Go to file
Matt Caswell 9873297900 Separate ca_names handling for client and server
SSL(_CTX)?_set_client_CA_list() was a server side only function in 1.1.0.
If it was called on the client side then it was ignored. In 1.1.1 it now
makes sense to have a CA list defined for both client and server (the
client now sends it the the TLSv1.3 certificate_authorities extension).
Unfortunately some applications were using the same SSL_CTX for both
clients and servers and this resulted in some client ClientHellos being
excessively large due to the number of certificate authorities being sent.

This commit seperates out the CA list updated by
SSL(_CTX)?_set_client_CA_list() and the more generic
SSL(_CTX)?_set0_CA_list(). This means that SSL(_CTX)?_set_client_CA_list()
still has no effect on the client side. If both CA lists are set then
SSL(_CTX)?_set_client_CA_list() takes priority.

Fixes #7411

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7503)
2018-11-12 14:29:02 +00:00
.github
apps Check return value of EVP_PKEY_new 2018-11-10 04:30:45 +02:00
boringssl@2070f8ad91
Configurations Recreate the OS390-Unix config target 2018-11-10 14:26:40 +01:00
crypto Fix SipHash init order. 2018-11-12 07:15:55 +01:00
demos Remove outdated e_chil.txt file 2018-11-06 22:23:37 -05:00
doc Separate ca_names handling for client and server 2018-11-12 14:29:02 +00:00
engines Change the build of engines to use ordinal files for symbol export 2018-10-05 08:22:42 +02:00
external/perl Update copyright year 2018-09-11 13:45:17 +01:00
fuzz GMAC implementation 2018-11-05 08:09:41 +10:00
include Add EVP_PKEY_supports_digest_nid() 2018-11-10 03:23:14 +02:00
krb5@b9ad6c4950
ms Update copyright year 2018-05-01 13:34:30 +01:00
os-dep
pyca-cryptography@09403100de Update the pyca-cryptography submodule 2018-09-10 12:04:03 +01:00
ssl Separate ca_names handling for client and server 2018-11-12 14:29:02 +00:00
test Test use of a brainpool ECDSA certificate 2018-11-12 11:10:21 +00:00
tools Update copyright year 2018-03-20 13:08:46 +00:00
util Add EVP_PKEY_supports_digest_nid() 2018-11-10 03:23:14 +02:00
VMS
.gitattributes
.gitignore Ignore libcrypto.ld and libssl.ld 2018-10-03 16:40:18 +01:00
.gitmodules
.travis-apt-pin.preferences
.travis-create-release.sh Reduce travis-ci log output 2018-03-08 21:18:35 +01:00
.travis.yml Revert ".travis.yml: omit linux-ppc64le target." 2018-08-31 10:56:35 +02:00
ACKNOWLEDGEMENTS
appveyor.yml CI config: no need to make both install and install_docs 2018-05-14 17:51:48 +02:00
AUTHORS Update AUTHORS list, add commentary 2018-07-08 20:32:04 -04:00
build.info Simplify the processing of skipped source directories 2018-11-05 09:28:37 +01:00
CHANGES Recreate the OS390-Unix config target 2018-11-10 14:26:40 +01:00
config Configure: move --noexecstack probe to Configure. 2018-05-05 20:44:56 +02:00
config.com Update copyright year 2018-02-13 13:59:25 +00:00
Configure Simplify the processing of skipped source directories 2018-11-05 09:28:37 +01:00
CONTRIBUTING Add a note on CHANGES and NEWS in CONTRIBUTING 2018-05-17 13:51:11 +02:00
e_os.h test/secmemtest: test secure memory only if it is implemented 2018-10-05 12:19:48 +02:00
FAQ
INSTALL typo-fixes: miscellaneous typo fixes 2018-09-21 23:55:22 +02:00
LICENSE Update the license end year 2018-01-20 10:02:23 +01:00
NEWS Add blurbs about EVP_MAC in NEWS and CHANGES 2018-10-30 08:57:34 +01:00
NOTES.ANDROID Configurations/15-android.conf: add support for "standalone toolchain". 2018-10-19 10:35:36 +02:00
NOTES.DJGPP
NOTES.PERL
NOTES.UNIX NOTES.UNIX: add "Linking your application" paragraph 2018-06-26 12:28:06 +02:00
NOTES.VMS
NOTES.WIN INSTALL,NOTES.WIN: classify no-asm as non-production option. 2018-07-25 15:47:12 +02:00
README The next version in master is at least 1.1.2, not 1.1.1x 2018-09-11 16:51:38 +02:00
README.ENGINE
README.FIPS

 OpenSSL 1.1.2-dev

 Copyright (c) 1998-2018 The OpenSSL Project
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 All rights reserved.

 DESCRIPTION
 -----------

 The OpenSSL Project is a collaborative effort to develop a robust,
 commercial-grade, fully featured, and Open Source toolkit implementing the
 Transport Layer Security (TLS) protocols (including SSLv3) as well as a
 full-strength general purpose cryptographic library.

 OpenSSL is descended from the SSLeay library developed by Eric A. Young
 and Tim J. Hudson.  The OpenSSL toolkit is licensed under a dual-license (the
 OpenSSL license plus the SSLeay license), which means that you are free to
 get and use it for commercial and non-commercial purposes as long as you
 fulfill the conditions of both licenses.

 OVERVIEW
 --------

 The OpenSSL toolkit includes:

 libssl (with platform specific naming):
     Provides the client and server-side implementations for SSLv3 and TLS.

 libcrypto (with platform specific naming):
     Provides general cryptographic and X.509 support needed by SSL/TLS but
     not logically part of it.

 openssl:
     A command line tool that can be used for:
        Creation of key parameters
        Creation of X.509 certificates, CSRs and CRLs
        Calculation of message digests
        Encryption and decryption
        SSL/TLS client and server tests
        Handling of S/MIME signed or encrypted mail
        And more...

 INSTALLATION
 ------------

 See the appropriate file:
        INSTALL         Linux, Unix, Windows, OpenVMS, ...
        NOTES.*         INSTALL addendums for different platforms

 SUPPORT
 -------

 See the OpenSSL website www.openssl.org for details on how to obtain
 commercial technical support. Free community support is available through the
 openssl-users email list (see
 https://www.openssl.org/community/mailinglists.html for further details).

 If you have any problems with OpenSSL then please take the following steps
 first:

    - Download the latest version from the repository
      to see if the problem has already been addressed
    - Configure with no-asm
    - Remove compiler optimization flags

 If you wish to report a bug then please include the following information
 and create an issue on GitHub:

    - OpenSSL version: output of 'openssl version -a'
    - Configuration data: output of 'perl configdata.pm --dump'
    - OS Name, Version, Hardware platform
    - Compiler Details (name, version)
    - Application Details (name, version)
    - Problem Description (steps that will reproduce the problem, if known)
    - Stack Traceback (if the application dumps core)

 Just because something doesn't work the way you expect does not mean it
 is necessarily a bug in OpenSSL. Use the openssl-users email list for this type
 of query.

 HOW TO CONTRIBUTE TO OpenSSL
 ----------------------------

 See CONTRIBUTING

 LEGALITIES
 ----------

 A number of nations restrict the use or export of cryptography. If you
 are potentially subject to such restrictions you should seek competent
 professional legal advice before attempting to develop or distribute
 cryptographic code.