<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/curl.git/lib/content_encoding.c, branch bagder/timerfunction-not-recursive</title>
<subtitle>github.com: bagder/curl.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/'/>
<entry>
<title>content_encoding: accept up to 4 unknown trailer bytes after raw deflate data</title>
<updated>2018-07-12T20:46:15+00:00</updated>
<author>
<name>Patrick Monnerat</name>
<email>patrick@monnerat.net</email>
</author>
<published>2018-07-12T20:46:15+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=f8be737d8f5276a6ab4c9560d896fb5585d2933e'/>
<id>f8be737d8f5276a6ab4c9560d896fb5585d2933e</id>
<content type='text'>
Some servers issue raw deflate data that may be followed by an undocumented
trailer. This commit makes curl tolerate such a trailer of up to 4 bytes
before considering the data is in error.

Reported-by: clbr on github
Fixes #2719
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Some servers issue raw deflate data that may be followed by an undocumented
trailer. This commit makes curl tolerate such a trailer of up to 4 bytes
before considering the data is in error.

Reported-by: clbr on github
Fixes #2719
</pre>
</div>
</content>
</entry>
<entry>
<title>cppcheck: fix warnings</title>
<updated>2018-06-11T09:14:48+00:00</updated>
<author>
<name>Marian Klymov</name>
<email>nekto1989@gmail.com</email>
</author>
<published>2018-06-02T20:52:56+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=c45360d4633850839bb9c2d77dbf8a8285e9ad49'/>
<id>c45360d4633850839bb9c2d77dbf8a8285e9ad49</id>
<content type='text'>
- Get rid of variable that was generating false positive warning
(unitialized)

- Fix issues in tests

- Reduce scope of several variables all over

etc

Closes #2631
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
- Get rid of variable that was generating false positive warning
(unitialized)

- Fix issues in tests

- Reduce scope of several variables all over

etc

Closes #2631
</pre>
</div>
</content>
</entry>
<entry>
<title>content_encoding: handle zlib versions too old for Z_BLOCK</title>
<updated>2018-05-25T08:04:08+00:00</updated>
<author>
<name>Alejandro R. Sedeño</name>
<email>asedeno@mit.edu</email>
</author>
<published>2018-05-25T02:08:04+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=d0f1d6c8fa08a55a61186b836024a1b8537badbc'/>
<id>d0f1d6c8fa08a55a61186b836024a1b8537badbc</id>
<content type='text'>
Fallback on Z_SYNC_FLUSH when Z_BLOCK is not available.

Fixes #2606
Closes #2608
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fallback on Z_SYNC_FLUSH when Z_BLOCK is not available.

Fixes #2606
Closes #2608
</pre>
</div>
</content>
</entry>
<entry>
<title>all: Refactor malloc+memset to use calloc</title>
<updated>2018-04-15T07:00:37+00:00</updated>
<author>
<name>Daniel Gustafsson</name>
<email>daniel@yesql.se</email>
</author>
<published>2018-04-14T20:42:04+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=94400f32e9016d2eaea2db583f6e213c36b1eb1d'/>
<id>94400f32e9016d2eaea2db583f6e213c36b1eb1d</id>
<content type='text'>
When a zeroed out allocation is required, use calloc() rather than
malloc() followed by an explicit memset(). The result will be the
same, but using calloc() everywhere increases consistency in the
codebase and avoids the risk of subtle bugs when code is injected
between malloc and memset by accident.

Closes https://github.com/curl/curl/pull/2497
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When a zeroed out allocation is required, use calloc() rather than
malloc() followed by an explicit memset(). The result will be the
same, but using calloc() everywhere increases consistency in the
codebase and avoids the risk of subtle bugs when code is injected
between malloc and memset by accident.

Closes https://github.com/curl/curl/pull/2497
</pre>
</div>
</content>
</entry>
<entry>
<title>content_encoding: Add "none" alias to "identity"</title>
<updated>2018-02-09T08:11:18+00:00</updated>
<author>
<name>Mohammad AlSaleh</name>
<email>CE.Mohammad.AlSaleh@gmail.com</email>
</author>
<published>2018-02-08T18:23:22+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=f886cbfe9c3055999d8174b2eedc826d0d9a54f1'/>
<id>f886cbfe9c3055999d8174b2eedc826d0d9a54f1</id>
<content type='text'>
Some servers return a "content-encoding" header with a non-standard
"none" value.

Add "none" as an alias to "identity" as a work-around, to avoid
unrecognised content encoding type errors.

Signed-off-by: Mohammad AlSaleh &lt;CE.Mohammad.AlSaleh@gmail.com&gt;

Closes https://github.com/curl/curl/pull/2298
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Some servers return a "content-encoding" header with a non-standard
"none" value.

Add "none" as an alias to "identity" as a work-around, to avoid
unrecognised content encoding type errors.

Signed-off-by: Mohammad AlSaleh &lt;CE.Mohammad.AlSaleh@gmail.com&gt;

Closes https://github.com/curl/curl/pull/2298
</pre>
</div>
</content>
</entry>
<entry>
<title>brotli: data at the end of content can be lost</title>
<updated>2017-12-27T12:00:54+00:00</updated>
<author>
<name>Mikalai Ananenka</name>
<email>git@3dyd.com</email>
</author>
<published>2017-12-25T21:17:08+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=58d7cd28a0d8306c91be6ea393d861b92165402f'/>
<id>58d7cd28a0d8306c91be6ea393d861b92165402f</id>
<content type='text'>
Decoding loop implementation did not concern the case when all
received data is consumed by Brotli decoder and the size of decoded
data internally hold by Brotli decoder is greater than CURL_MAX_WRITE_SIZE.
For content with unencoded length greater than CURL_MAX_WRITE_SIZE this
can result in the loss of data at the end of content.

Closes #2194
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Decoding loop implementation did not concern the case when all
received data is consumed by Brotli decoder and the size of decoded
data internally hold by Brotli decoder is greater than CURL_MAX_WRITE_SIZE.
For content with unencoded length greater than CURL_MAX_WRITE_SIZE this
can result in the loss of data at the end of content.

Closes #2194
</pre>
</div>
</content>
</entry>
<entry>
<title>content_encoding: rework zlib_inflate</title>
<updated>2017-12-20T15:02:42+00:00</updated>
<author>
<name>Patrick Monnerat</name>
<email>patrick@monnerat.net</email>
</author>
<published>2017-12-20T15:02:42+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=4acc9d3d1a6774f4c00079bdba0fafc51afcbd6a'/>
<id>4acc9d3d1a6774f4c00079bdba0fafc51afcbd6a</id>
<content type='text'>
- When zlib version is &lt; 1.2.0.4, process gzip trailer before considering
extra data as an error.
- Inflate with Z_BLOCK instead of Z_SYNC_FLUSH to maximize correct data
and minimize corrupt data output.
- Do not try to restart deflate decompression in raw mode if output has
started or if the leading data is not available anymore.
- New test 232 checks inflating raw-deflated content.

Closes #2068
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
- When zlib version is &lt; 1.2.0.4, process gzip trailer before considering
extra data as an error.
- Inflate with Z_BLOCK instead of Z_SYNC_FLUSH to maximize correct data
and minimize corrupt data output.
- Do not try to restart deflate decompression in raw mode if output has
started or if the leading data is not available anymore.
- New test 232 checks inflating raw-deflated content.

Closes #2068
</pre>
</div>
</content>
</entry>
<entry>
<title>brotli: allow compiling with version 0.6.0.</title>
<updated>2017-12-20T14:30:35+00:00</updated>
<author>
<name>Patrick Monnerat</name>
<email>patrick@monnerat.net</email>
</author>
<published>2017-12-20T14:30:35+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=e639d4ca4d794c222dde4680d9ff35053f501042'/>
<id>e639d4ca4d794c222dde4680d9ff35053f501042</id>
<content type='text'>
Some error codes were not yet defined in brotli 0.6.0: do not issue code
for them in this case.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Some error codes were not yet defined in brotli 0.6.0: do not issue code
for them in this case.
</pre>
</div>
</content>
</entry>
<entry>
<title>zlib/brotli: only include header files in modules needing them</title>
<updated>2017-11-13T13:20:41+00:00</updated>
<author>
<name>Patrick Monnerat</name>
<email>patrick@monnerat.net</email>
</author>
<published>2017-11-13T13:20:41+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=def2ca2628fff1973f558e45dd8fe84ca00b54d5'/>
<id>def2ca2628fff1973f558e45dd8fe84ca00b54d5</id>
<content type='text'>
There is a conflict on symbol 'free_func' between openssl/crypto.h and
zlib.h on AIX. This is an attempt to resolve it.

Bug: https://curl.haxx.se/mail/lib-2017-11/0032.html
Reported-By: Michael Felt
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
There is a conflict on symbol 'free_func' between openssl/crypto.h and
zlib.h on AIX. This is an attempt to resolve it.

Bug: https://curl.haxx.se/mail/lib-2017-11/0032.html
Reported-By: Michael Felt
</pre>
</div>
</content>
</entry>
<entry>
<title>content_encoding: fix inflate_stream for no bytes available</title>
<updated>2017-11-09T06:36:50+00:00</updated>
<author>
<name>Jay Satiro</name>
<email>raysatiro@yahoo.com</email>
</author>
<published>2017-11-07T05:46:59+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/curl.git/commit/?id=fa64b0fc4bb8e25fd831db8b9328eeec5cc209c1'/>
<id>fa64b0fc4bb8e25fd831db8b9328eeec5cc209c1</id>
<content type='text'>
- Don't call zlib's inflate() when avail_in stream bytes is 0.

This is a follow up to the parent commit 19e66e5. Prior to that change
libcurl's inflate_stream could call zlib's inflate even when no bytes
were available, causing inflate to return Z_BUF_ERROR, and then
inflate_stream would treat that as a hard error and return
CURLE_BAD_CONTENT_ENCODING.

According to the zlib FAQ, Z_BUF_ERROR is not fatal.

This bug would happen randomly since packet sizes are arbitrary. A test
of 10,000 transfers had 55 fail (ie 0.55%).

Ref: https://zlib.net/zlib_faq.html#faq05

Closes https://github.com/curl/curl/pull/2060
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
- Don't call zlib's inflate() when avail_in stream bytes is 0.

This is a follow up to the parent commit 19e66e5. Prior to that change
libcurl's inflate_stream could call zlib's inflate even when no bytes
were available, causing inflate to return Z_BUF_ERROR, and then
inflate_stream would treat that as a hard error and return
CURLE_BAD_CONTENT_ENCODING.

According to the zlib FAQ, Z_BUF_ERROR is not fatal.

This bug would happen randomly since packet sizes are arbitrary. A test
of 10,000 transfers had 55 fail (ie 0.55%).

Ref: https://zlib.net/zlib_faq.html#faq05

Closes https://github.com/curl/curl/pull/2060
</pre>
</div>
</content>
</entry>
</feed>
