- Oct 12, 2017
-
-
Patrick Monnerat authored
If stdin is not a regular file, its content is memory-buffered to enable a possible data "rewind". In all cases, stdin data size is determined before real use to avoid having an unknown part's size. --libcurl generated code is left as an unbuffered stdin fread/fseek callback part with unknown data size. Buffering is not supported in deprecated curl_formadd() API.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
following the new github "standard"
-
- Oct 11, 2017
-
-
Daniel Stenberg authored
-
Artak Galoyan authored
Now VERIFYHOST, VERIFYPEER and VERIFYSTATUS options change during active connection updates the current connection's (i.e.'connectdata' structure) appropriate ssl_config (and ssl_proxy_config) structures variables, making these options effective for ongoing connection. This functionality was available before and was broken by the following change: "proxy: Support HTTPS proxy and SOCKS+HTTP(s)" CommitId: cb4e2be7. Bug: https://github.com/curl/curl/issues/1941 Closes https://github.com/curl/curl/pull/1951
-
David Benjamin authored
Those were temporary things we'd add and remove for our own convenience long ago. The last few stayed around for too long as an oversight but have since been removed. These days we have a running BORINGSSL_API_VERSION counter which is bumped when we find it convenient, but 2015-11-19 was quite some time ago, so just check OPENSSL_IS_BORINGSSL. Closes #1979
-
- Oct 10, 2017
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
... as otherwise it could leak that memory. Detected by OSS-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3600 Assisted-by: Max Dymond Closes #1977
-
Daniel Stenberg authored
Reported-by: Zenju on github Test 244 added to verify Fixes #1974 Closes #1976
-
- Oct 09, 2017
-
-
Daniel Stenberg authored
Ref: #1974
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Enable PKCS12 for all non-boringssl builds without relying on configure or cmake checks. Bug: https://curl.haxx.se/mail/lib-2017-10/0007.html Reported-by: Christian Schmitz Closes #1948
-
Kristiyan Tsaklev authored
Test 1422 updated to verify. Closes #1964
-
Patrick Monnerat authored
This allows freeing a mime structure bound to the easy handle before curl_easy_cleanup(). Fixes #1970.
-
- Oct 08, 2017
-
-
Daniel Stenberg authored
... like a very large non-existing RTSP version number. Added test 577 to verify. Detected by OSS-fuzz. Closes #1969
-
Patrick Monnerat authored
-
Patrick Monnerat authored
-
Patrick Monnerat authored
Reported-by: Alexey Melnichuk Fixes #1962
-
Patrick Monnerat authored
-
Patrick Monnerat authored
Also avoid dangling pointers in referencing parts.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Patrick Monnerat authored
-
Patrick Monnerat authored
-
- Oct 07, 2017
-
-
Daniel Stenberg authored
This reverts commit f3e03f6c. Caused memory leaks in the fuzzer, needs to be done differently. Disable test 1553 for now too, as it causes memory leaks without this commit!
-
Daniel Stenberg authored
Closes #1960
-
Daniel Stenberg authored
... as we must clean up memory.
-
- Oct 06, 2017
-
-
Daniel Stenberg authored
When imap_done() got called before a connection is setup, it would try to "finish up" and dereffed a NULL pointer. Test case 1553 managed to reproduce. I had to actually use a host name to try to resolve to slow it down, as using the normal local server IP will make libcurl get a connection in the first curl_multi_perform() loop and then the bug doesn't trigger. Fixes #1953 Assisted-by: Max Dymond
-
Dan Fandrich authored
These are around 5% flaky in my Linux x86 autobuilds.
-
Marcel Raad authored
When CURL_DISABLE_CRYPTO_AUTH is defined, Curl_none_md5sum's parameters are not used.
-
Daniel Stenberg authored
... fixes a memory leak with at least IMAP when remove_handle is never called and the transfer is abruptly just abandoned early. Test 1552 added to verify Detected by OSS-fuzz Assisted-by: Max Dymond Closes #1954
-
Benbuck Nason authored
Fixes #1950: curlx_strtoofft() doesn't fully protect against null 'str' argument. Closes #1952
-
Daniel Stenberg authored
Reported-by: Javier Sixto Fixes #1955 Closes #1956
-
Viktor Szakats authored
The source code is now prepared to handle the case when both Win32 Crypto and OpenSSL/NSS crypto backends are enabled at the same time, making it now possible to enable `USE_WIN32_CRYPTO` whenever the targeted Windows version supports it. Since this matches the minimum Windows version supported by curl (Windows 2000), enable it unconditionally for the Win32 platform. This in turn enables SMB (and SMBS) protocol support whenever Win32 Crypto is available, regardless of what other crypto backends are enabled. Ref: https://github.com/curl/curl/pull/1840#issuecomment-325682052 Closes https://github.com/curl/curl/pull/1943
-
- Oct 05, 2017
-
-
Daniel Stenberg authored
Reported-by: Wyatt O'Day Fixes #1945 Closes #1947
-
Nick Zitzmann authored
Closes https://github.com/curl/curl/pull/1794
-
- Oct 04, 2017
-
-
Felix Kaiser authored
Closes #1946
-