You can subscribe to this list here.
2002 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(15) |
Nov
(29) |
Dec
(5) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2003 |
Jan
(88) |
Feb
(75) |
Mar
(86) |
Apr
(81) |
May
(47) |
Jun
(36) |
Jul
(87) |
Aug
(61) |
Sep
(37) |
Oct
(36) |
Nov
(18) |
Dec
(4) |
2004 |
Jan
(19) |
Feb
(26) |
Mar
(5) |
Apr
(10) |
May
|
Jun
(2) |
Jul
(14) |
Aug
(21) |
Sep
(8) |
Oct
(51) |
Nov
(20) |
Dec
(11) |
2005 |
Jan
(5) |
Feb
(5) |
Mar
(25) |
Apr
(48) |
May
(6) |
Jun
(29) |
Jul
(42) |
Aug
(25) |
Sep
(11) |
Oct
(42) |
Nov
(43) |
Dec
(52) |
2006 |
Jan
(39) |
Feb
(21) |
Mar
(42) |
Apr
(25) |
May
(22) |
Jun
(9) |
Jul
(4) |
Aug
(7) |
Sep
(3) |
Oct
(7) |
Nov
(11) |
Dec
(8) |
2007 |
Jan
(1) |
Feb
(5) |
Mar
(11) |
Apr
(2) |
May
(5) |
Jun
(9) |
Jul
(1) |
Aug
(9) |
Sep
|
Oct
(8) |
Nov
(1) |
Dec
(1) |
2008 |
Jan
(2) |
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
(1) |
Jul
|
Aug
(1) |
Sep
(1) |
Oct
|
Nov
(5) |
Dec
|
2009 |
Jan
(8) |
Feb
|
Mar
(1) |
Apr
(5) |
May
(4) |
Jun
(1) |
Jul
(4) |
Aug
|
Sep
(2) |
Oct
|
Nov
|
Dec
|
2010 |
Jan
(2) |
Feb
|
Mar
|
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(10) |
Nov
|
Dec
|
2011 |
Jan
(1) |
Feb
(1) |
Mar
(1) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2012 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2013 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
|
Nov
|
Dec
|
From: syed h. <sy...@ho...> - 2013-09-17 14:07:00
|
http://www.kreativesystemsinc.com/stunngnes.php What seems to be generosity is often no more than disguised ambition, which overlooks a small interest in order to secure a great one. 9/17/2013 3:06:47 PM |
From: Sridhar Y. <yad...@gm...> - 2012-02-15 09:17:50
|
Hi, I am using cryptix32.jar in JDK 1.4.2_10 version. Can I use the same jar for JDK 1.6.0_30. Is it compatible? If not compaitble, Can you please provide URL to download the cryptix version to use for JDK 1.6.0_30. Thank You Sridhar Yadavilli |
From: Shawn W. <swi...@go...> - 2011-03-22 22:42:39
|
I stumbled across a bug, and found a solution to it. I realize this project is dead, and that everyone should be migrating away from it, but some of us are stuck (at least for a little longer) with legacy code which uses it. I realize there won't be any more releases, but I though I might as well post the problem and the fix for anyone else who finds themselves in the same boat. One manifestation of this bug is that when you use the streaming PGP decryption API (DecodedMessageInputStream) to decrypt a signed stream, you get a PGPFatalDataFormatException with the message "Read tried past end of inputstream". The stack trace looks like: cryptix.openpgp.PGPFatalDataFormatException: Read tried past end of inputstream. at cryptix.openpgp.io.PGPLengthDataInputStream.readDirect(PGPLengthDataInputStream.java:123) at cryptix.openpgp.io.PGPLengthDataInputStream.readInternal(PGPLengthDataInputStream.java:159) at cryptix.openpgp.io.PGPLengthDataInputStream.readBuffer(PGPLengthDataInputStream.java:286) at cryptix.openpgp.io.PGPLengthDataInputStream.readBuffer(PGPLengthDataInputStream.java:250) at cryptix.openpgp.io.PGPLengthDataInputStream.readByteArray(PGPLengthDataInputStream.java:320) at cryptix.openpgp.packet.PGPSignaturePacket.decodeBody(PGPSignaturePacket.java:507) at cryptix.openpgp.provider.PGPDecodedMessageInputStream$SignedLiteralInputStream.verify(PGPDecodedMessageInputStream.java:732) at cryptix.openpgp.provider.PGPDecodedMessageInputStream.engineClose(PGPDecodedMessageInputStream.java:485) at cryptix.message.stream.DecodedMessageInputStream.close(DecodedMessageInputStream.java:162) at com.google.math.crypto.pgp.cryptix.CryptixDecryptionStream.close(CryptixDecryptionStream.java:70) at com.google.math.crypto.pgp.cryptix.CryptixDecryptionStream.read(CryptixDecryptionStream.java:53) The problem actually lies in cryptix.openpgp.provider.PGPDecodedMessageInputStream.read(byte[],int,int), on line 905. The troublesome code is: if ((in.available() == 0) && (buf.length - bufoffset == 0)) return 0; This basically says "if the underlying stream (which contains encrypted data) says it has no more data available and if our own buffer (containing already-decrypted data) is empty, then return 0 indicating that we have no more decrypted data to be read. Unfortunately, this test misses a third source of data -- the cipher object. It may have some additional data which will be returned by the call to doFinal(). If this is the case, the above lines ensure that the reader never gets that additional data. To fix the problem, simply delete the above two lines. This quick-escape test is actually unnecessary, since the following code works just fine even when no data is available from the underlying stream or in the data buffer. And without the quick-escape, the code recognizes the end-of-stream condition and calls doFinal() on the cipher, allowing it to retrieve and return the last of the decrypted data. A patch file is attached. -- Shawn Willden swi...@go... |
From: kannan n. <kan...@gm...> - 2011-02-02 09:06:21
|
Hi All, I resolved the issue by copying the two latest local_policy.jar,US_export_policy.jar provided by sun. Thanks, Kannan.N On Thu, Jan 27, 2011 at 6:05 PM, kannan natarajan <kan...@gm...>wrote: > Hi , > > I am facing the below issue.Kindly help me ! > java.lang.NoClassDefFoundError: javax/crypto/SunJCE_b > at javax.crypto.Cipher.getInstance(DashoA12275) > at javax.crypto.Cipher.getInstance(DashoA12275) > at > cryptix.openpgp.algorithm.PGPAlgorithmFactory.getCipherAlgorithm(PGPA > lgorithmFactory.java:675) > at > cryptix.openpgp.packet.PGPKeyPacket.decrypt(PGPKeyPacket.java:527) > at > cryptix.openpgp.provider.PGPKeyBundleImpl.getPrivateSubKey(PGPKeyBund > leImpl.java:906) > > Caused by: java.lang.SecurityException: Cannot set up certs for trusted CAs > at javax.crypto.SunJCE_b.<clinit>(DashoA12275) > ... 28 more > Caused by: java.security.PrivilegedActionException: > java.util.zip.ZipException: > Could not find End Of Central Directory > ... 29 more > Caused by: java.util.zip.ZipException: Could not find End Of Central > Directory > at java.util.zip.ZipFile.open(Native Method) > at java.util.zip.ZipFile.<init>(ZipFile.java:117) > at java.util.jar.JarFile.<init>(JarFile.java:132) > at java.util.jar.JarFile.<init>(JarFile.java:97) > at javax.crypto.SunJCE_b.a(DashoA12275) > at javax.crypto.SunJCE_b.i(DashoA12275) > at javax.crypto.SunJCE_b.g(DashoA12275) > at javax.crypto.SunJCE_r.run(DashoA12275) > at javax.crypto.SunJCE_b.<clinit>(DashoA12275) > at javax.crypto.Cipher.getInstance(DashoA12275) > at javax.crypto.Cipher.getInstance(DashoA12275) > at > cryptix.openpgp.algorithm.PGPAlgorithmFactory.getCipherAlgorithm(PGPA > |
From: kannan n. <kan...@gm...> - 2011-01-27 12:36:04
|
Hi , I am facing the below issue.Kindly help me ! java.lang.NoClassDefFoundError: javax/crypto/SunJCE_b at javax.crypto.Cipher.getInstance(DashoA12275) at javax.crypto.Cipher.getInstance(DashoA12275) at cryptix.openpgp.algorithm.PGPAlgorithmFactory.getCipherAlgorithm(PGPA lgorithmFactory.java:675) at cryptix.openpgp.packet.PGPKeyPacket.decrypt(PGPKeyPacket.java:527) at cryptix.openpgp.provider.PGPKeyBundleImpl.getPrivateSubKey(PGPKeyBund leImpl.java:906) Caused by: java.lang.SecurityException: Cannot set up certs for trusted CAs at javax.crypto.SunJCE_b.<clinit>(DashoA12275) ... 28 more Caused by: java.security.PrivilegedActionException: java.util.zip.ZipException: Could not find End Of Central Directory ... 29 more Caused by: java.util.zip.ZipException: Could not find End Of Central Directory at java.util.zip.ZipFile.open(Native Method) at java.util.zip.ZipFile.<init>(ZipFile.java:117) at java.util.jar.JarFile.<init>(JarFile.java:132) at java.util.jar.JarFile.<init>(JarFile.java:97) at javax.crypto.SunJCE_b.a(DashoA12275) at javax.crypto.SunJCE_b.i(DashoA12275) at javax.crypto.SunJCE_b.g(DashoA12275) at javax.crypto.SunJCE_r.run(DashoA12275) at javax.crypto.SunJCE_b.<clinit>(DashoA12275) at javax.crypto.Cipher.getInstance(DashoA12275) at javax.crypto.Cipher.getInstance(DashoA12275) at cryptix.openpgp.algorithm.PGPAlgorithmFactory.getCipherAlgorithm(PGPA |
From: Edwin W. <ed...@wo...> - 2010-10-11 06:30:58
|
My apologies for all the spam from 1 user to this list. This user now has lost his posting privileges. Gary: once you have gained control again of your account, please let me know. Edwin On 11 okt 2010, at 07:51, Gary Gray wrote: > http://artdaca.it/und9.html > ------------------------------------------------------------------------------ > Beautiful is writing same markup. Internet Explorer 9 supports > standards for HTML5, CSS3, SVG 1.1, ECMAScript5, and DOM L2 & L3. > Spend less time writing and rewriting code and more time creating great > experiences on the web. Be a part of the beta today. > http://p.sf.net/sfu/beautyoftheweb_______________________________________________ > Cryptix-Users mailing list > Cry...@li... > https://lists.sourceforge.net/lists/listinfo/cryptix-users |
From: Gary G. <gar...@ho...> - 2010-10-11 05:51:35
|
http://artdaca.it/und9.html |
From: Gary G. <gar...@ho...> - 2010-10-10 16:45:33
|
http://demarcogioielli.com/und9.html |
From: Gary G. <gar...@ho...> - 2010-10-10 16:14:16
|
http://www.grupponext.net/und9.html |
From: Gary G. <gar...@ho...> - 2010-10-10 10:25:23
|
http://elettronicsistem.com/und9.html |
From: Gary G. <gar...@ho...> - 2010-10-10 01:04:04
|
http://riccius-winter.de/und9.html |
From: Gary G. <gar...@ho...> - 2010-10-08 20:48:36
|
http://magicfrog.fr/und9.html |
From: Gary G. <gar...@ho...> - 2010-10-08 09:22:29
|
http://picarosgloves.it/und9.html |
From: Gary G. <gar...@ho...> - 2010-10-07 03:07:19
|
http://luigigrosso.net/und9.html |
From: Gerardo J. <ger...@ne...> - 2010-04-19 21:41:34
|
Hi, I downloaded cryptix32-20001002-r3.2.0 and I´m trying to figure out how to use RC4 to encrypt/decrypt but can´t figure out yet how to do it, is there some guide online? Or can somebody send me a code that I can use to get this done? Thanx in Advanced! Kind Regards, Gerardo J ################################################################################################################# Este documento puede incluir información confidencial y propiedad de Neoris y deberá ser leído solamente por la o las personas a quienes está dirigido. Si usted ha recibido este mensaje por error, por favor avise inmediatamente al remitente contestando y eliminando este correo. Cualquier punto de vista u opiniones expresadas en este mensaje son del remitente y no necesariamente coinciden con aquellas de Neoris. Este documento no deberá ser reproducido, copiado, distribuido, publicado, ni modificado por terceros sin la autorización por escrito de Neoris. Este mensaje ha sido verificado contra virus. Visítenos en www.neoris.com. This document may include proprietary and confidential information of Neoris, and may only be read by those person or persons to whom it is addressed. If you have received this e-mail message in error, please advise the sender immediately by reply e-mail and delete this message. Any views or opinions expressed in this e-mail are those of the sender and do not necessarily coincide with those of Neoris. This document may not be reproduced, copied, distributed, published, modified or furnished to third parties, without the prior written consent of Neoris. This e-mail message has been scanned for viruses and cleared. Visit us at www.neoris.com ################################################################################################################## |
From: Imran Q. <Imr...@cp...> - 2010-01-04 17:52:32
|
Here is some more error log if that can help: Netscape security model is no longer supported. Please migrate to the Java 2 security model instead. Cipher: Entered getInstance("DES", "ECB", "PKCS7", "Cryptix") IJCE_SecuritySupport: Initializing... Netscape security model is no longer supported. Please migrate to the Java 2 security model instead. Warning: invalid return value from PrivilegeManager.getMyPrincipals() Future security-related operations will probably fail. Many thanks Imran Qureshi ________________________________ From: Imran Qureshi Sent: 04 January 2010 13:36 To: 'cry...@li...' Subject: Error while using Cryptix 3.2.0 library Hi I am getting following error while using one of our 3rd party libraries which uses Cryptix32.jar: Netscape security model is no longer supported. Please migrate to the Java 2 security model instead. Warning: invalid return value from PrivilegeManager.getMyPrincipals() Future security-related operations will probably fail. Our Java environment is jdk1.5 and I am running a JUNIT test from Intellij IDEA. It runs successfully when we call the same code using JSPs deployed on weblogic 9.2. We have thrown this issue back to our provider third party already, but thought it could be resolved here. Many thanks Imran Qureshi This is an email from the CPP Group Plc, Holgate Park, York, YO26 4GA; telephone +44 (0)1904 544500. This message may contain information that is confidential. If you are not the intended recipient, you may not peruse, use, disseminate, distribute or copy this message. If you have received this message in error, please notify the sender immediately by email, facsimile or telephone and either return or destroy the original message. The CPP Group Plc accepts no responsibility for any changes made to this message after it has been sent by the original author. This email has been scanned for all viruses by the MessageLabs Email Security System. |
From: Imran Q. <Imr...@cp...> - 2010-01-04 14:36:29
|
Hi I am getting following error while using one of our 3rd party libraries which uses Cryptix32.jar: Netscape security model is no longer supported. Please migrate to the Java 2 security model instead. Warning: invalid return value from PrivilegeManager.getMyPrincipals() Future security-related operations will probably fail. Our Java environment is jdk1.5 and I am running a JUNIT test from Intellij IDEA. It runs successfully when we call the same code using JSPs deployed on weblogic 9.2. We have thrown this issue back to our provider third party already, but thought it could be resolved here. Many thanks Imran Qureshi This is an email from the CPP Group Plc, Holgate Park, York, YO26 4GA; telephone +44 (0)1904 544500. This message may contain information that is confidential. If you are not the intended recipient, you may not peruse, use, disseminate, distribute or copy this message. If you have received this message in error, please notify the sender immediately by email, facsimile or telephone and either return or destroy the original message. The CPP Group Plc accepts no responsibility for any changes made to this message after it has been sent by the original author. This email has been scanned for all viruses by the MessageLabs Email Security System. |
From: Geetu S. <gee...@gm...> - 2009-09-17 07:53:37
|
Maryann, It was a long time ago that I faced a similar problem. Since it was a production impacting issue, I did not have time to fix it. I just found a workaround and encrypted them from the tool instead of code. I dont remember the exact details, but hope that this helps in some way! Luck -Geetu On Tue, Sep 15, 2009 at 10:16 PM, Maryann Wayman <mar...@ya...>wrote: > Help > > I'm using Cryptix Open PGP to encrypt a nightly file (incremental > databases). It appears it cannot handle a file size greater than 1 gig. > Can anyone confirm that is the case? Also is there anyway to increse the > max of the file size? Not sure this would matter....but I can encrypt the > file on either a Windows or Linux box. > > Any help would be greatly appreciated. > > > Thanks! > Maryann > > > > > > ------------------------------------------------------------------------------ > Come build with us! The BlackBerry® Developer Conference in SF, CA > is the only developer event you need to attend this year. Jumpstart your > developing skills, take BlackBerry mobile applications to market and stay > ahead of the curve. Join us from November 9-12, 2009. Register now! > http://p.sf.net/sfu/devconf > _______________________________________________ > Cryptix-Users mailing list > Cry...@li... > https://lists.sourceforge.net/lists/listinfo/cryptix-users > -- regards, Geetu |
From: Maryann W. <mar...@ya...> - 2009-09-15 16:47:23
|
Help I'm using Cryptix Open PGP to encrypt a nightly file (incremental databases). It appears it cannot handle a file size greater than 1 gig. Can anyone confirm that is the case? Also is there anyway to increse the max of the file size? Not sure this would matter....but I can encrypt the file on either a Windows or Linux box. Any help would be greatly appreciated. Thanks! Maryann |
From: Gianni <gia...@gm...> - 2009-07-06 21:25:24
|
Hi all, we are currently using the Cryptix-JCE implementation and we have tried in a development box to set a system date past to Aug the 29th, 2009. We have experimented that the environment starts and runs as usual. I think (actually, I hope) that this is the expected and correct behaviour, after reading from the Sun forum where they say: “The validation code which checked for certificate expiration was only found in JCE 1.2.1. It WAS REMOVED from JCE 1.2.2 and all successive releases like JCE in JDK 1.4.x and 5.x (and soon in 6.x). This expiration problem was the primary reason for releasing JCE 1.2.2 over three years ago. Export control regulations changed following the release of JCE 1.2.1, and Sun released 1.2.2 shortly thereafter so that customers wouldn't have this expiration problem. This change is documented as the first bullet in the change log for JCE 1.2.2, which is found both in the product distribution itself and on the following JCE product page: http://java.sun.com/products/jce/jce122_changes.html. That said, JCE 1.2.2 is indeed signed with a certificate which is valid until October 2006, HOWEVER the JCE 1.2.2 and JCE in JDK 1.4.x/5.x code no longer checks that expiration date. All it cares about is that the code signature is valid”. (Refer to: http://forums.sun.com/thread.jspa?threadID=678679&tstart=2506). As suggested in http://forums.sun.com/thread.jspa?threadID=716308&tstart=2235, I’ve also tried the command: “jarsigner -verify -certs -verbose cryptix-jce-provider.jar” and in both cases (real current date and faked date) the jar (and the single classes) is verified. Only the final warnings are different. Current date: jar verified. - Warning: This jar contains entries whose signer certificate will expire within six months. Faked date: jar verified. - Warning: This jar contains entries whose signer certificate has expired. (Similarly for each class we had "[certificate will expire on 8/29/09 12:04 AM]" in the case of current date and "[certificate expired on 8/29/09 12:04 AM]" in the case of the faked date). As a matter of comparison to the real word it is reasanable to think that a signed hand written paper document is still valid even after years and even after the signer’s death. At the same time I think that it is correct to assume that a digitally signed document (or file, a jar in this case) is still integer/verified even after that the signing certificate (actually its corresponding private key) is expired. Of course it is correct (for security reasons) that a signing key (and certificate) expires after a certain period of time, but the signatures of documents signed with that key should “survive” to it. Best regards and apologizes for the long post Gianni Polidoro Edwin Woudt ha scritto: >> I am using cryptix-jce and cryptix-openpgp in an application. The >> certificate that signed the cryptix-jce-provider jar expires on 28 >> Aug 2009. >> >> We will all either need: >> >> 1 - A new build, signed with a newer key. >> > > The Cryptix Foundation ltd is the owner of the certificate, but that > organisation was dissolved a few years ago. While the private key is > still (somewhere) in my possession, the foundation cannot get that > certificate renewed anymore. > > So unless there is some other way for me to obtain a new certificate, > there will be no new build. > > > >> 2 - A new JCE implementation that doesn't require signed jars. >> 3 - A new package to use. >> > > Switching to Bouncycastle may be an option, but as the API is > different that requires some work. > > Alternatively you or your organization could try to get your own code > signing key and use it to create your own 'custom' version of the > Cryptix JCE. Instructions are on the following page: > > http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/HowToImplAProvider.html#Step61 > > I'm very interested in the results. > > > Edwin > > > ------------------------------------------------------------------------------ > _______________________________________________ > Cryptix-Users mailing list > Cry...@li... > https://lists.sourceforge.net/lists/listinfo/cryptix-users > > |
From: Edwin W. <ed...@wo...> - 2009-07-04 18:58:53
|
> I am using cryptix-jce and cryptix-openpgp in an application. The > certificate that signed the cryptix-jce-provider jar expires on 28 > Aug 2009. > > We will all either need: > > 1 - A new build, signed with a newer key. The Cryptix Foundation ltd is the owner of the certificate, but that organisation was dissolved a few years ago. While the private key is still (somewhere) in my possession, the foundation cannot get that certificate renewed anymore. So unless there is some other way for me to obtain a new certificate, there will be no new build. > 2 - A new JCE implementation that doesn't require signed jars. > 3 - A new package to use. Switching to Bouncycastle may be an option, but as the API is different that requires some work. Alternatively you or your organization could try to get your own code signing key and use it to create your own 'custom' version of the Cryptix JCE. Instructions are on the following page: http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/HowToImplAProvider.html#Step61 I'm very interested in the results. Edwin |
From: <Gre...@ri...> - 2009-07-02 23:42:51
|
Hello Tim, We also use cryptix-jce-provider jar for our open pgp encryption/decryption. As a test I set the date on our dev box to be 2010 and ran the unit tests where they passed, ie encrypted/decrypted messages OK. As a matter of interest, where would this certificate date be used? Cheers Greg Tim Orbaker <ti...@or...> 01/07/2009 18:03 To cry...@li... cc Subject [Cryptix-users] Impending certificate expiration I am using cryptix-jce and cryptix-openpgp in an application. The certificate that signed the cryptix-jce-provider jar expires on 28 Aug 2009. We will all either need: 1 - A new build, signed with a newer key. 2 - A new JCE implementation that doesn't require signed jars. 3 - A new package to use. Are others aware of this impending date and what are your plans? Tim Orbaker ------------------------------------------------------------------------------ _______________________________________________ Cryptix-Users mailing list Cry...@li... https://lists.sourceforge.net/lists/listinfo/cryptix-users Share our environment commitment - conserve resources and contribute to the reduction of CO2 emissions by not printing the email unless absolutely necessary to do so. Any opinions expressed are those of the author, not Ricoh UK Ltd. This communication does not constitute either offer or acceptance of any contractually binding agreement. Such offer or acceptance must be communicated in writing. It is the responsibility of the recipient to ensure this email and attachments are free from computer viruses before use and the sender accepts no responsibility or liability for any such computer viruses. Ricoh UK Ltd. may monitor the content of emails sent and received via its network for the purpose of ensuring compliance with its policies and procedures. This communication contains information, which may be confidential or privileged. The information is intended solely for the use of the individual or entity named above. If you are not the intended recipient, be aware that any disclosure, copying, distribution or use of the contents of this information is prohibited. If you have received this communication in error, please notify the sender immediately by return email with a copy to pos...@ri... . Please contact us on +44 (0) 208 261 4000 if you need assistance. Registered in England No: 473236 VAT No: GB524161280 |
From: Tim O. <ti...@or...> - 2009-07-01 17:02:14
|
I am using cryptix-jce and cryptix-openpgp in an application. The certificate that signed the cryptix-jce-provider jar expires on 28 Aug 2009. We will all either need: 1 - A new build, signed with a newer key. 2 - A new JCE implementation that doesn't require signed jars. 3 - A new package to use. Are others aware of this impending date and what are your plans? Tim Orbaker |
From: Jade L. <mon...@gm...> - 2009-06-29 20:35:11
|
I am working on getting a very old MMO up and running and right now I am in need of finding: Cryptix Perl Cryptix-1.16.tar.gz<http://www.cryptix.org/Cryptix-1.16.tar.gz>or higher. Currently the one that is one the site to download appears to be broken. Any chance anyone has a working copy that I could be sent so I can get this free game up and running? -- Jade Fetch me another play thing, it seems I have broken this one. |
From: Ian G <ia...@sy...> - 2009-05-01 22:32:18
|
Cryptix has not been maintained for many years. You could try BouncyCastle instead. iang On 1/5/09 04:18, Viet H. Phan wrote: > Hi All, > > Could you tell me what the latest Cryptix release is and whether the > development team still support it? I searched the Internet and found two > locations: > http://www.cryptix.org/ > http://www.ntua.gr/cryptix/products/index.html > They are too old, so they looks unreliable enough to use in production > environments. > Please let me know if there are any newer Cryptix releases. |