[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2015-11-24 Thread Kurt Roeckx
The branch OpenSSL_1_0_1-stable has been updated
   via  98b94544e5dcab065404de1892d2aeb726dd6491 (commit)
  from  844de56ed6e96042d364da6020bd29a816293a0a (commit)


- Log -
commit 98b94544e5dcab065404de1892d2aeb726dd6491
Author: Kurt Roeckx 
Date:   Tue Nov 24 23:21:06 2015 +0100

Use both sun and __sun

Reviewed-by: Andy Polyakov 
(cherry picked from commit ed02493567390cac6d07447f193fcaac5b219af3)

---

Summary of changes:
 crypto/opensslconf.h.in | 2 +-
 e_os.h  | 4 ++--
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/crypto/opensslconf.h.in b/crypto/opensslconf.h.in
index d8e6abc..7a1c85d 100644
--- a/crypto/opensslconf.h.in
+++ b/crypto/opensslconf.h.in
@@ -120,7 +120,7 @@
optimization options.  Older Sparc's work better with only UNROLL, but
there's no way to tell at compile time what it is you're running on */
  
-#if defined( __sun )   /* Newer Sparc's */
+#if defined( __sun ) || defined ( sun )/* Newer Sparc's */
 #  define DES_PTR
 #  define DES_RISC1
 #  define DES_UNROLL
diff --git a/e_os.h b/e_os.h
index d84ffb4..c9c7aaf 100644
--- a/e_os.h
+++ b/e_os.h
@@ -612,7 +612,7 @@ struct servent *PASCAL getservbyname(const char *, const 
char *);
 #include 
 #   endif
 
-#   if defined(__sun)
+#   if defined(__sun) || defined(sun)
 #include 
 #   else
 #ifndef VMS
@@ -654,7 +654,7 @@ struct servent *PASCAL getservbyname(const char *, const 
char *);
 
 # endif
 
-# if defined(__sun) && !defined(__svr4__) && !defined(__SVR4)
+# if (defined(__sun) || defined(sun)) && !defined(__svr4__) && !defined(__SVR4)
   /* include headers first, so our defines don't break it */
 #  include 
 #  include 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2015-11-24 Thread Kurt Roeckx
The branch OpenSSL_1_0_2-stable has been updated
   via  ed02493567390cac6d07447f193fcaac5b219af3 (commit)
  from  296f7bd1ace9383648795b24bf2f3c10d0b9ca47 (commit)


- Log -
commit ed02493567390cac6d07447f193fcaac5b219af3
Author: Kurt Roeckx 
Date:   Tue Nov 24 23:21:06 2015 +0100

Use both sun and __sun

Reviewed-by: Andy Polyakov 

---

Summary of changes:
 crypto/opensslconf.h.in | 2 +-
 e_os.h  | 4 ++--
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/crypto/opensslconf.h.in b/crypto/opensslconf.h.in
index d8e6abc..7a1c85d 100644
--- a/crypto/opensslconf.h.in
+++ b/crypto/opensslconf.h.in
@@ -120,7 +120,7 @@
optimization options.  Older Sparc's work better with only UNROLL, but
there's no way to tell at compile time what it is you're running on */
  
-#if defined( __sun )   /* Newer Sparc's */
+#if defined( __sun ) || defined ( sun )/* Newer Sparc's */
 #  define DES_PTR
 #  define DES_RISC1
 #  define DES_UNROLL
diff --git a/e_os.h b/e_os.h
index 8ac3673..1fa36c1 100644
--- a/e_os.h
+++ b/e_os.h
@@ -619,7 +619,7 @@ struct servent *PASCAL getservbyname(const char *, const 
char *);
 #include 
 #   endif
 
-#   if defined(__sun)
+#   if defined(__sun) || defined(sun)
 #include 
 #   else
 #ifndef VMS
@@ -661,7 +661,7 @@ struct servent *PASCAL getservbyname(const char *, const 
char *);
 
 # endif
 
-# if defined(__sun) && !defined(__svr4__) && !defined(__SVR4)
+# if (defined(__sun) || defined(sun)) && !defined(__svr4__) && !defined(__SVR4)
   /* include headers first, so our defines don't break it */
 #  include 
 #  include 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl 6

2015-11-24 Thread AppVeyor



Build openssl 6 failed


Commit 1a0659e002 by Alessandro Ghedini on 11/24/2015 11:50 PM:

Convert RAND_OpenSSL() to CRYPTO_MUTEX


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl master.27

2015-11-24 Thread AppVeyor


Build openssl master.27 completed



Commit 63eb10a07e by Dr. Stephen Henson on 11/24/2015 4:45 PM:

Fix uninitialised p error.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl OpenSSL_1_0_1-stable.28

2015-11-24 Thread AppVeyor



Build openssl OpenSSL_1_0_1-stable.28 failed


Commit fc45da0535 by Dr. Stephen Henson on 11/24/2015 4:55 PM:

Fix uninitialised p error.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl OpenSSL_1_0_2-stable.29

2015-11-24 Thread AppVeyor


Build openssl OpenSSL_1_0_2-stable.29 completed



Commit 943c4ca62b by Dr. Stephen Henson on 11/24/2015 4:55 PM:

Fix uninitialised p error.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2015-11-24 Thread Kurt Roeckx
The branch master has been updated
   via  da950fd3f1c91619ec6636158d959827e48f5ab0 (commit)
  from  c98d63f250c3cefe0905269171eb5e26b1ce8d57 (commit)


- Log -
commit da950fd3f1c91619ec6636158d959827e48f5ab0
Author: Alessandro Ghedini 
Date:   Wed Oct 28 20:38:39 2015 +0100

Remove useless locking code

Follow-up to 070c233.

Signed-off-by: Kurt Roeckx 
Reviewed-by: Rich Salz 

GH: #454

---

Summary of changes:
 crypto/x509/x509_lu.c | 2 --
 1 file changed, 2 deletions(-)

diff --git a/crypto/x509/x509_lu.c b/crypto/x509/x509_lu.c
index b61d757..e2cbf51 100644
--- a/crypto/x509/x509_lu.c
+++ b/crypto/x509/x509_lu.c
@@ -527,12 +527,10 @@ STACK_OF(X509_CRL) *X509_STORE_get1_crls(X509_STORE_CTX 
*ctx, X509_NAME *nm)
 X509_CRL *x;
 X509_OBJECT *obj, xobj;
 sk = sk_X509_CRL_new_null();
-CRYPTO_w_lock(CRYPTO_LOCK_X509_STORE);
 
 /*
  * Always do lookup to possibly add new CRLs to cache
  */
-CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE);
 if (!X509_STORE_get_by_subject(ctx, X509_LU_CRL, nm, )) {
 sk_X509_CRL_free(sk);
 return NULL;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl 5

2015-11-24 Thread AppVeyor



Build openssl 5 failed


Commit 19b164688e by Alessandro Ghedini on 11/24/2015 7:37 PM:

Convert RAND_OpenSSL() to CRYPTO_MUTEX


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2015-11-24 Thread Kurt Roeckx
The branch OpenSSL_1_0_2-stable has been updated
   via  296f7bd1ace9383648795b24bf2f3c10d0b9ca47 (commit)
   via  a5b63f80736862809a0f76ce22f7c0cc8163d6ae (commit)
   via  3a9328e3f7adfb0e5ccfb5375c98f4ef304f8554 (commit)
  from  943c4ca62b3f5a160340d57aecb9413407a06e15 (commit)


- Log -
commit 296f7bd1ace9383648795b24bf2f3c10d0b9ca47
Author: Marcus Meissner 
Date:   Tue Nov 24 22:03:58 2015 +0100

mark openssl configuration as loaded at end of OPENSSL_config

Signed-off-by: Kurt Roeckx 
Reviewed-by: Rich Salz 

GH: #466
(cherry picked from commit 434b58457c8cca4d09f77a1774d6d2c446604bae)

commit a5b63f80736862809a0f76ce22f7c0cc8163d6ae
Author: Pascal Cuoq 
Date:   Mon Nov 23 00:13:15 2015 +0100

ssl3_free(): Return if it wasn't created

If somewhere in SSL_new() there is a memory allocation failure, ssl3_free() 
can
get called with s->s3 still being NULL.

Patch also provided by Willy Tarreau 

Signed-off-by: Kurt Roeckx 
Reviewed-by: Viktor Dukhovni 
(cherry picked from commit 3e7bd2ce0b16f8611298175d6dc7cb35ee06ea6d)

commit 3a9328e3f7adfb0e5ccfb5375c98f4ef304f8554
Author: Kurt Roeckx 
Date:   Mon Nov 23 00:07:28 2015 +0100

Set reference count earlier

Backport of 0e04674e964b905e67e3d215bcf888932c92765f

Reviewed-by: Steve Henson 

RT #4047, #4110, MR #1356

---

Summary of changes:
 crypto/conf/conf_sap.c | 1 +
 ssl/s3_lib.c   | 2 +-
 ssl/ssl_cert.c | 2 +-
 ssl/ssl_lib.c  | 2 +-
 4 files changed, 4 insertions(+), 3 deletions(-)

diff --git a/crypto/conf/conf_sap.c b/crypto/conf/conf_sap.c
index 544fe97..c042cf2 100644
--- a/crypto/conf/conf_sap.c
+++ b/crypto/conf/conf_sap.c
@@ -90,6 +90,7 @@ void OPENSSL_config(const char *config_name)
 CONF_modules_load_file(NULL, config_name,
CONF_MFLAGS_DEFAULT_SECTION |
CONF_MFLAGS_IGNORE_MISSING_FILE);
+openssl_configured = 1;
 }
 
 void OPENSSL_no_config()
diff --git a/ssl/s3_lib.c b/ssl/s3_lib.c
index ad9eeb6..64793d6 100644
--- a/ssl/s3_lib.c
+++ b/ssl/s3_lib.c
@@ -2983,7 +2983,7 @@ int ssl3_new(SSL *s)
 
 void ssl3_free(SSL *s)
 {
-if (s == NULL)
+if (s == NULL || s->s3 == NULL)
 return;
 
 #ifdef TLSEXT_TYPE_opaque_prf_input
diff --git a/ssl/ssl_cert.c b/ssl/ssl_cert.c
index 93a1eb9..a73f866 100644
--- a/ssl/ssl_cert.c
+++ b/ssl/ssl_cert.c
@@ -227,6 +227,7 @@ CERT *ssl_cert_dup(CERT *cert)
 
 memset(ret, 0, sizeof(CERT));
 
+ret->references = 1;
 ret->key = >pkeys[cert->key - >pkeys[0]];
 /*
  * or ret->key = ret->pkeys + (cert->key - cert->pkeys), if you find that
@@ -325,7 +326,6 @@ CERT *ssl_cert_dup(CERT *cert)
 #endif
 }
 
-ret->references = 1;
 /*
  * Set digests to defaults. NB: we don't copy existing values as they
  * will be set during handshake.
diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
index 9ddc591..f2071db 100644
--- a/ssl/ssl_lib.c
+++ b/ssl/ssl_lib.c
@@ -307,6 +307,7 @@ SSL *SSL_new(SSL_CTX *ctx)
 s->options = ctx->options;
 s->mode = ctx->mode;
 s->max_cert_list = ctx->max_cert_list;
+s->references = 1;
 
 if (ctx->cert != NULL) {
 /*
@@ -405,7 +406,6 @@ SSL *SSL_new(SSL_CTX *ctx)
 if (!s->method->ssl_new(s))
 goto err;
 
-s->references = 1;
 s->server = (ctx->method->ssl_accept == ssl_undefined_function) ? 0 : 1;
 
 SSL_clear(s);
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2015-11-24 Thread Kurt Roeckx
The branch OpenSSL_1_0_1-stable has been updated
   via  844de56ed6e96042d364da6020bd29a816293a0a (commit)
   via  784934498fac88eaeff106e22bcab44c272e2cc9 (commit)
   via  0b5f9ce37bd0e4030faf6af9e1b6356693239576 (commit)
  from  fc45da053535ee4de573aeb4d895ef6d6f7b72c9 (commit)


- Log -
commit 844de56ed6e96042d364da6020bd29a816293a0a
Author: Marcus Meissner 
Date:   Tue Nov 24 22:03:58 2015 +0100

mark openssl configuration as loaded at end of OPENSSL_config

Signed-off-by: Kurt Roeckx 
Reviewed-by: Rich Salz 

GH: #466
(cherry picked from commit 434b58457c8cca4d09f77a1774d6d2c446604bae)

commit 784934498fac88eaeff106e22bcab44c272e2cc9
Author: Pascal Cuoq 
Date:   Mon Nov 23 00:13:15 2015 +0100

ssl3_free(): Return if it wasn't created

If somewhere in SSL_new() there is a memory allocation failure, ssl3_free() 
can
get called with s->s3 still being NULL.

Patch also provided by Willy Tarreau 

Signed-off-by: Kurt Roeckx 
Reviewed-by: Viktor Dukhovni 
(cherry picked from commit 3e7bd2ce0b16f8611298175d6dc7cb35ee06ea6d)

commit 0b5f9ce37bd0e4030faf6af9e1b6356693239576
Author: Kurt Roeckx 
Date:   Tue Nov 24 21:53:40 2015 +0100

Set reference count earlier

Backport of 0e04674e964b905e67e3d215bcf888932c92765f

Reviewed-by: Steve Henson 

RT #4047, #4110, MR #1356

---

Summary of changes:
 crypto/conf/conf_sap.c | 1 +
 ssl/s3_lib.c   | 2 +-
 ssl/ssl_cert.c | 2 +-
 ssl/ssl_lib.c  | 2 +-
 4 files changed, 4 insertions(+), 3 deletions(-)

diff --git a/crypto/conf/conf_sap.c b/crypto/conf/conf_sap.c
index 544fe97..c042cf2 100644
--- a/crypto/conf/conf_sap.c
+++ b/crypto/conf/conf_sap.c
@@ -90,6 +90,7 @@ void OPENSSL_config(const char *config_name)
 CONF_modules_load_file(NULL, config_name,
CONF_MFLAGS_DEFAULT_SECTION |
CONF_MFLAGS_IGNORE_MISSING_FILE);
+openssl_configured = 1;
 }
 
 void OPENSSL_no_config()
diff --git a/ssl/s3_lib.c b/ssl/s3_lib.c
index de917d3..f716d77 100644
--- a/ssl/s3_lib.c
+++ b/ssl/s3_lib.c
@@ -2955,7 +2955,7 @@ int ssl3_new(SSL *s)
 
 void ssl3_free(SSL *s)
 {
-if (s == NULL)
+if (s == NULL || s->s3 == NULL)
 return;
 
 #ifdef TLSEXT_TYPE_opaque_prf_input
diff --git a/ssl/ssl_cert.c b/ssl/ssl_cert.c
index 5df2413..9a4e104 100644
--- a/ssl/ssl_cert.c
+++ b/ssl/ssl_cert.c
@@ -206,6 +206,7 @@ CERT *ssl_cert_dup(CERT *cert)
 
 memset(ret, 0, sizeof(CERT));
 
+ret->references = 1;
 ret->key = >pkeys[cert->key - >pkeys[0]];
 /*
  * or ret->key = ret->pkeys + (cert->key - cert->pkeys), if you find that
@@ -282,7 +283,6 @@ CERT *ssl_cert_dup(CERT *cert)
  * chain is held inside SSL_CTX
  */
 
-ret->references = 1;
 /*
  * Set digests to defaults. NB: we don't copy existing values as they
  * will be set during handshake.
diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
index 9cfeaf3..93d1cbe 100644
--- a/ssl/ssl_lib.c
+++ b/ssl/ssl_lib.c
@@ -307,6 +307,7 @@ SSL *SSL_new(SSL_CTX *ctx)
 s->options = ctx->options;
 s->mode = ctx->mode;
 s->max_cert_list = ctx->max_cert_list;
+s->references = 1;
 
 if (ctx->cert != NULL) {
 /*
@@ -375,7 +376,6 @@ SSL *SSL_new(SSL_CTX *ctx)
 if (!s->method->ssl_new(s))
 goto err;
 
-s->references = 1;
 s->server = (ctx->method->ssl_accept == ssl_undefined_function) ? 0 : 1;
 
 SSL_clear(s);
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2015-11-24 Thread Dr . Stephen Henson
The branch OpenSSL_1_0_2-stable has been updated
   via  943c4ca62b3f5a160340d57aecb9413407a06e15 (commit)
  from  d88ef40a1e5c81d0d32b4a431e55f5456e678dd2 (commit)


- Log -
commit 943c4ca62b3f5a160340d57aecb9413407a06e15
Author: Dr. Stephen Henson 
Date:   Tue Nov 24 16:37:52 2015 +

Fix uninitialised p error.

Reviewed-by: Rich Salz 
(cherry picked from commit 63eb10a07ee29a312e50a227f5b3a290b1ad22b4)

---

Summary of changes:
 crypto/asn1/asn1_par.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index 21dfe0c..0ca985a 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -135,7 +135,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 
 if (depth > ASN1_PARSE_MAXDEPTH) {
 BIO_puts(bp, "BAD RECURSION DEPTH\n");
-goto end;
+return 0;
 }
 
 p = *pp;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_0_9_8-stable update

2015-11-24 Thread Dr . Stephen Henson
The branch OpenSSL_0_9_8-stable has been updated
   via  2c02faeecd2bd321d6b8dd7bbd2f34325785fd03 (commit)
  from  a8731c0cb819302b1b790463fdb86d3af998a283 (commit)


- Log -
commit 2c02faeecd2bd321d6b8dd7bbd2f34325785fd03
Author: Dr. Stephen Henson 
Date:   Tue Nov 24 16:37:52 2015 +

Fix uninitialised p error.

Reviewed-by: Rich Salz 
(cherry picked from commit 63eb10a07ee29a312e50a227f5b3a290b1ad22b4)

---

Summary of changes:
 crypto/asn1/asn1_par.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index 8120f26..e16483d 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -141,7 +141,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 
 if (depth > ASN1_PARSE_MAXDEPTH) {
 BIO_puts(bp, "BAD RECURSION DEPTH\n");
-goto end;
+return 0;
 }
 
 p = *pp;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2015-11-24 Thread Dr . Stephen Henson
The branch OpenSSL_1_0_1-stable has been updated
   via  fc45da053535ee4de573aeb4d895ef6d6f7b72c9 (commit)
  from  5844c9453f409c95fab3f295214b94dc27e38502 (commit)


- Log -
commit fc45da053535ee4de573aeb4d895ef6d6f7b72c9
Author: Dr. Stephen Henson 
Date:   Tue Nov 24 16:37:52 2015 +

Fix uninitialised p error.

Reviewed-by: Rich Salz 
(cherry picked from commit 63eb10a07ee29a312e50a227f5b3a290b1ad22b4)

---

Summary of changes:
 crypto/asn1/asn1_par.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index 21dfe0c..0ca985a 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -135,7 +135,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 
 if (depth > ASN1_PARSE_MAXDEPTH) {
 BIO_puts(bp, "BAD RECURSION DEPTH\n");
-goto end;
+return 0;
 }
 
 p = *pp;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Broken: openssl/openssl#710 (master - 158e520)

2015-11-24 Thread Travis CI
Build Update for openssl/openssl
-

Build: #710
Status: Broken

Duration: 33 minutes and 12 seconds
Commit: 158e520 (master)
Author: Dr. Stephen Henson
Message: Limit depth of ASN1 parse printing.

Thanks to Guido Vranken  for reporting this issue.

Reviewed-by: Tim Hudson 

View the changeset: 
https://github.com/openssl/openssl/compare/de17db915e26...158e5207a794

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/92956199

--

You can configure recipients for build notifications in your .travis.yml file. 
See http://docs.travis-ci.com/user/notifications


_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Broken: openssl/openssl#711 (OpenSSL_1_0_2-stable - d88ef40)

2015-11-24 Thread Travis CI
Build Update for openssl/openssl
-

Build: #711
Status: Broken

Duration: 17 minutes and 19 seconds
Commit: d88ef40 (OpenSSL_1_0_2-stable)
Author: Dr. Stephen Henson
Message: Limit depth of ASN1 parse printing.

Thanks to Guido Vranken  for reporting this issue.

Reviewed-by: Tim Hudson 
(cherry picked from commit 158e5207a794603f5d64ffa95e0247c7808ab445)

Conflicts:
crypto/asn1/asn1_par.c

View the changeset: 
https://github.com/openssl/openssl/compare/9252d71557c4...d88ef40a1e5c

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/92957916

--

You can configure recipients for build notifications in your .travis.yml file. 
See http://docs.travis-ci.com/user/notifications


_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2015-11-24 Thread Dr . Stephen Henson
The branch master has been updated
   via  63eb10a07ee29a312e50a227f5b3a290b1ad22b4 (commit)
  from  158e5207a794603f5d64ffa95e0247c7808ab445 (commit)


- Log -
commit 63eb10a07ee29a312e50a227f5b3a290b1ad22b4
Author: Dr. Stephen Henson 
Date:   Tue Nov 24 16:37:52 2015 +

Fix uninitialised p error.

Reviewed-by: Rich Salz 

---

Summary of changes:
 crypto/asn1/asn1_par.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index 09dde15..4698e02 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -129,7 +129,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 
 if (depth > ASN1_PARSE_MAXDEPTH) {
 BIO_puts(bp, "BAD RECURSION DEPTH\n");
-goto end;
+return 0;
 }
 
 dump_indent = 6;/* Because we know BIO_dump_indent() */
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Fixed: openssl/openssl#715 (master - 63eb10a)

2015-11-24 Thread Travis CI
Build Update for openssl/openssl
-

Build: #715
Status: Fixed

Duration: 45 minutes and 8 seconds
Commit: 63eb10a (master)
Author: Dr. Stephen Henson
Message: Fix uninitialised p error.

Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/openssl/openssl/compare/158e5207a794...63eb10a07ee2

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/92976848

--

You can configure recipients for build notifications in your .travis.yml file. 
See http://docs.travis-ci.com/user/notifications


_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2015-11-24 Thread Dr . Stephen Henson
The branch master has been updated
   via  00f5263b78910da233ed0258bf8ea8fd1758abbc (commit)
   via  9cc6fa1ce83ce7857660ee11c3285651ceff0f43 (commit)
   via  28f4580c1e510ccf4278a20975c9bc3306f758d6 (commit)
   via  a0f63828e3e542ba71b166b3d0cac05833591065 (commit)
   via  396d5fd091f68729f0a038a283fe3cca3eb670dd (commit)
   via  93972b8c72d5c074278654b3380a8215d741ea1f (commit)
   via  e3e11e99cebd2f0cbf0b46cc4200a094a9c4b4eb (commit)
   via  192e4bbbf93d258c94075ad329404212f62337f3 (commit)
   via  d18d31a16f91dc5042344e207390322170458025 (commit)
   via  2f142ada2c1f04c96c0c3db3ee3b6425934ad83b (commit)
  from  63eb10a07ee29a312e50a227f5b3a290b1ad22b4 (commit)


- Log -
commit 00f5263b78910da233ed0258bf8ea8fd1758abbc
Author: Dr. Stephen Henson 
Date:   Tue Nov 24 14:20:58 2015 +

Add ctrl for SHA1 and SSLv3

Add SSLv3 ctrl to EVP_sha1() this is only needed if SSLv3 client
authentication is used with DSA/ECDSA.

Reviewed-by: Tim Hudson 

commit 9cc6fa1ce83ce7857660ee11c3285651ceff0f43
Author: Dr. Stephen Henson 
Date:   Tue Nov 24 02:29:57 2015 +

make update

Reviewed-by: Tim Hudson 

commit 28f4580c1e510ccf4278a20975c9bc3306f758d6
Author: Dr. Stephen Henson 
Date:   Tue Nov 24 00:47:11 2015 +

Use EVP_md5_sha1() to process client verify

Reviewed-by: Tim Hudson 

commit a0f63828e3e542ba71b166b3d0cac05833591065
Author: Dr. Stephen Henson 
Date:   Tue Nov 24 00:08:35 2015 +

Use EVP_md5_sha1() to generate client verify

Reviewed-by: Tim Hudson 

commit 396d5fd091f68729f0a038a283fe3cca3eb670dd
Author: Dr. Stephen Henson 
Date:   Mon Nov 23 16:07:46 2015 +

Add EVP_MD_CTX_ctrl function.

Reviewed-by: Tim Hudson 

commit 93972b8c72d5c074278654b3380a8215d741ea1f
Author: Dr. Stephen Henson 
Date:   Mon Nov 23 16:05:20 2015 +

Add ssl3 ctrl to EVP_md5_sha1().

Add a ctrl to EVP_md5_sha1() to handle the additional operations needed
to handle SSL v3 client authentication and finished message.

Reviewed-by: Tim Hudson 

commit e3e11e99cebd2f0cbf0b46cc4200a094a9c4b4eb
Author: Dr. Stephen Henson 
Date:   Sat Nov 21 04:03:48 2015 +

Remove RSA exception when generating server key exchange.

Reviewed-by: Tim Hudson 

commit 192e4bbbf93d258c94075ad329404212f62337f3
Author: Dr. Stephen Henson 
Date:   Sat Nov 21 03:56:52 2015 +

Remove RSA exception when processing server key exchange.

Reviewed-by: Tim Hudson 

commit d18d31a16f91dc5042344e207390322170458025
Author: Dr. Stephen Henson 
Date:   Sat Aug 29 22:11:05 2015 +0100

Use MD5+SHA1 for default digest if appropriate.

Reviewed-by: Tim Hudson 

commit 2f142ada2c1f04c96c0c3db3ee3b6425934ad83b
Author: Dr. Stephen Henson 
Date:   Thu Nov 20 13:28:48 2014 +

Add MD5+SHA1

Add digest combining MD5 and SHA1. This is used by RSA signatures for
TLS 1.1 and earlier.

Reviewed-by: Tim Hudson 

---

Summary of changes:
 crypto/evp/Makefile  |  19 +++-
 crypto/evp/c_alld.c  |   1 +
 crypto/evp/digest.c  |  11 ++
 crypto/evp/m_md5_sha1.c  | 184 +
 crypto/evp/m_sha1.c  |  55 ++
 include/openssl/evp.h|   4 +
 ssl/ssl_locl.h   |   1 +
 ssl/statem/statem_clnt.c | 263 ++-
 ssl/statem/statem_srvr.c | 211 -
 ssl/t1_lib.c |   9 +-
 util/libeay.num  |   2 +
 11 files changed, 382 insertions(+), 378 deletions(-)
 create mode 100644 crypto/evp/m_md5_sha1.c

diff --git a/crypto/evp/Makefile b/crypto/evp/Makefile
index 1a65b46..c672296 100644
--- a/crypto/evp/Makefile
+++ b/crypto/evp/Makefile
@@ -20,7 +20,7 @@ LIBSRC= encode.c digest.c evp_enc.c evp_key.c evp_acnf.c 
evp_cnf.c \
e_rc4.c e_aes.c names.c e_seed.c \
e_xcbc_d.c e_rc2.c e_cast.c e_rc5.c \
m_null.c m_md2.c m_md4.c m_md5.c m_sha1.c m_wp.c \
-   m_dss1.c m_mdc2.c m_ripemd.c m_ecdsa.c\
+   m_md5_sha1.c m_dss1.c m_mdc2.c m_ripemd.c m_ecdsa.c\
p_open.c p_seal.c p_sign.c p_verify.c p_lib.c p_enc.c p_dec.c \
bio_md.c bio_b64.c bio_enc.c evp_err.c e_null.c \
c_all.c c_allc.c c_alld.c evp_lib.c bio_ok.c \
@@ -33,7 +33,7 @@ LIBOBJ=   encode.o digest.o evp_enc.o evp_key.o 
evp_acnf.o evp_cnf.o \
e_rc4.o e_aes.o names.o e_seed.o \
e_xcbc_d.o e_rc2.o e_cast.o e_rc5.o \
   

[openssl-commits] Passed: openssl/openssl#709 (master - de17db9)

2015-11-24 Thread Travis CI
Build Update for openssl/openssl
-

Build: #709
Status: Passed

Duration: 8 minutes and 13 seconds
Commit: de17db9 (master)
Author: Richard Levitte
Message: Drop the old perl start magic and replace it with a normal shebang

perlrun(1) leads the way.

Reviewed-by: Matt Caswell 

View the changeset: 
https://github.com/openssl/openssl/compare/f4d8f0375566...de17db915e26

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/92932620

--

You can configure recipients for build notifications in your .travis.yml file. 
See http://docs.travis-ci.com/user/notifications


_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2015-11-24 Thread Dr . Stephen Henson
The branch master has been updated
   via  158e5207a794603f5d64ffa95e0247c7808ab445 (commit)
  from  de17db915e26452819692fd837d788d52b8dd48a (commit)


- Log -
commit 158e5207a794603f5d64ffa95e0247c7808ab445
Author: Dr. Stephen Henson 
Date:   Thu Sep 3 14:27:19 2015 +0100

Limit depth of ASN1 parse printing.

Thanks to Guido Vranken  for reporting this issue.

Reviewed-by: Tim Hudson 

---

Summary of changes:
 crypto/asn1/asn1_par.c | 9 +
 1 file changed, 9 insertions(+)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index 9a370cd..09dde15 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -62,6 +62,10 @@
 #include 
 #include 
 
+#ifndef ASN1_PARSE_MAXDEPTH
+#define ASN1_PARSE_MAXDEPTH 128
+#endif
+
 static int asn1_print_info(BIO *bp, int tag, int xclass, int constructed,
int indent);
 static int asn1_parse2(BIO *bp, const unsigned char **pp, long length,
@@ -123,6 +127,11 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 /* ASN1_BMPSTRING *bmp=NULL; */
 int dump_indent;
 
+if (depth > ASN1_PARSE_MAXDEPTH) {
+BIO_puts(bp, "BAD RECURSION DEPTH\n");
+goto end;
+}
+
 dump_indent = 6;/* Because we know BIO_dump_indent() */
 p = *pp;
 tot = p + length;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2015-11-24 Thread Richard Levitte
The branch master has been updated
   via  f4d8f0375566aeee395c9523e4bc6ed3abccf6b5 (commit)
  from  b83fb854da7ab6b61c3ec62372cfb857987107fd (commit)


- Log -
commit f4d8f0375566aeee395c9523e4bc6ed3abccf6b5
Author: Jacob Bandes-Storch 
Date:   Mon Nov 23 21:44:58 2015 -0800

Add perl modeline to Configure scripts

Encourages GitHub to perform proper syntax highlighting.

Reviewed-by: Rich Salz 
Reviewed-by: Richard Levitte 

---

Summary of changes:
 Configurations/10-main.conf | 1 +
 Configurations/90-team.conf | 1 +
 Configurations/99-personal-ben.conf | 1 +
 Configurations/99-personal-bodo.conf| 1 +
 Configurations/99-personal-geoff.conf   | 1 +
 Configurations/99-personal-levitte.conf | 1 +
 Configurations/99-personal-rse.conf | 1 +
 Configurations/99-personal-steve.conf   | 1 +
 Configure   | 1 +
 9 files changed, 9 insertions(+)

diff --git a/Configurations/10-main.conf b/Configurations/10-main.conf
index a24b992..f77bfda 100644
--- a/Configurations/10-main.conf
+++ b/Configurations/10-main.conf
@@ -1,3 +1,4 @@
+## -*- mode: perl; -*-
 ## Standard openssl configuration targets.
 ##
 ## If you edit this file, run this command before committing
diff --git a/Configurations/90-team.conf b/Configurations/90-team.conf
index 0e78a14..1a567d1 100644
--- a/Configurations/90-team.conf
+++ b/Configurations/90-team.conf
@@ -1,3 +1,4 @@
+## -*- mode: perl; -*-
 ## Build configuration targets for openssl-team members
 ##
 ## If you edit this file, run this command before committing
diff --git a/Configurations/99-personal-ben.conf 
b/Configurations/99-personal-ben.conf
index 94ea6d0..ed7fa21 100644
--- a/Configurations/99-personal-ben.conf
+++ b/Configurations/99-personal-ben.conf
@@ -1,3 +1,4 @@
+## -*- mode: perl; -*-
 ## Personal configuration targets
 ##
 ## If you edit this file, run this command before committing
diff --git a/Configurations/99-personal-bodo.conf 
b/Configurations/99-personal-bodo.conf
index c9a7534..2cb22e1 100644
--- a/Configurations/99-personal-bodo.conf
+++ b/Configurations/99-personal-bodo.conf
@@ -1,3 +1,4 @@
+## -*- mode: perl; -*-
 ## Personal configuration targets
 ##
 ## If you edit this file, run this command before committing
diff --git a/Configurations/99-personal-geoff.conf 
b/Configurations/99-personal-geoff.conf
index adf0990..ca0ded9 100644
--- a/Configurations/99-personal-geoff.conf
+++ b/Configurations/99-personal-geoff.conf
@@ -1,3 +1,4 @@
+## -*- mode: perl; -*-
 ## Personal configuration targets
 ##
 ## If you edit this file, run this command before committing
diff --git a/Configurations/99-personal-levitte.conf 
b/Configurations/99-personal-levitte.conf
index 18fbcdc..6df2ea6 100644
--- a/Configurations/99-personal-levitte.conf
+++ b/Configurations/99-personal-levitte.conf
@@ -1,3 +1,4 @@
+## -*- mode: perl; -*-
 ## Personal configuration targets
 ##
 ## If you edit this file, run this command before committing
diff --git a/Configurations/99-personal-rse.conf 
b/Configurations/99-personal-rse.conf
index e9318fc..0cbe29f 100644
--- a/Configurations/99-personal-rse.conf
+++ b/Configurations/99-personal-rse.conf
@@ -1,3 +1,4 @@
+## -*- mode: perl; -*-
 ## Personal configuration targets
 ##
 ## If you edit this file, run this command before committing
diff --git a/Configurations/99-personal-steve.conf 
b/Configurations/99-personal-steve.conf
index b75e6a3..ed25f9c 100644
--- a/Configurations/99-personal-steve.conf
+++ b/Configurations/99-personal-steve.conf
@@ -1,3 +1,4 @@
+## -*- mode: perl; -*-
 ## Personal configuration targets
 ##
 ## If you edit this file, run this command before committing
diff --git a/Configure b/Configure
index c53c316..e344d05 100755
--- a/Configure
+++ b/Configure
@@ -1,3 +1,4 @@
+# -*- mode: perl; -*-
 :
 eval 'exec perl -S $0 ${1+"$@"}'
 if $running_under_some_shell;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.22

2015-11-24 Thread AppVeyor



Build openssl master.22 failed


Commit f4d8f03755 by Jacob Bandes-Storch on 11/24/2015 12:12 PM:

Add perl modeline to Configure scripts


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2015-11-24 Thread Richard Levitte
The branch master has been updated
   via  de17db915e26452819692fd837d788d52b8dd48a (commit)
  from  f4d8f0375566aeee395c9523e4bc6ed3abccf6b5 (commit)


- Log -
commit de17db915e26452819692fd837d788d52b8dd48a
Author: Richard Levitte 
Date:   Tue Nov 24 14:06:45 2015 +0100

Drop the old perl start magic and replace it with a normal shebang

perlrun(1) leads the way.

Reviewed-by: Matt Caswell 

---

Summary of changes:
 Configure | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/Configure b/Configure
index e344d05..cd4f37f 100755
--- a/Configure
+++ b/Configure
@@ -1,7 +1,6 @@
+#! /usr/bin/env perl
 # -*- mode: perl; -*-
-:
-eval 'exec perl -S $0 ${1+"$@"}'
-if $running_under_some_shell;
+
 ##
 ##  Configure -- OpenSSL source tree configuration script
 ##  If editing this file, run this command before committing
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2015-11-24 Thread Dr . Stephen Henson
The branch OpenSSL_1_0_2-stable has been updated
   via  d88ef40a1e5c81d0d32b4a431e55f5456e678dd2 (commit)
  from  9252d71557c49fbb802854ea0de58e319645a448 (commit)


- Log -
commit d88ef40a1e5c81d0d32b4a431e55f5456e678dd2
Author: Dr. Stephen Henson 
Date:   Thu Sep 3 14:27:19 2015 +0100

Limit depth of ASN1 parse printing.

Thanks to Guido Vranken  for reporting this issue.

Reviewed-by: Tim Hudson 
(cherry picked from commit 158e5207a794603f5d64ffa95e0247c7808ab445)

Conflicts:
crypto/asn1/asn1_par.c

---

Summary of changes:
 crypto/asn1/asn1_par.c | 10 ++
 1 file changed, 10 insertions(+)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index a5d2da1..21dfe0c 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -62,6 +62,10 @@
 #include 
 #include 
 
+#ifndef ASN1_PARSE_MAXDEPTH
+#define ASN1_PARSE_MAXDEPTH 128
+#endif
+
 static int asn1_print_info(BIO *bp, int tag, int xclass, int constructed,
int indent);
 static int asn1_parse2(BIO *bp, const unsigned char **pp, long length,
@@ -128,6 +132,12 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 #else
 dump_indent = 6;/* Because we know BIO_dump_indent() */
 #endif
+
+if (depth > ASN1_PARSE_MAXDEPTH) {
+BIO_puts(bp, "BAD RECURSION DEPTH\n");
+goto end;
+}
+
 p = *pp;
 tot = p + length;
 op = p - 1;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_0_9_8-stable update

2015-11-24 Thread Dr . Stephen Henson
The branch OpenSSL_0_9_8-stable has been updated
   via  a8731c0cb819302b1b790463fdb86d3af998a283 (commit)
  from  31172717e8324fbb01e1b3e65db6f5d48d7e352e (commit)


- Log -
commit a8731c0cb819302b1b790463fdb86d3af998a283
Author: Dr. Stephen Henson 
Date:   Thu Sep 3 14:27:19 2015 +0100

Limit depth of ASN1 parse printing.

Thanks to Guido Vranken  for reporting this issue.

Reviewed-by: Tim Hudson 
(cherry picked from commit 158e5207a794603f5d64ffa95e0247c7808ab445)

Conflicts:
crypto/asn1/asn1_par.c

---

Summary of changes:
 crypto/asn1/asn1_par.c | 10 ++
 1 file changed, 10 insertions(+)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index e15e341..8120f26 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -62,6 +62,10 @@
 #include 
 #include 
 
+#ifndef ASN1_PARSE_MAXDEPTH
+#define ASN1_PARSE_MAXDEPTH 128
+#endif
+
 static int asn1_print_info(BIO *bp, int tag, int xclass, int constructed,
int indent);
 static int asn1_parse2(BIO *bp, const unsigned char **pp, long length,
@@ -134,6 +138,12 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 #else
 dump_indent = 6;/* Because we know BIO_dump_indent() */
 #endif
+
+if (depth > ASN1_PARSE_MAXDEPTH) {
+BIO_puts(bp, "BAD RECURSION DEPTH\n");
+goto end;
+}
+
 p = *pp;
 tot = p + length;
 op = p - 1;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2015-11-24 Thread Dr . Stephen Henson
The branch OpenSSL_1_0_1-stable has been updated
   via  5844c9453f409c95fab3f295214b94dc27e38502 (commit)
  from  3f2ebff3927b52d609928f632cfe670b7ba9 (commit)


- Log -
commit 5844c9453f409c95fab3f295214b94dc27e38502
Author: Dr. Stephen Henson 
Date:   Thu Sep 3 14:27:19 2015 +0100

Limit depth of ASN1 parse printing.

Thanks to Guido Vranken  for reporting this issue.

Reviewed-by: Tim Hudson 
(cherry picked from commit 158e5207a794603f5d64ffa95e0247c7808ab445)

Conflicts:
crypto/asn1/asn1_par.c

---

Summary of changes:
 crypto/asn1/asn1_par.c | 10 ++
 1 file changed, 10 insertions(+)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index a5d2da1..21dfe0c 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -62,6 +62,10 @@
 #include 
 #include 
 
+#ifndef ASN1_PARSE_MAXDEPTH
+#define ASN1_PARSE_MAXDEPTH 128
+#endif
+
 static int asn1_print_info(BIO *bp, int tag, int xclass, int constructed,
int indent);
 static int asn1_parse2(BIO *bp, const unsigned char **pp, long length,
@@ -128,6 +132,12 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 #else
 dump_indent = 6;/* Because we know BIO_dump_indent() */
 #endif
+
+if (depth > ASN1_PARSE_MAXDEPTH) {
+BIO_puts(bp, "BAD RECURSION DEPTH\n");
+goto end;
+}
+
 p = *pp;
 tot = p + length;
 op = p - 1;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits