aboutsummaryrefslogtreecommitdiff
path: root/lib
AgeCommit message (Collapse)Author
2011-02-09CURLE_TLSAUTH_FAILED: removedQuinn Slack
On second thought, I think CURLE_TLSAUTH_FAILED should be eliminated. It was only being raised when an internal error occurred while allocating or setting the GnuTLS SRP client credentials struct. For TLS authentication failures, the general CURLE_SSL_CONNECT_ERROR seems appropriate; its error string already includes "passwords" as a possible cause. Having a separate TLS auth error code might also cause people to think that a TLS auth failure means the wrong username or password was entered, when it could also be a sign of a man-in-the-middle attack.
2011-02-09CURLOPT_SOCKOPTFUNCTION: return proper error codeDaniel Stenberg
When the callback returns an error, this function must make sure to return CURLE_ABORTED_BY_CALLBACK properly and not CURLE_OK as before to allow the callback to properly abort the operation.
2011-02-07netrc: Removed dead code.Julien Chaffraix
The main has not been updated from some time and is out of sync with the code. The code is now tested by several test cases so no need for a seperate code path.
2011-02-07netrc: Tightened up the type checks.Julien Chaffraix
The state should not be anonymous so that we can check if the values are fine. Added 2 unreachables states to the switch as a result of this change.
2011-02-07imap: Fixed typo in a comment.Julien Chaffraix
2011-02-07Curl_gmtime: avoid future mistakesDaniel Stenberg
Document Curl_gmtime() and define away the old functions so that they won't be used internally again by mistake.
2011-02-07Curl_gmtime: added a portable gmtimeDaniel Stenberg
Instead of polluting many places with #ifdefs, we create a single place for this function, and also check return code properly so that a NULL pointer returned won't cause problems.
2011-02-03mk-ca-bundle.vbs: use new cacert urlGuenter Knauf
The official Mozilla page at http://www.mozilla.org/projects/security/certs/ points out a new place as the "proper" place to get Mozilla's CA certs from so this script is now updated to use that instead. Reported by: Daniel Mentz
2011-02-02mk-ca-bundle.pl: use new cacert urlDaniel Stenberg
The official Mozilla page at http://www.mozilla.org/projects/security/certs/ points out a new place as the "proper" place to get Mozilla's CA certs from so this script is now updated to use that instead. Reported by: Daniel Mentz
2011-02-02ssluse: improved error message on SSL_CTX_new failuresBjoern Sikora
"SSL: couldn't create a context" really isn't that helpful, now it'll also extract an explanation from OpenSSL and append to the right.
2011-02-02multi: fix CURLM_STATE_TOOFAST for multi_socketNicholas Maniscalco
The code in the toofast state needs to first recalculate the values before it uses them again since it may have been a while since it last did it when it reaches this point.
2011-01-31file: add support for CURLOPT_TIMECONDITIONDave Reisner
2011-01-31transfer: add Curl_meets_timecondition()Dave Reisner
This will be used by file_do() and Curl_readwrite() as a unified method of checking to see if a remote document meets the supplied CURLOPT_TIMEVAL and CURLOPT_TIMECONDITION. Signed-off-by: Dave Reisner <d@falconindy.com>
2011-01-27ares: memory leak fixDaniel Stenberg
The double name resolve trick used with c-ares could leave allocated memory in 'temp_ai' if the operation was aborted in the middle.
2011-01-27ares_query_completed_cb: don't touch invalid dataDaniel Stenberg
When this callback is called due to the destruction of the ares handle, the connection pointer passed in as an argument may no longer pointing to valid data and this function doesn't need to do anything with it anyway so we make sure it doesn't. Bug: http://curl.haxx.se/mail/lib-2011-01/0333.html Reported by: Vsevolod Novikov
2011-01-27nss: avoid memory leaks and failure of NSS shutdownKamil Dudka
... in case more than one CA is loaded. Bug: https://bugzilla.redhat.com/670802
2011-01-25HTTP: memory leak on multiple Location:Daniel Stenberg
The HTTP parser allocated memory on each received Location: header without properly freeing old data. Starting now, the code only considers the first Location: header and will blissfully ignore subsequent ones. Bug: http://curl.haxx.se/bug/view.cgi?id=3165129 Reported by: Martin Lemke
2011-01-20Fixed compile using OpenSSL versions < 0.9.4aDarshan Mody
2011-01-19TLS-SRP: support added when using GnuTLSQuinn Slack
2011-01-18nss: fix a bug in handling of CURLOPT_CAPATHKamil Dudka
... and update the curl.1 and curl_easy_setopt.3 man pages such that they do not suggest to use an OpenSSL utility if curl is not built against OpenSSL. Bug: https://bugzilla.redhat.com/669702
2011-01-17Avoid redefines.Guenter Knauf
2011-01-14Added casts to silent gcc warnings.Guenter Knauf
2011-01-13build: BCC - makefile.b32 tweakYang Tse
Get rid of stdout redirection to NUL and move stderr redirection into RM and RMDIR macros.
2011-01-13build: BCC - makefile.b32 tweakYang Tse
Check for BCCDIR environment var done now as other checks.
2011-01-13Use env var for PSDK instead of hardcoded path.Guenter Knauf
2011-01-13Enabled SSPI support by default.Guenter Knauf
2011-01-12build: BCC - require Borlands's MAKE for Makefile.b32 processing.Yang Tse
2011-01-12build: BCC - recover lost functionality from commit 3d813204260b37289411Yang Tse
Borland's $(MAKEDIR) expands to the path where make.exe is located, use this feature to define BCCDIR when user has not defined BCCDIR.
2011-01-12build: use external preprocessor cpp32 when building with Borland CYang Tse
2011-01-11Disable LDAP support since BCC headers are insufficient.Guenter Knauf
2011-01-11Instead of exiting with error lets set BCCDIR self.Guenter Knauf
2011-01-11Some Borland C++ makefile tweaks.Guenter Knauf
2011-01-11Borland C++ doesnt have struct sockaddr_storage.Guenter Knauf
2011-01-11connect: use UDP correctlyDaniel Stenberg
The idea that the protocol and socktype is part of name resolving in the libc functions is nuts. We keep the name resolver functions assume TCP/STREAM and we make sure that when we want to connect to a UDP service we use the correct UDP/DGRAM set instead. This bug was because the ->protocol field was not always set correctly. This bug was only affecting ipv6-disabled non-cares non-threaded builds. Bug: http://curl.haxx.se/bug/view.cgi?id=3154436 Reported by: "dperham"
2011-01-10SSL: fix memory leakQuinn Slack
In OOM situation. Follow-up fix to commit a9cd4f4ed49e1a0.
2011-01-08gtls: fix memory leakDaniel Stenberg
Bug: http://curl.haxx.se/mail/lib-2011-01/0079.html Reported by: Quinn Slack
2011-01-07HTTP: HTTP Negotiate authentication using SSPIMarcel Roelofs
Only under Windows
2011-01-06SSH: speedcheck clobbered existing errorDaniel Stenberg
The just added speedcheck must not ruin the error code if already set due to a problem.
2011-01-05SSH: acknowledge speedcheckDaniel Stenberg
Check for speedcheck limits during the state machine traversals
2011-01-04Curl_timeleft: s/conn/data in first argumentDaniel Stenberg
As the function doesn't really use the connectdata struct but only the SessionHanadle struct I modified what argument it wants.
2011-01-04nss: avoid CURLE_OUT_OF_MEMORY given a file name without any slashKamil Dudka
Bug: https://bugzilla.redhat.com/623663
2011-01-04get_cert_chain: support larger data setsDaniel Stenberg
512 bytes turned out too short for some data, so now we allocate a larger buffer instead Bug: http://curl.haxx.se/mail/archive-2011-01/0002.html
2011-01-03unittesting: build a separate static libDaniel Stenberg
When configure --enable-debug has been used, all files in lib/ are now built twice and a separate static library crafted for unit-testing will be linked. The unit tests in the tests/unit subdir will use that library.
2011-01-03SSH: avoid PATH_MAX with allocDaniel Stenberg
We cannot assume that PATH_MAX will be enough for the remote path name so allocating room for it is the only sensible approach.
2011-01-02Curl_nss_connect: avoid PATH_MAXDaniel Stenberg
Since some systems don't have PATH_MAX and it isn't that clever to assume a fixed maximum path length, the code now allocates buffer space instead of using stack. Reported by: Samuel Thibault Bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608521
2011-01-01SFTP: make pwd output result to header callbackDaniel Stenberg
Sending "pwd" as a QUOTE command only sent the reply to the DEBUGFUNCTION. Now it also sends an FTP-like header to the header callback to allow similar operations as with FTP, and apps can re-use the same parser.
2011-01-01pubkey_show: allocate buffer to fit any-size resultDaniel Stenberg
The loop condition was wrong so keys larger than 340 bits would overflow the local stack-based buffer.
2010-12-30ssh: honour the CURLINFO_FTP_ENTRY_PATH curl_getinfo optionLuke Amery
2010-12-28IDN: use win32 API if told toPierre Joye
The functionality is provided in a new source file: lib/idn_win32.c
2010-12-27c-ares: fix cancelled resolvesDaniel Stenberg
When built IPv6-enabled, we could do Curl_done() with one of the two resolves having returned already, so when ares_cancel() is called the resolve callback ends up doing funny things (sometimes resulting in a segfault) since it would try to actually store the previous resolve even though we're shutting down the resolve. This bug was introduced in commit 8ab137b2bc9630ce so it hasn't been included in any public release. Bug: http://curl.haxx.se/bug/view.cgi?id=3145445 Reported by: Pedro Larroy