NOTES: NSS can be used for metalink hashing | Anthony Bryan | |
2012-11-19 | test2032: spurious failure caused by premature termination | Kamil Dudka | |
Bug: http://curl.haxx.se/mail/lib-2012-11/0095.html | |||
2012-11-17 | RELEASE-NOTES: synced with ee588fe08807778 | Daniel Stenberg | |
4 more bug fixes and 4 more contributors | |||
2012-11-14 | RELEASE-NOTES: synced with fa1ae0abcde | Daniel Stenberg | |
2012-11-13 | RELEASE-NOTES: synced with 7c0cbcf2f617b | Daniel Stenberg | |
2012-11-09 | tool_metalink: allow to use hash algorithms provided by NSS | Kamil Dudka | |
Fixes bug #3578163: http://sourceforge.net/tracker/?func=detail&atid=100976&aid=3578163&group_id=976 |