/openssl/test/testutil/ |
H A D | provider.c | 171 int fips_provider_version_match(OSSL_LIB_CTX *libctx, const char *versions) in fips_provider_version_match() argument 179 while (*versions != '\0') { in fips_provider_version_match() 180 for (; isspace((unsigned char)(*versions)); versions++) in fips_provider_version_match() 182 if (*versions == '\0') in fips_provider_version_match() 184 for (p = versions; *versions != '\0' && !isspace((unsigned char)(*versions)); versions++) in fips_provider_version_match()
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_min_proto_version.pod | 27 The functions get or set the minimum and maximum supported protocol versions 31 specific protocol versions. 32 Use these functions instead of disabling specific protocol versions. 35 versions down to the lowest version, or up to the highest version 41 Currently supported versions are B<SSL3_VERSION>, B<TLS1_VERSION>,
|
H A D | X509_check_purpose.pod | 61 =item E<32>2 Only possible in old versions of openSSL when basicConstraints are absent. 62 New versions will not return this value. May be a CA
|
H A D | SSL_check_chain.pod | 76 TLS 1.3 and DTLS 1.2 the results for earlier versions of TLS and DTLS may not 78 for earlier versions of TLS or DTLS.
|
H A D | ERR_load_crypto_strings.pod | 29 In versions prior to OpenSSL 1.1.0,
|
H A D | OPENSSL_FILE.pod | 27 currently being compiled, as far as language and compiler versions allow.
|
H A D | CONF_modules_free.pod | 24 configuration modules. Normally, in versions of OpenSSL prior to 1.1.0,
|
H A D | OpenSSL_add_all_algorithms.pod | 35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
|
H A D | SSL_CTX_new.pod | 201 disable either all previous or all subsequent protocol versions. 203 previous protocol versions, the effect is to also disable all subsequent 204 protocol versions.
|
H A D | EC_POINT_add.pod | 49 Modern versions automatically perform this conversion when needed. 58 Modern versions should instead use EC_POINT_mul(), combined (if needed) with EC_POINT_add() in such…
|
/openssl/.github/workflows/ |
H A D | provider-compatibility.yml | 9 # released versions continue to run against the current branch. 11 name: Provider compatibility across versions 34 # Formally released versions should be added here. 89 - name: show module versions from release 167 - name: show module versions from branch 244 - name: show module versions from cross validation
|
H A D | prov-compat-label.yml | 9 # released versions continue to run against the current branch. 27 # Formally released versions should be added here. 82 - name: show module versions from release 165 - name: show module versions from branch 250 - name: show module versions from cross validation
|
/openssl/doc/designs/quic-design/ |
H A D | demuxer.md | 37 - discard smaller packets with unsupported versions 38 - packet handling on server for well-formed packets with supported versions
|
/openssl/external/perl/Text-Template-1.56/ |
H A D | README | 56 with the previous beta versions. 61 the test suite that the old beta versions passed.
|
H A D | Changes | 80 NOTE: Changes for versions prior to 1.47 have been imported from README 110 other versions. 229 incompatible with the beta versions and was also inconvenient. (`\n' in 232 versions, but it is only a little bit incompatible, and it is probably 282 100% backward-compatible with the previous versions. With one cosmetic 283 change, it passes the test suite that the previous versions passed. If you
|
/openssl/util/perl/OpenSSL/ |
H A D | Test.pm | 851 my @versions = (); 853 unless (@versions) { 859 @versions = ( $lines{'Build version'}, $lines{'Library version'} ); 861 return @versions;
|
H A D | Ordinals.pm | 319 my %versions = (); 323 $versions{$_->version()} = 1; 335 if (scalar keys %versions > 1);
|
/openssl/ |
H A D | NOTES-ANDROID.md | 12 role, the goal is to support a range of most recent versions. 45 Older versions of the NDK have GCC under their common prebuilt tools 54 Caveat lector! Earlier OpenSSL versions relied on additional `CROSS_SYSROOT`
|
H A D | README-FIPS.md | 14 using OpenSSL versions that have valid FIPS certificates. A FIPS certificate 36 which versions are FIPS validated. The instructions given below build OpenSSL 98 which versions are FIPS validated. For this example we use OpenSSL 3.0.0. 181 versions 3.5 and later.
|
H A D | README.md | 43 an implementation of all TLS protocol versions up to TLSv1.3 ([RFC 8446]), 44 DTLS protocol versions up to DTLSv1.2 ([RFC 6347]) and 73 However, for a large variety of operating systems precompiled versions 128 Specific notes on upgrading to OpenSSL 3.x from previous versions can be found
|
/openssl/doc/man7/ |
H A D | openssl_user_macros.pod.in | 33 This is the form supported for all versions up to 1.1.x, where C<M> 87 versions up to and including the version given by B<OPENSSL_API_COMPAT>
|
H A D | EVP_SIGNATURE-HMAC.pod | 14 This mechanism is provided for backwards compatibility with older versions of
|
/openssl/doc/ |
H A D | README.md | 29 Formatted versions of the manpages (apps,ssl,crypto) can be found at
|
/openssl/dev/release-aux/ |
H A D | openssl-announce-release.tmpl | 14 Specific notes on upgrading to OpenSSL $series from previous versions are
|
H A D | openssl-announce-pre-release.tmpl | 15 Specific notes on upgrading to OpenSSL $series from previous versions are
|