openssl/crypto/dsa
Tomas Mraz cd4c83b524 The SHA256 is not a mandatory digest for DSA.
The #7408 implemented mandatory digest checking in TLS.
However this broke compatibility of DSS support with GnuTLS
which supports only SHA1 with DSS.

There is no reason why SHA256 would be a mandatory digest
for DSA as other digests in SHA family can be used as well.

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/9015)
2019-05-28 17:14:47 +02:00
..
build.info Make DSA_METHOD opaque 2016-04-03 00:23:56 +01:00
dsa_ameth.c The SHA256 is not a mandatory digest for DSA. 2019-05-28 17:14:47 +02:00
dsa_asn1.c constify *_dup() and *i2d_*() and related functions as far as possible, introducing DECLARE_ASN1_DUP_FUNCTION 2019-03-06 16:10:09 +00:00
dsa_depr.c Following the license change, modify the boilerplates in crypto/dsa/ 2018-12-06 14:48:43 +01:00
dsa_err.c Following the license change, modify the boilerplates in crypto/dsa/ 2018-12-06 14:48:43 +01:00
dsa_gen.c Added NULL check to BN_clear() & BN_CTX_end() 2019-03-19 07:25:48 +01:00
dsa_key.c Following the license change, modify the boilerplates in crypto/dsa/ 2018-12-06 14:48:43 +01:00
dsa_lib.c Following the license change, modify the boilerplates in crypto/dsa/ 2018-12-06 14:48:43 +01:00
dsa_locl.h Following the license change, modify the boilerplates in crypto/dsa/ 2018-12-06 14:48:43 +01:00
dsa_meth.c Following the license change, modify the boilerplates in crypto/dsa/ 2018-12-06 14:48:43 +01:00
dsa_ossl.c Reject obviously invalid DSA parameters during signing 2019-05-07 16:47:30 +01:00
dsa_pmeth.c EVP_Digest*: enable SHA3 pre-hashing for DSA 2019-05-22 16:49:49 +02:00
dsa_prn.c Following the license change, modify the boilerplates in crypto/dsa/ 2018-12-06 14:48:43 +01:00
dsa_sign.c Following the license change, modify the boilerplates in crypto/dsa/ 2018-12-06 14:48:43 +01:00
dsa_vrf.c Following the license change, modify the boilerplates in crypto/dsa/ 2018-12-06 14:48:43 +01:00