- 01 6月, 2000 1 次提交
-
-
由 Geoff Thorpe 提交于
yet tighter, and also put some heat on the rest of the library by insisting (correctly) that compare callbacks used in stacks are prototyped with "const" parameters. This has led to a depth-first explosion of compiler warnings in the code where 1 constification has led to 3 or 4 more. Fortunately these have all been resolved to completion and the code seems cleaner as a result - in particular many of the _cmp() functions should have been prototyped with "const"s, and now are. There was one little problem however; X509_cmp() should by rights compare "const X509 *" pointers, and it is now declared as such. However, it's internal workings can involve recalculating hash values and extensions if they have not already been setup. Someone with a more intricate understanding of the flow control of X509 might be able to tighten this up, but for now - this seemed the obvious place to stop the "depth-first" constification of the code by using an evil cast (they have migrated all the way here from safestack.h). Fortunately, this is the only place in the code where this was required to complete these type-safety changes, and it's reasonably clear and commented, and seemed the least unacceptable of the options. Trying to take the constification further ends up exploding out considerably, and indeed leads directly into generalised ASN functions which are not likely to cooperate well with this.
-
- 31 5月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
More EVP cipher revision. Change EVP_SealInit() and EVP_OpenInit() to handle cipher parameters. Make it possible to set RC2 and RC5 params. Make RC2 ASN1 code use the effective key bits and not the key length. TODO: document how new API works.
-
- 30 5月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Declare ciphers in terms of macros. This reduces the amount of code and places each block cipher EVP definition in a single file instead of being spread over 4 files.
-
- 28 5月, 2000 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Remove duplicated code in EVP.
-
由 Bodo Möller 提交于
-
- 27 5月, 2000 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Second phase of EVP cipher overhaul. Change functions like EVP_EncryptUpdate() so they now return a value. These normally have software only implementations which cannot fail so this was acceptable. However ciphers can be implemented in hardware and these could return errors.
-
由 Dr. Stephen Henson 提交于
Beginnings of EVP cipher overhaul. This should eventually enhance and tidy up the EVP interface. This patch adds initial support for variable length ciphers and changes S/MIME code to use this. Some other library functions need modifying to support use of modified cipher parameters. Also need to change all the cipher functions that should return error codes, but currenly don't. And of course it needs extensive testing...
-
- 25 5月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
Call dh_tmp_cb with correct 'is_export' flag. Avoid tabs in CHANGES.
-
- 24 5月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
ASN1 encoding.
-
- 19 5月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
-
- 18 5月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 16 5月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
-
- 05 5月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 04 5月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add a couple of FAQs.
-
- 03 5月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 30 4月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
for it).
-
- 27 4月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
Submitted by: Reviewed by: PR:
-
- 20 4月, 2000 2 次提交
-
-
由 Geoff Thorpe 提交于
initialised, at which point an appropriate default was chosen. This meant a call to RSA_get_default_method might have returned FALSE. This change fixes that; now any called to RSA_new(), RSA_new_method(NULL), or RSA_get_default_method() will ensure that a default is chosen if it wasn't already.
-
由 Geoff Thorpe 提交于
technique used is far from perfect and alternatives are welcome. Basically if the translation flag is set, the string is not too long, and there appears to be no path information in the string, then it is converted to whatever the standard should be for the DSO_METHOD in question, eg; blah --> libblah.so on *nix, and blah --> blah.dll on win32. This change also introduces the DSO_ctrl() function that is used by the name translation stuff.
-
- 15 4月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 10 4月, 2000 1 次提交
-
-
由 Richard Levitte 提交于
-
- 07 4月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 05 4月, 2000 1 次提交
-
-
由 Geoff Thorpe 提交于
-
- 01 4月, 2000 2 次提交
-
-
由 Richard Levitte 提交于
as important to keep a low profile here :-))
-
由 Richard Levitte 提交于
-
- 30 3月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 28 3月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
0.9.5a should not break anything that works in 0.9.5.
-
- 27 3月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 22 3月, 2000 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Don't copy private key to X509 etc public key structures. Fix for warning.
-
- 19 3月, 2000 1 次提交
-
-
由 Ulf Möller 提交于
See http://www.pdc.kth.se/kth-krb/ Their solution for CRAY is somewhat awkward. I'll assume that a "short" is 32 bits on CRAY to avoid the #ifdef _CRAY typedef struct { unsigned int a:32; unsigned int b:32; } XXX; #else typedef DES_LONG XXX; #endif
-
- 14 3月, 2000 6 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
"openssl list-standard-commands".
-
由 Bodo Möller 提交于
-
由 Bodo Möller 提交于
in SSL_new. If SSL_OP_SINGLE_DH_USE is set, don't waste time in SSL_[CTX_]set_tmp_dh on computing a DH key that will be ignored anyway. ssltest -dhe1024dsa (w/ 160-bit sub-prime) had an unfair performance advantage over -dhe1024 (safe prime): SSL_OP_SINGLE_DH_USE was effectively always enabled because SSL_new ignored the DH key set in the SSL_CTX. Now -dhe1024 takes the server only about twice as long as -dhe1024dsa instead of three times as long (for 1024 bit RSA with 1024 bit DH).
-
- 10 3月, 2000 1 次提交
-
-
由 Bodo Möller 提交于
-
- 07 3月, 2000 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
-