Add doc on when to use SCT callback.

With help from Viktor.

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
This commit is contained in:
Rich Salz
2016-03-10 10:37:31 -05:00
parent 4b8574461b
commit 36cc1390f2
2 changed files with 7 additions and 1 deletions

View File

@@ -42,6 +42,12 @@ Certificate Transparency validation cannot be enabled and so a callback cannot
be set if a custom client extension handler has been registered to handle SCT
extensions (B<TLSEXT_TYPE_signed_certificate_timestamp>).
If an SCT callback is enabled, a handshake may fail if the peer does
not provide a certificate, which can happen when using opportunistic
encryption with anonymous (B<aNULL>) cipher-suites enabled on both ends.
SCTs should only be used when the application requires an authenticated
connection, and wishes to perform additional validation on that identity.
=head1 RETURN VALUES
SSL_CTX_set_ct_validation_callback() and SSL_set_ct_validation_callback()

View File

@@ -21,7 +21,7 @@ the peer's certificate for SCTs. Future calls will return the same SCTs.
If no Certificate Transparency validation callback has been set (using
B<SSL_CTX_set_ct_validation_callback> or B<SSL_set_ct_validation_callback>),
this function is not guarantee to return all of the SCTs that the peer is
this function is not guaranteed to return all of the SCTs that the peer is
capable of sending.
=head1 RETURN VALUES