[openssl] master update

2022-01-31 Thread Dr . Paul Dale
The branch master has been updated
   via  1751356267f64d5db8824cf4ff5b3496e15972da (commit)
   via  b9d8ad3f157fa816c423bec6f7b4328ef894577c (commit)
   via  d3aaf4e9e71944d869ae47821d7b5a8402234ee8 (commit)
   via  43332e405bea83a2d553e0519fdb04170879bc96 (commit)
   via  769cd46540b2ec2a2d91ee3886b9e4f9d78e9a51 (commit)
   via  2722eeceaa993f4488b295a22d2e1178f5ba1ce1 (commit)
   via  59558f9d8824747024b6ab756f3798a577ecae48 (commit)
   via  cdcdcf5c6fa382c879cb3503609519d56fa62e81 (commit)
   via  fe01052f775d1b5dff86ff9b405b6b0df5efd3cf (commit)
   via  4c1a841c3de645674ed2af92da25f7f5736fae1c (commit)
   via  d54c52c28ebb780e2ffc5b7752d35359215cf0a6 (commit)
   via  95bd5ff65985e992827f7178deda84d95b1e6f66 (commit)
   via  0a10f71d3071bae0183cd4277da64d100f6b48eb (commit)
   via  6585d3aa7638c8cea2d4bb9f10e7298002f652e5 (commit)
   via  c8adf19d2da318cd7b007753d6c8a7f9dc94d4ed (commit)
   via  5b030ec0800d4ad6022ecd00e18a19f77ada0b04 (commit)
  from  a841d450a443efccf4df02922ebe02e4c2f11a2b (commit)


- Log -
commit 1751356267f64d5db8824cf4ff5b3496e15972da
Author: Pauli 
Date:   Wed Jan 26 12:01:57 2022 +1100

indentation fix

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit b9d8ad3f157fa816c423bec6f7b4328ef894577c
Author: Pauli 
Date:   Tue Jan 25 11:54:56 2022 +1100

tls1 prf: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit d3aaf4e9e71944d869ae47821d7b5a8402234ee8
Author: Pauli 
Date:   Tue Jan 25 11:54:42 2022 +1100

pkcs12 kdf: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit 43332e405bea83a2d553e0519fdb04170879bc96
Author: Pauli 
Date:   Tue Jan 25 11:47:23 2022 +1100

test: change pkey kdf dup fail test to a pkey kdf dup success test

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit 769cd46540b2ec2a2d91ee3886b9e4f9d78e9a51
Author: Pauli 
Date:   Mon Jan 24 17:38:57 2022 +1100

k942 kdf: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit 2722eeceaa993f4488b295a22d2e1178f5ba1ce1
Author: Pauli 
Date:   Mon Jan 24 17:32:16 2022 +1100

ss KDF: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit 59558f9d8824747024b6ab756f3798a577ecae48
Author: Pauli 
Date:   Mon Jan 24 17:22:37 2022 +1100

ssh kdf: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit cdcdcf5c6fa382c879cb3503609519d56fa62e81
Author: Pauli 
Date:   Mon Jan 24 17:17:58 2022 +1100

scrypt: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit fe01052f775d1b5dff86ff9b405b6b0df5efd3cf
Author: Pauli 
Date:   Mon Jan 24 17:08:58 2022 +1100

pvk kdf: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit 4c1a841c3de645674ed2af92da25f7f5736fae1c
Author: Pauli 
Date:   Mon Jan 24 17:02:29 2022 +1100

krb5kdf: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit d54c52c28ebb780e2ffc5b7752d35359215cf0a6
Author: Pauli 
Date:   Mon Jan 24 16:58:54 2022 +1100

kbkdf: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit 95bd5ff65985e992827f7178deda84d95b1e6f66
Author: Pauli 
Date:   Mon Jan 24 16:51:24 2022 +1100

hkdf: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit 0a10f71d3071bae0183cd4277da64d100f6b48eb
Author: Pauli 
Date:   Mon Jan 24 16:22:54 2022 +1100

pbkdf2: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit 6585d3aa7638c8cea2d4bb9f10e7298002f652e5
Author: Pauli 
Date:   Mon Jan 24 16:17:44 2022 +1100

pbkdf1: implement ctx dup operation

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit c8adf19d2da318cd7b007753d6c8a7f9dc94d4ed
Author: Pauli 
Date:   Mon Jan 24 16:17:25 2022 +1100

evp_test: add a ctx dup operation to the KDF tests

Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/17572)

commit 5b030ec0800d4ad6022ecd00e18a19f77ada0b04
Author: Pauli 
Date:   Wed Jan 26 15:21:51 2022 +1100

prov: add a safe memdup function fo

[openssl] openssl-3.0 update

2022-01-31 Thread Dr . Paul Dale
The branch openssl-3.0 has been updated
   via  b882e1bb0b520f264f2ea1f53e753a5ef1a5974a (commit)
  from  1f7c5c56c7365fefd9cff9bea4d3d27346ca44d1 (commit)


- Log -
commit b882e1bb0b520f264f2ea1f53e753a5ef1a5974a
Author: EasySec 
Date:   Sat Jan 29 00:59:24 2022 +0100

Fix bad HTML formatting in EVP_KEYEXCH-DH.html because of missing newline 
in pod file

Reviewed-by: Shane Lontis 
Reviewed-by: Richard Levitte 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/17609)

(cherry picked from commit a841d450a443efccf4df02922ebe02e4c2f11a2b)

---

Summary of changes:
 doc/man7/EVP_KEYEXCH-DH.pod | 1 +
 1 file changed, 1 insertion(+)

diff --git a/doc/man7/EVP_KEYEXCH-DH.pod b/doc/man7/EVP_KEYEXCH-DH.pod
index fc38531ae9..44811f1e37 100644
--- a/doc/man7/EVP_KEYEXCH-DH.pod
+++ b/doc/man7/EVP_KEYEXCH-DH.pod
@@ -58,6 +58,7 @@ To convert the received peer's public key from DER format on 
the host:
 
 To derive a shared secret on the host using the host's key and the peer's 
public
 key:
+
 /* It is assumed that the host_key and peer_pub_key are set up */
 void derive_secret(EVP_KEY *host_key, EVP_PKEY *peer_pub_key)
 {


[openssl] master update

2022-01-31 Thread Dr . Paul Dale
The branch master has been updated
   via  a841d450a443efccf4df02922ebe02e4c2f11a2b (commit)
  from  9927749ec2b8fc4b6146f0bd54cb6a44b8295974 (commit)


- Log -
commit a841d450a443efccf4df02922ebe02e4c2f11a2b
Author: EasySec 
Date:   Sat Jan 29 00:59:24 2022 +0100

Fix bad HTML formatting in EVP_KEYEXCH-DH.html because of missing newline 
in pod file

Reviewed-by: Shane Lontis 
Reviewed-by: Richard Levitte 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/17609)

---

Summary of changes:
 doc/man7/EVP_KEYEXCH-DH.pod | 1 +
 1 file changed, 1 insertion(+)

diff --git a/doc/man7/EVP_KEYEXCH-DH.pod b/doc/man7/EVP_KEYEXCH-DH.pod
index fc38531ae9..44811f1e37 100644
--- a/doc/man7/EVP_KEYEXCH-DH.pod
+++ b/doc/man7/EVP_KEYEXCH-DH.pod
@@ -58,6 +58,7 @@ To convert the received peer's public key from DER format on 
the host:
 
 To derive a shared secret on the host using the host's key and the peer's 
public
 key:
+
 /* It is assumed that the host_key and peer_pub_key are set up */
 void derive_secret(EVP_KEY *host_key, EVP_PKEY *peer_pub_key)
 {


[openssl] master update

2022-01-31 Thread Dr . Paul Dale
The branch master has been updated
   via  9927749ec2b8fc4b6146f0bd54cb6a44b8295974 (commit)
  from  e180bf641ed23010073b0882d63d5dfd48409602 (commit)


- Log -
commit 9927749ec2b8fc4b6146f0bd54cb6a44b8295974
Author: Juergen Christ 
Date:   Fri Jan 28 10:53:43 2022 +0100

Fix endianness problem in params_api_test

On a big endian machine, we get test failures in params_api_test like

# ERROR: (memory) 'buf1 == buf2' failed @ test/params_api_test.c:473
# --- buf1
# +++ buf2
# :-e901
# :+01e9
#   
#
# OPENSSL_TEST_RAND_ORDER=1643313367
not ok 157 - iteration 3

They are due to an additional conversion copy.  Remove this copy to solve 
the
problem.

Signed-off-by: Juergen Christ 

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/17608)

---

Summary of changes:
 test/params_api_test.c | 16 
 1 file changed, 8 insertions(+), 8 deletions(-)

diff --git a/test/params_api_test.c b/test/params_api_test.c
index d073477d5a..8aa6676e32 100644
--- a/test/params_api_test.c
+++ b/test/params_api_test.c
@@ -428,14 +428,15 @@ static int test_param_bignum(int n)
 int ret = 0;
 
 param.data = bnbuf;
-param.data_size = len;
+param.data_size = sizeof(bnbuf);
 
-le_copy(buf, len, raw_values[n].value, len);
 if (!TEST_ptr(b = BN_lebin2bn(raw_values[n].value, (int)len, NULL)))
 goto err;
 
-if (!TEST_true(OSSL_PARAM_set_BN(¶m, b))
-|| !TEST_mem_eq(bnbuf, param.return_size, buf, param.return_size))
+if (!TEST_true(OSSL_PARAM_set_BN(¶m, b)))
+goto err;
+le_copy(buf, len, bnbuf, sizeof(bnbuf));
+if (!TEST_mem_eq(raw_values[n].value, len, buf, len))
 goto err;
 param.data_size = param.return_size;
 if (!TEST_true(OSSL_PARAM_get_BN(¶m, &c))
@@ -451,7 +452,7 @@ err:
 
 static int test_param_signed_bignum(int n)
 {
-unsigned char buf1[MAX_LEN], buf2[MAX_LEN], bnbuf[MAX_LEN];
+unsigned char buf[MAX_LEN], bnbuf[MAX_LEN];
 const size_t len = raw_values[n].len;
 BIGNUM *b = NULL, *c = NULL;
 OSSL_PARAM param = OSSL_PARAM_DEFN("bn", OSSL_PARAM_INTEGER, NULL, 0);
@@ -460,7 +461,6 @@ static int test_param_signed_bignum(int n)
 param.data = bnbuf;
 param.data_size = sizeof(bnbuf);
 
-le_copy(buf1, len, raw_values[n].value, len);
 if (!TEST_ptr(b = BN_signed_lebin2bn(raw_values[n].value, (int)len, NULL)))
 goto err;
 
@@ -469,8 +469,8 @@ static int test_param_signed_bignum(int n)
 goto err;
 if (!TEST_true(OSSL_PARAM_set_BN(¶m, b)))
 goto err;
-le_copy(buf2, len, bnbuf, sizeof(bnbuf));
-if (!TEST_mem_eq(buf1, len, buf2, len))
+le_copy(buf, len, bnbuf, sizeof(bnbuf));
+if (!TEST_mem_eq(raw_values[n].value, len, buf, len))
 goto err;
 param.data_size = param.return_size;
 if (!TEST_true(OSSL_PARAM_get_BN(¶m, &c))


Coverity Scan: Analysis completed for openssl/openssl

2022-01-31 Thread scan-admin


Your request for analysis of openssl/openssl has been completed 
successfully.
The results are available at 
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yoN-2BQSVjTtaSz8wS4wOr7HlekBtV1P4YRtWclMVkCdvAA-3D-3DbNh7_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeGsLDTlY0A3H-2Bvdcr5B5NlTNfbNLK34Oo6zm8I-2FIvvEOMA8Uoj3BxahvH-2B4cdJbnmNuzUoBGcPKY1aeuU9lPv8RDKPWnWtwvP1oo2HLtONbupgJVNRCMLHnph0RPa0JctjCRdSaXMJrYpRYj-2F6-2FdhgbWNG9iTbnxAsomLi1jkvjfd52rkTs1aaWtG-2BKFnUBFS8-3D

Build ID: 434044

Analysis Summary:
   New defects found: 0
   Defects eliminated: 0