aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2009-10-09Fix compiler warningYang Tse
2009-10-08Fix compiler warningYang Tse
2009-10-08Fix compiler warningYang Tse
2009-10-08Attempt to silence bogus compiler warning: "Potential null pointer dereference"Yang Tse
2009-10-08Fix compiler warning: addition result could be truncated before cast to ↵Yang Tse
bigger sized type
2009-10-07fix gcc warnings in lib/nss.cKamil Dudka
2009-10-07Overhauled ares__get_hostent()Yang Tse
- Fixing out of bounds memory overwrite triggered with malformed /etc/hosts file. - Improving parsing of /etc/hosts file. - Validating requested address family. - Ensuring that failures always return a NULL pointer. - Adjusting header inclusions.
2009-10-07removed NSS README since the mentioned problems are now solved.Gunter Knauf
2009-10-06Fix vc-x64 target having MACHINE= wrongly positioned, and added vc-x64-ssl-zlibYang Tse
target as indicated end requested by Viktor Szakats in bug report #2872879.
2009-10-06Fix commentYang Tse
2009-10-06Fix ssize_t redefinition errors on WIN64 reported by Alexey SimakYang Tse
2009-10-06Minix has new build prerequisites using autoconf 2.64Dan Fandrich
2009-10-05more files to ignoreYang Tse
2009-10-01- Tom Mueller correctly reported in bug report #2870221Daniel Stenberg
(http://curl.haxx.se/bug/view.cgi?id=2870221) that libcurl returned an incorrect return code from the internal trynextip() function which caused him grief. This is a regression that was introduced in 7.19.1 and I find it strange it hasn't hit us harder, but I won't persue into figuring out exactly why.
2009-10-01mention some alternative method names in the docs for --requestDaniel Stenberg
2009-10-01mention "quiet" for the --silent option to get easier to findDaniel Stenberg
2009-10-01- Constantine Sapuntzakis: The current implementation will always setDaniel Stenberg
SO_SNDBUF to CURL_WRITE_SIZE even if the SO_SNDBUF starts out larger. The patch doesn't do a setsockopt if SO_SNDBUF is already greater than CURL_WRITE_SIZE. This should help folks who have set up their computer with large send buffers.
2009-09-29Check if _REENTRANT definition is required toYang Tse
make errno available as a preprocessor macro.
2009-09-28Removed some extraneous carriage return charactersDan Fandrich
2009-09-28fix compiler warning: conversion from "long" to "size_t" may lose signYang Tse
2009-09-28libcurl private function Curl_memrchr() now in curl_memrchr.c and curl_memrchr.hYang Tse
2009-09-28Added check for memrchr function or macroYang Tse
2009-09-27tiny indent fixDaniel Stenberg
2009-09-27- I introduced a maximum limit for received HTTP headers. It is controlled byDaniel Stenberg
the define CURL_MAX_HTTP_HEADER which is even exposed in the public header file to allow for users to fairly easy rebuild libcurl with a modified limit. The rationale for a fixed limit is that libcurl is realloc()ing a buffer to be able to put a full header into it, so that it can call the header callback with the entire header, but that also risk getting it into trouble if a server by mistake or willingly sends a header that is more or less without an end. The limit is set to 100K.
2009-09-27unify two very similar code sections into one single function, header_append()Daniel Stenberg
2009-09-26- John P. McCaskey posted a bug report that showed how libcurl did wrong whenDaniel Stenberg
saving received cookies with no given path, if the path in the request had a query part. That is means a question mark (?) and characters on the right side of that. I wrote test case 1105 and fixed this problem.
2009-09-26added test 1105 (disabled) - it repeats a cookie path bug we need to fixDaniel Stenberg
2009-09-26- Implemented a protocol independent way to specify blocking direction, used byKamil Dudka
transfer.c for blocking. It is currently used only by SCP and SFTP protocols. This enhancement resolves an issue with 100% CPU usage during SFTP upload, reported by Vourhey.
2009-09-25minor whitespace editDaniel Stenberg
2009-09-25- Chris Mumford filed bug report #2861587Daniel Stenberg
(http://curl.haxx.se/bug/view.cgi?id=2861587) identifying that libcurl used the OpenSSL function X509_load_crl_file() wrongly and failed if it would load a CRL file with more than one certificate within. This is now fixed.
2009-09-25Changed the default OpenSSL include pathDan Fandrich
2009-09-25fix compiler warning: end-of-loop code not reachedYang Tse
2009-09-24fix compiler warning: variable "sni" was set but never usedYang Tse
2009-09-24revert HPUX change since it already works fineDaniel Stenberg
2009-09-23builds thread-safer on HPUXDaniel Stenberg
2009-09-23- HPUX does need _REENTRANT too to build really thread-safe.Daniel Stenberg
2009-09-21added section for libcurl builds with NSS SSL support.Gunter Knauf
2009-09-21added support for new SQLite cert database format: added a runtime check for ↵Gunter Knauf
version 3.12.0, and depending on the result add 'sql:' prefix to cert database directory so that newer SQLIte database format works.
2009-09-21added aditional check for the directory specified with SSL_DIR, and fall ↵Gunter Knauf
back to hardcoded directory if not a valid directory.
2009-09-18fix compiler warning: comparison between signed and unsignedYang Tse
2009-09-17added three missing files to the dist archiveDaniel Stenberg
2009-09-17fix compiler warning: enumerated type mixed with another typeYang Tse
2009-09-17Attempt to silence bogus compiler warning: "Potential null pointer dereference"Yang Tse
2009-09-17fix compiler warning: conversion to 'size_t' from 'curl_off_t' may alter its ↵Yang Tse
value
2009-09-17Moved Curl_rand() and Curl_srand() code from formdata.c and formdata.hYang Tse
into curl_rand.c and curl_rand.h
2009-09-17remove line obsoleted with previous commitYang Tse
2009-09-17Attempt to silence bogus compiler warning: "Potential null pointer dereference"Yang Tse
2009-09-16- Sven Anders reported that we introduced a cert verfication flaw for OpenSSL-Daniel Stenberg
powered libcurl in 7.19.6. If there was a X509v3 Subject Alternative Name field in the certficate it had to match and so even if non-DNS and non-IP entry was present it caused the verification to fail.
2009-09-16Attempt to silence bogus compiler warning: "Potential null pointer ↵Yang Tse
dereference through ptr is detected"
2009-09-16Attempt to silence bogus compiler warning: "Potential null pointer ↵Yang Tse
dereference through ptr is detected"