- May 27, 2010
-
-
Daniel Stenberg authored
-
Kamil Dudka authored
-
Kamil Dudka authored
-
Kamil Dudka authored
-
Kamil Dudka authored
... and make it possible to do so without any user interaction
-
Howard Chu authored
-
Daniel Stenberg authored
-
Kamil Dudka authored
-
Tor Arntsen authored
-
Pavel Raiskup authored
-
Tor Arntsen authored
An enum will catch non-bool assignments to bool on platforms with a strict compiler, e.g MIPSPro. Signed-off-by: Kamil Dudka <kdudka@redhat.com>
-
Kamil Dudka authored
-
Tor Arntsen authored
Using the 'register' keyword rarely improves anything with modern compilers and architectures.
-
- May 25, 2010
-
-
Julien Chaffraix authored
-
Julien Chaffraix authored
Fix 2 OOM errors: a missing NULL-check in lib/http_negociate.c and a potential NULL dereferencing in lib/splay.c
-
- May 24, 2010
-
-
Howard Chu authored
makes the LDAP code much cleaner, nicer and in general being a better libcurl citizen. If a new enough OpenLDAP version is detect, the new and shiny lib/openldap.c code is then used instead of the old cruft Code by Howard, minor cleanups by Daniel.
-
- May 21, 2010
-
-
Tor Arntsen authored
bool in curl internals is unsigned char and should not be used to receive return value from functions returning int - this fails when using IBM VisualAge and Tru64 compilers.
-
Daniel Stenberg authored
Eric Mertens posted bug #3003705: when we made TFTP use the correct timeout option when sent to the server (fixed May 18th 2010) it became obvious that libcurl used invalid timeout values (300 by default while the RFC allows nothing above 255). While of course it is obvious that as TFTP has worked thus far without being able to set timeout at all, just removing the setting wouldn't make any difference in behavior. I decided to still keep it (but fix the problem) as it now actually allows for easier (future) customization of the timeout. (http://curl.haxx.se/bug/view.cgi?id=3003705)
-
Daniel Stenberg authored
If an unexpected block number was received, break out of the switch loop.
-
Daniel Stenberg authored
In a normal expression, doing [unsigned short] + 1 will not wrap at 16 bits so the comparisons and outputs were done wrong. I added a macro do make sure it gets done right. Douglas Kilpatrick filed bug report #3004787 about it: http://curl.haxx.se/bug/view.cgi?id=3004787
-
- May 20, 2010
-
-
Ben Greear authored
Signed-off-by: Ben Greear <greearb@candelatech.com>
-
Ben Greear authored
Signed-off-by: Ben Greear <greearb@candelatech.com>
-
Tanguy Fautre authored
By undefing a bunch of E* defines that VC10 has started to define but that we redefine internally to their WSA* alternatives when building for Windows.
-
Tor Arntsen authored
curl_easy_getinfo() called with a pointer to long instead of double would sigbus on RISC processors (e.g. MIPS) due to wrong alignment of pointer address.
-
- May 19, 2010
-
-
Tor Arntsen authored
-
Dan Fandrich authored
-
- May 18, 2010
-
-
Dan Fandrich authored
-
Daniel Stenberg authored
Eric Mertens posted bug report #3003005 pointing out that the libcurl TFTP code was not sending the timeout option properly to the server, and suggested a fix. (http://curl.haxx.se/bug/view.cgi?id=3003005)
-
- May 16, 2010
-
-
Tor Arntsen authored
An update had added a couple of lines with DOS line endings, and some compilers will choke on that (e.g. the Tru64 compiler).
-
Kamil Dudka authored
-
- May 15, 2010
-
-
Howard Chu authored
-
Howard Chu authored
-
Pavel Raiskup authored
-
- May 14, 2010
-
-
Dan Fandrich authored
-
Daniel Stenberg authored
John-Mark Bell filed bug #3000052 that identified a problem (with an associated patch) with the OpenSSL handshake state machine when the multi interface is used: Performing an https request using a curl multi handle and using select or epoll to wait for events results in a hang. It appears that the cause is the fix for bug #2958179, which makes ossl_connect_common unconditionally return from the step 2 loop when fetching from a multi handle. When ossl_connect_step2 has completed, it updates connssl->connecting_state to ssl_connect_3. ossl_connect_common will then return to the caller, as a multi handle is in use. Eventually, the client code will call curl_multi_fdset to obtain an updated fdset to select or epoll on. For https requests, curl_multi_fdset will cause https_getsock to be called. https_getsock will only return a socket handle if the connecting_state is ssl_connect_2_reading or ssl_connect_2_writing. Therefore, the client will never obtain a valid fdset, and thus not drive the multi handle, resulting in a hang. (http://curl.haxx.se/bug/view.cgi?id=3000052)
-
Daniel Stenberg authored
-
Dan Fandrich authored
-
Daniel Stenberg authored
Sebastian V reported bug #3000056 identifying a problem with redirect following. It showed that when curl followed redirects it didn't properly ignore the response body of the 30X response if that response was using compressed Content-Encoding! (http://curl.haxx.se/bug/view.cgi?id=3000056)
-
Daniel Stenberg authored
-
- May 13, 2010
-
-
Hoi-Ho Chan authored
"The BSD version of PolarSSL was made for migratory purposes only and is not maintained. The GPL version of PolarSSL is actually the only actively developed version, so I would be very reluctant to use the BSD version." / Paul Bakker, PolarSSL hacker. Signed-off-by: Hoi-Ho Chan <hoiho.chan@gmail.com>
-