]> git.ipfire.org Git - thirdparty/openssl.git/log
thirdparty/openssl.git
38 hours agoset SSLfatal if tls1_set_shared_sigalgs has a malloc failure master
Neil Horman [Wed, 13 Aug 2025 18:27:34 +0000 (14:27 -0400)] 
set SSLfatal if tls1_set_shared_sigalgs has a malloc failure

Detected another memfail failure

https://github.com/openssl/openssl/actions/runs/16926186604/job/47962169870

Tracking it back, it occurs because tls1_set_server_sigalgs attempts to
preform an allocation, and in the event of failure, returns 0 without
setting SSLfatal, like the other failure paths in this function do when
returning 0, which translates to a return of WORK_ERROR higher up the
stack

The result is that on the next call to check_fatal in
read_state_machine, we fail the assert when deubg is enabled (as it is
in the coverage tests).

Fix it by calling SSLfatal when the call to OPENSSL_calloc fails in this
function.

Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28250)

2 days agodocs: fix typos
Saurabh Kushwah [Tue, 12 Aug 2025 17:48:56 +0000 (23:18 +0530)] 
docs: fix typos

CLA: trivial

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28239)

2 days agorsa: made the padding and salt length parameter decoding more straightforward
Pauli [Wed, 13 Aug 2025 02:26:22 +0000 (12:26 +1000)] 
rsa: made the padding and salt length parameter decoding more straightforward

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/28242)

2 days agohkdf: make the mode decoding more straightforward
Pauli [Wed, 13 Aug 2025 02:25:14 +0000 (12:25 +1000)] 
hkdf: make the mode decoding more straightforward

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/28242)

2 days agoasym cipher: make the pad type decoding more straightforward
Pauli [Tue, 12 Aug 2025 05:59:37 +0000 (15:59 +1000)] 
asym cipher: make the pad type decoding more straightforward

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/28242)

2 days agorsa sig: make indicator parameter conditional on FIPS
Pauli [Wed, 13 Aug 2025 03:00:12 +0000 (13:00 +1000)] 
rsa sig: make indicator parameter conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agoecdsa sig: make indicator parameter conditional on FIPS
Pauli [Wed, 13 Aug 2025 03:00:12 +0000 (13:00 +1000)] 
ecdsa sig: make indicator parameter conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agodsa sig: make indicator parameter conditional on FIPS
Pauli [Wed, 13 Aug 2025 03:00:12 +0000 (13:00 +1000)] 
dsa sig: make indicator parameter conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agohmac drbg: make indicator parameter conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:59:22 +0000 (12:59 +1000)] 
hmac drbg: make indicator parameter conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agohash drbg: make indicator parameter conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:59:22 +0000 (12:59 +1000)] 
hash drbg: make indicator parameter conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agoctr drbg: make indicator parameter conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:59:22 +0000 (12:59 +1000)] 
ctr drbg: make indicator parameter conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agocrng test: make indicator parameter conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:58:03 +0000 (12:58 +1000)] 
crng test: make indicator parameter conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agotest_rng: make indicator parameter conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:57:41 +0000 (12:57 +1000)] 
test_rng: make indicator parameter conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agokmac: make parameters conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:56:44 +0000 (12:56 +1000)] 
kmac: make parameters conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agohmac: make parameters conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:56:44 +0000 (12:56 +1000)] 
hmac: make parameters conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agocmac: make parameters conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:56:44 +0000 (12:56 +1000)] 
cmac: make parameters conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agorsa kem: make parameters conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:55:57 +0000 (12:55 +1000)] 
rsa kem: make parameters conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agoecx: make parameters conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:55:26 +0000 (12:55 +1000)] 
ecx: make parameters conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agoecdh: make parameters conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:55:26 +0000 (12:55 +1000)] 
ecdh: make parameters conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agodh: make parameters conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:55:26 +0000 (12:55 +1000)] 
dh: make parameters conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agorsa: make parameters conditional on FIPS
Pauli [Wed, 13 Aug 2025 02:54:12 +0000 (12:54 +1000)] 
rsa: make parameters conditional on FIPS

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agoparams: fix conditionals in param parser generation script
Pauli [Wed, 13 Aug 2025 03:56:42 +0000 (13:56 +1000)] 
params: fix conditionals in param parser generation script

These problems only occur in edge cases when using conditional parameters.
I.e. not a problem before now.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28243)

2 days agotest/ml_kem_internal_test.c: Add EVP_MD_free() in the error path to avoid memory...
Jiasheng Jiang [Mon, 11 Aug 2025 21:52:59 +0000 (21:52 +0000)] 
test/ml_kem_internal_test.c: Add EVP_MD_free() in the error path to avoid memory leak

Add EVP_MD_free() to free sha256 in the error path to avoid memory leak.

Fixes: d2136d9 ("Multi-variant ML-KEM")
Signed-off-by: Jiasheng Jiang <jiashengjiangcool@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/27946)

2 days agoAdd CRYPTO_FREE_REF to ossl_quic_free_token_store
Neil Horman [Wed, 13 Aug 2025 14:12:38 +0000 (10:12 -0400)] 
Add CRYPTO_FREE_REF to ossl_quic_free_token_store

ossl_quic_free_token_store doesn't call CRYPTO_FREE_REF on the
hdl->reference object, which could lead to memory leaks on platforms
that don't support atomics (where the call to CRYPTO_NEW_REF allocates a
mutex as part of its function.  It wasn't caught before because all the
platforms we do ci on support threads.

Fixes #28241

Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28247)

2 days agoAdd test coverage for PKCS7_TEXT mode
Bernd Edlinger [Sun, 10 Aug 2025 16:50:37 +0000 (18:50 +0200)] 
Add test coverage for PKCS7_TEXT mode

This was inspired by the following commit
9882d389df71 ("crypto/pkcs7/pk7_smime.c: Add BIO_free() to avoid memory leak")
which discovered a bug in PKCS7_verify(..., PKCS7_TEXT).
While there is some test coverage for PKCS_verify by
./test/pkcs7_test.c, there is no test coverage whatsoever
of the PKCS7_TEXT flag for PKCS7_sign, PKCS7_encrypt and
PKCS7_decrypt.
So this adds some test coverage for those functions as well.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28223)

3 days agoDH private key size was one bit too large
Bernd Edlinger [Sat, 21 Jun 2025 10:53:56 +0000 (12:53 +0200)] 
DH private key size was one bit too large

In the case when no q parameter was given,
the function generate_key in dh_key.c did create
one bit too much, so the priv_key value was exceeding
the DH group size q = (p-1)/2.
When the length is used in this case the limit is also
one bit too high, but for backward compatibility this
limit was left as is, instead we have to silently reduce
the value by one.

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27870)

3 days agoRISC-V: Add MD5 assembly implementation with rv64gc and Zbb
Julian Zhu [Tue, 8 Jul 2025 10:10:41 +0000 (18:10 +0800)] 
RISC-V: Add MD5 assembly implementation with rv64gc and Zbb

For the rv64gc assembly implementation, we can get about 20%-50% better performance than compiler-generated code (-O3).
For the Zbb assembly implementation, we can get about 10%-30% better performance than compiler-generated code (-O3 -march=rv64gc_zbb).

Signed-off-by: Julian Zhu <julian.oerv@isrc.iscas.ac.cn>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/27990)

3 days agoRISC-V: Add Zbb orn and its pseudo instruction opcode to rv64gc in riscv.pm
Julian Zhu [Tue, 8 Jul 2025 10:09:36 +0000 (18:09 +0800)] 
RISC-V: Add Zbb orn and its pseudo instruction opcode to rv64gc in riscv.pm

Signed-off-by: Julian Zhu <julian.oerv@isrc.iscas.ac.cn>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/27990)

3 days agoCorrect the synthetisized OPENSSL_VERSION_NUMBER
Richard Levitte [Mon, 11 Aug 2025 18:57:44 +0000 (20:57 +0200)] 
Correct the synthetisized OPENSSL_VERSION_NUMBER

The last hex digit always became 0x0L, even of OPENSSL_VERSION_PRE_RELEASE
was the empty string.

Resolves: https://github.com/openssl/openssl/issues/28227

Reviewed-by: Paul Yang <kaishen.yy@antfin.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28230)

3 days agogit: add x942kdf.c to gitignore
Dimitri John Ledkov [Mon, 11 Aug 2025 19:03:02 +0000 (20:03 +0100)] 
git: add x942kdf.c to gitignore

It is now a generated file. See:
- https://github.com/openssl/openssl/pull/27923

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28231)

4 days agoencode_key2ms: convert to use generated parameter parsing
Pauli [Wed, 30 Jul 2025 02:31:55 +0000 (12:31 +1000)] 
encode_key2ms: convert to use generated parameter parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28152)

4 days agoencode_key2any: convert to use generated parameter parsing
Pauli [Wed, 30 Jul 2025 02:31:55 +0000 (12:31 +1000)] 
encode_key2any: convert to use generated parameter parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28152)

4 days agodecode_spki2typespki: convert to use generated parameter parsing
Pauli [Wed, 30 Jul 2025 02:31:55 +0000 (12:31 +1000)] 
decode_spki2typespki: convert to use generated parameter parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28152)

4 days agodecode_pvk2key: convert to use generated parameter parsing
Pauli [Wed, 30 Jul 2025 02:31:55 +0000 (12:31 +1000)] 
decode_pvk2key: convert to use generated parameter parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28152)

4 days agodecode_pem2der: convert to use generated parameter parsing
Pauli [Wed, 30 Jul 2025 02:31:55 +0000 (12:31 +1000)] 
decode_pem2der: convert to use generated parameter parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28152)

4 days agodecode_epki2pki: convert to use generated parameter parsing
Pauli [Wed, 30 Jul 2025 02:31:55 +0000 (12:31 +1000)] 
decode_epki2pki: convert to use generated parameter parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28152)

4 days agodecode_der2key: convert to use generated parameter parsing
Pauli [Wed, 30 Jul 2025 02:31:55 +0000 (12:31 +1000)] 
decode_der2key: convert to use generated parameter parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28152)

4 days agoencode_decode: rename files for generated param parsing
Pauli [Wed, 30 Jul 2025 02:12:04 +0000 (12:12 +1000)] 
encode_decode: rename files for generated param parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28152)

4 days agorsa: update to use generated param decoders for signature operations
Pauli [Mon, 28 Jul 2025 01:02:45 +0000 (11:02 +1000)] 
rsa: update to use generated param decoders for signature operations

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28150)

4 days agosm2: update to use generated param decoders for signature operations
Pauli [Mon, 28 Jul 2025 00:11:34 +0000 (10:11 +1000)] 
sm2: update to use generated param decoders for signature operations

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28150)

4 days agoslh_dsa: update to use generated param decoders for signature operations
Pauli [Mon, 28 Jul 2025 00:11:34 +0000 (10:11 +1000)] 
slh_dsa: update to use generated param decoders for signature operations

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28150)

4 days agoecdsa: update to use generated param decoders for signature operations
Pauli [Mon, 28 Jul 2025 00:11:34 +0000 (10:11 +1000)] 
ecdsa: update to use generated param decoders for signature operations

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28150)

4 days agodsa: update to use generated param decoders for signature operations
Pauli [Mon, 28 Jul 2025 00:11:34 +0000 (10:11 +1000)] 
dsa: update to use generated param decoders for signature operations

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28150)

4 days agosignatures: rename files in anticipation of generated param decoding
Pauli [Sun, 27 Jul 2025 22:44:38 +0000 (08:44 +1000)] 
signatures: rename files in anticipation of generated param decoding

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28150)

4 days agorsa kem: convert to using generated param decoders
Pauli [Fri, 25 Jul 2025 03:15:26 +0000 (13:15 +1000)] 
rsa kem: convert to using generated param decoders

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28149)

4 days agoml_kem kem: convert to using generated param decoders
Pauli [Fri, 25 Jul 2025 03:15:26 +0000 (13:15 +1000)] 
ml_kem kem: convert to using generated param decoders

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28149)

4 days agoecx kem: convert to using generated param decoders
Pauli [Fri, 25 Jul 2025 03:15:26 +0000 (13:15 +1000)] 
ecx kem: convert to using generated param decoders

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28149)

4 days agoec kem: convert to using generated param decoders
Pauli [Fri, 25 Jul 2025 03:15:26 +0000 (13:15 +1000)] 
ec kem: convert to using generated param decoders

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28149)

4 days agokem: rename files for autogeneration of param parsing
Pauli [Fri, 25 Jul 2025 03:03:40 +0000 (13:03 +1000)] 
kem: rename files for autogeneration of param parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28149)

4 days agoecx: convert key exchange to using generated param decoder
Pauli [Thu, 24 Jul 2025 02:01:03 +0000 (12:01 +1000)] 
ecx: convert key exchange to using generated param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28148)

4 days agoecdh: convert key exchange to using generated param decoder
Pauli [Thu, 24 Jul 2025 02:00:55 +0000 (12:00 +1000)] 
ecdh: convert key exchange to using generated param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28148)

4 days agodh: convert key exchange to using generated param decoder
Pauli [Thu, 24 Jul 2025 02:00:48 +0000 (12:00 +1000)] 
dh: convert key exchange to using generated param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28148)

4 days agoexchange: rename files for generated param decoders
Pauli [Thu, 24 Jul 2025 01:28:12 +0000 (11:28 +1000)] 
exchange: rename files for generated param decoders

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28148)

4 days agofile_store_any: convert to using generated param decoder
Pauli [Thu, 24 Jul 2025 01:24:00 +0000 (11:24 +1000)] 
file_store_any: convert to using generated param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28147)

4 days agowin store: convert to using generated param decoder
Pauli [Thu, 24 Jul 2025 01:23:47 +0000 (11:23 +1000)] 
win store: convert to using generated param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28147)

4 days agofile_store: convert to using generated param decoder
Pauli [Thu, 24 Jul 2025 01:23:33 +0000 (11:23 +1000)] 
file_store: convert to using generated param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28147)

4 days agostoremgmt: rename files for generate param decoders
Pauli [Thu, 24 Jul 2025 01:14:29 +0000 (11:14 +1000)] 
storemgmt: rename files for generate param decoders

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28147)

4 days agorsa: update sm asymmetric cipher to use generated param parser
Pauli [Tue, 22 Jul 2025 02:09:23 +0000 (12:09 +1000)] 
rsa: update sm asymmetric cipher to use generated param parser

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28145)

4 days agosm2: update sm asymmetric cipher to use generated param parser
Pauli [Tue, 22 Jul 2025 02:09:12 +0000 (12:09 +1000)] 
sm2: update sm asymmetric cipher to use generated param parser

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28145)

4 days agoasym: rename RSA and SM2 asymmetric cipher files
Pauli [Tue, 22 Jul 2025 01:33:45 +0000 (11:33 +1000)] 
asym: rename RSA and SM2 asymmetric cipher files

To allow generated param parsing

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28145)

4 days agodrbg: convert DRBGs to use generated ctx get param decoders
Pauli [Mon, 21 Jul 2025 02:13:47 +0000 (12:13 +1000)] 
drbg: convert DRBGs to use generated ctx get param decoders

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28143)

4 days agodrbg: convert DRBGs to use generated ctx set param decoders
Pauli [Mon, 21 Jul 2025 01:40:35 +0000 (11:40 +1000)] 
drbg: convert DRBGs to use generated ctx set param decoders

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28143)

4 days agocrngt: update to use generated param handling
Pauli [Mon, 21 Jul 2025 00:09:13 +0000 (10:09 +1000)] 
crngt: update to use generated param handling

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28143)

4 days agodrbg: move drbg_local.h to somewhere it can be found by generated files
Pauli [Mon, 21 Jul 2025 00:07:42 +0000 (10:07 +1000)] 
drbg: move drbg_local.h to somewhere it can be found by generated files

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28143)

4 days agoseed: update to use generated param handling
Pauli [Sun, 20 Jul 2025 23:48:16 +0000 (09:48 +1000)] 
seed: update to use generated param handling

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28143)

4 days agojitter: update to use generated param handling
Pauli [Sun, 20 Jul 2025 23:44:14 +0000 (09:44 +1000)] 
jitter: update to use generated param handling

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28143)

4 days agotest rand: update to use generated param handling
Pauli [Sun, 20 Jul 2025 23:36:56 +0000 (09:36 +1000)] 
test rand: update to use generated param handling

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28143)

4 days agorands: rename files for autogeneration of param parser
Pauli [Sun, 20 Jul 2025 23:24:50 +0000 (09:24 +1000)] 
rands: rename files for autogeneration of param parser

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28143)

4 days agoblake2: use generated param decoder
Pauli [Wed, 16 Jul 2025 00:50:03 +0000 (10:50 +1000)] 
blake2: use generated param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agoblake2: add generated param decoder
Pauli [Wed, 16 Jul 2025 00:49:49 +0000 (10:49 +1000)] 
blake2: add generated param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agopoly1305: convert poly1305 to use param decoder
Pauli [Mon, 14 Jul 2025 01:22:56 +0000 (11:22 +1000)] 
poly1305: convert poly1305 to use param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agosiphash: convert siphash to use param decoder
Pauli [Mon, 14 Jul 2025 01:15:43 +0000 (11:15 +1000)] 
siphash: convert siphash to use param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agogmac: convert GMAC to use param decoder
Pauli [Mon, 14 Jul 2025 01:07:21 +0000 (11:07 +1000)] 
gmac: convert GMAC to use param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agocmac: convert CMAC to use param decoder
Pauli [Mon, 14 Jul 2025 00:57:54 +0000 (10:57 +1000)] 
cmac: convert CMAC to use param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agokmac: convert KMAC to use param decoder
Pauli [Mon, 14 Jul 2025 00:48:04 +0000 (10:48 +1000)] 
kmac: convert KMAC to use param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agohmac: convert HMAC to use param decoder
Pauli [Sun, 13 Jul 2025 23:56:00 +0000 (09:56 +1000)] 
hmac: convert HMAC to use param decoder

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agohmac: remove two unsupported params
Pauli [Sun, 13 Jul 2025 23:26:23 +0000 (09:26 +1000)] 
hmac: remove two unsupported params

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agoRename MAC files for autogeneration of param parsers
Pauli [Sun, 13 Jul 2025 23:11:57 +0000 (09:11 +1000)] 
Rename MAC files for autogeneration of param parsers

Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28142)

4 days agokdf: put back argument null checks
Pauli [Fri, 8 Aug 2025 04:01:12 +0000 (14:01 +1000)] 
kdf: put back argument null checks

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28204)

4 days agoRemove OSSL_CRYPTO_ALLOC attribute from CRYPTO_*dup routines
Eugene Syromiatnikov [Mon, 11 Aug 2025 08:56:13 +0000 (10:56 +0200)] 
Remove OSSL_CRYPTO_ALLOC attribute from CRYPTO_*dup routines

The __attribute__((malloc)) is for functions that return new memory,
and "the memory [returned by the function] has undefined content", which
is a property that doesn't hold for the *dup functions (the same reason
it doesn't apply to realloc).

Fixes: e1035957eba1 "OSSL_CRYPTO_ALLOC attribute introduction proposal."
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28220)

4 days agoAdd NULL check
Andrew Dinh [Mon, 11 Aug 2025 10:07:15 +0000 (17:07 +0700)] 
Add NULL check

Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28221)

4 days agoFix missing unlock in decoder_pkey.c
Neil Horman [Sun, 10 Aug 2025 21:55:15 +0000 (17:55 -0400)] 
Fix missing unlock in decoder_pkey.c

We hit an assertion failure during a call to CRYPTO_THREAD_read_lock
during memfail testing.

This was caused by us attempting to take a read lock in the same thread
that already held the same lock for writing resulting in an EBUSY
return.

This occured because we triggered a memory failure path in
DECODER_new_for_pkey, which never unlocked a write lock we were holding.

Fix it by ensuring the lock is released in the error path.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28216)

4 days agoAssert SSLFatal on keylog failure
Neil Horman [Sun, 10 Aug 2025 21:53:28 +0000 (17:53 -0400)] 
Assert SSLFatal on keylog failure

We hit an check_failure assert during memfail testing in
ssl_read_state_machine, based on a return of WORK_ERROR without an
SSLFatal call being made.  This occurs because, if we fail in
ssl_log_secret (which we do due to memfail testing, we don't actually
assert an SSL fatal error.

Fix it by adding the SSLFatal call

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28216)

4 days agoRemove assert in core_namemap.c
Neil Horman [Sun, 10 Aug 2025 12:25:04 +0000 (08:25 -0400)] 
Remove assert in core_namemap.c

The namemap_add_name function has an assertion to check for the failure
os ossl_ht_insert.

Its there because we assume the operation can't fail since we're under
write lock

But it can fail if we get a malloc failure, as thats what we're testing
for here.

Remove the assert and handle the failure properly.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28216)

4 days agoFix SKEYMGMT enumeration, add tests
Dmitry Belyavskiy [Fri, 8 Aug 2025 09:52:11 +0000 (11:52 +0200)] 
Fix SKEYMGMT enumeration, add tests

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28207)

5 days agoIncrement sleep time in quic_tserver_test less
Andrew Dinh [Wed, 6 Aug 2025 17:26:12 +0000 (00:26 +0700)] 
Increment sleep time in quic_tserver_test less

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28187)

5 days agodoc/man3/SSL_CTX_set_domain_flags: fix version in HISTORY section
Nikolas Gauder [Wed, 30 Jul 2025 17:50:50 +0000 (19:50 +0200)] 
doc/man3/SSL_CTX_set_domain_flags: fix version in HISTORY section

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28128)

5 days agotest/sanitytest.c: fix setitimer usage in timer disarmament
Eugene Syromiatnikov [Sun, 10 Aug 2025 00:00:25 +0000 (02:00 +0200)] 
test/sanitytest.c: fix setitimer usage in timer disarmament

It is incorrect to call setitimer(which, NULL, NULL) to disarm a timer,
Linux just gives a pass on that;  properly provide a zeroed-out
structure instead.

Fixes: 760929f6ba18 "crypto/sleep.c: avoid returning early due to signal"
Reported-by: Neil Horman <nhorman@openssl.org>
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28215)

5 days agoFix memory leak on EVP_CIPHER_param_to_asn1 failure
77tiann [Thu, 31 Jul 2025 00:47:06 +0000 (17:47 -0700)] 
Fix memory leak on EVP_CIPHER_param_to_asn1 failure

When EVP_CIPHER_param_to_asn1() fails, xalg->parameter was not freed,
leading to a memory leak. This patch adds proper cleanup for that case.
CLA: trivial

Signed-off-by: 77tiann <27392025k@gmail.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28131)

5 days agofix: Apply cascade-disables before showing status
BMDan [Sat, 4 Nov 2023 20:00:45 +0000 (13:00 -0700)] 
fix: Apply cascade-disables before showing status

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/22621)

5 days agofix: restore missing --help in Configure
BMDan [Fri, 3 Nov 2023 22:25:50 +0000 (15:25 -0700)] 
fix: restore missing --help in Configure

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/22621)

5 days agoossl_prov_drbg_generate(): Move syscalls out of the write locked section
Tomas Mraz [Thu, 31 Jul 2025 19:24:55 +0000 (21:24 +0200)] 
ossl_prov_drbg_generate(): Move syscalls out of the write locked section

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28141)

5 days agoFix RSA key size validation in EVP_PKEY_RSA_keygen demo
Quin-Darcy [Thu, 31 Jul 2025 14:07:46 +0000 (09:07 -0500)] 
Fix RSA key size validation in EVP_PKEY_RSA_keygen demo

The validation was checking the default 'bits' value (4096) instead of
the parsed 'bits_i' from the command line arguments, allowing invalid
key sizes to bypass the 512-bit minimum.

CLA: trivial

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/28139)

5 days agocms_kemri.c: Fix Coverity issues
Tomas Mraz [Thu, 31 Jul 2025 08:40:40 +0000 (10:40 +0200)] 
cms_kemri.c: Fix Coverity issues

Add return value check of ASN1_OCTET_STRING_set().
Do not call OPENSSL_cleanse() if keklen is greater than the cleaned buffer.

Fixes Coverity 16608241660825

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28132)

5 days agocrypto/{cmp,crmf}/: clean up unneeded #include directives
Dr. David von Oheimb [Wed, 26 Feb 2025 17:56:21 +0000 (18:56 +0100)] 
crypto/{cmp,crmf}/: clean up unneeded #include directives

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
(Merged from https://github.com/openssl/openssl/pull/28035)

5 days agox509: Accept 'contentCommitment' as alias
Clemens Lang [Sun, 3 Aug 2025 18:47:36 +0000 (20:47 +0200)] 
x509: Accept 'contentCommitment' as alias

ITU-T X.509 (10/2019) section 9.2.2.3 [1] defines 'contentCommitment' as
the current name for what had previously been called 'nonRepudiation',
and deprecates the old name:

> It is not incorrect to refer to this keyUsage bit using the identifier
> nonRepudiation. However, the use of this identifier has been
> deprecated.

Allow 'contentCommitment' as an alias wherever 'nonRepudiation' has been
accepted before, so that passing

    -addext keyUsage=critical,contentCommitment

works as expected.

Add a test that checks that contentCommitment sets the same keyUsage bit
as nonRepudiation. Adjust the docs to mention the available alias name.

[1]: https://www.itu.int/rec/T-REC-X.509-201910-I/en

Signed-off-by: Clemens Lang <cllang@redhat.com>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28161)

6 days agoquic_channel.c: NULL check SSL_CONNECTION
Norbert Pocs [Fri, 8 Aug 2025 13:17:06 +0000 (15:17 +0200)] 
quic_channel.c: NULL check SSL_CONNECTION

Addresses coverity issue #1662037

Fixes: https://github.com/openssl/project/issues/1316
Signed-off-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28208)

7 days agocrypto/sleep.c: avoid returning early due to signal
Eugene Syromiatnikov [Thu, 7 Aug 2025 14:01:23 +0000 (16:01 +0200)] 
crypto/sleep.c: avoid returning early due to signal

On POSIX systems, sleep/usleep/nanosleep may return early due to arrival
of a signal, and OSSL_sleep does not report that, so it is assumed that
it cannot return early.  Fix that by introducing a loop that checks
the remaining time and sleep some more if the time has not passed;
that also solves the issue of limited sleeping time on some systems.

Signed-off-by: Eugene Syromiatnikov <esyr@redhat.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28193)

7 days agos/veirfy/verify
Alexandr Nedvedicky [Mon, 4 Aug 2025 09:11:15 +0000 (11:11 +0200)] 
s/veirfy/verify

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28136)

7 days ago- veirfy downloaded package
Alexandr Nedvedicky [Mon, 4 Aug 2025 08:24:40 +0000 (10:24 +0200)] 
- veirfy downloaded package

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28136)