Merge branch 'ep/http-configure-ssl-version'
A new configuration variable http.sslVersion can be used to specify what specific version of SSL/TLS to use to make a connection. * ep/http-configure-ssl-version: http: add support for specifying the SSL version
This commit is contained in:
commit
ed070a4007
@ -1609,6 +1609,29 @@ http.saveCookies::
|
|||||||
If set, store cookies received during requests to the file specified by
|
If set, store cookies received during requests to the file specified by
|
||||||
http.cookieFile. Has no effect if http.cookieFile is unset.
|
http.cookieFile. Has no effect if http.cookieFile is unset.
|
||||||
|
|
||||||
|
http.sslVersion::
|
||||||
|
The SSL version to use when negotiating an SSL connection, if you
|
||||||
|
want to force the default. The available and default version
|
||||||
|
depend on whether libcurl was built against NSS or OpenSSL and the
|
||||||
|
particular configuration of the crypto library in use. Internally
|
||||||
|
this sets the 'CURLOPT_SSL_VERSION' option; see the libcurl
|
||||||
|
documentation for more details on the format of this option and
|
||||||
|
for the ssl version supported. Actually the possible values of
|
||||||
|
this option are:
|
||||||
|
|
||||||
|
- sslv2
|
||||||
|
- sslv3
|
||||||
|
- tlsv1
|
||||||
|
- tlsv1.0
|
||||||
|
- tlsv1.1
|
||||||
|
- tlsv1.2
|
||||||
|
|
||||||
|
+
|
||||||
|
Can be overridden by the 'GIT_SSL_VERSION' environment variable.
|
||||||
|
To force git to use libcurl's default ssl version and ignore any
|
||||||
|
explicit http.sslversion option, set 'GIT_SSL_VERSION' to the
|
||||||
|
empty string.
|
||||||
|
|
||||||
http.sslCipherList::
|
http.sslCipherList::
|
||||||
A list of SSL ciphers to use when negotiating an SSL connection.
|
A list of SSL ciphers to use when negotiating an SSL connection.
|
||||||
The available ciphers depend on whether libcurl was built against
|
The available ciphers depend on whether libcurl was built against
|
||||||
|
@ -2121,6 +2121,7 @@ _git_config ()
|
|||||||
http.postBuffer
|
http.postBuffer
|
||||||
http.proxy
|
http.proxy
|
||||||
http.sslCipherList
|
http.sslCipherList
|
||||||
|
http.sslVersion
|
||||||
http.sslCAInfo
|
http.sslCAInfo
|
||||||
http.sslCAPath
|
http.sslCAPath
|
||||||
http.sslCert
|
http.sslCert
|
||||||
|
33
http.c
33
http.c
@ -37,6 +37,20 @@ static int curl_ssl_verify = -1;
|
|||||||
static int curl_ssl_try;
|
static int curl_ssl_try;
|
||||||
static const char *ssl_cert;
|
static const char *ssl_cert;
|
||||||
static const char *ssl_cipherlist;
|
static const char *ssl_cipherlist;
|
||||||
|
static const char *ssl_version;
|
||||||
|
static struct {
|
||||||
|
const char *name;
|
||||||
|
long ssl_version;
|
||||||
|
} sslversions[] = {
|
||||||
|
{ "sslv2", CURL_SSLVERSION_SSLv2 },
|
||||||
|
{ "sslv3", CURL_SSLVERSION_SSLv3 },
|
||||||
|
{ "tlsv1", CURL_SSLVERSION_TLSv1 },
|
||||||
|
#if LIBCURL_VERSION_NUM >= 0x072200
|
||||||
|
{ "tlsv1.0", CURL_SSLVERSION_TLSv1_0 },
|
||||||
|
{ "tlsv1.1", CURL_SSLVERSION_TLSv1_1 },
|
||||||
|
{ "tlsv1.2", CURL_SSLVERSION_TLSv1_2 },
|
||||||
|
#endif
|
||||||
|
};
|
||||||
#if LIBCURL_VERSION_NUM >= 0x070903
|
#if LIBCURL_VERSION_NUM >= 0x070903
|
||||||
static const char *ssl_key;
|
static const char *ssl_key;
|
||||||
#endif
|
#endif
|
||||||
@ -190,6 +204,8 @@ static int http_options(const char *var, const char *value, void *cb)
|
|||||||
}
|
}
|
||||||
if (!strcmp("http.sslcipherlist", var))
|
if (!strcmp("http.sslcipherlist", var))
|
||||||
return git_config_string(&ssl_cipherlist, var, value);
|
return git_config_string(&ssl_cipherlist, var, value);
|
||||||
|
if (!strcmp("http.sslversion", var))
|
||||||
|
return git_config_string(&ssl_version, var, value);
|
||||||
if (!strcmp("http.sslcert", var))
|
if (!strcmp("http.sslcert", var))
|
||||||
return git_config_string(&ssl_cert, var, value);
|
return git_config_string(&ssl_cert, var, value);
|
||||||
#if LIBCURL_VERSION_NUM >= 0x070903
|
#if LIBCURL_VERSION_NUM >= 0x070903
|
||||||
@ -364,9 +380,24 @@ static CURL *get_curl_handle(void)
|
|||||||
if (http_proactive_auth)
|
if (http_proactive_auth)
|
||||||
init_curl_http_auth(result);
|
init_curl_http_auth(result);
|
||||||
|
|
||||||
|
if (getenv("GIT_SSL_VERSION"))
|
||||||
|
ssl_version = getenv("GIT_SSL_VERSION");
|
||||||
|
if (ssl_version && *ssl_version) {
|
||||||
|
int i;
|
||||||
|
for (i = 0; i < ARRAY_SIZE(sslversions); i++) {
|
||||||
|
if (!strcmp(ssl_version, sslversions[i].name)) {
|
||||||
|
curl_easy_setopt(result, CURLOPT_SSLVERSION,
|
||||||
|
sslversions[i].ssl_version);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (i == ARRAY_SIZE(sslversions))
|
||||||
|
warning("unsupported ssl version %s: using default",
|
||||||
|
ssl_version);
|
||||||
|
}
|
||||||
|
|
||||||
if (getenv("GIT_SSL_CIPHER_LIST"))
|
if (getenv("GIT_SSL_CIPHER_LIST"))
|
||||||
ssl_cipherlist = getenv("GIT_SSL_CIPHER_LIST");
|
ssl_cipherlist = getenv("GIT_SSL_CIPHER_LIST");
|
||||||
|
|
||||||
if (ssl_cipherlist != NULL && *ssl_cipherlist)
|
if (ssl_cipherlist != NULL && *ssl_cipherlist)
|
||||||
curl_easy_setopt(result, CURLOPT_SSL_CIPHER_LIST,
|
curl_easy_setopt(result, CURLOPT_SSL_CIPHER_LIST,
|
||||||
ssl_cipherlist);
|
ssl_cipherlist);
|
||||||
|
Loading…
Reference in New Issue
Block a user