Daniel Stenberg [Sat, 14 May 2016 22:37:36 +0000 (00:37 +0200)]
ftp wildcard: segfault due to init only in multi_perform
The proper FTP wildcard init is now more properly done in Curl_pretransfer()
and the corresponding cleanup in Curl_close().
The previous place of init/cleanup code made the internal pointer to be NULL
when this feature was used with the multi_socket() API, as it was made within
the curl_multi_perform() function.
Reported-by: Jonathan Cardoso Machado
Fixes #800
Jay Satiro [Fri, 13 May 2016 20:01:35 +0000 (16:01 -0400)]
libcurl-tlibcurl-thread: Update OpenSSL links
Because the old OpenSSL link now redirects to their master documentation
(currently 1.1.0), which does not document the required actions for
OpenSSL <= 1.0.2.
Viktor Szakats [Fri, 13 May 2016 07:25:54 +0000 (09:25 +0200)]
darwinssl.c: fix OS X codename typo in comment
Daniel Stenberg [Thu, 12 May 2016 22:18:53 +0000 (00:18 +0200)]
RELEASE-NOTES: synced with
68701e51c1f7
Added 8 bug fixes and 5 more contrbutors
Jay Satiro [Wed, 9 Mar 2016 07:59:05 +0000 (02:59 -0500)]
mprintf: Fix processing of width and prec args
Prior to this change a width arg could be erroneously output, and also
width and precision args could not be used together without crashing.
"%0*d%s", 2, 9, "foo"
Before: "092"
After: "09foo"
"%*.*s", 5, 2, "foo"
Before: crash
After: " fo"
Test 557 is updated to verify this and more
Michael Kaufmann [Thu, 12 May 2016 22:02:21 +0000 (00:02 +0200)]
ConnectionExists: follow-up fix for proxy re-use
Follow-up commit to
5823179
Closes #648
Per Malmberg [Thu, 12 May 2016 10:16:16 +0000 (12:16 +0200)]
darwinssl: fix certificate verification disable on OS X 10.8
The new way of disabling certificate verification doesn't work on
Mountain Lion (OS X 10.8) so we need to use the old way in that version
too. I've tested this solution on versions 10.7.5, 10.8, 10.9, 10.10.2
and 10.11.
Closes #802
Cory Benfield [Wed, 11 May 2016 11:35:05 +0000 (12:35 +0100)]
http2: Add space between colon and header value
curl's representation of HTTP/2 responses involves transforming the
response to a format that is similar to HTTP/1.1. Prior to this change,
curl would do this by separating header names and values with only a
colon, without introducing a space after the colon.
While this is technically a valid way to represent a HTTP/1.1 header
block, it is much more common to see a space following the colon. This
change introduces that space, to ensure that incautious tools are safely
able to parse the header block.
This also ensures that the difference between the HTTP/1.1 and HTTP/2
response layout is as minimal as possible.
Bug: https://github.com/curl/curl/issues/797
Closes #798
Fixes #797
Kamil Dudka [Thu, 12 May 2016 06:36:21 +0000 (08:36 +0200)]
openssl: fix compile-time warning in Curl_ossl_check_cxn()
... introduced in curl-7_48_0
-293-g2968c83:
Error: COMPILER_WARNING:
lib/vtls/openssl.c: scope_hint: In function ‘Curl_ossl_check_cxn’
lib/vtls/openssl.c:767:15: warning: conversion to ‘int’ from ‘ssize_t’
may alter its value [-Wconversion]
Jay Satiro [Thu, 12 May 2016 01:21:15 +0000 (21:21 -0400)]
openssl: stricter connection check function
- In the case of recv error, limit returning 'connection still in place'
to EINPROGRESS, EAGAIN and EWOULDBLOCK.
This is an improvement on the parent commit which changed the openssl
connection check to use recv MSG_PEEK instead of SSL_peek.
Ref: https://github.com/curl/curl/commit/
856baf5#comments
Anders Bakken [Tue, 10 May 2016 19:49:33 +0000 (12:49 -0700)]
TLS: SSL_peek is not a const operation
Calling SSL_peek can cause bytes to be read from the raw socket which in
turn can upset the select machinery that determines whether there's data
available on the socket.
Since Curl_ossl_check_cxn only tries to determine whether the socket is
alive and doesn't actually need to see the bytes SSL_peek seems like
the wrong function to call.
We're able to occasionally reproduce a connect timeout due to this
bug. What happens is that Curl doesn't know to call SSL_connect again
after the peek happens since data is buffered in the SSL buffer and thus
select won't fire for this socket.
Closes #795
Daniel Stenberg [Mon, 9 May 2016 14:50:11 +0000 (16:50 +0200)]
TLS: move the ALPN/NPN enable bits to the connection
Only protocols that actually have a protocol registered for ALPN and NPN
should try to get that negotiated in the TLS handshake. That is only
HTTPS (well, http/1.1 and http/2) right now. Previously ALPN and NPN
would wrongly be used in all handshakes if libcurl was built with it
enabled.
Reported-by: Jay Satiro
Fixes #789
Daniel Stenberg [Sun, 8 May 2016 13:48:26 +0000 (15:48 +0200)]
libcurl-thread.3: openssl 1.1.0 is safe, and so is boringssl
Antonio Larrosa [Thu, 5 May 2016 17:50:15 +0000 (19:50 +0200)]
connect: fix invalid "Network is unreachable" errors
Sometimes, in systems with both ipv4 and ipv6 addresses but where the
network doesn't support ipv6, Curl_is_connected returns an error
(intermittently) even if the ipv4 socket connects successfully.
This happens because there's a for-loop that iterates on the sockets but
the error variable is not resetted when the ipv4 is checked and is ok.
This patch fixes this problem by setting error to 0 when checking the
second socket and not having a result yet.
Fixes #794
Jay Satiro [Thu, 5 May 2016 18:34:27 +0000 (14:34 -0400)]
FAQ: refer to thread safety guidelines
Daniel Stenberg [Mon, 2 May 2016 21:15:05 +0000 (23:15 +0200)]
connections: non-HTTP proxies on different ports aren't reused either
Reported-by: Oleg Pudeyev and fuchaoqun
Fixes #648
Daniel Stenberg [Mon, 2 May 2016 09:24:11 +0000 (11:24 +0200)]
http: make sure a blank header overrides accept_decoding
Reported-by: rcanavan
Assisted-by: Isaac Boukris
Closes #785
Daniel Stenberg [Mon, 2 May 2016 09:18:59 +0000 (11:18 +0200)]
CHECKSRC.md: clarified, explained the whitelist file
Daniel Stenberg [Mon, 2 May 2016 07:09:16 +0000 (09:09 +0200)]
nroff-scan.pl: verify that references are made with \fI
Daniel Stenberg [Mon, 2 May 2016 07:09:36 +0000 (09:09 +0200)]
docs: unified man page references to use \fI
Daniel Stenberg [Mon, 2 May 2016 06:36:54 +0000 (08:36 +0200)]
TODO: 17.14 --fail without --location should treat 3xx as a failure
Closes #727
Daniel Stenberg [Sun, 1 May 2016 21:44:02 +0000 (23:44 +0200)]
RELEASE-NOTES: synced with
7987f5cb14d
Isaac Boukris [Sat, 23 Apr 2016 12:52:04 +0000 (15:52 +0300)]
CURLOPT_ACCEPT_ENCODING.3: Follow-up clarification
Mention possible content-length mismatch with sum of bytes reported
by write callbacks when auto decoding is enabled.
See #785
Daniel Stenberg [Sun, 1 May 2016 21:07:35 +0000 (23:07 +0200)]
test1140: run nroff-scan to verify man pages
Daniel Stenberg [Sun, 1 May 2016 21:07:06 +0000 (23:07 +0200)]
nroff-scan.pl: verify the .BR references as well
Daniel Stenberg [Sun, 1 May 2016 21:06:43 +0000 (23:06 +0200)]
CURLOPT_CONV_TO_NETWORK_FUNCTION.3: fix bad man page reference
Daniel Stenberg [Sun, 1 May 2016 21:06:15 +0000 (23:06 +0200)]
CURLOPT_BUFFERSIZE.3: fix reference to CURLOPT_MAX_RECV_SPEED_LARGE
Daniel Stenberg [Sun, 1 May 2016 21:05:55 +0000 (23:05 +0200)]
curl_easy_pause.3: fix man page reference
Jay Satiro [Sun, 1 May 2016 20:07:04 +0000 (16:07 -0400)]
tool_cb_hdr: Fix --remote-header-name with schemeless URL
- Move the existing scheme check from tool_operate.
In the case of --remote-header-name we want to parse Content-disposition
for a filename, but only if the scheme is http or https. A recent
adjustment
0dc4d8e was made to account for schemeless URLs however it's
not 100% accurate. To remedy that I've moved the scheme check to the
header callback, since at that point the library has already determined
the scheme.
Bug: https://github.com/curl/curl/issues/760
Reported-by: Kai Noda
Daniel Stenberg [Sun, 1 May 2016 15:05:38 +0000 (17:05 +0200)]
tls: make setting pinnedkey option fail if not supported
to make it obvious to users trying to use the feature with TLS backends
not supporting it.
Discussed in #781
Reported-by: Travis Burtrum
Daniel Stenberg [Sun, 1 May 2016 14:41:35 +0000 (16:41 +0200)]
nroff-scan.pl: verifies nroff pages
... not used by any test yet but can be used stand-alone.
Daniel Stenberg [Sun, 1 May 2016 14:41:04 +0000 (16:41 +0200)]
opts: fix broken/bad references
Michael Kaufmann [Sun, 1 May 2016 11:22:16 +0000 (13:22 +0200)]
docs: fix bugs in CURLOPT_HTTP_VERSION.3 and CURLOPT_PIPEWAIT.3
Closes #786
Daniel Stenberg [Sun, 1 May 2016 11:29:11 +0000 (13:29 +0200)]
CURLOPT_ACCEPT_ENCODING.3: clarified
As discussed in #785
Daniel Stenberg [Fri, 29 Apr 2016 22:15:44 +0000 (00:15 +0200)]
curl.1: --mail-rcpt can be used multiple times
Reported-by: mgendre
Closes #784
Karlson2k [Mon, 22 Feb 2016 07:06:53 +0000 (10:06 +0300)]
tests: Use 'pathhelp' for paths conversions in secureserver.pl
Closes #675
Karlson2k [Sun, 21 Feb 2016 20:17:57 +0000 (23:17 +0300)]
tests: Use 'pathhelp' for paths conversions in sshserver.pl
Karlson2k [Tue, 15 Mar 2016 21:14:47 +0000 (00:14 +0300)]
tests: Use 'pathhelp' for current path in runtests.pl
Karlson2k [Tue, 15 Mar 2016 20:07:19 +0000 (23:07 +0300)]
tests: pathhelp.pm to process paths on Msys/Cygwin
Daniel Stenberg [Fri, 29 Apr 2016 13:46:40 +0000 (15:46 +0200)]
lib: include curl_printf.h as one of the last headers
curl_printf.h defines printf to curl_mprintf, etc. This can cause
problems with external headers which may use
__attribute__((format(printf, ...))) markers etc.
To avoid that they cause problems with system includes, we include
curl_printf.h after any system headers. That makes the three last
headers to always be, and we keep them in this order:
curl_printf.h
curl_memory.h
memdebug.h
None of them include system headers, they all do funny #defines.
Reported-by: David Benjamin
Fixes #743
Daniel Stenberg [Fri, 29 Apr 2016 13:33:46 +0000 (15:33 +0200)]
memdebug.h: remove inclusion of other headers
Mostly because they're not needed, because memdebug.h is always included
last of all headers so the others already included the correct ones.
But also, starting now we don't want this to accidentally include any
system headers, as the header included _before_ this header may add
defines and other fun stuff that we won't want used in system includes.
Jay Satiro [Fri, 29 Apr 2016 13:24:10 +0000 (15:24 +0200)]
curl -J: make it work even without http:// scheme on URL
It does open up a miniscule risk that one of the other protocols that
libcurl could use would send back a Content-Disposition header and then
curl would act on it even if not HTTP.
A future mitigation for this risk would be to allow the callback to ask
libcurl which protocol is being used.
Verified with test 1312
Closes #760
Daniel Stenberg [Thu, 28 Apr 2016 21:52:37 +0000 (23:52 +0200)]
manpage-scan.pl: also verify the command line option docs
This script now also scans src/tool_getparam.c, docs/curl.1 and
src/tool_help.c and will warn if any of them lists a command line option
not mentioned in one of the other places.
Daniel Stenberg [Thu, 28 Apr 2016 21:50:52 +0000 (23:50 +0200)]
curl: show the long option version of -q in the -h list
Daniel Stenberg [Thu, 28 Apr 2016 21:47:03 +0000 (23:47 +0200)]
curl: remove "--socks" as "--socks5" turned 8
In commit
2e42b0a2524 (Jan 2008) we made the option "--socks" deprecated
and it has not been documented since. The more explicit socks options
(like --socks4 or --socks5) should be used.
Daniel Stenberg [Thu, 28 Apr 2016 21:46:31 +0000 (23:46 +0200)]
curl.1: document the deprecated --ftp-ssl option
Daniel Stenberg [Thu, 28 Apr 2016 21:38:28 +0000 (23:38 +0200)]
curl: remove --http-request
It was mentioned as deprecated already in commit
ae1912cb0d4 from
1999. It has not been documented in this millennium.
Daniel Stenberg [Thu, 28 Apr 2016 21:33:27 +0000 (23:33 +0200)]
curl: mention --ntlm-wb in -h list
Daniel Stenberg [Thu, 28 Apr 2016 21:31:53 +0000 (23:31 +0200)]
curl: -h output lacked --proxy-header
Daniel Stenberg [Thu, 28 Apr 2016 21:26:52 +0000 (23:26 +0200)]
curl.1: document --ntlm-wb
Daniel Stenberg [Thu, 28 Apr 2016 21:23:44 +0000 (23:23 +0200)]
curl.1: document the long format of -q: --disable
Daniel Stenberg [Thu, 28 Apr 2016 21:23:17 +0000 (23:23 +0200)]
curl.1: mention the deprecated --krb4 option
Daniel Stenberg [Thu, 28 Apr 2016 21:18:28 +0000 (23:18 +0200)]
curl.1: document --ftp-ssl-reqd
Even if deprecated, document it so that people will find it as old
scripts may still use it.
Daniel Stenberg [Thu, 28 Apr 2016 21:13:55 +0000 (23:13 +0200)]
curl: use --telnet-option as documented
The code said "telnet-options" but no documentation ever said so. It
worked fine since the code is fine with a unique match of the first
part.
Daniel Stenberg [Thu, 28 Apr 2016 21:08:42 +0000 (23:08 +0200)]
getparam: remove support for --ftpport
It has been deprecated and undocumented since commit
ad5ead8bed7 (Dec
2003). --ftp-port is the proper long option name.
Daniel Stenberg [Thu, 28 Apr 2016 20:32:05 +0000 (22:32 +0200)]
curl: make --disable work as long form of -q
To make the aliases list reflect reality.
Daniel Stenberg [Thu, 28 Apr 2016 20:28:37 +0000 (22:28 +0200)]
aliases: remove trailing space from capath string
Daniel Stenberg [Thu, 28 Apr 2016 20:24:10 +0000 (22:24 +0200)]
cmdline parse: only single letter options have single-letter strings
... moved around options so that parsing the code to find all
single-letter options easier.
Jay Satiro [Thu, 28 Apr 2016 20:48:38 +0000 (16:48 -0400)]
CURLINFO_TLS_SSL_PTR.3: Clarify SSL pointer availability
Bug: https://curl.haxx.se/mail/lib-2016-04/0126.html
Reported-by: Bru Rom
Daniel Stenberg [Thu, 28 Apr 2016 14:31:37 +0000 (16:31 +0200)]
curl_easy_getinfo.3: remove superfluous blank lines
Daniel Stenberg [Thu, 28 Apr 2016 14:27:51 +0000 (16:27 +0200)]
test1139: verifies libcurl option man page presence
- checks that each option has its own man page present
- checks that each option is mentioned in its corresponding index man
page
Daniel Stenberg [Thu, 28 Apr 2016 14:26:42 +0000 (16:26 +0200)]
curl_easy_getinfo.3: added missing mention of CURLINFO_TLS_SESSION
... although it is deprecated.
Jay Satiro [Thu, 28 Apr 2016 06:57:12 +0000 (02:57 -0400)]
mbedtls: Fix session resume
This also fixes PolarSSL session resume.
Prior to this change the TLS session information wasn't properly
saved and restored for PolarSSL and mbedTLS.
Bug: https://curl.haxx.se/mail/lib-2016-01/0070.html
Reported-by: Thomas Glanzmann
Bug: https://curl.haxx.se/mail/lib-2016-04/0095.html
Reported-by: Moti Avrahami
Daniel Stenberg [Wed, 27 Apr 2016 13:31:38 +0000 (15:31 +0200)]
RELEASE-NOTES: synced with
f4298fcc6d2
Michael Kaufmann [Tue, 26 Apr 2016 21:51:50 +0000 (23:51 +0200)]
opts: Fix some syntax errors in example code fragments
Fixes #779
Daniel Stenberg [Tue, 26 Apr 2016 21:55:31 +0000 (23:55 +0200)]
openssl: avoid BN_print a NULL bignum
OpenSSL 1.1.0-pre seems to return NULL(?) for a whole lot of those
numbers so make sure the function handles this.
Reported-by: Linus Nordberg
Marcel Raad [Mon, 15 Feb 2016 07:58:36 +0000 (08:58 +0100)]
CONNECT_ONLY: don't close connection on GSS 401/407 reponses
Previously, connections were closed immediately before the user had a
chance to extract the socket when the proxy required Negotiate
authentication.
This regression was brought in with the security fix in commit
79b9d5f1a42578f
Closes #655
Daniel Stenberg [Tue, 26 Apr 2016 13:17:07 +0000 (15:17 +0200)]
CURLINFO_TLS_SESSION.3: clarify TLS library support before 7.48.0
Daniel Stenberg [Mon, 25 Apr 2016 22:28:40 +0000 (00:28 +0200)]
mbedtls.c: silly spellfix of a comment
Daniel Stenberg [Mon, 25 Apr 2016 22:07:40 +0000 (00:07 +0200)]
KNOWN_BUGS: 1.10 Strips trailing dot from host name
Closes #716
Daniel Stenberg [Mon, 25 Apr 2016 21:51:33 +0000 (23:51 +0200)]
test1322: verify stripping of trailing dot from host name
While being debated (in #716) and a violation of RFC 7230 section 5.4,
this test verifies that the existing functionality works as intended. It
strips the dot from the host name and uses the host without dot
throughout the internals.
Daniel Stenberg [Sat, 23 Apr 2016 20:46:15 +0000 (22:46 +0200)]
multi: accidentally used resolved host name instead of proxy
Regression introduced in
09b5a998
Bug: https://curl.haxx.se/mail/lib-2016-04/0084.html
Reported-by: BoBo
Daniel Stenberg [Mon, 25 Apr 2016 21:15:00 +0000 (23:15 +0200)]
symbols-in-versions: added new CURLSSLBACKEND_ symbols
Daniel Stenberg [Mon, 25 Apr 2016 21:10:13 +0000 (23:10 +0200)]
test148: fixed after the --ftp-create-dirs retry change
follow-up commit to
3c1e84f569 as it made curl try a little harder
Daniel Stenberg [Mon, 25 Apr 2016 09:35:12 +0000 (11:35 +0200)]
curl.h: clarify curl_sslbackend for openssl clones and renames
Karlson2k [Mon, 25 Apr 2016 09:12:26 +0000 (12:12 +0300)]
url.c: fixed DEBUGASSERT() for WinSock workaround
If buffer is allocated, but nothing is received during prereceive
stage, than number of processed bytes must be zero.
Closes #778
Daniel Stenberg [Mon, 25 Apr 2016 09:20:23 +0000 (11:20 +0200)]
KNOWN_BUGS: --interface for ipv6 binds to unusable IP address
Closes #686 for now.
Daniel Stenberg [Sun, 24 Apr 2016 21:51:34 +0000 (23:51 +0200)]
TODO: 1.17 Add support for IRIs
Adding support for IRIs is a mouthful, but is probably interesting at
least for areas and countries where the use of such "URLs" are growing
popularity.
Closes #776
Daniel Stenberg [Sun, 24 Apr 2016 10:46:41 +0000 (12:46 +0200)]
THANKS-filter: Travis Burtrum
Daniel Stenberg [Sun, 24 Apr 2016 10:27:22 +0000 (12:27 +0200)]
lib1517: checksrc compliance
moparisthebest [Fri, 22 Apr 2016 01:21:45 +0000 (21:21 -0400)]
PolarSSL: Implement public key pinning
Patrick Monnerat [Fri, 22 Apr 2016 14:50:30 +0000 (16:50 +0200)]
os400: upgrade ILE/RPG binding
Patrick Monnerat [Fri, 22 Apr 2016 14:49:02 +0000 (16:49 +0200)]
curl.h: CURLOPT_CONNECT_TO sets a struct slist *, not a string
Daniel Stenberg [Fri, 22 Apr 2016 13:53:42 +0000 (15:53 +0200)]
contributors.sh: make --releasenotes implied
It got too annoying to type =)
Daniel Stenberg [Fri, 22 Apr 2016 13:46:34 +0000 (15:46 +0200)]
RELEASE-NOTES: synced with
3c1e84f5693d8093
Daniel Stenberg [Fri, 22 Apr 2016 13:25:13 +0000 (15:25 +0200)]
curl: make --ftp-create-dirs retry on failure
The underlying libcurl option used for this feature is
CURLOPT_FTP_CREATE_MISSING_DIRS which has the ability to retry the dir
creation, but it was never set to do that by the command line tool.
Now it does.
Bug: https://curl.haxx.se/mail/archive-2016-04/0021.html
Reported-by: John Wanghui
Help-by: Leif W
Henrik Gaßmann [Thu, 21 Apr 2016 21:23:49 +0000 (23:23 +0200)]
winbuild: add mbedtls support
Add WITH_MBEDTLS option. Make WITH_SSL, WITH_MBEDTLS and ENABLE_WINSSL
options mutual exclusive.
Closes #606
Daniel Stenberg [Thu, 21 Apr 2016 21:14:13 +0000 (23:14 +0200)]
KNOWN_BUGS: fixed "5.6 Improper use of Autoconf cache variables"
As of commit
d9f3b365a3
Irfan Adilovic [Sun, 17 Apr 2016 20:05:15 +0000 (22:05 +0200)]
configure: ac_cv_ -> curl_cv_ for write-only vars
These configure vars are modified in a curl-specific way but never
evaluated or loaded from cache, even though they are designated as
_cv_. We could either implement proper AC_CACHE_CHECKs for them, or
remove them completely.
Fixes #603 as ac_cv_func_gethostbyname is no longer clobbered, and
AC_CHECK_FUNC(gethostbyname...) will no longer spuriously succeed after
the first configure run with caching.
`ac_cv_func_strcasecmp` is curious, see #770.
`eval "ac_cv_func_$func=yes"` can still cause problems as it works in
tandem with AC_CHECK_FUNCS and then potentially modifies its result. It
would be best to rewrite this test to use a new CURL_CHECK_FUNCS macro,
which works the same as AC_CHECK_FUNCS but relies on caching the values
of curl_cv_func_* variables, without modifiying ac_cv_func_*.
Irfan Adilovic [Sun, 17 Apr 2016 19:58:15 +0000 (21:58 +0200)]
configure: ac_cv_ -> curl_cv_ for r/w vars
These configure vars are modified in a curl-specific way and modified by
the configure process, but are never loaded from cache, even though they
are designated as _cv_. We should implement proper AC_CACHE_CHECKs for
them eventually.
Irfan Adilovic [Sun, 17 Apr 2016 15:01:13 +0000 (17:01 +0200)]
configure: ac_cv_func_clock_gettime -> curl_...
This variable must not be cached in its current form, as any cached
information will prevent the next configure run from determining the
correct LIBS needed for the function. Thus, rename prefix `ac_cv_` to
just `curl_`.
Irfan Adilovic [Fri, 15 Apr 2016 14:37:20 +0000 (16:37 +0200)]
configure: ac_cv_ -> curl_cv_ for all cached vars
This was automated by:
sed -b -i -f <(ack -A1 AC_CACHE_CHECK | \
ack -o 'ac_cv_.*?\b' | \
sort -u | xargs -n1 bash -c \
'echo "s/$0/curl_cv_${0#ac_cv_}/g"') \
$(git ls-files)
This only changed the prefix for 16 variables actually checked with
AC_CACHE_CHECK.
Daniel Stenberg [Thu, 21 Apr 2016 08:24:23 +0000 (10:24 +0200)]
openssl: builds with OpenSSL 1.1.0-pre5
The RSA, DSA and DH structs are now opaque and require use of new APIs
Fixes #763
Steve Holme [Wed, 20 Apr 2016 17:07:05 +0000 (18:07 +0100)]
url.c: Prefer we don't use explicit NULLs in conditions
Fixed commit
fa5fa65a30 to not use NULLs in if condition.
Isaac Boukris [Sat, 16 Apr 2016 08:49:09 +0000 (11:49 +0300)]
NTLM: check for NULL pointer before deferencing
At ConnectionExists, both check->proxyuser and check->proxypasswd
could be NULL, so make sure to check first.
Fixes #765
Karlson2k [Thu, 17 Mar 2016 17:04:20 +0000 (20:04 +0300)]
tests: added test1517
... for checking ability to receive full HTTP response when POST request
is used with slow read callback function.
This test checks for bug #657 and verifies the work-around from
72d5e144fbc6.
Closes #720
Karlson2k [Fri, 19 Feb 2016 19:38:20 +0000 (22:38 +0300)]
sendf.c: added ability to call recv() before send() as workaround
WinSock destroys recv() buffer if send() is failed. As result - server
response may be lost if server sent it while curl is still sending
request. This behavior noticeable on HTTP server short replies if
libcurl use several send() for request (usually for POST request).
To workaround this problem, libcurl use recv() before every send() and
keeps received data in intermediate buffer for further processing.
Fixes: #657
Closes: #668
Kamil Dudka [Tue, 19 Apr 2016 07:38:44 +0000 (09:38 +0200)]
connect: make sure that rc is initialized in singleipconnect()
This commit fixes a Clang warning introduced in curl-7_48_0
-190-g8f72b13:
Error: CLANG_WARNING:
lib/connect.c:1120:11: warning: The right operand of '==' is a garbage value
1118| }
1119|
1120|-> if(-1 == rc)
1121| error = SOCKERRNO;
1122| }
Daniel Stenberg [Tue, 19 Apr 2016 06:48:36 +0000 (08:48 +0200)]
make/checksrc: use $srcdir, not $top_srcdir
Daniel Stenberg [Tue, 19 Apr 2016 06:43:13 +0000 (08:43 +0200)]
src/checksrc.whitelist: removed