Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/openssl/openssl.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorViktor Dukhovni <openssl-users@dukhovni.org>2016-07-11 03:36:02 +0300
committerViktor Dukhovni <openssl-users@dukhovni.org>2016-07-12 17:16:34 +0300
commit5ae4ceb92c2ae6c677b1de2c477dce71a4d94716 (patch)
treee3df5a313a7e45524115e1cca438256f0405bd6a /include/internal
parentd83b7e1a580b2f68a041d178e91e9495ec95e383 (diff)
Perform DANE-EE(3) name checks by default
In light of potential UKS (unknown key share) attacks on some applications, primarily browsers, despite RFC761, name checks are by default applied with DANE-EE(3) TLSA records. Applications for which UKS is not a problem can optionally disable DANE-EE(3) name checks via the new SSL_CTX_dane_set_flags() and friends. Reviewed-by: Rich Salz <rsalz@openssl.org>
Diffstat (limited to 'include/internal')
-rw-r--r--include/internal/dane.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/include/internal/dane.h b/include/internal/dane.h
index 65bf24439d..a1cb5488ba 100644
--- a/include/internal/dane.h
+++ b/include/internal/dane.h
@@ -57,6 +57,7 @@ struct dane_ctx_st {
const EVP_MD **mdevp; /* mtype -> digest */
uint8_t *mdord; /* mtype -> preference */
uint8_t mdmax; /* highest supported mtype */
+ unsigned long flags; /* feature bitmask */
};
/*
@@ -71,6 +72,7 @@ struct ssl_dane_st {
uint32_t umask; /* Usages present */
int mdpth; /* Depth of matched cert */
int pdpth; /* Depth of PKIX trust */
+ unsigned long flags; /* feature bitmask */
};
#define DANETLS_ENABLED(dane) \