- Sep 03, 2015
-
-
Marcel Raad authored
This fixes another run-time check failure because of a narrowing cast on Visual C++. Closes #408
-
Jay Satiro authored
- Warn that cookies without a domain are sent to any domain: CURLOPT_COOKIELIST, CURLOPT_COOKIEFILE, --cookie - Note that imported Set-Cookie cookies without a domain are no longer exported: CURLINFO_COOKIELIST, CURLOPT_COOKIEJAR, --cookie-jar
-
- Sep 02, 2015
-
-
Steve Holme authored
tool_sdecls.h:139 warning: comma at end of enumerator list
-
- Sep 01, 2015
-
-
Daniel Stenberg authored
-
- Aug 31, 2015
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Steve Holme authored
Introduced in commit 59f3f92b this function is only implemented when CURL_DISABLE_CRYPTO_AUTH is not defined. As such we shouldn't define the function in the header file either.
-
Steve Holme authored
In places the "host name" and "realm" variable was referred to as "instance" whilst in others it was referred to as "host".
-
- Aug 30, 2015
-
-
Daniel Stenberg authored
Turns out HMAC_Init is now deprecated in openssl master (and I spelled HMAC_Init_ex wrong in previous commit)
-
Steve Holme authored
Set HAVE_DES_SET_ODD_PARITY when using OpenSSL/BoringSSL as native Windows builds don't use the autoconf tools.
-
Steve Holme authored
curl_ntlm_core.c:150: warning 'Curl_des_set_odd_parity' undefined; assuming extern returning int
-
Steve Holme authored
-
Steve Holme authored
But kept the original author, when they were specified in a comment, as the initial copyright holder.
-
Jay Satiro authored
-
- Aug 29, 2015
-
-
Daniel Stenberg authored
-
- Aug 28, 2015
-
-
Daniel Stenberg authored
-
Nikolai Kondrashov authored
Put braces around empty "if" body in libcurl.m4 check to avoid warning: suggest braces around empty body in an 'if' statement and make it work with -Werror builds. Closes #402
-
- Aug 25, 2015
-
-
Svyatoslav Mishyn authored
Closes #398
-
Svyatoslav Mishyn authored
remove redundant '}'
-
Sergei Nikulov authored
Closes #399
-
Daniel Stenberg authored
It isn't always clear to the user which options that cause the HTTP methods to conflict so by spelling them out it should hopefully be easier to understand why curl complains.
-
- Aug 24, 2015
-
-
Daniel Stenberg authored
-
Svyatoslav Mishyn authored
Closes #395
-
Patrick Monnerat authored
-
Daniel Stenberg authored
... since HTTP is forbidden to return any such.
-
Daniel Stenberg authored
-
Razvan Cojocaru authored
This patch addresses known bug #76, where on 64-bit Windows SOCKET is 64 bits wide, but long is only 32, making CURLINFO_LASTSOCKET unreliable. Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
-
Daniel Stenberg authored
Leftovers from when we removed the private socket hash. Coverity CID 1317365, "Logically dead code"
-
Daniel Stenberg authored
Coverity CID 1317367, "Missing break in switch"
-
Daniel Stenberg authored
"Explicit null dereferenced (FORWARD_NULL)" Coverity CID 1317366
-
- Aug 23, 2015
-
-
Daniel Stenberg authored
-
Dan Fandrich authored
-
Nathaniel Waisbrot authored
- Add new option CURLOPT_DEFAULT_PROTOCOL to allow specifying a default protocol for schemeless URLs. - Add new tool option --proto-default to expose CURLOPT_DEFAULT_PROTOCOL. In the case of schemeless URLs libcurl will behave in this way: When the option is used libcurl will use the supplied default. When the option is not used, libcurl will follow its usual plan of guessing from the hostname and falling back to 'http'.
-
Jay Satiro authored
-
- Aug 22, 2015
-
-
Daniel Stenberg authored
... so improve the #ifdefs for using our local implementation.
-
- Aug 21, 2015
-
-
Daniel Stenberg authored
Since boringssl brought back DES_set_odd_parity again, it cannot be used to differentiate from boringssl. Using the OPENSSL_IS_BORINGSSL define seems better anyway. URL: https://android.googlesource.com/platform/external/curl/+/f551028d5caab29d4b4a4ae8c159c76c3cfd4887%5E!/ Original-patch-by: Bertrand Simonnet Closes #393
-
Daniel Stenberg authored
... since boringssl moved the former ones and the check started to fail. URL: https://android.googlesource.com/platform/external/curl/+/f551028d5caab29d4b4a4ae8c159c76c3cfd4887%5E!/ Original-patch-by: Bertrand Simonnet
-
Alessandro Ghedini authored
If strict certificate checking is disabled (CURLOPT_SSL_VERIFYPEER and CURLOPT_SSL_VERIFYHOST are disabled) do not fail if the server doesn't present a certificate at all. Closes #392
-
Daniel Stenberg authored
The multi state machine would otherwise go into the DO_MORE state after DO, even for the case when the FTP state machine had already performed those duties, which caused libcurl to get stuck in that state and fail miserably. This occured for for active ftp uploads. Reported-by: Patricia Muscalu
-