Go to file
Brent Cook 1c5591947a Add an OpenSSL compatible ./config wrapper
This allows sofware expecting OpenSSL's config script, to a limited
extent, to continue building without changes.

Thanks to technion for pointing this out and providing the initial
patch.
2014-10-31 07:35:06 -05:00
apps Improve and simplify function and header detection logic. 2014-10-30 19:15:11 -05:00
crypto wrap arc4random header 2014-10-30 19:15:20 -05:00
include Improve and simplify function and header detection logic. 2014-10-30 19:15:11 -05:00
man add missing commas from man links 2014-10-14 21:54:37 -05:00
ssl initial top-level import of subdirectories 2014-07-10 06:22:54 -05:00
tests Improve and simplify function and header detection logic. 2014-10-30 19:15:11 -05:00
.gitignore update gitignore to see changelog 2014-10-14 22:23:16 -05:00
AUTHORS initial top-level import 2014-07-10 06:07:09 -05:00
autogen.sh initial top-level import 2014-07-10 06:07:09 -05:00
ChangeLog update with 2.1.1 changes 2014-10-15 22:28:34 -05:00
config Add an OpenSSL compatible ./config wrapper 2014-10-31 07:35:06 -05:00
configure.ac Improve and simplify function and header detection logic. 2014-10-30 19:15:11 -05:00
dist.sh don't fail to make dist on a clean repo 2014-10-14 20:54:42 -05:00
libcrypto.pc.in add platform libraries to libcompat's LIBADD list 2014-07-12 03:34:08 -05:00
libressl.pub Add the public signing key so it can be fetched from github 2014-07-14 20:50:52 -06:00
libssl.pc.in add platform libraries to libcompat's LIBADD list 2014-07-12 03:34:08 -05:00
Makefile.am add platform libraries to libcompat's LIBADD list 2014-07-12 03:34:08 -05:00
Makefile.am.common allow inline asm 2014-08-16 14:16:01 -05:00
NEWS initial top-level import 2014-07-10 06:07:09 -05:00
OPENBSD_BRANCH tie master libressl branch to openbsd master 2014-07-31 22:08:30 -05:00
openssl.pc.in add platform libraries to libcompat's LIBADD list 2014-07-12 03:34:08 -05:00
README LibreSSL portable README update 2014-10-15 16:36:08 -05:00
update.sh Improve and simplify function and header detection logic. 2014-10-30 19:15:11 -05:00
VERSION bump version 2014-10-22 11:16:39 -05:00

This package is the official portable version of LibreSSL
	(http://www.libressl.org).

LibreSSL is a fork of OpenSSL developed by the OpenBSD project
(http://www.openbsd.org). LibreSSL is developed on OpenBSD. This
package then adds portability shims for other operating systems.

Official release tarballs are available at your friendly neighborhood
OpenBSD mirror in directory LibreSSL, e.g.:

	http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/

although we suggest that you use a mirror:

	http://www.openbsd.org/ftp.html

The LibreSSL portable build framework is also mirrored in Github:

	https://github.com/libressl-portable/portable

If you have checked this source using Git, follow these initial steps to
prepare the source tree for building:

 1. ensure you have the following packages installed:
	automake, autoconf, bash, git, libtool, perl, pod2man
 2. run './autogen.sh' to prepare the source tree for building
    or run './dist.sh' to prepare a tarball.

Once you have a source tree from Git or FTP, run these commands to build and
install the package:

  ./configure   # see ./configure --help for configuration options
  make check    # runs builtin unit tests
  make install  # set DESTDIR= to install to an alternate location

The resulting library and 'openssl' utility is largely API-compatible with
OpenSSL 1.0.1. However, it is not ABI compatible - you will need to relink your
programs to LibreSSL in order to use it, just as in moving from OpenSSL 0.9.8
to 1.0.1.

LibreSSL portable will likely build on any reasonably modern version of Linux,
Solaris, or OSX with a standards-compliant compiler and C library. If you are
working a new port, most of the OS-specific compatibility code is found in
'crypto/compat'

Note: Our policy is generally to use your system provided intrinsics.
If your system provides security sensitive functions (such as
arc4random(), issetugid(), calloc(), getentropy(), and others) we will
assume they are implemented correctly and securely. If they are
not please contact your OS provider.