openssl/test/ssl-tests
Kurt Roeckx aba03ae571 Reduce the security bits for MD5 and SHA1 based signatures in TLS
This has as effect that SHA1 and MD5+SHA1 are no longer supported at
security level 1, and that TLS < 1.2 is no longer supported at the
default security level of 1, and that you need to set the security
level to 0 to use TLS < 1.2.

Reviewed-by: Tim Hudson <tjh@openssl.org>
GH: #10787
2020-06-27 08:41:40 +02:00
..
01-simple.cnf
01-simple.cnf.in
02-protocol-version.cnf
02-protocol-version.cnf.in
03-custom_verify.cnf
03-custom_verify.cnf.in
04-client_auth.cnf
04-client_auth.cnf.in
05-sni.cnf
05-sni.cnf.in
06-sni-ticket.cnf
06-sni-ticket.cnf.in
07-dtls-protocol-version.cnf
07-dtls-protocol-version.cnf.in
08-npn.cnf
08-npn.cnf.in
09-alpn.cnf
09-alpn.cnf.in
10-resumption.cnf
10-resumption.cnf.in
11-dtls_resumption.cnf
11-dtls_resumption.cnf.in
12-ct.cnf
12-ct.cnf.in
13-fragmentation.cnf
13-fragmentation.cnf.in
14-curves.cnf
14-curves.cnf.in
15-certstatus.cnf
15-certstatus.cnf.in
16-dtls-certstatus.cnf
16-dtls-certstatus.cnf.in
17-renegotiate.cnf
17-renegotiate.cnf.in
18-dtls-renegotiate.cnf
18-dtls-renegotiate.cnf.in
19-mac-then-encrypt.cnf
19-mac-then-encrypt.cnf.in
20-cert-select.cnf
20-cert-select.cnf.in
21-key-update.cnf
21-key-update.cnf.in
22-compression.cnf
22-compression.cnf.in
23-srp.cnf
23-srp.cnf.in
24-padding.cnf
24-padding.cnf.in
25-cipher.cnf
25-cipher.cnf.in
26-tls13_client_auth.cnf
26-tls13_client_auth.cnf.in
27-ticket-appdata.cnf
27-ticket-appdata.cnf.in
28-seclevel.cnf
28-seclevel.cnf.in
29-dtls-sctp-label-bug.cnf
29-dtls-sctp-label-bug.cnf.in
30-extended-master-secret.cnf
30-extended-master-secret.cnf.in
protocol_version.pm
ssltests_base.pm