- Jun 01, 2001
-
-
Richard Levitte authored
-
Richard Levitte authored
-
Bodo Möller authored
(The attack against SSL 3.1 and TLS 1.0 is impractical anyway, otherwise this would be a security relevant patch.)
-
Bodo Möller authored
-
- May 31, 2001
-
-
Richard Levitte authored
links.
-
Geoff Thorpe authored
a bit of weird code in sk_new.
-
- May 30, 2001
-
-
Andy Polyakov authored
Submitted by: Reviewed by: PR:
-
Richard Levitte authored
string (some engines may have certificates protected by a PIN!) and a description to put into error messages. Also, have our own password callback that we can send both a password and some prompt info to. The default password callback in EVP assumes that the passed parameter is a password, which isn't always the right thing, and the ENGINE code (at least the nCipher one) makes other assumptions... Also, in spite of having the functions to load keys, some utilities did the loading all by themselves... That's changed too.
-
Richard Levitte authored
-
- May 29, 2001
-
-
Lutz Jänicke authored
-
- May 28, 2001
-
-
Andy Polyakov authored
details (performance numbers and accompanying discussions:-). Note that the code is not engaged in ./Configure yet. I'll add it later this week along with updates for .spec file. Submitted by: Reviewed by: PR:
-
- May 26, 2001
-
-
Richard Levitte authored
-
- May 25, 2001
-
-
Richard Levitte authored
passwords that were given to the key loading functions were completely ignored, at least in the ncipher code, and then we made the assumption that the callback wanted a prompt as user argument. All that is now changed, and the application author is forced to give a callback function of type pem_callback_cb and possibly an argument for it, just as for all other functions that want to generate password prompting. NOTE: this change creates binary and source incompatibilities with previous versions of OpenSSL [engine]. It's worth it this time, to get it right (or at least better and with a chance that it'll work).
-
- May 24, 2001
-
-
Dr. Stephen Henson authored
Add missing variable length cipher flag for Blowfish. Only use trust settings if either trust or reject settings are present, otherwise use compatibility mode. This stops root CAs being rejected if they have alias of keyid set.
-
- May 22, 2001
-
-
Richard Levitte authored
-
- May 17, 2001
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
For some unknown reason fopen("con", "w") is the only way to make this work. Using "r+" and "w+" causes the fopen call to fail and the fallback (using stdin) doesn't work because writing to stdin fails.
-
Richard Levitte authored
-
Richard Levitte authored
environment were a part of a Unix operating systems, but these days you see an increasing number of installations that do not necessarely have these crucial parts by default, so it's needs mentioning.
-
- May 16, 2001
-
-
Lutz Jänicke authored
-
Richard Levitte authored
as gmtime_r() on the systems where that is defined.
-
- May 15, 2001
-
-
Lutz Jänicke authored
-
Richard Levitte authored
-
Richard Levitte authored
DEC C only have them declared that way (it doesn't really matter, since the linker is case-insensitive by default)
-
- May 14, 2001
-
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
characters.
-
Richard Levitte authored
compilers will complain against the check for less than zero.
-
Richard Levitte authored
-
Richard Levitte authored
symbols.
-
Lutz Jänicke authored
-
Lutz Jänicke authored
-
- May 13, 2001
-
-
Richard Levitte authored
mistake.
-
Richard Levitte authored
-
Richard Levitte authored
reachable. It's completely untested for now. To be done in the next few days.
-
Richard Levitte authored
-