Home
last modified time | relevance | path

Searched refs:versions (Results 1 – 25 of 151) sorted by relevance

1234567

/openssl/test/testutil/
H A Dprovider.c171 int fips_provider_version_match(OSSL_LIB_CTX *libctx, const char *versions) in fips_provider_version_match() argument
179 while (*versions != '\0') { in fips_provider_version_match()
180 for (; isspace((unsigned char)(*versions)); versions++) in fips_provider_version_match()
182 if (*versions == '\0') in fips_provider_version_match()
184 for (p = versions; *versions != '\0' && !isspace((unsigned char)(*versions)); versions++) in fips_provider_version_match()
/openssl/doc/man3/
H A DSSL_CTX_set_min_proto_version.pod27 The functions get or set the minimum and maximum supported protocol versions
31 specific protocol versions.
32 Use these functions instead of disabling specific protocol versions.
35 versions down to the lowest version, or up to the highest version
41 Currently supported versions are B<SSL3_VERSION>, B<TLS1_VERSION>,
H A DX509_check_purpose.pod61 =item E<32>2 Only possible in old versions of openSSL when basicConstraints are absent.
62 New versions will not return this value. May be a CA
H A DSSL_check_chain.pod76 TLS 1.3 and DTLS 1.2 the results for earlier versions of TLS and DTLS may not
78 for earlier versions of TLS or DTLS.
H A DERR_load_crypto_strings.pod29 In versions prior to OpenSSL 1.1.0,
H A DOPENSSL_FILE.pod27 currently being compiled, as far as language and compiler versions allow.
H A DCONF_modules_free.pod24 configuration modules. Normally, in versions of OpenSSL prior to 1.1.0,
H A DOpenSSL_add_all_algorithms.pod35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
H A DSSL_CTX_new.pod201 disable either all previous or all subsequent protocol versions.
203 previous protocol versions, the effect is to also disable all subsequent
204 protocol versions.
H A DEC_POINT_add.pod49 Modern versions automatically perform this conversion when needed.
58 Modern versions should instead use EC_POINT_mul(), combined (if needed) with EC_POINT_add() in such…
/openssl/.github/workflows/
H A Dprovider-compatibility.yml9 # released versions continue to run against the current branch.
11 name: Provider compatibility across versions
34 # Formally released versions should be added here.
89 - name: show module versions from release
167 - name: show module versions from branch
244 - name: show module versions from cross validation
H A Dprov-compat-label.yml9 # released versions continue to run against the current branch.
27 # Formally released versions should be added here.
82 - name: show module versions from release
165 - name: show module versions from branch
250 - name: show module versions from cross validation
/openssl/doc/designs/quic-design/
H A Ddemuxer.md37 - discard smaller packets with unsupported versions
38 - packet handling on server for well-formed packets with supported versions
/openssl/external/perl/Text-Template-1.56/
H A DREADME56 with the previous beta versions.
61 the test suite that the old beta versions passed.
H A DChanges80 NOTE: Changes for versions prior to 1.47 have been imported from README
110 other versions.
229 incompatible with the beta versions and was also inconvenient. (`\n' in
232 versions, but it is only a little bit incompatible, and it is probably
282 100% backward-compatible with the previous versions. With one cosmetic
283 change, it passes the test suite that the previous versions passed. If you
/openssl/util/perl/OpenSSL/
H A DTest.pm851 my @versions = ();
853 unless (@versions) {
859 @versions = ( $lines{'Build version'}, $lines{'Library version'} );
861 return @versions;
H A DOrdinals.pm319 my %versions = ();
323 $versions{$_->version()} = 1;
335 if (scalar keys %versions > 1);
/openssl/
H A DNOTES-ANDROID.md12 role, the goal is to support a range of most recent versions.
45 Older versions of the NDK have GCC under their common prebuilt tools
54 Caveat lector! Earlier OpenSSL versions relied on additional `CROSS_SYSROOT`
H A DREADME-FIPS.md14 using OpenSSL versions that have valid FIPS certificates. A FIPS certificate
36 which versions are FIPS validated. The instructions given below build OpenSSL
98 which versions are FIPS validated. For this example we use OpenSSL 3.0.0.
181 versions 3.5 and later.
H A DREADME.md43 an implementation of all TLS protocol versions up to TLSv1.3 ([RFC 8446]),
44 DTLS protocol versions up to DTLSv1.2 ([RFC 6347]) and
73 However, for a large variety of operating systems precompiled versions
128 Specific notes on upgrading to OpenSSL 3.x from previous versions can be found
/openssl/doc/man7/
H A Dopenssl_user_macros.pod.in33 This is the form supported for all versions up to 1.1.x, where C<M>
87 versions up to and including the version given by B<OPENSSL_API_COMPAT>
H A DEVP_SIGNATURE-HMAC.pod14 This mechanism is provided for backwards compatibility with older versions of
/openssl/doc/
H A DREADME.md29 Formatted versions of the manpages (apps,ssl,crypto) can be found at
/openssl/dev/release-aux/
H A Dopenssl-announce-release.tmpl14 Specific notes on upgrading to OpenSSL $series from previous versions are
H A Dopenssl-announce-pre-release.tmpl15 Specific notes on upgrading to OpenSSL $series from previous versions are

Completed in 31 milliseconds

1234567