#
55765877 |
| 29-Nov-2014 |
Bill Nagel |
smb: Added SMB protocol and port definitions Added the necessary protocol and port definitions in order to support SMB/CIFS.
|
#
7599143d |
| 07-Nov-2014 |
Steve Holme |
version info: Added Kerberos V5 to the supported features
|
#
569288b3 |
| 02-Nov-2014 |
Steve Holme |
CURL_VERSION_KERBEROS4: Mark as deprecated Support for Kerberos V4 was removed in v7.33.0.
|
#
265b9a2e |
| 13-Oct-2014 |
Patrick Monnerat |
vtls: remove QsoSSL
|
#
93e45079 |
| 01-Oct-2014 |
moparisthebest |
SSL: implement public key pinning Option --pinnedpubkey takes a path to a public key in DER format and only connect if it matches (currently only implemented with OpenSSL). Prov
SSL: implement public key pinning Option --pinnedpubkey takes a path to a public key in DER format and only connect if it matches (currently only implemented with OpenSSL). Provides CURLOPT_PINNEDPUBLICKEY for curl_easy_setopt(). Extract a public RSA key from a website like so: openssl s_client -connect google.com:443 2>&1 < /dev/null | \ sed -n '/-----BEGIN/,/-----END/p' | openssl x509 -noout -pubkey \ | openssl rsa -pubin -outform DER > google.com.der
show more ...
|
#
37f0e8a3 |
| 02-Aug-2014 |
Michael Osipov <1983-01-06@gmx.net> |
docs: Update SPNEGO and GSS-API related doc sections Reflect recent changes in SPNEGO and GSS-API code in the docs. Update them with appropriate namings and remove visible spots for
docs: Update SPNEGO and GSS-API related doc sections Reflect recent changes in SPNEGO and GSS-API code in the docs. Update them with appropriate namings and remove visible spots for GSS-Negotiate.
show more ...
|
#
a439e438 |
| 31-Jul-2014 |
Daniel Stenberg |
ssl: generalize how the ssl backend identifier is set Each backend now defines CURL_SSL_BACKEND accordingly. Added the *AXTLS one which was missing previously.
|
#
821d4a1e |
| 24-Jul-2014 |
Daniel Stenberg |
symbols: CURL_VERSION_GSSNEGOTIATE is deprecated
|
#
81cd24ad |
| 23-Jul-2014 |
Daniel Stenberg |
http2: more and better error checking 1 - fixes the warnings when built without http2 support 2 - adds CURLE_HTTP2, a new error code for errors detected by nghttp2 basically whe
http2: more and better error checking 1 - fixes the warnings when built without http2 support 2 - adds CURLE_HTTP2, a new error code for errors detected by nghttp2 basically when they are about http2 specific things.
show more ...
|
#
cc52d776 |
| 22-Jul-2014 |
Daniel Stenberg |
symbols-in-versions: new SPNEGO/GSS-API symbols in 7.38.0
|
Revision tags: curl-7_37_0 |
|
#
109e94c5 |
| 04-Apr-2014 |
Daniel Stenberg |
docs: this is for 7.37.0 And clarify for curl that --proxy-header now must be used for headers that are meant for a proxy, and they will not be included if the request is not for a p
docs: this is for 7.37.0 And clarify for curl that --proxy-header now must be used for headers that are meant for a proxy, and they will not be included if the request is not for a proxy.
show more ...
|
Revision tags: curl-7_36_0 |
|
#
fa0a5e68 |
| 20-Feb-2014 |
Daniel Stenberg |
symbols-in-versions: Added CURLHEADER_* ... and sorted the list
|
#
ef6be35b |
| 04-Feb-2014 |
Daniel Stenberg |
CURLOPT_HEADEROPT: added Modified the logic so that CURLOPT_HEADEROPT now controls if PROXYHEADER is actually used or not.
|
#
ac887eed |
| 31-Jan-2014 |
Daniel Stenberg |
CURLOPT_PROXYHEADER: set headers for proxy-only Includes docs and new test cases: 1525, 1526 and 1527 Co-written-by: Vijay Panghal
|
#
c021a60b |
| 13-Feb-2014 |
Tiit Pikma |
transfer: make Expect: 100-continue timeout configurable. Replaced the #define CURL_TIMEOUT_EXPECT_100 in transfer.c with the CURLOPT_EXPECT_100_TIMEOUT_MS option to make the timeout con
transfer: make Expect: 100-continue timeout configurable. Replaced the #define CURL_TIMEOUT_EXPECT_100 in transfer.c with the CURLOPT_EXPECT_100_TIMEOUT_MS option to make the timeout configurable.
show more ...
|
#
909a68c1 |
| 10-Feb-2014 |
Fabian Frank |
NPN/ALPN: allow disabling via command line when using --http2 one can now selectively disable NPN or ALPN with --no-alpn and --no-npn. for now honored with NSS only. TODO: honor
NPN/ALPN: allow disabling via command line when using --http2 one can now selectively disable NPN or ALPN with --no-alpn and --no-npn. for now honored with NSS only. TODO: honor this option with GnuTLS and OpenSSL
show more ...
|
Revision tags: curl-7_35_0, curl-7_34_0 |
|
#
169fedbd |
| 14-Dec-2013 |
Daniel Stenberg |
login options: remove the ;[options] support from CURLOPT_USERPWD To avoid the regression when users pass in passwords containing semi- colons, we now drop the ability to set the login o
login options: remove the ;[options] support from CURLOPT_USERPWD To avoid the regression when users pass in passwords containing semi- colons, we now drop the ability to set the login options with the same options. Support for login options in CURLOPT_USERPWD was added in 7.31.0. Test case 83 was modified to verify that colons and semi-colons can be used as part of the password when using -u (CURLOPT_USERPWD). Bug: http://curl.haxx.se/bug/view.cgi?id=1311 Reported-by: Petr Bahula Assisted-by: Steve Holme Signed-off-by: Daniel Stenberg <daniel@haxx.se>
show more ...
|
#
9f18cf15 |
| 22-Nov-2013 |
Steve Holme |
symbols-in-versions: Added missing CURLSSLBACKEND_* symbols
|
#
bf05da18 |
| 22-Nov-2013 |
Steve Holme |
symbols-in-versions: Fixed missing CURLINFO_TLS_SESSION
|
#
f2584627 |
| 12-Nov-2013 |
Steve Holme |
curl_easy_setopt: Added the ability to set the login options separately Rather than set the authentication options as part of the login details specified in the URL, or via the older CUR
curl_easy_setopt: Added the ability to set the login options separately Rather than set the authentication options as part of the login details specified in the URL, or via the older CURLOPT_USERPWD option, added a new libcurl option to allow the login options to be set separately.
show more ...
|
#
2c84ffe1 |
| 16-Oct-2013 |
Steve Holme |
SSL: Corrected version number for new symbols from commit ad34a2d5c87c7f
|
Revision tags: curl-7_33_0 |
|
#
ad34a2d5 |
| 19-Sep-2013 |
Gergely Nagy |
SSL: protocol version can be specified more precisely CURL_SSLVERSION_TLSv1_0, CURL_SSLVERSION_TLSv1_1, CURL_SSLVERSION_TLSv1_2 enum values are added to force exact TLS version (CURL
SSL: protocol version can be specified more precisely CURL_SSLVERSION_TLSv1_0, CURL_SSLVERSION_TLSv1_1, CURL_SSLVERSION_TLSv1_2 enum values are added to force exact TLS version (CURL_SSLVERSION_TLSv1 means TLS 1.x). axTLS: axTLS only supports TLS 1.0 and 1.1 but it cannot be set that only one of these should be used, so we don't allow the new enum values. darwinssl: Added support for the new enum values. SChannel: Added support for the new enum values. CyaSSL: Added support for the new enum values. Bug: The original CURL_SSLVERSION_TLSv1 value enables only TLS 1.0 (it did the same before this commit), because CyaSSL cannot be configured to use TLS 1.0-1.2. GSKit: GSKit doesn't seem to support TLS 1.1 and TLS 1.2, so we do not allow those values. Bugfix: There was a typo that caused wrong SSL versions to be passed to GSKit. NSS: TLS minor version cannot be set, so we don't allow the new enum values. QsoSSL: TLS minor version cannot be set, so we don't allow the new enum values. OpenSSL: Added support for the new enum values. Bugfix: The original CURL_SSLVERSION_TLSv1 value enabled only TLS 1.0, now it enables 1.0-1.2. Command-line tool: Added command line options for the new values.
show more ...
|
#
df69440d |
| 07-Sep-2013 |
Kim Vandry |
libcurl: New options to bind DNS to local interfaces or IP addresses
|
#
316ca865 |
| 05-Sep-2013 |
Daniel Stenberg |
symbols: added HTTP2 symbols and sorted list CURL_HTTP_VERSION_2_0 and CURL_VERSION_HTTP2 are new
|
#
a74b36af |
| 28-Aug-2013 |
Daniel Stenberg |
symbols-in-versions: add CURLOPT_XOAUTH2_BEARER
|