- Sep 13, 2018
-
-
Daniel Gustafsson authored
When erroring out on a request being too large, the existing buffer was leaked. Fix by explicitly freeing on the way out. Closes #2966 Reviewed-by: Daniel Stenberg <daniel@haxx.se>
-
Yiming Jing authored
-
Yiming Jing authored
-
Yiming Jing authored
Closes #2984
-
Yiming Jing authored
-
Dave Reisner authored
This yields "the scheme is %s\n" instead of "the scheme is %s0 Closes #2970
-
Dave Reisner authored
-
Daniel Stenberg authored
to help user understand what the problem is Reported-by: Daniel Shahaf Fixes #2763 Closes #2977
-
- Sep 12, 2018
-
-
Yiming Jing authored
The previous test certificates contained RSA keys of only 1024 bits. However, RSA claims that 1024-bit RSA keys are likely to become crackable some time before 2010. The NIST recommends at least 2048-bit keys for RSA for now. Better use full 2048 also for testing. Closes #2973
-
Daniel Gustafsson authored
Closes #2968 Reviewed-by: Daniel Stenberg <daniel@haxx.se>
-
Marcel Raad authored
On Windows, the read function from <io.h> is used, which has its byte count parameter as unsigned int instead of size_t. Closes https://github.com/curl/curl/pull/2972
-
Viktor Szakats authored
Closes https://github.com/curl/curl/pull/2979
-
Jay Satiro authored
- Use memcpy instead of strncpy to copy a string without termination, since gcc8 warns about using strncpy to copy as many bytes from a string as its length. Suggested-by: Viktor Szakats Closes https://github.com/curl/curl/issues/2980
-
- Sep 10, 2018
-
-
Daniel Stenberg authored
Closes #2967
-
Daniel Stenberg authored
This example is simply not working correctly but there's nobody around with the skills and energy to fix it. Closes #2407
-
Kamil Dudka authored
... to reflect the changes in 6015cefb Closes #2955
-
Kamil Dudka authored
Closes #2948
-
Daniel Gustafsson authored
Rather than jumping backwards to where failure cleanup happens to be performed, move the failure case to end of the function where it is expected per existing coding convention. Closes #2965
-
Daniel Gustafsson authored
Closes #2963
-
Daniel Gustafsson authored
If the formatting fails, we error out on a fatal error and clean up on the way out. The array was however freed within the wrong scope and was thus never freed in case the cookies were written to a file instead of STDOUT. Closes #2957
-
Daniel Gustafsson authored
Expired cookies have already been purged at a later expiration time before this check, so remove the redundant check. closes #2962
-
- Sep 09, 2018
-
-
Daniel Stenberg authored
Exit the realloc() loop if the response turns out ridiculously large to avoid worse problems. Reported-by: Harry Sintonen Closes #2959
-
- Sep 08, 2018
-
-
Daniel Gustafsson authored
Closes #2960
-
Daniel Stenberg authored
Coverity CID 1439134
-
Daniel Stenberg authored
-
Marcel Raad authored
The expected error code is now 60. 51 is dead.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
See header file and man pages for API. All documented API details work and are tested in the 1560 test case. Closes #2842
-
- Sep 07, 2018
-
-
Daniel Stenberg authored
... including the associated option. Fixes #2951 Closes #2952
-
Max Dymond authored
Add functionality so that protocols can do custom keepalive on their connections, when an external API function is called. Add docs for the new options in 7.62.0 Closes #1641
-
Philipp Waehnert authored
Sometimes it may be considered a security risk to load an external OpenSSL configuration automatically inside curl_global_init(). The configuration option --disable-ssl-auto-load-config disables this automatism. The Windows build scripts winbuild/Makefile.vs provide a corresponding option ENABLE_SSL_AUTO_LOAD_CONFIG accepting a boolean value. Setting neither of these options corresponds to the previous behavior loading the external OpenSSL configuration automatically. Fixes #2724 Closes #2791
-
Daniel Stenberg authored
The gcc typecheck macros and coverity combined made it warn on the 2nd argument for ERROR_CHECK_SETOPT(). Here's minor rearrange to please it. Coverity CID 1439115 and CID 1439114.
-
Daniel Stenberg authored
SEC_E_APPLICATION_PROTOCOL_MISMATCH isn't defined in some versions of mingw and would require an ifdef otherwise. Reported-by: Thomas Glanzmann Approved-by: Marc Hörsken Bug: https://curl.haxx.se/mail/lib-2018-09/0020.html Closes #2950
-
- Sep 06, 2018
-
-
Nicklas Avén authored
... and add "MAILINDEX". As described in #2789, this is a suggested solution. Changing UID=xx to actually get mail with UID xx and add "MAILINDEX" to get a mail with a special index in the mail box (old behavior). So MAILINDEX=1 gives the first non deleted mail in the mail box. Fixes #2789 Closes #2815
-
Daniel Stenberg authored
This is step 3 of #2888. Fixes #2888 Closes #2896
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Closes #2668
-