- Feb 25, 2017
-
-
Peter Wu authored
Make use of macro substitution of suffix patterns to remove duplication of manual names. This approach is portable according to http://pubs.opengroup.org/onlinepubs/009695399/utilities/make.html Closes https://github.com/curl/curl/pull/1287
-
Dan Fandrich authored
-
Dan Fandrich authored
-
Dan Fandrich authored
The character set in POSIX is set by the locale defined by (in decreasing order of precedence) the LC_ALL, LC_CTYPE and LANG environment variables (CHARSET was used by libidn but not libidn2). LC_ALL is cleared to ensure that LC_CTYPE takes effect, but LC_ALL is not used to set the locale to ensure that other parts of the locale aren't overridden. Since there doesn't seem to be a cross-platform way of specifying a UTF-8 locale, and not all systems may support UTF-8, a <precheck> is used to skip the test if UTF-8 can't be verified to be available. Test 1035 was also converted to UTF-8 for consistency, as the actual character set used there is irrelevant to the test. This patch uses a different UTF-8 locale than the last attempt, namely en_US.UTF-8. This one has been verified on 7 different Linux and BSD distributions and is more complete and usable than the locale UTF-8 (on at least some systems).
-
Dan Fandrich authored
-
Simon Warta authored
- Change the encoding of the regex temp placeholder token to UTF-8. Prior to this change the file contained special chars in a different encoding than ASCII or UTF-8 making text editors and Python complain when reading the file. Closes https://github.com/curl/curl/pull/1271 Closes https://github.com/curl/curl/pull/1275
-
- Feb 24, 2017
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
This reverts commit ecd1d020. That commit caused test failures on my Debian Linux machine for all changed test cases. We need to reconsider how that should get done.
-
- Feb 23, 2017
-
-
Dan Fandrich authored
Character set in POSIX is set by the locale defined (in decreasing order of precedence) by the LC_ALL, LC_CTYPE and LANG environment variables (I believe CHARSET is only historic). LC_ALL is cleared to ensure that LC_CTYPE takes effect, but LC_ALL is not used to set the locale to ensure that other parts of the locale aren't overriden, if set. Since there doesn't seem to be a cross-platform way of specifying a UTF-8 locale, and not all systems may support UTF-8, a <precheck> is used (where relevant) to skip the test if UTF-8 isn't in use. Test 1035 was also converted to UTF-8 for consistency, as the actual character set used there is irrelevant to the test.
-
Jay Satiro authored
If the compile-time CURL_CA_BUNDLE location is defined use it as the default value for the proxy CA bundle location, which is the same as what we already do for the regular CA bundle location. Ref: https://github.com/curl/curl/pull/1257
-
Sergii Pylypenko authored
Closes #1285
-
Daniel Stenberg authored
Closes #1280
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
İsmail Dönmez authored
Closes #1283 Fixes #1277
-
Daniel Stenberg authored
synced with df665f4df0f7a352
-
Daniel Stenberg authored
Reported-by: <shachaf@users.noreply.github.com> Fixes #1281
-
- Feb 22, 2017
-
-
Jay Satiro authored
curl.1 is generated by the cmdline-opts script since 4c49b835.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Viktor Szakats authored
f77dabef broke builds in Windows using Windows SSPI but not Windows SSL. Bug: https://github.com/curl/curl/issues/1276 Reported-by: <jveazey@users.noreply.github.com>
-
Jay Satiro authored
- Change CURLOPT_PROXY_CAPATH to return CURLE_NOT_BUILT_IN if the option is not supported, which is the same as what we already do for CURLOPT_CAPATH. - Change the curl tool to handle CURLOPT_PROXY_CAPATH error CURLE_NOT_BUILT_IN as a warning instead of as an error, which is the same as what we already do for CURLOPT_CAPATH. - Fix CAPATH docs to show that CURLE_NOT_BUILT_IN is returned when the respective CAPATH option is not supported by the SSL library. Ref: https://github.com/curl/curl/pull/1257
-
Jay Satiro authored
-
- Feb 21, 2017
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
The CURLOPT_SSL_VERIFYSTATUS option was not properly handled by libcurl and thus even if the status couldn't be verified, the connection would be allowed and the user would not be told about the failed verification. Regression since cb4e2be7 CVE-2017-2629 Bug: https://curl.haxx.se/docs/adv_20170222.html Reported-by: Marcus Hoffmann
-
Jay Satiro authored
- If the server has provided another challenge use it as the replacement input token if stale=TRUE. Otherwise previous credentials have failed so return CURLE_LOGIN_DENIED. Prior to this change the stale directive was ignored and if another challenge was received it would cause error CURLE_BAD_CONTENT_ENCODING. Ref: https://tools.ietf.org/html/rfc2617#page-10 Bug: https://github.com/curl/curl/issues/928 Reported-by: <tarek112@users.noreply.github.com>
-
- Feb 20, 2017
-
-
Daniel Stenberg authored
Closes #1264
-
Daniel Stenberg authored
-
Jean Gressmann authored
Since negative values are errors and not only -1. This makes SFTP upload with --create-dirs work (again). Closes #1269
-
Max Khon authored
- on the first invocation: keep security context returned by InitializeSecurityContext() - on subsequent invocations: use MakeSignature() instead of InitializeSecurityContext() to generate HTTP digest response Bug: https://github.com/curl/curl/issues/870 Reported-by: Andreas Roth Closes https://github.com/curl/curl/pull/1251
-
Jay Satiro authored
- Feb 19, 2017
-
-
Michael Kaufmann authored
-
- Feb 18, 2017
-
-
Dan Fandrich authored
-
Michael Kaufmann authored
Follow-up to 4b86113f Fixes https://github.com/curl/curl/issues/793 Fixes https://github.com/curl/curl/issues/942
-
Michael Kaufmann authored
-
Michael Kaufmann authored
Properly resolve, convert and log the proxy host names. Support the "--connect-to" feature for SOCKS proxies and for passive FTP data transfers. Follow-up to cb4e2be7 Reported-by: Jay Satiro Fixes https://github.com/curl/curl/issues/1248
-
- Feb 17, 2017
-
-
Isaac Boukris authored
- While negotiating auth during PUT/POST if a user-specified Content-Length header is set send 'Content-Length: 0'. This is what we do already in HTTPREQ_POST_FORM and what we did in the HTTPREQ_POST case (regression since afd288b2). Prior to this change no Content-Length header would be sent in such a case. Bug: https://curl.haxx.se/mail/lib-2017-02/0006.html Reported-by: Dominik Hölzl Closes https://github.com/curl/curl/pull/1242
-