[openssl] master update
The branch master has been updated via 1751356267f64d5db8824cf4ff5b3496e15972da (commit) via b9d8ad3f157fa816c423bec6f7b4328ef894577c (commit) via d3aaf4e9e71944d869ae47821d7b5a8402234ee8 (commit) via 43332e405bea83a2d553e0519fdb04170879bc96 (commit) via 769cd46540b2ec2a2d91ee3886b9e4f9d78e9a51 (commit) via 2722eeceaa993f4488b295a22d2e1178f5ba1ce1 (commit) via 59558f9d8824747024b6ab756f3798a577ecae48 (commit) via cdcdcf5c6fa382c879cb3503609519d56fa62e81 (commit) via fe01052f775d1b5dff86ff9b405b6b0df5efd3cf (commit) via 4c1a841c3de645674ed2af92da25f7f5736fae1c (commit) via d54c52c28ebb780e2ffc5b7752d35359215cf0a6 (commit) via 95bd5ff65985e992827f7178deda84d95b1e6f66 (commit) via 0a10f71d3071bae0183cd4277da64d100f6b48eb (commit) via 6585d3aa7638c8cea2d4bb9f10e7298002f652e5 (commit) via c8adf19d2da318cd7b007753d6c8a7f9dc94d4ed (commit) via 5b030ec0800d4ad6022ecd00e18a19f77ada0b04 (commit) from a841d450a443efccf4df02922ebe02e4c2f11a2b (commit) - Log - commit 1751356267f64d5db8824cf4ff5b3496e15972da Author: Pauli Date: Wed Jan 26 12:01:57 2022 +1100 indentation fix Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit b9d8ad3f157fa816c423bec6f7b4328ef894577c Author: Pauli Date: Tue Jan 25 11:54:56 2022 +1100 tls1 prf: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit d3aaf4e9e71944d869ae47821d7b5a8402234ee8 Author: Pauli Date: Tue Jan 25 11:54:42 2022 +1100 pkcs12 kdf: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit 43332e405bea83a2d553e0519fdb04170879bc96 Author: Pauli Date: Tue Jan 25 11:47:23 2022 +1100 test: change pkey kdf dup fail test to a pkey kdf dup success test Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit 769cd46540b2ec2a2d91ee3886b9e4f9d78e9a51 Author: Pauli Date: Mon Jan 24 17:38:57 2022 +1100 k942 kdf: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit 2722eeceaa993f4488b295a22d2e1178f5ba1ce1 Author: Pauli Date: Mon Jan 24 17:32:16 2022 +1100 ss KDF: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit 59558f9d8824747024b6ab756f3798a577ecae48 Author: Pauli Date: Mon Jan 24 17:22:37 2022 +1100 ssh kdf: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit cdcdcf5c6fa382c879cb3503609519d56fa62e81 Author: Pauli Date: Mon Jan 24 17:17:58 2022 +1100 scrypt: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit fe01052f775d1b5dff86ff9b405b6b0df5efd3cf Author: Pauli Date: Mon Jan 24 17:08:58 2022 +1100 pvk kdf: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit 4c1a841c3de645674ed2af92da25f7f5736fae1c Author: Pauli Date: Mon Jan 24 17:02:29 2022 +1100 krb5kdf: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit d54c52c28ebb780e2ffc5b7752d35359215cf0a6 Author: Pauli Date: Mon Jan 24 16:58:54 2022 +1100 kbkdf: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit 95bd5ff65985e992827f7178deda84d95b1e6f66 Author: Pauli Date: Mon Jan 24 16:51:24 2022 +1100 hkdf: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit 0a10f71d3071bae0183cd4277da64d100f6b48eb Author: Pauli Date: Mon Jan 24 16:22:54 2022 +1100 pbkdf2: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit 6585d3aa7638c8cea2d4bb9f10e7298002f652e5 Author: Pauli Date: Mon Jan 24 16:17:44 2022 +1100 pbkdf1: implement ctx dup operation Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit c8adf19d2da318cd7b007753d6c8a7f9dc94d4ed Author: Pauli Date: Mon Jan 24 16:17:25 2022 +1100 evp_test: add a ctx dup operation to the KDF tests Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/17572) commit 5b030ec0800d4ad6022ecd00e18a19f77ada0b04 Author: Pauli Date: Wed Jan 26 15:21:51 2022 +1100 prov: add a safe memdup function fo
[openssl] openssl-3.0 update
The branch openssl-3.0 has been updated via b882e1bb0b520f264f2ea1f53e753a5ef1a5974a (commit) from 1f7c5c56c7365fefd9cff9bea4d3d27346ca44d1 (commit) - Log - commit b882e1bb0b520f264f2ea1f53e753a5ef1a5974a Author: EasySec Date: Sat Jan 29 00:59:24 2022 +0100 Fix bad HTML formatting in EVP_KEYEXCH-DH.html because of missing newline in pod file Reviewed-by: Shane Lontis Reviewed-by: Richard Levitte Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/17609) (cherry picked from commit a841d450a443efccf4df02922ebe02e4c2f11a2b) --- Summary of changes: doc/man7/EVP_KEYEXCH-DH.pod | 1 + 1 file changed, 1 insertion(+) diff --git a/doc/man7/EVP_KEYEXCH-DH.pod b/doc/man7/EVP_KEYEXCH-DH.pod index fc38531ae9..44811f1e37 100644 --- a/doc/man7/EVP_KEYEXCH-DH.pod +++ b/doc/man7/EVP_KEYEXCH-DH.pod @@ -58,6 +58,7 @@ To convert the received peer's public key from DER format on the host: To derive a shared secret on the host using the host's key and the peer's public key: + /* It is assumed that the host_key and peer_pub_key are set up */ void derive_secret(EVP_KEY *host_key, EVP_PKEY *peer_pub_key) {
[openssl] master update
The branch master has been updated via a841d450a443efccf4df02922ebe02e4c2f11a2b (commit) from 9927749ec2b8fc4b6146f0bd54cb6a44b8295974 (commit) - Log - commit a841d450a443efccf4df02922ebe02e4c2f11a2b Author: EasySec Date: Sat Jan 29 00:59:24 2022 +0100 Fix bad HTML formatting in EVP_KEYEXCH-DH.html because of missing newline in pod file Reviewed-by: Shane Lontis Reviewed-by: Richard Levitte Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/17609) --- Summary of changes: doc/man7/EVP_KEYEXCH-DH.pod | 1 + 1 file changed, 1 insertion(+) diff --git a/doc/man7/EVP_KEYEXCH-DH.pod b/doc/man7/EVP_KEYEXCH-DH.pod index fc38531ae9..44811f1e37 100644 --- a/doc/man7/EVP_KEYEXCH-DH.pod +++ b/doc/man7/EVP_KEYEXCH-DH.pod @@ -58,6 +58,7 @@ To convert the received peer's public key from DER format on the host: To derive a shared secret on the host using the host's key and the peer's public key: + /* It is assumed that the host_key and peer_pub_key are set up */ void derive_secret(EVP_KEY *host_key, EVP_PKEY *peer_pub_key) {
[openssl] master update
The branch master has been updated via 9927749ec2b8fc4b6146f0bd54cb6a44b8295974 (commit) from e180bf641ed23010073b0882d63d5dfd48409602 (commit) - Log - commit 9927749ec2b8fc4b6146f0bd54cb6a44b8295974 Author: Juergen Christ Date: Fri Jan 28 10:53:43 2022 +0100 Fix endianness problem in params_api_test On a big endian machine, we get test failures in params_api_test like # ERROR: (memory) 'buf1 == buf2' failed @ test/params_api_test.c:473 # --- buf1 # +++ buf2 # :-e901 # :+01e9 # # # OPENSSL_TEST_RAND_ORDER=1643313367 not ok 157 - iteration 3 They are due to an additional conversion copy. Remove this copy to solve the problem. Signed-off-by: Juergen Christ Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/17608) --- Summary of changes: test/params_api_test.c | 16 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/test/params_api_test.c b/test/params_api_test.c index d073477d5a..8aa6676e32 100644 --- a/test/params_api_test.c +++ b/test/params_api_test.c @@ -428,14 +428,15 @@ static int test_param_bignum(int n) int ret = 0; param.data = bnbuf; -param.data_size = len; +param.data_size = sizeof(bnbuf); -le_copy(buf, len, raw_values[n].value, len); if (!TEST_ptr(b = BN_lebin2bn(raw_values[n].value, (int)len, NULL))) goto err; -if (!TEST_true(OSSL_PARAM_set_BN(¶m, b)) -|| !TEST_mem_eq(bnbuf, param.return_size, buf, param.return_size)) +if (!TEST_true(OSSL_PARAM_set_BN(¶m, b))) +goto err; +le_copy(buf, len, bnbuf, sizeof(bnbuf)); +if (!TEST_mem_eq(raw_values[n].value, len, buf, len)) goto err; param.data_size = param.return_size; if (!TEST_true(OSSL_PARAM_get_BN(¶m, &c)) @@ -451,7 +452,7 @@ err: static int test_param_signed_bignum(int n) { -unsigned char buf1[MAX_LEN], buf2[MAX_LEN], bnbuf[MAX_LEN]; +unsigned char buf[MAX_LEN], bnbuf[MAX_LEN]; const size_t len = raw_values[n].len; BIGNUM *b = NULL, *c = NULL; OSSL_PARAM param = OSSL_PARAM_DEFN("bn", OSSL_PARAM_INTEGER, NULL, 0); @@ -460,7 +461,6 @@ static int test_param_signed_bignum(int n) param.data = bnbuf; param.data_size = sizeof(bnbuf); -le_copy(buf1, len, raw_values[n].value, len); if (!TEST_ptr(b = BN_signed_lebin2bn(raw_values[n].value, (int)len, NULL))) goto err; @@ -469,8 +469,8 @@ static int test_param_signed_bignum(int n) goto err; if (!TEST_true(OSSL_PARAM_set_BN(¶m, b))) goto err; -le_copy(buf2, len, bnbuf, sizeof(bnbuf)); -if (!TEST_mem_eq(buf1, len, buf2, len)) +le_copy(buf, len, bnbuf, sizeof(bnbuf)); +if (!TEST_mem_eq(raw_values[n].value, len, buf, len)) goto err; param.data_size = param.return_size; if (!TEST_true(OSSL_PARAM_get_BN(¶m, &c))
Coverity Scan: Analysis completed for openssl/openssl
Your request for analysis of openssl/openssl has been completed successfully. The results are available at https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yoN-2BQSVjTtaSz8wS4wOr7HlekBtV1P4YRtWclMVkCdvAA-3D-3DbNh7_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeGsLDTlY0A3H-2Bvdcr5B5NlTNfbNLK34Oo6zm8I-2FIvvEOMA8Uoj3BxahvH-2B4cdJbnmNuzUoBGcPKY1aeuU9lPv8RDKPWnWtwvP1oo2HLtONbupgJVNRCMLHnph0RPa0JctjCRdSaXMJrYpRYj-2F6-2FdhgbWNG9iTbnxAsomLi1jkvjfd52rkTs1aaWtG-2BKFnUBFS8-3D Build ID: 434044 Analysis Summary: New defects found: 0 Defects eliminated: 0