Skip to content

OpenSSL 3.3, 3.4, 3.5 features to expose #12610

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
2 of 4 tasks
h-vetinari opened this issue Mar 12, 2025 · 3 comments
Open
2 of 4 tasks

OpenSSL 3.3, 3.4, 3.5 features to expose #12610

h-vetinari opened this issue Mar 12, 2025 · 3 comments

Comments

@h-vetinari
Copy link

h-vetinari commented Mar 12, 2025

This is a continuation of #9795 for newer versions. The points here are simply harvested from the feature list in openssl's NEWS.md, not all of them are necessarily applicable to cryptography (but I don't know how to make that determination, so I opted to err on the side of completeness). Please feel free to prune/edit/expand the list as you see fit.

  • OpenSSL v3.3

    • Added a new EVP_DigestSqueeze() API. This allows SHAKE to squeeze multiple times with different output sizes.
    • New atexit configuration switch, which controls whether the OPENSSL_cleanup is registered when libcrypto is unloaded.
  • OpenSSL v3.4

  • OpenSSL v3.5

    • Support for PQC algorithms (ML-KEM, ML-DSA, SLH-DSA)
    • Support added for opaque symmetric key objects (EVP_SKEY).
@ralienpp
Copy link
Contributor

In this context I'd like to revive the discussion: #11473

OpenSSL 3.5 extends the default provider with support for NIST finalists of the post-quantum algorithm competition, so I hope this brings the possibility of using PQ algorithms via cryptography closer to reality.

@alex
Copy link
Member

alex commented Mar 14, 2025

Once 3.5 is out, I'd like to add PQ algorithms.

This is somewhat tempered by the fact that they're all behind atrocious new OpenSSL APIs.

(I don't think the current list of everything from the OpenSSL changelogs is especially useful, as the vast majority of these ideas have no implications for our APIs.)

@h-vetinari
Copy link
Author

I don't think the current list of everything from the OpenSSL changelogs is especially useful, as the vast majority of these ideas have no implications for our APIs.

Please just wantonly delete what has no place here. I find it hard to tell which pieces may affect cryptography, so I didn't prune the list.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

3 participants