| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
SVN-Revision: 32028
|
|
|
|
| |
SVN-Revision: 32027
|
|
|
|
|
|
| |
buffer and subsequent data corruption (#11557)
SVN-Revision: 32005
|
|
|
|
|
|
| |
structure - support concurrent requests and make the upper limit configurable - implement initial version of HTTP-to-ubus JSON proxy and session.* namespace - add compile time support for debug information - code style changes - bump package revision
SVN-Revision: 31931
|
|
|
|
|
|
| |
version
SVN-Revision: 31572
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Passes the document-root to the Lua handler by placing it in uhttpd.docroot.
It could alternatively be placed in env.DOCUMENT_ROOT which would more closely
resemble the CGI protocol; but would mean that it is not available at the time
when the handler-chunk is loaded but rather not until the handler is called,
without any code savings.
Signed-off-by: David Favro <openwrt@meta-dynamic.com>
SVN-Revision: 31571
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
My apologies, the 2nd of those patches had a syntax error -- that's what
I get for making a last-minute edit, even to the comments, without
testing! :-p
Here is the corrected patch.
-- David
From d259cff104d2084455476b82e92a3a27524f4263 Mon Sep 17 00:00:00 2001
From: David Favro <openwrt@meta-dynamic.com>
Date: Fri, 27 Apr 2012 14:17:52 -0400
Subject: [PATCH] uhttpd URL-codec enhancements.
* uh_urlencode() and uh_urldecode() now return an error condition for
buffer-overflow and malformed-encoding rather than normal return with corrupt
or truncated data. As HTTP request processing is currently implemented, this
causes a 404 HTTP status returned to the client, while 400 is more
appropriate.
* Exposed urlencode() to Lua.
* Lua's uhttpd.urlencode() and .urldecode() now raise an error condition for
buffer-overflow and malformed-encoding rather than normal return with
incorrect data.
SVN-Revision: 31570
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Fixed output-buffer-overflow bug in uh_urlencode() and uh_urldecode() [tested
input-buffer index against output-buffer length]. In reality, this would not
typically cause an overflow on decode, where the output string would be
expected to be shorter than the input string; and uh_urlencode() seems to have
been unreferenced in the source.
* Fixed bug: uh_urlencode() and uh_urldecode() both read one extra byte from the
input-string. While this could manifest in C code, the result was most
egregious when called from Lua, where it caused an extra null byte to be
embedded at the end of the output string.
* uh_urlencode() cleanup: removed redundant bitwise-and.
Signed-off-by: David Favro <openwrt@meta-dynamic.com>
SVN-Revision: 31569
|
|
|
|
| |
SVN-Revision: 30936
|
|
|
|
| |
SVN-Revision: 30806
|
|
|
|
| |
SVN-Revision: 29152
|
|
|
|
|
|
| |
dollar sign to indicate a cipher
SVN-Revision: 28886
|
|
|
|
| |
SVN-Revision: 28841
|
|
|
|
| |
SVN-Revision: 28792
|
|
|
|
|
|
|
|
|
| |
For instance two word city names will result in weird certificates.
Therefore adding the missing quotations.
Signed-off-by: Linus Lüssing <linus.luessing@web.de>
SVN-Revision: 28776
|
|
|
|
| |
SVN-Revision: 28769
|
|
|
|
| |
SVN-Revision: 28762
|
|
|
|
|
|
| |
send() operations below the ssl layer - fixes hangs when accessing via https
SVN-Revision: 28761
|
|
|
|
| |
SVN-Revision: 28257
|
|
|
|
|
|
| |
Linus Luessing for spotting it
SVN-Revision: 28254
|
|
|
|
| |
SVN-Revision: 28160
|
|
|
|
| |
SVN-Revision: 28149
|
|
|
|
| |
SVN-Revision: 27689
|
|
|
|
|
|
| |
(#7827)
SVN-Revision: 27686
|
|
|
|
|
|
| |
server restart from within LuCI and similar problems
SVN-Revision: 27628
|
|
|
|
|
|
| |
the other web serves and proxies from the packages feed
SVN-Revision: 26062
|
|
|
|
| |
SVN-Revision: 25220
|
|
|
|
|
|
| |
optional (#8272)
SVN-Revision: 24952
|
|
|
|
| |
SVN-Revision: 24823
|
|
|
|
|
|
| |
directories are requested
SVN-Revision: 23952
|
|
|
|
| |
SVN-Revision: 23897
|
|
|
|
| |
SVN-Revision: 23261
|
|
|
|
| |
SVN-Revision: 23260
|
|
|
|
| |
SVN-Revision: 23159
|
|
|
|
| |
SVN-Revision: 22988
|
|
|
|
| |
SVN-Revision: 22805
|
|
|
|
|
|
| |
serving of static files as .cgi with X-Wrt - better cope with connection aborts, especially during header transfer - fix return value checking of TLS reads and writes, solves some blocking issues
SVN-Revision: 22692
|
|
|
|
|
|
| |
support unlimited amount of authentication realms, listener and client sockets - support for interpreters (.php => /usr/bin/php-cgi)
SVN-Revision: 22630
|
|
|
|
| |
SVN-Revision: 22607
|
|
|
|
|
|
| |
send bad request headers twice
SVN-Revision: 22602
|
|
|
|
| |
SVN-Revision: 22593
|
|
|
|
|
|
| |
(DNS rebinding countermeasure)
SVN-Revision: 22589
|
|
|
|
| |
SVN-Revision: 22404
|
|
|
|
|
|
| |
custom error pages (or cgi handler) - add option to disable directory listings - add REDIRECT_STATUS for CGI requests, fixes php-cgi
SVN-Revision: 22366
|
|
|
|
|
|
| |
PEM certificates for SSL
SVN-Revision: 21762
|
|
|
|
| |
SVN-Revision: 21556
|
|
|
|
| |
SVN-Revision: 21492
|
|
|
|
|
|
| |
password set yet (X-Wrt compatibility) - fix off-by-one in CGI header parsing, fixes cgi programs that emit bad header lines (AsteriskGUI compatibility) - bump version
SVN-Revision: 21121
|
|
|
|
| |
SVN-Revision: 20885
|
|
|
|
|
|
| |
(#7067) - follow symlinks in docroot and add option to disable that - fix mimetype detection for files with combined extensions (.tar.gz, ...)
SVN-Revision: 20883
|