aboutsummaryrefslogtreecommitdiff
path: root/tests
AgeCommit message (Collapse)Author
2015-04-22cyassl: Implement public key pinningJay Satiro
Also add public key extraction example to CURLOPT_PINNEDPUBLICKEY doc.
2015-04-22tests/unit/.gitignore: hide unit1601 and above, tooKamil Dudka
2015-04-22nss: implement public key pinning for NSS backendKamil Dudka
Bug: https://bugzilla.redhat.com/1195771
2015-04-18test1423: added missing "file" to server sectionDan Fandrich
2015-04-08test142[23]: verify that an empty file is stored on successKamil Dudka
2015-04-03fix refreshing of obsolete dns cache entriesStefan Bühler
- cache entries must be also refreshed when they are in use - have the cache count as inuse reference too, freeing timestamp == 0 special value - use timestamp == 0 for CURLOPT_RESOLVE entries which don't get refreshed - remove CURLOPT_RESOLVE special inuse reference (timestamp == 0 will prevent refresh) - fix Curl_hostcache_clean - CURLOPT_RESOLVE entries don't have a special reference anymore, and it would also release non CURLOPT_RESOLVE references - fix locking in Curl_hostcache_clean - fix unit1305.c: hash now keeps a reference, need to set inuse = 1
2015-04-02http2: Fix missing nghttp2_session_send call in Curl_http2_switchedTatsuhiro Tsujikawa
Previously in Curl_http2_switched, we called nghttp2_session_mem_recv to parse incoming data which were already received while curl was handling upgrade. But we didn't call nghttp2_session_send, and it led to make curl not send any response to the received frames. Most likely, we received SETTINGS from server at this point, so we missed opportunity to send SETTINGS + ACK. This commit adds missing nghttp2_session_send call in Curl_http2_switched to fix this issue. Bug: https://github.com/bagder/curl/issues/192 Reported-by: Stefan Eissing
2015-04-01cookie: handle spaces after the name in Set-CookieDaniel Stenberg
"name =value" is fine and the space should just be skipped. Updated test 31 to also test for this. Bug: https://github.com/bagder/curl/issues/195 Reported-by: cromestant Help-by: Frank Gevaerts
2015-03-28runtests.pl: detect WolfSSL as yasslDan Fandrich
2015-03-24testcurl.pl: add the --notes option to supply more info about a buildDan Fandrich
Support for notes has been in place for a while, but it required being added to the setup file manually.
2015-03-24CURLOPT_PATH_AS_IS: addedDaniel Stenberg
--path-as-is is the command line option Added docs in curl.1 and CURLOPT_PATH_AS_IS.3 Added test in test 1241
2015-03-22test1513: eliminated race condition in test runDan Fandrich
It seems that some systems (e.g. fairly consistently in some recent Solaris autobuilds) would manage to get to the connect phase before the progress callback was called, resulting in a CURLE_COULDNT_CONNECT error. Reworked the test to point at a test server that never returns a full result so the progress callback always gets a chance to be called before the transfer can complete in some other way.
2015-03-21tests/certs: rebuild certificates with modified key usage bitsDan Fandrich
The certificates were missing the digitalSignature and keyAgreement usage types, of which at least digitalSignature was checked by CyaSSL. This caused the test server in test 310 (among others) to fail the startup verification and therefore run (see http://curl.haxx.se/mail/lib-2014-07/0303.html).
2015-03-21tests/certs: added make target to rebuild certificatesDan Fandrich
The certificate generation scripts were also updated to better match the format of the certificates currently checked in.
2015-03-21testcurl: Allow '=' in values given on command lineDagobert Michelsen
2015-03-21test938: added missing closing tagsDan Fandrich
2015-03-16free: instead of Curl_safefree()Daniel Stenberg
Since we just started make use of free(NULL) in order to simplify code, this change takes it a step further and: - converts lots of Curl_safefree() calls to good old free() - makes Curl_safefree() not check the pointer before free() The (new) rule of thumb is: if you really want a function call that frees a pointer and then assigns it to NULL, then use Curl_safefree(). But we will prefer just using free() from now on.
2015-03-16Bug #149: Deletion of unnecessary checks before calls of the function "free"Markus Elfring
The function "free" is documented in the way that no action shall occur for a passed null pointer. It is therefore not needed that a function caller repeats a corresponding check. http://stackoverflow.com/questions/18775608/free-a-null-pointer-anyway-or-check-first This issue was fixed by using the software Coccinelle 1.0.0-rc24. Signed-off-by: Markus Elfring <elfring@users.sourceforge.net>
2015-03-14http2: detect prematures close without data transferedDaniel Stenberg
... by using the regular Curl_http_done() method which checks for that. This makes test 1801 fail consistently with error 56 (which seems fine) to that test is also updated here. Reported-by: Ben Darnell Bug: https://github.com/bagder/curl/issues/166
2015-03-13test320: Expect the Host header to be the first headerDan Fandrich
Required for the test to work after a5d994941c2b.
2015-03-12test203[0-3]: Expect the Host header to be the first headerFabian Keil
Required for the tests to work after a5d994941c2b.
2015-03-12http: always send Host: header as first headerDaniel Stenberg
...after the method line: "Since the Host field-value is critical information for handling a request, a user agent SHOULD generate Host as the first header field following the request-line." / RFC 7230 section 5.4 Additionally, this will also make libcurl ignore multiple specified custom Host: headers and only use the first one. Test 1121 has been updated accordingly Bug: http://curl.haxx.se/bug/view.cgi?id=1491 Reported-by: Rainer Canavan
2015-03-11proxy: re-use proxy connections (regression)Daniel Stenberg
When checking for a connection to re-use, a proxy-using request must check for and use a proxy connection and not one based on the host name! Added test 1421 to verify Bug: http://curl.haxx.se/bug/view.cgi?id=1492
2015-03-10memanalyze.pl: handle free(NULL)Jay Satiro
2015-03-05openssl: remove all uses of USE_SSLEAYDaniel Stenberg
SSLeay was the name of the library that was subsequently turned into OpenSSL many moons ago (1999). curl does not work with the old SSLeay library since years. This is now reflected by only using USE_OPENSSL in code that depends on OpenSSL.
2015-03-03libtest: fixed linker errors on msvcSergei Nikulov
Bug: https://github.com/bagder/curl/pull/144
2015-02-25dist: add symbol-scan.pl to the tarballKamil Dudka
... in order to make test1135 succeed
2015-02-25sws: timeout idle CONNECT connectionsDaniel Stenberg
2015-02-24sws: stop logging about TPC_NODELAY nonsenseDaniel Stenberg
2015-02-24lib530: make it less timing sensibleDaniel Stenberg
... by making sure the first request is completed before doing the remainder.
2015-02-14tests/README: Updated to reflect email test rangesSteve Holme
2015-02-04unit1600: Fix compilation when NTLM is disabledDan Fandrich
2015-02-03unit1601: MD5 unit testsDaniel Stenberg
2015-02-03unit1600: unit test for Curl_ntlm_core_mk_nt_hashDaniel Stenberg
2015-02-03unit1600: NTLM unit testDaniel Stenberg
2015-02-03tests/README: add a new range, clean up some languageDaniel Stenberg
2015-02-02test1135: verify the CURL_EXTERN order in header filesDaniel Stenberg
2015-01-28tests: Grouped SMTP SASL EXTERNAL tests with other SMTP testsSteve Holme
2015-01-28tests: Grouped POP3 SASL EXTERNAL tests with other POP3 testsSteve Holme
2015-01-28tests: Grouped IMAP SASL EXTERNAL tests with other IMAP testsSteve Holme
2015-01-28runtests: identify BoringSSL and libresslDaniel Stenberg
2015-01-27test: add test cases for sasl external authentication (imap/pop3/smtp).Patrick Monnerat
2015-01-07tests: make sure CRLFs can't be used in URLs passed to proxyDaniel Stenberg
Bug: http://curl.haxx.se/docs/adv_20150108B.html
2014-12-31lib1900.c: Fixed cppcheck errorJulien Nabet
lib1900.c:182: (style) Array index 'handlenum' is used before limits check Bug: https://github.com/bagder/curl/pull/133
2014-12-28sockfilt.c: Fixed compilation warningsSteve Holme
sockfilt.c:288: warning: conversion to 'DWORD' from 'size_t' may alter its value sockfilt.c:291: warning: conversion to 'DWORD' from 'size_t' may alter its value sockfilt.c:323: warning: conversion to 'DWORD' from 'size_t' may alter its value sockfilt.c:326: warning: conversion to 'DWORD' from 'size_t' may alter its value
2014-12-28test1509: Fixed compilation warningSteve Holme
lib1509.c:93:18: warning: conversion to 'long int' from 'size_t' may alter its value
2014-12-28test556: Fixed compilation warningSteve Holme
lib556.c:90: warning: conversion to 'unsigned int' from 'size_t' may alter its value
2014-12-28test1520: Fixed initial teething problemsSteve Holme
* Missing initialisation of upload status caused a seg fault * Missing data termination caused corrupt data to be uploaded * Data verification should be performed in <upload> element * Added missing recipient list cleanup
2014-12-28test1520: Fixed compilation errorsSteve Holme
2014-12-28tests: Added test for bug #1456Steve Holme