4f20188a | 19-Dec-2022 |
Daniel Stenberg |
smb/telnet: do not free the protocol struct in *_done() It is managed by the generic layer. Reported-by: Trail of Bits Closes #10112 |
9e719016 | 19-Dec-2022 |
Daniel Stenberg |
http: use the IDN decoded name in HSTS checks Otherwise it stores the info HSTS into the persistent cache for the IDN name which will not match when the HSTS status is later checked for
http: use the IDN decoded name in HSTS checks Otherwise it stores the info HSTS into the persistent cache for the IDN name which will not match when the HSTS status is later checked for using the decoded name. Reported-by: Hiroki Kurosawa Closes #10111
show more ...
|
46441955 | 16-Dec-2022 |
Daniel Stenberg |
CURLOPT_DEBUGFUNCTION.3: emphasize that incoming data is "raw" Closes #10106 |
6cc18802 | 16-Dec-2022 |
Xì Gà |
socks: fix username max size is 255 (0xFF) Closes #10105 Reviewed-by: Daniel Gustafsson |
66f4d50f | 16-Dec-2022 |
Daniel Stenberg |
limit-rate.d: see also --rate |
b151faa0 | 15-Dec-2022 |
Daniel Stenberg |
lib1560: add some basic IDN host name tests Closes #10094 |
cc0aaf6e | 14-Dec-2022 |
Daniel Stenberg |
idn: rename the files to idn.[ch] and hold all IDN functions Closes #10094 |
301812be | 14-Dec-2022 |
Daniel Stenberg |
idn: remove Curl_win32_ascii_to_idn It was not used. Introduce a new IDN header for the prototype(s). Closes #10094 |
590ecb6d | 15-Dec-2022 |
Daniel Stenberg |
RELEASE-NOTES: synced |
6f40703b | 15-Dec-2022 |
Daniel Stenberg |
curl_url_get.3: remove spurious backtick Put there by mistake. Follow-up from 9a8564a92 Closes #10101 |
50e781d3 | 15-Dec-2022 |
Daniel Stenberg |
socks: fix infof() flag for outputing a char It used to be a 'long', %lu is no longer correct. Follow-up to 57d2d9b6bed33d Detected by Coverity CID 1517663 Closes #10100 |
50750d09 | 14-Dec-2022 |
Daniel Stenberg |
ssl-reqd.d: clarify that this is for upgrading connections only Closes #10093 |
af092421 | 15-Dec-2022 |
Daniel Stenberg |
curl_url_set.3: document CURLU_DISALLOW_USER Closes #10099 |
5de6848f | 03-Dec-2022 |
Daniel Stenberg |
cmake: set the soname on the shared library Set SONAME and VERSION for platforms we think this works on. Remove issue from KNOWN_BUGS. Assisted-by: Jakub Zakrzewski Clo
cmake: set the soname on the shared library Set SONAME and VERSION for platforms we think this works on. Remove issue from KNOWN_BUGS. Assisted-by: Jakub Zakrzewski Closes #10023
show more ...
|
614f7813 | 14-Dec-2022 |
Daniel Stenberg |
tool_paramhlp: free the proto strings on exit And also make sure that repeated use of the options free the previous string before it stores a new. Follow-up from e6f8445edef8e79
tool_paramhlp: free the proto strings on exit And also make sure that repeated use of the options free the previous string before it stores a new. Follow-up from e6f8445edef8e7996d Closes #10098
show more ...
|
24d494c2 | 14-Dec-2022 |
Daniel Stenberg |
tool_cfgable: free the ssl_ec_curves on exit Follow-up to ede125b7b Closes #10097 |
c20b35dd | 14-Dec-2022 |
Daniel Stenberg |
urlapi: reject more bad letters from the host name: &+() Follow-up from eb0167ff7d31d3a5 Extend test 1560 to verify Closes #10096 |
b740f152 | 14-Dec-2022 |
Daniel Stenberg |
altsvc: fix rejection of negative port numbers Follow-up to ac612dfeee95 strtoul() accepts a leading minus so better make sure there is none Extended test 356 somewhat to u
altsvc: fix rejection of negative port numbers Follow-up to ac612dfeee95 strtoul() accepts a leading minus so better make sure there is none Extended test 356 somewhat to use a huge negative 64 bit number that otherwise becomes a low positive number. Closes #10095
show more ...
|
57d2d9b6 | 13-Dec-2022 |
Daniel Stenberg |
lib: use size_t or int etc instead of longs Since long is not using a consistent data size in curl builds, making it often "waste" 32 bits. Closes #10088 |
58f55ba5 | 14-Dec-2022 |
Daniel Stenberg |
azure: use "unversioned" clang and clang-tools for scanbuild job To make it less fragile Closes #10092 |
6b19247e | 14-Dec-2022 |
Daniel Gustafsson |
x509asn1: avoid freeing unallocated pointers When utf8asn1str fails there is no allocation returned, so freeing the return pointer in **to is at best a no-op and at worst a double- f
x509asn1: avoid freeing unallocated pointers When utf8asn1str fails there is no allocation returned, so freeing the return pointer in **to is at best a no-op and at worst a double- free bug waiting to happen. The current coding isn't hiding any such bugs but to future proof, avoid freeing the return value pointer iff the function failed. Closes: #10087 Reviewed-by: Daniel Stenberg <daniel@haxx.se>
show more ...
|
a20f99de | 13-Dec-2022 |
Emil Engler |
curl_url_set.3: fix typo Closes: #10089 Reviewed-by: Daniel Gustafsson <daniel@yesql.se> |
86b4b66c | 12-Dec-2022 |
Daniel Stenberg |
test2304: verify websocket handling when connection is closed |
b716511f | 12-Dec-2022 |
Daniel Stenberg |
server/sws: if asked to close connection, skip the websocket handling |
734c1f89 | 12-Dec-2022 |
Daniel Stenberg |
ws: if no connection is around, return error - curl_ws_send returns CURLE_SEND_ERROR if data->conn is gone - curl_ws_recv returns CURLE_GOT_NOTHING on connection close - cu
ws: if no connection is around, return error - curl_ws_send returns CURLE_SEND_ERROR if data->conn is gone - curl_ws_recv returns CURLE_GOT_NOTHING on connection close - curl_ws_recv.3: mention new return code for connection close + example embryo Closes #10084
show more ...
|