summaryrefslogtreecommitdiff
path: root/src/lib/libssl/man/Makefile (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Start documenting our new pet octopus, SSL_CTX_set_security_level(3).schwarze2022-07-131-1/+2
| | | | | | | Or should we call it a centipede? Feedback and OK on a previous version from jsing@ and from our chief myriapodologist, tb@.
* sort. alphanumerics have lower ASCII values than '_'tb2021-10-251-5/+5
|
* Install SSL_read_early_data.3. I should have done this during the lasttb2021-10-251-4/+2
| | | | libssl bump.
* Add SSL_CTX_set_keylog_callback and SSL_CTX_get_keylog_callbackbeck2021-10-231-1/+2
| | | | | | | | Some things in ports care about calling these functions. Since we will not provide private key logging functionality they are documented as being for compatibility and that they don't do anything. ok tb@
* provide a small manual page for the SSL_set_psk_use_session_callback(3)schwarze2021-09-141-1/+2
| | | | | stub, written from scratch; OK tb@ on SSL_set_psk_use_session_callback.3
* Merge the stub SSL_SESSION_is_resumable(3) manual page from theschwarze2021-09-141-1/+2
| | | | | | OpenSSL 1.1.1 branch, which is still under a free license. A few tweaks to wording and structure by me. OK tb@ on SSL_SESSION_is_resumable.3
* Install SSL_SESSION_get0_cipher.3tb2021-05-121-1/+2
|
* Link SSL_get_finished.3 to build.tb2021-01-271-1/+2
|
* In ssl.h rev. 1.174 to 1.176, tb@ added some stubs related to 0-RTT data.schwarze2020-09-211-1/+4
| | | | | | | | | | Write documentation from scratch explaining why we don't support 0-RTT but how we stub it out instead. Tweaks and OK tb@. ... and beck@ pointed out that this OpenSSL API is akin to adding a laser sighting system to a giant blackpowder cannon that one keeps blowing one's own feet to mangled scraps with ...
* Document the public function SSL_set_SSL_CTX(3) from scratch,schwarze2020-09-201-1/+2
| | | | | | | which is undocumented in OpenSSL but mentioned in passing in one OpenSSL manual page, and which was recently mentioned by jsing@ when working on SSL_set_ciphersuites(3). With corrections from and OK inoguchi@.
* Install the new page SSL_set1_host(3), link to it from relevant places,schwarze2020-09-171-1/+2
| | | | | | | and add two other .Xrs that might help readers find their way. Update the merge notices of all files touched and merge a few trivial changes from the OpenSSL 1.1.1 branch. OK tb@
* Import SSL_CTX_add1_chain_cert(3) from OpenSSL branch 1.1.1, which is stillschwarze2019-04-051-1/+2
| | | | | | | | | under a free license, omitting functions we don't have and tweaked by me; the functions were provided by jsing@ in ssl.h rev. 1.166. While here, also document SSL_CTX_get_extra_chain_certs(3) because it is closely related to companion functions are already documented and the API is kind of incomplete without it.
* In crypto.h rev. 1.43 and ssl.h rev. 1.153 2018/03/17 16:20:01, beck@schwarze2018-03-171-1/+2
| | | | | | provided OPENSSL_init_crypto(3) and OPENSSL_init_ssl(3). Write the documentation from scratch because the text OpenSSL provides is full of bloat.
* In ssl.h rev. 1.152 2018/03/17 15:55:52, tb@ providedschwarze2018-03-171-1/+2
| | | | | SSL_SESSION_has_ticket(3) and SSL_SESSION_get_ticket_lifetime_hint(3). Merge the documentation from OpenSSL, tweaked by me.
* Import SSL_CTX_set_tlsext_use_srtp(3) from OpenSSL, slightly tweaked by me.schwarze2018-02-271-1/+2
|
* In ssl.h rev. 1.141 2018/02/20 18:07:11, tb@ providedschwarze2018-02-241-1/+2
| | | | | SSL_SESSION_get_protocol_version(3). Import the documentation form OpenSSL, tweaked by me, OK tb@.
* In ssl.h rev. 1.139 2018/02/17 15:19:43 and rev. 1.140 2018/02/17 15:32:20,schwarze2018-02-181-1/+2
| | | | | | jsing@ provided SSL_get_client_random(3), SSL_get_server_random(3), and SSL_SESSION_get_master_key(3). Import the documentation from OpenSSL, with some tweaks.
* In ssl.h rev. 1.138 2018/02/17 15:13:12, jsing@ providedschwarze2018-02-181-1/+2
| | | | | SSL_CTX_get0_certificate(3). It is public in OpenSSL, too, but OpenSSL has no documentation, so write some from scratch.
* import SSL_export_keying_material(3) from OpenSSLschwarze2017-08-211-1/+2
|
* Import SSL_CTX_set_min_proto_version(3) from OpenSSL, suggested by jsing@.schwarze2017-08-191-1/+2
| | | | | | | | | While importing: * Fix the prototypes, they all contained wrong datatypes. * Delete SSL3_VERSION which is no longer supported. * Delete TLS1_3_VERSION and DTLS1_2_VERSION, not yet supported. * Delete the lie that these would be macros. * Improve SEE ALSO and HISTORY sections.
* Import the SSL_CTX_set1_groups(3) manual page from OpenSSL, deletingschwarze2017-08-121-1/+2
| | | | | | the read accessors we don't have and fixing the prototypes - the data type of each and every argument differs in the OpenSSL manuals. Reference the new page from SSL_set_tmp_ecdh(3) as suggested by jsing@.
* New manual page SSL_set_tmp_ecdh(3) written from scratch.schwarze2017-08-121-1/+2
| | | | Feedback and OK jsing@.
* new manual page SSL_get_server_tmp_key(3)schwarze2017-04-101-1/+2
| | | | from Matt Caswell <matt@openssl.org>, OpenSSL commit 508fafd8
* Additional SSL_SESSION documentationschwarze2017-04-101-1/+5
| | | | | from Matt Caswell <matt at openssl dot org>, OpenSSL commit b31db505. Improve crosslinking while here.
* new manual page SSL_CTX_set_tlsext_servername_callback(3) for SNI;schwarze2017-04-101-1/+2
| | | | | from <Jon dot Spillett at oracle dot com> via OpenSSL commit 8c55c461
* Write an SSL_get_shared_ciphers(3) manual from scratch; another oneschwarze2016-12-101-1/+2
| | | | | | | | where BUGS is longer than DESCRIPTION. The function is listed in ssl(3) and <openssl/ssl.h>, so it's clearly public. The code looks slightly mysterious to me, so it would be welcome if somebody more familiar with TLS protocols could check factual accuracy.
* New manual pages SSL_get_certificate(3), SSL_get_state(3), andschwarze2016-12-101-1/+4
| | | | | SSL_num_renegotiations(3) written from scratch. These functions are listed in ssl(3) and <openssl/ssl.h>, so they are clearly public.
* Write SSL_renegotiate(3) manual from scratch; this function is listedschwarze2016-12-071-1/+2
| | | | | | | in ssl(3) and <openssl/ssl.h>, so it's clearly a public interface. More could probably be said, the code looks somewhat mysterious to me, but i think this stub is already better than nothing.
* Write SSL_copy_session_id(3) manual from scratch. This function isschwarze2016-12-071-1/+2
| | | | | | | listed in ssl(3) and <openssl/ssl.h>, so it's clearly a public interface. We might wish to merge the improved code from OpenSSL 1.1.0, but that's major bump, so i'm documenting the BUGS for now.
* Write new SSL_dup(3) manual from scratch. This function is listedschwarze2016-12-071-1/+2
| | | | in ssl(3) and <openssl/ssl.h>, so it is clearly public.
* New SSL_dup_CA_list(3) manual written from scratch.schwarze2016-12-071-1/+2
| | | | Mentioned in ssl(3) and <openssl/ssl.h>, so it is public.
* An SSL_SESSION_print(3) manual written from scratch. It's clearlyschwarze2016-12-061-1/+2
| | | | | a public interface since it's listed both in ssl(3) and in <openssl/ssl.h>. Nothing to pilfer from OpenSSL in this case...
* New manual page SSL_SESSION_new(3) written from scratch.schwarze2016-12-061-1/+2
| | | | | | The function prototype is listed in ssl(3) and <openssl/ssl.h>, so it's clearly a public interface, but OpenSSL has no documentation about it whatsoever.
* import tlsext documentation from OpenSSLschwarze2016-12-011-1/+3
|
* import the parts of OpenSSL SSL_CTX_set_split_send_fragment(3)schwarze2016-12-011-1/+2
| | | | relevant for us, calling the page SSL_set_max_send_fragment(3)
* import SSL_CTX_set_read_ahead(3) from OpsenSSL, with considerable tweaksschwarze2016-12-011-1/+2
|
* garbage collect PSK remnantsschwarze2016-12-011-4/+1
|
* import SSL_CTX_set_alpn_select_cb(3) from OpenSSLschwarze2016-11-301-1/+2
|
* Import the relevant parts of SSL_CTX_get0_param(3) from OpenSSL.schwarze2016-11-301-1/+2
| | | | Call it SSL_set1_param(3) since we don't have these get0 functions.
* The OpenSSL file doc/man3/PEM_read_CMS.pod contains parts belongingschwarze2016-11-281-1/+2
| | | | | to libcrypto and parts belonging to libssl. Extract the parts relevant for our libssl and import them with some tweaks.
* Import the DTLSv1_listen(3) manual from OpenSSL,schwarze2016-11-211-1/+2
| | | | | | | | excluding interface changes that don't apply to LibreSSL, except that i left the confusing discussion of RETURN VALUES completely unchanged, to warn users that this is a mess: OpenSSL first published this interface, then later changed its syntax and semantics in multiple ways.
* move manual pages from doc/ to man/ for consistency with otherschwarze2016-11-051-0/+93
| | | | | libraries, in particular considering that there are unrelated files in doc/; requested by jsing@ and beck@
* after getting rid of the pod files, clean up the Makefiles; ok bcook@schwarze2016-11-051-111/+0
|
* Make tree build againbeck2016-09-031-2/+2
|
* for some time now mandoc has not required MLINKS to functionjmc2016-03-301-166/+1
| | | | | | | | | | | | correctly - logically complete that now by removing MLINKS from base; authors need only to ensure there is an entry in NAME for any function/ util being added. MLINKS will still work, and remain for perl to ease upgrades; ok nicm (curses) bcook (ssl) ok schwarze, who provided a lot of feedback and assistance ok tb natano jung
* SSL_CTX_sess_set_remove mlink should be SSL_CTX_sess_set_remove_cb;jmc2015-11-101-2/+2
|
* Rename SSL_CTX_use_certificate_chain() to SSL_CTX_use_certificate_chain_mem().reyk2015-02-061-1/+2
| | | | | As discussed with beck@ jsing@ and others OK beck@
* Delete the MANLINT variable and the related SUFFIXES rules becauseschwarze2015-01-161-2/+2
| | | | | | | | since yesterday, "mandoc -Tlint -Wfatal" can no longer fail. Instead, as suggested by deraadt@, provide a manlint target that is *not* run during make build, but can be run whenever you want to check syntax of manuals. "nice stuff" deraadt@
* missing \deraadt2014-07-111-2/+2
|
* formattingbeck2014-07-111-4/+6
| | | | ok bcook@