- Nov 13, 1999
-
-
Dr. Stephen Henson authored
-
- Nov 12, 1999
-
-
Richard Levitte authored
The info removal code was overcomplicated, and error-prone (references being wrongly decreased). Fixed.
-
Bodo Möller authored
-
Dr. Stephen Henson authored
-
Richard Levitte authored
-
Richard Levitte authored
1. Added code to the memory leak detecting code to give the user the possibility to add information, thereby forming a traceback. 2. Make the memory leak detecting code multithread-safe. The idea is that we're actually dealing with two separate critical sections, one containing the hash tables with the information, the other containing the current memory checking mode. Those should not be handled with the same lock, especially since their handling overlap. Hence, the added second lock.
-
Richard Levitte authored
Some crypto applications are now being built on Unix, so they should on VMS as well. Not by default, however.
-
Richard Levitte authored
works on Unix and MS-DOS/Windows. It does not under VMS, so open it as text.
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Richard Levitte authored
-
Dr. Stephen Henson authored
Merge some common functionality in the apps, delete the encryption option in the pkcs7 utility (they never did anything) and add a couple more options to pkcs7.
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
- Nov 11, 1999
-
-
Dr. Stephen Henson authored
pages.
-
Dr. Stephen Henson authored
Update docs, change 'ca' to use the new callback parameter. Now moved key_callback into app.c because some other utilities will use it soon.
-
Dr. Stephen Henson authored
-
- Nov 10, 1999
-
-
Dr. Stephen Henson authored
of the openssl utility commands...
-
- Nov 09, 1999
-
-
Bodo Möller authored
-
Ben Laurie authored
-
Bodo Möller authored
-
- Nov 08, 1999
-
-
Dr. Stephen Henson authored
plain not working :-( Also fix some memory leaks in the new X509_NAME code. Fix so new app_rand code doesn't crash 'x509' and move #include so it compiles under Win32.
-
- Nov 04, 1999
-
-
Dr. Stephen Henson authored
certificate: currently this includes trust settings and a "friendly name".
-
- Nov 03, 1999
-
-
Mark J. Cox authored
problem was that one of the replacement routines had not been working since SSLeay releases. For now the offending routine has been replaced with non-optimised assembler. Even so, this now gives around 95% performance improvement for 1024 bit RSA signs.
-
- Oct 30, 1999
-
-
Ulf Möller authored
-
- Oct 29, 1999
-
-
Dr. Stephen Henson authored
-
- Oct 27, 1999
-
-
Dr. Stephen Henson authored
Add a bunch of functions to simplify the creation of X509_NAME structures. Change the X509_NAME_entry_add stuff in req/ca so it no longer uses X509_NAME_entry_count(): passing -1 has the same effect.
-
- Oct 26, 1999
-
-
Bodo Möller authored
don't try to detect fork()s by looking at getpid(). The reason is that threads sharing the same memory can have different PIDs; it's inefficient to run RAND_seed each time a different thread calls RAND_bytes.
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
-
Bodo Möller authored
applications.
-
Bodo Möller authored
some utilities that should have used RANDFILE did not, and -rand handling was broken except in genrsa.
-
Bodo Möller authored
when X509_LOOKUP_load_file or X509_LOOKUP_add_dir failed.
-
- Oct 25, 1999
-
-
Bodo Möller authored
Submitted by: Janez Jere <jj@void.si>
-