- 26 11月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Extend the X509_PURPOSE structure to include shortnames for purposed and default trust ids. Still need some extendable trust checking code and integration with the SSL and S/MIME code.
-
- 24 11月, 1999 2 次提交
-
-
由 Dr. Stephen Henson 提交于
at present. However nothing enables it yet so this doesn't matter :-)
-
由 Dr. Stephen Henson 提交于
Fix so EVP_PKEY_rset_*() check return codes.
-
- 22 11月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
New universal public key format. Fix CRL+cert load problem in by_file.c Make verify report errors when loading files or dirs
-
- 19 11月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 18 11月, 1999 3 次提交
-
-
由 Ben Laurie 提交于
-
由 Ben Laurie 提交于
-
由 Bodo Möller 提交于
don't leak tons of memory.
-
- 17 11月, 1999 3 次提交
-
-
由 Ulf Möller 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Bodo Möller 提交于
-
- 16 11月, 1999 5 次提交
-
-
由 Dr. Stephen Henson 提交于
Remove rc4-64 from ciphers since it doesn't exist...
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Mark J. Cox 提交于
Previously, the returned SSL_SESSION didn't have its reference count incremented so the SSL_SESSION could be freed at any time causing seg-faults if the pointer was subsequently used. Code that uses SSL_get_session must now make a corresponding SSL_SESSION_free() call when it is done to avoid memory leaks (or blocked up session caches). Submitted By: Geoff Thorpe <geoff@eu.c2.net>
-
- 15 11月, 1999 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Fix to stop null being added to attributes. Modify X509_LOOKUP, X509_INFO to handle auxiliary info.
-
- 14 11月, 1999 4 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
add documentation for 'enc'.
-
由 Dr. Stephen Henson 提交于
and add an nseq manpage.
-
由 Dr. Stephen Henson 提交于
-
- 13 11月, 1999 2 次提交
-
-
由 Richard Levitte 提交于
The info removal code was overcomplicated, and error-prone (references being wrongly decreased). Fixed.
-
由 Bodo Möller 提交于
-
- 12 11月, 1999 17 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
1. Added code to the memory leak detecting code to give the user the possibility to add information, thereby forming a traceback. 2. Make the memory leak detecting code multithread-safe. The idea is that we're actually dealing with two separate critical sections, one containing the hash tables with the information, the other containing the current memory checking mode. Those should not be handled with the same lock, especially since their handling overlap. Hence, the added second lock.
-
由 Richard Levitte 提交于
Some crypto applications are now being built on Unix, so they should on VMS as well. Not by default, however.
-
由 Richard Levitte 提交于
works on Unix and MS-DOS/Windows. It does not under VMS, so open it as text.
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
-
由 Dr. Stephen Henson 提交于
Merge some common functionality in the apps, delete the encryption option in the pkcs7 utility (they never did anything) and add a couple more options to pkcs7.
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
pages.
-