stunnel: regenerated self-signed test certificate with SHA1 hash
authorMarc Hoersken <info@marc-hoersken.de>
Sat, 22 Feb 2014 15:48:15 +0000 (16:48 +0100)
committerMarc Hoersken <info@marc-hoersken.de>
Sat, 22 Feb 2014 15:49:09 +0000 (16:49 +0100)
commitb5486adc9bb335818e501b925544dcd6b3fd92e4
treebbdb2c1ce1331ce7466f190f0523c4cf2b706d60
parenta660c0dbe6a81317c64d6652ddc66658e2752d2e
stunnel: regenerated self-signed test certificate with SHA1 hash

The previous test certificate contained a MD5 hash which is not
supported using TLSv1.2 with Schannel on Windows 7 or newer.

See the update to this blog post on IEInternals / MSDN:
http://blogs.msdn.com/b/ieinternals/archive/2011/03/25/
misbehaving-https-servers-impair-tls-1.1-and-tls-1.2.aspx

"Update: If the server negotiates a TLS1.2 connection with a
Windows 7 or 8 schannel.dll-using client application, and it
provides a certificate chain which uses the (weak) MD5 hash
algorithm, the client will abort the connection (TCP/IP FIN)
upon receipt of the certificate."
tests/stunnel.pem