]> git.ipfire.org Git - thirdparty/openssl.git/log
thirdparty/openssl.git
8 hours agoapps/enc.c: typo fix in -k option description master
Eugene Syromiatnikov [Tue, 14 Apr 2026 06:45:14 +0000 (08:45 +0200)] 
apps/enc.c: typo fix in -k option description

Add missing closing parenthesis.

Fixes: de89ca9347c2 "apps/enc.c: Moved -pass, -k, -kfile to encryption options"
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Mon Apr 20 10:18:05 2026
(Merged from https://github.com/openssl/openssl/pull/30813)

8 hours agofips: mark X448MLKEM1024 as non-approved
Dimitri John Ledkov [Wed, 15 Apr 2026 23:57:15 +0000 (00:57 +0100)] 
fips: mark X448MLKEM1024 as non-approved

The [FIPS 140-3I.G.](https://csrc.nist.gov/csrc/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf)
Section D.S Key Encapsulation Mechanisms have been substantially
update on April 9, 2026.

It now explicitely lists that hybrid mechanisms must be fixed
combinations with both portions being in boundary, and the intent
should be to use them with an approved combiner such as HKDF as part
of a protocol. With the combinations from the
https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem
explicitely mentioned that they can reach appoved or allowed claims.

Note that consensus for TLS group for X448MLKEM1024 failed to reach on
the [pqc forum](https://mailarchive.ietf.org/arch/browse/tls/?gbt=1&index=YIHJrbWVPdXIr8q57nsEUUmuaIo) and is not part of the
https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem. And there
are no other protocols defined that use this hybrid with an approved
combiner.

Also on https://test.openquantumsafe.org/ there is x448_mlkem768 but
no X448MLKEM1024.

To avoid any confusion, it is best to mark this hybrid as non-approved
going forward. It is likely also worthfile to deprecate X448MLKEM1024
altogether.

Fixes: https://github.com/openssl/openssl/pull/26220
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Mon Apr 20 10:08:09 2026
(Merged from https://github.com/openssl/openssl/pull/30856)

8 hours agoci: Add MINGW64 build
Milan Broz [Thu, 16 Apr 2026 07:14:45 +0000 (09:14 +0200)] 
ci: Add MINGW64 build

MINGW64 is supported platfrom but not covered in CI.

This patch adds trivial rebuild test, for now without strict
warnings (need to be fixed later).

Fixes: https://github.com/openssl/project/issues/1911
Signed-off-by: Milan Broz <gmazyland@gmail.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
MergeDate: Mon Apr 20 10:04:58 2026
(Merged from https://github.com/openssl/openssl/pull/30860)

8 hours agosock_read: check ret==0 before BIO_sock_should_retry()
Liu-ErMeng [Fri, 17 Apr 2026 01:32:00 +0000 (18:32 -0700)] 
sock_read: check ret==0 before BIO_sock_should_retry()

POSIX states errno is only valid when the return value indicates an
error.  recv() sets errno only on -1; when it returns 0 (peer closed)
errno is unspecified.

Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
MergeDate: Mon Apr 20 09:59:27 2026
(Merged from https://github.com/openssl/openssl/pull/30877)

8 hours ago.github/workflows: remove openssl-3.2 and openssl-3.3 from CI jobs
Eugene Syromiatnikov [Fri, 17 Apr 2026 09:08:00 +0000 (11:08 +0200)] 
.github/workflows: remove openssl-3.2 and openssl-3.3 from CI jobs

These branches are EOL, so there is no need to keep running CI jobs
for them.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
MergeDate: Mon Apr 20 09:57:54 2026
(Merged from https://github.com/openssl/openssl/pull/30881)

10 hours agoFix prototype typo in X509_NAME_get_index_by_NID
Daniel Gustafsson [Thu, 16 Apr 2026 12:06:19 +0000 (14:06 +0200)] 
Fix prototype typo in X509_NAME_get_index_by_NID

s/cont/const/

Fixes: b0f2107b4404 "Constify X509_NAME"
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
MergeDate: Mon Apr 20 07:54:23 2026
(Merged from https://github.com/openssl/openssl/pull/30865)

3 days agoMake QUIC radix tests friendly to clang-format
Alexandr Nedvedicky [Wed, 15 Apr 2026 13:01:59 +0000 (15:01 +0200)] 
Make QUIC radix tests friendly to clang-format

this is yet another small fallout from clang-format
style change. This time for radix tests.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Fri Apr 17 10:50:07 2026
(Merged from https://github.com/openssl/openssl/pull/30844)

3 days agoFixes AES optimisations for Fujitsu M10 cause SEGV #29085
Jan Damborsky [Tue, 14 Apr 2026 06:43:35 +0000 (08:43 +0200)] 
Fixes AES optimisations for Fujitsu M10 cause SEGV #29085

Fixes off-by-one error in AES optimisations for Fujitsu Sparc CPUs.

Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Fri Apr 17 10:46:01 2026
(Merged from https://github.com/openssl/openssl/pull/30814)

3 days agoASN1_BIT_STRING_name_print check BIO_* RVs
Norbert Pocs [Tue, 31 Mar 2026 15:06:36 +0000 (17:06 +0200)] 
ASN1_BIT_STRING_name_print check BIO_* RVs

Signed-off-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Fri Apr 17 10:44:19 2026
(Merged from https://github.com/openssl/openssl/pull/30691)

3 days agoGrow the init_buf incrementally as we receive data
Matt Caswell [Tue, 17 Mar 2026 13:41:21 +0000 (13:41 +0000)] 
Grow the init_buf incrementally as we receive data

Instead of growing the init_buf buffer immediately to the full size of the
expected message, we grow it incrementally as we receive the data. This
prevents abuse where the remote peer claims a very large message size, but
then doesn't send it.

This change is as a result of a security issue reported to the
openssl-security team by Okta Red Team. The openssl-security
team have decided to handle this as a "bug or hardening" only fix.

Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Fri Apr 17 10:08:34 2026
(Merged from https://github.com/openssl/openssl/pull/30792)

3 days agoossl_curve448_scalar_halve(): Fix -ansi build
Tomas Mraz [Thu, 16 Apr 2026 17:37:51 +0000 (19:37 +0200)] 
ossl_curve448_scalar_halve(): Fix -ansi build

Move statement after declarations.
Fixes 4247fb98def703bcc55952f17f426331cce08d09

Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
MergeDate: Fri Apr 17 06:15:24 2026
(Merged from https://github.com/openssl/openssl/pull/30872)

(cherry picked from commit e812720ddca26c88d8704d55de606881ccec8ea7)

3 days agoport_default_packet_handler() should not attempt to parse QUIC packet
Alexandr Nedvedicky [Mon, 13 Apr 2026 10:39:25 +0000 (12:39 +0200)] 
port_default_packet_handler() should not attempt to parse QUIC packet
header when destination connection id is not present. To save CPU cycles.

Issue has been noticed and kindly reported by Dan Carpenter via
openssl-users@ mailing list.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Matt Caswell <matt@openssl.foundation>
MergeDate: Thu Apr 16 22:59:33 2026
(Merged from https://github.com/openssl/openssl/pull/30795)

4 days agoossl_err_get_state_int(): Avoid saving the last sys error if not needed
Tomas Mraz [Wed, 25 Feb 2026 17:15:47 +0000 (18:15 +0100)] 
ossl_err_get_state_int(): Avoid saving the last sys error if not needed

In calls like ERR_set_mark(), ERR_clear_last_mark() and
others, there is no point in saving the last sys error.

It can be potentially expensive (on Windows).

Reviewed-by: Simo Sorce <simo@redhat.com>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Thu Apr 16 18:12:49 2026
(Merged from https://github.com/openssl/openssl/pull/30179)

4 days agoFix off-by-one in "groups list" parser
Viktor Dukhovni [Wed, 15 Apr 2026 09:14:48 +0000 (19:14 +1000)] 
Fix off-by-one in "groups list" parser

When parsing the configured TLS supported groups list reallocating of the list
of "tuples" happened one element too late.  The current tuple count is the
number of "closed" (completed) tuples, the currently active tuple occupies
one more slot, so we need space for `tuple count + 1` elements.

This is only an issue while parsing configurations (not attacker controlled),
and only if the group list somehow manages to contain 32 or distinct elements
(each in its own tuple, and even though OpenSSL does not implement that many
groups in typical builds).

Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 17:17:38 2026
(Merged from https://github.com/openssl/openssl/pull/30838)

4 days agoAdd a test for too many PSKs
Matt Caswell [Fri, 10 Apr 2026 11:15:33 +0000 (12:15 +0100)] 
Add a test for too many PSKs

We test that even if we add too many PSKs we still handle the
ClientHello correctly.

Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 17:07:38 2026
(Merged from https://github.com/openssl/openssl/pull/30761)

4 days agoLimit the number of PSKs we accept
Matt Caswell [Fri, 10 Apr 2026 09:58:50 +0000 (10:58 +0100)] 
Limit the number of PSKs we accept

To prevent attacks where an unauthenticated client sends us a large
number of PSKs, we place a limit on the number we are prepared to
accept.

Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 17:07:37 2026
(Merged from https://github.com/openssl/openssl/pull/30761)

4 days agoriscv: weaken capscheck for rv64gc_v_zvkned_hwprobe entry
Christoph Müllner [Tue, 7 Apr 2026 20:09:46 +0000 (22:09 +0200)] 
riscv: weaken capscheck for rv64gc_v_zvkned_hwprobe entry

QEMU 8.2.2 (ubuntu-latest) does not report ZVKNED via hwprobe
despite zvkned=true being set in QEMU_CPU, so the _V_ZVKNED
assertion would fail in CI for a reason unrelated to OpenSSL.

Weaken the check to _V, which QEMU 8.2.2 does report correctly.
The ZVKNED assertion can be restored once the CI moves to a QEMU
version with full Zvk* hwprobe coverage.

Signed-off-by: Christoph Müllner <christoph.muellner@vrull.eu>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 17:03:43 2026
(Merged from https://github.com/openssl/openssl/pull/30713)

4 days agoriscv: add capscheck assertion to hwprobe CI entries
Christoph Müllner [Tue, 7 Apr 2026 19:47:44 +0000 (21:47 +0200)] 
riscv: add capscheck assertion to hwprobe CI entries

The two hwprobe-based matrix entries exercise hwprobe_to_cap() but
previously contained no assertion to verify that expected extensions
were actually detected; tests pass regardless of which code path is
taken because both the optimised and fallback paths produce correct
output.

Add an optional capscheck field to the matrix schema.  When set, a
new "check detected capabilities" step runs
"openssl info -cpusettings" and asserts the output matches the
given extended regular expression.

Set capscheck for the two hwprobe entries:
- rv64gc_novector_hwprobe: assert "_ZBB" is present.
  With the IS_IN_DEPEND_VECTOR bug, scalar extensions are gated on
  VECTOR_CAPABLE (false when V is absent), so ZBB is not detected
  and the assertion fails.
- rv64gc_v_zvkned_hwprobe: assert "_V_ZVKNED" is present.

Signed-off-by: Christoph Müllner <christoph.muellner@vrull.eu>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 17:03:42 2026
(Merged from https://github.com/openssl/openssl/pull/30713)

4 days agoriscv: add hwprobe-based CI entries for capability detection
Christoph Müllner [Tue, 7 Apr 2026 19:22:35 +0000 (21:22 +0200)] 
riscv: add hwprobe-based CI entries for capability detection

All existing RISC-V cross-compile matrix entries set OPENSSL_riscvcap,
which causes OPENSSL_cpuid_setup() to call parse_env() and skip the
hwprobe_to_cap() code path entirely.  That path has never been exercised
by CI, leaving bugs in it undetectable.

Add two matrix entries that omit opensslcapsname so OPENSSL_riscvcap is
not set and hwprobe_to_cap() is called:

- rv64gc_novector_hwprobe: rv64 with ZBB/ZBC/ZBS/ZBKB, V disabled.
  AT_HWCAP V bit is clear (VECTOR_CAPABLE=false).  Exercises the
  scalar-extension detection branch of hwprobe_to_cap().

- rv64gc_v_zvkned_hwprobe: rv64 with V (vlen=128) and ZVKNED.
  AT_HWCAP V bit is set (VECTOR_CAPABLE=true).  Exercises the
  vector-extension detection branch and the IS_IN_DEPEND_VECTOR
  guard that gates Zvk* extensions on V availability.

Signed-off-by: Christoph Müllner <christoph.muellner@vrull.eu>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 17:03:41 2026
(Merged from https://github.com/openssl/openssl/pull/30713)

4 days agoriscv: fix IS_IN_DEPEND_VECTOR range check
Christoph Müllner [Tue, 7 Apr 2026 19:28:47 +0000 (21:28 +0200)] 
riscv: fix IS_IN_DEPEND_VECTOR range check

The macro checked (ZVX_MIN >= offset) which is equivalent to
(offset <= ZVX_MIN), making it true for offsets 0-15 instead of
the intended range [ZVX_MIN, ZVX_MAX] = [15, 23].

The practical effect in hwprobe_to_cap() was inverted:
- Scalar extensions (ZBA..ZKT, offsets 0-14) were incorrectly
  treated as vector-dependent and suppressed when VECTOR_CAPABLE
  was false, preventing their detection via hwprobe.
- Vector extensions ZVBC..ZVKSH (offsets 16-23) were not treated
  as vector-dependent, allowing them to be enabled via hwprobe
  even when the V extension was absent.

Fix by changing >= to <= so the macro correctly tests whether
offset falls in [ZVX_MIN, ZVX_MAX].

Signed-off-by: Christoph Müllner <christoph.muellner@vrull.eu>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 17:03:40 2026
(Merged from https://github.com/openssl/openssl/pull/30713)

4 days agoEAP-FAST: echo Session ID on PAC-based session resumption
Daniel Kubec [Thu, 2 Apr 2026 13:25:29 +0000 (14:25 +0100)] 
EAP-FAST: echo Session ID on PAC-based session resumption

Ensure that when a ClientHello includes both a Session ID and a PAC-Opaque
in the SessionTicket extension, the server echoes the same Session ID in
the ServerHello if the session is resumed based on the PAC-Opaque.

Fixes #29095

Signed-off-by: Daniel Kubec <kubec@openssl.foundation>
Co-authored-by: Matt Caswell <matt@openssl.foundation>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 17:01:03 2026
(Merged from https://github.com/openssl/openssl/pull/30695)

4 days ago25-test_verify.t: improve variable and test name, add relative {file:,}D:cert test...
Dr. David von Oheimb [Tue, 6 May 2025 06:12:00 +0000 (08:12 +0200)] 
25-test_verify.t: improve variable and test name, add relative {file:,}D:cert test for Windows

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Thu Apr 16 16:52:57 2026
(Merged from https://github.com/openssl/openssl/pull/27554)

4 days agoFactor out ossl_file_stat() from file_store.c:file_open()
Dr. David von Oheimb [Sat, 26 Apr 2025 12:37:12 +0000 (14:37 +0200)] 
Factor out ossl_file_stat() from file_store.c:file_open()

It is also simplified and generalized.

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Thu Apr 16 16:52:56 2026
(Merged from https://github.com/openssl/openssl/pull/27554)

4 days agoClarify the set_session_id_context functions
Matt Caswell [Mon, 13 Apr 2026 13:27:58 +0000 (14:27 +0100)] 
Clarify the set_session_id_context functions

Clarify when they can be used, and introduce some warnings about using
them too late in the handshake. In particular using them in the server
name callback is too late.

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 16:46:26 2026
(Merged from https://github.com/openssl/openssl/pull/30797)

4 days agoFix constant-time violation in ossl_curve448_scalar_halve
Lukas Gerlach [Wed, 15 Apr 2026 13:52:46 +0000 (15:52 +0200)] 
Fix constant-time violation in ossl_curve448_scalar_halve

Add a value barrier to the mask variable in ossl_curve448_scalar_halve()
to prevent LLVM SimpleLoopUnswitchPass from introducing a
secret-dependent branch.

When compiled with Clang >= 17 at -O3, the mask which is static during
the loop (derived from the secret scalar LSB) is used by SimpleLoopUnswitchPass
to clone the loop body into two versions guarded by a branch on the secret bit.
This produces a side-channel that leaks nonce parity.

The value barrier forces the compiler to treat the mask as opaque,
preventing loop unswitching while maintaining identical performance.

A portable value_barrier_c448 macro is added to word.h to select the
appropriate barrier width (32 or 64 bit) based on C448_WORD_BITS.

Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 16:43:22 2026
(Merged from https://github.com/openssl/openssl/pull/30845)

4 days agoForward port release update commit to master branch
openssl-machine [Tue, 14 Apr 2026 12:04:16 +0000 (12:04 +0000)] 
Forward port release update commit to master branch

Bring NEWS.md/CHANGES.md into line with updates on the 4.0 branch

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Thu Apr 16 16:27:47 2026
(Merged from https://github.com/openssl/openssl/pull/30830)

4 days agoTLSv1.3: reissue session ticket after full handshake on ciphersuite mismatch
Daniel Kubec [Mon, 30 Mar 2026 11:43:41 +0000 (13:43 +0200)] 
TLSv1.3: reissue session ticket after full handshake on ciphersuite mismatch

When session resumption falls back to a full handshake due to a ciphersuite
mismatch, ensure a new session ticket is issued with the newly negotiated
ciphersuite.

Fixes #18549

Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Matt Caswell <matt@openssl.foundation>
MergeDate: Thu Apr 16 11:27:51 2026
(Merged from https://github.com/openssl/openssl/pull/30626)

4 days agossl: Fix ssl_do_config to clean up errors on success with ERR_set_mark
Gellért Peresztegi-Nagy [Fri, 10 Apr 2026 16:45:55 +0000 (17:45 +0100)] 
ssl: Fix ssl_do_config to clean up errors on success with ERR_set_mark

ssl_do_config() could leave stale errors on the error stack even on
success, so that later error checking operations could mistakenly
surface these errors. Use ERR_set_mark()/ERR_pop_to_mark() to cleanly
discard errors when the function succeeds or when system config errors
are non-fatal.

Fixes #30760

Co-authored-by: Brandon Allard <brandon@redpanda.com>
Reviewed-by: Matt Caswell <matt@openssl.foundation>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
MergeDate: Thu Apr 16 11:24:56 2026
(Merged from https://github.com/openssl/openssl/pull/30765)

4 days agoossl-guide-migration.pod: tfixes in TLS fixed ver meth deprecation desc
Eugene Syromiatnikov [Tue, 14 Apr 2026 09:50:40 +0000 (11:50 +0200)] 
ossl-guide-migration.pod: tfixes in TLS fixed ver meth deprecation desc

Change duplicating names of the suggested function names from TLS_* to DTLS_*
ones and fix the case of "API".

Co-Authored-by: Frederik Wedel-Heinen <frederik.wedel-heinen@dencrypt.dk>
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
MergeDate: Thu Apr 16 11:19:19 2026
(Merged from https://github.com/openssl/openssl/pull/30819)

4 days agoAdd regression tests to `test/evp_extra_test.c` that dynamically
jlg1061 [Mon, 2 Mar 2026 13:37:16 +0000 (13:37 +0000)] 
Add regression tests to `test/evp_extra_test.c` that dynamically
discover all provided ciphers with non-zero IV length and verify
correct multi-step initialization semantics.

The EVP API permits key and IV to be supplied in separate
`EVP_CipherInit_ex()` calls (e.g. key-only followed by IV-only).
A recent bug (PR #29934, ASCON-AEAD128) demonstrated that a
provider may silently ignore a key-only init, resulting in reuse
of a previously loaded key during a subsequent IV-only init.

To prevent similar regressions, this change introduces three
generic tests that automatically cover all IV-taking ciphers:

Verifies that:
- `init(key) → init(iv)`
- `init(iv) → init(key)`

produce identical ciphertext (and authentication tag for AEAD
ciphers) compared to single-call `init(key, iv)`.

Primes a context with `key1/iv1`, then re-initializes via
`init(key2) → init(iv2)` and verifies the output matches a fresh
`encrypt(key2, iv2)` operation, ensuring that no previously stored
key is reused.

Encrypts using single-call initialization and then decrypts using
multi-step initialization, verifying plaintext recovery. For AEAD
ciphers, this also exercises tag verification through the
multi-step path.

Ciphers are discovered using `EVP_CIPHER_do_all_provided()`,
requiring no maintenance when new IV-taking ciphers are added.
SIV mode is skipped due to its synthetic IV semantics. CCM mode
handling includes required length declarations.

This provides broad regression coverage for the provider
implementations that support multi-step EVP initialization.

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Thu Apr 16 07:08:17 2026
(Merged from https://github.com/openssl/openssl/pull/30141)

4 days agoFix broken sslapitest with old FIPS providers
Tomas Mraz [Thu, 16 Apr 2026 05:47:01 +0000 (07:47 +0200)] 
Fix broken sslapitest with old FIPS providers

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Thu Apr 16 06:34:31 2026
(Merged from https://github.com/openssl/openssl/pull/30858)

5 days agotest/quicapitest.c: restore array formatting butchered by clang-format
Eugene Syromiatnikov [Thu, 26 Mar 2026 04:57:01 +0000 (05:57 +0100)] 
test/quicapitest.c: restore array formatting butchered by clang-format

Shut off clang-format, as it is incapable of formatting arrays properly,
and just mangles everything instead.  Also, while at it, drop the trailing
commas from TPARAM_CHECK_* definitions, as they are pretty confusing.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:45:37 2026
(Merged from https://github.com/openssl/openssl/pull/30580)

5 days agorun-checker-ci.yml, run-checker-merge: add -DOPENSSL_USE_IPV6=0
Eugene Syromiatnikov [Thu, 26 Mar 2026 04:55:23 +0000 (05:55 +0100)] 
run-checker-ci.yml, run-checker-merge: add -DOPENSSL_USE_IPV6=0

Add -DOPENSSL_USE_IPV6=0 to run-checker-ci.yml and move no-ui
to run-checker-merge.

References: https://github.com/openssl/openssl/issues/30574
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:45:34 2026
(Merged from https://github.com/openssl/openssl/pull/30580)

5 days agoAvoid creating TLSProxy on IPv6 loopback address is IPv6 is disabled
Eugene Syromiatnikov [Thu, 26 Mar 2026 04:52:40 +0000 (05:52 +0100)] 
Avoid creating TLSProxy on IPv6 loopback address is IPv6 is disabled

Add a parameter to TLSProxy::Proxy->new()
and TLSProxy::Proxy->new_dtls() that indicates IPv6 usage preference
and pass have_IPv6() to it, so IPv6 usage is avoided when it is disabled.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:45:33 2026
(Merged from https://github.com/openssl/openssl/pull/30580)

5 days agotest/quicapitest.c: skip test_quic_peer_addr_v6() if IPv6 is disabled
Eugene Syromiatnikov [Thu, 26 Mar 2026 04:40:04 +0000 (05:40 +0100)] 
test/quicapitest.c: skip test_quic_peer_addr_v6() if IPv6 is disabled

Define and add the test only if OPENSSL_USE_IPV6 is set to 1.

Resolves: https://github.com/openssl/openssl/issues/30574
Fixes: beec4e146a9e "Add SSL_get_peer_addr() function to query peer address for QUIC"
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:45:31 2026
(Merged from https://github.com/openssl/openssl/pull/30580)

5 days agoinclude/openssl/x509_acert.h.in: add extern "C" linkage specification for C++
Eugene Syromiatnikov [Mon, 13 Apr 2026 12:11:49 +0000 (14:11 +0200)] 
include/openssl/x509_acert.h.in: add extern "C" linkage specification for C++

Fixes: dcee34c8f921 "Add RFC 5755 attribute certificate support"
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
MergeDate: Wed Apr 15 12:36:41 2026
(Merged from https://github.com/openssl/openssl/pull/30796)

5 days agodoc: clarify -hex option behavior in openssl prime
kovan [Mon, 2 Feb 2026 12:30:15 +0000 (13:30 +0100)] 
doc: clarify -hex option behavior in openssl prime

The -hex option description was ambiguous about its exact behavior.
Clarify that:
- With -generate: outputs the prime in hex instead of decimal
- When checking: interprets input as hex instead of decimal
- Output when checking is always hex regardless of this option

Fixes #19208

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
MergeDate: Wed Apr 15 12:33:18 2026
(Merged from https://github.com/openssl/openssl/pull/29913)

5 days ago.github/workflows/coveralls.yml: move the master branch to the top of the matrix
Eugene Syromiatnikov [Mon, 13 Apr 2026 11:56:17 +0000 (13:56 +0200)] 
.github/workflows/coveralls.yml: move the master branch to the top of the matrix

So its config options can be copied into a newly created branch more naturally.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:30:38 2026
(Merged from https://github.com/openssl/openssl/pull/30785)

5 days ago.github/workflows/coveralls.yml: enable allocafil tests on openssl-4.0
Eugene Syromiatnikov [Mon, 13 Apr 2026 11:55:16 +0000 (13:55 +0200)] 
.github/workflows/coveralls.yml: enable allocafil tests on openssl-4.0

This really should have been done when the branch was added, but better
late than never.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:30:37 2026
(Merged from https://github.com/openssl/openssl/pull/30785)

5 days ago.github/workflows/coveralls.yml: add enable-lms to openssl-3.6 and openssl-4.0 configs
Eugene Syromiatnikov [Sun, 12 Apr 2026 14:59:19 +0000 (16:59 +0200)] 
.github/workflows/coveralls.yml: add enable-lms to openssl-3.6 and openssl-4.0 configs

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:30:35 2026
(Merged from https://github.com/openssl/openssl/pull/30785)

5 days ago.github/workflows/coveralls.yml: drop no-afalgeng from openssl-4.0 config
Eugene Syromiatnikov [Sun, 12 Apr 2026 14:58:35 +0000 (16:58 +0200)] 
.github/workflows/coveralls.yml: drop no-afalgeng from openssl-4.0 config

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:30:34 2026
(Merged from https://github.com/openssl/openssl/pull/30785)

5 days ago.github/workflows/coveralls.yml: drop EOL branches from the run matrix
Eugene Syromiatnikov [Sun, 12 Apr 2026 13:31:47 +0000 (15:31 +0200)] 
.github/workflows/coveralls.yml: drop EOL branches from the run matrix

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:30:33 2026
(Merged from https://github.com/openssl/openssl/pull/30785)

5 days agoDocument ASN1_BIT_STRING functions
Norbert Pocs [Tue, 31 Mar 2026 14:45:43 +0000 (16:45 +0200)] 
Document ASN1_BIT_STRING functions

Signed-off-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Wed Apr 15 12:25:45 2026
(Merged from https://github.com/openssl/openssl/pull/30690)

5 days agoUpdate S/MIME tool documentation
Taavi Eomäe [Thu, 26 Mar 2026 11:48:07 +0000 (13:48 +0200)] 
Update S/MIME tool documentation

CLA: trivial

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
MergeDate: Wed Apr 15 12:19:04 2026
(Merged from https://github.com/openssl/openssl/pull/30583)

5 days agodoc: clarify -CAfile and -verifyCAfile semantics in s_server
Josh Auler [Thu, 12 Mar 2026 05:07:42 +0000 (01:07 -0400)] 
doc: clarify -CAfile and -verifyCAfile semantics in s_server

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
MergeDate: Wed Apr 15 12:11:34 2026
(Merged from https://github.com/openssl/openssl/pull/30405)

5 days agodoc: Clarify that BN_CTX must not be NULL for BN arithmetic functions
kovan [Tue, 27 Jan 2026 05:16:06 +0000 (06:16 +0100)] 
doc: Clarify that BN_CTX must not be NULL for BN arithmetic functions

The documentation for BN_add and related functions did not explicitly
state that the ctx parameter cannot be NULL. Users may assume NULL is
acceptable since some other OpenSSL functions allow it, but passing
NULL to functions like BN_mod_add() or BN_mod() causes a crash.

Update the documentation to explicitly state that ctx must not be NULL.

Fixes #12092

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
MergeDate: Wed Apr 15 11:47:59 2026
(Merged from https://github.com/openssl/openssl/pull/29773)

5 days agoFix memory leak in ossl_uint_set_insert()
Alexandr Nedvedicky [Wed, 8 Apr 2026 09:55:24 +0000 (11:55 +0200)] 
Fix memory leak in ossl_uint_set_insert()

There is a missing call to OPENSSL_free() in the branch
where existing sets are merged to new range. There is
no evidence/POC OpenSSL poject is aware of the leak can
be triggered by QUIC protocol operation.

The issue has been kindly reported by Abhinav Agarwal (@abhinavagarwal07)

Fixes: c5ca718003e6 "uint_set: convert uint_set to use the list data type"
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr 15 11:28:41 2026
(Merged from https://github.com/openssl/openssl/pull/30718)

5 days agoriscv: fix missing VLEN >= 128 guard in AES-GCM dispatch
Christoph Müllner [Tue, 7 Apr 2026 21:05:24 +0000 (23:05 +0200)] 
riscv: fix missing VLEN >= 128 guard in AES-GCM dispatch

ossl_prov_aes_hw_gcm() returned &rv64i_zvkned_gcm when
RISCV_HAS_ZVKNED() was true but RISCV_HAS_ZVKB()/RISCV_HAS_ZVKG()
were false, without checking riscv_vlen() >= 128. All Zvkned
instructions require VLEN >= 128; on VLEN=64 hardware this would
cause illegal-instruction traps.

All other Zvk* dispatch sites already guard on riscv_vlen() >= 128.
Hoist the check to the outer if (RISCV_HAS_ZVKNED()) condition to
cover both return paths uniformly.

Fixes: d056e90ee58a "riscv: Provide vector crypto implementation of AES-GCM mode."
Signed-off-by: Christoph Müllner <christoph.muellner@vrull.eu>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Wed Apr 15 11:24:50 2026
(Merged from https://github.com/openssl/openssl/pull/30714)

5 days agoecp_s390x_nistp.c: reorder nullptr checks
Joshua Rogers [Sat, 4 Apr 2026 09:20:01 +0000 (17:20 +0800)] 
ecp_s390x_nistp.c: reorder nullptr checks

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr 15 11:01:22 2026
(Merged from https://github.com/openssl/openssl/pull/30648)

5 days agoecp_s390x_nistp.c: Reject negative digest length to prevent size_t underflow
Joshua Rogers [Tue, 31 Mar 2026 15:53:47 +0000 (23:53 +0800)] 
ecp_s390x_nistp.c: Reject negative digest length to prevent size_t underflow

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr 15 11:01:20 2026
(Merged from https://github.com/openssl/openssl/pull/30648)

5 days agoossl-guide-migration: Fix ASN1_STRING_ functions formatting
Jon Ericson [Tue, 7 Apr 2026 04:49:33 +0000 (21:49 -0700)] 
ossl-guide-migration: Fix ASN1_STRING_ functions formatting

keep bold and move to an unordered list

Co-authored-by: Tomáš Mráz <tm@t8m.info>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
MergeDate: Wed Apr 15 10:54:01 2026
(Merged from https://github.com/openssl/openssl/pull/30629)

5 days agoossl-guide-migration: delete duplicate entry
Jon Ericson [Tue, 31 Mar 2026 13:47:00 +0000 (06:47 -0700)] 
ossl-guide-migration: delete duplicate entry

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
MergeDate: Wed Apr 15 10:54:00 2026
(Merged from https://github.com/openssl/openssl/pull/30629)

5 days agoossl-guide-migration: Format function names correctly
Jon Ericson [Mon, 30 Mar 2026 17:05:14 +0000 (10:05 -0700)] 
ossl-guide-migration: Format function names correctly

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
MergeDate: Wed Apr 15 10:53:59 2026
(Merged from https://github.com/openssl/openssl/pull/30629)

5 days agoquic: fix channel leak when ossl_quic_provide_initial_secret fails
Sunwoo Lee [Fri, 27 Mar 2026 23:22:02 +0000 (08:22 +0900)] 
quic: fix channel leak when ossl_quic_provide_initial_secret fails

  In port_bind_channel(), when ossl_quic_provide_initial_secret()
  fails, the function returns without freeing the QUIC_CHANNEL
  that was just created by port_make_channel(). The caller sees
  new_ch == NULL and cannot free it, leaking the channel and all
  its sub-allocations (QRX, QTX, TXP, ACKM).

  Add ossl_quic_channel_free(ch) before the early return, matching
  the cleanup pattern already used by the other error paths in the
  same function (lines 864, 873).

  CWE-401

Reported-by: Sunwoo Lee <sunwoolee@kentech.ac.kr>
  CLA: trivial

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr 15 10:44:51 2026
(Merged from https://github.com/openssl/openssl/pull/30612)

6 days agoWork around "Use of uninitialized value..." in mkinstallvars.pl
Eugene Syromiatnikov [Fri, 10 Apr 2026 17:48:18 +0000 (19:48 +0200)] 
Work around "Use of uninitialized value..." in mkinstallvars.pl

Avoid "Use of uninitialized value in concatenation (.) or string
at util/mkinstallvars.pl line 139." message by supplying COMMENT
in the mkinstallvars.pl call exporters/build.info.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Tue Apr 14 08:54:11 2026
(Merged from https://github.com/openssl/openssl/pull/30768)

6 days agoNOTES-NONSTOP.md: remove the "Linking and Loading Considerations" section
Eugene Syromiatnikov [Sat, 11 Apr 2026 10:16:05 +0000 (12:16 +0200)] 
NOTES-NONSTOP.md: remove the "Linking and Loading Considerations" section

Since the atexit() handler setup was removed in [1], the section content
is no longer relevant;  remove it.

[1] https://github.com/openssl/openssl/pull/29385

References: https://github.com/openssl/openssl/issues/30742
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
MergeDate: Tue Apr 14 08:50:36 2026
(Merged from https://github.com/openssl/openssl/pull/30776)

6 days agoINSTALL.md: mention that no-atexit has no effect
Eugene Syromiatnikov [Sat, 11 Apr 2026 10:14:42 +0000 (12:14 +0200)] 
INSTALL.md: mention that no-atexit has no effect

Since the atexit() handler was removed in [1], no-atexit configuration
option has no effect, so update the documentation accordingly.

[1] https://github.com/openssl/openssl/pull/29385

References: https://github.com/openssl/openssl/pull/30742
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
MergeDate: Tue Apr 14 08:50:35 2026
(Merged from https://github.com/openssl/openssl/pull/30776)

6 days agoAdd docs for new atomic apis
Neil Horman [Thu, 2 Apr 2026 19:24:27 +0000 (15:24 -0400)] 
Add docs for new atomic apis

Documents CRYPTO_atomic_load_ptr(), CRYPTO_atomic_store_ptr() and
CRYPTO_atomic_cmp_exch_ptr()

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Tue Apr 14 08:29:33 2026
(Merged from https://github.com/openssl/openssl/pull/30670)

6 days agoRun make update
Neil Horman [Thu, 2 Apr 2026 19:23:47 +0000 (15:23 -0400)] 
Run make update

Adds CRYPTO_atomic_load_ptr, CRYPTO_atomic_store_ptr and
CRYPTO_atomic_cmp_exch_ptr

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Tue Apr 14 08:29:32 2026
(Merged from https://github.com/openssl/openssl/pull/30670)

6 days agoconvert rand_meth_lock to atomics
Neil Horman [Wed, 1 Apr 2026 18:37:52 +0000 (14:37 -0400)] 
convert rand_meth_lock to atomics

Using our previously created atomic ops, we can (almost) eliminate the
use of the rand_meth_lock.  This lock guards reads/write on the
RAND_default_meth global variable, which is generally written only once
during a process lifetime.  By replacing the lock with an atomic read
for reads, and an atomic compare and exchange or atomic store for
writes, we can significantly improve the execution time of
RAND_get_rand_method, which is called every time a process calls
RAND_bytes_ex()

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Tue Apr 14 08:29:31 2026
(Merged from https://github.com/openssl/openssl/pull/30670)

6 days agoAdd some crypto atomic pointer ops
Neil Horman [Wed, 1 Apr 2026 16:32:40 +0000 (12:32 -0400)] 
Add some crypto atomic pointer ops

CRYPTO_atomic_load_ptr - load a pointer value with relaxed semantics
CRYPTO_atomic_store_ptr - store a pointer value with relaxed semantics
CRYPTO_atomic_cmp_exch_ptr - cmp/exch a pointer with relaxed or acq/rel
                             semantics

The addition of these functions enables us to better use atomics to
replace read/write locks where we are almost always doing reads

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Tue Apr 14 08:29:30 2026
(Merged from https://github.com/openssl/openssl/pull/30670)

6 days agoppc64le: Optimized MLKEM NTT, supports p8 (ISA 2.07) and above architectures.
Danny Tsen [Tue, 7 Apr 2026 13:19:05 +0000 (09:19 -0400)] 
ppc64le: Optimized MLKEM NTT, supports p8 (ISA 2.07) and above architectures.

Optimized MKEM NTT implementation for ppc64le for ISA 2.07 and above architectures.

Supporting files include,
asm/mlkem_ntt_ppc64le.S: supports NTT.
asm/mlkem_intt_ppc64le.S: supports inverse NTT.
asm/mlkem_ppc_macros_asm.S: PPC64LE macros.

Modified build.info to support ppc64le assembly implementation.
Added new definitions of MLKEM_NTT_ASM for NTT and inverse NTT for
optimized assembly implementation.

This is the initial archtecture specific implementation so can be mdified
to adapt to a new build structures.

Baseline speed test:
                               keygen    encaps    decaps keygens/s  encaps/s  decaps/s
                 ML-KEM-512 0.000037s 0.000030s 0.000046s   26744.7   33529.5   21875.6
                 ML-KEM-768 0.000059s 0.000043s 0.000066s   16836.6   23118.8   15198.3
                ML-KEM-1024 0.000088s 0.000060s 0.000089s   11406.2   16749.7   11265.8

Optimized:
                               keygen    encaps    decaps keygens/s  encaps/s  decaps/s
                 ML-KEM-512 0.000023s 0.000015s 0.000022s   42789.9   65006.8   46064.6
                 ML-KEM-768 0.000038s 0.000023s 0.000032s   25983.3   43731.1   31254.7
                ML-KEM-1024 0.000060s 0.000033s 0.000045s   16662.7   30708.2   22034.6

The optimized code runs around 1.9 times faster than the original C implementation.

Tested-by: Eugene Syromiatnikov <esyr@openssl.org>
Signed-off-by: Danny Tsen <dtsen@us.ibm.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
MergeDate: Tue Apr 14 08:23:42 2026
(Merged from https://github.com/openssl/openssl/pull/30709)

7 days agoinclude C++ extern in ech.h
sftcd [Mon, 13 Apr 2026 00:43:04 +0000 (01:43 +0100)] 
include C++ extern in ech.h

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Mon Apr 13 09:57:10 2026
(Merged from https://github.com/openssl/openssl/pull/30790)

7 days agoSkip parsing OCSP status_request when no status call is registered
Brenda So [Mon, 30 Mar 2026 21:32:47 +0000 (14:32 -0700)] 
Skip parsing OCSP status_request when no status call is registered

When no ext.status_cb is set, the server will not produce a stapled
OCSP response. This patch returns early from tls_parse_ctos_status_request
before parsing the extension body to save memory.

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
MergeDate: Mon Apr 13 09:40:08 2026
(Merged from https://github.com/openssl/openssl/pull/30630)

7 days agoWe now have ml-dsa asm, add it to fips-checksums
Tomas Mraz [Thu, 19 Mar 2026 09:58:56 +0000 (10:58 +0100)] 
We now have ml-dsa asm, add it to fips-checksums

We also add other PQC algorithm directories that might
appear in future so they are picked-up by the script
once they appear. This requires checking whether the
directory exists.

Also update the fips sources and checksums.

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Mon Apr 13 09:35:17 2026
(Merged from https://github.com/openssl/openssl/pull/30502)

7 days agoapps : enforce command-line parameter checking.
F. R. Da Silva [Thu, 26 Mar 2026 23:09:23 +0000 (00:09 +0100)] 
apps : enforce command-line parameter checking.

Improve 'verify' option help messages.

integer value parsing formats are:
- 'n' is any integer
- 'N' is a non-negative integer (i.e. value >= 0)
- 'p' is a positive integer (i.e. value > 0)

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
MergeDate: Mon Apr 13 09:30:22 2026
(Merged from https://github.com/openssl/openssl/pull/30476)

7 days agoapps: remove atoi() calls.
Filipe R. Da Silva [Sun, 15 Mar 2026 20:55:42 +0000 (21:55 +0100)] 
apps: remove atoi() calls.

Related to #8216

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
MergeDate: Mon Apr 13 09:30:21 2026
(Merged from https://github.com/openssl/openssl/pull/30476)

7 days agoPrecompute some helper objects in each SSL_CTX
Viktor Dukhovni [Tue, 7 Apr 2026 11:46:58 +0000 (21:46 +1000)] 
Precompute some helper objects in each SSL_CTX

Instead of repeated fetching, precompute the below per the library
context and properties of the SSL_CTX and use them for the lifetime of
the SSL_CTX.

    - HMAC algorithm handle (session ticket HMAC)
    - SHA2-256 algorithm handle (session ticket HMAC)
    - AES_256-CBC algorithm handle (session ticket en/decryption)
    - TLS1 PRF (when TLS <= 1.2 is supported)

The "sha1" and "md5" handles are no longer used, and those fields are
removed.

The `SSL_HMAC` objects used internally are now stack allocated, and the
associated "new" and "free" functions are now called "construct" and
"destruct" respectively.

Reviewed-by: Matt Caswell <matt@openssl.foundation>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Mon Apr 13 09:03:45 2026
(Merged from https://github.com/openssl/openssl/pull/30696)

7 days agoFix no-dtls1_2 test failure
Matt Caswell [Tue, 7 Apr 2026 14:39:42 +0000 (15:39 +0100)] 
Fix no-dtls1_2 test failure

Fix a failure with no-dtls1_2 introduced by the test in #30503

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Mon Apr 13 08:59:03 2026
(Merged from https://github.com/openssl/openssl/pull/30704)

7 days agoci: Use jom to parallize Windows builds
Milan Broz [Sun, 5 Apr 2026 19:24:28 +0000 (21:24 +0200)] 
ci: Use jom to parallize Windows builds

The jom version in choco install is obsolete,
but it works fine for CI.

Users should use jom 1.1.7 or more recent.

Signed-off-by: Milan Broz <gmazyland@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
MergeDate: Mon Apr 13 08:46:21 2026
(Merged from https://github.com/openssl/openssl/pull/30703)

7 days agoWindows: Use /Z7 compiler flag to enable parallel builds
Milan Broz [Thu, 2 Apr 2026 10:51:46 +0000 (12:51 +0200)] 
Windows: Use /Z7 compiler flag to enable parallel builds

MSVC compilation on Windows cannot be reliably parallelized
with tools like jom (an nmake replacement) due to contention
on shared .pdb files used for debug info. Writes to a shared
.pdb must be serialized.

The /FS compiler flag serializes concurrent compiler writes,
but does not resolve contention when the compiler and linker
access the same .pdb file. With shared .pdb files (e.g. app.pdb),
the makefile does not prevent races between the linker and
compilation of multiple targets.

This can be resolved either by restructuring the makefile
to introduce sentinel dependencies that serialize the conflicting
steps, or by eliminating the shared .pdb entirely.

This patch takes the latter approach: it replaces /Zi with /Z7,
which embeds debug info directly into each .obj file and avoids
any shared-file contention. /Z7 is supported by all MSVC versions.

The linker-generated .pdb is unaffected.

Side effects: object files are slightly larger, and all .pdb files
are now named after their target — the shared app.pdb, ossl_static.pdb,
and dso.pdb no longer exist.

With this change, jom can be used to parallelize the build.

Fixes: #9931
Signed-off-by: Milan Broz <gmazyland@gmail.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Norbert Pocs <norbertp@openssl.org>
MergeDate: Mon Apr 13 08:46:20 2026
(Merged from https://github.com/openssl/openssl/pull/30703)

7 days agoOSSL_PARAM_BLD_push_octet_*(): Allow NULL buffer with 0 bsize
Tomas Mraz [Wed, 8 Apr 2026 15:38:51 +0000 (17:38 +0200)] 
OSSL_PARAM_BLD_push_octet_*(): Allow NULL buffer with 0 bsize

Fixes #30728

Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Mon Apr 13 07:47:44 2026
(Merged from https://github.com/openssl/openssl/pull/30730)

7 days agoRemove duplicate function asn1_bit_string_set_unused_bits
Norbert Pocs [Mon, 6 Apr 2026 12:34:08 +0000 (14:34 +0200)] 
Remove duplicate function asn1_bit_string_set_unused_bits

Signed-off-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Mon Apr 13 07:11:12 2026
(Merged from https://github.com/openssl/openssl/pull/30746)

7 days agoRename ossl_asn1_string_set_bits_left to something more expressive
Norbert Pocs [Mon, 6 Apr 2026 12:30:03 +0000 (14:30 +0200)] 
Rename ossl_asn1_string_set_bits_left to something more expressive

Signed-off-by: Norbert Pocs <norbertp@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Mon Apr 13 07:11:11 2026
(Merged from https://github.com/openssl/openssl/pull/30746)

8 days agoquic: fix NULL txl dereference in qtx_resize_txe
Nikolas Gauder [Tue, 17 Mar 2026 19:29:28 +0000 (20:29 +0100)] 
quic: fix NULL txl dereference in qtx_resize_txe

Fixes: 1957148384c7 "QUIC Record Layer (Refactor and TX Side)"
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
MergeDate: Sat Apr 11 20:55:10 2026
(Merged from https://github.com/openssl/openssl/pull/30474)

8 days agostyle: fix clang-format issues in chacha_internal_test.c
Samaresh Kumar Singh [Thu, 2 Apr 2026 20:16:56 +0000 (15:16 -0500)] 
style: fix clang-format issues in chacha_internal_test.c

Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Sat Apr 11 20:06:07 2026
(Merged from https://github.com/openssl/openssl/pull/30587)

8 days agotest/chacha: added ELFv2 ABI FPR preservation check for POWER10 8x path
Samaresh Kumar Singh [Sat, 28 Mar 2026 21:38:35 +0000 (16:38 -0500)] 
test/chacha: added ELFv2 ABI FPR preservation check for POWER10 8x path

On POWER10, ChaCha20_ctr32_vsx_8x is activated for buffers over 255
bytes and uses vxxlor to alias FPR14-FPR25 as temporary storage. Add a
test to chacha_internal_test that pins known values in f14-f25 via
inline asm, calls through ChaCha20_ctr32 with a 512-byte buffer to
trigger the 8x path, and verifies the registers still hold their
original values. The test is gated on PPC_BRD31 (POWER10 capability
flag) so it is skipped silently on older hardware.

Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Sat Apr 11 20:06:05 2026
(Merged from https://github.com/openssl/openssl/pull/30587)

8 days agochacha/asm: save f17 in 8x prologue for contiguous f14-f25 range
Samaresh Kumar Singh [Sat, 28 Mar 2026 19:43:47 +0000 (14:43 -0500)] 
chacha/asm: save f17 in 8x prologue for contiguous f14-f25 range

f17 is not directly clobbered by any vxxlor in this function, but
saving the full contiguous range f14-f25 is cleaner and avoids any
future ambiguity if the code is modified. Adjust all subsequent FPR
slot offsets and the VMX base offset accordingly, and update the frame
size comment.

Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Sat Apr 11 20:06:04 2026
(Merged from https://github.com/openssl/openssl/pull/30587)

8 days agochacha/asm: fix ELFv2 ABI violation in ChaCha20_ctr32_vsx_8x
Samaresh Kumar Singh [Thu, 26 Mar 2026 14:19:22 +0000 (09:19 -0500)] 
chacha/asm: fix ELFv2 ABI violation in ChaCha20_ctr32_vsx_8x

The 8-block POWER10 ChaCha20 path uses vxxlor to spill VMX values into
VSR0-VSR26, which aliases FPR0-FPR26. FPR14-FPR31 are callee-saved per
the ELFv2 ABI, but the function was never saving or restoring them,
silently corrupting 11 FPRs (12 on big-endian) across any call with a
buffer larger than 255 bytes. VMX registers v20-v23, also
callee-saved, had the same problem.

Fix by increasing the frame size to accommodate save slots for
FPR14-FPR25 (and FPR26 on BE) and VMX v20-v23, and adding the
corresponding stfd/lfd and stvx/lvx pairs in the prologue and
epilogue. The VRSAVE save offset is updated to a fixed expression so
it stays clear of the new save area.

Fix for the bug #30584

Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Sat Apr 11 20:06:02 2026
(Merged from https://github.com/openssl/openssl/pull/30587)

8 days agodoc: updates no-pinshared description
Ethan [Fri, 27 Mar 2026 19:15:52 +0000 (15:15 -0400)] 
doc: updates no-pinshared description

The current documentation heavily references the now removed
`atexit()` handlers. This updates the description to better reflect
it's current utility (removal of `-Wl,-znodelete` linker flags on
Linux and Hurd).

Fixes #30586

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
MergeDate: Sat Apr 11 19:44:00 2026
(Merged from https://github.com/openssl/openssl/pull/30606)

8 days agoSetting statem.error_state more carefully
Igor Ustinov [Tue, 31 Mar 2026 14:35:49 +0000 (16:35 +0200)] 
Setting statem.error_state more carefully

Reviewed-by: Matt Caswell <matt@openssl.foundation>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Sat Apr 11 19:31:39 2026
(Merged from https://github.com/openssl/openssl/pull/30647)

8 days agoSSL_use_cert_and_key NPE with provided keys
Viktor Dukhovni [Sat, 4 Apr 2026 14:19:07 +0000 (01:19 +1100)] 
SSL_use_cert_and_key NPE with provided keys

SSL_use_cert_and_key(3) dereferenced a NULL SSL_CTX pointer
via ssl_cert_lookup_by_pkey() when the private key type was
not one of the builtin ones, but was provider-based.

Bug introduced in Postfix 3.2 (commit ee58915cfd9).

Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
MergeDate: Sat Apr 11 19:04:12 2026
(Merged from https://github.com/openssl/openssl/pull/30683)

8 days agoCHANGES.md, NEWS.md: update for 3.6.2
Eugene Syromiatnikov [Sun, 5 Apr 2026 10:54:45 +0000 (12:54 +0200)] 
CHANGES.md, NEWS.md: update for 3.6.2

3.6.2 CHANGES.md includes the following:
 * CVE-2026-2673, CVE-2026-28386, CVE-2026-28387, CVE-2026-28388,
   CVE-2026-28389, CVE-2026-28390, CVE-2026-31789, CVE-2026-31790
 * https://github.com/openssl/openssl/pull/30384
   "Fix #19891 CONNECT request for IPv6 targets in OSSL_HTTP_proxy_connect"
 * https://github.com/openssl/openssl/pull/30411
   "Fix detection of plaintext HTTP over TLS (3.6/3.5 backport)"
 * https://github.com/openssl/openssl/pull/30557
   "re-constructorize the cpuid stuff, but fix riscv to not depend
   on BIO_snprintf."

3.6.2 NEWS.md includes the following:
 * CVE-2026-2673, CVE-2026-28386, CVE-2026-28387, CVE-2026-28388,
   CVE-2026-28389, CVE-2026-28390, CVE-2026-31789, CVE-2026-31790

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Paul Dale <paul.dale@oracle.com>
MergeDate: Sat Apr 11 18:51:42 2026
(Merged from https://github.com/openssl/openssl/pull/30720)

8 days agocurl ECH+QUIC fix
sftcd [Wed, 8 Apr 2026 10:11:37 +0000 (11:11 +0100)] 
curl ECH+QUIC fix

Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Matt Caswell <matt@openssl.foundation>
MergeDate: Sat Apr 11 18:29:37 2026
(Merged from https://github.com/openssl/openssl/pull/30727)

9 days agoFix off-by-one s_client overflows
Matt Caswell [Wed, 8 Apr 2026 15:36:42 +0000 (16:36 +0100)] 
Fix off-by-one s_client overflows

There are one byte buffer overflows possible in s_client's handling
of STARTTLS in various protocols. If a server's response fills the entire
buffer (16k) then we attempt to add a NUL terminator one byte off the end
of the buffer.

This was reported by Igor Morgenstern from AISLE to openssl-security and
assessed by the security team as "bug or hardening only".

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
MergeDate: Sat Apr 11 16:16:24 2026
(Merged from https://github.com/openssl/openssl/pull/30731)

10 days agoUpdate apps/lib/s_cb.c
Sashan [Wed, 1 Apr 2026 06:32:46 +0000 (08:32 +0200)] 
Update apps/lib/s_cb.c

Co-authored-by: Bob Beck <beck@obtuse.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Fri Apr 10 12:22:48 2026
(Merged from https://github.com/openssl/openssl/pull/30596)

10 days agoUpdate apps/lib/s_cb.c
Sashan [Wed, 1 Apr 2026 06:28:31 +0000 (08:28 +0200)] 
Update apps/lib/s_cb.c

Co-authored-by: Bob Beck <beck@obtuse.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Fri Apr 10 12:22:46 2026
(Merged from https://github.com/openssl/openssl/pull/30596)

10 days agofix BIO_vsnprintf() with NULL string arg crash on Solaris 10
Alexandr Nedvedicky [Fri, 27 Mar 2026 08:33:07 +0000 (09:33 +0100)] 
fix BIO_vsnprintf() with NULL string arg crash on Solaris 10

Issue was kindly reported and fixes suggested by @rainerjung

Fixes #30402

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Fri Apr 10 12:22:44 2026
(Merged from https://github.com/openssl/openssl/pull/30596)

12 days agoImprove PBKDF2 password strength too weak error message with arguments 30757/head
Jun Aruga [Mon, 30 Mar 2026 17:21:18 +0000 (18:21 +0100)] 
Improve PBKDF2 password strength too weak error message with arguments

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Eugene Syromiatnikov <esyr@openssl.org>
MergeDate: Wed Apr  8 10:34:20 2026
(Merged from https://github.com/openssl/openssl/pull/30628)

12 days agoevp_skey_test.c: Add test for EVP_SKEY_to_provider cross-provider transfer
Joshua Rogers [Sat, 4 Apr 2026 10:28:46 +0000 (18:28 +0800)] 
evp_skey_test.c: Add test for EVP_SKEY_to_provider cross-provider transfer

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
MergeDate: Wed Apr  8 10:27:04 2026
(Merged from https://github.com/openssl/openssl/pull/30650)

12 days agoevp_skey_test.c: Add test for EVP_SKEY_to_provider same-provider path
Joshua Rogers [Sat, 4 Apr 2026 09:55:34 +0000 (17:55 +0800)] 
evp_skey_test.c: Add test for EVP_SKEY_to_provider same-provider path

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
MergeDate: Wed Apr  8 10:27:03 2026
(Merged from https://github.com/openssl/openssl/pull/30650)

12 days agos_lib.c: Fix refcount leak in EVP_SKEY_to_provider
Joshua Rogers [Tue, 31 Mar 2026 16:02:11 +0000 (00:02 +0800)] 
s_lib.c: Fix refcount leak in EVP_SKEY_to_provider

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
MergeDate: Wed Apr  8 10:27:02 2026
(Merged from https://github.com/openssl/openssl/pull/30650)

12 days agoOPENSSL_secure_malloc.pod: mention CRYPTO_secure_actual_size()
Eugene Syromiatnikov [Mon, 30 Mar 2026 08:30:41 +0000 (10:30 +0200)] 
OPENSSL_secure_malloc.pod: mention CRYPTO_secure_actual_size()

Add mentions to NAME, SYNOPSIS, and RETURN VALUES, and provide a short
description (that it is identical to its OPENSSL_* counterpart)
to DESCRIPTION.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr  8 10:23:57 2026
(Merged from https://github.com/openssl/openssl/pull/30623)

12 days agoOPENSSL_malloc.pod: mention CRYPTO_memdup()
Eugene Syromiatnikov [Mon, 30 Mar 2026 08:27:35 +0000 (10:27 +0200)] 
OPENSSL_malloc.pod: mention CRYPTO_memdup()

Add its mentions to NAME, SYNOPSIS, and RETURN VALUES sections.
Also, while at it, put OPENSSL_{str,strn,mem}dup() with the other
OPENSSL_* interfaces, and add mentions of OPENSSL_str{,n}dup()
to RETURN VALUES.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr  8 10:23:55 2026
(Merged from https://github.com/openssl/openssl/pull/30623)

12 days agoOPENSSL_malloc.pod: mention CRYPTO_aligned_alloc{,_array}() in RETURN VALUES
Eugene Syromiatnikov [Mon, 30 Mar 2026 08:10:35 +0000 (10:10 +0200)] 
OPENSSL_malloc.pod: mention CRYPTO_aligned_alloc{,_array}() in RETURN VALUES

Addition of those has been originally overlooked.

Complements: cc4ea5e00028 "Introduce new internal hashtable implementation"
Complements: fa9b7b930e3e "Add array memory allocation routines"
Complements: 14a24fd14ff7 "doc/man3/OPENSSL_malloc.pod: explicitly document freeptr value on failures"
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr  8 10:23:55 2026
(Merged from https://github.com/openssl/openssl/pull/30623)

12 days agoquic: remove unused scid from port_default_packet_handler
Sunwoo Lee [Fri, 27 Mar 2026 23:58:41 +0000 (08:58 +0900)] 
quic: remove unused scid from port_default_packet_handler

  Remove the scid variable entirely from port_default_packet_handler()
  and all functions that accept it as a parameter. The scid was never
  used meaningfully — cur_remote_dcid is set later during the handshake.

  Remove scid parameter from:
    - port_bind_channel()
    - port_validate_token()
    - ossl_quic_channel_on_new_conn()
    - ossl_quic_bind_channel()
    - ch_on_new_conn_common()

  Remove the cur_remote_dcid = *peer_scid assignment in
  ch_on_new_conn_common() as it wrote dead data.

  CWE-457

Reported-by: Sunwoo Lee <sunwoolee@kentech.ac.kr>
  CLA: trivial

Reviewed-by: Saša Nedvědický <sashan@openssl.org>
Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr  8 10:21:55 2026
(Merged from https://github.com/openssl/openssl/pull/30611)

12 days agocrypto/pkcs12/p12_add.c: Restore ERR_set_mark and ERR_pop_to_mark
Jun Aruga [Fri, 27 Mar 2026 18:16:55 +0000 (18:16 +0000)] 
crypto/pkcs12/p12_add.c: Restore ERR_set_mark and ERR_pop_to_mark

The commit <2ea6e785f526f88f913cc6f49372aae9dc54bc63> removed the
ERR_set_mark and ERR_pop_to_mark calls before and after the EVP_CIPHER_fetch
call in several files.

However, in PKCS12_pack_p7encdata_ex, crypto/pkcs12/p12_add.c, there is a valid
case that EVP_CIPHER_fetch returns NULL, raising an error, and calls
PKCS5_pbe_set_ex. The case is such as PBE-SHA1-3DES.

PKCS12_pack_p7encdata_ex, crypto/pkcs12/p12_add.c:
```
...
    pbe_ciph = EVP_CIPHER_fetch(ctx, OBJ_nid2sn(pbe_nid), propq);

    if (pbe_ciph != NULL) {
        pbe = PKCS5_pbe2_set_iv_ex(pbe_ciph, iter, salt, saltlen, NULL, -1, ctx);
    } else {
        pbe = PKCS5_pbe_set_ex(pbe_nid, iter, salt, saltlen, ctx);
    }
...
```

So, we need to restore ERR_set_mark and ERR_pop_to_mark calls before and after
the EVP_CIPHER_fetch call for this case.

A reproducer is below.

```
$ openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -nodes \
  -subj "/CN=Test" 2> /dev/null
$ openssl pkcs12 \
    -export -in cert.pem -inkey key.pem -out test.p12 -passout pass: \
    -keypbe PBE-SHA1-3DES -certpbe PBE-SHA1-3DES
40276EC7677F0000:error:0308010C:digital envelope routines:inner_evp_generic_fetch:unsupported:crypto/evp/evp_fetch.c:376:Global default library context, Algorithm (PBE-SHA1-3DES : 0), Properties (<null>)
$ echo $?
0
```

80-test_pkcs12.t: Add test_pkcs12_passcerts_legacy_outerr2_empty test to test
this change.

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
MergeDate: Wed Apr  8 10:09:07 2026
(Merged from https://github.com/openssl/openssl/pull/30607)

12 days agoquic_channel.c: avoid clipping in ack_delay_exponent/disable_active_migration setters
Eugene Syromiatnikov [Wed, 18 Mar 2026 09:13:26 +0000 (10:13 +0100)] 
quic_channel.c: avoid clipping in ack_delay_exponent/disable_active_migration setters

Avoid clipping of the provided values in setters due to type casting
by checking the values agains the type-specific maximum beforehand.

Fixes: 35dc6c353bfe "QUIC: Make more transport parameters configurable"
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr  8 10:05:27 2026
(Merged from https://github.com/openssl/openssl/pull/30485)

12 days agoquic_channel.c: avoid integer overflow in ossl_quic_channel_set_max_data_request
Eugene Syromiatnikov [Wed, 18 Mar 2026 09:03:08 +0000 (10:03 +0100)] 
quic_channel.c: avoid integer overflow in ossl_quic_channel_set_max_data_request

Check that DEFAULT_CONN_RXFC_MAX_WND_MUL * max_data multiplication
will not overflow uint64_t data type before performing it.

Fixes: 35dc6c353bfe "QUIC: Make more transport parameters configurable"
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr  8 10:05:26 2026
(Merged from https://github.com/openssl/openssl/pull/30485)

12 days agoquic_channel.c: check the setters return values
Eugene Syromiatnikov [Wed, 18 Mar 2026 08:59:31 +0000 (09:59 +0100)] 
quic_channel.c: check the setters return values

...and call them before updating QUIC_CHANNEL parameters.
Unchecked return value has been initially reported by Coverity
for ossl_quic_rxfc_init() call in ossl_quic_channel_set_max_data_request(),
but also seems to be relevant for ossl_quic_channel_set_max_streams_request()
and ossl_quic_channel_set_ack_delay_exponent_request().

Resolves: https://scan5.scan.coverity.com/#/project-view/65248/10222?selectedIssue=1689768
Fixes: 35dc6c353bfe "QUIC: Make more transport parameters configurable"
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.foundation>
MergeDate: Wed Apr  8 10:05:25 2026
(Merged from https://github.com/openssl/openssl/pull/30485)