<feed xmlns='http://www.w3.org/2005/Atom'>
<title>curl/tests/data/test2041, branch master</title>
<subtitle>cURL mirror with patches applied
</subtitle>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/'/>
<entry>
<title>certs: generate tests certs with sha256 digest algorithm</title>
<updated>2018-09-20T07:06:21+00:00</updated>
<author>
<name>Daniel Stenberg</name>
<email>daniel@haxx.se</email>
</author>
<published>2018-09-19T07:04:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=ba782baac3009e44295589743bb8ae8220793e74'/>
<id>ba782baac3009e44295589743bb8ae8220793e74</id>
<content type='text'>
As OpenSSL 1.1.1 starts to complain and fail on sha1 CAs:

"SSL certificate problem: CA signature digest algorithm too weak"

Closes #3014
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
As OpenSSL 1.1.1 starts to complain and fail on sha1 CAs:

"SSL certificate problem: CA signature digest algorithm too weak"

Closes #3014
</pre>
</div>
</content>
</entry>
<entry>
<title>tests/certs: rebuild certs with 2048-bit RSA keys</title>
<updated>2018-09-12T14:09:17+00:00</updated>
<author>
<name>Yiming Jing</name>
<email>jingyiming@baidu.com</email>
</author>
<published>2018-09-10T18:32:23+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=92f9db17466c4e28998a5cf849c7a861093eff23'/>
<id>92f9db17466c4e28998a5cf849c7a861093eff23</id>
<content type='text'>
The previous test certificates contained RSA keys of only 1024 bits.
However, RSA claims that 1024-bit RSA keys are likely to become
crackable some time before 2010. The NIST recommends at least 2048-bit
keys for RSA for now.

Better use full 2048 also for testing.

Closes #2973
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The previous test certificates contained RSA keys of only 1024 bits.
However, RSA claims that 1024-bit RSA keys are likely to become
crackable some time before 2010. The NIST recommends at least 2048-bit
keys for RSA for now.

Better use full 2048 also for testing.

Closes #2973
</pre>
</div>
</content>
</entry>
<entry>
<title>test2041: fixed line endings in protocol part</title>
<updated>2015-07-02T06:32:18+00:00</updated>
<author>
<name>Dan Fandrich</name>
<email>dan@coneharvesters.com</email>
</author>
<published>2015-07-02T06:32:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=ce1bf87a04e3d5e42c2709ed106d62e80669c63b'/>
<id>ce1bf87a04e3d5e42c2709ed106d62e80669c63b</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: Pinned public key hash support</title>
<updated>2015-07-01T17:43:47+00:00</updated>
<author>
<name>moparisthebest</name>
<email>admin@moparisthebest.com</email>
</author>
<published>2015-07-01T00:23:54+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=55b78c5ae94852ffb942ff979e6f25aebfeedb16'/>
<id>55b78c5ae94852ffb942ff979e6f25aebfeedb16</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
