- Mar 20, 2016
-
-
Steve Holme authored
warning C4706: assignment within conditional expression
-
Steve Holme authored
warning: conversion to 'unsigned char' from 'int' may alter its value
-
- Mar 19, 2016
-
-
Daniel Stenberg authored
vtls/mbedtls.h:67:36: warning: implicit declaration of function ‘mbedtls_sha256’ [-Wimplicit-function-declaration]
-
Steve Holme authored
Following commit c5744340. Additionally removes the need for a second 'result code' variable as well.
-
Jay Satiro authored
.. because curl_multi_wait can no longer signal poll failure. follow-up to 77e17267 Bug: https://github.com/curl/curl/issues/707
-
Steve Holme authored
warning C4706: assignment within conditional expression
-
Steve Holme authored
warning C4668: 'USE_IPV6' is not defined as a preprocessor macro, replacing with '0' for '#if/#elif'
-
Steve Holme authored
warning C4701: potentially uninitialized local variable 'size' used Technically this can't happen, as the usage of 'size' is protected by 'if(parsed)' and 'parsed' is only set after 'size' has been parsed. Anyway, lets keep the compiler happy.
-
- Mar 18, 2016
-
-
Steve Holme authored
formdata.c:390: warning: cast from pointer to integer of different size Introduced in commit ca5f9341 this happens because a char*, which is 32-bits wide in 32-bit land, is being cast to a curl_off_t which is 64-bits wide where 64-bit integers are supported by the compiler. This doesn't happen in 64-bit land as a pointer is the same size as a curl_off_t. This fix doesn't address the fact that a 64-bit value cannot be used for CURLFORM_CONTENTLEN when set in a form array and compiled on a 32-bit platforms, it does at least suppress the compilation warning.
-
- Mar 17, 2016
-
-
Gisle Vanem authored
The OpenSSL API change that broke this is "Convert ERR_STATE to new multi-threading API": openssl commit 8509dcc. Closes #713
-
- Mar 16, 2016
-
-
Daniel Stenberg authored
follow-up to 80015cdd
-
Daniel Stenberg authored
... to allow users to see which specfic wildcard that matched when such is used. Also minor logic cleanup to simplify the code, and I removed all tabs from verbose strings.
-
Jay Satiro authored
-
Steve Holme authored
It would also seem that share.h is not required here either as there are no references to the Curl_share structure or functions.
-
Steve Holme authored
-
- Mar 15, 2016
-
-
Steve Holme authored
-
- Mar 14, 2016
-
-
Daniel Stenberg authored
... to allow torture tests then too.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Since sh_getentry() now checks for invalid sockets itself and by narrowing the scope of the remove_sock_from_hash variable.
-
Daniel Stenberg authored
Simplify the code by using a single entry that looks for a socket in the socket hash. As indicated in #712, the code looked for CURL_SOCKET_BAD at some point and that is ineffective/wrong and this makes it easier to avoid that.
-
Jaime Fullaondo authored
Closes #712
-
- Mar 13, 2016
-
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
-
Maksim Kuzevanov authored
Closes #703
-
- Mar 12, 2016
-
-
Steve Holme authored
Rather than use a 0 and 1 integer base result code use a TRUE / FALSE based success code.
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
-
- Mar 11, 2016
-
-
Steve Holme authored
-
Steve Holme authored
Rather than use 0 and 1 integer base result codes use a FALSE / TRUE based success code.
-
- Mar 10, 2016
-
-
Daniel Stenberg authored
-
Steve Holme authored
warning C4267: 'function': conversion from 'size_t' to 'int', possible loss of data
-
Daniel Stenberg authored
... as it implies we need to check for that on all the other variable references as well (as Coverity otherwise warns us for missing NULL checks), and we're alredy making sure that the pointer is never NULL.
-
Daniel Stenberg authored
RFC 6265 section 4.1.1 spells out that the first name/value pair in the header is the actual cookie name and content, while the following are the parameters. libcurl previously had a more liberal approach which causes significant problems when introducing new cookie parameters, like the suggested new cookie priority draft. The previous logic read all n/v pairs from left-to-right and the first name used that wassn't a known parameter name would be used as the cookie name, thus accepting "Set-Cookie: Max-Age=2; person=daniel" to be a cookie named 'person' while an RFC 6265 compliant parser should consider that to be a cookie named 'Max-Age' with an (unknown) parameter 'person'. Fixes #709
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Such a return value isn't documented but could still happen, and the curl tool code checks for it. It would happen when the underlying Curl_poll() function returns an error. Starting now we mask that error as a user of curl_multi_wait() would have no way to handle it anyway. Reported-by: Jay Satiro Closes #707
-
- Mar 08, 2016
-
-
Steve Holme authored
Regression since commit 710f14ed. Bug: https://github.com/curl/curl/issues/422 Reported-by: Justin Ehlert
-