<feed xmlns='http://www.w3.org/2005/Atom'>
<title>interimap/tests/certs, branch debian/0.5.5-1</title>
<subtitle>Fast bidirectional synchronization for QRESYNC-capable IMAP servers</subtitle>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/'/>
<entry>
<title>libinterimap: add support for the TLS SNI (Server Name Indication) extension.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T20:52:44+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=4ed6f0982cc0553e31e7beadf441beb8573a07d4'/>
<id>4ed6f0982cc0553e31e7beadf441beb8573a07d4</id>
<content type='text'>
This is controlled by the new 'SSL_hostname' option.  The default value
of that option is the value of the 'host' option when it is hostname,
and the empty string (which disables SNI) when it is an IP literal.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This is controlled by the new 'SSL_hostname' option.  The default value
of that option is the value of the 'host' option when it is hostname,
and the empty string (which disables SNI) when it is an IP literal.
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: make SSL_verify check the hostname as well.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T18:39:10+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=265f133600e9812726a52ea3067409ed3578e882'/>
<id>265f133600e9812726a52ea3067409ed3578e882</id>
<content type='text'>
More precisely, ensure that the certificate Subject Alternative Name
(SAN) or Subject CommonName (CN) matches the hostname or IP literal
specified by the 'host' option.  Previously it was only verifying the
chain of trust.

This bumps the minimum Net::SSLeay version to 1.83 and OpenSSL version
1.0.2.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
More precisely, ensure that the certificate Subject Alternative Name
(SAN) or Subject CommonName (CN) matches the hostname or IP literal
specified by the 'host' option.  Previously it was only verifying the
chain of trust.

This bumps the minimum Net::SSLeay version to 1.83 and OpenSSL version
1.0.2.
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: always generate new certificates on `make test`.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T13:34:48+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=26e5c04abfb81bdcbd4d89d9f9329b8433920b26'/>
<id>26e5c04abfb81bdcbd4d89d9f9329b8433920b26</id>
<content type='text'>
In addition, sign test certificates with the same root CA.  Hence
running `make test` now requires OpenSSL 1.1.1 or later.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In addition, sign test certificates with the same root CA.  Hence
running `make test` now requires OpenSSL 1.1.1 or later.
</pre>
</div>
</content>
</entry>
</feed>
