Coverity Scan: Analysis completed for openssl/openssl

2022-04-21 Thread scan-admin


Your request for analysis of openssl/openssl has been completed 
successfully.
The results are available at 
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yoN-2BQSVjTtaSz8wS4wOr7HlekBtV1P4YRtWclMVkCdvAA-3D-3D4NDL_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeGe0ngQSyvkRt3s7ccmYefsKliddSn5ZypkuJLGwTnDrG6vSgyQjkH9VYVliW1BXSra-2F78YZ-2Fp1FyxWgwM3UbJ2Ad2bJWsz86tZcSQ0spdHDq7wWMG5xy6wFy28FhZ7V4e3C4L2cEfco8p1-2BwMU8cMQtuMIy2X-2BFgtY4apc6vgWaCm1rpFR221yZT8JGJZcPvA-3D

Build ID: 451341

Analysis Summary:
   New defects found: 0
   Defects eliminated: 0



[openssl/openssl] 130de7: Public API functions OPENSSL_str[n]casecmp

2022-04-21 Thread beldmit
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 130de70e0f85ecec08fcfe4daed1d0c491089ea6
  
https://github.openssl.org/openssl/openssl/commit/130de70e0f85ecec08fcfe4daed1d0c491089ea6
  Author: Dmitry Belyavskiy 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M crypto/context.c
M crypto/ctype.c
M crypto/init.c
M doc/build.info
A doc/man3/OPENSSL_strcasecmp.pod
M e_os.h
M include/crypto/ctype.h
M include/internal/core.h
M include/openssl/crypto.h.in
M util/libcrypto.num

  Log Message:
  ---
  Public API functions OPENSSL_str[n]casecmp

Reviewed-by: Tim Hudson 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18103)


  Commit: 467b6f17a6747fd2e09b7c1475f2e9c91ef2e0ed
  
https://github.openssl.org/openssl/openssl/commit/467b6f17a6747fd2e09b7c1475f2e9c91ef2e0ed
  Author: Dmitry Belyavskiy 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M providers/fips/fipsprov.c

  Log Message:
  ---
  FIPS provider modifications

Reviewed-by: Tim Hudson 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18103)


  Commit: a8e4ddc6d15b6e6b308428753bc22b12422adacf
  
https://github.openssl.org/openssl/openssl/commit/a8e4ddc6d15b6e6b308428753bc22b12422adacf
  Author: Dmitry Belyavskiy 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M .github/workflows/ci.yml
M test/build.info
A test/localetest.c
A test/recipes/02-test_localetest.t

  Log Message:
  ---
  Minimal test checking we can get public key in Turkish locale

(cherry picked from commit 6ae39acaf0c3578850be6699026a3a5c3f4bdfce)

Reviewed-by: Tim Hudson 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18103)


  Commit: 2c31d942af28a20e87979cbc76c3dd8d162c1a9c
  
https://github.openssl.org/openssl/openssl/commit/2c31d942af28a20e87979cbc76c3dd8d162c1a9c
  Author: Dmitry Belyavskiy 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M apps/ca.c
M apps/cmp.c
M apps/ecparam.c
M apps/lib/apps.c
M apps/lib/engine_loader.c
M apps/lib/http_server.c
M apps/lib/names.c
M apps/lib/vms_term_sock.c
M apps/list.c
M apps/rehash.c
M apps/s_server.c
M crypto/LPdir_unix.c
M crypto/asn1/ameth_lib.c
M crypto/asn1/asn1_gen.c
M crypto/conf/conf_def.c
M crypto/core_namemap.c
M crypto/dh/dh_group_params.c
M crypto/ec/ec_backend.c
M crypto/ec/ec_lib.c
M crypto/encode_decode/decoder_lib.c
M crypto/encode_decode/decoder_pkey.c
M crypto/encode_decode/encoder_lib.c
M crypto/encode_decode/encoder_pkey.c
M crypto/engine/tb_asnmth.c
M crypto/evp/ctrl_params_translate.c
M crypto/evp/ec_support.c
M crypto/evp/evp_lib.c
M crypto/evp/p_lib.c
M crypto/ffc/ffc_dh.c
M crypto/ffc/ffc_params.c
M crypto/http/http_client.c
M crypto/objects/o_names.c
M crypto/params_dup.c
M crypto/property/property_parse.c
M crypto/rand/rand_lib.c
M crypto/rsa/rsa_backend.c
M crypto/store/store_lib.c
M crypto/store/store_result.c
M crypto/trace.c
M crypto/x509/v3_tlsf.c
M crypto/x509/v3_utl.c
M engines/e_devcrypto.c
M engines/e_loader_attic.c
M engines/e_ossltest.c
M providers/common/capabilities.c
M providers/implementations/ciphers/cipher_cts.c
M providers/implementations/kdfs/hkdf.c
M providers/implementations/kdfs/kbkdf.c
M providers/implementations/kdfs/tls1_prf.c
M providers/implementations/kem/rsa_kem.c
M providers/implementations/keymgmt/dsa_kmgmt.c
M providers/implementations/keymgmt/ec_kmgmt.c
M providers/implementations/keymgmt/ecx_kmgmt.c
M providers/implementations/keymgmt/mac_legacy_kmgmt.c
M providers/implementations/rands/drbg_ctr.c
M providers/implementations/signature/rsa_sig.c
M providers/implementations/storemgmt/file_store.c
M ssl/ssl_conf.c
M test/bntest.c
M test/evp_extra_test.c
M test/evp_libctx_test.c
M test/evp_test.c
M test/helpers/ssl_test_ctx.c
M test/params_conversion_test.c
M test/ssl_old_test.c
M test/v3nametest.c

  Log Message:
  ---
  str[n]casecmp => OPENSSL_strncasecmp

Reviewed-by: Tim Hudson 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18103)


Compare: 
https://github.openssl.org/openssl/openssl/compare/455e158ef9b3...2c31d942af28


[openssl/openssl] 5adddc: Fix gcc 6.3 builds of aarch64 BSAES

2022-04-21 Thread Tomas Mraz
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 5adddcd96255112ff04b350d661518302159e7e2
  
https://github.openssl.org/openssl/openssl/commit/5adddcd96255112ff04b350d661518302159e7e2
  Author: Tom Cosgrove 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M crypto/aes/asm/bsaes-armv8.pl

  Log Message:
  ---
  Fix gcc 6.3 builds of aarch64 BSAES

gcc6.3 doesn't seem to support the register aliases fp and lr for x29 and x30,
so use the x names.

Fixes #18114

Change-Id: I077edda42af4c7cdb7b24f28ac82d1603f550108

Reviewed-by: Shane Lontis 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18127)




[openssl/openssl] 455e15: Clear incorrectly reported errors in cms_io.

2022-04-21 Thread Daniel Fiala
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 455e158ef9b3b600738f5b01190c2b7083d3d0ba
  
https://github.openssl.org/openssl/openssl/commit/455e158ef9b3b600738f5b01190c2b7083d3d0ba
  Author: Daniel Fiala 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M crypto/cms/cms_io.c
M test/cmsapitest.c
M test/recipes/80-test_cmsapi.t
A test/recipes/80-test_cmsapi_data/encryptedData.der

  Log Message:
  ---
  Clear incorrectly reported errors in cms_io.

Fixes openssl#17841.

Reviewed-by: Shane Lontis 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18109)

(cherry picked from commit 45a3c592b94b66cab72e5bffbaf9d810c3fb29c0)




[openssl/openssl] 45a3c5: Clear incorrectly reported errors in cms_io.

2022-04-21 Thread Daniel Fiala
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 45a3c592b94b66cab72e5bffbaf9d810c3fb29c0
  
https://github.openssl.org/openssl/openssl/commit/45a3c592b94b66cab72e5bffbaf9d810c3fb29c0
  Author: Daniel Fiala 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M crypto/cms/cms_io.c
M test/cmsapitest.c
M test/recipes/80-test_cmsapi.t
A test/recipes/80-test_cmsapi_data/encryptedData.der

  Log Message:
  ---
  Clear incorrectly reported errors in cms_io.

Fixes openssl#17841.

Reviewed-by: Shane Lontis 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18109)




[openssl/openssl] ea5ef3: Fix a possible NULL pointer dereference in create_...

2022-04-21 Thread Tomas Mraz
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: ea5ef33be1bd4fbd89143932a4d12a72003913a5
  
https://github.openssl.org/openssl/openssl/commit/ea5ef33be1bd4fbd89143932a4d12a72003913a5
  Author: Zhou Qingyang 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M apps/ts.c

  Log Message:
  ---
  Fix a possible NULL pointer dereference in create_cert_store()

In create_cert_store(), X509_STORE_new() is called and there is a
dereference of it in following function X509_STORE_add_lookup()
without check, which could lead to NULL pointer dereference.

Fix this by adding a NULL check of X509_STORE_new()

Reviewed-by: Shane Lontis 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18057)

(cherry picked from commit 3f075967f664aac12951a1d7aa3124d9235cd299)




[openssl/openssl] 3f0759: Fix a possible NULL pointer dereference in create_...

2022-04-21 Thread Tomas Mraz
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 3f075967f664aac12951a1d7aa3124d9235cd299
  
https://github.openssl.org/openssl/openssl/commit/3f075967f664aac12951a1d7aa3124d9235cd299
  Author: Zhou Qingyang 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M apps/ts.c

  Log Message:
  ---
  Fix a possible NULL pointer dereference in create_cert_store()

In create_cert_store(), X509_STORE_new() is called and there is a
dereference of it in following function X509_STORE_add_lookup()
without check, which could lead to NULL pointer dereference.

Fix this by adding a NULL check of X509_STORE_new()

Reviewed-by: Shane Lontis 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18057)




[openssl/openssl] caf7a9: Fix wild pointer dereference in make_ocsp_response()

2022-04-21 Thread Tomas Mraz
  Branch: refs/heads/openssl-3.0
  Home:   https://github.openssl.org/openssl/openssl
  Commit: caf7a9cbcc7462314427c5594c0a50d457bdf3a5
  
https://github.openssl.org/openssl/openssl/commit/caf7a9cbcc7462314427c5594c0a50d457bdf3a5
  Author: Zhou Qingyang 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M apps/ocsp.c

  Log Message:
  ---
  Fix wild pointer dereference in make_ocsp_response()

The function OCSP_basic_add1_status() will return NULL on malloc failure.
However the return value is not checked before being passed to
OCSP_SINGLERESP_add1_ext_i2d(), and there is a wild field pointer,
which could lead to wild pointer dereference.

Fix this by adding return value check

Reviewed-by: Kurt Roeckx 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18081)

(cherry picked from commit 4d50a5467b0a208c61d163239a3544bae06343ea)




[openssl/openssl] 4d50a5: Fix wild pointer dereference in make_ocsp_response()

2022-04-21 Thread Tomas Mraz
  Branch: refs/heads/master
  Home:   https://github.openssl.org/openssl/openssl
  Commit: 4d50a5467b0a208c61d163239a3544bae06343ea
  
https://github.openssl.org/openssl/openssl/commit/4d50a5467b0a208c61d163239a3544bae06343ea
  Author: Zhou Qingyang 
  Date:   2022-04-21 (Thu, 21 Apr 2022)

  Changed paths:
M apps/ocsp.c

  Log Message:
  ---
  Fix wild pointer dereference in make_ocsp_response()

The function OCSP_basic_add1_status() will return NULL on malloc failure.
However the return value is not checked before being passed to
OCSP_SINGLERESP_add1_ext_i2d(), and there is a wild field pointer,
which could lead to wild pointer dereference.

Fix this by adding return value check

Reviewed-by: Kurt Roeckx 
Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/18081)