[openssl-commits] Build failed: openssl OpenSSL_1_0_2-stable.81

2015-12-03 Thread AppVeyor



Build openssl OpenSSL_1_0_2-stable.81 failed


Commit babe434c99 by Andy Polyakov on 12/3/2015 12:31 PM:

perlasm/ppc-xlate.pl: comply with ABIs that specify vrsave as reserved.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.82

2015-12-03 Thread AppVeyor



Build openssl master.82 failed


Commit 85a9398323 by oezgan on 12/3/2015 1:34 PM:

Fix for  Error #4148 (PKCS1 type 1 padding check)


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2015-12-03 Thread Andy Polyakov
The branch OpenSSL_1_0_1-stable has been updated
   via  005f4893dc770d77eb07a098da32e0fca87f07b6 (commit)
  from  d585cc32a55e65573051225b29dc62171f59e05a (commit)


- Log -
commit 005f4893dc770d77eb07a098da32e0fca87f07b6
Author: Andy Polyakov 
Date:   Thu Dec 3 12:29:49 2015 +0100

e_os.h: limit _MSC_VER trickery to older compilers.

PR: #3390, backport from 1.0.2.

Reviewed-by: Matt Caswell 

---

Summary of changes:
 e_os.h | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/e_os.h b/e_os.h
index c9c7aaf..76c471e 100644
--- a/e_os.h
+++ b/e_os.h
@@ -315,7 +315,7 @@ static __inline unsigned int _strlen31(const char *str)
 #undef isxdigit
 #   endif
 #   if defined(_MSC_VER) && !defined(_DLL) && defined(stdin)
-#if _MSC_VER>=1300
+#if _MSC_VER>=1300 && _MSC_VER<1600
 # undef stdin
 # undef stdout
 # undef stderr
@@ -323,7 +323,7 @@ FILE *__iob_func();
 # define stdin  (&__iob_func()[0])
 # define stdout (&__iob_func()[1])
 # define stderr (&__iob_func()[2])
-#elif defined(I_CAN_LIVE_WITH_LNK4049)
+#elif _MSC_VER<1300 && defined(I_CAN_LIVE_WITH_LNK4049)
 # undef stdin
 # undef stdout
 # undef stderr
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2015-12-03 Thread Richard Levitte
The branch OpenSSL_1_0_2-stable has been updated
   via  fb4f46763fed3c600db21974577061b611b6fa46 (commit)
  from  babe434c99251cd1e3c84d6906f579509343186c (commit)


- Log -
commit fb4f46763fed3c600db21974577061b611b6fa46
Author: Richard Levitte 
Date:   Thu Dec 3 15:20:10 2015 +0100

Add cleanup of *.s

Reviewed-by: Matt Caswell 

---

Summary of changes:
 crypto/ec/Makefile | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/ec/Makefile b/crypto/ec/Makefile
index 359ef4e..8949145 100644
--- a/crypto/ec/Makefile
+++ b/crypto/ec/Makefile
@@ -89,7 +89,7 @@ dclean:
mv -f Makefile.new $(MAKEFILE)
 
 clean:
-   rm -f *.o */*.o *.obj lib tags core .pure .nfs* *.old *.bak fluff
+   rm -f *.s *.o */*.o *.obj lib tags core .pure .nfs* *.old *.bak fluff
 
 # DO NOT DELETE THIS LINE -- make depend depends on it.
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_0_9_8zh create

2015-12-03 Thread Matt Caswell
The annotated tag OpenSSL_0_9_8zh has been created
at  f9022119ae9267abd57e70a2b53f27925df77c39 (tag)
   tagging  c2ef67100cd0ca2321b5f1a437abb93fc7e11e37 (commit)
  replaces  OpenSSL_0_9_8zg
 tagged by  Matt Caswell
on  Thu Dec 3 15:00:17 2015 +

- Log -
OpenSSL 0.9.8zh release tag

Dr. Stephen Henson (6):
  document -2 return value
  Don't try and parse boolean type.
  Typo.
  Limit depth of ASN1 parse printing.
  Fix uninitialised p error.
  Fix leak with ASN.1 combine.

Matt Caswell (5):
  Prepare for 0.9.8zh-dev
  Fix building with OPENSSL_NO_TLSEXT.
  Make sure OPENSSL_cleanse checks for NULL
  Update CHANGES and NEWS
  Prepare for 0.9.8zh release

Rich Salz (5):
  Tweak README about rt and bug reporting.
  Move FAQ to the web.
  GH398: Add mingw cross-compile, etc.
  Remove stricts-warnings on 0.9.8 travis.
  Change --debug to -d for compat with old releases.

Richard Levitte (8):
  Stop using tardy
  Set numeric IDs for tar as well
  Add emacs CC mode style for OpenSSL
  Add an example .dir-locals.el
  Remove auto-fill-mode
  Ignore .dir-locals.el
  OpenSSL 0.9.8 doesn't have support for mingw64
  _BSD_SOURCE is deprecated, use _DEFAULT_SOURCE instead

---
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1q create

2015-12-03 Thread Matt Caswell
The annotated tag OpenSSL_1_0_1q has been created
at  075c0103d9e098bb44507e552e3dc45a13b8ce0f (tag)
   tagging  55615e8d48a4ddd684fcbfc7ba6523ed6414c8fc (commit)
  replaces  OpenSSL_1_0_1p
 tagged by  Matt Caswell
on  Thu Dec 3 14:50:26 2015 +

- Log -
OpenSSL 1.0.1q release tag

Adam Eijdenberg (1):
  Clarify return values for EVP_DigestVerifyFinal.

Alessandro Ghedini (11):
  Make BUF_strndup() read-safe on arbitrary inputs
  Validate ClientHello extension field length
  Do not treat 0 return value from BIO_get_fd() as error
  Replace malloc+strlcpy with strdup
  Fix memory leaks and other mistakes on errors
  Set salt length after the malloc has succeeded
  Fix typos
  Fix references to various RFCs
  Check memory allocation
  Remove useless code
  Add initial AppVeyor configuration

Andy Polyakov (1):
  e_os.h: limit _MSC_VER trickery to older compilers.

Ben Kaduk (1):
  GH367 follow-up, for more clarity

David Brodski (1):
  Fixed problem with multiple load-unload of comp zlib

David Woodhouse (1):
  RT3479: Add UTF8 support to BIO_read_filename()

Dirk Wetter (1):
  GH336: Return an exit code if report fails

Dr. Stephen Henson (19):
  Sort @sstacklst correctly.
  use X9.31 keygen by default in FIPS mode
  Err isn't always malloc failure.
  Fix memory leak if setup fails.
  Return error for unsupported modes.
  Update docs.
  Use default field separator.
  Check for FIPS mode after loading config.
  Handle SSL_ERROR_WANT_X509_LOOKUP
  Make SRP work with -www
  SRP memory leak fix
  Link in applink with fips_premain_dso
  Don't try and parse boolean type.
  Typo.
  Limit depth of ASN1 parse printing.
  Fix uninitialised p error.
  typo
  Fix leak with ASN.1 combine.
  Add PSS parameter check.

Emilia Kasper (11):
  bntest: don't dereference the |d| array for a zero BIGNUM.
  BN_mod_exp_mont_consttime: check for zero modulus.
  RT 3493: fix RSA test
  RT4002: check for NULL cipher in p12_crpt.c
  OpenSSL 1.0.1n: add missing CHANGES entry
  RT3754: check for NULL pointer
  RT3757: base64 encoding bugs
  base64 decode: check for high bit
  BUF_strndup: tidy
  BUF_strdup and friends: update docs
  RT2772: accept empty SessionTicket

Ernie Hershey (1):
  GH322: Fix typo in generated comment.

GitHub User (1):
  Missing perldoc markup around < literal

Graeme Perrow (1):
  RT32671: wrong multiple errs TS_check_status_info

Gunnar Kudrjavets (1):
  RT3823: Improve the robustness of event logging

Guy Leaver (guleaver) (1):
  Fix seg fault with 0 p val in SKE

Hubert Kario (1):
  RT4051: fix ciphers man page typo

Ismo Puustinen (2):
  GH367: Fix dsa keygen for too-short seed
  GH367: use random data if seed too short.

Ivo Raisr (1):
  Make no-psk compile without warnings.

Kurt Roeckx (5):
  d2i: don't update input pointer on failure
  Fix more d2i cases to properly update the input pointer
  Use defined(__sun) instead of defined(sun)
  Set reference count earlier
  Use both sun and __sun

Loganaden Velvindron (1):
  Clear BN-mont values when free'ing it.

Marcus Meissner (1):
  mark openssl configuration as loaded at end of OPENSSL_config

Markus Rinne (1):
  RT4019: Duplicate -hmac flag in dgst.pod

Martin Vejnar (1):
  RT3774: double-free in DSA

Matt Caswell (24):
  Prepare for 1.0.1q-dev
  Add test for SSL_set_session_ticket_ext
  Fix SSL_set_session_ticket_ext when used with SSLv23_method
  Fix warning when compiling with no-ec2m
  Check for 0 modulus in BN_MONT_CTX_set
  Fix missing return value checks in SCTP
  Fix "make test" seg fault with SCTP enabled
  Fix DTLS session ticket renewal
  Fix building with OPENSSL_NO_TLSEXT.
  Fix session resumption
  Make sure OPENSSL_cleanse checks for NULL
  Fix SRP memory leaks
  Change functions to pass in a limit rather than calculate it
  Don't treat a bare OCTETSTRING as DigestInfo in int_rsa_verify
  Clarify the preferred way of creating patch files
  Minor EVP_SignInit_ex doc fix
  Fix missing malloc return value checks
  Only call ssl3_init_finished_mac once for DTLS
  Stop DTLS servers asking for unsafe legacy renegotiation
  Ensure all EVP calls have their returns checked where appropriate
  Return errors even if the cookie validation has succeeded
  Update CHANGES and NEWS
  make update
  Prepare for 1.0.1q release

Pascal Cuoq (4):
  Set flags to 0 before calling BN_with_flags()
  Move BN_CTX_start() call so the error case can always call BN_CTX_end().
  BN_GF2m_mod_inv(): check bn_wexpand return value
  ssl3_free(): Return if it wasn't created

Peter Waltenberg (1):
  Exit on error in ecparam


[openssl-commits] [openssl] OpenSSL_0_9_8-stable update

2015-12-03 Thread Matt Caswell
The branch OpenSSL_0_9_8-stable has been updated
   via  74743418dca737ff584530470c54d1a7061e7e0a (commit)
   via  c2ef67100cd0ca2321b5f1a437abb93fc7e11e37 (commit)
   via  35c8d0d85fe71e41eb990655b249e398c7fd1435 (commit)
   via  2cdafc51f008e65b2d5263a80ad0e89e9b56c8d3 (commit)
  from  e979e4715f3795cb59fcf46c77e7c714a184edd8 (commit)


- Log -
commit 74743418dca737ff584530470c54d1a7061e7e0a
Author: Matt Caswell 
Date:   Thu Dec 3 15:00:54 2015 +

Prepare for 0.9.8zi-dev

Reviewed-by: Richard Levitte 

commit c2ef67100cd0ca2321b5f1a437abb93fc7e11e37
Author: Matt Caswell 
Date:   Thu Dec 3 15:00:17 2015 +

Prepare for 0.9.8zh release

Reviewed-by: Richard Levitte 

commit 35c8d0d85fe71e41eb990655b249e398c7fd1435
Author: Matt Caswell 
Date:   Tue Dec 1 14:39:47 2015 +

Update CHANGES and NEWS

Update the CHANGES and NEWS files for the new release.

Reviewed-by: Rich Salz 

commit 2cdafc51f008e65b2d5263a80ad0e89e9b56c8d3
Author: Dr. Stephen Henson 
Date:   Tue Nov 10 19:03:07 2015 +

Fix leak with ASN.1 combine.

When parsing a combined structure pass a flag to the decode routine
so on error a pointer to the parent structure is not zeroed as
this will leak any additional components in the parent.

This can leak memory in any application parsing PKCS#7 or CMS structures.

CVE-2015-3195.

Thanks to Adam Langley (Google/BoringSSL) for discovering this bug using
libFuzzer.

PR#4131

Reviewed-by: Richard Levitte 

---

Summary of changes:
 CHANGES| 16 +++-
 NEWS   |  6 +-
 README |  2 +-
 crypto/asn1/tasn_dec.c |  7 +--
 crypto/opensslv.h  |  6 +++---
 openssl.spec   |  2 +-
 6 files changed, 30 insertions(+), 9 deletions(-)

diff --git a/CHANGES b/CHANGES
index ed2f0ec..d3f43af 100644
--- a/CHANGES
+++ b/CHANGES
@@ -2,10 +2,24 @@
  OpenSSL CHANGES
  ___
 
- Changes between 0.9.8zg and 0.9.8zh [xx XXX ]
+ Changes between 0.9.8zh and 0.9.8zi [xx XXX ]
 
   *)
 
+ Changes between 0.9.8zg and 0.9.8zh [3 Dec 2015]
+
+  *) X509_ATTRIBUTE memory leak
+
+ When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
+ memory. This structure is used by the PKCS#7 and CMS routines so any
+ application which reads PKCS#7 or CMS data from untrusted sources is
+ affected. SSL/TLS is not affected.
+
+ This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) 
using
+ libFuzzer.
+ (CVE-2015-3195)
+ [Stephen Henson]
+
  Changes between 0.9.8zf and 0.9.8zg [11 Jun 2015]
 
   *) Malformed ECParameters causes infinite loop
diff --git a/NEWS b/NEWS
index 4ffbbab..f3130d4 100644
--- a/NEWS
+++ b/NEWS
@@ -5,10 +5,14 @@
   This file gives a brief overview of the major changes between each OpenSSL
   release. For more details please read the CHANGES file.
 
-  Major changes between OpenSSL 0.9.8zg and OpenSSL 0.9.8zh [under development]
+  Major changes between OpenSSL 0.9.8zh and OpenSSL 0.9.8zi [under development]
 
   o
 
+  Major changes between OpenSSL 0.9.8zg and OpenSSL 0.9.8zh [3 Dec 2015]
+
+  o X509_ATTRIBUTE memory leak (CVE-2015-3195)
+
   Major changes between OpenSSL 0.9.8zf and OpenSSL 0.9.8zg [11 Jun 2015]
 
   o Malformed ECParameters causes infinite loop (CVE-2015-1788)
diff --git a/README b/README
index 4827753..52df8f6 100644
--- a/README
+++ b/README
@@ -1,5 +1,5 @@
 
- OpenSSL 0.9.8zh-dev
+ OpenSSL 0.9.8zi-dev
 
  Copyright (c) 1998-2011 The OpenSSL Project
  Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
diff --git a/crypto/asn1/tasn_dec.c b/crypto/asn1/tasn_dec.c
index 6e4a325..91e7698 100644
--- a/crypto/asn1/tasn_dec.c
+++ b/crypto/asn1/tasn_dec.c
@@ -178,6 +178,8 @@ int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char 
**in, long len,
 int otag;
 int ret = 0;
 ASN1_VALUE **pchptr, *ptmpval;
+int combine = aclass & ASN1_TFLG_COMBINE;
+aclass &= ~ASN1_TFLG_COMBINE;
 if (!pval)
 return 0;
 if (aux && aux->asn1_cb)
@@ -498,7 +500,8 @@ int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char 
**in, long len,
  auxerr:
 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, ASN1_R_AUX_ERROR);
  err:
-ASN1_item_ex_free(pval, it);
+if (combine == 0)
+ASN1_item_ex_free(pval, it);
 if (errtt)
 ERR_add_error_data(4, "Field=", errtt->field_name,
", Type=", it->sname);
@@ -687,7 +690,7 @@ static int asn1_template_noexp_d2i(ASN1_VALUE **val,
 } else {
 /* Nothing special */
 ret = ASN1_item_ex_d2i(val, , len, 

[openssl-commits] [openssl] OpenSSL_1_0_0-stable update

2015-12-03 Thread Matt Caswell
The branch OpenSSL_1_0_0-stable has been updated
   via  f93aad4a56a1580a109785c2c922fe6b8baf7df9 (commit)
   via  ce052c8437fb97cbc57f034fa94b5bcd749dbf52 (commit)
   via  a402b2b7bcff8d6901aa771e49c45cf38836e7bf (commit)
   via  d275dbe6eb7b720b8920f712eea79044f845a4bb (commit)
   via  cf432b3b1bd7caa22943b41b94ec2472ae497dc6 (commit)
  from  015b17257855e31003eb29a70280764c3c822710 (commit)


- Log -
commit f93aad4a56a1580a109785c2c922fe6b8baf7df9
Author: Matt Caswell 
Date:   Thu Dec 3 14:57:35 2015 +

Prepare for 1.0.0u-dev

Reviewed-by: Richard Levitte 

commit ce052c8437fb97cbc57f034fa94b5bcd749dbf52
Author: Matt Caswell 
Date:   Thu Dec 3 14:56:22 2015 +

Prepare for 1.0.0t release

Reviewed-by: Richard Levitte 

commit a402b2b7bcff8d6901aa771e49c45cf38836e7bf
Author: Matt Caswell 
Date:   Tue Dec 1 14:39:47 2015 +

Update CHANGES and NEWS

Update the CHANGES and NEWS files for the new release.

Reviewed-by: Rich Salz 

commit d275dbe6eb7b720b8920f712eea79044f845a4bb
Author: Dr. Stephen Henson 
Date:   Mon Feb 23 12:57:50 2015 +

Free up passed ASN.1 structure if reused.

Change the "reuse" behaviour in ASN1_item_d2i: if successful the old
structure is freed and a pointer to the new one used. If it is not
successful then the passed structure is untouched.

Exception made for primitive types so ssl_asn1.c still works.

Reviewed-by: Tim Hudson 
Reviewed-by: Emilia Käsper 

Conflicts:
doc/crypto/d2i_X509.pod

commit cf432b3b1bd7caa22943b41b94ec2472ae497dc6
Author: Dr. Stephen Henson 
Date:   Tue Nov 10 19:03:07 2015 +

Fix leak with ASN.1 combine.

When parsing a combined structure pass a flag to the decode routine
so on error a pointer to the parent structure is not zeroed as
this will leak any additional components in the parent.

This can leak memory in any application parsing PKCS#7 or CMS structures.

CVE-2015-3195.

Thanks to Adam Langley (Google/BoringSSL) for discovering this bug using
libFuzzer.

PR#4131

Reviewed-by: Richard Levitte 

---

Summary of changes:
 CHANGES | 25 -
 NEWS|  7 ++-
 README  |  2 +-
 crypto/asn1/tasn_dec.c  | 21 +++--
 crypto/opensslv.h   |  6 +++---
 doc/crypto/d2i_X509.pod | 10 +-
 openssl.spec|  2 +-
 7 files changed, 59 insertions(+), 14 deletions(-)

diff --git a/CHANGES b/CHANGES
index ccf2c03..9cea9e6 100644
--- a/CHANGES
+++ b/CHANGES
@@ -2,10 +2,33 @@
  OpenSSL CHANGES
  ___
 
- Changes between 1.0.0s and 1.0.0t [xx XXX ]
+ Changes between 1.0.0t and 1.0.0u [xx XXX ]
 
   *)
 
+ Changes between 1.0.0s and 1.0.0t [3 Dec 2015]
+
+  *) X509_ATTRIBUTE memory leak
+
+ When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
+ memory. This structure is used by the PKCS#7 and CMS routines so any
+ application which reads PKCS#7 or CMS data from untrusted sources is
+ affected. SSL/TLS is not affected.
+
+ This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) 
using
+ libFuzzer.
+ (CVE-2015-3195)
+ [Stephen Henson]
+
+  *) Race condition handling PSK identify hint
+
+ If PSK identity hints are received by a multi-threaded client then
+ the values are wrongly updated in the parent SSL_CTX structure. This can
+ result in a race condition potentially leading to a double free of the
+ identify hint data.
+ (CVE-2015-3196)
+ [Stephen Henson]
+
  Changes between 1.0.0r and 1.0.0s [11 Jun 2015]
 
   *) Malformed ECParameters causes infinite loop
diff --git a/NEWS b/NEWS
index 99ba960..d688d4b 100644
--- a/NEWS
+++ b/NEWS
@@ -5,10 +5,15 @@
   This file gives a brief overview of the major changes between each OpenSSL
   release. For more details please read the CHANGES file.
 
-  Major changes between OpenSSL 1.0.0s and OpenSSL 1.0.0t [under development]
+  Major changes between OpenSSL 1.0.0t and OpenSSL 1.0.0u [under development]
 
   o
 
+  Major changes between OpenSSL 1.0.0s and OpenSSL 1.0.0t [3 Dec 2015]
+
+  o X509_ATTRIBUTE memory leak (CVE-2015-3195)
+  o Race condition handling PSK identify hint (CVE-2015-3196)
+
   Major changes between OpenSSL 1.0.0r and OpenSSL 1.0.0s [11 Jun 2015]
 
   o Malformed ECParameters causes infinite loop (CVE-2015-1788)
diff --git a/README b/README
index 1a70b7f..f2f62b0 100644
--- a/README
+++ b/README
@@ -1,5 +1,5 @@
 
- OpenSSL 1.0.0t-dev
+ OpenSSL 

[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2015-12-03 Thread Matt Caswell
The branch OpenSSL_1_0_1-stable has been updated
   via  d82626caec9cb3f8da346125434f17eb180d4ef1 (commit)
   via  55615e8d48a4ddd684fcbfc7ba6523ed6414c8fc (commit)
   via  56edb20184ac7ea5fec1636a4cae3b8ba5c0d5d1 (commit)
   via  ac3dd9b7e6e2182ae3d1a8dc6c522cef9385f511 (commit)
   via  d8541d7e9e63bf5f343af24644046c8d96498c17 (commit)
   via  b29ffa392e839d05171206523e84909146f7a77c (commit)
  from  005f4893dc770d77eb07a098da32e0fca87f07b6 (commit)


- Log -
commit d82626caec9cb3f8da346125434f17eb180d4ef1
Author: Matt Caswell 
Date:   Thu Dec 3 14:51:13 2015 +

Prepare for 1.0.1r-dev

Reviewed-by: Richard Levitte 

commit 55615e8d48a4ddd684fcbfc7ba6523ed6414c8fc
Author: Matt Caswell 
Date:   Thu Dec 3 14:50:26 2015 +

Prepare for 1.0.1q release

Reviewed-by: Richard Levitte 

commit 56edb20184ac7ea5fec1636a4cae3b8ba5c0d5d1
Author: Matt Caswell 
Date:   Thu Dec 3 14:50:26 2015 +

make update

Reviewed-by: Richard Levitte 

commit ac3dd9b7e6e2182ae3d1a8dc6c522cef9385f511
Author: Matt Caswell 
Date:   Tue Dec 1 14:39:47 2015 +

Update CHANGES and NEWS

Update the CHANGES and NEWS files for the new release.

Reviewed-by: Richard Levitte 

commit d8541d7e9e63bf5f343af24644046c8d96498c17
Author: Dr. Stephen Henson 
Date:   Fri Oct 2 13:10:29 2015 +0100

Add PSS parameter check.

Avoid seg fault by checking mgf1 parameter is not NULL. This can be
triggered during certificate verification so could be a DoS attack
against a client or a server enabling client authentication.

Thanks to Loïc Jonas Etienne (Qnective AG) for discovering this bug.

CVE-2015-3194

Reviewed-by: Matt Caswell 

commit b29ffa392e839d05171206523e84909146f7a77c
Author: Dr. Stephen Henson 
Date:   Tue Nov 10 19:03:07 2015 +

Fix leak with ASN.1 combine.

When parsing a combined structure pass a flag to the decode routine
so on error a pointer to the parent structure is not zeroed as
this will leak any additional components in the parent.

This can leak memory in any application parsing PKCS#7 or CMS structures.

CVE-2015-3195.

Thanks to Adam Langley (Google/BoringSSL) for discovering this bug using
libFuzzer.

PR#4131

Reviewed-by: Richard Levitte 

---

Summary of changes:
 CHANGES| 47 ++-
 NEWS   | 11 ++-
 README |  2 +-
 crypto/asn1/tasn_dec.c |  7 +--
 crypto/opensslv.h  |  6 +++---
 crypto/rsa/rsa_ameth.c |  2 +-
 openssl.spec   |  2 +-
 test/Makefile  |  7 ---
 8 files changed, 67 insertions(+), 17 deletions(-)

diff --git a/CHANGES b/CHANGES
index 178d010..915b1f6 100644
--- a/CHANGES
+++ b/CHANGES
@@ -2,7 +2,38 @@
  OpenSSL CHANGES
  ___
 
- Changes between 1.0.1p and 1.0.1q [xx XXX ]
+ Changes between 1.0.1q and 1.0.1r [xx XXX ]
+
+  *)
+
+ Changes between 1.0.1p and 1.0.1q [3 Dec 2015]
+
+  *) Certificate verify crash with missing PSS parameter
+
+ The signature verification routines will crash with a NULL pointer
+ dereference if presented with an ASN.1 signature using the RSA PSS
+ algorithm and absent mask generation function parameter. Since these
+ routines are used to verify certificate signature algorithms this can be
+ used to crash any certificate verification operation and exploited in a
+ DoS attack. Any application which performs certificate verification is
+ vulnerable including OpenSSL clients and servers which enable client
+ authentication.
+
+ This issue was reported to OpenSSL by Loïc Jonas Etienne (Qnective AG).
+ (CVE-2015-3194)
+ [Stephen Henson]
+
+  *) X509_ATTRIBUTE memory leak
+
+ When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
+ memory. This structure is used by the PKCS#7 and CMS routines so any
+ application which reads PKCS#7 or CMS data from untrusted sources is
+ affected. SSL/TLS is not affected.
+
+ This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) 
using
+ libFuzzer.
+ (CVE-2015-3195)
+ [Stephen Henson]
 
   *) Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs.
  This changes the decoding behaviour for some invalid messages,
@@ -14,9 +45,6 @@
  return an error
  [Rich Salz and Ismo Puustinen ]
 
-  *) Rewrite PSK to support ECDHE_PSK, DHE_PSK and RSA_PSK. Add ciphersuites
- from RFC4279, RFC4785, RFC5487, 

[openssl-commits] [openssl] OpenSSL_1_0_0t create

2015-12-03 Thread Matt Caswell
The annotated tag OpenSSL_1_0_0t has been created
at  07ecb6190a68fa9aeefc64ec510b3244ac9f4e7a (tag)
   tagging  ce052c8437fb97cbc57f034fa94b5bcd749dbf52 (commit)
  replaces  OpenSSL_1_0_0s
 tagged by  Matt Caswell
on  Thu Dec 3 14:56:22 2015 +

- Log -
OpenSSL 1.0.0t release tag

Dirk Wetter (1):
  GH336: Return an exit code if report fails

Dr. Stephen Henson (11):
  Don't output bogus errors in PKCS12_parse
  Fix PSK handling.
  document -2 return value
  Sort @sstacklst correctly.
  Use default field separator.
  Don't try and parse boolean type.
  Typo.
  Limit depth of ASN1 parse printing.
  Fix uninitialised p error.
  Fix leak with ASN.1 combine.
  Free up passed ASN.1 structure if reused.

Ismo Puustinen (1):
  GH367: use random data if seed too short.

Ivo Raisr (1):
  Make no-psk compile without warnings.

Loganaden Velvindron (1):
  Clear BN-mont values when free'ing it.

Martin Vejnar (1):
  RT3774: double-free in DSA

Matt Caswell (5):
  Prepare for 1.0.0t-dev
  Fix building with OPENSSL_NO_TLSEXT.
  Make sure OPENSSL_cleanse checks for NULL
  Update CHANGES and NEWS
  Prepare for 1.0.0t release

Rich Salz (5):
  Tweak README about rt and bug reporting.
  Move FAQ to the web.
  GH398: Add mingw cross-compile, etc.
  Remove stricts-warnings on 1.0.0 travis.
  Change --debug to -d for compat with old releases.

Richard Levitte (10):
  Remove one extraneous parenthesis
  Make preprocessor error into real preprocessor error
  Stop using tardy
  Set numeric IDs for tar as well
  Remove extra '; \' in apps/Makefile
  Add emacs CC mode style for OpenSSL
  Add an example .dir-locals.el
  Remove auto-fill-mode
  Ignore .dir-locals.el
  _BSD_SOURCE is deprecated, use _DEFAULT_SOURCE instead

---
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2015-12-03 Thread Richard Levitte
The branch master has been updated
   via  b954344e5f61310b12c50e5042bff7af512b4457 (commit)
  from  fda590f8c6af8c40f522e3f62a67b6b5f39f5dde (commit)


- Log -
commit b954344e5f61310b12c50e5042bff7af512b4457
Author: Richard Levitte 
Date:   Thu Dec 3 17:11:38 2015 +0100

Make sure to redirect the old release notes

---

Summary of changes:
 news/.htaccess | 5 +
 1 file changed, 5 insertions(+)

diff --git a/news/.htaccess b/news/.htaccess
index 6c8fb10..9ca8d84 100644
--- a/news/.htaccess
+++ b/news/.htaccess
@@ -1,3 +1,8 @@
+Redirect permanent /news/openssl-0.9.8-notes.html /news/cl098.txt
+Redirect permanent /news/openssl-1.0.0-notes.html /news/cl100.txt
+Redirect permanent /news/openssl-1.0.1-notes.html /news/cl101.txt
+Redirect permanent /news/openssl-1.0.2-notes.html /news/cl102.txt
+
 RewriteEngine on
 RewriteCond %{REQUEST_FILENAME} !-f
 RewriteRule secadv_(.*) /news/secadv/$1 [L,R=302,NC]
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2015-12-03 Thread Matt Caswell
The branch master has been updated
   via  fda590f8c6af8c40f522e3f62a67b6b5f39f5dde (commit)
  from  76e25ea3709538ce2b534e6bde4f897942146e93 (commit)


- Log -
commit fda590f8c6af8c40f522e3f62a67b6b5f39f5dde
Author: Matt Caswell <m...@openssl.org>
Date:   Thu Dec 3 15:29:34 2015 +

Add release and vulnerabilities information to website for release

---

Summary of changes:
 news/newsflash.txt   |   5 ++
 news/secadv/20151203.txt | 123 +++
 news/vulnerabilities.xml | 214 ++-
 3 files changed, 341 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20151203.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 44b973c..cf51a94 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,11 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+03-Dec-2015: Security Advisory: four 
security fixes
+03-Dec-2015: OpenSSL 1.0.2e is now available, including bug and security fixes
+03-Dec-2015: OpenSSL 1.0.1q is now available, including bug and security fixes
+03-Dec-2015: OpenSSL 1.0.0t is now available, including bug and security fixes
+03-Dec-2015: OpenSSL 0.9.8zh is now available, including bug and security fixes
 09-Jul-2015: Security Advisory: one 
security fix
 09-Jul-2015: OpenSSL 1.0.2d is now available, including bug and security fixes
 09-Jul-2015: OpenSSL 1.0.1p is now available, including bug and security fixes
diff --git a/news/secadv/20151203.txt b/news/secadv/20151203.txt
new file mode 100644
index 000..44051a2
--- /dev/null
+++ b/news/secadv/20151203.txt
@@ -0,0 +1,123 @@
+OpenSSL Security Advisory [3 Dec 2015]
+===
+
+NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
+0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
+PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS.
+
+BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
+==
+
+Severity: Moderate
+
+There is a carry propagating bug in the x86_64 Montgomery squaring procedure. 
No
+EC algorithms are affected. Analysis suggests that attacks against RSA and DSA
+as a result of this defect would be very difficult to perform and are not
+believed likely. Attacks against DH are considered just feasible (although very
+difficult) because most of the work necessary to deduce information
+about a private key may be performed offline. The amount of resources
+required for such an attack would be very significant and likely only
+accessible to a limited number of attackers. An attacker would
+additionally need online access to an unpatched system using the target
+private key in a scenario with persistent DH parameters and a private
+key that is shared between multiple clients. For example this can occur by
+default in OpenSSL DHE based SSL/TLS ciphersuites.
+
+This issue affects OpenSSL version 1.0.2.
+
+OpenSSL 1.0.2 users should upgrade to 1.0.2e
+
+This issue was reported to OpenSSL on August 13 2015 by Hanno
+Böck. The fix was developed by Andy Polyakov of the OpenSSL
+development team.
+
+Certificate verify crash with missing PSS parameter (CVE-2015-3194)
+===
+
+Severity: Moderate
+
+The signature verification routines will crash with a NULL pointer dereference
+if presented with an ASN.1 signature using the RSA PSS algorithm and absent
+mask generation function parameter. Since these routines are used to verify
+certificate signature algorithms this can be used to crash any certificate
+verification operation and exploited in a DoS attack. Any application which
+performs certificate verification is vulnerable including OpenSSL clients and
+servers which enable client authentication.
+
+This issue affects OpenSSL versions 1.0.2 and 1.0.1.
+
+OpenSSL 1.0.2 users should upgrade to 1.0.2e
+OpenSSL 1.0.1 users should upgrade to 1.0.1q
+
+This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne
+(Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL
+development team.
+
+X509_ATTRIBUTE memory leak (CVE-2015-3195)
+==
+
+Severity: Moderate
+
+When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
+memory. This structure is used by the PKCS#7 and CMS routines so any
+application which reads PKCS#7 or CMS data from untrusted sources is affected.
+SSL/TLS is not affected.
+
+This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8.
+
+OpenSSL 1.0.2 users should upgrade to 1.0.2e
+OpenSSL 1.0.1 users should upgrade to 1.0.1q
+OpenSSL 1.0.0 users should upgrade to 

[openssl-commits] [web] master update

2015-12-03 Thread Rich Salz
The branch master has been updated
   via  8fa5106fbbdebe56eab4784a5c14bce8f8676d6d (commit)
  from  eebadc3b6b3ac68cc9bbe03cdc814f2c9d02486a (commit)


- Log -
commit 8fa5106fbbdebe56eab4784a5c14bce8f8676d6d
Author: Rich Salz 
Date:   Thu Dec 3 14:19:50 2015 -0500

redirect /license to policies/cla

---

Summary of changes:
 .htaccess | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/.htaccess b/.htaccess
index 803ad34..74aa4f3 100644
--- a/.htaccess
+++ b/.htaccess
@@ -6,6 +6,8 @@ Redirect permanent /about/releasestrat.html 
/policies/releasestrat.html
 Redirect permanent /licenses/openssl_ccla.pdf /policies/openssl_ccla.pdf
 Redirect permanent /licenses/openssl_icla.pdf /policies/openssl_icla.pdf
 Redirect permanent /support/faq.html /docs/faq.html
+Redirect permanent /licenses /policies/cla.html
+Redirect permanent /licenses/ /policies/cla.html
 
 
 ForceType application/binary
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2015-12-03 Thread Richard Levitte
The branch master has been updated
   via  10ac045c44c14a807dc5c257417e3c4839c5961c (commit)
  from  8fa5106fbbdebe56eab4784a5c14bce8f8676d6d (commit)


- Log -
commit 10ac045c44c14a807dc5c257417e3c4839c5961c
Author: Richard Levitte 
Date:   Thu Dec 3 21:26:10 2015 +0100

Remove source/.htaccess from versioning since it's generated

---

Summary of changes:
 source/.htaccess | 30 --
 1 file changed, 30 deletions(-)
 delete mode 100644 source/.htaccess

diff --git a/source/.htaccess b/source/.htaccess
deleted file mode 100644
index 6a2766d..000
--- a/source/.htaccess
+++ /dev/null
@@ -1,30 +0,0 @@
-RewriteEngine on
-RewriteBase /source
-# First, rewrite all the 'latest' URLs
-RewriteRule ^latest.tar.gz$ openssl-1.0.2d.tar.gz [L,R=302,NC]
-RewriteRule ^openssl-0.9.8-latest.tar.gz$ openssl-0.9.8zg.tar.gz [L,R=302,NC]
-RewriteRule ^openssl-1.0.0-latest.tar.gz$ openssl-1.0.0s.tar.gz [L,R=302,NC]
-RewriteRule ^openssl-1.0.1-latest.tar.gz$ openssl-1.0.1p.tar.gz [L,R=302,NC]
-RewriteRule ^openssl-1.0.2-latest.tar.gz$ openssl-1.0.2d.tar.gz [L,R=302,NC]
-
-# Old distro's are in subdirs.
-RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule ^(openssl-0\.9\.8.*) old/0.9.x/$1 [L]
-RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule ^openssl-(1\.0\.0.*) old/1.0.0/openssl-$1 [L]
-RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule ^openssl-(1\.0\.1.*) old/1.0.1/openssl-$1 [L]
-RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule ^openssl-(1\.0\.2.*) old/1.0.1/openssl-$1 [L]
-RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule ^openssl-(fips.*)  old/fips/openssl-$1 [L]
-
-
-RemoveEncoding .gz
-
-
-RemoveEncoding .gz
-
-
-RemoveEncoding .gz
-
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2015-12-03 Thread Richard Levitte
The branch master has been updated
   via  49266e288ce2698587c44205ac75b85f4d6da7cc (commit)
   via  ac20fc67b72cf661dd2ae574b2e14d459c7a9f3f (commit)
   via  39a259dbd009b9167d8a1373c7df12e11e839cb7 (commit)
  from  10ac045c44c14a807dc5c257417e3c4839c5961c (commit)


- Log -
commit 49266e288ce2698587c44205ac75b85f4d6da7cc
Author: Richard Levitte 
Date:   Thu Dec 3 23:03:39 2015 +0100

Add release notes generator

commit ac20fc67b72cf661dd2ae574b2e14d459c7a9f3f
Author: Richard Levitte 
Date:   Thu Dec 3 23:01:32 2015 +0100

Ignore source/.htacces since it's generated

commit 39a259dbd009b9167d8a1373c7df12e11e839cb7
Author: Richard Levitte 
Date:   Thu Dec 3 22:58:59 2015 +0100

Add dependencies, so make has a chance to determine if there's work to do

---

Summary of changes:
 .gitignore|  3 ++
 Makefile  | 41 ++-
 bin/mk-notes  | 39 +
 source/license.html => news/openssl-notes.html.in | 25 --
 4 files changed, 89 insertions(+), 19 deletions(-)
 create mode 100755 bin/mk-notes
 copy source/license.html => news/openssl-notes.html.in (52%)

diff --git a/.gitignore b/.gitignore
index f99f40b..e37e39d 100644
--- a/.gitignore
+++ b/.gitignore
@@ -15,9 +15,12 @@ news/changelog.txt
 news/newsflash.inc
 news/cl*.txt
 news/vulnerabilities.inc
+news/openssl-*-notes.html
+news/openssl-*-notes.inc
 newsflash.inc
 source/*.gz*
 source/*.patch
+source/.htaccess
 source/index.inc
 source/license.txt
 source/old/*/*.patch
diff --git a/Makefile b/Makefile
index 6df8a09..3e10b5e 100644
--- a/Makefile
+++ b/Makefile
@@ -90,6 +90,31 @@ news/cl102.txt: $(CHECKOUTS)/openssl-1.0.2-stable/CHANGES
@rm -f $@
cp $? $@
 
+news/openssl-0.9.8-notes.html: news/openssl-notes.html.in
+   @rm -f $@
+   sed -e 's|@VERSION@|0.9.8|g' < $< > $@
+news/openssl-1.0.0-notes.html: news/openssl-notes.html.in
+   @rm -f $@
+   sed -e 's|@VERSION@|1.0.0|g' < $< > $@
+news/openssl-1.0.1-notes.html: news/openssl-notes.html.in
+   @rm -f $@
+   sed -e 's|@VERSION@|1.0.1|g' < $< > $@
+news/openssl-1.0.2-notes.html: news/openssl-notes.html.in
+   @rm -f $@
+   sed -e 's|@VERSION@|1.0.2|g' < $< > $@
+news/openssl-0.9.8-notes.inc: $(CHECKOUTS)/openssl-0.9.8-stable/NEWS 
news/openssl-0.9.8-notes.html
+   @rm -f $@
+   ./bin/mk-notes 0.9.8 < $(CHECKOUTS)/openssl-0.9.8-stable/NEWS > $@
+news/openssl-1.0.0-notes.inc: $(CHECKOUTS)/openssl-1.0.0-stable/NEWS 
news/openssl-1.0.0-notes.html
+   @rm -f $@
+   ./bin/mk-notes 1.0.0 < $(CHECKOUTS)/openssl-1.0.0-stable/NEWS > $@
+news/openssl-1.0.1-notes.inc: $(CHECKOUTS)/openssl-1.0.1-stable/NEWS 
news/openssl-1.0.1-notes.html
+   @rm -f $@
+   ./bin/mk-notes 1.0.1 < $(CHECKOUTS)/openssl-1.0.1-stable/NEWS > $@
+news/openssl-1.0.2-notes.inc: $(CHECKOUTS)/openssl-1.0.2-stable/NEWS 
news/openssl-1.0.2-notes.html
+   @rm -f $@
+   ./bin/mk-notes 1.0.2 < $(CHECKOUTS)/openssl-1.0.2-stable/NEWS > $@
+
 news/newsflash.inc: news/newsflash.txt
sed <$? >$@ \
-e '/^#/d' \
@@ -103,32 +128,32 @@ news/vulnerabilities.inc: bin/vulnerabilities.xsl 
news/vulnerabilities.xml
 docs/faq.inc: docs/faq.txt
@rm -f $@
./bin/mk-faq <$? >$@
-docs/fips.inc:
+docs/fips.inc: $(wildcard docs/fips/*)
@rm -f $@
./bin/mk-filelist docs/fips fips/ '*' >$@
 
-source/.htaccess:
+source/.htaccess: $(wildcard source/openssl-*.tar.gz)
@rm -f @?
./bin/mk-latest source >$@
 source/license.txt: $(SNAP)/LICENSE
@rm -f $@
cp $? $@
-source/index.inc:
+source/index.inc: $(wildcard $(RELEASEDIR)/openssl-*.tar.gz)
@rm -f $@
./bin/mk-filelist -a $(RELEASEDIR) '' 'openssl-*.tar.gz' >$@
 
-source/old/0.9.x/index.inc:
+source/old/0.9.x/index.inc: $(wildcard source/old/0.9.x/*.gz)
@rm -f $@
./bin/mk-filelist source/old/0.9.x '' '*.gz' >$@
-source/old/1.0.0/index.inc:
+source/old/1.0.0/index.inc: $(wildcard source/old/1.0.0/*.gz)
@rm -f $@
./bin/mk-filelist source/old/1.0.0 '' '*.gz' >$@
-source/old/1.0.1/index.inc:
+source/old/1.0.1/index.inc: $(wildcard source/old/1.0.1/*.gz)
@rm -f $@
./bin/mk-filelist source/old/1.0.1 '' '*.gz' >$@
-source/old/1.0.2/index.inc:
+source/old/1.0.2/index.inc: $(wildcard source/old/1.0.2/*.gz)
@rm -f $@
./bin/mk-filelist source/old/1.0.2 '' '*.gz' >$@
-source/old/fips/index.inc:
+source/old/fips/index.inc: $(wildcard source/old/fips/*.gz)
@rm -f $@
./bin/mk-filelist source/old/fips '' '*.gz' >$@
diff --git a/bin/mk-notes b/bin/mk-notes
new file mode 100755
index 000..7738c6b
--- /dev/null
+++ 

[openssl-commits] [web] master update

2015-12-03 Thread Richard Levitte
The branch master has been updated
   via  eebadc3b6b3ac68cc9bbe03cdc814f2c9d02486a (commit)
  from  b954344e5f61310b12c50e5042bff7af512b4457 (commit)


- Log -
commit eebadc3b6b3ac68cc9bbe03cdc814f2c9d02486a
Author: Richard Levitte 
Date:   Thu Dec 3 19:04:36 2015 +0100

Fixup mk-latest

---

Summary of changes:
 bin/mk-latest | 10 +-
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/bin/mk-latest b/bin/mk-latest
index 14f586f..2759297 100755
--- a/bin/mk-latest
+++ b/bin/mk-latest
@@ -34,15 +34,15 @@ print <<\EOF
 
 # Old distro's are in subdirs.
 RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule (openssl-0\.9\.8.*) old/0.9.x/$1 [L]
+RewriteRule ^(openssl-0\.9\.8.*) old/0.9.x/$1 [L]
 RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule openssl-(1\.0\.0.*) old/1.0.0/openssl-$1 [L]
+RewriteRule ^openssl-(1\.0\.0.*) old/1.0.0/openssl-$1 [L]
 RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule openssl-(1\.0\.1.*) old/1.0.1/openssl-$1 [L]
+RewriteRule ^openssl-(1\.0\.1.*) old/1.0.1/openssl-$1 [L]
 RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule openssl-(1\.0\.2.*) old/1.0.1/openssl-$1 [L]
+RewriteRule ^openssl-(1\.0\.2.*) old/1.0.1/openssl-$1 [L]
 RewriteCond %{REQUEST_FILENAME} !-f
-RewriteRule openssl-(fips.*)  old/fips/openssl-$1 [L]
+RewriteRule ^openssl-(fips.*)  old/fips/openssl-$1 [L]
 
 
 RemoveEncoding .gz
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl OpenSSL_1_0_1-stable.77

2015-12-03 Thread AppVeyor



Build openssl OpenSSL_1_0_1-stable.77 failed


Commit d585cc32a5 by Dr. Stephen Henson on 12/2/2015 9:49 PM:

typo


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits