Searched refs:patch (Results 1 – 17 of 17) sorted by relevance
/openssl/test/testutil/ |
H A D | provider.c | 69 int major, minor, patch; member 106 return major == prov.major && minor == prov.minor && patch == prov.patch; in fips_provider_version_eq() 116 return major != prov.major || minor != prov.minor || patch != prov.patch; in fips_provider_version_ne() 129 || (prov.minor == minor && prov.patch <= patch))); in fips_provider_version_le() 142 || (prov.minor == minor && prov.patch < patch))); in fips_provider_version_lt() 155 || (prov.minor == minor && prov.patch > patch))); in fips_provider_version_gt() 168 || (prov.minor == minor && prov.patch >= patch))); in fips_provider_version_ge() 174 int major, minor, patch, r; in fips_provider_version_match() local 210 if (sscanf(p, "%d.%d.%d", &major, &minor, &patch) != 3) { in fips_provider_version_match() 216 r = fips_provider_version_eq(libctx, major, minor, patch); in fips_provider_version_match() [all …]
|
/openssl/dev/ |
H A D | NEWS-FORMAT.md | 37 Each release line has a section, which is broken down into the initial and patch 46 <entry for patch releases of OpenSSL x.y...> 47 <entry for patch releases of OpenSSL x.y...> 74 For a patch release with no CVEs fixed, the following opener paragraph is 78 OpenSSL x.y.z is a patch release. 81 For a patch release which fixes one or more CVEs, the following opener paragraph 85 OpenSSL x.y.z is a security patch release. The most severe CVE fixed in this
|
/openssl/doc/man7/ |
H A D | openssl_user_macros.pod.in | 60 I<major> * 10000 + I<minor> * 100 + I<patch> 62 where I<major>, I<minor> and I<patch> are the desired major, 63 minor and patch components of the version number. For example:
|
H A D | ossl-guide-migration.pod | 175 For OpenSSL 1.1.1 and below, different patch levels were indicated by a letter 177 instead the patch level is indicated by the final number in the version. A
|
/openssl/test/ |
H A D | testutil.h | 257 int fips_provider_version_eq(OSSL_LIB_CTX *libctx, int major, int minor, int patch); 258 int fips_provider_version_ne(OSSL_LIB_CTX *libctx, int major, int minor, int patch); 259 int fips_provider_version_le(OSSL_LIB_CTX *libctx, int major, int minor, int patch); 260 int fips_provider_version_lt(OSSL_LIB_CTX *libctx, int major, int minor, int patch); 261 int fips_provider_version_gt(OSSL_LIB_CTX *libctx, int major, int minor, int patch); 262 int fips_provider_version_ge(OSSL_LIB_CTX *libctx, int major, int minor, int patch);
|
/openssl/util/perl/OpenSSL/ |
H A D | config.pm | 372 my ($major, $minor, $patch) = 376 $CCVER = ( $major * 100 + $minor ) * 100 + $patch;
|
/openssl/doc/man3/ |
H A D | ERR_GET_LIB.pod | 48 codes. Error codes are subject to change at any time (even in patch releases of
|
H A D | OpenSSL_version.pod | 83 patch version into a single integer 0xMNN00PP0L, where:
|
/openssl/include/openssl/ |
H A D | opensslv.h.in | 31 # define OPENSSL_VERSION_PATCH {- $config{patch} -}
|
/openssl/doc/internal/man7/ |
H A D | VERSION.pod | 63 =item $config{major}, $config{minor}, $config{patch}, $config{shlib_version}
|
/openssl/ |
H A D | CONTRIBUTING.md | 15 To submit a patch or implement a new feature, please open a
|
H A D | README-FIPS.md | 189 Some Vendors choose to patch/modify/build their own FIPS provider,
|
H A D | NEWS.md | 121 OpenSSL 3.3.3 is a security patch release. The most severe CVE fixed in this 132 OpenSSL 3.3.2 is a security patch release. The most severe CVE fixed in this 145 OpenSSL 3.3.1 is a security patch release. The most severe CVE fixed in this 278 OpenSSL 3.2.2 is a security patch release. The most severe CVE fixed in this 288 OpenSSL 3.2.1 is a security patch release. The most severe CVE fixed in this
|
H A D | Configure | 352 $config{patch} = $version{PATCH} // 'unknown';
|
H A D | INSTALL.md | 386 If you are developing a patch for OpenSSL then it is recommended that you use 1750 This is a developer option. If you are developing a patch for
|
H A D | CHANGES.md | 4317 Based on a patch from Tomasz Moń 5787 original RSA_PSK patch. 5871 initial patch which was a great help during development. 9003 Emilia Käsper for the initial patch. 9426 * A long standing patch to add support for SRP from EdelWeb (Peter 9954 Emilia Käsper for the initial patch. 9978 [NB: OpenSSL 1.0.0i and later 1.0.0 patch levels were released after 11275 *Steve Henson, based on patch from Jeremy Utley* 12112 [NB: OpenSSL 0.9.7i and later 0.9.7 patch levels were released after 15896 * Changes in security patch: [all …]
|
/openssl/doc/designs/ |
H A D | fips_indicator.md | 309 …com/redhat/centos-stream/rpms/openssl/-/blob/c9s/0078-KDF-Add-FIPS-indicators.patch?ref_type=heads>
|
Completed in 104 milliseconds