mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2025-03-05 02:49:01 +00:00
Following work from Arjen and Mathilde, it adds ssl_{c,s}_chain_der methods; it returns DER encoded certs from SSL_get_peer_cert_chain Also update existing vtc tests to add random intermediate certificates When getting the result through this header: http-response add-header x-ssl-chain-der %[ssl_c_chain_der,hex] One can parse it with any lib accepting ASN.1 DER data, such as in go: bin, err := encoding/hex.DecodeString(cert) certs_parsed, err := x509.ParseCertificates(bin) Cc: Arjen Nienhuis <arjen@zorgdoc.nl> Signed-off-by: Mathilde Gilles <m.gilles@criteo.com> Signed-off-by: William Dauchy <w.dauchy@criteo.com> |
||
---|---|---|
.. | ||
design-thoughts | ||
internals | ||
lua-api | ||
51Degrees-device-detection.txt | ||
acl.fig | ||
architecture.txt | ||
close-options.txt | ||
coding-style.txt | ||
configuration.txt | ||
cookie-options.txt | ||
DeviceAtlas-device-detection.txt | ||
gpl.txt | ||
haproxy.1 | ||
intro.txt | ||
lgpl.txt | ||
linux-syn-cookies.txt | ||
lua.txt | ||
management.txt | ||
netscaler-client-ip-insertion-protocol.txt | ||
network-namespaces.txt | ||
peers-v2.0.txt | ||
peers.txt | ||
proxy-protocol.txt | ||
queuing.fig | ||
regression-testing.txt | ||
seamless_reload.txt | ||
SOCKS4.protocol.txt | ||
SPOE.txt | ||
WURFL-device-detection.txt |