Skip to content
Snippets Groups Projects
  1. Feb 23, 2016
  2. Feb 20, 2016
  3. Feb 17, 2016
    • Daniel Stenberg's avatar
      http2: don't decompress gzip decoding automatically · eb083e0d
      Daniel Stenberg authored
      At one point during the development of HTTP/2, the commit 133cdd29
      introduced automatic decompression of Content-Encoding as that was what
      the spec said then. Now however, HTTP/2 should work the same way as
      HTTP/1 in this regard.
      
      Reported-by: Kazuho Oku
      
      Closes #661
      eb083e0d
  4. Feb 16, 2016
  5. Feb 15, 2016
  6. Feb 14, 2016
  7. Feb 12, 2016
  8. Feb 10, 2016
  9. Feb 09, 2016
    • Rafael Antonio's avatar
      c62d7944
    • Daniel Stenberg's avatar
      mbedtls: fix ALPN usage segfault · 716302c2
      Daniel Stenberg authored
      Since we didn't keep the input argument around after having called
      mbedtls, it could end up accessing the wrong memory when figuring out
      the ALPN protocols.
      
      Closes #642
      716302c2
    • David Benjamin's avatar
      openssl: remove most BoringSSL #ifdefs. · 39c803cb
      David Benjamin authored
      As of https://boringssl-review.googlesource.com/#/c/6980/, almost all of
      BoringSSL #ifdefs in cURL should be unnecessary:
      
      - BoringSSL provides no-op stubs for compatibility which replaces most
        #ifdefs.
      
      - DES_set_odd_parity has been in BoringSSL for nearly a year now. Remove
        the compatibility codepath.
      
      - With a small tweak to an extend_key_56_to_64 call, the NTLM code
        builds fine.
      
      - Switch OCSP-related #ifdefs to the more generally useful
        OPENSSL_NO_OCSP.
      
      The only #ifdefs which remain are Curl_ossl_version and the #undefs to
      work around OpenSSL and wincrypt.h name conflicts. (BoringSSL leaves
      that to the consumer. The in-header workaround makes things sensitive to
      include order.)
      
      This change errs on the side of removing conditionals despite many of
      the restored codepaths being no-ops. (BoringSSL generally adds no-op
      compatibility stubs when possible. OPENSSL_VERSION_NUMBER #ifdefs are
      bad enough!)
      
      Closes #640
      39c803cb
  10. Feb 08, 2016
  11. Feb 07, 2016
  12. Feb 06, 2016
  13. Feb 04, 2016
  14. Feb 03, 2016
  15. Feb 02, 2016
  16. Jan 29, 2016
  17. Jan 28, 2016
  18. Jan 26, 2016
  19. Jan 18, 2016
    • Jay Satiro's avatar
      mbedtls: Fix pinned key return value on fail · d58ba66e
      Jay Satiro authored
      - Switch from verifying a pinned public key in a callback during the
      certificate verification to inline after the certificate verification.
      
      The callback method had three problems:
      
      1. If a pinned public key didn't match, CURLE_SSL_PINNEDPUBKEYNOTMATCH
      was not returned.
      
      2. If peer certificate verification was disabled the pinned key
      verification did not take place as it should.
      
      3. (related to #2) If there was no certificate of depth 0 the callback
      would not have checked the pinned public key.
      
      Though all those problems could have been fixed it would have made the
      code more complex. Instead we now verify inline after the certificate
      verification in mbedtls_connect_step2.
      
      Ref: http://curl.haxx.se/mail/lib-2016-01/0047.html
      Ref: https://github.com/bagder/curl/pull/601
      d58ba66e
  20. Jan 15, 2016
  21. Jan 14, 2016
  22. Jan 11, 2016
    • Daniel Stenberg's avatar
      ConnectionExists: only do pipelining/multiplexing when asked · 13b6d3b7
      Daniel Stenberg authored
      When an HTTP/2 upgrade request fails (no protocol switch), it would
      previously detect that as still possible to pipeline on (which is
      acorrect) and do that when PIPEWAIT was enabled even if pipelining was
      not explictily enabled.
      
      It should only pipelined if explicitly asked to.
      
      Closes #584
      13b6d3b7
    • Mohammad AlSaleh's avatar
      lib: Prefix URLs with lower-case protocol names/schemes · 3d209b5f
      Mohammad AlSaleh authored
      Before this patch, if a URL does not start with the protocol
      name/scheme, effective URLs would be prefixed with upper-case protocol
      names/schemes. This behavior might not be expected by library users or
      end users.
      
      For example, if `CURLOPT_DEFAULT_PROTOCOL` is set to "https". And the
      URL is "hostname/path". The effective URL would be
      "HTTPS://hostname/path" instead of "https://hostname/path
      
      ".
      
      After this patch, effective URLs would be prefixed with a lower-case
      protocol name/scheme.
      
      Closes #597
      
      Signed-off-by: default avatarMohammad AlSaleh <CE.Mohammad.AlSaleh@gmail.com>
      3d209b5f
  23. Jan 10, 2016
  24. Jan 09, 2016
  25. Jan 08, 2016
    • Tatsuhiro Tsujikawa's avatar
      http2: Ensure that http2_handle_stream_close is called · b019af41
      Tatsuhiro Tsujikawa authored
      Previously, when HTTP/2 is enabled and used, and stream has content
      length known, Curl_read was not called when there was no bytes left to
      read. Because of this, we could not make sure that
      http2_handle_stream_close was called for every stream. Since we use
      http2_handle_stream_close to emit trailer fields, they were
      effectively ignored. This commit changes the code so that Curl_read is
      called even if no bytes left to read, to ensure that
      http2_handle_stream_close is called for every stream.
      
      Discussed in https://github.com/bagder/curl/pull/564
      b019af41
Loading