Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
2351 commits
Select commit Hold shift + click to select a range
5003be6
ech_ssl_apis.c: Check some invalid argument passing
t8m Sep 18, 2025
676b8d8
ech_store.c: Fix casts and avoid leaks on error return
t8m Sep 18, 2025
a732ff7
Fix a client-auth bug introduced by ECH code
sftcd Sep 15, 2025
a2e5848
s_client and s_server options for ECH
sftcd Aug 14, 2025
df8f3cc
ECH: Properly apply libctx and propq from SSL_CTX
t8m Dec 18, 2025
5308da8
ech_read_priv_echconfiglist(): Pass encodedlen to BIO_new_mem_buf()
sftcd Nov 25, 2025
c7e7b78
Document that SSL_OP_ECH_TRIALDECRYPT can cause DoS in some circumsta…
sftcd Nov 25, 2025
acda536
ssl_choose_server_version(): With ECH check if connection is TLSv1.3
sftcd Dec 18, 2025
f45c7fe
ech_test.c: Add test for trying ECH with TLSv1.2
sftcd Dec 18, 2025
706e5f4
tls_process_server_hello(): With retry config validate the outer host…
sftcd Dec 18, 2025
0bdae60
ossl_ech_get_retry_configs(): Check for integer overflow
sftcd Dec 18, 2025
5e5a76f
Add tests and documentation and fix a couple of issues identified by …
sftcd Nov 23, 2025
0e8559b
ech_check_format(): Fix potential out of bounds read
sftcd Feb 17, 2026
b320fa3
ECH: avoid pointer aliasing in tls_construct_ctos_psk()
sftcd Feb 17, 2026
2230c67
ECH: change from I-D to RFC 9849 and resolve TODO(ECH) cases
sftcd Feb 17, 2026
dba0ecd
ECH: Use BIO_puts when appropriate
t8m Feb 18, 2026
22c0515
ECH: Remove whitespace at EOL or EOF
t8m Feb 18, 2026
6fb07d7
require manual build for external ECH tests
sftcd Feb 17, 2026
2a21345
Removing some more EVP_get_smtbysmth calls
beldmit Feb 16, 2026
06cff36
Constify X509_REQ_get1_email, X509_get1_email and X509_get1_ocsp.
mbroz Feb 19, 2026
79c0985
Constify X509_print_fp and X509_print_ex_fp
nhorman Feb 18, 2026
946391a
New decoder generator returns matched field count
Feb 9, 2026
917d286
SM2 digest sign/verify context initialisation fix
Feb 10, 2026
522ee71
Implement default SM2 distinguished identifier
Feb 11, 2026
1409546
New SM2 "tls-version" signature parameter
Feb 10, 2026
9cd6315
Pass tls-version to cert sign/verify algorithms
Feb 10, 2026
7684408
Use algorithm name macros instead of literals
Feb 10, 2026
a168925
Support for RFC8998 curveSM2 + hybrid
Feb 10, 2026
913e1d4
Document ECDH over SM2 key exchange.
Feb 8, 2026
1079919
Add curveSM2 and curveSM2MLKEM768 TLS test.
mbroz Feb 11, 2026
5093d72
New SSL tests for SM2 cert and key exchange
Feb 11, 2026
5cefb82
Refactor openssl-speed(1)
Feb 10, 2026
db28160
CHANGE log additions
Feb 18, 2026
c7f2651
X509V3_set_ctx(): Improve error handling using this function, mostly …
DDvO Aug 19, 2021
1c34275
X509V3_set_nconf(): Improve error handling using this function, mostl…
DDvO Aug 23, 2021
b132345
Constify X509_chain_check_suiteb
bob-beck Feb 17, 2026
13ee7ea
Fix broken strict-warnings build in sskdf and x963kdf
nhorman Feb 20, 2026
7875854
Add a changes entry for the x509 time function changes
bob-beck Feb 19, 2026
76f8005
Return the correct error message in ossl_X509_print_ex_brief
bob-beck Feb 19, 2026
104ec0d
Constify X509_CRL_get0_by_cert
nhorman Feb 19, 2026
1f8b10b
Constify X509_CRL_get0_by_cert
Feb 19, 2026
3be1254
Correct the instructions for how to run the krb5 external test.
bob-beck Feb 20, 2026
eed2a1f
cmp_ctx.c OSSL_CMP_CTX_new(): update and/or comment the default PBM p…
DDvO Apr 2, 2025
5cbf8ce
OSSL_CRMF_MSG_centralkeygen_requested(): change confusing paramter na…
DDvO Feb 26, 2025
9c32abf
Added BIO_set_send_flags() function to set flags passed to send(), se…
igus68 Feb 17, 2026
c8c8fcc
preserve data constness when getting issuer name's and subject's hash
dpronin Nov 19, 2024
3954813
Fix the uses of X509_check_certificate_times
levitte Feb 19, 2026
3434087
Constify various functions that were non const due to extension cache
bob-beck Feb 17, 2026
946b4ca
Constify X509_STORE_add_cert()
bob-beck Feb 18, 2026
4f73575
Update documentation with guidelines for commit and PR messages
paulidale Feb 19, 2026
43fc670
Added Nvidia/Olympus CPU dispatch to enable optimal SHA3/EOR3 on Vera…
izard Feb 10, 2026
0da2990
Constify X509_find_by_subject
nhorman Feb 19, 2026
dbc2e10
Ensure we don't leak heap in ossl_rcu_lock_free
nhorman Feb 19, 2026
f584ae9
Let's support multiple names for certificate verification
bob-beck Dec 20, 2025
0b43f11
Update crypto/x509/v3_utl.c
bob-beck Jan 28, 2026
be38e56
Update crypto/x509/v3_utl.c
bob-beck Jan 28, 2026
a26131e
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod
bob-beck Feb 3, 2026
6b4f803
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod
bob-beck Feb 3, 2026
54c4a4b
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod
bob-beck Feb 3, 2026
401e9f2
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 3, 2026
52f00eb
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 3, 2026
7352f44
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod
bob-beck Feb 3, 2026
de14306
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 3, 2026
99429c8
derp
bob-beck Feb 3, 2026
166caf6
Mention ASCII vs Non ASCII localparts
bob-beck Feb 3, 2026
87337dd
Address Viktor's review around label checks
bob-beck Feb 3, 2026
8b09d0b
Ensure we use the correct '@' in an email and raise an error when we …
bob-beck Feb 4, 2026
84a6c9b
Allow for a leading . for wildcard like matches
bob-beck Feb 4, 2026
a16da68
Add a test for using a leading . for verification of a domain name
bob-beck Feb 4, 2026
b1bce1a
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 5, 2026
cde3c0b
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 5, 2026
74fdd73
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 5, 2026
2bfe320
Update crypto/x509/x509_vpm.c
bob-beck Feb 5, 2026
22b02d9
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 5, 2026
27c995f
Update crypto/x509/x509_vpm.c
bob-beck Feb 5, 2026
89bb36f
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 5, 2026
ce4faf0
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 5, 2026
c2ac335
Fix up bug found by nhorman on review. Thanks!
bob-beck Feb 18, 2026
4553c79
Fix misplaced check spotted by vitkor
bob-beck Feb 18, 2026
cb1645e
Add a changes entry
bob-beck Feb 19, 2026
b5dbe10
Update doc/man3/SSL_set1_host.pod
bob-beck Feb 21, 2026
e593c39
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod
bob-beck Feb 21, 2026
29a9e79
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod
bob-beck Feb 21, 2026
2839ed3
Update ssl/ssl_lib.c
bob-beck Feb 21, 2026
8edf240
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod
bob-beck Feb 21, 2026
5bcbf65
Update doc/man3/X509_VERIFY_PARAM_set_flags.pod
bob-beck Feb 21, 2026
5e31efd
Update CHANGES.md
bob-beck Feb 21, 2026
ca13f11
Update CHANGES.md
bob-beck Feb 21, 2026
308bac4
Update CHANGES.md
bob-beck Feb 21, 2026
4676ea7
Update CHANGES.md
bob-beck Feb 21, 2026
f25ebc9
Correct rename of variable that went one bikeshed too far
bob-beck Feb 22, 2026
518b6ab
Fix being hoist on my own petard by my kind Irish friend.
bob-beck Feb 22, 2026
15b11a1
Revert "Update doc/man3/SSL_set1_host.pod"
bob-beck Feb 22, 2026
3922b1f
Correct synopsis for SSL_set1_ipaddr
bob-beck Feb 22, 2026
ccc6935
Correct man page args to be consistant
bob-beck Feb 23, 2026
c6bbba0
Add missing valgrind supressions
nhorman Feb 11, 2026
0ace7b7
Fix a legitimate leak in v2i_issuer_sign_tool
nhorman Feb 11, 2026
1dcde44
Add a ci job to validate our suppression file is up to date nightly
nhorman Feb 11, 2026
1c4a2cc
Constify more X509 arguments and return values
bob-beck Feb 16, 2026
e75bd84
Constify X509_get_ext() and friends..
bob-beck Sep 29, 2025
6ae64a6
Patch the kerbeos5 tests
bob-beck Feb 19, 2026
c8e34c6
Remove implicit truncation behaviour in ossl_i2c_ASN1_BIT_STRING
bob-beck Jan 22, 2026
367c54e
Constify X509_OBJECT_[get0|set1]_X509 and friends
nhorman Feb 20, 2026
ce77331
Constify X509_check[host, email, ip, ip_asc]
bob-beck Feb 21, 2026
3d17e41
Constify X509_get0_trust_*
bob-beck Feb 21, 2026
fa9d8af
Constify X509_get_signature_info
bob-beck Feb 21, 2026
922a1f1
Constify X509_get_pubkey_parameters
bob-beck Feb 21, 2026
9a46c4c
Removes fixed version TLS methods.
fwh-dc Feb 21, 2026
67badef
ech_test.c: Fix the test with disabled CHACHA20-POLY1305
t8m Feb 24, 2026
3297773
OSSL_HPKE_CTX_new.pod: Correct the valid AEAD names for HPKE
t8m Feb 24, 2026
55b87dd
Removes trailing whitespace from generated pkg-config .pc files
cbaudouinjr Feb 19, 2026
b0f2107
Constify X509_NAME
bob-beck Sep 30, 2025
96a4910
Patch krb5 build in external tests
bob-beck Feb 19, 2026
46dbd7f
Make ASN1_STRING opaque
bob-beck Jan 29, 2026
8bc41a8
Update oqs-provider to current, which support opaque asn1 strings
bob-beck Feb 20, 2026
13a431d
Skip the oqsprovider test temporarily because it is currently broken
bob-beck Feb 20, 2026
5e3d9cf
krb5 external test: Add patch to use accessors for ASN1_STRING
bob-beck Feb 19, 2026
151086b
Update rpki-client test to use current release instead of an old one
bob-beck Feb 21, 2026
63dc68f
Patch rpki-client-portable to handle bit string changes
bob-beck Feb 22, 2026
56f000a
Patch the pkcs11 provider
bob-beck Feb 22, 2026
fdc8414
Constify X509_build_chain()
bob-beck Feb 17, 2026
e5b5633
Constify X509_STORE_CTX functions invoving X509 *
bob-beck Feb 19, 2026
e3a7153
Patch the krb5 build for X509_STORE_CTX constification
bob-beck Feb 19, 2026
7226f3c
doc: fix algorithm and key type names in EVP_PKEY-SLH-DSA
kovan Jan 27, 2026
3b3804c
Deprecate ASN1_OBJECT_new().
fwh-dc Feb 14, 2026
72830bb
doc: enumerate and describe known reserved property names
levitte Feb 19, 2026
0c537b5
FIPS self tests: fix config options when -no-bulk is used
slontis Feb 18, 2026
2af8d3b
Fix const qualifiers from strchr where discarded
heitbaum Feb 23, 2026
9efd7e9
Fix group tuple handling in DEFAULT expansion
Feb 15, 2026
52cf530
Add keyshare floating
Feb 16, 2026
e6a9a6e
Simplify and expand default group list
Feb 23, 2026
3770f02
apps/ech.c: free the resources on option help printing
esyr Feb 23, 2026
08f6739
apps/s_server.c: free ECH storage in ech_load_dir() on return
esyr Feb 23, 2026
2bd2451
apps/s_server.c: call OPENSSL_DIR_end after directory traversal in ec…
esyr Feb 23, 2026
8abd64a
ssl/ech/ech_internal.c: avoid superfluous extval check in ossl_ech_ea…
esyr Feb 23, 2026
3e08902
ssl/ech/ech_internal.c: check WPACKET_get_total_written in ossl_ech_s…
esyr Feb 23, 2026
3dc9834
ssl/ech/ech_internal.c: avoid memory leak in ossl_ech_get_retry_confi…
esyr Feb 23, 2026
fe26c12
ssl/ech/ech_store.c: check WPACKET_get_total_written return value
esyr Feb 23, 2026
054027e
ssl/ech/ech_internal.c: avoid truncating time_t value in ossl_ech_sta…
esyr Feb 23, 2026
9fe7bf3
ssl/ech/ech_internal.c: avoid NULL dereference in ossl_ech_get_ch_off…
esyr Feb 23, 2026
3a0a16f
ssl/ech/ech_internal.c: avoid memory leak on ech_decode_inbound_ech()…
esyr Feb 23, 2026
5366d8c
ssl/ech/ech_store.c: avoid memory leak on error path in OSSL_ECHSTORE…
esyr Feb 23, 2026
bbd93b0
ssl/ech/ech_store.c: avoid uninitialised WPACKET use in OSSL_ECHSTORE…
esyr Feb 23, 2026
3a5fa57
ssl/ech/ech_store.c: avoid NULL dereference in ech_decode_one_entry()
esyr Feb 23, 2026
869506d
ssl/statem/extensions_clnt.c: superfluous NULL check in tls_construct…
esyr Feb 23, 2026
30208dd
ssl/statem/extensions_srvr.c: free empty rcfgs in tls_construct_stoc_…
esyr Feb 23, 2026
e531a13
ssl/statem/statem_srvr.c: avoid WPACKET momory leak in tls_process_cl…
esyr Feb 23, 2026
2f4ef4a
test/ech_corrupt_test.c: avoid memory leak in tls_corrupt_write()
esyr Feb 23, 2026
f6c9ce7
test/ech_test.c: avoid memory leaks in ech_api_basic_calls()
esyr Feb 23, 2026
b09086c
evp_kem_init(): Fix copy paste bug when checking decapsulate_init
cuiweixie Feb 23, 2026
26e8ece
ssl/ech/ech_store.c: do not raise errors on allocation failures
esyr Feb 23, 2026
226438f
ssl/ech/ech_store.c: use OPENSSL_malloc_array() in ech_decode_one_ent…
esyr Feb 23, 2026
d9461c0
Improved reporting of shared and peer sigalgs
n13l Feb 10, 2026
58d88a3
test_sigalgs_available(): Add missing FALLTHROUGH annotation
t8m Feb 25, 2026
07ee3d5
constify X509_find_by_issuer_and_serial
nhorman Feb 19, 2026
5971d32
Remove dead code in ossl_ech_copy_inner2outer
nhorman Feb 23, 2026
3fdeb5d
Fix clean target to remove test-runs directory
freewilly123489 Feb 19, 2026
792a760
Constify X509_check_issued and friends
nhorman Feb 18, 2026
89e9bd3
Fix potential use after free in buffer_from_bytes()
Sashan Feb 25, 2026
b7a42c6
crypto/bio/bio_print.c: maintain consistent MSVC feature macro guards
levitte Feb 25, 2026
fc15338
ossl_x509v3_cache_extensions(): Fix regression of no-rfc3779 build
t8m Feb 27, 2026
3d82b99
Added LMS support for OpenSSL commandline signature verification usin…
slontis Dec 12, 2025
07933f8
Added LMS SubjectPublicInfo related encoders and decoders.
slontis Dec 12, 2025
a324e50
Added additional TRACE information to Decoders.
slontis Dec 12, 2025
14371f3
Added HSS/LMS OID id-alg-hss-lms-hashsig
slontis Dec 12, 2025
c0f82d9
Describe X509 constification and ASN1_STRING changes
bob-beck Feb 24, 2026
74be610
Add alternate ordering for ossl-guide-migration
bob-beck Feb 24, 2026
8a6dffc
CRL: Reject CRLs with malformed Issuing Distribution Point
n13l Feb 25, 2026
2357b35
Ensure TLS 1.3 ciphersuites are actually for TLS 1.3
Feb 23, 2026
3acf8e9
Added -expected-rpks s_client/server option
Feb 18, 2026
52bd241
Remove remnant SSL_FIPS flag
paulidale Feb 26, 2026
f5070fe
Remove SSL_TXT_FIPS
paulidale Feb 27, 2026
4c4f7b6
Add CHANGES entry noting the removal of the SSL_TXT_FIPS option
paulidale Feb 27, 2026
341054d
Fixes Coverity issue CID 1681693
igus68 Feb 26, 2026
c6a5fb5
Add a note about commit message titles being 50-70 character in length
paulidale Feb 24, 2026
b678c18
Fallback implementation of tsan_add now returns value before addition…
fwh-dc Feb 25, 2026
84419e3
Improved handling of AKID/SKID extensions in CSRs and certs
Nov 4, 2025
16e5d81
Replace built-in AKID/SKID with configs
Feb 25, 2026
cc360d1
Fix doc name of ML-DSA-MU
Feb 24, 2026
3719143
Fix return values on PKCS7_dataVerfiy
nhorman Feb 24, 2026
3bd54e7
Document PKCS7_dataVerify
nhorman Feb 24, 2026
ce101e1
doc: document provider/library context cleanup order requirement
kovan Jan 27, 2026
7428975
add check before releaseing retry-configs
sftcd Feb 25, 2026
b39fc83
adds test of ECH fail then using retry configs
sftcd Feb 24, 2026
65c8fdc
SHAKE - Fix 390x CI problems for SLH-DSA
slontis Feb 19, 2026
6e22081
copy_email() may leak memory when asked to move data
Sashan Feb 26, 2026
d6db530
Coverity complains X509_REQ_set_subject_name() return value
Sashan Feb 26, 2026
337d5c6
Make the openssl-ciphers(1) manual page up to date
igus68 Feb 23, 2026
c55fda7
Polish AKID/SKID handling and related docs
Feb 28, 2026
2a15001
ossl_lms_key_to_text(): Fix NULL pointer dereference of `key` argument
Sashan Feb 28, 2026
5e63272
FIPS: Change EC_GROUP_check() so that it fails for explicit curves.
slontis Feb 23, 2026
e09a74e
Indicate EOF on fatal error in file or winstore
t8m Feb 25, 2026
71c2924
fix implementation json naming in quic interop tests
nhorman Mar 3, 2026
938c59f
Add support for dynamic key sizing in hashtable
nhorman Feb 27, 2026
aec9e7f
Allow core_namemap to limit hashtable key sizes
nhorman Feb 27, 2026
f297e96
Adds fixed version tls methods to ossl-removed-api.pod
fwh-dc Feb 25, 2026
9e78491
doc/man7/ossl-removed-api.pod: mention OPENSSL_atexit in the NAME sec…
esyr Feb 25, 2026
2b5bb61
openssl-verify.pod.in: Add clarification about the parameters order
igus68 Feb 25, 2026
70e71ac
X509 returned by X509_REQ_to_X509() should not be (const ...)
Sashan Mar 2, 2026
69fb933
Fix bad length computation in HT_COPY_RAW_KEY_CASE
nhorman Mar 3, 2026
51b0bd6
SSL_get_shared_ciphers(): Return NUL-terminated buffer for no shared …
fwh-dc Oct 11, 2025
3885f81
ech test retry-configs unavailable if server finished corrupted
sftcd Mar 3, 2026
9d46f7f
Code Comment Correction
zl523856 Feb 26, 2026
b97177b
remove OPENSSL_USE_NODELETE from the config
bbolli Feb 26, 2026
fa293c4
remove OPENSSL_BUILDING_OPENSSL from the config
bbolli Feb 26, 2026
ae8d50f
Make X509_up_ref and X509_free take const X509 *
bob-beck Mar 2, 2026
78e812c
FIPS: Disable time/request based reseeding for ECDSA KAT DRBG
ssapalski Jan 14, 2026
2cc9014
ECH: Add back code needed for correct ECH backend confirmation
sftcd Feb 27, 2026
aafd5dc
Adds missing definitions to deprecation.pod
fwh-dc Feb 28, 2026
875a791
CHANGES.md: Fix 'extention' and 'insenstive' typos
fwh-dc Mar 2, 2026
d40bfac
fips: Skip testing RFC 9579 good files as they use short salt & password
xnox Apr 25, 2025
66ab2db
fips: Align PKCS5_PBKDF2_HMAC defaults with EVP_KDF-PBKDF2
xnox Apr 18, 2025
8a82e3a
Deuglify ML-KEM code after reformat
Mar 3, 2026
8b5cd6a
dane_match_cert() should X509_free() on ->mcert instead
Sashan Mar 3, 2026
ebb188f
Ensure fatal errors from the record layer put the state machine into err
igus68 Feb 27, 2026
b9da8a5
SSL_get_error(): Check the error stack only in MSG_FLOW_ERROR state
igus68 Mar 4, 2026
1bc4ad1
Proxy.pm: Redirect s_server’s output to stderr
igus68 Mar 4, 2026
d145b76
x509: remove erroneous critical extension enforcement
n13l Mar 3, 2026
68866ed
fix project spelling and capitalization
jericson Mar 4, 2026
6f24d9c
SSL_CONF_cmd.pod: Fix TSL typo
jogme Mar 4, 2026
a0415a3
windows-makefile: make clean target less noisy
mbroz Mar 1, 2026
bde5f49
Some more X509 extension add/del polish
Mar 3, 2026
e78e141
CSHAKE: Fix memory leak related to propq.
slontis Mar 4, 2026
465fd32
OSSL_HTTP_REQ_CTX_nbio(): check for clear Content-Type mismatch
tGautot Jan 27, 2026
c577864
Restrict the number of keyshares a server is willing to accept
mattcaswell Mar 3, 2026
447426a
Restrict the number of supported groups/sig algs
mattcaswell Mar 3, 2026
68dd2e0
Add a test for a large number of sigalgs
mattcaswell Mar 3, 2026
16ef335
Add a test for a large number of key shares
mattcaswell Mar 3, 2026
dc8a929
Add a CHANGES.md entry for the max key_shares/supported groups/sig algs
mattcaswell Mar 4, 2026
3298dad
Revert "Make X509_up_ref and X509_free take const X509 *"
bob-beck Mar 5, 2026
5d066a2
Partially revert "Constify X509_STORE_CTX functions invoving X509 *"
esyr Mar 5, 2026
240b973
doc/man7/ossl-guide-migration.pod: remove mentions of X509_STORE_CTX …
esyr Mar 5, 2026
584e176
Un-constify X509_OBJECT_get0_X509 and X509_OBJECT_set1_X509
esyr Mar 5, 2026
45a8663
document the new build option "enable-static-vcruntime"
ideafarm Feb 18, 2026
e491465
Un-constify the return value of X509_find_by_issuer_and_serial()
esyr Mar 2, 2026
81cc6cb
Revert "Constify X509_find_by_subject"
esyr Mar 4, 2026
fb3b82b
CHANGES.md, NEWS.md: sort links in lexicographical order
esyr Mar 10, 2026
9805c7b
CHANGES.md: add spaces to RFC 8998 mentions
esyr Mar 10, 2026
52a4fbe
CHANGES.md: add links to the mentioned RFCs
esyr Mar 10, 2026
7324a87
CHANGES.md, NEWS.md: wfixes, tfixes, ffixes
esyr Mar 10, 2026
47f2c0a
CHANGES.md: reorder entries
esyr Mar 10, 2026
35d09a5
Move the FIPS PKCS5_PBKDF2_HMAC limits description from NEWS.md to CH…
esyr Mar 10, 2026
4e0961e
NEWS.md: update
esyr Mar 10, 2026
047eac8
CHANGES.md: additional tfixes, ffixes, and wfixes
esyr Mar 10, 2026
63b300a
CHANGES.md, NEWS.md: update the URL format for CVE URLs
esyr Mar 10, 2026
8f23518
CHANGES.md, NEWS.md: picking up changes from 3.6.1
esyr Mar 10, 2026
f3a6a50
Copyright year updates
openssl-machine Mar 10, 2026
15bb67a
make update
openssl-machine Mar 10, 2026
dadacfc
Prepare for release of 4.0 alpha 1
openssl-machine Mar 10, 2026
dbd229f
Prepare for 4.0 alpha 2
openssl-machine Mar 10, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
The diff you're trying to view is too large. We only load the first 3000 changed files.
1,428 changes: 1,428 additions & 0 deletions .clang-format

Large diffs are not rendered by default.

457 changes: 457 additions & 0 deletions .codespellrc

Large diffs are not rendered by default.

3 changes: 1 addition & 2 deletions .ctags.d/exclude.ctags
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
#
# Copyright 2023 The OpenSSL Project Authors. All Rights Reserved.
# Copyright 2023-2026 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
Expand All @@ -10,4 +10,3 @@
# List file names or patterns you want ctags to ignore.
--exclude=.ctags.d
--exclude=test
--exclude=check-format-test-positives.c
8 changes: 5 additions & 3 deletions engines/e_dasync.txt → .ctags.d/langmap.ctags
Original file line number Diff line number Diff line change
@@ -1,9 +1,11 @@
# Copyright 1999-2021 The OpenSSL Project Authors. All Rights Reserved.
#
# Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html
#

#Reason codes
DASYNC_R_INIT_FAILED:100:init failed
--langmap=C:+.h
--langmap=C:+.inc
2 changes: 2 additions & 0 deletions .git-blame-ignore-revs
Original file line number Diff line number Diff line change
@@ -1,2 +1,4 @@
# Run util/openssl-format-source -v -c .
0f113f3ee4d629ef9a4a30911b22b224772085e5
# 4.0-POST-CLANG-FORMAT-WEBKIT
2fab90bb5e1937f1c2125eab144f7f6c39e70087
1 change: 1 addition & 0 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
/.github/workflows/ @quarckster
6 changes: 5 additions & 1 deletion .github/PULL_REQUEST_TEMPLATE.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,11 @@ Thank you for your pull request. Please review these requirements:

Contributors guide: https://github.com/openssl/openssl/blob/master/CONTRIBUTING.md

Other than that, provide a description above this comment if there isn't one already
Include a clear description of the issue or feature above this comment if not already provided. This should briefly outline the issue or feature being addressed, along with any relevant implementation details. For performance improvements, include benchmark results as well.

Please always add meaningful commit messages. Commit message titles (the first line of each commit message which should be separated by an empty line from the rest of the message) should be kept to 50-70 characters if possible. Further details and Fixes #issue number annotations should be placed in the commit message body (i.e, after the empty line).

Pull requests and commits should be self-contained, allowing readers to understand what changed and why without needing to reference related issues or having prior knowledge. Individual commit messages should include all relevant details to ensure future contributors can easily follow the git history. Clearly explain what is changing and why, and feel free to include detailed (long) descriptions when beneficial to understanding.

If this fixes a GitHub issue, make sure to have a line saying 'Fixes #XXXX' (without quotes) in the commit message.
-->
Expand Down
2 changes: 2 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,3 +13,5 @@ updates:
- "approval: review pending"
reviewers:
- "openssl/committers"
cooldown:
default-days: 7
67 changes: 67 additions & 0 deletions .github/workflows/backport.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
# Copyright 2021-2026 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html

name: Backports CI

on: [pull_request]

permissions:
contents: read

jobs:
check_backports:
strategy:
fail-fast: false
matrix:
release: [
{
branch: '3.6',
cppflags: ''
}, {
branch: '3.5',
cppflags: 'CPPFLAGS=-ansi'
}, {
branch: '3.4',
cppflags: 'CPPFLAGS=-ansi'
}, {
branch: '3.3',
cppflags: 'CPPFLAGS=-ansi',
}, {
branch: '3.2',
cppflags: 'CPPFLAGS=-ansi'
}, {
branch: '3.0',
cppflags: 'CPPFLAGS=-ansi'
}
]
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v6
if: ${{ contains(join(github.event.pull_request.labels.*.name,','),matrix.release.branch) }}
with:
ref: ${{ github.event.pull_request.head.sha }}
fetch-depth: 0
persist-credentials: false
- name: cherry-pick
if: ${{ contains(join(github.event.pull_request.labels.*.name,','),matrix.release.branch) }}
run: |
REFEND=$(git rev-parse HEAD)
REFSTART=$(git rev-parse $REFEND~${{ github.event.pull_request.commits }})
git checkout ${{ format('openssl-{0}', matrix.release.branch) }}
git config user.name "OpenSSL Machine"
git config user.email "openssl-machine@openssl.org"
echo Cherry-picking $REFSTART..$REFEND
git cherry-pick $REFSTART..$REFEND
- name: config
if: ${{ contains(join(github.event.pull_request.labels.*.name,','),matrix.release.branch) }}
run: ${{ matrix.release.cppflags }} ./config --strict-warnings --banner=Configured no-asm enable-fips --strict-warnings -D_DEFAULT_SOURCE && perl configdata.pm --dump
- name: make
if: ${{ contains(join(github.event.pull_request.labels.*.name,','),matrix.release.branch) }}
run: make -s -j4
- name: make test
if: ${{ contains(join(github.event.pull_request.labels.*.name,','),matrix.release.branch) }}
run: make test HARNESS_JOBS=${HARNESS_JOBS:-4}
25 changes: 0 additions & 25 deletions .github/workflows/build_quic_interop_container.yml

This file was deleted.

105 changes: 105 additions & 0 deletions .github/workflows/check-news-changes.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,105 @@
# Copyright 2026 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html

name: "Scan to check for NEWS/CHANGES suggestions"

on: pull_request
env:
NEED_NEWS_CHANGES: "no"
SKIP_NEWS_CHECK: "no"
PR_NUMBER: ${{ github.event.number }}
GH_TOKEN: ${{ github.token }}
permissions: {}

jobs:
scan_for_news_changes:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v6
with:
persist-credentials: false
fetch-depth: 0
- name: "Check if we have the label to skip this test"
run: |
SKIP_TEST=$(gh pr view $PR_NUMBER --json labels --jq '.labels[] | select(.name == "no_news_changes_needed") | .name')
if [ -n "$SKIP_TEST" ]; then
echo "SKIP_NEWS_CHECK=yes" >> $GITHUB_ENV
fi

- name: "Check if we already have a NEWS/CHANGES entry"
if: ${{ env.SKIP_NEWS_CHECK == 'no' }}
run: |
git diff --name-only ${{ github.event.pull_request.base.sha }}..${{ github.event.pull_request.head.sha }} > ./names.txt
echo "changed files between ${{ github.event.pull_request.base.sha }} and ${{ github.event.pull_request.head.sha }}"
cat ./names.txt
set +e
grep -q "NEWS\.md" names.txt
if [ $? -eq 0 ]; then
echo "FOUND_NEWS_CHANGES_ADDITION=yes" >> $GITHUB_ENV
else
grep -q "CHANGES\.md" names.txt
if [ $? -eq 0 ]; then
echo "FOUND_NEWS_CHANGES_ADDITION=yes" >> $GITHUB_ENV
else
echo "FOUND_NEWS_CHANGES_ADDITION=no" >> $GITHUB_ENV
fi
fi
- name: "Check if this PR affects a CVE"
if: ${{ env.FOUND_NEWS_CHANGES_ADDITION == 'no' && env.SKIP_NEWS_CHECK == 'no' }}
run: |
git log ${{ github.event.pull_request.base.sha }}..${{ github.event.pull_request.head.sha }} > ./log.txt
set +e
grep -q "CVE-" ./log.txt
if [ $? -eq 0 ]; then
echo "Changes in this PR reference a CVE"
echo "NEED_NEWS_CHANGES=yes" >> $GITHUB_ENV
fi
- name: "Check if this PR impacts a public API"
if: ${{ env.FOUND_NEWS_CHANGES_ADDITION == 'no' && env.SKIP_NEWS_CHECK == 'no' }}
run: |
set +e
git diff --name-only ${{ github.event.pull_request.base.sha }}..${{ github.event.pull_request.head.sha }} > ./names.txt
echo "changed files between ${{ github.event.pull_request.base.sha }} and ${{ github.event.pull_request.head.sha }}"
cat ./names.txt
grep -q "include/openssl" ./names.txt
if [ $? -eq 0 ]; then
echo "Changes in this PR may impact public APIS's"
echo "NEED_NEWS_CHANGES=yes" >> $GITHUB_ENV
fi
- name: "Check if this is a feature branch merge"
if: ${{ env.FOUND_NEWS_CHANGES_ADDITION == 'no' && env.SKIP_NEWS_CHECK == 'no' }}
run: |
set +e
echo ${{ github.head_ref }} | grep -q "feature"
if [ $? -eq 0 ]; then
echo "Feature branch found"
echo "NEED_NEWS_CHANGES=yes" >> $GITHUB_ENV
fi
- name: "Check if configuration options have changed"
if: ${{ env.FOUND_NEWS_CHANGES_ADDITION == 'no' && env.SKIP_NEWS_CHECK == 'no' }}
run: |
git checkout ${{ github.event.pull_request.base.sha }}
set +e
./Configure --help > ./before.txt 2>&1
git checkout ${{ github.event.pull_request.head.sha }}
./Configure --help > ./after.txt 2>&1
set -e
CONF_CHANGE=$(diff ./before.txt ./after.txt | wc -l)
if [ $CONF_CHANGE -ne 0 ]; then
echo "Configuration options changes"
echo "NEED_NEWS_CHANGES=yes" >> $GITHUB_ENV
fi
- name: "Report Results"
if: ${{ env.SKIP_NEWS_CHECK == 'no' }}
run: |
if [ "${{ env.NEED_NEWS_CHANGES }}" == "yes" ]; then
echo "Suggest that you add a NEWS/CHANGES entry for this PR"
echo "Alternatively, quiet this suggestion by applying the no_news_changes_needed label"
exit 1
fi


Loading
Loading