aboutsummaryrefslogtreecommitdiffstats
path: root/url.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2021-04-17New option localhost_only to restrict connections only to localhostTatsuya Kinoshita1-0/+4
Bug-Debian: https://github.com/tats/w3m/issues/117
2021-04-10New option cross_origin_referer to use origin only RefererTatsuya Kinoshita1-2/+30
2021-04-10Don't include username in RefererTatsuya Kinoshita1-21/+16
2021-04-10Don't set Referer when data URI schemeTatsuya Kinoshita1-1/+1
2021-02-28New option ssl_ca_default to explicitly use OpenSSL default pathsTatsuya Kinoshita1-3/+4
2021-02-22Don't fallback when SSL_CTX_load_verify_locations failsTatsuya Kinoshita1-5/+11
2021-02-22Don't use SSL_CTX_set_default_verify_paths when not USE_SSL_VERIFYTatsuya Kinoshita1-1/+1
2021-02-13Use ssl_ca_file and ssl_ca_path only when ssl_verify_serverTatsuya Kinoshita1-0/+1
2021-02-12Check empty string conditions for ssl_ca_file and ssl_ca_pathTatsuya Kinoshita1-1/+2
2021-02-12Fix OpenSSL default always overrides ssl_ca_file and ssl_ca_pathTatsuya Kinoshita1-1/+1
2021-02-11Mention -insecure option as a workaround for SSL errorTatsuya Kinoshita1-5/+2
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934493 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953045
2021-02-11Update ssl_min_version to accept "all" and reject "SSLv2"Tatsuya Kinoshita1-6/+6
2021-02-10Mention ssl_* options as a workaround for SSL errorTatsuya Kinoshita1-2/+5
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934493 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953045
2021-02-10New option ssl_min_version for OpenSSL 1.1Tatsuya Kinoshita1-0/+43
2021-02-10New option ssl_cipher to specify ciphers for TLSv1.2 and belowTatsuya Kinoshita1-3/+5
2020-12-16Use the default ciphers for OpenSSL 1.1 and laterTatsuya Kinoshita1-0/+2
cf. https://bugs.launchpad.net/ubuntu/+source/w3m/+bug/1325674 https://src.fedoraproject.org/rpms/w3m/blob/36f14df378762a3a03a6a724583ca5b0ff618ed5/f/Fix-the-cipher-list-string-to-ensure-that-it-contain.patch https://fedoraproject.org/wiki/Packaging:CryptoPolicies
2020-12-02Add support for Gopher items 5 and Ibptato1-0/+2
2020-11-07Remove useless loopbptato1-5/+0
2020-11-07Remove unnecessary variable assignmentbptato1-1/+0
2020-11-07Support Gopher items search (7) and binary file (9)bptato1-0/+14
2020-10-21Moved back filetype indicator to the beginning of file namesbptato1-12/+30
2020-10-21Improved gopher supportbptato1-8/+25
2020-09-15Add support for file://hostname/... URLsBruno Haible1-5/+31
Origin: https://github.com/tats/w3m/files/3488813/file-hostname-support.diff.gz Bug-Debian: https://github.com/tats/w3m/issues/120
2020-03-11Extend ssl_forbid_method for TLSv1.2 and TLSv1.3Tatsuya Kinoshita1-0/+10
2019-06-30Allow setting User Agent in SiteconfAzure1-1/+4
Since Google gives usable search results to Lynx but not to w3m, and many other sites block Lynx but /not/ w3m, we want to be able to set the User Agent string on a per-site basis.
2019-04-21Allow to override UserAgentLaurent Arnoud1-6/+8
Adding on command line the user agent add a duplicate header: ``` ./w3m -header "User-Agent: Mozilla" http://localhost:9999 GET / HTTP/1.0 User-Agent: w3m/0.5.3+git20190105 Accept: text/html, text/*;q=0.5, image/*, application/*, message/*, x-scheme-handler/*, audio/*, video/*, inode/* Accept-Encoding: gzip, compress, bzip, bzip2, deflate Accept-Language: en;q=1.0 Host: localhost:9999 Pragma: no-cache Cache-control: no-cache User-Agent: Mozilla ``` As a result most server will take the first given; the default w3m_version or the one defined on config `user_agent` With this patch we can now override `User-Agent` from command line
2018-10-26Indentation fixTatsuya Kinoshita1-1/+1
2018-10-24Do not use deprecated features with openssl-1.1Mark Wright1-1/+5
2018-03-04Add error handling code for fopenJia Zhouyang1-0/+4
Check the return code of fopen, and return when it fails.
2018-01-06Fix multi-character character constant for ssl_forbid_methodTatsuya Kinoshita1-3/+3
2018-01-06Extend ssl_forbid_method to disable TLSv1.1se1-0/+4
Origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874218#5
2016-11-17Prevent global-buffer-overflow in parseURL()Tatsuya Kinoshita1-1/+4
Bug-Debian: https://github.com/tats/w3m/issues/41
2016-03-30Disable RC4Leo Famulari1-1/+1
Origin: http://git.savannah.gnu.org/cgit/guix.git/commit/?id=62339e2d493bf87a3aabe12e45458581e9705d83
2016-03-29Fix variable is reassigned a value before the old one has been usedTatsuya Kinoshita1-1/+1
2016-03-29Fix style of array index is used before limits checkTatsuya Kinoshita1-1/+1
Bug: https://sourceforge.net/p/w3m/feature-requests/25/
2015-08-11Remove dead assignments flagged by Clang static analysisDavid Crosby1-4/+2
2015-08-09http requests: use Content-Length instead of Content-lengthAlan Grow1-4/+4
2014-06-23Disable ciphers that use keys smaller than 128 bitsTatsuya Kinoshita1-0/+1
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/w3m/+bug/1325674
2013-11-07Use SSL_MODE_RELEASE_BUFFERS if availableCristian Rodriguez1-0/+5
Patch from openSUSE on 2012-11-12: https://build.opensuse.org/request/show/141054
2013-11-07Use SSL_OP_NO_COMPRESSION if availableCristian Rodriguez1-0/+3
Due to the "CRIME attack" (CVE-2012-4929) HTTPS clients that negotiate TLS-level compression can be abused for MITM attacks. Patch from openSUSE on 2012-11-12: https://build.opensuse.org/request/show/141054
2013-10-14Define schemeNumToName() to fix scheme bugAIDA Shinra1-10/+21
Patch from <http://www.j10n.org/files/w3m-cvs-1.1055-schemebug.patch>, [w3m-dev:04470] on 2013-10-14.
2013-04-08Support the siteconf featureTatsuya Kinoshita1-23/+99
Patch to support the siteconf feature, from [w3m-dev 04463] on 2012-06-27, provided by AIDA Shinra.
2011-05-04Adding upstream version 0.5.3upstream/0.5.3Tatsuya Kinoshita1-13/+27
2011-05-04Adding upstream version 0.5.2upstream/0.5.2Tatsuya Kinoshita1-12/+18
2011-05-04Adding upstream version 0.5.1upstream/0.5.1Tatsuya Kinoshita1-0/+2216
2010-12-15[w3m-dev 04424] http://www.j10n.org/files/w3m-cvs-1.1040-misc.patchIto Hiroyuki1-11/+17
2010-12-11[w3m-dev 04421] Patch to prevent sending Referer: ' header from HTTPS to HTTPIto Hiroyuki1-1/+7
2010-08-03* register user name and password for proxy authentication.Ito Hiroyuki1-3/+1
* remove option -pauth
2010-07-20* url.c (openSSLHandle): add support for TLS SNI (Server NameIndication)Ito Hiroyuki1-1/+4
2010-07-18http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=242599#21Ito Hiroyuki1-1/+2
* file.c (is_html_type): added. (examineFile, loadGeneralFile, _saveBuffer) (openGeneralPagerBuffer, reloadBuffer): use is_html_type() instead of strcasecmp(). (loadGeneralFile): set f.guess_tupe * display.c (displayBuffer): use is_html_type() instead of strcasecmp(). * buffer.c (reshapeBuffer): use is_html_type() instead of strcasecmp(). * backend.c (internal_get): use is_html_type() instead of strcasecmp().