aboutsummaryrefslogtreecommitdiff
path: root/docs/libcurl
AgeCommit message (Collapse)Author
2016-04-17news: CURLOPT_CONNECT_TO and --connect-toMichael Kaufmann
Makes curl connect to the given host+port instead of the host+port found in the URL.
2016-04-11http2: Add handling stream level errorTatsuhiro Tsujikawa
Previously, when a stream was closed with other than NGHTTP2_NO_ERROR by RST_STREAM, underlying TCP connection was dropped. This is undesirable since there may be other streams multiplexed and they are very much fine. This change introduce new error code CURLE_HTTP2_STREAM, which indicates stream error that only affects the relevant stream, and connection should be kept open. The existing CURLE_HTTP2 means connection error in general. Ref: https://github.com/curl/curl/issues/659 Ref: https://github.com/curl/curl/pull/663
2016-04-09CURLOPT_SOCKS5_GSSAPI_SERVICE: Merged with CURLOPT_PROXY_SERVICE_NAMESteve Holme
As these two options provide identical functionality, the former for SOCK5 proxies and the latter for HTTP proxies, merged the two options together. As such CURLOPT_SOCKS5_GSSAPI_SERVICE is marked as deprecated as of 7.49.0.
2016-04-08docs: Added clarification following commit 9d89a0387Steve Holme
2016-04-08ftp/imap/pop3/smtp: Allow the service name to be overriddenSteve Holme
Allow the service name to be overridden for DIGIST-MD5 and Kerberos 5 authentication in FTP, IMAP, POP3 and SMTP.
2016-04-06URLs: change http to https in many placesViktor Szakats
Closes #754
2016-04-03code: style updatesDaniel Stenberg
2016-04-02test1119: Fixed missing CURL_DID_MEMORY_FUNC_TYPEDEFS symbolSteve Holme
2016-04-01curl/mprintf.h: remove support for _MPRINTF_REPLACEDaniel Stenberg
The define is not in our name space and is therefore not protected by our API promises. It was only really used by libcurl internals but was mostly erased from there already in 8aabbf5 (March 2015). This is supposedly the final death blow to that define from everywhere. As a side-effect, making sure _MPRINTF_REPLACE is gone and not used, I made the lib tests in tests/libtest/ use curl_printf.h for its redefine magic and then subsequently the use of sprintf() got banned in the tests as well (as it is in libcurl internals) and I then replaced them all with snprintf(). In the unlikely event that any users is actually using this define and gets sad by this change, it is very easily copied to the user's own code.
2016-03-31http2: more documentation for prior knowledgeDaniel Stenberg
2016-03-31http2: support "prior knowledge", no upgrade from HTTP/1.1Diego Bes
Supports HTTP/2 over clear TCP - Optimize switching to HTTP/2 by removing calls to init and setup before switching. Switching will eventually call setup and setup calls init. - Supports new version to “force” the use of HTTP/2 over clean TCP - Add common line parameter “--http2-prior-knowledge” to the Curl command line tool.
2016-03-29build: use roffit 0.11 featureDaniel Stenberg
... load file specified as argument.
2016-03-27CURLMOPT_SOCKETFUNCTION.3: describe the 'what' argumentDaniel Stenberg
2016-03-27curl_multi_socket_action.3: mark the options properlyDaniel Stenberg
... to make them appear as links on the html version.
2016-03-27docs: curlinfo_filetime sftp support, new curlopt_quote "statvfs"marquis-de-muesli
Closes #677
2016-03-23CURLINFO_TLS_SSL_PTR.3: Warn about limitationsJay Satiro
Bug: https://github.com/curl/curl/issues/685
2016-03-22libcurl-thread.3: minor nroff format fixDaniel Stenberg
2016-03-22CURLINFO_TLS_SSL_PTR.3: minor nroff format fixDaniel Stenberg
2016-03-15CURLOPT_SSLENGINE.3: Only for OpenSSL built with engine supportJay Satiro
Bug: https://curl.haxx.se/mail/lib-2016-03/0150.html Reported-by: Oliver Graute
2016-03-09curl_multi_wait.3: add exampleDaniel Stenberg
2016-03-08opt-docs: fix heading macrosJay Satiro
..SH should be .SH Bug: https://github.com/curl/curl/issues/705 Reported-by: Eric S. Raymond
2016-03-06CURLOPT_ACCEPTTIMEOUT_MS.3: added exampleDaniel Stenberg
2016-03-06CURLOPT_ACCEPT_ENCODING.3: added exampleDaniel Stenberg
2016-03-06CURLOPT_APPEND.3: added exampleDaniel Stenberg
2016-03-06CURLOPT_NOPROGRESS.3: added example, conform to stardard styleDaniel Stenberg
2016-03-06opts: added two examplesDaniel Stenberg
2016-03-06CURLOPT_SSL_CTX_FUNCTION.3: use .NF for exampleDaniel Stenberg
2016-03-06CURLOPT_SSL_CTX_FUNCTION.3: added exampleDaniel Stenberg
and removed erroneous reference to test case lib509
2016-02-27getinfo: Add support for mbedTLS TLS session infoJay Satiro
.. and preprocessor check TLS session info is defined for all backends.
2016-02-23getinfo: CURLINFO_TLS_SSL_PTR supersedes CURLINFO_TLS_SESSIONJay Satiro
The two options are almost the same, except in the case of OpenSSL: CURLINFO_TLS_SESSION OpenSSL session internals is SSL_CTX *. CURLINFO_TLS_SSL_PTR OpenSSL session internals is SSL *. For backwards compatibility we couldn't modify CURLINFO_TLS_SESSION to return an SSL pointer for OpenSSL. Also, add support for the 'internals' member to point to SSL object for the other backends axTLS, PolarSSL, Secure Channel, Secure Transport and wolfSSL. Bug: https://github.com/curl/curl/issues/234 Reported-by: dkjjr89@users.noreply.github.com Bug: https://curl.haxx.se/mail/lib-2015-09/0127.html Reported-by: Michael König
2016-02-23TFTP: add option to suppress TFTP option requests (Part 2)Jay Satiro
- Add tests. - Add an example to CURLOPT_TFTP_NO_OPTIONS.3. - Add --tftp-no-options to expose CURLOPT_TFTP_NO_OPTIONS. Bug: https://github.com/curl/curl/issues/481
2016-02-23TFTP: add option to suppress TFTP option requests (Part 1)Michael Koenig
Some TFTP server implementations ignore the "TFTP Option extension" (RFC 1782-1784, 2347-2349), or implement it in a flawed way, causing problems with libcurl. Another switch for curl_easy_setopt "CURLOPT_TFTP_NO_OPTIONS" is introduced which prevents libcurl from sending TFTP option requests to a server, avoiding many problems caused by faulty implementations. Bug: https://github.com/curl/curl/issues/481
2016-02-20CURLOPT_DEBUGFUNCTION.3: Fix exampleJay Satiro
2016-02-18CURLOPT_COOKIEFILE.3: HTTP headers must be Set-Cookie styleJay Satiro
Bug: https://github.com/curl/curl/issues/666 Reported-by: baumanj@users.noreply.github.com
2016-02-18opts: add referencesDaniel Stenberg
2016-02-14CURLOPT_CONNECTTIMEOUT_MS.3: Fix example to use milliseconds optionClint Clayton
Change the example in the docs for CURLOPT_CONNECTTIMEOUT_MS to use CURLOPT_CONNECTTIMEOUT_MS instead of CURLOPT_CONNECTTIMEOUT. Closes #653
2016-02-14opt-docs: add more referencesDaniel Stenberg
2016-02-09opts: update references to renamed optionsTimotej Lazar
2016-02-04URLs: change more http to httpsViktor Szakats
2016-02-02URLs: change more http to httpsViktor Szakats
2016-02-03URLs: change all http:// URLs to https://Daniel Stenberg
2016-02-02HTTPS: update a bunch of URLs from HTTP to HTTPSDaniel Stenberg
2016-01-24curl_multi_socket_action.3: line wrapDaniel Stenberg
2016-01-16CURLINFO_RESPONSE_CODE.3: add exampleDaniel Schauenberg
2016-01-15ssh: make CURLOPT_SSH_PUBLIC_KEYFILE treat "" as NULLKamil Dudka
The CURLOPT_SSH_PUBLIC_KEYFILE option has been documented to handle empty strings specially since curl-7_25_0-31-g05a443a but the behavior was unintentionally removed in curl-7_38_0-47-gfa7d04f. This commit restores the original behavior and clarifies it in the documentation that NULL and "" have both the same meaning when passed to CURLOPT_SSH_PUBLIC_KEYFILE. Bug: http://curl.haxx.se/mail/lib-2016-01/0072.html
2016-01-13CURLOPT_RESOLVE.3: minor language polishDaniel Stenberg
2016-01-10mbedtls: implement CURLOPT_PINNEDPUBLICKEYThomas Glanzmann
2016-01-04curl_global_init.3: Add Windows-specific info for init via DLLJay Satiro
- Add to both curl_global_init.3 and libcurl.3 the caveat for Windows that initializing libcurl via a DLL's DllMain or static initializer could cause a deadlock. Bug: https://github.com/bagder/curl/issues/586 Reported-by: marc-groundctl@users.noreply.github.com
2015-12-24CURLOPT_RANGE: for HTTP servers, range support is optionalDaniel Stenberg
2015-12-13http: add libcurl option to allow HTTP/2 for HTTPS onlyDaniel Stenberg
... and stick to 1.1 for HTTP. This is in line with what browsers do and should have very little risk.