#
62518615 |
| 11-Nov-2016 |
jsing <jsing@openbsd.org> |
Bump TLS_API due to recent feature additions and changes.
|
#
2b50121a |
| 11-Nov-2016 |
jsing <jsing@openbsd.org> |
Change the return value of tls_config_set_protocols() and tls_config_set_verify_depth() from void to int. This makes them consistent with all other tls_config_set_* functions and will allow for call
Change the return value of tls_config_set_protocols() and tls_config_set_verify_depth() from void to int. This makes them consistent with all other tls_config_set_* functions and will allow for call time validation to be implemented.
Rides libtls major bump.
ok beck@
show more ...
|
#
668bec95 |
| 05-Nov-2016 |
beck <beck@openbsd.org> |
Add support for server side OCSP stapling to libtls. Add support for server side OCSP stapling to netcat.
|
#
69013f12 |
| 04-Nov-2016 |
beck <beck@openbsd.org> |
Add ocsp_require_stapling config option for tls - allows a connection to indicate that it requires the peer to provide a stapled OCSP response with the handshake. Provide a "-T muststaple" for nc th
Add ocsp_require_stapling config option for tls - allows a connection to indicate that it requires the peer to provide a stapled OCSP response with the handshake. Provide a "-T muststaple" for nc that uses it. ok jsing@, guenther@
show more ...
|
#
2dc6b4e4 |
| 02-Nov-2016 |
beck <beck@openbsd.org> |
Add OCSP client side support to libtls. - Provide access to certificate OCSP URL - Provide ability to check a raw OCSP reply against an established TLS ctx - Check and validate OCSP sta
Add OCSP client side support to libtls. - Provide access to certificate OCSP URL - Provide ability to check a raw OCSP reply against an established TLS ctx - Check and validate OCSP stapling info in the TLS handshake if a stapled OCSP response is provided.`
Add example code to show OCSP URL and stapled info into netcat.
ok jsing@
show more ...
|
#
f36cb7cf |
| 13-Sep-2016 |
tedu <tedu@openbsd.org> |
add a little more typing to the first callback argument. it's always a tls context.
|
#
b4c0f014 |
| 04-Sep-2016 |
jsing <jsing@openbsd.org> |
Bump TLS_API for addition of callbacks.
|
#
ed19021f |
| 04-Sep-2016 |
bcook <bcook@openbsd.org> |
Add callback-based interface to libtls.
This allows working with buffers and callback functions instead of directly on sockets or file descriptors. Original patch from Tobias Pape <tobias_at_netshed
Add callback-based interface to libtls.
This allows working with buffers and callback functions instead of directly on sockets or file descriptors. Original patch from Tobias Pape <tobias_at_netshed.de>. ok beck@
show more ...
|
#
8680495d |
| 22-Aug-2016 |
jsing <jsing@openbsd.org> |
Bump TLS_API due to the addition of server side SNI functions.
|
#
55272e79 |
| 22-Aug-2016 |
jsing <jsing@openbsd.org> |
Provide an API that enables server side SNI support - add the ability to provide additional keypairs (via tls_config_add_keypair_{file,mem}()) and allow the server to determine what servername the cl
Provide an API that enables server side SNI support - add the ability to provide additional keypairs (via tls_config_add_keypair_{file,mem}()) and allow the server to determine what servername the client requested (via tls_conn_servername()).
ok beck@
show more ...
|
#
183da8c6 |
| 12-Aug-2016 |
jsing <jsing@openbsd.org> |
Add ALPN support to libtls.
ok beck@ doug@
|
#
380117c0 |
| 02-Aug-2016 |
jsing <jsing@openbsd.org> |
Revert previous since it adds new symbols.
Requested by deraadt@
|
#
cd719857 |
| 01-Aug-2016 |
jsing <jsing@openbsd.org> |
Bump TLS_API for addition of ALPN support.
|
#
623e6e82 |
| 01-Aug-2016 |
jsing <jsing@openbsd.org> |
Add ALPN support to libtls.
ok beck@ doug@
|
#
5684be2a |
| 27-May-2016 |
jsing <jsing@openbsd.org> |
Fix function parameters that do not have an underscore prefix.
|
#
1fe9fea1 |
| 28-Apr-2016 |
jsing <jsing@openbsd.org> |
Factor our the keypair handling in libtls. This results in more readable and self-contained code, while preparing for the ability to handle multiple keypairs. Also provide two additional functions th
Factor our the keypair handling in libtls. This results in more readable and self-contained code, while preparing for the ability to handle multiple keypairs. Also provide two additional functions that allow a public certificate and private key to be set with a single function call.
ok beck@
show more ...
|
#
a88e9e95 |
| 28-Apr-2016 |
jsing <jsing@openbsd.org> |
Rework the error handling in libtls so that we can associate errors with both configuration and contexts. This allows us to propagate errors that occur during configuration, rather than either just f
Rework the error handling in libtls so that we can associate errors with both configuration and contexts. This allows us to propagate errors that occur during configuration, rather than either just failing with no reason or delaying the failure until it can be propagated via the tls context.
Also provide a tls_config_error() function for retrieving the last error from a tls_config *.
ok bcook@
show more ...
|
#
f00a4e85 |
| 07-Oct-2015 |
beck <beck@openbsd.org> |
Add tls_peer_cert_notbefore and tls_peer_cert_notafter to expose peer certificate validity times for tls connections. ok jsing@
|
#
27ecf354 |
| 01-Oct-2015 |
bcook <bcook@openbsd.org> |
include <sys/types.h> for ssize_t
ok jsing@, deraadt@
|
#
615956a0 |
| 14-Sep-2015 |
jsing <jsing@openbsd.org> |
Provide tls_config_insecure_noverifytime() in order to be able to disable certificate validity checking.
ok beck@
|
#
2eb13fba |
| 13-Sep-2015 |
beck <beck@openbsd.org> |
add visibility of ciper and connection version strings ok jsing@
|
#
ab8f2ec6 |
| 12-Sep-2015 |
beck <beck@openbsd.org> |
Move connection info into it's own private structure allocated and filled in at handshake time. change accessors to return const char * to remove need for caller to free memory. ok jsing@
|
#
b838e8e9 |
| 12-Sep-2015 |
jsing <jsing@openbsd.org> |
Put tls_peer_cert* functions in the same place.
|
#
0fb5de82 |
| 11-Sep-2015 |
beck <beck@openbsd.org> |
add tls_peer functions for checking names and issuers of peer certificates. ok jsing@
|
#
a0ec9d6b |
| 11-Sep-2015 |
jsing <jsing@openbsd.org> |
Provide tls_peer_cert_hash() which returns a hash of the raw certificate that was presented by the peer. The hash used is currently SHA256, however since we prefix the result with the hash name, we c
Provide tls_peer_cert_hash() which returns a hash of the raw certificate that was presented by the peer. The hash used is currently SHA256, however since we prefix the result with the hash name, we can change this in the future as the need arises.
The same output can be generated by using:
h=$(openssl x509 -outform der -in mycert.crt | sha256) printf "SHA256:${h}\n"
ok beck@
show more ...
|