summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/Symbols.list (follow)
Commit message (Expand)AuthorAgeFilesLines
* Provide RSA_PKCS1_OpenSSL().jsing2019-11-021-0/+1
* Make RSA_padding_{add,check}_PKCS1_OAEP_mgf1() public.jsing2019-11-021-0/+2
* Make RSA_OAEP_PARAMs public.jsing2019-11-021-0/+5
* Enable CMS in LibreSSL.jsing2019-11-021-0/+128
* Provide RSA_pkey_ctx_ctrl().jsing2019-10-241-0/+1
* provide getters and setters for the RSA_METHOD interfacegilles2019-06-051-0/+23
* Provide EVP_PKEY_get0_hmac(). From OpenSSL 1.1.1 which is stilltb2019-03-171-0/+1
* Provide EVP_aes_{128,192,256}_wrap(). This is a compatibletb2019-03-171-0/+3
* Add the SM4 block cipher from the Chinese standard GB/T 32907-2016.tb2019-03-171-0/+8
* Add missing symbols from the EC_KEY_METHOD port.tb2019-01-221-0/+8
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-221-0/+3
* provide EVP_ENCODE_CTX_{new,free}().tb2019-01-191-0/+2
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-191-0/+6
* Partial port of EC_KEY_METHOD from OpenSSL 1.1.tb2019-01-191-0/+13
* Add Ribose Inc's implementation of the SM3 hashing function withtb2018-11-111-0/+4
* move X509_get0_serialNumber where it belongstb2018-11-021-1/+1
* Remove a GOST data symbol that should not be exported.jsing2018-10-241-1/+0
* Remove a bunch of ancient and highly crufty ASN.1 related code fromjsing2018-10-241-13/+0
* Add some accessor functions:djm2018-09-121-0/+4
* Remove EVP_PKEY2PKCS8_broken() and PKCS8_set_broken()tb2018-08-241-2/+2
* Provide X509_get0_serialNumber()tb2018-08-241-0/+1
* Turn a number of #defines into proper functions with prototypes matchingtb2018-08-241-0/+9
* Provide EVP_CIPHER_CTX_encrypting().tb2018-08-241-0/+1
* Bring in compatibility for OpenSSL 1.1 style init functions.beck2018-03-171-0/+1
* Provide X509_STORE_get0_param()tb2018-03-171-0/+1
* Provide X509_OBJECT_get_type(). Instead of the X509_LOOKUP_TYPE enumtb2018-03-171-0/+1
* Provide X509_NAME_ENTRY_set()tb2018-03-171-0/+1
* Provide ECDSA_SIG_{g,s}et0().tb2018-03-171-0/+2
* Add DSA_meth_{dup,free,new,set_{finish,sign}}()tb2018-03-171-0/+5
* Provide RSA_meth_{dup,free,new,set_{finish,priv_{dec,enc}}}()tb2018-03-171-0/+6
* Make BIO_meth_get_write() public. Omission spotted by schwarze.tb2018-03-171-0/+1
* Provide X509_PUBKEY_get0() by splitting X509_PUBKEY_get() and turning itjsing2018-03-171-0/+1
* Provide OCSP_SINGLERESP_get0_id().jsing2018-03-171-0/+1
* Provide X509_REVOKED_dup().jsing2018-03-171-0/+1
* Provide X509_chain_up_ref().jsing2018-02-221-0/+1
* Provide X509_STORE_get0_objects(), X509_STORE_get_ex_data() andjsing2018-02-221-0/+3
* Provide X509_OBJECT_get0_X509() and X509_OBJECT_get0_X509_CRL().jsing2018-02-221-0/+2
* Provide X509_STORE_up_ref().jsing2018-02-221-0/+1
* Provide X509_STORE_CTX_get0_chain() and X509_STORE_CTX_get0_store().jsing2018-02-221-0/+2
* Provide X509_get0_tbs_sigalg().jsing2018-02-221-0/+1
* Provide X509_set1_notBefore() and X509_set1_notAfter().jsing2018-02-221-0/+2
* Provide X509_get0_pubkey().jsing2018-02-221-0/+1
* Provide X509_CRL_set1_lastUpdate() and X509_CRL_set1_nextUpdate().jsing2018-02-221-0/+2
* Provide X509_CRL_get0_extensions() and X509_CRL_get_signature_nid().jsing2018-02-221-0/+2
* Provide X509_CRL_up_ref().jsing2018-02-221-0/+1
* Provide X509_REQ_get_signature_nid().jsing2018-02-221-0/+1
* Provide X509_REVOKED_get0_extensions(), X509_REVOKED_get0_revocationDate()jsing2018-02-221-0/+3
* Provide DH_get0_engine().jsing2018-02-221-0/+1
* Provide BIO_up_ref().jsing2018-02-221-0/+1
* RSA_get_flags should be RSA_test_flags.tb2018-02-201-1/+1