| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
|
|
| |
as PEM format. This allows for it to be used or examined with tools
external to libtls
bump minor
ok jsing@
|
|
|
|
|
|
| |
public key as an identifier to RSA, and adds an function for relayd to
use to disable private key checking when doing engine privsep.
ok jsing@
|
| |
|
| |
|
| |
|
|
|
|
|
| |
about tls_error(3), and warn about some traps;
OK jmc@
|
| |
|
|
|
|
|
|
|
|
| |
added associated to a keypair used for SNI, and are usable for more than
just the "main" certificate. Modify httpd to use this.
Bump libtls minor.
ok jsing@
|
|
|
|
| |
ok beck@ reyk@
|
| |
|
|
|
|
|
|
|
| |
so that it does not send back bogus staples when SNI is in use.
(Further change is required to be able to use staples on all keypairs
and not just the main one)
ok jsing@
|
| |
|
| |
|
|
|
|
| |
ok jmc@
|
| |
|
|
|
|
|
|
|
|
|
| |
issue where by calling tls_close() on a TLS context that has not attempted
a handshake, results in an unexpected failure.
Reported by Vinay Sajip.
ok beck@
|
| |
|
| |
|
|
|
|
| |
suggested by jsing@; "i would just chuck it in" jmc@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
lifetime with tls_config_set_session_lifetime(). This enables tickets
and uses an internal automatic rekeying mode for the ticket keys.
If multiple processes are involved the following functions can be used to make
tickets work accross all instances:
- tls_config_set_session_id() sets the session identifier
- tls_config_add_ticket_key() adds an encryption and authentication key
For now only the last 4 keys added will be used (unless they are too old).
If tls_config_add_ticket_key() is used the caller must ensure to add new keys
regularly. It is best to do this 4 times per session lifetime (which is also
the ticket key lifetime).
Since tickets break PFS it is best to minimize the session lifetime according
to needs.
With a lot of help, input and OK beck@, jsing@
|
|
|
|
| |
Done together with jsing@
|
| |
|
|
|
|
|
|
| |
ocsp_staple functions set the OCSP response they don't add them (which implies
you can call them multiple times).
Discussed with jsing@ beck@
|
|
|
|
| |
OK beck@ jsing@
|
| |
|
|
|
|
| |
Further changes to the publically visible structs will ride this bump.
|
| |
|
| |
|
|
|
|
|
| |
simplifying the code. Also check the provided read and write callbacks
before assigning to the context.
|
|
|
|
| |
replace it with a less specific one.
|
|
|
|
|
|
|
| |
stored directly in bio->ptr, rather than allocating and deallocating an
intermediate struct.
Diff from Marko Kreen <markokr at gmail dot com> - thanks!
|
| |
|
|
|
|
|
|
| |
continuing on.
Also noticed by Marko Kreen.
|
|
|
|
| |
Issue found by and fix from Shuo Chen <chenshuo at chenshuo dot com>.
|
|
|
|
|
|
|
| |
CA chain or specify CA paths. This prevents attempts to access the file
system, which may fail due to pledge.
ok bluhm@
|
|
|
|
|
|
|
|
|
|
|
| |
should not have changed the X509_STORE_CTX error value on success and it
was initialised to X509_V_OK by X509_STORE_CTX_init(). Other software also
depends on this behaviour.
Previously X509_verify_cert() was mishandling the X509_STORE_CTX error
value when validating alternate chains. This has been fixed and further
changes now explicitly ensure that the error value will be set to X509_V_OK
if X509_verify_cert() returns success.
|
|
|
|
|
|
| |
in the context. don't look for errors in case of success.
fixes spurious verify errors.
guilty change tracked and fix tested by sthen
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
error messages, instead of libssl error strings. This gives us messages
like:
certificate verification failed: certificate has expired
Instead of:
14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
This also lets us always enable peer verification since the no verification
case is now handled via the callback.
Tested by tedu@
ok beck@
|
|
|
|
| |
changes to libssl non-opaque structs.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
tls_config_set_verify_depth() from void to int. This makes them consistent
with all other tls_config_set_* functions and will allow for call time
validation to be implemented.
Rides libtls major bump.
ok beck@
|
|
|
|
| |
majors appropriately
|
|
|
|
|
| |
the master only.
ok jsing@
|
| |
|
| |
|
| |
|
|
|
|
| |
Add support for server side OCSP stapling to netcat.
|
|
|
|
| |
ok jsing@
|