Age | Commit message (Collapse) | Author | Files | Lines |
|
initialization
|
|
|
|
|
|
|
|
The keystore type 'inline' can be used to build a keystore by using
PEM encoded certificate and key files.
Example: pkcs12:keystore?private=certs/key.pem&cert=certs/certificate.pem
|
|
|
|
|
|
|
|
|
|
INFO:
SSL Client-Authentication with keys from HSM-Facade only works with
BCJSSE Provider >= 1.70 and SystemD Parameter: -Dorg.bouncycastle.jsse.client.acceptRenegotiation=true
if HTTP Server requires re-negotiation.
Hint: do not enable SSL Debugging in BCJSSE Probider, because it throws
a NullPointerException with HSM-Facade keys!!!!
|
|
'AuthenticatedEncryptionPendingRequestIdGenerationStrategy' that allows generation of already expired tokens
|
|
|
|
does not responde
|
|
|
|
deadline, see https://grpc.io/blog/deadlines/
|
|
|
|
|
|
in case of keys base on HSM-Facade, because SSLContext based on BCJSSE needs BCJSSE TrustManager
BCJSSE is not compatible to SunJSSE TrustManager in Java >= 9
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Feature/gitlabci
See merge request egiz/eaaf_components!5
|
|
|
|
|
|
|
|
authenticated-encryption protect the internal pendingRequesttId
|
|
|
|
Security-Provider
|
|
passphrase based symmetric keys and keys from HSM-Facade
|
|
|
|
injection
fix broken jUnit test
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
authentication mechanisms
|
|
|
|
|
|
|
|
depends on a special provider implementation
|
|
|
|
|
|
|
|
The EaafKeyStoreFactory can be used to build KeyStores from differend providers and types
|