summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/Symbols.list (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Provide X509_CRL_set1_lastUpdate() and X509_CRL_set1_nextUpdate().jsing2018-02-221-0/+2
|
* Provide X509_CRL_get0_extensions() and X509_CRL_get_signature_nid().jsing2018-02-221-0/+2
|
* Provide X509_CRL_up_ref().jsing2018-02-221-0/+1
|
* Provide X509_REQ_get_signature_nid().jsing2018-02-221-0/+1
|
* Provide X509_REVOKED_get0_extensions(), X509_REVOKED_get0_revocationDate()jsing2018-02-221-0/+3
| | | | and X509_REVOKED_get0_serialNumber().
* Provide DH_get0_engine().jsing2018-02-221-0/+1
|
* Provide BIO_up_ref().jsing2018-02-221-0/+1
|
* RSA_get_flags should be RSA_test_flags.tb2018-02-201-1/+1
| | | | Noted by sthen. Rides previous minor bump.
* Provide BIO_meth_{g,s}et_callback_ctrl()tb2018-02-201-0/+2
| | | | with & ok jsing
* Provide BIO_meth_get_{create,ctrl,destroy,gets,puts,read}()tb2018-02-201-0/+6
| | | | ok jsing
* Provide EVP_PKEY_get0_EC_KEY() and 'if (ret)' vs 'if (ret != 0)' cosmetics.tb2018-02-201-0/+1
| | | | ok jsing
* Provide DH_set_length()tb2018-02-201-0/+1
| | | | ok jsing
* Provide DH_bits()tb2018-02-201-0/+1
| | | | ok jsing
* Provide BIO_{g,s}et_shutdown().tb2018-02-201-0/+2
| | | | ok jsing
* Provide DSA_get0_engine()tb2018-02-201-0/+1
| | | | ok jsing
* Provide DSA_SIG_{g,s}et0()tb2018-02-201-0/+2
| | | | ok jsing
* Provide DSA_{clear,set,test}_flags()tb2018-02-201-0/+3
| | | | ok jsing
* Provide RSA_{clear,set,test}_flasg()tb2018-02-201-0/+3
| | | | ok jsing
* Provide DH_{clear,set,test}_flags().tb2018-02-201-0/+3
| | | | ok jsing
* Provide BIO_get_new_index().jsing2018-02-201-0/+1
| | | | Based on BoringSSL.
* Provide BN_GENCB_new(), BN_GENCB_free() and BN_GENCB_get_arg()jsing2018-02-201-0/+3
|
* Provide X509_NAME_get0_der().jsing2018-02-201-0/+1
| | | | From OpenSSL.
* Provide X509_REQ_get0_signature()jsing2018-02-201-0/+1
|
* Provide X509_CRL_get0_{last,next}Update() and X509_CRL_get0_signature().jsing2018-02-201-0/+3
|
* Provide BN_get_rfc2409_prime_*() and BN_get_rfc3526_prime_*().jsing2018-02-201-1/+9
|
* Provide {DH,DSA}_set0_key(). Requested by sthen.tb2018-02-181-0/+2
| | | | ok jsing
* Provide BIO_meth_set_gets().tb2018-02-181-0/+1
| | | | ok jsing
* Provide BIO_{g,s}et_data() and BIO_set_init().tb2018-02-181-0/+3
| | | | ok jsing
* Provide RSA_{g,s}et0_crt_params()tb2018-02-181-0/+2
| | | | ok jsing
* Provide RSA_{g,s}et0_factors()tb2018-02-181-0/+2
| | | | ok jsing
* Provide RSA_bits()tb2018-02-181-0/+1
| | | | ok jsing
* Provide DH_set0_pqg.tb2018-02-181-0/+1
| | | | ok jsing
* Provide DSA_set0_pqg.tb2018-02-181-0/+1
| | | | ok jsing
* Provide EVP_CIPHER_CTX_reset().jsing2018-02-171-0/+1
| | | | Rides previous minor bump.
* Provide X509_get0_extensions() and X509_get0_signature()jsing2018-02-171-3/+5
|
* Provide EVP_MD_CTX_new(), EVP_MD_CTX_free() and EVP_MD_CTX_reset().jsing2018-02-171-0/+3
|
* Provide HMAC_CTX_new(), HMAC_CTX_free(), HMAC_CTX_reset() andjsing2018-02-171-0/+4
| | | | HMAC_CTX_get_md().
* Provide BIO_meth_{free,new}() and BIO_meth_set_{create,crtl,destroy}()tb2018-02-171-0/+8
| | | | | | and BIO_meth_set_{puts,read,write}(). ok jsing
* Provide further parts of the OpenSSL 1.1 API: {DH,DSA}_get0_{key,pqg}(),tb2018-02-171-0/+9
| | | | | | EVP_PKEY_get0_{DH,DSA,RSA}(), RSA_{g,s}et0_key(). ok jsing
* Provide X509_STORE_CTX_get0_{cert,untrusted}() andjsing2018-02-141-0/+4
| | | | X509_STORE_CTX_set0_{trusted_stack,untrusted}().
* Provide X509_get{0,m}_not{Before,After}().jsing2018-02-141-0/+4
|
* Provide ASN1_STRING_get0_data().jsing2018-02-141-0/+1
|
* Provide EVP_PKEY_up_ref().jsing2018-02-141-0/+1
|
* Start providing parts of the OpenSSL 1.1 API.jsing2018-02-141-0/+2
| | | | | | | | | | This will ease the burden on ports and others trying to make software work with LibreSSL, while avoiding #ifdef mazes. Note that we are not removing 1.0.1 API or making things opaque, hence software written to use the older APIs will continue to work, as will software written to use the 1.1 API (as more functionality become available). Discussed at length with deraadt@ and others.
* Provide X509_get_signature_nid().jsing2018-02-141-10/+11
|
* Expose X509_VERIFY_PARAM_* functions that appeared in the OpenSSL 1.0.2jsing2018-02-101-0/+10
| | | | API and are now in use by various libraries and applications.
* Remove EVP_aead_chacha20_poly1305_old() now that the original/oldjsing2017-08-281-1/+0
| | | | chacha20-poly1305 cipher suites have been removed from libssl.
* Remove RSA_padding_add_SSLv23()/RSA_padding_check_SSLv23() and relatedjsing2017-08-281-2/+0
| | | | | | code. We removed SSLv2/SSLv3 a long time ago... Discussed with doug@
* Make the symbol for ASN1_time_tm_clamp_notafter visible so libtlsbeck2017-08-271-0/+1
| | | | | can get at it, so libtls can also deal with notafter's past the realm of 32 bit time in portable
* Add ASN1_TIME_set_to to exported symbolsbeck2017-05-061-0/+4
| | | | ok jsing@