summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* GF2m bites the dust. It won't be missed.tb2023-04-2512-4655/+11
|
* ASN1_item_ndef_i2d also goes. discussed with deraadttb2023-04-251-1/+0
|
* bio_asn1: adjust for more recent churntb2023-04-252-2/+6
|
* Remove commented version of OPENSSL_NO_EC2Mtb2023-04-251-1/+0
|
* Remove duplicate NID definitionstb2023-04-251-11/+1
|
* LIBRESSL_NEXT_API is no longer neededtb2023-04-251-2/+0
|
* Remove prototype of EC_GFp_nist_method()tb2023-04-251-8/+1
|
* Move EC_KEY_{insert,set}_key_method_data() to internal-onlytb2023-04-254-22/+15
|
* Move low level BIO_new_NDEF API to internal-onlytb2023-04-256-25/+29
|
* Remove proxy cert remnantstb2023-04-254-492/+2
|
* Remove NETSCAPE_CERT_SEQUENCEtb2023-04-254-191/+4
|
* Move the policy STACK_OF stuff to pcy_int.h as welltb2023-04-252-50/+45
|
* Remove SXNETtb2023-04-259-638/+7
| | | | Unused and no authorative information was found online in 2016
* Move truncated sha-2 and sha3 out of #ifdef wrapperstb2023-04-251-5/+1
|
* Use X509_STORE_CTX_get1_{certs,crls}() instead of an aliastb2023-04-251-3/+3
|
* X509_STORE_get1_{certs,crls} become X509_STORE_CTX_* also intb2023-04-251-2/+2
| | | | Symbols.namespace
* X509_STORE_get1_{certs,crls} become X509_STORE_CTX_*tb2023-04-253-28/+5
| | | | This matches the OpenSSL 1.1 API a bit better.
* Move the policy tree code to internal-onlytb2023-04-258-86/+42
| | | | | A few hooks remain in the legacy validator, which will soon be replaced with something better. The rest of the tentacles are now largely contained.
* Remove i2d_PKCS7_NDEF from the hidden version as welltb2023-04-251-2/+1
|
* Remove documentation for i2d_PKCS7_NDEFtb2023-04-251-15/+2
|
* Remove i2d_PKCS7_NDEFtb2023-04-253-13/+2
|
* BN_RECP_CTX moves to internaltb2023-04-252-5/+4
|
* Remove CTS modetb2023-04-253-298/+2
| | | | ok jsing
* Remove TS_VERIFY_CTX_init()tb2023-04-252-11/+2
|
* Remove PEM wrappers for NETSCAPE_CERT_SEQUENCEtb2023-04-252-36/+2
|
* Remove the horror show that is bn_nist and ecp_nisttb2023-04-254-1529/+2
| | | | | | This code is full of problematic C and is also otherwise of questionable quality. It is far from constant time and jsing informs me it also isn't faster. Good riddance.
* Remove BN_init() documentationtb2023-04-251-40/+2
|
* Remove BN_CTX_init() documentationtb2023-04-251-23/+3
|
* Remove the no longer used BN_MONT_CTX_init()tb2023-04-252-15/+2
|
* Remove a couple of temporary hackstb2023-04-252-17/+2
|
* Move a few now internal prototypes to bn_local.htb2023-04-252-24/+17
|
* Remove old BN_one/BN_zero compat stufftb2023-04-251-13/+1
| | | | ok jsing
* Remove X9.31 supporttb2023-04-257-493/+6
| | | | ok jsing
* Remove the no longer used BN_CTX_init()tb2023-04-252-14/+2
| | | | ok jsing
* Bump LibreSSL version to 3.8.0tb2023-04-251-2/+2
|
* Remove the nseq commandtb2023-04-254-211/+5
|
* Document most command constants.schwarze2023-04-251-2/+60
| | | | | They are part of the public API, may be needed for implementing custom BIO types, and application programmers need to avoid clashing with them.
* Update Wycheproof.go to exercise truncated SHA-2 and SHA-3tb2023-04-251-5/+27
|
* Bump majors after symbol addition and removaltb2023-04-253-6/+6
|
* Update Symbols.list after symbol addition and removaltb2023-04-251-134/+10
|
* Comment out a few now unused files from Makefiletb2023-04-251-14/+14
|
* Use proper fix for the recent x400Address issuetb2023-04-252-6/+4
| | | | | | From David Benjamin (BoringSSL) ok beck
* Temporarily define LIBRESSL_NEXT_API in opensslfeatures.htb2023-04-251-0/+2
|
* Define OPENSSL_NO_DEPRECATED and OPENSSL_NO_EC2M in opensslfeatures.htb2023-04-251-0/+2
| | | | ok beck jsing
* Wire up truncated SHA-2, SHA-3 and related thingstb2023-04-255-7/+32
| | | | from jsing
* Remove no longer necessary compat #definestb2023-04-251-6/+1
|
* Add NIDs for truncated SHA-2, SHA-3 and related thingstb2023-04-252-7/+72
| | | | From jsing
* bn_mod_exp: temporarily add a prototype for BN_mod_exp_recp()tb2023-04-251-1/+4
|
* bn_test: temporarily add prototypes for reciprocal functionstb2023-04-251-1/+13
| | | | This is a hack needed until bn_local.h is updated
* bn_test: BN_one() will become void, so stop checking ittb2023-04-251-8/+8
|