1. 12 May, 2018 2 commits
  2. 11 May, 2018 5 commits
  3. 08 May, 2018 1 commit
  4. 05 May, 2018 2 commits
  5. 04 May, 2018 3 commits
  6. 03 May, 2018 2 commits
  7. 02 May, 2018 5 commits
  8. 01 May, 2018 4 commits
  9. 27 Apr, 2018 3 commits
  10. 26 Apr, 2018 6 commits
  11. 25 Apr, 2018 4 commits
  12. 24 Apr, 2018 3 commits
    • Matt Caswell's avatar
      In a reneg use the same client_version we used last time · ba2fd950
      Matt Caswell authored
      
      
      In 1.0.2 and below we always send the same client_version in a reneg
      ClientHello that we sent the first time around, regardless of what
      version eventually gets negotiated. According to a comment in
      statem_clnt.c this is a workaround for some buggy servers that choked if
      we changed the version used in the RSA encrypted premaster secret.
      
      In 1.1.0+ this behaviour no longer occurs. This restores the original
      behaviour.
      
      Fixes #1651
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/6060)
      ba2fd950
    • Matt Caswell's avatar
      Document when a session gets removed from cache · 0abb903b
      Matt Caswell authored
      
      
      Document the fact that if a session is not closed down cleanly then the
      session gets removed from the cache and marked as non-resumable.
      
      Fixes #4720
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/6054)
      0abb903b
    • Matt Caswell's avatar
      Allow intermediate CAs to use RSA PSS in 1.1.0 · 5791a917
      Matt Caswell authored
      
      
      In 1.1.0 and above we check the digest algorithm used to create signatures
      in intermediate CA certs. If it is not sufficiently strong then we reject
      the cert. To work out what digest was used we look at the OID for the
      signature. This works for most signatures, but not for RSA PSS where the
      digest is stored as parameter of the SignatureAlgorithmIdentifier. This
      results in the digest look up routines failing and the cert being rejected.
      
      PR #3301 added support for doing this properly in master. So in that
      branch this all works as expected. It also works properly in 1.0.2 where we
      don't have the digest checks at all. So the only branch where this fails is
      1.1.0.
      
      PR #3301 seems too significant to backport to 1.1.0. Instead we simply skip
      the signature digest algorithm strength checks if we detect RSA PSS.
      
      Fixes #3558.
      
      Reviewed-by: default avatarBernd Edlinger <bernd.edlinger@hotmail.de>
      (Merged from https://github.com/openssl/openssl/pull/6052)
      5791a917