Commit Graph

1752 Commits

Author SHA1 Message Date
Daniel Stenberg 8f8ba61224 bump: next release will be 7.53.0 2017-01-16 08:34:15 +01:00
Daniel Stenberg d758e99cef RELEASE-NOTES: synced with a7c73ae309 2017-01-13 23:26:09 +01:00
Daniel Stenberg d3a313c099 RELEASE-NOTES: synced with a41e8592d6 2017-01-09 14:54:48 +01:00
Daniel Stenberg 2bb00705bb RELEASE-NOTES: synced with a7b38c9dc9 2016-12-26 21:12:44 +01:00
Daniel Stenberg ad4b348c48 bump: toward next release 2016-12-23 23:47:33 +01:00
Daniel Stenberg 44b9b4d4f5 RELEASE-NOTES: curl 7.52.1 2016-12-22 16:41:14 +01:00
Daniel Stenberg 462650e455 bump: toward next release 2016-12-21 12:44:09 +01:00
Daniel Stenberg 7fda9ce46e RELEASE-NOTES: 7.52.0 2016-12-20 16:16:47 +01:00
Daniel Stenberg 3dcbd06d05 RELEASE-NOTES: synced with 4517158abf 2016-12-18 17:15:09 +01:00
Daniel Stenberg 65c3d3fe94 RELEASE-NOTES: synced with 71a55534fa 2016-12-08 21:08:35 +01:00
Daniel Stenberg 4e8e22c25b RELEASE-NOTES: synced with 19613fb3 2016-11-28 23:40:48 +01:00
Daniel Stenberg 7d967c80bc RELEASE-NOTES: update option counters 2016-11-25 00:47:52 +01:00
Daniel Stenberg 54789f9444 RELEASE-NOTES: synced with 63198a4750 2016-11-25 00:31:48 +01:00
Daniel Stenberg ff662f1c3a RELEASE-NOTES: synced with 346340808c 2016-11-12 00:09:35 +01:00
Daniel Stenberg de39e8973f RELEASE-NOTES: synced with dfcdaaba37 2016-11-09 09:14:44 +01:00
Kamil Dudka a110a03b43 curl: introduce the --tlsv1.3 option to force TLS 1.3
Fully implemented with the NSS backend only for now.

Reviewed-by: Ray Satiro
2016-11-07 12:07:11 +01:00
Kamil Dudka 6ad3add606 vtls: support TLS 1.3 via CURL_SSLVERSION_TLSv1_3
Fully implemented with the NSS backend only for now.

Reviewed-by: Ray Satiro
2016-11-07 11:52:07 +01:00
Kamil Dudka 5d45ced7a4 nss: map CURL_SSLVERSION_DEFAULT to NSS default
... but make sure we use at least TLSv1.0 according to libcurl API

Reported-by: Cure53
Reviewed-by: Ray Satiro
2016-11-07 11:51:33 +01:00
Daniel Stenberg 71cfce9ce7 bump: start working on 7.51.1 2016-11-03 10:08:26 +01:00
Daniel Stenberg 1fe755f99d RELEASE-NOTES: 7.51.0 2016-11-02 07:34:06 +01:00
Daniel Stenberg 9934f4fe9f RELEASE-NOTES: synced with d14538d250 2016-10-31 10:50:32 +01:00
Martin Frodl eb84412b33 nss: fix tight loop in non-blocking TLS handhsake over proxy
... in case the handshake completes before entering
CURLM_STATE_PROTOCONNECT

Bug: https://bugzilla.redhat.com/1388162
2016-10-25 11:56:37 +02:00
Daniel Stenberg c30a2d97ed RELEASE-NOTES: synced with 50ee3aaf1a 2016-10-24 08:03:07 +02:00
Daniel Stenberg 97dfe38641 RELEASE-NOTES: synced with f36f8c1455 2016-10-18 17:17:54 +02:00
Daniel Stenberg f7d6bdca6c RELEASE-NOTES: synced with a1a5cd0487 2016-10-16 13:31:42 +02:00
Daniel Stenberg 8c2b5580a6 RELEASE-NOTES: spellfix 2016-10-10 08:14:28 +02:00
Daniel Stenberg f68042a2a5 RELEASE-NOTES: synced with 8272049062
5 more fixes, 2 more contributors
2016-10-10 08:13:01 +02:00
Daniel Stenberg 6bf909d5ce RELEASE-NOTES: synced with 8fd2a754f0 2016-10-04 23:50:52 +02:00
Kamil Dudka d1f1c857ad nss: add chacha20-poly1305 cipher suites if supported by NSS 2016-09-22 10:20:12 +02:00
Daniel Stenberg 6834ebaaa3 RELEASE-NOTES: synced with 79607eec51 2016-09-19 23:58:55 +02:00
Daniel Stenberg 4ba1569ad1 RELEASE-NOTES: reset and go toward 7.51.0 (again) 2016-09-14 09:00:00 +02:00
Daniel Stenberg 0b4a85352b RELEASE-NOTES: curl 7.50.3 2016-09-14 07:56:11 +02:00
Daniel Stenberg 4a35bbbe8e RELEASE-NOTES: synced with 665694979b 2016-09-13 15:09:29 +02:00
Daniel Stenberg d58682f28b RELEASE-NOTES: synced with 257bf3ac67 2016-09-11 00:06:17 +02:00
Daniel Stenberg add8ee7d57 bump: toward 7.51.0 2016-09-07 15:45:24 +02:00
Daniel Stenberg 9ce6d0d528 RELEASE-NOTES: curl 7.50.2 release 2016-09-07 07:45:43 +02:00
Daniel Stenberg 72abf4f59e RELEASE-NOTES: synced with 3d4c0c8b9b 2016-09-05 14:55:01 +02:00
Steve Holme 8a529ef01d RELEASE-NOTES: Added missing fix from commit 15592143f 2016-08-27 11:10:17 +01:00
Peter Wang 3a5d5de9ef nss: work around race condition in PK11_FindSlotByName()
Serialise the call to PK11_FindSlotByName() to avoid spurious errors in
a multi-threaded environment. The underlying cause is a race condition
in nssSlot_IsTokenPresent().

Bug: https://bugzilla.mozilla.org/1297397

Closes #985
2016-08-26 14:42:22 +02:00
Kamil Dudka 7700fcba64 nss: refuse previously loaded certificate from file
... when we are not asked to use a certificate from file
2016-08-26 13:30:27 +02:00
Daniel Stenberg 15592143f3 RELEASE-NOTES: synced with 95ded2c56 2016-08-22 14:48:13 +02:00
Daniel Stenberg a5174b022b RELEASE-NOTES: synced with b7ee5316c2 2016-08-15 08:47:21 +02:00
Daniel Stenberg 6301692fae RELEASE-NOTES: synced with e577c43bb5 2016-08-10 09:12:34 +02:00
Daniel Stenberg 9803e832d9 RELEASE-NOTES: synced with 7b4bf37a44 2016-08-05 00:37:03 +02:00
Daniel Stenberg 73878278d8 bump: start working toward 7.50.2 2016-08-03 09:36:27 +02:00
Daniel Stenberg 95addfe828 RELEASE-NOTES: 7.50.1 2016-08-03 00:34:27 +02:00
Daniel Stenberg 2136a6a892 RELEASE-NOTES: synced with aa9f536a18 2016-08-01 23:40:27 +02:00
Kamil Dudka 5e26d9ceea tests: distribute the http2-server.pl script, too 2016-07-21 13:07:27 +02:00
Kamil Dudka 8b9ba132f0 docs: distribute the CURLINFO_HTTP_VERSION(3) man page, too 2016-07-21 13:06:17 +02:00
Daniel Stenberg 001f8d06fe bump: start working on 7.50.1 2016-07-21 11:16:08 +02:00