Daniel Stenberg [Thu, 16 Oct 2014 21:39:28 +0000 (23:39 +0200)]
test545: make it not use a trailing zero
CURLOPT_COPYPOSTFIELDS with a given CURLOPT_POSTFIELDSIZE does not
require a trailing zero of the data and by making sure this test doesn't
use one we know it works (combined with valgrind).
Steve Holme [Thu, 16 Oct 2014 19:28:30 +0000 (20:28 +0100)]
ntlm: Fixed empty type-2 decoded message info text
Updated the info text when the base-64 decode of the type-2 message
returns a null buffer to be more specific.
Steve Holme [Thu, 16 Oct 2014 19:25:15 +0000 (20:25 +0100)]
ntlm: Fixed empty/bad base-64 decoded buffer return codes
Steve Holme [Thu, 16 Oct 2014 19:22:20 +0000 (20:22 +0100)]
ntlm: Avoid unnecessary buffer allocation for SSPI based type-2 token
Daniel Stenberg [Thu, 16 Oct 2014 09:37:52 +0000 (11:37 +0200)]
httpcustomheader.c: make use of more CURLOPT_HTTPHEADER features
... and only do a single request for clarity.
Steve Holme [Wed, 15 Oct 2014 20:48:59 +0000 (21:48 +0100)]
sasl_sspi: Fixed some typos
Steve Holme [Wed, 15 Oct 2014 20:20:25 +0000 (21:20 +0100)]
sasl_sspi: Fixed Kerberos response buffer not being allocated when using SSO
Bruno Thomsen [Wed, 15 Oct 2014 10:48:27 +0000 (12:48 +0200)]
mk-ca-bundle: added SHA-384 signature algorithm
Certificates based on SHA-1 are being phased out[1].
So we should expect a rise in certificates based on SHA-2.
Adding SHA-384 as a valid signature algorithm.
[1] https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/
Signed-off-by: Bruno Thomsen <bth@kamstrup.dk>
Patrick Monnerat [Tue, 14 Oct 2014 13:43:25 +0000 (15:43 +0200)]
OS400: fix bugs in curl_*escape_ccsid() and reduce variables scope
Patrick Monnerat [Tue, 14 Oct 2014 12:58:26 +0000 (14:58 +0200)]
Implement pinned public key in GSKit backend
Daniel Stenberg [Tue, 14 Oct 2014 08:23:27 +0000 (10:23 +0200)]
CURLOPT_TLSAUTH_*.3: fix reference typos
Daniel Stenberg [Tue, 14 Oct 2014 07:44:06 +0000 (09:44 +0200)]
cleanups: reduce variable scope
cppcheck pointed these out.
Daniel Stenberg [Tue, 14 Oct 2014 07:16:16 +0000 (09:16 +0200)]
singleipconnect: remove dead assignment never used
cppcheck pointed this out.
Daniel Stenberg [Mon, 13 Oct 2014 20:22:49 +0000 (22:22 +0200)]
pinning: minor code style policing
Patrick Monnerat [Mon, 13 Oct 2014 16:34:51 +0000 (18:34 +0200)]
Factorize pinned public key code into generic file handling and backend specific
Patrick Monnerat [Mon, 13 Oct 2014 14:33:47 +0000 (16:33 +0200)]
vtls: remove QsoSSL
Patrick Monnerat [Mon, 13 Oct 2014 13:02:58 +0000 (15:02 +0200)]
gskit: supply dummy randomization function
Patrick Monnerat [Mon, 13 Oct 2014 12:39:50 +0000 (14:39 +0200)]
vtls/*: deprecate have_curlssl_md5sum and set-up default md5sum implementation
Peter Wu [Sun, 12 Oct 2014 22:00:39 +0000 (00:00 +0200)]
tests: move TESTCASES to Makefile.inc, add show for cmake
This change allows runtests.pl to be run from the CMake builddir:
export srcdir=/tmp/curl/tests;
perl -I$srcdir $srcdir/runtests.pl -l
In order to make this possible, all test cases have been moved from
Makefile.am to Makefile.inc.
Signed-off-by: Peter Wu <peter@lekensteyn.nl>
Peter Wu [Mon, 13 Oct 2014 09:19:36 +0000 (11:19 +0200)]
cmake: enable IPv6 by default if available
ENABLE_IPV6 depends on HAVE_GETADDRINFO or you will get a
Curl_getaddrinfo_ex error. Enable IPv6 by default, disabling it if
struct sockaddr_in6 is not found in netinet/in.h.
Note that HAVE_GETADDRINFO_THREADSAFE is still not set as it needs more
platform checks even though POSIX requires a thread-safe getaddrinfo.
Verified on Arch Linux x86_64 with glibc 2.20-2 and Linux 3.16-rc7.
Signed-off-by: Peter Wu <peter@lekensteyn.nl>
Peter Wu [Sun, 12 Oct 2014 09:27:07 +0000 (11:27 +0200)]
cmake: build tool_hugehelp (ENABLE_MANUAL)
Rather than always outputting an empty manual page for the '-M' option,
generate a full manual page as done by autotools. For simplicity in
CMake, always generate the gzipped page as it will not be used anyway
when zlib is not available.
Signed-off-by: Peter Wu <peter@lekensteyn.nl>
Peter Wu [Fri, 10 Oct 2014 14:15:42 +0000 (16:15 +0200)]
tests/http_pipe.py: Python 3 support
The 2to3 tool converted socketserver (which I manually fixed up with an
import fallback) and the print(e) line. The xrange option was converted
to range, but it seems better to use the '*' operator here for
simplicity.
Signed-off-by: Peter Wu <peter@lekensteyn.nl>
Daniel Stenberg [Fri, 10 Oct 2014 08:50:23 +0000 (10:50 +0200)]
SECURITY: slightly nicer markdown format
Daniel Stenberg [Fri, 10 Oct 2014 08:39:01 +0000 (10:39 +0200)]
RELEASE-PROCEDURE: better markdown, more content
Daniel Stenberg [Thu, 9 Oct 2014 21:55:17 +0000 (23:55 +0200)]
RELEASE-NOTES: synced with
6637b237e6eb
... and bumped the planned release version.
Daniel Stenberg [Thu, 9 Oct 2014 20:34:34 +0000 (22:34 +0200)]
vtls: have vtls.h include the backend header files
It turned out some features were not enabled in the build since for
example url.c #ifdefs on features that are defined on a per-backend
basis but vtls.h didn't include the backend headers.
CURLOPT_CERTINFO was one such feature that was accidentally disabled.
Daniel Stenberg [Thu, 9 Oct 2014 14:50:26 +0000 (16:50 +0200)]
test2036: verify -O with no slash at all in the URL
Similar to test 76 but that test's URL has a slash just no file name
part.
Daniel Stenberg [Thu, 9 Oct 2014 14:42:17 +0000 (16:42 +0200)]
get_url_file_name: make no slash equal empty string
Daniel Stenberg [Thu, 9 Oct 2014 14:37:11 +0000 (16:37 +0200)]
get_url_file_name: never return a NULL string *and* OK
Change
987a4a73 assumes that as it simplifies life in the calling
function.
Reported-by: Fabian Keil
Jakub Zakrzewski [Thu, 25 Sep 2014 13:03:00 +0000 (15:03 +0200)]
Cmake: Build with GSSAPI (MIT or Heimdal)
It tries hard to recognise SDK's on different platforms. On windows MIT
Kerberos installs SDK with other things and puts path into registry.
Heimdal have separate zip archive. On linux pkg-config is tried, then
krb5-config script and finally old-style libs and headers detection.
Command line args:
* CMAKE_USE_GSSAPI - enables GSSAPI detection
* GSS_ROOT_DIR - if set, should point to the root of GSSAPI installation
(the one with include and lib directories)
Jakub Zakrzewski [Fri, 22 Aug 2014 15:02:59 +0000 (17:02 +0200)]
Cmake: Got rid of setup_curl_dependencies
There is no need for such function. Include_directories propagate by
themselves and having a function with one simple link statement makes
little sense.
Jakub Zakrzewski [Fri, 22 Aug 2014 14:59:30 +0000 (16:59 +0200)]
Cmake: Avoid cycle directory dependencies.
Because we prepended libraries to list, CMake had troubles resolving
link directory order as it detected some cycles. Appending to list ensures
that dependencies will preceed dependees.
Jakub Zakrzewski [Thu, 21 Aug 2014 11:37:07 +0000 (13:37 +0200)]
Cmake: Fix library list provided to cURL tests.
The list must be set after those nice CMake tests as we mess with
CMAKE_REQUIRED_LIBRARIES there.
Jakub Zakrzewski [Thu, 21 Aug 2014 11:15:59 +0000 (13:15 +0200)]
Cmake: Check for OpenSSL before OpenLDAP.
OpenLDAP might have been build with OpenSSL. Checking for OpenLDAP first
may result in undefined symbols. Of course, the found OpenSSL libraries
must also be linked whenever OpenLDAP is.
Daniel Stenberg [Thu, 9 Oct 2014 11:41:13 +0000 (13:41 +0200)]
curl_multi_fdset.3: improved the formatting slightly
Daniel Stenberg [Thu, 9 Oct 2014 11:17:27 +0000 (13:17 +0200)]
curl_multi_fdset: explain the fd_set arguments
Kamil Dudka [Wed, 8 Oct 2014 15:13:59 +0000 (17:13 +0200)]
nss: do not fail if a CRL is already cached
This fixes a copy-paste mistake from commit
2968f957.
Patrick Monnerat [Wed, 8 Oct 2014 13:47:04 +0000 (15:47 +0200)]
OS400: upgrade interface for pinned public key (no implementation yet)
Daniel Stenberg [Wed, 8 Oct 2014 11:53:41 +0000 (13:53 +0200)]
FormAdd: precaution against memdup() of NULL pointer
Coverity CID 252518. This function is in general far too complicated for
its own good and really should be broken down into several smaller
funcitons instead - but I'm adding this protection here now since it
seems there's a risk the code flow can end up here and dereference a
NULL pointer.
Daniel Stenberg [Wed, 8 Oct 2014 11:18:55 +0000 (13:18 +0200)]
operate: avoid NULL dereference
Coverity CID
1241948. dumpeasysrc() would get called with
config->current set to NULL which could be dereferenced by a warnf()
call.
Daniel Stenberg [Wed, 8 Oct 2014 10:48:06 +0000 (12:48 +0200)]
do_sec_send: remove dead code
Coverity CID
1241951. The condition 'len >= 0' would always be true at
that point and thus not necessary to check for.
Daniel Stenberg [Wed, 8 Oct 2014 10:25:07 +0000 (12:25 +0200)]
krb5_encode: remove unused argument
Coverity CID
1241957. Removed the unused argument. As this struct and
pointer now are used only for krb5, there's no need to keep unused
function arguments around.
Daniel Stenberg [Wed, 8 Oct 2014 10:21:39 +0000 (12:21 +0200)]
operate_do: skip superfluous check for NULL pointer
Coverity CID
1243583. get_url_file_name() cannot fail and return a NULL
file name pointer so skip the check for that - it tricks coverity into
believing it can happen and it then warns later on when we use 'outfile'
without checking for NULL.
Daniel Stenberg [Tue, 7 Oct 2014 13:48:37 +0000 (15:48 +0200)]
curl_easy_getinfo.3: spell-fix
Reported-By: Luan Cestari
moparisthebest [Wed, 1 Oct 2014 06:14:49 +0000 (02:14 -0400)]
GnuTLS: Implement public key pinning
moparisthebest [Wed, 1 Oct 2014 02:31:17 +0000 (22:31 -0400)]
SSL: implement public key pinning
Option --pinnedpubkey takes a path to a public key in DER format and
only connect if it matches (currently only implemented with OpenSSL).
Provides CURLOPT_PINNEDPUBLICKEY for curl_easy_setopt().
Extract a public RSA key from a website like so:
openssl s_client -connect google.com:443 2>&1 < /dev/null | \
sed -n '/-----BEGIN/,/-----END/p' | openssl x509 -noout -pubkey \
| openssl rsa -pubin -outform DER > google.com.der
Daniel Stenberg [Tue, 7 Oct 2014 11:57:13 +0000 (13:57 +0200)]
multi_runsingle: fix possible memory leak
Coverity CID
1202837. 'newurl' can in fact be allocated even when
Curl_retry_request() returns failure so free it if need be.
Daniel Stenberg [Tue, 7 Oct 2014 11:33:43 +0000 (13:33 +0200)]
ares::Curl_resolver_cancel: skip checking for NULL conn
Coverity CID
1243581. 'conn' will never be NULL here, and if it would be
the subsequent statement would dereference it!
Daniel Stenberg [Tue, 7 Oct 2014 08:29:06 +0000 (10:29 +0200)]
parseconfig: skip a NULL check
Coverity CID
1154198. This NULL check implies that the pointer _can_ be
NULL at this point, which it can't. Thus it is dead code. It tricks
static analyzers to warn about dereferencing the pointer since the code
seems to imply it can be NULL.
Waldek Kozba [Tue, 7 Oct 2014 07:59:59 +0000 (09:59 +0200)]
multi-uv.c: call curl_multi_info_read() better
Improves it for low-latency cases (like the communication with
localhost)
Daniel Stenberg [Mon, 6 Oct 2014 06:53:12 +0000 (08:53 +0200)]
tool_go_sleep: use (void) to spell out we ignore the return value
Coverity CID
1222080.
Daniel Stenberg [Mon, 6 Oct 2014 06:49:43 +0000 (08:49 +0200)]
ssh_statemach_act: split out assignment from check
just a minor code style thing to make the code clearer
Marc Hoersken [Sat, 4 Oct 2014 16:24:23 +0000 (18:24 +0200)]
curl_schannel.c: Fixed possible memory or handle leak
First try to fix possible memory leaks, in this case:
Only connssl->ctxt xor onnssl->cred being initialized.
Daniel Stenberg [Sat, 4 Oct 2014 14:14:39 +0000 (16:14 +0200)]
getparameter: remove dead code
Coverity CID
1061126. 'parse' will always be non-NULL here.
Daniel Stenberg [Sat, 4 Oct 2014 14:12:06 +0000 (16:12 +0200)]
getparameter: comment a switch FALLTHROUGH
Coverity CID
1061118. Point out that it is on purpose.
Daniel Stenberg [Sat, 4 Oct 2014 13:37:42 +0000 (15:37 +0200)]
choose_mech: fix return code
Coverity CID
1241950. The pointer is never NULL but it might point to
NULL.
Daniel Stenberg [Sat, 4 Oct 2014 13:21:39 +0000 (15:21 +0200)]
Curl_sec_read_msg: spell out that we ignore return code
Coverity CID
1241947. Since if sscanf() fails, the previously set value
remains set.
Daniel Stenberg [Sat, 4 Oct 2014 13:14:27 +0000 (15:14 +0200)]
nonblock: call with (void) to show we ignore the return code
Coverity pointed out several of these.
Daniel Stenberg [Fri, 3 Oct 2014 21:51:19 +0000 (23:51 +0200)]
parse_proxy: remove dead code.
Coverity CID 982331.
Daniel Stenberg [Fri, 3 Oct 2014 21:49:39 +0000 (23:49 +0200)]
Curl_debug: document switch fallthroughs
Daniel Stenberg [Fri, 3 Oct 2014 21:46:10 +0000 (23:46 +0200)]
curl_multi_remove_handle: remove dead code
Coverify CID
1157776. Removed a superfluous if() that always evaluated
true (and an else clause that never ran), and then re-indented the
function accordingly.
Daniel Stenberg [Fri, 3 Oct 2014 21:40:57 +0000 (23:40 +0200)]
Curl_pipeline_server_blacklisted: handle a NULL server name
Coverity CID
1215284. The server name is extracted with
Curl_copy_header_value() and passed in to this function, and
copy_header_value can actually can fail and return NULL.
Daniel Stenberg [Fri, 3 Oct 2014 21:30:05 +0000 (23:30 +0200)]
ssh: comment "fallthrough" in switch statement
Jeremy Lin [Tue, 16 Sep 2014 04:16:46 +0000 (21:16 -0700)]
ssh: improve key file search
For private keys, use the first match from: user-specified key file
(if provided), ~/.ssh/id_rsa, ~/.ssh/id_dsa, ./id_rsa, ./id_dsa
Note that the previous code only looked for id_dsa files. id_rsa is
now generally preferred, as it supports larger key sizes.
For public keys, use the user-specified key file, if provided.
Otherwise, try to extract the public key from the private key file.
This means that passing --pubkey is typically no longer required,
and makes the key-handling behavior more like OpenSSH.
Daniel Stenberg [Fri, 3 Oct 2014 11:35:40 +0000 (13:35 +0200)]
CURLOPT_HTTPHEADER.3: libcurl doesn't copy the whole list
Daniel Stenberg [Thu, 2 Oct 2014 21:31:01 +0000 (23:31 +0200)]
detect_proxy: fix possible single-byte memory leak
Coverity CID
1202836. If the proxy environment variable returned an empty
string, it would be leaked. While an empty string is not really a proxy, other
logic in this function already allows a blank string to be returned so allow
that here to avoid the leak.
Daniel Stenberg [Thu, 2 Oct 2014 21:22:01 +0000 (23:22 +0200)]
multi_runsingle: fix memory leak
Coverity CID
1202837. There's a potential risk that 'newurl' gets
overwritten when it was already pointing to allocated memory.
Daniel Stenberg [Thu, 2 Oct 2014 21:07:06 +0000 (23:07 +0200)]
pop3_perform_authentication: fix memory leak
Coverity CID
1215287. There's a potential risk for a memory leak in
here, and moving the free call to be unconditional seems like a cheap
price to remove the risk.
Daniel Stenberg [Thu, 2 Oct 2014 21:01:45 +0000 (23:01 +0200)]
imap_perform_authentication: fix memory leak
Coverity CID
1215296. There's a potential risk for a memory leak in
here, and moving the free call to be unconditional seems like a cheap
price to remove the risk.
Daniel Stenberg [Thu, 2 Oct 2014 20:52:23 +0000 (22:52 +0200)]
wait_or_timeout: return failure when Curl_poll() fails
Coverity detected this. CID
1241954. When Curl_poll() returns a negative value
'mcode' was uninitialized. Pretty harmless since this is debug code only and
would at worst cause an error to _not_ be returned...
Daniel Stenberg [Wed, 1 Oct 2014 06:29:43 +0000 (08:29 +0200)]
curl.1: mention quoting in the URL section
and separate the example URLs with newlines
Bill Nagel [Fri, 26 Sep 2014 18:55:01 +0000 (18:55 +0000)]
smtp: Fixed intermittent "SSL3_WRITE_PENDING: bad write retry" error
This patch fixes the "SSL3_WRITE_PENDING: bad write retry" error that
sometimes occurs when sending an email over SMTPS with OpenSSL. OpenSSL
appears to require the same pointer on a write that follows a retry
(CURLE_AGAIN) as discussed here:
http://stackoverflow.com/questions/
2997218/why-am-i-getting-error1409f07fssl-routinesssl3-write-pending-bad-write-retr
Daniel Stenberg [Tue, 30 Sep 2014 13:18:02 +0000 (15:18 +0200)]
RELEASE-NOTES: synced with
53cbea22310f15
Daniel Stenberg [Thu, 25 Sep 2014 11:44:24 +0000 (13:44 +0200)]
file: reject paths using embedded %00
Mostly because we use C strings and they end at a binary zero so we know
we can't open a file name using an embedded binary zero.
Reported-by: research@g0blin.co.uk
Dan Fandrich [Fri, 26 Sep 2014 04:41:23 +0000 (06:41 +0200)]
test506: Fixed a couple of memory leaks in test
Yousuke Kimoto [Thu, 25 Sep 2014 14:25:52 +0000 (16:25 +0200)]
CURLOPT_COOKIELIST: Added "RELOAD" command
Michael Wallner [Thu, 25 Sep 2014 13:11:04 +0000 (15:11 +0200)]
CURLOPT_POSTREDIR.3: Added availability for CURL_REDIR_POST_303
Daniel Stenberg [Tue, 23 Sep 2014 09:44:03 +0000 (11:44 +0200)]
threaded-resolver: revert Curl_expire_latest() switch
The switch to using Curl_expire_latest() in commit
cacdc27f52b was a
mistake and was against the advice even mentioned in that commit. The
comparison in asyn-thread.c:Curl_resolver_is_resolved() makes
Curl_expire() the suitable function to use.
Bug: http://curl.haxx.se/bug/view.cgi?id=1426
Reported-By: graysky
Daniel Stenberg [Fri, 19 Sep 2014 13:07:58 +0000 (15:07 +0200)]
libcurl docs: improvements all over
Steve Holme [Fri, 19 Sep 2014 11:43:10 +0000 (12:43 +0100)]
build: Added WinIDN build configuration options
Added initial support for WinIDN build configurations to the VC10+
project files.
Daniel Stenberg [Fri, 19 Sep 2014 10:54:19 +0000 (12:54 +0200)]
tutorial: signals aren't used for the threaded resolver
Daniel Stenberg [Fri, 19 Sep 2014 08:01:45 +0000 (10:01 +0200)]
FAQ: update the pronunciation section
As we weren't using the correct phonetic description and doing it correctly
involves funny letters that I'm sure will cause problems for people in a text
document so I instead rephrased it and link to a WAV file with a person
actually saying 'curl'.
Reported-By: Dimitar Boevski
Daniel Stenberg [Thu, 18 Sep 2014 20:58:12 +0000 (22:58 +0200)]
CURLOPT_COOKIE*: added more cross-references
Daniel Stenberg [Thu, 18 Sep 2014 07:05:29 +0000 (09:05 +0200)]
BINDINGS: add node-libcurl
Reported-By: Jonathan Cardoso Machado
URL: http://curl.haxx.se/mail/lib-2014-09/0102.html
Daniel Stenberg [Mon, 15 Sep 2014 21:13:35 +0000 (23:13 +0200)]
README.http2: updated to reflect current status
Daniel Stenberg [Sat, 13 Sep 2014 17:09:56 +0000 (19:09 +0200)]
formdata: removed unnecessary USE_SSLEAY use
Daniel Stenberg [Sat, 13 Sep 2014 13:31:12 +0000 (15:31 +0200)]
curlssl: make tls backend symbols use curlssl in the name
Daniel Stenberg [Sat, 13 Sep 2014 13:28:08 +0000 (15:28 +0200)]
url: let the backend decide CURLOPT_SSL_CTX_ support
... to further remove specific TLS backend knowledge from url.c
Daniel Stenberg [Sat, 13 Sep 2014 13:11:26 +0000 (15:11 +0200)]
vtls: have the backend tell if it supports CERTINFO
Catalin Patulea [Sat, 13 Sep 2014 05:58:04 +0000 (07:58 +0200)]
configure: allow --with-ca-path with PolarSSL too
Missed this in
af45542c.
Signed-off-by: Catalin Patulea <cat@vv.carleton.ca>
Daniel Stenberg [Sat, 13 Sep 2014 12:56:27 +0000 (14:56 +0200)]
CURLOPT_CAPATH: return failure if set without backend support
Tatsuhiro Tsujikawa [Sat, 13 Sep 2014 02:59:23 +0000 (11:59 +0900)]
http2: Fix busy loop when EOF is encountered
Previously we did not handle EOF from underlying transport socket and
wrongly just returned error code CURL_AGAIN from http2_recv, which
caused busy loop since socket has been closed. This patch adds the
code to handle EOF situation and tells the upper layer that we got
EOF.
Steve Holme [Sat, 13 Sep 2014 10:24:07 +0000 (11:24 +0100)]
build: Added batch wrapper to checksrc.pl
Steve Holme [Sat, 13 Sep 2014 09:23:36 +0000 (10:23 +0100)]
RELEASE-NOTES: Synced with
bd3df5ec6d
Marcel Raad [Wed, 10 Sep 2014 12:32:56 +0000 (14:32 +0200)]
sasl_sspi: Fixed Unicode build
Bug: http://curl.haxx.se/bug/view.cgi?id=1422
Verified-by: Steve Holme
Daniel Stenberg [Fri, 12 Sep 2014 19:02:12 +0000 (21:02 +0200)]
libcurl-tutorial.3: fix GnuTLS link to thread-safety guidelines
The former link was turned into a 404 at some point.
Reported-By: Askar Safin
Daniel Stenberg [Fri, 12 Sep 2014 13:12:06 +0000 (15:12 +0200)]
contributors.sh: split list of names at comma
... to support a list of names provided in a commit message.
Ulrich Telle [Fri, 12 Sep 2014 10:22:56 +0000 (12:22 +0200)]
ntlm: Fixed HTTP proxy authentication when using Windows SSPI
Removed ISC_REQ_* flags from calls to InitializeSecurityContext to fix
bug in NTLM handshake for HTTP proxy authentication.
NTLM handshake for HTTP proxy authentication failed with error
SEC_E_INVALID_TOKEN from InitializeSecurityContext for certain proxy
servers on generating the NTLM Type-3 message.
The flag ISC_REQ_CONFIDENTIALITY seems to cause the problem according
to the observations and suggestions made in a bug report for the
QT project (https://bugreports.qt-project.org/browse/QTBUG-17322).
Removing all the flags solved the problem.
Bug: http://curl.haxx.se/mail/lib-2014-08/0273.html
Reported-by: Ulrich Telle
Assisted-by: Steve Holme, Daniel Stenberg
Ray Satiro [Fri, 12 Sep 2014 08:22:34 +0000 (10:22 +0200)]
newlines: fix mixed newlines to LF-only
I use the curl repo mainly on Windows with the typical Windows git
checkout which converts the LF line endings in the curl repo to CRLF
automatically on checkout. The automatic conversion is not done on files
in the repo with mixed line endings. I recently noticed some weird
output with projects/build-openssl.bat that I traced back to mixed line
endings, so I scanned the repo and there are files (excluding the
test data) that have mixed line endings.
I used this command below to do the scan. Unfortunately it's not as easy
as git grep, at least not on Windows. This gets the names of all the
files in the repo's HEAD, gets each of those files raw from HEAD, checks
for mixed line endings of both LF and CRLF, and prints the name if
mixed. I excluded path tests/data/test* because those can have mixed
line endings if I understand correctly.
for f in `git ls-tree --name-only --full-tree -r HEAD`;
do if [ -n "${f##tests/data/test*}" ];
then git show "HEAD:$f" | \
perl -0777 -ne 'exit 1 if /([^\r]\n.*\r\n)|(\r\n.*[^\r]\n)/';
if [ $? -ne 0 ];
then echo "$f";
fi;
fi;
done
Viktor Szakáts [Thu, 11 Sep 2014 14:26:26 +0000 (16:26 +0200)]
mk-ca-bundle.pl: converted tabs to spaces, deleted trailing spaces