boringssl/crypto/err
David Benjamin ea9a0d5313 Refine SHA-1 default in signature algorithm negotiation.
Rather than blindly select SHA-1 if we can't find a matching one, act as
if the peer advertised rsa_pkcs1_sha1 and ecdsa_sha1. This means that we
will fail the handshake if no common algorithm may be found.

This is done in preparation for removing the SHA-1 default in TLS 1.3.

Change-Id: I3584947909d3d6988b940f9404044cace265b20d
Reviewed-on: https://boringssl-review.googlesource.com/8695
Reviewed-by: David Benjamin <davidben@google.com>
2016-07-12 16:32:31 +00:00
..
asn1.errordata Align with upstream's error strings, take two. 2016-03-15 16:02:12 +00:00
bio.errordata
bn.errordata
cipher.errordata
CMakeLists.txt
conf.errordata
dh.errordata Reimplement PKCS #3 DH parameter parsing with crypto/bytestring. 2016-05-09 19:36:41 +00:00
digest.errordata
dsa.errordata Reimplement DSA parsing logic with crypto/asn1. 2016-02-17 00:26:01 +00:00
ec.errordata Always use Fermat's Little Theorem in ecdsa_sign_setup. 2016-06-20 17:11:42 +00:00
ecdh.errordata
ecdsa.errordata
engine.errordata
err_data_generate.go Make err_data_generator.go silent by default. 2016-04-18 19:42:15 +00:00
err_test.cc
err.c Wrap MSVC-only warning pragmas in a macro. 2016-06-09 21:29:36 +00:00
evp.errordata Reset crypto/evp error codes. 2016-02-26 23:34:04 +00:00
hkdf.errordata
obj.errordata
pem.errordata
pkcs8.errordata
rsa.errordata Align with upstream's error strings, take two. 2016-03-15 16:02:12 +00:00
ssl.errordata Refine SHA-1 default in signature algorithm negotiation. 2016-07-12 16:32:31 +00:00
x509.errordata Add checks to X509_NAME_oneline() 2016-05-03 16:34:59 +00:00
x509v3.errordata