diff options
author | Péter Dimitrov <[email protected]> | 2018-09-24 17:10:11 +0200 |
---|---|---|
committer | Péter Dimitrov <[email protected]> | 2018-10-15 10:21:23 +0200 |
commit | c115250a755cabfce3cd24429e9eaec70c8d8a59 (patch) | |
tree | 79a0822df9d7539b1b51e04351baa6e1af40c96d /lib/dialyzer | |
parent | d106d1fc65d3c2b0c1b27450936895ab0e039c45 (diff) | |
download | otp-c115250a755cabfce3cd24429e9eaec70c8d8a59.tar.gz otp-c115250a755cabfce3cd24429e9eaec70c8d8a59.tar.bz2 otp-c115250a755cabfce3cd24429e9eaec70c8d8a59.zip |
ssl: Implement Signature Algorithms (TLS 1.3)
Implement handling of the signature algorithms extension described by
RFC 8446. This commit updates the behavior of legacy TLS versions to
align them with RFC 8446 (TLS 1.3) and RFC 5246 (TLS 1.2).
- TLS 1.0/1.1 clients validate the client certificate against the
certificate_type field of the CertificateRequest message.
- TLS 1.2 client verifies the hash/signature algorithm pair of the
client certificate when processing a CertificateRequest. Old
behavior only checked the signature algorithms.
- TLS 1.2 server verifies that the server certificate is signed by
a hash/signature algorithm pair that appears in the
"singature_algorithms" or "signature_algorithms_cert" (RFC 8446)
extensions of the ClientHello.
Change-Id: I3e0a0d7408984f5e5b1233968934fe34d64eb2b7
Diffstat (limited to 'lib/dialyzer')
0 files changed, 0 insertions, 0 deletions