Jay Satiro
616cecfdb6
symbols-in-versions: Add new http2 push symbols
...
Prior to this change test 1119 failed due to the missing symbols.
2015-06-30 17:03:08 -04:00
Daniel Stenberg
b59f296bf6
RELEASE-NOTES: synced with e6749055d6
2015-06-30 00:45:14 +02:00
Daniel Stenberg
e6749055d6
configure: disable libidn by default
...
For security reasons, until there is a fix.
Bug: http://curl.haxx.se/mail/lib-2015-06/0143.html
Reported-by: Gustavo Grieco, Feist Josselin
2015-06-29 23:17:30 +02:00
Daniel Stenberg
8208dd3b22
SSL-PROBLEMS: mention WinSSL problems in WinXP
2015-06-29 15:03:56 +02:00
Daniel Stenberg
0c46abd79a
CODE_OF_CONDUCT.md: added
...
Just to underscore how we treat each other in this project. Nothing new
really, but could be useful for newcomers and outsiders to see our
values.
2015-06-29 11:35:13 +02:00
Daniel Stenberg
1f70cdef98
tool_header_cb: fflush the header stream
...
Flush the header stream when -D is used so that they are sent off
earlier.
Bug: https://github.com/bagder/curl/issues/324
Reported-by: Cédric Connes
2015-06-25 11:53:56 -07:00
Roger Leigh
e3e06e1aee
tests: Distribute CMakeLists.txt files in subdirectories
2015-06-25 07:48:50 -07:00
Daniel Stenberg
37402b5eb8
CURLOPT_FAILONERROR.3: mention that it closes the connection
...
Reported-by: bemoody
Bug: https://github.com/bagder/curl/issues/325
2015-06-24 15:26:15 -07:00
Daniel Stenberg
69c77f69a5
curl_multi_setopt.3: alpha sort the options
2015-06-24 14:55:12 -07:00
Daniel Stenberg
dc2cbfda89
curl_multi_setopt.3: add the new push options
2015-06-24 14:52:58 -07:00
Tatsuhiro Tsujikawa
1b5eba8324
http2: Use nghttp2 library error code for error return value
2015-06-24 23:44:42 +02:00
Tatsuhiro Tsujikawa
ddb106d7f6
http2: Harden header validation for curl_pushheader_byname
...
Since we do prefix match using given header by application code
against header name pair in format "NAME:VALUE", and VALUE part can
contain ":", we have to careful about existence of ":" in header
parameter. ":" should be allowed to match HTTP/2 pseudo-header field,
and other use of ":" in header must be treated as error, and
curl_pushheader_byname should return NULL. This commit implements
this behaviour.
2015-06-24 23:44:42 +02:00
Tatsuhiro Tsujikawa
77044b53f7
CURLMOPT_PUSHFUNCTION.3: Remove unused variable
2015-06-24 23:44:42 +02:00
Daniel Stenberg
c712aa0ebe
CURLMOPT_PUSHFUNCTION.3: added example
2015-06-24 23:44:42 +02:00
Daniel Stenberg
a384f28ca6
http2: curl_pushheader_byname now takes a const char *
2015-06-24 23:44:42 +02:00
Daniel Stenberg
bf445b6e12
http2-serverpush.c: example code
2015-06-24 23:44:42 +02:00
Daniel Stenberg
a3a55d80ec
http2: free all header memory after the push callback
2015-06-24 23:44:42 +02:00
Daniel Stenberg
e9f0dd43bc
http2: init the pushed transfer properly
2015-06-24 23:44:42 +02:00
Daniel Stenberg
f65ab8864e
http2: fixed the header accessor functions for the push callback
2015-06-24 23:44:42 +02:00
Daniel Stenberg
feea9263e9
http2: setup the new pushed stream properly
2015-06-24 23:44:42 +02:00
Daniel Stenberg
ea7134ac87
http2: initial implementation of the push callback
2015-06-24 23:44:42 +02:00
Daniel Stenberg
70191958b5
http2: initial HTTP/2 server push types/docs
2015-06-24 23:44:42 +02:00
Daniel Stenberg
5156982377
test1531: verify POSTFIELDSIZE set after add_handle
...
Following the fix made in 903b6e0556
.
2015-06-23 17:51:03 -07:00
Daniel Stenberg
903b6e0556
pretransfer: init state.infilesize here, not in add_handle
...
... to properly support that options are set to the handle after it is
added to the multi handle.
Bug: http://curl.haxx.se/mail/lib-2015-06/0122.html
Reported-by: Stefan Bühler
2015-06-23 17:48:37 -07:00
Lior Kaplan
f44b803f16
tool_help: fix --tlsv1 help text to use >= for TLSv1
2015-06-21 13:33:11 -04:00
Jay Satiro
6842afbf44
INSTALL: Advise use of non-native SSL for Windows <= XP
...
Advise that WinSSL in versions <= XP will not be able to connect to
servers that no longer support the legacy handshakes and algorithms used
by those versions, and to use an alternate backend like OpenSSL instead.
Bug: https://github.com/bagder/curl/issues/253
Reported-by: zenden2k <zenden2k@gmail.com>
2015-06-20 18:45:25 -04:00
Kamil Dudka
ea1eec8ea8
curl_easy_setopt.3: restore contents removed by mistake
...
... in commit curl-7_43_0-18-g570076e
2015-06-19 10:07:32 -04:00
Daniel Stenberg
570076e82c
curl_easy_setopt.3: mention CURLOPT_PIPEWAIT
2015-06-19 15:47:27 +02:00
Jay Satiro
ef0fdb83b8
cookie: Fix bug in export if any-domain cookie is present
...
In 3013bb6
I had changed cookie export to ignore any-domain cookies,
however the logic I used to do so was incorrect, and would lead to a
busy loop in the case of exporting a cookie list that contained
any-domain cookies. The result of that is worse though, because in that
case the other cookies would not be written resulting in an empty file
once the application is terminated to stop the busy loop.
2015-06-18 19:37:20 -04:00
Dan Fandrich
1c3811f4fd
FTP: fixed compiling with --disable-proxy, broken in b88f980a
2015-06-18 23:20:10 +02:00
Daniel Stenberg
afbee791d5
tool: always provide negotiate/kerberos options
...
libcurl can still be built with it, even if the tool is not. Maintain
independence!
2015-06-18 16:57:38 +02:00
Daniel Stenberg
2546134b97
TODO: Support IDNA2008
2015-06-18 16:32:47 +02:00
Viktor Szakats
93aacc3050
Makefile.m32: add support for CURL_LDFLAG_EXTRAS
...
It is similar to existing CURL_CFLAG_EXTRAS, but for
extra linker option.
2015-06-18 14:43:26 +02:00
Daniel Stenberg
307f212379
RTSP: removed another piece of dead code
...
Coverity CID 1306668
2015-06-18 14:29:57 +02:00
Daniel Stenberg
26ddc536b0
openssl: fix use of uninitialized buffer
...
Make sure that the error buffer is always initialized and simplify the
use of it to make the logic easier.
Bug: https://github.com/bagder/curl/issues/318
Reported-by: sneis
2015-06-18 14:20:31 +02:00
Daniel Stenberg
0e7d76d6a8
examples: more descriptions
2015-06-18 11:38:54 +02:00
Daniel Stenberg
26583a62ab
examples: add descriptions with <DESC>
...
Using this fixed format for example descriptions, we can generate a
better list on the web site.
2015-06-18 10:17:02 +02:00
Daniel Stenberg
cf6ef2dc92
libcurl-errors.3: fix typo
2015-06-18 00:17:47 +02:00
Daniel Stenberg
3b93f1a3ec
curl_easy_setopt.3: option order doesn't matter
2015-06-18 00:09:46 +02:00
Daniel Stenberg
46d0eba2e9
openssl: fix build with BoringSSL
...
OPENSSL_load_builtin_modules does not exist in BoringSSL. Regression
from cae43a1
2015-06-18 00:06:46 +02:00
Paul Howarth
4a2398627c
openssl: Fix build with openssl < ~ 0.9.8f
...
The symbol SSL3_MT_NEWSESSION_TICKET appears to have been introduced at
around openssl 0.9.8f, and the use of it in lib/vtls/openssl.c breaks
builds with older openssls (certainly with 0.9.8b, which is the latest
older version I have to try with).
2015-06-17 16:53:34 +02:00
Daniel Stenberg
b88f980a74
FTP: do the HTTP CONNECT for data connection blocking
...
** WORK-AROUND **
The introduced non-blocking general behaviour for Curl_proxyCONNECT()
didn't work for the data connection establishment unless it was very
fast. The newly introduced function argument makes it operate in a more
blocking manner, more like it used to work in the past. This blocking
approach is only used when the FTP data connecting through HTTP proxy.
Blocking like this is bad. A better fix would make it work more
asynchronously.
Bug: https://github.com/bagder/curl/issues/278
2015-06-17 14:00:12 +02:00
Daniel Stenberg
85739723ba
bump: start the journey toward 7.44.0
2015-06-17 13:59:33 +02:00
Jay Satiro
f72b30e6fb
CURLOPT_ERRORBUFFER.3: Fix example, escape backslashes
2015-06-17 02:49:14 -04:00
Jay Satiro
52d83cb0c6
CURLOPT_ERRORBUFFER.3: Improve example
2015-06-17 02:25:51 -04:00
Daniel Stenberg
38e07886ed
RELEASE-NOTES: 7.43.0 release
2015-06-17 07:44:53 +02:00
Daniel Stenberg
bdf89d80ca
THANKS: updated with 7.43.0 names
2015-06-17 07:43:13 +02:00
Kamil Dudka
24a8359b25
http: do not leak basic auth credentials on re-used connections
...
CVE-2015-3236
This partially reverts commit curl-7_39_0-237-g87c4abb
Reported-by: Tomas Tomecek, Kamil Dudka
Bug: http://curl.haxx.se/docs/adv_20150617A.html
2015-06-17 07:43:13 +02:00
Kamil Dudka
24f0b6ebf7
test2040: verify basic auth on re-used connections
2015-06-17 07:43:13 +02:00
Daniel Stenberg
50c7f17e50
SMB: rangecheck values read off incoming packet
...
CVE-2015-3237
Detected by Coverity. CID 1299430.
Bug: http://curl.haxx.se/docs/adv_20150617B.html
2015-06-17 07:43:13 +02:00