]> git.ipfire.org Git - thirdparty/openssl.git/log
thirdparty/openssl.git
2 months agoAdd a changes entry
Bob Beck [Thu, 19 Feb 2026 01:17:39 +0000 (18:17 -0700)] 
Add a changes entry

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:47 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoFix misplaced check spotted by vitkor
Bob Beck [Wed, 18 Feb 2026 16:55:17 +0000 (09:55 -0700)] 
Fix misplaced check spotted by vitkor

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:45 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoFix up bug found by nhorman on review. Thanks!
Bob Beck [Wed, 18 Feb 2026 16:48:04 +0000 (09:48 -0700)] 
Fix up bug found by nhorman on review. Thanks!

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:42 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/SSL_set1_host.pod
Bob Beck [Thu, 5 Feb 2026 15:38:22 +0000 (08:38 -0700)] 
Update doc/man3/SSL_set1_host.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:40 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/SSL_set1_host.pod
Bob Beck [Thu, 5 Feb 2026 15:38:03 +0000 (08:38 -0700)] 
Update doc/man3/SSL_set1_host.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:37 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate crypto/x509/x509_vpm.c
Bob Beck [Thu, 5 Feb 2026 15:37:42 +0000 (08:37 -0700)] 
Update crypto/x509/x509_vpm.c

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:35 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/SSL_set1_host.pod
Bob Beck [Thu, 5 Feb 2026 15:37:18 +0000 (08:37 -0700)] 
Update doc/man3/SSL_set1_host.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:32 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate crypto/x509/x509_vpm.c
Bob Beck [Thu, 5 Feb 2026 15:37:00 +0000 (08:37 -0700)] 
Update crypto/x509/x509_vpm.c

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:30 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/SSL_set1_host.pod
Bob Beck [Thu, 5 Feb 2026 15:36:42 +0000 (08:36 -0700)] 
Update doc/man3/SSL_set1_host.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:28 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/SSL_set1_host.pod
Bob Beck [Thu, 5 Feb 2026 15:36:21 +0000 (08:36 -0700)] 
Update doc/man3/SSL_set1_host.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:25 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/SSL_set1_host.pod
Bob Beck [Thu, 5 Feb 2026 15:35:57 +0000 (08:35 -0700)] 
Update doc/man3/SSL_set1_host.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:22 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoAdd a test for using a leading . for verification of a domain name
Bob Beck [Wed, 4 Feb 2026 00:57:49 +0000 (17:57 -0700)] 
Add a test for using a leading . for verification of a domain name

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:20 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoAllow for a leading . for wildcard like matches
Bob Beck [Wed, 4 Feb 2026 00:51:37 +0000 (17:51 -0700)] 
Allow for a leading . for wildcard like matches

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:17 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoEnsure we use the correct '@' in an email and raise an error when we fail
Bob Beck [Wed, 4 Feb 2026 00:30:10 +0000 (17:30 -0700)] 
Ensure we use the correct '@' in an email and raise an error when we fail

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:15 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoAddress Viktor's review around label checks
Bob Beck [Tue, 3 Feb 2026 18:39:29 +0000 (11:39 -0700)] 
Address Viktor's review around label checks

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:12 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoMention ASCII vs Non ASCII localparts
Bob Beck [Tue, 3 Feb 2026 17:24:19 +0000 (10:24 -0700)] 
Mention ASCII vs Non ASCII localparts

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:10 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoderp
Bob Beck [Tue, 3 Feb 2026 17:09:07 +0000 (10:09 -0700)] 
derp

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:07 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/SSL_set1_host.pod
Bob Beck [Tue, 3 Feb 2026 17:47:06 +0000 (10:47 -0700)] 
Update doc/man3/SSL_set1_host.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:04 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/X509_VERIFY_PARAM_set_flags.pod
Bob Beck [Tue, 3 Feb 2026 17:14:49 +0000 (10:14 -0700)] 
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:02 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/SSL_set1_host.pod
Bob Beck [Tue, 3 Feb 2026 17:13:29 +0000 (10:13 -0700)] 
Update doc/man3/SSL_set1_host.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:04:00 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/SSL_set1_host.pod
Bob Beck [Tue, 3 Feb 2026 17:09:46 +0000 (10:09 -0700)] 
Update doc/man3/SSL_set1_host.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:03:57 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/X509_VERIFY_PARAM_set_flags.pod
Bob Beck [Tue, 3 Feb 2026 16:44:09 +0000 (09:44 -0700)] 
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:03:54 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/X509_VERIFY_PARAM_set_flags.pod
Bob Beck [Tue, 3 Feb 2026 16:41:12 +0000 (09:41 -0700)] 
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:03:52 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate doc/man3/X509_VERIFY_PARAM_set_flags.pod
Bob Beck [Tue, 3 Feb 2026 16:39:50 +0000 (09:39 -0700)] 
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:03:49 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate crypto/x509/v3_utl.c
Bob Beck [Wed, 28 Jan 2026 19:56:57 +0000 (12:56 -0700)] 
Update crypto/x509/v3_utl.c

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:03:47 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoUpdate crypto/x509/v3_utl.c
Bob Beck [Wed, 28 Jan 2026 19:56:47 +0000 (12:56 -0700)] 
Update crypto/x509/v3_utl.c

Co-authored-by: Viktor Dukhovni <viktor1ghub@dukhovni.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:03:44 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoLet's support multiple names for certificate verification
Bob Beck [Sat, 20 Dec 2025 19:21:40 +0000 (12:21 -0700)] 
Let's support multiple names for certificate verification

This adds the functionality to VERIFY_PARAM to separately add multiple
ip's and email addresses for verification purposes.

We then mark the unfortunate SSL_add1_host API which unfortunately
aquired a confusing "maybe add an IP address" behaviour as deprecated.

We replace this with SSL_set1_<dnsname, email, ip, ip_asc> and
SSL_add1_<dnsname, email, ip, ip_asc> to set the things in the SSL
corresponding to the VERIFY_PARAM funcitons.

Fixes: https://github.com/openssl/openssl/issues/28418
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Tue Feb 24 14:03:42 2026
(Merged from https://github.com/openssl/openssl/pull/29612)

2 months agoEnsure we don't leak heap in ossl_rcu_lock_free
Neil Horman [Thu, 19 Feb 2026 19:14:40 +0000 (14:14 -0500)] 
Ensure we don't leak heap in ossl_rcu_lock_free

BSD, when initializing a pthread_cond_t or pthread_mutex_t may allocate
additional heap.  If we don't call pthread_[cond|mutex]_destroy on them,
those allocations leak.

clean that up here.

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Tue Feb 24 12:52:59 2026
(Merged from https://github.com/openssl/openssl/pull/30094)

2 months agoConstify X509_find_by_subject
Neil Horman [Thu, 19 Feb 2026 20:17:10 +0000 (15:17 -0500)] 
Constify X509_find_by_subject

Transitively, this also requires the constification of OCSP_resp_get0_signer

Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
MergeDate: Tue Feb 24 12:45:57 2026
(Merged from https://github.com/openssl/openssl/pull/30096)

2 months agoAdded Nvidia/Olympus CPU dispatch to enable optimal SHA3/EOR3 on Vera CPU
Alexander Komarov [Tue, 10 Feb 2026 09:25:23 +0000 (01:25 -0800)] 
Added Nvidia/Olympus CPU dispatch to enable optimal SHA3/EOR3 on Vera CPU

CLA: Trivial

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/30129)

2 months agoUpdate documentation with guidelines for commit and PR messages
Pauli [Thu, 19 Feb 2026 00:29:23 +0000 (11:29 +1100)] 
Update documentation with guidelines for commit and PR messages

The CONTRIBUTING.md and PULL_REQUEST_TEMPLATE.md files have been updated
to include guidelines on what makes a desirable commit message and
PR description.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
(Merged from https://github.com/openssl/openssl/pull/30075)

2 months agoConstify X509_STORE_add_cert()
Bob Beck [Wed, 18 Feb 2026 23:43:33 +0000 (16:43 -0700)] 
Constify X509_STORE_add_cert()

For #30050

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Mon Feb 23 22:45:42 2026
(Merged from https://github.com/openssl/openssl/pull/30074)

2 months agoConstify various functions that were non const due to extension cache
Bob Beck [Tue, 17 Feb 2026 21:28:01 +0000 (14:28 -0700)] 
Constify various functions that were non const due to extension cache

for https://github.com/openssl/openssl/issues/30052

This is a blatent cheat. While I can get pretty close to getting
around cheating by cacheing extensions as X509 objects are created it's
too fragile at the moment. In a future with a better not-copying all
the things X509, we would endeavour to not need this.

In the meantime, in the interest of getting the public API ready to
do that, we instead make a blatent cheat in the internal function of

int ossl_x509v3_cache_extensions(const X509 *x);

Which in a future world we can work to make go away.

And then the public API all changes to const.

long X509_get_pathlen(const X509 *x);
int X509_check_ca(const X509 *x);
int X509_check_purpose(const X509 *x, int id, int ca);
long X509_get_proxy_pathlen(const X509 *x);
uint32_t X509_get_extension_flags(const X509 *x);
uint32_t X509_get_key_usage(const X509 *x);
uint32_t X509_get_extended_key_usage(const X509 *x);
onst ASN1_OCTET_STRING *X509_get0_subject_key_id(const X509 *x);
const ASN1_OCTET_STRING *X509_get0_authority_key_id(const X509 *x);
const GENERAL_NAMES *X509_get0_authority_issuer(const X509 *x);
const ASN1_INTEGER *X509_get0_authority_serial(const X509 *x);

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Mon Feb 23 16:34:29 2026
(Merged from https://github.com/openssl/openssl/pull/30055)

2 months agoFix the uses of X509_check_certificate_times
Richard Levitte [Thu, 19 Feb 2026 15:30:45 +0000 (16:30 +0100)] 
Fix the uses of X509_check_certificate_times

The "error" parameter to 'X509_check_certificate_times' gets an X509 error
value, which isn't a OpenSSL ERR reason code.  Unfortunately, this was
conflated.

This restores the behaviour in the places of conflation to something
similar enough to what was done before 'X509_check_certificate_times'
was implemented.

Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Mon Feb 23 15:43:21 2026
(Merged from https://github.com/openssl/openssl/pull/30088)

2 months agopreserve data constness when getting issuer name's and subject's hash
Denis Pronin [Tue, 19 Nov 2024 04:57:07 +0000 (07:57 +0300)] 
preserve data constness when getting issuer name's and subject's hash

CLA:trivial

Signed-off-by: Denis Pronin <dannftk@yandex.ru>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Mon Feb 23 13:13:33 2026
(Merged from https://github.com/openssl/openssl/pull/25991)

2 months agoAdded BIO_set_send_flags() function to set flags passed to send(), sendto(), and...
Igor Ustinov [Tue, 17 Feb 2026 13:36:04 +0000 (14:36 +0100)] 
Added BIO_set_send_flags() function to set flags passed to send(), sendto(), and sendmsg().

The main intention is to allow setting the MSG_NOSIGNAL flag to avoid
a crash on receiving the SIGPIPE signal.

Fixes #16399

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/30044)

2 months agoOSSL_CRMF_MSG_centralkeygen_requested(): change confusing paramter name 'p10cr' to...
Dr. David von Oheimb [Wed, 26 Feb 2025 17:55:00 +0000 (18:55 +0100)] 
OSSL_CRMF_MSG_centralkeygen_requested(): change confusing paramter name 'p10cr' to 'p10'

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/29073)

2 months agocmp_ctx.c OSSL_CMP_CTX_new(): update and/or comment the default PBM parameters chosen
Dr. David von Oheimb [Wed, 2 Apr 2025 07:33:18 +0000 (09:33 +0200)] 
cmp_ctx.c OSSL_CMP_CTX_new(): update and/or comment the default PBM parameters chosen

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/29073)

2 months agoCorrect the instructions for how to run the krb5 external test.
Bob Beck [Fri, 20 Feb 2026 23:26:51 +0000 (16:26 -0700)] 
Correct the instructions for how to run the krb5 external test.

What is there is a trap. I fell into it. I was sad.

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Sun Feb 22 21:47:54 2026
(Merged from https://github.com/openssl/openssl/pull/30122)

2 months agoConstify X509_CRL_get0_by_cert
Angel Yankov [Thu, 19 Feb 2026 08:27:21 +0000 (10:27 +0200)] 
Constify X509_CRL_get0_by_cert

Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Sun Feb 22 17:57:56 2026
(Merged from https://github.com/openssl/openssl/pull/30079)

2 months agoConstify X509_CRL_get0_by_cert
Neil Horman [Thu, 19 Feb 2026 15:52:31 +0000 (10:52 -0500)] 
Constify X509_CRL_get0_by_cert

Update the X509 parameter to be const

Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
MergeDate: Sun Feb 22 17:55:12 2026
(Merged from https://github.com/openssl/openssl/pull/30090)

2 months agoReturn the correct error message in ossl_X509_print_ex_brief
Bob Beck [Thu, 19 Feb 2026 20:20:20 +0000 (13:20 -0700)] 
Return the correct error message in ossl_X509_print_ex_brief

X509_verify_cert_times returns a verify error code,
so X509_verify_cert_error_string() must be used to
convert it to text.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
MergeDate: Sun Feb 22 17:52:13 2026
(Merged from https://github.com/openssl/openssl/pull/30097)

2 months agoAdd a changes entry for the x509 time function changes
Bob Beck [Thu, 19 Feb 2026 20:59:17 +0000 (13:59 -0700)] 
Add a changes entry for the x509 time function changes

Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Sun Feb 22 17:49:25 2026
(Merged from https://github.com/openssl/openssl/pull/30098)

2 months agoFix broken strict-warnings build in sskdf and x963kdf
Neil Horman [Fri, 20 Feb 2026 10:48:53 +0000 (05:48 -0500)] 
Fix broken strict-warnings build in sskdf and x963kdf

when configuring with:

./Configure no-sskdf --strict-warnings

The build breaks as sskdf_new is defined but not used (as the same sskdf
file is used to implement x963kdf with a different new dispatch
function).  i.e. we will build the file when sskdf is disabled but
x963kdf is enabled, omitting any use of sskdf_new

Easy fix, just gate the inclusion of sskdf_new on #ifndef
OPENSSL_NO_SSKDF.

Do the same for X963KDF, which has the same problem (thank you for
pointing that out @t8m)

Fixes #30105

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Sun Feb 22 17:46:00 2026
(Merged from https://github.com/openssl/openssl/pull/30106)

2 months agoConstify X509_chain_check_suiteb
Bob Beck [Tue, 17 Feb 2026 22:37:15 +0000 (15:37 -0700)] 
Constify X509_chain_check_suiteb

For https://github.com/openssl/openssl/issues/30052

Reviewed-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Sun Feb 22 17:37:38 2026
(Merged from https://github.com/openssl/openssl/pull/30058)

3 months agoX509V3_set_nconf(): Improve error handling using this function, mostly in apps/
Dr. David von Oheimb [Mon, 23 Aug 2021 08:33:27 +0000 (10:33 +0200)] 
X509V3_set_nconf(): Improve error handling using this function, mostly in apps/

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16998)

3 months agoX509V3_set_ctx(): Improve error handling using this function, mostly in apps/
Dr. David von Oheimb [Thu, 19 Aug 2021 18:58:55 +0000 (20:58 +0200)] 
X509V3_set_ctx(): Improve error handling using this function, mostly in apps/

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/16998)

3 months agoCHANGE log additions
Viktor Dukhovni [Wed, 18 Feb 2026 04:27:55 +0000 (15:27 +1100)] 
CHANGE log additions

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:26:53 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoRefactor openssl-speed(1)
Viktor Dukhovni [Tue, 10 Feb 2026 11:51:15 +0000 (22:51 +1100)] 
Refactor openssl-speed(1)

- Adding support for "curveSM2" ECDH
- Integrating EdDSA and SM2 signature support into existing ECDSA code.

This removes ~500 lines of duplicated code.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:26:44 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoNew SSL tests for SM2 cert and key exchange
Viktor Dukhovni [Wed, 11 Feb 2026 18:55:51 +0000 (05:55 +1100)] 
New SSL tests for SM2 cert and key exchange

Also some additional tests for other MLKEM hybrids.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:26:36 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoAdd curveSM2 and curveSM2MLKEM768 TLS test.
Milan Broz [Wed, 11 Feb 2026 12:02:26 +0000 (13:02 +0100)] 
Add curveSM2 and curveSM2MLKEM768 TLS test.

This extends sslapi test for SM2-based key exchange.

Also add comments for #endif to clearly mark disabled code blocks.

Signed-off-by: Milan Broz <gmazyland@gmail.com>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
MergeDate: Sat Feb 21 13:26:27 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoDocument ECDH over SM2 key exchange.
Viktor Dukhovni [Sun, 8 Feb 2026 13:45:03 +0000 (00:45 +1100)] 
Document ECDH over SM2 key exchange.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:26:15 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoSupport for RFC8998 curveSM2 + hybrid
Viktor Dukhovni [Tue, 10 Feb 2026 16:32:17 +0000 (03:32 +1100)] 
Support for RFC8998 curveSM2 + hybrid

This adds support for the "sm2sig_sm3" TLS 1.3 signature algorithm, the
"curveSM2" key exchange group (ECDH over SM2) and the associated
post-quantum/traditional (PQ/T) hybrid "curveSM2MLKEM768" key exchange.

The default key agreement group list is expanded to add two additional
PQ groups, immediately after X25519MLKEM768.  These are the P-256-based
SecP256r1MLKEM768 and the SM2-based curveSMMLKEM768.  Neither of the new
groups is a default client keyshare group, these would only come into
play after a server HRR, if for some reason X25519MLKEM768 is not
supported by the server, X25519 is not then the server's most
preferred group, and the server supports and prefers one of these
of X25519.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:26:07 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoUse algorithm name macros instead of literals
Viktor Dukhovni [Tue, 10 Feb 2026 15:58:43 +0000 (02:58 +1100)] 
Use algorithm name macros instead of literals

In the default and FIPS provider dispatch tables use corresponding
macros instead of string literals.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:25:57 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoPass tls-version to cert sign/verify algorithms
Viktor Dukhovni [Tue, 10 Feb 2026 15:53:51 +0000 (02:53 +1100)] 
Pass tls-version to cert sign/verify algorithms

Most signature algorithms will ignore this parameter, but for SM2 this
makes it possible to set the RFC8998 distinguished identifier.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:25:47 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoNew SM2 "tls-version" signature parameter
Viktor Dukhovni [Tue, 10 Feb 2026 15:45:02 +0000 (02:45 +1100)] 
New SM2 "tls-version" signature parameter

When the version is TLS 1.3, this sets the SM2 distinguished identifier to
the RFC8998 specified value: "TLSv1.3+GM+Cipher+Suite".

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:25:39 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoImplement default SM2 distinguished identifier
Viktor Dukhovni [Wed, 11 Feb 2026 18:49:33 +0000 (05:49 +1100)] 
Implement default SM2 distinguished identifier

This is needed for certificate verification to work correctly.
Removed unnecessary explicit instances of the distid in most tests, and
documentation.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:25:30 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoSM2 digest sign/verify context initialisation fix
Viktor Dukhovni [Tue, 10 Feb 2026 14:55:02 +0000 (01:55 +1100)] 
SM2 digest sign/verify context initialisation fix

SM digest sign/verify context initialisation needs to set the
"compute_z_digest" flag earlier, before calling sm2sig_signature_init(),
to process the provided parameters, because otherwise attempts to set
the "distinguished identifier" will erroneously fail.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:25:19 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoNew decoder generator returns matched field count
Viktor Dukhovni [Mon, 9 Feb 2026 09:28:39 +0000 (20:28 +1100)] 
New decoder generator returns matched field count

It can be useful to know how many parameters matched a decoded field,
(or at least whether that number is non-zero).

Tne new `produce_param_decoder_with_count` generator produces code that
updates a count output variable.

In particular, an RSA parameter handler did not handle requests for only
unexpected parameter as gracefully as one might want.  It can now
return early when none of the provided parameters are relevant.

[ The number reported is a count of matching parameter values, not a
  count of the resulting decoded fields, so if a parameter key occurs
  more than once, the count can be larger than the number of fields
  actually set. ]

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Yang <paulyang.inf@gmail.com>
MergeDate: Sat Feb 21 13:25:11 2026
(Merged from https://github.com/openssl/openssl/pull/29953)

3 months agoConstify X509_print_fp and X509_print_ex_fp
Neil Horman [Wed, 18 Feb 2026 21:04:52 +0000 (16:04 -0500)] 
Constify X509_print_fp and X509_print_ex_fp

Make the X509 argument to both functions const, as we don't modify the
object at all in these functions.

Again, these functions, while public, appear undocumented, and so I'm
omitting any HISTORY notes

Reviewed-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Fri Feb 20 21:26:47 2026
(Merged from https://github.com/openssl/openssl/pull/30073)

3 months agoConstify X509_REQ_get1_email, X509_get1_email and X509_get1_ocsp.
Milan Broz [Thu, 19 Feb 2026 12:05:21 +0000 (13:05 +0100)] 
Constify X509_REQ_get1_email, X509_get1_email and X509_get1_ocsp.

Functions seem not documented, but exported.

Signed-off-by: Milan Broz <gmazyland@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Fri Feb 20 17:07:41 2026
(Merged from https://github.com/openssl/openssl/pull/30082)

3 months agoRemoving some more EVP_get_smtbysmth calls
Dmitry Belyavskiy [Mon, 16 Feb 2026 13:43:41 +0000 (14:43 +0100)] 
Removing some more EVP_get_smtbysmth calls

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Simo Sorce <simo@redhat.com>
(Merged from https://github.com/openssl/openssl/pull/30026)

3 months agorequire manual build for external ECH tests
sftcd [Tue, 17 Feb 2026 23:09:01 +0000 (23:09 +0000)] 
require manual build for external ECH tests

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Fri Feb 20 14:16:40 2026
(Merged from https://github.com/openssl/openssl/pull/30059)

3 months agoECH: Remove whitespace at EOL or EOF
Tomas Mraz [Wed, 18 Feb 2026 14:09:37 +0000 (15:09 +0100)] 
ECH: Remove whitespace at EOL or EOF

Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Fri Feb 20 10:11:21 2026
(Merged from https://github.com/openssl/openssl/pull/30066)

3 months agoECH: Use BIO_puts when appropriate
Tomas Mraz [Wed, 18 Feb 2026 14:09:11 +0000 (15:09 +0100)] 
ECH: Use BIO_puts when appropriate

And also a few additional code cleanups.

Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Fri Feb 20 10:11:20 2026
(Merged from https://github.com/openssl/openssl/pull/30066)

3 months agoECH: change from I-D to RFC 9849 and resolve TODO(ECH) cases
sftcd [Tue, 17 Feb 2026 16:48:18 +0000 (16:48 +0000)] 
ECH: change from I-D to RFC 9849 and resolve TODO(ECH) cases

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
MergeDate: Thu Feb 19 09:22:37 2026
(Merged from https://github.com/openssl/openssl/pull/30048)

3 months agoECH: avoid pointer aliasing in tls_construct_ctos_psk()
sftcd [Tue, 17 Feb 2026 19:11:50 +0000 (19:11 +0000)] 
ECH: avoid pointer aliasing in tls_construct_ctos_psk()

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
MergeDate: Thu Feb 19 09:20:46 2026
(Merged from https://github.com/openssl/openssl/pull/30051)

3 months agoech_check_format(): Fix potential out of bounds read
sftcd [Tue, 17 Feb 2026 18:37:04 +0000 (18:37 +0000)] 
ech_check_format(): Fix potential out of bounds read

strspn() is called on likely non-NUL-terminated BIO buffer.
Copy it and add NUL-termination before calling the function.

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
MergeDate: Thu Feb 19 09:17:54 2026
(Merged from https://github.com/openssl/openssl/pull/30050)

3 months agoAdd tests and documentation and fix a couple of issues identified by added tests
sftcd [Sun, 23 Nov 2025 23:19:16 +0000 (23:19 +0000)] 
Add tests and documentation and fix a couple of issues identified by added tests

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Mon Feb 16 15:41:15 2026
(Merged from https://github.com/openssl/openssl/pull/29200)

3 months agoossl_ech_get_retry_configs(): Check for integer overflow
sftcd [Thu, 18 Dec 2025 14:39:10 +0000 (14:39 +0000)] 
ossl_ech_get_retry_configs(): Check for integer overflow

Fixes DEF-02-010

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Wed Feb 11 17:19:16 2026
(Merged from https://github.com/openssl/openssl/pull/29593)

3 months agotls_process_server_hello(): With retry config validate the outer hostname
sftcd [Thu, 18 Dec 2025 14:16:10 +0000 (14:16 +0000)] 
tls_process_server_hello(): With retry config validate the outer hostname

Call SSL_set1_host() to apply the outer hostname to the certificate
validation.

Fixes DEF-02-009

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Wed Feb 11 17:19:14 2026
(Merged from https://github.com/openssl/openssl/pull/29593)

3 months agoech_test.c: Add test for trying ECH with TLSv1.2
sftcd [Thu, 18 Dec 2025 13:48:28 +0000 (13:48 +0000)] 
ech_test.c: Add test for trying ECH with TLSv1.2

Fixes DEF-02-006

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Wed Feb 11 17:19:13 2026
(Merged from https://github.com/openssl/openssl/pull/29593)

3 months agossl_choose_server_version(): With ECH check if connection is TLSv1.3
sftcd [Thu, 18 Dec 2025 02:10:38 +0000 (02:10 +0000)] 
ssl_choose_server_version(): With ECH check if connection is TLSv1.3

Fixes DEF-02-005

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Wed Feb 11 17:19:11 2026
(Merged from https://github.com/openssl/openssl/pull/29593)

3 months agoDocument that SSL_OP_ECH_TRIALDECRYPT can cause DoS in some circumstances
sftcd [Tue, 25 Nov 2025 23:39:33 +0000 (23:39 +0000)] 
Document that SSL_OP_ECH_TRIALDECRYPT can cause DoS in some circumstances

Fixes DEF-02-002

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Wed Feb 11 17:19:10 2026
(Merged from https://github.com/openssl/openssl/pull/29593)

3 months agoech_read_priv_echconfiglist(): Pass encodedlen to BIO_new_mem_buf()
sftcd [Tue, 25 Nov 2025 22:41:23 +0000 (22:41 +0000)] 
ech_read_priv_echconfiglist(): Pass encodedlen to BIO_new_mem_buf()

Fixes DEF-02-001

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
MergeDate: Wed Feb 11 17:19:08 2026
(Merged from https://github.com/openssl/openssl/pull/29593)

3 months agoECH: Properly apply libctx and propq from SSL_CTX
Tomas Mraz [Thu, 18 Dec 2025 10:43:41 +0000 (11:43 +0100)] 
ECH: Properly apply libctx and propq from SSL_CTX

And further minor refactoring.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
MergeDate: Thu Jan  8 09:59:56 2026
(Merged from https://github.com/openssl/openssl/pull/29439)

3 months agos_client and s_server options for ECH
sftcd [Thu, 14 Aug 2025 18:17:07 +0000 (19:17 +0100)] 
s_client and s_server options for ECH

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28270)

3 months agoFix a client-auth bug introduced by ECH code
sftcd [Mon, 15 Sep 2025 20:10:33 +0000 (21:10 +0100)] 
Fix a client-auth bug introduced by ECH code

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28555)

3 months agoech_store.c: Fix casts and avoid leaks on error return
Tomas Mraz [Thu, 18 Sep 2025 17:41:49 +0000 (19:41 +0200)] 
ech_store.c: Fix casts and avoid leaks on error return

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28611)

3 months agoech_ssl_apis.c: Check some invalid argument passing
Tomas Mraz [Thu, 18 Sep 2025 16:01:49 +0000 (18:01 +0200)] 
ech_ssl_apis.c: Check some invalid argument passing

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28611)

3 months agoFix warnings about casts in ECH code
Tomas Mraz [Thu, 18 Sep 2025 15:13:28 +0000 (17:13 +0200)] 
Fix warnings about casts in ECH code

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28611)

3 months agoAdd server-side handling of Encrypted Client Hello
sftcd [Mon, 5 May 2025 13:23:55 +0000 (14:23 +0100)] 
Add server-side handling of Encrypted Client Hello

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27561)

3 months agoAdd a test for the new PACKET_msg_start() function
Matt Caswell [Thu, 5 Jun 2025 14:29:01 +0000 (15:29 +0100)] 
Add a test for the new PACKET_msg_start() function

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27776)

3 months agoIntroduce the PACKET_msg_start() function
Matt Caswell [Thu, 5 Jun 2025 13:41:55 +0000 (14:41 +0100)] 
Introduce the PACKET_msg_start() function

This gives us the start of the buffer in use for the PACKET.

We then use this information when calculating the TLS PSK binder.
Previously we were assuming knowledge about where the buffer starts.
However, with ECH, we may be using a different buffer to normal so it is
better to ask the PACKET where the start of the buffer is.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27776)

3 months agoECH client support for sending multiple key shares
sftcd [Fri, 2 May 2025 11:58:30 +0000 (12:58 +0100)] 
ECH client support for sending multiple key shares

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27540)

3 months agoECH client side transcript refactor
sftcd [Sat, 28 Dec 2024 02:49:12 +0000 (02:49 +0000)] 
ECH client side transcript refactor

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/26011)

3 months agoECH client side
sftcd [Wed, 20 Nov 2024 14:10:30 +0000 (14:10 +0000)] 
ECH client side

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/26011)

3 months agoECH external APIs
sftcd [Thu, 10 Oct 2024 16:46:11 +0000 (17:46 +0100)] 
ECH external APIs

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/25663)

3 months agoECH CLI implementation
sftcd [Tue, 10 Sep 2024 23:28:32 +0000 (00:28 +0100)] 
ECH CLI implementation

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/25420)

3 months agoECH build artefacts and a bit of code
Stephen Farrell [Thu, 15 Aug 2024 00:27:24 +0000 (01:27 +0100)] 
ECH build artefacts and a bit of code

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/25193)

3 months agoDocuments initial agreed APIs for Encrypted Client Hello (ECH)
Stephen Farrell [Tue, 6 Aug 2024 22:16:58 +0000 (23:16 +0100)] 
Documents initial agreed APIs for Encrypted Client Hello (ECH)
and includes a minimal demo for some of those APIs.

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/24738)

3 months agoadd ech-api.md
Stephen Farrell [Wed, 26 Jun 2024 11:55:17 +0000 (12:55 +0100)] 
add ech-api.md

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/24738)

3 months agoConst correct time parameter for X509_cmp_time(), X509_time_adj() and X509_time_adj_ex().
Frederik Wedel-Heinen [Sun, 15 Feb 2026 14:34:59 +0000 (15:34 +0100)] 
Const correct time parameter for X509_cmp_time(), X509_time_adj() and X509_time_adj_ex().

Fixes #21371

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Fri Feb 20 16:36:52 2026
(Merged from https://github.com/openssl/openssl/pull/30020)

3 months agoConstify X509_to_X509_REQ and X509_REQ_to_X509
Neil Horman [Wed, 18 Feb 2026 20:51:20 +0000 (15:51 -0500)] 
Constify X509_to_X509_REQ and X509_REQ_to_X509

Modify both functions to accept and return a const X509, respectively.

Again, neither of these functions appear documented, so omitting the
HISTORY updates here, though we should look into why they are missing
docs.

Reviewed-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Fri Feb 20 16:27:15 2026
(Merged from https://github.com/openssl/openssl/pull/30072)

3 months agoCRL: reject malformed CRL Number and CRL Delta Indicator
Daniel Kubec [Mon, 16 Feb 2026 12:09:41 +0000 (13:09 +0100)] 
CRL: reject malformed CRL Number and CRL Delta Indicator

Previously, a malformed ASN.1 INTEGER in the CRL Number or Delta CRL Indicator
extension would cause a parse error but the CRL would not be explicitly
rejected. Existing code discards the error and continues, accepting a CRL it
cannot fully parse, unlike other libraries and implementations that reject the
CRL outright.

Malformed encoding suggests a corrupt or tampered CRL, data that cannot be
parsed cannot be trusted. Reject the CRL outright if either extension cannot be
decoded, regardless of whether the extension is marked critical. This prevents
silent soft-fail behavior where revoked certificates could pass validation
unchecked.

Fixes #27374

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Fri Feb 20 16:24:44 2026
(Merged from https://github.com/openssl/openssl/pull/30024)

3 months agoConstify X509_issuer_and_serial_hash
Milan Broz [Thu, 19 Feb 2026 13:04:39 +0000 (14:04 +0100)] 
Constify X509_issuer_and_serial_hash

Signed-off-by: Milan Broz <gmazyland@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
MergeDate: Fri Feb 20 16:22:12 2026
(Merged from https://github.com/openssl/openssl/pull/30084)

3 months agoConsity X509_add_cert and X509_self_signed
Neil Horman [Tue, 17 Feb 2026 20:47:12 +0000 (15:47 -0500)] 
Consity X509_add_cert and X509_self_signed

As part of the effort to not allow mutable X509 objects where they
aren't needed, constify the cert parameter for these two functions

Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
MergeDate: Fri Feb 20 13:33:04 2026
(Merged from https://github.com/openssl/openssl/pull/30054)

3 months agoConstify X509v3_asid_validate_resource_set and X509v3_addr_validate_resource_set
Milan Broz [Thu, 19 Feb 2026 09:47:33 +0000 (10:47 +0100)] 
Constify X509v3_asid_validate_resource_set and X509v3_addr_validate_resource_set

These functions are exported, but undocumented.

Signed-off-by: Milan Broz <gmazyland@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Fri Feb 20 13:06:58 2026
(Merged from https://github.com/openssl/openssl/pull/30080)

3 months agoconstify X509_check_trust, X509_TRUST_add
Neil Horman [Wed, 18 Feb 2026 20:34:31 +0000 (15:34 -0500)] 
constify X509_check_trust, X509_TRUST_add

Turn the X509 parameters to X509_check_trust and X509_TRUST_add into
consts.

Interesting side notes: X509_TRUST_add and some others that we're
modified as a result of this pr, are listed as public functions, but
have no documentation for them, and make doc-nits doesn't complain about
it.  Unsure as to why, but we should probably look at that eventually

Reviewed-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Fri Feb 20 13:04:04 2026
(Merged from https://github.com/openssl/openssl/pull/30071)

3 months agoRevert "fips-jitter: Force use jitter entropy in the FIPS 3.0.9 provider callback"
Dimitri John Ledkov [Wed, 14 Jan 2026 21:12:25 +0000 (21:12 +0000)] 
Revert "fips-jitter: Force use jitter entropy in the FIPS 3.0.9 provider callback"

This reverts commit aa5f1b4cf562d7f0b65ae7ef93179ebc1102fbeb.

Whilst this is still useful with pre-3.2 providers, it is actually unlikely to be deployed. And there are now openssl fips providers getting validated with statically linked jitterentropy source already.

See background info at:
- https://github.com/openssl/openssl/pull/25930

Fixes: https://github.com/openssl/openssl/issues/26903
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
MergeDate: Fri Feb 20 11:15:25 2026
(Merged from https://github.com/openssl/openssl/pull/29641)