chore(deps): update dependency openssl/openssl to v4#265
Open
renovate[bot] wants to merge 1 commit into
Open
Conversation
ac035b5 to
b333ed5
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.6.2→4.0.0Release Notes
openssl/openssl (openssl/openssl)
v4.0.0: OpenSSL 4.0.0Compare Source
OpenSSL 4.0.0 is a feature release adding significant new functionality
to OpenSSL.
This release incorporates the following potentially significant or incompatible
changes:
Removed extra leading '00:' when printing key data such as an RSA modulus
in hexadecimal format where the first (most significant) byte is >= 0x80.
Standardized the width of hexadecimal dumps to 24 bytes for signatures
(to stay within the 80 characters limit) and 16 bytes for everything else.
Lower bounds checks are now enforced when using
PKCS5_PBKDF2_HMACAPIwith FIPS provider.
Added AKID verification checks when
X509_V_FLAG_X509_STRICTis set.Augmented CRL verification process with several additional checks.
libcryptono longer cleans up globally allocated data viaatexit().BIO_snprintf()now usessnprintf()provided by libc instead of internalimplementation.
OPENSSL_cleanup()now runs in a global destructor, or not at allby default.
ASN1_STRINGhas been made opaque.Signatures of numerous API functions, including those that are related
to X509 processing, are changed to include
constqualifiers for argumentand return types, where suitable.
Deprecated
X509_cmp_time(),X509_cmp_current_time(),and
X509_cmp_timeframe()in favor ofX509_check_certificate_times().Removed support for the SSLv2 Client Hello.
Removed support for SSLv3. SSLv3 has been deprecated since 2015,
and OpenSSL had it disabled by default since version 1.1.0 (2016).
Removed support for engines. The
no-enginebuild optionand the
OPENSSL_NO_ENGINEmacro are always present.Support of deprecated elliptic curves in TLS according to RFC 8422 was
disabled at compile-time by default. To enable it, use the
enable-tls-deprecated-ecconfiguration option.Support of explicit EC curves was disabled at compile-time by default.
To enable it, use the
enable-ec_explicit_curvesconfiguration option.Removed
c_rehashscript tool. Useopenssl rehashinstead.Removed the deprecated
msie-hackoption from theopenssl cacommand.Removed
BIO_f_reliable()implementation without replacement.It was broken since 3.0 release without any complaints.
Removed deprecated support for custom
EVP_CIPHER,EVP_MD,EVP_PKEY,and
EVP_PKEY_ASN1methods.Removed deprecated fixed SSL/TLS version method functions.
Removed deprecated functions
ERR_get_state(),ERR_remove_state()and
ERR_remove_thread_state(). TheERR_STATEobject is now alwaysopaque.
Dropped
darwin-i386{,-cc}anddarwin-ppc{,64}{,-cc}targetsfrom Configurations.
This release adds the following new features:
Support for Encrypted Client Hello (ECH, RFC 9849).
See
doc/designs/ech-api.mdfor details.Support for RFC 8998, signature algorithm
sm2sig_sm3, key exchangegroup
curveSM2, and [tls-hybrid-sm2-mlkem] post-quantum groupcurveSM2MLKEM768.cSHAKE function support as per SP 800-185.
"ML-DSA-MU" digest algorithm support.
Support for SNMP KDF and SRTP KDF.
FIPS self tests can now be deferred and run as needed when installing
the FIPS module with the
-defer_testsoption of theopenssl fipsinstallcommand.
Support for using either static or dynamic VC runtime linkage
on Windows.
Support for negotiated FFDHE key exchange in TLS 1.2 in accordance
with RFC 7919.
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.