Daniel Stenberg
03bd26852b
bump: work on the next release
2017-02-24 23:48:05 +01:00
Daniel Stenberg
25df50aa33
release: 7.53.1
2017-02-24 08:47:45 +01:00
Daniel Stenberg
656441d915
RELEASE-NOTES: synced with 443e5b03a7
2017-02-23 11:21:44 +01:00
Daniel Stenberg
d3838dc68e
bump: 7.53.1 coming up
...
synced with df665f4df0f7a352
2017-02-23 10:47:44 +01:00
Daniel Stenberg
a7135ac3c3
release: 7.53.0
2017-02-22 00:23:38 +01:00
Daniel Stenberg
563a4b0671
RELEASE-NOTES: synced with af30f1152d
2017-02-20 08:11:17 +01:00
Daniel Stenberg
04aa9645b5
RELEASE-NOTES: synced with 690935390c
2017-02-14 23:19:04 +01:00
Kamil Dudka
8fa5409800
nss: make FTPS work with --proxytunnel
...
If the NSS code was in the middle of a non-blocking handshake and it
was asked to finish the handshake in blocking mode, it unexpectedly
continued in the non-blocking mode, which caused a FTPS connection
over CONNECT to fail with "(81) Socket not ready for send/recv".
Bug: https://bugzilla.redhat.com/1420327
2017-02-09 17:34:14 +01:00
Daniel Stenberg
3726802830
RELEASE-NOTES: synced with 102454459d
2017-02-07 10:44:04 +01:00
Daniel Stenberg
54210fa5b0
RELEASE-NOTES; synced with ab08d82648
2017-01-28 23:58:13 +01:00
Daniel Stenberg
a2bcaa3194
RELEASE-NOTES: synced with 01ab7c30bb
2017-01-20 16:56:05 +01:00
Daniel Stenberg
8f8ba61224
bump: next release will be 7.53.0
2017-01-16 08:34:15 +01:00
Daniel Stenberg
d758e99cef
RELEASE-NOTES: synced with a7c73ae309
2017-01-13 23:26:09 +01:00
Daniel Stenberg
d3a313c099
RELEASE-NOTES: synced with a41e8592d6
2017-01-09 14:54:48 +01:00
Daniel Stenberg
2bb00705bb
RELEASE-NOTES: synced with a7b38c9dc9
2016-12-26 21:12:44 +01:00
Daniel Stenberg
ad4b348c48
bump: toward next release
2016-12-23 23:47:33 +01:00
Daniel Stenberg
44b9b4d4f5
RELEASE-NOTES: curl 7.52.1
2016-12-22 16:41:14 +01:00
Daniel Stenberg
462650e455
bump: toward next release
2016-12-21 12:44:09 +01:00
Daniel Stenberg
7fda9ce46e
RELEASE-NOTES: 7.52.0
2016-12-20 16:16:47 +01:00
Daniel Stenberg
3dcbd06d05
RELEASE-NOTES: synced with 4517158abf
2016-12-18 17:15:09 +01:00
Daniel Stenberg
65c3d3fe94
RELEASE-NOTES: synced with 71a55534fa
2016-12-08 21:08:35 +01:00
Daniel Stenberg
4e8e22c25b
RELEASE-NOTES: synced with 19613fb3
2016-11-28 23:40:48 +01:00
Daniel Stenberg
7d967c80bc
RELEASE-NOTES: update option counters
2016-11-25 00:47:52 +01:00
Daniel Stenberg
54789f9444
RELEASE-NOTES: synced with 63198a4750
2016-11-25 00:31:48 +01:00
Daniel Stenberg
ff662f1c3a
RELEASE-NOTES: synced with 346340808c
2016-11-12 00:09:35 +01:00
Daniel Stenberg
de39e8973f
RELEASE-NOTES: synced with dfcdaaba37
2016-11-09 09:14:44 +01:00
Kamil Dudka
a110a03b43
curl: introduce the --tlsv1.3 option to force TLS 1.3
...
Fully implemented with the NSS backend only for now.
Reviewed-by: Ray Satiro
2016-11-07 12:07:11 +01:00
Kamil Dudka
6ad3add606
vtls: support TLS 1.3 via CURL_SSLVERSION_TLSv1_3
...
Fully implemented with the NSS backend only for now.
Reviewed-by: Ray Satiro
2016-11-07 11:52:07 +01:00
Kamil Dudka
5d45ced7a4
nss: map CURL_SSLVERSION_DEFAULT to NSS default
...
... but make sure we use at least TLSv1.0 according to libcurl API
Reported-by: Cure53
Reviewed-by: Ray Satiro
2016-11-07 11:51:33 +01:00
Daniel Stenberg
71cfce9ce7
bump: start working on 7.51.1
2016-11-03 10:08:26 +01:00
Daniel Stenberg
1fe755f99d
RELEASE-NOTES: 7.51.0
2016-11-02 07:34:06 +01:00
Daniel Stenberg
9934f4fe9f
RELEASE-NOTES: synced with d14538d250
2016-10-31 10:50:32 +01:00
Martin Frodl
eb84412b33
nss: fix tight loop in non-blocking TLS handhsake over proxy
...
... in case the handshake completes before entering
CURLM_STATE_PROTOCONNECT
Bug: https://bugzilla.redhat.com/1388162
2016-10-25 11:56:37 +02:00
Daniel Stenberg
c30a2d97ed
RELEASE-NOTES: synced with 50ee3aaf1a
2016-10-24 08:03:07 +02:00
Daniel Stenberg
97dfe38641
RELEASE-NOTES: synced with f36f8c1455
2016-10-18 17:17:54 +02:00
Daniel Stenberg
f7d6bdca6c
RELEASE-NOTES: synced with a1a5cd0487
2016-10-16 13:31:42 +02:00
Daniel Stenberg
8c2b5580a6
RELEASE-NOTES: spellfix
2016-10-10 08:14:28 +02:00
Daniel Stenberg
f68042a2a5
RELEASE-NOTES: synced with 8272049062
...
5 more fixes, 2 more contributors
2016-10-10 08:13:01 +02:00
Daniel Stenberg
6bf909d5ce
RELEASE-NOTES: synced with 8fd2a754f0
2016-10-04 23:50:52 +02:00
Kamil Dudka
d1f1c857ad
nss: add chacha20-poly1305 cipher suites if supported by NSS
2016-09-22 10:20:12 +02:00
Daniel Stenberg
6834ebaaa3
RELEASE-NOTES: synced with 79607eec51
2016-09-19 23:58:55 +02:00
Daniel Stenberg
4ba1569ad1
RELEASE-NOTES: reset and go toward 7.51.0 (again)
2016-09-14 09:00:00 +02:00
Daniel Stenberg
0b4a85352b
RELEASE-NOTES: curl 7.50.3
2016-09-14 07:56:11 +02:00
Daniel Stenberg
4a35bbbe8e
RELEASE-NOTES: synced with 665694979b
2016-09-13 15:09:29 +02:00
Daniel Stenberg
d58682f28b
RELEASE-NOTES: synced with 257bf3ac67
2016-09-11 00:06:17 +02:00
Daniel Stenberg
add8ee7d57
bump: toward 7.51.0
2016-09-07 15:45:24 +02:00
Daniel Stenberg
9ce6d0d528
RELEASE-NOTES: curl 7.50.2 release
2016-09-07 07:45:43 +02:00
Daniel Stenberg
72abf4f59e
RELEASE-NOTES: synced with 3d4c0c8b9b
2016-09-05 14:55:01 +02:00
Steve Holme
8a529ef01d
RELEASE-NOTES: Added missing fix from commit 15592143f
2016-08-27 11:10:17 +01:00
Peter Wang
3a5d5de9ef
nss: work around race condition in PK11_FindSlotByName()
...
Serialise the call to PK11_FindSlotByName() to avoid spurious errors in
a multi-threaded environment. The underlying cause is a race condition
in nssSlot_IsTokenPresent().
Bug: https://bugzilla.mozilla.org/1297397
Closes #985
2016-08-26 14:42:22 +02:00