- 30 10月, 2003 1 次提交
-
-
由 Geoff Thorpe 提交于
I have tried to convert 'len' type variable declarations to unsigned as a means to address these warnings when appropriate, but when in doubt I have used casts in the comparisons instead. The better solution (that would get us all lynched by API users) would be to go through and convert all the function prototypes and structure definitions to use unsigned variables except when signed is necessary. The proliferation of (signed) "int" for strictly non-negative uses is unfortunate.
-
- 06 2月, 2003 1 次提交
-
-
由 Bodo Möller 提交于
-
- 16 11月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
-
- 09 8月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Douglas Stebila <douglas.stebila@sun.com> (Authors: Vipul Gupta and Sumit Gupta, Sun Microsystems Laboratories)
-
- 29 4月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
-
- 19 4月, 2002 1 次提交
-
-
由 Richard Levitte 提交于
Notified by Lorinczy Zsigmond <lzsiga@mail.ahiv.hu>
-
- 28 2月, 2002 1 次提交
-
-
由 Bodo Möller 提交于
Submitted by: D. K. Smetters <smetters@parc.xerox.com> Reviewed by: Bodo Moeller
-
- 24 10月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
-
- 04 10月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
Submitted by Massimo Santin <msantin@santineassociati.com>.
-
- 03 9月, 2001 1 次提交
-
-
由 Bodo Möller 提交于
[DR]SA_up => [DR]SA_up_ref
-
- 02 9月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
See the commit log message for that for more information. NB: X509_STORE_CTX's use of "ex_data" support was actually misimplemented (initialisation by "memset" won't/can't/doesn't work). This fixes that but requires that X509_STORE_CTX_init() be able to handle errors - so its prototype has been changed to return 'int' rather than 'void'. All uses of that function throughout the source code have been tracked down and adjusted.
-
- 26 8月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
counts in DH, DSA, and RSA structures. Instead they use the new "***_up()" functions that handle this.
-
- 31 7月, 2001 2 次提交
-
-
由 Lutz Jänicke 提交于
-
由 Ben Laurie 提交于
-
- 30 7月, 2001 1 次提交
-
-
由 Lutz Jänicke 提交于
-
- 22 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
and make all files the depend on it include it without prefixing it with openssl/. This means that all Makefiles will have $(TOP) as one of the include directories.
-
- 20 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
missed any. This compiles and runs on Linux, and external applications have no problems with it. The definite test will be to build this on VMS.
-
- 16 12月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 30 11月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 17 11月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 18 9月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
of complaints from the compiler about data pointers and function pointers not being compatible with each other.
-
- 02 6月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
like Malloc, Realloc and especially Free conflict with already existing names on some operating systems or other packages. That is reason enough to change the names of the OpenSSL memory allocation macros to something that has a better chance of being unique, like prepending them with OPENSSL_. This change includes all the name changes needed throughout all C files.
-
- 01 6月, 2000 1 次提交
-
-
由 Geoff Thorpe 提交于
yet tighter, and also put some heat on the rest of the library by insisting (correctly) that compare callbacks used in stacks are prototyped with "const" parameters. This has led to a depth-first explosion of compiler warnings in the code where 1 constification has led to 3 or 4 more. Fortunately these have all been resolved to completion and the code seems cleaner as a result - in particular many of the _cmp() functions should have been prototyped with "const"s, and now are. There was one little problem however; X509_cmp() should by rights compare "const X509 *" pointers, and it is now declared as such. However, it's internal workings can involve recalculating hash values and extensions if they have not already been setup. Someone with a more intricate understanding of the flow control of X509 might be able to tighten this up, but for now - this seemed the obvious place to stop the "depth-first" constification of the code by using an evil cast (they have migrated all the way here from safestack.h). Fortunately, this is the only place in the code where this was required to complete these type-safety changes, and it's reasonably clear and commented, and seemed the least unacceptable of the options. Trying to take the constification further ends up exploding out considerably, and indeed leads directly into generalised ASN functions which are not likely to cooperate well with this.
-
- 21 5月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 14 3月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
in SSL_new. If SSL_OP_SINGLE_DH_USE is set, don't waste time in SSL_[CTX_]set_tmp_dh on computing a DH key that will be ignored anyway. ssltest -dhe1024dsa (w/ 160-bit sub-prime) had an unfair performance advantage over -dhe1024 (safe prime): SSL_OP_SINGLE_DH_USE was effectively always enabled because SSL_new ignored the DH key set in the SSL_CTX. Now -dhe1024 takes the server only about twice as long as -dhe1024dsa instead of three times as long (for 1024 bit RSA with 1024 bit DH).
-
- 24 1月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Tidy up CRYPTO_EX_DATA structures.
-
- 30 11月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
SSL_CTX and SSL, functions to set them and defaults if no values set.
-
- 12 9月, 1999 1 次提交
-
-
由 Andy Polyakov 提交于
This will soon be complemented with MacOS specific source code files and INSTALL.MacOS. I (Andy) have decided to get rid of a number of #include <sys/types.h>. I've verified it's ok (both by examining /usr/include/*.h and compiling) on a number of Unix platforms. Unfortunately I don't have Windows box to verify this on. I really appreciate if somebody could try to compile it and contact me a.s.a.p. in case a problem occurs. Submitted by: Roy Wood <roy@centricsystems.ca> Reviewed by: Andy Polyakov <appro@fy.chalmers.se>
-
- 08 8月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
-
- 30 7月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
-
- 22 7月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
and to lots of PEM_... functions. Submitted by: Damien Miller <dmiller@ilogic.com.au>
-
- 30 5月, 1999 1 次提交
-
-
由 Ben Laurie 提交于
-
- 21 5月, 1999 1 次提交
-
-
由 Ulf Möller 提交于
Pointed out by Juergen Moellenhoff <jurgen@oic.de>
-
- 14 5月, 1999 1 次提交
-
-
由 Bodo Möller 提交于
thread-safe (where thread-safe counterparts are not available on all platforms), and don't memcpy to NULL-pointers Submitted by: Anonymous Reviewed by: Bodo Moeller Also, clean up htons vs. ntohs confusions.
-
- 13 5月, 1999 3 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
While modifying the sources, I found some inconsistencies on the use of s->cert vs. s->session->sess_cert; I don't know if those could really have caused problems, but possibly this is a proper bug-fix and not just a clean-up.
-
由 Ulf Möller 提交于
Submitted by: Richard Levitte <richard@levitte.org>
-
- 10 5月, 1999 2 次提交
-
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
由 Bodo Möller 提交于
pointers. The cert_st handling is changed by this in various ways. Submitted by: Reviewed by: PR:
-