- 17 5月, 1999 9 次提交
-
-
由 Ulf Möller 提交于
-
由 Bodo Möller 提交于
Submitted by: Andy Polyakov
-
由 Bodo Möller 提交于
because of missing session ID context (so that application programmers are directly pointed to what they should do differently).
-
由 Bodo Möller 提交于
So omit it for now :-(
-
由 Bodo Möller 提交于
doesn't have a default value like the "-config" options of other openssl subprograms.
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
the secret key before we've encrypted it and using the right NID for RC2-64. Add various arguments to the experimental programs 'dec' and 'enc' to make testing less painful. This stuff has now been tested against Netscape Messenger and it can encrypt and decrypt S/MIME messages with RC2 (128, 64 and 40 bit) DES and triple DES. Its still experimental though...
-
- 16 5月, 1999 10 次提交
-
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
(meaning pointer to char) to des_cblock * (meaning pointer to array with 8 char elements), which allows the compiler to do more typechecking. (The changed argument types were of type des_cblock * back in SSLeay, and a lot of ugly casts were used then to turn them into pointers to elements; but it can be done without those casts.) Introduce new type const_des_cblock -- before, the pointers rather than the elements pointed to were declared const, and for some reason gcc did not complain about this (but some other compilers did).
-
由 Bodo Möller 提交于
which cost me some time to find out about.
-
由 Bodo Möller 提交于
-
由 Ben Laurie 提交于
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
find the right RecipientInfo based on the recipient certificate (so would fail a lot of the time) and fixup cipher structures to correctly (maybe) modify the AlgorithmIdentifiers. Largely untested at present... this will be fixed in due course. Well the stuff was broken to begin with so if its broken now then you haven't lost anything :-)
-
由 Dr. Stephen Henson 提交于
unsigned/signed cmp error in asn1parse. Change various pem_all.c args to use pem_password_cb.
-
由 Ben Laurie 提交于
-
- 15 5月, 1999 18 次提交
-
-
由 Ben Laurie 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
use (certain parts of) OpenSSL.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
Submitted by: Oleg Girko
-
由 Bodo Möller 提交于
-
由 Ben Laurie 提交于
-
由 Bodo Möller 提交于
that's what the calling code seems to expect.
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
integers was completely broken. Also added a NEG_PUBKEY_BUG compilation option to compensate for public keys improperly encoded as negative integers.
-
- 14 5月, 1999 3 次提交
-
-
由 Bodo Möller 提交于
thread-safe (where thread-safe counterparts are not available on all platforms), and don't memcpy to NULL-pointers Submitted by: Anonymous Reviewed by: Bodo Moeller Also, clean up htons vs. ntohs confusions.
-
由 Bodo Möller 提交于
Submitted by: Reviewed by: PR:
-
由 Bodo Möller 提交于
those functions without having a parameter list declaration. (There are various similar cases left ...)
-