summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/man (follow)
Commit message (Expand)AuthorAgeFilesLines
* Void functions obviously do not return values; no need to elaborate.schwarze2020-03-294-23/+8
* Be concise: do not say that void functions return no values, that's obvious.schwarze2020-03-283-22/+6
* Describe the restriction for length of openssl conf value stringinoguchi2020-02-171-2/+4
* tweak previous; ok tbjmc2020-01-261-3/+3
* Document the change in EVP_chacha20(3).tb2020-01-261-3/+5
* The length of the IV of EVP_chacha20 is currently 64 bits, not 96.tb2020-01-221-3/+3
* Fix documented signatures of HMAC(3) and HMAC_Update(3). The n and lentb2019-12-141-4/+4
* Document X509_STORE_CTX_set_flags() which is a handy way to change theclaudio2019-12-051-3/+18
* CMS didn't make the 6.6 release: adjust the text in the HISTORY sectionsschwarze2019-11-0223-69/+69
* .Xr CMS_ContentInfo_new 3schwarze2019-11-021-2/+3
* .Xr BIO_new_CMS 3schwarze2019-11-021-2/+3
* document PEM_read_CMS(3), PEM_read_bio_CMS(3), PEM_write_CMS(3), andschwarze2019-11-021-3/+46
* In Symbols.list rev. 1.91, jsing enabled many CMS functions.schwarze2019-11-021-1/+24
* In evp/pmeth_lib.c rev. 1.16, jsing@ enabled EVP_PKEY_RSA_PSS.schwarze2019-11-011-3/+5
* In rsa.h rev. 1.45, jsing@ providedschwarze2019-11-011-8/+16
* In rsa.h rev. 1.45, jsing@ provided the threeschwarze2019-11-012-6/+64
* move the PSS macros to the end in preparation for adding more macros,schwarze2019-11-011-50/+45
* The EVP_PKEY_CTX_ctrl(3) manual page requires additions for RSA-PSSschwarze2019-11-014-267/+358
* In rsa_pmeth.c rev. 1.30, jsing@ set the minimum RSA key lengthschwarze2019-10-311-2/+3
* In rsa.h rev. 1.41, jsing@ provided RSA_pkey_ctx_ctrl(3).schwarze2019-10-291-1/+26
* merge documentation for several macros EVP_PKEY_CTX_*_rsa_oaep_*(3)schwarze2019-10-291-4/+239
* merge documentation for EVP_PKEY_CTX_set1_id(3), EVP_PKEY_CTX_get1_id(3),schwarze2019-10-291-2/+57
* merge documentation of EVP_PKEY_CTX_set_ec_param_enc(3)schwarze2019-10-291-6/+23
* correct HISTORY of some RSA control macrosschwarze2019-10-291-5/+26
* list supported algorithm ids and clarify how the engine argument is usedschwarze2019-10-291-10/+50
* document EVP_PKEY_CTX_get_signature_md(3);schwarze2019-09-101-4/+17
* Document EVP_PKEY_get0(3), EVP_PKEY_assign_GOST(3), EVP_PKEY_assign(3),schwarze2019-09-012-31/+116
* new manual page AES_encrypt(3)schwarze2019-08-284-5/+181
* document OCSP_parse_url(3)schwarze2019-08-271-6/+75
* document OCSP_cert_status_str(3)schwarze2019-08-271-3/+19
* document OCSP_response_status_str(3)schwarze2019-08-271-4/+19
* document i2a_ASN1_INTEGER(3)schwarze2019-08-261-5/+50
* document ASN1_put_object(3) and ASN1_put_eoc(3)schwarze2019-08-263-3/+186
* document ASN1_OCTET_STRING_cmp(3), ASN1_OCTET_STRING_dup(3), andschwarze2019-08-261-12/+45
* Change generating and checking of primes so that the error rate ofschwarze2019-08-251-8/+20
* document EVP_sm3(3) and EVP_whirlpool(3), loosely based on theschwarze2019-08-255-6/+177
* fix reversed meaning of error codes;schwarze2019-08-251-7/+7
* typo in function argument type;schwarze2019-08-251-4/+4
* Correctly document the return values of i2d_ECDSA_SIG(3) andschwarze2019-08-251-25/+28
* import the CRYPTO_memcmp(3) manual from OpenSSL 1.1.1,schwarze2019-08-252-1/+97
* document RSAPrivateKey_dup(3) and RSAPublicKey_dup(3)schwarze2019-08-231-11/+55
* document X509_get1_email(3), X509_get1_ocsp(3), X509_email_free(3)schwarze2019-08-236-12/+141
* document X509_dup(3)schwarze2019-08-231-8/+40
* document X509_check_purpose(3)schwarze2019-08-226-9/+403
* New manual page X509_cmp(3) documenting the same public functionsschwarze2019-08-206-10/+241
* make BN_CTX_end(NULL) a NOOP for compatibility with documented behaviourschwarze2019-08-201-3/+8
* document X509_INFO_new(3) and X509_INFO_free(3)schwarze2019-08-194-10/+78
* document ECDH_compute_key(3) and ECDH_size(3);schwarze2019-08-198-15/+110
* Tweak cross references, in particular making sure thatschwarze2019-08-1823-48/+85
* minor cleanup:schwarze2019-08-182-63/+37