diff options
author | Tatsuya Kinoshita <tats@debian.org> | 2021-02-10 12:06:57 +0000 |
---|---|---|
committer | Tatsuya Kinoshita <tats@debian.org> | 2021-02-10 12:53:20 +0000 |
commit | 707b02d256281971f0ebbcee03712c8a3c11c203 (patch) | |
tree | abe59ed537e3e269c39217fe68a5ccbeff18e985 | |
parent | New option ssl_min_version for OpenSSL 1.1 (diff) | |
download | w3m-707b02d256281971f0ebbcee03712c8a3c11c203.tar.gz w3m-707b02d256281971f0ebbcee03712c8a3c11c203.zip |
Mention ssl_* options as a workaround for SSL error
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934493
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953045
-rw-r--r-- | url.c | 7 |
1 files changed, 5 insertions, 2 deletions
@@ -474,8 +474,11 @@ openSSLHandle(int sock, char *hostname, char **p_cert) SSL_free(handle); /* FIXME: gettextize? */ disp_err_message(Sprintf - ("SSL error: %s", - ERR_error_string(ERR_get_error(), NULL))->ptr, FALSE); + ("SSL error: %s" +#ifdef SSL_CTX_set_min_proto_version + ", a workaround might be: w3m -o ssl_cipher=ALL:@SECLEVEL=0 -o ssl_min_version=TLSv1.0 -o ssl_forbid_method= -o ssl_verify_server=0" +#endif + , ERR_error_string(ERR_get_error(), NULL))->ptr, FALSE); return NULL; } |