aboutsummaryrefslogtreecommitdiffstats
path: root/url.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Don't fallback when SSL_CTX_load_verify_locations failsTatsuya Kinoshita2021-02-221-5/+11
|
* Don't use SSL_CTX_set_default_verify_paths when not USE_SSL_VERIFYTatsuya Kinoshita2021-02-221-1/+1
|
* Use ssl_ca_file and ssl_ca_path only when ssl_verify_serverTatsuya Kinoshita2021-02-131-0/+1
|
* Check empty string conditions for ssl_ca_file and ssl_ca_pathTatsuya Kinoshita2021-02-121-1/+2
|
* Fix OpenSSL default always overrides ssl_ca_file and ssl_ca_pathTatsuya Kinoshita2021-02-121-1/+1
|
* Mention -insecure option as a workaround for SSL errorTatsuya Kinoshita2021-02-111-5/+2
| | | | | | Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934493 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953045
* Update ssl_min_version to accept "all" and reject "SSLv2"Tatsuya Kinoshita2021-02-111-6/+6
|
* Mention ssl_* options as a workaround for SSL errorTatsuya Kinoshita2021-02-101-2/+5
| | | | | | Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934493 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953045
* New option ssl_min_version for OpenSSL 1.1Tatsuya Kinoshita2021-02-101-0/+43
|
* New option ssl_cipher to specify ciphers for TLSv1.2 and belowTatsuya Kinoshita2021-02-101-3/+5
|
* Use the default ciphers for OpenSSL 1.1 and laterTatsuya Kinoshita2020-12-161-0/+2
| | | | | | cf. https://bugs.launchpad.net/ubuntu/+source/w3m/+bug/1325674 https://src.fedoraproject.org/rpms/w3m/blob/36f14df378762a3a03a6a724583ca5b0ff618ed5/f/Fix-the-cipher-list-string-to-ensure-that-it-contain.patch https://fedoraproject.org/wiki/Packaging:CryptoPolicies
* Add support for Gopher items 5 and Ibptato2020-12-021-0/+2
|
* Remove useless loopbptato2020-11-071-5/+0
|
* Remove unnecessary variable assignmentbptato2020-11-071-1/+0
|
* Support Gopher items search (7) and binary file (9)bptato2020-11-071-0/+14
|
* Moved back filetype indicator to the beginning of file namesbptato2020-10-211-12/+30
|
* Improved gopher supportbptato2020-10-211-8/+25
|
* Add support for file://hostname/... URLsBruno Haible2020-09-151-5/+31
| | | | | Origin: https://github.com/tats/w3m/files/3488813/file-hostname-support.diff.gz Bug-Debian: https://github.com/tats/w3m/issues/120
* Extend ssl_forbid_method for TLSv1.2 and TLSv1.3Tatsuya Kinoshita2020-03-111-0/+10
|
* Allow setting User Agent in SiteconfAzure2019-06-301-1/+4
| | | | | | Since Google gives usable search results to Lynx but not to w3m, and many other sites block Lynx but /not/ w3m, we want to be able to set the User Agent string on a per-site basis.
* Allow to override UserAgentLaurent Arnoud2019-04-211-6/+8
| | | | | | | | | | | | | | | | | | | | | | | Adding on command line the user agent add a duplicate header: ``` ./w3m -header "User-Agent: Mozilla" http://localhost:9999 GET / HTTP/1.0 User-Agent: w3m/0.5.3+git20190105 Accept: text/html, text/*;q=0.5, image/*, application/*, message/*, x-scheme-handler/*, audio/*, video/*, inode/* Accept-Encoding: gzip, compress, bzip, bzip2, deflate Accept-Language: en;q=1.0 Host: localhost:9999 Pragma: no-cache Cache-control: no-cache User-Agent: Mozilla ``` As a result most server will take the first given; the default w3m_version or the one defined on config `user_agent` With this patch we can now override `User-Agent` from command line
* Indentation fixTatsuya Kinoshita2018-10-261-1/+1
|
* Do not use deprecated features with openssl-1.1Mark Wright2018-10-241-1/+5
|
* Add error handling code for fopenJia Zhouyang2018-03-041-0/+4
| | | Check the return code of fopen, and return when it fails.
* Fix multi-character character constant for ssl_forbid_methodTatsuya Kinoshita2018-01-061-3/+3
|
* Extend ssl_forbid_method to disable TLSv1.1se2018-01-061-0/+4
| | | | Origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874218#5
* Prevent global-buffer-overflow in parseURL()Tatsuya Kinoshita2016-11-171-1/+4
| | | | Bug-Debian: https://github.com/tats/w3m/issues/41
* Disable RC4Leo Famulari2016-03-301-1/+1
| | | | Origin: http://git.savannah.gnu.org/cgit/guix.git/commit/?id=62339e2d493bf87a3aabe12e45458581e9705d83
* Fix variable is reassigned a value before the old one has been usedTatsuya Kinoshita2016-03-291-1/+1
|
* Fix style of array index is used before limits checkTatsuya Kinoshita2016-03-291-1/+1
| | | | Bug: https://sourceforge.net/p/w3m/feature-requests/25/
* Remove dead assignments flagged by Clang static analysisDavid Crosby2015-08-111-4/+2
|
* http requests: use Content-Length instead of Content-lengthAlan Grow2015-08-091-4/+4
|
* Merge branch 'bug/weak-ciphers'Tatsuya Kinoshita2014-06-231-0/+1
|\
| * Disable ciphers that use keys smaller than 128 bitsTatsuya Kinoshita2014-06-231-0/+1
| | | | | | | | Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/w3m/+bug/1325674
* | Merge branch 'bug/openssl'Tatsuya Kinoshita2013-11-071-0/+8
|\ \
| * | Use SSL_MODE_RELEASE_BUFFERS if availableCristian Rodriguez2013-11-071-0/+5
| | | | | | | | | | | | | | | Patch from openSUSE on 2012-11-12: https://build.opensuse.org/request/show/141054
| * | Use SSL_OP_NO_COMPRESSION if availableCristian Rodriguez2013-11-071-0/+3
| |/ | | | | | | | | | | | | | | | | Due to the "CRIME attack" (CVE-2012-4929) HTTPS clients that negotiate TLS-level compression can be abused for MITM attacks. Patch from openSUSE on 2012-11-12: https://build.opensuse.org/request/show/141054
* | Merge branch 'bug/schemebug'Tatsuya Kinoshita2013-10-141-10/+21
|\ \
| * | Define schemeNumToName() to fix scheme bugAIDA Shinra2013-10-141-10/+21
| |/ | | | | | | | | Patch from <http://www.j10n.org/files/w3m-cvs-1.1055-schemebug.patch>, [w3m-dev:04470] on 2013-10-14.
* / Support the siteconf featureTatsuya Kinoshita2013-04-081-23/+99
|/ | | | | Patch to support the siteconf feature, from [w3m-dev 04463] on 2012-06-27, provided by AIDA Shinra.
* Adding upstream version 0.5.3upstream/0.5.3Tatsuya Kinoshita2011-05-041-13/+27
|
* Adding upstream version 0.5.2upstream/0.5.2Tatsuya Kinoshita2011-05-041-12/+18
|
* Adding upstream version 0.5.1upstream/0.5.1Tatsuya Kinoshita2011-05-041-0/+2216