summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* zap trailing whitespace on one linetb2020-07-031-2/+2
* Make the message type available to the extension functionstb2020-07-032-167/+181
* Improve argument order for the internal tlsext APItb2020-07-038-39/+39
* Disable assembly code for powerpc64; more work is needed to make it work.kettenis2020-06-291-8/+9
* Switch back to bn_mul_mont_int since the bn_mul_mont_fpu64 code isn'tkettenis2020-06-281-3/+3
* Accidentally doubled these files on first commit. Correcting.drahn2020-06-262-194/+1
* Switch the order of the two tests in tls13_client_hello_required_extensionstb2020-06-251-9/+9
* Intial attempt at powerpc64 libcrypto pieces.drahn2020-06-252-0/+386
* Properly document the return values of EVP_PKEY_base_id(3)schwarze2020-06-244-70/+152
* use n-bit <noun> consistently; ok schwarze for the principal of the idea,jmc2020-06-246-28/+28
* Make tls13_legacy_shutdown() match ssl3_shutdown() semantics.jsing2020-06-241-21/+22
* new manual page ChaCha(3);schwarze2020-06-243-2/+257
* new manual page CMAC_Init(3);schwarze2020-06-245-7/+298
* Document eight additional pre-OpenSSL-1.1 accessor functions that areschwarze2020-06-241-21/+122
* Enforce restrictions for ClientHello extensionstb2020-06-241-1/+44
* We inherited the constant time CBC padding removal from BoringSSL, buttb2020-06-191-4/+4
* mark the functions documented in des_read_pw(3) as deprecatedschwarze2020-06-192-6/+11
* document X509_get0_pubkey_bitstr(3),schwarze2020-06-191-5/+81
* document error handling of X509_PUBKEY_get0(3) and X509_PUBKEY_get(3)schwarze2020-06-191-3/+52
* Merge documentation of X509_get0_serialNumber(3) from OpenSSL-1.1.1schwarze2020-06-191-4/+19
* Document EVP_read_pw_string_min(3)tb2020-06-151-6/+44
* Document PEM_def_callback(3).schwarze2020-06-153-106/+158
* add my Copyright and license, which i forgot when adding a significantschwarze2020-06-121-3/+20
* add a comment saying that name_cmp() is intentionally undocumented;schwarze2020-06-121-2/+5
* document PEM_ASN1_read(3) and PEM_ASN1_read_bio(3);schwarze2020-06-125-7/+236
* wording tweaks from ross l richardson and tb;jmc2020-06-111-6/+6
* document PKCS7_get_signer_info(3)schwarze2020-06-105-8/+75
* describe six more PKCS7 attribute functionsschwarze2020-06-101-14/+208
* The check_includes step is incorrect dependency management model forderaadt2020-06-093-33/+3
* Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck2020-06-066-7/+179
* Add a custom copy handler for AES key wraptb2020-06-051-5/+31
* Use IANA allocated GOST ClientCertificateTypes.jsing2020-06-053-9/+15
* Stop sending GOST R 34.10-94 as a CertificateType.jsing2020-06-051-3/+1
* Handle GOST in ssl_cert_dup().jsing2020-06-051-1/+5
* Enable GOST_SIG_FORMAT_RS_LE when verifying certificate signatures.jsing2020-06-052-2/+15
* Allow GOST R 34.11-2012 in PBE/PBKDF2/PKCS#5.jsing2020-06-051-1/+3
* Add OIDs for HMAC using Streebog (GOST R 34.11-2012) hash function.jsing2020-06-052-0/+4
* Add a few more errors to help debugging.jsing2020-06-051-6/+16
* Add support for additional GOST curves.jsing2020-06-054-12/+182
* Remove remaining error *_str_functs[]jsing2020-06-054-274/+11
* Apply some style(9).jsing2020-06-051-34/+30
* One error file per directory is plenty.jsing2020-06-053-229/+157
* When X509_ATTRIBUTE_create() receives an invalid NID (e.g., -1), returnschwarze2020-06-042-14/+9
* minor polishing:schwarze2020-06-041-4/+10
* Align tls13_server_select_certificate() withtb2020-06-041-3/+7
* Improve client certificate selection for TLSv1.3tb2020-06-041-16/+80
* mention that TLS_method(3) also supports TLSv1.3;schwarze2020-06-041-3/+3
* Collapse the x509v3 directory into x509.jsing2020-06-0438-47/+44
* new manual page PKCS7_add_attribute(3);schwarze2020-06-047-12/+201
* Properly document PKCS7_final(3), which was already mentionedschwarze2020-06-0310-32/+263