> [fol...@cisco.com - Fri Jul 06 17:50:15 2012]: > > RFC 5246 allows a TLS 1.2 client to omit the Signature Algorithm > extension. See section 7.4.1.4.1 for details. This creates a problem > for OpenSSL 1.0.1 when acting as a server and either a DSA or ECDSA > certificate is used. Because the ClientHello does not contain the > Signature Algorithm extension, tls1_process_sigalgs() is never invoked > on the server side to set the digest used for the session context. > Later during the handshake when the server sends the ServerKeyExchange, > the call to tls12_get_sigandhash() fails, which causes the server to > abort the handshake. > > The attached patch to tls12_get_sigandhash() resolves the problem. > However, the OpenSSL maintainers may have a better solution. > >
Have you tried a recent 1.0.1 snapshot? I came across the same issue when developing more configurable supported signature algorithms support. The fix I made was: http://cvs.openssl.org/chngview?cn=22655 Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org