- Sep 20, 2015
-
-
Daniel Stenberg authored
Closes #334
-
Daniel Stenberg authored
-
- Aug 24, 2015
-
-
Daniel Stenberg authored
... since HTTP is forbidden to return any such.
-
Daniel Stenberg authored
-
Razvan Cojocaru authored
This patch addresses known bug #76, where on 64-bit Windows SOCKET is 64 bits wide, but long is only 32, making CURLINFO_LASTSOCKET unreliable. Signed-off-by:
Razvan Cojocaru <rcojocaru@bitdefender.com>
-
- Jun 16, 2015
-
-
Viktor Szakats authored
-
- Apr 15, 2015
-
-
Daniel Stenberg authored
-
- Mar 29, 2015
-
-
Daniel Stenberg authored
Disabling pipelining on multi handle with in-progress pipelined requests leads to heap corruption and crash
-
- Dec 26, 2014
-
-
Steve Holme authored
Use Unix when generically writing about Unix based systems as UNIX is the trademark and should only be used in a particular product's name.
-
- Dec 15, 2014
-
-
Daniel Stenberg authored
-
- Aug 22, 2014
-
-
Frank Meier authored
Problem: if CURLOPT_FORBID_REUSE is set, requests using NTLM failed since NTLM requires multiple requests that re-use the same connection for the authentication to work Solution: Ignore the forbid reuse flag in case the NTLM authentication handshake is in progress, according to the NTLM state flag. Fixed known bug #77.
-
- Aug 08, 2014
-
-
Michael Osipov authored
Reflect recent changes in SPNEGO and GSS-API code in the docs. Update them with appropriate namings and remove visible spots for GSS-Negotiate.
-
- Jun 04, 2014
-
-
Daniel Stenberg authored
-
- Jun 01, 2014
-
-
Daniel Stenberg authored
-
- Mar 31, 2014
-
-
Till Maas authored
-
- Mar 14, 2014
-
-
Dan Fandrich authored
-
- Jan 04, 2014
-
-
Marc Hoersken authored
-
- Dec 15, 2013
-
-
Daniel Stenberg authored
...also added as KNOWN_BUG #87 with reference to bug #1294
-
- Nov 27, 2013
-
-
Steve Holme authored
-
- Nov 05, 2013
-
-
Daniel Stenberg authored
added 85. Wrong STARTTRANSFER timer accounting for POST requests
-
- Oct 02, 2013
-
-
Daniel Stenberg authored
CURLINFO_SSL_VERIFYRESULT is only implemented for the OpenSSL and NSS backends and not for any other!
-
- Aug 25, 2013
-
-
Daniel Stenberg authored
The old numbers would still redirect but who knows for how long...
-
- Aug 08, 2013
-
-
John E. Malmberg authored
-
- Jun 22, 2013
-
-
Daniel Stenberg authored
-
- Jun 10, 2013
-
-
Daniel Stenberg authored
-
- May 21, 2013
-
-
Daniel Stenberg authored
Bug: http://curl.haxx.se/bug/view.cgi?id=1169
-
- Sep 13, 2012
-
-
Marc Hoersken authored
-
- Aug 31, 2012
-
-
Daniel Stenberg authored
The test would hang and get aborted with a "ABORTING TEST, since it seems that it would have run forever." until I prevented that from happening. I also fixed the data file which got broken CRLF line endings when I sucked down the path from Joe's repo == my fault. Removed #37 from KNOWN_BUGS as this fix and test case verifies exactly this.
-
- Jul 20, 2012
-
-
Dan Fandrich authored
-
- Jul 08, 2012
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Jul 07, 2012
-
-
Daniel Stenberg authored
Bug #75 updated with additional info, still remains for builds with other backends.
-
- Jan 18, 2012
-
- Jan 04, 2012
-
-
Daniel Stenberg authored
-
- Oct 20, 2011
-
-
Daniel Stenberg authored
Multiple auths in the same WWW-Authenticate header Fixed in commit 7d81e3f7193b8c
-
- Aug 15, 2010
-
-
Daniel Stenberg authored
Curl_expire() is now expanded to hold a list of timeouts for each easy handle. Only the closest in time will be the one used as the primary timeout for the handle and will be used for the splay tree (which sorts and lists all handles within the multi handle). When the main timeout has triggered/expired, the next timeout in time that is kept in the list will be moved to the main timeout position and used as the key to splay with. This way, all timeouts that are set with Curl_expire() internally will end up as a proper timeout. Previously any Curl_expire() that set a _later_ timeout than what was already set was just silently ignored and thus missed. Setting Curl_expire() with timeout 0 (zero) will cancel all previously added timeouts. Corrects known bug #62.
-
- Aug 11, 2010
-
-
Dan Fandrich authored
-
- Jul 30, 2010
-
-
Daniel Stenberg authored
The SOCKET type in Win64 is 64 bits large (and thus so is curl_socket_t on that platform), and long is only 32 bits. It makes it impossible for curl_easy_getinfo() to return a socket properly with the CURLINFO_LASTSOCKET option as for all other operating systems.
-
- Feb 14, 2010
-
-
Yang Tse authored
removed trailing whitespace