Revision tags: curl-7_69_0 |
|
#
3f74e5e6 |
| 23-Feb-2020 |
Steve Holme |
hmac: Added a unit test for the HMAC hash generation Closes #4973
|
#
fa009cc7 |
| 23-Feb-2020 |
Steve Holme |
tests: Added a unit test for MD4 digest generation Closes #4970
|
#
81c37124 |
| 22-Feb-2020 |
Steve Holme |
tests: Added a unit test for SHA256 digest generation Follow up to 2b5b37c. Closes #4968
|
Revision tags: curl-7_68_0, curl-7_67_0 |
|
#
b7666027 |
| 14-Sep-2019 |
Paul Dreik |
doh: fix (harmless) buffer overrun Added unit test case 1655 to verify. Close #4352 the code correctly finds the flaws in the old code, if one temporarily restores doh.c to
doh: fix (harmless) buffer overrun Added unit test case 1655 to verify. Close #4352 the code correctly finds the flaws in the old code, if one temporarily restores doh.c to the old version.
show more ...
|
Revision tags: curl-7_66_0, curl-7_65_3, curl-7_65_2, curl-7_65_1, curl-7_65_0, curl-7_64_1 |
|
#
e1be8254 |
| 03-Mar-2019 |
Daniel Stenberg |
alt-svc: the libcurl bits
|
Revision tags: curl-7_64_0 |
|
#
98e66291 |
| 02-Jan-2019 |
Daniel Stenberg |
xattr: strip credentials from any URL that is stored Both user and password are cleared uncondtitionally. Added unit test 1621 to verify. Fixes #3423 Closes #3433
|
Revision tags: curl-7_63_0 |
|
#
e1be2ecb |
| 11-Dec-2018 |
Daniel Gustafsson |
tests: add urlapi unittest This adds a new unittest intended to cover the internal functions in the urlapi code, starting with parse_port(). In order to avoid name collisions in debu
tests: add urlapi unittest This adds a new unittest intended to cover the internal functions in the urlapi code, starting with parse_port(). In order to avoid name collisions in debug builds, parse_port() is renamed Curl_parse_port() since it will be exported. Reviewed-by: Daniel Stenberg <daniel@haxx.se> Reviewed-by: Marcel Raad <Marcel.Raad@teamviewer.com>
show more ...
|
#
c37b66aa |
| 03-Nov-2018 |
Daniel Gustafsson |
infof: clearly indicate truncation The internal buffer in infof() is limited to 2048 bytes of payload plus an additional byte for NULL termination. Servers with very long error messa
infof: clearly indicate truncation The internal buffer in infof() is limited to 2048 bytes of payload plus an additional byte for NULL termination. Servers with very long error messages can however cause truncation of the string, which currently isn't very clear, and leads to badly formatted output. This appends a "...\n" (or just "..." in case the format didn't with a newline char) marker to the end of the string to clearly show that it has been truncated. Also include a unittest covering infof() to try and catch any bugs introduced in this quite important function. Closes #3216 Reviewed-by: Daniel Stenberg <daniel@haxx.se> Reviewed-by: Marcel Raad <Marcel.Raad@teamviewer.com>
show more ...
|
Revision tags: curl-7_62_0 |
|
#
a669e069 |
| 26-Oct-2018 |
Daniel Stenberg |
test1651: unit test Curl_extract_certinfo() The version used for Gskit, NSS, GnuTLS, WolfSSL and schannel.
|
#
b801b453 |
| 23-Sep-2018 |
Viktor Szakats |
whitespace fixes - replace tabs with spaces where possible - remove line ending spaces - remove double/triple newlines at EOF - fix a non-UTF-8 character - cleanup a few inde
whitespace fixes - replace tabs with spaces where possible - remove line ending spaces - remove double/triple newlines at EOF - fix a non-UTF-8 character - cleanup a few indentations/line continuations in manual examples Closes https://github.com/curl/curl/pull/3037
show more ...
|
Revision tags: curl-7_61_1, curl-7_61_0 |
|
#
f2b1a189 |
| 19-Jun-2018 |
Daniel Stenberg |
DOH: add test case 1650 and 2100
|
#
b004a174 |
| 13-Jul-2018 |
Jim Fuller |
tests: add unit tests for url.c Approved-by: Daniel Gustafsson Closes #2937
|
#
f66d97b6 |
| 30-May-2018 |
Alibek.Jorajev |
CURLOPT_RESOLVE: always purge old entry first If there's an existing entry using the selected name. Closes #2622
|
Revision tags: curl-7_60_0 |
|
#
d95f3dc0 |
| 17-Mar-2018 |
Rick Deist |
resolve: add CURLOPT_DNS_SHUFFLE_ADDRESSES This patch adds CURLOPT_DNS_SHUFFLE_ADDRESSES to explicitly request shuffling of IP addresses returned for a hostname when there is more th
resolve: add CURLOPT_DNS_SHUFFLE_ADDRESSES This patch adds CURLOPT_DNS_SHUFFLE_ADDRESSES to explicitly request shuffling of IP addresses returned for a hostname when there is more than one. This is useful when the application knows that a round robin approach is appropriate and is willing to accept the consequences of potentially discarding some preference order returned by the system's implementation. Closes #1694
show more ...
|
Revision tags: curl-7_59_0 |
|
#
50d1b337 |
| 31-Jan-2018 |
Anders Bakken |
CURLOPT_RESOLVE: Add support for multiple IP addresses per entry This enables users to preresolve but still take advantage of happy eyeballs and trying multiple addresses if some are not
CURLOPT_RESOLVE: Add support for multiple IP addresses per entry This enables users to preresolve but still take advantage of happy eyeballs and trying multiple addresses if some are not connecting. Ref: https://github.com/curl/curl/pull/2260
show more ...
|
Revision tags: curl-7_58_0, curl-7_57_0, curl-7_56_1, curl-7_56_0, curl-7_55_1, curl-7_55_0 |
|
#
00182215 |
| 28-Jul-2017 |
Daniel Stenberg |
test1323: verify curlx_tvdiff
|
#
f8f040e6 |
| 26-Jun-2017 |
Ryan Winograd |
progress: prevent resetting t_starttransfer Prevent `Curl_pgrsTime` from modifying `t_starttransfer` when invoked with `TIMER_STARTTRANSFER` more than once during a single request.
progress: prevent resetting t_starttransfer Prevent `Curl_pgrsTime` from modifying `t_starttransfer` when invoked with `TIMER_STARTTRANSFER` more than once during a single request. When a redirect occurs, this is considered a new request and `t_starttransfer` can be updated to reflect the `t_starttransfer` time of the redirect request. Closes #1616 Bug: https://github.com/curl/curl/pull/1602#issuecomment-310267370
show more ...
|
Revision tags: curl-7_54_1, curl-7_54_0 |
|
#
d2bdc987 |
| 06-Apr-2017 |
Daniel Stenberg |
test1606: verify speedcheck
|
Revision tags: curl-7_53_1, curl-7_53_0, curl-7_52_1, curl-7_52_0, curl-7_51_0, curl-7_50_3 |
|
#
8dcc074f |
| 13-Sep-2016 |
Daniel Stenberg |
test1605: verify negative input lengths to (un)escape functions
|
Revision tags: curl-7_50_2, curl-7_50_1, curl-7_50_0, curl-7_49_1, curl-7_49_0, curl-7_48_0, curl-7_47_1 |
|
#
4520534e |
| 05-Feb-2016 |
Jay Satiro |
tool_doswin: Improve sanitization processing - Add unit test 1604 to test the sanitize_file_name function. - Use -DCURL_STATICLIB when building libcurltool for unit testing.
tool_doswin: Improve sanitization processing - Add unit test 1604 to test the sanitize_file_name function. - Use -DCURL_STATICLIB when building libcurltool for unit testing. - Better detection of reserved DOS device names. - New flags to modify sanitize behavior: SANITIZE_ALLOW_COLONS: Allow colons SANITIZE_ALLOW_PATH: Allow path separators and colons SANITIZE_ALLOW_RESERVED: Allow reserved device names SANITIZE_ALLOW_TRUNCATE: Allow truncating a long filename - Restore sanitization of banned characters from user-specified outfile. Prior to this commit sanitization of a user-specified outfile was temporarily disabled in 2b6dadc because there was no way to allow path separators and colons through while replacing other banned characters. Now in such a case we call the sanitize function with SANITIZE_ALLOW_PATH which allows path separators and colons to pass through. Closes https://github.com/curl/curl/issues/624 Reported-by: Octavio Schroeder
show more ...
|
Revision tags: curl-7_47_0, curl-7_46_0 |
|
#
d7e35240 |
| 12-Nov-2015 |
dfandrich |
unit1603: Added unit tests for hash functions
|
Revision tags: curl-7_45_0, curl-7_44_0, curl-7_43_0 |
|
#
4883f701 |
| 02-May-2015 |
Anthony Avina |
hostip: fix unintended destruction of hash table .. and added unit1602 for hash.c
|
Revision tags: curl-7_42_1, curl-7_42_0, curl-7_41_0 |
|
#
b3cbf450 |
| 03-Feb-2015 |
Daniel Stenberg |
unit1601: MD5 unit tests
|
#
6b68aa98 |
| 03-Feb-2015 |
Daniel Stenberg |
unit1600: NTLM unit test
|
Revision tags: curl-7_40_0, curl-7_39_0, curl-7_38_0, curl-7_37_1, curl-7_37_0 |
|
#
812da419 |
| 04-May-2014 |
Daniel Stenberg |
mprintf: allow %.s with data not being zero terminated If the precision is indeed shorter than the string, don't strlen() to find the end because that's not how the precision operator wo
mprintf: allow %.s with data not being zero terminated If the precision is indeed shorter than the string, don't strlen() to find the end because that's not how the precision operator works. I also added a unit test for curl_msnprintf to make sure this works and that the fix doesn't a few other basic use cases. I found a POSIX compliance problem that I marked TODO in the unit test, and I figure we need to add more tests in the future. Reported-by: Török Edwin
show more ...
|