Go to file
Rich Salz a397aca435 Refactor many common flags into openssl.pod
Options moved: -rand, -writerand, -CApath, -CAfile, -no-CApath, -no-CAfile
Added rand to dgst and srp manpages (they were missing them).
New sections in openssl.pod: Random State Options, Trusted Certificate
Options.
Cleanup and add comments to find-doc-nits
Remove ".in" file support; unless giving specific arguments, this
only runs after configuration

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/10118)
2019-10-15 13:47:17 +02:00
.github Auto add a label depending on the type of issue they report. 2019-07-16 20:33:01 +02:00
apps Remove duplicated line in 'openssl list' output 2019-10-15 00:21:23 +02:00
boringssl@2070f8ad91
Configurations Building: Add modules with DEPENDs to GENERATEd files 2019-10-14 16:58:20 +02:00
crypto Add BN_check_prime() 2019-10-14 22:54:02 +02:00
demos Fix Typos 2019-07-02 14:22:29 +02:00
doc Refactor many common flags into openssl.pod 2019-10-15 13:47:17 +02:00
engines Explicitly test against NULL; do not use !p or similar 2019-10-09 21:32:15 +02:00
external/perl Update the bundled external perl module Text-Template to version 1.56 2019-09-12 12:53:32 +02:00
fuzz Support printing out some otherName variants 2019-09-24 10:27:09 +03:00
include Add BN_check_prime() 2019-10-14 22:54:02 +02:00
krb5@b9ad6c4950
ms Unify all assembler file generators 2019-09-16 16:29:57 +02:00
os-dep
providers Remove EVP_CIPH_FLAG_CUSTOM_CIPHER in all our providers 2019-10-11 15:58:15 +02:00
pyca-cryptography@09403100de
ssl Stop using EVP_MD_CTX_FLAG_NON_FIPS_ALLOW 2019-10-11 09:52:31 +02:00
test Add BN_check_prime() 2019-10-14 22:54:02 +02:00
tools
util Refactor many common flags into openssl.pod 2019-10-15 13:47:17 +02:00
VMS
.gitattributes
.gitignore Reorganize private crypto header files 2019-09-28 20:26:34 +02:00
.gitmodules
.travis-apt-pin.preferences
.travis-create-release.sh
.travis.yml Add arm64 in test matrix on TravisCI. 2019-10-03 07:53:14 +02:00
ACKNOWLEDGEMENTS
appveyor.yml Travis and Appveyor: use HARNESS_VERBOSE_FAILURE rather than HARNESS_VERBOSE 2019-09-12 14:39:09 +02:00
AUTHORS
build.info Building: Add modules with DEPENDs to GENERATEd files 2019-10-14 16:58:20 +02:00
CHANGES Deprecate NCONF_WIN32() function 2019-10-06 10:55:02 +02:00
config iOS build: Replace %20 with space in config script 2019-07-08 10:55:57 +02:00
config.com
configdata.pm.in confdata.pm.in: New template for configdata.pm 2019-09-12 18:19:27 +02:00
Configure Configure: accept Windows style compiler options 2019-10-13 17:23:37 +02:00
CONTRIBUTING
e_os.h Fix typo in comment 2019-10-06 13:39:01 +10:00
FAQ
HACKING A very brief explanation of how to add custom functions to OpenSSL. 2019-07-08 20:09:13 +10:00
INSTALL Configure: accept Windows style compiler options 2019-10-13 17:23:37 +02:00
LICENSE
NEWS Document recent changes in NEWS and CHANGES 2019-07-31 09:33:24 +02:00
NOTES.ANDROID
NOTES.DJGPP
NOTES.PERL
NOTES.UNIX
NOTES.VALGRIND
NOTES.VMS
NOTES.WIN
README
README.ENGINE
README.FIPS

 OpenSSL 3.0.0-dev

 Copyright (c) 1998-2018 The OpenSSL Project
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 All rights reserved.

 DESCRIPTION
 -----------

 The OpenSSL Project is a collaborative effort to develop a robust,
 commercial-grade, fully featured, and Open Source toolkit implementing the
 Transport Layer Security (TLS) protocols (including SSLv3) as well as a
 full-strength general purpose cryptographic library.

 OpenSSL is descended from the SSLeay library developed by Eric A. Young
 and Tim J. Hudson.

 The OpenSSL toolkit is licensed under the Apache License 2.0, which means
 that you are free to get and use it for commercial and non-commercial
 purposes as long as you fulfill its conditions.

 OVERVIEW
 --------

 The OpenSSL toolkit includes:

 libssl (with platform specific naming):
     Provides the client and server-side implementations for SSLv3 and TLS.

 libcrypto (with platform specific naming):
     Provides general cryptographic and X.509 support needed by SSL/TLS but
     not logically part of it.

 openssl:
     A command line tool that can be used for:
        Creation of key parameters
        Creation of X.509 certificates, CSRs and CRLs
        Calculation of message digests
        Encryption and decryption
        SSL/TLS client and server tests
        Handling of S/MIME signed or encrypted mail
        And more...

 INSTALLATION
 ------------

 See the appropriate file:
        INSTALL         Linux, Unix, Windows, OpenVMS, ...
        NOTES.*         INSTALL addendums for different platforms

 SUPPORT
 -------

 See the OpenSSL website www.openssl.org for details on how to obtain
 commercial technical support. Free community support is available through the
 openssl-users email list (see
 https://www.openssl.org/community/mailinglists.html for further details).

 If you have any problems with OpenSSL then please take the following steps
 first:

    - Download the latest version from the repository
      to see if the problem has already been addressed
    - Configure with no-asm
    - Remove compiler optimization flags

 If you wish to report a bug then please include the following information
 and create an issue on GitHub:

    - OpenSSL version: output of 'openssl version -a'
    - Configuration data: output of 'perl configdata.pm --dump'
    - OS Name, Version, Hardware platform
    - Compiler Details (name, version)
    - Application Details (name, version)
    - Problem Description (steps that will reproduce the problem, if known)
    - Stack Traceback (if the application dumps core)

 Just because something doesn't work the way you expect does not mean it
 is necessarily a bug in OpenSSL. Use the openssl-users email list for this type
 of query.

 HOW TO CONTRIBUTE TO OpenSSL
 ----------------------------

 See CONTRIBUTING

 LEGALITIES
 ----------

 A number of nations restrict the use or export of cryptography. If you
 are potentially subject to such restrictions you should seek competent
 professional legal advice before attempting to develop or distribute
 cryptographic code.