{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":7634677,"defaultBranch":"master","name":"openssl","ownerLogin":"openssl","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2013-01-15T22:34:48.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/3279138?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1717740453.0","currentOid":""},"activityList":{"items":[{"before":"57b83edc46926662491d63666231ba7ddc954a38","after":"a9064366e8dcff56c722d0c8f1306d84d6c3f255","ref":"refs/heads/master","pushedAt":"2024-06-25T14:11:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Fix memory leak in x509_req_test\n\nRunning the x509_req_test with address sanitizer shows a memory leak:\n\n==186455==ERROR: LeakSanitizer: detected memory leaks\nDirect leak of 53 byte(s) in 1 object(s) allocated from:\n #0 0x3ffad5f47af in malloc (/lib64/libasan.so.8+0xf47af) (BuildId: 93b3d2536d76f772a95880d76c746c150daabbee)\n #1 0x3ffac4214fb in CRYPTO_malloc crypto/mem.c:202\n #2 0x3ffac421759 in CRYPTO_zalloc crypto/mem.c:222\n #3 0x100e58f in test_mk_file_path test/testutil/driver.c:450\n #4 0x1004671 in test_x509_req_detect_invalid_version test/x509_req_test.c:32\n #5 0x100d247 in run_tests test/testutil/driver.c:342\n #6 0x10042e3 in main test/testutil/main.c:31\n #7 0x3ffaad34a5b in __libc_start_call_main (/lib64/libc.so.6+0x34a5b) (BuildId: 461b58df774538594b6173825bed67a9247a014d)\n #8 0x3ffaad34b5d in __libc_start_main@GLIBC_2.2 (/lib64/libc.so.6+0x34b5d) (BuildId: 461b58df774538594b6173825bed67a9247a014d)\n #9 0x1004569 (/root/openssl/test/x509_req_test+0x1004569) (BuildId: ab6bce0e531df1e3626a8f506d07f6ad7c7c6d57)\nSUMMARY: AddressSanitizer: 53 byte(s) leaked in 1 allocation(s).\n\nThe certFilePath that is obtained via test_mk_file_path() must be freed when\nno longer used.\n\nWhile at it, make the certFilePath variable a local variable, there is no need\nto have this a global static variable.\n\nFixes: https://github.com/openssl/openssl/commit/7d2c0a4b1feb152ee1190dfedc65dfd1c928f9e5\n\nSigned-off-by: Ingo Franzki \n\nReviewed-by: Dmitry Belyavskiy \nReviewed-by: Neil Horman \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24715)","shortMessageHtmlLink":"Fix memory leak in x509_req_test"}},{"before":"42a8ef844e5fca55abb608beb62695abe80c6b6d","after":"57b83edc46926662491d63666231ba7ddc954a38","ref":"refs/heads/master","pushedAt":"2024-06-25T14:09:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"bio_ssl.c: Do not call SSL_shutdown if not inited\n\nFixes #4545\n\nIf free is called for an SSL BIO that is in initialization phase,\nthe `SSL_shutdown` call is omitted.\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24705)","shortMessageHtmlLink":"bio_ssl.c: Do not call SSL_shutdown if not inited"}},{"before":"dad7f4d15a521749c934fbb5c5d1fc9e386f9bc2","after":"678e63bc38dbfe3769bcfd5d6df51896423f2093","ref":"refs/heads/openssl-3.0","pushedAt":"2024-06-25T14:09:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"bio_ssl.c: Do not call SSL_shutdown if not inited\n\nFixes #4545\n\nIf free is called for an SSL BIO that is in initialization phase,\nthe `SSL_shutdown` call is omitted.\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24705)\n\n(cherry picked from commit 57b83edc46926662491d63666231ba7ddc954a38)","shortMessageHtmlLink":"bio_ssl.c: Do not call SSL_shutdown if not inited"}},{"before":"a7d11644fe5f78cd0ccc5c6334b74365eeca696c","after":"b3bbb67ebcc247615fc78e6e47011e7ebc54ad8c","ref":"refs/heads/openssl-3.2","pushedAt":"2024-06-25T14:09:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"bio_ssl.c: Do not call SSL_shutdown if not inited\n\nFixes #4545\n\nIf free is called for an SSL BIO that is in initialization phase,\nthe `SSL_shutdown` call is omitted.\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24705)\n\n(cherry picked from commit 57b83edc46926662491d63666231ba7ddc954a38)","shortMessageHtmlLink":"bio_ssl.c: Do not call SSL_shutdown if not inited"}},{"before":"08cfec5d04748d5aaae856a91b007ae646977a43","after":"c94b641cca452f6d36d796d91c9487453fec8db7","ref":"refs/heads/openssl-3.1","pushedAt":"2024-06-25T14:09:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"bio_ssl.c: Do not call SSL_shutdown if not inited\n\nFixes #4545\n\nIf free is called for an SSL BIO that is in initialization phase,\nthe `SSL_shutdown` call is omitted.\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24705)\n\n(cherry picked from commit 57b83edc46926662491d63666231ba7ddc954a38)","shortMessageHtmlLink":"bio_ssl.c: Do not call SSL_shutdown if not inited"}},{"before":"32aa3d13fae1ac50f85733626108688a76e98f84","after":"db4ebf84c02b4ca08f450d83190cdf584785d43a","ref":"refs/heads/openssl-3.3","pushedAt":"2024-06-25T14:09:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"bio_ssl.c: Do not call SSL_shutdown if not inited\n\nFixes #4545\n\nIf free is called for an SSL BIO that is in initialization phase,\nthe `SSL_shutdown` call is omitted.\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24705)\n\n(cherry picked from commit 57b83edc46926662491d63666231ba7ddc954a38)","shortMessageHtmlLink":"bio_ssl.c: Do not call SSL_shutdown if not inited"}},{"before":"cbe516a9bd133e405524a9945aef7a7b3a317635","after":"08cfec5d04748d5aaae856a91b007ae646977a43","ref":"refs/heads/openssl-3.1","pushedAt":"2024-06-24T17:04:41.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Fix usage of deallocated EVP_RAND_CTX after execution of FIPS on-demand self tests\n\nOnce RNG is used, triggering FIPS on-demand self tests (via\nOSSL_PROVIDER_self_test() API) crashes the application. This happens because the\nRNG context is stored before self tests, and restored after their execution.\nIn the meantime - before context restoration - RAND_set0_private() function is\ncalled, which decrements the stored RNG context reference counter and frees it.\nTo resolve the issue, the stored RNG context refcount has been incremented via\nthe EVP_RAND_CTX_up_ref() API to avoid its deallocation during the RNG context\nswitch performed by the self test function.\nThe provider_status_test test has been updated to reproduce the issue as\na regression test.\n\nSigned-off-by: Karol Brzuskiewicz \n\nReviewed-by: Shane Lontis \nReviewed-by: Tom Cosgrove \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24599)\n\n(cherry picked from commit 42a8ef844e5fca55abb608beb62695abe80c6b6d)","shortMessageHtmlLink":"Fix usage of deallocated EVP_RAND_CTX after execution of FIPS on-dema…"}},{"before":"4ccb130763a401a20b19f86ecc824f4502c68500","after":"a7d11644fe5f78cd0ccc5c6334b74365eeca696c","ref":"refs/heads/openssl-3.2","pushedAt":"2024-06-24T17:04:41.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Fix usage of deallocated EVP_RAND_CTX after execution of FIPS on-demand self tests\n\nOnce RNG is used, triggering FIPS on-demand self tests (via\nOSSL_PROVIDER_self_test() API) crashes the application. This happens because the\nRNG context is stored before self tests, and restored after their execution.\nIn the meantime - before context restoration - RAND_set0_private() function is\ncalled, which decrements the stored RNG context reference counter and frees it.\nTo resolve the issue, the stored RNG context refcount has been incremented via\nthe EVP_RAND_CTX_up_ref() API to avoid its deallocation during the RNG context\nswitch performed by the self test function.\nThe provider_status_test test has been updated to reproduce the issue as\na regression test.\n\nSigned-off-by: Karol Brzuskiewicz \n\nReviewed-by: Shane Lontis \nReviewed-by: Tom Cosgrove \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24599)\n\n(cherry picked from commit 42a8ef844e5fca55abb608beb62695abe80c6b6d)","shortMessageHtmlLink":"Fix usage of deallocated EVP_RAND_CTX after execution of FIPS on-dema…"}},{"before":"b46227bcd26e15b2e48198d9f2e5d40706014a05","after":"32aa3d13fae1ac50f85733626108688a76e98f84","ref":"refs/heads/openssl-3.3","pushedAt":"2024-06-24T17:04:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Fix usage of deallocated EVP_RAND_CTX after execution of FIPS on-demand self tests\n\nOnce RNG is used, triggering FIPS on-demand self tests (via\nOSSL_PROVIDER_self_test() API) crashes the application. This happens because the\nRNG context is stored before self tests, and restored after their execution.\nIn the meantime - before context restoration - RAND_set0_private() function is\ncalled, which decrements the stored RNG context reference counter and frees it.\nTo resolve the issue, the stored RNG context refcount has been incremented via\nthe EVP_RAND_CTX_up_ref() API to avoid its deallocation during the RNG context\nswitch performed by the self test function.\nThe provider_status_test test has been updated to reproduce the issue as\na regression test.\n\nSigned-off-by: Karol Brzuskiewicz \n\nReviewed-by: Shane Lontis \nReviewed-by: Tom Cosgrove \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24599)\n\n(cherry picked from commit 42a8ef844e5fca55abb608beb62695abe80c6b6d)","shortMessageHtmlLink":"Fix usage of deallocated EVP_RAND_CTX after execution of FIPS on-dema…"}},{"before":"d38f62ea118170fc40e10f6f95b180cccbaa7581","after":"42a8ef844e5fca55abb608beb62695abe80c6b6d","ref":"refs/heads/master","pushedAt":"2024-06-24T17:04:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Fix usage of deallocated EVP_RAND_CTX after execution of FIPS on-demand self tests\n\nOnce RNG is used, triggering FIPS on-demand self tests (via\nOSSL_PROVIDER_self_test() API) crashes the application. This happens because the\nRNG context is stored before self tests, and restored after their execution.\nIn the meantime - before context restoration - RAND_set0_private() function is\ncalled, which decrements the stored RNG context reference counter and frees it.\nTo resolve the issue, the stored RNG context refcount has been incremented via\nthe EVP_RAND_CTX_up_ref() API to avoid its deallocation during the RNG context\nswitch performed by the self test function.\nThe provider_status_test test has been updated to reproduce the issue as\na regression test.\n\nSigned-off-by: Karol Brzuskiewicz \n\nReviewed-by: Shane Lontis \nReviewed-by: Tom Cosgrove \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24599)","shortMessageHtmlLink":"Fix usage of deallocated EVP_RAND_CTX after execution of FIPS on-dema…"}},{"before":"4f797e00d8487af438ddd1f103b204aa42e76dfe","after":"4ccb130763a401a20b19f86ecc824f4502c68500","ref":"refs/heads/openssl-3.2","pushedAt":"2024-06-24T13:51:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Allow calling OPENSSL_INIT_free() with NULL argument\n\nReviewed-by: Neil Horman \nReviewed-by: Matt Caswell \nReviewed-by: Paul Dale \n(Merged from https://github.com/openssl/openssl/pull/24681)\n\n(cherry picked from commit d38f62ea118170fc40e10f6f95b180cccbaa7581)","shortMessageHtmlLink":"Allow calling OPENSSL_INIT_free() with NULL argument"}},{"before":"7de0a33b8f8bf7248d953ff6e0ffa41eceb37c56","after":"b46227bcd26e15b2e48198d9f2e5d40706014a05","ref":"refs/heads/openssl-3.3","pushedAt":"2024-06-24T13:51:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Allow calling OPENSSL_INIT_free() with NULL argument\n\nReviewed-by: Neil Horman \nReviewed-by: Matt Caswell \nReviewed-by: Paul Dale \n(Merged from https://github.com/openssl/openssl/pull/24681)\n\n(cherry picked from commit d38f62ea118170fc40e10f6f95b180cccbaa7581)","shortMessageHtmlLink":"Allow calling OPENSSL_INIT_free() with NULL argument"}},{"before":"1c94b69475c3fa467e6d1eeed6cd6a81a9a01bdc","after":"cbe516a9bd133e405524a9945aef7a7b3a317635","ref":"refs/heads/openssl-3.1","pushedAt":"2024-06-24T13:51:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Allow calling OPENSSL_INIT_free() with NULL argument\n\nReviewed-by: Neil Horman \nReviewed-by: Matt Caswell \nReviewed-by: Paul Dale \n(Merged from https://github.com/openssl/openssl/pull/24681)\n\n(cherry picked from commit d38f62ea118170fc40e10f6f95b180cccbaa7581)","shortMessageHtmlLink":"Allow calling OPENSSL_INIT_free() with NULL argument"}},{"before":"3fc784835cdb8489117c2680e867cd32b3b70fbe","after":"d38f62ea118170fc40e10f6f95b180cccbaa7581","ref":"refs/heads/master","pushedAt":"2024-06-24T13:51:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Allow calling OPENSSL_INIT_free() with NULL argument\n\nReviewed-by: Neil Horman \nReviewed-by: Matt Caswell \nReviewed-by: Paul Dale \n(Merged from https://github.com/openssl/openssl/pull/24681)","shortMessageHtmlLink":"Allow calling OPENSSL_INIT_free() with NULL argument"}},{"before":"ac85b01f6aa608dea8634980a7fd79d840edcf08","after":"dad7f4d15a521749c934fbb5c5d1fc9e386f9bc2","ref":"refs/heads/openssl-3.0","pushedAt":"2024-06-24T13:51:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Allow calling OPENSSL_INIT_free() with NULL argument\n\nReviewed-by: Neil Horman \nReviewed-by: Matt Caswell \nReviewed-by: Paul Dale \n(Merged from https://github.com/openssl/openssl/pull/24681)\n\n(cherry picked from commit d38f62ea118170fc40e10f6f95b180cccbaa7581)","shortMessageHtmlLink":"Allow calling OPENSSL_INIT_free() with NULL argument"}},{"before":"94567d6889b8b48ac618cd8a90911e6732d0e4df","after":"3fc784835cdb8489117c2680e867cd32b3b70fbe","ref":"refs/heads/master","pushedAt":"2024-06-24T13:44:32.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"stricter parser for ipv4_from_asc\n\nreject invalid IPv4 addresses in ipv4_from_asc\n\nThe old scanf-based parser accepted all kinds of invalid inputs like:\n\"1.2.3.4.5\"\n\"1.2.3.4 \"\n\"1.2.3. 4\"\n\" 1.2.3.4\"\n\"1.2.3.4.\"\n\"1.2.3.+4\"\n\"1.2.3.4.example.test\"\n\"1.2.3.01\"\n\"1.2.3.0x1\"\nThanks to Amir Mohamadi for pointing this out.\n\nReviewed-by: Neil Horman \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24438)","shortMessageHtmlLink":"stricter parser for ipv4_from_asc"}},{"before":"954979ef7a44b46acad175f00dd96fa947788494","after":"1c94b69475c3fa467e6d1eeed6cd6a81a9a01bdc","ref":"refs/heads/openssl-3.1","pushedAt":"2024-06-24T13:41:39.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Add Provider compatibility on PR CI job\n\nReviewed-by: Paul Dale \nReviewed-by: Tom Cosgrove \n(Merged from https://github.com/openssl/openssl/pull/24537)\n\n(cherry picked from commit 94567d6889b8b48ac618cd8a90911e6732d0e4df)","shortMessageHtmlLink":"Add Provider compatibility on PR CI job"}},{"before":"c07f861b92e7fc9bf39db89d5ee3aa0af027e7b0","after":"4f797e00d8487af438ddd1f103b204aa42e76dfe","ref":"refs/heads/openssl-3.2","pushedAt":"2024-06-24T13:41:39.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Add Provider compatibility on PR CI job\n\nReviewed-by: Paul Dale \nReviewed-by: Tom Cosgrove \n(Merged from https://github.com/openssl/openssl/pull/24537)\n\n(cherry picked from commit 94567d6889b8b48ac618cd8a90911e6732d0e4df)","shortMessageHtmlLink":"Add Provider compatibility on PR CI job"}},{"before":"d49ba5066dbbf16c6b07e3ab6aee0072cb611111","after":"ac85b01f6aa608dea8634980a7fd79d840edcf08","ref":"refs/heads/openssl-3.0","pushedAt":"2024-06-24T13:41:39.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Add Provider compatibility on PR CI job\n\nReviewed-by: Paul Dale \nReviewed-by: Tom Cosgrove \n(Merged from https://github.com/openssl/openssl/pull/24537)\n\n(cherry picked from commit 94567d6889b8b48ac618cd8a90911e6732d0e4df)","shortMessageHtmlLink":"Add Provider compatibility on PR CI job"}},{"before":"6a60f7ccc9f05bc91463b2739c25991a2b1dbdbf","after":"7de0a33b8f8bf7248d953ff6e0ffa41eceb37c56","ref":"refs/heads/openssl-3.3","pushedAt":"2024-06-24T13:41:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Add Provider compatibility on PR CI job\n\nReviewed-by: Paul Dale \nReviewed-by: Tom Cosgrove \n(Merged from https://github.com/openssl/openssl/pull/24537)\n\n(cherry picked from commit 94567d6889b8b48ac618cd8a90911e6732d0e4df)","shortMessageHtmlLink":"Add Provider compatibility on PR CI job"}},{"before":"be5adfd6e36817fe8d5b5793f8c23189dc412045","after":"94567d6889b8b48ac618cd8a90911e6732d0e4df","ref":"refs/heads/master","pushedAt":"2024-06-24T13:41:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Add Provider compatibility on PR CI job\n\nReviewed-by: Paul Dale \nReviewed-by: Tom Cosgrove \n(Merged from https://github.com/openssl/openssl/pull/24537)","shortMessageHtmlLink":"Add Provider compatibility on PR CI job"}},{"before":"8f250985ad1ac4efc25621ce2504c52ef0cbe283","after":"be5adfd6e36817fe8d5b5793f8c23189dc412045","ref":"refs/heads/master","pushedAt":"2024-06-24T13:36:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Support subjectDirectoryAttributes and associatedInformation exts\n\nAdded tests for SDA and AI extensions.\nAdded internal function ossl_print_attribute_value() with documentation.\n\nReviewed-by: Neil Horman \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24669)","shortMessageHtmlLink":"Support subjectDirectoryAttributes and associatedInformation exts"}},{"before":"89c9c3b857b5d68d835c3c3d371dc74a26f568fd","after":"8f250985ad1ac4efc25621ce2504c52ef0cbe283","ref":"refs/heads/master","pushedAt":"2024-06-24T13:10:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Fix typos found by codespell\n\nReviewed-by: Paul Dale \nReviewed-by: Kurt Roeckx \n(Merged from https://github.com/openssl/openssl/pull/24691)","shortMessageHtmlLink":"Fix typos found by codespell"}},{"before":"b23cd39f0a4e3cfe142694402a5246a498a3574f","after":"89c9c3b857b5d68d835c3c3d371dc74a26f568fd","ref":"refs/heads/master","pushedAt":"2024-06-23T14:39:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Extend `mask` of `ssl_method_st` to 64-bit\n\nFixes #23260: The bit count for `SSL_OP_*` flags has exceeded 32 bits, making it impossible to handle newer flags and protocol extensions with the existing 32-bit variables. This commit extends the `mask` field in the `ssl_method_st` structure to 64-bit, aligning them with the previously extended 64-bit `options` field.\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Matt Caswell \n(Merged from https://github.com/openssl/openssl/pull/24692)","shortMessageHtmlLink":"Extend mask of ssl_method_st to 64-bit"}},{"before":"dfb60bbabb29f9a047154f3bbff5150e9922be68","after":"6a60f7ccc9f05bc91463b2739c25991a2b1dbdbf","ref":"refs/heads/openssl-3.3","pushedAt":"2024-06-22T04:36:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod\n\nBulk editing had history wrongly specify current functions as deprecated,\namong other small errors.\n\nFixes #24678\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24680)\n\n(cherry picked from commit b23cd39f0a4e3cfe142694402a5246a498a3574f)","shortMessageHtmlLink":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod"}},{"before":"7433b6c1ae18fbea87c294f7c5415c0342e53d9a","after":"954979ef7a44b46acad175f00dd96fa947788494","ref":"refs/heads/openssl-3.1","pushedAt":"2024-06-22T04:36:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod\n\nBulk editing had history wrongly specify current functions as deprecated,\namong other small errors.\n\nFixes #24678\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24680)\n\n(cherry picked from commit b23cd39f0a4e3cfe142694402a5246a498a3574f)","shortMessageHtmlLink":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod"}},{"before":"a4daab0c29bce044d385bdeada177a88c32cba4c","after":"c07f861b92e7fc9bf39db89d5ee3aa0af027e7b0","ref":"refs/heads/openssl-3.2","pushedAt":"2024-06-22T04:36:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod\n\nBulk editing had history wrongly specify current functions as deprecated,\namong other small errors.\n\nFixes #24678\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24680)\n\n(cherry picked from commit b23cd39f0a4e3cfe142694402a5246a498a3574f)","shortMessageHtmlLink":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod"}},{"before":"424c3f84bec34427449f4ae9fcec5dc3f03b2ced","after":"d49ba5066dbbf16c6b07e3ab6aee0072cb611111","ref":"refs/heads/openssl-3.0","pushedAt":"2024-06-22T04:36:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod\n\nBulk editing had history wrongly specify current functions as deprecated,\namong other small errors.\n\nFixes #24678\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24680)\n\n(cherry picked from commit b23cd39f0a4e3cfe142694402a5246a498a3574f)","shortMessageHtmlLink":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod"}},{"before":"7d2c0a4b1feb152ee1190dfedc65dfd1c928f9e5","after":"b23cd39f0a4e3cfe142694402a5246a498a3574f","ref":"refs/heads/master","pushedAt":"2024-06-22T04:35:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod\n\nBulk editing had history wrongly specify current functions as deprecated,\namong other small errors.\n\nFixes #24678\n\nReviewed-by: Neil Horman \nReviewed-by: Paul Dale \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24680)","shortMessageHtmlLink":"[DOCS] Correct history in doc/man3/OSSL_STORE_LOADER.pod"}},{"before":"03448ba21b5e720f59f7d349fcffd26c53323414","after":"7d2c0a4b1feb152ee1190dfedc65dfd1c928f9e5","ref":"refs/heads/master","pushedAt":"2024-06-21T20:25:33.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"openssl-machine","name":null,"path":"/openssl-machine","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/25405787?s=80&v=4"},"commit":{"message":"Make x509_req_test ANSI Compatible\n\nUpdate the `x509_req_test` to ensure ANSI compatibility. The integrated certificate string was too long, so the PEM certificate has been moved to `certs/x509-req-detect-invalid-version.pem`. The test have been updated to load this certificate from the file on disk.\n\nReviewed-by: Neil Horman \nReviewed-by: Tomas Mraz \n(Merged from https://github.com/openssl/openssl/pull/24677)","shortMessageHtmlLink":"Make x509_req_test ANSI Compatible"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEbrS-NgA","startCursor":null,"endCursor":null}},"title":"Activity · openssl/openssl"}