- Aug 09, 2016
-
-
Daniel Stenberg authored
-
- Jul 31, 2016
-
-
Daniel Stenberg authored
Many applications assume the actual contents of the public types and use that do for example forward declarations (saving them from including our public header) which then breaks when we switch from void * to a struct *. I'm not convinced we were wrong, but since this practise seems widespread enough I'm willing to (partly) step down. Now libcurl uses the struct itself when it is built and it allows applications to use the struct type if CURL_STRICTER is defined at the time of the #include. Reported-by: Peter Frühberger Fixes #926
-
- Jun 22, 2016
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
Instead of typedef'ing to void, typedef to their corresponding actual struct names to allow compilers to type-check. Assisted-by: Reinhard Max
-
- May 30, 2016
-
-
Frank Gevaerts authored
Adds access to the effectively used http version to both libcurl and curl. Closes #799
-
- Apr 25, 2016
-
-
Daniel Stenberg authored
-
- Apr 22, 2016
-
-
Patrick Monnerat authored
-
- Apr 18, 2016
-
-
Alessandro Ghedini authored
-
Daniel Stenberg authored
-
- Apr 17, 2016
-
-
Michael Kaufmann authored
Makes curl connect to the given host+port instead of the host+port found in the URL.
-
- Apr 12, 2016
-
-
Tatsuhiro Tsujikawa authored
Previously, when a stream was closed with other than NGHTTP2_NO_ERROR by RST_STREAM, underlying TCP connection was dropped. This is undesirable since there may be other streams multiplexed and they are very much fine. This change introduce new error code CURLE_HTTP2_STREAM, which indicates stream error that only affects the relevant stream, and connection should be kept open. The existing CURLE_HTTP2 means connection error in general. Ref: https://github.com/curl/curl/issues/659 Ref: https://github.com/curl/curl/pull/663
-
- Apr 09, 2016
-
-
Steve Holme authored
As these two options provide identical functionality, the former for SOCK5 proxies and the latter for HTTP proxies, merged the two options together. As such CURLOPT_SOCKS5_GSSAPI_SERVICE is marked as deprecated as of 7.49.0.
-
- Apr 03, 2016
-
-
Daniel Stenberg authored
-
- Apr 01, 2016
-
-
Daniel Stenberg authored
So that we only do the extra typedefs in curl_memory.h when we really need to and avoid double typedefs. follow-up commit to 7218b52c Thanks-to: Steve Holme
-
- Mar 31, 2016
-
-
Diego Bes authored
Supports HTTP/2 over clear TCP - Optimize switching to HTTP/2 by removing calls to init and setup before switching. Switching will eventually call setup and setup calls init. - Supports new version to “force” the use of HTTP/2 over clean TCP - Add common line parameter “--http2-prior-knowledge” to the Curl command line tool.
-
- Feb 24, 2016
-
-
Jay Satiro authored
The two options are almost the same, except in the case of OpenSSL: CURLINFO_TLS_SESSION OpenSSL session internals is SSL_CTX *. CURLINFO_TLS_SSL_PTR OpenSSL session internals is SSL *. For backwards compatibility we couldn't modify CURLINFO_TLS_SESSION to return an SSL pointer for OpenSSL. Also, add support for the 'internals' member to point to SSL object for the other backends axTLS, PolarSSL, Secure Channel, Secure Transport and wolfSSL. Bug: https://github.com/curl/curl/issues/234 Reported-by: <dkjjr89@users.noreply.github.com> Bug: https://curl.haxx.se/mail/lib-2015-09/0127.html Reported-by: Michael König
-
- Feb 23, 2016
-
-
Michael Koenig authored
Some TFTP server implementations ignore the "TFTP Option extension" (RFC 1782-1784, 2347-2349), or implement it in a flawed way, causing problems with libcurl. Another switch for curl_easy_setopt "CURLOPT_TFTP_NO_OPTIONS" is introduced which prevents libcurl from sending TFTP option requests to a server, avoiding many problems caused by faulty implementations. Bug: https://github.com/curl/curl/issues/481
-
- Feb 03, 2016
-
-
Dan Fandrich authored
-
- Feb 02, 2016
-
-
Daniel Stenberg authored
-
- Dec 13, 2015
-
-
Daniel Stenberg authored
... and stick to 1.1 for HTTP. This is in line with what browsers do and should have very little risk.
-
- Dec 07, 2015
-
-
Gisle Vanem authored
The name of the header guard in lwIP's <lwip/opt.h> has changed from '__LWIP_OPT_H__' to 'LWIP_HDR_OPT_H' (bug #35874 in May 2015). Other fixes: - In curl_setup.h, the problem with an old PSDK doesn't apply if lwIP is used. - In memdebug.h, the 'socket' should be undefined first due to lwIP's lwip_socket() macro. - In curl_addrinfo.c lwIP's getaddrinfo() + freeaddrinfo() macros need special handling because they were undef'ed in memdebug.h. - In select.c we can't use preprocessor conditionals inside select if MSVC and select is a macro, as it is with lwIP. http://curl.haxx.se/mail/lib-2015-12/0023.html http://curl.haxx.se/mail/lib-2015-12/0024.html
-
Gisle Vanem authored
-
- Nov 19, 2015
-
-
Patrick Monnerat authored
-
- Nov 13, 2015
-
-
Daniel Stenberg authored
As an alias for OBJECTPOINT. Provided to allow us to grep for all string options easier.
-
- Nov 02, 2015
-
-
Daniel Stenberg authored
Closes #425
-
- Oct 31, 2015
-
-
Daniel Stenberg authored
Fixes a name space pollution at the cost of programs using one of these defines will no longer compile. However, the vast majority of libcurl programs that do multipart formposts use curl_formadd() to build this list. Closes #506
-
- Oct 23, 2015
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
CURLOPT_STREAM_DEPENDS CURLOPT_STREAM_DEPENDS_E CURLOPT_STREAM_PRIORITY
-
- Oct 20, 2015
-
-
Jonas Minnberg authored
closes #496
-
- Aug 24, 2015
-
-
Razvan Cojocaru authored
This patch addresses known bug #76, where on 64-bit Windows SOCKET is 64 bits wide, but long is only 32, making CURLINFO_LASTSOCKET unreliable. Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
-
- Aug 23, 2015
-
-
Nathaniel Waisbrot authored
- Add new option CURLOPT_DEFAULT_PROTOCOL to allow specifying a default protocol for schemeless URLs. - Add new tool option --proto-default to expose CURLOPT_DEFAULT_PROTOCOL. In the case of schemeless URLs libcurl will behave in this way: When the option is used libcurl will use the supplied default. When the option is not used, libcurl will follow its usual plan of guessing from the hostname and falling back to 'http'.
-
- Jul 17, 2015
-
-
Jay Satiro authored
New tool option --ssl-no-revoke. New value CURLSSLOPT_NO_REVOKE for CURLOPT_SSL_OPTIONS. Currently this option applies only to WinSSL where we have automatic certificate revocation checking by default. According to the ssl-compared chart there are other backends that have automatic checking (NSS, wolfSSL and DarwinSSL) so we could possibly accommodate them at some later point. Bug: https://github.com/bagder/curl/issues/264 Reported-by: zenden2k <zenden2k@gmail.com>
-
- Jun 05, 2015
-
-
Daniel Stenberg authored
The protocol is named "HTTP/2" after all. It is an alias for the existing CURL_HTTP_VERSION_2_0 enum.
-
- May 18, 2015
-
-
Daniel Stenberg authored
By setting this option to 1 libcurl will wait for a connection to reveal if it is possible to pipeline/multiplex on before it continues.
-
- Apr 28, 2015
-
-
Linus Nielsen authored
* Add new options, CURLOPT_PROXY_SERVICE_NAME and CURLOPT_SERVICE_NAME. * Add new curl options, --proxy-service-name and --service-name.
-
- Mar 24, 2015
-
-
Daniel Stenberg authored
--path-as-is is the command line option Added docs in curl.1 and CURLOPT_PATH_AS_IS.3 Added test in test 1241
-
- Mar 20, 2015
-
-
Alessandro Ghedini authored
This option can be used to enable/disable TLS False Start defined in the RFC draft-bmoeller-tls-falsestart.
-
- Jan 16, 2015
-
-
Alessandro Ghedini authored
This option can be used to enable/disable certificate status verification using the "Certificate Status Request" TLS extension defined in RFC6066 section 8. This also adds the CURLE_SSL_INVALIDCERTSTATUS error, to be used when the certificate status verification fails, and the Curl_ssl_cert_status_request() function, used to check whether the SSL backend supports the status_request extension.
-
- Jan 15, 2015
-
-
Yun SangHo authored
-
- Dec 27, 2014
-
-
Steve Holme authored
For consistency, as we seem to have a bit of a mixed bag, changed all instances of ipv4 and ipv6 in comments and documentations to use the correct case.
-