diff options
author | Scott Murray <scott.murray@konsulko.com> | 2022-07-11 19:29:53 -0400 |
---|---|---|
committer | Jan-Simon Moeller <jsmoeller@linuxfoundation.org> | 2022-07-13 21:58:38 +0000 |
commit | 08977ac24f2d31b0955786824c9ff62eff981ee9 (patch) | |
tree | 5315c8605e38eee12b164a9884891168900516d8 /recipes-wam/chromium | |
parent | ff1776b06bc54c36d199f9061f1ff78c7b3db027 (diff) |
kuksa-val: add regenerated server certificateneedlefish_13.91.0needlefish/13.91.013.91.0
After fixing the issue with the SSL context purpose in the Python
client library, client connections were still failing with the
error:
certificate verify failed: IP address mismatch, certificate is not valid for localhost
To fix this, the certificate generation script has been patched to
create the now required Subject Alt Name extension field, as that has
effectively replaced using the CN field in most SSL implementations.
Replacement Server.key and Server.pem files generated with the
updated script have been added to give us a working configuration
while this is worked with upstream so their default configuration is
usable with newer Python + OpenSSL versions.
Bug-AGL: SPEC-4467
Signed-off-by: Scott Murray <scott.murray@konsulko.com>
Change-Id: I9e8374fbbef6e8570b16d87f4e1800ceba8aacad
Diffstat (limited to 'recipes-wam/chromium')
0 files changed, 0 insertions, 0 deletions