Searched refs:newer (Results 1 – 20 of 20) sorted by relevance
/openssl/crypto/x509/ |
H A D | x509_vfy.c | 2136 X509_CRL *X509_CRL_diff(X509_CRL *base, X509_CRL *newer, in X509_CRL_diff() argument 2144 if (base->base_crl_number != NULL || newer->base_crl_number != NULL) { in X509_CRL_diff() 2149 if (base->crl_number == NULL || newer->crl_number == NULL) { in X509_CRL_diff() 2155 X509_CRL_get_issuer(newer)) != 0) { in X509_CRL_diff() 2160 if (!crl_extension_match(base, newer, NID_authority_key_identifier)) { in X509_CRL_diff() 2169 if (ASN1_INTEGER_cmp(newer->crl_number, base->crl_number) <= 0) { in X509_CRL_diff() 2175 X509_CRL_verify(newer, skey) <= 0)) { in X509_CRL_diff() 2186 if (!X509_CRL_set_issuer_name(crl, X509_CRL_get_issuer(newer))) { in X509_CRL_diff() 2210 for (i = 0; i < X509_CRL_get_ext_count(newer); i++) { in X509_CRL_diff() 2211 X509_EXTENSION *ext = X509_CRL_get_ext(newer, i); in X509_CRL_diff() [all …]
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-HMAC.pod | 13 creating MACs. Instead you should use the newer L<EVP_MAC_init(3)> functions.
|
H A D | passphrase-encoding.pod | 71 outcome in OpenSSL 1.1.0 and newer than in OpenSSL older than 1.1.0. 74 0x00 0xEF # OpenSSL 1.1.0 and newer
|
H A D | ossl-guide-introduction.pod | 53 newer version of OpenSSL than the one supplied by your Operating System). In
|
/openssl/doc/man3/ |
H A D | SSL_CTX_config.pod | 23 in newer versions of OpenSSL automatically.
|
H A D | X509_LOOKUP_hash_dir.pod | 83 they are loaded. As of OpenSSL 1.0.0, it also checks for newer CRLs 84 upon each lookup, so that newer CRLs are as soon as they appear in
|
H A D | EVP_PKEY_CTX_set_scrypt_N.pod | 57 There is a newer generic API for KDFs, L<EVP_KDF(3)>, which is
|
H A D | X509_cmp_time.pod | 37 offsets up to the capacity of long, so the newer X509_time_adj_ex()
|
H A D | EVP_VerifyInit.pod | 90 The previous two bugs are fixed in the newer EVP_DigestVerify*() function.
|
H A D | EVP_SignInit.pod | 94 The previous two bugs are fixed in the newer EVP_DigestSign*() functions.
|
H A D | SSL_CTX_new.pod | 192 allow newer protocols like TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3.
|
/openssl/.github/workflows/ |
H A D | compiler-zoo.yml | 84 # We set per-compiler now to allow testing with both older and newer sets
|
/openssl/doc/man1/ |
H A D | openssl-rehash.pod.in | 114 This allows releases before 1.0.0 to use these links along-side newer
|
H A D | openssl-dsa.pod.in | 48 traditional SSLeay compatible format for private key encryption: newer
|
/openssl/doc/designs/ |
H A D | xof.md | 43 an error if a newer core is used that supports multiple squeeze operations.
|
/openssl/ |
H A D | README-ENGINES.md | 136 have known problems and you wish to use a newer version with an existing
|
H A D | CHANGES.md | 623 used only on newer PowerPC processors supporting the PowerISA 2.07 1126 restoring their previous content. The vulnerable code is used only on newer 7514 near-optimal performance even on newer platforms. 8987 10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer. 9945 10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer. 11665 - fixed RunningProcess usage so that it works with newer LIBC NDKs too 13241 * Fixes for newer kerberos headers. NB: the casts are needed because 13958 make the newer ENGINE framework commands for the CHIL engine work. 17852 argument to 'req'. This is not because the function is newer or 20495 by only inserting errors if the .err file is newer than the auto generated
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1847 X509_R_NEWER_CRL_NOT_NEWER:132:newer crl not newer
|
/openssl/include/openssl/ |
H A D | x509.h.in | 776 X509_CRL *X509_CRL_diff(X509_CRL *base, X509_CRL *newer,
|
/openssl/Configurations/ |
H A D | unix-Makefile.tmpl | 643 # We check if any depfile is newer than Makefile and decide to
|
Completed in 80 milliseconds