• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

ctz / rustls
96%
master: 96%

Build:
Build:
LAST BUILD BRANCH: quic-13
DEFAULT BRANCH: master
Repo Added 22 Sep 2016 09:07PM UTC
Files 3
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

LAST BUILD ON BRANCH jbp-custom-sigverify
branch: jbp-custom-sigverify
CHANGE BRANCH
x
Reset
  • jbp-custom-sigverify
  • HEAD
  • backports-0.13
  • dependabot/cargo/base64-0.12
  • dependabot/cargo/criterion-0.3.0
  • dependabot/cargo/docopt-approx-1.1
  • dependabot/cargo/env_logger-0.6
  • dependabot/cargo/env_logger-0.7.0
  • dependabot/cargo/env_logger-0.7.1
  • dependabot/cargo/mio-0.7.0
  • dependabot/cargo/webpki-roots-0.18.0
  • dependabot/cargo/webpki-roots-0.19.0
  • jbp-0rtt-client
  • jbp-azure-fixes
  • jbp-azure-min-versions
  • jbp-azure-pipelines
  • jbp-client-auth-by-sni
  • jbp-dangerous-apis
  • jbp-ecdsa
  • jbp-edition-2018
  • jbp-faster-read_tls-errors
  • jbp-final-tls13
  • jbp-get-cs
  • jbp-iovec
  • jbp-lcov
  • jbp-mdbook
  • jbp-mdbook-2
  • jbp-mio-optional-for-basic-tests
  • jbp-no-sha1
  • jbp-ocsp
  • jbp-pr-79
  • jbp-reduce-cert-resolve-sigalgs
  • jbp-refactor-hs
  • jbp-refactor-keyschedule
  • jbp-refactor-secrets
  • jbp-ring0.16
  • jbp-separated-rng
  • jbp-server-cert-resolve-alpn
  • jbp-test-workspace
  • jbp-tls-read-perf
  • jbp-tls13
  • jbp-tls13-draft19
  • jbp-tls13-draft20
  • jbp-tls13-draft22
  • jbp-tls13-stateful-resumption
  • jbp-tlsserver-stable
  • jbp-travis
  • jbp-vectored-io
  • jbp-workspace
  • jbp-xfer
  • master
  • trytls
  • v/0.15.0
  • v/0.15.1
  • v/0.15.2
  • v/0.16.0
  • v/0.17.0

10 Apr 2020 04:25PM UTC coverage: 96.124%. First build
988

push

travis-ci

ctz
Fix client detection of bad CertificateRequests

A certificate request with no signature schemes is meaningless.
In TLS1.3 we reject this outright, but it was allowed in TLS1.2.
Fix that first.

Secondly, fix the TLS1.2 behaviour when `choose_scheme` fails:
we want to avoid any client auth in this case, not send a certificate
but be unable to send the matching CertificateVerify.

11 of 11 new or added lines in 3 files covered. (100.0%)

8060 of 8385 relevant lines covered (96.12%)

363601.87 hits per line

Relevant lines Covered
Build:
Build:
8385 RELEVANT LINES 8060 COVERED LINES
363601.87 HITS PER LINE
Source Files on jbp-custom-sigverify
  • List 0
  • Changed 0
  • Source Changed 0
  • Coverage Changed 0
Coverage ∆ File Lines Relevant Covered Missed Hits/Line

Recent builds

Builds Branch Commit Type Ran Committer Via Coverage
988 jbp-custom-sigverify Fix client detection of bad CertificateRequests A certificate request with no signature schemes is meaningless. In TLS1.3 we reject this outright, but it was allowed in TLS1.2. Fix that first. Secondly, fix the TLS1.2 behaviour when `choose_sche... push 10 Apr 2020 04:43PM UTC ctz travis-ci
96.12
See All Builds (555)
  • Repo on GitHub
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc