- Mar 08, 2005
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
that feature 64 bit 'long'. Some systems have 64 bit time_t and deal with years beyond 2038. However, even some of the systems with 64 bit time_t returns -1 for dates beyond 03:14:07 UTC, January 19, 2038. (Such as AIX 5100-06)
-
Daniel Stenberg authored
-
Daniel Stenberg authored
file got a Last-Modified: header written to the data stream, corrupting the actual data. This was because some conditions from the previous FTP code was not properly brought into the new FTP code. I fixed and I added test case 520 to verify. (This bug was introduced in 7.13.1)
-
Dan Fandrich authored
path to the compiler flags. Before, a zlib installation in the default path was always used in preference to the one in the desired location.
-
- Mar 07, 2005
-
-
Dan Fandrich authored
revert to the SEEK_END method of repositioning the stream after a ftruncate() and only use SEEK_SET if ftruncate() isn't available.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Mar 06, 2005
-
-
Daniel Stenberg authored
-
- Mar 05, 2005
-
-
Dan Fandrich authored
Added HAVE_FTRUNCATE to all the static config-*.h files on the assumption that all those systems provide it.
-
Daniel Stenberg authored
-
- Mar 04, 2005
-
-
Daniel Stenberg authored
on the remote side. This then converts the operation to an ordinary STOR upload. This was requested/pointed out by Ignacio Vazquez-Abrams. It also proved (and I fixed) a bug in the newly rewritten ftp code (and present in the 7.13.1 release) when trying to resume an upload and the servers returns an error to the SIZE command. libcurl then loops and sends SIZE commands infinitely.
-
Dan Fandrich authored
-
Dan Fandrich authored
used, it slows initialization too much reading an infinitely long file!
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
the cookie "engine" without having to provide an empty or non-existing file.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Mar 03, 2005
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Feb 28, 2005
-
-
Dan Fandrich authored
-
- Feb 24, 2005
-
-
Dan Fandrich authored
-
- Feb 22, 2005
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
got no notification, no mail, no nothing. You didn't even bother to mail us when you went public with this. Cool. NTLM buffer overflow fix, as reported here: http://www.securityfocus.com/archive/1/391042
-
- Feb 19, 2005
-
-
Daniel Stenberg authored
thus the second request to the new host will use authentication fine
-
- Feb 18, 2005
-
-
Daniel Stenberg authored
requested data from a host and then followed a redirect to another host. libcurl then didn't use the proxy-auth properly in the second request, due to the host-only check for original host name wrongly being extended to the proxy auth as well. Added test case 233 to verify the flaw and that the fix removed the problem.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
runs to build with mingw.
-
- Feb 17, 2005
-
-
Daniel Stenberg authored
Bug report #1124588 by David
-
Daniel Stenberg authored
-
- Feb 16, 2005
-
-
Daniel Stenberg authored
that picks NTLM. Thanks to David Byron letting me test NTLM against his servers, I could quickly repeat and fix the problem. It turned out to be: When libcurl POSTs without knowing/using an authentication and it gets back a list of types from which it picks NTLM, it needs to either continue sending its data if it keeps the connection alive, or not send the data but close the connection. Then do the first step in the NTLM auth. libcurl didn't send the data nor close the connection but simply read the response-body and then sent the first negotiation step. Which then failed miserably of course. The fixed version forces a connection if there is more than 2000 bytes left to send.
-
- Feb 14, 2005
-
-
Daniel Stenberg authored
-
Marty Kuhrt authored
-