Svyatoslav Mishyn
d36d83ba4b
CURLINFO_CONTENT_LENGTH_UPLOAD.3: replace "receive" with "get" for consistency
2015-09-05 23:19:33 +02:00
Svyatoslav Mishyn
5dc556031b
CURLINFO_REDIRECT_TIME.3: remove redundant '!'
2015-09-05 23:19:33 +02:00
Kamil Dudka
0e91737615
Revert "has: generate the curl/has.h header"
...
This reverts commit a60bde79f9
I have
pushed by mistake. Apologies for my incompetent use of the git repo!
2015-09-04 16:12:26 +02:00
Kamil Dudka
7380433d6a
nss: do not directly access SSL_ImplementedCiphers[]
...
It causes dynamic linking issues at run-time after an update of NSS.
Bug: https://lists.fedoraproject.org/pipermail/devel/2015-September/214117.html
2015-09-04 14:35:36 +02:00
Daniel Stenberg
a60bde79f9
has: generate the curl/has.h header
...
changed macro name, moved and renamed script to become docs/libcurl/has.pl,
generate code that is checksrc compliant
2015-09-04 10:41:43 +02:00
Daniel Stenberg
82db076d9f
gitignore: ignore more generated VC Makefiles
2015-09-03 23:35:41 +02:00
Daniel Stenberg
25a2e8ebaf
projects/Windows/.gitignore: ignore generated files for release
2015-09-03 23:34:53 +02:00
Daniel Stenberg
1869164293
http2: don't pass on Connection: headers
...
RFC 7540 section 8.1.2.2 states: "An endpoint MUST NOT generate an
HTTP/2 message containing connection-specific header fields; any message
containing connection-specific header fields MUST be treated as
malformed"
Closes #401
2015-09-03 22:23:50 +02:00
Daniel Stenberg
4ceddcf8ca
curl.1: update RFC references
2015-09-03 19:52:23 +02:00
Daniel Stenberg
e1a4bab86a
CURLOPT_POSTREDIR.3: update RFC number and section
2015-09-03 17:33:16 +02:00
Daniel Stenberg
8a0ff1e529
CURLOPT_FOLLOWLOCATION.3: mention methods for redirects
...
and some general cleaning up
2015-09-03 17:27:40 +02:00
Marcel Raad
668231c309
inet_pton.c: Fix MSVC run-time check failure (2)
...
This fixes another run-time check failure because of a narrowing cast on
Visual C++.
Closes #408
2015-09-03 11:37:50 +02:00
Jay Satiro
cb6a07fed0
docs: Warn about any-domain cookies and multiple transfers
...
- Warn that cookies without a domain are sent to any domain:
CURLOPT_COOKIELIST, CURLOPT_COOKIEFILE, --cookie
- Note that imported Set-Cookie cookies without a domain are no longer
exported:
CURLINFO_COOKIELIST, CURLOPT_COOKIEJAR, --cookie-jar
2015-09-03 02:35:11 -04:00
Steve Holme
b604b7f040
tool_sdecls.h: Fixed compilation warning from commit 4a889441d3
...
tool_sdecls.h:139 warning: comma at end of enumerator list
2015-09-02 06:52:12 +01:00
Daniel Stenberg
9bb198026e
opts: 8 more CURLINFO* options as stand-alone man pages
2015-09-02 00:00:53 +02:00
Daniel Stenberg
749c0ca05b
RELEASE-NOTES: synced with c764cb4add
2015-08-31 23:17:53 +02:00
Daniel Stenberg
c764cb4add
man-pages: more SEE ALSO links
2015-08-31 16:03:53 +02:00
Daniel Stenberg
6099f5fcac
opts: more CURLINFO_* options as stand-alone man pages
2015-08-31 15:28:21 +02:00
Steve Holme
4963948089
sasl: Only define Curl_sasl_digest_get_pair() when CRYPTO_AUTH enabled
...
Introduced in commit 59f3f92ba6
this function is only implemented when
CURL_DISABLE_CRYPTO_AUTH is not defined. As such we shouldn't define
the function in the header file either.
2015-08-31 12:44:01 +01:00
Steve Holme
b850437991
sasl: Updated SPN variables and comments for consistency
...
In places the "host name" and "realm" variable was referred to as
"instance" whilst in others it was referred to as "host".
2015-08-31 12:43:58 +01:00
Daniel Stenberg
eb8283bb1a
configure: check for HMAC_Update in openssl
...
Turns out HMAC_Init is now deprecated in openssl master (and I spelled
HMAC_Init_ex wrong in previous commit)
2015-08-30 23:21:30 +02:00
Steve Holme
415f0370ea
win32: Use DES_set_odd_parity() from OpenSSL/BoringSSL by default
...
Set HAVE_DES_SET_ODD_PARITY when using OpenSSL/BoringSSL as native
Windows builds don't use the autoconf tools.
2015-08-30 22:06:10 +01:00
Steve Holme
347a6ee597
des: Fixed compilation warning from commit 613e5022fe
...
curl_ntlm_core.c:150: warning 'Curl_des_set_odd_parity' undefined;
assuming extern returning int
2015-08-30 21:45:30 +01:00
Steve Holme
2a59fb25cc
buildconf.bat: Fixed double blank line in 'curl manual' warning output
2015-08-30 15:09:43 +01:00
Steve Holme
fb0825cb0a
makefiles: Added our standard copyright header
...
But kept the original author, when they were specified in a comment, as
the initial copyright holder.
2015-08-30 14:51:13 +01:00
Jay Satiro
dfeb85a187
CURLOPT_FILETIME.3: CURLINFO_FILETIME has its own manpage now
2015-08-29 23:23:58 -04:00
Daniel Stenberg
96a3488eae
CURLINFO_RESPONSE_CODE.3: added short description
2015-08-29 13:55:00 +02:00
Daniel Stenberg
45e918564a
opts: 7 initial CURLINFO_* options as stand-alone man pages
2015-08-28 22:58:00 +02:00
Nikolai Kondrashov
1abb218fe0
libcurl.m4: Put braces around empty if body
...
Put braces around empty "if" body in libcurl.m4 check to avoid warning:
suggest braces around empty body in an 'if' statement
and make it work with -Werror builds.
Closes #402
2015-08-28 22:51:55 +02:00
Svyatoslav Mishyn
ac7be02e69
curl_easy_escape.3: escape '\n'
...
Closes #398
2015-08-25 22:44:22 +02:00
Svyatoslav Mishyn
37f173cfd0
curl_easy_{escape,setopt}.3: fix example
...
remove redundant '}'
2015-08-25 22:44:14 +02:00
Sergei Nikulov
2132708ac2
cmake: added Windows SSL support
...
Closes #399
2015-08-25 22:42:28 +02:00
Daniel Stenberg
4a889441d3
curl: point out the conflicting HTTP methods if used
...
It isn't always clear to the user which options that cause the HTTP
methods to conflict so by spelling them out it should hopefully be
easier to understand why curl complains.
2015-08-25 09:20:56 +02:00
Daniel Stenberg
ce034356d2
curl: clarify that users can only specify one _METHOD_
2015-08-25 00:04:03 +02:00
Svyatoslav Mishyn
f21408132a
curl_easy_{escape,unescape}.3: "char *" vs. "const char *"
...
Closes #395
2015-08-24 23:58:57 +02:00
Patrick Monnerat
aec249f89f
os400: include new options in wrappers and update ILE/RPG binding.
2015-08-24 14:20:34 +02:00
Daniel Stenberg
e7d171da6b
KNOWN_BUGS: #2 , not reading a HEAD response-body is not a bug
...
... since HTTP is forbidden to return any such.
2015-08-24 12:56:20 +02:00
Daniel Stenberg
874413b3e1
KNOWN_BUGS: #78 zero-length files is already fixed!
2015-08-24 12:53:38 +02:00
Razvan Cojocaru
62f306ff34
getinfo: added CURLINFO_ACTIVESOCKET
...
This patch addresses known bug #76 , where on 64-bit Windows SOCKET is 64
bits wide, but long is only 32, making CURLINFO_LASTSOCKET unreliable.
Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
2015-08-24 12:34:17 +02:00
Daniel Stenberg
36f6f6f4f2
http2: remove dead code
...
Leftovers from when we removed the private socket hash.
Coverity CID 1317365, "Logically dead code"
2015-08-24 11:31:45 +02:00
Daniel Stenberg
a78534794e
ntlm: mark deliberate switch case fall-through
...
Coverity CID 1317367, "Missing break in switch"
2015-08-24 11:29:22 +02:00
Daniel Stenberg
110d99c661
http2: on_frame_recv: get a proper 'conn' for the debug logging
...
"Explicit null dereferenced (FORWARD_NULL)"
Coverity CID 1317366
2015-08-24 11:26:30 +02:00
Daniel Stenberg
6d91b70d8b
RELEASE-NOTES: synced with 2acaf3c804
2015-08-24 00:21:08 +02:00
Dan Fandrich
2acaf3c804
tool: fix memory leak with --proto-default option
2015-08-23 20:57:17 +02:00
Nathaniel Waisbrot
9756d1da76
CURLOPT_DEFAULT_PROTOCOL: added
...
- Add new option CURLOPT_DEFAULT_PROTOCOL to allow specifying a default
protocol for schemeless URLs.
- Add new tool option --proto-default to expose
CURLOPT_DEFAULT_PROTOCOL.
In the case of schemeless URLs libcurl will behave in this way:
When the option is used libcurl will use the supplied default.
When the option is not used, libcurl will follow its usual plan of
guessing from the hostname and falling back to 'http'.
2015-08-22 21:57:14 -04:00
Jay Satiro
22cb631198
runtests: Allow for spaces in server-verify curl custom path
2015-08-22 21:19:34 -04:00
Daniel Stenberg
613e5022fe
NTLM: recent boringssl brought DES_set_odd_parity back
...
... so improve the #ifdefs for using our local implementation.
2015-08-22 23:59:18 +02:00
Daniel Stenberg
2c12ac8de2
configure: detect latest boringssl
...
Since boringssl brought back DES_set_odd_parity again, it cannot be used
to differentiate from boringssl. Using the OPENSSL_IS_BORINGSSL define
seems better anyway.
URL: f551028d5c
%5E!/
Original-patch-by: Bertrand Simonnet
Closes #393
2015-08-22 00:08:03 +02:00
Daniel Stenberg
30aa38c818
configure: change functions to detect openssl (clones)
...
... since boringssl moved the former ones and the check started to fail.
URL: f551028d5c
%5E!/
Original-patch-by: Bertrand Simonnet
2015-08-22 00:03:56 +02:00
Alessandro Ghedini
8363656cb4
openssl: handle lack of server cert when strict checking disabled
...
If strict certificate checking is disabled (CURLOPT_SSL_VERIFYPEER
and CURLOPT_SSL_VERIFYHOST are disabled) do not fail if the server
doesn't present a certificate at all.
Closes #392
2015-08-21 15:32:51 +02:00