Daniel Stenberg
787c2ae91b
multi: remove_handle: move pending connections
...
If the handle removed from the multi handle happens to be the one
"owning" the pipeline other transfers will be waiting indefinitely. Now
we move such handles back to connect to have them race (again) for
getting the connection and thus avoid hanging.
Bug: http://curl.haxx.se/bug/view.cgi?id=1465
Reported-by: Jiri Dvorak
2015-03-29 23:49:12 +02:00
Daniel Stenberg
31987c340e
KNOWN_BUGS: 89 is bug #1411
...
Disabling pipelining on multi handle with in-progress pipelined requests
leads to heap corruption and crash
2015-03-29 23:20:15 +02:00
Jay Satiro
fcdc597b1a
cyassl: CTX callback cosmetic changes and doc fix
...
- More descriptive fail message for NO_FILESYSTEM builds.
- Cosmetic changes.
- Change more of CURLOPT_SSL_CTX_* doc to not be OpenSSL specific.
2015-03-28 16:41:51 +01:00
Daniel Stenberg
623d24f3ee
RELEASE-NOTES: synced with d2feb71752
2015-03-28 16:33:17 +01:00
Dan Fandrich
ae3c985060
tool_operate: only set SSL options if SSL is enabled
2015-03-28 11:57:16 +01:00
Dan Fandrich
9a743bc5fc
runtests.pl: detect WolfSSL as yassl
2015-03-28 00:26:45 +01:00
Kyle L. Huff
d2feb71752
cyassl: add SSL context callback support for CyaSSL
...
Adds support for CURLOPT_SSL_CTX_FUNCTION when using CyaSSL, and better
handles CyaSSL instances using NO_FILESYSTEM.
2015-03-27 23:32:14 +01:00
Kyle L. Huff
211f1e3c6b
cyassl: remove undefined reference to CyaSSL_no_filesystem_verify
...
CyaSSL_no_filesystem_verify is not (or no longer) defined by cURL or
CyaSSL. This reference causes build errors when compiling with
NO_FILESYSTEM.
2015-03-27 23:31:12 +01:00
Jay Satiro
dab4ff179f
build: Fix libcurl.sln erroneous mixed configurations
...
Prior to this change some Release configurations had an active
configuration assignment to their Debug counterpart.
2015-03-27 23:10:42 +01:00
Jay Satiro
e7a289ebb9
vtls: Don't accept unknown CURLOPT_SSLVERSION values
2015-03-27 09:32:23 +01:00
Jay Satiro
488102fc17
url: Don't accept CURLOPT_SSLVERSION unless USE_SSL is defined
2015-03-27 09:31:30 +01:00
Paul Howarth
559e2cc921
build: link curl to openssl libraries when openssl support is enabled
...
This fixes a build failure where openssl and libmetalink are used
together and the system linker does not do implicit linking (e.g.
Fedora 13 and later releases). The MD5 functions required for
metalink support must be pulled in from the openssl crypto library.
This is similar to commit c6e7cbb94e
,
which fixes the same sort of problem for NSS builds.
2015-03-26 13:23:37 +01:00
Daniel Stenberg
318ad8d767
multi: on a request completion, check all CONNECT_PEND transfers
...
... even if they don't have an associated connection anymore. It could
leave the waiting transfers pending with no active one on the
connection.
Bug: http://curl.haxx.se/bug/view.cgi?id=1465
Reported-by: Jiri Dvorak
2015-03-26 08:14:22 +01:00
Emil Lerner
83835f7185
globbing: fix url number calculation when using range with step
...
In function glob_range, the number of urls was multiplied by (max - min
+ 1), regardless of step. The correct formula is (max - min) / step + 1
2015-03-25 12:48:15 +01:00
Daniel Stenberg
eb2a6180fb
README.http2: refreshed and added TODO items
2015-03-25 12:13:16 +01:00
Emil Lerner
7b223a3a21
globbing: fix step parsing for character globbing ranges
...
The glob_range function used wrong offset (3 instead of 4) for parsing
integer step inside character range specification, which led to 'bad
range' error when using character ranges with explicitly specified step
(such as '[a-z:2]')
2015-03-25 11:29:46 +01:00
Daniel Stenberg
5b58bface3
polarssl: called mbedTLS in 1.3.10 and later
2015-03-25 09:19:57 +01:00
Daniel Stenberg
83b29e43cd
polarssl: remove dead code
...
and simplify code by changing if-elses to a switch()
CID 1291706: Logically dead code. Execution cannot reach this statement
2015-03-25 09:01:11 +01:00
Daniel Stenberg
24908c12d7
polarssl: remove superfluous for(;;) loop
...
"unreachable: Since the loop increment is unreachable, the loop body
will never execute more than once."
Coverity CID 1291707
2015-03-25 08:49:34 +01:00
Daniel Stenberg
4e299192ed
Curl_ssl_md5sum: return CURLcode
...
... since the funciton can fail on OOM. Check this return code.
Coverity CID 1291705.
2015-03-25 08:32:12 +01:00
Jay Satiro
e35f2e61ec
cyassl: default to highest possible TLS version
...
(cyassl_connect_step1)
- Use TLS 1.0-1.2 by default when available.
CyaSSL/wolfSSL >= v3.3.0 supports setting a minimum protocol downgrade
version.
cyassl/cyassl@322f79f
2015-03-25 08:10:24 +01:00
Jay Satiro
d29f8b460c
cyassl: Check for invalid length parameter in Curl_cyassl_random
2015-03-25 08:08:12 +01:00
Jay Satiro
ec31962640
cyassl: If wolfSSL then identify as such in version string
2015-03-25 08:08:12 +01:00
Dan Fandrich
aa5808b504
symbols-in-versions: added CURLOPT_PATH_AS_IS
2015-03-24 23:47:02 +01:00
Dan Fandrich
a45146868b
testcurl.pl: add the --notes option to supply more info about a build
...
Support for notes has been in place for a while, but it required
being added to the setup file manually.
2015-03-24 23:47:01 +01:00
Dan Fandrich
35648f2e79
curl_memory: make curl_memory.h the second-last header file loaded
...
This header file must be included after all header files except
memdebug.h, as it does similar memory function redefinitions and can be
similarly affected by conflicting definitions in system or dependent
library headers.
2015-03-24 23:47:01 +01:00
Daniel Stenberg
ac2827ac09
openssl: do the OCSP work-around for libressl too
...
I tested with libressl git master now (v2.1.4-27-g34bf96c) and it seems to
still require the work-around for stapling to work.
2015-03-24 23:39:52 +01:00
Daniel Stenberg
bd9ac3cff2
openssl: verifystatus: only use the OCSP work-around <= 1.0.2a
...
URL: http://curl.haxx.se/mail/lib-2015-03/0205.html
Reported-by: Alessandro Ghedini
2015-03-24 23:06:37 +01:00
Daniel Stenberg
7e6ca87a72
openssl: adapt to ASN1/X509 things gone opaque in 1.1
2015-03-24 22:59:33 +01:00
Jay Satiro
9edf28e12d
curl_easy_setopt.3: Fix misspelling in CURLOPT_PATH_AS_IS description
2015-03-24 21:48:15 +01:00
Viktor Szakáts
bbd0dd3fe2
CURLOPT_HTTPHEADER.3: fix typo in recent commit
2015-03-24 21:48:02 +01:00
Viktor Szakáts
e438a9e2f0
CURLOPT_PATH_AS_IS.3: add type 'long' to prototype
2015-03-24 21:46:07 +01:00
Dan Fandrich
56ae66d518
vtls: fix compile with --disable-crypto-auth but with SSL
...
This is a strange combination of options, but is allowed.
2015-03-24 21:41:22 +01:00
Patrick Monnerat
ff4a4dd92e
os400: define new options in ILE/RPG binding.
2015-03-24 12:18:31 +01:00
Daniel Stenberg
ab6e6edb9e
RELEASE-NOTES: synced with f687860936
2015-03-24 11:15:47 +01:00
Daniel Stenberg
f687860936
curl_easy_setopt.3: Add CURLOPT_PATH_AS_IS
2015-03-24 11:06:38 +01:00
Daniel Stenberg
5d23279299
CURLOPT_PATH_AS_IS: added
...
--path-as-is is the command line option
Added docs in curl.1 and CURLOPT_PATH_AS_IS.3
Added test in test 1241
2015-03-24 10:31:58 +01:00
Yamada Yasuharu
ecc4940df2
curl_easy_recv/send: make them work with the multi interface
...
By making sure Curl_getconnectinfo() uses the correct connection cache
to find the last connection.
2015-03-23 22:46:58 +01:00
Daniel Stenberg
4b02b84897
http2: move the init too for when its actually needed
...
... it would otherwise lead to memory leakage if we never actually do
the switch.
2015-03-23 10:26:04 +01:00
Dan Fandrich
145c4692ff
dict: rename byte to avoid compiler shadowed declaration warning
...
This conflicted with a WolfSSL typedef.
2015-03-23 10:16:10 +01:00
Dan Fandrich
430006c5e2
cyassl: include version.h to ensure the version macros are defined
2015-03-23 10:10:03 +01:00
Dan Fandrich
148207e2d7
test1513: eliminated race condition in test run
...
It seems that some systems (e.g. fairly consistently in some recent
Solaris autobuilds) would manage to get to the connect phase before the
progress callback was called, resulting in a CURLE_COULDNT_CONNECT
error. Reworked the test to point at a test server that never returns a
full result so the progress callback always gets a chance to be called
before the transfer can complete in some other way.
2015-03-22 00:03:44 +01:00
Nick Zitzmann
7f5a170442
darwinsssl: add support for TLS False Start
...
TLS False Start support requires iOS 7.0 or later, or OS X 10.9 or later.
2015-03-21 12:22:56 -05:00
Daniel Stenberg
ed429b72d7
gtls: add check of return code
...
Coverity CID 1291167 pointed out that 'rc' was received but never used when
gnutls_credentials_set() was used. Added return code check now.
2015-03-21 16:53:43 +01:00
Daniel Stenberg
fea13a17d8
gtls: dereferencing NULL pointer
...
Coverity CID 1291165 pointed out 'chainp' could be dereferenced when
NULL if gnutls_certificate_get_peers() had previously failed.
2015-03-21 16:53:23 +01:00
Daniel Stenberg
5f6f9e8b59
gtls: avoid uninitialized variable.
...
Coverity CID 1291166 pointed out that we could read this variable
uninitialized.
2015-03-21 16:53:09 +01:00
Dan Fandrich
f9251a5c86
tests/certs: rebuild certificates with modified key usage bits
...
The certificates were missing the digitalSignature and keyAgreement
usage types, of which at least digitalSignature was checked by CyaSSL.
This caused the test server in test 310 (among others) to fail the
startup verification and therefore run (see
http://curl.haxx.se/mail/lib-2014-07/0303.html ).
2015-03-21 16:33:58 +01:00
Dan Fandrich
38c304a58f
tests/certs: added make target to rebuild certificates
...
The certificate generation scripts were also updated to better match the
format of the certificates currently checked in.
2015-03-21 16:33:58 +01:00
Daniel Stenberg
9cd4d6518f
x509asn1: add /* fallthrough */ in switch() case
2015-03-21 16:29:58 +01:00
Daniel Stenberg
e6917d3b77
x509asn1: minor edit to unconfuse Coverity
...
CID 1202732 warns on the previous use, although I cannot fine any
problems with it. I'm doing this change only to make the code use a more
familiar approach to accomplish the same thing.
2015-03-21 16:21:01 +01:00