#
5c4fe0d8 |
| 01-Nov-2018 |
Jim Fuller |
setopt: add CURLOPT_CURLU Allows an application to pass in a pre-parsed URL via a URL handle. Closes #3227
|
#
74f47823 |
| 05-Nov-2018 |
Sangamkar |
libcurl: stop reading from paused transfers In the transfer loop it would previously not acknwledge the pause bit and continue until drained or loop ended. Closes #3240
|
#
2c5ec339 |
| 01-Nov-2018 |
Daniel Stenberg |
Curl_follow: accept non-supported schemes for "fake" redirects When not actually following the redirect and the target URL is only stored for later retrieval, curl always accepted "non-s
Curl_follow: accept non-supported schemes for "fake" redirects When not actually following the redirect and the target URL is only stored for later retrieval, curl always accepted "non-supported" schemes. This was a regression from 46e164069d1a5230. Reported-by: Brad King Fixes #3210 Closes #3215
show more ...
|
#
eda09988 |
| 23-Oct-2018 |
Gisle Vanem |
Fix for compiling with lwIP (3) lwIP on Windows does not have a WSAIoctl() function. But it do have a SO_SNDBUF option to lwip_setsockopt(). But it currently does nothing.
|
#
6535b930 |
| 21-Oct-2018 |
Daniel Stenberg |
Curl_follow: return better errors on URL problems ... by making the converter function global and accessible. Closes #3153
|
#
ca10fae6 |
| 21-Oct-2018 |
Daniel Stenberg |
Curl_follow: remove remaining free(newurl) Follow-up to 05564e750e8f0c. This function no longer frees the passed-in URL. Reported-by: Michael Kaufmann Bug: https://github.co
Curl_follow: remove remaining free(newurl) Follow-up to 05564e750e8f0c. This function no longer frees the passed-in URL. Reported-by: Michael Kaufmann Bug: https://github.com/curl/curl/commit/05564e750e8f0c79016c680f301ce251e6e86155#commitcomm ent-30985666
show more ...
|
#
05564e75 |
| 02-Oct-2018 |
Daniel Stenberg |
multi: avoid double-free Curl_follow() no longer frees the string. Make sure it happens in the caller function, like we normally handle allocations. This bug was introduced with
multi: avoid double-free Curl_follow() no longer frees the string. Make sure it happens in the caller function, like we normally handle allocations. This bug was introduced with the use of the URL API internally, it has never been in a release version Reported-by: Dario Weißer Closes #3149
show more ...
|
#
6afe70a0 |
| 10-Oct-2018 |
Michael Kaufmann |
Curl_follow: Always free the passed new URL Closes #3124
|
#
12d833fa |
| 10-Oct-2018 |
Daniel Gustafsson |
transfer: fix typo in comment
|
#
ef695fc3 |
| 24-Sep-2018 |
Daniel Stenberg |
Curl_retry_request: fix memory leak Detected by OSS-Fuzz Bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10648 Closes #3042
|
#
46e16406 |
| 14-Sep-2018 |
Daniel Stenberg |
url: use the URL API internally as well ... to make it a truly unified URL parser. Closes #3017
|
Revision tags: curl-7_61_1 |
|
#
fb30ac5a |
| 05-Aug-2018 |
Daniel Stenberg |
URL-API See header file and man pages for API. All documented API details work and are tested in the 1560 test case. Closes #2842
|
#
2825f46d |
| 18-Aug-2018 |
Daniel Stenberg |
CURLOPT_UPLOAD_BUFFERSIZE: set upload buffer size This is step 3 of #2888. Fixes #2888 Closes #2896
|
#
1a890997 |
| 31-Aug-2018 |
Daniel Stenberg |
all: s/int/size_t cleanup Assisted-by: Rikard Falkeborn Closes #2922
|
Revision tags: curl-7_61_0 |
|
#
15ed9f87 |
| 09-Jul-2018 |
Marcel Raad |
curl-compilers: enable -Wimplicit-fallthrough=4 for GCC This enables level 4 instead of the default level 3, which of the currently used comments only allows /* FALLTHROUGH */ to silence
curl-compilers: enable -Wimplicit-fallthrough=4 for GCC This enables level 4 instead of the default level 3, which of the currently used comments only allows /* FALLTHROUGH */ to silence the warning. Closes https://github.com/curl/curl/pull/2747
show more ...
|
#
8c80a9d1 |
| 17-Aug-2018 |
Daniel Stenberg |
upload: change default UPLOAD_BUFSIZE to 64KB To make uploads significantly faster in some circumstances. Part 2 of #2888 Closes #2892
|
#
e6e9b006 |
| 16-Aug-2018 |
Daniel Stenberg |
upload: allocate upload buffer on-demand Saves 16KB on the easy handle for operations that don't need that buffer. Part 1 of #2888
|
#
d38b4737 |
| 08-Aug-2018 |
Daniel Stenberg |
windows: follow up to the buffer-tuning 1ba1dba7 Somehow I didn't include the amended version of the previous fix. This is the missing piece. Pointed-out-by: Viktor Szakats
|
#
1ba1dba7 |
| 19-Jul-2018 |
Daniel Jelinski |
windows: implement send buffer tuning Significantly enhances upload performance on modern Windows versions. Bug: https://curl.haxx.se/mail/lib-2018-07/0080.html Closes #2762
windows: implement send buffer tuning Significantly enhances upload performance on modern Windows versions. Bug: https://curl.haxx.se/mail/lib-2018-07/0080.html Closes #2762 Fixes #2224
show more ...
|
#
1836d59e |
| 26-Jul-2018 |
Harry Sintonen |
HTTP: Don't attempt to needlessly decompress redirect body This change fixes a regression where redirect body would needlessly be decompressed even though it was to be ignored anyway. As
HTTP: Don't attempt to needlessly decompress redirect body This change fixes a regression where redirect body would needlessly be decompressed even though it was to be ignored anyway. As it happens this causes secondary issues since there appears to be a bug in apache2 that it in certain conditions generates a corrupt zlib response. The regression was created by commit: dbcced8e32b50c068ac297106f0502ee200a1ebd Discovered-by: Harry Sintonen Closes #2798
show more ...
|
#
5ae22272 |
| 11-Jun-2018 |
Daniel Stenberg |
Curl_debug: remove dead printhost code The struct field is never set (since 5e0d9aea3) so remove the use of it and remove the connectdata pointer from the prototype. Reported-by
Curl_debug: remove dead printhost code The struct field is never set (since 5e0d9aea3) so remove the use of it and remove the connectdata pointer from the prototype. Reported-by: Tejas Bug: https://curl.haxx.se/mail/lib-2018-06/0054.html Closes #2647
show more ...
|
#
c45360d4 |
| 02-Jun-2018 |
Marian Klymov |
cppcheck: fix warnings - Get rid of variable that was generating false positive warning (unitialized) - Fix issues in tests - Reduce scope of several variables all over
cppcheck: fix warnings - Get rid of variable that was generating false positive warning (unitialized) - Fix issues in tests - Reduce scope of several variables all over etc Closes #2631
show more ...
|
Revision tags: curl-7_60_0 |
|
#
fe6b78b4 |
| 11-May-2018 |
Daniel Stenberg |
setup_transfer: deal with both sockets being -1 Detected by Coverity; CID 1435559. Follow-up to f8d608f38d00. It would index the array with -1 if neither index was a socket.
|
#
f8d608f3 |
| 04-May-2018 |
Daniel Stenberg |
transfer: don't unset writesockfd on setup of multiplexed conns Curl_setup_transfer() can be called to setup a new individual transfer over a multiplexed connection so it shouldn't unset
transfer: don't unset writesockfd on setup of multiplexed conns Curl_setup_transfer() can be called to setup a new individual transfer over a multiplexed connection so it shouldn't unset writesockfd. Bug: #2520 Closes #2549
show more ...
|
#
7f41432c |
| 26-Apr-2018 |
Stephan Mühlstrasser |
URL: fix ASCII dependency in strcpy_url and strlen_url Commit 3c630f9b0af097663a64e5c875c580aa9808a92b partially reverted the changes from commit dd7521bcc1b7a6fcb53c31f9bd1192fcc884bd56
URL: fix ASCII dependency in strcpy_url and strlen_url Commit 3c630f9b0af097663a64e5c875c580aa9808a92b partially reverted the changes from commit dd7521bcc1b7a6fcb53c31f9bd1192fcc884bd56 because of the problem that strcpy_url() was modified unilaterally without also modifying strlen_url(). As a consequence strcpy_url() was again depending on ASCII encoding. This change fixes strlen_url() and strcpy_url() in parallel to use a common host-encoding independent criterion for deciding whether an URL character must be %-escaped. Closes #2535
show more ...
|