-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Client certificate chain is now sent #4894
base: dev_kip848_mock_handler_and_integration_tests
Are you sure you want to change the base?
Client certificate chain is now sent #4894
Conversation
🎉 All Contributor License Agreements have been signed. Ready to merge. |
c77c7e4
to
ec21967
Compare
ec21967
to
7ec52aa
Compare
…PEM format. Test that CA with untrusted chain fails authentication.
6cf59f0
to
d64f4f8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed the non-test files, looking at tests.
if (sk_X509_num(ca) > 0) | ||
cert->chain = ca; | ||
else | ||
sk_X509_pop_free(cert->chain, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Doesn't this need to be sk_X509_pop_free(ca,
instead? because cert->chain isn't assigned to yet.
when using
ssl.certificate.pem
orssl_certificate
orssl.keystore.location
.Without that, broker must explicitly add any intermediate certification
authority certificate to its truststore to be able to accept client
certificate.
Happens since: 1.x