Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Don't fallback when SSL_CTX_load_verify_locations fails | Tatsuya Kinoshita | 2021-02-22 | 1 | -5/+11 |
| | |||||
* | Don't use SSL_CTX_set_default_verify_paths when not USE_SSL_VERIFY | Tatsuya Kinoshita | 2021-02-22 | 1 | -1/+1 |
| | |||||
* | Use ssl_ca_file and ssl_ca_path only when ssl_verify_server | Tatsuya Kinoshita | 2021-02-13 | 1 | -0/+1 |
| | |||||
* | Check empty string conditions for ssl_ca_file and ssl_ca_path | Tatsuya Kinoshita | 2021-02-12 | 1 | -1/+2 |
| | |||||
* | Fix OpenSSL default always overrides ssl_ca_file and ssl_ca_path | Tatsuya Kinoshita | 2021-02-12 | 1 | -1/+1 |
| | |||||
* | Mention -insecure option as a workaround for SSL error | Tatsuya Kinoshita | 2021-02-11 | 1 | -5/+2 |
| | | | | | | Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934493 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953045 | ||||
* | Update ssl_min_version to accept "all" and reject "SSLv2" | Tatsuya Kinoshita | 2021-02-11 | 1 | -6/+6 |
| | |||||
* | Mention ssl_* options as a workaround for SSL error | Tatsuya Kinoshita | 2021-02-10 | 1 | -2/+5 |
| | | | | | | Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900984 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934493 Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953045 | ||||
* | New option ssl_min_version for OpenSSL 1.1 | Tatsuya Kinoshita | 2021-02-10 | 1 | -0/+43 |
| | |||||
* | New option ssl_cipher to specify ciphers for TLSv1.2 and below | Tatsuya Kinoshita | 2021-02-10 | 1 | -3/+5 |
| | |||||
* | Use the default ciphers for OpenSSL 1.1 and later | Tatsuya Kinoshita | 2020-12-16 | 1 | -0/+2 |
| | | | | | | cf. https://bugs.launchpad.net/ubuntu/+source/w3m/+bug/1325674 https://src.fedoraproject.org/rpms/w3m/blob/36f14df378762a3a03a6a724583ca5b0ff618ed5/f/Fix-the-cipher-list-string-to-ensure-that-it-contain.patch https://fedoraproject.org/wiki/Packaging:CryptoPolicies | ||||
* | Add support for Gopher items 5 and I | bptato | 2020-12-02 | 1 | -0/+2 |
| | |||||
* | Remove useless loop | bptato | 2020-11-07 | 1 | -5/+0 |
| | |||||
* | Remove unnecessary variable assignment | bptato | 2020-11-07 | 1 | -1/+0 |
| | |||||
* | Support Gopher items search (7) and binary file (9) | bptato | 2020-11-07 | 1 | -0/+14 |
| | |||||
* | Moved back filetype indicator to the beginning of file names | bptato | 2020-10-21 | 1 | -12/+30 |
| | |||||
* | Improved gopher support | bptato | 2020-10-21 | 1 | -8/+25 |
| | |||||
* | Add support for file://hostname/... URLs | Bruno Haible | 2020-09-15 | 1 | -5/+31 |
| | | | | | Origin: https://github.com/tats/w3m/files/3488813/file-hostname-support.diff.gz Bug-Debian: https://github.com/tats/w3m/issues/120 | ||||
* | Extend ssl_forbid_method for TLSv1.2 and TLSv1.3 | Tatsuya Kinoshita | 2020-03-11 | 1 | -0/+10 |
| | |||||
* | Allow setting User Agent in Siteconf | Azure | 2019-06-30 | 1 | -1/+4 |
| | | | | | | Since Google gives usable search results to Lynx but not to w3m, and many other sites block Lynx but /not/ w3m, we want to be able to set the User Agent string on a per-site basis. | ||||
* | Allow to override UserAgent | Laurent Arnoud | 2019-04-21 | 1 | -6/+8 |
| | | | | | | | | | | | | | | | | | | | | | | | Adding on command line the user agent add a duplicate header: ``` ./w3m -header "User-Agent: Mozilla" http://localhost:9999 GET / HTTP/1.0 User-Agent: w3m/0.5.3+git20190105 Accept: text/html, text/*;q=0.5, image/*, application/*, message/*, x-scheme-handler/*, audio/*, video/*, inode/* Accept-Encoding: gzip, compress, bzip, bzip2, deflate Accept-Language: en;q=1.0 Host: localhost:9999 Pragma: no-cache Cache-control: no-cache User-Agent: Mozilla ``` As a result most server will take the first given; the default w3m_version or the one defined on config `user_agent` With this patch we can now override `User-Agent` from command line | ||||
* | Indentation fix | Tatsuya Kinoshita | 2018-10-26 | 1 | -1/+1 |
| | |||||
* | Do not use deprecated features with openssl-1.1 | Mark Wright | 2018-10-24 | 1 | -1/+5 |
| | |||||
* | Add error handling code for fopen | Jia Zhouyang | 2018-03-04 | 1 | -0/+4 |
| | | | Check the return code of fopen, and return when it fails. | ||||
* | Fix multi-character character constant for ssl_forbid_method | Tatsuya Kinoshita | 2018-01-06 | 1 | -3/+3 |
| | |||||
* | Extend ssl_forbid_method to disable TLSv1.1 | se | 2018-01-06 | 1 | -0/+4 |
| | | | | Origin: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874218#5 | ||||
* | Prevent global-buffer-overflow in parseURL() | Tatsuya Kinoshita | 2016-11-17 | 1 | -1/+4 |
| | | | | Bug-Debian: https://github.com/tats/w3m/issues/41 | ||||
* | Disable RC4 | Leo Famulari | 2016-03-30 | 1 | -1/+1 |
| | | | | Origin: http://git.savannah.gnu.org/cgit/guix.git/commit/?id=62339e2d493bf87a3aabe12e45458581e9705d83 | ||||
* | Fix variable is reassigned a value before the old one has been used | Tatsuya Kinoshita | 2016-03-29 | 1 | -1/+1 |
| | |||||
* | Fix style of array index is used before limits check | Tatsuya Kinoshita | 2016-03-29 | 1 | -1/+1 |
| | | | | Bug: https://sourceforge.net/p/w3m/feature-requests/25/ | ||||
* | Remove dead assignments flagged by Clang static analysis | David Crosby | 2015-08-11 | 1 | -4/+2 |
| | |||||
* | http requests: use Content-Length instead of Content-length | Alan Grow | 2015-08-09 | 1 | -4/+4 |
| | |||||
* | Merge branch 'bug/weak-ciphers' | Tatsuya Kinoshita | 2014-06-23 | 1 | -0/+1 |
|\ | |||||
| * | Disable ciphers that use keys smaller than 128 bits | Tatsuya Kinoshita | 2014-06-23 | 1 | -0/+1 |
| | | | | | | | | Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/w3m/+bug/1325674 | ||||
* | | Merge branch 'bug/openssl' | Tatsuya Kinoshita | 2013-11-07 | 1 | -0/+8 |
|\ \ | |||||
| * | | Use SSL_MODE_RELEASE_BUFFERS if available | Cristian Rodriguez | 2013-11-07 | 1 | -0/+5 |
| | | | | | | | | | | | | | | | Patch from openSUSE on 2012-11-12: https://build.opensuse.org/request/show/141054 | ||||
| * | | Use SSL_OP_NO_COMPRESSION if available | Cristian Rodriguez | 2013-11-07 | 1 | -0/+3 |
| |/ | | | | | | | | | | | | | | | | | Due to the "CRIME attack" (CVE-2012-4929) HTTPS clients that negotiate TLS-level compression can be abused for MITM attacks. Patch from openSUSE on 2012-11-12: https://build.opensuse.org/request/show/141054 | ||||
* | | Merge branch 'bug/schemebug' | Tatsuya Kinoshita | 2013-10-14 | 1 | -10/+21 |
|\ \ | |||||
| * | | Define schemeNumToName() to fix scheme bug | AIDA Shinra | 2013-10-14 | 1 | -10/+21 |
| |/ | | | | | | | | | Patch from <http://www.j10n.org/files/w3m-cvs-1.1055-schemebug.patch>, [w3m-dev:04470] on 2013-10-14. | ||||
* / | Support the siteconf feature | Tatsuya Kinoshita | 2013-04-08 | 1 | -23/+99 |
|/ | | | | | Patch to support the siteconf feature, from [w3m-dev 04463] on 2012-06-27, provided by AIDA Shinra. | ||||
* | Adding upstream version 0.5.3upstream/0.5.3 | Tatsuya Kinoshita | 2011-05-04 | 1 | -13/+27 |
| | |||||
* | Adding upstream version 0.5.2upstream/0.5.2 | Tatsuya Kinoshita | 2011-05-04 | 1 | -12/+18 |
| | |||||
* | Adding upstream version 0.5.1upstream/0.5.1 | Tatsuya Kinoshita | 2011-05-04 | 1 | -0/+2216 |