Alexandre Savard | 1b09e31 | 2012-08-07 20:33:29 -0400 | [diff] [blame] | 1 | 1.1 23/08/96 - eay |
| 2 | Changed RC2_set_key() so it now takes another argument. Many |
| 3 | thanks to Peter Gutmann <pgut01@cs.auckland.ac.nz> for the |
| 4 | clarification and origional specification of RC2. BSAFE uses |
| 5 | this last parameter, 'bits'. It the key is 128 bits, BSAFE |
| 6 | also sets this parameter to 128. The old behaviour can be |
| 7 | duplicated by setting this parameter to 1024. |
| 8 | |
| 9 | 1.0 08/04/96 - eay |
| 10 | First version of SSLeay with rc2. This has been written from the spec |
| 11 | posted sci.crypt. It is in this directory under rrc2.doc |
| 12 | I have no test values for any mode other than ecb, my wrappers for the |
| 13 | other modes should be ok since they are basically the same as |
| 14 | the ones taken from idea and des :-). I have implemented them as |
| 15 | little-endian operators. |
| 16 | While rc2 is included because it is used with SSL, I don't know how |
| 17 | far I trust it. It is about the same speed as IDEA and DES. |
| 18 | So if you are paranoid, used Tripple DES, else IDEA. If RC2 |
| 19 | does get used more, perhaps more people will look for weaknesses in |
| 20 | it. |
| 21 | |
| 22 | |