aboutsummaryrefslogtreecommitdiff
path: root/RELEASE-NOTES
AgeCommit message (Collapse)Author
2011-03-13RELEASE-NOTES: synced with e649a7baae2Daniel Stenberg
2011-02-23RELEASE-NOTES: synced with 2345c1dd661cDaniel Stenberg
2011-02-22nss: do not ignore failure of SSL handshakeKamil Dudka
Flaw introduced in fc77790 and present in curl-7.21.4. Bug: https://bugzilla.redhat.com/669702#c16
2011-02-17SOCKOPTFUNCTION: callback can say already-connectedDaniel Stenberg
Introducing a few CURL_SOCKOPT* defines for conveniance. The new CURL_SOCKOPT_ALREADY_CONNECTED signals to libcurl that the socket is to be treated as already connected and thus it will skip the connect() call.
2011-02-17nss: avoid memory leak on SSL connection failureKamil Dudka
2011-02-17RELEASE-NOTES: fresh start towards 7.21.5Daniel Stenberg
2011-02-17RELEASE-NOTES: credits since 7.21.3Daniel Stenberg
I went through all the names mentioned as authors and in commit messages since 7.21.3, and this list inserted now is sorted on first name.
2011-02-10RELEASE-NOTES: synced with 3bb1291fbd4Daniel Stenberg
2011-01-18RELEASE-NOTES: mention contributorsDaniel Stenberg
2011-01-18RELEASE-NOTES: synced with 7fcbdd68b9eDaniel Stenberg
2011-01-18nss: fix a bug in handling of CURLOPT_CAPATHKamil Dudka
... and update the curl.1 and curl_easy_setopt.3 man pages such that they do not suggest to use an OpenSSL utility if curl is not built against OpenSSL. Bug: https://bugzilla.redhat.com/669702
2011-01-04nss: avoid CURLE_OUT_OF_MEMORY given a file name without any slashKamil Dudka
Bug: https://bugzilla.redhat.com/623663
2011-01-04RELEASE-NOTES: synced with 83e9fb21aabbec2Daniel Stenberg
2010-12-157.21.4: version bumpDaniel Stenberg
2010-12-15RELEASE-NOTES: synced with a865bd9fbaaa43e5cDaniel Stenberg
2010-12-09RELEASE-NOTES: synced with c28443c551825Daniel Stenberg
2010-11-19Detect socket errors in GnuTLS on WindowsMatthias Bolte
On Windows, translate WSAGetLastError() to errno values as GNU TLS does it internally, too. This is necessary because send() and recv() on Windows don't set errno when they fail but GNU TLS expects a proper errno value. Bug: http://curl.haxx.se/bug/view.cgi?id=3110991
2010-11-15RELEASE-NOTES: synced with cbf4961bf3e4Daniel Stenberg
2010-11-09ftp: treat server's response 421 as CURLE_OPERATION_TIMEDOUTKamil Dudka
Bug: https://bugzilla.redhat.com/650255 Reported by: Simon H.
2010-11-08RELEASE-NOTES: synced with fc6c4c10f9faab08Daniel Stenberg
I also recounted and updated the command line and libcurl options.
2010-11-04RELEASE-NOTES: synced with 7b823badbcab9d330Daniel Stenberg
2010-10-17RELEASE-NOTES: sync with 09a2d93a0f17caDaniel Stenberg
2010-10-13RELEASE-NOTES: start over towards 7.21.3Daniel Stenberg
2010-10-12RELEASE-NOTES: synced with ecd624b8e774a85Daniel Stenberg
2010-10-08RELEASE-NOTES: synced with 61f4cdb73ae4Daniel Stenberg
2010-10-01RELEASE-NOTES: synced up to 588402585baeDaniel Stenberg
2010-09-27Changed the TPF make file to get source files from Makefile.incDan Fandrich
Patch was fixed and validated by David McCreedy.
2010-09-21RELEASE-NOTES: sync with 8665d4e5 and c-ares >= 1.6.0 noteDaniel Stenberg
2010-09-21RELEASE-NOTES: in sync with 19f45eaa799Daniel Stenberg
2010-09-21RELEASE-NOTES: synced with 5fcc4332d62feDaniel Stenberg
Removed the duplicate entry of Kamil in the credits.
2010-09-18RELEASE-NOTES: sync from d2a7fd2fe65b to HEADDaniel Stenberg
2010-09-11Link curl and the test apps with -lrt explicitly when necessaryDan Fandrich
When curl calls a function from that library then it needs to explicitly link to the library instead of piggybacking on libcurl's own dependency. Without this, GNU ld with the --no-add-needed flag fails when linking (which Fedora now does by default). Reported by: Quanah Gibson-Mount Bug: http://curl.haxx.se/mail/lib-2010-09/0085.html
2010-08-25RELEASE-NOTES: sync from b980c9a02 to HEADDaniel Stenberg
2010-08-15multi: two fixes doneDaniel Stenberg
2010-08-15curl -T: ignore file size of special filesKamil Dudka
original bug report at https://bugzilla.redhat.com/622520
2010-08-11release cycle loop: start over toward 7.21.2Daniel Stenberg
2010-08-11RELEASE-NOTES: mention the runtests fix as wellDaniel Stenberg
2010-08-10RELEASE-NOTES: synced, 3 additional bugfixesDaniel Stenberg
2010-08-07RELEASE-NOTES: synced with recent changesDaniel Stenberg
2010-08-03RELEASE-NOTES: synced with recent changesDaniel Stenberg
2010-07-14--retry: access violation with URL part sets continuedDaniel Stenberg
When getting multiple URLs, curl didn't properly reset the byte counter after a successful transfer so if the subsequent transfer failed it would wrongly use the previous byte counter and behave badly (segfault) because of that. The code assumes that the byte counter and the 'stream' pointer is well in synch. Reported by: Jon Sargeant Bug: http://curl.haxx.se/bug/view.cgi?id=3028241
2010-07-14releasnote: synch up with commit f3b77e5611dDaniel Stenberg
2010-06-30http_ntlm: add support for NSSKamil Dudka
When configured with '--without-ssl --with-nss', NTLM authentication now uses NSS crypto library for MD5 and DES. For MD4 we have a local implementation in that case. More details are available at https://bugzilla.redhat.com/603783 In order to get it working, curl_global_init() must be called with CURL_GLOBAL_SSL or CURL_GLOBAL_ALL. That's necessary because NSS needs to be initialized globally and we do so only when the NSS library is actually required by protocol. The mentioned call of curl_global_init() is responsible for creating of the initialization mutex. There was also slightly changed the NSS initialization scenario, in particular, loading of the NSS PEM module. It used to be loaded always right after the NSS library was initialized. Now the library is initialized as soon as any SSL or NTLM is required, while the PEM module is prevented from being loaded until the SSL is actually required.
2010-06-29glob: backslash escaping bugDaniel Stenberg
curl didn't properly handle escaping characters in a URL with the use of backslash. It did an attempt, but that failed as reported in bug 3022551. The described example was using the URL "http://example.com?{AB,C\,D}". I've now removed the special-handling of letters following the backslash and I also removed the bad extra check that triggered this particular bug. Bug: http://curl.haxx.se/bug/view.cgi?id=3022551 Reported by: Jon Sargeant
2010-06-29release-notes: sync up with recent commitsDaniel Stenberg
2010-06-16release: start on 7.21.1, bump contributor countDaniel Stenberg
2010-06-05OpenSSL: fix spurious SSL connection abortsConstantine Sapuntzakis
Was seeing spurious SSL connection aborts using libcurl and OpenSSL. I tracked it down to uncleared error state on the OpenSSL error stack - patch attached deals with that. Rough idea of problem: Code that uses libcurl calls some library that uses OpenSSL but don't clear the OpenSSL error stack after an error. ssluse.c calls SSL_read which eventually gets an EWOULDBLOCK from the OS. Returns -1 to indicate an error ssluse.c calls SSL_get_error. First thing, SSL_get_error calls ERR_get_error to check the OpenSSL error stack, finds an old error and returns SSL_ERROR_SSL instead of SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE. ssluse.c returns an error and aborts the connection Solution: Clear the openssl error stack before calling SSL_* operation if we're going to call SSL_get_error afterwards. Notes: This is much more likely to happen with multi because it's easier to intersperse other calls to the OpenSSL library in the same thread.
2010-06-05getinfo: added *_PRIMARY_PORT, *_LOCAL_IP and *_LOCAL_PORTFrank Meier
2010-06-04RELEASE-NOTES: add contributors not mentionedDaniel Stenberg
2010-06-04Enable OpenLDAP support for cygwin builds.Yang Tse
Enable OpenLDAP support for cygwin builds. This support was disabled back in 2008 due to incompatibilities between OpenSSL and OpenLDAP headers. cygwin's OpenSSL 0.9.8l and OpenLDAP 2.3.43 versions on cygwin 1.5.25 allow building an OpenLDAP enabled libcurl supporting back to Windows 95. Remove non-functional CURL_LDAP_HYBRID code and references.