Daniel Stenberg
aff7562922
RELEASE-NOTES: synced with 365c5ba395
...
The 10 first bug fixes for the pending release...
2013-06-25 10:35:21 +02:00
Daniel Stenberg
ec248b590d
bump: start working towards what most likely will become 7.32.0
2013-06-22 14:13:28 +02:00
Daniel Stenberg
85c710e11e
RELEASE-NOTES: synced with 0de7249bb3
- 7.31.0
2013-06-22 11:30:31 +02:00
Daniel Stenberg
a9f5ad0e2a
RELEASE-NOTES: synced with e305f5ec71
2013-06-20 22:27:33 +02:00
Daniel Stenberg
1826c768ab
RELEASE-NOTES: synced with 9c3e098259
...
Mention 7 recent bug fixes and their associated contributors
2013-06-13 23:01:32 +02:00
Daniel Stenberg
dc19e656b5
RELEASE-NOTES: synced with 87cf677eca
...
Added 11 bugs and 7 contributors
2013-06-07 10:39:21 +02:00
Daniel Stenberg
01eede2662
RELEASE-NOTES: synced with ae26ee3489
2013-05-12 14:36:04 +02:00
Jared Jennings
865d4138a0
curl -E: allow to escape ':' in cert nickname
2013-05-06 14:32:26 +02:00
Steve Holme
7632bc911b
RELEASE-NOTES: synced with 92ef5f19c8
2013-05-04 10:13:43 +01:00
Steve Holme
b52cf5d2cd
smtp: Fixed unknown percentage complete in progress bar
...
The curl command line utility would display the the completed progress
bar with a percentage of zero as the progress routines didn't know the
size of the transfer.
2013-04-29 22:34:26 +01:00
Nick Zitzmann
a5c0e20939
darwinssl: add TLS crypto authentication
...
Users using the Secure Transport (darwinssl) back-end can now use a
certificate and private key to authenticate with a site using TLS. Because
Apple's security system is based around the keychain and does not have any
non-public function to create a SecIdentityRef data structure from data
loaded outside of the Keychain, the certificate and private key have to be
loaded into the Keychain first (using the certtool command line tool or
the Security framework's C API) before we can find it and use it.
2013-04-27 23:15:07 -06:00
Daniel Stenberg
219358b93d
bump version
...
Since we're adding new stuff, the next release will bump the minor
version and we're looking forward to 7.31.0
2013-04-27 23:15:35 +02:00
Steve Holme
f133719f73
RELEASE-NOTES: synced with f4e6e201b1
2013-04-27 20:43:55 +01:00
Zdenek Pavlas
b37b5233ca
url: initialize speed-check data for file:// protocol
...
... in order to prevent an artificial timeout event based on stale
speed-check data from a previous network transfer. This commit fixes
a regression caused by 9dd85bced5
.
Bug: https://bugzilla.redhat.com/906031
2013-04-26 15:38:22 +02:00
Steve Holme
c0d502785f
RELEASE-NOTES: synced with a8c92cb608
2013-04-24 19:40:06 +01:00
Steve Holme
5821d5f111
RELEASE-NOTES: synced with d535c4a2e1
2013-04-20 09:56:16 +01:00
Steve Holme
95ba6cdd54
RELEASE-NOTES: Removed erroneous spaces
2013-04-13 18:35:16 +01:00
Steve Holme
7ce6cb9ab4
RELEASE-NOTES: synced with 8723cade21
2013-04-13 16:43:30 +01:00
Daniel Stenberg
e0cff02061
bump: start working towards next release
2013-04-12 11:30:32 +02:00
Daniel Stenberg
80d241046e
RELEASE-NOTES: cleaned up for 7.30 (synced with 5c5e1a1cd2
)
...
Most notable the security advisory:
http://curl.haxx.se/docs/adv_20130412.html
2013-04-12 00:05:39 +02:00
Daniel Stenberg
4594ee5e14
RELEASe-NOTES: synced with 29fdb2700f
...
added "tcpkeepalive on Mac OS X"
2013-04-09 14:49:27 +02:00
Nick Zitzmann
d7f4c3772e
darwinssl: disable insecure ciphers by default
...
I noticed that aria2's SecureTransport code disables insecure ciphers such
as NULL, anonymous, IDEA, and weak-key ciphers used by SSLv3 and later.
That's a good idea, and now we do the same thing in order to prevent curl
from accessing a "secure" site that only negotiates insecure ciphersuites.
2013-04-08 17:07:20 -06:00
Steve Holme
4990f46856
RELEASE-NOTES: Corrected duplicate NTLM memory leaks
2013-04-08 20:59:50 +01:00
Steve Holme
5e24db0cba
RELEASE-NOTES: Removed trailing full stop
2013-04-08 20:34:29 +01:00
Daniel Stenberg
9141c75bfb
RELEASE-NOTES: sync with 704a5dfca9
2013-04-08 08:43:18 +02:00
Daniel Stenberg
bf7a270e0b
RELEASE-NOTES: synced with 5e722b2d09
...
3 more bug fixes, 6 more contributors
2013-04-05 23:31:00 +02:00
Daniel Stenberg
c7e56db050
RELEASE-NOTES: synced with 0614b90213
2013-04-01 00:36:50 +02:00
Steve Holme
048726a5a2
RELEASE-NOTES: Corrected typo
2013-03-27 20:35:28 +00:00
Daniel Stenberg
b8c195974c
RELEASE-NOTES: add two references
2013-03-27 15:36:15 +01:00
Daniel Stenberg
11219b3c93
RELEASE-NOTES: synced with bc6037ed3e
...
More changes, bugfixes and contributors!
2013-03-23 23:29:40 +01:00
Nick Zitzmann
6f1f7e5de8
darwinssl: disable ECC ciphers under Mountain Lion by default
...
I found out that ECC doesn't work as of OS X 10.8.3, so those ciphers are
turned off until the next point release of OS X.
2013-03-19 15:21:34 -06:00
Zdenek Pavlas
57ccdfa8d2
curl_global_init: accept the CURL_GLOBAL_ACK_EINTR flag
...
The flag can be used in pycurl-based applications where using the multi
interface would not be acceptable because of the performance lost caused
by implementing the select() loop in python.
Bug: http://curl.haxx.se/bug/view.cgi?id=1168
Downstream Bug: https://bugzilla.redhat.com/919127
2013-03-12 10:58:20 +01:00
Kamil Dudka
491e026ccd
easy: do not ignore poll() failures other than EINTR
2013-03-12 10:58:19 +01:00
Daniel Stenberg
cb07bca689
RELEASE-NOTES: synced with ca3c0ed3a9
...
8 more bugfixes, one change and a bunch of contributors
2013-03-09 16:32:23 +01:00
Daniel Stenberg
6d8d306905
RELEASE-NOTES: mention that krb4 is up for consideration
2013-03-08 22:33:27 +01:00
Daniel Stenberg
442084cdb5
version bump: the next release will be 7.30.0
2013-03-07 11:14:16 +01:00
Steve Holme
9ceee69ff7
RELEASE-NOTES: Added missing imap fixes and additions
...
With all the recent imap changes it wasn't clear what new features and
fixes should be included in the release notes.
2013-03-07 10:03:28 +00:00
Nick Zitzmann
a9cc5ee0c6
RELEASE-NOTES: brought this up-to-date with the latest changes
2013-03-06 20:03:18 -07:00
Kamil Dudka
9d0af3018c
nss: fix misplaced code enabling non-blocking socket mode
...
The option needs to be set on the SSL socket. Setting it on the model
takes no effect. Note that the non-blocking mode is still not enabled
for the handshake because the code is not yet ready for that.
2013-03-06 13:34:10 +01:00
Daniel Stenberg
d4703fa428
Guile-curl: a new libcurl binding
2013-02-16 14:26:28 +01:00
Steve Holme
ff8c5a329e
RELEASE-NOTES: Updated following the recent imap/pop3/smtp changes
2013-02-10 22:32:47 +00:00
Steve Holme
8170d1f828
RELEASE-NOTES: synced with 92f7606f29
2013-02-10 11:41:42 +00:00
Steve Holme
ce4b554e5d
RELEASE-NOTES: Added new imap features
2013-02-07 21:20:11 +00:00
Daniel Stenberg
2488a01337
7.29.1: onwards!
2013-02-06 14:50:39 +01:00
Daniel Stenberg
0f1deac71e
RELEASE-NOTES: mention the SASL buffer overflow
2013-02-06 11:06:33 +01:00
Daniel Stenberg
25d13822ae
RELEASE-NOTES: synced with 25f351424b
...
8 more bug fixes mentioned
2013-02-05 23:19:19 +01:00
Steve Holme
03577a355e
RELEASE-NOTES: Updated following recent changes to the email protocols
...
Added recent additions and fixes following the changes to imap, pop3
and smtp. Additionally added another contributor that helped to test
the imap sasl changes.
2013-02-05 00:11:24 +00:00
Daniel Stenberg
38ec16d671
RELEASE-NOTES: only list Nick once
...
Even though he's a fine dude, once is enough for this time!
2013-01-28 22:32:11 +01:00
Daniel Stenberg
446afec71a
RELEASE-NOTES: add references to several bugfixes+changes
2013-01-18 15:57:11 +01:00
Steve Holme
e2bfae239f
RELEASE-NOTES: Added missing imap fix
...
Added missing imap fix as per commit 709b3506cd
.
2013-01-18 12:15:37 +00:00
Daniel Stenberg
0e1855d9d3
RELEASE-NOTES: synced with c43127414d
2013-01-18 00:12:18 +01:00
Kamil Dudka
26613d7817
nss: fix error messages for CURLE_SSL_{CACERT,CRL}_BADFILE
...
Do not use the error messages from NSS for errors not occurring in NSS.
2013-01-15 13:20:56 +01:00
Kamil Dudka
b36f1d26f8
nss: clear session cache if a client cert from file is used
...
This commit fixes a regression introduced in 052a08ff
.
NSS caches certs/keys returned by the SSL_GetClientAuthDataHook callback
and if we connect second time to the same server, the cached cert/key
pair is used. If we use multiple client certificates for different
paths on the same server, we need to clear the session cache to force
NSS to call the hook again. The commit 052a08ff
prevented the session
cache from being cleared if a client certificate from file was used.
The condition is now fixed to cover both cases: consssl->client_nickname
is not NULL if a client certificate from the NSS database is used and
connssl->obj_clicert is not NULL if a client certificate from file is
used.
Review by: Kai Engert
2013-01-11 10:59:11 +01:00
Daniel Stenberg
431ead1c9a
RELEASE-NOTES: synced with e3ed2b82e6
2012-12-27 20:15:07 +01:00
Kamil Dudka
68d2830ee9
nss: prevent NSS from crashing on client auth hook failure
...
Although it is not explicitly stated in the documentation, NSS uses
*pRetCert and *pRetKey even if the client authentication hook returns
a failure. Namely, if we destroy *pRetCert without clearing *pRetCert
afterwards, NSS destroys the certificate once again, which causes a
double free.
Reported by: Bob Relyea
2012-12-03 13:34:36 +01:00
Daniel Stenberg
ba476bb6d8
bump: start working on 7.28.2
2012-11-20 10:27:36 +01:00
Daniel Stenberg
b9fdb721f2
RELEASE-NOTES: synced with 52af6e69f0
/ 7.28.1
2012-11-20 08:05:42 +01:00
Anthony Bryan
c830115c48
RELEASE-NOTES: NSS can be used for metalink hashing
2012-11-20 00:14:31 +01:00
Kamil Dudka
32be348af2
test2032: spurious failure caused by premature termination
...
Bug: http://curl.haxx.se/mail/lib-2012-11/0095.html
2012-11-19 13:36:10 +01:00
Daniel Stenberg
dd75cba3ef
RELEASE-NOTES: synced with ee588fe088
...
4 more bug fixes and 4 more contributors
2012-11-17 14:23:41 +01:00
Daniel Stenberg
53c83ee3ed
RELEASE-NOTES: synced with fa1ae0abcd
2012-11-14 22:32:19 +01:00
Daniel Stenberg
6a4bdb027b
RELEASE-NOTES: synced with 7c0cbcf2f6
2012-11-13 13:03:38 +01:00
Kamil Dudka
49c37e6c1c
tool_metalink: allow to use hash algorithms provided by NSS
...
Fixes bug #3578163 :
http://sourceforge.net/tracker/?func=detail&atid=100976&aid=3578163&group_id=976
2012-11-09 10:42:54 +01:00
Daniel Stenberg
9096f4f451
RELEASE-NOTES: synced with 487538e87a
...
6 new bugfixes and 3 more contributors...
2012-11-07 23:21:55 +01:00
Daniel Stenberg
0da6c113ce
RELEASE-NOTES: synced with fa6d78829f
2012-11-06 12:03:29 +01:00
Daniel Stenberg
ff32546d81
version-bump: towards 7.28.1!
2012-10-10 22:35:08 +02:00
Daniel Stenberg
33c02d4771
RELEASE-NOTES: synced with 8373ca3641
...
One bug, one contributor. Getting ready for release.
2012-10-10 21:58:16 +02:00
Daniel Stenberg
6b18f18b4c
RELEASE-NOTES: synced with 971f5bcedd
...
9 new bug fixes, 5 changes, 6 more contributors
2012-10-02 10:39:51 +02:00
Kamil Dudka
f05e51362f
ssh: do not crash if MD5 fingerprint is not provided by libssh2
...
The MD5 fingerprint cannot be computed when running in FIPS mode.
2012-09-12 16:49:10 +02:00
Daniel Stenberg
a492632022
RELEASE-NOTES: synced with 6c6f1f64c2
...
6 bug fixes to mention, 5 contributors
2012-09-09 14:55:52 +02:00
Daniel Stenberg
cb2feb9def
RELEASE-NOTES: synced with abb0da9193
2012-09-03 23:20:33 +02:00
Kamil Dudka
52b6eda4f2
nss: do not print misleading NSS error codes
2012-08-09 13:33:49 +02:00
Daniel Stenberg
73342f0ee0
RELEASE-NOTES: synced with 0774386b23
...
5 more bug fixes, one change, 6 contributors
2012-08-08 23:19:05 +02:00
Daniel Stenberg
4dd44d9c20
RELEASE-NOTES: added missing link
2012-08-08 23:01:14 +02:00
Daniel Stenberg
77f72aa6c3
RELEASE-NOTES: synced with b4a558041f
2012-08-07 23:20:06 +02:00
Daniel Stenberg
dd4699c111
version bump: start towards next release
...
Let's call it 7.27.1 for now, but it it probably going to become 7.28.0
when released.
2012-07-27 23:57:27 +02:00
Daniel Stenberg
7f9f94a1df
RELEASE-NOTES: remove mentioned of bug never in a release
...
The --silent bug came with 7561a0fc83
which was never in a release.
Pointed out by Kamil Dudka
2012-07-27 00:31:15 +02:00
Daniel Stenberg
3b4d430cd8
RELEASE-NOTES: synced with 33b815e894
...
4 more bugfixes, 3 more contributors
2012-07-27 00:15:17 +02:00
Kamil Dudka
d317ca50ae
http: print reason phrase from HTTP status line on error
...
Bug: https://bugzilla.redhat.com/676596
2012-07-22 02:12:43 +02:00
Dan Fandrich
cb787b70bf
Fixed some typos in documentation
2012-07-20 21:02:58 +02:00
Daniel Stenberg
8276791749
RELEASE-NOTES: synced with 9d11716933
...
Fixed 6 bugs, added 3 contributors
2012-07-15 22:39:06 +02:00
Daniel Stenberg
e5843470e8
docs: switch to proper UTF-8 for text file encoding
2012-07-09 19:28:51 +02:00
Daniel Stenberg
329be28d69
RELEASE-NOTES: added a URL reference to cookie docs
2012-07-09 13:11:44 +02:00
Daniel Stenberg
68e6b56a2a
RELEASE-NOTES: synced with 5a99bce07d
2012-07-07 14:47:46 +02:00
Daniel Stenberg
07e3ea7f26
RELEASE-NOTES: link to more metalink info
2012-06-25 23:03:52 +02:00
Daniel Stenberg
4afc33db8d
RELEASE-NOTES: synced with d025af9bb5
2012-06-25 23:02:32 +02:00
Yang Tse
819afe46ee
schannel: remove version number and identify its use with 'schannel' literal
...
Version number is removed in order to make this info consistent with
how we do it with other MS and Linux system libraries for which we don't
provide this info.
Identifier changed from 'WinSSPI' to 'schannel' given that this is the
actual provider of the SSL/TLS support. libcurl can still be built with
SSPI and without SCHANNEL support.
2012-06-13 16:42:48 +02:00
Marc Hoersken
0c86ccc647
sspi: Updated RELEASE-NOTES, FEATURES and THANKS
2012-06-11 19:00:37 +02:00
Steve Holme
c09c621af7
pop3: Added support for apop authentication
2012-06-09 13:49:37 +01:00
Kamil Dudka
68857e40d6
ssl: fix duplicated SSL handshake with multi interface and proxy
...
Bug: https://bugzilla.redhat.com/788526
Reported by: Enrico Scholz
2012-06-08 23:27:11 +02:00
Steve Holme
7759d10f36
pop3: Added support for sasl digest-md5 authentication
2012-06-04 21:50:16 +01:00
Steve Holme
79c2af3082
RELEASE-NOTES: Added missing addition of sasl login support
2012-06-03 19:28:08 +01:00
Steve Holme
8c0bfd3e0c
pop3: Added support for sasl cram-md5 authentication
2012-06-03 19:13:16 +01:00
Daniel Stenberg
4cff10af69
RELEASE-NOTES: synced with c4e3578e4b
...
Also bumped the contributor number and next release is to become 7.27.0
2012-06-03 13:51:54 +02:00
Steve Holme
69ba0da827
pop3: Fixed the issue of having to supply the user name for all requests
...
Previously it wasn't possible to connect to POP3 and not specify the
user name as a CURLE_ACCESS_DENIED error would be returned. This error
occurred because USER would be sent to the server with a blank user name
if no mailbox user was specified as the server would reply with -ERR.
This wasn't a problem prior to the 7.26.0 release but with the
introduction of custom commands the user and/or application developer
might want to issue a CAPA command without having to log in as a
specific mailbox user.
Additionally this fix won't send the newly introduced AUTH command if no
user name is specified.
2012-06-02 22:11:37 +01:00
Kamil Dudka
72f4b534c4
nss: use human-readable error messages provided by NSS
...
Bug: http://lists.baseurl.org/pipermail/yum-devel/2012-January/009002.html
2012-05-28 11:24:24 +02:00
Daniel Stenberg
244e966138
bump to 7.26.1: start working towards next release
2012-05-24 18:32:34 +02:00
Daniel Stenberg
c262c35676
RELEASE-NOTES: synced with ef60fdbd73
...
Just before 7.26.0 is about to ship
2012-05-24 18:04:41 +02:00
Daniel Stenberg
cc36756aa2
RELEASE-NOTES: synced with 8ae1e657e8
...
And mention that this will become 7.26.0
2012-05-22 10:54:55 +02:00
Daniel Stenberg
6f998400d9
REALEASE-NOTES: synced with 64f48e884e
2012-04-29 23:10:37 +02:00