aboutsummaryrefslogtreecommitdiffstats
path: root/doc/log.txt
Commit message (Expand)AuthorAgeFilesLines
...
* Tick version numbers to 1.10.0lloyd2011-04-141-0/+5
* Update docslloyd2011-04-111-1/+1
* More docslloyd2011-04-081-1/+2
* ECC private keys had two different constructors, one taking a grouplloyd2011-04-081-0/+6
* s/Release/Version/lloyd2011-04-061-152/+161
* Remove the socket wrapper code, as the SSL interface itselflloyd2011-04-051-2/+8
* Put 'Release' in front of every version. This causes Sphinx tolloyd2011-04-041-150/+150
* Convert most of the documentation to reStructured Text, addinglloyd2011-04-041-1543/+1882
* Remove some old scripts. Move the PGP key to a txt file. Documentlloyd2011-03-241-0/+2
* Disable the by default strong key checking on loading a privatelloyd2011-03-211-0/+3
* Tick to 1.9.16-devlloyd2011-03-211-1/+3
* Update notes, version, and readme for 1.9.15, first release candidate1.9.151.10.0-rc1lloyd2011-03-211-6/+12
* merge of '1bf20e797477a87c044a8fd74af47d872f630831'lloyd2011-03-141-2/+4
|\
| * More noteslloyd2011-03-091-0/+4
* | Use the same mesasge expansion trick in SHA-512. Performance onlloyd2011-03-131-2/+3
* | Modify SHA-224/SHA-256 so that it does the message expansion inlloyd2011-03-121-0/+4
|/
* Tick to 1.9.15-devlloyd2011-03-071-0/+4
* Tick version numbers for 1.9.14 release1.9.14lloyd2011-03-011-1/+1
* Fix PR 142: the zlib filters were not updated in 1.9.11 to use zeroiselloyd2011-02-181-0/+1
* Add support for bcrypt, the Blowfish-based password hashing schemelloyd2011-02-161-0/+1
* Add the NIST AES key wrap algorithm, as specified in RFC 3394 andlloyd2011-02-151-0/+1
* Tick version to 1.9.14-devlloyd2011-02-101-0/+2
* Tick to 1.9.13 release1.9.13lloyd2011-02-091-1/+5
* Fix the ordering of the GOST 34.10 signature values. Add a testlloyd2011-02-071-0/+1
* Update Keccak to the round 3 variant announced 2011-01-17lloyd2011-01-201-0/+1
* Tick to 1.9.13-devlloyd2010-12-151-0/+2
* Update versions for 1.9.12 release1.9.12lloyd2010-12-131-1/+2
* Add a simple but functioning implementation of Keccak. Only thelloyd2010-12-101-0/+1
* Fix OpenSSL engine compile :/lloyd2010-12-011-0/+1
* Add LDFLAGS to Python link linelloyd2010-12-011-0/+1
* Now 1.9.12-devlloyd2010-11-301-0/+2
* Update version numbers for 1.9.11 releaselloyd2010-11-291-1/+1
* Add X509_Certificate::to_stringlloyd2010-11-291-0/+2
* More release noteslloyd2010-11-231-1/+4
* More details in changeloglloyd2010-11-171-5/+10
* Update Skein-512 for the new 1.3 specification, just changes the keylloyd2010-11-031-0/+1
* Add 1.8.11 changeloglloyd2010-11-021-0/+8
* Document adding base64 standalone encoderlloyd2010-10-281-0/+1
* More size_t. Document changeslloyd2010-10-131-2/+5
* Forward port CRL fixes from rev 7bb2001cd554a1acc3d345914ea710ff0e1d3a6blloyd2010-10-071-0/+1
* Document removing appendlloyd2010-09-151-2/+3
* Wording changeslloyd2010-09-081-3/+3
* Document recent changeslloyd2010-09-081-2/+5
* Realization while thinking about the recently added truncate: in a STLlloyd2010-09-071-1/+0
* Document recent changeslloyd2010-09-031-0/+4
* Add 1.8.10 change noteslloyd2010-08-311-0/+9
* For passhash9, add another interface that allows the caller to specifylloyd2010-08-221-0/+1
* Turns out OpenSSL's implementation of PBKDF2 allows empty passphrases,lloyd2010-08-211-0/+1
* In the first round of AES, use a 256 element table and do thelloyd2010-08-181-0/+1
* The changelog for 1.9.4 claimed that the default PKCS #8 encryptionlloyd2010-08-131-1/+4