]> git.ipfire.org Git - thirdparty/openssl.git/log
thirdparty/openssl.git
4 days agocrypto/threads_lock_contention: Remove duplicating code
Eugene Syromiatnikov [Mon, 7 Jul 2025 13:00:17 +0000 (15:00 +0200)] 
crypto/threads_lock_contention: Remove duplicating code

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27983)

4 days agoFactor out the lock contention reporting facility implementation
Eugene Syromiatnikov [Mon, 7 Jul 2025 12:51:35 +0000 (14:51 +0200)] 
Factor out the lock contention reporting facility implementation

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27983)

4 days ago.github/workflows/run_quic_interop.yml: remove superfluous docker-compose.yml patching
Nikolas Gauder [Mon, 4 Aug 2025 20:23:33 +0000 (22:23 +0200)] 
.github/workflows/run_quic_interop.yml: remove superfluous docker-compose.yml patching

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28179)

4 days agobn: save space in bn_mont_ctx_st by reordering elements
Nikola Pajkovsky [Wed, 6 Aug 2025 09:58:57 +0000 (11:58 +0200)] 
bn: save space in bn_mont_ctx_st by reordering elements

 # pahole -C bn_mont_ctx_st ./crypto/bn/libcrypto-shlib-bn_mont.o

 struct bn_mont_ctx_st {
         int                        ri;                   /*     0     4 */

         /* XXX 4 bytes hole, try to pack */

         BIGNUM                     RR;                   /*     8    24 */
         BIGNUM                     N;                    /*    32    24 */
         BIGNUM                     Ni;                   /*    56    24 */
         /* --- cacheline 1 boundary (64 bytes) was 16 bytes ago --- */
         long unsigned int          n0[2];                /*    80    16 */
         int                        flags;                /*    96     4 */

         /* size: 104, cachelines: 2, members: 6 */
         /* sum members: 96, holes: 1, sum holes: 4 */
         /* padding: 4 */
         /* last cacheline: 40 bytes */
 };

 # pahole -C bn_mont_ctx_st ./crypto/bn/libcrypto-shlib-bn_mont.o

 struct bn_mont_ctx_st {
         BIGNUM                     RR;                   /*     0    24 */
         BIGNUM                     N;                    /*    24    24 */
         BIGNUM                     Ni;                   /*    48    24 */
         /* --- cacheline 1 boundary (64 bytes) was 8 bytes ago --- */
         long unsigned int          n0[2];                /*    72    16 */
         int                        ri;                   /*    88     4 */
         int                        flags;                /*    92     4 */

         /* size: 96, cachelines: 2, members: 6 */
         /* last cacheline: 32 bytes */
 };

8 bytes were saved.

Signed-off-by: Nikola Pajkovsky <nikolap@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28185)

5 days agoAdd mdebug config for coveralls on master branch
Neil Horman [Wed, 23 Jul 2025 15:52:03 +0000 (11:52 -0400)] 
Add mdebug config for coveralls on master branch

enable mdebug on coveralls for the master branch so that, when testing
we run our memory failure tests and pick up the extra test coverage

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28078)

5 days agoAdd a daily memory allocation failure test
Neil Horman [Wed, 23 Jul 2025 14:56:38 +0000 (10:56 -0400)] 
Add a daily memory allocation failure test

nightly, run the memory allocation failure test.

We build with asan enabled to log memory leaks and other issues

Note the test is designed to pass even if the test fails, as currently
(perhaps not suprisingly), several error paths result in asan errors.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28078)

5 days agoadd a handshake memory failure test
Neil Horman [Wed, 23 Jul 2025 13:09:05 +0000 (09:09 -0400)] 
add a handshake memory failure test

We would like to be able to test our memory failure paths, but forcing
malloc to return NULL at certain points in time.

This test does that, by running a sepcific workload n+1 time.  In this
case the workload is a simple ssl handshake.

We run 1 test which sets our malloc wrapper into record mode, in which
it just acts as a pass through to the system malloc call and records the
number of times it was called.

Then we run a second test, which does the same handshake N times, where
N is the number of times malloc was called in the previous test.  For
each iteration in i=0..N we fail the ith malloc operation.

We don't check for functional failures in the second test (as we expect
failures), we just want to make sure that (a) we don't crash and (b)
asan doesn't report any errors.

Currently, we get _lots_ of asan failures, but we can use this test to
log issues for that and fix those up.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28078)

5 days agossl/quic/quic_channel.c: Fix endianness of supported versions from received version...
Nikolas Gauder [Mon, 4 Aug 2025 21:47:23 +0000 (23:47 +0200)] 
ssl/quic/quic_channel.c: Fix endianness of supported versions from received version negotiation packets

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28169)

5 days agossl/quic/quic_port.c: Fix endianness of supported versions in sent version negotiatio...
Nikolas Gauder [Mon, 4 Aug 2025 19:12:35 +0000 (21:12 +0200)] 
ssl/quic/quic_port.c: Fix endianness of supported versions in sent version negotiation packets

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28169)

6 days agoImprove english in endian comment
Chiller Dragon [Mon, 4 Aug 2025 12:55:10 +0000 (14:55 +0200)] 
Improve english in endian comment

CLA: trivial

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28167)

6 days agoEliminate indentation tabs from *.c and *.h files
Eugene Syromiatnikov [Sun, 3 Aug 2025 22:55:59 +0000 (00:55 +0200)] 
Eliminate indentation tabs from *.c and *.h files

While the majority of the sites assumed 8-wide tabs, at least engines/e_capi.c
assumed 4-wide;  in any case it is better to just follow the code style guide
and eliminate them altogether.  Some addition changes (namely, curly
brackets in apps/crl.c and apps/req.c, and additional whitespace changes
in apps/s_client.c and test/provider_pkey_test.c) are made to placate
check-format-commit.sh.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28162)

6 days agoutil/perl/OpenSSL/Test.pm: consistently use 4 spaces for indentation
Eugene Syromiatnikov [Mon, 21 Jul 2025 11:22:16 +0000 (13:22 +0200)] 
util/perl/OpenSSL/Test.pm: consistently use 4 spaces for indentation

While the majority of the file uses 4 spaces for indentation, some parts
contain 8-wide tabs.  Use the spaces for indentation consistently
throughout the file.

Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28162)

6 days agoshake: update to use generated param decoders
Pauli [Mon, 28 Jul 2025 07:15:25 +0000 (17:15 +1000)] 
shake: update to use generated param decoders

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28151)

6 days agoblake2: update to use generated param decoders
Pauli [Mon, 28 Jul 2025 07:15:14 +0000 (17:15 +1000)] 
blake2: update to use generated param decoders

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28151)

6 days agoblake2: rename files for generated param decoding
Pauli [Mon, 28 Jul 2025 07:04:32 +0000 (17:04 +1000)] 
blake2: rename files for generated param decoding

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28151)

6 days agosha3: rename files for generated param decoding
Pauli [Mon, 28 Jul 2025 07:01:23 +0000 (17:01 +1000)] 
sha3: rename files for generated param decoding

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28151)

6 days agoargon2: avoid searching for "size" parameter
Pauli [Tue, 22 Jul 2025 04:38:55 +0000 (14:38 +1000)] 
argon2: avoid searching for "size" parameter

Remember where the size was in the parameter array instead.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28146)

11 days agoskey: update build infrastructure for generate param name parsing
Pauli [Mon, 21 Jul 2025 23:48:48 +0000 (09:48 +1000)] 
skey: update build infrastructure for generate param name parsing

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28144)

11 days agoskey: convert generic SKEY to use generated param parser
Pauli [Mon, 21 Jul 2025 23:48:10 +0000 (09:48 +1000)] 
skey: convert generic SKEY to use generated param parser

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28144)

11 days agoRevert "Pairwise check for DH keys import as part of FIPS"
Nikola Pajkovsky [Wed, 30 Jul 2025 07:21:29 +0000 (09:21 +0200)] 
Revert "Pairwise check for DH keys import as part of FIPS"

Not needed anymore. It's handled in the 'ec (fips): add PCT for key import'

This reverts commit e08b83cbb3b853ae9dc364c32d927405172918ac.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28122)

11 days agodh: add extra argument to ossl_dh_check_pairwise
Pauli [Wed, 30 Jul 2025 06:50:03 +0000 (16:50 +1000)] 
dh: add extra argument to ossl_dh_check_pairwise

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28122)

11 days agodh: add FIPS 140-3 PCT on key import.
Pauli [Thu, 30 Jan 2025 23:38:28 +0000 (10:38 +1100)] 
dh: add FIPS 140-3 PCT on key import.

This is mandated by FIPS 140-3 IG 10.3.A additional comment 1

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28122)

11 days agofips: add DH PCT name
Pauli [Thu, 30 Jan 2025 23:16:17 +0000 (10:16 +1100)] 
fips: add DH PCT name

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28122)

11 days agochanges: add note about PCT on key import to the FIPS provider
Pauli [Wed, 29 Jan 2025 01:41:59 +0000 (12:41 +1100)] 
changes: add note about PCT on key import to the FIPS provider

This is mandated by FIPS 140-3 IG 10.3.A additional comment 1.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28122)

11 days agorsa (fips): add PCT for key import
Pauli [Wed, 29 Jan 2025 00:31:33 +0000 (11:31 +1100)] 
rsa (fips): add PCT for key import

FIPS 140-3 IG 10.3.A additional comment 1 mandates a PCT on key import.

Fixes #26572

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28122)

11 days agoec (fips): add PCT for key import
Pauli [Wed, 29 Jan 2025 00:16:54 +0000 (11:16 +1100)] 
ec (fips): add PCT for key import

FIPS 140-3 IG 10.3.A additional comment 1 mandates a PCT on key import.

Fixes #26572

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28122)

11 days agoecx (fips): add PCT for key import
Pauli [Wed, 29 Jan 2025 00:16:44 +0000 (11:16 +1100)] 
ecx (fips): add PCT for key import

FIPS 140-3 IG 10.3.A additional comment 1 mandates a PCT on key import.

Fixes #26572

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28122)

11 days agorsa: expose pairwise consistency test API
Pauli [Wed, 29 Jan 2025 00:44:02 +0000 (11:44 +1100)] 
rsa: expose pairwise consistency test API

This is only used by the FIPS provider as part of importing keys.  At least
at the moment.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28122)

11 days agoapps/asn1parse.c: correct help text order for -genstr option
Saurabh Kushwah [Wed, 30 Jul 2025 12:36:57 +0000 (18:06 +0530)] 
apps/asn1parse.c: correct help text order for -genstr option

CLA: trivial

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28123)

11 days agopbkdf2: remove second compiled file
Pauli [Thu, 17 Jul 2025 03:24:21 +0000 (13:24 +1000)] 
pbkdf2: remove second compiled file

The main source file now depends on FIPS_MODULE so there is no need to have
a second file with a fips flag defined.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agomacsig: call updated ossl_prov_set_macctx function
Pauli [Wed, 16 Jul 2025 08:09:54 +0000 (18:09 +1000)] 
macsig: call updated ossl_prov_set_macctx function

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparams: emit an error if a parameter array overflows
Pauli [Thu, 17 Jul 2025 01:13:56 +0000 (11:13 +1000)] 
params: emit an error if a parameter array overflows

This is in addition to returning an error code.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparams: revert error checking when params are duplicated
Pauli [Fri, 11 Jul 2025 06:03:12 +0000 (16:03 +1000)] 
params: revert error checking when params are duplicated

This is to avoid a change of behaviour even though it is a result of user
error.  When params are duplicated, all but the first are ignored and no
error is returned.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agohkdf: changes to incorporate the fixed digest HkDF flavours
Pauli [Thu, 10 Jul 2025 01:47:16 +0000 (11:47 +1000)] 
hkdf: changes to incorporate the fixed digest HkDF flavours

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agokdf: use generated param name alias handling
Pauli [Thu, 10 Jul 2025 00:41:51 +0000 (10:41 +1000)] 
kdf: use generated param name alias handling

secret or key is the common one but ukm and partyu-info are also aliases for
the X9.42 KDF.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparams: allow param name aliases
Pauli [Thu, 10 Jul 2025 00:40:55 +0000 (10:40 +1000)] 
params: allow param name aliases

We allowed multiple names for the same parameter in a number of places.
This is best dealt with in the generated code.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agotls1-prf: process multiple seed parameters with a single realloc call
Pauli [Tue, 8 Jul 2025 01:36:51 +0000 (11:36 +1000)] 
tls1-prf: process multiple seed parameters with a single realloc call

The old code did a realloc for each such parameter which is inefficient
because they are most often passed in in pentuples.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparamnames: factor out common code after successful match
Pauli [Mon, 7 Jul 2025 23:32:36 +0000 (09:32 +1000)] 
paramnames: factor out common code after successful match

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agokdfs: make the 'engine' parameter hidden
Pauli [Thu, 3 Jul 2025 03:07:48 +0000 (13:07 +1000)] 
kdfs: make the 'engine' parameter hidden

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparams: add support for 'hidden' parameters
Pauli [Thu, 3 Jul 2025 03:08:27 +0000 (13:08 +1000)] 
params: add support for 'hidden' parameters

These are in the name decoder and structure but do not appear in the parameter
listing.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agohmacdrbg_kdf: convert to generated OSSL_PARAM parser
Pauli [Wed, 2 Jul 2025 07:19:43 +0000 (17:19 +1000)] 
hmacdrbg_kdf: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agohmacdrbg_kdf: update build infrastructure
Pauli [Wed, 2 Jul 2025 07:08:00 +0000 (17:08 +1000)] 
hmacdrbg_kdf: update build infrastructure

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agohmacdrbg_kdf: rename C file for conversion to generated param name decoding
Pauli [Wed, 2 Jul 2025 07:06:25 +0000 (17:06 +1000)] 
hmacdrbg_kdf: rename C file for conversion to generated param name decoding

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoevp_kdf_test: skip "engine" parameters when checking for updatability.
Pauli [Wed, 2 Jul 2025 07:22:51 +0000 (17:22 +1000)] 
evp_kdf_test: skip "engine" parameters when checking for updatability.

The code already skips "properties" and "engines" behaves the same.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoargon2: convert to generated OSSL_PARAM parser
Pauli [Wed, 2 Jul 2025 07:05:17 +0000 (17:05 +1000)] 
argon2: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoargon2: update build infrastructure
Pauli [Wed, 2 Jul 2025 06:55:37 +0000 (16:55 +1000)] 
argon2: update build infrastructure

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoargon2: rename C file for conversion to generated param name decoding
Pauli [Wed, 2 Jul 2025 06:54:20 +0000 (16:54 +1000)] 
argon2: rename C file for conversion to generated param name decoding

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agokrb5kdf: convert to generated OSSL_PARAM parser
Pauli [Wed, 2 Jul 2025 06:53:40 +0000 (16:53 +1000)] 
krb5kdf: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agokrb5kdf: update build infrastructure
Pauli [Wed, 2 Jul 2025 06:52:34 +0000 (16:52 +1000)] 
krb5kdf: update build infrastructure

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agokrb5kdf: rename C file for conversion to generated param name decoding
Pauli [Wed, 2 Jul 2025 06:45:50 +0000 (16:45 +1000)] 
krb5kdf: rename C file for conversion to generated param name decoding

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopbkdf1: convert to generated OSSL_PARAM parser
Pauli [Wed, 2 Jul 2025 06:45:10 +0000 (16:45 +1000)] 
pbkdf1: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopbkdf1: update build infrastructure
Pauli [Wed, 2 Jul 2025 06:39:52 +0000 (16:39 +1000)] 
pbkdf1: update build infrastructure

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopbkdf1: rename C file for conversion to generated param name decoding
Pauli [Wed, 2 Jul 2025 06:39:34 +0000 (16:39 +1000)] 
pbkdf1: rename C file for conversion to generated param name decoding

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopkcs12kdf: convert to generated OSSL_PARAM parser
Pauli [Wed, 2 Jul 2025 06:37:26 +0000 (16:37 +1000)] 
pkcs12kdf: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopkcs12kdf: update build infrastructure
Pauli [Wed, 2 Jul 2025 06:35:24 +0000 (16:35 +1000)] 
pkcs12kdf: update build infrastructure

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopkcs12kdf: rename C file for conversion to generated param name decoding
Pauli [Wed, 2 Jul 2025 06:34:58 +0000 (16:34 +1000)] 
pkcs12kdf: rename C file for conversion to generated param name decoding

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoscrypt: convert to generated OSSL_PARAM parser
Pauli [Wed, 2 Jul 2025 06:28:39 +0000 (16:28 +1000)] 
scrypt: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoscrypt: update build infrastructure
Pauli [Wed, 2 Jul 2025 06:28:24 +0000 (16:28 +1000)] 
scrypt: update build infrastructure

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoscrypt: rename C file for conversion to generated param name decodering
Pauli [Wed, 2 Jul 2025 06:28:09 +0000 (16:28 +1000)] 
scrypt: rename C file for conversion to generated param name decodering

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopbkdf2: convert to generated OSSL_PARAM parser
Pauli [Wed, 2 Jul 2025 06:16:15 +0000 (16:16 +1000)] 
pbkdf2: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopbkdf2: build infrastructure changes
Pauli [Wed, 2 Jul 2025 05:54:13 +0000 (15:54 +1000)] 
pbkdf2: build infrastructure changes

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopbkdf2: rename for autogeneration of param name parsing
Pauli [Wed, 2 Jul 2025 05:54:02 +0000 (15:54 +1000)] 
pbkdf2: rename for autogeneration of param name parsing

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agox9.42kdf: convert to generated OSSL_PARAM parser
Pauli [Wed, 2 Jul 2025 00:31:31 +0000 (10:31 +1000)] 
x9.42kdf: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agobuild infrastructure changes for X9.42 KDF
Pauli [Wed, 2 Jul 2025 00:10:31 +0000 (10:10 +1000)] 
build infrastructure changes for X9.42 KDF

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agorename X9.42 KDF for autogeneration of param name parsing
Pauli [Wed, 2 Jul 2025 00:09:30 +0000 (10:09 +1000)] 
rename X9.42 KDF for autogeneration of param name parsing

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agopvkkdf: convert to generated OSSL_PARAM parser
Pauli [Wed, 2 Jul 2025 00:07:19 +0000 (10:07 +1000)] 
pvkkdf: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agosshkdf: convert to generated OSSL_PARAM parser
Pauli [Tue, 1 Jul 2025 23:59:42 +0000 (09:59 +1000)] 
sshkdf: convert to generated OSSL_PARAM parser

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agobuild infrastructure for PVK KDF
Pauli [Tue, 1 Jul 2025 23:48:02 +0000 (09:48 +1000)] 
build infrastructure for PVK KDF

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agobuild infrastructure changes for SSH KDF
Pauli [Tue, 1 Jul 2025 23:42:20 +0000 (09:42 +1000)] 
build infrastructure changes for SSH KDF

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agorename sshkdf for autogeneration of param name parsing
Pauli [Tue, 1 Jul 2025 23:13:26 +0000 (09:13 +1000)] 
rename sshkdf for autogeneration of param name parsing

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agotls1prf: update to use generated param decoders
Pauli [Tue, 1 Jul 2025 01:42:34 +0000 (11:42 +1000)] 
tls1prf: update to use generated param decoders

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agokdf: remove max argument to the param concatenation helper
Pauli [Tue, 1 Jul 2025 00:49:50 +0000 (10:49 +1000)] 
kdf: remove max argument to the param concatenation helper

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agotls1_prf: update build infrastructure for generated param parsers
Pauli [Tue, 1 Jul 2025 00:01:00 +0000 (10:01 +1000)] 
tls1_prf: update build infrastructure for generated param parsers

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agorename tls1 PRF C file
Pauli [Mon, 30 Jun 2025 23:58:41 +0000 (09:58 +1000)] 
rename tls1 PRF C file

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agokbkdf: conversion to use generated param parsers
Pauli [Mon, 30 Jun 2025 03:10:48 +0000 (13:10 +1000)] 
kbkdf: conversion to use generated param parsers

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agosskdf: conversion to use generated param parsers
Pauli [Mon, 30 Jun 2025 03:10:40 +0000 (13:10 +1000)] 
sskdf: conversion to use generated param parsers

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoutil: add helper functions that don't locate the parameters
Pauli [Mon, 30 Jun 2025 03:09:53 +0000 (13:09 +1000)] 
util: add helper functions that don't locate the parameters

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparams: add helper functions that don't locate the parameters
Pauli [Mon, 30 Jun 2025 03:09:29 +0000 (13:09 +1000)] 
params: add helper functions that don't locate the parameters

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agofips: update FIPS indicator functions so non-locating flavours are available
Pauli [Mon, 30 Jun 2025 03:08:23 +0000 (13:08 +1000)] 
fips: update FIPS indicator functions so non-locating flavours are available

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agohkdf: conversion to use generated param parsers
Pauli [Wed, 25 Jun 2025 22:12:03 +0000 (08:12 +1000)] 
hkdf: conversion to use generated param parsers

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agokdf: rename SSKDF and KBKDF for param parser generation
Pauli [Fri, 27 Jun 2025 01:55:28 +0000 (11:55 +1000)] 
kdf: rename SSKDF and KBKDF for param parser generation

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agohkdf: rename file for Perl processing
Pauli [Wed, 25 Jun 2025 00:56:43 +0000 (10:56 +1000)] 
hkdf: rename file for Perl processing

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparams: update param parser generator script to support duplicated parameters
Pauli [Wed, 25 Jun 2025 22:11:47 +0000 (08:11 +1000)] 
params: update param parser generator script to support duplicated parameters

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agobuild infrastructure changes for KBKDF and SSKDF to use generated param parsers
Pauli [Fri, 27 Jun 2025 01:55:55 +0000 (11:55 +1000)] 
build infrastructure changes for KBKDF and SSKDF to use generated param parsers

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoUpdate build infrastructure for generated hkdf.c file
Pauli [Tue, 24 Jun 2025 04:05:42 +0000 (14:05 +1000)] 
Update build infrastructure for generated hkdf.c file

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agotest: seperate the integer and string fetches of the 'mode' parameter
Pauli [Mon, 30 Jun 2025 03:11:51 +0000 (13:11 +1000)] 
test: seperate the integer and string fetches of the 'mode' parameter

The generated parameter parsers don't accept duplication of parameters so this
causes an error at runtime if not seperated.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparams: add additional error checking to generated param name parsers
Pauli [Thu, 26 Jun 2025 00:13:25 +0000 (10:13 +1000)] 
params: add additional error checking to generated param name parsers

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparams: update generated decoder based implementations to handle return code
Pauli [Wed, 25 Jun 2025 00:50:43 +0000 (10:50 +1000)] 
params: update generated decoder based implementations to handle return code

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoparams: generated decoder functions return an error state on failure
Pauli [Wed, 25 Jun 2025 00:50:15 +0000 (10:50 +1000)] 
params: generated decoder functions return an error state on failure

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27923)

11 days agoCMS KEMRecipientInfo support requires HKDF with fixed digests
Tomas Mraz [Thu, 31 Jul 2025 09:54:28 +0000 (11:54 +0200)] 
CMS KEMRecipientInfo support requires HKDF with fixed digests

These are not present in FIPS providers <3.6.0.

Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Nicola Tuveri <nic.tuv@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28133)

12 days agoRemove unnecessary OPENSSL_NO_RSA remnants
Michael Baentsch [Tue, 29 Jul 2025 10:32:00 +0000 (12:32 +0200)] 
Remove unnecessary OPENSSL_NO_RSA remnants

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28113)

12 days agofuzz/dtlsserver.c: Remove incorrect ifdef guard
Michael Baentsch [Mon, 28 Jul 2025 04:52:49 +0000 (06:52 +0200)] 
fuzz/dtlsserver.c: Remove incorrect ifdef guard

Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28102)

12 days agotest_tlsext_status_type(): Avoid leaking of previously allocated data
Tomas Mraz [Mon, 28 Jul 2025 08:55:45 +0000 (10:55 +0200)] 
test_tlsext_status_type(): Avoid leaking of previously allocated data

Fixes Coverity 165922616592241659223

Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28105)

12 days agoOnly report generic error if provider did not put an error on the error queue
Ingo Franzki [Tue, 22 Jul 2025 13:09:27 +0000 (15:09 +0200)] 
Only report generic error if provider did not put an error on the error queue

Commit 72351b0d18078170af270418b2d5e9fc579cb1af added code to unconditionally
put a generic error onto the error stack, if key generation, encryption,
decryption, sign, or verify fails to ensure that there is an error entry
on the error queue, even if the provider did not itself put a specific error
onto the queue.

However, this can hide error details if an application just looks at the very
last error entry and checks for specific errors. Now, the generic error is
always the last entry, and the application won't find the expected error
entry, although it would be there as second last entry. This can lead to
different application behavior in error situations than before this change.

To fix this, only add the generic error entry if the provider did not itself
add an error entry onto the queue. That way, there always is an error on the
error queue in case of a failure, but no behavior change in case the provider
emitted the error entry itself.

Closes: https://github.com/openssl/openssl/issues/27992
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28073)

12 days agoMake ERR_count_to_mark() available to providers via 'in' dispatch array
Ingo Franzki [Tue, 22 Jul 2025 13:01:38 +0000 (15:01 +0200)] 
Make ERR_count_to_mark() available to providers via 'in' dispatch array

Functions like ERR_set_mark(), ERR_clear_last_mark(), and ERR_pop_to_mark()
are already passed to the a provider via the 'in' dispatch array of the
provider initialization function (although the documentation did not
mention them).

Also pass ERR_count_to_mark() to the provider the same way, and update
the documentation to mention all four functions.

Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28073)

12 days agoFix hanging of test_external_cf_quiche
Eugene Syromiatnikov [Wed, 30 Jul 2025 13:55:14 +0000 (15:55 +0200)] 
Fix hanging of test_external_cf_quiche

The commit "Remove HARNESS_OSSL_PREFIX manipulation in the test harness"
forced all the output to be processed by the test harness, which means
that any process that keeps the stdout FD open prevents the run() call
from finishing, as was the case in the test_external_cf_quiche test that
ran quiche server in the background, but retaining the std{in,out,err}
descriptors.  Avoid that by explicitly redirecting them to a log file.

Reported-by: Tomas Mraz <tomas@openssl.org>
Fixes: 70c05fcde53cf "Remove HARNESS_OSSL_PREFIX manipulation in the test harness"
Signed-off-by: Eugene Syromiatnikov <esyr@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/28125)

12 days agoImplement KEMRecipientInfo (RFC9629) in CMS
Daniel Van Geest [Thu, 3 Apr 2025 10:19:43 +0000 (11:19 +0100)] 
Implement KEMRecipientInfo (RFC9629) in CMS

Also add support for ML-KEM in CMS (draft-ietf-lamps-cms-kyber).

Add the -recip_kdf and -recip_ukm parameters to `openssl cms -encrypt`
to allow the user to specify the KDF algorithm and optional user
keying material for each recipient.

A provider may indicate which RecipientInfo type is supported
for a key, otherwise CMS will try to figure it out itself. A
provider may also indicate which KDF to use in KEMRecipientInfo
if the user hasn't specified one.

Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27681)

13 days agocrypto: evp: fix potential null pointer dereference in EVP_DigestSignUpdate in m_sigver.c
Anton Moryakov [Fri, 25 Jul 2025 12:43:15 +0000 (15:43 +0300)] 
crypto: evp: fix potential null pointer dereference in EVP_DigestSignUpdate in m_sigver.c

Static analysis detected that EVP_DigestSign() could lead to null pointer
dereference in EVP_DigestSignUpdate() when pctx->pmeth is NULL. The issue
occurs in the legacy code path where pmeth is accessed without prior null
check.

This fix adds a proper null check for pctx->pmeth in the legacy section
of EVP_DigestSignUpdate() to prevent the crash when the function is called
through EVP_DigestSign() with improperly initialized context.

The check is placed in EVP_DigestSignUpdate() rather than EVP_DigestSign()
to maintain proper separation of concerns and follow OpenSSL's architectural
patterns where lower-level functions handle their own parameter validation.

Fixes potential crash in signature operations with legacy providers.

CLA: trivial
Signed-off-by: Anton Moryakov <ant.v.moryakov@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28095)

13 days agoFix NULL check in get_ocsp_resp_from_responder
Neil Horman [Sat, 26 Jul 2025 13:30:53 +0000 (09:30 -0400)] 
Fix NULL check in get_ocsp_resp_from_responder

We assign an allocation to *sk_resp, but only check for NULL on sk_resp,
not the value it points to.

Addresses https://scan5.scan.coverity.com/#/project-view/60762/10222?selectedIssue=1659222

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28101)

13 days agoSet *sk_resp to NULL when freeing.
Neil Horman [Sat, 26 Jul 2025 13:28:01 +0000 (09:28 -0400)] 
Set *sk_resp to NULL when freeing.

Its possible for get_ocsp_resp_from_responder to return OK after having
freed *sk_resp without setting the freed pointer to NULL, leading us to
set a garbage pointer in other code.

Ensure that we set it to NULL after freeing

Addresses https://scan5.scan.coverity.com/#/project-view/60762/10222?selectedIssue=1659225

Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: David von Oheimb <david.von.oheimb@siemens.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/28101)