summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* test719-721: verify SOCKS detailsbagder/socks-atypDaniel Stenberg2022-01-034-6/+71
| | | | Using the new verify/socks details
* runtests: add verify/socks checkDaniel Stenberg2022-01-032-0/+15
| | | | | | | If used, this data is compared with the data in log/socksd-request.log which the socksd server logs. Added to FILEFORMAT.md
* server/socksd: log atyp + address in a separate logDaniel Stenberg2022-01-031-0/+40
| | | | To allow the test suite to verify that the right data arrived
* socks5: use appropriate ATYP for numerical IP address host namesDaniel Stenberg2022-01-035-7/+143
| | | | | | | | | When not resolving the address locallly (known as socks5h). Add test 719 and 720 to verify. Reported-by: Peter Piekarski Fixes #8216
* libtest: avoid "assignment within conditional expression"Daniel Stenberg2022-01-033-10/+17
| | | | | | In lib530, lib540 and lib582 Closes #8218
* ftp: disable warning 4706 in MSVCDaniel Stenberg2022-01-031-1/+6
| | | | | | | | | Follow-up to 21248e052d Disabling "assignment within conditional expression" for MSVC needs to be done before the function starts, for it to take effect. Closes #8218
* tool_operate: warn if too many output arguments were foundDaniel Stenberg2022-01-034-4/+72
| | | | | | | | More output instructions than URLs is likely a user error. Add test case 371 to verify Closes #8210
* .github/workflows/mbedtls.yml: bump to mbedtls 3.1.0Daniel Stenberg2022-01-031-1/+1
| | | | Closes #8215
* zuul: remove the mbedtls jobsDaniel Stenberg2022-01-032-47/+2
| | | | | | Now running as github workflows Closes #8215
* github/workflows: add mbedtls and mbedtls-clangDaniel Stenberg2022-01-031-0/+50
| | | | Closes #8215
* mbedtls: fix private member designations for v3.1.0Valentin Richter2022-01-031-4/+4
| | | | | | | | | | | | | | "As a last resort, you can access the field foo of a structure bar by writing bar.MBEDTLS_PRIVATE(foo). Note that you do so at your own risk, since such code is likely to break in a future minor version of Mbed TLS." - https://github.com/ARMmbed/mbedtls/blob/f2d1199edc5834df4297f247f213e614f7782d1d/docs/3.0-migration-guide.md That future minor version is v3.1.0. I set the >= to == for the version checks because v3.1.0 is a release, and I am not sure when the private designation was reverted after v3.0.0. Closes #8214
* cmake: prevent dev warning due to mismatched argValentin Richter2022-01-021-2/+2
| | | | | | | | | | | | | | | -- curl version=[7.81.0-DEV] CMake Warning (dev) at /usr/share/cmake-3.22.1/Modules/FindPackageHandleStandardArgs.cmake:438 (message): The package name passed to `find_package_handle_standard_args` (MBEDTLS) does not match the name of the calling package (MbedTLS). This can lead to problems in calling code that expects `find_package` result variables (e.g., `_FOUND`) to follow a certain pattern. Call Stack (most recent call first): deps/curl/CMake/FindMbedTLS.cmake:31 (find_package_handle_standard_args) deps/curl/CMakeLists.txt:473 (find_package) This warning is for project developers. Use -Wno-dev to suppress it. Closes #8207
* urlapi: if possible, shorten given numerical IPv6 addressesDaniel Stenberg2022-01-022-9/+22
| | | | | | Extended test 1560 to verify Closes #8206
* url: reduce ssl backend count for CURL_DISABLE_PROXY buildsMAntoniak2022-01-021-2/+11
| | | | Closes #8212
* KNOWN_BUGS: "Trying local ports fails on Windows"Daniel Stenberg2022-01-011-0/+9
| | | | | Reported-by: gclinch on github Closes #8112
* misc: update copyright year rangeDaniel Stenberg2021-12-307-7/+7
|
* zuul: remove the wolfssl even moreDaniel Stenberg2021-12-301-17/+0
| | | | Follow-up to 1914465cf180d32b3d
* examples/multi-single.c: remove WAITMS()Daniel Stenberg2021-12-301-9/+0
| | | | | | | | As it isn't used. Reported-by: Melroy van den Berg Fixes #8200 Closes #8201
* gtls: add gnutls include for the session typeDaniel Stenberg2021-12-291-1/+1
| | | | Follow-up to 8fbd6feddfa5 to make it build more universally
* m4/curl-compilers: tell clang -Wno-pointer-bool-conversionDaniel Stenberg2021-12-291-0/+3
| | | | | | | | To hush compiler warnings we don't care for: error: address of function 'X' will always evaluate to 'true' Fixes #8197 Closes #8198
* http_proxy: don't close the socket (too early)Daniel Stenberg2021-12-292-2/+6
| | | | | | | | | | ... and double-check in the OpenSSL shutdown that the socket is actually still there before it is used. Fixes #8193 Closes #8195 Reported-by: Leszek Kubik
* ngtcp2: verify the server certificate for the gnutls caseDaniel Stenberg2021-12-283-17/+24
| | | | Closes #8178
* ngtcp2: verify the server cert on connect (quictls)Daniel Stenberg2021-12-284-13/+84
| | | | | | | | | | | | | | | Make ngtcp2+quictls correctly acknowledge `CURLOPT_SSL_VERIFYPEER` and `CURLOPT_SSL_VERIFYHOST`. The name check now uses a function from lib/vtls/openssl.c which will need attention for when TLS is not done by OpenSSL or is disabled while QUIC is enabled. Possibly the servercert() function in openssl.c should be adjusted to be able to use for both regular TLS and QUIC. Ref: #8173 Closes #8178
* zuul: remove the wolfssl buildDaniel Stenberg2021-12-282-22/+0
|
* github workflow: add wolfsslDaniel Stenberg2021-12-281-0/+49
| | | | Closes #8196
* zuul: fix quiche build pointing to wrong CargoNicolas Sterchele2021-12-271-1/+1
| | | | | Fixes #8184 Closes #8189
* checksrc: detect more kinds of NULL comparisons we avoidDaniel Stenberg2021-12-2736-87/+87
| | | | | Co-authored-by: Jay Satiro Closes #8180
* RELEASE-NOTES: syncedDaniel Stenberg2021-12-271-7/+15
|
* mesalink: remove the BACKEND define kludgeDaniel Stenberg2021-12-261-43/+48
| | | | Closes #8183
* schannel: remove the BACKEND define kludgeDaniel Stenberg2021-12-261-187/+198
| | | | Closes #8182
* gtls: check return code for gnutls_alpn_set_protocolsDaniel Stenberg2021-12-261-1/+5
| | | | Closes #8181
* README: label the link to the support documentStefan Huber2021-12-261-1/+1
| | | | Closes #8185
* docs/HTTP3: describe how to setup a h3 reverse-proxy for testingDaniel Stenberg2021-12-231-3/+73
| | | | | | Assisted-by: Matt Holt Closes #8177
* libcurl-multi.3: "SOCKS proxy handshakes" are not blockingDaniel Stenberg2021-12-231-1/+0
| | | | Since 4a4b63daaa0
* tests: Add test for CURLOPT_HTTP200ALIASESVladimir Panteleev2021-12-214-2/+112
|
* http: Fix CURLOPT_HTTP200ALIASESVladimir Panteleev2021-12-211-1/+1
| | | | | | | The httpcode < 100 check was also triggered when none of the fields were parsed, thus making the if(!nc) block unreachable. Closes #8171
* RELEASE-NOTES: syncedDaniel Stenberg2021-12-201-11/+25
|
* language: "email"Daniel Stenberg2021-12-202-3/+3
| | | | | | Missed three occurrences. Follow-up to 7a92f86
* nss:set_cipher don't clobber the cipher listDaniel Stenberg2021-12-201-38/+40
| | | | | | | | | The string is set by the user and needs to remain intact for proper connection reuse etc. Reported-by: Eric Musser Fixes #8160 Closes #8161
* misc: s/e-mail/emailDaniel Stenberg2021-12-1928-54/+54
| | | | | | Consistency is king. Following the lead in everything curl. Closes #8159
* docs: fix typo in OpenSSL 3 build instructionsTobias Nießen2021-12-181-1/+1
| | | | Closes #8162
* linkcheck.yml: add CI job that checks markdown linksDaniel Stenberg2021-12-171-0/+23
| | | | Closes #8158
* RELEASE-PROCEDURE.md: remove ICAL link and old release datesDaniel Stenberg2021-12-171-7/+1
|
* BINDINGS.md: "markdown-link-check-disable"Daniel Stenberg2021-12-171-0/+2
| | | | | | It feels a bit unfortunate to litter an ugly tag for this functionality, but if we get link scans of all markdown files, this might be worth the price.
* docs: fix dead links, remove ECH.mdDaniel Stenberg2021-12-175-142/+5
|
* openssl: define HAVE_OPENSSL_VERSION for OpenSSL 1.1.0+Jay Satiro2021-12-162-11/+15
| | | | | | | | | | | | | | | | | | | | | Prior to this change OpenSSL_version was only detected in configure builds. For other builds the old version parsing code was used which would result in incorrect versioning for OpenSSL 3: Before: curl 7.80.0 (i386-pc-win32) libcurl/7.80.0 OpenSSL/3.0.0a zlib/1.2.11 WinIDN libssh2/1.9.0 After: curl 7.80.0 (i386-pc-win32) libcurl/7.80.0 OpenSSL/3.0.1 zlib/1.2.11 WinIDN libssh2/1.9.0 Reported-by: lllaffer@users.noreply.github.com Fixes https://github.com/curl/curl/issues/8154 Closes https://github.com/curl/curl/pull/8155
* docs: add known bugs list to HTTP3.mdxquery2021-12-161-0/+4
| | | | Closes #8156
* BINDINGS: add one from Everything curl and update a linkDan Fandrich2021-12-151-4/+5
|
* libcurl-security.3: mention address and URL mitigationsDan Fandrich2021-12-151-7/+13
| | | | | | | The new CURLOPT_PREREQFUNCTION callback is another way to sanitize addresses. Using the curl_url API is a way to mitigate against attacks relying on URL parsing differences.
* RELEASE-NOTES: syncedDaniel Stenberg2021-12-151-7/+29
|