summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* vauth: Use CURLE_AUTH_ERROR for auth function errorsJay Satiro2019-08-1411-18/+62
| | | | | | | | | | | | | | - Add new error code CURLE_AUTH_ERROR. Prior to this change auth function errors were signaled by CURLE_OUT_OF_MEMORY and CURLE_RECV_ERROR, and neither one was technically correct. Ref: https://github.com/curl/curl/pull/3848 Co-authored-by: Dominik Hölzl Closes https://github.com/curl/curl/pull/3864
* curl_version_info: make the quic_version a constDaniel Stenberg2019-08-132-2/+2
| | | | | | Follow-up from 1a2df1518ad8653f Closes #4222
* examples: add http3.c, altsvc.c and http3-present.cDaniel Stenberg2019-08-134-1/+159
| | | | Closes #4221
* nss: use TLSv1.3 as default if supportedPeter Wu2019-08-131-10/+6
| | | | | | | | | | | | SSL_VersionRangeGetDefault returns (TLSv1.0, TLSv1.2) as supported range in NSS 3.45. It looks like the intention is to raise the minimum version rather than lowering the maximum, so adjust accordingly. Note that the caller (nss_setup_connect) initializes the version range to (TLSv1.0, TLSv1.3), so there is no need to check for >= TLSv1.0 again. Closes #4187 Reviewed-by: Daniel Stenberg Reviewed-by: Kamil Dudka
* quic.h: remove unused protoDaniel Stenberg2019-08-131-6/+0
|
* curl_version_info.3: mentioned ALTSVC and HTTP3Daniel Stenberg2019-08-131-45/+49
| | | | ... and sorted the list alphabetically
* lib/quic.c: unused - removedDaniel Stenberg2019-08-132-39/+1
|
* CURLOPT_ALTSVC_CTRL.3: remove CURLALTSVC_ALTUSEDDaniel Stenberg2019-08-131-5/+2
| | | | Follow-up to 98c3f148 that removed it from the header file
* docs/HTTP3: simplify quiche build instructionJunho Choi2019-08-121-6/+2
| | | | | | Use --recursive to get boringssl in one line Closes #4219
* altsvc: make it use h3-22 with ngtcp2 as wellDaniel Stenberg2019-08-121-2/+2
|
* ngtcp2: initial h3 request workDaniel Stenberg2019-08-122-24/+116
| | | | Closes #4217
* curl_version_info: offer quic (and h3) library infoDaniel Stenberg2019-08-123-2/+21
| | | | Closes #4216
* HTTP3: use ngtcp2's draft-22 branchDaniel Stenberg2019-08-121-1/+1
|
* RELEASE-NOTES: syncedDaniel Stenberg2019-08-121-8/+14
|
* CURLOPT_READFUNCTION.3: provide inline exampleDaniel Stenberg2019-08-121-2/+31
| | | | ... instead of mentioning one in another place
* ngtcp2: send HTTP/3 request with nghttp3Tatsuhiro Tsujikawa2019-08-121-44/+221
| | | | | | | | This commit makes sending HTTP/3 request with nghttp3 work. It minimally receives HTTP response and calls nghttp3 callbacks, but no processing is made at the moment. Closes #4215
* nghttp3: initial h3 template code addedDaniel Stenberg2019-08-122-1/+501
|
* nghttp3: required when ngtcp2 is used for QUICDaniel Stenberg2019-08-123-9/+128
| | | | | | | | - checked for by configure - updated docs/HTTP3.md - shown in the version string Closes #4210
* asyn-thread: issue CURL_POLL_REMOVE before closing socketEric Wong2019-08-111-5/+20
| | | | | | | | | | | | This avoids EBADF errors from EPOLL_CTL_DEL operations in the ephiperfifo.c example. EBADF is dangerous in multi-threaded applications where I rely on epoll_ctl to operate on the same epoll description from different threads. Follow-up to eb9a604f8d7db8 Bug: https://curl.haxx.se/mail/lib-2019-08/0026.html Closes #4211
* configure: avoid undefined check_for_ca_bundleCarlo Marcelo Arenas Belón2019-08-111-1/+1
| | | | | | | | instead of using a "greater than 0" test, check for variable being set, as it is always set to 1, and could be left unset if non of OPENSSL MBEDTLS GNUTLS WOLFSSL is being configured for. Closes #4213
* ngtcp2: Send ALPN h3-22Tatsuhiro Tsujikawa2019-08-111-4/+5
| | | | Closes #4212
* ngtcp2: use ngtcp2_settings_default and specify initial_tsTatsuhiro Tsujikawa2019-08-111-4/+2
|
* curl_global_init_mem.3: mention it was added in 7.12.0Daniel Stenberg2019-08-111-1/+3
|
* ngtcp2: make the QUIC handshake workTatsuhiro Tsujikawa2019-08-103-76/+267
| | | | Closes #4209
* HTTP3.md: Update quiche build instructionsAlex Mayorga2019-08-101-2/+12
| | | | | | | Added cloning for quiche and BoringSSL and modified the build instructions so they work on a clean folder. Closes #4208
* CURLOPT_H3: removedDaniel Stenberg2019-08-098-82/+4
| | | | | | There's no use for this anymore and it was never in a release. Closes #4206
* http3: make connection reuse workDaniel Stenberg2019-08-096-47/+87
| | | | Closes #4204
* quiche: add SSLKEYLOGFILE supportDaniel Stenberg2019-08-091-0/+3
|
* cleanup: s/curl_debug/curl_dbg_debug in comments and docsDaniel Stenberg2019-08-083-7/+7
| | | | | | | | | | Leftovers from the function rename back in 76b63489495 Reported-by: Gisle Vanem Bug: https://github.com/curl/curl/commit/f3e0f071b14fcb46a453f69bdf4e062bcaacf362#com mitcomment-34601751 Closes #4203
* RELEASE-NOTES: syncedDaniel Stenberg2019-08-081-5/+19
|
* alt-svc: add protocol version selection maskingDaniel Stenberg2019-08-085-64/+69
| | | | | | | | | | | So that users can mask in/out specific HTTP versions when Alt-Svc is used. - Removed "h2c" and updated test case accordingly - Changed how the altsvc struct is laid out - Added ifdefs to make the unittest run even in a quiche-tree Closes #4201
* http3: fix the HTTP/3 in the request, make alt-svc set right versionsDaniel Stenberg2019-08-082-39/+46
| | | | Closes #4200
* alt-svc: send Alt-Used: in redirected requestsDaniel Stenberg2019-08-085-4/+17
| | | | | | | | | | | | | | | RFC 7838 section 5: When using an alternative service, clients SHOULD include an Alt-Used header field in all requests. Removed CURLALTSVC_ALTUSED again (feature is still EXPERIMENTAL thus this is deemed ok). You can disable sending this header just like you disable any other HTTP header in libcurl. Closes #4199
* CURLOPT_HTTP_VERSION: seting this to 3 forces HTTP/3 use directlyDaniel Stenberg2019-08-0816-39/+43
| | | | | | | | | | | | Even though it cannot fall-back to a lower HTTP version automatically. The safer way to upgrade remains via CURLOPT_ALTSVC. CURLOPT_H3 no longer has any bits that do anything and might be removed before we remove the experimental label. Updated the curl tool accordingly to use "--http3". Closes #4197
* docs/ALTSVC: remove what works and the experimental explanationDaniel Stenberg2019-08-071-49/+8
| | | | | | Also, put the TODO items at the bottom. Closes #4198
* docs/EXPERIMENTAL: explain what it means and what's experimental nowDaniel Stenberg2019-08-072-0/+23
|
* curl: make use of CURLINFO_RETRY_AFTER when retryingDaniel Stenberg2019-08-072-1/+17
| | | | | | | | If a Retry-After: header was used in the response, that value overrides other retry timing options. Fixes #3794 Closes #4195
* curl: use CURLINFO_PROTOCOL to check for HTTP(s)Daniel Stenberg2019-08-071-4/+3
| | | | ... instead of CURLINFO_EFFECTIVE_URL to avoid string operations.
* CURLINFO_RETRY_AFTER: parse the Retry-After header valueDaniel Stenberg2019-08-0714-6/+317
| | | | | | | | This is only the libcurl part that provides the information. There's no user of the parsed value. This change includes three new tests for the parser. Ref: #3794
* docs/ALTSVC.md: first basic file format descriptionDaniel Stenberg2019-08-071-0/+21
|
* curl: have -w's 'http_version' show '3' for HTTP/3Daniel Stenberg2019-08-071-1/+4
| | | | Closes #4196
* curl.h: add CURL_HTTP_VERSION_3 to the version enumDaniel Stenberg2019-08-074-2/+8
| | | | | It can't be set for CURLOPT_HTTP_VERSION, but it can be extracted with CURLINFO_HTTP_VERSION.
* quiche: make use of the connection timeout API properlyDaniel Stenberg2019-08-072-0/+11
|
* quiche: make POSTFIELDS posts workDaniel Stenberg2019-08-071-14/+27
|
* quiche: improved error handling and memory cleanupsDaniel Stenberg2019-08-072-21/+49
|
* quiche: flush egress in h3_stream_recv() tooDaniel Stenberg2019-08-071-0/+4
|
* RELEASE-NOTES: syncedDaniel Stenberg2019-08-061-4/+13
|
* os400: take care of CURLOPT_SASL_AUTHZID in curl_easy_setopt_ccsid().Patrick Monnerat2019-08-062-6/+2
| | | | | | | | | | | | Ref: https://github.com/curl/curl/issues/3653 Ref: https://github.com/curl/curl/pull/3790 NOTE: This commit was cherry-picked and is part of a series of commits that added the authzid feature for upcoming 7.66.0. The series was temporarily reverted in db8ec1f so that it would not ship in a 7.65.x patch release. Closes https://github.com/curl/curl/pull/4186
* tests: Fix the line endings for the SASL alt-auth testsJay Satiro2019-08-066-44/+44
| | | | | | | | | | | | | | | | | | | - Change data and protocol sections to CRLF line endings. Prior to this change the tests would fail or hang, which is because certain sections such as protocol require CRLF line endings. Follow-up to grandparent commit which added the tests. Ref: https://github.com/curl/curl/issues/3653 Ref: https://github.com/curl/curl/pull/3790 NOTE: This commit was cherry-picked and is part of a series of commits that added the authzid feature for upcoming 7.66.0. The series was temporarily reverted in db8ec1f so that it would not ship in a 7.65.x patch release. Closes https://github.com/curl/curl/pull/4186
* examples: Added SASL PLAIN authorisation identity (authzid) examplesSteve Holme2019-08-064-2/+304
| | | | | | | | | | | | Ref: https://github.com/curl/curl/issues/3653 Ref: https://github.com/curl/curl/pull/3790 NOTE: This commit was cherry-picked and is part of a series of commits that added the authzid feature for upcoming 7.66.0. The series was temporarily reverted in db8ec1f so that it would not ship in a 7.65.x patch release. Closes https://github.com/curl/curl/pull/4186