1. 20 2月, 2001 1 次提交
  2. 10 2月, 2001 1 次提交
  3. 08 2月, 2001 1 次提交
    • D
      · deb2c1a1
      Dr. Stephen Henson 提交于
      Fix AES code.
      
      Update Rijndael source to v3.0
      
      Add AES OIDs.
      
      Change most references of Rijndael to AES.
      
      Add new draft AES ciphersuites.
      deb2c1a1
  4. 06 2月, 2001 1 次提交
  5. 31 12月, 2000 1 次提交
  6. 15 12月, 2000 1 次提交
  7. 01 12月, 2000 1 次提交
  8. 01 6月, 2000 1 次提交
    • G
      The previous commit to crypto/stack/*.[ch] pulled the type-safety strings · ccd86b68
      Geoff Thorpe 提交于
      yet tighter, and also put some heat on the rest of the library by
      insisting (correctly) that compare callbacks used in stacks are prototyped
      with "const" parameters. This has led to a depth-first explosion of
      compiler warnings in the code where 1 constification has led to 3 or 4
      more. Fortunately these have all been resolved to completion and the code
      seems cleaner as a result - in particular many of the _cmp() functions
      should have been prototyped with "const"s, and now are. There was one
      little problem however;
      
      X509_cmp() should by rights compare "const X509 *" pointers, and it is now
      declared as such. However, it's internal workings can involve
      recalculating hash values and extensions if they have not already been
      setup. Someone with a more intricate understanding of the flow control of
      X509 might be able to tighten this up, but for now - this seemed the
      obvious place to stop the "depth-first" constification of the code by
      using an evil cast (they have migrated all the way here from safestack.h).
      
      Fortunately, this is the only place in the code where this was required
      to complete these type-safety changes, and it's reasonably clear and
      commented, and seemed the least unacceptable of the options. Trying to
      take the constification further ends up exploding out considerably, and
      indeed leads directly into generalised ASN functions which are not likely
      to cooperate well with this.
      ccd86b68
  9. 22 2月, 2000 1 次提交
  10. 21 2月, 2000 2 次提交
  11. 04 2月, 2000 1 次提交
  12. 22 1月, 2000 1 次提交
  13. 06 1月, 2000 3 次提交
  14. 10 6月, 1999 1 次提交
  15. 21 5月, 1999 2 次提交
  16. 15 5月, 1999 1 次提交
  17. 13 5月, 1999 5 次提交
  18. 10 5月, 1999 2 次提交
  19. 09 5月, 1999 1 次提交
  20. 27 4月, 1999 2 次提交
  21. 24 4月, 1999 1 次提交
  22. 23 4月, 1999 1 次提交
  23. 21 4月, 1999 1 次提交
  24. 18 4月, 1999 1 次提交
  25. 13 4月, 1999 1 次提交
  26. 06 3月, 1999 1 次提交
  27. 25 2月, 1999 1 次提交
    • R
      Add a bunch of SSL_xxx() functions for configuring the temporary RSA and DH · 15d21c2d
      Ralf S. Engelschall 提交于
      private keys and/or callback functions which directly correspond to their
      SSL_CTX_xxx() counterparts but work on a per-connection basis. This is needed
      for applications which have to configure certificates on a per-connection
      basis (e.g. Apache+mod_ssl) instead of a per-context basis (e.g.
      s_server).
      
      For the RSA certificate situation is makes no difference, but for the DSA
      certificate situation this fixes the "no shared cipher" problem where the
      OpenSSL cipher selection procedure failed because the temporary keys were not
      overtaken from the context and the API provided no way to reconfigure them.
      
      The new functions now let applications reconfigure the stuff and they are in
      detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh,
      SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback.  Additionally a new
      non-public-API function ssl_cert_instantiate() is used as a helper function
      and also to reduce code redundancy inside ssl_rsa.c.
      
      Submitted by: Ralf S. Engelschall
      Reviewed by: Ben Laurie
      15d21c2d
  28. 22 2月, 1999 3 次提交