|Age||Commit message (Collapse)||Author|
Instead of forcing someone to look at this again in a couple of years we
can simply extend it to 100 years and expect this code does no longer
For more details on the steps I used to generate and the problem in
ecore_con please see the original commit 3b835b57ff70659c12a89158cd8d29e3187a42a9
For our unit testing of ecore_con we have a sself-signed certificate for
localhost to do some of the tests. It expired in 2016 and this was not
really a problem so far. Starting from Debian 10 and Ubuntu 20.04 this
resulted in failures thought. Either the newer openssl version is more
strict or the config for Debian and Ubuntu is.
Anyway, time to generate a new one. Its valied until Sep 23 12:33:13
2024 GMT and I used the follwoing commands to generate the cert/key and
the second command to rmeove the key passphrase.
openssl req -x509 -newkey rsa:4096 -keyout server.key -out server.pem -days 1600 -subj '/CN=127.0.0.1'
openssl rsa -in server.key -out server2.key
Someone has to do this again in 4 years. if we stillhave this code
Have created ecore_con test suite.
Signed-off-by: Srivardhan Hebbar <email@example.com>
Reviewers: cedric, Sergeant_Whitespace, stefan_schmidt
Subscribers: stefan_schmidt, Sergeant_Whitespace, cedric
Maniphest Tasks: T2235
Differential Revision: https://phab.enlightenment.org/D2269