summaryrefslogtreecommitdiff
path: root/content/fetchers
Commit message (Collapse)AuthorAgeFilesLines
* fetchers/curl: Move report_certs function outside WITH_OPENSSLDaniel Silverstone2020-05-221-21/+22
| | | | Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* query/ssl: Include link to view certificate detailsDaniel Silverstone2020-05-221-1/+9
| | | | Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* about: Rework freeing the san_names structureDaniel Silverstone2020-05-191-1/+11
| | | | | | | | | AmiSSL's approach to replacing 90% of OpenSSL calls with assembly means that the official way to pop_free a stack type won't work. As such, we open-code it here. Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* add subject alternative names to certificate viewerVincent Sanders2020-05-181-0/+103
|
* Page info: Improve certificate fault display style.Michael Drake2020-05-181-6/+9
|
* Display errors properly in certificate windowVincent Sanders2020-05-181-5/+19
|
* Improve certificate page styling.Michael Drake2020-05-171-7/+35
|
* add fingerprints to the certificate viewerVincent Sanders2020-05-171-0/+115
|
* split out public key table formatted outputVincent Sanders2020-05-171-55/+68
|
* use entity for colon in certificate hex values to allow netsurf to break ↵Vincent Sanders2020-05-171-2/+10
| | | | properly
* get the sign right on the certificate openssl compatability interfaceVincent Sanders2020-05-171-2/+2
|
* fix typo in certificate openssl compatabilityVincent Sanders2020-05-171-1/+1
|
* add openssl compatability to certificate decodeVincent Sanders2020-05-171-12/+91
|
* make about handler ssenddataf cope with longer dataVincent Sanders2020-05-161-2/+24
|
* improve certificate viewerVincent Sanders2020-05-161-77/+593
|
* curl: Pass cert chain on even if we get no headersDaniel Silverstone2020-05-041-0/+4
| | | | Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* About pages: Update presentation using nscolour.Michael Drake2020-04-071-100/+95
|
* about fetcher: Add about:nscolour.css generated colour stylesheet.Michael Drake2020-04-071-0/+46
|
* about: Add handling for unknown about: pageDaniel Silverstone2020-03-221-2/+28
| | | | Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* Internal content: Restyle certificate viewer page.Michael Drake2020-02-241-7/+43
|
* about scheme certificate viewer initial implementationVincent Sanders2020-02-241-1/+279
|
* Curl fetcher: Guard against read of uninitialised value.Michael Drake2020-02-241-0/+3
| | | | | | | Fixes Coverity issue: CID 1419830: Memory - illegal accesses (UNINIT) >>> Using uninitialized value "buf[depth]".
* Curl fetcher: Squash coverity warning.Michael Drake2020-02-241-3/+2
| | | | | CID 1419832: Control flow issues (DEADCODE) >>> Execution cannot reach this statement: "goto out;".
* fetchers: Rework the about, data, file, and resource fetcher poll loopDaniel Silverstone2020-02-244-123/+50
| | | | | | | This simplifies the poll loops a little more and makes me less worried that some other corner case will bite us in the future. Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* About fetches resources: Drop maps resource.Michael Drake2020-02-242-30/+0
| | | | It had bitrotted.
* fetchers: Apply cleaner ring handling mechanic to other fetchersDaniel Silverstone2020-02-243-3/+48
| | | | Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* about: Correct handling of ring in fetch_about_pollDaniel Silverstone2020-02-241-1/+16
| | | | Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* curl: Implement SSL chain cache in cURL fetcherDaniel Silverstone2020-02-231-8/+150
| | | | | | | | | | | Because cURL can do connection caching behind the scenes, we need to have a cache for the SSL certificate chains which we send onward on first header back from cURL. This uses the new hashmap implementation to mean that we cache chains on a hostname:port basis. Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* Keep the complete certificate chain from a fetchVincent Sanders2020-02-231-120/+57
| | | | | | | | | Instead of extracting information from the X509 certificate chain in the fetcher the entire chain is propagated in Distinguished Encoding Rules (DER) format. This allows all the information contained in a certificate chain to be retained which can subsequently be presented to the user
* fetch_curl_report_certs_upstream: Use new SSL_CERT_ERR_CERT_MISSINGDaniel Silverstone2019-12-031-1/+5
| | | | Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* fetch_curl_verify_callback: Do depth update after checkDaniel Silverstone2019-12-031-5/+5
| | | | Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* Data fetcher: Include stdarg.h header.Michael Drake2019-11-121-0/+1
|
* Data fetcher: Squash BSD warning.Michael Drake2019-11-111-4/+3
|
* File fetcher: Optimise HTTP header generation.Michael Drake2019-11-101-6/+8
|
* Resource fetcher: Optimise HTTP header generation.Michael Drake2019-11-101-6/+8
|
* Resource fetcher: Add Cache-Control header with max-age of a year.Michael Drake2019-11-101-0/+5
| | | | | Resource URLs can't change, we want to assume they're fresh for as long as we can.
* Data fetcher: Add Cache-Control header with max-age of a year.Michael Drake2019-11-101-0/+6
| | | | | Data URLs can't change, we want to assume they're fresh for as long as we can.
* Data fetcher: Split header emitting out into helper.Michael Drake2019-11-101-15/+26
|
* Data fetcher: Move fetch_data_send_callback towards top of file.Michael Drake2019-11-101-8/+8
|
* File fetcher: Avoid atoi for If-None-Match value parse.Michael Drake2019-11-091-12/+21
| | | | The file fetcher emits FETCH_NOTMODIFIED if the file is unchanged.
* Resource fetcher: Fix ETag handling.Michael Drake2019-11-091-10/+19
| | | | | | | | * Changed ETag storage to be time_t, rather than int. * Changed `If-None-Match` value parsing to use proper time_t parsing, rather than `atoi`. We emit FETCH_NOTMODIFIED if the resource hasn't changed.
* remove user warnings from hotlist load and curl pollVincent Sanders2019-11-051-2/+2
|
* move the fallback text for about handler into messages handlerVincent Sanders2019-10-301-88/+38
|
* add internal query handler for fetch errorsVincent Sanders2019-10-301-0/+136
| | | | | | | | | | | | | Any errors from the fetch which are not already handled are reported with an internal query page instead of a modal dialog. This is much less invasive for the user and much more in keeping with how this is handled by other browsers. The handler is similar to the timeout handler but the functionality is kept separate as it is intended timeout handling be extended in future.
* add internal query page for request timeoutsVincent Sanders2019-10-291-6/+147
|
* fetchers/curl: Restrict AUTH to BASICDaniel Silverstone2019-10-211-1/+1
| | | | | | | | | | | | | cURL will prevent channel reuse if NTLM auth is enabled because NTLM authenticates a channel not a request. As such we were unable to reuse curl handles since we handed off connection reuse to curl instead of our own handle cache. This mitigates the effect, though curl authors are looking at fixing it upstream too. Fixes: #2707 Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* Use curl API (versions after 7.56.0) to determine if openssl is in useVincent Sanders2019-10-011-4/+23
|
* Allow the curl fetcher to be built without openssl.Vincent Sanders2019-09-301-30/+61
| | | | | | | | | | The curl fetcher can operate without openssl library being available, additionaly curl itself may be compiled with a different TLS library. In either case this will simply cause the "unknown" error to be reported for all TLS failiures and page information to lack any certificate information.
* SSL Error: Enable OpenSSL hostname verificationDaniel Silverstone2019-08-141-16/+19
| | | | | | | | Since OpenSSL 1.0.2 there has been hostname verification support which cURL doesn't turn on for some reason. Turn it on so that we get better hostname verification handling. Signed-off-by: Daniel Silverstone <dsilvers@digital-scurf.org>
* add English message text for ssl errorsVincent Sanders2019-08-101-1/+1
|