| Age | Commit message (Collapse) | Author | Files | Lines | 
|---|
|  | The check can be disabled by using the configuration property: modules.sl20.security.truststore.need.valid.certificate | 
|  | initialization | 
|  |  | 
|  |  | 
|  |  | 
|  | The keystore type 'inline' can be used to build a keystore by using
PEM encoded certificate and key files.
Example: pkcs12:keystore?private=certs/key.pem&cert=certs/certificate.pem | 
|  |  | 
|  |  | 
|  |  | 
|  |  | 
|  | INFO:
       SSL Client-Authentication with keys from HSM-Facade only works with
       BCJSSE Provider >= 1.70 and SystemD Parameter: -Dorg.bouncycastle.jsse.client.acceptRenegotiation=true
       if HTTP Server requires re-negotiation.
       Hint: do not enable SSL Debugging in BCJSSE Probider, because it throws
             a NullPointerException with HSM-Facade keys!!!! | 
|  | 'AuthenticatedEncryptionPendingRequestIdGenerationStrategy' that allows generation of already expired tokens | 
|  |  | 
|  | does not responde | 
|  |  | 
|  | deadline, see https://grpc.io/blog/deadlines/ | 
|  |  | 
|  |  | 
|  | in case of keys base on HSM-Facade, because SSLContext based on BCJSSE needs BCJSSE TrustManager
BCJSSE is not compatible to SunJSSE TrustManager in Java >= 9 | 
|  |  | 
|  |  | 
|  |  | 
|  |  | 
|  |  | 
|  |  | 
|  | Feature/gitlabci
See merge request egiz/eaaf_components!5 | 
|  |  | 
|  |  | 
|  |  | 
|  | authenticated-encryption protect the internal pendingRequesttId | 
|  |  | 
|  | Security-Provider | 
|  | passphrase based symmetric keys and keys from HSM-Facade | 
|  |  | 
|  | injection
fix broken jUnit test | 
|  |  | 
|  |  | 
|  |  | 
|  |  | 
|  |  | 
|  |  | 
|  |  | 
|  | authentication mechanisms | 
|  |  | 
|  |  | 
|  |  | 
|  | depends on a special provider implementation | 
|  |  | 
|  |  | 
|  |  |