97b14fd700
This brings curl to version 7.43.0 and contains fixes for the following security vulnerabilities: CVE-2015-3236: lingering HTTP credentials in connection re-use http://curl.haxx.se/docs/adv_20150617A.html CVE-2015-3237: SMB send off unrelated memory contents http://curl.haxx.se/docs/adv_20150617B.html The 100-check_long_long patch is not needed any more, because the upstream autoconf script already checks for long long when cyassl is selected. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> SVN-Revision: 46169
25 lines
808 B
Diff
25 lines
808 B
Diff
--- a/lib/curl_ntlm_msgs.c
|
|
+++ b/lib/curl_ntlm_msgs.c
|
|
@@ -569,7 +569,7 @@ CURLcode Curl_sasl_create_ntlm_type3_mes
|
|
else
|
|
#endif
|
|
|
|
-#if USE_NTRESPONSES && USE_NTLM2SESSION
|
|
+#if USE_NTRESPONSES && USE_NTLM2SESSION && !defined(CURL_DISABLE_CRYPTO_AUTH)
|
|
/* We don't support NTLM2 if we don't have USE_NTRESPONSES */
|
|
if(ntlm->flags & NTLMFLAG_NEGOTIATE_NTLM2_KEY) {
|
|
unsigned char ntbuffer[0x18];
|
|
--- a/lib/vtls/vtls.c
|
|
+++ b/lib/vtls/vtls.c
|
|
@@ -852,9 +852,9 @@ CURLcode Curl_ssl_md5sum(unsigned char *
|
|
unsigned char *md5sum, /* output */
|
|
size_t md5len)
|
|
{
|
|
-#ifdef curlssl_md5sum
|
|
+#if defined(curlssl_md5sum)
|
|
curlssl_md5sum(tmp, tmplen, md5sum, md5len);
|
|
-#else
|
|
+#elif !defined(CURL_DISABLE_CRYPTO_AUTH)
|
|
MD5_context *MD5pw;
|
|
|
|
(void) md5len;
|