Commit graph

912 commits

Author SHA1 Message Date
yhirose
7c1c952f5a Don't allow invalid status code format (It sould be a three-digit code.) 2020-12-15 20:25:24 -05:00
yhirose
a6edfc730a Added a unit test for static file with range 2020-12-15 18:47:51 -05:00
yhirose
c1264bfedc Fix problem with mp4 w/ Range header 2020-12-14 22:41:05 -05:00
yhirose
90a5b6ceb0
Updated README 2020-12-04 19:39:39 -05:00
yhirose
eb240ad2e5 Code cleanup 2020-12-03 16:03:12 -05:00
yhirose
88c961f37e Removed std::atomic<Error> error_ 2020-12-01 15:17:34 +00:00
yhirose
b952376968 Fixed warning 2020-12-01 03:50:55 +00:00
yhirose
5dd605d3a2 Fix 2020-11-30 21:49:31 -05:00
Seunghwan Hong
9c0c98b1ed
Add keep_alive_timeout guide on README.md () 2020-11-30 07:11:22 -05:00
yhirose
615867322d Fixed build errors and apply clangformat 2020-11-29 12:29:18 -05:00
David Wu
02d3cd5909 Fix multiple threading bugs including and 2020-11-29 12:29:15 -05:00
yhirose
47e5af15ea Updated README 2020-11-22 09:22:40 -05:00
yhirose
a5c239c174 Fix 2020-11-21 16:35:31 -05:00
yhirose
c2afc5ca44 Added chunked content provider support on client 2020-11-21 08:46:50 -05:00
yhirose
cee062d4c9 Fixed unit tests due to the change in 2020-11-19 21:04:46 -05:00
Unkorunk
b21dc8cbe0
Fix incorrect content_encoding for Brotli () 2020-11-19 12:39:20 -05:00
372046933
e1133a2dcb
std::tolower is undefined if the argument's value is neither representable as unsigned char nor equal to EOF ()
Co-authored-by: taoxu <taoxu@bilibili.com>
2020-11-19 09:21:40 -05:00
yhirose
e273fec93c Fixed Visual Studio setup 2020-11-19 09:17:59 -05:00
yhirose
95d0b073bd Fix 2020-11-15 08:13:08 -05:00
vawen
9c7d841b37
Fix: Compile error under VS2015 ()
Co-authored-by: jigarcia@vaxtor.es <jigarcia@vaxtor.es>
2020-11-10 08:41:53 -05:00
yhirose
f086bf5310 Fix 2020-11-08 18:16:23 -05:00
yhirose
6613d7b7ad Fixed warnings 2020-11-08 17:59:11 -05:00
yhirose
6adf130bf3 Fix 2020-11-07 21:54:47 -05:00
miketsts
b6b2eaf5bc
Add unit test SSLConnectTimeout ()
Add unit test for issue  fixed in PR , which does not contain
the test of its own.

The test creates a fake SSL server, inherited from SSLServer, which
does not create an SSL context. When an SSL client attempts to send it
a request, it gets a timeout error. Prior to PR , the client would
wait indefinitely

Co-authored-by: Michael Tseitlin <michael.tseitlin@concertio.com>
2020-11-07 09:41:20 -05:00
yhirose
eb4b7c70a9 Fix 2020-11-07 09:33:22 -05:00
yhirose
84661ea6ed Refactoring 2020-11-05 07:06:53 -05:00
yhirose
041122908c Fix problem with invalid range 2020-11-05 00:20:59 -05:00
yhirose
401de608df Fixed debug option problem. 2020-11-05 00:20:59 -05:00
yhirose
726c64cf10 Code format 2020-11-05 00:20:59 -05:00
Omkar Jadhav
e1f781a21a
[oss-fuzz] Enable msan for fuzz tests ()
* Disable openssl as we're not using it in fuzz tests

* Increase timeout in ClientStop test
2020-11-04 11:30:56 -05:00
Omkar Jadhav
72b81badad
Fix issues reported by oss-fuzz ()
* Fix oss-fuzz issue 

* Add test for oss-fuzz issue  

* Fix oss-fuzz issue  

* Revert change and add new test cases
2020-11-03 11:36:02 -05:00
yhirose
17428a8fbf Fixed warning 2020-11-03 09:16:28 -05:00
Daniel Ottiger
6e1879dfae
ssl-verify-host: fix verifying ip addresses containing zero's ()
* ssl-verify-host: fix verifying ip addresses containing zero's

If the subject alternate name contained an ip address with an zero
(like 10.42.0.1) it could not successfully verify.
It is because in c++ strings are null-terminated
and therefore strlen(name) would return a wrong result.
As I can not see why we can not trust the length returned by openssl,
lets drop this check.

* ssl-verify-host: add test case

lets try to validate against 127.0.0.1

Co-authored-by: Daniel Ottiger <daniel.ottiger@ch.schindler.com>
2020-11-02 20:27:34 -05:00
miketsts
eb1d2e04bc
SSL_connect and SSL_accept in non-blocking mode ()
SSL connection is performed in two steps:
First, a regular socket connection is established.
Then, SSL_connect/SSL_accept is called to establish SSL handshake.

If a network problem occurs during the second stage, SSL_connect on
the client may hang indefinitely.

The non-blocking mode solves this problem.

Co-authored-by: Michael Tseitlin <michael.tseitlin@concertio.com>
2020-11-02 17:05:08 -05:00
yhirose
c909ffa758 Fix 2020-11-01 21:03:47 -05:00
yhirose
ff5677ad19 Updated README 2020-10-27 20:35:56 -04:00
yhirose
8b1b31ac20 Fix 2020-10-27 20:32:19 -04:00
yhirose
953600c177 Fixed compiler error for old compiler. 2020-10-27 12:23:37 -04:00
yhirose
536e7eb7f2 Revert "Fix ". (It broke unit test...)
This reverts commit 6d66721ba1.
2020-10-25 20:22:39 -04:00
yhirose
6d66721ba1 Fix 2020-10-25 16:55:54 -04:00
yhirose
3b29cd0bdc Fix 2020-10-25 12:14:54 -04:00
yhirose
109b624dfe
Fix ()
* Fix 

* Rename ContentReceiver2 to ContentReceiverWithProgress
2020-10-22 11:48:43 -04:00
yhirose
0ed70c4d9f Fixed unit test errors 2020-10-21 14:34:27 -04:00
yhirose
a50b7591ca Fix 2020-10-21 13:02:33 -04:00
yhirose
bf8fc11b53 Code cleanup 2020-10-20 21:24:47 -04:00
Omkar Jadhav
bc4a613b6d
Fix suffix-byte-range issue () 2020-10-20 11:11:27 -04:00
yhirose
4bb001351c Fix 2020-10-19 22:13:24 -04:00
yhirose
e155ba44bb Fix 2020-10-19 15:23:35 -04:00
Muchamad Arifin Dwi P
a4a9637738
Fix null pointer exception () 2020-10-16 20:44:14 -04:00
Omkar Jadhav
5292142046
Add cpp-httplib to oss-fuzz ()
* *Add server fuzzer target  and seed corpus
* Add fuzz_test option to Makefile

* Fix 

* Try to fix Github actions on Ubuntu

* Added ReadTimeoutSSL test

* Comment out `-fsanitize=address`

* Rebase upstream changes

* remove address sanitizer temporarily

* Add separate Makefile for fuzzing

* 1. Remove special char from dictionary
2. Clean fuzzing/Makefile

* Use specific path to avoid accidently linking openssl version brought in by oss-fuzz

* remove addition of flags

* Refactor Makefile

* Add missing newline

* Add fuzztest to github workflow

* Fix

Co-authored-by: yhirose <yuji.hirose.bug@gmail.com>
2020-10-15 08:11:40 -04:00