Coverity Scan: Analysis completed for openssl/openssl
Your request for analysis of openssl/openssl has been completed successfully. The results are available at https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yoN-2BQSVjTtaSz8wS4wOr7HlekBtV1P4YRtWclMVkCdvAA-3D-3D4NDL_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeGe0ngQSyvkRt3s7ccmYefsKliddSn5ZypkuJLGwTnDrG6vSgyQjkH9VYVliW1BXSra-2F78YZ-2Fp1FyxWgwM3UbJ2Ad2bJWsz86tZcSQ0spdHDq7wWMG5xy6wFy28FhZ7V4e3C4L2cEfco8p1-2BwMU8cMQtuMIy2X-2BFgtY4apc6vgWaCm1rpFR221yZT8JGJZcPvA-3D Build ID: 451341 Analysis Summary: New defects found: 0 Defects eliminated: 0
[openssl/openssl] 130de7: Public API functions OPENSSL_str[n]casecmp
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: 130de70e0f85ecec08fcfe4daed1d0c491089ea6 https://github.openssl.org/openssl/openssl/commit/130de70e0f85ecec08fcfe4daed1d0c491089ea6 Author: Dmitry Belyavskiy Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M crypto/context.c M crypto/ctype.c M crypto/init.c M doc/build.info A doc/man3/OPENSSL_strcasecmp.pod M e_os.h M include/crypto/ctype.h M include/internal/core.h M include/openssl/crypto.h.in M util/libcrypto.num Log Message: --- Public API functions OPENSSL_str[n]casecmp Reviewed-by: Tim Hudson Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18103) Commit: 467b6f17a6747fd2e09b7c1475f2e9c91ef2e0ed https://github.openssl.org/openssl/openssl/commit/467b6f17a6747fd2e09b7c1475f2e9c91ef2e0ed Author: Dmitry Belyavskiy Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M providers/fips/fipsprov.c Log Message: --- FIPS provider modifications Reviewed-by: Tim Hudson Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18103) Commit: a8e4ddc6d15b6e6b308428753bc22b12422adacf https://github.openssl.org/openssl/openssl/commit/a8e4ddc6d15b6e6b308428753bc22b12422adacf Author: Dmitry Belyavskiy Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M .github/workflows/ci.yml M test/build.info A test/localetest.c A test/recipes/02-test_localetest.t Log Message: --- Minimal test checking we can get public key in Turkish locale (cherry picked from commit 6ae39acaf0c3578850be6699026a3a5c3f4bdfce) Reviewed-by: Tim Hudson Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18103) Commit: 2c31d942af28a20e87979cbc76c3dd8d162c1a9c https://github.openssl.org/openssl/openssl/commit/2c31d942af28a20e87979cbc76c3dd8d162c1a9c Author: Dmitry Belyavskiy Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M apps/ca.c M apps/cmp.c M apps/ecparam.c M apps/lib/apps.c M apps/lib/engine_loader.c M apps/lib/http_server.c M apps/lib/names.c M apps/lib/vms_term_sock.c M apps/list.c M apps/rehash.c M apps/s_server.c M crypto/LPdir_unix.c M crypto/asn1/ameth_lib.c M crypto/asn1/asn1_gen.c M crypto/conf/conf_def.c M crypto/core_namemap.c M crypto/dh/dh_group_params.c M crypto/ec/ec_backend.c M crypto/ec/ec_lib.c M crypto/encode_decode/decoder_lib.c M crypto/encode_decode/decoder_pkey.c M crypto/encode_decode/encoder_lib.c M crypto/encode_decode/encoder_pkey.c M crypto/engine/tb_asnmth.c M crypto/evp/ctrl_params_translate.c M crypto/evp/ec_support.c M crypto/evp/evp_lib.c M crypto/evp/p_lib.c M crypto/ffc/ffc_dh.c M crypto/ffc/ffc_params.c M crypto/http/http_client.c M crypto/objects/o_names.c M crypto/params_dup.c M crypto/property/property_parse.c M crypto/rand/rand_lib.c M crypto/rsa/rsa_backend.c M crypto/store/store_lib.c M crypto/store/store_result.c M crypto/trace.c M crypto/x509/v3_tlsf.c M crypto/x509/v3_utl.c M engines/e_devcrypto.c M engines/e_loader_attic.c M engines/e_ossltest.c M providers/common/capabilities.c M providers/implementations/ciphers/cipher_cts.c M providers/implementations/kdfs/hkdf.c M providers/implementations/kdfs/kbkdf.c M providers/implementations/kdfs/tls1_prf.c M providers/implementations/kem/rsa_kem.c M providers/implementations/keymgmt/dsa_kmgmt.c M providers/implementations/keymgmt/ec_kmgmt.c M providers/implementations/keymgmt/ecx_kmgmt.c M providers/implementations/keymgmt/mac_legacy_kmgmt.c M providers/implementations/rands/drbg_ctr.c M providers/implementations/signature/rsa_sig.c M providers/implementations/storemgmt/file_store.c M ssl/ssl_conf.c M test/bntest.c M test/evp_extra_test.c M test/evp_libctx_test.c M test/evp_test.c M test/helpers/ssl_test_ctx.c M test/params_conversion_test.c M test/ssl_old_test.c M test/v3nametest.c Log Message: --- str[n]casecmp => OPENSSL_strncasecmp Reviewed-by: Tim Hudson Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18103) Compare: https://github.openssl.org/openssl/openssl/compare/455e158ef9b3...2c31d942af28
[openssl/openssl] 5adddc: Fix gcc 6.3 builds of aarch64 BSAES
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 5adddcd96255112ff04b350d661518302159e7e2 https://github.openssl.org/openssl/openssl/commit/5adddcd96255112ff04b350d661518302159e7e2 Author: Tom Cosgrove Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M crypto/aes/asm/bsaes-armv8.pl Log Message: --- Fix gcc 6.3 builds of aarch64 BSAES gcc6.3 doesn't seem to support the register aliases fp and lr for x29 and x30, so use the x names. Fixes #18114 Change-Id: I077edda42af4c7cdb7b24f28ac82d1603f550108 Reviewed-by: Shane Lontis Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18127)
[openssl/openssl] 455e15: Clear incorrectly reported errors in cms_io.
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: 455e158ef9b3b600738f5b01190c2b7083d3d0ba https://github.openssl.org/openssl/openssl/commit/455e158ef9b3b600738f5b01190c2b7083d3d0ba Author: Daniel Fiala Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M crypto/cms/cms_io.c M test/cmsapitest.c M test/recipes/80-test_cmsapi.t A test/recipes/80-test_cmsapi_data/encryptedData.der Log Message: --- Clear incorrectly reported errors in cms_io. Fixes openssl#17841. Reviewed-by: Shane Lontis Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18109) (cherry picked from commit 45a3c592b94b66cab72e5bffbaf9d810c3fb29c0)
[openssl/openssl] 45a3c5: Clear incorrectly reported errors in cms_io.
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 45a3c592b94b66cab72e5bffbaf9d810c3fb29c0 https://github.openssl.org/openssl/openssl/commit/45a3c592b94b66cab72e5bffbaf9d810c3fb29c0 Author: Daniel Fiala Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M crypto/cms/cms_io.c M test/cmsapitest.c M test/recipes/80-test_cmsapi.t A test/recipes/80-test_cmsapi_data/encryptedData.der Log Message: --- Clear incorrectly reported errors in cms_io. Fixes openssl#17841. Reviewed-by: Shane Lontis Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18109)
[openssl/openssl] ea5ef3: Fix a possible NULL pointer dereference in create_...
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: ea5ef33be1bd4fbd89143932a4d12a72003913a5 https://github.openssl.org/openssl/openssl/commit/ea5ef33be1bd4fbd89143932a4d12a72003913a5 Author: Zhou Qingyang Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M apps/ts.c Log Message: --- Fix a possible NULL pointer dereference in create_cert_store() In create_cert_store(), X509_STORE_new() is called and there is a dereference of it in following function X509_STORE_add_lookup() without check, which could lead to NULL pointer dereference. Fix this by adding a NULL check of X509_STORE_new() Reviewed-by: Shane Lontis Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18057) (cherry picked from commit 3f075967f664aac12951a1d7aa3124d9235cd299)
[openssl/openssl] 3f0759: Fix a possible NULL pointer dereference in create_...
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 3f075967f664aac12951a1d7aa3124d9235cd299 https://github.openssl.org/openssl/openssl/commit/3f075967f664aac12951a1d7aa3124d9235cd299 Author: Zhou Qingyang Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M apps/ts.c Log Message: --- Fix a possible NULL pointer dereference in create_cert_store() In create_cert_store(), X509_STORE_new() is called and there is a dereference of it in following function X509_STORE_add_lookup() without check, which could lead to NULL pointer dereference. Fix this by adding a NULL check of X509_STORE_new() Reviewed-by: Shane Lontis Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18057)
[openssl/openssl] caf7a9: Fix wild pointer dereference in make_ocsp_response()
Branch: refs/heads/openssl-3.0 Home: https://github.openssl.org/openssl/openssl Commit: caf7a9cbcc7462314427c5594c0a50d457bdf3a5 https://github.openssl.org/openssl/openssl/commit/caf7a9cbcc7462314427c5594c0a50d457bdf3a5 Author: Zhou Qingyang Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M apps/ocsp.c Log Message: --- Fix wild pointer dereference in make_ocsp_response() The function OCSP_basic_add1_status() will return NULL on malloc failure. However the return value is not checked before being passed to OCSP_SINGLERESP_add1_ext_i2d(), and there is a wild field pointer, which could lead to wild pointer dereference. Fix this by adding return value check Reviewed-by: Kurt Roeckx Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18081) (cherry picked from commit 4d50a5467b0a208c61d163239a3544bae06343ea)
[openssl/openssl] 4d50a5: Fix wild pointer dereference in make_ocsp_response()
Branch: refs/heads/master Home: https://github.openssl.org/openssl/openssl Commit: 4d50a5467b0a208c61d163239a3544bae06343ea https://github.openssl.org/openssl/openssl/commit/4d50a5467b0a208c61d163239a3544bae06343ea Author: Zhou Qingyang Date: 2022-04-21 (Thu, 21 Apr 2022) Changed paths: M apps/ocsp.c Log Message: --- Fix wild pointer dereference in make_ocsp_response() The function OCSP_basic_add1_status() will return NULL on malloc failure. However the return value is not checked before being passed to OCSP_SINGLERESP_add1_ext_i2d(), and there is a wild field pointer, which could lead to wild pointer dereference. Fix this by adding return value check Reviewed-by: Kurt Roeckx Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/18081)