- Feb 19, 2005
-
-
Lutz Jänicke authored
prematurely by EGD/PRNGD. PR: 1014 Submitted by: Darren Tucker <dtucker@zip.com.au>
-
- Feb 14, 2005
-
-
Dr. Stephen Henson authored
-
- Feb 06, 2005
-
-
Andy Polyakov authored
-
http://cvs.openssl.org/chngview?cn=12841Andy Polyakov authored
In HEAD this approach was taken one step further. There is linux-generic32 target which is used as unified Linux target for ARM, PA-RISC, SPARCv7, S390...
-
- Feb 05, 2005
-
-
Dr. Stephen Henson authored
utilities.
-
Dr. Stephen Henson authored
-
- Feb 03, 2005
-
-
Andy Polyakov authored
platforms."
-
Andy Polyakov authored
-
- Feb 01, 2005
-
-
Andy Polyakov authored
and SafeDllSearchMode in Windows.
-
- Jan 31, 2005
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Remove old FIPS_allow_md5() calls.
-
Dr. Stephen Henson authored
-
- Jan 28, 2005
-
-
Dr. Stephen Henson authored
Fixes to cipher blocking and enabling code. Add option -non-fips-allow to 'enc' and update testenc.
-
- Jan 27, 2005
-
-
Richard Levitte authored
unsigned char **, since it points at text. Thanks to Nils Larsch <nils.larsch@cybertrust.com> for pointing out the inelegance of our code :-)
-
Dr. Stephen Henson authored
Catch attempted use of non FIPS algorithms with HMAC. Give an assertion error for applications that ignore FIPS digest errors. Make -non-fips-allow work with dgst and HMAC.
-
Richard Levitte authored
cause a segfault... This was uncovered because EVP_VerifyInit() may fail in FIPS mode if the wrong algorithm is chosen...
-
Richard Levitte authored
-
- Jan 26, 2005
-
-
Dr. Stephen Henson authored
-
Dr. Stephen Henson authored
Non FIPS algorithms are not normally allowed in FIPS mode. Any attempt to use them via high level functions will return an error. The low level non-FIPS algorithm functions cannot return errors so they produce assertion failures. HMAC also has to give an assertion error because it (erroneously) can't return an error either. There are exceptions (such as MD5 in TLS and non cryptographic use of algorithms) and applications can override the blocking and use non FIPS algorithms anyway. For low level functions the override is perfomed by prefixing the algorithm initalization function with "private_" for example private_MD5_Init(). For high level functions an override is performed by setting a flag in the context.
-
Andy Polyakov authored
and make it work in non-interactive mode...
-
- Jan 18, 2005
-
-
Andy Polyakov authored
-
- Jan 14, 2005
-
-
Dr. Stephen Henson authored
memory BIO (for example from SMIME_read_PKCS7 and detached data) avoid lots of slow memory copies from the memory BIO by saving the content in a temporary read only memory BIO.
-
Andy Polyakov authored
PR: 989
-
Andy Polyakov authored
environments.
-
Andy Polyakov authored
PR: 998
-
Richard Levitte authored
-
- Jan 12, 2005
-
-
Richard Levitte authored
really needed now, but may be needed in the future, who knows?).
-
- Jan 11, 2005
-
-
Richard Levitte authored
-
Richard Levitte authored
Change the fingerprint accordingly.
-
Richard Levitte authored
besides, the implementation is bogus.
-
- Jan 09, 2005
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
PR: 993
-
- Jan 04, 2005
-
-
Andy Polyakov authored
PR: 989 Submitted by: Doug Kaufman
-
- Jan 03, 2005
-
-
Dr. Stephen Henson authored
-
- Dec 31, 2004
-
-
Andy Polyakov authored
-
- Dec 30, 2004
-
-
Andy Polyakov authored
-
Andy Polyakov authored
-
Andy Polyakov authored
-