Displaying 2 results from an estimated 2 matches for "0xff0l".
Did you mean:
0xff00
2014 Mar 20
2
[Bug 2212] New: openssl version check should ignore status nibble
...Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at mindrot.org
Reporter: vapier at gentoo.org
the current version check in entropy.c looks like:
u_long version_mask = SSLeay() >= 0x1000000f ? ~0xffff0L : ~0xff0L;
if (((SSLeay() ^ OPENSSL_VERSION_NUMBER) & version_mask) ||
this causes it to pay attention to the last nibble in the version field
which makes no sense. the only thing that part does is track whether
the openssl in use is a dev, beta, or release. so if you install
1.0.2-beta1, then buil...
2012 Mar 15
11
[Bug 1991] New: openssl version checking needs updating
...tatus
- * We match major, minor, fix and status (not patch)
+ * We match major, minor, fix and status (not patch) for <1.0.0.
+ * After that, we acceptable compatible minor versions (so we
+ * allow 1.0.1 to work with 1.0.0).
*/
- if ((SSLeay() ^ OPENSSL_VERSION_NUMBER) & ~0xff0L)
+ u_long bldver = OPENSSL_VERSION_NUMBER & ~0xff0L;
+ u_long runver = SSLeay() & ~0xff0L;
+ if ((bldver >> 12) < 0x10000 && bldver != runver) ||
+ (bldver >> 12) >= 0x10000 && (runver >> 12) < (bldver >> 12)))
fatal("...