aboutsummaryrefslogtreecommitdiff
path: root/docs
AgeCommit message (Collapse)Author
2015-09-03docs: Warn about any-domain cookies and multiple transfersJay Satiro
- Warn that cookies without a domain are sent to any domain: CURLOPT_COOKIELIST, CURLOPT_COOKIEFILE, --cookie - Note that imported Set-Cookie cookies without a domain are no longer exported: CURLINFO_COOKIELIST, CURLOPT_COOKIEJAR, --cookie-jar
2015-09-02opts: 8 more CURLINFO* options as stand-alone man pagesDaniel Stenberg
2015-08-31man-pages: more SEE ALSO linksDaniel Stenberg
2015-08-31opts: more CURLINFO_* options as stand-alone man pagesDaniel Stenberg
2015-08-29CURLOPT_FILETIME.3: CURLINFO_FILETIME has its own manpage nowJay Satiro
2015-08-29CURLINFO_RESPONSE_CODE.3: added short descriptionDaniel Stenberg
2015-08-28opts: 7 initial CURLINFO_* options as stand-alone man pagesDaniel Stenberg
2015-08-28libcurl.m4: Put braces around empty if bodyNikolai Kondrashov
Put braces around empty "if" body in libcurl.m4 check to avoid warning: suggest braces around empty body in an 'if' statement and make it work with -Werror builds. Closes #402
2015-08-25curl_easy_escape.3: escape '\n'Svyatoslav Mishyn
Closes #398
2015-08-25curl_easy_{escape,setopt}.3: fix exampleSvyatoslav Mishyn
remove redundant '}'
2015-08-24curl_easy_{escape,unescape}.3: "char *" vs. "const char *"Svyatoslav Mishyn
Closes #395
2015-08-24KNOWN_BUGS: #2, not reading a HEAD response-body is not a bugDaniel Stenberg
... since HTTP is forbidden to return any such.
2015-08-24KNOWN_BUGS: #78 zero-length files is already fixed!Daniel Stenberg
2015-08-24getinfo: added CURLINFO_ACTIVESOCKETRazvan Cojocaru
This patch addresses known bug #76, where on 64-bit Windows SOCKET is 64 bits wide, but long is only 32, making CURLINFO_LASTSOCKET unreliable. Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
2015-08-22CURLOPT_DEFAULT_PROTOCOL: addedNathaniel Waisbrot
- Add new option CURLOPT_DEFAULT_PROTOCOL to allow specifying a default protocol for schemeless URLs. - Add new tool option --proto-default to expose CURLOPT_DEFAULT_PROTOCOL. In the case of schemeless URLs libcurl will behave in this way: When the option is used libcurl will use the supplied default. When the option is not used, libcurl will follow its usual plan of guessing from the hostname and falling back to 'http'.
2015-08-19CURLMOPT_PUSHFUNCTION.3: fix argument typesSam Roth
Closes #389 Closes #386
2015-08-18docs: Update the redirect protocols disabled by defaultJay Satiro
- Clarify that FILE and SCP are disabled by default since 7.19.4 - Add that SMB and SMBS are disabled by default since 7.40.0 - Add CURLPROTO_SMBS to the list of protocols
2015-08-15curl_easy_getinfo.3: fix superfluous spaceDaniel Stenberg
... and changed "oriented" to "related" Closes #378
2015-08-15CURLOPT_HTTP_VERSION.3: connection re-use goes before versionDaniel Stenberg
2015-08-15curl.1: Document weaknesses in SSLv2 and SSLv3Daniel Kahn Gillmor
Acknowledge that SSLv3 is also widely considered to be insecure. Also, provide references for people who want to know more about why it's insecure.
2015-08-13curl_global_init_mem.3: Stronger thread safety warningJay Satiro
Bug: http://curl.haxx.se/mail/lib-2015-08/0016.html Reported-by: Eric Ridge
2015-08-12curl_multi_add_handle.3: fix a typoSvyatoslav Mishyn
"can not" => "cannot" closes #377
2015-08-12docs: fix typosAlessandro Ghedini
closes #376
2015-08-12THANKS: remove duplicate nameDaniel Stenberg
2015-08-12THANKS-filter: merge Todd's namesDaniel Stenberg
2015-08-12THANKS: 13 new contributors from the 7.44.0 RELEASE-NOTESDaniel Stenberg
2015-08-11curl_formget.3: correct return codeSvyatoslav Mishyn
Closes #375
2015-08-11libcurl-tutorial.3: fix formattingSvyatoslav Mishyn
Closes #374
2015-08-11curl_easy_recv.3: fix formattingSvyatoslav Mishyn
2015-08-10build: refer to fixed libidn versionsViktor Szakats
closes #371
2015-08-09CURLOPT_RESOLVE.3: Note removal support was added in 7.42Jay Satiro
Bug: http://curl.haxx.se/mail/lib-2015-08/0019.html Reported-by: Inca R
2015-08-06curl_multi_remove_handle.3: fix formattingjuef
closes #366
2015-08-05curl_slist_append.3: add error checking to the exampleDaniel Stenberg
2015-08-03libcurl.3: fix a single typoDaniel Stenberg
Closes #361
2015-08-02docs: formpost needs the full size at start of uploadDaniel Stenberg
Closes #360
2015-07-31libcurl-thread.3: minor reformattingDaniel Stenberg
2015-07-31curl_global_init_mem.3: Warn threaded resolver needs thread safe funcsJay Satiro
Bug: http://curl.haxx.se/mail/lib-2015-07/0149.html Reported-by: Eric Ridge
2015-07-31libcurl-thread.3: Warn memory functions must be thread safeJay Satiro
Bug: http://curl.haxx.se/mail/lib-2015-07/0149.html Reported-by: Eric Ridge
2015-07-30INSTALL: Minor formatting correction in 'Legacy Windows and SSL' sectionSteve Holme
...as well as some rewording.
2015-07-30ABI doc: use secure URLViktor Szakats
2015-07-30ABI: remove the ascii logoDaniel Stenberg
and made the indent level to 1
2015-07-30libcurl-multi.3: mention curl_multi_waitDaniel Stenberg
... and some general rewordings to improve this docs. Reported-by: Tim Stack Closes #356
2015-07-29libcurl-thread.3: Clarify CURLOPT_NOSIGNAL takes long value 1LJay Satiro
2015-07-28libcurl-thread.3: Revert to stricter handle wordingJay Satiro
.. also update formatting and add WinSSL and wolfSSL to the SSL/TLS handlers list.
2015-07-28libcurl-thread.3: Consolidate thread safety infoJay Satiro
This is a new document to consolidate our thread safety information from several documents (curl-www:features, libcurl.3, libcurl-tutorial.3). Each document's section on multi-threading will now point to this one.
2015-07-26TODO: improve how curl works in a windows console windowDaniel Stenberg
Closes #322 for now
2015-07-261.11 minimize dependencies with dynamicly loaded modulesDaniel Stenberg
Closes #349 for now
2015-07-18symbols-in-versions: Add new CURLSSLOPT_NO_REVOKE symbolJay Satiro
2015-07-17SSL: Add an option to disable certificate revocation checksJay Satiro
New tool option --ssl-no-revoke. New value CURLSSLOPT_NO_REVOKE for CURLOPT_SSL_OPTIONS. Currently this option applies only to WinSSL where we have automatic certificate revocation checking by default. According to the ssl-compared chart there are other backends that have automatic checking (NSS, wolfSSL and DarwinSSL) so we could possibly accommodate them at some later point. Bug: https://github.com/bagder/curl/issues/264 Reported-by: zenden2k <zenden2k@gmail.com>
2015-07-11examples: Fix typo in multi-single.cJay Satiro