summaryrefslogtreecommitdiffstats
path: root/README.md (unfollow)
Commit message (Collapse)AuthorFilesLines
3 daysExpanding trace of providers algorithms fetching/caching/etcDmitry Belyavskiy4-1/+26
Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26543)
3 daysAdd function X509_VERIFY_PARAM_get_purpose()Rajeev Ranjan4-0/+13
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25132)
3 daysCMP: add support for central key generationRajeev Ranjan37-153/+966
- add testcase for central keygen - add documentation Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25132)
3 daysFixes some memory leaks when errors occur in ossl_cmp_rp_new().Frederik Wedel-Heinen1-10/+9
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26235)
4 daysAlso expose an accessor for a single string provider config propertyViktor Dukhovni2-3/+15
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26550)
5 daysExclude amplificationlimit test with mvfst clientNeil Horman1-0/+3
The amplificationlimit interop test is failing currently with our server. However, based on the global nightly runs here: https://github.com/openssl/openssl/actions/runs/12860128783/job/35851614148 it appears to be failing in all test cases. Some analysis indicates that the client appears to abort operations early during frame loss in this test. As such just exclude the combination of this test and client. Re-add it later if it ever becomes functional Fixes openssl/project#1062 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26538)
5 daysFix magic + 20 in PEM_ASN1_write_bioSean Kannanaikal1-3/+2
Fixes #26476 In the file crypto/pem/pem_lib.c the function had a +20 to account for padding in the data size, however this was recognized to not be up to standard quality. Instead it has now been updated to use the static maximum block size and uses that for the calculation as opposed to a +20. CLA: trivial Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26526)
5 daysFix passing struct by value rather than by reference to syscallMae1-1/+1
Fixes #26521 CLA: trivial Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26523)
5 daystemplate_kem.c: Use proper printf format for size_tTomas Mraz1-3/+3
Fixes Coverity 1633351, 1633352, 1633354, 1633355 Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/26522)
5 daystemplate_kem.c: Check outlen before dereferencing itTomas Mraz1-2/+4
Fixes Coverity 1633353, 1633356, 1633357 Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/26522)
5 daysCheck returns of sk_X509_CRL_push and handle appropriately.Frederik Wedel-Heinen4-12/+22
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26234)
5 daysExpose the provider `c_get_params` function via PROV_CTX.Viktor Dukhovni5-0/+60
This applies to the base, default and FIPS providers, could be added in principle also to the legacy provider, but there's no compelling reason to do that at the moment. Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26530)
5 daysDon't lose config infopairs of built-in providersViktor Dukhovni1-15/+45
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26520)
6 daysos-zoo.yml: Add linux-s390x runnerDmitry Misharov1-0/+17
Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26489)
6 daysFix data race in asn1_str2tag() on tntmp which was accidentally made staticStas Cymbalov1-1/+2
Variables tntmp and tnst are declared in the same declaration and thus share storage class specifiers (static). This is unfortunate as tntmp is used during iteration through tnst array and shouldn't be static. In particular this leads to two problems that may arise when multiple threads are executing asn1_str2tag() concurrently: 1. asn1_str2tag() might return value that doesn't correspond to tagstr parameter. This can happen if other thread modifies tntmp to point to a different tnst element right after a successful name check in the if statement. 2. asn1_str2tag() might perform an out-of-bounds read of tnst array. This can happen when multiple threads all first execute tntmp = tnst; line and then start executing the loop. If that case those threads can end up incrementing tntmp past the end of tnst array. CLA: trivial Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26504)
6 dayseddsa_signverify_init(): Avoid memory leak on errorTomas Mraz1-0/+1
Add missing WPACKET_cleanup() call. Fixes Coverity 1638693 Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/26500)
6 daysmac_legacy_kmgmt.c: Avoid possible memory leak on errorTomas Mraz1-2/+2
Use mac_gen_cleanup() instead of just freeing the gctx. Fixes Coverity 1638702 Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/26500)
6 daystest_kdf_scrypt(): Test resetting the KDF contextTomas Mraz1-10/+16
Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/26488)
6 dayskdf_scrypt_reset(): NULLify freed pointersTomas Mraz1-0/+2
Otherwise doublefree happens with further usage. Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/26488)
6 daysscrypt: Do not free the context itself when fetch failsTomas Mraz1-1/+0
Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/26488)
6 daysconfig.pod: Fix typoAlexander Heinlein1-1/+1
CLA: trivial Signed-off-by: Alexander Heinlein <alexander.heinlein@web.de> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26497)
6 daysRefactor MAKE_ENCODER in ↵Richard Levitte1-105/+101
providers/implementations/encode_decode/encode_key2any.c It took a parameter 'evp_type', which isn't used. The comment describing it mentions a future refactoring, but it appears that this has already happened. Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Viktor Dukhovni <viktor@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26360)
6 daysGive DTLS tests more time to completeBernd Edlinger1-1/+1
Increase the timeout for DTLS tests to 10 seconds. But do that only for DTLS as this would waste time for other tests, most of the TLS tests do not need this at all. Fixes #26491 Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26502)
7 daysapps/cms.c: Cleanup for dead assignment to argcAlex Prabhat Bara1-1/+0
CLA: trivial Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26273)
7 daysrcu: Ensure that updates to the ID field of a qp don't lose refsNeil Horman1-4/+27
ppc64le occasionally still fails the threadstest on __rcu_torture From several days of debugging, I think I've landed on the problem. Occasionally, under high load I observe the following pattern CPU0 CPU1 update_qp get_hold_current_qp atomic_and_fetch(qp->users, ID_MASK, RELEASE) atomic_add_fetch(qp->users, 1, RELEASE atomic_or_fetch(qp->users, ID_VAL++, RELEASE) When this pattern occurs, the atomic or operation fails to see the published value of CPU1 and when the or-ed value is written back to ram, the incremented value in get_hold_current_qp is overwritten, meaning the hold that the reader placed on the rcu lock is lost, allowing the writer to complete early, freeing memory before a reader is done reading any held memory. Why this is only observed on ppc64le I'm not sure, but it seems like a pretty clear problem. fix it by implementing ATOMIC_COMPARE_EXCHANGE_N, so that, on the write side in update_qp, we can ensure that updates are only done if the read side hasn't changed anything. If it has, retry the operation. With this fix, I'm able to run the threads test overnight (4000 iterations and counting) without failure. Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26478)
7 daysbyteorder.h: Fix MSVC compiler error C2371Kelvin Lee1-0/+1
Compiling byteorder_test.c with VS2022 produces the following warnings and errors: E:\build\kiyolee\openssl\include\openssl\byteorder.h(24,21): warning C4164: '_byteswap_ushort': intrinsic function not declared (compiling source file '../../../test/byteorder_test.c') E:\build\kiyolee\openssl\include\openssl\byteorder.h(25,21): warning C4164: '_byteswap_ulong': intrinsic function not declared (compiling source file '../../../test/byteorder_test.c') E:\build\kiyolee\openssl\include\openssl\byteorder.h(26,21): warning C4164: '_byteswap_uint64': intrinsic function not declared (compiling source file '../../../test/byteorder_test.c') E:\build\kiyolee\openssl\include\openssl\byteorder.h(112,18): warning C4013: '_byteswap_ushort' undefined; assuming extern returning int (compiling source file '../../../test/byteorder_test.c') E:\build\kiyolee\openssl\include\openssl\byteorder.h(144,18): warning C4013: '_byteswap_ulong' undefined; assuming extern returning int (compiling source file '../../../test/byteorder_test.c') E:\build\kiyolee\openssl\include\openssl\byteorder.h(182,18): warning C4013: '_byteswap_uint64' undefined; assuming extern returning int (compiling source file '../../../test/byteorder_test.c') C:\Program Files (x86)\Windows Kits\10\Include\10.0.22621.0\ucrt\stdlib.h(298,41): error C2371: '_byteswap_ushort': redefinition; different basic types (compiling source file '../../../test/byteorder_test.c') C:\Program Files (x86)\Windows Kits\10\Include\10.0.22621.0\ucrt\stdlib.h(299,41): warning C4142: '_byteswap_ulong': benign redefinition of type (compiling source file '../../../test/byteorder_test.c') C:\Program Files (x86)\Windows Kits\10\Include\10.0.22621.0\ucrt\stdlib.h(300,41): error C2371: '_byteswap_uint64': redefinition; different basic types (compiling source file '../../../test/byteorder_test.c') CLA: trivial Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26448)
8 daysproviders/implementations/keymgmt/ec_kmgmt.c: Remove unused variableJiasheng Jiang1-2/+0
Remove unused variable "group". CLA: trivial Signed-off-by: Jiasheng Jiang <jiashengjiangcool@gmail.com> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26293)
8 daysImprove ASN1_TIME_print documentation and outputMichael Baentsch2-32/+31
This adds missing GMT indication when printing the local time as it is converted to the UTC timezone before printing. Also fixing the fractional seconds printing on EBCDIC platforms. Fixes #26313 Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26344)
8 dayskeymgmt: refactor fips indicator checkDimitri John Ledkov1-8/+4
Currently direct call to ossl_ec_check_security_strength is used, instead of ossl_fips_ind_ec_key_check() like in all other places. Make keymgmt do the same check as ecdh_exch and ecdsa_sig do. Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/25748)
8 dayss_socket: naccept: close listening socket after accepting clientsNadav Tasher1-2/+9
When `-naccept` is passed (i.e with `s_server`), the listening socket remains open while handling client, even after `naccept` is supposed to reach `0`. This is caused to to the decrementation of `naccept` and closing of the socket happening a little too late in the `do_server` function. Signed-off-by: Nadav Tasher <tashernadav@gmail.com> Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26228)
8 daysSupport boolean queries against provider configViktor Dukhovni4-5/+62
Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26455)
8 daysRevert "Move rodata to .rodata section for armv8"Alexey Moksyakov3-46/+22
This reverts commit 5b36728d974578f2c74e9f3d2ee6472187084882. Issue #26458 Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26498)
9 daysRestore correct registers in aarch64 AES-CTR codeJulian Andres Klode1-1/+1
Commit 1d1ca79fe35dbe5c05faed5a2ef8c4de9c5adc49 introduced save and restore for the registers, saving them as stp d8,d9,[sp, #16] stp d10,d11,[sp, #32] stp d12,d13,[sp, #48] stp d14,d15,[sp, #64] But the restore code was inadvertently typoed: ldp d8,d9,[sp, #16] ldp d10,d11,[sp, #32] ldp d12,d13,[sp, #48] ldp d15,d16,[sp, #64] Restoring [sp, #64] into d15,d16 instead of d14,d15. Fixes: #26466 CLA: trivial Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26469)
9 daysMove some encode helpers to crypt/encode_decode/Viktor Dukhovni3-217/+245
Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26487)
9 daysCheck return of OSSL_PROVIDER_do_all to avoid coverity noiseViktor Dukhovni1-2/+3
Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26462)
9 daysDon't promise a non-zero return size in error cases.Viktor Dukhovni1-66/+80
When a requested parameter has a non-NULL result pointer, and the error isn't simply that the result buffer is too small, don't return a non-zero result size. Returning a non-zero result size that isn't larger than the user's provided space is an indication that a result of that size was actually written, inviting trouble if the error indication was inadvertenly lost. Also, in such cases (wrong type, data can't be converted to the requested type when otherwise supported, ...) there is nothing useful to be done with the return size value, it can't help to address the problem. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/26436)
9 daysMake the provider context available to encodersViktor Dukhovni7-79/+166
At the moment the provider context is only available to encoders that encrypt, but it is useful more generally. A similar change has already been merged to "master" on the decoder side, this is the mirror change for encoders. The only significant difference is that PEM_ASN1_write_bio needed to be "extended" (cloned) to allow it to pass the provider context down to the `k2d` function it uses to encode the data. I had to "hold my nose" and live with the random "20" added to the data size in order to accomodate encryption with padding, which may produce one more cipher block than the input length. This really should ask the EVP layer about the block length of the cipher, and allocate the right amount. This should be a separate fix for both the old PEM_ASN1_write_bio() and the new PEM_ASN1_write_bio_ctx(). Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/26475)
10 daysAdd CHANGES.md and NEWS.md updates for CVE-2024-13176Tomas Mraz2-3/+25
Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/26429)
10 daysFix timing side-channel in ECDSA signature computationTomas Mraz3-9/+22
There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. Attacks on ECDSA nonce are also known as Minerva attack. Fixes CVE-2024-13176 Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> Reviewed-by: Paul Dale <ppzgs1@gmail.com> (Merged from https://github.com/openssl/openssl/pull/26429)
10 daysfix X509_PURPOSE_add() to take |sname| as primary key and handle |id| in a ↵Dr. David von Oheimb10-73/+266
backwd compat way for new purpose Fixes #25873 Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/26221)
10 daysfix X509_PURPOSE_set() to support clearing the purpose requirement as needed ↵Dr. David von Oheimb5-3/+6
for X509_VERIFY_PARAM_set_purpose() Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/26221)
10 daysIf you call X509_add_cert with cert == NULL and the X509_ADD_FLAG_UP_REFotherddn19782-0/+3
flag, it will сrash to X509_up_ref. Passing NULL here is not valid, return 0 if cert == NULL. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Frederik Wedel-Heinen <fwh.openssl@gmail.com> (Merged from https://github.com/openssl/openssl/pull/26267)
12 daysFix documentation of OSSL_ASYM_CIPHER_PARAM_IMPLICIT_REJECTIONRichard Levitte3-4/+7
This drops OSSL_PKEY_PARAM_IMPLICIT_REJECTION - which is a meaningless name - everywhere apart from still existing (for API stability, in case someone uses that macro). Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26421)
12 daystest: aAissuingDistributionPoint X.509v3 extensionJonathan M. Wilbur2-1/+34
Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26174)
12 daysdoc: aAissuingDistributionPoint X.509v3 extensionJonathan M. Wilbur2-0/+8
Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26174)
12 daysfeat: support the aAissuingDistributionPoint X.509v3 extensionJonathan M. Wilbur5-0/+189
Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26174)
12 daysSupport CLI and API setting of provider configuration parametersViktor Dukhovni11-29/+168
Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26427)
12 daysWork around to get llvm-mingw working on aarch64Alexandr Nedvedicky1-0/+9
It looks like llvm-mingw tool chain does not understand `.previous` asm directive (see https://sourceware.org/binutils/docs/as/Previous.html). As a workaround for win64 flavor (llvm-mingw toolchain) we let xlate to emit .text instead of emitting .previous. We also need to revisit usage of win64 flavor here in aarch64. We should perhaps introduce a mingw flavour on aarch64 as well. win assembly flavour should be used for microsoft assembler. Fixes #26415 Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26428)
12 daysMove rodata to .rodata section for armv8Alexey Moksyakov3-22/+46
Adds missing files where asm code is generated by perl scripts and read only constant is used PR #24137 closes #23312 Signed-off-by: Alexey Moksyakov <yavtuk@yandex.ru> Reviewed-by: Saša Nedvědický <sashan@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26440)
12 daysMissing .gitignore entriesDmitry Belyavskiy1-0/+21
Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Paul Dale <ppzgs1@gmail.com> Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/26418)