History log of /curl/ (Results 4176 – 4200 of 33763)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
ccf1ca9422-Dec-2022 Daniel Stenberg

libssh2: try sha2 algos for hostkey methods

As is supported by recent libssh2, but should just be ignored by older
versions.

Reported-by: norbertmm on github
Assisted-by: no

libssh2: try sha2 algos for hostkey methods

As is supported by recent libssh2, but should just be ignored by older
versions.

Reported-by: norbertmm on github
Assisted-by: norbertmm on github
Fixes #10143
Closes #10145

show more ...

e2aed00423-Dec-2022 Patrick Monnerat

typecheck: accept expressions for option/info parameters

As expressions can have side effects, evaluate only once.

To enable deprecation reporting only once, get rid of the __typeof

typecheck: accept expressions for option/info parameters

As expressions can have side effects, evaluate only once.

To enable deprecation reporting only once, get rid of the __typeof__
use to define the local temporary variable and use the target type
(CURLoption/CURLINFO). This also avoids multiple reports on type
conflicts (if some) by the curlcheck_* macros.

Note that CURLOPT_* and CURLINFO_* symbols may be deprecated, but not
their values: a curl_easy_setopt call with an integer constant as option
will never report a deprecation.

Reported-by: Thomas Klausner
Fixes #10148
Closes #10149

show more ...

ef07452a23-Dec-2022 Paul Howarth

tests: avoid use of sha1 in certificates

The SHA-1 algorithm is deprecated (particularly for security-sensitive
applications) in a variety of OS environments. This already affects
RH

tests: avoid use of sha1 in certificates

The SHA-1 algorithm is deprecated (particularly for security-sensitive
applications) in a variety of OS environments. This already affects
RHEL-9 and derivatives, which are not willing to use certificates using
that algorithm. The fix is to use sha256 instead, which is already used
for most of the other certificates in the test suite.

Fixes #10135

This gets rid of issues related to sha1 signatures.

Manual steps after "make clean-certs" and "make build-certs":

- Copy tests/certs/stunnel-sv.pem to tests/stunnel.pem
(make clean-certs does not remove the original tests/stunnel.pem)

- Copy tests/certs/Server-localhost-sv.pubkey-pinned into --pinnedpubkey
options of tests/data/test2041 and tests/data/test2087

Closes #10153

show more ...


tests/certs/EdelCurlRoot-ca.cacert
tests/certs/EdelCurlRoot-ca.cnf
tests/certs/EdelCurlRoot-ca.crt
tests/certs/EdelCurlRoot-ca.csr
tests/certs/EdelCurlRoot-ca.der
tests/certs/EdelCurlRoot-ca.key
tests/certs/Makefile.am
tests/certs/Server-localhost-firstSAN-sv.crl
tests/certs/Server-localhost-firstSAN-sv.crt
tests/certs/Server-localhost-firstSAN-sv.csr
tests/certs/Server-localhost-firstSAN-sv.der
tests/certs/Server-localhost-firstSAN-sv.key
tests/certs/Server-localhost-firstSAN-sv.pem
tests/certs/Server-localhost-firstSAN-sv.pub.der
tests/certs/Server-localhost-firstSAN-sv.pub.pem
tests/certs/Server-localhost-firstSAN-sv.pubkey-pinned
tests/certs/Server-localhost-lastSAN-sv.crl
tests/certs/Server-localhost-lastSAN-sv.crt
tests/certs/Server-localhost-lastSAN-sv.csr
tests/certs/Server-localhost-lastSAN-sv.der
tests/certs/Server-localhost-lastSAN-sv.key
tests/certs/Server-localhost-lastSAN-sv.pem
tests/certs/Server-localhost-lastSAN-sv.pub.der
tests/certs/Server-localhost-lastSAN-sv.pub.pem
tests/certs/Server-localhost-lastSAN-sv.pubkey-pinned
tests/certs/Server-localhost-sv.crl
tests/certs/Server-localhost-sv.crt
tests/certs/Server-localhost-sv.csr
tests/certs/Server-localhost-sv.der
tests/certs/Server-localhost-sv.key
tests/certs/Server-localhost-sv.pem
tests/certs/Server-localhost-sv.pub.der
tests/certs/Server-localhost-sv.pub.pem
tests/certs/Server-localhost-sv.pubkey-pinned
tests/certs/Server-localhost.nn-sv.crl
tests/certs/Server-localhost.nn-sv.crt
tests/certs/Server-localhost.nn-sv.csr
tests/certs/Server-localhost.nn-sv.der
tests/certs/Server-localhost.nn-sv.key
tests/certs/Server-localhost.nn-sv.pem
tests/certs/Server-localhost.nn-sv.pub.der
tests/certs/Server-localhost.nn-sv.pub.pem
tests/certs/Server-localhost.nn-sv.pubkey-pinned
tests/certs/Server-localhost0h-sv.crl
tests/certs/Server-localhost0h-sv.crt
tests/certs/Server-localhost0h-sv.csr
tests/certs/Server-localhost0h-sv.der
tests/certs/Server-localhost0h-sv.key
tests/certs/Server-localhost0h-sv.pem
tests/certs/Server-localhost0h-sv.pub.der
tests/certs/Server-localhost0h-sv.pub.pem
tests/certs/Server-localhost0h-sv.pubkey-pinned
tests/certs/scripts/genroot.sh
tests/certs/stunnel-sv.crl
tests/certs/stunnel-sv.crt
tests/certs/stunnel-sv.csr
tests/certs/stunnel-sv.der
tests/certs/stunnel-sv.key
tests/certs/stunnel-sv.pem
tests/certs/stunnel-sv.pub.der
tests/certs/stunnel-sv.pub.pem
tests/certs/stunnel-sv.pubkey-pinned
tests/data/test2041
tests/data/test2087
tests/stunnel.pem
5ee81c3924-Dec-2022 Yurii Rashkovskii

cmake: fix the snprintf detection

I haven't had the time to check other configurations, but on my macOS
Ventura 13.1 with XCode 14.2 cmake does not find `snprintf`.

Solution: en

cmake: fix the snprintf detection

I haven't had the time to check other configurations, but on my macOS
Ventura 13.1 with XCode 14.2 cmake does not find `snprintf`.

Solution: ensure stdio.h is checked for definitions

Closes #10155

show more ...

73477d5a26-Dec-2022 Radu Hociung

http: remove the trace message "Mark bundle... multiuse"

The message "Mark bundle as not supporting multiuse" was added at commit
29364d93 when an http/2-related bug was fixed, and it ap

http: remove the trace message "Mark bundle... multiuse"

The message "Mark bundle as not supporting multiuse" was added at commit
29364d93 when an http/2-related bug was fixed, and it appears to be a
leftover trace message.

This message should be removed because:
* it conveys no information to the user
* it is enabled in the default build (--enable-verbose)
* it reads like a warning/unexpected condition
* it is equivalent to "Detected http proto < 2", which is
not a useful message.
* it is a time-wasting red-herring for anyone who encounters
it for the first time while investigating some other, real
problem.

This commit removes the trace message "Mark bundle as not
supporting multiuse"

Closes #10159

show more ...

a5cf4a8725-Dec-2022 Hannah Schierling

url: fix build with `--disable-cookies`

Struct `UserDefined` has no member `cookielist` if
`CURL_DISABLE_COOKIES` is defined.

Follow-up to af5999a

Closes #10158

4ab601d919-Dec-2022 Stefan Eissing

runtests: also tear down http2/http3 servers when https server is stopped

Closes #10114

c7fb341c19-Dec-2022 Stefan Eissing

tests: add 3 new HTTP/2 test cases, plus https: support for nghttpx

- a simple https get
- a simple https post
- a multi get of 4 requests and check that same connection was used

tests: add 3 new HTTP/2 test cases, plus https: support for nghttpx

- a simple https get
- a simple https post
- a multi get of 4 requests and check that same connection was used

Closes #10114

show more ...

db07301f22-Dec-2022 Daniel Stenberg

urldata: remove unused struct fields, made more conditional

- source_quote, source_prequote and source_postquote have not been used since
5e0d9aea3; September 2006

- make seve

urldata: remove unused struct fields, made more conditional

- source_quote, source_prequote and source_postquote have not been used since
5e0d9aea3; September 2006

- make several fields conditional on proxy support

- make three quote struct fields conditional on FTP || SSH

- make 'mime_options' depend on MIME

- make trailer_* fields depend on HTTP

- change 'gssapi_delegation' from long to unsigned char

- make 'localportrange' unsigned short instead of int

- conn->trailer now depends on HTTP

Closes #10147

show more ...

f4883ba922-Dec-2022 Daniel Stenberg

urldata: make set.http200aliases conditional on HTTP being present

And make a few SSH-only fields depend on SSH

Closes #10140

aef4dc8922-Dec-2022 Daniel Stenberg

md4: fix build with GnuTLS + OpenSSL v1

Reported-by: Esdras de Morais da Silva

Fixes #10110
Closes #10142

31b9a32222-Dec-2022 Daniel Stenberg

urldata: make 'ftp_create_missing_dirs' depend on FTP || SFTP

Closes #10139

80efd3bc22-Dec-2022 John Bampton

misc: fix grammar and spelling

Closes #10137

af5999a622-Dec-2022 Daniel Stenberg

urldata: move the cookefilelist to the 'set' struct

The cookiefile entries are set into the handle and should remain set for
the lifetime of the handle so that duplicating it also duplic

urldata: move the cookefilelist to the 'set' struct

The cookiefile entries are set into the handle and should remain set for
the lifetime of the handle so that duplicating it also duplicates the
list. Therefore, the struct field is moved from 'state' to 'set'.

Fixes #10133
Closes #10134

show more ...

e4505a1922-Dec-2022 Daniel Stenberg

strdup: name it Curl_strdup

It does not belong in the curlx_ name space as it is never used
externally.

Closes #10132

72b819f121-Dec-2022 Nick Banks

msh3: update to v0.5 Release

Closes #10125

3736c0a209-Dec-2022 Andy Alt

workflows/linux.yml: merge 3 common packages

Closes #10071

ee583c6821-Dec-2022 Daniel Stenberg

docs: mention indirect effects of --insecure

Warn users that disabling certficate verification allows servers to
"pollute" curl with data it trusts.

Reported-by: Harry Sintonen

docs: mention indirect effects of --insecure

Warn users that disabling certficate verification allows servers to
"pollute" curl with data it trusts.

Reported-by: Harry Sintonen
Closes #10126

show more ...

07dfbc0819-Dec-2022 Daniel Stenberg

SECURITY-PROCESS.md: document severity levels

Closes #10118

5d0cad9721-Dec-2022 Daniel Stenberg

RELEASE_NOTES: synced

bumped version for new cycle

03ac7ab421-Dec-2022 Marcel Raad

tool_operate: fix `CURLOPT_SOCKS5_GSSAPI_NEC` type

`CURLOPT_SOCKS5_GSSAPI_NEC` is a long, while `socks5_gssapi_nec` was
made a bool in commit 4ac64eadf60.

Closes https://github.

tool_operate: fix `CURLOPT_SOCKS5_GSSAPI_NEC` type

`CURLOPT_SOCKS5_GSSAPI_NEC` is a long, while `socks5_gssapi_nec` was
made a bool in commit 4ac64eadf60.

Closes https://github.com/curl/curl/pull/10124

show more ...

c12fb3dd21-Dec-2022 Daniel Stenberg

RELEASE-NOTES: synced

The curl 7.87.0 release

26959cb721-Dec-2022 Daniel Stenberg

THANKS: 40 new contributors from 7.87.0

565d0ca220-Dec-2022 Daniel Stenberg

http: fix the ::1 comparison for IPv6 localhost for cookies

When checking if there is a "secure context", which it is if the
connection is to localhost even if the protocol is HTTP, the

http: fix the ::1 comparison for IPv6 localhost for cookies

When checking if there is a "secure context", which it is if the
connection is to localhost even if the protocol is HTTP, the comparison
for ::1 was done incorrectly and included brackets.

Reported-by: BratSinot on github

Fixes #10120
Closes #10121

show more ...

5f5660f319-Dec-2022 Philip Heiduck

CI/spell: actions/checkout@v2 > actions/checkout@v3

1...<<161162163164165166167168169170>>...1351