- Nov 07, 2012
-
-
Daniel Stenberg authored
The logic previously checked for a started NTLM negotiation only for host and not also with proxy, leading to problems doing POSTs over a proxy NTLM that are larger than 2000 bytes. Now it includes proxy in the check. Bug: http://curl.haxx.se/bug/view.cgi?id=3582321 Reported by: John Suprock
-
Lars Buitinck authored
-
- Nov 06, 2012
-
-
Daniel Stenberg authored
The bug report claimed it didn't work. This problem was probably fixed in 473003fb. Bug: http://curl.haxx.se/bug/view.cgi?id=3581898
-
Daniel Stenberg authored
The existing logic only cut off the fragment from the separate 'path' buffer which is used when sending HTTP to hosts. The buffer that held the full URL used for proxies were not dealt with. It is now. Test case 5 was updated to use a fragment on a URL over a proxy. Bug: http://curl.haxx.se/bug/view.cgi?id=3579813
-
Daniel Stenberg authored
Bug: http://curl.haxx.se/bug/view.cgi?id=3579286
-
Daniel Stenberg authored
-
Daniel Stenberg authored
With the reversion of ce8311c7 and the new clear logic, this flaw is present and we allow it.
-
Daniel Stenberg authored
As a handle can be re-used after having done HTTP auth in a previous request, it must make sure to clear out the HTTP types that aren't wanted in this new request.
-
Daniel Stenberg authored
This test case verifies that bug 3582718 is fixed. Bug: http://curl.haxx.se/bug/view.cgi?id=3582718 Reported by: Nick Zitzmann (originally)
-
Daniel Stenberg authored
This reverts commit ce8311c7. The commit made test 2024 work but caused a regression with repeated Digest authentication. We need to fix this differently.
-
Daniel Stenberg authored
After a research team wrote a document[1] that found several live source codes out there in the wild that misused the CURLOPT_SSL_VERIFYHOST option thinking it was a boolean, this change now bans 1 as a value and will make libcurl return error for it. 1 was never a sensible value to use in production but was introduced back in the days to help debugging. It was always documented clearly this way. 1 was never supported by all SSL backends in libcurl, so this cleanup makes the treatment of it unified. The report's list of mistakes for this option were all PHP code and while there's a binding layer between libcurl and PHP, the PHP team has decided that they have an as thin layer as possible on top of libcurl so they will not alter or specifically filter a 'TRUE' value for this particular option. I sympathize with that position. [1] = http://daniel.haxx.se/blog/2012/10/25/libcurl-claimed-to-be-dangerous/
-
Daniel Stenberg authored
-
Alessandro Ghedini authored
-
Alessandro Ghedini authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Nov 05, 2012
-
-
Dave Reisner authored
Since automake 1.12.4, the warnings are issued on running automake: warning: 'INCLUDES' is the old name for 'AM_CPPFLAGS' (or '*_CPPFLAGS') Avoid INCLUDES and roll these flags into AM_CPPFLAGS. Compile tested on: Ubuntu 10.04 (automake 1:1.11.1-1) Ubuntu 12.04 (automake 1:1.11.3-1ubuntu2) Arch Linux (automake 1.12.4)
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Oops, my previous commit broke builds with krb support.
-
- Nov 04, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
As pointed out in Bug report #3579064, curl_multi_perform() would wrongly use a blocking mechanism internally for some commands which could lead to for example a very long block if the LIST response never showed. The solution was to make sure to properly continue to use the multi interface non-blocking state machine. The new test 1501 verifies the fix. Bug: http://curl.haxx.se/bug/view.cgi?id=3579064 Reported by: Guido Berhoerster
-
- Nov 01, 2012
-
-
Marc Hoersken authored
This patch restores the original behavior instead of always falling back to x86 if no MACHINE-type was specified.
-
Marc Hoersken authored
-
Sapien2 authored
-
Sapien2 authored
-
Sapien2 authored
-
Daniel Stenberg authored
The URL we used before is the one that goes directly to 'add' a bug report, but since you can only do that after first having logged in to sourceforge, the link often doesn't work for visitors. Bug: http://curl.haxx.se/bug/view.cgi?id=3582408 Reported by: Oscar Norlander
-
Daniel Stenberg authored
Bug: http://curl.haxx.se/bug/view.cgi?id=3582407 Reported by: Oscar Norlander
-
Guenter Knauf authored
Since libssh2 supports now agent stuff it also depends on user32.lib. Posted to the list by Jan Ehrhardt.
-
- Oct 23, 2012
-
-
Daniel Stenberg authored
When given a string as 'srp' it didn't work, but required 'SRP'. Starting now, the check disregards casing. Bug: http://curl.haxx.se/bug/view.cgi?id=3578418 Reported by: Jeff Connelly
-
Daniel Stenberg authored
Back in those days the public ares.h header didn't include the ares_version.h header so it needs to be included here. Bug: http://curl.haxx.se/bug/view.cgi?id=3577710
-
- Oct 22, 2012
-
-
Nick Zitzmann authored
Previously the Metalink code used Apple's CommonCrypto library only if curl was built using the --with-darwinssl option. Now we use CommonCrypto on all Apple operating systems including Tiger or later, or iOS 5 or later, so you don't need to build --with-darwinssl anymore. Also rolled out this change to libcurl's md5 code.
-
- Oct 18, 2012
-
-
Daniel Stenberg authored
-
Michał Kowalczyk authored
It does so in a streaming manner using the "Streaming HTML parser".
-
- Oct 16, 2012
-
-
Nick Zitzmann authored
The iOS build was broken by a reference to a function that only existed under OS X; fixed. Also fixed a hard-to-reproduce problem where, if the server disconnected before libcurl got the chance to hang up first and SecureTransport was in use, then we'd raise an error instead of failing gracefully.
-
- Oct 15, 2012
-
-
- Oct 12, 2012
-
-
Guenter Knauf authored
-
Guenter Knauf authored
The makefile is designed to build against a libmetalink devel package; therefore is does not matter what will change inside libmetalink. Add OpenSSL includes and defines for libmetalink-aware OpenSSL builds.
-
- Oct 10, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-