1. 17 3月, 2008 1 次提交
  2. 16 5月, 2006 1 次提交
  3. 30 10月, 2003 1 次提交
    • G
      A general spring-cleaning (in autumn) to fix up signed/unsigned warnings. · 27545970
      Geoff Thorpe 提交于
      I have tried to convert 'len' type variable declarations to unsigned as a
      means to address these warnings when appropriate, but when in doubt I have
      used casts in the comparisons instead. The better solution (that would get
      us all lynched by API users) would be to go through and convert all the
      function prototypes and structure definitions to use unsigned variables
      except when signed is necessary. The proliferation of (signed) "int" for
      strictly non-negative uses is unfortunate.
      27545970
  4. 21 3月, 2003 1 次提交
  5. 13 11月, 2002 1 次提交
  6. 16 2月, 2002 1 次提交
    • R
      The AES modes OFB and CFB are defined with 128 feedback bits. This · a6cd8707
      Richard Levitte 提交于
      deviates from the "standard" 64 bits of feedback that all other
      algorithms are using.  Therefore, let's redo certain EVP macros to
      accept different amounts of feedback bits for these modes.
      
      Also, change e_aes.c to provide all usually available modes for AES.
      CTR isn't included yet.
      a6cd8707
  7. 17 10月, 2001 1 次提交
  8. 31 7月, 2001 1 次提交
  9. 09 3月, 2001 1 次提交
    • D
      · 13588350
      Dr. Stephen Henson 提交于
      Change the EVP_somecipher() and EVP_somedigest()
      functions to return constant EVP_MD and EVP_CIPHER
      pointers.
      
      Update docs.
      13588350
  10. 20 2月, 2001 1 次提交
    • R
      Make all configuration macros available for application by making · cf1b7d96
      Richard Levitte 提交于
      sure they are available in opensslconf.h, by giving them names starting
      with "OPENSSL_" to avoid conflicts with other packages and by making
      sure e_os2.h will cover all platform-specific cases together with
      opensslconf.h.
      
      I've checked fairly well that nothing breaks with this (apart from
      external software that will adapt if they have used something like
      NO_KRB5), but I can't guarantee it completely, so a review of this
      change would be a good thing.
      cf1b7d96
  11. 03 6月, 2000 1 次提交
  12. 31 5月, 2000 1 次提交
    • D
      · 49528751
      Dr. Stephen Henson 提交于
      More EVP cipher revision.
      
      Change EVP_SealInit() and EVP_OpenInit() to
      handle cipher parameters.
      
      Make it possible to set RC2 and RC5 params.
      
      Make RC2 ASN1 code use the effective key bits
      and not the key length.
      
      TODO: document how new API works.
      49528751
  13. 30 5月, 2000 1 次提交
    • D
      Fourth phase EVP revision. · 57ae2e24
      Dr. Stephen Henson 提交于
      Declare ciphers in terms of macros. This reduces
      the amount of code and places each block cipher EVP
      definition in a single file instead of being spread
      over 4 files.
      57ae2e24
  14. 28 5月, 2000 1 次提交
  15. 27 5月, 2000 2 次提交
    • D
      · be06a934
      Dr. Stephen Henson 提交于
      Second phase of EVP cipher overhaul.
      
      Change functions like EVP_EncryptUpdate() so they now return a
      value. These normally have software only implementations
      which cannot fail so this was acceptable. However ciphers
      can be implemented in hardware and these could return errors.
      be06a934
    • D
      · 7f060601
      Dr. Stephen Henson 提交于
      Beginnings of EVP cipher overhaul. This should eventually
      enhance and tidy up the EVP interface.
      
      This patch adds initial support for variable length ciphers
      and changes S/MIME code to use this.
      
      Some other library functions need modifying to support use
      of modified cipher parameters.
      
      Also need to change all the cipher functions that should
      return error codes, but currenly don't.
      
      And of course it needs extensive testing...
      7f060601
  16. 17 5月, 1999 1 次提交
    • D
      Fix various less obvious bugs in PKCS#7 handling: such as not zeroing · 1b266dab
      Dr. Stephen Henson 提交于
      the secret key before we've encrypted it and using the right NID for RC2-64.
      Add various arguments to the experimental programs 'dec' and 'enc' to make
      testing less painful.
      
      This stuff has now been tested against Netscape Messenger and it can encrypt
      and decrypt S/MIME messages with RC2 (128, 64 and 40 bit) DES and triple DES.
      
      Its still experimental though...
      1b266dab
  17. 10 5月, 1999 1 次提交
  18. 27 4月, 1999 1 次提交
  19. 24 4月, 1999 1 次提交
  20. 20 4月, 1999 1 次提交
  21. 18 4月, 1999 1 次提交
  22. 17 4月, 1999 1 次提交
  23. 21 12月, 1998 3 次提交