Age | Commit message (Collapse) | Author |
|
If curl_multi_fdset() sets maxfd to -1, the socket detection
loop is skipped and thus !found_new_socket is no cause for alarm.
|
|
Bug: http://curl.haxx.se/mail/lib-2012-11/0095.html
|
|
|
|
Fixed tests/libtest/libntlmconnect.c:52: warning: call to
'_curl_easy_getinfo_err_long' declared with attribute warning:
curl_easy_getinfo expects a pointer to long for this info
|
|
Windows does not use -1 to represent invalid sockets and the
SOCKET type is unsigned.
|
|
|
|
The test would hang and get aborted with a "ABORTING TEST, since it
seems that it would have run forever." until I prevented that from
happening.
I also fixed the data file which got broken CRLF line endings when I
sucked down the path from Joe's repo == my fault.
Removed #37 from KNOWN_BUGS as this fix and test case verifies exactly
this.
|
|
Add test2032 to test that NTLM does not switch connections in the middle
of the handshake
|