Skip to content
Commits on Feb 8, 2016
  1. @jay
  2. @jay

    tool_urlglob: Allow reserved dos device names (Windows)

    jay committed
    Allow --output to reserved dos device names without the device prefix
    for backwards compatibility.
    
    Example: --output NUL can be used instead of --output \\.\NUL
    
    Bug: 4520534#commitcomment-15954863
    Reported-by: Gisle Vanem
  3. @bagder

    cookies: allow spaces in cookie names, cut of trailing spaces

    bagder committed
    It turns out Firefox and Chrome both allow spaces in cookie names and
    there are sites out there using that.
    
    Turned out the code meant to strip off trailing space from cookie names
    didn't work. Fixed now.
    
    Test case 8 modified to verify both these changes.
    
    Closes #639
  4. @monnerat
  5. @monnerat
  6. @lnussel @bagder
  7. @lnussel @bagder

    configure: --with-ca-fallback: use built-in TLS CA fallback

    lnussel committed with bagder
    When trying to verify a peer without having any root CA certificates
    set, this makes libcurl use the TLS library's built in default as
    fallback.
    
    Closes #569
  8. @bagder

    Proxy-Connection: stop sending this header by default

    bagder committed
    RFC 7230 says we should stop. Firefox already stopped.
    
    Bug: #633
    Reported-By: Brad Fitzpatrick
    
    Closes #633
  9. @bagder
  10. @bagder
  11. @bagder

    RELEASE-PROCEDURE: remove the github upload part

    bagder committed
    ... as we're HTTPS on the main site now, there's no point in that
    extra step
  12. @bagder
  13. @jay

    tool_operhlp: Check for backslashes in get_url_file_name

    jay committed
    Extract the filename from the last slash or backslash. Prior to this
    change backslashes could be part of the filename.
    
    This change needed for the curl tool built for Cygwin. Refer to the
    CYGWIN addendum in advisory 20160127B.
    
    Bug: https://curl.haxx.se/docs/adv_20160127B.html
Commits on Feb 7, 2016
  1. @bagder

    RELEASE-NOTES: synced with d6a8869

    bagder committed
  2. @jay

    openssl: Fix signed/unsigned mismatch warning in X509V3_ext

    jay committed
    sk_X509_EXTENSION_num may return an unsigned integer, however the value
    will fit in an int.
    
    Bug: dd1b44c#commitcomment-15913896
    Reported-by: Gisle Vanem
Commits on Feb 6, 2016
  1. @bagder

    TODO: 17.11 -w output to stderr

    bagder committed
  2. @mkauf @jay

    idn_win32: Better error checking

    mkauf committed with jay
    .. also fix a conversion bug in the unused function
    curl_win32_ascii_to_idn().
    
    And remove wprintfs on error (Jay).
    
    Bug: #637
  3. @gvanem @jay

    examples/asiohiper: Avoid function name collision on Windows

    gvanem committed with jay
    closesocket => close_socket
    Winsock already has the former.
    
    Bug: https://curl.haxx.se/mail/lib-2016-02/0016.html
  4. @gvanem @jay
  5. @bagder

    COPYING: clarify that Daniel is not the sole author

    bagder committed
    ... done on request and as it is a fair point.
Commits on Feb 5, 2016
  1. @jay
  2. @jay
  3. @jay

    tool_doswin: Improve sanitization processing

    jay committed
    - Add unit test 1604 to test the sanitize_file_name function.
    
    - Use -DCURL_STATICLIB when building libcurltool for unit testing.
    
    - Better detection of reserved DOS device names.
    
    - New flags to modify sanitize behavior:
    
    SANITIZE_ALLOW_COLONS: Allow colons
    SANITIZE_ALLOW_PATH: Allow path separators and colons
    SANITIZE_ALLOW_RESERVED: Allow reserved device names
    SANITIZE_ALLOW_TRUNCATE: Allow truncating a long filename
    
    - Restore sanitization of banned characters from user-specified outfile.
    
    Prior to this commit sanitization of a user-specified outfile was
    temporarily disabled in 2b6dadc because there was no way to allow path
    separators and colons through while replacing other banned characters.
    Now in such a case we call the sanitize function with
    SANITIZE_ALLOW_PATH which allows path separators and colons to pass
    through.
    
    
    Closes #624
    Reported-by: Octavio Schroeder
Commits on Feb 4, 2016
  1. @vszakats @jay

    URLs: change more http to https

    vszakats committed with jay
  2. @jay

    sasl_sspi: Fix memory leak in domain populate

    jay committed
    Free an existing domain before replacing it.
    
    Bug: #635
    Reported-by: silveja1@users.noreply.github.com
  3. @vszakats @bagder
Commits on Feb 3, 2016
  1. @bagder

    CHANGES.o: fix references to curl.haxx.nu

    bagder committed
    I removed the scheme prefix from the URLs references this host name, as
    we don't own/run that anymore but the name is kept for historic reasons.
  2. @bagder
  3. @vszakats @jay

    URLs: change more http to https

    vszakats committed with jay
  4. @dfandrich
Commits on Feb 2, 2016
  1. @bagder

    RELEASE-NOTES: synced with 4af40b3

    bagder committed
  2. @bagder
  3. @bagder
  4. @bagder

    dotdot: allow an empty input string too

    bagder committed
    It isn't used by the code in current conditions but for safety it seems
    sensible to at least not crash on such input.
    
    Extended unit test 1395 to verify this too as well as a plain "/" input.
Commits on Feb 1, 2016
  1. @bagder
Something went wrong with that request. Please try again.