aboutsummaryrefslogtreecommitdiff
path: root/docs
AgeCommit message (Collapse)Author
2018-07-28docs/examples: add hiperfifo example using linux epoll/timerfdJosh Bialkowski
Closes #2804
2018-07-26docs/INSTALL.md: minor formatting fixesDarío Hereñú
Closes #2794
2018-07-26docs/CURLOPT_URL: fix indentationChristopher Head
The statement, “The application does not have to keep the string around after setting this option,” appears to be indented under the RTMP paragraph. It actually applies to all protocols, not just RTMP. Eliminate the extra indentation. Closes #2788
2018-07-26docs/CURLOPT_WRITEFUNCTION: size is always 1Christopher Head
For compatibility with `fwrite`, the `CURLOPT_WRITEFUNCTION` callback is passed two `size_t` parameters which, when multiplied, designate the number of bytes of data passed in. In practice, CURL always sets the first parameter (`size`) to 1. This practice is also enshrined in documentation and cannot be changed in future. The documentation states that the default callback is `fwrite`, which means `fwrite` must be a suitable function for this purpose. However, the documentation also states that the callback must return the number of *bytes* it successfully handled, whereas ISO C `fwrite` returns the number of items (each of size `size`) which it wrote. The only way these numbers can be equal is if `size` is 1. Since `size` is 1 and can never be changed in future anyway, document that fact explicitly and let users rely on it. Closes #2787
2018-07-14darwinssl: add support for ALPN negotiationRodger Combs
2018-07-12docs/SECURITY-PROCESS: mention bounty, drop pre-notifyDaniel Stenberg
+ The hackerone bounty and its process - We don't and can't handle pre-notification
2018-07-11examples/crawler.c: move #ifdef to column 0Daniel Stenberg
Apparently the C => HTML converter on the web site doesn't quite like it otherwise. Reported-by: Jeroen Ooms
2018-07-11release: 7.61.0Daniel Stenberg
2018-07-10TODO: Configurable loading of OpenSSL configuration fileDaniel Stenberg
Closes #2724
2018-07-10post303.d: clarify that this is an RFC violationDaniel Stenberg
... and not the other way around, which this previously said. Reported-by: Vasiliy Faronov Fixes #2723 Closes #2726
2018-07-09examples: fix -Wformat warningsMarcel Raad
When size_t is not a typedef for unsigned long (as usually the case on Windows), GCC emits -Wformat warnings when using lu and lx format specifiers with size_t. Silence them with explicit casts to unsigned long. Closes https://github.com/curl/curl/pull/2721
2018-07-06KNOWN_BUGS: Stick to same family over SOCKS proxyDaniel Stenberg
2018-07-05KNOWN_BUGS: Borland support is dropped, AIX problem is too oldDaniel Stenberg
2018-07-05example/crawler.c: simple crawler based on libxml2Jeroen Ooms
Closes #2706
2018-07-02DEPRECATE: include year when specifying dateDaniel Stenberg
2018-07-02DEPRECATE: linkifiedDaniel Stenberg
2018-07-02DEPRECATE: mention the PR that disabled axTLSDaniel Stenberg
2018-07-02docs/DEPRECATE.md: spelling and minor formattingDaniel Stenberg
2018-07-02DEPRECATE: new doc describing planned item removalsDaniel Stenberg
Closes #2704
2018-06-30docs: fix missed option name markupsDaniel Stenberg
2018-06-29openssl: make the requested TLS version the *minimum* wantedDaniel Stenberg
The code treated the set version as the *exact* version to require in the TLS handshake, which is not what other TLS backends do and probably not what most people expect either. Reported-by: Andreas Olsson Assisted-by: Gaurav Malhotra Fixes #2691 Closes #2694
2018-06-29openssl: allow TLS 1.3 by defaultDaniel Stenberg
Reported-by: Andreas Olsson Fixes #2692 Closes #2693
2018-06-28CURLINFO_TLS_SSL_PTR.3: improve the exampleAdrian Peniak
The previous example was a little bit confusing, because SSL* structure (or other "in use" SSL connection pointer) is not accessible after the transfer is completed, therefore working with the raw TLS library specific pointer needs to be done during transfer. Closes #2690
2018-06-27GOVERNANCE: linkify, changed some titlesDaniel Stenberg
2018-06-27GOVERNANCE: add maintainer details/dutiesDaniel Stenberg
2018-06-24CURLOPT_SSL_VERIFYPEER.3: fix syntax mistakeDaniel Stenberg
Follow-up to b6a16afa0aa5
2018-06-23CURLOPT_SSL_VERIFYPEER.3: Add performance notePatrick Schlangen
Closes #2673
2018-06-18CURLOPT_INTERFACE.3: interface names not supported on WindowsDaniel Stenberg
2018-06-15docs/RELEASE-PROCEDURE.md: renamed to use .md extensionDaniel Stenberg
Closes #2663
2018-06-15RELEASE-PROCEDURE: gpg sign the tagsDaniel Stenberg
2018-06-15CURLOPT_HTTPAUTH.3: CURLAUTH_BEARER was added in 7.61.0Daniel Stenberg
2018-06-14GOVERNANCE.md: explains how this project is runDaniel Stenberg
Closes #2657
2018-06-14KNOWN_BUGS: NTLM doen't support password with § characterDaniel Stenberg
Closes #2120
2018-06-14KNOWN_BUGS: slow connect to localhost on WindowsDaniel Stenberg
Closes #2281
2018-06-13TODO: "Option to refuse usernames in URLs" doneDaniel Stenberg
Implemented by Björn in 946ce5b61f
2018-06-12schannel: support selecting ciphersRobert Prag
Given the contstraints of SChannel, I'm exposing these as the algorithms themselves instead; while replicating the ciphersuite as specified by OpenSSL would have been preferable, I found no way in the SChannel API to do so. To use this from the commandline, you need to pass the names of contants defining the desired algorithms. For example, curl --ciphers "CALG_SHA1:CALG_RSA_SIGN:CALG_RSA_KEYX:CALG_AES_128:CALG_DH_EPHEM" https://github.com The specific names come from wincrypt.h Closes #2630
2018-06-11RELEASE-PROCEDURE: update the release calendar for 2019Daniel Stenberg
2018-06-05cmdline-opts/cert-type.d: mention "p12" as a recognized type as wellDaniel Stenberg
2018-06-03spelling fixesViktor Szakats
Detected using the `codespell` tool (version 1.13.0). Also secure and fix an URL.
2018-06-02build: remove the Borland specific makefilesDaniel Stenberg
According to the user survey 2018, not even one out of 670 users use them. Nobody on the mailing list spoke up for them either. Closes #2629
2018-06-01CURLOPT_RESOLVE: always purge old entry firstAlibek.Jorajev
If there's an existing entry using the selected name. Closes #2622
2018-05-31KNOWN_BUGS: CURL_GLOBAL_SSLDaniel Stenberg
Closes #2276
2018-05-31option: disallow username in URLBjörn Stenberg
Adds CURLOPT_DISALLOW_USERNAME_IN_URL and --disallow-username-in-url. Makes libcurl reject URLs with a username in them. Closes #2340
2018-05-31libcurl-security.3: improved layout for two rememdy listsDaniel Stenberg
2018-05-31libcurl-security.3: refer to URL instead of in-source markdown fileDaniel Stenberg
2018-05-29setopt: add TLS 1.3 ciphersuitesDaniel Stenberg
Adds CURLOPT_TLS13_CIPHERS and CURLOPT_PROXY_TLS13_CIPHERS. curl: added --tls13-ciphers and --proxy-tls13-ciphers Fixes #2435 Reported-by: zzq1015 on github Closes #2607
2018-05-29INSTALL: LDFLAGS=-Wl,-R/usr/local/ssl/libDaniel Stenberg
... the older description doesn't work Reported-by: Peter Varga Fixes #2615 Closes #2616
2018-05-29KNOWN_BUGS: restore text regarding #2101.Will Dietz
This was added earlier but appears to have been removed accidentally. AFAICT this is very much still an issue. ----- I say "accidentally" because the text seems to have harmlessly snuck into [1] (which makes no mention of it). [1] was later reverted for unspecified reasons in [2], presumably because the mentioned issue was fixed or invalid. [1] de9fac00c40db321d44fa6fbab6eb62ec4c83998 [2] 16d1f369403cbb04bd7b085eabbeebf159473fc2 Closes #2618
2018-05-28psl: use latest psl and refresh it periodicallyPatrick Monnerat
The latest psl is cached in the multi or share handle. It is refreshed before use after 72 hours. New share lock CURL_LOCK_DATA_PSL controls the psl cache sharing. If the latest psl is not available, the builtin psl is used. Reported-by: Yaakov Selkowitz Fixes #2553 Closes #2601
2018-05-28cmdline-opts/gen.pl: warn if mutexes: or see-also: list non-existing optionsDaniel Stenberg