#
c47148f1 |
| 18-Sep-2010 |
Daniel Stenberg |
RELEASE-NOTES: sync from d2a7fd2fe65b to HEAD
|
#
8e2f16e6 |
| 12-Sep-2010 |
Dan Fandrich |
Link curl and the test apps with -lrt explicitly when necessary When curl calls a function from that library then it needs to explicitly link to the library instead of piggybacking on
Link curl and the test apps with -lrt explicitly when necessary When curl calls a function from that library then it needs to explicitly link to the library instead of piggybacking on libcurl's own dependency. Without this, GNU ld with the --no-add-needed flag fails when linking (which Fedora now does by default). Reported by: Quanah Gibson-Mount Bug: http://curl.haxx.se/mail/lib-2010-09/0085.html
show more ...
|
#
d2a7fd2f |
| 25-Aug-2010 |
Daniel Stenberg |
RELEASE-NOTES: sync from b980c9a02 to HEAD
|
#
b980c9a0 |
| 15-Aug-2010 |
Daniel Stenberg |
multi: two fixes done
|
#
59077771 |
| 12-Aug-2010 |
Kamil Dudka |
curl -T: ignore file size of special files original bug report at https://bugzilla.redhat.com/622520
|
#
4342a208 |
| 11-Aug-2010 |
Daniel Stenberg |
release cycle loop: start over toward 7.21.2
|
Revision tags: curl-7_21_1 |
|
#
8249b052 |
| 11-Aug-2010 |
Daniel Stenberg |
RELEASE-NOTES: mention the runtests fix as well
|
#
2596eb6d |
| 10-Aug-2010 |
Daniel Stenberg |
RELEASE-NOTES: synced, 3 additional bugfixes
|
#
15201da4 |
| 06-Aug-2010 |
Daniel Stenberg |
RELEASE-NOTES: synced with recent changes
|
#
52beeb2c |
| 02-Aug-2010 |
Daniel Stenberg |
RELEASE-NOTES: synced with recent changes
|
#
c8d42b2f |
| 14-Jul-2010 |
Daniel Stenberg |
--retry: access violation with URL part sets continued When getting multiple URLs, curl didn't properly reset the byte counter after a successful transfer so if the subsequent transfer f
--retry: access violation with URL part sets continued When getting multiple URLs, curl didn't properly reset the byte counter after a successful transfer so if the subsequent transfer failed it would wrongly use the previous byte counter and behave badly (segfault) because of that. The code assumes that the byte counter and the 'stream' pointer is well in synch. Reported by: Jon Sargeant Bug: http://curl.haxx.se/bug/view.cgi?id=3028241
show more ...
|
#
84332b60 |
| 13-Jul-2010 |
Daniel Stenberg |
releasnote: synch up with commit f3b77e5611d
|
#
f3b77e56 |
| 27-Jun-2010 |
Kamil Dudka |
http_ntlm: add support for NSS When configured with '--without-ssl --with-nss', NTLM authentication now uses NSS crypto library for MD5 and DES. For MD4 we have a local implementati
http_ntlm: add support for NSS When configured with '--without-ssl --with-nss', NTLM authentication now uses NSS crypto library for MD5 and DES. For MD4 we have a local implementation in that case. More details are available at https://bugzilla.redhat.com/603783 In order to get it working, curl_global_init() must be called with CURL_GLOBAL_SSL or CURL_GLOBAL_ALL. That's necessary because NSS needs to be initialized globally and we do so only when the NSS library is actually required by protocol. The mentioned call of curl_global_init() is responsible for creating of the initialization mutex. There was also slightly changed the NSS initialization scenario, in particular, loading of the NSS PEM module. It used to be loaded always right after the NSS library was initialized. Now the library is initialized as soon as any SSL or NTLM is required, while the PEM module is prevented from being loaded until the SSL is actually required.
show more ...
|
#
89924a89 |
| 28-Jun-2010 |
Daniel Stenberg |
glob: backslash escaping bug curl didn't properly handle escaping characters in a URL with the use of backslash. It did an attempt, but that failed as reported in bug 3022551. The de
glob: backslash escaping bug curl didn't properly handle escaping characters in a URL with the use of backslash. It did an attempt, but that failed as reported in bug 3022551. The described example was using the URL "http://example.com?{AB,C\,D}". I've now removed the special-handling of letters following the backslash and I also removed the bad extra check that triggered this particular bug. Bug: http://curl.haxx.se/bug/view.cgi?id=3022551 Reported by: Jon Sargeant
show more ...
|
#
bcefe839 |
| 28-Jun-2010 |
Daniel Stenberg |
release-notes: sync up with recent commits
|
#
7eecfb53 |
| 16-Jun-2010 |
Daniel Stenberg |
release: start on 7.21.1, bump contributor count
|
Revision tags: curl-7_21_0 |
|
#
a0dd9df9 |
| 05-Jun-2010 |
Constantine Sapuntzakis |
OpenSSL: fix spurious SSL connection aborts Was seeing spurious SSL connection aborts using libcurl and OpenSSL. I tracked it down to uncleared error state on the OpenSSL error stack
OpenSSL: fix spurious SSL connection aborts Was seeing spurious SSL connection aborts using libcurl and OpenSSL. I tracked it down to uncleared error state on the OpenSSL error stack - patch attached deals with that. Rough idea of problem: Code that uses libcurl calls some library that uses OpenSSL but don't clear the OpenSSL error stack after an error. ssluse.c calls SSL_read which eventually gets an EWOULDBLOCK from the OS. Returns -1 to indicate an error ssluse.c calls SSL_get_error. First thing, SSL_get_error calls ERR_get_error to check the OpenSSL error stack, finds an old error and returns SSL_ERROR_SSL instead of SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE. ssluse.c returns an error and aborts the connection Solution: Clear the openssl error stack before calling SSL_* operation if we're going to call SSL_get_error afterwards. Notes: This is much more likely to happen with multi because it's easier to intersperse other calls to the OpenSSL library in the same thread.
show more ...
|
#
8098d941 |
| 04-Jun-2010 |
Frank Meier |
getinfo: added *_PRIMARY_PORT, *_LOCAL_IP and *_LOCAL_PORT
|
#
605207a3 |
| 04-Jun-2010 |
Daniel Stenberg |
RELEASE-NOTES: add contributors not mentioned
|
#
43d20d81 |
| 04-Jun-2010 |
Yang Tse |
Enable OpenLDAP support for cygwin builds. Enable OpenLDAP support for cygwin builds. This support was disabled back in 2008 due to incompatibilities between OpenSSL and OpenLDAP headers
Enable OpenLDAP support for cygwin builds. Enable OpenLDAP support for cygwin builds. This support was disabled back in 2008 due to incompatibilities between OpenSSL and OpenLDAP headers. cygwin's OpenSSL 0.9.8l and OpenLDAP 2.3.43 versions on cygwin 1.5.25 allow building an OpenLDAP enabled libcurl supporting back to Windows 95. Remove non-functional CURL_LDAP_HYBRID code and references.
show more ...
|
#
684830cb |
| 02-Jun-2010 |
Daniel Stenberg |
SSH: corrected the inability to respect the timeout Jason McDonald posted bug report #3006786 when he found that the SFTP code didn't timeout properly in several places in the code e
SSH: corrected the inability to respect the timeout Jason McDonald posted bug report #3006786 when he found that the SFTP code didn't timeout properly in several places in the code even if a timeout was set properly. Based on his suggested patch, I wrote a different implementation that I think addressed the issue better and also uses the connect timeout for the initial part of the SSH/SFTP done during the "protocol connect" phase. (http://curl.haxx.se/bug/view.cgi?id=3006786)
show more ...
|
#
2c72732e |
| 01-Jun-2010 |
Daniel Stenberg |
multi_socket: handles timer inaccuracy better for timeouts Igor Novoseltsev reported a problem with the multi socket API and using timeouts and timers. It boiled down to a problem with
multi_socket: handles timer inaccuracy better for timeouts Igor Novoseltsev reported a problem with the multi socket API and using timeouts and timers. It boiled down to a problem with libcurl's use of GetTickCount() interally to figure out the current time, while Igor's own application code used another function call. It made his app call the socket API timeout function a bit _before_ libcurl would consider the timeout to trigger, and that could easily lead to timeouts or stalls in the app. It seems GetTickCount() in general often has no better resolution than 16ms and switching to the alternative function QueryPerformanceCounter has its share of problems: http://www.virtualdub.org/blog/pivot/entry.php?id=106 We address this problem by simply having libcurl treat timers that already has occured or will occur within 40ms subject for treatment. I'm confident that there are other implementations and operating systems with similarly in accurate timer functions so it makes sense to have applied generically and I don't believe we sacrifice much by adding a 40ms inaccuracy on these timeouts.
show more ...
|
#
2e056353 |
| 24-May-2010 |
Howard Chu |
LDAP: properly implemented as a curl_handler makes the LDAP code much cleaner, nicer and in general being a better libcurl citizen. If a new enough OpenLDAP version is detect, the ne
LDAP: properly implemented as a curl_handler makes the LDAP code much cleaner, nicer and in general being a better libcurl citizen. If a new enough OpenLDAP version is detect, the new and shiny lib/openldap.c code is then used instead of the old cruft Code by Howard, minor cleanups by Daniel.
show more ...
|
#
0a29e244 |
| 21-May-2010 |
Daniel Stenberg |
TFTP: block id wrap bug fix In a normal expression, doing [unsigned short] + 1 will not wrap at 16 bits so the comparisons and outputs were done wrong. I added a macro do make sure i
TFTP: block id wrap bug fix In a normal expression, doing [unsigned short] + 1 will not wrap at 16 bits so the comparisons and outputs were done wrong. I added a macro do make sure it gets done right. Douglas Kilpatrick filed bug report #3004787 about it: http://curl.haxx.se/bug/view.cgi?id=3004787
show more ...
|
#
5f53c9d9 |
| 19-May-2010 |
Tor Arntsen |
lib: Fix AIX build failure
|