summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* In asn1.h rev. 1.44 2018/02/14 16:46:04, jsing@schwarze2018-02-151-8/+25
* In evp.h rev. 1.54 2018/02/14 16:40:42, jsing@ provided EVP_PKEY_up_ref(3).schwarze2018-02-141-4/+22
* In x509.h rev. 1.27 2018/02/14 16:18:10, jsing@ providedschwarze2018-02-142-1/+80
* Bump lib{crypto,ssl,tls} minors due to symbol additions.jsing2018-02-141-1/+1
* Provide X509_STORE_CTX_get0_{cert,untrusted}() andjsing2018-02-143-3/+35
* Provide X509_get{0,m}_not{Before,After}().jsing2018-02-143-5/+41
* Provide ASN1_STRING_get0_data().jsing2018-02-143-3/+11
* Provide EVP_PKEY_up_ref().jsing2018-02-143-2/+11
* Start providing parts of the OpenSSL 1.1 API.jsing2018-02-143-2/+24
* Provide X509_get_signature_nid().jsing2018-02-143-12/+21
* New manual page EVP_PKEY_asn1_new(3) from Richard Levitteschwarze2018-02-148-13/+475
* I recently documented X509_VERIFY_PARAM_lookup(3), so change .Fn to .Xr.schwarze2018-02-141-3/+3
* Mention two more block cipher modes that actually exist in our tree;schwarze2018-02-141-8/+30
* Add the missing RETURN VALUES section.schwarze2018-02-131-5/+118
* Add the missing RETURN VALUES section, mostly from Paul Yangschwarze2018-02-131-11/+38
* Correctly describe BN_get_word(3) and BN_set_word(3).schwarze2018-02-131-20/+25
* Mention that BN_new(3) sets the value to zero;schwarze2018-02-131-5/+6
* Delete duplicate .Nm entry in the NAME section,schwarze2018-02-131-4/+4
* Add the missing RETURN VALUES section.schwarze2018-02-131-14/+76
* Add the missing RETURN VALUES section;schwarze2018-02-121-3/+21
* Add the missing RETURN VALUES section;schwarze2018-02-121-3/+15
* Add missing RETURN VALUES section.schwarze2018-02-121-4/+15
* Add the missing RETURN VALUES section and reorder the contentschwarze2018-02-121-35/+93
* Document three more functions recently made public by jsing@schwarze2018-02-111-18/+185
* Merge documentation from OpenSSL for seven functionsschwarze2018-02-111-7/+196
* Bump lib{crypto,ssl,tls} minors due to symbol addition.jsing2018-02-101-1/+1
* Expose X509_VERIFY_PARAM_* functions that appeared in the OpenSSL 1.0.2jsing2018-02-102-1/+26
* Restore the old behavior when a port number without a host name isbluhm2018-02-071-10/+12
* Do not call freeaddrinfo() with a NULL parameter.bluhm2018-02-061-2/+3
* Make the NEON codepaths conditional on __STRICT_ALIGNMENT not beingkettenis2018-01-243-5/+5
* On OpenBSD/armv7 we deliberately trap unaligned access. Unfortunatelykettenis2018-01-075-12/+16
* bump to 2.7.0bcook2017-12-111-3/+3
* http://repzret.org/p/repzret/deraadt2017-12-113-8/+8
* In the middle of CRYPTO_gcm128_finish() there is a complicated #ifdefderaadt2017-12-091-6/+8
* Please variable decl before code.deraadt2017-12-091-2/+2
* Rewrite ASN1_TYPE_{get,set}_octetstring() using templated ASN.1.jsing2017-11-281-81/+78
* GNU ld has prefixed the contents of .gnu.warning.SYMBOL sectionstb2017-11-281-4/+4
* bump version in advance of final releasebcook2017-09-261-3/+3
* bump wo 2.6.2libressl-v2.6.2bcook2017-09-261-3/+3
* Checking sizeof size_t by SIZE_MAX instead of _LP64inoguchi2017-09-031-7/+7
* Remove OPENSSL_NO_NEXTPROTONEG - some software creates conflictingjsing2017-08-311-1/+0
* Bring back the RSA_SSLV23_PADDING define.jsing2017-08-301-1/+2
* Fix ifdef to if in gcm128.cinoguchi2017-08-301-2/+2
* Bump lib{crypto,ssl,tls} majors due to symbol removals.jsing2017-08-281-2/+2
* Remove EVP_aead_chacha20_poly1305_old() now that the original/oldjsing2017-08-283-83/+28
* Remove documentation for EVP_aead_chacha20_poly1305_ietf() - this wasjsing2017-08-281-13/+3
* Put the opening curly brace in the right place.jsing2017-08-281-2/+3
* Remove RSA_padding_add_SSLv23()/RSA_padding_check_SSLv23() and relatedjsing2017-08-289-202/+11
* Define OPENSSL_NO_NEXTPROTONEG since there is no longer any NPN.jsing2017-08-281-0/+1
* Make the symbol for ASN1_time_tm_clamp_notafter visible so libtlsbeck2017-08-273-4/+5