Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Refactor tls_check_common_name to use lower level API. | beck | 2023-05-28 | 1 | -2/+4 |
| | | | | | | | | | | | | | | | | | | | | X509_NAME_get_text_by_NID is kind of a bad interface that we wish to make safer, and does not give us the visibility we really want here to detect hostile things. Instead call the lower level functions to do some better checking that should be done by X509_NAME_get_text_by_NID, but is not in the OpenSSL version. Specifically we will treat the input as hostile and fail if: 1) The certificate contains more than one CN in the subject. 2) The CN does not decode as UTF-8 3) The CN is of invalid length (must be between 1 and 64 bytes) 4) The CN contains a 0 byte 4) matches the existing logic, 1 and 2, and 3 are new checks. ok tb@ | ||||
* | Add missing tls_init() and tls_free() calls. | jsing | 2017-04-30 | 1 | -1/+4 |
| | |||||
* | Rework and significantly extend TLS name verification tests to match | jsing | 2017-04-10 | 1 | -99/+377 |
| | | | | changes in libtls. | ||||
* | regress test that we do not allow a wildcard match for ".openbsd.org" | beck | 2015-09-11 | 1 | -1/+6 |
| | | | | against a wildcard of "*.openbsd.org" | ||||
* | fix verify to allow for servername->name | beck | 2015-09-11 | 1 | -25/+25 |
| | | | | ok jsing@ | ||||
* | Update for recent verify related naming changes. | jsing | 2015-02-22 | 1 | -25/+25 |
| | |||||
* | Allow specific libtls hostname validation errors to propagate. | bcook | 2014-12-07 | 1 | -3/+7 |
| | | | | | | | | Remove direct calls to printf from the tls_check_hostname() path. This allows NUL byte error messages to bubble up to the caller, to be logged in a program-appropriate way. It also removes non-portable calls to getprogname(). ok jsing@ | ||||
* | Initial regress for libtls hostname verification. | jsing | 2014-11-01 | 1 | -0/+234 |