summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* release: 7.53.1curl-7_53_1Daniel Stenberg2017-02-242-4/+11
|
* Revert "tests: use consistent environment variables for setting charset"Daniel Stenberg2017-02-245-28/+7
| | | | | | | This reverts commit ecd1d020abdae3c3ce3643ddab3106501e62e7c0. That commit caused test failures on my Debian Linux machine for all changed test cases. We need to reconsider how that should get done.
* tests: use consistent environment variables for setting charsetDan Fandrich2017-02-235-7/+28
| | | | | | | | | | | | | Character set in POSIX is set by the locale defined (in decreasing order of precedence) by the LC_ALL, LC_CTYPE and LANG environment variables (I believe CHARSET is only historic). LC_ALL is cleared to ensure that LC_CTYPE takes effect, but LC_ALL is not used to set the locale to ensure that other parts of the locale aren't overriden, if set. Since there doesn't seem to be a cross-platform way of specifying a UTF-8 locale, and not all systems may support UTF-8, a <precheck> is used (where relevant) to skip the test if UTF-8 isn't in use. Test 1035 was also converted to UTF-8 for consistency, as the actual character set used there is irrelevant to the test.
* url: Default the CA proxy bundle location to CURL_CA_BUNDLEJay Satiro2017-02-231-0/+4
| | | | | | | | If the compile-time CURL_CA_BUNDLE location is defined use it as the default value for the proxy CA bundle location, which is the same as what we already do for the regular CA bundle location. Ref: https://github.com/curl/curl/pull/1257
* rand: added missing #ifdef HAVE_FCNTL_H around fcntl.h headerSergii Pylypenko2017-02-231-0/+2
| | | | Closes #1285
* TODO: "OPTIONS *"Daniel Stenberg2017-02-231-1/+18
| | | | Closes #1280
* RELEASE-NOTES: synced with 443e5b03a7d441Daniel Stenberg2017-02-231-3/+5
|
* THANKS-filter: shachafDaniel Stenberg2017-02-231-0/+1
|
* tests: Set CHARSET & LANG to UTF-8 in 1035, 2046 and 2047İsmail Dönmez2017-02-233-1/+4
| | | | | Closes #1283 Fixes #1277
* bump: 7.53.1 coming upDaniel Stenberg2017-02-232-182/+15
| | | | synced with df665f4df0f7a352
* formdata: check for EOF when reading from stdinDaniel Stenberg2017-02-231-2/+2
| | | | | | Reported-by: shachaf@users.noreply.github.com Fixes #1281
* docs: gitignore curl.1Jay Satiro2017-02-221-0/+1
| | | | curl.1 is generated by the cmdline-opts script since 4c49b83.
* TODO: HTTP Digest using SHA-256Daniel Stenberg2017-02-221-0/+10
|
* TODO: brotli is deployed widely nowDaniel Stenberg2017-02-221-5/+3
|
* urldata: include curl_sspi.h when Windows SSPI is enabledViktor Szakats2017-02-211-1/+3
| | | | | | | f77dabe broke builds in Windows using Windows SSPI but not Windows SSL. Bug: https://github.com/curl/curl/issues/1276 Reported-by: jveazey@users.noreply.github.com
* url: Improve CURLOPT_PROXY_CAPATH error handlingJay Satiro2017-02-214-10/+38
| | | | | | | | | | | | | | | - Change CURLOPT_PROXY_CAPATH to return CURLE_NOT_BUILT_IN if the option is not supported, which is the same as what we already do for CURLOPT_CAPATH. - Change the curl tool to handle CURLOPT_PROXY_CAPATH error CURLE_NOT_BUILT_IN as a warning instead of as an error, which is the same as what we already do for CURLOPT_CAPATH. - Fix CAPATH docs to show that CURLE_NOT_BUILT_IN is returned when the respective CAPATH option is not supported by the SSL library. Ref: https://github.com/curl/curl/pull/1257
* cyassl: fix typoJay Satiro2017-02-211-1/+1
|
* release: 7.53.0curl-7_53_0Daniel Stenberg2017-02-222-5/+35
|
* cookie: fix declaration of 'dup' shadows a global declarationDaniel Stenberg2017-02-211-11/+11
|
* TLS: make SSL_VERIFYSTATUS work againDaniel Stenberg2017-02-211-0/+3
| | | | | | | | | | | | | The CURLOPT_SSL_VERIFYSTATUS option was not properly handled by libcurl and thus even if the status couldn't be verified, the connection would be allowed and the user would not be told about the failed verification. Regression since cb4e2be7c6d42ca CVE-2017-2629 Bug: https://curl.haxx.se/docs/adv_20170222.html Reported-by: Marcus Hoffmann
* digest_sspi: Handle 'stale=TRUE' directive in HTTP digestJay Satiro2017-02-211-7/+36
| | | | | | | | | | | | | | - If the server has provided another challenge use it as the replacement input token if stale=TRUE. Otherwise previous credentials have failed so return CURLE_LOGIN_DENIED. Prior to this change the stale directive was ignored and if another challenge was received it would cause error CURLE_BAD_CONTENT_ENCODING. Ref: https://tools.ietf.org/html/rfc2617#page-10 Bug: https://github.com/curl/curl/issues/928 Reported-by: tarek112@users.noreply.github.com
* smb: use getpid replacement for windows UWP buildsDaniel Stenberg2017-02-201-1/+5
| | | | Source: https://github.com/Microsoft/vcpkg/blob/7676b8780db1e1e591c4fc7eba4f96f73c428cb4/ports/curl/0002_fix_uwp.patch
* TODO: CURLOPT_RESOLVE for any port numberDaniel Stenberg2017-02-201-1/+10
| | | | Closes #1264
* RELEASE-NOTES: synced with af30f1152d43dcdbDaniel Stenberg2017-02-201-8/+25
|
* sftp: improved checks for create dir failuresJean Gressmann2017-02-201-1/+9
| | | | | | | Since negative values are errors and not only -1. This makes SFTP upload with --create-dirs work (again). Closes #1269
* digest_sspi: Fix nonce-count generation in HTTP digestMax Khon2017-02-204-100/+256
| | | | | | | | | | | | | - on the first invocation: keep security context returned by InitializeSecurityContext() - on subsequent invocations: use MakeSignature() instead of InitializeSecurityContext() to generate HTTP digest response Bug: https://github.com/curl/curl/issues/870 Reported-by: Andreas Roth Closes https://github.com/curl/curl/pull/1251
* examples/multi-uv: checksrc complianceJay Satiro2017-02-201-2/+2
|
* string formatting: fix 4 printf-style format stringsMichael Kaufmann2017-02-194-4/+6
|
* tests: removed the obsolete name parameterDan Fandrich2017-02-1816-16/+16
|
* speed caps: update the timeouts if the speed is too low/highMichael Kaufmann2017-02-181-36/+48
| | | | | | | Follow-up to 4b86113 Fixes https://github.com/curl/curl/issues/793 Fixes https://github.com/curl/curl/issues/942
* docs: fix timeout handling in multi-uv exampleMichael Kaufmann2017-02-181-14/+18
|
* proxy: fix hostname resolution and IDN conversionMichael Kaufmann2017-02-1810-29/+295
| | | | | | | | | | | Properly resolve, convert and log the proxy host names. Support the "--connect-to" feature for SOCKS proxies and for passive FTP data transfers. Follow-up to cb4e2be Reported-by: Jay Satiro Fixes https://github.com/curl/curl/issues/1248
* http: fix missing 'Content-Length: 0' while negotiating authIsaac Boukris2017-02-174-3/+189
| | | | | | | | | | | | | | | | - While negotiating auth during PUT/POST if a user-specified Content-Length header is set send 'Content-Length: 0'. This is what we do already in HTTPREQ_POST_FORM and what we did in the HTTPREQ_POST case (regression since afd288b). Prior to this change no Content-Length header would be sent in such a case. Bug: https://curl.haxx.se/mail/lib-2017-02/0006.html Reported-by: Dominik Hölzl Closes https://github.com/curl/curl/pull/1242
* winbuild: add note on auto-detection of MACHINE in Makefile.vcSimon Warta2017-02-161-0/+3
| | | | Closes #1265
* RELEASE-PROCEDURE: update the upcoming release calendarDaniel Stenberg2017-02-161-4/+3
|
* TODO: consider file name from the redirected URL with -O ?Daniel Stenberg2017-02-151-0/+20
| | | | | | | It isn't easily solved, but with some thinking someone could probably come up with a working approach? Closes #1241
* tool_urlglob: Allow a glob range with the same start and stopJay Satiro2017-02-153-19/+75
| | | | | | | | | For example allow ranges like [1-1] and [a-a] etc. Regression since 5ca96cb. Bug: https://github.com/curl/curl/issues/1238 Reported-by: R. Dennis Steed
* axtls: adapt to API changesDaniel Stenberg2017-02-152-6/+6
| | | | | | | | | Builds with axTLS 2.1.2. This then also breaks compatibility with axTLS < 2.1.0 (the older API) ... and fix the session_id mixup brought in 04b4ee549 Fixes #1220
* RELEASE-NOTES: synced with 690935390c29cDaniel Stenberg2017-02-141-7/+23
|
* curl: fix typo in time condition warning messageNick Draffen2017-02-141-1/+1
| | | | | | | The warning message had a typo. The argument long form is --time-cond not --timecond Closes #1263
* smb: code indentDaniel Stenberg2017-02-141-16/+17
|
* configure: Allow disabling pthreads, fall back on Win32 threadsJay Satiro2017-02-141-4/+40
| | | | | | | | | When the threaded resolver option is specified for configure the default thread library is pthreads. This change makes it possible to --disable-pthreads and then configure can fall back on Win32 threads for native Windows builds. Closes https://github.com/curl/curl/pull/1260
* http2: fix memory-leak when denying push streamsDaniel Stenberg2017-02-131-11/+19
| | | | | Reported-by: zelinchen@users.noreply.github.com Fixes #1229
* tool_operate: Show HTTPS-Proxy options on CURLE_SSL_CACERTJay Satiro2017-02-111-2/+7
| | | | | | | | | | When CURLE_SSL_CACERT occurs the tool shows a lengthy error message to the user explaining possible solutions such as --cacert and --insecure. This change appends to that message similar options --proxy-cacert and --proxy-insecure when there's a specified HTTPS proxy. Closes https://github.com/curl/curl/issues/1258
* cmdline-opts/page-footer: ftp.sunet.se is no longer an FTP mirrorDaniel Stenberg2017-02-101-2/+0
|
* URL: only accept ";options" in SMTP/POP3/IMAP URL schemesDaniel Stenberg2017-02-107-14/+73
| | | | Fixes #1252
* cmdline-opts/socks*: Mention --preproxy in --socks* optsJay Satiro2017-02-095-14/+23
| | | | | | | | | | - Document in --socks* opts they're still mutually exclusive of --proxy. Partial revert of 423a93c; I had misinterpreted the SOCKS proxy + HTTP/HTTPS proxy combination. - Document in --socks* opts that --preproxy can be used to specify a SOCKS proxy at the same time --proxy is used with an HTTP/HTTPS proxy.
* CURLOPT_SSL_VERIFYPEER.3: also the https proxy versionDaniel Stenberg2017-02-091-1/+3
|
* nss: make FTPS work with --proxytunnelKamil Dudka2017-02-092-12/+13
| | | | | | | | | If the NSS code was in the middle of a non-blocking handshake and it was asked to finish the handshake in blocking mode, it unexpectedly continued in the non-blocking mode, which caused a FTPS connection over CONNECT to fail with "(81) Socket not ready for send/recv". Bug: https://bugzilla.redhat.com/1420327
* examples/multithread.c: link to our multi-thread docsDaniel Stenberg2017-02-091-4/+4
| | | | ... instead of the OpenSSL mutex page.