aboutsummaryrefslogtreecommitdiffstats
path: root/url.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2021-02-13Use ssl_ca_file and ssl_ca_path only when ssl_verify_serverTatsuya Kinoshita1-0/+1
2021-02-12Check empty string conditions for ssl_ca_file and ssl_ca_pathTatsuya Kinoshita1-1/+2
2021-02-12Fix OpenSSL default always overrides ssl_ca_file and ssl_ca_pathTatsuya Kinoshita1-1/+1
2021-02-11Mention -insecure option as a workaround for SSL errorTatsuya Kinoshita1-5/+2
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934493 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953045
2021-02-11Update ssl_min_version to accept "all" and reject "SSLv2"Tatsuya Kinoshita1-6/+6
2021-02-10Mention ssl_* options as a workaround for SSL errorTatsuya Kinoshita1-2/+5
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934493 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953045
2021-02-10New option ssl_min_version for OpenSSL 1.1Tatsuya Kinoshita1-0/+43
2021-02-10New option ssl_cipher to specify ciphers for TLSv1.2 and belowTatsuya Kinoshita1-3/+5
2020-12-16Use the default ciphers for OpenSSL 1.1 and laterTatsuya Kinoshita1-0/+2
cf. https://bugs.launchpad.net/ubuntu/+source/w3m/+bug/1325674 https://src.fedoraproject.org/rpms/w3m/blob/36f14df378762a3a03a6a724583ca5b0ff618ed5/f/Fix-the-cipher-list-string-to-ensure-that-it-contain.patch https://fedoraproject.org/wiki/Packaging:CryptoPolicies
2020-12-02Add support for Gopher items 5 and Ibptato1-0/+2
2020-11-07Remove useless loopbptato1-5/+0
2020-11-07Remove unnecessary variable assignmentbptato1-1/+0
2020-11-07Support Gopher items search (7) and binary file (9)bptato1-0/+14
2020-10-21Moved back filetype indicator to the beginning of file namesbptato1-12/+30
2020-10-21Improved gopher supportbptato1-8/+25
2020-09-15Add support for file://hostname/... URLsBruno Haible1-5/+31
Origin: https://github.com/tats/w3m/files/3488813/file-hostname-support.diff.gz Bug-Debian: https://github.com/tats/w3m/issues/120
2020-03-11Extend ssl_forbid_method for TLSv1.2 and TLSv1.3Tatsuya Kinoshita1-0/+10
2019-06-30Allow setting User Agent in SiteconfAzure1-1/+4
Since Google gives usable search results to Lynx but not to w3m, and many other sites block Lynx but /not/ w3m, we want to be able to set the User Agent string on a per-site basis.
2019-04-21Allow to override UserAgentLaurent Arnoud1-6/+8
Adding on command line the user agent add a duplicate header: ``` ./w3m -header "User-Agent: Mozilla" http://localhost:9999 GET / HTTP/1.0 User-Agent: w3m/0.5.3+git20190105 Accept: text/html, text/*;q=0.5, image/*, application/*, message/*, x-scheme-handler/*, audio/*, video/*, inode/* Accept-Encoding: gzip, compress, bzip, bzip2, deflate Accept-Language: en;q=1.0 Host: localhost:9999 Pragma: no-cache Cache-control: no-cache User-Agent: Mozilla ``` As a result most server will take the first given; the default w3m_version or the one defined on config `user_agent` With this patch we can now override `User-Agent` from command line
2018-10-26Indentation fixTatsuya Kinoshita1-1/+1
2018-10-24Do not use deprecated features with openssl-1.1Mark Wright1-1/+5
2018-03-04Add error handling code for fopenJia Zhouyang1-0/+4
Check the return code of fopen, and return when it fails.
2018-01-06Fix multi-character character constant for ssl_forbid_methodTatsuya Kinoshita1-3/+3
2018-01-06Extend ssl_forbid_method to disable TLSv1.1se1-0/+4
Origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874218#5
2016-11-17Prevent global-buffer-overflow in parseURL()Tatsuya Kinoshita1-1/+4
Bug-Debian: https://github.com/tats/w3m/issues/41
2016-03-30Disable RC4Leo Famulari1-1/+1
Origin: http://git.savannah.gnu.org/cgit/guix.git/commit/?id=62339e2d493bf87a3aabe12e45458581e9705d83
2016-03-29Fix variable is reassigned a value before the old one has been usedTatsuya Kinoshita1-1/+1
2016-03-29Fix style of array index is used before limits checkTatsuya Kinoshita1-1/+1
Bug: https://sourceforge.net/p/w3m/feature-requests/25/
2015-08-11Remove dead assignments flagged by Clang static analysisDavid Crosby1-4/+2
2015-08-09http requests: use Content-Length instead of Content-lengthAlan Grow1-4/+4
2014-06-23Disable ciphers that use keys smaller than 128 bitsTatsuya Kinoshita1-0/+1
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/w3m/+bug/1325674
2013-11-07Use SSL_MODE_RELEASE_BUFFERS if availableCristian Rodriguez1-0/+5
Patch from openSUSE on 2012-11-12: https://build.opensuse.org/request/show/141054
2013-11-07Use SSL_OP_NO_COMPRESSION if availableCristian Rodriguez1-0/+3
Due to the "CRIME attack" (CVE-2012-4929) HTTPS clients that negotiate TLS-level compression can be abused for MITM attacks. Patch from openSUSE on 2012-11-12: https://build.opensuse.org/request/show/141054
2013-10-14Define schemeNumToName() to fix scheme bugAIDA Shinra1-10/+21
Patch from <http://www.j10n.org/files/w3m-cvs-1.1055-schemebug.patch>, [w3m-dev:04470] on 2013-10-14.
2013-04-08Support the siteconf featureTatsuya Kinoshita1-23/+99
Patch to support the siteconf feature, from [w3m-dev 04463] on 2012-06-27, provided by AIDA Shinra.
2011-05-04Adding upstream version 0.5.3upstream/0.5.3Tatsuya Kinoshita1-13/+27
2011-05-04Adding upstream version 0.5.2upstream/0.5.2Tatsuya Kinoshita1-12/+18
2011-05-04Adding upstream version 0.5.1upstream/0.5.1Tatsuya Kinoshita1-0/+2216
2010-12-15[w3m-dev 04424] http://www.j10n.org/files/w3m-cvs-1.1040-misc.patchIto Hiroyuki1-11/+17
2010-12-11[w3m-dev 04421] Patch to prevent sending Referer: ' header from HTTPS to HTTPIto Hiroyuki1-1/+7
2010-08-03* register user name and password for proxy authentication.Ito Hiroyuki1-3/+1
* remove option -pauth
2010-07-20* url.c (openSSLHandle): add support for TLS SNI (Server NameIndication)Ito Hiroyuki1-1/+4
2010-07-18http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=242599#21Ito Hiroyuki1-1/+2
* file.c (is_html_type): added. (examineFile, loadGeneralFile, _saveBuffer) (openGeneralPagerBuffer, reloadBuffer): use is_html_type() instead of strcasecmp(). (loadGeneralFile): set f.guess_tupe * display.c (displayBuffer): use is_html_type() instead of strcasecmp(). * buffer.c (reshapeBuffer): use is_html_type() instead of strcasecmp(). * backend.c (internal_get): use is_html_type() instead of strcasecmp().
2007-05-23[w3m-dev 04155] fix for minpw.Dai Sato1-1/+10
2006-12-10add LiveHTTPHeaders-like option: -reqlog.Dai Sato1-9/+5
2006-05-29[w3m-dev-en 01067] decode content-encoding in all situations.Dai Sato1-2/+3
2006-04-07rewind to 10 Feb 2006.Dai Sato1-10/+1
2006-04-05apply multiple patches on w3m-dev(-en) ML since Jun 2005 to Jan 2006.Dai Sato1-1/+10
2006-02-10replace pclose passed to localcgi_post/get() with fclose in openURL()Dai Sato1-3/+3
2004-04-16[w3m-dev 04064] authenticationFumitoshi UKAI1-28/+1
closes: Bug#:244029: w3m: HTTP basic authentication annoyance * fm.h (auth_cookie): deleted * proto.h (find_auth_cookie): deleted (add_auth_cookie): deleted (add_auth_user_passwd): added (invalidate_auth_user_passwd): added * etc.c (auth_pass): add bad flag delete file (dir_under): deleted (add_auth_pass_entry): add override flag no need to check file (find_auth_pass_entry): delete file check bad flag check uname (find_auth_user_passwd): find by pu->user (add_auth_user_passwd): added (invalidate_auth_user_passwd): added (parsePasswd): add no override ignore file (find_auth): deleted (find_auth_cookie): deleted (dump_auth_cookie): deleted (add_auth_cookie): deleted * file.c (getAuthCookie): add *uname, *pwd rewrite (loadGeneralFile): delete ss, add uname, pwd use add_auth_user_passwd instead of add_auth_cookie * url.c (HTTPrequest): don't authorization here it should be done in getAuthCookie in loadGeneralFile through extra_header * ftp.c (openFTPStream): add uname use find_auth_user_passwd instead of find_auth_cookie use add_auth_user_passwd instead of add_auth_cookie