summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* One error file per directory is plenty.jsing2020-06-053-229/+157
* When X509_ATTRIBUTE_create() receives an invalid NID (e.g., -1), returnschwarze2020-06-042-14/+9
* minor polishing:schwarze2020-06-041-4/+10
* Collapse the x509v3 directory into x509.jsing2020-06-0438-47/+44
* new manual page PKCS7_add_attribute(3);schwarze2020-06-047-12/+201
* Properly document PKCS7_final(3), which was already mentionedschwarze2020-06-0310-32/+263
* Remove expired certificate, ok tb@sthen2020-06-011-53/+1
* bump to LibreSSL 3.2.1libressl-v3.2.0bcook2020-06-011-3/+3
* When building a chain look for non-expired certificates first.jsing2020-05-311-8/+29
* document PKCS7_dataFinal(3);schwarze2020-05-273-3/+162
* Minimally document PKCS7_dataInit(3).schwarze2020-05-244-5/+215
* Briefly mention the obsolete function OPENSSL_init(3).schwarze2020-05-241-7/+23
* new manual page for PKCS7_set_content(3) and PKCS7_content_new(3);schwarze2020-05-204-5/+127
* As done everywhere else, use a local version of MINIMUM() and avoidderaadt2020-05-175-21/+21
* document PKCS7_set_type(3);schwarze2020-05-163-3/+123
* catch the other place this needs to changebeck2020-05-091-2/+2
* now that 3.1.1 is out the door as a stable release bump the developmentbeck2020-05-091-2/+2
* Bump LibreSSL version to 3.1.1tb2020-05-061-3/+3
* Disallow setting the AES-GCM IV length to 0tb2020-04-301-1/+5
* Disallow the use of zero length IVs in AES-GCM viatb2020-04-273-3/+15
* sync cert.pem with Mozilla's root ca list, ok beck@sthen2020-04-101-276/+343
* When printing the serialNumber, fall back to the colon separated hextb2020-04-101-2/+4
* Void functions obviously do not return values; no need to elaborate.schwarze2020-03-294-23/+8
* Be concise: do not say that void functions return no values, that's obvious.schwarze2020-03-283-22/+6
* Fix ASN1 print functionsinoguchi2020-03-241-6/+13
* Check high bit for base64 decodeinoguchi2020-03-041-2/+10
* Fix base64 processing of long linesinoguchi2020-03-031-99/+66
* Describe the restriction for length of openssl conf value stringinoguchi2020-02-171-2/+4
* Restrict the length of openssl conf value stringinoguchi2020-02-173-5/+14
* Avoid 32 bit right shift with unsigned int in crypto/cast/cast_lcl.hinoguchi2020-01-261-2/+2
* tweak previous; ok tbjmc2020-01-261-3/+3
* typotb2020-01-261-2/+2
* Document the change in EVP_chacha20(3).tb2020-01-261-3/+5
* Improve the comment explaining why the previous change matches OpenSSL'stb2020-01-261-8/+15
* Adjust EVP_chacha20()'s behavior to match OpenSSL's semantics:tb2020-01-261-7/+14
* The length of the IV of EVP_chacha20 is currently 64 bits, not 96.tb2020-01-221-3/+3
* Add checks to ensure that lib{crypto,ssl,tls} public headers have actuallyjsing2020-01-221-1/+11
* Simplify header installation by combining the HDRS and HDRS_GEN loops.jsing2020-01-221-9/+2
* Remove redundant ASN1_INTEGER_set call in PKCS7_set_typeinoguchi2020-01-211-2/+1
* Free pss in RSA_freeinoguchi2020-01-171-1/+2
* bump to 3.1.0bcook2020-01-141-3/+3
* Avoid leak in error path of PKCS5_PBE_keyivgeninoguchi2020-01-121-1/+2
* Avoid leak in error path of asn1_parse2inoguchi2020-01-091-17/+21
* Avoid leak in error path of dh_priv_decodeinoguchi2020-01-041-1/+2
* Fix documented signatures of HMAC(3) and HMAC_Update(3). The n and lentb2019-12-141-4/+4
* Document X509_STORE_CTX_set_flags() which is a handy way to change theclaudio2019-12-051-3/+18
* A touch of style(9)tim2019-11-211-6/+6
* Use explicit_bzero() to clear key materialtim2019-11-211-1/+2
* Fix rsa key output formatinoguchi2019-11-201-5/+12
* Reshuffle RSA_PSS_PARAMS and RSA_OAEP_PARAMS to avoid duplicate typedef.jsing2019-11-041-21/+19