- 10 Sep, 2013 4 commits
-
-
Jiri Hruska authored
Don't wait for the next callback call (usually 1 second) before continuing with protocol specific connection initialization.
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
-
- 09 Sep, 2013 1 commit
-
-
Kamil Dudka authored
Otherwise, the FTP protocol would unnecessarily hang 60 seconds if aborted in the CURLOPT_HEADERFUNCTION callback. Reported by: Tomas Mlcoch Bug: https://bugzilla.redhat.com/1005686
-
- 04 Sep, 2013 1 commit
-
-
Daniel Stenberg authored
-
- 31 Aug, 2013 1 commit
-
-
Steve Holme authored
-
- 28 Aug, 2013 1 commit
-
-
Daniel Stenberg authored
-
- 26 Aug, 2013 1 commit
-
-
Steve Holme authored
-
- 25 Aug, 2013 1 commit
-
-
Daniel Stenberg authored
We've announced this pending removal for a long time and we've repeatedly asked if anyone would care or if anyone objects. Nobody has objected. It has probably not even been working for a good while since nobody has tested/used this code recently. The stuff in krb4.h that was generic enough to be used by other sources is now present in security.h
-
- 23 Aug, 2013 1 commit
-
-
Daniel Stenberg authored
-
- 12 Aug, 2013 1 commit
-
-
Daniel Stenberg authored
Start working on the next version and up some counters.
-
- 08 Aug, 2013 1 commit
-
-
Daniel Stenberg authored
-
- 29 Jul, 2013 1 commit
-
-
Daniel Stenberg authored
-
- 19 Jul, 2013 1 commit
-
-
Daniel Stenberg authored
-
- 30 Jun, 2013 1 commit
-
-
Kamil Dudka authored
This commit fixes a regression introduced in fddb7b44. Reported by: Markus Moeller Bug: http://curl.haxx.se/mail/archive-2013-06/0052.html
-
- 25 Jun, 2013 1 commit
-
-
Daniel Stenberg authored
The 10 first bug fixes for the pending release...
-
- 22 Jun, 2013 2 commits
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- 20 Jun, 2013 1 commit
-
-
Daniel Stenberg authored
-
- 13 Jun, 2013 1 commit
-
-
Daniel Stenberg authored
Mention 7 recent bug fixes and their associated contributors
-
- 07 Jun, 2013 1 commit
-
-
Daniel Stenberg authored
Added 11 bugs and 7 contributors
-
- 12 May, 2013 1 commit
-
-
Daniel Stenberg authored
-
- 06 May, 2013 1 commit
-
-
Jared Jennings authored
-
- 04 May, 2013 1 commit
-
-
Steve Holme authored
-
- 29 Apr, 2013 1 commit
-
-
Steve Holme authored
The curl command line utility would display the the completed progress bar with a percentage of zero as the progress routines didn't know the size of the transfer.
-
- 28 Apr, 2013 1 commit
-
-
Nick Zitzmann authored
Users using the Secure Transport (darwinssl) back-end can now use a certificate and private key to authenticate with a site using TLS. Because Apple's security system is based around the keychain and does not have any non-public function to create a SecIdentityRef data structure from data loaded outside of the Keychain, the certificate and private key have to be loaded into the Keychain first (using the certtool command line tool or the Security framework's C API) before we can find it and use it.
-
- 27 Apr, 2013 2 commits
-
-
Daniel Stenberg authored
Since we're adding new stuff, the next release will bump the minor version and we're looking forward to 7.31.0
-
Steve Holme authored
-
- 26 Apr, 2013 1 commit
-
-
Zdenek Pavlas authored
... in order to prevent an artificial timeout event based on stale speed-check data from a previous network transfer. This commit fixes a regression caused by 9dd85bce. Bug: https://bugzilla.redhat.com/906031
-
- 24 Apr, 2013 1 commit
-
-
Steve Holme authored
-
- 20 Apr, 2013 1 commit
-
-
Steve Holme authored
-
- 13 Apr, 2013 2 commits
-
-
Steve Holme authored
-
Steve Holme authored
-
- 12 Apr, 2013 1 commit
-
-
Daniel Stenberg authored
-
- 11 Apr, 2013 1 commit
-
-
Daniel Stenberg authored
Most notable the security advisory: http://curl.haxx.se/docs/adv_20130412.html
-
- 09 Apr, 2013 1 commit
-
-
Daniel Stenberg authored
added "tcpkeepalive on Mac OS X"
-
- 08 Apr, 2013 3 commits
-
-
Nick Zitzmann authored
I noticed that aria2's SecureTransport code disables insecure ciphers such as NULL, anonymous, IDEA, and weak-key ciphers used by SSLv3 and later. That's a good idea, and now we do the same thing in order to prevent curl from accessing a "secure" site that only negotiates insecure ciphersuites.
-
Steve Holme authored
-
Steve Holme authored
-