summaryrefslogtreecommitdiff
path: root/src/lib/libtls/tls_init.3
diff options
context:
space:
mode:
authorbeck <>2016-11-04 05:13:13 +0000
committerbeck <>2016-11-04 05:13:13 +0000
commitdfcc608101125b045153abb36d8b26d283aeb812 (patch)
treebeb66ed0e210e9dcdda1ae81df9eaf1ac13b84b6 /src/lib/libtls/tls_init.3
parent85d1a393066ebc8950b3667cae2d5c9e9da47ed8 (diff)
downloadopenbsd-dfcc608101125b045153abb36d8b26d283aeb812.tar.gz
openbsd-dfcc608101125b045153abb36d8b26d283aeb812.tar.bz2
openbsd-dfcc608101125b045153abb36d8b26d283aeb812.zip
Add ocsp_require_stapling config option for tls - allows a connection
to indicate that it requires the peer to provide a stapled OCSP response with the handshake. Provide a "-T muststaple" for nc that uses it. ok jsing@, guenther@
Diffstat (limited to 'src/lib/libtls/tls_init.3')
-rw-r--r--src/lib/libtls/tls_init.310
1 files changed, 8 insertions, 2 deletions
diff --git a/src/lib/libtls/tls_init.3 b/src/lib/libtls/tls_init.3
index d0b6292b4a..88195deb2e 100644
--- a/src/lib/libtls/tls_init.3
+++ b/src/lib/libtls/tls_init.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: tls_init.3,v 1.76 2016/11/03 12:54:16 beck Exp $ 1.\" $OpenBSD: tls_init.3,v 1.77 2016/11/04 05:13:13 beck Exp $
2.\" 2.\"
3.\" Copyright (c) 2014 Ted Unangst <tedu@openbsd.org> 3.\" Copyright (c) 2014 Ted Unangst <tedu@openbsd.org>
4.\" 4.\"
@@ -14,7 +14,7 @@
14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16.\" 16.\"
17.Dd $Mdocdate: November 3 2016 $ 17.Dd $Mdocdate: November 4 2016 $
18.Dt TLS_INIT 3 18.Dt TLS_INIT 3
19.Os 19.Os
20.Sh NAME 20.Sh NAME
@@ -47,6 +47,7 @@
47.Nm tls_config_insecure_noverifycert , 47.Nm tls_config_insecure_noverifycert ,
48.Nm tls_config_insecure_noverifyname , 48.Nm tls_config_insecure_noverifyname ,
49.Nm tls_config_insecure_noverifytime , 49.Nm tls_config_insecure_noverifytime ,
50.Nm tls_config_ocsp_require_stapling ,
50.Nm tls_config_verify , 51.Nm tls_config_verify ,
51.Nm tls_config_verify_client , 52.Nm tls_config_verify_client ,
52.Nm tls_config_verify_client_optional , 53.Nm tls_config_verify_client_optional ,
@@ -150,6 +151,8 @@
150.Ft "void" 151.Ft "void"
151.Fn tls_config_insecure_noverifytime "struct tls_config *config" 152.Fn tls_config_insecure_noverifytime "struct tls_config *config"
152.Ft "void" 153.Ft "void"
154.Fn tls_config_ocsp_require_stapling "struct tls_config *config"
155.Ft "void"
153.Fn tls_config_verify "struct tls_config *config" 156.Fn tls_config_verify "struct tls_config *config"
154.Ft "void" 157.Ft "void"
155.Fn tls_config_verify_client "struct tls_config *config" 158.Fn tls_config_verify_client "struct tls_config *config"
@@ -456,6 +459,9 @@ Be careful when using this option.
456disables validity checking of certificates and OCSP validation. 459disables validity checking of certificates and OCSP validation.
457Be careful when using this option. 460Be careful when using this option.
458.It 461.It
462.Fn tls_config_ocsp_require_stapling
463requires that a valid stapled OCSP response be provided during the TLS handshake.
464.It
459.Fn tls_config_verify 465.Fn tls_config_verify
460reenables server name and certificate verification. 466reenables server name and certificate verification.
461.It 467.It