aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-09-03CURLOPT_FOLLOWLOCATION.3: mention methods for redirectsDaniel Stenberg
and some general cleaning up
2015-09-03inet_pton.c: Fix MSVC run-time check failure (2)Marcel Raad
This fixes another run-time check failure because of a narrowing cast on Visual C++. Closes #408
2015-09-03docs: Warn about any-domain cookies and multiple transfersJay Satiro
- Warn that cookies without a domain are sent to any domain: CURLOPT_COOKIELIST, CURLOPT_COOKIEFILE, --cookie - Note that imported Set-Cookie cookies without a domain are no longer exported: CURLINFO_COOKIELIST, CURLOPT_COOKIEJAR, --cookie-jar
2015-09-02tool_sdecls.h: Fixed compilation warning from commit 4a889441d3Steve Holme
tool_sdecls.h:139 warning: comma at end of enumerator list
2015-09-02opts: 8 more CURLINFO* options as stand-alone man pagesDaniel Stenberg
2015-08-31RELEASE-NOTES: synced with c764cb4add1a8Daniel Stenberg
2015-08-31man-pages: more SEE ALSO linksDaniel Stenberg
2015-08-31opts: more CURLINFO_* options as stand-alone man pagesDaniel Stenberg
2015-08-31sasl: Only define Curl_sasl_digest_get_pair() when CRYPTO_AUTH enabledSteve Holme
Introduced in commit 59f3f92ba6 this function is only implemented when CURL_DISABLE_CRYPTO_AUTH is not defined. As such we shouldn't define the function in the header file either.
2015-08-31sasl: Updated SPN variables and comments for consistencySteve Holme
In places the "host name" and "realm" variable was referred to as "instance" whilst in others it was referred to as "host".
2015-08-30configure: check for HMAC_Update in opensslDaniel Stenberg
Turns out HMAC_Init is now deprecated in openssl master (and I spelled HMAC_Init_ex wrong in previous commit)
2015-08-30win32: Use DES_set_odd_parity() from OpenSSL/BoringSSL by defaultSteve Holme
Set HAVE_DES_SET_ODD_PARITY when using OpenSSL/BoringSSL as native Windows builds don't use the autoconf tools.
2015-08-30des: Fixed compilation warning from commit 613e5022feSteve Holme
curl_ntlm_core.c:150: warning 'Curl_des_set_odd_parity' undefined; assuming extern returning int
2015-08-30buildconf.bat: Fixed double blank line in 'curl manual' warning outputSteve Holme
2015-08-30makefiles: Added our standard copyright headerSteve Holme
But kept the original author, when they were specified in a comment, as the initial copyright holder.
2015-08-29CURLOPT_FILETIME.3: CURLINFO_FILETIME has its own manpage nowJay Satiro
2015-08-29CURLINFO_RESPONSE_CODE.3: added short descriptionDaniel Stenberg
2015-08-28opts: 7 initial CURLINFO_* options as stand-alone man pagesDaniel Stenberg
2015-08-28libcurl.m4: Put braces around empty if bodyNikolai Kondrashov
Put braces around empty "if" body in libcurl.m4 check to avoid warning: suggest braces around empty body in an 'if' statement and make it work with -Werror builds. Closes #402
2015-08-25curl_easy_escape.3: escape '\n'Svyatoslav Mishyn
Closes #398
2015-08-25curl_easy_{escape,setopt}.3: fix exampleSvyatoslav Mishyn
remove redundant '}'
2015-08-25cmake: added Windows SSL supportSergei Nikulov
Closes #399
2015-08-25curl: point out the conflicting HTTP methods if usedDaniel Stenberg
It isn't always clear to the user which options that cause the HTTP methods to conflict so by spelling them out it should hopefully be easier to understand why curl complains.
2015-08-25curl: clarify that users can only specify one _METHOD_Daniel Stenberg
2015-08-24curl_easy_{escape,unescape}.3: "char *" vs. "const char *"Svyatoslav Mishyn
Closes #395
2015-08-24os400: include new options in wrappers and update ILE/RPG binding.Patrick Monnerat
2015-08-24KNOWN_BUGS: #2, not reading a HEAD response-body is not a bugDaniel Stenberg
... since HTTP is forbidden to return any such.
2015-08-24KNOWN_BUGS: #78 zero-length files is already fixed!Daniel Stenberg
2015-08-24getinfo: added CURLINFO_ACTIVESOCKETRazvan Cojocaru
This patch addresses known bug #76, where on 64-bit Windows SOCKET is 64 bits wide, but long is only 32, making CURLINFO_LASTSOCKET unreliable. Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
2015-08-24http2: remove dead codeDaniel Stenberg
Leftovers from when we removed the private socket hash. Coverity CID 1317365, "Logically dead code"
2015-08-24ntlm: mark deliberate switch case fall-throughDaniel Stenberg
Coverity CID 1317367, "Missing break in switch"
2015-08-24http2: on_frame_recv: get a proper 'conn' for the debug loggingDaniel Stenberg
"Explicit null dereferenced (FORWARD_NULL)" Coverity CID 1317366
2015-08-24RELEASE-NOTES: synced with 2acaf3c804Daniel Stenberg
2015-08-23tool: fix memory leak with --proto-default optionDan Fandrich
2015-08-22CURLOPT_DEFAULT_PROTOCOL: addedNathaniel Waisbrot
- Add new option CURLOPT_DEFAULT_PROTOCOL to allow specifying a default protocol for schemeless URLs. - Add new tool option --proto-default to expose CURLOPT_DEFAULT_PROTOCOL. In the case of schemeless URLs libcurl will behave in this way: When the option is used libcurl will use the supplied default. When the option is not used, libcurl will follow its usual plan of guessing from the hostname and falling back to 'http'.
2015-08-22runtests: Allow for spaces in server-verify curl custom pathJay Satiro
2015-08-22NTLM: recent boringssl brought DES_set_odd_parity backDaniel Stenberg
... so improve the #ifdefs for using our local implementation.
2015-08-22configure: detect latest boringsslDaniel Stenberg
Since boringssl brought back DES_set_odd_parity again, it cannot be used to differentiate from boringssl. Using the OPENSSL_IS_BORINGSSL define seems better anyway. URL: https://android.googlesource.com/platform/external/curl/+/f551028d5caab29d4b4a4ae8c159c76c3cfd4887%5E!/ Original-patch-by: Bertrand Simonnet Closes #393
2015-08-22configure: change functions to detect openssl (clones)Daniel Stenberg
... since boringssl moved the former ones and the check started to fail. URL: https://android.googlesource.com/platform/external/curl/+/f551028d5caab29d4b4a4ae8c159c76c3cfd4887%5E!/ Original-patch-by: Bertrand Simonnet
2015-08-21openssl: handle lack of server cert when strict checking disabledAlessandro Ghedini
If strict certificate checking is disabled (CURLOPT_SSL_VERIFYPEER and CURLOPT_SSL_VERIFYHOST are disabled) do not fail if the server doesn't present a certificate at all. Closes #392
2015-08-21ftp: clear the do_more bit when the server has connectedDaniel Stenberg
The multi state machine would otherwise go into the DO_MORE state after DO, even for the case when the FTP state machine had already performed those duties, which caused libcurl to get stuck in that state and fail miserably. This occured for for active ftp uploads. Reported-by: Patricia Muscalu
2015-08-21travis.yml: Add OS X testbot.Jactry Zeng
2015-08-20travis: Upgrading to container based buildRémy Léone
http://docs.travis-ci.com/user/migrating-from-legacy Closes #388
2015-08-20RELEASE-NOTES: synced with 14ff86256b13eDaniel Stenberg
2015-08-20rtsp: stop reading empty DESCRIBE responsesErik Janssen
Based-on-patch-by: Jim Hollinger
2015-08-20rtsp: support basic/digest authenticationErik Janssen
2015-08-19CURLMOPT_PUSHFUNCTION.3: fix argument typesSam Roth
Closes #389 Closes #386
2015-08-19inet_pton.c: Fix MSVC run-time check failureMarcel Raad
Visual Studio complains with a message box: "Run-Time Check Failure #1 - A cast to a smaller data type has caused a loss of data. If this was intentional, you should mask the source of the cast with the appropriate bitmask. For example: char c = (i & 0xFF); Changing the code in this way will not affect the quality of the resulting optimized code." This is because only 'val' is cast to unsigned char, so the "& 0xff" has no effect. Closes #387
2015-08-18docs: Update the redirect protocols disabled by defaultJay Satiro
- Clarify that FILE and SCP are disabled by default since 7.19.4 - Add that SMB and SMBS are disabled by default since 7.40.0 - Add CURLPROTO_SMBS to the list of protocols
2015-08-18gitignore: Sort for readabilityJay Satiro
find . -name .gitignore -print0 | xargs -i -0 sort -o '{}' '{}'