summaryrefslogtreecommitdiff
path: root/lib/algorithms
Commit message (Expand)AuthorAgeFilesLines
* DH/DSA: allow the generation of larger than 15360 bit parametersNikos Mavrogiannopoulos2016-02-131-3/+2
* updated chacha20 ciphers to conform to latest draftNikos Mavrogiannopoulos2015-12-141-8/+8
* Modified the CHACHA20 cipher to conform to draft-ietf-tls-chacha20-poly1305-02Nikos Mavrogiannopoulos2015-12-142-26/+21
* Require TLS 1.2 for all the ciphersuites which are defined for it onlyNikos Mavrogiannopoulos2015-11-091-97/+97
* Disable the NULL cipher on runtime when FIPS140 mode is enabled instead of st...Nikos Mavrogiannopoulos2015-10-151-6/+0
* backport: Tolerate priority strings with names of legacy ciphers and key exch...Nikos Mavrogiannopoulos2015-10-152-5/+27
* Introduced the security parameter future (256) and switched ultra to 192 bitsNikos Mavrogiannopoulos2015-10-121-2/+2
* Exported functions to convert from and to OIDsNikos Mavrogiannopoulos2015-06-184-27/+107
* doc updateNikos Mavrogiannopoulos2015-04-291-0/+2
* ciphersuites: moved CCM ciphersuites in the appropriate ifdefsNikos Mavrogiannopoulos2015-04-071-32/+35
* Added CCM-8 ciphersuitesNikos Mavrogiannopoulos2015-04-072-1/+75
* chacha20-poly1305: ciphersuite numbers correspond to the latest draftNikos Mavrogiannopoulos2015-04-021-8/+8
* only send EtM extension if we have CBC ciphersuitesNikos Mavrogiannopoulos2015-04-011-0/+13
* corrected GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305Nikos Mavrogiannopoulos2015-03-291-1/+1
* moved chacha20-poly1305 ciphersuites to the 0xCD spaceNikos Mavrogiannopoulos2015-03-281-8/+8
* Added the CHACHA20-POLY1305 ciphersuites (with random IDs)Nikos Mavrogiannopoulos2015-03-281-40/+82
* added chacha20-poly1305 as cipherNikos Mavrogiannopoulos2015-03-281-0/+10
* doc: avoid using structure for opaque typesNikos Mavrogiannopoulos2015-03-201-1/+1
* added commentsNikos Mavrogiannopoulos2015-02-221-1/+1
* removed unnecessary check and optimized functionNikos Mavrogiannopoulos2015-02-211-21/+4
* corrected check which prevented client to sent an unacceptable for the versio...Nikos Mavrogiannopoulos2015-02-211-11/+12
* check the negotiated TLS/DTLS version prior to offering a ciphersuite a serverNikos Mavrogiannopoulos2015-02-211-9/+245
* Added the notion of obsolete versionsNikos Mavrogiannopoulos2015-01-161-10/+17
* Added more precise version check in _gnutls_version_lowestNikos Mavrogiannopoulos2014-12-191-3/+2
* modified the CCM ciphersuite's name to match the one in the IANA registryNikos Mavrogiannopoulos2014-12-051-20/+20
* Added definitions for CCM ciphersuitesNikos Mavrogiannopoulos2014-12-032-0/+76
* The record version in the client Hello will be set to the lowest supported pr...Nikos Mavrogiannopoulos2014-11-211-18/+33
* added missing commaNikos Mavrogiannopoulos2014-11-051-2/+1
* modernized cipher tableNikos Mavrogiannopoulos2014-11-051-52/+123
* Made AEAD type an alternative to stream and blockNikos Mavrogiannopoulos2014-11-031-6/+6
* removed support for SALSA20 and for stream ciphers with IVNikos Mavrogiannopoulos2014-10-241-61/+0
* mac_to_entry -> _gnutls_mac_to_entryNikos Mavrogiannopoulos2014-08-111-1/+1
* RSA-PSK ciphersuites are only allowed in TLS 1.0.Nikos Mavrogiannopoulos2014-07-221-5/+5
* minimum version was changed to TLS 1.0 for ciphersuites with SHA2Nikos Mavrogiannopoulos2014-07-221-10/+10
* _gnutls_version_get() returns GNUTLS_VERSION_UNKNOWN on error instead of nega...Nikos Mavrogiannopoulos2014-05-231-1/+1
* Prevent a crash by ensuring that there is a valid negotiated version.Nikos Mavrogiannopoulos2014-05-221-0/+3
* Better check for null signature method.Nikos Mavrogiannopoulos2014-05-041-1/+2
* corrected initializerNikos Mavrogiannopoulos2014-03-111-2/+2
* verify that the algorithm of the received certificate matches the expected.Nikos Mavrogiannopoulos2014-03-111-14/+22
* ciphersuites that utilize SHA256 or SHA384 are only available in TLS 1.0Nikos Mavrogiannopoulos2014-03-081-39/+39
* stricter type usageNikos Mavrogiannopoulos2014-03-082-4/+4
* explicit type conversions when neededNikos Mavrogiannopoulos2014-03-081-31/+31
* Added NULL PSK ciphersuites with SHA1; suggested by Manuel Pégourié-Gonnard.Nikos Mavrogiannopoulos2014-03-021-0/+21
* Allow all ciphersuites in SSL3.0 when they are available in TLS1.0Nikos Mavrogiannopoulos2014-02-281-79/+79
* corrected typoNikos Mavrogiannopoulos2014-02-011-1/+1
* reduced the TLS and DTLS version requirements for all ciphersuites that are n...Nikos Mavrogiannopoulos2014-01-311-44/+44
* Added identifiers for DSA-SHA382 and DSA-SHA512Nikos Mavrogiannopoulos2014-01-271-2/+5
* Added gnutls_sec_param_to_symmetric_bits()Nikos Mavrogiannopoulos2014-01-151-0/+26
* security levels aligned to ENISA and other common practice recommendations.Nikos Mavrogiannopoulos2014-01-141-6/+6
* GNUTLS_SEC_PARAM_NORMAL was renamed to GNUTLS_SEC_PARAM_MEDIUMNikos Mavrogiannopoulos2014-01-141-2/+2