aboutsummaryrefslogtreecommitdiffstats
path: root/ssl/t1_lib.c
Commit message (Expand)AuthorAgeFilesLines
* Reduce the security bits for MD5 and SHA1 based signatures in TLSKurt Roeckx2020-06-271-0/+18
* Create defines for TLS Group IdsMatt Caswell2020-06-191-35/+36
* Update the various SSL group getting and setting functionsMatt Caswell2020-06-191-33/+68
* Modify libssl to discover supported groups based on available providersMatt Caswell2020-06-191-81/+268
* The EVP_MAC functions have been renamed for consistency. The EVP_MAC_CTX_*Pauli2020-06-111-4/+4
* use safe primes in ssl_get_auto_dh()Hubert Kario2020-06-091-36/+38
* Don't downgrade keys in libsslMatt Caswell2020-06-051-11/+0
* Check that Signature Algorithms are available before using themMatt Caswell2020-06-051-47/+102
* Move EC_METHOD to internal-onlyBilly Brumley2020-06-021-1/+1
* New Russian TLS 1.2 implementationDmitry Belyavskiy2020-05-191-1/+16
* Fix GOST curve sec bitsNikolay Morozov2020-04-281-7/+7
* In OpenSSL builds, declare STACK for datatypes ...Rich Salz2020-04-241-0/+4
* Update copyright yearMatt Caswell2020-04-231-1/+1
* GOST2012 TLS Supported Groups Identifiers SupportNikolay Morozov2020-04-221-0/+18
* Fix NULL dereference in SSL_check_chain() for TLS 1.3Benjamin Kaduk2020-04-211-1/+1
* Use the libctx for all EVP_PKEY_CTX operationsMatt Caswell2020-04-191-35/+35
* TLSEXT_SIGALG_gostr34102012 0x0840 and 0x0841 supportNikolay Morozov2020-04-161-2/+12
* EVP & TLS: Add necessary EC_KEY data extraction functions, and use themRichard Levitte2020-04-081-29/+32
* Give a better error if we can't find a sig algMatt Caswell2020-03-301-2/+2
* Use a fetched cipher when decrypting a ticket in libsslMatt Caswell2020-03-261-4/+12
* Constify various mostly X509-related parameter types in crypto/ and apps/Dr. David von Oheimb2020-03-231-1/+1
* Deprecate the low level RSA functions.Pauli2020-02-201-7/+5
* Check that ed25519 and ed448 are allowed by the security levelKurt Roeckx2020-02-111-18/+41
* Explicitly fetch ciphers and digests in libsslMatt Caswell2020-02-061-11/+14
* TLS: use EVP for HMAC throughout libssl.Pauli2020-01-291-12/+148
* Check that the default signature type is allowedKurt Roeckx2020-01-251-4/+12
* Workaround for Windows-based GOST implementationsDmitry Belyavskiy2019-11-101-0/+20
* Reorganize local header filesDr. Matthias St. Pierre2019-09-281-1/+1
* Fix bogus check for EVP_PKEY_supports_digest_nid() in check_cert_usable()David Woodhouse2019-08-271-28/+26
* Fix SSL_check_chain()Matt Caswell2019-08-091-71/+152
* API to get negotiated key exchange algorithm in TLS1.3raja-ashok2019-08-061-0/+7
* Remove tab characters from C source files.Pauli2019-07-161-2/+2
* Move 'shared_sigalgs' from cert_st to ssl_stBenjamin Kaduk2019-06-261-31/+29
* Following the previous 2 commits also move ecpointformats out of sessionMatt Caswell2019-06-181-3/+3
* Fix no-ec with no-dhMatt Caswell2019-06-171-15/+37
* Allow TLSv1.3 in a no-ec buildMatt Caswell2019-06-171-81/+97
* TLS1.3 FFDHE Supportraja-ashok2019-06-121-51/+85
* Collapse ssl3_state_st (s3) into ssl_stTodd Short2019-04-291-68/+68
* Use (D)TLS_MAX_VERSION_INTERNAL internallyKurt Roeckx2018-12-151-1/+1
* Following the license change, modify the boilerplates in ssl/Richard Levitte2018-12-061-1/+1
* Fix no-ec and no-tls1_2Matt Caswell2018-11-141-0/+2
* Added missing signature algorithm reflection functionsViktor Dukhovni2018-11-121-0/+8
* Don't negotiate TLSv1.3 if our EC cert isn't TLSv1.3 capableMatt Caswell2018-11-121-0/+31
* Add EVP_PKEY_supports_digest_nid()David Woodhouse2018-11-101-25/+30
* Honour mandatory digest on private key in has_usable_cert()David Woodhouse2018-11-101-3/+18
* Give a better error if an attempt is made to set a zero length groups listMatt Caswell2018-11-081-0/+4
* Don't use an RSA-PSS cert for RSA key exchangeMatt Caswell2018-09-041-3/+7
* Use the same min-max version range on the client consistentlyMatt Caswell2018-08-221-1/+1
* Check that the public key OID matches the sig algMatt Caswell2018-07-181-1/+9
* Do not use GOST sig algs in TLSv1.3 where possibleMatt Caswell2018-07-131-0/+41