summaryrefslogtreecommitdiff
path: root/include
Commit message (Collapse)AuthorAgeFilesLines
* curl.h: Tidy up of CURL_VERSION_* flagsSteve Holme2014-11-071-21/+23
| | | | | | As the list has gotten a little messy and hard to read, especially with the introduction of deprecated items, aligned the values and comments into clean columns and reworked some of the comments in the process.
* version info: Added Kerberos V5 to the supported featuresSteve Holme2014-11-071-0/+1
|
* bump: towards next releaseDaniel Stenberg2014-11-051-3/+3
|
* CURL_VERSION_KERBEROS4: Mark as deprecatedSteve Holme2014-11-021-1/+2
| | | | Support for Kerberos V4 was removed in v7.33.0.
* vtls: remove QsoSSLPatrick Monnerat2014-10-131-1/+1
|
* SSL: implement public key pinningmoparisthebest2014-10-071-0/+6
| | | | | | | | | | | | Option --pinnedpubkey takes a path to a public key in DER format and only connect if it matches (currently only implemented with OpenSSL). Provides CURLOPT_PINNEDPUBLICKEY for curl_easy_setopt(). Extract a public RSA key from a website like so: openssl s_client -connect google.com:443 2>&1 < /dev/null | \ sed -n '/-----BEGIN/,/-----END/p' | openssl x509 -noout -pubkey \ | openssl rsa -pubin -outform DER > google.com.der
* bump: on the 7.38.1-DEV train now!Daniel Stenberg2014-09-101-3/+3
|
* ssl: generalize how the ssl backend identifier is setDaniel Stenberg2014-07-311-1/+2
| | | | | Each backend now defines CURL_SSL_BACKEND accordingly. Added the *AXTLS one which was missing previously.
* curl.h: bring back CURLE_OBSOLETE16Anthon Pang2014-07-281-1/+4
| | | | | | | Removing defines, even obsolete ones that haven't been used for a very long time, still break a lot of applications. Bug: https://github.com/bagder/curl/pull/106
* http2: more and better error checkingDaniel Stenberg2014-07-231-1/+3
| | | | | | | 1 - fixes the warnings when built without http2 support 2 - adds CURLE_HTTP2, a new error code for errors detected by nghttp2 basically when they are about http2 specific things.
* curl.h/features: Deprecate GSS-Negotiate macros due to bad namingMichael Osipov2014-07-231-3/+7
| | | | | | | | - Replace CURLAUTH_GSSNEGOTIATE with CURLAUTH_NEGOTIATE - CURL_VERSION_GSSNEGOTIATE is deprecated which is served by CURL_VERSION_SSPI, CURL_VERSION_GSSAPI and CURUL_VERSION_SPNEGO now. - Remove display of feature 'GSS-Negotiate'
* configure/features: Add feature and version info for GSS-API and SPNEGOMichael Osipov2014-07-231-1/+2
|
* curl.h: renamed CURLOPT_DEPRECATEDx to CURLOPT_OBSOLETExDan Fandrich2014-06-181-4/+4
| | | | | This is consistent with the existing obsolete error code naming convention.
* curl.h: moved two really old deprecated symbolsDaniel Stenberg2014-06-171-2/+7
| | | | ... from the CINIT() enum
* curl.h: reverse the enum/define setup for old symbolsDaniel Stenberg2014-06-172-8/+10
| | | | | | | | | We now provide the "real" names in the CINIT() macro setup for CURLOPT_* symbols, and we provide backwards compatibility defines for the old symbols as defines instead of vice versa. This allows us to better use the CINIT() list to check for existing and current option names.
* curlbuild: fix GCC build on SPARC systems without configure scriptMAN-AT-ARMS2014-06-161-2/+2
|
* bump: Start working on the next releaseSteve Holme2014-05-211-3/+3
|
* CURLOPT_HEADEROPT: addedDaniel Stenberg2014-04-041-0/+7
| | | | | Modified the logic so that CURLOPT_HEADEROPT now controls if PROXYHEADER is actually used or not.
* CURLOPT_PROXYHEADER: set headers for proxy-onlyDaniel Stenberg2014-04-041-2/+7
| | | | | | Includes docs and new test cases: 1525, 1526 and 1527 Co-written-by: Vijay Panghal
* bump: start the 7.37.0 raceDaniel Stenberg2014-03-261-3/+3
|
* transfer: make Expect: 100-continue timeout configurable.Tiit Pikma2014-02-131-0/+4
| | | | | Replaced the #define CURL_TIMEOUT_EXPECT_100 in transfer.c with the CURLOPT_EXPECT_100_TIMEOUT_MS option to make the timeout configurable.
* version: next release will become 7.36.0Daniel Stenberg2014-02-111-4/+4
|
* NPN/ALPN: allow disabling via command lineFabian Frank2014-02-101-0/+6
| | | | | | | when using --http2 one can now selectively disable NPN or ALPN with --no-alpn and --no-npn. for now honored with NSS only. TODO: honor this option with GnuTLS and OpenSSL
* bump: start working on 7.35.1Daniel Stenberg2014-01-291-3/+3
|
* Bumped copyright year to 2014Steve Holme2014-01-021-2/+2
|
* bump: start working on the next releaseDaniel Stenberg2013-12-171-3/+3
|
* login options: remove the ;[options] support from CURLOPT_USERPWDDaniel Stenberg2013-12-142-3/+3
| | | | | | | | | | | | | | | To avoid the regression when users pass in passwords containing semi- colons, we now drop the ability to set the login options with the same options. Support for login options in CURLOPT_USERPWD was added in 7.31.0. Test case 83 was modified to verify that colons and semi-colons can be used as part of the password when using -u (CURLOPT_USERPWD). Bug: http://curl.haxx.se/bug/view.cgi?id=1311 Reported-by: Petr Bahula Assisted-by: Steve Holme Signed-off-by: Daniel Stenberg <daniel@haxx.se>
* curl.h: <sys/select.h> for OpenBSDChristian Weisgerber2013-12-061-1/+1
| | | | | | | curl.h should also include <sys/select.h> on OpenBSD to reliably pull in select(). Typically, including <sys/time.h> will be enough, but not if strict standards-compliance is requested (e.g. by defining _XOPEN_SOURCE).
* curl_easy_getinfo: Post CURLINFO_TLS_SESSION tidy upSteve Holme2013-11-301-3/+3
| | | | | | | | 1) Renamed curl_tlsinfo to curl_tlssessioninfo as discussed on the mailing list. 2) Renamed curl_ssl_backend to curl_sslbackend so it doesn't follow our function naming convention. 3) Updated sessioninfo.c example accordingly.
* curl_easy_getinfo: Added CURLINFO_TLS_SESSION for accessing TLS internalsChristian Grothoff2013-11-211-3/+25
| | | | | | Added new API for returning a SSL backend type and pointer, in order to allow access to the TLS internals, that may then be used to obtain X509 certificate information for example.
* curl_easy_setopt: Added the ability to set the login options separatelySteve Holme2013-11-122-2/+6
| | | | | | Rather than set the authentication options as part of the login details specified in the URL, or via the older CURLOPT_USERPWD option, added a new libcurl option to allow the login options to be set separately.
* bump: next release will be 7.34.0Daniel Stenberg2013-11-111-4/+4
| | | | Due to all the news and changes.
* cmake: unbreak for non-Windows platformsDaniel Stenberg2013-10-201-34/+51
| | | | | Patch-by: Oliver Kuckertz Bug: http://curl.haxx.se/bug/view.cgi?id=1292
* SSL: protocol version can be specified more preciselyGergely Nagy2013-10-151-1/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CURL_SSLVERSION_TLSv1_0, CURL_SSLVERSION_TLSv1_1, CURL_SSLVERSION_TLSv1_2 enum values are added to force exact TLS version (CURL_SSLVERSION_TLSv1 means TLS 1.x). axTLS: axTLS only supports TLS 1.0 and 1.1 but it cannot be set that only one of these should be used, so we don't allow the new enum values. darwinssl: Added support for the new enum values. SChannel: Added support for the new enum values. CyaSSL: Added support for the new enum values. Bug: The original CURL_SSLVERSION_TLSv1 value enables only TLS 1.0 (it did the same before this commit), because CyaSSL cannot be configured to use TLS 1.0-1.2. GSKit: GSKit doesn't seem to support TLS 1.1 and TLS 1.2, so we do not allow those values. Bugfix: There was a typo that caused wrong SSL versions to be passed to GSKit. NSS: TLS minor version cannot be set, so we don't allow the new enum values. QsoSSL: TLS minor version cannot be set, so we don't allow the new enum values. OpenSSL: Added support for the new enum values. Bugfix: The original CURL_SSLVERSION_TLSv1 value enabled only TLS 1.0, now it enables 1.0-1.2. Command-line tool: Added command line options for the new values.
* bump: start working on 7.33.1Daniel Stenberg2013-10-141-3/+3
|
* libcurl: New options to bind DNS to local interfaces or IP addressesKim Vandry2013-09-122-0/+17
|
* curl.h: add CURL_VERSION_HTTP2 as a featureDaniel Stenberg2013-09-041-0/+1
| | | | | It isn't added as a separate protocol as HTTP2 will be done over HTTP:// URLs that can be upgraded to HTTP2 if the server supports it as well.
* curl.h: added CURL_HTTP_VERSION_2_0Daniel Stenberg2013-09-041-0/+1
| | | | Initial library considerations documented in lib/README.http2
* bump: next release is 7.33.0 due to added featuresDaniel Stenberg2013-08-281-4/+4
|
* options: added basic SASL XOAUTH2 supportKyle L. Huff2013-08-252-0/+4
| | | | | | Added the ability to specify an XOAUTH2 bearer token [RFC6750] via the option CURLOPT_XOAUTH2_BEARER for authentication using RFC6749 "OAuth 2.0 Authorization Framework".
* curl.h: name space pollution by "enum type"Daniel Stenberg2013-08-221-6/+8
| | | | | | | | Renamed to "enum curl_khtype" now. Will break compilation for programs that rely on the enum name. Bug: https://github.com/bagder/curl/pull/76 Reported-by: Shawn Landden
* CURLM_ADDED_ALREADY: new error codeDaniel Stenberg2013-08-201-1/+3
| | | | | | Doing curl_multi_add_handle() on an easy handle that is already added to a multi handle now returns this error code. It previously returned CURLM_BAD_EASY_HANDLE for this condition.
* version number: bump to 7.32.1 for nowDaniel Stenberg2013-08-121-3/+3
| | | | Start working on the next version and up some counters.
* CURLOPT_XFERINFOFUNCTION: introducing a new progress callbackDaniel Stenberg2013-07-181-2/+20
| | | | | | | | | | | | | | | CURLOPT_XFERINFOFUNCTION is now the preferred progress callback function and CURLOPT_PROGRESSFUNCTION is considered deprecated. This new callback uses pure 'curl_off_t' arguments to pass on full resolution sizes. It otherwise retains the same characteristics: the same call rate, the same meanings for the arguments and the return code is used the same way. The progressfunc.c example is updated to show how to use the new callback for newer libcurls while supporting the older one if built with an older libcurl or even built with a newer libcurl while running with an older.
* bump: start working towards what most likely will become 7.32.0Daniel Stenberg2013-06-221-3/+3
|
* bump versionDaniel Stenberg2013-04-271-4/+4
| | | | | Since we're adding new stuff, the next release will bump the minor version and we're looking forward to 7.31.0
* sasl-ir: Added CURLOPT_SASL_IR to enable/disable the SASL initial responseSteve Holme2013-04-271-1/+4
|
* bump: start working towards next releaseDaniel Stenberg2013-04-121-3/+3
|
* Multiple pipelines and limiting the number of connections.Linus Nielsen Feltzing2013-03-132-0/+27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Introducing a number of options to the multi interface that allows for multiple pipelines to the same host, in order to optimize the balance between the penalty for opening new connections and the potential pipelining latency. Two new options for limiting the number of connections: CURLMOPT_MAX_HOST_CONNECTIONS - Limits the number of running connections to the same host. When adding a handle that exceeds this limit, that handle will be put in a pending state until another handle is finished, so we can reuse the connection. CURLMOPT_MAX_TOTAL_CONNECTIONS - Limits the number of connections in total. When adding a handle that exceeds this limit, that handle will be put in a pending state until another handle is finished. The free connection will then be reused, if possible, or closed if the pending handle can't reuse it. Several new options for pipelining: CURLMOPT_MAX_PIPELINE_LENGTH - Limits the pipeling length. If a pipeline is "full" when a connection is to be reused, a new connection will be opened if the CURLMOPT_MAX_xxx_CONNECTIONS limits allow it. If not, the handle will be put in a pending state until a connection is ready (either free or a pipe got shorter). CURLMOPT_CONTENT_LENGTH_PENALTY_SIZE - A pipelined connection will not be reused if it is currently processing a transfer with a content length that is larger than this. CURLMOPT_CHUNK_LENGTH_PENALTY_SIZE - A pipelined connection will not be reused if it is currently processing a chunk larger than this. CURLMOPT_PIPELINING_SITE_BL - A blacklist of hosts that don't allow pipelining. CURLMOPT_PIPELINING_SERVER_BL - A blacklist of server types that don't allow pipelining. See the curl_multi_setopt() man page for details.
* curl_global_init: accept the CURL_GLOBAL_ACK_EINTR flagZdenek Pavlas2013-03-121-0/+1
| | | | | | | | | The flag can be used in pycurl-based applications where using the multi interface would not be acceptable because of the performance lost caused by implementing the select() loop in python. Bug: http://curl.haxx.se/bug/view.cgi?id=1168 Downstream Bug: https://bugzilla.redhat.com/919127