aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2016-04-03Merge with main repo.Sebastian Geerken
2016-03-19MSGcorvid
2016-03-12MSGcorvid
2016-03-11update hsts_preloadcorvid
2016-03-08openssl 1.0.2f does not like shutdown to be called during handshakecorvid
thread begins here: http://lists.dillo.org/pipermail/dillo-dev/2016-February/010682.html
2016-03-05move include of FL/x.H under #ifdef X_PROTOCOLJohannes Hofmann
This fixes compilation on Mac OS. reported-by: Yves de Champlain
2016-01-23Merge with hg.dillo.org.Sebastian Geerken
2016-01-18update hsts_preloadcorvid
2016-01-07Set proper display for textblocks.Sebastian Geerken
2015-12-21Merge with main repo.Sebastian Geerken
2015-12-13update hsts_preloadcorvid
2015-11-19readable location textcorvid
2015-09-09update hsts_preloadcorvid
2015-07-06Merge with main repo.Sebastian Geerken
2015-07-05wasteful use of strncpycorvid
I never knew that if you give it a small string to copy into a big buffer, it'll waste time filling the rest of it with '\0'.
2015-07-05tls.c a little cleanupcorvid
2015-07-05integrate cert algorithm + key checking code with the other checkscorvid
2015-07-05restore lost initialization of choice_answercorvid
looks like we lost it in "changeset 2768:e7f98f931ed7 Modified a_Dialog_choice5() to accept any number of alternatives [p37sitdu]"
2015-07-04permit secure->insecure redirection for now, add large commentcorvid
2015-07-03let's disallow mixed contentcorvid
2015-07-03pop up dialog when an HTTPS page's form submission is insecurecorvid
2015-07-03enable prefs.http_persistent_conns by defaultcorvid
2015-07-02merge 3.0.5 branchcorvid
2015-06-30release datev3.0.5release-3_0_5corvid
2015-06-29HSTS add the preload listcorvid
2015-06-29prefs.http_strict_transport_securitycorvid
2015-06-29HTTP Strict Transport Securitycorvid
I'm not including the preload file yet.
2015-06-24add a tls test sitecorvid
2015-06-18use [IMG] placeholder even if prefs.load_images is truecorvid
2015-06-17mention the most recent ChangeLog additions in splashcorvid
2015-06-10SRDOP: Work on RTFL messages.Sebastian Geerken
2015-06-03Merge with main repo.Sebastian Geerken
2015-06-03web must be valid in order to continue in a_Http_connect_donecorvid
A site triggers this with a background image where the style is deleted upon </div>, and Capi_stop_client() finds that a_Cache_client_get_if_unique() is false, so nothing aborts the connection. And there's time for this to happen because we're doing TLS handshake. I don't know whether all of what triggered this is doing the right thing, but at least when it comes to capi, we can see that there's the idea of permitting it (with whether we ever actually want that in practice being yet another question). In any case, Http_make_query_str() definitely thinks the web is there. If we really decided that we wanted connections to continue without webs, we could stuff 1) what sort of thing are we requesting? 2) is this a third-party request? into the socket data. Making the query earlier is probably not advisable because we'd want the cookies available at the time that we send the query and not the cookies that were available somewhat earlier.
2015-06-03show certificate hash algorithm (and complain feebly if it's weak)corvid
2015-06-01constcorvid
2015-06-01url: rm unused flagscorvid
2015-06-01rm the old-style url alt stuffcorvid
2015-06-01TLS servers sortedcorvid
2015-06-01url: rm dead codecorvid
2015-05-31mergecorvid
2015-05-31rm MSGcorvid
2015-05-31rm MSGcorvid
2015-05-31fix up socket queuecorvid
2015-05-30fix warningcorvid
2015-05-30print certificate chaincorvid
2015-05-30let's not print tls alerts for 'close notify'corvid
2015-05-29print out TLS version and cipher agreed upon after first connection with servercorvid
2015-05-29documentation and not-currently-possible error casecorvid
2015-05-29some more information for TLS warning popupscorvid
2015-05-28'ssl' -> 'tls' where reasonable, given that ssl3 is dead and allcorvid
I used 'hg rename' and expected (at least hoped) that 'hg diff' would do what I would naturally want, but no.