summaryrefslogtreecommitdiff
path: root/include
Commit message (Collapse)AuthorAgeFilesLines
* bump: start working toward 7.43.0Daniel Stenberg2015-04-221-3/+3
|
* CURLOPT_PATH_AS_IS: addedDaniel Stenberg2015-03-241-1/+4
| | | | | | | | --path-as-is is the command line option Added docs in curl.1 and CURLOPT_PATH_AS_IS.3 Added test in test 1241
* url: add CURLOPT_SSL_FALSESTART optionAlessandro Ghedini2015-03-201-0/+3
| | | | | This option can be used to enable/disable TLS False Start defined in the RFC draft-bmoeller-tls-falsestart.
* mprintf.h: remove #ifdef CURLDEBUGDaniel Stenberg2015-03-031-8/+1
| | | | | ... and as a consequence, introduce curl_printf.h with that re-define magic instead and make all libcurl code use that instead.
* bump: start working toward 7.42.0Daniel Stenberg2015-02-251-3/+3
|
* curlver.h: next release is 7.41.0 due to the changesDaniel Stenberg2015-01-161-4/+4
|
* url: add CURLOPT_SSL_VERIFYSTATUS optionAlessandro Ghedini2015-01-161-0/+4
| | | | | | | | | | This option can be used to enable/disable certificate status verification using the "Certificate Status Request" TLS extension defined in RFC6066 section 8. This also adds the CURLE_SSL_INVALIDCERTSTATUS error, to be used when the certificate status verification fails, and the Curl_ssl_cert_status_request() function, used to check whether the SSL backend supports the status_request extension.
* curl.h: remove extra spaceYun SangHo2015-01-151-1/+1
|
* bump: start working towards 7.40.1Daniel Stenberg2015-01-081-3/+3
|
* version: Bump copyright year to 2015Steve Holme2015-01-011-2/+2
|
* code/docs: Use correct case for IPv4 and IPv6Steve Holme2014-12-271-2/+2
| | | | | | For consistency, as we seem to have a bit of a mixed bag, changed all instances of ipv4 and ipv6 in comments and documentations to use the correct case.
* code/docs: Use Unix rather than UNIX to avoid use of the trademarkSteve Holme2014-12-261-2/+2
| | | | | Use Unix when generically writing about Unix based systems as UNIX is the trademark and should only be used in a particular product's name.
* docs: Fix FAILONERROR typosAnthon Pang2014-12-041-1/+1
| | | | | | It returns error for >= 400 HTTP responses. Bug: https://github.com/bagder/curl/pull/129
* libcurl: add UNIX domain sockets supportPeter Wu2014-12-041-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The ability to do HTTP requests over a UNIX domain socket has been requested before, in Apr 2008 [0][1] and Sep 2010 [2]. While a discussion happened, no patch seems to get through. I decided to give it a go since I need to test a nginx HTTP server which listens on a UNIX domain socket. One patch [3] seems to make it possible to use the CURLOPT_OPENSOCKETFUNCTION function to gain a UNIX domain socket. Another person wrote a Go program which can do HTTP over a UNIX socket for Docker[4] which uses a special URL scheme (though the name contains cURL, it has no relation to the cURL library). This patch considers support for UNIX domain sockets at the same level as HTTP proxies / IPv6, it acts as an intermediate socket provider and not as a separate protocol. Since this feature affects network operations, a new feature flag was added ("unix-sockets") with a corresponding CURL_VERSION_UNIX_SOCKETS macro. A new CURLOPT_UNIX_SOCKET_PATH option is added and documented. This option enables UNIX domain sockets support for all requests on the handle (replacing IP sockets and skipping proxies). A new configure option (--enable-unix-sockets) and CMake option (ENABLE_UNIX_SOCKETS) can disable this optional feature. Note that I deliberately did not mark this feature as advanced, this is a feature/component that should easily be available. [0]: http://curl.haxx.se/mail/lib-2008-04/0279.html [1]: http://daniel.haxx.se/blog/2008/04/14/http-over-unix-domain-sockets/ [2]: http://sourceforge.net/p/curl/feature-requests/53/ [3]: http://curl.haxx.se/mail/lib-2008-04/0361.html [4]: https://github.com/Soulou/curl-unix-socket Signed-off-by: Peter Wu <peter@lekensteyn.nl>
* version: The next release will become 7.40.0Steve Holme2014-11-301-4/+4
|
* smb: Added SMB protocol and port definitionsBill Nagel2014-11-291-0/+2
| | | | | Added the necessary protocol and port definitions in order to support SMB/CIFS.
* curl.h: Tidy up of CURL_VERSION_* flagsSteve Holme2014-11-071-21/+23
| | | | | | As the list has gotten a little messy and hard to read, especially with the introduction of deprecated items, aligned the values and comments into clean columns and reworked some of the comments in the process.
* version info: Added Kerberos V5 to the supported featuresSteve Holme2014-11-071-0/+1
|
* bump: towards next releaseDaniel Stenberg2014-11-051-3/+3
|
* CURL_VERSION_KERBEROS4: Mark as deprecatedSteve Holme2014-11-021-1/+2
| | | | Support for Kerberos V4 was removed in v7.33.0.
* vtls: remove QsoSSLPatrick Monnerat2014-10-131-1/+1
|
* SSL: implement public key pinningmoparisthebest2014-10-071-0/+6
| | | | | | | | | | | | Option --pinnedpubkey takes a path to a public key in DER format and only connect if it matches (currently only implemented with OpenSSL). Provides CURLOPT_PINNEDPUBLICKEY for curl_easy_setopt(). Extract a public RSA key from a website like so: openssl s_client -connect google.com:443 2>&1 < /dev/null | \ sed -n '/-----BEGIN/,/-----END/p' | openssl x509 -noout -pubkey \ | openssl rsa -pubin -outform DER > google.com.der
* bump: on the 7.38.1-DEV train now!Daniel Stenberg2014-09-101-3/+3
|
* ssl: generalize how the ssl backend identifier is setDaniel Stenberg2014-07-311-1/+2
| | | | | Each backend now defines CURL_SSL_BACKEND accordingly. Added the *AXTLS one which was missing previously.
* curl.h: bring back CURLE_OBSOLETE16Anthon Pang2014-07-281-1/+4
| | | | | | | Removing defines, even obsolete ones that haven't been used for a very long time, still break a lot of applications. Bug: https://github.com/bagder/curl/pull/106
* http2: more and better error checkingDaniel Stenberg2014-07-231-1/+3
| | | | | | | 1 - fixes the warnings when built without http2 support 2 - adds CURLE_HTTP2, a new error code for errors detected by nghttp2 basically when they are about http2 specific things.
* curl.h/features: Deprecate GSS-Negotiate macros due to bad namingMichael Osipov2014-07-231-3/+7
| | | | | | | | - Replace CURLAUTH_GSSNEGOTIATE with CURLAUTH_NEGOTIATE - CURL_VERSION_GSSNEGOTIATE is deprecated which is served by CURL_VERSION_SSPI, CURL_VERSION_GSSAPI and CURUL_VERSION_SPNEGO now. - Remove display of feature 'GSS-Negotiate'
* configure/features: Add feature and version info for GSS-API and SPNEGOMichael Osipov2014-07-231-1/+2
|
* curl.h: renamed CURLOPT_DEPRECATEDx to CURLOPT_OBSOLETExDan Fandrich2014-06-181-4/+4
| | | | | This is consistent with the existing obsolete error code naming convention.
* curl.h: moved two really old deprecated symbolsDaniel Stenberg2014-06-171-2/+7
| | | | ... from the CINIT() enum
* curl.h: reverse the enum/define setup for old symbolsDaniel Stenberg2014-06-172-8/+10
| | | | | | | | | We now provide the "real" names in the CINIT() macro setup for CURLOPT_* symbols, and we provide backwards compatibility defines for the old symbols as defines instead of vice versa. This allows us to better use the CINIT() list to check for existing and current option names.
* curlbuild: fix GCC build on SPARC systems without configure scriptMAN-AT-ARMS2014-06-161-2/+2
|
* bump: Start working on the next releaseSteve Holme2014-05-211-3/+3
|
* CURLOPT_HEADEROPT: addedDaniel Stenberg2014-04-041-0/+7
| | | | | Modified the logic so that CURLOPT_HEADEROPT now controls if PROXYHEADER is actually used or not.
* CURLOPT_PROXYHEADER: set headers for proxy-onlyDaniel Stenberg2014-04-041-2/+7
| | | | | | Includes docs and new test cases: 1525, 1526 and 1527 Co-written-by: Vijay Panghal
* bump: start the 7.37.0 raceDaniel Stenberg2014-03-261-3/+3
|
* transfer: make Expect: 100-continue timeout configurable.Tiit Pikma2014-02-131-0/+4
| | | | | Replaced the #define CURL_TIMEOUT_EXPECT_100 in transfer.c with the CURLOPT_EXPECT_100_TIMEOUT_MS option to make the timeout configurable.
* version: next release will become 7.36.0Daniel Stenberg2014-02-111-4/+4
|
* NPN/ALPN: allow disabling via command lineFabian Frank2014-02-101-0/+6
| | | | | | | when using --http2 one can now selectively disable NPN or ALPN with --no-alpn and --no-npn. for now honored with NSS only. TODO: honor this option with GnuTLS and OpenSSL
* bump: start working on 7.35.1Daniel Stenberg2014-01-291-3/+3
|
* Bumped copyright year to 2014Steve Holme2014-01-021-2/+2
|
* bump: start working on the next releaseDaniel Stenberg2013-12-171-3/+3
|
* login options: remove the ;[options] support from CURLOPT_USERPWDDaniel Stenberg2013-12-142-3/+3
| | | | | | | | | | | | | | | To avoid the regression when users pass in passwords containing semi- colons, we now drop the ability to set the login options with the same options. Support for login options in CURLOPT_USERPWD was added in 7.31.0. Test case 83 was modified to verify that colons and semi-colons can be used as part of the password when using -u (CURLOPT_USERPWD). Bug: http://curl.haxx.se/bug/view.cgi?id=1311 Reported-by: Petr Bahula Assisted-by: Steve Holme Signed-off-by: Daniel Stenberg <daniel@haxx.se>
* curl.h: <sys/select.h> for OpenBSDChristian Weisgerber2013-12-061-1/+1
| | | | | | | curl.h should also include <sys/select.h> on OpenBSD to reliably pull in select(). Typically, including <sys/time.h> will be enough, but not if strict standards-compliance is requested (e.g. by defining _XOPEN_SOURCE).
* curl_easy_getinfo: Post CURLINFO_TLS_SESSION tidy upSteve Holme2013-11-301-3/+3
| | | | | | | | 1) Renamed curl_tlsinfo to curl_tlssessioninfo as discussed on the mailing list. 2) Renamed curl_ssl_backend to curl_sslbackend so it doesn't follow our function naming convention. 3) Updated sessioninfo.c example accordingly.
* curl_easy_getinfo: Added CURLINFO_TLS_SESSION for accessing TLS internalsChristian Grothoff2013-11-211-3/+25
| | | | | | Added new API for returning a SSL backend type and pointer, in order to allow access to the TLS internals, that may then be used to obtain X509 certificate information for example.
* curl_easy_setopt: Added the ability to set the login options separatelySteve Holme2013-11-122-2/+6
| | | | | | Rather than set the authentication options as part of the login details specified in the URL, or via the older CURLOPT_USERPWD option, added a new libcurl option to allow the login options to be set separately.
* bump: next release will be 7.34.0Daniel Stenberg2013-11-111-4/+4
| | | | Due to all the news and changes.
* cmake: unbreak for non-Windows platformsDaniel Stenberg2013-10-201-34/+51
| | | | | Patch-by: Oliver Kuckertz Bug: http://curl.haxx.se/bug/view.cgi?id=1292
* SSL: protocol version can be specified more preciselyGergely Nagy2013-10-151-1/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | CURL_SSLVERSION_TLSv1_0, CURL_SSLVERSION_TLSv1_1, CURL_SSLVERSION_TLSv1_2 enum values are added to force exact TLS version (CURL_SSLVERSION_TLSv1 means TLS 1.x). axTLS: axTLS only supports TLS 1.0 and 1.1 but it cannot be set that only one of these should be used, so we don't allow the new enum values. darwinssl: Added support for the new enum values. SChannel: Added support for the new enum values. CyaSSL: Added support for the new enum values. Bug: The original CURL_SSLVERSION_TLSv1 value enables only TLS 1.0 (it did the same before this commit), because CyaSSL cannot be configured to use TLS 1.0-1.2. GSKit: GSKit doesn't seem to support TLS 1.1 and TLS 1.2, so we do not allow those values. Bugfix: There was a typo that caused wrong SSL versions to be passed to GSKit. NSS: TLS minor version cannot be set, so we don't allow the new enum values. QsoSSL: TLS minor version cannot be set, so we don't allow the new enum values. OpenSSL: Added support for the new enum values. Bugfix: The original CURL_SSLVERSION_TLSv1 value enabled only TLS 1.0, now it enables 1.0-1.2. Command-line tool: Added command line options for the new values.