Blame SOURCES/dovecot-2.3.6-opensslhmac.patch

8cdc5b
diff -up dovecot-2.3.14/src/auth/auth-token.c.opensslhmac dovecot-2.3.14/src/auth/auth-token.c
8cdc5b
--- dovecot-2.3.14/src/auth/auth-token.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/auth/auth-token.c	2021-03-22 20:44:13.022912242 +0100
8cdc5b
@@ -161,17 +161,17 @@ void auth_token_deinit(void)
8cdc5b
 const char *auth_token_get(const char *service, const char *session_pid,
8cdc5b
 			   const char *username, const char *session_id)
8cdc5b
 {
8cdc5b
-	struct hmac_context ctx;
8cdc5b
+	struct openssl_hmac_context ctx;
8cdc5b
 	unsigned char result[SHA1_RESULTLEN];
8cdc5b
 
8cdc5b
-	hmac_init(&ctx, (const unsigned char*)username, strlen(username),
8cdc5b
+	openssl_hmac_init(&ctx, (const unsigned char*)username, strlen(username),
8cdc5b
 		  &hash_method_sha1);
8cdc5b
-	hmac_update(&ctx, session_pid, strlen(session_pid));
8cdc5b
+	openssl_hmac_update(&ctx, session_pid, strlen(session_pid));
8cdc5b
 	if (session_id != NULL && *session_id != '\0')
8cdc5b
-		hmac_update(&ctx, session_id, strlen(session_id));
8cdc5b
-	hmac_update(&ctx, service, strlen(service));
8cdc5b
-	hmac_update(&ctx, auth_token_secret, sizeof(auth_token_secret));
8cdc5b
-	hmac_final(&ctx, result);
8cdc5b
+		openssl_hmac_update(&ctx, session_id, strlen(session_id));
8cdc5b
+	openssl_hmac_update(&ctx, service, strlen(service));
8cdc5b
+	openssl_hmac_update(&ctx, auth_token_secret, sizeof(auth_token_secret));
8cdc5b
+	openssl_hmac_final(&ctx, result);
8cdc5b
 
8cdc5b
 	return binary_to_hex(result, sizeof(result));
8cdc5b
 }
8cdc5b
diff -up dovecot-2.3.14/src/auth/mech-cram-md5.c.opensslhmac dovecot-2.3.14/src/auth/mech-cram-md5.c
8cdc5b
--- dovecot-2.3.14/src/auth/mech-cram-md5.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/auth/mech-cram-md5.c	2021-03-22 20:44:13.022912242 +0100
8cdc5b
@@ -51,7 +51,7 @@ static bool verify_credentials(struct cr
8cdc5b
 {
8cdc5b
 	
8cdc5b
 	unsigned char digest[MD5_RESULTLEN];
8cdc5b
-        struct hmac_context ctx;
8cdc5b
+        struct orig_hmac_context ctx;
8cdc5b
 	const char *response_hex;
8cdc5b
 
8cdc5b
 	if (size != CRAM_MD5_CONTEXTLEN) {
8cdc5b
@@ -60,10 +60,10 @@ static bool verify_credentials(struct cr
8cdc5b
 		return FALSE;
8cdc5b
 	}
8cdc5b
 
8cdc5b
-	hmac_init(&ctx, NULL, 0, &hash_method_md5);
8cdc5b
+	orig_hmac_init(&ctx, NULL, 0, &hash_method_md5);
8cdc5b
 	hmac_md5_set_cram_context(&ctx, credentials);
8cdc5b
-	hmac_update(&ctx, request->challenge, strlen(request->challenge));
8cdc5b
-	hmac_final(&ctx, digest);
8cdc5b
+	orig_hmac_update(&ctx, request->challenge, strlen(request->challenge));
8cdc5b
+	orig_hmac_final(&ctx, digest);
8cdc5b
 
8cdc5b
 	response_hex = binary_to_hex(digest, sizeof(digest));
8cdc5b
 
8cdc5b
diff -up dovecot-2.3.14/src/auth/mech-scram.c.opensslhmac dovecot-2.3.14/src/auth/mech-scram.c
8cdc5b
--- dovecot-2.3.14/src/auth/mech-scram.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/auth/mech-scram.c	2021-03-22 20:44:13.022912242 +0100
8cdc5b
@@ -78,7 +78,7 @@ static const char *get_scram_server_firs
8cdc5b
 static const char *get_scram_server_final(struct scram_auth_request *request)
8cdc5b
 {
8cdc5b
 	const struct hash_method *hmethod = request->hash_method;
8cdc5b
-	struct hmac_context ctx;
8cdc5b
+	struct openssl_hmac_context ctx;
8cdc5b
 	const char *auth_message;
8cdc5b
 	unsigned char server_signature[hmethod->digest_size];
8cdc5b
 	string_t *str;
8cdc5b
@@ -87,9 +87,9 @@ static const char *get_scram_server_fina
8cdc5b
 			request->server_first_message, ",",
8cdc5b
 			request->client_final_message_without_proof, NULL);
8cdc5b
 
8cdc5b
-	hmac_init(&ctx, request->server_key, hmethod->digest_size, hmethod);
8cdc5b
-	hmac_update(&ctx, auth_message, strlen(auth_message));
8cdc5b
-	hmac_final(&ctx, server_signature);
8cdc5b
+	openssl_hmac_init(&ctx, request->server_key, hmethod->digest_size, hmethod);
8cdc5b
+	openssl_hmac_update(&ctx, auth_message, strlen(auth_message));
8cdc5b
+	openssl_hmac_final(&ctx, server_signature);
8cdc5b
 
8cdc5b
 	str = t_str_new(MAX_BASE64_ENCODED_SIZE(sizeof(server_signature)));
8cdc5b
 	str_append(str, "v=");
8cdc5b
@@ -228,7 +228,7 @@ static bool parse_scram_client_first(str
8cdc5b
 static bool verify_credentials(struct scram_auth_request *request)
8cdc5b
 {
8cdc5b
 	const struct hash_method *hmethod = request->hash_method;
8cdc5b
-	struct hmac_context ctx;
8cdc5b
+	struct openssl_hmac_context ctx;
8cdc5b
 	const char *auth_message;
8cdc5b
 	unsigned char client_key[hmethod->digest_size];
8cdc5b
 	unsigned char client_signature[hmethod->digest_size];
8cdc5b
@@ -239,9 +239,9 @@ static bool verify_credentials(struct sc
8cdc5b
 			request->server_first_message, ",",
8cdc5b
 			request->client_final_message_without_proof, NULL);
8cdc5b
 
8cdc5b
-	hmac_init(&ctx, request->stored_key, hmethod->digest_size, hmethod);
8cdc5b
-	hmac_update(&ctx, auth_message, strlen(auth_message));
8cdc5b
-	hmac_final(&ctx, client_signature);
8cdc5b
+	openssl_hmac_init(&ctx, request->stored_key, hmethod->digest_size, hmethod);
8cdc5b
+	openssl_hmac_update(&ctx, auth_message, strlen(auth_message));
8cdc5b
+	openssl_hmac_final(&ctx, client_signature);
8cdc5b
 
8cdc5b
 	const unsigned char *proof_data = request->proof->data;
8cdc5b
 	for (i = 0; i < sizeof(client_signature); i++)
8cdc5b
diff -up dovecot-2.3.14/src/auth/password-scheme.c.opensslhmac dovecot-2.3.14/src/auth/password-scheme.c
8cdc5b
--- dovecot-2.3.14/src/auth/password-scheme.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/auth/password-scheme.c	2021-03-22 20:44:13.022912242 +0100
8cdc5b
@@ -639,11 +639,11 @@ static void
8cdc5b
 cram_md5_generate(const char *plaintext, const struct password_generate_params *params ATTR_UNUSED,
8cdc5b
 		  const unsigned char **raw_password_r, size_t *size_r)
8cdc5b
 {
8cdc5b
-	struct hmac_context ctx;
8cdc5b
+	struct orig_hmac_context ctx;
8cdc5b
 	unsigned char *context_digest;
8cdc5b
 
8cdc5b
 	context_digest = t_malloc_no0(CRAM_MD5_CONTEXTLEN);
8cdc5b
-	hmac_init(&ctx, (const unsigned char *)plaintext,
8cdc5b
+	orig_hmac_init(&ctx, (const unsigned char *)plaintext,
8cdc5b
 		  strlen(plaintext), &hash_method_md5);
8cdc5b
 	hmac_md5_get_cram_context(&ctx, context_digest);
8cdc5b
 
8cdc5b
diff -up dovecot-2.3.14/src/auth/password-scheme-scram.c.opensslhmac dovecot-2.3.14/src/auth/password-scheme-scram.c
8cdc5b
--- dovecot-2.3.14/src/auth/password-scheme-scram.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/auth/password-scheme-scram.c	2021-03-22 20:44:13.023912229 +0100
8cdc5b
@@ -30,23 +30,23 @@ Hi(const struct hash_method *hmethod, co
8cdc5b
    const unsigned char *salt, size_t salt_size, unsigned int i,
8cdc5b
    unsigned char *result)
8cdc5b
 {
8cdc5b
-	struct hmac_context ctx;
8cdc5b
+	struct openssl_hmac_context ctx;
8cdc5b
 	unsigned char U[hmethod->digest_size];
8cdc5b
 	unsigned int j, k;
8cdc5b
 
8cdc5b
 	/* Calculate U1 */
8cdc5b
-	hmac_init(&ctx, str, str_size, hmethod);
8cdc5b
-	hmac_update(&ctx, salt, salt_size);
8cdc5b
-	hmac_update(&ctx, "\0\0\0\1", 4);
8cdc5b
-	hmac_final(&ctx, U);
8cdc5b
+	openssl_hmac_init(&ctx, str, str_size, hmethod);
8cdc5b
+	openssl_hmac_update(&ctx, salt, salt_size);
8cdc5b
+	openssl_hmac_update(&ctx, "\0\0\0\1", 4);
8cdc5b
+	openssl_hmac_final(&ctx, U);
8cdc5b
 
8cdc5b
 	memcpy(result, U, hmethod->digest_size);
8cdc5b
 
8cdc5b
 	/* Calculate U2 to Ui and Hi */
8cdc5b
 	for (j = 2; j <= i; j++) {
8cdc5b
-		hmac_init(&ctx, str, str_size, hmethod);
8cdc5b
-		hmac_update(&ctx, U, sizeof(U));
8cdc5b
-		hmac_final(&ctx, U);
8cdc5b
+		openssl_hmac_init(&ctx, str, str_size, hmethod);
8cdc5b
+		openssl_hmac_update(&ctx, U, sizeof(U));
8cdc5b
+		openssl_hmac_final(&ctx, U);
8cdc5b
 		for (k = 0; k < hmethod->digest_size; k++)
8cdc5b
 			result[k] ^= U[k];
8cdc5b
 	}
8cdc5b
@@ -102,7 +102,7 @@ int scram_verify(const struct hash_metho
8cdc5b
 		 const char *plaintext, const unsigned char *raw_password,
8cdc5b
 		 size_t size, const char **error_r)
8cdc5b
 {
8cdc5b
-	struct hmac_context ctx;
8cdc5b
+	struct openssl_hmac_context ctx;
8cdc5b
 	const char *salt_base64;
8cdc5b
 	unsigned int iter_count;
8cdc5b
 	const unsigned char *salt;
8cdc5b
@@ -126,9 +126,9 @@ int scram_verify(const struct hash_metho
8cdc5b
 	   salt, salt_len, iter_count, salted_password);
8cdc5b
 
8cdc5b
 	/* Calculate ClientKey */
8cdc5b
-	hmac_init(&ctx, salted_password, sizeof(salted_password), hmethod);
8cdc5b
-	hmac_update(&ctx, "Client Key", 10);
8cdc5b
-	hmac_final(&ctx, client_key);
8cdc5b
+	openssl_hmac_init(&ctx, salted_password, sizeof(salted_password), hmethod);
8cdc5b
+	openssl_hmac_update(&ctx, "Client Key", 10);
8cdc5b
+	openssl_hmac_final(&ctx, client_key);
8cdc5b
 
8cdc5b
 	/* Calculate StoredKey */
8cdc5b
 	hash_method_get_digest(hmethod, client_key, sizeof(client_key),
8cdc5b
@@ -147,7 +147,7 @@ void scram_generate(const struct hash_me
8cdc5b
 		    const unsigned char **raw_password_r, size_t *size_r)
8cdc5b
 {
8cdc5b
 	string_t *str;
8cdc5b
-	struct hmac_context ctx;
8cdc5b
+	struct openssl_hmac_context ctx;
8cdc5b
 	unsigned char salt[16];
8cdc5b
 	unsigned char salted_password[hmethod->digest_size];
8cdc5b
 	unsigned char client_key[hmethod->digest_size];
8cdc5b
@@ -165,9 +165,9 @@ void scram_generate(const struct hash_me
8cdc5b
 	   sizeof(salt), SCRAM_DEFAULT_ITERATE_COUNT, salted_password);
8cdc5b
 
8cdc5b
 	/* Calculate ClientKey */
8cdc5b
-	hmac_init(&ctx, salted_password, sizeof(salted_password), hmethod);
8cdc5b
-	hmac_update(&ctx, "Client Key", 10);
8cdc5b
-	hmac_final(&ctx, client_key);
8cdc5b
+	openssl_hmac_init(&ctx, salted_password, sizeof(salted_password), hmethod);
8cdc5b
+	openssl_hmac_update(&ctx, "Client Key", 10);
8cdc5b
+	openssl_hmac_final(&ctx, client_key);
8cdc5b
 
8cdc5b
 	/* Calculate StoredKey */
8cdc5b
 	hash_method_get_digest(hmethod, client_key, sizeof(client_key),
8cdc5b
@@ -176,9 +176,9 @@ void scram_generate(const struct hash_me
8cdc5b
 	base64_encode(stored_key, sizeof(stored_key), str);
8cdc5b
 
8cdc5b
 	/* Calculate ServerKey */
8cdc5b
-	hmac_init(&ctx, salted_password, sizeof(salted_password), hmethod);
8cdc5b
-	hmac_update(&ctx, "Server Key", 10);
8cdc5b
-	hmac_final(&ctx, server_key);
8cdc5b
+	openssl_hmac_init(&ctx, salted_password, sizeof(salted_password), hmethod);
8cdc5b
+	openssl_hmac_update(&ctx, "Server Key", 10);
8cdc5b
+	openssl_hmac_final(&ctx, server_key);
8cdc5b
 	str_append_c(str, ',');
8cdc5b
 	base64_encode(server_key, sizeof(server_key), str);
8cdc5b
 
8cdc5b
diff -up dovecot-2.3.14/src/lib/hmac.c.opensslhmac dovecot-2.3.14/src/lib/hmac.c
8cdc5b
--- dovecot-2.3.14/src/lib/hmac.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib/hmac.c	2021-03-22 20:44:13.023912229 +0100
8cdc5b
@@ -7,6 +7,10 @@
8cdc5b
  * This software is released under the MIT license.
8cdc5b
  */
8cdc5b
 
8cdc5b
+#include <sys/types.h>
8cdc5b
+#include <sys/stat.h>
8cdc5b
+#include <fcntl.h>
8cdc5b
+#include <unistd.h>
8cdc5b
 #include "lib.h"
8cdc5b
 #include "hmac.h"
8cdc5b
 #include "safe-memset.h"
8cdc5b
@@ -14,10 +18,65 @@
8cdc5b
 
8cdc5b
 #include "hex-binary.h"
8cdc5b
 
8cdc5b
-void hmac_init(struct hmac_context *_ctx, const unsigned char *key,
8cdc5b
+#ifndef HAVE_HMAC_CTX_NEW
8cdc5b
+#  define HMAC_Init_ex(ctx, key, key_len, md, impl) \
8cdc5b
+	HMAC_Init_ex(&(ctx), key, key_len, md, impl)
8cdc5b
+#  define HMAC_Update(ctx, data, len) HMAC_Update(&(ctx), data, len)
8cdc5b
+#  define HMAC_Final(ctx, md, len) HMAC_Final(&(ctx), md, len)
8cdc5b
+#  define HMAC_CTX_free(ctx) HMAC_cleanup(&(ctx))
8cdc5b
+#else
8cdc5b
+#  define HMAC_CTX_free(ctx) \
8cdc5b
+	STMT_START { HMAC_CTX_free(ctx); (ctx) = NULL; } STMT_END
8cdc5b
+#endif
8cdc5b
+
8cdc5b
+
8cdc5b
+void openssl_hmac_init(struct openssl_hmac_context *_ctx, const unsigned char *key,
8cdc5b
 		size_t key_len, const struct hash_method *meth)
8cdc5b
 {
8cdc5b
-	struct hmac_context_priv *ctx = &_ctx->u.priv;
8cdc5b
+ 	struct openssl_hmac_context_priv *ctx = &_ctx->u.priv;
8cdc5b
+
8cdc5b
+	const EVP_MD *md;
8cdc5b
+	const char *ebuf = NULL;
8cdc5b
+	const char **error_r = &ebuf;
8cdc5b
+
8cdc5b
+	md = EVP_get_digestbyname(meth->name);
8cdc5b
+	if(md == NULL) {
8cdc5b
+		if (error_r != NULL) {
8cdc5b
+			*error_r = t_strdup_printf("Invalid digest %s",
8cdc5b
+						   meth->name);
8cdc5b
+		}
8cdc5b
+		//return FALSE;
8cdc5b
+	}
8cdc5b
+
8cdc5b
+// 	int ec;
8cdc5b
+
8cdc5b
+	i_assert(md != NULL);
8cdc5b
+#ifdef HAVE_HMAC_CTX_NEW
8cdc5b
+	ctx->ctx = HMAC_CTX_new();
8cdc5b
+/*	if (ctx->ctx == NULL)
8cdc5b
+		dcrypt_openssl_error(error_r);*/
8cdc5b
+#endif
8cdc5b
+	/*ec = */HMAC_Init_ex(ctx->ctx, key, key_len, md, NULL);
8cdc5b
+}
8cdc5b
+
8cdc5b
+void orig_hmac_init(struct orig_hmac_context *_ctx, const unsigned char *key,
8cdc5b
+		size_t key_len, const struct hash_method *meth)
8cdc5b
+{
8cdc5b
+    static int no_fips = -1;
8cdc5b
+    if (no_fips == -1) {
8cdc5b
+        int fd = open("/proc/sys/crypto/fips_enabled", O_RDONLY);
8cdc5b
+        if (fd != -1)
8cdc5b
+        {
8cdc5b
+            char buf[4];
8cdc5b
+            if (read(fd, buf, 4) > 0)
8cdc5b
+            {
8cdc5b
+                no_fips = buf[0] == '0';   
8cdc5b
+            }
8cdc5b
+            close(fd);   
8cdc5b
+        }
8cdc5b
+    }
8cdc5b
+    i_assert(no_fips);
8cdc5b
+	struct orig_hmac_context_priv *ctx = &_ctx->u.priv;
8cdc5b
 	unsigned int i;
8cdc5b
 	unsigned char k_ipad[meth->block_size];
8cdc5b
 	unsigned char k_opad[meth->block_size];
8cdc5b
@@ -53,9 +112,27 @@ void hmac_init(struct hmac_context *_ctx
8cdc5b
 	safe_memset(k_opad, 0, meth->block_size);
8cdc5b
 }
8cdc5b
 
8cdc5b
-void hmac_final(struct hmac_context *_ctx, unsigned char *digest)
8cdc5b
+void openssl_hmac_final(struct openssl_hmac_context *_ctx, unsigned char *digest)
8cdc5b
+{
8cdc5b
+	int ec;
8cdc5b
+	unsigned char buf[HMAC_MAX_MD_CBLOCK];
8cdc5b
+	unsigned int outl;
8cdc5b
+//     const char *ebuf = NULL;
8cdc5b
+//     const char **error_r = &ebuf;
8cdc5b
+
8cdc5b
+    struct openssl_hmac_context_priv *ctx = &_ctx->u.priv;
8cdc5b
+	ec = HMAC_Final(ctx->ctx, buf, &outl);
8cdc5b
+	HMAC_CTX_free(ctx->ctx);
8cdc5b
+	if (ec == 1)
8cdc5b
+		memcpy(digest, buf, outl);
8cdc5b
+//	else
8cdc5b
+//		dcrypt_openssl_error(error_r);
8cdc5b
+
8cdc5b
+}
8cdc5b
+
8cdc5b
+void orig_hmac_final(struct orig_hmac_context *_ctx, unsigned char *digest)
8cdc5b
 {
8cdc5b
-	struct hmac_context_priv *ctx = &_ctx->u.priv;
8cdc5b
+	struct orig_hmac_context_priv *ctx = &_ctx->u.priv;
8cdc5b
 
8cdc5b
 	ctx->hash->result(ctx->ctx, digest);
8cdc5b
 
8cdc5b
@@ -63,53 +140,50 @@ void hmac_final(struct hmac_context *_ct
8cdc5b
 	ctx->hash->result(ctx->ctxo, digest);
8cdc5b
 }
8cdc5b
 
8cdc5b
-buffer_t *t_hmac_data(const struct hash_method *meth,
8cdc5b
+buffer_t *openssl_t_hmac_data(const struct hash_method *meth,
8cdc5b
 		      const unsigned char *key, size_t key_len,
8cdc5b
 		      const void *data, size_t data_len)
8cdc5b
 {
8cdc5b
-	struct hmac_context ctx;
8cdc5b
+	struct openssl_hmac_context ctx;
8cdc5b
 	i_assert(meth != NULL);
8cdc5b
 	i_assert(key != NULL && key_len > 0);
8cdc5b
 	i_assert(data != NULL || data_len == 0);
8cdc5b
 
8cdc5b
 	buffer_t *res = t_buffer_create(meth->digest_size);
8cdc5b
-	hmac_init(&ctx, key, key_len, meth);
8cdc5b
+	openssl_hmac_init(&ctx, key, key_len, meth);
8cdc5b
 	if (data_len > 0)
8cdc5b
-		hmac_update(&ctx, data, data_len);
8cdc5b
+		openssl_hmac_update(&ctx, data, data_len);
8cdc5b
 	unsigned char *buf = buffer_get_space_unsafe(res, 0, meth->digest_size);
8cdc5b
-	hmac_final(&ctx, buf);
8cdc5b
+	openssl_hmac_final(&ctx, buf);
8cdc5b
 	return res;
8cdc5b
 }
8cdc5b
 
8cdc5b
-buffer_t *t_hmac_buffer(const struct hash_method *meth,
8cdc5b
+buffer_t *openssl_t_hmac_buffer(const struct hash_method *meth,
8cdc5b
 			const unsigned char *key, size_t key_len,
8cdc5b
 			const buffer_t *data)
8cdc5b
 {
8cdc5b
-	return t_hmac_data(meth, key, key_len, data->data, data->used);
8cdc5b
+	return openssl_t_hmac_data(meth, key, key_len, data->data, data->used);
8cdc5b
 }
8cdc5b
 
8cdc5b
-buffer_t *t_hmac_str(const struct hash_method *meth,
8cdc5b
+buffer_t *openssl_t_hmac_str(const struct hash_method *meth,
8cdc5b
 		     const unsigned char *key, size_t key_len,
8cdc5b
 		     const char *data)
8cdc5b
 {
8cdc5b
-	return t_hmac_data(meth, key, key_len, data, strlen(data));
8cdc5b
+	return openssl_t_hmac_data(meth, key, key_len, data, strlen(data));
8cdc5b
 }
8cdc5b
 
8cdc5b
-void hmac_hkdf(const struct hash_method *method,
8cdc5b
+void openssl_hmac_hkdf(const struct hash_method *method,
8cdc5b
 	       const unsigned char *salt, size_t salt_len,
8cdc5b
 	       const unsigned char *ikm, size_t ikm_len,
8cdc5b
 	       const unsigned char *info, size_t info_len,
8cdc5b
 	       buffer_t *okm_r, size_t okm_len)
8cdc5b
 {
8cdc5b
+	const EVP_MD *md;
8cdc5b
+	EVP_PKEY_CTX *pctx;
8cdc5b
+	int r = 1;
8cdc5b
+
8cdc5b
 	i_assert(method != NULL);
8cdc5b
 	i_assert(okm_len < 255*method->digest_size);
8cdc5b
-	struct hmac_context key_mac;
8cdc5b
-	struct hmac_context info_mac;
8cdc5b
-	size_t remain = okm_len;
8cdc5b
-	unsigned char prk[method->digest_size];
8cdc5b
-	unsigned char okm[method->digest_size];
8cdc5b
-	/* N = ceil(L/HashLen) */
8cdc5b
-	unsigned int rounds = (okm_len + method->digest_size - 1)/method->digest_size;
8cdc5b
 
8cdc5b
 	/* salt and info can be NULL */
8cdc5b
 	i_assert(salt != NULL || salt_len == 0);
8cdc5b
@@ -118,35 +192,30 @@ void hmac_hkdf(const struct hash_method
8cdc5b
 	i_assert(ikm != NULL && ikm_len > 0);
8cdc5b
 	i_assert(okm_r != NULL && okm_len > 0);
8cdc5b
 
8cdc5b
-	/* but they still need valid pointer, reduces
8cdc5b
-	   complains from static analysers */
8cdc5b
-	if (salt == NULL)
8cdc5b
-		salt = &uchar_nul;
8cdc5b
-	if (info == NULL)
8cdc5b
-		info = &uchar_nul;
8cdc5b
-
8cdc5b
-	/* extract */
8cdc5b
-	hmac_init(&key_mac, salt, salt_len, method);
8cdc5b
-	hmac_update(&key_mac, ikm, ikm_len);
8cdc5b
-	hmac_final(&key_mac, prk);
8cdc5b
-
8cdc5b
-	/* expand */
8cdc5b
-	for (unsigned int i = 0; remain > 0 && i < rounds; i++) {
8cdc5b
-		unsigned char round = (i+1);
8cdc5b
-		size_t amt = remain;
8cdc5b
-		if (amt > method->digest_size)
8cdc5b
-			amt = method->digest_size;
8cdc5b
-		hmac_init(&info_mac, prk, method->digest_size, method);
8cdc5b
-		if (i > 0)
8cdc5b
-			hmac_update(&info_mac, okm, method->digest_size);
8cdc5b
-		hmac_update(&info_mac, info, info_len);
8cdc5b
-		hmac_update(&info_mac, &round, 1);
8cdc5b
-		memset(okm, 0, method->digest_size);
8cdc5b
-		hmac_final(&info_mac, okm);
8cdc5b
-		buffer_append(okm_r, okm, amt);
8cdc5b
-		remain -= amt;
8cdc5b
+
8cdc5b
+	md = EVP_get_digestbyname(method->name);
8cdc5b
+	pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_HKDF, NULL);
8cdc5b
+	unsigned char *okm_buf = buffer_get_space_unsafe(okm_r, 0, okm_len);
8cdc5b
+
8cdc5b
+	if ((r=EVP_PKEY_derive_init(pctx)) <= 0)
8cdc5b
+		goto out;
8cdc5b
+	if ((r=EVP_PKEY_CTX_set_hkdf_md(pctx, md)) <= 0)
8cdc5b
+		goto out;
8cdc5b
+	if ((r=EVP_PKEY_CTX_set1_hkdf_salt(pctx, salt, salt_len)) <= 0)
8cdc5b
+		goto out;
8cdc5b
+	if ((r=EVP_PKEY_CTX_set1_hkdf_key(pctx, ikm, ikm_len)) <= 0)
8cdc5b
+		goto out;
8cdc5b
+	if ((r=EVP_PKEY_CTX_add1_hkdf_info(pctx, info, info_len)) <= 0)
8cdc5b
+		goto out;
8cdc5b
+	if ((r=EVP_PKEY_derive(pctx, okm_buf, &okm_len)) <= 0)
8cdc5b
+		goto out;
8cdc5b
+
8cdc5b
+     out:
8cdc5b
+	EVP_PKEY_CTX_free(pctx);
8cdc5b
+	if (r <= 0) {
8cdc5b
+		unsigned long ec = ERR_get_error();
8cdc5b
+		unsigned char *error = t_strdup_printf("%s", ERR_error_string(ec, NULL));
8cdc5b
+		i_error("%s", error);
8cdc5b
 	}
8cdc5b
 
8cdc5b
-	safe_memset(prk, 0, sizeof(prk));
8cdc5b
-	safe_memset(okm, 0, sizeof(okm));
8cdc5b
 }
8cdc5b
diff -up dovecot-2.3.14/src/lib/hmac-cram-md5.c.opensslhmac dovecot-2.3.14/src/lib/hmac-cram-md5.c
8cdc5b
--- dovecot-2.3.14/src/lib/hmac-cram-md5.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib/hmac-cram-md5.c	2021-03-22 20:44:13.023912229 +0100
8cdc5b
@@ -9,10 +9,10 @@
8cdc5b
 #include "md5.h"
8cdc5b
 #include "hmac-cram-md5.h"
8cdc5b
 
8cdc5b
-void hmac_md5_get_cram_context(struct hmac_context *_hmac_ctx,
8cdc5b
+void hmac_md5_get_cram_context(struct orig_hmac_context *_hmac_ctx,
8cdc5b
 			unsigned char context_digest[CRAM_MD5_CONTEXTLEN])
8cdc5b
 {
8cdc5b
-	struct hmac_context_priv *hmac_ctx = &_hmac_ctx->u.priv;
8cdc5b
+	struct orig_hmac_context_priv *hmac_ctx = &_hmac_ctx->u.priv;
8cdc5b
 	unsigned char *cdp;
8cdc5b
 
8cdc5b
 	struct md5_context *ctx = (void*)hmac_ctx->ctx;
8cdc5b
@@ -35,10 +35,10 @@ void hmac_md5_get_cram_context(struct hm
8cdc5b
 	CDPUT(cdp, ctx->d);
8cdc5b
 }
8cdc5b
 
8cdc5b
-void hmac_md5_set_cram_context(struct hmac_context *_hmac_ctx,
8cdc5b
+void hmac_md5_set_cram_context(struct orig_hmac_context *_hmac_ctx,
8cdc5b
 			const unsigned char context_digest[CRAM_MD5_CONTEXTLEN])
8cdc5b
 {
8cdc5b
-	struct hmac_context_priv *hmac_ctx = &_hmac_ctx->u.priv;
8cdc5b
+	struct orig_hmac_context_priv *hmac_ctx = &_hmac_ctx->u.priv;
8cdc5b
 	const unsigned char *cdp;
8cdc5b
 
8cdc5b
 	struct md5_context *ctx = (void*)hmac_ctx->ctx;
8cdc5b
diff -up dovecot-2.3.14/src/lib/hmac-cram-md5.h.opensslhmac dovecot-2.3.14/src/lib/hmac-cram-md5.h
8cdc5b
--- dovecot-2.3.14/src/lib/hmac-cram-md5.h.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib/hmac-cram-md5.h	2021-03-22 20:44:13.023912229 +0100
8cdc5b
@@ -5,9 +5,9 @@
8cdc5b
 
8cdc5b
 #define CRAM_MD5_CONTEXTLEN 32
8cdc5b
 
8cdc5b
-void hmac_md5_get_cram_context(struct hmac_context *ctx,
8cdc5b
+void hmac_md5_get_cram_context(struct orig_hmac_context *ctx,
8cdc5b
 		unsigned char context_digest[CRAM_MD5_CONTEXTLEN]);
8cdc5b
-void hmac_md5_set_cram_context(struct hmac_context *ctx,
8cdc5b
+void hmac_md5_set_cram_context(struct orig_hmac_context *ctx,
8cdc5b
 		const unsigned char context_digest[CRAM_MD5_CONTEXTLEN]);
8cdc5b
 
8cdc5b
 
8cdc5b
diff -up dovecot-2.3.14/src/lib/hmac.h.opensslhmac dovecot-2.3.14/src/lib/hmac.h
8cdc5b
--- dovecot-2.3.14/src/lib/hmac.h.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib/hmac.h	2021-03-22 20:44:13.023912229 +0100
8cdc5b
@@ -4,60 +4,97 @@
8cdc5b
 #include "hash-method.h"
8cdc5b
 #include "sha1.h"
8cdc5b
 #include "sha2.h"
8cdc5b
+#include <openssl/objects.h>
8cdc5b
+#include <openssl/hmac.h>
8cdc5b
+#include <openssl/kdf.h>
8cdc5b
+#include <openssl/err.h>
8cdc5b
 
8cdc5b
 #define HMAC_MAX_CONTEXT_SIZE sizeof(struct sha512_ctx)
8cdc5b
 
8cdc5b
-struct hmac_context_priv {
8cdc5b
+struct openssl_hmac_context_priv {
8cdc5b
+#ifdef HAVE_HMAC_CTX_NEW
8cdc5b
+	HMAC_CTX *ctx;
8cdc5b
+#else
8cdc5b
+	HMAC_CTX ctx;
8cdc5b
+#endif
8cdc5b
+	const struct hash_method *hash;
8cdc5b
+};
8cdc5b
+
8cdc5b
+struct orig_hmac_context_priv {
8cdc5b
 	char ctx[HMAC_MAX_CONTEXT_SIZE];
8cdc5b
 	char ctxo[HMAC_MAX_CONTEXT_SIZE];
8cdc5b
 	const struct hash_method *hash;
8cdc5b
 };
8cdc5b
 
8cdc5b
-struct hmac_context {
8cdc5b
+struct openssl_hmac_context {
8cdc5b
+	union {
8cdc5b
+		struct openssl_hmac_context_priv priv;
8cdc5b
+		uint64_t padding_requirement;
8cdc5b
+	} u;
8cdc5b
+};
8cdc5b
+
8cdc5b
+struct orig_hmac_context {
8cdc5b
 	union {
8cdc5b
-		struct hmac_context_priv priv;
8cdc5b
+		struct orig_hmac_context_priv priv;
8cdc5b
 		uint64_t padding_requirement;
8cdc5b
 	} u;
8cdc5b
 };
8cdc5b
 
8cdc5b
-void hmac_init(struct hmac_context *ctx, const unsigned char *key,
8cdc5b
+void openssl_hmac_init(struct openssl_hmac_context *ctx, const unsigned char *key,
8cdc5b
+		size_t key_len, const struct hash_method *meth);
8cdc5b
+void openssl_hmac_final(struct openssl_hmac_context *ctx, unsigned char *digest);
8cdc5b
+
8cdc5b
+static inline void
8cdc5b
+openssl_hmac_update(struct openssl_hmac_context *_ctx, const void *data, size_t size)
8cdc5b
+{
8cdc5b
+	struct openssl_hmac_context_priv *ctx = &_ctx->u.priv;
8cdc5b
+	HMAC_Update(ctx->ctx, data, size);
8cdc5b
+/*	if (ec != 1)
8cdc5b
+    {
8cdc5b
+        const char *ebuf = NULL;
8cdc5b
+        const char **error_r = &ebuf;
8cdc5b
+		dcrypt_openssl_error(error_r);
8cdc5b
+    }*/
8cdc5b
+}
8cdc5b
+
8cdc5b
+void orig_hmac_init(struct orig_hmac_context *ctx, const unsigned char *key,
8cdc5b
 		size_t key_len, const struct hash_method *meth);
8cdc5b
-void hmac_final(struct hmac_context *ctx, unsigned char *digest);
8cdc5b
+void orig_hmac_final(struct orig_hmac_context *ctx, unsigned char *digest);
8cdc5b
 
8cdc5b
 
8cdc5b
 static inline void
8cdc5b
-hmac_update(struct hmac_context *_ctx, const void *data, size_t size)
8cdc5b
+orig_hmac_update(struct orig_hmac_context *_ctx, const void *data, size_t size)
8cdc5b
 {
8cdc5b
-	struct hmac_context_priv *ctx = &_ctx->u.priv;
8cdc5b
+	struct orig_hmac_context_priv *ctx = &_ctx->u.priv;
8cdc5b
 
8cdc5b
 	ctx->hash->loop(ctx->ctx, data, size);
8cdc5b
 }
8cdc5b
 
8cdc5b
-buffer_t *t_hmac_data(const struct hash_method *meth,
8cdc5b
+buffer_t *openssl_t_hmac_data(const struct hash_method *meth,
8cdc5b
 		      const unsigned char *key, size_t key_len,
8cdc5b
 		      const void *data, size_t data_len);
8cdc5b
-buffer_t *t_hmac_buffer(const struct hash_method *meth,
8cdc5b
+buffer_t *openssl_t_hmac_buffer(const struct hash_method *meth,
8cdc5b
 			const unsigned char *key, size_t key_len,
8cdc5b
 			const buffer_t *data);
8cdc5b
-buffer_t *t_hmac_str(const struct hash_method *meth,
8cdc5b
+buffer_t *openssl_t_hmac_str(const struct hash_method *meth,
8cdc5b
 		     const unsigned char *key, size_t key_len,
8cdc5b
 		     const char *data);
8cdc5b
 
8cdc5b
-void hmac_hkdf(const struct hash_method *method,
8cdc5b
+void openssl_hmac_hkdf(const struct hash_method *method,
8cdc5b
 	       const unsigned char *salt, size_t salt_len,
8cdc5b
 	       const unsigned char *ikm, size_t ikm_len,
8cdc5b
 	       const unsigned char *info, size_t info_len,
8cdc5b
 	       buffer_t *okm_r, size_t okm_len);
8cdc5b
 
8cdc5b
 static inline buffer_t *
8cdc5b
-t_hmac_hkdf(const struct hash_method *method,
8cdc5b
+openssl_t_hmac_hkdf(const struct hash_method *method,
8cdc5b
 	    const unsigned char *salt, size_t salt_len,
8cdc5b
 	    const unsigned char *ikm, size_t ikm_len,
8cdc5b
 	    const unsigned char *info, size_t info_len,
8cdc5b
 	    size_t okm_len)
8cdc5b
 {
8cdc5b
 	buffer_t *okm_buffer = t_buffer_create(okm_len);
8cdc5b
-	hmac_hkdf(method, salt, salt_len, ikm, ikm_len, info, info_len,
8cdc5b
+	openssl_hmac_hkdf(method, salt, salt_len, ikm, ikm_len, info, info_len,
8cdc5b
 		  okm_buffer, okm_len);
8cdc5b
 	return okm_buffer;
8cdc5b
 }
8cdc5b
diff -up dovecot-2.3.14/src/lib-imap-urlauth/imap-urlauth.c.opensslhmac dovecot-2.3.14/src/lib-imap-urlauth/imap-urlauth.c
8cdc5b
--- dovecot-2.3.14/src/lib-imap-urlauth/imap-urlauth.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib-imap-urlauth/imap-urlauth.c	2021-03-22 20:44:13.023912229 +0100
8cdc5b
@@ -85,15 +85,15 @@ imap_urlauth_internal_generate(const cha
8cdc5b
 			       const unsigned char mailbox_key[IMAP_URLAUTH_KEY_LEN],
8cdc5b
 			       size_t *token_len_r)
8cdc5b
 {
8cdc5b
-	struct hmac_context hmac;
8cdc5b
+	struct openssl_hmac_context hmac;
8cdc5b
 	unsigned char *token;
8cdc5b
 
8cdc5b
 	token = t_new(unsigned char, SHA1_RESULTLEN + 1);
8cdc5b
 	token[0] = IMAP_URLAUTH_MECH_INTERNAL_VERSION;
8cdc5b
 
8cdc5b
-	hmac_init(&hmac, mailbox_key, IMAP_URLAUTH_KEY_LEN, &hash_method_sha1);
8cdc5b
-	hmac_update(&hmac, rumpurl, strlen(rumpurl));
8cdc5b
-	hmac_final(&hmac, token+1);
8cdc5b
+	openssl_hmac_init(&hmac, mailbox_key, IMAP_URLAUTH_KEY_LEN, &hash_method_sha1);
8cdc5b
+	openssl_hmac_update(&hmac, rumpurl, strlen(rumpurl));
8cdc5b
+	openssl_hmac_final(&hmac, token+1);
8cdc5b
 
8cdc5b
 	*token_len_r = SHA1_RESULTLEN + 1;
8cdc5b
 	return token;
8cdc5b
diff -up dovecot-2.3.14/src/lib/Makefile.am.opensslhmac dovecot-2.3.14/src/lib/Makefile.am
8cdc5b
--- dovecot-2.3.14/src/lib/Makefile.am.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib/Makefile.am	2021-03-22 20:44:13.023912229 +0100
8cdc5b
@@ -352,6 +352,9 @@ headers = \
8cdc5b
 	wildcard-match.h \
8cdc5b
 	write-full.h
8cdc5b
 
8cdc5b
+liblib_la_LIBADD = $(SSL_LIBS)
8cdc5b
+liblib_la_CFLAGS = $(SSL_CFLAGS)
8cdc5b
+
8cdc5b
 test_programs = test-lib
8cdc5b
 noinst_PROGRAMS = $(test_programs)
8cdc5b
 
8cdc5b
diff -up dovecot-2.3.14/src/lib-oauth2/oauth2-jwt.c.opensslhmac dovecot-2.3.14/src/lib-oauth2/oauth2-jwt.c
8cdc5b
--- dovecot-2.3.14/src/lib-oauth2/oauth2-jwt.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib-oauth2/oauth2-jwt.c	2021-03-22 20:44:13.024912217 +0100
8cdc5b
@@ -106,14 +106,14 @@ oauth2_validate_hmac(const struct oauth2
8cdc5b
 	if (oauth2_lookup_hmac_key(set, azp, alg, key_id, &key, error_r) < 0)
8cdc5b
 		return -1;
8cdc5b
 
8cdc5b
-	struct hmac_context ctx;
8cdc5b
-	hmac_init(&ctx, key->data, key->used, method);
8cdc5b
-	hmac_update(&ctx, blobs[0], strlen(blobs[0]));
8cdc5b
-	hmac_update(&ctx, ".", 1);
8cdc5b
-	hmac_update(&ctx, blobs[1], strlen(blobs[1]));
8cdc5b
+	struct openssl_hmac_context ctx;
8cdc5b
+	openssl_hmac_init(&ctx, key->data, key->used, method);
8cdc5b
+	openssl_hmac_update(&ctx, blobs[0], strlen(blobs[0]));
8cdc5b
+	openssl_hmac_update(&ctx, ".", 1);
8cdc5b
+	openssl_hmac_update(&ctx, blobs[1], strlen(blobs[1]));
8cdc5b
 	unsigned char digest[method->digest_size];
8cdc5b
 
8cdc5b
-	hmac_final(&ctx, digest);
8cdc5b
+	openssl_hmac_final(&ctx, digest);
8cdc5b
 
8cdc5b
 	buffer_t *their_digest =
8cdc5b
 		t_base64url_decode_str(BASE64_DECODE_FLAG_NO_PADDING, blobs[2]);
8cdc5b
diff -up dovecot-2.3.14/src/lib-oauth2/test-oauth2-jwt.c.opensslhmac dovecot-2.3.14/src/lib-oauth2/test-oauth2-jwt.c
8cdc5b
--- dovecot-2.3.14/src/lib-oauth2/test-oauth2-jwt.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib-oauth2/test-oauth2-jwt.c	2021-03-22 20:46:09.524440794 +0100
8cdc5b
@@ -236,7 +236,7 @@ static void save_key_to(const char *algo
8cdc5b
 static void sign_jwt_token_hs256(buffer_t *tokenbuf, buffer_t *key)
8cdc5b
 {
8cdc5b
 	i_assert(key != NULL);
8cdc5b
-	buffer_t *sig = t_hmac_buffer(&hash_method_sha256, key->data, key->used,
8cdc5b
+	buffer_t *sig = openssl_t_hmac_buffer(&hash_method_sha256, key->data, key->used,
8cdc5b
 				      tokenbuf);
8cdc5b
 	buffer_append(tokenbuf, ".", 1);
8cdc5b
 	base64url_encode(BASE64_ENCODE_FLAG_NO_PADDING, SIZE_MAX,
8cdc5b
@@ -246,7 +246,7 @@ static void sign_jwt_token_hs256(buffer_
8cdc5b
 static void sign_jwt_token_hs384(buffer_t *tokenbuf, buffer_t *key)
8cdc5b
 {
8cdc5b
 	i_assert(key != NULL);
8cdc5b
-	buffer_t *sig = t_hmac_buffer(&hash_method_sha384, key->data, key->used,
8cdc5b
+	buffer_t *sig = openssl_t_hmac_buffer(&hash_method_sha384, key->data, key->used,
8cdc5b
 				      tokenbuf);
8cdc5b
 	buffer_append(tokenbuf, ".", 1);
8cdc5b
 	base64url_encode(BASE64_ENCODE_FLAG_NO_PADDING, SIZE_MAX,
8cdc5b
@@ -256,7 +256,7 @@ static void sign_jwt_token_hs384(buffer_
8cdc5b
 static void sign_jwt_token_hs512(buffer_t *tokenbuf, buffer_t *key)
8cdc5b
 {
8cdc5b
 	i_assert(key != NULL);
8cdc5b
-	buffer_t *sig = t_hmac_buffer(&hash_method_sha512, key->data, key->used,
8cdc5b
+	buffer_t *sig = openssl_t_hmac_buffer(&hash_method_sha512, key->data, key->used,
8cdc5b
 				      tokenbuf);
8cdc5b
 	buffer_append(tokenbuf, ".", 1);
8cdc5b
 	base64url_encode(BASE64_ENCODE_FLAG_NO_PADDING, SIZE_MAX,
8cdc5b
diff -up dovecot-2.3.14/src/lib/pkcs5.c.opensslhmac dovecot-2.3.14/src/lib/pkcs5.c
8cdc5b
--- dovecot-2.3.14/src/lib/pkcs5.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib/pkcs5.c	2021-03-22 20:44:13.024912217 +0100
8cdc5b
@@ -52,7 +52,7 @@ int pkcs5_pbkdf2(const struct hash_metho
8cdc5b
 	size_t l = (length + hash->digest_size - 1)/hash->digest_size; /* same as ceil(length/hash->digest_size) */
8cdc5b
 	unsigned char dk[l * hash->digest_size];
8cdc5b
 	unsigned char *block;
8cdc5b
-	struct hmac_context hctx;
8cdc5b
+	struct openssl_hmac_context hctx;
8cdc5b
 	unsigned int c,i,t;
8cdc5b
 	unsigned char U_c[hash->digest_size];
8cdc5b
 
8cdc5b
@@ -60,17 +60,17 @@ int pkcs5_pbkdf2(const struct hash_metho
8cdc5b
 		block = &(dk[t*hash->digest_size]);
8cdc5b
 		/* U_1 = PRF(Password, Salt|| INT_BE32(Block_Number)) */
8cdc5b
 		c = htonl(t+1);
8cdc5b
-		hmac_init(&hctx, password, password_len, hash);
8cdc5b
-		hmac_update(&hctx, salt, salt_len);
8cdc5b
-		hmac_update(&hctx, &c, sizeof(c));
8cdc5b
-		hmac_final(&hctx, U_c);
8cdc5b
+		openssl_hmac_init(&hctx, password, password_len, hash);
8cdc5b
+		openssl_hmac_update(&hctx, salt, salt_len);
8cdc5b
+		openssl_hmac_update(&hctx, &c, sizeof(c));
8cdc5b
+		openssl_hmac_final(&hctx, U_c);
8cdc5b
 		/* block = U_1 ^ .. ^ U_iter */
8cdc5b
 		memcpy(block, U_c, hash->digest_size);
8cdc5b
 		/* U_c = PRF(Password, U_c-1) */
8cdc5b
 		for(c = 1; c < iter; c++) {
8cdc5b
-			hmac_init(&hctx, password, password_len, hash);
8cdc5b
-			hmac_update(&hctx, U_c, hash->digest_size);
8cdc5b
-			hmac_final(&hctx, U_c);
8cdc5b
+			openssl_hmac_init(&hctx, password, password_len, hash);
8cdc5b
+			openssl_hmac_update(&hctx, U_c, hash->digest_size);
8cdc5b
+			openssl_hmac_final(&hctx, U_c);
8cdc5b
 			for(i = 0; i < hash->digest_size; i++)
8cdc5b
 				block[i] ^= U_c[i];
8cdc5b
 		}
8cdc5b
diff -up dovecot-2.3.14/src/lib/test-hmac.c.opensslhmac dovecot-2.3.14/src/lib/test-hmac.c
8cdc5b
--- dovecot-2.3.14/src/lib/test-hmac.c.opensslhmac	2021-03-04 09:38:06.000000000 +0100
8cdc5b
+++ dovecot-2.3.14/src/lib/test-hmac.c	2021-03-22 20:44:13.024912217 +0100
8cdc5b
@@ -206,11 +206,11 @@ static void test_hmac_rfc(void)
8cdc5b
 	test_begin("hmac sha256 rfc4231 vectors");
8cdc5b
 	for(size_t i = 0; i < N_ELEMENTS(test_vectors); i++) {
8cdc5b
 		const struct test_vector *vec = &(test_vectors[i]);
8cdc5b
-		struct hmac_context ctx;
8cdc5b
-		hmac_init(&ctx, vec->key, vec->key_len, hash_method_lookup(vec->prf));
8cdc5b
-		hmac_update(&ctx, vec->data, vec->data_len);
8cdc5b
+		struct openssl_hmac_context ctx;
8cdc5b
+		openssl_hmac_init(&ctx, vec->key, vec->key_len, hash_method_lookup(vec->prf));
8cdc5b
+		openssl_hmac_update(&ctx, vec->data, vec->data_len);
8cdc5b
 		unsigned char res[SHA256_RESULTLEN];
8cdc5b
-		hmac_final(&ctx, res);
8cdc5b
+		openssl_hmac_final(&ctx, res);
8cdc5b
 		test_assert_idx(memcmp(res, vec->res, vec->res_len) == 0, i);
8cdc5b
 	}
8cdc5b
 	test_end();
8cdc5b
@@ -221,11 +221,11 @@ static void test_hmac384_rfc(void)
8cdc5b
 	test_begin("hmac sha384 rfc4231 vectors");
8cdc5b
 	for (size_t i = 0; i < N_ELEMENTS(test_vectors_hmac384); i++) {
8cdc5b
 		const struct test_vector *vec = &(test_vectors_hmac384[i]);
8cdc5b
-		struct hmac_context ctx;
8cdc5b
-		hmac_init(&ctx, vec->key, vec->key_len, hash_method_lookup(vec->prf));
8cdc5b
-		hmac_update(&ctx, vec->data, vec->data_len);
8cdc5b
+		struct openssl_hmac_context ctx;
8cdc5b
+		openssl_hmac_init(&ctx, vec->key, vec->key_len, hash_method_lookup(vec->prf));
8cdc5b
+		openssl_hmac_update(&ctx, vec->data, vec->data_len);
8cdc5b
 		unsigned char res[SHA384_RESULTLEN];
8cdc5b
-		hmac_final(&ctx, res);
8cdc5b
+		openssl_hmac_final(&ctx, res);
8cdc5b
 		test_assert_idx(memcmp(res, vec->res, vec->res_len) == 0, i);
8cdc5b
 	}
8cdc5b
 	test_end();
8cdc5b
@@ -236,11 +236,11 @@ static void test_hmac512_rfc(void)
8cdc5b
 	test_begin("hmac sha512 rfc4231 vectors");
8cdc5b
 	for (size_t i = 0; i < N_ELEMENTS(test_vectors_hmac512); i++) {
8cdc5b
 		const struct test_vector *vec = &(test_vectors_hmac512[i]);
8cdc5b
-		struct hmac_context ctx;
8cdc5b
-		hmac_init(&ctx, vec->key, vec->key_len, hash_method_lookup(vec->prf));
8cdc5b
-		hmac_update(&ctx, vec->data, vec->data_len);
8cdc5b
+		struct openssl_hmac_context ctx;
8cdc5b
+		openssl_hmac_init(&ctx, vec->key, vec->key_len, hash_method_lookup(vec->prf));
8cdc5b
+		openssl_hmac_update(&ctx, vec->data, vec->data_len);
8cdc5b
 		unsigned char res[SHA512_RESULTLEN];
8cdc5b
-		hmac_final(&ctx, res);
8cdc5b
+		openssl_hmac_final(&ctx, res);
8cdc5b
 		test_assert_idx(memcmp(res, vec->res, vec->res_len) == 0, i);
8cdc5b
 	}
8cdc5b
 	test_end();
8cdc5b
@@ -253,7 +253,7 @@ static void test_hmac_buffer(void)
8cdc5b
 
8cdc5b
 	buffer_t *tmp;
8cdc5b
 
8cdc5b
-	tmp = t_hmac_data(hash_method_lookup(vec->prf), vec->key, vec->key_len,
8cdc5b
+	tmp = openssl_t_hmac_data(hash_method_lookup(vec->prf), vec->key, vec->key_len,
8cdc5b
 			  vec->data, vec->data_len);
8cdc5b
 
8cdc5b
 	test_assert(tmp->used == vec->res_len &&
8cdc5b
@@ -270,7 +270,7 @@ static void test_hkdf_rfc(void)
8cdc5b
 		buffer_set_used_size(res, 0);
8cdc5b
 		const struct test_vector_5869 *vec = &(test_vectors_5869[i]);
8cdc5b
 		const struct hash_method *m = hash_method_lookup(vec->prf);
8cdc5b
-		hmac_hkdf(m, vec->salt, vec->salt_len, vec->ikm, vec->ikm_len,
8cdc5b
+		openssl_hmac_hkdf(m, vec->salt, vec->salt_len, vec->ikm, vec->ikm_len,
8cdc5b
 			  vec->info, vec->info_len, res, vec->okm_len);
8cdc5b
 		test_assert_idx(memcmp(res->data, vec->okm, vec->okm_len) == 0, i);
8cdc5b
 	}
8cdc5b
@@ -283,7 +283,7 @@ static void test_hkdf_buffer(void)
8cdc5b
 	test_begin("hkdf temporary buffer");
8cdc5b
 	const struct test_vector_5869 *vec = &(test_vectors_5869[0]);
8cdc5b
 	const struct hash_method *m = hash_method_lookup(vec->prf);
8cdc5b
-	buffer_t *tmp = t_hmac_hkdf(m, vec->salt, vec->salt_len, vec->ikm,
8cdc5b
+	buffer_t *tmp = openssl_t_hmac_hkdf(m, vec->salt, vec->salt_len, vec->ikm,
8cdc5b
 				    vec->ikm_len, vec->info, vec->info_len,
8cdc5b
 				    vec->okm_len);
8cdc5b
 	test_assert(tmp->used == vec->okm_len &&