- Nov 10, 2013
-
-
Björn Stenberg authored
The temporary sockets used for Happy Eyeballs were not closed properly, if curl exited prematurely, which this patch fixes.
-
Kim Vandry authored
-
- Nov 05, 2013
-
-
Steve Holme authored
-
Björn Stenberg authored
The reason for this loop's existence was removed in commit 02fbc26d.
-
Daniel Stenberg authored
Our own printf() replacement clearly can't properly handle %.*s with a string that isn't zero terminated. Instead of fixing the printf code or even figuring out what the proper posix behavior is, I reverted this piece of the code back to the previous version where it does malloc + memcpy instead. Regression added in e839446c, released in curl 7.32.0. Reported-by: Felix Yan Bug: http://curl.haxx.se/bug/view.cgi?id=1295
-
Steve Holme authored
-
- Nov 04, 2013
-
-
Björn Stenberg authored
This patch adds a 200ms delay between the first and second address family socket connection attempts. It also iterates over IP addresses in the order returned by the system, meaning most dual-stack systems will try IPv6 first. Additionally, it refactors the connect code, removing most code that handled synchronous connects. Since all sockets are now non-blocking, the logic can be made simpler.
-
Steve Holme authored
-
Steve Holme authored
nss.c:702: warning: pointer targets in passing argument 3 of 'Curl_extract_certinfo' differ in signedness nss.c:702: warning: pointer targets in passing argument 4 of 'Curl_extract_certinfo' differ in signedness Made sure the cast was correctly "unsigned char *" to "char *" and not "unsigned char *" to "unsigned char *".
-
Steve Holme authored
nss.c:700: warning: pointer targets in passing argument 3 of 'Curl_extract_certinfo' differ in signedness nss.c:700: warning: pointer targets in passing argument 4 of 'Curl_extract_certinfo' differ in signedness
-
- Nov 03, 2013
-
-
Steve Holme authored
No need for a rhs condition on a bitwise compare.
-
Steve Holme authored
warning: implicit declaration of function 'Curl_extract_certinfo'
-
Steve Holme authored
warning: declaration of 'chsize' shadows a global declaration
-
Steve Holme authored
curl_sasl.c:294: warning: dereferencing type-punned pointer will break strict-aliasing rules getpart.c:201: warning: dereferencing type-punned pointer will break strict-aliasing rules
-
Steve Holme authored
Introduced in commit 7d7df831 curl would loop displaying "Whut?" if it was trying to connect to an address and port that didn't have anything listening on it.
-
Steve Holme authored
Renamed copy_header_value() to Curl_copy_header_value() as this function is now non static. Simplified proxy flag in Curl_http_input_auth() when calling sub-functions. Removed unnecessary white space removal when using negotiate as it had been missed in commit cdccb422.
-
- Nov 02, 2013
-
-
Steve Holme authored
...following recent changes to Curl_base64_decode() rather than trying to parse a header line for the authentication mechanisms which is CRLF terminated and inline zero terminate it.
-
- Oct 31, 2013
-
-
Steve Holme authored
...following recent changes to Curl_base64_decode() rather than trying to parse a header line for the authentication mechanisms which is CRLF terminated and inline zero terminate it.
-
- Oct 30, 2013
-
-
Daniel Stenberg authored
The code rejected 0 as a valid timeout while in fact the function could indeed legitimately return that and it should be respected. Reported-by: Bjorn Stenberg
-
Steve Holme authored
-
Steve Holme authored
-
Patrick Monnerat authored
-
Daniel Stenberg authored
and updated copyright year
-
Steve Holme authored
A base64 string should be a multiple of 4 characters in length, not contain any more than 2 padding characters and only contain padding characters at the end of string. For example: Y3VybA== Strings such as the following are considered invalid: Y= - Invalid length Y== - Invalid length Y=== - More than two padding characters Y=x= - Padding character contained within string
-
- Oct 29, 2013
-
-
Björn Stenberg authored
This patch fixes a bug in Happy Eyeballs where curl would wait for a connect response from socket1 before checking socket2. Also, it updates error messages for failed connections, showing the ip addresses that failed rather than just the host name repeatedly. Bug: http://curl.haxx.se/mail/lib-2013-10/0236.html Reported-by: Paul Marks
-
- Oct 28, 2013
-
-
Steve Holme authored
-
Patrick Monnerat authored
-
- Oct 27, 2013
-
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
-
Björn Stenberg authored
-
Björn Stenberg authored
This patch invokes two socket connect()s nearly simultaneously, and the socket that is first connected "wins" and is subsequently used for the connection. The other is terminated. There is a very slight IPv4 preference, in that if both sockets connect simultaneously IPv4 is checked first and thus will win.
-
Steve Holme authored
Should a client application fail to decode an authentication message received from a server, or not support any of the parameters given by the server in the message, then the authentication phrase should be cancelled gracefully by the client rather than simply terminating the connection. The authentication phrase should be cancelled by simply sending a '*' to the server, in response to erroneous data being received, as per RFC-3501, RFC-4954 and RFC-5034. This patch adds the necessary state machine constants and appropriate response handlers in order to add this functionality for the CRAM-MD5, DIGEST-MD5 and NTLM authentication mechanisms.
-
Steve Holme authored
...in preparation for upcoming modifications.
-
- Oct 26, 2013
-
-
Steve Holme authored
warning: 'result' may be used uninitialized in this function
-
Daniel Stenberg authored
This is a regression since the switch to always-multi internally c4312741. Test 1316 was modified since we now clearly call the Curl_client_write() function when doing the LIST transfer part and then the handler->protocol says FTP and ftpc.transfertype is 'A' which implies text converting even though that the response is initially a HTTP CONNECT response in this case.
-
Steve Holme authored
-
Steve Holme authored
This workaround had been previously been implemented for IMAP and POP3 but not SMTP. Some of the recent test case additions implemented this behaviour to emulate a bad server and the SMTP code didn't cope with it.
-