<feed xmlns='http://www.w3.org/2005/Atom'>
<title>curl/tests/data/test1322, branch gemini-meta</title>
<subtitle>cURL mirror with patches applied
</subtitle>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/'/>
<entry>
<title>test: update test20/1322 for eglibc bug workaround</title>
<updated>2018-11-22T12:41:35+00:00</updated>
<author>
<name>Tobias Hintze</name>
<email>th-git@thzn.de</email>
</author>
<published>2018-11-13T14:49:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=9944d6ba334f07b0b6199bdb5bb82091c88c16ed'/>
<id>9944d6ba334f07b0b6199bdb5bb82091c88c16ed</id>
<content type='text'>
The tests 20 and 1322 are using getaddrinfo of libc for resolving. In
eglibc-2.19 there is a memory leakage and invalid free bug which
surfaces in some special circumstances (PF_UNSPEC hint with invalid or
non-existent names). The valgrind runs in testing fail in these
situations.

As the tests 20/1322 are not specific on either protocol (IPv4/IPv6)
this commit changes the hints to IPv4 protocol by passing `--ipv4` flag
on the tests' command line.  This prevents the valgrind failures.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The tests 20 and 1322 are using getaddrinfo of libc for resolving. In
eglibc-2.19 there is a memory leakage and invalid free bug which
surfaces in some special circumstances (PF_UNSPEC hint with invalid or
non-existent names). The valgrind runs in testing fail in these
situations.

As the tests 20/1322 are not specific on either protocol (IPv4/IPv6)
this commit changes the hints to IPv4 protocol by passing `--ipv4` flag
on the tests' command line.  This prevents the valgrind failures.
</pre>
</div>
</content>
</entry>
<entry>
<title>test1322: verify stripping of trailing dot from host name</title>
<updated>2016-04-25T21:51:33+00:00</updated>
<author>
<name>Daniel Stenberg</name>
<email>daniel@haxx.se</email>
</author>
<published>2016-04-25T21:51:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=e504f03f8ccd1d29199efccde1d1f901fcdb602e'/>
<id>e504f03f8ccd1d29199efccde1d1f901fcdb602e</id>
<content type='text'>
While being debated (in #716) and a violation of RFC 7230 section 5.4,
this test verifies that the existing functionality works as intended. It
strips the dot from the host name and uses the host without dot
throughout the internals.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
While being debated (in #716) and a violation of RFC 7230 section 5.4,
this test verifies that the existing functionality works as intended. It
strips the dot from the host name and uses the host without dot
throughout the internals.
</pre>
</div>
</content>
</entry>
<entry>
<title>tests: Moved CR LF in URL tests to their respective protocol groups</title>
<updated>2013-11-23T14:49:50+00:00</updated>
<author>
<name>Steve Holme</name>
<email>steve_holme@hotmail.com</email>
</author>
<published>2013-11-23T14:06:10+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=7935478397b602f73c64ef9197051c7725edb252'/>
<id>7935478397b602f73c64ef9197051c7725edb252</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>tests: test CRLF in URLs</title>
<updated>2012-01-24T07:54:26+00:00</updated>
<author>
<name>Daniel Stenberg</name>
<email>daniel@haxx.se</email>
</author>
<published>2012-01-11T14:46:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=c11c30a8c8d727dcf5634fa0cc6ee0b4b77ddc3d'/>
<id>c11c30a8c8d727dcf5634fa0cc6ee0b4b77ddc3d</id>
<content type='text'>
Related to the security vulnerability: CVE-2012-0036

Bug: http://curl.haxx.se/docs/adv_20120124.html
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Related to the security vulnerability: CVE-2012-0036

Bug: http://curl.haxx.se/docs/adv_20120124.html
</pre>
</div>
</content>
</entry>
</feed>
