- Nov 15, 2015
-
-
Steve Holme authored
-
Steve Holme authored
As POP3 final and continuation responses both begin with a + character, and both the finalcode and contcode variables in SASLprotoc are set as such, we cannot tell the difference between them when we are expecting an optional continuation from the server such as the following: + something else from the server +OK final response Disabled these tests until such a time we can tell the responses apart.
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
According to RFC7628 a failure message may be sent by the server in a base64 encoded JSON string as a continuation response. Currently only implemented for OAUTHBEARER and not XAUTH2.
-
Daniel Stenberg authored
-
- Nov 14, 2015
-
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
OAUTHBEARER is now the official "registered" SASL mechanism name for OAuth 2.0. However, we don't want to drop support for XOAUTH2 as some servers won't support the new mechanism yet.
-
- Nov 13, 2015
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
CURLOPT_RESOLVE and CURLOPT_PROXYHEADER were missing Also sorted the list.
-
Daniel Stenberg authored
... and sorted curl_is_cb_data_option alphabetically
-
Sebastian Pohlschmidt authored
Curl_ossl_init calls OPENSSL_load_builtin_modules() but Curl_ossl_cleanup doesn't make a call to free these modules. Bug: https://github.com/bagder/curl/issues/526
-
Steve Holme authored
...following commit aba281e7 to fix test 1119.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Also sorted that list alphabetically
-
Daniel Stenberg authored
As an alias for OBJECTPOINT. Provided to allow us to grep for all string options easier.
-
Daniel Stenberg authored
They tend to never get updated anyway so they're frequently inaccurate and we never go back to revisit them anyway. We document issues to work on properly in KNOWN_BUGS and TODO instead.
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Simplify by removing #ifdefs and macros
-
Daniel Stenberg authored
-
Daniel Stenberg authored
We only support >= 0.9.7
-
Daniel Stenberg authored
-
- Nov 12, 2015
-
-
Dan Fandrich authored
The hashes can vary between architectures (e.g. Sparc differs from x86_64). This is not a fatal problem but just reduces the coverage of these white-box tests, as the assumptions about into which hash bucket each key falls are no longer valid.
-
Dan Fandrich authored
-
Dan Fandrich authored
-
Steve Holme authored
Following the fix in commit d6d58dd5 it is necessary to re-introduce XOAUTH2 in the default enabled authentication mechanism, which was removed in commit 7b2012f2, otherwise users will have to specify AUTH=XOAUTH2 in the URL. Note: OAuth 2.0 will only be used when the bearer is specified.
-
Stefan Bühler authored
-
Stefan Bühler authored
Closes #525
-
Steve Holme authored
-
Steve Holme authored
Regression from commit 9e8ced98 which meant if --oauth2-bearer was specified but the SASL mechanism wasn't supported by the server then the mechanism would be chosen.
-
Daniel Stenberg authored
- no point in repeating curl features that is already listed as features from the curl -V output - remove the port numbers/unix domain path from the output unless verbose is used, as that is rarely interesting to users.
-
Daniel Stenberg authored
-
- Nov 11, 2015
-
-
Steve Holme authored
Added support to the OAuth 2.0 message function for host and port, in order to accommodate the official OAUTHBEARER SASL mechanism which is to be added shortly.
-
Steve Holme authored
-
Steve Holme authored
In addition to commit a215381c added the RTSP, RTMP and SMB protocols.
-
- Nov 10, 2015
-
-
Douglas Creager authored
The curl_config.h file can be generated either from curl_config.h.cmake or curl_config.h.in, depending on whether you're building using CMake or the autotools. The CMake template header doesn't include entries for all of the protocols that you can disable, which (I think) means that you can't actually disable those protocols when building via CMake. Closes #523
-
Douglas Creager authored
BoringSSL implements `BIO_get_mem_data` as a function, instead of a macro, and expects the output pointer to be a `char **`. We have to add an explicit cast to grab the pointer as a `const char **`. Closes #524
-
Daniel Stenberg authored
We need 1.0.0 or later. Also verified by configure.
-