aboutsummaryrefslogtreecommitdiff
path: root/RELEASE-NOTES
AgeCommit message (Collapse)Author
2017-04-10RELEASE-NOTES: synced with f9d1e9a27f7e1Daniel Stenberg
2017-04-04RELEASE-NOTES: synced with 4f2e348f9b42c69c480Daniel Stenberg
2017-03-29RELEASE-NOTES: synced with 556c51a2dfDaniel Stenberg
2017-03-21RELEASE-NOTES: typoDaniel Stenberg
2017-03-21RELEASE-NOTES: synced with 6e0f26c8a8c28dfDaniel Stenberg
2017-03-13RELEASE-NOTES: synced with c25e0761d0fc49c4Daniel Stenberg
2017-03-08bump: next release will be known as 7.54.0Daniel Stenberg
...due to the newly added CURL_SSLVERSION_MAX_* functionality
2017-03-08RELEASE-NOTES: synced with 6888a670aa01Daniel Stenberg
2017-02-24bump: work on the next releaseDaniel Stenberg
2017-02-24release: 7.53.1Daniel Stenberg
2017-02-23RELEASE-NOTES: synced with 443e5b03a7d441Daniel Stenberg
2017-02-23bump: 7.53.1 coming upDaniel Stenberg
synced with df665f4df0f7a352
2017-02-22release: 7.53.0Daniel Stenberg
2017-02-20RELEASE-NOTES: synced with af30f1152d43dcdbDaniel Stenberg
2017-02-14RELEASE-NOTES: synced with 690935390c29cDaniel Stenberg
2017-02-09nss: make FTPS work with --proxytunnelKamil Dudka
If the NSS code was in the middle of a non-blocking handshake and it was asked to finish the handshake in blocking mode, it unexpectedly continued in the non-blocking mode, which caused a FTPS connection over CONNECT to fail with "(81) Socket not ready for send/recv". Bug: https://bugzilla.redhat.com/1420327
2017-02-07RELEASE-NOTES: synced with 102454459dd688cDaniel Stenberg
2017-01-28RELEASE-NOTES; synced with ab08d82648Daniel Stenberg
2017-01-20RELEASE-NOTES: synced with 01ab7c30bba6fDaniel Stenberg
2017-01-16bump: next release will be 7.53.0Daniel Stenberg
2017-01-13RELEASE-NOTES: synced with a7c73ae309cDaniel Stenberg
2017-01-09RELEASE-NOTES: synced with a41e8592d6b3e58Daniel Stenberg
2016-12-26RELEASE-NOTES: synced with a7b38c9dc98481eDaniel Stenberg
2016-12-23bump: toward next releaseDaniel Stenberg
2016-12-22RELEASE-NOTES: curl 7.52.1Daniel Stenberg
2016-12-21bump: toward next releaseDaniel Stenberg
2016-12-20RELEASE-NOTES: 7.52.0Daniel Stenberg
2016-12-18RELEASE-NOTES: synced with 4517158abfebaDaniel Stenberg
2016-12-08RELEASE-NOTES: synced with 71a55534fa6Daniel Stenberg
2016-11-28RELEASE-NOTES: synced with 19613fb3Daniel Stenberg
2016-11-25RELEASE-NOTES: update option countersDaniel Stenberg
2016-11-25RELEASE-NOTES: synced with 63198a4750aebDaniel Stenberg
2016-11-12RELEASE-NOTES: synced with 346340808cDaniel Stenberg
2016-11-09RELEASE-NOTES: synced with dfcdaaba371e9a3Daniel Stenberg
2016-11-07curl: introduce the --tlsv1.3 option to force TLS 1.3Kamil Dudka
Fully implemented with the NSS backend only for now. Reviewed-by: Ray Satiro
2016-11-07vtls: support TLS 1.3 via CURL_SSLVERSION_TLSv1_3Kamil Dudka
Fully implemented with the NSS backend only for now. Reviewed-by: Ray Satiro
2016-11-07nss: map CURL_SSLVERSION_DEFAULT to NSS defaultKamil Dudka
... but make sure we use at least TLSv1.0 according to libcurl API Reported-by: Cure53 Reviewed-by: Ray Satiro
2016-11-03bump: start working on 7.51.1Daniel Stenberg
2016-11-02RELEASE-NOTES: 7.51.0Daniel Stenberg
2016-10-31RELEASE-NOTES: synced with d14538d2501ef0daDaniel Stenberg
2016-10-25nss: fix tight loop in non-blocking TLS handhsake over proxyMartin Frodl
... in case the handshake completes before entering CURLM_STATE_PROTOCONNECT Bug: https://bugzilla.redhat.com/1388162
2016-10-24RELEASE-NOTES: synced with 50ee3aaf1a9b22dDaniel Stenberg
2016-10-18RELEASE-NOTES: synced with f36f8c14551efc6772Daniel Stenberg
2016-10-16RELEASE-NOTES: synced with a1a5cd04877fd6fdDaniel Stenberg
2016-10-10RELEASE-NOTES: spellfixDaniel Stenberg
2016-10-10RELEASE-NOTES: synced with 82720490628cb53aDaniel Stenberg
5 more fixes, 2 more contributors
2016-10-04RELEASE-NOTES: synced with 8fd2a754f0deDaniel Stenberg
2016-09-22nss: add chacha20-poly1305 cipher suites if supported by NSSKamil Dudka
2016-09-19RELEASE-NOTES: synced with 79607eec51055Daniel Stenberg
2016-09-14RELEASE-NOTES: reset and go toward 7.51.0 (again)Daniel Stenberg