Skip to content

chore(deps): update dependency openssl/openssl to v3.5.0 #143

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Apr 8, 2025

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Apr 8, 2025

This PR contains the following updates:

Package Update Change
openssl/openssl minor 3.4.1 -> 3.5.0

Release Notes

openssl/openssl (openssl/openssl)

v3.5.0: OpenSSL 3.5.0

Compare Source

OpenSSL 3.5.0 is a feature release adding significant new functionality to
OpenSSL.

This release incorporates the following potentially significant or incompatible
changes:

  • Default encryption cipher for the req, cms, and smime applications
    changed from des-ede3-cbc to aes-256-cbc.

  • The default TLS supported groups list has been changed to include and
    prefer hybrid PQC KEM groups. Some practically unused groups were removed
    from the default list.

  • The default TLS keyshares have been changed to offer X25519MLKEM768 and
    and X25519.

  • All BIO_meth_get_*() functions were deprecated.

This release adds the following new features:

  • Support for server side QUIC (RFC 9000)

  • Support for 3rd party QUIC stacks including 0-RTT support

  • Support for PQC algorithms (ML-KEM, ML-DSA and SLH-DSA)

  • A new configuration option no-tls-deprecated-ec to disable support for
    TLS groups deprecated in RFC8422

  • A new configuration option enable-fips-jitter to make the FIPS provider
    to use the JITTER seed source

  • Support for central key generation in CMP

  • Support added for opaque symmetric key objects (EVP_SKEY)

  • Support for multiple TLS keyshares and improved TLS key establishment group
    configurability

  • API support for pipelining in provided cipher algorithms

Known issues in 3.5.0

  • #​27282
    Calling SSL_accept on objects returned from SSL_accept_connection
    results in error. It is expected that making this call will advance
    the SSL handshake for the passed connection, but currently it does not.
    This can be handled by calling SSL_do_handshake instead. A fix is planned
    for OpenSSL 3.5.1

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from cmeister2 April 8, 2025 13:41
Copy link
Collaborator

@cmeister2 cmeister2 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@cmeister2 cmeister2 merged commit a292bad into master Apr 8, 2025
18 checks passed
@renovate renovate bot deleted the renovate/openssl-openssl-3.x branch April 8, 2025 17:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

1 participant