boringssl/ssl
David Benjamin 76bb1411ac Remove the BORINGSSL_ANDROID_SYSTEM P-521 special-case.
This dates to
62d05888d1
which intended to be removed in a later Android release once X25519 was
added. That has since happened.

This intentionally leaves the P-521 hooked up for now. Detaching it
completely is a more aggressive change (since it's slightly tied up with
SHA-512) that should wait until removing ECDSA+SHA512 has stuck in Chrome.

Change-Id: I04553c3eddf33a13b6e3e9a6e7ac4c4725676cb0
Reviewed-on: https://boringssl-review.googlesource.com/10923
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2016-12-15 15:47:39 +00:00
..
test Make TLS 1.3 check ECDSA KeyUsage and add test. 2016-12-14 17:56:55 +00:00
CMakeLists.txt Add TLS 1.3 1-RTT. 2016-07-18 09:54:46 +00:00
custom_extensions.c Pass explicit hs parameters into custom_extensions.c. 2016-12-06 19:49:36 +00:00
d1_both.c Replace hash_current_message with get_current_message. 2016-11-15 06:52:10 +00:00
d1_lib.c Move a few more functions into *_method.c. 2016-12-08 16:29:19 +00:00
d1_pkt.c Expose SSL_max_seal_overhead. 2016-11-09 16:51:46 +00:00
d1_srtp.c Fix ssl_ctx_make_profiles error handling. 2016-09-27 13:27:06 +00:00
dtls_method.c Move a few more functions into *_method.c. 2016-12-08 16:29:19 +00:00
dtls_record.c Take the version parameter out of ssl_do_msg_callback. 2016-09-21 18:55:27 +00:00
handshake_client.c Don't use X.509 functions to check ECDSA keyUsage. 2016-12-14 17:51:03 +00:00
handshake_server.c Preserve the peer signature algorithm across resumes. 2016-12-14 01:12:40 +00:00
internal.h Don't use X.509 functions to check ECDSA keyUsage. 2016-12-14 17:51:03 +00:00
s3_both.c Don't depend on the X509 code for getting public keys. 2016-12-13 21:27:31 +00:00
s3_enc.c Move key_block into SSL_HANDSHAKE. 2016-11-09 17:02:33 +00:00
s3_lib.c Set up the SSL_HANDSHAKE object earlier. 2016-12-12 21:59:06 +00:00
s3_pkt.c Expose SSL_max_seal_overhead. 2016-11-09 16:51:46 +00:00
ssl_aead_ctx.c Validate input iv/mac sizes in SSL_AEAD_CTX_new. 2016-10-28 21:25:35 +00:00
ssl_asn1.c Preserve the peer signature algorithm across resumes. 2016-12-14 01:12:40 +00:00
ssl_buffer.c Add SSL_is_dtls. 2016-08-02 20:43:58 +00:00
ssl_cert.c Don't use X.509 functions to check ECDSA keyUsage. 2016-12-14 17:51:03 +00:00
ssl_cipher.c Remove CECPQ1 (experimental post-quantum key agreement). 2016-12-09 19:16:56 +00:00
ssl_ecdh.c Remove New Hope key agreement. 2016-12-10 01:06:31 +00:00
ssl_file.c Check for sk_X509_NAME_push failures. 2016-09-27 13:18:37 +00:00
ssl_lib.c Add |SSL_get_peer_full_cert_chain|. 2016-12-14 18:01:10 +00:00
ssl_rsa.c Rename X.509 members in |SSL_SESSION| and |CERT|. 2016-11-09 20:07:57 +00:00
ssl_session.c Preserve the peer signature algorithm across resumes. 2016-12-14 01:12:40 +00:00
ssl_stat.c Move state and next_state to SSL_HANDSHAKE. 2016-12-12 22:09:01 +00:00
ssl_test.cc Push the difference in chain semantics to the edge. 2016-12-13 17:18:53 +00:00
t1_enc.c Pass explicit hs parameters into t1_enc.c. 2016-12-06 19:49:46 +00:00
t1_lib.c Remove the BORINGSSL_ANDROID_SYSTEM P-521 special-case. 2016-12-15 15:47:39 +00:00
tls13_both.c Make TLS 1.3 check ECDSA KeyUsage and add test. 2016-12-14 17:56:55 +00:00
tls13_client.c Don't use |X509_get_pubkey| in TLS 1.3 code either. 2016-12-14 17:49:10 +00:00
tls13_enc.c Pass explicit hs parameters to tls13_*.c. 2016-12-06 19:49:24 +00:00
tls13_server.c Don't use |X509_get_pubkey| in TLS 1.3 code either. 2016-12-14 17:49:10 +00:00
tls_method.c Move a few more functions into *_method.c. 2016-12-08 16:29:19 +00:00
tls_record.c Skipping early data on 0RTT rejection. 2016-12-01 20:16:08 +00:00