aboutsummaryrefslogtreecommitdiffstats
path: root/lib/dialyzer
diff options
context:
space:
mode:
authorPéter Dimitrov <[email protected]>2018-09-24 17:10:11 +0200
committerPéter Dimitrov <[email protected]>2018-10-15 10:21:23 +0200
commitc115250a755cabfce3cd24429e9eaec70c8d8a59 (patch)
tree79a0822df9d7539b1b51e04351baa6e1af40c96d /lib/dialyzer
parentd106d1fc65d3c2b0c1b27450936895ab0e039c45 (diff)
downloadotp-c115250a755cabfce3cd24429e9eaec70c8d8a59.tar.gz
otp-c115250a755cabfce3cd24429e9eaec70c8d8a59.tar.bz2
otp-c115250a755cabfce3cd24429e9eaec70c8d8a59.zip
ssl: Implement Signature Algorithms (TLS 1.3)
Implement handling of the signature algorithms extension described by RFC 8446. This commit updates the behavior of legacy TLS versions to align them with RFC 8446 (TLS 1.3) and RFC 5246 (TLS 1.2). - TLS 1.0/1.1 clients validate the client certificate against the certificate_type field of the CertificateRequest message. - TLS 1.2 client verifies the hash/signature algorithm pair of the client certificate when processing a CertificateRequest. Old behavior only checked the signature algorithms. - TLS 1.2 server verifies that the server certificate is signed by a hash/signature algorithm pair that appears in the "singature_algorithms" or "signature_algorithms_cert" (RFC 8446) extensions of the ClientHello. Change-Id: I3e0a0d7408984f5e5b1233968934fe34d64eb2b7
Diffstat (limited to 'lib/dialyzer')
0 files changed, 0 insertions, 0 deletions