Skip to content
  1. Feb 16, 2012
  2. Feb 15, 2012
    • Steve Holme's avatar
      DOCS: Added information for CURLOPT_MAIL_AUTH. · 154c0d4b
      Steve Holme authored
      Added information relating to the new CURLOPT_MAIL_AUTH parameter and
      reworked CURLOPT_MAIL_FROM and CURLOPT_MAIL_RCPT to be a clearer.
      
      Fixed inconsistencies of "vocalisation of the abbreviation" versus
      "vocalisation of the first word" for all abbreviations.
      
      Corrected a typo in CURLOPT_NOPROXY.
      154c0d4b
    • Steve Holme's avatar
      smtp.c: Fixed use of angled brackets in AUTH parameter. · b685481d
      Steve Holme authored
      Fixed the use of angled brackets "<>" in the optional AUTH parameter as
      per RFC-2554 section 5. The address should not include them but an
      empty address should be replaced by them.
      b685481d
  3. Feb 14, 2012
    • Steve Holme's avatar
      smtp_mail: Added support to MAIL FROM for the optional AUTH parameter · 0cf0ab6f
      Steve Holme authored
      Added a new CURLOPT_MAIL_AUTH option that allows the calling program to
      set the optional AUTH parameter in the MAIL FROM command.
      
      When this option is specified and an authentication mechanism is used
      to communicate with the mail server then the AUTH parameter will be
      included in the MAIL FROM command. This is particularly useful when the
      calling program is acting as a relay in a trusted environment and
      performing server to server communication, as it allows the relaying
      server to specify the address of the mailbox that was used to
      authenticate and send the original email.
      0cf0ab6f
    • toddouska's avatar
      cyassl: update to CyaSSL 2.0.x API · ee7e4fc1
      toddouska authored
      Modify configure.ac to test for new CyaSSL Init function and remove
      default install path to system.  Change to CyaSSL OpenSSL header and
      proper Init in code as well.
      
      Note that this no longer detects or works with CyaSSL before v2
      ee7e4fc1
    • Daniel Stenberg's avatar
      LIBCURL_VERSION_NUM: 0x071900 · 02012805
      Daniel Stenberg authored
      I accidentally left the lowest bits 01 before
      02012805
    • Steve Holme's avatar
      SMTP: Fixed error when using CURLOPT_CONNECT_ONLY · 69406f0b
      Steve Holme authored
      Fixed incorrect behavior in smtp_done() which would cause the end of
      block data to be sent to the SMTP server if libcurl was operating in
      connect only mode. This would cause the server to return an error as
      data would not be expected which in turn caused libcurl to return
      CURLE_RECV_ERROR.
      69406f0b
  4. Feb 13, 2012
  5. Feb 10, 2012
  6. Feb 09, 2012
    • Kamil Dudka's avatar
      nss: add support for the CURLSSLOPT_ALLOW_BEAST option · ebf31389
      Kamil Dudka authored
      ... and fix some typos from the 62d15f15 commit.
      ebf31389
    • Rob Ward's avatar
      8ef8a2b5
    • Daniel Stenberg's avatar
      --ssl-allow-beast added · 62d15f15
      Daniel Stenberg authored
      This new option tells curl to not work around a security flaw in the
      SSL3 and TLS1.0 protocols. It uses the new libcurl option
      CURLOPT_SSL_OPTIONS with the CURLSSLOPT_ALLOW_BEAST bit set.
      62d15f15
    • Daniel Stenberg's avatar
      CURLOPT_SSL_OPTIONS: added · 2a699bc6
      Daniel Stenberg authored
      Allow an appliction to set libcurl specific SSL options. The first and
      only options supported right now is CURLSSLOPT_ALLOW_BEAST.
      
      It will make libcurl to disable any work-arounds the underlying SSL
      library may have to address a known security flaw in the SSL3 and TLS1.0
      protocol versions.
      
      This is a reaction to us unconditionally removing that behavior after
      this security advisory:
      
      http://curl.haxx.se/docs/adv_20120124B.html
      
      ... it did however cause a lot of programs to fail because of old
      servers not liking this work-around. Now programs can opt to decrease
      the security in order to interoperate with old servers better.
      2a699bc6
    • Dave Reisner's avatar
      curl: use new library-side TCP_KEEPALIVE options · 2a266c1c
      Dave Reisner authored
      Use the new library CURLOPT_TCP_KEEPALIVE rather than disabling this via
      the sockopt callback. If --keepalive-time is used, apply the value to
      CURLOPT_TCP_KEEPIDLE and CURLOPT_TCP_KEEPINTVL.
      2a266c1c
    • Dave Reisner's avatar
      add library support for tuning TCP_KEEPALIVE · 705f0f7a
      Dave Reisner authored
      This adds three new options to control the behavior of TCP keepalives:
      
      - CURLOPT_TCP_KEEPALIVE: enable/disable probes
      - CURLOPT_TCP_KEEPIDLE: idle time before sending first probe
      - CURLOPT_TCP_KEEPINTVL: delay between successive probes
      
      While not all operating systems support the TCP_KEEPIDLE and
      TCP_KEEPINTVL knobs, the library will still allow these options to be
      set by clients, silently ignoring the values.
      705f0f7a
  7. Feb 07, 2012
  8. Feb 06, 2012
  9. Jan 31, 2012
  10. Jan 28, 2012
    • Martin Storsjo's avatar
      Explicitly link to the nettle/gcrypt libraries · f710aa40
      Martin Storsjo authored
      When support for nettle was added in 64f328c7, I overlooked
      the fact that AC_CHECK_LIB doesn't add the tested lib to LIBS
      if the check succeeded, if a custom success code block was present.
      (The previous version of the check had an empty block for
      successful checks, adding the lib to LIBS implicitly.)
      
      Therefore, explicitly add either nettle or gcrypt to LIBS, after
      deciding which one to use. Even if they can be linked in
      transitively, it is safer to actually link explicitly to them.
      
      This fixes building with gnutls with linkers that don't allow
      linking transitively, such as for windows.
      f710aa40
    • Pierre Ynard's avatar
      more resilient connection times among IP addresses · f4d3c0cb
      Pierre Ynard authored
      When connecting to a domain with multiple IP addresses, allow different,
      decreasing connection timeout values. This should guarantee some
      connections attempts with sufficiently long timeouts, while still
      providing fallback.
      f4d3c0cb
    • Pierre Ynard's avatar
      remove write-only variable · 4d2737bc
      Pierre Ynard authored
      4d2737bc
  11. Jan 26, 2012
  12. Jan 25, 2012
  13. Jan 24, 2012
  14. Jan 22, 2012