aboutsummaryrefslogtreecommitdiffstats
path: root/doc
Commit message (Collapse)AuthorAgeFilesLines
* a B< that wasn't properly ended.Richard Levitte2002-05-301-1/+1
|
* Remove item listed twice <kromJx@crosswinds.net>.Lutz Jänicke2002-05-281-1/+0
|
* Fix incorrect =over 4 location.Lutz Jänicke2002-05-161-4/+2
| | | | | | Submitted by: David Waitzman <djw@bbn.com> Reviewed by: Lutz Jaenicke PR: [openssl.org #38]
* Small documentation fix for EVP_CipherFinal or EVP_CipherFinal_ex.Richard Levitte2002-05-081-1/+1
| | | | | Notified by Stella Power <snpower@maths.tcd.ie>. PR: 24
* Fix escaping when using the -subj option of "openssl req", documentLutz Jänicke2002-04-302-1/+13
| | | | 'hidden' -nameopt support. (Robert Joop <joop@fokus.gmd.de>)
* another error discovered by Karsten Braaten. The number was not evenUlf Möller2002-04-131-1/+1
| | | | prime!
* error reported by Karsten BraatenUlf Möller2002-04-071-1/+1
|
* Rephrase statement on the security of two-key 3DES.Bodo Möller2002-03-051-2/+2
| | | | | | | | [Chosen plaintext attack: R. Merkle, M. Hellman: "On the Security of Multiple Encryption", CACM 24 (1981) pp. 465-467, p. 776. Known plaintext angriff: P.C. van Oorschot, M. Wiener: "A known-plaintext attack on two-key triple encryption", EUROCRYPT '90.]
* Add 'void *' argument to app_verify_callback.Bodo Möller2002-02-281-20/+20
| | | | | Submitted by: D. K. Smetters <smetters@parc.xerox.com> Reviewed by: Bodo Moeller
* SSL_clear != SSL_free/SSL_newLutz Jänicke2002-02-271-0/+19
|
* Even though it is not really practical people should know about it.Lutz Jänicke2002-02-156-2/+97
|
* New functionsBodo Möller2002-01-241-8/+21
| | | | | | | | | | | ERR_peek_last_error ERR_peek_last_error_line ERR_peek_last_error_line_data (supersedes ERR_peek_top_error). Rename OPENSSL_NO_OLD_DES_SUPPORT into OPENSSL_DISABLE_OLD_DES_SUPPORT because OPENSSL_NO_... indicates disabled algorithms (according to mkdef.pl).
* Typos (jsyn <jsyn@openbsd.org>).Lutz Jänicke2002-01-211-2/+2
|
* add a sentence previously deleted by accidentBodo Möller2002-01-041-0/+2
|
* add documentation for SSLeay_version(SSLEAY_DIR) andBodo Möller2002-01-043-7/+100
| | | | | | | 'openssl version -d' use some descriptions from Lutz' redundant manual page instead of the previous ones
* Tsss, SSLeay_version() was already documented, it just was not linked in.Lutz Jänicke2002-01-043-68/+3
|
* Add information as provided by Richard Levitte on openssl-users :-)Lutz Jänicke2002-01-042-1/+67
|
* Update PEM docsDr. Stephen Henson2002-01-041-1/+24
|
* Improve back compatibility.Ben Laurie2001-12-091-4/+27
|
* I was recently informed that some people wrongly use ssleay.txt asRichard Levitte2001-12-041-0/+16
| | | | | main documentation, so let's warn them a little more, so the word "OBSOLETE" really gets understood.
* EVP_BytesToKey documentation.Dr. Stephen Henson2001-12-031-0/+67
|
* Add -pubkey option to req command.Dr. Stephen Henson2001-12-011-0/+5
|
* discuss -name and default_ca more correctly (I hope)Bodo Möller2001-11-261-2/+19
|
* Clarify reference count handling/removal of sessionLutz Jänicke2001-11-191-2/+4
| | | | (shinagawa@star.zko.dec.com).
* remove incorrect 'callback' prototypeBodo Möller2001-11-102-2/+9
|
* msg_callback documentationBodo Möller2001-11-103-0/+107
|
* clarifyBodo Möller2001-11-081-2/+4
|
* New options to allow req to accept UTF8 strings as input.Dr. Stephen Henson2001-10-261-0/+15
|
* remove compatibility notes that no longer applyUlf Möller2001-10-251-7/+6
|
* Correct some links...Richard Levitte2001-10-251-1/+1
|
* Change the DES documentation to reflect the current status. Note thatRichard Levitte2001-10-253-29/+255
| | | | | some password reading functions are really part of the UI compatibility library...
* mention des_old.hBodo Möller2001-10-251-1/+2
|
* Add '-noemailDN' option to 'openssl ca'. This prevents inclusion ofBodo Möller2001-10-251-2/+22
| | | | | | | | the e-mail address in the DN (i.e., it will go into a certificate extension only). The new configuration file option 'email_in_dn = no' has the same effect. Submitted by: Massimiliano Pala madwolf@openca.org
* Remove DES_random_seed() but retain des_random_seed() for now. ChangeRichard Levitte2001-10-251-7/+9
| | | | the docs to reflect this change and correct libeay.num.
* Due to an increasing number of clashes between modern OpenSSL andRichard Levitte2001-10-241-147/+150
| | | | | | | | | | | | libdes (which is still used out there) or other des implementations, the OpenSSL DES functions are renamed to begin with DES_ instead of des_. Compatibility routines are provided and declared by including openssl/des_old.h. Those declarations are the same as were in des.h when the OpenSSL project started, which is exactly how libdes looked at that time, and hopefully still looks today. The compatibility functions will be removed in some future release, at the latest in version 1.0.
* New functions SSL[_CTX]_set_msg_callback().Bodo Möller2001-10-201-2/+2
| | | | | | | | | | | | | | | | | | | | | New macros SSL[_CTX]_set_msg_callback_arg(). Message callback imlementation for SSL 3.0/TLS 1.0 (no SSL 2.0 yet). New '-msg' option for 'openssl s_client' and 'openssl s_server' that enable a message callback that displays all protocol messages. In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert if client_version is smaller than the protocol version in use. Also change ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if the client demanded SSL 3.0 but only TLS 1.0 is enabled; then the client will at least see that alert. Fix SSL[_CTX]_ctrl prototype (void * instead of char * for generic pointer). Add/update some OpenSSL copyright notices.
* document SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATIONBodo Möller2001-10-171-5/+13
|
* Update docs.Dr. Stephen Henson2001-10-173-78/+142
|
* Update docs.Dr. Stephen Henson2001-10-161-23/+71
|
* Update information as a partial response to the postLutz Jänicke2001-10-125-5/+62
| | | | | | | | | | | | | | From: "Chris D. Peterson" <cpeterson@aventail.com> Subject: Implementation Issues with OpenSSL To: openssl-users@openssl.org Date: Wed, 22 Aug 2001 16:13:17 -0700 The patch included in the original post may improve the internal session list handling (and is therefore worth a seperate investigation). No change to the list handling will however solve the problems of incorrect SSL_SESSION_free() calls. The session list is only one possible point of failure, dangling pointers would also occur for SSL object currently using the session. The correct solution is to only use SSL_SESSION_free() when applicable!
* Small documentation fixes (Howard Lum <howard@pumpkin.canada.sun.com>)Lutz Jänicke2001-10-081-4/+4
|
* Typo.Lutz Jänicke2001-09-131-0/+2
|
* One more manual page.Lutz Jänicke2001-09-132-0/+35
|
* Rework section about return values another time (based on hints fromLutz Jänicke2001-09-132-11/+9
| | | | Bodo Moeller).
* Make maximum certifcate chain size accepted from the peer applicationLutz Jänicke2001-09-112-0/+78
| | | | settable (proposed by "Douglas E. Engert" <deengert@anl.gov>).
* ispellUlf Möller2001-09-0721-35/+35
|
* Use uniformly chosen witnesses for Miller-Rabin testBodo Möller2001-09-032-0/+6
| | | | (by using new BN_pseudo_rand_range function)
* More docs.Lutz Jänicke2001-08-244-2/+158
|
* Typo.Lutz Jänicke2001-08-231-3/+3
|
* More manual pages. Constify.Lutz Jänicke2001-08-233-0/+106
|