You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Add initial support for OpenSSL 4.x betas
Accept OpenSSL 4.x in the version check (raising the ceiling to 4.0.0
final), add the ossl400 cfg flag, and ignore tests with behavioral
changes in OpenSSL 4 (tmp_dh_callback, zero_length_buffers).
* Fix zero-length SSL_read_ex/SSL_write_ex calling into OpenSSL
The empty-buffer early return was only on the pre-1.1.1 code path.
On the ossl111/libressl path, SSL_read_ex and SSL_write_ex were called
with length 0, causing OpenSSL to perform wire I/O unnecessarily. This
was exposed by OpenSSL 4 which now errors. Hoist the guard above the
cfg_if so it applies to all versions.
Co-Authored-By: Claude Opus 4.6 (1M context) <[email protected]>
* Handle const-qualified return types in OpenSSL 4
OpenSSL 4 changed X509_NAME_ENTRY_get_data, X509_NAME_ENTRY_get_object,
and X509_CRL_get_issuer to return const pointers. Use const_ptr_if(ossl400)
in the FFI bindings and cast to *mut at the call sites since we only
return immutable references.
Co-Authored-By: Claude Opus 4.6 (1M context) <[email protected]>
* Add Version::Openssl4xx, bind SSL_OP_IGNORE_UNEXPECTED_EOF
Add a distinct Openssl4xx variant to the Version enum and use it for
OpenSSL 4.x detection. Bind SSL_OP_IGNORE_UNEXPECTED_EOF (gated on
ossl400) and set it in the default_verify_paths test to handle peers
that close without close_notify.
Co-Authored-By: Claude Opus 4.6 (1M context) <[email protected]>
* Add 4.0.0-beta1 in CI
* cargo fmt
* update a comment and some cfg guards
* missed a comment
* 4.0.0
---------
Co-authored-by: Claude Opus 4.6 (1M context) <[email protected]>
0 commit comments