1. 08 6月, 2001 2 次提交
  2. 07 6月, 2001 6 次提交
  3. 06 6月, 2001 3 次提交
  4. 05 6月, 2001 3 次提交
  5. 04 6月, 2001 1 次提交
  6. 01 6月, 2001 7 次提交
  7. 31 5月, 2001 1 次提交
  8. 30 5月, 2001 2 次提交
    • R
      Extend all the loading functions to take an engine pointer, a pass · 30b4c272
      Richard Levitte 提交于
      string (some engines may have certificates protected by a PIN!) and
      a description to put into error messages.
      
      Also, have our own password callback that we can send both a password
      and some prompt info to.  The default password callback in EVP assumes
      that the passed parameter is a password, which isn't always the right
      thing, and the ENGINE code (at least the nCipher one) makes other
      assumptions...
      
      Also, in spite of having the functions to load keys, some utilities
      did the loading all by themselves...  That's changed too.
      30b4c272
    • R
      A wish was expressed. · 2adc9293
      Richard Levitte 提交于
      2adc9293
  9. 29 5月, 2001 2 次提交
  10. 27 5月, 2001 1 次提交
  11. 26 5月, 2001 1 次提交
    • R
      We had the password callback for ENGINEs pretty much wrong. And · 6c1a3e4f
      Richard Levitte 提交于
      passwords that were given to the key loading functions were completely
      ignored, at least in the ncipher code, and then we made the assumption
      that the callback wanted a prompt as user argument.
      
      All that is now changed, and the application author is forced to give
      a callback function of type pem_callback_cb and possibly an argument
      for it, just as for all other functions that want to generate password
      prompting.
      
      NOTE: this change creates binary and source incompatibilities with
      previous versions of OpenSSL [engine].  It's worth it this time, to
      get it right (or at least better and with a chance that it'll work).
      6c1a3e4f
  12. 25 5月, 2001 1 次提交
    • D
      · 76c919c1
      Dr. Stephen Henson 提交于
      Add missing variable length cipher flag for Blowfish.
      
      Only use trust settings if either trust or reject settings
      are present, otherwise use compatibility mode. This stops
      root CAs being rejected if they have alias of keyid set.
      76c919c1
  13. 22 5月, 2001 1 次提交
  14. 17 5月, 2001 4 次提交
  15. 16 5月, 2001 3 次提交
  16. 15 5月, 2001 2 次提交