Files
mbedtls/library
Gilles Peskine 551756df7c Require calling mbedtls_ssl_set_hostname() for security
In a TLS client, when using certificate authentication, the client should
check that the certificate is valid for the server name that the client
expects. Otherwise, in most scenarios, a malicious server can impersonate
another server.

Normally, the application code should call mbedtls_ssl_set_hostname().
However, it's easy to forget. So raise an error if mandatory certificate
authentication is in effect and mbedtls_ssl_set_hostname() has not been
called. Raise the new error code
MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME, for easy
identification.

But don't raise the error if the backward compatibility option
MBEDTLS_SSL_CLI_ALLOW_WEAK_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME is
enabled.

Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2025-02-24 18:04:29 +01:00
..
2023-05-12 13:57:39 +02:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2024-01-22 15:58:57 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2024-08-26 12:44:41 +02:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2025-01-23 15:29:58 +00:00
2023-11-03 12:54:54 +00:00
2024-02-01 19:38:22 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2024-01-31 14:14:27 +01:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2024-06-14 16:29:47 +01:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2024-01-22 15:58:57 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:58:29 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2024-01-18 12:25:18 +01:00
2023-11-03 12:54:54 +00:00
2024-01-22 16:00:07 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00
2023-11-03 12:54:54 +00:00