Steve Holme
925c11b545
build: Added VC11 support to the project file generator
2014-04-29 22:30:16 +01:00
Steve Holme
c64370dccd
build: Added VC9 and VC10 support to the project file generator
2014-04-29 22:30:14 +01:00
Steve Holme
9bd13a9d2e
build: Added Visual Studio project file generator
...
Added a batch file for generating the Visual Studio project files from
the new template files.
2014-04-29 22:30:12 +01:00
Steve Holme
78ca3c6830
copyright: Updated following recent edits
2014-04-28 23:20:52 +01:00
Dan Fandrich
a917f30c6b
runtests.pl: Improved the check for a crash during torture tests
2014-04-29 00:06:32 +02:00
Dan Fandrich
ef1322df67
Added a few more const where possible
2014-04-29 00:05:19 +02:00
Dan Fandrich
970ce28c12
unit1395: Fixed null pointer dereference on torture test
2014-04-28 17:14:46 +02:00
Tatsuhiro Tsujikawa
b8a220d255
http2: Compile with latest nghttp2
...
commit 6d5f40238028f2d8c (Apr 27) or later nghttp2 is now required
2014-04-27 19:15:08 +02:00
Steve Holme
2c239ba233
build: Added other VC6 output files to the .gitignore list
2014-04-27 18:14:17 +01:00
Steve Holme
eb4dd494a9
build: Corrected libcurl PDB file name for x64 builds in VC8 through VC12
2014-04-27 18:04:59 +01:00
Steve Holme
0d854de5f0
build: Added Visual Studio .NET (VC7) project files
...
Carrying on from commit 11025613b9
added VC7 project files which are
capable of supporting side-by-side compilation, as well as support for
some of the third-party libraries curl uses.
2014-04-27 17:58:18 +01:00
Steve Holme
c506e03f54
build: Added Visual Studio 6.0 (VC6) project files
...
Carrying on from commit 11025613b9
added a more thorough version of
the VC6 project files which are capable of supporting side-by-side
compilation, as well as support for some of the third-party libraries
curl uses.
2014-04-27 13:37:09 +01:00
Daniel Stenberg
d5ec44ca4c
INFILESIZE: fields in UserDefined must not be changed run-time
...
set.infilesize in this case was modified in several places, which could
lead to repeated requests using the same handle to get unintendent/wrong
consequences based on what the previous request did!
2014-04-26 18:17:10 +02:00
Kamil Dudka
9c941e92c4
nss: propagate blocking direction from NSPR I/O
...
... during the non-blocking SSL handshake
2014-04-25 15:08:12 +02:00
Daniel Stenberg
2e57c7e0fc
test325: verify --proto-redir https=>http
2014-04-23 22:36:01 +02:00
Daniel Stenberg
710f14edba
handler: make 'protocol' always specified as a single bit
...
This makes the findprotocol() function work as intended so that libcurl
can properly be restricted to not support HTTP while still supporting
HTTPS - since the HTTPS handler previously set both the HTTP and HTTPS
bits in the protocol field.
This fixes --proto and --proto-redir for most SSL protocols.
This is done by adding a few new convenience defines that groups HTTP
and HTTPS, FTP and FTPS etc that should then be used when the code wants
to check for both protocols at once. PROTO_FAMILY_[protocol] style.
Bug: https://github.com/bagder/curl/pull/97
Reported-by: drizzt
2014-04-23 22:36:01 +02:00
Steve Holme
cf9342e275
build: Added Visual Studio 2013 (VC12) project files
...
Carrying on from commit 11025613b9
added VC12 project files which are
capable of supporting side-by-side compilation, 32-bit and 64-bit
builds as well as support for some of the third-party libraries curl
uses.
2014-04-23 20:49:01 +01:00
Dan Fandrich
0204e17bc6
cyassl: Use error-ssl.h when available
...
Versions since at least 2.9.4 renamed error.h to error-ssl.h, so use
whichever one is available.
2014-04-23 11:01:30 +02:00
Steve Holme
f4ec8ffee2
RELEASE-NOTES: Synced with 386ed2d590
2014-04-22 22:57:40 +01:00
Daniel Stenberg
386ed2d590
gtls: fix NULL pointer dereference
...
gnutls_x509_crt_import() must not be called with a NULL certificate
Bug: http://curl.haxx.se/mail/lib-2014-04/0145.html
Reported-by: Damian Dixon
2014-04-22 23:24:31 +02:00
Daniel Stenberg
5b463e97fa
curl_global_init_mem: bump initialized even if already initialized
...
As this makes curl_global_init_mem() behave the same way as
curl_global_init() already does in that aspect - the same number of
curl_global_cleanup() calls is then required to again decrease the
counter and then eventually do the cleanup.
Bug: http://curl.haxx.se/bug/view.cgi?id=1362
Reported-by: Tristan
2014-04-22 23:08:14 +02:00
Kamil Dudka
8868a226cd
nss: implement non-blocking SSL handshake
2014-04-22 22:56:14 +02:00
Kamil Dudka
a43bba3a34
nss: split Curl_nss_connect() into 4 functions
2014-04-22 22:56:14 +02:00
Dan Fandrich
c1d6158789
tests: Fixed torture test for tests 1526 & 1527
2014-04-22 22:43:57 +02:00
Marc Hoersken
42c04eb1d1
sockfilt.c: clean up threaded approach and add documentation
2014-04-22 17:22:42 +02:00
Marc Hoersken
6fd97fca88
sockfilt.c: zero initialize variable
2014-04-22 17:22:42 +02:00
Marc Hoersken
6a03f6368f
sockfilt.c: fixed getting stuck waiting for MinGW stdin pipe
2014-04-22 17:22:41 +02:00
Daniel Stenberg
a5d7ec1848
configure: use the nghttp2 path correctly with pkg-config
...
When --with-nghttp2 was used (without a given path), the
PKG_CONFIG_LIBDIR varialbe could get clobbered and ruin a proper
detection of the library.
Reported-by: Dilyan Palauzov
Bug: http://curl.haxx.se/mail/lib-2014-04/0159.html
2014-04-22 00:24:44 +02:00
Dilyan Palauzov
11ce2f2182
configure: fix wrong comment
...
copy and paste error
2014-04-21 20:12:20 +02:00
Steve Holme
4b87029113
build: Fixed output name for Release builds in VC10 and VC11
2014-04-21 17:40:50 +01:00
Marc Hoersken
8ce852a279
sockfilt.c: properly handle disk files, pipes and character input
2014-04-20 22:15:36 +02:00
Marc Hoersken
fe1c0176c1
sockfilt.c: ignore non-key-events and continue waiting for input
2014-04-20 18:26:24 +02:00
Marc Hoersken
eb01947e1d
sockfilt.c: free memory in case of memory allocation errors
2014-04-20 18:22:28 +02:00
Marc Hoersken
ee6791128f
multi.c: fix possible invalid memory access in case nfds overflows
...
ufds might not be allocated in case nfds overflows to zero while
extra_nfds is still non-zero. udfs is then accessed within the
extra_nfds-based for loop.
2014-04-19 16:02:14 +02:00
Marc Hoersken
549b4a659a
netrc.c: fix multiple possible dereferences of null pointers
2014-04-19 16:00:43 +02:00
Marc Hoersken
9146f37973
parsedate.c: check sscanf result before passing it to strlen
2014-04-19 15:47:07 +02:00
Marc Hoersken
662fc62517
telnet.c: check sscanf results before passing them to snprintf
2014-04-19 15:23:04 +02:00
Marc Hoersken
f9ffbfce90
telnet.c: fix possible use of uninitialized variable
2014-04-19 15:18:19 +02:00
Marc Hoersken
aa0fbe3537
telnet.c: fix possible use of non-null-terminated strings
2014-04-19 14:26:02 +02:00
Marc Hoersken
c48b996cf2
url.c: fix possible use of non-null-terminated string with strlen
...
Follow up on b0e742544b
2014-04-19 14:25:32 +02:00
Marc Hoersken
89390f35f8
tool_writeout.c: initialize string pointer variable
2014-04-19 00:24:25 +02:00
Marc Hoersken
da900ca970
tool_formparse.c: fix possible use of non-null-terminated strings
2014-04-19 00:17:47 +02:00
Marc Hoersken
b0e742544b
url.c: fix possible use of non-null-terminated string with strlen
2014-04-19 00:17:21 +02:00
Marc Hoersken
7296fc9e7e
connect.c: fix multiple possible dereferences of null pointers
...
In case the first address in the tempaddr array is NULL,
the code would previously dereference an unchecked null pointer.
2014-04-18 23:56:54 +02:00
Marc Hoersken
3f74e149f8
tftp.c: fix possible dereference of null pointer
2014-04-18 23:53:48 +02:00
Marc Hoersken
667d133dab
tool_urlglob.c: added some comments to clarify for loop conditions
...
I was tempted to change those to >= 0 until I saw that this is
actually a for loop that terminates once i underflows.
2014-04-18 23:28:26 +02:00
Marc Hoersken
e81bdab13e
socks_sspi.c: added pointer guards to FreeContextBuffer calls
...
The FreeContextBuffer SAL declaration does not declare the pointer
as optional, therefore it must not be NULL.
2014-04-18 23:24:41 +02:00
Marc Hoersken
54df616729
md5.c: fix use of uninitialized variable
2014-04-18 22:59:25 +02:00
Marc Hoersken
6f72c2fe31
curl_schannel.c: added explicit cast of structure pointers
2014-04-18 22:38:42 +02:00
Marc Hoersken
a703914e60
curl_schannel.c: fix possible dereference of null pointer
2014-04-18 22:36:12 +02:00