<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/libgit2.git/tests/online/badssl.c, branch ethomson/test_https</title>
<subtitle>github.com: libgit2/libgit2.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/'/>
<entry>
<title>badssl: RC4 should not fail with ECERTIFICATE</title>
<updated>2020-12-14T10:43:07+00:00</updated>
<author>
<name>Edward Thomson</name>
<email>ethomson@edwardthomson.com</email>
</author>
<published>2020-12-14T10:43:07+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=589b8129e065b0bcfdbb7c4eee815b6e149218bc'/>
<id>589b8129e065b0bcfdbb7c4eee815b6e149218bc</id>
<content type='text'>
Using RC4 is not a _certificate_ problem, it's a cipher problem.  The
SSL implementation should and will fail with an unrecoverable error
(-1).  There's no opportunity to accept/continue.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Using RC4 is not a _certificate_ problem, it's a cipher problem.  The
SSL implementation should and will fail with an unrecoverable error
(-1).  There's no opportunity to accept/continue.
</pre>
</div>
</content>
</entry>
<entry>
<title>badssl: re-enable RC4 test</title>
<updated>2020-12-13T15:56:36+00:00</updated>
<author>
<name>Carlos Martín Nieto</name>
<email>cmn@dwim.me</email>
</author>
<published>2017-11-18T14:51:08+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=89ffa98eacde35b045b16586be196dc2ca89ab0c'/>
<id>89ffa98eacde35b045b16586be196dc2ca89ab0c</id>
<content type='text'>
This used to fail with an error indicating a mis-use of OpenSSL on platforms
using it due to poor error handling. Re-enable it even if this isn't the right
error code to use for now.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This used to fail with an error indicating a mis-use of OpenSSL on platforms
using it due to poor error handling. Re-enable it even if this isn't the right
error code to use for now.
</pre>
</div>
</content>
</entry>
<entry>
<title>cmake: define GIT_HTTPS when HTTPS is supported</title>
<updated>2017-04-25T08:15:59+00:00</updated>
<author>
<name>Patrick Steinhardt</name>
<email>ps@pks.im</email>
</author>
<published>2017-04-25T08:14:19+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=a4de1ae38980ea52d675d52d60d19f1bec61c127'/>
<id>a4de1ae38980ea52d675d52d60d19f1bec61c127</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>https: don't test that RC4 is invalid</title>
<updated>2017-01-09T18:32:11+00:00</updated>
<author>
<name>Carlos Martín Nieto</name>
<email>cmn@dwim.me</email>
</author>
<published>2017-01-09T17:53:21+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=2ac57aa89bde788173b54bd153430369deec64c0'/>
<id>2ac57aa89bde788173b54bd153430369deec64c0</id>
<content type='text'>
None of our crypto backends actually reject RC4 as a cipher so don't
test for it and instead keep it as something we'd like to do.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
None of our crypto backends actually reject RC4 as a cipher so don't
test for it and instead keep it as something we'd like to do.
</pre>
</div>
</content>
</entry>
<entry>
<title>http: correct the expected error for RC4</title>
<updated>2017-01-09T17:58:58+00:00</updated>
<author>
<name>Carlos Martín Nieto</name>
<email>cmn@dwim.me</email>
</author>
<published>2017-01-09T17:50:17+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=3829ba2e710553893faf6336cc6b2f3fc17a293e'/>
<id>3829ba2e710553893faf6336cc6b2f3fc17a293e</id>
<content type='text'>
We must make sure that we're getting a certificate error from the
library so we know that we're testing the right thing.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We must make sure that we're getting a certificate error from the
library so we know that we're testing the right thing.
</pre>
</div>
</content>
</entry>
<entry>
<title>http: perform 'badssl' check also via certificate callback</title>
<updated>2017-01-06T17:09:52+00:00</updated>
<author>
<name>Carlos Martín Nieto</name>
<email>cmn@dwim.me</email>
</author>
<published>2017-01-06T10:51:31+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=98d66240ecb7765e191da19b535c75c92ccc90fe'/>
<id>98d66240ecb7765e191da19b535c75c92ccc90fe</id>
<content type='text'>
Make sure that the callbacks do also get a 'valid' value of zero when
the certificate we're looking at is in valid and assert that within the
test.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Make sure that the callbacks do also get a 'valid' value of zero when
the certificate we're looking at is in valid and assert that within the
test.
</pre>
</div>
</content>
</entry>
<entry>
<title>Use general cl_git_fail because the error is generic</title>
<updated>2016-03-14T12:41:41+00:00</updated>
<author>
<name>Dirkjan Bussink</name>
<email>d.bussink@gmail.com</email>
</author>
<published>2016-03-14T12:41:41+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=c577efbbb5565d078a08eae211cfb04987199809'/>
<id>c577efbbb5565d078a08eae211cfb04987199809</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Setup better defaults for OpenSSL ciphers</title>
<updated>2016-03-14T12:07:13+00:00</updated>
<author>
<name>Dirkjan Bussink</name>
<email>d.bussink@gmail.com</email>
</author>
<published>2016-03-14T12:02:00+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=fa72d6daf8624b9d2b11566625d0f588016c11db'/>
<id>fa72d6daf8624b9d2b11566625d0f588016c11db</id>
<content type='text'>
This ensures that when using OpenSSL a safe default set of ciphers
is selected. This is done so that the client communicates securely
and we don't accidentally enable unsafe ciphers like RC4, or even
worse some old export ciphers.

Implements the first part of https://github.com/libgit2/libgit2/issues/3682
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This ensures that when using OpenSSL a safe default set of ciphers
is selected. This is done so that the client communicates securely
and we don't accidentally enable unsafe ciphers like RC4, or even
worse some old export ciphers.

Implements the first part of https://github.com/libgit2/libgit2/issues/3682
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix build for unit test</title>
<updated>2015-11-02T21:19:25+00:00</updated>
<author>
<name>Leo Yang</name>
<email>lyang@topologyinc.com</email>
</author>
<published>2015-10-30T17:53:53+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=505e4531b7e52daf6caa9eac9904d9a014e0d14f'/>
<id>505e4531b7e52daf6caa9eac9904d9a014e0d14f</id>
<content type='text'>
If none of GIT_OPENSSL, GIT_WINHTTP or GIT_SECURE_TRANSPORT
is defined we should also be able to build the unit test.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If none of GIT_OPENSSL, GIT_WINHTTP or GIT_SECURE_TRANSPORT
is defined we should also be able to build the unit test.
</pre>
</div>
</content>
</entry>
<entry>
<title>net: add tests against badssl.com</title>
<updated>2015-09-27T20:56:25+00:00</updated>
<author>
<name>Carlos Martín Nieto</name>
<email>cmn@dwim.me</email>
</author>
<published>2015-09-27T20:48:39+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=53a2870514fb06b7aebfd1c55c19a61704906596'/>
<id>53a2870514fb06b7aebfd1c55c19a61704906596</id>
<content type='text'>
These provide bad X.509 certificates, which we should refuse to connect
to by default.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
These provide bad X.509 certificates, which we should refuse to connect
to by default.
</pre>
</div>
</content>
</entry>
</feed>
