wolfssl/doc/dox_comments/header_files
David Garske a38576146e * Added support for disabling PEM to DER functionality using `WOLFSSL_PEM_TO_DER`. This allows way to use with DER (ASN.1) certificates only in an embedded environment. This option builds, but internal make check requires PEM support for tests.
* More cleanup to move PEM functions from ssl.c to asn.c (`wolfSSL_CertPemToDer`, `wolfSSL_KeyPemToDer`, `wolfSSL_PubKeyPemToDer`). Renamed these API's to `wc_` and added backwards compatability macro for old function names.
2018-04-09 13:28:15 -07:00
..
aes.h added script so ensure doxygen api documentation matches wolfssl api 2018-03-01 10:27:30 -07:00
arc4.h
asn.h * Added support for disabling PEM to DER functionality using `WOLFSSL_PEM_TO_DER`. This allows way to use with DER (ASN.1) certificates only in an embedded environment. This option builds, but internal make check requires PEM support for tests. 2018-04-09 13:28:15 -07:00
asn_public.h * Added support for disabling PEM to DER functionality using `WOLFSSL_PEM_TO_DER`. This allows way to use with DER (ASN.1) certificates only in an embedded environment. This option builds, but internal make check requires PEM support for tests. 2018-04-09 13:28:15 -07:00
blake2.h
bn.h
camellia.h
chacha.h
chacha20_poly1305.h
coding.h
compress.h
curve25519.h * Added support for not loading a private key for server or client when `HAVE_PK_CALLBACK` is defined and the private PK callback is set. Tested with all cipher suites, TLS 1.2/1.3, client/server certs, RSA/ECC/ED25519. 2018-03-21 11:27:08 -07:00
des3.h
dh.h * Added support for not loading a private key for server or client when `HAVE_PK_CALLBACK` is defined and the private PK callback is set. Tested with all cipher suites, TLS 1.2/1.3, client/server certs, RSA/ECC/ED25519. 2018-03-21 11:27:08 -07:00
doxygen_groups.h
dsa.h * Added support for not loading a private key for server or client when `HAVE_PK_CALLBACK` is defined and the private PK callback is set. Tested with all cipher suites, TLS 1.2/1.3, client/server certs, RSA/ECC/ED25519. 2018-03-21 11:27:08 -07:00
ecc.h * Added support for not loading a private key for server or client when `HAVE_PK_CALLBACK` is defined and the private PK callback is set. Tested with all cipher suites, TLS 1.2/1.3, client/server certs, RSA/ECC/ED25519. 2018-03-21 11:27:08 -07:00
ed25519.h * Added support for not loading a private key for server or client when `HAVE_PK_CALLBACK` is defined and the private PK callback is set. Tested with all cipher suites, TLS 1.2/1.3, client/server certs, RSA/ECC/ED25519. 2018-03-21 11:27:08 -07:00
error-crypt.h
evp.h added script so ensure doxygen api documentation matches wolfssl api 2018-03-01 10:27:30 -07:00
hash.h
hc128.h
hmac.h
idea.h
logging.h added script so ensure doxygen api documentation matches wolfssl api 2018-03-01 10:27:30 -07:00
md2.h
md4.h
md5.h
memory.h
pem.h
pkcs7.h
poly1305.h
pwdbased.h
rabbit.h
random.h
ripemd.h
rsa.h * Added support for not loading a private key for server or client when `HAVE_PK_CALLBACK` is defined and the private PK callback is set. Tested with all cipher suites, TLS 1.2/1.3, client/server certs, RSA/ECC/ED25519. 2018-03-21 11:27:08 -07:00
sha.h
sha256.h
sha512.h
signature.h * Added support for not loading a private key for server or client when `HAVE_PK_CALLBACK` is defined and the private PK callback is set. Tested with all cipher suites, TLS 1.2/1.3, client/server certs, RSA/ECC/ED25519. 2018-03-21 11:27:08 -07:00
srp.h
ssl.h * Added support for disabling PEM to DER functionality using `WOLFSSL_PEM_TO_DER`. This allows way to use with DER (ASN.1) certificates only in an embedded environment. This option builds, but internal make check requires PEM support for tests. 2018-04-09 13:28:15 -07:00
tfm.h
types.h
wc_encrypt.h
wc_port.h Fix for the `HAVE_THEAD_LS` case with `FP_ECC` where starting a new thead and doing ECC operations and not calling `wc_ecc_fp_free`. Added missing `wolfCrypt_Init` to API docs. 2018-03-27 14:29:39 -07:00
wolfio.h Refactor IO callback function names to use `_CTX_` to eliminate confusion about the first parameter. 2018-03-21 16:08:55 -07:00