Loading openssl/src/ssl/connector.rs +1 −1 Original line number Diff line number Diff line Loading @@ -114,7 +114,7 @@ impl SslConnector { /// You should think very carefully before you use this method. If hostname verification is not /// used, *any* valid certificate for *any* site will be trusted for use from any other. This /// introduces a significant vulnerability to man-in-the-middle attacks. pub fn connect_without_providing_domain_for_certificate_verification_and_server_name_indication<S>( pub fn danger_connect_without_providing_domain_for_certificate_verification_and_server_name_indication<S>( &self, stream: S) -> Result<SslStream<S>, HandshakeError<S>> where S: Read + Write { Loading openssl/src/ssl/tests/mod.rs +3 −3 Original line number Diff line number Diff line Loading @@ -1093,7 +1093,7 @@ fn connector_invalid_no_hostname_verification() { let connector = SslConnectorBuilder::new(SslMethod::tls()).unwrap().build(); let s = TcpStream::connect("google.com:443").unwrap(); connector.connect_without_providing_domain_for_certificate_verification_and_server_name_indication(s) connector.danger_connect_without_providing_domain_for_certificate_verification_and_server_name_indication(s) .unwrap(); } Loading @@ -1103,7 +1103,7 @@ fn connector_no_hostname_still_verifies() { let connector = SslConnectorBuilder::new(SslMethod::tls()).unwrap().build(); assert!(connector.connect_without_providing_domain_for_certificate_verification_and_server_name_indication(tcp) assert!(connector.danger_connect_without_providing_domain_for_certificate_verification_and_server_name_indication(tcp) .is_err()); } Loading @@ -1115,7 +1115,7 @@ fn connector_no_hostname_can_disable_verify() { connector.builder_mut().set_verify(SSL_VERIFY_NONE); let connector = connector.build(); connector.connect_without_providing_domain_for_certificate_verification_and_server_name_indication(tcp).unwrap(); connector.danger_connect_without_providing_domain_for_certificate_verification_and_server_name_indication(tcp).unwrap(); } #[test] Loading Loading
openssl/src/ssl/connector.rs +1 −1 Original line number Diff line number Diff line Loading @@ -114,7 +114,7 @@ impl SslConnector { /// You should think very carefully before you use this method. If hostname verification is not /// used, *any* valid certificate for *any* site will be trusted for use from any other. This /// introduces a significant vulnerability to man-in-the-middle attacks. pub fn connect_without_providing_domain_for_certificate_verification_and_server_name_indication<S>( pub fn danger_connect_without_providing_domain_for_certificate_verification_and_server_name_indication<S>( &self, stream: S) -> Result<SslStream<S>, HandshakeError<S>> where S: Read + Write { Loading
openssl/src/ssl/tests/mod.rs +3 −3 Original line number Diff line number Diff line Loading @@ -1093,7 +1093,7 @@ fn connector_invalid_no_hostname_verification() { let connector = SslConnectorBuilder::new(SslMethod::tls()).unwrap().build(); let s = TcpStream::connect("google.com:443").unwrap(); connector.connect_without_providing_domain_for_certificate_verification_and_server_name_indication(s) connector.danger_connect_without_providing_domain_for_certificate_verification_and_server_name_indication(s) .unwrap(); } Loading @@ -1103,7 +1103,7 @@ fn connector_no_hostname_still_verifies() { let connector = SslConnectorBuilder::new(SslMethod::tls()).unwrap().build(); assert!(connector.connect_without_providing_domain_for_certificate_verification_and_server_name_indication(tcp) assert!(connector.danger_connect_without_providing_domain_for_certificate_verification_and_server_name_indication(tcp) .is_err()); } Loading @@ -1115,7 +1115,7 @@ fn connector_no_hostname_can_disable_verify() { connector.builder_mut().set_verify(SSL_VERIFY_NONE); let connector = connector.build(); connector.connect_without_providing_domain_for_certificate_verification_and_server_name_indication(tcp).unwrap(); connector.danger_connect_without_providing_domain_for_certificate_verification_and_server_name_indication(tcp).unwrap(); } #[test] Loading