- Feb 22, 2011
-
-
Daniel Stenberg authored
The stopserver function would append pids to kill and could append them without separating them with space properly. The result would be a very large number that by (some implementations of) kill would be interpreted as a negative number and that process group would be wiped... Bug: http://curl.haxx.se/bug/view.cgi?id=3188836 Reported by: Greg Pratt
-
Kamil Dudka authored
Flaw introduced in fc77790b and present in curl-7.21.4. Bug: https://bugzilla.redhat.com/669702#c16
-
- Feb 21, 2011
-
-
Daniel Stenberg authored
Extend the docs to clarify that CURLOPT_SSH_KEYFUNCTION is only called if the known hosts option is also correctly set!
-
Julien Chaffraix authored
CURLOPT_HTTPAUTH was mentioning CURLOPT_USERPASSWORD instead of CURLOPT_PASSWORD. Reported by: Mike Henshaw
-
Julien Chaffraix authored
This is not needed anymore as we have unit testing running on it.
-
Julien Chaffraix authored
Removed the "netrc_debug" keyword replaced with --netrc-file additions. Removed the debug code from Curl_parsenetrc as it is superseeded by --netrc-file.
-
Julien Chaffraix authored
This enables people to specify a path to the netrc file to use. The new option override --netrc if both are present. However it does follow --netrc-optional if specified.
-
- Feb 18, 2011
-
-
Mike Crowe authored
After a request times out, the connection wasn't properly closed and prevented to get re-used, so subsequent transfers could still mistakenly get to use the previously aborted connection.
-
Daniel Stenberg authored
When failing to connect the protocol during the CURLM_STATE_PROTOCONNECT state, Curl_done() has to be called with the premature flag set TRUE as for the pingpong protocols this can be important. When Curl_done() is called with premature == TRUE, it needs to call Curl_disconnect() with its 'dead_connection' argument set to TRUE as well so that any protocol handler's disconnect function won't attempt to use the (control) connection for anything. This problem caused the pingpong protocols to fail to disconnect when STARTTLS failed. Reported by: Alona Rossen Bug: http://curl.haxx.se/mail/lib-2011-02/0195.html
-
Hoi-Ho Chan authored
Signed-off-by: Hoi-Ho Chan <hoiho.chan@gmail.com>
-
- Feb 17, 2011
-
-
Daniel Stenberg authored
I forgot to sort it when I added the CURL_SOCKOPT_* symbols
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Introducing a few CURL_SOCKOPT* defines for conveniance. The new CURL_SOCKOPT_ALREADY_CONNECTED signals to libcurl that the socket is to be treated as already connected and thus it will skip the connect() call.
-
Kamil Dudka authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Guenter Knauf authored
-
Daniel Stenberg authored
I went through all the names mentioned as authors and in commit messages since 7.21.3, and this list inserted now is sorted on first name.
-
- Feb 16, 2011
-
-
Daniel Stenberg authored
-
- Feb 14, 2011
-
-
Daniel Stenberg authored
It turns out some systems rely on the gmtime or gmtime_r to be defined already in the system headers and thus my "precaution" redefining of them only caused trouble. They are now removed.
-
- Feb 13, 2011
-
-
Guenter Knauf authored
-
Guenter Knauf authored
-
- Feb 10, 2011
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Since the feature requires support for TCP_KEEPIDLE and TCP_KEEPINTVL to function as documented, it now warns if that support is missing when the option is used.
-
Dan Fandrich authored
The latter isn't available in older OpenSSL versions, and is less useful since it returns the most recent error instead of the first one encountered.
-
Julien Chaffraix authored
Unset the environment variable so that we can specify different filenames in the unit test.
-
Julien Chaffraix authored
Moved some definitons into the header file so that we can reuse them.
-
- Feb 09, 2011
-
-
Quinn Slack authored
On second thought, I think CURLE_TLSAUTH_FAILED should be eliminated. It was only being raised when an internal error occurred while allocating or setting the GnuTLS SRP client credentials struct. For TLS authentication failures, the general CURLE_SSL_CONNECT_ERROR seems appropriate; its error string already includes "passwords" as a possible cause. Having a separate TLS auth error code might also cause people to think that a TLS auth failure means the wrong username or password was entered, when it could also be a sign of a man-in-the-middle attack.
-
Quinn Slack authored
-
Daniel Stenberg authored
When the callback returns an error, this function must make sure to return CURLE_ABORTED_BY_CALLBACK properly and not CURLE_OK as before to allow the callback to properly abort the operation.
-
- Feb 08, 2011
-
-
Daniel Stenberg authored
Reported by: Ian D Allen Bug: https://bugs.launchpad.net/ubuntu/+source/curl/+bug/714895 Forwarded to us by: Reported by: Andreas Olsson Bug: http://curl.haxx.se/bug/view.cgi?id=3175422
-
Julien Chaffraix authored
The main has not been updated from some time and is out of sync with the code. The code is now tested by several test cases so no need for a seperate code path.
-
Julien Chaffraix authored
The state should not be anonymous so that we can check if the values are fine. Added 2 unreachables states to the switch as a result of this change.
-
Julien Chaffraix authored
-
- Feb 07, 2011
-
-
Daniel Stenberg authored
Document Curl_gmtime() and define away the old functions so that they won't be used internally again by mistake.
-
Daniel Stenberg authored
Instead of polluting many places with #ifdefs, we create a single place for this function, and also check return code properly so that a NULL pointer returned won't cause problems.
-
- Feb 03, 2011
-
-
Guenter Knauf authored
The official Mozilla page at http://www.mozilla.org/projects/security/certs/ points out a new place as the "proper" place to get Mozilla's CA certs from so this script is now updated to use that instead. Reported by: Daniel Mentz
-
- Feb 02, 2011
-
-
Daniel Stenberg authored
The official Mozilla page at http://www.mozilla.org/projects/security/certs/ points out a new place as the "proper" place to get Mozilla's CA certs from so this script is now updated to use that instead. Reported by: Daniel Mentz
-