- Mar 08, 2005
-
-
Daniel Stenberg authored
that feature 64 bit 'long'. Some systems have 64 bit time_t and deal with years beyond 2038. However, even some of the systems with 64 bit time_t returns -1 for dates beyond 03:14:07 UTC, January 19, 2038. (Such as AIX 5100-06)
-
Daniel Stenberg authored
file got a Last-Modified: header written to the data stream, corrupting the actual data. This was because some conditions from the previous FTP code was not properly brought into the new FTP code. I fixed and I added test case 520 to verify. (This bug was introduced in 7.13.1)
-
- Mar 04, 2005
-
-
Daniel Stenberg authored
on the remote side. This then converts the operation to an ordinary STOR upload. This was requested/pointed out by Ignacio Vazquez-Abrams. It also proved (and I fixed) a bug in the newly rewritten ftp code (and present in the 7.13.1 release) when trying to resume an upload and the servers returns an error to the SIZE command. libcurl then loops and sends SIZE commands infinitely.
-
Dan Fandrich authored
-
Dan Fandrich authored
used, it slows initialization too much reading an infinitely long file!
-
Daniel Stenberg authored
the cookie "engine" without having to provide an empty or non-existing file.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Feb 28, 2005
-
-
Dan Fandrich authored
-
- Feb 24, 2005
-
-
Dan Fandrich authored
-
- Feb 22, 2005
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
got no notification, no mail, no nothing. You didn't even bother to mail us when you went public with this. Cool. NTLM buffer overflow fix, as reported here: http://www.securityfocus.com/archive/1/391042
-
- Feb 18, 2005
-
-
Daniel Stenberg authored
requested data from a host and then followed a redirect to another host. libcurl then didn't use the proxy-auth properly in the second request, due to the host-only check for original host name wrongly being extended to the proxy auth as well. Added test case 233 to verify the flaw and that the fix removed the problem.
-
- Feb 17, 2005
-
-
Daniel Stenberg authored
Bug report #1124588 by David
-
- Feb 16, 2005
-
-
Daniel Stenberg authored
that picks NTLM. Thanks to David Byron letting me test NTLM against his servers, I could quickly repeat and fix the problem. It turned out to be: When libcurl POSTs without knowing/using an authentication and it gets back a list of types from which it picks NTLM, it needs to either continue sending its data if it keeps the connection alive, or not send the data but close the connection. Then do the first step in the NTLM auth. libcurl didn't send the data nor close the connection but simply read the response-body and then sent the first negotiation step. Which then failed miserably of course. The fixed version forces a connection if there is more than 2000 bytes left to send.
-
- Feb 14, 2005
-
-
Daniel Stenberg authored
do pretransfer stuff like Curl_pretransfer().
-
- Feb 11, 2005
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
week day names and month names and servers don't like that.
-
- Feb 10, 2005
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Feb 09, 2005
-
-
Daniel Stenberg authored
at fixing this issue.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Gisle Vanem authored
Don't free 'lud_dn' twice in case curl_unescape() fails.
-
Gisle Vanem authored
-
Gisle Vanem authored
For ftp only?
-
Daniel Stenberg authored
-
Daniel Stenberg authored
The tag 'before_ftp_statemachine' was set just before this commit in case of future need.
-
Gisle Vanem authored
"Each command line must be terminated by a CRLF".
-
- Feb 08, 2005
-
-
Daniel Stenberg authored
-
Gisle Vanem authored
CURLE_OK or CURLE_OUT_OF_MEMORY. Add typecast in hostares.c.
-
Gisle Vanem authored
-
Daniel Stenberg authored
operation to the caller. Disconnecting has the disadvantage that the conn pointer gets completely invalidated and this is not handled on lots of places in the code.
-
- Feb 07, 2005
-
-
Dan Fandrich authored
produce a zlib error.
-
- Feb 06, 2005
-
-
Gisle Vanem authored
-
- Feb 04, 2005
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
the buffer is already BUFSIZE +1 one big to fit the extra trailing zero. This change is reported to fix David's weird SSL problem...
-
- Jan 30, 2005
-
-
Daniel Stenberg authored
prevent memory leakage
-
Daniel Stenberg authored
properly, to avoid reading uninited variables when using file:// (valgrind)
-