- Dec 13, 2014
-
-
Guenter Knauf authored
worldtimeserver.com seems also no longer available.
-
Guenter Knauf authored
For getting the date header its not necessary to access special pages or even CGI scripts - all pages including the main index reply with the date header, therefore shortened URLs to domain. Removed worldtime.com; added pool.ntp.org.
-
Steve Holme authored
ftp.c:819: warning: unused parameter 'lineno'
-
Steve Holme authored
For debugging purposes, and as per other protocols within curl, added state change functions rather than changing the states directly.
-
Steve Holme authored
-
- Dec 12, 2014
-
-
Steve Holme authored
-
Steve Holme authored
smtp.c:2357 warning: adding 'size_t' (aka 'unsigned long') to a string does not append to the string smtp.c:2375 warning: adding 'size_t' (aka 'unsigned long') to a string does not append to the string smtp.c:2386 warning: adding 'size_t' (aka 'unsigned long') to a string does not append to the string Used array index notation instead.
-
Steve Holme authored
This fixes compilation issues with compilers that don't support 64-bit integers through long long or __int64.
-
Steve Holme authored
This fixes compilation issues with compilers that don't support 64-bit integers through long long or __int64 which was introduced in commit 07b66cbf.
-
Steve Holme authored
Previously USE_NTLM2SESSION would only be defined automatically when USE_NTRESPONSES wasn't already defined. Separated the two definitions so that the user can manually set USE_NTRESPONSES themselves but USE_NTLM2SESSION is defined automatically if they don't define it.
-
Steve Holme authored
-
Steve Holme authored
As the OpenSSL and NSS Crypto engines are prefered by the core NTLM routines, to the Windows Crypt API, don't define USE_WIN32_CRYPT automatically when either OpenSSL or NSS are in use - doing so would disable NTLM2Session responses in NTLM type-3 messages.
-
Steve Holme authored
If the scratch buffer was allocated in a previous call to Curl_smtp_escape_eob(), a new buffer not allocated in the subsequent call and no action taken by that call, then an attempt would be made to try and free the buffer which, by now, would be part of the data->state structure. This bug was introduced in commit 4bd860a0.
-
Steve Holme authored
Fixed a problem with the CRLF. detection when multiple buffers were used to upload an email to libcurl and the line ending character(s) appeared at the end of each buffer. This meant any lines which started with . would not be escaped into .. and could be interpreted as the end of transmission string instead. This only affected libcurl based applications that used a read function and wasn't reproducible with the curl command-line tool. Bug: http://curl.haxx.se/bug/view.cgi?id=1456 Assisted-by: Patrick Monnerat
-
- Dec 11, 2014
-
-
Daniel Stenberg authored
-
- Dec 10, 2014
-
-
Daniel Stenberg authored
... and I could use a break instead of a goto to end the loop. Bug: http://curl.haxx.se/mail/lib-2014-12/0089.html Reported-by: Tor Arntsen
-
Steve Holme authored
Added some bug fixes that I had missed in previous synchronisations.
-
Daniel Stenberg authored
I suspect this causes compile failures on Solaris: Bug: http://curl.haxx.se/mail/lib-2014-12/0081.html
-
Steve Holme authored
url.c:3078: warning: variable 'credentialsMatch' set but not used
-
Steve Holme authored
parsedate.c:548: warning: 'parsed' may be used uninitialized in this function As curl_getdate() returns -1 when parsedate() fails we can initialise parsed to -1.
-
Daniel Stenberg authored
Worth exploring
-
- Dec 09, 2014
-
-
Daniel Stenberg authored
There might be one or two memory leaks left in the error paths.
-
Daniel Stenberg authored
-
Dan Fandrich authored
-
Dan Fandrich authored
This fixes the test 506 torture test. The internal cookie API really ought to be improved to separate cookie parsing errors (which may be ignored) with OOM errors (which should be fatal).
-
Guenter Knauf authored
Some websites meanwhile refuse to reply to requests from ancient browsers like IE6, therefore I've comment out this setting, but also fixed the string to now fake IE8 if someone enables it.
-
Daniel Stenberg authored
-
Patrick Monnerat authored
-
Guenter Knauf authored
-
Daniel Stenberg authored
Bug: http://curl.haxx.se/bug/view.cgi?id=1462 Reported-by: Tae Hyoung Ahn
-
- Dec 08, 2014
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Patrick Monnerat authored
-
- Dec 07, 2014
-
-
Steve Holme authored
As Windows based autoconf builds don't yet define USE_WIN32_CRYPTO either explicitly through --enable-win32-cypto or automatically on _WIN32 based platforms, subsequent builds broke with the following error message: "Can't compile NTLM support without a crypto library."
-
Steve Holme authored
-
Bill Nagel authored
Build SMB/CIFS protocol support when SSPI is enabled.
-
Bill Nagel authored
Allow the use of the Windows Crypt API for NTLMv1 functions.
-
Dan Fandrich authored
Also, fixed the outdated comments on the cookie API.
-
Dan Fandrich authored
This caused a null-pointer dereference which caused a few dozen torture tests to fail.
-