openssl/apps
Matt Caswell c9d6fdd6f7 Don't fail if the PSK identity doesn't match
In 1.1.0 s_server if the PSK identity doesn't match what we have then
a warning is printed and we continue the connection anyway. In 1.1.1,
if TLSv1.3 is used and the identity doesn't match then we abort the
connection. We should really be consistent with the old behaviour.

Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6659)
2018-07-06 23:38:53 +01:00
..
demoSRP
CA.pl.in
app_rand.c
apps.c
apps.h
asn1pars.c
bf_prefix.c
build.info
ca-cert.srl
ca-key.pem
ca-req.pem
ca.c
cert.pem
ciphers.c
client.pem
cms.c
crl.c
crl2p7.c
ct_log_list.cnf
dgst.c
dh1024.pem
dh2048.pem
dh4096.pem
dhparam.c
dsa-ca.pem
dsa-pca.pem
dsa.c
dsa512.pem
dsa1024.pem
dsap.pem
dsaparam.c
ec.c
ecparam.c
enc.c
engine.c
errstr.c
gendsa.c
genpkey.c
genrsa.c
nseq.c
ocsp.c
openssl-vms.cnf
openssl.c
openssl.cnf
opt.c
passwd.c
pca-cert.srl
pca-key.pem
pca-req.pem
pkcs7.c
pkcs8.c
pkcs12.c
pkey.c
pkeyparam.c
pkeyutl.c
prime.c
privkey.pem
progs.pl
rand.c
rehash.c
req.c Reject duplicate -addext parameters 2018-07-05 19:57:22 -04:00
req.pem
rsa.c
rsa8192.pem
rsautl.c
s512-key.pem
s512-req.pem
s1024key.pem
s1024req.pem
s_apps.h
s_cb.c
s_client.c Only dump session data after we have received it 2018-06-26 10:07:01 +01:00
s_server.c Don't fail if the PSK identity doesn't match 2018-07-06 23:38:53 +01:00
s_socket.c
s_time.c
server.pem
server.srl
server2.pem
sess_id.c
smime.c
speed.c apps/speed.c: add missing checks for RAND_bytes() 2018-06-24 20:26:37 +02:00
spkac.c
srp.c
storeutl.c
testCA.pem
testdsa.h
testrsa.h
timeouts.h
ts.c
tsget.in
verify.c
version.c
vms_decc_init.c
vms_term_sock.c
vms_term_sock.h
win32_init.c
x509.c