diff options
author | Matt Caswell <matt@openssl.org> | 2018-08-13 16:23:27 +0200 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2018-08-20 16:14:01 +0200 |
commit | 32097b33bdff520d149ad6c8a11bd344e4ef764b (patch) | |
tree | c46929e459ee7c2688765c56afbf329f38a6edda /doc | |
parent | Check getauxval on systems that have it when checking for setuid execution. (diff) | |
download | openssl-32097b33bdff520d149ad6c8a11bd344e4ef764b.tar.xz openssl-32097b33bdff520d149ad6c8a11bd344e4ef764b.zip |
Change Post Handshake auth so that it is opt-in
Having post handshake auth automatically switched on breaks some
applications written for TLSv1.2. This changes things so that an explicit
function call is required for a client to indicate support for
post-handshake auth.
Fixes #6933.
Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6938)
Diffstat (limited to 'doc')
-rw-r--r-- | doc/man1/s_client.pod | 8 | ||||
-rw-r--r-- | doc/man3/SSL_CTX_set_verify.pod | 17 |
2 files changed, 13 insertions, 12 deletions
diff --git a/doc/man1/s_client.pod b/doc/man1/s_client.pod index 80152e1ba4..fa5cb0a92d 100644 --- a/doc/man1/s_client.pod +++ b/doc/man1/s_client.pod @@ -134,7 +134,7 @@ B<openssl> B<s_client> [B<-ctlogfile>] [B<-keylogfile file>] [B<-early_data file>] -[B<-force_pha>] +[B<-enable_pha>] [B<target>] =head1 DESCRIPTION @@ -700,10 +700,10 @@ Reads the contents of the specified file and attempts to send it as early data to the server. This will only work with resumed sessions that support early data and when the server accepts the early data. -=item B<-force_pha> +=item B<-enable_pha> -For TLSv1.3 only, always send the Post-Handshake Authentication extension, -whether or not a certificate has been provided via B<-cert>. +For TLSv1.3 only, send the Post-Handshake Authentication extension. This will +happen whether or not a certificate has been provided via B<-cert>. =item B<[target]> diff --git a/doc/man3/SSL_CTX_set_verify.pod b/doc/man3/SSL_CTX_set_verify.pod index 7165547933..173f006eb6 100644 --- a/doc/man3/SSL_CTX_set_verify.pod +++ b/doc/man3/SSL_CTX_set_verify.pod @@ -7,7 +7,7 @@ SSL_CTX_set_verify, SSL_set_verify, SSL_CTX_set_verify_depth, SSL_set_verify_depth, SSL_verify_cb, SSL_verify_client_post_handshake, -SSL_force_post_handshake_auth +SSL_set_post_handshake_auth - set peer certificate verification parameters =head1 SYNOPSIS @@ -24,7 +24,7 @@ SSL_force_post_handshake_auth void SSL_set_verify_depth(SSL *ssl, int depth); int SSL_verify_client_post_handshake(SSL *ssl); - void SSL_force_post_handshake_auth(SSL *ssl); + void SSL_set_post_handshake_auth(SSL *ssl, int val); =head1 DESCRIPTION @@ -48,11 +48,12 @@ verification that shall be allowed for B<ctx>. SSL_set_verify_depth() sets the maximum B<depth> for the certificate chain verification that shall be allowed for B<ssl>. -SSL_force_post_handshake_auth() forces the Post-Handshake Authentication -extension to be added to the ClientHello regardless of certificate configuration -at the time of the initial handshake, such that post-handshake authentication -can be requested by the server. A certificate callback will need to be set via -SSL_CTX_set_client_cert_cb() if no certificate is provided at initialization. +SSL_set_post_handshake_auth() enables the Post-Handshake Authentication +extension to be added to the ClientHello such that post-handshake authentication +can be requested by the server. If B<val> is 0 then the extension is not sent, +otherwise it is. By default the extension is not sent. A certificate callback +will need to be set via SSL_CTX_set_client_cert_cb() if no certificate is +provided at initialization. SSL_verify_client_post_handshake() causes a CertificateRequest message to be sent by a server on the given B<ssl> connection. The SSL_VERIFY_PEER flag must @@ -341,7 +342,7 @@ L<CRYPTO_get_ex_new_index(3)> =head1 HISTORY The SSL_VERIFY_POST_HANDSHAKE option, and the SSL_verify_client_post_handshake() -and SSL_force_post_handshake_auth() functions were added in OpenSSL 1.1.1. +and SSL_set_post_handshake_auth() functions were added in OpenSSL 1.1.1. =head1 COPYRIGHT |