- May 09, 2013
-
-
Daniel Stenberg authored
Reported by: David Strauss Bug: http://curl.haxx.se/mail/lib-2013-05/0088.html
-
- May 07, 2013
-
-
Daniel Stenberg authored
Bug: http://curl.haxx.se/bug/view.cgi?id=1220 Patch by: John Gardiner Myers
-
- May 05, 2013
-
-
Marc Hoersken authored
-
- May 04, 2013
-
-
Steve Holme authored
-
Steve Holme authored
comparison between signed and unsigned integer expressions
-
Steve Holme authored
-
Steve Holme authored
If the mail sent during the transfer contains a terminating <CRLF> then we should not send the first <CRLF> of the EOB as specified in RFC-5321. Additionally don't send the <CRLF> if there is "no mail data" as the DATA command already includes it.
-
- May 01, 2013
-
-
Lars Johannesen authored
The code within #ifdef HAVE_SOCKADDR_IN6_SIN6_SCOPE_ID wrongly had two closing braces when it should only have one, so builds without that define would fail. Bug: http://curl.haxx.se/mail/lib-2013-05/0000.html
-
- Apr 30, 2013
-
-
Steve Holme authored
Move the eob counter from the smtp_conn structure to the SMTP structure as it is associated with a SMTP payload on a per-request basis.
-
- Apr 29, 2013
-
-
Steve Holme authored
The curl command line utility would display the the completed progress bar with a percentage of zero as the progress routines didn't know the size of the transfer.
-
- Apr 28, 2013
-
-
Steve Holme authored
Removed the hard returns from imap and pop3 by using the same style for sending the authentication string as smtp. Moved the "Other mechanisms not supported" check in smtp to match that of imap and pop3 to provide consistency between the three email protocols.
-
Steve Holme authored
-
Steve Holme authored
Added 255 octet limit check as per Section 4. Paragraph 8 of RFC-5034.
-
Nick Zitzmann authored
Users using the Secure Transport (darwinssl) back-end can now use a certificate and private key to authenticate with a site using TLS. Because Apple's security system is based around the keychain and does not have any non-public function to create a SecIdentityRef data structure from data loaded outside of the Keychain, the certificate and private key have to be loaded into the Keychain first (using the certtool command line tool or the Security framework's C API) before we can find it and use it.
-
- Apr 27, 2013
-
-
Steve Holme authored
In addition to checking for the SASL-IR capability the user can override the sending of the client's initial response in the AUTHENTICATION command with the use of CURLOPT_SASL_IR should the server erroneously not report SASL-IR when it does support it.
-
Steve Holme authored
Updated the default behaviour of sending the client's initial response in the AUTH command to not send it and added support for CURLOPT_SASL_IR to allow the user to specify including the response. Related Bug: http://curl.haxx.se/mail/lib-2012-03/0114.html Reported-by: Gokhan Sengun
-
Steve Holme authored
Allowed the user to specify whether to send the client's intial response in the AUTH command via CURLOPT_SASL_IR.
-
Steve Holme authored
-
- Apr 26, 2013
-
-
Daniel Stenberg authored
By introducing an internal alternative to curl_multi_init() that accepts parameters to set the hash sizes, easy handles will now use tiny socket and connection hash tables since it will only ever add a single easy handle to that multi handle. This decreased the number mallocs in test 40 (which is a rather simple and typical easy interface use case) from 1142 to 138. The maximum amount of memory allocated used went down from 118969 to 78805.
-
Daniel Stenberg authored
When connecting back to an FTP server after having sent PASV/EPSV, libcurl sometimes didn't use the proxy properly even though the proxy was used for the initial connect. The function wrongly checked for the CURLOPT_PROXY variable to be set, which made it act wrongly if the proxy information was set with an environment variable. Added test case 711 to verify (based on 707 which uses --socks5). Also added test712 to verify another variation of setting the proxy: with --proxy socks5:// Bug: http://curl.haxx.se/bug/view.cgi?id=1218 Reported-by: Zekun Ni
-
Zdenek Pavlas authored
... in order to prevent an artificial timeout event based on stale speed-check data from a previous network transfer. This commit fixes a regression caused by 9dd85bce. Bug: https://bugzilla.redhat.com/906031
-
- Apr 23, 2013
-
-
Steve Holme authored
-
- Apr 22, 2013
-
-
Alessandro Ghedini authored
Bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705783 Reported-by: Ludovico Cavedon <cavedon@debian.org>
-
- Apr 21, 2013
-
-
Steve Holme authored
Commit 11332577 removed the length check that was performed by the old scanf() code.
-
Steve Holme authored
Fixed an issue in parse_proxy(), introduced in commit 11332577, where an empty username or password (For example: http://:@example.com) would cause a crash.
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
Updated the naming convention of the login parameters to match those of other functions.
-
Steve Holme authored
Tidy up of variable names and comments in setstropt_userpwd() and parse_login_details().
-
- Apr 20, 2013
-
-
Steve Holme authored
There is no need to perform separate clearing of data if a NULL option pointer is passed in. Instead this operation can be performed by simply not calling parse_login_details() and letting the rest of the code do the work.
-
Steve Holme authored
-
Steve Holme authored
setstropt_userpwd() was calling setstropt() in commit fddb7b44 to set each of the login details which would duplicate the strings and subsequently cause a memory leak.
-
Steve Holme authored
-
Steve Holme authored
In addition to parsing the optional login options from the URL, added support for parsing them from CURLOPT_USERPWD, to allow the following supported command line: --user username:password;options
-
- Apr 19, 2013
-
-
Steve Holme authored
Added bounds checking when searching for the separator characters within the login string as this string may not be NULL terminated (For example it is the login part of a URL). We do this in preference to allocating a new string to copy the login details into which could then be passed to parse_login_details() for performance reasons.
-
Steve Holme authored
-
Steve Holme authored
-
- Apr 18, 2013
-
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
signed and unsigned type in conditional expression
-