Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Apache httpd w/TLS 1.3 support #3421

Merged
merged 5 commits into from
Nov 6, 2020
Merged

Conversation

dgarske
Copy link
Contributor

@dgarske dgarske commented Oct 23, 2020

  • Add support for TLS v1.3 compatibility API SSL_verify_client_post_handshake for the server-side to support rehandshake (Required for Apache v2.4.39 with TLS v1.3)
  • Added SSL_CTX_set_post_handshake_auth and SSL_set_post_handshake_auth API's for enabling or disabling post handshake authentication for TLS v1.3
  • Add OPENSSL_init_crypto and OPENSSL_init_ssl API's.

…ndshake` for the server-side to support rehandshake. Required for Apache v2.4.39 with TLS v1.3.
@dgarske dgarske self-assigned this Oct 23, 2020
Copy link
Contributor

@SparkiDev SparkiDev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rest is fine.

}
#endif
#ifndef NO_WOLFSSL_CLIENT
if (ssl->options.side == WOLFSSL_CLIENT_END) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OpenSSL returns an error when client side.

@@ -10357,6 +10357,30 @@ void wolfSSL_set_verify_result(WOLFSSL *ssl, long v)
#endif
}

/* For TLS v1.3 perform rehandshake. Returns 1=WOLFSSL_SUCCESS or 0=WOLFSSL_FAILURE */
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not a rehandshake - sending handshake messages after handshake complete.

#endif
#ifndef NO_WOLFSSL_CLIENT
if (ssl->options.side == WOLFSSL_CLIENT_END) {
ret = wolfSSL_allow_post_handshake_auth(ssl);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks like SSL_[CTX_]set_post_handshake_auth() enables/disables.

…th` and `SSL_set_post_handshake_auth` API's for enabling or disabling post handshake authentication for TLS v1.3.
@dgarske dgarske assigned haydenroche5 and unassigned dgarske Nov 4, 2020
@dgarske dgarske requested a review from haydenroche5 November 4, 2020 23:10
return (ret == 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
}

void wolfSSL_CTX_set_post_handshake_auth(WOLFSSL_CTX* ctx, int val)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the return type should be int for this guy and wolfSSL_set_post_handshake_auth.

@haydenroche5 haydenroche5 merged commit 2cad844 into wolfSSL:master Nov 6, 2020
@dgarske dgarske deleted the apache_httpd branch November 6, 2020 19:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants