Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package aws-c-io for openSUSE:Factory checked in at 2025-10-04 18:51:24 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/aws-c-io (Old) and /work/SRC/openSUSE:Factory/.aws-c-io.new.11973 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "aws-c-io" Sat Oct 4 18:51:24 2025 rev:30 rq:1308870 version:0.22.1 Changes: -------- --- /work/SRC/openSUSE:Factory/aws-c-io/aws-c-io.changes 2025-09-19 16:10:53.462021945 +0200 +++ /work/SRC/openSUSE:Factory/.aws-c-io.new.11973/aws-c-io.changes 2025-10-04 18:53:00.210172488 +0200 @@ -1,0 +2,7 @@ +Tue Sep 30 08:03:35 UTC 2025 - John Paul Adrian Glaubitz <[email protected]> + +- Update to version 0.22.1 + * (Darwin) Fix leaks on setting unsupported cipher pref + by @xiazhvera in (#757) + +------------------------------------------------------------------- Old: ---- v0.22.0.tar.gz New: ---- v0.22.1.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ aws-c-io.spec ++++++ --- /var/tmp/diff_new_pack.l6wGDn/_old 2025-10-04 18:53:00.714193484 +0200 +++ /var/tmp/diff_new_pack.l6wGDn/_new 2025-10-04 18:53:00.714193484 +0200 @@ -21,7 +21,7 @@ %define library_version 1.0.0 %define library_soversion 0unstable Name: aws-c-io -Version: 0.22.0 +Version: 0.22.1 Release: 0 Summary: I/O and TLS package AWS SDK for C License: Apache-2.0 ++++++ v0.22.0.tar.gz -> v0.22.1.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/aws-c-io-0.22.0/source/darwin/secure_transport_tls_channel_handler.c new/aws-c-io-0.22.1/source/darwin/secure_transport_tls_channel_handler.c --- old/aws-c-io-0.22.0/source/darwin/secure_transport_tls_channel_handler.c 2025-09-09 23:50:02.000000000 +0200 +++ new/aws-c-io-0.22.1/source/darwin/secure_transport_tls_channel_handler.c 2025-09-30 01:14:59.000000000 +0200 @@ -1071,14 +1071,14 @@ } static struct aws_tls_ctx *s_tls_ctx_new(struct aws_allocator *alloc, const struct aws_tls_ctx_options *options) { - struct secure_transport_ctx *secure_transport_ctx = aws_mem_calloc(alloc, 1, sizeof(struct secure_transport_ctx)); - if (!aws_tls_is_cipher_pref_supported(options->cipher_pref)) { aws_raise_error(AWS_IO_TLS_CIPHER_PREF_UNSUPPORTED); AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: TLS Cipher Preference is not supported: %d.", options->cipher_pref); return NULL; } + struct secure_transport_ctx *secure_transport_ctx = aws_mem_calloc(alloc, 1, sizeof(struct secure_transport_ctx)); + secure_transport_ctx->wrapped_allocator = aws_wrapped_cf_allocator_new(alloc); if (!secure_transport_ctx->wrapped_allocator) { goto cleanup_secure_transport_ctx; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/aws-c-io-0.22.0/tests/CMakeLists.txt new/aws-c-io-0.22.1/tests/CMakeLists.txt --- old/aws-c-io-0.22.0/tests/CMakeLists.txt 2025-09-09 23:50:02.000000000 +0200 +++ new/aws-c-io-0.22.1/tests/CMakeLists.txt 2025-09-30 01:14:59.000000000 +0200 @@ -290,6 +290,8 @@ add_net_test_case(alpn_successfully_negotiates) add_net_test_case(alpn_no_protocol_message) add_net_test_case(test_ecc_cert_import) + + add_test_case(test_tls_cipher_preference) if(NOT AWS_USE_SECITEM) # These tests require the test binary to be codesigned with an Apple Developer account with entitlements. # The entitlements also require a provisioning profile and require the binary to be run from within XCode or a diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/aws-c-io-0.22.0/tests/tls_handler_test.c new/aws-c-io-0.22.1/tests/tls_handler_test.c --- old/aws-c-io-0.22.0/tests/tls_handler_test.c 2025-09-09 23:50:02.000000000 +0200 +++ new/aws-c-io-0.22.1/tests/tls_handler_test.c 2025-09-30 01:14:59.000000000 +0200 @@ -2718,4 +2718,31 @@ AWS_TEST_CASE(test_pkcs8_import, s_test_pkcs8_import) +static int s_test_tls_cipher_preference_fn(struct aws_allocator *allocator, void *ctx) { + (void)ctx; + aws_io_library_init(allocator); + + struct aws_tls_ctx_options tls_options; + aws_tls_ctx_options_init_default_client(&tls_options, allocator); + + aws_tls_ctx_options_set_tls_cipher_preference(&tls_options, AWS_IO_TLS_CIPHER_PREF_TLSV1_2_2025_07); + /* Creating tls context */ + struct aws_tls_ctx *tls_context = aws_tls_client_ctx_new(allocator, &tls_options); +# ifdef USE_S2N + ASSERT_NOT_NULL(tls_context); + aws_tls_ctx_release(tls_context); +# else + /* The cipher suite currently only available with S2N */ + ASSERT_NULL(tls_context); + ASSERT_INT_EQUALS(AWS_IO_TLS_CIPHER_PREF_UNSUPPORTED, aws_last_error()); +# endif + + aws_tls_ctx_options_clean_up(&tls_options); + aws_io_library_clean_up(); + + return AWS_OP_SUCCESS; +} + +AWS_TEST_CASE(test_tls_cipher_preference, s_test_tls_cipher_preference_fn) + #endif /* BYO_CRYPTO */
