[openssl] master update

Richard Levitte levitte at openssl.org
Thu Aug 20 05:52:42 UTC 2020


The branch master has been updated
       via  16486f6332410d0d9e8f2606abb970d32b0572d3 (commit)
      from  26a8f2ac95ad4f652b1719aab356ad9c042c6fad (commit)


- Log -----------------------------------------------------------------
commit 16486f6332410d0d9e8f2606abb970d32b0572d3
Author: Richard Levitte <levitte at openssl.org>
Date:   Tue Aug 18 23:13:29 2020 +0200

    PROV: Fix EC OSSL_FUNC_keymgmt_match() to work in the FIPS provider
    
    In the FIPS provider, calling EC_GROUP_cmp() with NULL for the BN_CTX
    argument is forbidden.  Since that's what ec_match() does, it simply
    cannot work in the FIPS provider.  Therefore, we allocate a BN_CTX
    with the library context asssociated with one of the input keys
    (doesn't matter which) and use that.
    
    Reviewed-by: Shane Lontis <shane.lontis at oracle.com>
    (Merged from https://github.com/openssl/openssl/pull/12677)

-----------------------------------------------------------------------

Summary of changes:
 providers/implementations/keymgmt/ec_kmgmt.c | 6 ++++--
 1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/providers/implementations/keymgmt/ec_kmgmt.c b/providers/implementations/keymgmt/ec_kmgmt.c
index 34b2737fdf..7fa23b1a6c 100644
--- a/providers/implementations/keymgmt/ec_kmgmt.c
+++ b/providers/implementations/keymgmt/ec_kmgmt.c
@@ -285,11 +285,12 @@ static int ec_match(const void *keydata1, const void *keydata2, int selection)
     const EC_KEY *ec2 = keydata2;
     const EC_GROUP *group_a = EC_KEY_get0_group(ec1);
     const EC_GROUP *group_b = EC_KEY_get0_group(ec2);
+    BN_CTX *ctx = BN_CTX_new_ex(ec_key_get_libctx(ec1));
     int ok = 1;
 
     if ((selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) != 0)
         ok = ok && group_a != NULL && group_b != NULL
-            && EC_GROUP_cmp(group_a, group_b, NULL) == 0;
+            && EC_GROUP_cmp(group_a, group_b, ctx) == 0;
     if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) {
         const BIGNUM *pa = EC_KEY_get0_private_key(ec1);
         const BIGNUM *pb = EC_KEY_get0_private_key(ec2);
@@ -300,8 +301,9 @@ static int ec_match(const void *keydata1, const void *keydata2, int selection)
         const EC_POINT *pa = EC_KEY_get0_public_key(ec1);
         const EC_POINT *pb = EC_KEY_get0_public_key(ec2);
 
-        ok = ok && EC_POINT_cmp(group_b, pa, pb, NULL) == 0;
+        ok = ok && EC_POINT_cmp(group_b, pa, pb, ctx) == 0;
     }
+    BN_CTX_free(ctx);
     return ok;
 }
 


More information about the openssl-commits mailing list