summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRob Kendrick <rjek@netsurf-browser.org>2007-06-27 16:06:42 +0000
committerRob Kendrick <rjek@netsurf-browser.org>2007-06-27 16:06:42 +0000
commit31cde5dcdef072377916d81ba9388cf8f2c9e53f (patch)
tree6ecc4e674fa7bc213649714561eced13a2f94a12
parent2c27a6ad550ba9bee78e94f0c2a223e44d75a564 (diff)
downloadnetsurf-31cde5dcdef072377916d81ba9388cf8f2c9e53f.tar.gz
netsurf-31cde5dcdef072377916d81ba9388cf8f2c9e53f.tar.bz2
Add stop-gap SSL cert verification. Currently ignores problems and continues anyway to allow access to SSL sites. A dialogue box providing the user with an opportunity to decline the certificate is on the TODO list.
svn path=/trunk/netsurf/; revision=3371
-rw-r--r--gtk/gtk_gui.c12
1 files changed, 11 insertions, 1 deletions
diff --git a/gtk/gtk_gui.c b/gtk/gtk_gui.c
index 4e0aa952a..ae751d36b 100644
--- a/gtk/gtk_gui.c
+++ b/gtk/gtk_gui.c
@@ -426,7 +426,17 @@ void hotlist_visited(struct content *content)
}
void gui_cert_verify(struct browser_window *bw, struct content *c,
- const struct ssl_cert_info *certs, unsigned long num) {}
+ const struct ssl_cert_info *certs, unsigned long num)
+{
+
+ /* TODO: we should open a window showing what the certificate
+ * problem is and offer the user the choice to reject it. Until
+ * we do this, we just always accept them.
+ * */
+
+ urldb_set_cert_permissions(c->url, true);
+ browser_window_go(bw, c->url, 0, true);
+}
utf8_convert_ret utf8_to_local_encoding(const char *string, size_t len,
char **result)