Daemon for in-kernel TLS handshake

Edit Package ktls-utils

In-kernel TLS consumers need a mechanism to perform TLS handshakes on a connected socket to negotiate TLS session parameters that can then be programmed into the kernel's TLS record protocol engine.

This package of software provides a TLS handshake user agent that listens for kernel requests and then materializes a user space socket endpoint on which to perform these handshakes. The resulting negotiated session parameters are passed back to the kernel via standard kTLS socket options.

Refresh
Refresh
Source Files
Filename Size Changed
_service 0000000705 705 Bytes
_servicedata 0000000450 450 Bytes
ktls-utils-0.10+9.gf28f084.obscpio 0000196107 192 KB
ktls-utils.changes 0000003065 2.99 KB
ktls-utils.obsinfo 0000000109 109 Bytes
ktls-utils.spec 0000002269 2.22 KB
Revision 2 (latest revision is 3)
Marcus Rueckert's avatar Marcus Rueckert (darix) committed (revision 2)
Fix for bsc#1218037
Factory request sr#1155294

- Update to upstream version 0.10+9.gf28f084:
  * ktls: restrict hash functions to supported sizes (bsc#1218037)
  * tlshd: Add support for chained certs

- Update to upstream version 0.10:
  * All previously SUSE_specific patches included
  * tlshd: Reorganize tlshd.conf
    - get rid of [main]
    - add [debug] and move the debug-related options there
    - move the "keyrings" option to [authenticate]
  * tlshd: add 'delay' configuration parameter
  * tlshd: Add .conf option to specify trust store
  * Bug fixes and cleanups
Comments 0
openSUSE Build Service is sponsored by