Revision b08edf709dfcd79c3691370930cd89c4b9b16d2f authored by Jeff King on 01 February 2023, 11:39:26 UTC, committed by Junio C Hamano on 01 February 2023, 18:10:34 UTC
Recent versions of openssl will refuse to work with 1024-bit RSA keys,
as they are considered insecure. I didn't track down the exact version
in which the defaults were tightened, but the Debian-package openssl 3.0
on my system yields:

  $ LIB_HTTPD_SSL=1 ./t5551-http-fetch-smart.sh -v -i
  [...]
  SSL Library Error: error:0A00018F:SSL routines::ee key too small
  1..0 # SKIP web server setup failed

This could probably be overcome with configuration, but that's likely
to be a headache (especially if it requires touching /etc/openssl).
Let's just pick a key size that's less outrageously out of date.

Signed-off-by: Jeff King <peff@peff.net>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
1 parent d113449
Raw File
checkout.h
#ifndef CHECKOUT_H
#define CHECKOUT_H

#include "cache.h"

/*
 * Check if the branch name uniquely matches a branch name on a remote
 * tracking branch.  Return the name of the remote if such a branch
 * exists, NULL otherwise.
 */
const char *unique_tracking_name(const char *name,
				 struct object_id *oid,
				 int *dwim_remotes_matched);

#endif /* CHECKOUT_H */
back to top