You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Squashed 'openssl/' changes from 0893a623535..c4da9ac23de
c4da9ac23de Prepare for release of 3.5.3
9dc1518642e make update
c836d8f2b11 Copyright year updates
9a267ece9ba CHANGES.md, NEWS.md: update for 3.5.3
5cc789333c1 Test failure of rsa_encrypt when buffer too short
0b776b5fcfa Harden RSA public encrypt
9b14e143464 OSSL_CALLBACK.pod: add missing info on required return values of callback functions
2fbe8461466 doc: Add missing commas
0369c2e8b5e Add one more trace message to the torture_rcu_high test
ae09a87326d doc/man3/RAND_load_file.pod: RAND_load_file on non-regular files with bytes=-1
c8d905b56c8 crypto/rand/randfile.c: avoid signed integer overflow in RAND_load_file
322be75a18a Make the Unix build process more repeatable
ecdcc7ba285 openssl-enc.pod.in: We actually use PKCS#7 padding
f7f31c45f33 RISC-V: Use address for vlenb CSR
cd31b027a8c Add a helper function to delete the extension list
1a43e10eb26 Clear the extension list when removing the last extension
56011947556 Fix typo in BN_generate_prime docs
e7056b53318 doc: Update documentation of SSL_CTX_set_dh_auto()
55f8bb10132 docs: Be case specific with links to man headers
2e5885d9737 apps: remove chopup_args()
9d8107751c6 hmac: stop using secure memory for the HMAC key
d3dd2c8612d demos/certs: properly handle "$@"
8b690e28182 apps/ocsp.c: avoid using NULL resp
7766151ad16 crypto/x509/t_req.c: avoid exts leaking on error paths
676fbb064a7 test/radix/quic_bindings.c: move locking after child_script_info assignment
fd44a134fdd doc/man1/openssl-enc.pod.in: document 'k' handling for -bufsize
96fa1f32840 apps/enc.c: avoid signed integer overflow on bufsize assignment
f89c3756dc7 slh-dsa: omit test of import PCT
8f395d322b3 import pct: remove import PCTs for most algorithms
a912c48f388 Add missing unlock to ossl_provider_new
e551da690cc Update news and changes for the 3.5.3 release
7e9498b5c7f X509_VERIFY_PARAM_get0(): add check to defend on out-of-bound table access
c9ec0346e15 FIPS: Don't allow SHA512-224 and SHA512-256 for ECDSA/DSA signatures
1d30a87dbfd slh-dsa: enter FIPS error state if pairwise test fails
b7602f10a86 Document the OSSL_SELF_TEST_TYPE_PCT_IMPORT failure state
017a65c59bc ml-kem: convert to transient error state on import failure in FIPS provider
5baef020830 ml-dsa: convert to transient error state on import failure in FIPS provider
119a7f4d808 ecx: convert to transient error state on import failure in FIPS provider
38cfb38a661 ec: convert to transient error state on import failure in FIPS provider
d923468e475 dh: convert to transient error state on import failure in FIPS provider
ee5a29b6756 rsa: convert to transient error state on import failure in FIPS provider
d4dfefef6ab Add OSSL_SELF_TEST_TYPE_PCT_IMPORT transient error state
a6747a8b443 add new error
2ead3ab8ca7 slh-dsa: add a PCT for key import when in FIPS mode
512f1ffd53a NOTES-WINDOWS.md: correct the Windows context macro name
b6ff32f7461 doc: Fix function name in example code
c744216296d aes-s390x.pl: Initialize reserved and unused memory
0798de99fa2 doc/man3/SSL_poll.pod: mention SSL_POLL_EVENT_{EL,IC} in SYNOPSIS
a2eea2926ef Fix: Add free to avoid memory leak.
71e7f4eceab Correct fixed cert validity end date in oqsprovider testing
fcbd13d843a dh: add FIPS 140-3 PCT on key generation
0163c6ad1f7 Fix null pointer check in pkey_dh_derive to ensure both keys are set
7e8d78d5795 Fix: Check for wrong object. The converted sc should be checked instead of the original s
f86e7107ab5 Fix reallocation failure condition in qtx_resize_txe()
65c1c7e6aac Make error checks on RSA_public_decrypt() consistent
cabfbebbd60 Fix a race in by_store_subject
59057effd4f Add a test for accessing an X509_STORE from multiple threads
c4c92f3e8af Don't keep the store open in by_store_ctrl_ex
efa495c92b6 fips: upgrade self-test KATs to reduce SHA-1/SHA-224 usage
a7f52c976c8 Test setting a client to send a key share not allowed in TLSv1.3
610cc1e7ad1 Fail immediately if we have no key shares to send
ffacc17def6 BIO_dgram: Fix BIO_CTRL_DGRAM_QUERY_MTU for IPv4-mapped IPv6 addresses
4376c9571a3 d2i_X509.pod: add missing doc of return value of i2d_ASN1_bio_stream()
e4c515833d5 fix asn1_write_micalg() in asn_mime.c on GostR3411 and SHAKE
3c7812decde apps/cms.c: add missing error message on error writing CMS output (ret == 6)
eea39c1a811 test/ml_kem_internal_test.c: Add EVP_MD_free() in the error path to avoid memory leak
7ba09090bca Add CRYPTO_FREE_REF to ossl_quic_free_token_store
ec5f97a4f1d Add test coverage for PKCS7_TEXT mode
f3b0e8a5180 DH private key size was one bit too large
229bc343130 Correct the synthetisized OPENSSL_VERSION_NUMBER
f2adaa2b60d Remove OSSL_CRYPTO_ALLOC attribute from CRYPTO_*dup routines
85f39c62f59 Add NULL check
5c8a3e06c97 Fix SKEYMGMT enumeration, add tests
71f3205fe4a doc/man3/SSL_CTX_set_domain_flags: fix version in HISTORY section
2ff0180e6b3 test/sanitytest.c: fix setitimer usage in timer disarmament
cf3a4bf1075 Fix memory leak on EVP_CIPHER_param_to_asn1 failure
a0ce39d9fd6 Fix RSA key size validation in EVP_PKEY_RSA_keygen demo
c3572c5f809 crypto/sleep.c: avoid returning early due to signal
0fa07898e1e Ensure that the largest_pn values are migrated to our channel qrx
5cedd0e22d9 quic_channel: Handle HRR and the second transport params extension
6d2772822c0 quicapitest: Check if we can handle HRR
17a20fdcfa4 ssl/quic/quic_channel.c: Fix endianness of supported versions from received version negotiation packets
d4ab1630908 ssl/quic/quic_port.c: Fix endianness of supported versions in sent version negotiation packets
4fb6c93b93f Prepare for 3.5.3
git-subtree-dir: openssl
git-subtree-split: c4da9ac23de497ce039a102e6715381047899447
0 commit comments