summaryrefslogtreecommitdiff
path: root/packages/OS400
Commit message (Collapse)AuthorAgeFilesLines
* OS400: Fix symbolsJay Satiro2017-02-013-5/+7
| | | | | | | | | | | | - s/CURLOPT_SOCKS_PROXY/CURLOPT_PRE_PROXY Follow-up to 7907a2b and 845522c. - Fix incorrect id for CURLOPT_PROXY_PINNEDPUBLICKEY. - Add id for CURLOPT_ABSTRACT_UNIX_SOCKET. Bug: https://github.com/curl/curl/issues/1237 Reported-by: jonrumsey@users.noreply.github.com
* os400: support CURLOPT_PROXY_PINNEDPUBLICKEYPatrick Monnerat2016-11-263-0/+6
| | | | Also define it in ILE/RPG binding.
* os400: sync ILE/RPG bindingPatrick Monnerat2016-11-253-11/+16
|
* proxy: Support HTTPS proxy and SOCKS+HTTP(s)Alex Rousskov2016-11-243-0/+66
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * HTTPS proxies: An HTTPS proxy receives all transactions over an SSL/TLS connection. Once a secure connection with the proxy is established, the user agent uses the proxy as usual, including sending CONNECT requests to instruct the proxy to establish a [usually secure] TCP tunnel with an origin server. HTTPS proxies protect nearly all aspects of user-proxy communications as opposed to HTTP proxies that receive all requests (including CONNECT requests) in vulnerable clear text. With HTTPS proxies, it is possible to have two concurrent _nested_ SSL/TLS sessions: the "outer" one between the user agent and the proxy and the "inner" one between the user agent and the origin server (through the proxy). This change adds supports for such nested sessions as well. A secure connection with a proxy requires its own set of the usual SSL options (their actual descriptions differ and need polishing, see TODO): --proxy-cacert FILE CA certificate to verify peer against --proxy-capath DIR CA directory to verify peer against --proxy-cert CERT[:PASSWD] Client certificate file and password --proxy-cert-type TYPE Certificate file type (DER/PEM/ENG) --proxy-ciphers LIST SSL ciphers to use --proxy-crlfile FILE Get a CRL list in PEM format from the file --proxy-insecure Allow connections to proxies with bad certs --proxy-key KEY Private key file name --proxy-key-type TYPE Private key file type (DER/PEM/ENG) --proxy-pass PASS Pass phrase for the private key --proxy-ssl-allow-beast Allow security flaw to improve interop --proxy-sslv2 Use SSLv2 --proxy-sslv3 Use SSLv3 --proxy-tlsv1 Use TLSv1 --proxy-tlsuser USER TLS username --proxy-tlspassword STRING TLS password --proxy-tlsauthtype STRING TLS authentication type (default SRP) All --proxy-foo options are independent from their --foo counterparts, except --proxy-crlfile which defaults to --crlfile and --proxy-capath which defaults to --capath. Curl now also supports %{proxy_ssl_verify_result} --write-out variable, similar to the existing %{ssl_verify_result} variable. Supported backends: OpenSSL, GnuTLS, and NSS. * A SOCKS proxy + HTTP/HTTPS proxy combination: If both --socks* and --proxy options are given, Curl first connects to the SOCKS proxy and then connects (through SOCKS) to the HTTP or HTTPS proxy. TODO: Update documentation for the new APIs and --proxy-* options. Look for "Added in 7.XXX" marks.
* vtls: support TLS 1.3 via CURL_SSLVERSION_TLSv1_3Kamil Dudka2016-11-071-0/+2
| | | | | | Fully implemented with the NSS backend only for now. Reviewed-by: Ray Satiro
* New libcurl option to keep sending on errorMichael Kaufmann2016-09-221-0/+2
| | | | | | | | | | | | Add the new option CURLOPT_KEEP_SENDING_ON_ERROR to control whether sending the request body shall be completed when the server responds early with an error status code. This is suitable for manual NTLM authentication. Reviewed-by: Jay Satiro Closes https://github.com/curl/curl/pull/904
* errors: new alias CURLE_WEIRD_SERVER_REPLY (8)Jay Satiro2016-09-071-0/+2
| | | | | | | | Since we're using CURLE_FTP_WEIRD_SERVER_REPLY in imap, pop3 and smtp as more of a generic "failed to parse" introduce an alias without FTP in the name. Closes https://github.com/curl/curl/pull/975
* os400: define BUILDING_LIBCURL in make script.Patrick Monnerat2016-08-022-2/+2
|
* os400: minimum supported OS version: V6R1M0.Patrick Monnerat2016-07-251-2/+2
| | | | Do not log compilation informational messages.
* internals: rename the SessionHandle struct to Curl_easyDaniel Stenberg2016-06-221-4/+4
|
* os400: add new definitions to ILE/RPG binding.Patrick Monnerat2016-06-161-1/+10
|
* os400: upgrade ILE/RPG bindingPatrick Monnerat2016-04-221-0/+6
|
* http2: Add handling stream level errorTatsuhiro Tsujikawa2016-04-111-0/+2
| | | | | | | | | | | | | Previously, when a stream was closed with other than NGHTTP2_NO_ERROR by RST_STREAM, underlying TCP connection was dropped. This is undesirable since there may be other streams multiplexed and they are very much fine. This change introduce new error code CURLE_HTTP2_STREAM, which indicates stream error that only affects the relevant stream, and connection should be kept open. The existing CURLE_HTTP2 means connection error in general. Ref: https://github.com/curl/curl/issues/659 Ref: https://github.com/curl/curl/pull/663
* os400: Fix ILE/RPG definition of CURLOPT_TFTP_NO_OPTIONSPatrick Monnerat2016-02-241-1/+1
|
* getinfo: CURLINFO_TLS_SSL_PTR supersedes CURLINFO_TLS_SESSIONJay Satiro2016-02-232-0/+3
| | | | | | | | | | | | | | | | | | | | | The two options are almost the same, except in the case of OpenSSL: CURLINFO_TLS_SESSION OpenSSL session internals is SSL_CTX *. CURLINFO_TLS_SSL_PTR OpenSSL session internals is SSL *. For backwards compatibility we couldn't modify CURLINFO_TLS_SESSION to return an SSL pointer for OpenSSL. Also, add support for the 'internals' member to point to SSL object for the other backends axTLS, PolarSSL, Secure Channel, Secure Transport and wolfSSL. Bug: https://github.com/curl/curl/issues/234 Reported-by: dkjjr89@users.noreply.github.com Bug: https://curl.haxx.se/mail/lib-2015-09/0127.html Reported-by: Michael König
* TFTP: add option to suppress TFTP option requests (Part 1)Michael Koenig2016-02-231-0/+2
| | | | | | | | | | | Some TFTP server implementations ignore the "TFTP Option extension" (RFC 1782-1784, 2347-2349), or implement it in a flawed way, causing problems with libcurl. Another switch for curl_easy_setopt "CURLOPT_TFTP_NO_OPTIONS" is introduced which prevents libcurl from sending TFTP option requests to a server, avoiding many problems caused by faulty implementations. Bug: https://github.com/curl/curl/issues/481
* os400: sync ILE/RPG definitions with latest public header files.Patrick Monnerat2016-02-081-0/+2
|
* URLs: change all http:// URLs to https://Daniel Stenberg2016-02-035-5/+5
|
* os400: define CURL_VERSION_PSL in ILE/RPG bindingPatrick Monnerat2015-12-071-0/+2
|
* os400: synchronize ILE/RPG header filePatrick Monnerat2015-11-191-0/+2
|
* os400: Provide options for libssh2 use in compile scripts. Adjust README.Patrick Monnerat2015-11-193-6/+35
|
* os400: adjust specific code to support new options.Patrick Monnerat2015-11-052-7/+30
|
* os400: include new options in wrappers and update ILE/RPG binding.Patrick Monnerat2015-08-243-0/+9
|
* os400: ebcdic wrappers for new functions. Upgrade ILE/RPG bindings.Patrick Monnerat2015-07-215-5/+110
|
* OS400: Add SPNEGO service name options to ILE/RPG binding.Patrick Monnerat2015-05-053-4/+10
|
* Negotiate: custom service names for SPNEGO.Linus Nielsen2015-04-281-0/+2
| | | | | * Add new options, CURLOPT_PROXY_SERVICE_NAME and CURLOPT_SERVICE_NAME. * Add new curl options, --proxy-service-name and --service-name.
* os400: define new options in ILE/RPG binding.Patrick Monnerat2015-03-241-1/+5
|
* Bug #149: Deletion of unnecessary checks before calls of the function "free"Markus Elfring2015-03-162-48/+15
| | | | | | | | | | | The function "free" is documented in the way that no action shall occur for a passed null pointer. It is therefore not needed that a function caller repeats a corresponding check. http://stackoverflow.com/questions/18775608/free-a-null-pointer-anyway-or-check-first This issue was fixed by using the software Coccinelle 1.0.0-rc24. Signed-off-by: Markus Elfring <elfring@users.sourceforge.net>
* OS400: CURLOPT_SSL_VERIFYSTATUS for ILE/RPG too.Patrick Monnerat2015-01-191-0/+4
|
* OS400: enable NTLM authenticationPatrick Monnerat2014-12-051-0/+7
|
* OS400: enable Unix sockets.Patrick Monnerat2014-12-042-1/+3
|
* libcurl: add UNIX domain sockets supportPeter Wu2014-12-041-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The ability to do HTTP requests over a UNIX domain socket has been requested before, in Apr 2008 [0][1] and Sep 2010 [2]. While a discussion happened, no patch seems to get through. I decided to give it a go since I need to test a nginx HTTP server which listens on a UNIX domain socket. One patch [3] seems to make it possible to use the CURLOPT_OPENSOCKETFUNCTION function to gain a UNIX domain socket. Another person wrote a Go program which can do HTTP over a UNIX socket for Docker[4] which uses a special URL scheme (though the name contains cURL, it has no relation to the cURL library). This patch considers support for UNIX domain sockets at the same level as HTTP proxies / IPv6, it acts as an intermediate socket provider and not as a separate protocol. Since this feature affects network operations, a new feature flag was added ("unix-sockets") with a corresponding CURL_VERSION_UNIX_SOCKETS macro. A new CURLOPT_UNIX_SOCKET_PATH option is added and documented. This option enables UNIX domain sockets support for all requests on the handle (replacing IP sockets and skipping proxies). A new configure option (--enable-unix-sockets) and CMake option (ENABLE_UNIX_SOCKETS) can disable this optional feature. Note that I deliberately did not mark this feature as advanced, this is a feature/component that should easily be available. [0]: http://curl.haxx.se/mail/lib-2008-04/0279.html [1]: http://daniel.haxx.se/blog/2008/04/14/http-over-unix-domain-sockets/ [2]: http://sourceforge.net/p/curl/feature-requests/53/ [3]: http://curl.haxx.se/mail/lib-2008-04/0361.html [4]: https://github.com/Soulou/curl-unix-socket Signed-off-by: Peter Wu <peter@lekensteyn.nl>
* smb: Added SMB protocol and port definitionsBill Nagel2014-11-291-0/+4
| | | | | Added the necessary protocol and port definitions in order to support SMB/CIFS.
* version info: Added Kerberos V5 to the supported featuresSteve Holme2014-11-071-0/+2
|
* Adjust OS400-specific support to last releasePatrick Monnerat2014-11-051-1/+2
|
* OS400: fix bugs in curl_*escape_ccsid() and reduce variables scopePatrick Monnerat2014-10-142-29/+21
|
* vtls: remove QsoSSLPatrick Monnerat2014-10-134-112/+7
|
* gskit: supply dummy randomization functionPatrick Monnerat2014-10-131-1/+1
|
* OS400: upgrade interface for pinned public key (no implementation yet)Patrick Monnerat2014-10-083-0/+6
|
* GSSAPI: private export mechanisms OIDs. OS400: Make RPG binding up to date.Patrick Monnerat2014-07-231-4/+5
|
* OS400: make it compilable again. Make RPG binding up to date.Patrick Monnerat2014-06-183-25/+67
|
* OS400: Add new options to RPG binding.Patrick Monnerat2014-02-141-0/+6
|
* login options: remove the ;[options] support from CURLOPT_USERPWDDaniel Stenberg2013-12-143-3/+3
| | | | | | | | | | | | | | | To avoid the regression when users pass in passwords containing semi- colons, we now drop the ability to set the login options with the same options. Support for login options in CURLOPT_USERPWD was added in 7.31.0. Test case 83 was modified to verify that colons and semi-colons can be used as part of the password when using -u (CURLOPT_USERPWD). Bug: http://curl.haxx.se/bug/view.cgi?id=1311 Reported-by: Petr Bahula Assisted-by: Steve Holme Signed-off-by: Daniel Stenberg <daniel@haxx.se>
* OS400: sync wrappers and RPG binding.Patrick Monnerat2013-12-022-3/+41
|
* curl_easy_setopt: Added the ability to set the login options separatelySteve Holme2013-11-123-0/+4
| | | | | | Rather than set the authentication options as part of the login details specified in the URL, or via the older CURLOPT_USERPWD option, added a new libcurl option to allow the login options to be set separately.
* OS400: coding style standardsPatrick Monnerat2013-10-283-131/+133
|
* OS400: sync RPG wrapper, zlib support, fix header file names, ...Patrick Monnerat2013-10-259-106/+233
| | | | | IFS compilation support, SSL GSKit backend by default, TLSv1.[12] support in GSKit for OS400 >= V7R1, no more tabs in make scripts.
* SSL: protocol version can be specified more preciselyGergely Nagy2013-10-151-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CURL_SSLVERSION_TLSv1_0, CURL_SSLVERSION_TLSv1_1, CURL_SSLVERSION_TLSv1_2 enum values are added to force exact TLS version (CURL_SSLVERSION_TLSv1 means TLS 1.x). axTLS: axTLS only supports TLS 1.0 and 1.1 but it cannot be set that only one of these should be used, so we don't allow the new enum values. darwinssl: Added support for the new enum values. SChannel: Added support for the new enum values. CyaSSL: Added support for the new enum values. Bug: The original CURL_SSLVERSION_TLSv1 value enables only TLS 1.0 (it did the same before this commit), because CyaSSL cannot be configured to use TLS 1.0-1.2. GSKit: GSKit doesn't seem to support TLS 1.1 and TLS 1.2, so we do not allow those values. Bugfix: There was a typo that caused wrong SSL versions to be passed to GSKit. NSS: TLS minor version cannot be set, so we don't allow the new enum values. QsoSSL: TLS minor version cannot be set, so we don't allow the new enum values. OpenSSL: Added support for the new enum values. Bugfix: The original CURL_SSLVERSION_TLSv1 value enabled only TLS 1.0, now it enables 1.0-1.2. Command-line tool: Added command line options for the new values.
* OS400: sync ILE/RPG binding with current curl.hPatrick Monnerat2013-07-241-0/+25
|
* OS400: new SSL backend GSKitPatrick Monnerat2013-07-153-18/+442
|