History log of /openbsd-src/lib/libtls/tls.h (Results 26 – 50 of 68)
Revision Date Author Comments
# 62518615 11-Nov-2016 jsing <jsing@openbsd.org>

Bump TLS_API due to recent feature additions and changes.


# 2b50121a 11-Nov-2016 jsing <jsing@openbsd.org>

Change the return value of tls_config_set_protocols() and
tls_config_set_verify_depth() from void to int. This makes them consistent
with all other tls_config_set_* functions and will allow for call

Change the return value of tls_config_set_protocols() and
tls_config_set_verify_depth() from void to int. This makes them consistent
with all other tls_config_set_* functions and will allow for call time
validation to be implemented.

Rides libtls major bump.

ok beck@

show more ...


# 668bec95 05-Nov-2016 beck <beck@openbsd.org>

Add support for server side OCSP stapling to libtls.
Add support for server side OCSP stapling to netcat.


# 69013f12 04-Nov-2016 beck <beck@openbsd.org>

Add ocsp_require_stapling config option for tls - allows a connection
to indicate that it requires the peer to provide a stapled OCSP response
with the handshake. Provide a "-T muststaple" for nc th

Add ocsp_require_stapling config option for tls - allows a connection
to indicate that it requires the peer to provide a stapled OCSP response
with the handshake. Provide a "-T muststaple" for nc that uses it.
ok jsing@, guenther@

show more ...


# 2dc6b4e4 02-Nov-2016 beck <beck@openbsd.org>

Add OCSP client side support to libtls.
- Provide access to certificate OCSP URL
- Provide ability to check a raw OCSP reply against an
established TLS ctx
- Check and validate OCSP sta

Add OCSP client side support to libtls.
- Provide access to certificate OCSP URL
- Provide ability to check a raw OCSP reply against an
established TLS ctx
- Check and validate OCSP stapling info in the TLS handshake
if a stapled OCSP response is provided.`

Add example code to show OCSP URL and stapled info
into netcat.

ok jsing@

show more ...


# f36cb7cf 13-Sep-2016 tedu <tedu@openbsd.org>

add a little more typing to the first callback argument.
it's always a tls context.


# b4c0f014 04-Sep-2016 jsing <jsing@openbsd.org>

Bump TLS_API for addition of callbacks.


# ed19021f 04-Sep-2016 bcook <bcook@openbsd.org>

Add callback-based interface to libtls.

This allows working with buffers and callback functions instead of directly on
sockets or file descriptors.
Original patch from Tobias Pape <tobias_at_netshed

Add callback-based interface to libtls.

This allows working with buffers and callback functions instead of directly on
sockets or file descriptors.
Original patch from Tobias Pape <tobias_at_netshed.de>.
ok beck@

show more ...


# 8680495d 22-Aug-2016 jsing <jsing@openbsd.org>

Bump TLS_API due to the addition of server side SNI functions.


# 55272e79 22-Aug-2016 jsing <jsing@openbsd.org>

Provide an API that enables server side SNI support - add the ability to
provide additional keypairs (via tls_config_add_keypair_{file,mem}()) and
allow the server to determine what servername the cl

Provide an API that enables server side SNI support - add the ability to
provide additional keypairs (via tls_config_add_keypair_{file,mem}()) and
allow the server to determine what servername the client requested (via
tls_conn_servername()).

ok beck@

show more ...


# 183da8c6 12-Aug-2016 jsing <jsing@openbsd.org>

Add ALPN support to libtls.

ok beck@ doug@


# 380117c0 02-Aug-2016 jsing <jsing@openbsd.org>

Revert previous since it adds new symbols.

Requested by deraadt@


# cd719857 01-Aug-2016 jsing <jsing@openbsd.org>

Bump TLS_API for addition of ALPN support.


# 623e6e82 01-Aug-2016 jsing <jsing@openbsd.org>

Add ALPN support to libtls.

ok beck@ doug@


# 5684be2a 27-May-2016 jsing <jsing@openbsd.org>

Fix function parameters that do not have an underscore prefix.


# 1fe9fea1 28-Apr-2016 jsing <jsing@openbsd.org>

Factor our the keypair handling in libtls. This results in more readable
and self-contained code, while preparing for the ability to handle
multiple keypairs. Also provide two additional functions th

Factor our the keypair handling in libtls. This results in more readable
and self-contained code, while preparing for the ability to handle
multiple keypairs. Also provide two additional functions that allow
a public certificate and private key to be set with a single function
call.

ok beck@

show more ...


# a88e9e95 28-Apr-2016 jsing <jsing@openbsd.org>

Rework the error handling in libtls so that we can associate errors with
both configuration and contexts. This allows us to propagate errors that
occur during configuration, rather than either just f

Rework the error handling in libtls so that we can associate errors with
both configuration and contexts. This allows us to propagate errors that
occur during configuration, rather than either just failing with no reason
or delaying the failure until it can be propagated via the tls context.

Also provide a tls_config_error() function for retrieving the last error
from a tls_config *.

ok bcook@

show more ...


# f00a4e85 07-Oct-2015 beck <beck@openbsd.org>

Add tls_peer_cert_notbefore and tls_peer_cert_notafter to expose peer certificate
validity times for tls connections.
ok jsing@


# 27ecf354 01-Oct-2015 bcook <bcook@openbsd.org>

include <sys/types.h> for ssize_t

ok jsing@, deraadt@


# 615956a0 14-Sep-2015 jsing <jsing@openbsd.org>

Provide tls_config_insecure_noverifytime() in order to be able to disable
certificate validity checking.

ok beck@


# 2eb13fba 13-Sep-2015 beck <beck@openbsd.org>

add visibility of ciper and connection version strings
ok jsing@


# ab8f2ec6 12-Sep-2015 beck <beck@openbsd.org>

Move connection info into it's own private structure allocated and filled in
at handshake time. change accessors to return const char * to remove need
for caller to free memory.
ok jsing@


# b838e8e9 12-Sep-2015 jsing <jsing@openbsd.org>

Put tls_peer_cert* functions in the same place.


# 0fb5de82 11-Sep-2015 beck <beck@openbsd.org>

add tls_peer functions for checking names and issuers of peer certificates.
ok jsing@


# a0ec9d6b 11-Sep-2015 jsing <jsing@openbsd.org>

Provide tls_peer_cert_hash() which returns a hash of the raw certificate
that was presented by the peer. The hash used is currently SHA256, however
since we prefix the result with the hash name, we c

Provide tls_peer_cert_hash() which returns a hash of the raw certificate
that was presented by the peer. The hash used is currently SHA256, however
since we prefix the result with the hash name, we can change this in the
future as the need arises.

The same output can be generated by using:

h=$(openssl x509 -outform der -in mycert.crt | sha256)
printf "SHA256:${h}\n"

ok beck@

show more ...


123