[openssl-commits] [openssl] OpenSSL_1_0_1-stable update
The branch OpenSSL_1_0_1-stable has been updated via 98b94544e5dcab065404de1892d2aeb726dd6491 (commit) from 844de56ed6e96042d364da6020bd29a816293a0a (commit) - Log - commit 98b94544e5dcab065404de1892d2aeb726dd6491 Author: Kurt RoeckxDate: Tue Nov 24 23:21:06 2015 +0100 Use both sun and __sun Reviewed-by: Andy Polyakov (cherry picked from commit ed02493567390cac6d07447f193fcaac5b219af3) --- Summary of changes: crypto/opensslconf.h.in | 2 +- e_os.h | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/crypto/opensslconf.h.in b/crypto/opensslconf.h.in index d8e6abc..7a1c85d 100644 --- a/crypto/opensslconf.h.in +++ b/crypto/opensslconf.h.in @@ -120,7 +120,7 @@ optimization options. Older Sparc's work better with only UNROLL, but there's no way to tell at compile time what it is you're running on */ -#if defined( __sun ) /* Newer Sparc's */ +#if defined( __sun ) || defined ( sun )/* Newer Sparc's */ # define DES_PTR # define DES_RISC1 # define DES_UNROLL diff --git a/e_os.h b/e_os.h index d84ffb4..c9c7aaf 100644 --- a/e_os.h +++ b/e_os.h @@ -612,7 +612,7 @@ struct servent *PASCAL getservbyname(const char *, const char *); #include # endif -# if defined(__sun) +# if defined(__sun) || defined(sun) #include # else #ifndef VMS @@ -654,7 +654,7 @@ struct servent *PASCAL getservbyname(const char *, const char *); # endif -# if defined(__sun) && !defined(__svr4__) && !defined(__SVR4) +# if (defined(__sun) || defined(sun)) && !defined(__svr4__) && !defined(__SVR4) /* include headers first, so our defines don't break it */ # include # include _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_2-stable update
The branch OpenSSL_1_0_2-stable has been updated via ed02493567390cac6d07447f193fcaac5b219af3 (commit) from 296f7bd1ace9383648795b24bf2f3c10d0b9ca47 (commit) - Log - commit ed02493567390cac6d07447f193fcaac5b219af3 Author: Kurt RoeckxDate: Tue Nov 24 23:21:06 2015 +0100 Use both sun and __sun Reviewed-by: Andy Polyakov --- Summary of changes: crypto/opensslconf.h.in | 2 +- e_os.h | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/crypto/opensslconf.h.in b/crypto/opensslconf.h.in index d8e6abc..7a1c85d 100644 --- a/crypto/opensslconf.h.in +++ b/crypto/opensslconf.h.in @@ -120,7 +120,7 @@ optimization options. Older Sparc's work better with only UNROLL, but there's no way to tell at compile time what it is you're running on */ -#if defined( __sun ) /* Newer Sparc's */ +#if defined( __sun ) || defined ( sun )/* Newer Sparc's */ # define DES_PTR # define DES_RISC1 # define DES_UNROLL diff --git a/e_os.h b/e_os.h index 8ac3673..1fa36c1 100644 --- a/e_os.h +++ b/e_os.h @@ -619,7 +619,7 @@ struct servent *PASCAL getservbyname(const char *, const char *); #include # endif -# if defined(__sun) +# if defined(__sun) || defined(sun) #include # else #ifndef VMS @@ -661,7 +661,7 @@ struct servent *PASCAL getservbyname(const char *, const char *); # endif -# if defined(__sun) && !defined(__svr4__) && !defined(__SVR4) +# if (defined(__sun) || defined(sun)) && !defined(__svr4__) && !defined(__SVR4) /* include headers first, so our defines don't break it */ # include # include _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl 6
Build openssl 6 failed Commit 1a0659e002 by Alessandro Ghedini on 11/24/2015 11:50 PM: Convert RAND_OpenSSL() to CRYPTO_MUTEX Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build completed: openssl master.27
Build openssl master.27 completed Commit 63eb10a07e by Dr. Stephen Henson on 11/24/2015 4:45 PM: Fix uninitialised p error. Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl OpenSSL_1_0_1-stable.28
Build openssl OpenSSL_1_0_1-stable.28 failed Commit fc45da0535 by Dr. Stephen Henson on 11/24/2015 4:55 PM: Fix uninitialised p error. Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build completed: openssl OpenSSL_1_0_2-stable.29
Build openssl OpenSSL_1_0_2-stable.29 completed Commit 943c4ca62b by Dr. Stephen Henson on 11/24/2015 4:55 PM: Fix uninitialised p error. Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via da950fd3f1c91619ec6636158d959827e48f5ab0 (commit) from c98d63f250c3cefe0905269171eb5e26b1ce8d57 (commit) - Log - commit da950fd3f1c91619ec6636158d959827e48f5ab0 Author: Alessandro GhediniDate: Wed Oct 28 20:38:39 2015 +0100 Remove useless locking code Follow-up to 070c233. Signed-off-by: Kurt Roeckx Reviewed-by: Rich Salz GH: #454 --- Summary of changes: crypto/x509/x509_lu.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/crypto/x509/x509_lu.c b/crypto/x509/x509_lu.c index b61d757..e2cbf51 100644 --- a/crypto/x509/x509_lu.c +++ b/crypto/x509/x509_lu.c @@ -527,12 +527,10 @@ STACK_OF(X509_CRL) *X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *nm) X509_CRL *x; X509_OBJECT *obj, xobj; sk = sk_X509_CRL_new_null(); -CRYPTO_w_lock(CRYPTO_LOCK_X509_STORE); /* * Always do lookup to possibly add new CRLs to cache */ -CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE); if (!X509_STORE_get_by_subject(ctx, X509_LU_CRL, nm, )) { sk_X509_CRL_free(sk); return NULL; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl 5
Build openssl 5 failed Commit 19b164688e by Alessandro Ghedini on 11/24/2015 7:37 PM: Convert RAND_OpenSSL() to CRYPTO_MUTEX Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_2-stable update
The branch OpenSSL_1_0_2-stable has been updated via 296f7bd1ace9383648795b24bf2f3c10d0b9ca47 (commit) via a5b63f80736862809a0f76ce22f7c0cc8163d6ae (commit) via 3a9328e3f7adfb0e5ccfb5375c98f4ef304f8554 (commit) from 943c4ca62b3f5a160340d57aecb9413407a06e15 (commit) - Log - commit 296f7bd1ace9383648795b24bf2f3c10d0b9ca47 Author: Marcus MeissnerDate: Tue Nov 24 22:03:58 2015 +0100 mark openssl configuration as loaded at end of OPENSSL_config Signed-off-by: Kurt Roeckx Reviewed-by: Rich Salz GH: #466 (cherry picked from commit 434b58457c8cca4d09f77a1774d6d2c446604bae) commit a5b63f80736862809a0f76ce22f7c0cc8163d6ae Author: Pascal Cuoq Date: Mon Nov 23 00:13:15 2015 +0100 ssl3_free(): Return if it wasn't created If somewhere in SSL_new() there is a memory allocation failure, ssl3_free() can get called with s->s3 still being NULL. Patch also provided by Willy Tarreau Signed-off-by: Kurt Roeckx Reviewed-by: Viktor Dukhovni (cherry picked from commit 3e7bd2ce0b16f8611298175d6dc7cb35ee06ea6d) commit 3a9328e3f7adfb0e5ccfb5375c98f4ef304f8554 Author: Kurt Roeckx Date: Mon Nov 23 00:07:28 2015 +0100 Set reference count earlier Backport of 0e04674e964b905e67e3d215bcf888932c92765f Reviewed-by: Steve Henson RT #4047, #4110, MR #1356 --- Summary of changes: crypto/conf/conf_sap.c | 1 + ssl/s3_lib.c | 2 +- ssl/ssl_cert.c | 2 +- ssl/ssl_lib.c | 2 +- 4 files changed, 4 insertions(+), 3 deletions(-) diff --git a/crypto/conf/conf_sap.c b/crypto/conf/conf_sap.c index 544fe97..c042cf2 100644 --- a/crypto/conf/conf_sap.c +++ b/crypto/conf/conf_sap.c @@ -90,6 +90,7 @@ void OPENSSL_config(const char *config_name) CONF_modules_load_file(NULL, config_name, CONF_MFLAGS_DEFAULT_SECTION | CONF_MFLAGS_IGNORE_MISSING_FILE); +openssl_configured = 1; } void OPENSSL_no_config() diff --git a/ssl/s3_lib.c b/ssl/s3_lib.c index ad9eeb6..64793d6 100644 --- a/ssl/s3_lib.c +++ b/ssl/s3_lib.c @@ -2983,7 +2983,7 @@ int ssl3_new(SSL *s) void ssl3_free(SSL *s) { -if (s == NULL) +if (s == NULL || s->s3 == NULL) return; #ifdef TLSEXT_TYPE_opaque_prf_input diff --git a/ssl/ssl_cert.c b/ssl/ssl_cert.c index 93a1eb9..a73f866 100644 --- a/ssl/ssl_cert.c +++ b/ssl/ssl_cert.c @@ -227,6 +227,7 @@ CERT *ssl_cert_dup(CERT *cert) memset(ret, 0, sizeof(CERT)); +ret->references = 1; ret->key = >pkeys[cert->key - >pkeys[0]]; /* * or ret->key = ret->pkeys + (cert->key - cert->pkeys), if you find that @@ -325,7 +326,6 @@ CERT *ssl_cert_dup(CERT *cert) #endif } -ret->references = 1; /* * Set digests to defaults. NB: we don't copy existing values as they * will be set during handshake. diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c index 9ddc591..f2071db 100644 --- a/ssl/ssl_lib.c +++ b/ssl/ssl_lib.c @@ -307,6 +307,7 @@ SSL *SSL_new(SSL_CTX *ctx) s->options = ctx->options; s->mode = ctx->mode; s->max_cert_list = ctx->max_cert_list; +s->references = 1; if (ctx->cert != NULL) { /* @@ -405,7 +406,6 @@ SSL *SSL_new(SSL_CTX *ctx) if (!s->method->ssl_new(s)) goto err; -s->references = 1; s->server = (ctx->method->ssl_accept == ssl_undefined_function) ? 0 : 1; SSL_clear(s); _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_1-stable update
The branch OpenSSL_1_0_1-stable has been updated via 844de56ed6e96042d364da6020bd29a816293a0a (commit) via 784934498fac88eaeff106e22bcab44c272e2cc9 (commit) via 0b5f9ce37bd0e4030faf6af9e1b6356693239576 (commit) from fc45da053535ee4de573aeb4d895ef6d6f7b72c9 (commit) - Log - commit 844de56ed6e96042d364da6020bd29a816293a0a Author: Marcus MeissnerDate: Tue Nov 24 22:03:58 2015 +0100 mark openssl configuration as loaded at end of OPENSSL_config Signed-off-by: Kurt Roeckx Reviewed-by: Rich Salz GH: #466 (cherry picked from commit 434b58457c8cca4d09f77a1774d6d2c446604bae) commit 784934498fac88eaeff106e22bcab44c272e2cc9 Author: Pascal Cuoq Date: Mon Nov 23 00:13:15 2015 +0100 ssl3_free(): Return if it wasn't created If somewhere in SSL_new() there is a memory allocation failure, ssl3_free() can get called with s->s3 still being NULL. Patch also provided by Willy Tarreau Signed-off-by: Kurt Roeckx Reviewed-by: Viktor Dukhovni (cherry picked from commit 3e7bd2ce0b16f8611298175d6dc7cb35ee06ea6d) commit 0b5f9ce37bd0e4030faf6af9e1b6356693239576 Author: Kurt Roeckx Date: Tue Nov 24 21:53:40 2015 +0100 Set reference count earlier Backport of 0e04674e964b905e67e3d215bcf888932c92765f Reviewed-by: Steve Henson RT #4047, #4110, MR #1356 --- Summary of changes: crypto/conf/conf_sap.c | 1 + ssl/s3_lib.c | 2 +- ssl/ssl_cert.c | 2 +- ssl/ssl_lib.c | 2 +- 4 files changed, 4 insertions(+), 3 deletions(-) diff --git a/crypto/conf/conf_sap.c b/crypto/conf/conf_sap.c index 544fe97..c042cf2 100644 --- a/crypto/conf/conf_sap.c +++ b/crypto/conf/conf_sap.c @@ -90,6 +90,7 @@ void OPENSSL_config(const char *config_name) CONF_modules_load_file(NULL, config_name, CONF_MFLAGS_DEFAULT_SECTION | CONF_MFLAGS_IGNORE_MISSING_FILE); +openssl_configured = 1; } void OPENSSL_no_config() diff --git a/ssl/s3_lib.c b/ssl/s3_lib.c index de917d3..f716d77 100644 --- a/ssl/s3_lib.c +++ b/ssl/s3_lib.c @@ -2955,7 +2955,7 @@ int ssl3_new(SSL *s) void ssl3_free(SSL *s) { -if (s == NULL) +if (s == NULL || s->s3 == NULL) return; #ifdef TLSEXT_TYPE_opaque_prf_input diff --git a/ssl/ssl_cert.c b/ssl/ssl_cert.c index 5df2413..9a4e104 100644 --- a/ssl/ssl_cert.c +++ b/ssl/ssl_cert.c @@ -206,6 +206,7 @@ CERT *ssl_cert_dup(CERT *cert) memset(ret, 0, sizeof(CERT)); +ret->references = 1; ret->key = >pkeys[cert->key - >pkeys[0]]; /* * or ret->key = ret->pkeys + (cert->key - cert->pkeys), if you find that @@ -282,7 +283,6 @@ CERT *ssl_cert_dup(CERT *cert) * chain is held inside SSL_CTX */ -ret->references = 1; /* * Set digests to defaults. NB: we don't copy existing values as they * will be set during handshake. diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c index 9cfeaf3..93d1cbe 100644 --- a/ssl/ssl_lib.c +++ b/ssl/ssl_lib.c @@ -307,6 +307,7 @@ SSL *SSL_new(SSL_CTX *ctx) s->options = ctx->options; s->mode = ctx->mode; s->max_cert_list = ctx->max_cert_list; +s->references = 1; if (ctx->cert != NULL) { /* @@ -375,7 +376,6 @@ SSL *SSL_new(SSL_CTX *ctx) if (!s->method->ssl_new(s)) goto err; -s->references = 1; s->server = (ctx->method->ssl_accept == ssl_undefined_function) ? 0 : 1; SSL_clear(s); _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_2-stable update
The branch OpenSSL_1_0_2-stable has been updated via 943c4ca62b3f5a160340d57aecb9413407a06e15 (commit) from d88ef40a1e5c81d0d32b4a431e55f5456e678dd2 (commit) - Log - commit 943c4ca62b3f5a160340d57aecb9413407a06e15 Author: Dr. Stephen HensonDate: Tue Nov 24 16:37:52 2015 + Fix uninitialised p error. Reviewed-by: Rich Salz (cherry picked from commit 63eb10a07ee29a312e50a227f5b3a290b1ad22b4) --- Summary of changes: crypto/asn1/asn1_par.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index 21dfe0c..0ca985a 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -135,7 +135,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, if (depth > ASN1_PARSE_MAXDEPTH) { BIO_puts(bp, "BAD RECURSION DEPTH\n"); -goto end; +return 0; } p = *pp; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_0_9_8-stable update
The branch OpenSSL_0_9_8-stable has been updated via 2c02faeecd2bd321d6b8dd7bbd2f34325785fd03 (commit) from a8731c0cb819302b1b790463fdb86d3af998a283 (commit) - Log - commit 2c02faeecd2bd321d6b8dd7bbd2f34325785fd03 Author: Dr. Stephen HensonDate: Tue Nov 24 16:37:52 2015 + Fix uninitialised p error. Reviewed-by: Rich Salz (cherry picked from commit 63eb10a07ee29a312e50a227f5b3a290b1ad22b4) --- Summary of changes: crypto/asn1/asn1_par.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index 8120f26..e16483d 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -141,7 +141,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, if (depth > ASN1_PARSE_MAXDEPTH) { BIO_puts(bp, "BAD RECURSION DEPTH\n"); -goto end; +return 0; } p = *pp; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_1-stable update
The branch OpenSSL_1_0_1-stable has been updated via fc45da053535ee4de573aeb4d895ef6d6f7b72c9 (commit) from 5844c9453f409c95fab3f295214b94dc27e38502 (commit) - Log - commit fc45da053535ee4de573aeb4d895ef6d6f7b72c9 Author: Dr. Stephen HensonDate: Tue Nov 24 16:37:52 2015 + Fix uninitialised p error. Reviewed-by: Rich Salz (cherry picked from commit 63eb10a07ee29a312e50a227f5b3a290b1ad22b4) --- Summary of changes: crypto/asn1/asn1_par.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index 21dfe0c..0ca985a 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -135,7 +135,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, if (depth > ASN1_PARSE_MAXDEPTH) { BIO_puts(bp, "BAD RECURSION DEPTH\n"); -goto end; +return 0; } p = *pp; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Broken: openssl/openssl#710 (master - 158e520)
Build Update for openssl/openssl - Build: #710 Status: Broken Duration: 33 minutes and 12 seconds Commit: 158e520 (master) Author: Dr. Stephen Henson Message: Limit depth of ASN1 parse printing. Thanks to Guido Vrankenfor reporting this issue. Reviewed-by: Tim Hudson View the changeset: https://github.com/openssl/openssl/compare/de17db915e26...158e5207a794 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/92956199 -- You can configure recipients for build notifications in your .travis.yml file. See http://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Broken: openssl/openssl#711 (OpenSSL_1_0_2-stable - d88ef40)
Build Update for openssl/openssl - Build: #711 Status: Broken Duration: 17 minutes and 19 seconds Commit: d88ef40 (OpenSSL_1_0_2-stable) Author: Dr. Stephen Henson Message: Limit depth of ASN1 parse printing. Thanks to Guido Vrankenfor reporting this issue. Reviewed-by: Tim Hudson (cherry picked from commit 158e5207a794603f5d64ffa95e0247c7808ab445) Conflicts: crypto/asn1/asn1_par.c View the changeset: https://github.com/openssl/openssl/compare/9252d71557c4...d88ef40a1e5c View the full build log and details: https://travis-ci.org/openssl/openssl/builds/92957916 -- You can configure recipients for build notifications in your .travis.yml file. See http://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 63eb10a07ee29a312e50a227f5b3a290b1ad22b4 (commit) from 158e5207a794603f5d64ffa95e0247c7808ab445 (commit) - Log - commit 63eb10a07ee29a312e50a227f5b3a290b1ad22b4 Author: Dr. Stephen HensonDate: Tue Nov 24 16:37:52 2015 + Fix uninitialised p error. Reviewed-by: Rich Salz --- Summary of changes: crypto/asn1/asn1_par.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index 09dde15..4698e02 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -129,7 +129,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, if (depth > ASN1_PARSE_MAXDEPTH) { BIO_puts(bp, "BAD RECURSION DEPTH\n"); -goto end; +return 0; } dump_indent = 6;/* Because we know BIO_dump_indent() */ _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Fixed: openssl/openssl#715 (master - 63eb10a)
Build Update for openssl/openssl - Build: #715 Status: Fixed Duration: 45 minutes and 8 seconds Commit: 63eb10a (master) Author: Dr. Stephen Henson Message: Fix uninitialised p error. Reviewed-by: Rich SalzView the changeset: https://github.com/openssl/openssl/compare/158e5207a794...63eb10a07ee2 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/92976848 -- You can configure recipients for build notifications in your .travis.yml file. See http://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 00f5263b78910da233ed0258bf8ea8fd1758abbc (commit) via 9cc6fa1ce83ce7857660ee11c3285651ceff0f43 (commit) via 28f4580c1e510ccf4278a20975c9bc3306f758d6 (commit) via a0f63828e3e542ba71b166b3d0cac05833591065 (commit) via 396d5fd091f68729f0a038a283fe3cca3eb670dd (commit) via 93972b8c72d5c074278654b3380a8215d741ea1f (commit) via e3e11e99cebd2f0cbf0b46cc4200a094a9c4b4eb (commit) via 192e4bbbf93d258c94075ad329404212f62337f3 (commit) via d18d31a16f91dc5042344e207390322170458025 (commit) via 2f142ada2c1f04c96c0c3db3ee3b6425934ad83b (commit) from 63eb10a07ee29a312e50a227f5b3a290b1ad22b4 (commit) - Log - commit 00f5263b78910da233ed0258bf8ea8fd1758abbc Author: Dr. Stephen HensonDate: Tue Nov 24 14:20:58 2015 + Add ctrl for SHA1 and SSLv3 Add SSLv3 ctrl to EVP_sha1() this is only needed if SSLv3 client authentication is used with DSA/ECDSA. Reviewed-by: Tim Hudson commit 9cc6fa1ce83ce7857660ee11c3285651ceff0f43 Author: Dr. Stephen Henson Date: Tue Nov 24 02:29:57 2015 + make update Reviewed-by: Tim Hudson commit 28f4580c1e510ccf4278a20975c9bc3306f758d6 Author: Dr. Stephen Henson Date: Tue Nov 24 00:47:11 2015 + Use EVP_md5_sha1() to process client verify Reviewed-by: Tim Hudson commit a0f63828e3e542ba71b166b3d0cac05833591065 Author: Dr. Stephen Henson Date: Tue Nov 24 00:08:35 2015 + Use EVP_md5_sha1() to generate client verify Reviewed-by: Tim Hudson commit 396d5fd091f68729f0a038a283fe3cca3eb670dd Author: Dr. Stephen Henson Date: Mon Nov 23 16:07:46 2015 + Add EVP_MD_CTX_ctrl function. Reviewed-by: Tim Hudson commit 93972b8c72d5c074278654b3380a8215d741ea1f Author: Dr. Stephen Henson Date: Mon Nov 23 16:05:20 2015 + Add ssl3 ctrl to EVP_md5_sha1(). Add a ctrl to EVP_md5_sha1() to handle the additional operations needed to handle SSL v3 client authentication and finished message. Reviewed-by: Tim Hudson commit e3e11e99cebd2f0cbf0b46cc4200a094a9c4b4eb Author: Dr. Stephen Henson Date: Sat Nov 21 04:03:48 2015 + Remove RSA exception when generating server key exchange. Reviewed-by: Tim Hudson commit 192e4bbbf93d258c94075ad329404212f62337f3 Author: Dr. Stephen Henson Date: Sat Nov 21 03:56:52 2015 + Remove RSA exception when processing server key exchange. Reviewed-by: Tim Hudson commit d18d31a16f91dc5042344e207390322170458025 Author: Dr. Stephen Henson Date: Sat Aug 29 22:11:05 2015 +0100 Use MD5+SHA1 for default digest if appropriate. Reviewed-by: Tim Hudson commit 2f142ada2c1f04c96c0c3db3ee3b6425934ad83b Author: Dr. Stephen Henson Date: Thu Nov 20 13:28:48 2014 + Add MD5+SHA1 Add digest combining MD5 and SHA1. This is used by RSA signatures for TLS 1.1 and earlier. Reviewed-by: Tim Hudson --- Summary of changes: crypto/evp/Makefile | 19 +++- crypto/evp/c_alld.c | 1 + crypto/evp/digest.c | 11 ++ crypto/evp/m_md5_sha1.c | 184 + crypto/evp/m_sha1.c | 55 ++ include/openssl/evp.h| 4 + ssl/ssl_locl.h | 1 + ssl/statem/statem_clnt.c | 263 ++- ssl/statem/statem_srvr.c | 211 - ssl/t1_lib.c | 9 +- util/libeay.num | 2 + 11 files changed, 382 insertions(+), 378 deletions(-) create mode 100644 crypto/evp/m_md5_sha1.c diff --git a/crypto/evp/Makefile b/crypto/evp/Makefile index 1a65b46..c672296 100644 --- a/crypto/evp/Makefile +++ b/crypto/evp/Makefile @@ -20,7 +20,7 @@ LIBSRC= encode.c digest.c evp_enc.c evp_key.c evp_acnf.c evp_cnf.c \ e_rc4.c e_aes.c names.c e_seed.c \ e_xcbc_d.c e_rc2.c e_cast.c e_rc5.c \ m_null.c m_md2.c m_md4.c m_md5.c m_sha1.c m_wp.c \ - m_dss1.c m_mdc2.c m_ripemd.c m_ecdsa.c\ + m_md5_sha1.c m_dss1.c m_mdc2.c m_ripemd.c m_ecdsa.c\ p_open.c p_seal.c p_sign.c p_verify.c p_lib.c p_enc.c p_dec.c \ bio_md.c bio_b64.c bio_enc.c evp_err.c e_null.c \ c_all.c c_allc.c c_alld.c evp_lib.c bio_ok.c \ @@ -33,7 +33,7 @@ LIBOBJ= encode.o digest.o evp_enc.o evp_key.o evp_acnf.o evp_cnf.o \ e_rc4.o e_aes.o names.o e_seed.o \ e_xcbc_d.o e_rc2.o e_cast.o e_rc5.o \
[openssl-commits] Passed: openssl/openssl#709 (master - de17db9)
Build Update for openssl/openssl - Build: #709 Status: Passed Duration: 8 minutes and 13 seconds Commit: de17db9 (master) Author: Richard Levitte Message: Drop the old perl start magic and replace it with a normal shebang perlrun(1) leads the way. Reviewed-by: Matt CaswellView the changeset: https://github.com/openssl/openssl/compare/f4d8f0375566...de17db915e26 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/92932620 -- You can configure recipients for build notifications in your .travis.yml file. See http://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 158e5207a794603f5d64ffa95e0247c7808ab445 (commit) from de17db915e26452819692fd837d788d52b8dd48a (commit) - Log - commit 158e5207a794603f5d64ffa95e0247c7808ab445 Author: Dr. Stephen HensonDate: Thu Sep 3 14:27:19 2015 +0100 Limit depth of ASN1 parse printing. Thanks to Guido Vranken for reporting this issue. Reviewed-by: Tim Hudson --- Summary of changes: crypto/asn1/asn1_par.c | 9 + 1 file changed, 9 insertions(+) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index 9a370cd..09dde15 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -62,6 +62,10 @@ #include #include +#ifndef ASN1_PARSE_MAXDEPTH +#define ASN1_PARSE_MAXDEPTH 128 +#endif + static int asn1_print_info(BIO *bp, int tag, int xclass, int constructed, int indent); static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, @@ -123,6 +127,11 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, /* ASN1_BMPSTRING *bmp=NULL; */ int dump_indent; +if (depth > ASN1_PARSE_MAXDEPTH) { +BIO_puts(bp, "BAD RECURSION DEPTH\n"); +goto end; +} + dump_indent = 6;/* Because we know BIO_dump_indent() */ p = *pp; tot = p + length; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via f4d8f0375566aeee395c9523e4bc6ed3abccf6b5 (commit) from b83fb854da7ab6b61c3ec62372cfb857987107fd (commit) - Log - commit f4d8f0375566aeee395c9523e4bc6ed3abccf6b5 Author: Jacob Bandes-StorchDate: Mon Nov 23 21:44:58 2015 -0800 Add perl modeline to Configure scripts Encourages GitHub to perform proper syntax highlighting. Reviewed-by: Rich Salz Reviewed-by: Richard Levitte --- Summary of changes: Configurations/10-main.conf | 1 + Configurations/90-team.conf | 1 + Configurations/99-personal-ben.conf | 1 + Configurations/99-personal-bodo.conf| 1 + Configurations/99-personal-geoff.conf | 1 + Configurations/99-personal-levitte.conf | 1 + Configurations/99-personal-rse.conf | 1 + Configurations/99-personal-steve.conf | 1 + Configure | 1 + 9 files changed, 9 insertions(+) diff --git a/Configurations/10-main.conf b/Configurations/10-main.conf index a24b992..f77bfda 100644 --- a/Configurations/10-main.conf +++ b/Configurations/10-main.conf @@ -1,3 +1,4 @@ +## -*- mode: perl; -*- ## Standard openssl configuration targets. ## ## If you edit this file, run this command before committing diff --git a/Configurations/90-team.conf b/Configurations/90-team.conf index 0e78a14..1a567d1 100644 --- a/Configurations/90-team.conf +++ b/Configurations/90-team.conf @@ -1,3 +1,4 @@ +## -*- mode: perl; -*- ## Build configuration targets for openssl-team members ## ## If you edit this file, run this command before committing diff --git a/Configurations/99-personal-ben.conf b/Configurations/99-personal-ben.conf index 94ea6d0..ed7fa21 100644 --- a/Configurations/99-personal-ben.conf +++ b/Configurations/99-personal-ben.conf @@ -1,3 +1,4 @@ +## -*- mode: perl; -*- ## Personal configuration targets ## ## If you edit this file, run this command before committing diff --git a/Configurations/99-personal-bodo.conf b/Configurations/99-personal-bodo.conf index c9a7534..2cb22e1 100644 --- a/Configurations/99-personal-bodo.conf +++ b/Configurations/99-personal-bodo.conf @@ -1,3 +1,4 @@ +## -*- mode: perl; -*- ## Personal configuration targets ## ## If you edit this file, run this command before committing diff --git a/Configurations/99-personal-geoff.conf b/Configurations/99-personal-geoff.conf index adf0990..ca0ded9 100644 --- a/Configurations/99-personal-geoff.conf +++ b/Configurations/99-personal-geoff.conf @@ -1,3 +1,4 @@ +## -*- mode: perl; -*- ## Personal configuration targets ## ## If you edit this file, run this command before committing diff --git a/Configurations/99-personal-levitte.conf b/Configurations/99-personal-levitte.conf index 18fbcdc..6df2ea6 100644 --- a/Configurations/99-personal-levitte.conf +++ b/Configurations/99-personal-levitte.conf @@ -1,3 +1,4 @@ +## -*- mode: perl; -*- ## Personal configuration targets ## ## If you edit this file, run this command before committing diff --git a/Configurations/99-personal-rse.conf b/Configurations/99-personal-rse.conf index e9318fc..0cbe29f 100644 --- a/Configurations/99-personal-rse.conf +++ b/Configurations/99-personal-rse.conf @@ -1,3 +1,4 @@ +## -*- mode: perl; -*- ## Personal configuration targets ## ## If you edit this file, run this command before committing diff --git a/Configurations/99-personal-steve.conf b/Configurations/99-personal-steve.conf index b75e6a3..ed25f9c 100644 --- a/Configurations/99-personal-steve.conf +++ b/Configurations/99-personal-steve.conf @@ -1,3 +1,4 @@ +## -*- mode: perl; -*- ## Personal configuration targets ## ## If you edit this file, run this command before committing diff --git a/Configure b/Configure index c53c316..e344d05 100755 --- a/Configure +++ b/Configure @@ -1,3 +1,4 @@ +# -*- mode: perl; -*- : eval 'exec perl -S $0 ${1+"$@"}' if $running_under_some_shell; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl master.22
Build openssl master.22 failed Commit f4d8f03755 by Jacob Bandes-Storch on 11/24/2015 12:12 PM: Add perl modeline to Configure scripts Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via de17db915e26452819692fd837d788d52b8dd48a (commit) from f4d8f0375566aeee395c9523e4bc6ed3abccf6b5 (commit) - Log - commit de17db915e26452819692fd837d788d52b8dd48a Author: Richard LevitteDate: Tue Nov 24 14:06:45 2015 +0100 Drop the old perl start magic and replace it with a normal shebang perlrun(1) leads the way. Reviewed-by: Matt Caswell --- Summary of changes: Configure | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/Configure b/Configure index e344d05..cd4f37f 100755 --- a/Configure +++ b/Configure @@ -1,7 +1,6 @@ +#! /usr/bin/env perl # -*- mode: perl; -*- -: -eval 'exec perl -S $0 ${1+"$@"}' -if $running_under_some_shell; + ## ## Configure -- OpenSSL source tree configuration script ## If editing this file, run this command before committing _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_2-stable update
The branch OpenSSL_1_0_2-stable has been updated via d88ef40a1e5c81d0d32b4a431e55f5456e678dd2 (commit) from 9252d71557c49fbb802854ea0de58e319645a448 (commit) - Log - commit d88ef40a1e5c81d0d32b4a431e55f5456e678dd2 Author: Dr. Stephen HensonDate: Thu Sep 3 14:27:19 2015 +0100 Limit depth of ASN1 parse printing. Thanks to Guido Vranken for reporting this issue. Reviewed-by: Tim Hudson (cherry picked from commit 158e5207a794603f5d64ffa95e0247c7808ab445) Conflicts: crypto/asn1/asn1_par.c --- Summary of changes: crypto/asn1/asn1_par.c | 10 ++ 1 file changed, 10 insertions(+) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index a5d2da1..21dfe0c 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -62,6 +62,10 @@ #include #include +#ifndef ASN1_PARSE_MAXDEPTH +#define ASN1_PARSE_MAXDEPTH 128 +#endif + static int asn1_print_info(BIO *bp, int tag, int xclass, int constructed, int indent); static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, @@ -128,6 +132,12 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, #else dump_indent = 6;/* Because we know BIO_dump_indent() */ #endif + +if (depth > ASN1_PARSE_MAXDEPTH) { +BIO_puts(bp, "BAD RECURSION DEPTH\n"); +goto end; +} + p = *pp; tot = p + length; op = p - 1; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_0_9_8-stable update
The branch OpenSSL_0_9_8-stable has been updated via a8731c0cb819302b1b790463fdb86d3af998a283 (commit) from 31172717e8324fbb01e1b3e65db6f5d48d7e352e (commit) - Log - commit a8731c0cb819302b1b790463fdb86d3af998a283 Author: Dr. Stephen HensonDate: Thu Sep 3 14:27:19 2015 +0100 Limit depth of ASN1 parse printing. Thanks to Guido Vranken for reporting this issue. Reviewed-by: Tim Hudson (cherry picked from commit 158e5207a794603f5d64ffa95e0247c7808ab445) Conflicts: crypto/asn1/asn1_par.c --- Summary of changes: crypto/asn1/asn1_par.c | 10 ++ 1 file changed, 10 insertions(+) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index e15e341..8120f26 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -62,6 +62,10 @@ #include #include +#ifndef ASN1_PARSE_MAXDEPTH +#define ASN1_PARSE_MAXDEPTH 128 +#endif + static int asn1_print_info(BIO *bp, int tag, int xclass, int constructed, int indent); static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, @@ -134,6 +138,12 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, #else dump_indent = 6;/* Because we know BIO_dump_indent() */ #endif + +if (depth > ASN1_PARSE_MAXDEPTH) { +BIO_puts(bp, "BAD RECURSION DEPTH\n"); +goto end; +} + p = *pp; tot = p + length; op = p - 1; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_1-stable update
The branch OpenSSL_1_0_1-stable has been updated via 5844c9453f409c95fab3f295214b94dc27e38502 (commit) from 3f2ebff3927b52d609928f632cfe670b7ba9 (commit) - Log - commit 5844c9453f409c95fab3f295214b94dc27e38502 Author: Dr. Stephen HensonDate: Thu Sep 3 14:27:19 2015 +0100 Limit depth of ASN1 parse printing. Thanks to Guido Vranken for reporting this issue. Reviewed-by: Tim Hudson (cherry picked from commit 158e5207a794603f5d64ffa95e0247c7808ab445) Conflicts: crypto/asn1/asn1_par.c --- Summary of changes: crypto/asn1/asn1_par.c | 10 ++ 1 file changed, 10 insertions(+) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index a5d2da1..21dfe0c 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -62,6 +62,10 @@ #include #include +#ifndef ASN1_PARSE_MAXDEPTH +#define ASN1_PARSE_MAXDEPTH 128 +#endif + static int asn1_print_info(BIO *bp, int tag, int xclass, int constructed, int indent); static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, @@ -128,6 +132,12 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, #else dump_indent = 6;/* Because we know BIO_dump_indent() */ #endif + +if (depth > ASN1_PARSE_MAXDEPTH) { +BIO_puts(bp, "BAD RECURSION DEPTH\n"); +goto end; +} + p = *pp; tot = p + length; op = p - 1; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits