aboutsummaryrefslogtreecommitdiff
path: root/lib
AgeCommit message (Collapse)Author
2009-11-02describe the cmake situationDaniel Stenberg
2009-10-31- Gabriel Kuri reported a problem with CURLINFO_CONTENT_LENGTH_DOWNLOAD if theDaniel Stenberg
download was 0 bytes, as libcurl would then return the size as unknown (-1) and not 0. I wrote a fix and test case 566 to verify it.
2009-10-30- Liza Alenchery mentioned a problem with re-used SCP connection when a badDaniel Stenberg
auth is used, as it caused a crash. I failed to repeat the issue, but still made a change that now forces the TCP connection used for a freed SCP session to get closed and not be re-used.
2009-10-30- "Tom" posted a bug report that mentioned how libcurl did wrong when doing aDaniel Stenberg
POST using a read callback, with Digest authentication and "Transfer-Encoding: chunked" enforced. I would then cause the first request to be wrongly sent and then basically hang until the server closed the connection. I fixed the problem and added test case 565 to verify it.
2009-10-29Fix compiler warning: control reaches end of non-void functionYang Tse
2009-10-29Take in account c-ares 1.6.1 will use __declspec function decorationYang Tse
for Win32 and Symbian unless CARES_STATICLIB is defined to use static library linkage.
2009-10-28Since the NSS lib closes the socket the memory tracking system wrongly gets aDaniel Stenberg
false positive on a leaked socket, so this introduces a way to tell the system that the socket is indeed closed without explicitly closing it!
2009-10-27Fix spellingYang Tse
2009-10-27Fix Pelles C Win32 target compilation issuesYang Tse
2009-10-25- Dima Barsky made the curl cookie parser accept cookies even with blank orDaniel Stenberg
unparsable expiry dates and then treat them as session cookies - previously libcurl would reject cookies with a date format it couldn't parse. Research shows that the major browser treat such cookies as session cookies. I modified test 8 and 31 to verify this.
2009-10-21Update memory tracking/debugging referenceYang Tse
2009-10-21spelling correctionsDaniel Stenberg
2009-10-21Detect when msvc 6.0 is in use without PSDK installed, intentionallyYang Tse
fail to build when this happens, and show an appropriate error. The brave of heart can circumvect this. Defining ALLOW_MSVC6_WITHOUT_PSDK in lib/config-win32.h, although absolutely discouraged and unsupported, this will allow the die hard MSVC hacker to build in such a discouraged environment. The actually supported 'fix' is to install 'February 2003 Platform SDK' a.k.a. 'Windows Server 2003 PSDK' which can be freely downloaded from http://www.microsoft.com/msdownload/platformsdk/sdkupdate/psdk-full.htm
2009-10-19added cast macros to silent compiler warnings with 64-bit systems.Gunter Knauf
2009-10-18- Ray Dassen provided a patch in Debian's bug tracker (bug number #551461)Daniel Stenberg
that now makes curl_getdate(3) actually handles RFC 822 formatted dates that use the "single letter military timezones". http://www.rfc-ref.org/RFC-TEXTS/822/chapter5.html has the details.
2009-10-18Check for basename() is now done the same as other function checksYang Tse
2009-10-18- Fixed memory leak in the SCP/SFTP code as it never freed the knownhostsDaniel Stenberg
data!
2009-10-18John Dennis filed bug report #2873666Daniel Stenberg
(http://curl.haxx.se/bug/view.cgi?id=2873666) which identified a problem which made libcurl loop infinitely when given incorrect credentials when using HTTP GSS negotiate authentication.
2009-10-18- Kevin Baughman found a double close() problem with libcurl-NSS, as whenDaniel Stenberg
libcurl called NSS to close the SSL "session" it also closed the actual socket.
2009-10-17README.NSS is goneDaniel Stenberg
2009-10-14we only need to call ASN1_STRING_length() if ASN1_STRING_type() detects UTF-8,Gunter Knauf
else ASN1_STRING_to_UTF8() returns the string length.
2009-10-13Update LDAP URL format referenceYang Tse
2009-10-08Attempt to silence bogus compiler warning: "Potential null pointer dereference"Yang Tse
2009-10-08Fix compiler warning: addition result could be truncated before cast to ↵Yang Tse
bigger sized type
2009-10-07fix gcc warnings in lib/nss.cKamil Dudka
2009-10-07removed NSS README since the mentioned problems are now solved.Gunter Knauf
2009-10-06Fix commentYang Tse
2009-10-05more files to ignoreYang Tse
2009-10-01- Tom Mueller correctly reported in bug report #2870221Daniel Stenberg
(http://curl.haxx.se/bug/view.cgi?id=2870221) that libcurl returned an incorrect return code from the internal trynextip() function which caused him grief. This is a regression that was introduced in 7.19.1 and I find it strange it hasn't hit us harder, but I won't persue into figuring out exactly why.
2009-10-01- Constantine Sapuntzakis: The current implementation will always setDaniel Stenberg
SO_SNDBUF to CURL_WRITE_SIZE even if the SO_SNDBUF starts out larger. The patch doesn't do a setsockopt if SO_SNDBUF is already greater than CURL_WRITE_SIZE. This should help folks who have set up their computer with large send buffers.
2009-09-28Removed some extraneous carriage return charactersDan Fandrich
2009-09-28fix compiler warning: conversion from "long" to "size_t" may lose signYang Tse
2009-09-28libcurl private function Curl_memrchr() now in curl_memrchr.c and curl_memrchr.hYang Tse
2009-09-27tiny indent fixDaniel Stenberg
2009-09-27- I introduced a maximum limit for received HTTP headers. It is controlled byDaniel Stenberg
the define CURL_MAX_HTTP_HEADER which is even exposed in the public header file to allow for users to fairly easy rebuild libcurl with a modified limit. The rationale for a fixed limit is that libcurl is realloc()ing a buffer to be able to put a full header into it, so that it can call the header callback with the entire header, but that also risk getting it into trouble if a server by mistake or willingly sends a header that is more or less without an end. The limit is set to 100K.
2009-09-27unify two very similar code sections into one single function, header_append()Daniel Stenberg
2009-09-26- John P. McCaskey posted a bug report that showed how libcurl did wrong whenDaniel Stenberg
saving received cookies with no given path, if the path in the request had a query part. That is means a question mark (?) and characters on the right side of that. I wrote test case 1105 and fixed this problem.
2009-09-26- Implemented a protocol independent way to specify blocking direction, used byKamil Dudka
transfer.c for blocking. It is currently used only by SCP and SFTP protocols. This enhancement resolves an issue with 100% CPU usage during SFTP upload, reported by Vourhey.
2009-09-25minor whitespace editDaniel Stenberg
2009-09-25- Chris Mumford filed bug report #2861587Daniel Stenberg
(http://curl.haxx.se/bug/view.cgi?id=2861587) identifying that libcurl used the OpenSSL function X509_load_crl_file() wrongly and failed if it would load a CRL file with more than one certificate within. This is now fixed.
2009-09-25fix compiler warning: end-of-loop code not reachedYang Tse
2009-09-24fix compiler warning: variable "sni" was set but never usedYang Tse
2009-09-21added support for new SQLite cert database format: added a runtime check for ↵Gunter Knauf
version 3.12.0, and depending on the result add 'sql:' prefix to cert database directory so that newer SQLIte database format works.
2009-09-21added aditional check for the directory specified with SSL_DIR, and fall ↵Gunter Knauf
back to hardcoded directory if not a valid directory.
2009-09-18fix compiler warning: comparison between signed and unsignedYang Tse
2009-09-17fix compiler warning: enumerated type mixed with another typeYang Tse
2009-09-17fix compiler warning: conversion to 'size_t' from 'curl_off_t' may alter its ↵Yang Tse
value
2009-09-17Moved Curl_rand() and Curl_srand() code from formdata.c and formdata.hYang Tse
into curl_rand.c and curl_rand.h
2009-09-17Attempt to silence bogus compiler warning: "Potential null pointer dereference"Yang Tse
2009-09-16- Sven Anders reported that we introduced a cert verfication flaw for OpenSSL-Daniel Stenberg
powered libcurl in 7.19.6. If there was a X509v3 Subject Alternative Name field in the certficate it had to match and so even if non-DNS and non-IP entry was present it caused the verification to fail.