summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Fix documentation of OSSL_ASYM_CIPHER_PARAM_IMPLICIT_REJECTIONHEADmasterRichard Levitte11 hours3-4/+7
| | | | | | | | | | This drops OSSL_PKEY_PARAM_IMPLICIT_REJECTION - which is a meaningless name - everywhere apart from still existing (for API stability, in case someone uses that macro). Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26421)
* test: aAissuingDistributionPoint X.509v3 extensionJonathan M. Wilbur11 hours2-1/+34
| | | | | | Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26174)
* doc: aAissuingDistributionPoint X.509v3 extensionJonathan M. Wilbur11 hours2-0/+8
| | | | | | Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26174)
* feat: support the aAissuingDistributionPoint X.509v3 extensionJonathan M. Wilbur11 hours5-0/+189
| | | | | | Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26174)
* Support CLI and API setting of provider configuration parametersViktor Dukhovni12 hours11-29/+168
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26427)
* Work around to get llvm-mingw working on aarch64Alexandr Nedvedicky12 hours1-0/+9
| | | | | | | | | | | | | | | | | It looks like llvm-mingw tool chain does not understand `.previous` asm directive (see https://sourceware.org/binutils/docs/as/Previous.html). As a workaround for win64 flavor (llvm-mingw toolchain) we let xlate to emit .text instead of emitting .previous. We also need to revisit usage of win64 flavor here in aarch64. We should perhaps introduce a mingw flavour on aarch64 as well. win assembly flavour should be used for microsoft assembler. Fixes #26415 Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26428)
* Move rodata to .rodata section for armv8Alexey Moksyakov13 hours3-22/+46
| | | | | | | | | | | | | | | | Adds missing files where asm code is generated by perl scripts and read only constant is used PR #24137 closes #23312 Signed-off-by: Alexey Moksyakov <yavtuk@yandex.ru> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26440)
* Missing .gitignore entriesDmitry Belyavskiy15 hours1-0/+21
| | | | | | | | Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26418)
* `atoi` should be allowedDmitry Belyavskiy15 hours1-0/+1
| | | | | | | | | | When we compile with -O0 for Linux, the command `./util/checkplatformsyms.pl ./util/platform_symbols/unix-symbols.txt ./libcrypto.so ./libssl.so` complains to the lack of `atoi` Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26417)
* provider_deactivate(): Check return value of CRYPTO_atomic_add()onexyoung19 hours1-1/+8
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26249)
* Workaround for RSA on AArch64 Big EndianNikolay Nikolaev3 days1-0/+2
| | | | | | | | | | | | | | | | | | | 10646160125 introduced and optimized RSA NEON implementation for AArch64 architecture, namely Cortex-A72 and Neoverse N1. This implementation is broken in Big Endian mode, which is not widely used, therefore not properly verified. Here we disable this optimized implementation when Big Endian platform is used. Fixes: #22687 CLA: trivial Signed-off-by: Nikolay Nikolaev <nicknickolaev@gmail.com> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26257)
* Remove non-existing error code.Peter Bierma3 days1-1/+0
| | | | | | | | | CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26389)
* Synchronize openssl.txt with comperr.hPeter Bierma3 days1-5/+5
| | | | | | | | | CLA: trivial Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26389)
* Fix dtls testsBernd Edlinger3 days1-0/+1
| | | | | | | | | | The dtls server process exits too early when the input has an EOF condition. Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26374)
* Revert "Use open2 instead of open for s_server instance"Bernd Edlinger3 days1-10/+54
| | | | | | | | | This reverts commit 4439ed16c5742e5ffb0417d45677900e77b299f2. Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26374)
* Revert "chomp does not work on windows."Bernd Edlinger3 days1-2/+1
| | | | | | | | | This reverts commit 3e94e2b11d73ed22c601f818b31b7c4ca281f5d1. Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26374)
* Revert "Do not confuse TAP::Parser by mixing up stderr with stdout."Bernd Edlinger3 days1-7/+1
| | | | | | | | | This reverts commit 3d3bb26a13dcc67f99e66de6a44ae9ced117f64b. Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26374)
* Correct documented KEM ids for OSSL_HPKE_str2suiteTom Fay3 days1-3/+3
| | | | | | | | CLA: trivial Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26159)
* Add a GitHub workflow to make a releaseDmitry Misharov3 days1-0/+41
| | | | | | | Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25662)
* genpkey: Avoid leaving empty file if encryption passphrase does not matchshridhar kalavagunta3 days3-18/+58
| | | | | | | | Fixes #25440 Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26081)
* Fix test failure in 30-test_evp_pkey_provided.tBernd Edlinger3 days1-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | In this test there is a random test output corruption. `make test TESTS=test_evp_pkey_provided V=1` has some random output, that can with a certain probability start a line with "ok" or so: # Setting up a OSSL_ENCODER context with passphrase # Testing with no encryption jLixONcRPi/m64CGie4KKKDuGeTjtYwfima3BNYCGlgbLGeK3yYxBfZb9JjviOJ4 # nHaNsRsONTAKyg== This happens because large random data is output to bio_out but some data remains buffered, and then test_note() is used to print some comments on the bio_err file. This causes output corruption that confuses the TAP parser. Fix that by flushing any pending output with test_flush_stdout() first. Fixes #23992 Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26383)
* Big and little-endian load and store supportViktor Dukhovni4 days9-1/+555
| | | | | | | | | These are needed in ML-KEM and ML-DSA, and are likely generally useful, so public. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26385)
* Finishing touch to perlasm update to make it work on OpenBSDsashan4 days2-6/+42
| | | | | | | | | | | | | This changeset brings a finishing touch to stuff we got from botovoq@ Changes to `crypto/perlasm/arm-xlate.pl` deal with verious assembler flavours to keep various assembler compilers happy. We also need to keep original code for 32-bit flavour in `crypto/aes/asm/aesv8-armx.pl`. Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24137)
* Make it able to run asm code on OpenBSD (arm64)Theo Buehler4 days12-73/+164
| | | | | | | | | | | | | | | In order to get asm code running on OpenBSD we must place all constants into .rodata sections. The change to crypto/perlasm/arm-xlate.pl adjusts changes from Theo for additional assembler variants/flavours we use for building OpenSSL. Fixes #23312 Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24137)
* drbg: provide requested amount of entropy, rather than self-strengthDimitri John Ledkov4 days1-1/+2
| | | | | | | | | | | | | | | | | | | | | | | Parent DRBG can be seed source (os or jitter) and thus able to provide unlimited entropy. get_entropy is documented to provide at least the request amount of entropy. If requested amount of entropy is same as, or less than drbg->strength, everything is compliant. However, if requested entropy is more than drbg->strength (unlikely, but possible), the returned amount of entropy will be insufficient and additional repeated calls to get_entropy will be required. Reading history of refactors, it seems to me that this function call previouslly had assumptions and usecases that couldn't ever request or require more than strength amount of entropy. If entropy is set, request that amount, otherwise request drbg->strength amount. Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/25850)
* Fix obvious misspelling of ASN1_VALUETom Cosgrove4 days1-2/+2
| | | | | | Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26118)
* Fix double 'the'sTom Cosgrove4 days3-4/+4
| | | | | | Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26118)
* LoongArch: we should access global symbol by la.global instead ofWang Xin4 days1-1/+1
| | | | | | | | | | | | | | la.pcrel openssl will not be built successfully with binutils-2.43.50.20241230 which checks if global symbols are accessed by PC-relative in shared library. CLA: trivial Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26336)
* Fix premature reuse of qp's in rcu locksNeil Horman4 days2-6/+19
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | An intermittent failure was noted on our new ppc64le CI runner, in which what appeared to be a corrupted or invalid value getting returned from a shared pointer under rcu protection Investigation showed that the problem was with our small number of qp's in a lock, and slightly incorrect accounting of the number of qp's available we were prematurely recycling qp's, which led in turn to premature completion of synchronization states, resulting in readers reading memory that may have already been freed. Fix it by: a) Ensuring that we account for the fact that the first qp in an rcu lock is allocated at the time the lock is created and b) Ensuring that we have a minimum number of 3 qp's: 1 that is free for write side allocation 1 that is in use by the write side currently 1 "next" qp that the read side can update while the prior qp is being retired With this change, the rcu threadstest runs indefinately in my testing Fixes #26356 Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26384)
* Fix intermittent test failure in 80-test_cmp_http.tBernd Edlinger4 days1-1/+1
| | | | | | | | | | | | | | | | output to stderr is unbuffered bypassing the normal output, which does not happen at line boundaries and is therefore confusing the TAP parser. This is known to cause random test failures like this one: 80-test_cmp_http.t (Wstat: 0 Tests: 5 Failed: 0) Parse errors: Tests out of sequence. Found (6) but expected (5) Bad plan. You planned 6 tests but ran 5. Fixes #23992 Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Saša Nedvědický <sashan@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26363)
* coveralls.yml: Avoid excluding subdirectories of already excluded dirsTomas Mraz5 days1-2/+0
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Saša Nedvědický <sashan@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26405)
* speed: Pass IV to EVP_CipherInit_ex for -evp runs with non-AEAD ciphersIngo Franzki5 days1-1/+1
| | | | | | | | | | | | | | | | | | Some (non-AEAD) ciphers require an IV to be used. Always pass a (dummy) IV when setting the key. It is ignored by ciphers that do not use an IV. Commit 607a46d003f472d4bce646f3df6e85725094d68a corrected the use of AEAD ciphers, but removed the IV from being passed to EVP_CipherInit_ex() for non-AEAD ciphers. Fixes: https://github.com/openssl/openssl/commit/607a46d003f472d4bce646f3df6e85725094d68a Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26346)
* Tweak case of [fs] variant letter in SLH-DSA algorithmsViktor Dukhovni7 days5-286/+286
| | | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26359)
* coveralls.yml: Add --ignore-errors mismatchTomas Mraz8 days1-0/+1
| | | | | | | | Once lcov is updated to 2.2 version or later, it could be dropped. Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/26381)
* Pre-ML-KEM/DSA decoder/encoder refactorViktor Dukhovni8 days3-61/+47
| | | | | | | | | Simplify some decoder/encoder internals to facilitate upcoming support for ML-KEM and ML-DSA. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26355)
* Fix buildinf.h generation for space and backslashKai Pastor8 days1-1/+3
| | | | | | | | | | | | | Builds may be configured with CC or CFLAGS containing space and double quotes. In particular on Windows, this may lead to passing more than two arguments into mkbuildinf.pl. In addition, backslashes must be escaped for constructing the C string. Fixes #26253. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26315)
* Update error codes in "crypto/err/openssl.txt"Michael Baentsch9 days1-2/+1
| | | | | | | | Fixes #26316 Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26330)
* Replace self-hosted runners with GitHub hostedDmitry Misharov9 days2-16/+86
| | | | | | Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26304)
* Fix memory leaks from missing checks of return value from ↵Frederik Wedel-Heinen9 days5-19/+38
| | | | | | | | sk_OPENSSL_STRING_push() Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26238)
* Fix the use of OPENSSL_HTTP_PROXY / OPENSSL_HTTPS_PROXYRichard Levitte9 days1-1/+1
| | | | | | | | Fixes #26337 Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26340)
* Fix encryption level orderingNeil Horman10 days2-41/+41
| | | | | | | | | | | | | | | | | | | | | | | | | | | | It was noticed recently that the enum for QUIC encryption levels doesn't match the ordering that is outlined in the RFC. RFC 9000 s. 12.2 and RFC 9002 s 14.4.1 indicate that encryption level ordering is INITIAL/0RTT/HANDSHAKE/1RTT, but our enum is in the order INITAL/HANDSHAKE/0RTT/1RTT. Our enum isn't a direct wire translation, so as long as the wire->enum mapping done in ossl_quic_pkt_type_to_enc_level is done consistently it ideally wouldn't matter, but because we do coalescing in ossl_quic_tx_packetiser_generate by iterating through all the values in the enum, its possible we may coalesce in the wrong order when we do start implementing 0RTT support. Fix it by adjusting the enum properly to match the RFC order. This also necessitates and adjustment to the archetypes array, which is a two dimensional array indexed by encryption level and frame archetype (PROBE/NORMAL/ACK ONLY). Moving the 0RTT enc level to index 1 requires moving the (formerly) index 2 0RTT array row to be at index 1. Fixes #26324 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Saša Nedvědický <sashan@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26334)
* Free data if sk_OPENSSL_STRING_push fails.Frederik Wedel-Heinen10 days2-2/+12
| | | | | | | | | Fixes #26203 Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26227)
* Return NULL from ossl_lib_ctx_get_concrete() when it is uninitializedFrederik Wedel-Heinen10 days2-4/+16
| | | | | | | | | | | When default_context_inited is set to false we return NULL instead of the global default context. Fixes #25442 Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26319)
* Added configuration for Embarcadero-Borland Clang Compiler 64 (BCC64)Семенов Герман10 days2-2/+63
| | | | | | | | | Signed-off-by: Герман Семенов <GermanAizek@yandex.ru> Signed-off-by: Herman Semenov <GermanAizek@yandex.ru> Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/23377)
* Check returns of various sk_*_push functionsFrederik Wedel-Heinen10 days11-18/+39
| | | | | | | | | | | | Check returns of sk_POLICY_MAPPING_push, sk_GENERAL_NAME_push, sk_ACCESS_DESCRIPTION_push, sk_X509_push, sk_X509_NAME_push, sk_OPENSSL_CSTRING_push, sk_SCT_push, sk_DIST_POINT_push, sk_OSSL_CMP_CRLSTATUS_push, sk_ASN1_UTF8STRING_push and sk_ASN1_OBJECT_push and handle appropriately. Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26240)
* Pass functions with correct signatures to the evp_generic_fetch_xxx methodsFrederik Wedel-Heinen10 days7-34/+104
| | | | | | | | | UBSan complains about functions being called with incorrect signatures. Relates to #22896 Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26318)
* Fix a funding.json errorMatt Caswell10 days1-6/+6
| | | | | | | | "Active" should be "active" Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/26327)
* Some PQ-related CSOR OIDsViktor Dukhovni11 days6-11/+444
| | | | | | | | Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26321)
* Fix potential memory leak in PKCS12_add_key_ex()Niels Dossche11 days1-1/+3
| | | | | | | | | | | p8 is allocated using EVP_PKEY2PKCS8(), but when PKCS8_add_keyusage() fails this memory is not freed. Fix this by adding a call to PKCS8_PRIV_KEY_INFO_free(). Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com> Reviewed-by: Hugo Landau <hlandau@devever.net> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25818)
* Fix a potential misaligned memory accessBernd Edlinger11 days1-1/+1
| | | | | | | | | in test/wpackettest.c:593:18: runtime error: load of misaligned address for type 'uint64_t', which requires 8 byte alignment. Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26269)