- Nov 12, 2015
-
-
Daniel Stenberg authored
- no point in repeating curl features that is already listed as features from the curl -V output - remove the port numbers/unix domain path from the output unless verbose is used, as that is rarely interesting to users.
-
Daniel Stenberg authored
-
- Nov 11, 2015
-
-
Steve Holme authored
Added support to the OAuth 2.0 message function for host and port, in order to accommodate the official OAUTHBEARER SASL mechanism which is to be added shortly.
-
Steve Holme authored
-
Steve Holme authored
In addition to commit a215381c added the RTSP, RTMP and SMB protocols.
-
- Nov 10, 2015
-
-
Douglas Creager authored
The curl_config.h file can be generated either from curl_config.h.cmake or curl_config.h.in, depending on whether you're building using CMake or the autotools. The CMake template header doesn't include entries for all of the protocols that you can disable, which (I think) means that you can't actually disable those protocols when building via CMake. Closes #523
-
Douglas Creager authored
BoringSSL implements `BIO_get_mem_data` as a function, instead of a macro, and expects the output pointer to be a `char **`. We have to add an explicit cast to grab the pointer as a `const char **`. Closes #524
-
Daniel Stenberg authored
We need 1.0.0 or later. Also verified by configure.
-
- Nov 09, 2015
-
-
Steve Holme authored
-
Steve Holme authored
-
Steve Holme authored
When referring to OAuth 2.0 we should use the official name rather the SASL mechanism name.
-
Daniel Stenberg authored
The fix in 1a614c6c was wrong and would leed to free() of a fixed string. Pointed-out-by: Kamil Dudka
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Jay Satiro authored
Because it's illogical to check for a 16-bit curl_off_t. Ref: https://github.com/bagder/curl/issues/425#issuecomment-154964205
-
- Nov 08, 2015
-
-
Dan Fandrich authored
-
- Nov 07, 2015
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
... when it was within a string!
-
Steve Holme authored
-
Steve Holme authored
Closes #517
-
Steve Holme authored
-
- Nov 06, 2015
-
-
Daniel Stenberg authored
imap.c:657:13: error: assignment discards 'const' qualifier from pointer target type [-Werror=discarded-qualifiers]
-
Steve Holme authored
-
Daniel Stenberg authored
... it is just weird to include by default even if it still works.
-
Daniel Stenberg authored
The tftpd test server now logs all received options and thus all TFTP test cases need to match them exactly. Extended test 283 to use and verify --tftp-blksize.
-
Jay Satiro authored
- Set user info param to the socket returned by Curl_getconnectinfo, regardless of if the socket is bad. Effectively this means the user info param now will receive CURL_SOCKET_BAD instead of -1 on bad socket. - Remove incorrect comments. CURLINFO_ACTIVESOCKET is documented to write CURL_SOCKET_BAD to user info param but prior to this change it wrote -1. Bug: https://github.com/bagder/curl/pull/518 Reported-by: Marcel Raad
-
- Nov 05, 2015
-
-
Patrick Monnerat authored
-
Patrick Monnerat authored
-
- Nov 02, 2015
-
-
Lauri Kasanen authored
Rationale: when starting up a curl-using app, all cookies from the jar are checked against each other. This was causing a startup delay in the Fifth browser. All tests pass. Signed-off-by: Lauri Kasanen <cand@gmx.com>
-
Daniel Stenberg authored
Apparently there are sites out there that do redirects to URLs they provide in plain UTF-8 or similar. Browsers and wget %-encode such headers when doing a subsequent request. Now libcurl does too. Added test 1138 to verify. Closes #473
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Closes #425
-
- Oct 31, 2015
-
-
Daniel Stenberg authored
Fixes a name space pollution at the cost of programs using one of these defines will no longer compile. However, the vast majority of libcurl programs that do multipart formposts use curl_formadd() to build this list. Closes #506
-
- Oct 29, 2015
-
-
Daniel Stenberg authored
CID 1332129
-
Daniel Stenberg authored
CID 1332128
-
Daniel Stenberg authored
This reverts commit 370ee919. Issue #509 has all the details but it was confirmed that the crash was not due to this, so the previous commit was wrong.
-
- Oct 28, 2015
-
-
Daniel Stenberg authored
... as the certificate is strictly speaking not private. Reported-by: John Levon
-
- Oct 27, 2015
-
-
Daniel Stenberg authored
After a successful call to SSL_CTX_use_PrivateKey(), we must not call EVP_PKEY_free() on the key. Reported-by: nased0 Closes #509
-