Coverity Scan: Analysis completed for openssl/openssl

2022-08-19 Thread scan-admin


Your request for analysis of openssl/openssl has been completed 
successfully.
The results are available at 
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yoN-2BQSVjTtaSz8wS4wOr7HlekBtV1P4YRtWclMVkCdvAA-3D-3Dy3E2_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeGvWwIIgqFKSr8RIUXcqDh5u-2BADZaBzsVj-2FMTuwQVP5V90UG2Ezuw2lR3jwQVT0hh0H5M5-2FtrtVotA-2FToAuTNonzo4QUVzi1TY5YNdCz3xrRBd9Vhg7CE3TIFi-2BEuayli66SMK8-2FpDOFQN-2Be0Xvu3nf9XfH58nxlpITOJAB3LhPx5WESyY53-2BcelUe95rLaVWk-3D

Build ID: 474562

Analysis Summary:
   New defects found: 0
   Defects eliminated: 76



[openssl/openssl] 6a9255: Update gitignore

2022-08-19 Thread Todd Short
  Branch: refs/heads/master
  Home:   https://github.com/openssl/openssl
  Commit: 6a9255054b345026bc847ddad72f2da93f30ce4c
  
https://github.com/openssl/openssl/commit/6a9255054b345026bc847ddad72f2da93f30ce4c
  Author: Todd Short 
  Date:   2022-08-19 (Fri, 19 Aug 2022)

  Changed paths:
M .gitignore

  Log Message:
  ---
  Update gitignore

Add test/timing_load_creds

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/19021)




[openssl/openssl] 87ceff: evp enc: cache cipher IV length

2022-08-19 Thread Pauli
  Branch: refs/heads/openssl-3.0
  Home:   https://github.com/openssl/openssl
  Commit: 87ceff925f5f1d43dac0413f36c8b7bba94e4a41
  
https://github.com/openssl/openssl/commit/87ceff925f5f1d43dac0413f36c8b7bba94e4a41
  Author: Pauli 
  Date:   2022-08-19 (Fri, 19 Aug 2022)

  Changed paths:
M crypto/evp/evp_enc.c
M crypto/evp/evp_lib.c
M crypto/evp/evp_local.h

  Log Message:
  ---
  evp enc: cache cipher IV length

Instead of doing a heavy params based query every time a context is asked for
its IV length, this value is cached in the context and only queried if it could
have been modified.

Fixes #17064

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/18995)


  Commit: 2e4b074800a293c5f3049286116a0a5030ea9312
  
https://github.com/openssl/openssl/commit/2e4b074800a293c5f3049286116a0a5030ea9312
  Author: Pauli 
  Date:   2022-08-19 (Fri, 19 Aug 2022)

  Changed paths:
M crypto/evp/evp_lib.c

  Log Message:
  ---
  Fix bug in EVP_CIPHER_CTX_get_iv_length()

Out of range values could possibly be returned due to a lack of range checking.
Very unlikely to be exploitable for our provider because sensible values are
returned for all ciphers.

Also fixed the defaulting code so that the cipher's IV length is returned if
the cipher ctx doesn't support getting.

Reviewed-by: Tomas Mraz 
Reviewed-by: Dmitry Belyavskiy 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/18995)


Compare: https://github.com/openssl/openssl/compare/d3072f3f3ba3...2e4b074800a2


[openssl/openssl] e0c4e4: BIO_sendmmsg/BIO_recvmmsg (API only)

2022-08-19 Thread Hugo Landau
  Branch: refs/heads/master
  Home:   https://github.com/openssl/openssl
  Commit: e0c4e43e40390e44614d14817e34b47e1c17d630
  
https://github.com/openssl/openssl/commit/e0c4e43e40390e44614d14817e34b47e1c17d630
  Author: Hugo Landau 
  Date:   2022-08-19 (Fri, 19 Aug 2022)

  Changed paths:
M crypto/bio/bio_cb.c
M crypto/bio/bio_err.c
M crypto/bio/bio_lib.c
M crypto/bio/bio_meth.c
M doc/build.info
M doc/man3/BIO_meth_new.pod
A doc/man3/BIO_sendmmsg.pod
M include/internal/bio.h
M include/openssl/bio.h.in
M include/openssl/bioerr.h
M util/libcrypto.num
M util/other.syms

  Log Message:
  ---
  BIO_sendmmsg/BIO_recvmmsg (API only)

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/18923)




[openssl/openssl] d3072f: Limit the size of various MAXCHUNK definitions

2022-08-19 Thread Pauli
  Branch: refs/heads/openssl-3.0
  Home:   https://github.com/openssl/openssl
  Commit: d3072f3f3ba3a6385bd41473483c9ee81443b684
  
https://github.com/openssl/openssl/commit/d3072f3f3ba3a6385bd41473483c9ee81443b684
  Author: Pauli 
  Date:   2022-08-19 (Fri, 19 Aug 2022)

  Changed paths:
M include/crypto/evp.h
M providers/implementations/include/prov/ciphercommon.h

  Log Message:
  ---
  Limit the size of various MAXCHUNK definitions

The current code has issues when sizeof(long) <> sizeof(size_t).  The two
types are assumed to be interchangeable and them being different will
cause crashes and endless loops.

This fix limits the maximum chunk size for many of the symmetric ciphers
to 2^30 bytes.  This chunk size limits the amount of data that will
be encrypted/decrypted in one lump.  The code internally handles block
of data later than the chunk limit, so this will present no difference
to the caller.  Any loss of efficiency due to limiting the chunking to
1Gbyte rather than more should be insignificant.

Fixes Coverity issues:
1508498, 1508500 - 1508505, 1508507 - 1508527, 1508529 - 1508533,
1508535 - 1508537, 1508539, 1508541 - 1508549, 1508551 - 1508569 &
1508571 - 1508582.

Reviewed-by: Dmitry Belyavskiy 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18997)

(cherry picked from commit 709d4be78f64a8ba0707fb5682b90039e848dad4)




[openssl/openssl] 709d4b: Limit the size of various MAXCHUNK definitions

2022-08-19 Thread Pauli
  Branch: refs/heads/master
  Home:   https://github.com/openssl/openssl
  Commit: 709d4be78f64a8ba0707fb5682b90039e848dad4
  
https://github.com/openssl/openssl/commit/709d4be78f64a8ba0707fb5682b90039e848dad4
  Author: Pauli 
  Date:   2022-08-19 (Fri, 19 Aug 2022)

  Changed paths:
M include/crypto/evp.h
M providers/implementations/include/prov/ciphercommon.h

  Log Message:
  ---
  Limit the size of various MAXCHUNK definitions

The current code has issues when sizeof(long) <> sizeof(size_t).  The two
types are assumed to be interchangeable and them being different will
cause crashes and endless loops.

This fix limits the maximum chunk size for many of the symmetric ciphers
to 2^30 bytes.  This chunk size limits the amount of data that will
be encrypted/decrypted in one lump.  The code internally handles block
of data later than the chunk limit, so this will present no difference
to the caller.  Any loss of efficiency due to limiting the chunking to
1Gbyte rather than more should be insignificant.

Fixes Coverity issues:
1508498, 1508500 - 1508505, 1508507 - 1508527, 1508529 - 1508533,
1508535 - 1508537, 1508539, 1508541 - 1508549, 1508551 - 1508569 &
1508571 - 1508582.

Reviewed-by: Dmitry Belyavskiy 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18997)