Daemon for in-kernel TLS handshake
In-kernel TLS consumers need a mechanism to perform TLS handshakes on a connected socket to negotiate TLS session parameters that can then be programmed into the kernel's TLS record protocol engine.
This package of software provides a TLS handshake user agent that listens for kernel requests and then materializes a user space socket endpoint on which to perform these handshakes. The resulting negotiated session parameters are passed back to the kernel via standard kTLS socket options.
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout SUSE:SLE-15-SP6:GA/ktls-utils && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000000705 705 Bytes | |
_servicedata | 0000000450 450 Bytes | |
ktls-utils-0.10+9.gf28f084.obscpio | 0000196107 192 KB | |
ktls-utils.changes | 0000003065 2.99 KB | |
ktls-utils.obsinfo | 0000000109 109 Bytes | |
ktls-utils.spec | 0000002269 2.22 KB |
Revision 2 (latest revision is 3)
Marcus Rueckert (darix)
committed
(revision 2)
Fix for bsc#1218037 Factory request sr#1155294 - Update to upstream version 0.10+9.gf28f084: * ktls: restrict hash functions to supported sizes (bsc#1218037) * tlshd: Add support for chained certs - Update to upstream version 0.10: * All previously SUSE_specific patches included * tlshd: Reorganize tlshd.conf - get rid of [main] - add [debug] and move the debug-related options there - move the "keyrings" option to [authenticate] * tlshd: add 'delay' configuration parameter * tlshd: Add .conf option to specify trust store * Bug fixes and cleanups
Comments 0