From 9c4a097d900fb623abeb61d3a58cf58e9c5f383f Mon Sep 17 00:00:00 2001
From: Laurent Bercot
Date: Mon, 20 Nov 2023 05:13:06 +0000
Subject: Update documentation; make s6-tlsd-io more conservative by default
Signed-off-by: Laurent Bercot
---
doc/libsbearssl/index.html | 17 +++++++++++++----
1 file changed, 13 insertions(+), 4 deletions(-)
(limited to 'doc/libsbearssl')
diff --git a/doc/libsbearssl/index.html b/doc/libsbearssl/index.html
index 64a7c0b..291290d 100644
--- a/doc/libsbearssl/index.html
+++ b/doc/libsbearssl/index.html
@@ -22,8 +22,8 @@
libsbearssl is a support library for the
-s6-tlsc and
-s6-tlsd executables when they're built
+s6-tlsc-io and
+s6-tlsd-io executables when they're built
against the BearSSL
backend. Among other things, it offers interfaces to read private
keys and certificates from a Unix filesystem, which BearSSL does
@@ -533,7 +533,7 @@ DN of the end entity after validation. eltstatus must point to a
user-supplied uint8_t, which after validation encodes the status
of DN extraction: bit 7 of eltstatus is set if there was an issue during extraction (in
which case the contents of *eedn are meaningless) and clear if
-everything went well, and bits 0 to 6 are set iff the corresponding element
+everything went well, and bits 0 to 5 are set iff the corresponding element
of the DN is present, by increasing order C, ST, L, O, OU and CN.
@@ -603,9 +603,13 @@ a high-level function missing from BearSSL: it fully initializes a
and all the hashes provided by BearSSL with a good degradation order,
supporting TLS 1.0 to TLS 1.2, etc. What it doesn't set: the engine buffer,
the certificate policy, the optional engine flags, and the optional client
-certificate validation.
+certificate validation. If the user wishes to be more conservative with the
+TLS versions, they can use the
+br_ssl_engine_set_versions()
+call on &sc→eng afterwards.
+
void sbearssl_sctx_set_policy_sni (br_ssl_server_context *sc, sbearssl_sni_policy_context *pol)
@@ -725,6 +729,11 @@ server for client authentication.
Bit 0: if clear, no close_notify is performed and the engine
will transmit EOF as received. If set, close_notify will be performed to
end the TLS connection.
+ Bit 1: if clear, on reception of an EOF from the peer without a
+preceding close_notify, the EOF will be transmitted to the local program,
+and the connection will eventually end normally, with the process exiting 0.
+If set, if the peer closes the connection without sending a close_notify,
+the process will exit 98 with a fatal error message.
verbosity defines the engine's verbosity: the
higher the more verbose. This parameter is currently ignored.
--
cgit v1.2.3