- 26 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Enhance OCSP_request_verify() so it finds the signers certificate properly and supports several flags.
-
- 24 2月, 2001 3 次提交
-
-
由 Dr. Stephen Henson 提交于
-
由 Dr. Stephen Henson 提交于
Print out OID of unknown signature or public key algorithms.
-
由 Dr. Stephen Henson 提交于
key algorithms and leaking if the signature verify fails.
-
- 23 2月, 2001 2 次提交
-
-
由 Dr. Stephen Henson 提交于
or serial number.
-
由 Dr. Stephen Henson 提交于
-
- 22 2月, 2001 1 次提交
-
-
由 Geoff Thorpe 提交于
-
- 21 2月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
form '#if defined(...) || defined(...) || ...' and '#if !defined(...) && !defined(...) && ...'. This also avoids the growing number of special cases it was previously handling (some of them wrongly).
-
- 20 2月, 2001 4 次提交
-
-
由 Bodo Möller 提交于
Mention BN_[pseudo_]rand with top=-1 in CHANGES.
-
由 Ulf Möller 提交于
-
由 Richard Levitte 提交于
-
由 Richard Levitte 提交于
sure they are available in opensslconf.h, by giving them names starting with "OPENSSL_" to avoid conflicts with other packages and by making sure e_os2.h will cover all platform-specific cases together with opensslconf.h. I've checked fairly well that nothing breaks with this (apart from external software that will adapt if they have used something like NO_KRB5), but I can't guarantee it completely, so a review of this change would be a good thing.
-
- 19 2月, 2001 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Remove the old broken bio read of serial numbers in the 'ca' index file. This would choke if a revoked certificate was specified with a negative serial number. Fix typo in uid.c
-
由 Bodo Möller 提交于
-
- 16 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Add revelant new X509V3 extensions. Add OIDs. Fix ASN1 memory leak code to pop info if external allocation used.
-
- 15 2月, 2001 2 次提交
-
-
由 Lutz Jänicke 提交于
-
由 Lutz Jänicke 提交于
-
- 14 2月, 2001 3 次提交
-
-
由 Dr. Stephen Henson 提交于
Add -nopad option to enc command. Update docs.
-
由 Dr. Stephen Henson 提交于
-
由 Ulf Möller 提交于
-
- 13 2月, 2001 2 次提交
-
-
由 Dr. Stephen Henson 提交于
Doesn't handle SSL URLs yet.
-
由 Dr. Stephen Henson 提交于
-
- 12 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 10 2月, 2001 3 次提交
-
-
由 Bodo Möller 提交于
-
由 Dr. Stephen Henson 提交于
Fix CRL printing to correctly show when there are no revoked certificates. Make ca.c correctly initialize the revocation date. Make ASN1_UTCTIME_set_string() and ASN1_GENERALIZEDTIME_set_string() set the string type: so they can initialize ASN1_TIME structures properly.
-
由 Lutz Jänicke 提交于
the clients choice; in SSLv2 the client uses the server's preferences.
-
- 09 2月, 2001 3 次提交
-
-
由 Dr. Stephen Henson 提交于
and ASN1 code.
-
由 Dr. Stephen Henson 提交于
OCSP responses. Documentation to follow... Urgh.. this conflicted with the -VAfile patch I hope I haven't broken it.
-
由 Richard Levitte 提交于
client code certificates to use to only check response signatures. I'm not entirely sure if the way I just implemented the verification is the right way to do it, and would be happy if someone would like to review this.
-
- 08 2月, 2001 3 次提交
-
-
由 Bodo Möller 提交于
Bleichenbacher's DSA attack. With this implementation, the expected number of iterations never exceeds 2. New semantics for BN_rand_range(): BN_rand_range(r, min, range) now generates r such that min <= r < min+range. (Previously, BN_rand_range(r, min, max) generated r such that min <= r < max. It is more convenient to have the range; also the previous prototype was misleading because max was larger than the actual maximum.)
-
由 Ulf Möller 提交于
-
由 Dr. Stephen Henson 提交于
Fix AES code. Update Rijndael source to v3.0 Add AES OIDs. Change most references of Rijndael to AES. Add new draft AES ciphersuites.
-
- 06 2月, 2001 2 次提交
-
-
由 Bodo Möller 提交于
-
由 Ulf Möller 提交于
-
- 05 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
request to response.
-
- 04 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
Various OCSP responder utility functions. Delete obsolete OCSP functions. Largely untested at present...
-
- 02 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-
- 01 2月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
certificates. One is a valid CA which has no basicConstraints but does have certSign keyUsage. Other is S/MIME signer with nonRepudiation but no digitalSignature.
-
- 30 1月, 2001 1 次提交
-
-
由 Richard Levitte 提交于
-
- 28 1月, 2001 1 次提交
-
-
由 Dr. Stephen Henson 提交于
-