[openssl-commits] [openssl] master update
The branch master has been updated via c6f9019b6966db3efd5d3df74826f055fc48aa82 (commit) from 04b76df3f72de65625c84eac2a00b4e3596c1102 (commit) - Log - commit c6f9019b6966db3efd5d3df74826f055fc48aa82 Author: Matt CaswellDate: Fri Feb 12 10:06:45 2016 + Fix the enable-ssl-trace config option The recent removal of static ECDH broke the enable-ssl-trace compilation. Reviewed-by: Richard Levitte --- Summary of changes: ssl/t1_trce.c | 22 -- 1 file changed, 22 deletions(-) diff --git a/ssl/t1_trce.c b/ssl/t1_trce.c index de1cac7..fdc61a5 100644 --- a/ssl/t1_trce.c +++ b/ssl/t1_trce.c @@ -920,14 +920,6 @@ static int ssl_get_keyex(const char **pname, SSL *ssl) *pname = "ECDHE"; return SSL_kECDHE; } -if (alg_k & SSL_kECDHr) { -*pname = "ECDH RSA"; -return SSL_kECDHr; -} -if (alg_k & SSL_kECDHe) { -*pname = "ECDH ECDSA"; -return SSL_kECDHe; -} if (alg_k & SSL_kPSK) { *pname = "PSK"; return SSL_kPSK; @@ -990,13 +982,6 @@ static int ssl_print_client_keyex(BIO *bio, int indent, SSL *ssl, return 0; break; -case SSL_kECDHr: -case SSL_kECDHe: -if (msglen == 0) { -BIO_indent(bio, indent + 2, 80); -BIO_puts(bio, "implicit\n"); -break; -} case SSL_kECDHE: case SSL_kECDHEPSK: if (!ssl_print_hexbuf(bio, indent + 2, "ecdh_Yc", 1, , )) @@ -1022,13 +1007,6 @@ static int ssl_print_server_keyex(BIO *bio, int indent, SSL *ssl, return 0; } switch (id) { -/* Should never happen */ -case SSL_kECDHr: -case SSL_kECDHe: -BIO_indent(bio, indent + 2, 80); -BIO_printf(bio, "Unexpected Message\n"); -break; - case SSL_kRSA: if (!ssl_print_hexbuf(bio, indent + 2, "rsa_modulus", 2, _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via a76265574398944d686d2d0de9bacca162f555ca (commit) from 04f171c09624cd2e9c00152a30cb22637c694ac1 (commit) - Log - commit a76265574398944d686d2d0de9bacca162f555ca Author: Emilia KasperDate: Tue Feb 2 17:12:45 2016 +0100 RT 3854: Update apps/req Change the default keysize to 2048 bits, and the minimum to 512 bits. Reviewed-by: Rich Salz --- Summary of changes: apps/req.c | 4 ++-- doc/apps/req.pod | 9 ++--- 2 files changed, 8 insertions(+), 5 deletions(-) diff --git a/apps/req.c b/apps/req.c index 3ced170..66bcabc 100644 --- a/apps/req.c +++ b/apps/req.c @@ -89,8 +89,8 @@ #define STRING_MASK "string_mask" #define UTF8_IN "utf8" -#define DEFAULT_KEY_LENGTH 512 -#define MIN_KEY_LENGTH 384 +#define DEFAULT_KEY_LENGTH 2048 +#define MIN_KEY_LENGTH 512 static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, char *dn, int mutlirdn, int attribs, unsigned long chtype); diff --git a/doc/apps/req.pod b/doc/apps/req.pod index 9593dec..12a0687 100644 --- a/doc/apps/req.pod +++ b/doc/apps/req.pod @@ -324,9 +324,12 @@ configuration file values. =item B -This specifies the default key size in bits. If not specified then -512 is used. It is used if the B<-new> option is used. It can be -overridden by using the B<-newkey> option. +Specifies the default key size in bits. + +This option is used in conjunction with the B<-new> option to generate +a new key. It can be overridden by specifying an explicit key size in +the B<-newkey> option. The smallest accepted key size is 512 bits. If +no key size is specified then 2048 bits is used. =item B _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_2-stable update
The branch OpenSSL_1_0_2-stable has been updated via b4b23d05d3282b0c155a1ab8435379306be43315 (commit) from 10c639a8a56c90bec9e332c7ca76ef552b3952ac (commit) - Log - commit b4b23d05d3282b0c155a1ab8435379306be43315 Author: Emilia KasperDate: Tue Feb 2 17:12:45 2016 +0100 RT 3854: Update apps/req Change the default keysize to 2048 bits, and the minimum to 512 bits. Reviewed-by: Rich Salz (cherry picked from commit a76265574398944d686d2d0de9bacca162f555ca) --- Summary of changes: CHANGES | 6 +- apps/req.c | 4 ++-- doc/apps/req.pod | 9 ++--- 3 files changed, 13 insertions(+), 6 deletions(-) diff --git a/CHANGES b/CHANGES index f2126bc..8039184 100644 --- a/CHANGES +++ b/CHANGES @@ -4,7 +4,11 @@ Changes between 1.0.2f and 1.0.2g [xx XXX ] - *) + *) Change the req app to generate a 2048-bit RSA/DSA key by default, + if no keysize is specified with default_bits. This fixes an + omission in an earlier change that changed all RSA/DSA key generation + apps to use 2048 bits by default. + [Emilia Käsper] Changes between 1.0.2e and 1.0.2f [28 Jan 2016] diff --git a/apps/req.c b/apps/req.c index 57781c9..e818bd2 100644 --- a/apps/req.c +++ b/apps/req.c @@ -101,8 +101,8 @@ #define STRING_MASK "string_mask" #define UTF8_IN "utf8" -#define DEFAULT_KEY_LENGTH 512 -#define MIN_KEY_LENGTH 384 +#define DEFAULT_KEY_LENGTH 2048 +#define MIN_KEY_LENGTH 512 #undef PROG #define PROGreq_main diff --git a/doc/apps/req.pod b/doc/apps/req.pod index 54a4d39..30653e5 100644 --- a/doc/apps/req.pod +++ b/doc/apps/req.pod @@ -347,9 +347,12 @@ configuration file values. =item B -This specifies the default key size in bits. If not specified then -512 is used. It is used if the B<-new> option is used. It can be -overridden by using the B<-newkey> option. +Specifies the default key size in bits. + +This option is used in conjunction with the B<-new> option to generate +a new key. It can be overridden by specifying an explicit key size in +the B<-newkey> option. The smallest accepted key size is 512 bits. If +no key size is specified then 2048 bits is used. =item B _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 04f171c09624cd2e9c00152a30cb22637c694ac1 (commit) from c6f9019b6966db3efd5d3df74826f055fc48aa82 (commit) - Log - commit 04f171c09624cd2e9c00152a30cb22637c694ac1 Author: Richard LevitteDate: Fri Feb 12 12:10:27 2016 +0100 Remove last chomps In the previous commit to change all chomp to a more flexible regexp, Configure was forgotten. This completes the change. Reviewed-by: Andy Polyakov --- Summary of changes: Configure | 10 +- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/Configure b/Configure index 3dc6a42..0b885d0 100755 --- a/Configure +++ b/Configure @@ -456,7 +456,7 @@ if (grep /^reconf(igure)?$/, @argvcopy) { # centered information gathering the reading configdata.pm # while () { -chomp; +s|\R$||; if (/^CONFIGURE_ARGS=\s*(.*)\s*/) { # Older form, we split the string and hope for the best @argvcopy = split /\s+/, $_; @@ -1333,7 +1333,7 @@ if ($builder eq "unified") { my $lineiterator = shift; my $target_kind = $1; while (defined $lineiterator->()) { -chomp; +s|\R$||; if (/^\s*ENDRAW\[((?:\\.|[^\\\]])+)\]\s*$/) { die "ENDRAW doesn't match BEGINRAW" if $1 ne $target_kind; @@ -2292,7 +2292,7 @@ sub collect_from_file { my $saved_line = ""; $_ = ""; while (<$fh>) { -chomp; +s|\R$||; if (defined $line_concat) { $_ = $line_concat->($saved_line, $_); $saved_line = ""; @@ -2323,7 +2323,7 @@ sub collect_from_array { my $saved_line = ""; $_ = ""; while (defined($_ = shift @array)) { -chomp; +s|\R$||; if (defined $line_concat) { $_ = $line_concat->($saved_line, $_); $saved_line = ""; @@ -2348,7 +2348,7 @@ sub collect_information { my %collectors = @_; while(defined($_ = $lineiterator->())) { -chomp; +s|\R$||; my $found = 0; foreach my $re (keys %collectors) { if ($re ne "OTHERWISE" && /$re/) { _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl ct_api.30
Build openssl ct_api.30 failed Commit 01ca602807 by Rob Percival on 2/12/2016 11:05 AM: Public API for Certificate Transparency Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl ct_verify.31
Build openssl ct_verify.31 failed Commit edf6bd8365 by Rob Percival on 2/12/2016 11:27 AM: Verify SCT signatures Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl ct_policy.32
Build openssl ct_policy.32 failed Commit 6f9d479479 by Rob Percival on 2/12/2016 11:39 AM: CT policy validation Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Broken: openssl/openssl#1734 (master - a762655)
Build Update for openssl/openssl - Build: #1734 Status: Broken Duration: 4 minutes and 19 seconds Commit: a762655 (master) Author: Emilia Kasper Message: RT 3854: Update apps/req Change the default keysize to 2048 bits, and the minimum to 512 bits. Reviewed-by: Rich SalzView the changeset: https://github.com/openssl/openssl/compare/04f171c09624...a76265574398 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108781349 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl ct_policy.35
Build openssl ct_policy.35 failed Commit 1f72304c1d by Rob Percival on 2/12/2016 12:04 PM: CT policy validation Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl ct_ssl.36
Build openssl ct_ssl.36 failed Commit 9c599cc0e4 by Rob Percival on 2/12/2016 12:06 PM: Extends s_client to allow a basic CT policy to be enabled Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 6faffd0ad23801dc540d3865bfd5bbb92e40c791 (commit) from c680f77fb181483d6d6ceee8c60eac6e568898c0 (commit) - Log - commit 6faffd0ad23801dc540d3865bfd5bbb92e40c791 Author: Richard LevitteDate: Fri Feb 12 19:44:55 2016 +0100 Better workaround for VMS getnameinfo() bug The actual bug with current getnameinfo() on VMS is not that it puts gibberish in the service buffer, but that it doesn't touch it at all. The gibberish we dealt with before was simply stuff that happened to be on the stack. It's better to initialise the service buffer properly (with the empty string) and check if it's still an empty string after the getnameinfo() call, and fill it with the direct numerical translation of the raw port if that's the case. Reviewed-by: Rich Salz --- Summary of changes: crypto/bio/b_addr.c | 12 +++- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/crypto/bio/b_addr.c b/crypto/bio/b_addr.c index 459443b..20ef8ec 100644 --- a/crypto/bio/b_addr.c +++ b/crypto/bio/b_addr.c @@ -229,7 +229,7 @@ static int addr_strings(const BIO_ADDR *ap, int numeric, if (1) { #ifdef AI_PASSIVE int ret = 0; -char host[NI_MAXHOST], serv[NI_MAXSERV]; +char host[NI_MAXHOST] = "", serv[NI_MAXSERV] = ""; int flags = 0; if (numeric) @@ -252,11 +252,13 @@ static int addr_strings(const BIO_ADDR *ap, int numeric, return 0; } -/* VMS getnameinfo() seems to have a bug, where serv gets filled - * with gibberish. We can at least check for digits when flags - * has NI_NUMERICSERV enabled +/* VMS getnameinfo() has a bug, it doesn't fill in serv, which + * leaves it with whatever garbage that happens to be there. + * However, we initialise serv with the empty string (serv[0] + * is therefore NUL), so it gets real easy to detect when things + * didn't go the way one might expect. */ -if ((flags & NI_NUMERICSERV) != 0 && !isdigit(serv[0])) { +if (serv[0] == '\0') { BIO_snprintf(serv, sizeof(serv), "%d", ntohs(BIO_ADDR_rawport(ap))); } _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#1747 (master - 5e4bbeb)
Build Update for openssl/openssl - Build: #1747 Status: Still Failing Duration: 1 hour, 5 minutes, and 59 seconds Commit: 5e4bbeb (master) Author: Andy Polyakov Message: modes/ctr128.c: pay attention to ecount_buf alignment in CRYPTO_ctr128_encrypt. It's never problem if CRYPTO_ctr128_encrypt is called from EVP, because buffer in question is always aligned within EVP_CIPHER_CTX structure. RT#4218 Reviewed-by: Richard LevitteView the changeset: https://github.com/openssl/openssl/compare/3c65577f1af1...5e4bbeb49fb6 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108889008 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Broken: openssl/openssl#1750 (master - 7687f52)
Build Update for openssl/openssl - Build: #1750 Status: Broken Duration: 1 hour, 2 minutes, and 59 seconds Commit: 7687f52 (master) Author: Andy Polyakov Message: evp/e_des[3].c: address compiler warnings, fix formatting. RT#4210 Reviewed-by: Richard LevitteView the changeset: https://github.com/openssl/openssl/compare/5e4bbeb49fb6...7687f5255011 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108894180 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl ossl_ssize_max.43
Build openssl ossl_ssize_max.43 failed Commit be2a12cb5e by Rob Percival on 2/12/2016 3:48 PM: Defines OSSL_SSIZE_MAX Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl sct_alt_tests.41
Build openssl sct_alt_tests.41 failed Commit 2ec37816d5 by Rob Percival on 2/12/2016 1:26 PM: Alternative Certificate Transparency SCT tests Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via ce3d25d3e5a7e82fd59fd30dff7acc39baed8b5e (commit) from e314c340736830a6fc0260cf72cc51ea0c227e9d (commit) - Log - commit ce3d25d3e5a7e82fd59fd30dff7acc39baed8b5e Author: Viktor DukhovniDate: Sat Feb 13 02:53:13 2016 -0500 Fix some issues near recent chomp changes. Reviewed-by: Richard Levitte --- Summary of changes: apps/CA.pl.in | 6 +++--- crypto/perlasm/x86_64-xlate.pl | 2 +- util/files.pl | 6 +++--- util/mk1mf.pl | 4 +++- util/mkfiles.pl| 4 ++-- 5 files changed, 12 insertions(+), 10 deletions(-) diff --git a/apps/CA.pl.in b/apps/CA.pl.in index fbba457..f5e8e4a 100644 --- a/apps/CA.pl.in +++ b/apps/CA.pl.in @@ -120,9 +120,9 @@ if ($WHAT eq '-newcert' ) { close OUT; # ask user for existing CA certificate print "CA certificate filename (or enter to create)\n"; -$FILE = ; -$FILE = s|\R$|| if $FILE; -if ($FILE) { +$FILE = "" unless defined($FILE = ); +$FILE =~ s{\R$}{}; +if ($FILE ne "") { copy_pemfile($FILE,"${CATOP}/private/$CAKEY", "PRIVATE"); copy_pemfile($FILE,"${CATOP}/$CACERT", "CERTIFICATE"); } else { diff --git a/crypto/perlasm/x86_64-xlate.pl b/crypto/perlasm/x86_64-xlate.pl index a0b3bc0..0a023fb 100755 --- a/crypto/perlasm/x86_64-xlate.pl +++ b/crypto/perlasm/x86_64-xlate.pl @@ -850,7 +850,7 @@ ___ OPTION DOTNAME ___ } -while($line=<>) { +while(defined($line=<>)) { $line =~ s|\R$||; # Better chomp diff --git a/util/files.pl b/util/files.pl index d984196..32e7125 100755 --- a/util/files.pl +++ b/util/files.pl @@ -25,8 +25,8 @@ while (<>) { $b=$`; # Keep what is before the backslash $o.=$b." "; - $b=<>; - $b =~ s|\R$||; # Better chomp + $b = "" unless defined($b = <>); + $b =~ s{\R$}{}; } else { @@ -43,7 +43,7 @@ while (<>) } } -$pwd=`pwd`; $pwd =~ s|\R$||; +($pwd=`pwd`) =~ s{\R$}{}; if ($sym{'TOP'} eq ".") { diff --git a/util/mk1mf.pl b/util/mk1mf.pl index 3a9f0d7..f29e50b 100755 --- a/util/mk1mf.pl +++ b/util/mk1mf.pl @@ -553,8 +553,10 @@ if ($fips) { open (IN, "util/fipslib_path.txt") || fipslib_error(); $fipslibdir = ; - $fipslibdir =~ s|\R$||; close IN; + $fipslibdir = "" unless defined($fipslibdir); + $fipslibdir =~ s{\R$}{}; + fipslib_error() if ($fipslibdir eq ""); } fips_check_files($fipslibdir, "fipscanister.lib", "fipscanister.lib.sha1", diff --git a/util/mkfiles.pl b/util/mkfiles.pl index 4fbe29a..55dfbc6 100755 --- a/util/mkfiles.pl +++ b/util/mkfiles.pl @@ -107,8 +107,8 @@ while () { $b=$`; $o.=$b." "; - $b=; - $b =~ s|\R$||; + $b = "" unless defined($b = ); + $b =~ s{\R$}{}; } else { _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl master.1064
Build openssl master.1064 failed Commit e314c34073 by Dr. Stephen Henson on 2/13/2016 2:29 AM: fix warnings on 32 bit builds Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#1746 (master - 3c65577)
Build Update for openssl/openssl - Build: #1746 Status: Still Failing Duration: 1 hour, 9 minutes, and 36 seconds Commit: 3c65577 (master) Author: Richard Levitte Message: Rename INSTALL_PREFIX to DESTDIR, remove option --install_prefix INSTALL_PREFIX is a confusing name, as there's also --prefix. Instead, tag along with the rest of the open source world and adopt the Makefile variable DESTDIR to designate the desired staging directory. The Configure option --install_prefix is removed, the only way to designate a staging directory is with the Makefile variable (this is also implemented for VMS' descrip.mms et al). Reviewed-by: Rich SalzView the changeset: https://github.com/openssl/openssl/compare/c619e8101120...3c65577f1af1 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/10232 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Broken: openssl/openssl#1751 (master - 82049c5)
Build Update for openssl/openssl - Build: #1751 Status: Broken Duration: 1 hour, 12 minutes, and 0 seconds Commit: 82049c5 (master) Author: Viktor Dukhovni Message: Move brace outside #ifdef Reviewed-by: Rich SalzView the changeset: https://github.com/openssl/openssl/compare/7687f5255011...82049c543cb7 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108897869 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 2b91ec7575ca94319a979ed9d23106b061dda095 (commit) from 577583519b147ec60e8e241ee12471c2a9c53183 (commit) - Log - commit 2b91ec7575ca94319a979ed9d23106b061dda095 Author: Rich SalzDate: Fri Feb 12 14:40:33 2016 -0500 Put user flags last for priority. Reviewed-by: Richard Levitte --- Summary of changes: Configure | 18 ++ 1 file changed, 10 insertions(+), 8 deletions(-) diff --git a/Configure b/Configure index 0b885d0..2ba33cb 100755 --- a/Configure +++ b/Configure @@ -643,7 +643,7 @@ foreach (@argvcopy) else# common if (/^[-+]/), just pass down... { $_ =~ s/%([0-9a-f]{1,2})/chr(hex($1))/gei; - $user_cflags.=$_." "; + $user_cflags.=" ".$_; } } elsif ($_ =~ /^([^:]+):(.+)$/) @@ -887,10 +887,10 @@ my $no_shared_warn=0; my $no_user_cflags=0; my $no_user_defines=0; -if ($user_cflags ne ""){ $config{cflags}="$user_cflags$config{cflags}"; } -else { $no_user_cflags=1; } -if (@user_defines) { $config{defines}=[ @user_defines, @{$config{defines}} ]; } -else { $no_user_defines=1; } +if ($user_cflags ne "") { $config{cflags}="$config{cflags}$user_cflags"; } +else{ $no_user_cflags=1; } +if (@user_defines) { $config{defines}=[ @{$config{defines}}, @user_defines ]; } +else { $no_user_defines=1;} # The DSO code currently always implements all functions so that no # applications will have to worry about that from a compilation point @@ -1141,30 +1141,32 @@ if (defined($config{api})) { if ($strict_warnings) { my $wopt; + my $addflags = ''; die "ERROR --strict-warnings requires gcc or clang" unless $ecc eq 'gcc' || $ecc eq 'clang'; foreach $wopt (split /\s+/, $gcc_devteam_warn) { - $config{cflags} .= " $wopt" unless ($config{cflags} =~ /(^|\s)$wopt(\s|$)/) + $addflags .= " $wopt" unless ($config{cflags} =~ /(^|\s)$wopt(\s|$)/) } if ($ecc eq "clang") { foreach $wopt (split /\s+/, $clang_devteam_warn) { - $config{cflags} .= " $wopt" unless ($config{cflags} =~ /(^|\s)$wopt(\s|$)/) + $addflags .= " $wopt" unless ($config{cflags} =~ /(^|\s)$wopt(\s|$)/) } } if ($target !~ /^mingw/) { foreach $wopt (split /\s+/, $memleak_devteam_backtrace) { - $config{cflags} .= " $wopt" unless ($config{cflags} =~ /(^|\s)$wopt(\s|$)/) + $addflags .= " $wopt" unless ($config{cflags} =~ /(^|\s)$wopt(\s|$)/) } if ($target =~ /^BSD-/) { $config{ex_libs} .= " -lexecinfo"; } } + $config{cflags} = "$addflags $config{cflags}" if $addflags ne ''; } # If we use the unified build, collect information from build.info files _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Errored: openssl/openssl#1740 (master - 6faffd0)
Build Update for openssl/openssl - Build: #1740 Status: Errored Duration: 50 minutes and 30 seconds Commit: 6faffd0 (master) Author: Richard Levitte Message: Better workaround for VMS getnameinfo() bug The actual bug with current getnameinfo() on VMS is not that it puts gibberish in the service buffer, but that it doesn't touch it at all. The gibberish we dealt with before was simply stuff that happened to be on the stack. It's better to initialise the service buffer properly (with the empty string) and check if it's still an empty string after the getnameinfo() call, and fill it with the direct numerical translation of the raw port if that's the case. Reviewed-by: Rich SalzView the changeset: https://github.com/openssl/openssl/compare/c680f77fb181...6faffd0ad238 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108863808 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_1-stable update
The branch OpenSSL_1_0_1-stable has been updated via 3629c49d7a0f46eebfea87c33c4e3d2864ad6fa8 (commit) from b0b9f693b422ddc643840859a0755b7b4fde92de (commit) - Log - commit 3629c49d7a0f46eebfea87c33c4e3d2864ad6fa8 Author: Andy PolyakovDate: Fri Feb 12 14:07:27 2016 +0100 modes/ctr128.c: pay attention to ecount_buf alignment in CRYPTO_ctr128_encrypt. It's never problem if CRYPTO_ctr128_encrypt is called from EVP, because buffer in question is always aligned within EVP_CIPHER_CTX structure. RT#4218 Reviewed-by: Richard Levitte (cherry picked from commit 5e4bbeb49fb6522d858703201b5adee9611e7b7b) --- Summary of changes: crypto/modes/ctr128.c | 41 + 1 file changed, 17 insertions(+), 24 deletions(-) diff --git a/crypto/modes/ctr128.c b/crypto/modes/ctr128.c index f3bbcbf..bcafd6b 100644 --- a/crypto/modes/ctr128.c +++ b/crypto/modes/ctr128.c @@ -67,23 +67,20 @@ /* increment counter (128-bit int) by 1 */ static void ctr128_inc(unsigned char *counter) { -u32 n = 16; -u8 c; +u32 n = 16, c = 1; do { --n; -c = counter[n]; -++c; -counter[n] = c; -if (c) -return; +c += counter[n]; +counter[n] = (u8)c; +c >>= 8; } while (n); } #if !defined(OPENSSL_SMALL_FOOTPRINT) static void ctr128_inc_aligned(unsigned char *counter) { -size_t *data, c, n; +size_t *data, c, d, n; const union { long one; char little; @@ -91,20 +88,19 @@ static void ctr128_inc_aligned(unsigned char *counter) 1 }; -if (is_endian.little) { +if (is_endian.little || ((size_t)counter % sizeof(size_t)) != 0) { ctr128_inc(counter); return; } data = (size_t *)counter; +c = 1; n = 16 / sizeof(size_t); do { --n; -c = data[n]; -++c; -data[n] = c; -if (c) -return; +d = data[n] += c; +/* did addition carry? */ +c = ((d - c) ^ d) >> (sizeof(size_t) * 8 - 1); } while (n); } #endif @@ -144,14 +140,14 @@ void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out, } # if defined(STRICT_ALIGNMENT) -if (((size_t)in | (size_t)out | (size_t)ivec) % sizeof(size_t) != -0) +if (((size_t)in | (size_t)out | (size_t)ecount_buf) +% sizeof(size_t) != 0) break; # endif while (len >= 16) { (*block) (ivec, ecount_buf, key); ctr128_inc_aligned(ivec); -for (; n < 16; n += sizeof(size_t)) +for (n = 0; n < 16; n += sizeof(size_t)) *(size_t *)(out + n) = *(size_t *)(in + n) ^ *(size_t *)(ecount_buf + n); len -= 16; @@ -189,16 +185,13 @@ void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out, /* increment upper 96 bits of 128-bit counter by 1 */ static void ctr96_inc(unsigned char *counter) { -u32 n = 12; -u8 c; +u32 n = 12, c = 1; do { --n; -c = counter[n]; -++c; -counter[n] = c; -if (c) -return; +c += counter[n]; +counter[n] = (u8)c; +c >>= 8; } while (n); } _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl ct_verify.38
Build openssl ct_verify.38 failed Commit cc1b6d4f2b by Rob Percival on 2/12/2016 12:35 PM: Verify SCT signatures Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via dbf9a33c433dedacbb6e0bc22f7aa87e27af2966 (commit) from 2b91ec7575ca94319a979ed9d23106b061dda095 (commit) - Log - commit dbf9a33c433dedacbb6e0bc22f7aa87e27af2966 Author: Andy PolyakovDate: Fri Feb 12 11:45:44 2016 +0100 .travis.yml: exclude gcc from MacOS X CI builds. Contemporary Xcode gcc is a front-end to clang, so that explicit gcc build is actually redundant on MacOS X. Reviewed-by: Richard Levitte --- Summary of changes: .travis.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.travis.yml b/.travis.yml index 8e365b3..001180e 100644 --- a/.travis.yml +++ b/.travis.yml @@ -52,6 +52,8 @@ matrix: - os: osx compiler: clang-3.6 - os: osx + compiler: gcc +- os: osx compiler: gcc-5 - os: osx compiler: i686-w64-mingw32-gcc _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Fixed: openssl/openssl#1738 (master - c680f77)
Build Update for openssl/openssl - Build: #1738 Status: Fixed Duration: 10 minutes and 18 seconds Commit: c680f77 (master) Author: Richard Levitte Message: Adjust transfer::Text::Template.pm for alternate directory name On VMS, periods in directory names weren't allowed. To counter that, unpackers such as VMSTAR convert periods in directory names to underscores. We need to count that in and add an alternative library path for Text::Template. Reviewed-by: Rich SalzView the changeset: https://github.com/openssl/openssl/compare/a76265574398...c680f77fb181 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108834420 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 82049c543cb71619bc23b4e2313f3f3eb405660a (commit) from 7687f5255011a5a3ca75e8c5427683d58ae411c0 (commit) - Log - commit 82049c543cb71619bc23b4e2313f3f3eb405660a Author: Viktor DukhovniDate: Fri Feb 12 16:36:06 2016 -0500 Move brace outside #ifdef Reviewed-by: Rich Salz --- Summary of changes: ssl/statem/statem_lib.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ssl/statem/statem_lib.c b/ssl/statem/statem_lib.c index 6d4a536..8effb0f 100644 --- a/ssl/statem/statem_lib.c +++ b/ssl/statem/statem_lib.c @@ -623,8 +623,8 @@ int ssl_cert_type(X509 *x, EVP_PKEY *pk) return SSL_PKEY_GOST12_256; case NID_id_GostR3410_2012_512: return SSL_PKEY_GOST12_512; -} #endif +} } int ssl_verify_alarm_type(long type) _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 03ed5e990668a57836d599d2093e762813058362 (commit) via 50e83cdde65dee08c5dc08391d6493452a8acc23 (commit) from 82049c543cb71619bc23b4e2313f3f3eb405660a (commit) - Log - commit 03ed5e990668a57836d599d2093e762813058362 Author: Richard LevitteDate: Wed Feb 10 19:18:33 2016 +0100 We need the linked utils after a full build. We really needs a better util/shlib_wrap.sh, but will have to do for now. Reviewed-by: Rich Salz commit 50e83cdde65dee08c5dc08391d6493452a8acc23 Author: Richard Levitte Date: Fri Feb 12 14:05:06 2016 +0100 Unified build - fix make depend There was a catch 22, where 'make depend' directly after configuring in an otherwise pristine build tree would fail because buildinf.h didn't exist yet. This change has the depend building targets depend on the same other targets as the object file building targets, so the generation of buildinf.h and similar files would kick in during 'make depend'. Reviewed-by: Rich Salz --- Summary of changes: Configurations/README | 8 +--- Configurations/common.tmpl| 1 + Configurations/descrip.mms.tmpl | 3 ++- Configurations/unix-Makefile.tmpl | 7 --- 4 files changed, 12 insertions(+), 7 deletions(-) diff --git a/Configurations/README b/Configurations/README index b67506a..89fc65c 100644 --- a/Configurations/README +++ b/Configurations/README @@ -488,6 +488,7 @@ They are all expected to return a string with the lines they produce. src2dep(obj => "PATH/TO/objectfile", srcs => [ "PATH/TO/sourcefile", ... ], +deps => [ "dep1", ... ], incs => [ "INCL/PATH", ... ]); 'obj' has the dependent object file as well as @@ -496,7 +497,8 @@ They are all expected to return a string with the lines they produce. 'srcs' has the list of source files to build the object file, with the first item being the source file that directly corresponds to the object file. - 'incs' is a list of include file directories. + 'deps' is a list of explicit dependencies. 'incs' + is a list of include file directories. src2obj - function that produces build file lines to build an object file from source files and associated data. @@ -513,8 +515,8 @@ They are all expected to return a string with the lines they produce. 'srcs' has the list of source files to build the object file, with the first item being the source file that directly corresponds to the object file. - 'deps' is a list of dependencies. 'incs' is a list - of include file directories. + 'deps' is a list of explicit dependencies. 'incs' + is a list of include file directories. obj2lib - function that produces build file lines to build a static library file ("libfoo.a" in Unix terms) from diff --git a/Configurations/common.tmpl b/Configurations/common.tmpl index a750e21..3bd7324 100644 --- a/Configurations/common.tmpl +++ b/Configurations/common.tmpl @@ -45,6 +45,7 @@ @{$unified_info{includes}->{$obj}} ]); $OUT .= src2dep(obj => $obj_no_o, srcs => $unified_info{sources}->{$obj}, + deps => [ reducedepends(resolvedepends($obj)) ], incs => [ @{$unified_info{includes}->{$bin}}, @{$unified_info{includes}->{$obj}} ]); } diff --git a/Configurations/descrip.mms.tmpl b/Configurations/descrip.mms.tmpl index 4732782..ef745ed 100644 --- a/Configurations/descrip.mms.tmpl +++ b/Configurations/descrip.mms.tmpl @@ -408,6 +408,7 @@ descrip.mms : {- sourcefile("Configurations", "descrip.mms.tmpl") -} $(SRCDIR)Co sub src2dep { my %args = @_; my $dep = $args{obj}; + my $deps = join(", -\n\t\t", @{$args{srcs}}, @{$args{deps}}); # Because VMS C isn't very good at combining a /INCLUDE path with # #includes having a relative directory (like '#include "../foo.h"), @@ -432,7 +433,7 @@ descrip.mms : {- sourcefile("Configurations", "descrip.mms.tmpl") -} $(SRCDIR)Co my $after = $unified_info{after}->{$dep.".OBJ"} || "\@ !"; return <<"EOF"; -$dep.MMS : $srcs +$dep.MMS : $deps ${before} SET DEFAULT $forward \$(CC) \$(CFLAGS)${incs} /MMS=(TARGET=.OBJ)/OBJECT=${depd}${depn}.MMS $srcs diff --git
[openssl-commits] [openssl] master update
The branch master has been updated via c619e81011209ec7c52763a07479081fc15076f1 (commit) from dbf9a33c433dedacbb6e0bc22f7aa87e27af2966 (commit) - Log - commit c619e81011209ec7c52763a07479081fc15076f1 Author: Andy PolyakovDate: Fri Feb 12 14:13:06 2016 +0100 Update .gitignore. Not all git versions understand **/Makefile, but all recognize that filename without any path applies to all directories. Reviewed-by: Richard Levitte --- Summary of changes: .gitignore | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.gitignore b/.gitignore index 4bbd89b..34505ca 100644 --- a/.gitignore +++ b/.gitignore @@ -11,7 +11,6 @@ # Top level excludes /Makefile.orig -/Makefile /MINFO /TABLE /*.a @@ -23,7 +22,8 @@ /tmp.* /configdata.pm -**/Makefile +# *all* Makefiles +Makefile /test/*.ss /test/*.srl _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 7687f5255011a5a3ca75e8c5427683d58ae411c0 (commit) from 5e4bbeb49fb6522d858703201b5adee9611e7b7b (commit) - Log - commit 7687f5255011a5a3ca75e8c5427683d58ae411c0 Author: Andy PolyakovDate: Fri Feb 12 14:46:02 2016 +0100 evp/e_des[3].c: address compiler warnings, fix formatting. RT#4210 Reviewed-by: Richard Levitte --- Summary of changes: crypto/evp/e_des.c | 35 ++- crypto/evp/e_des3.c | 31 +++ 2 files changed, 41 insertions(+), 25 deletions(-) diff --git a/crypto/evp/e_des.c b/crypto/evp/e_des.c index c083e3f..1afd917 100644 --- a/crypto/evp/e_des.c +++ b/crypto/evp/e_des.c @@ -70,12 +70,13 @@ typedef struct { DES_key_schedule ks; } ks; union { -void (*cbc) (const void *, void *, size_t, const void *, void *); +void (*cbc) (const void *, void *, size_t, + const DES_key_schedule *, unsigned char *); } stream; } EVP_DES_KEY; # if defined(AES_ASM) && (defined(__sparc) || defined(__sparc__)) -/* -^^^ this is not a typo, just a way to detect that +/* --^^^ this is not a typo, just a way to detect that * assembler support was in general requested... */ # include "sparc_arch.h" @@ -85,9 +86,9 @@ extern unsigned int OPENSSL_sparcv9cap_P[]; void des_t4_key_expand(const void *key, DES_key_schedule *ks); void des_t4_cbc_encrypt(const void *inp, void *out, size_t len, -DES_key_schedule *ks, unsigned char iv[8]); +const DES_key_schedule *ks, unsigned char iv[8]); void des_t4_cbc_decrypt(const void *inp, void *out, size_t len, -DES_key_schedule *ks, unsigned char iv[8]); +const DES_key_schedule *ks, unsigned char iv[8]); # endif static int des_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, @@ -136,20 +137,24 @@ static int des_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, { EVP_DES_KEY *dat = (EVP_DES_KEY *) EVP_CIPHER_CTX_cipher_data(ctx); -if (dat->stream.cbc) { -(*dat->stream.cbc) (in, out, inl, >ks.ks, EVP_CIPHER_CTX_iv_noconst(ctx)); +if (dat->stream.cbc != NULL) { +(*dat->stream.cbc) (in, out, inl, >ks.ks, +EVP_CIPHER_CTX_iv_noconst(ctx)); return 1; } while (inl >= EVP_MAXCHUNK) { -DES_ncbc_encrypt(in, out, (long)EVP_MAXCHUNK, EVP_CIPHER_CTX_cipher_data(ctx), - (DES_cblock *)EVP_CIPHER_CTX_iv_noconst(ctx), EVP_CIPHER_CTX_encrypting(ctx)); +DES_ncbc_encrypt(in, out, (long)EVP_MAXCHUNK, + EVP_CIPHER_CTX_cipher_data(ctx), + (DES_cblock *)EVP_CIPHER_CTX_iv_noconst(ctx), + EVP_CIPHER_CTX_encrypting(ctx)); inl -= EVP_MAXCHUNK; in += EVP_MAXCHUNK; out += EVP_MAXCHUNK; } if (inl) DES_ncbc_encrypt(in, out, (long)inl, EVP_CIPHER_CTX_cipher_data(ctx), - (DES_cblock *)EVP_CIPHER_CTX_iv_noconst(ctx), EVP_CIPHER_CTX_encrypting(ctx)); + (DES_cblock *)EVP_CIPHER_CTX_iv_noconst(ctx), + EVP_CIPHER_CTX_encrypting(ctx)); return 1; } @@ -194,7 +199,8 @@ static int des_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, for (n = 0; n < chunk * 8; ++n) { c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0; DES_cfb_encrypt(c, d, 1, 1, EVP_CIPHER_CTX_cipher_data(ctx), -(DES_cblock *)EVP_CIPHER_CTX_iv_noconst(ctx), EVP_CIPHER_CTX_encrypting(ctx)); +(DES_cblock *)EVP_CIPHER_CTX_iv_noconst(ctx), +EVP_CIPHER_CTX_encrypting(ctx)); out[n / 8] = (out[n / 8] & ~(0x80 >> (unsigned int)(n % 8))) | ((d[0] & 0x80) >> (unsigned int)(n % 8)); @@ -213,15 +219,18 @@ static int des_cfb8_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { while (inl >= EVP_MAXCHUNK) { -DES_cfb_encrypt(in, out, 8, (long)EVP_MAXCHUNK, EVP_CIPHER_CTX_cipher_data(ctx), -(DES_cblock *)EVP_CIPHER_CTX_iv_noconst(ctx), EVP_CIPHER_CTX_encrypting(ctx)); +DES_cfb_encrypt(in, out, 8, (long)EVP_MAXCHUNK, +EVP_CIPHER_CTX_cipher_data(ctx), +(DES_cblock *)EVP_CIPHER_CTX_iv_noconst(ctx), +EVP_CIPHER_CTX_encrypting(ctx)); inl -= EVP_MAXCHUNK; in += EVP_MAXCHUNK; out += EVP_MAXCHUNK; } if (inl) DES_cfb_encrypt(in, out, 8, (long)inl, EVP_CIPHER_CTX_cipher_data(ctx), -
[openssl-commits] [openssl] master update
The branch master has been updated via 577583519b147ec60e8e241ee12471c2a9c53183 (commit) from d1dc699ac6e5ada11b1f5b1695e403dce638 (commit) - Log - commit 577583519b147ec60e8e241ee12471c2a9c53183 Author: Andy PolyakovDate: Fri Feb 12 11:28:22 2016 +0100 ec/asm/ecp_nistz256-armv8.pl: fix test_ssl spurious errors. RT#4237 Reviewed-by: Matt Caswell --- Summary of changes: crypto/ec/asm/ecp_nistz256-armv8.pl | 3 +++ 1 file changed, 3 insertions(+) diff --git a/crypto/ec/asm/ecp_nistz256-armv8.pl b/crypto/ec/asm/ecp_nistz256-armv8.pl index 9d1bce1..ce6b69e 100644 --- a/crypto/ec/asm/ecp_nistz256-armv8.pl +++ b/crypto/ec/asm/ecp_nistz256-armv8.pl @@ -1289,6 +1289,9 @@ $code.=<<___; stp $acc0,$acc1,[$rp_real,#$i] stp $acc2,$acc3,[$rp_real,#$i+16] ___ +$code.=<<___ if ($i == 0); + adr $bp_real,.Lone_mont-64 +___ } $code.=<<___; ldp $acc0,$acc1,[$ap_real,#$i] // in1 _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 3c65577f1af1109beb8de06420efa09188981628 (commit) from c619e81011209ec7c52763a07479081fc15076f1 (commit) - Log - commit 3c65577f1af1109beb8de06420efa09188981628 Author: Richard LevitteDate: Fri Feb 12 21:14:03 2016 +0100 Rename INSTALL_PREFIX to DESTDIR, remove option --install_prefix INSTALL_PREFIX is a confusing name, as there's also --prefix. Instead, tag along with the rest of the open source world and adopt the Makefile variable DESTDIR to designate the desired staging directory. The Configure option --install_prefix is removed, the only way to designate a staging directory is with the Makefile variable (this is also implemented for VMS' descrip.mms et al). Reviewed-by: Rich Salz --- Summary of changes: CHANGES | 6 ++ Configurations/descrip.mms.tmpl | 24 +++-- Configurations/unix-Makefile.tmpl | 198 +++--- Configure | 9 -- INSTALL | 5 +- Makefile.in | 142 +-- apps/Makefile.in | 28 +++--- crypto/async/Makefile.in | 4 +- crypto/srp/Makefile.in| 2 +- crypto/ts/Makefile.in | 2 +- engines/Makefile.in | 10 +- openssl.spec | 2 +- tools/Makefile.in | 20 ++-- util/cygwin.sh| 20 ++-- 14 files changed, 233 insertions(+), 239 deletions(-) diff --git a/CHANGES b/CHANGES index 29a00bc..cf7d272 100644 --- a/CHANGES +++ b/CHANGES @@ -4,6 +4,12 @@ Changes between 1.0.2f and 1.1.0 [xx XXX ] + *) The INSTALL_PREFIX Makefile variable has been renamed to + DESTDIR. That makes for less confusion on what this variable + is for. Also, the configuration option --install_prefix is + removed. + [Richard Levitte] + *) Heartbeat for TLS has been removed and is disabled by default for DTLS; configure with enable-heartbeats. Code that uses the old #define's might need to be updated. diff --git a/Configurations/descrip.mms.tmpl b/Configurations/descrip.mms.tmpl index 0d5c7ba..4732782 100644 --- a/Configurations/descrip.mms.tmpl +++ b/Configurations/descrip.mms.tmpl @@ -106,15 +106,13 @@ PROGRAMS={- join(", ", map { "-\n\t".$_.".EXE" } grep { !m|^\[\.test\]| } @{$uni TESTPROGS={- join(", ", map { "-\n\t".$_.".EXE" } grep { m|^\[\.test\]| } @{$unified_info{programs}}) -} SCRIPTS={- join(", ", map { "-\n\t".$_ } @{$unified_info{scripts}}) -} -# INSTALL_PREFIX is for package builders so that they can configure for, say, +# DESTDIR is for package builders so that they can configure for, say, # SYS$COMMON:[OPENSSL] and yet have everything installed in STAGING:[USER]. # In that case, configure with --prefix=SYS$COMMON:[OPENSSL] and then run -# MMS with /MACROS=(INSTALL_PREFIX=STAGING:[USER]). The result will end -# up in STAGING:[USER.OPENSSL]. -# Note that INSTALL_PREFIX can also be given at configuration time, with -# --install_prefix. +# MMS with /MACROS=(DESTDIR=STAGING:[USER]). The result will end up in +# STAGING:[USER.OPENSSL]. # Normally it is left empty. -INSTALL_PREFIX={- $config{install_prefix} -} +DESTDIR= # Do not edit this manually. Use Configure --prefix=DIR to change this! INSTALLTOP={- catdir($config{prefix}) || "SYS\$COMMON:[OPENSSL-\$(MAJOR).\$(MINOR)]" -} @@ -160,7 +158,7 @@ NODEBUG=@ $(NODEBUG) internal_inc3 = F$PARSE("{- catdir($config{sourcedir},"[.crypto.include.internal]") -}","A.;",,,"SYNTAX_ONLY") - "A.;" $(NODEBUG) DEFINE openssl 'openssl_inc1','openssl_inc2' $(NODEBUG) DEFINE internal 'internal_inc1','internal_inc2','internal_inc3' -$(NODEBUG) staging_dir = "$(INSTALL_PREFIX)" +$(NODEBUG) staging_dir = "$(DESTDIR)" $(NODEBUG) IF staging_dir .NES. "" THEN - staging_dir = F$PARSE("A.;",staging_dir,"[]",,"SYNTAX_ONLY") - "A.;" $(NODEBUG) ! @@ -179,7 +177,7 @@ NODEBUG=@ $(NODEBUG) ! $(NODEBUG) datatop = F$PARSE("$(OPENSSLDIR)","[00]A.;",,,"SYNTAX_ONLY") - - "]A.;" + ".]" -$(NODEBUG) IF "$(INSTALL_PREFIX)" .EQS. "" THEN - +$(NODEBUG) IF "$(DESTDIR)" .EQS. "" THEN - DEFINE ossl_dataroot 'datatop' $(NODEBUG) ! $(NODEBUG) ! Figure out the architecture @@ -193,7 +191,7 @@ NODEBUG=@ .LAST : $(NODEBUG) {- join("\n\t\$(NODEBUG) ", map { "DEASSIGN ".uc($_) } map { $unified_info{sharednames}->{$_} || () } @{$unified_info{libraries}}) || "!" -} -$(NODEBUG) IF "$(INSTALL_PREFIX)" .EQS. "" THEN DEASSIGN ossl_dataroot +$(NODEBUG) IF "$(DESTDIR)" .EQS. "" THEN DEASSIGN
[openssl-commits] Build failed: openssl ct_policy.39
Build openssl ct_policy.39 failed Commit d9bf3e6aeb by Rob Percival on 2/12/2016 12:55 PM: CT policy validation Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Fixed: openssl/openssl#1742 (master - 5775835)
Build Update for openssl/openssl - Build: #1742 Status: Fixed Duration: 1 hour, 21 minutes, and 53 seconds Commit: 5775835 (master) Author: Andy Polyakov Message: ec/asm/ecp_nistz256-armv8.pl: fix test_ssl spurious errors. RT#4237 Reviewed-by: Matt CaswellView the changeset: https://github.com/openssl/openssl/compare/d1dc699ac6e5...577583519b14 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108885530 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#1744 (master - dbf9a33)
Build Update for openssl/openssl - Build: #1744 Status: Still Failing Duration: 1 hour, 7 minutes, and 56 seconds Commit: dbf9a33 (master) Author: Andy Polyakov Message: .travis.yml: exclude gcc from MacOS X CI builds. Contemporary Xcode gcc is a front-end to clang, so that explicit gcc build is actually redundant on MacOS X. Reviewed-by: Richard LevitteView the changeset: https://github.com/openssl/openssl/compare/2b91ec7575ca...dbf9a33c433d View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108886918 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#1741 (master - d1dc699)
Build Update for openssl/openssl - Build: #1741 Status: Still Failing Duration: 25 minutes and 18 seconds Commit: d1dc699 (master) Author: Richard Levitte Message: Now that we have good verbosity, turn it on for Travis It's nearly impossible to determine what goes wrong in the tests running there without this. Reviewed-by: Rich SalzView the changeset: https://github.com/openssl/openssl/compare/6faffd0ad238...d1dc699ac6e5 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108876291 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via e314c340736830a6fc0260cf72cc51ea0c227e9d (commit) from 03ed5e990668a57836d599d2093e762813058362 (commit) - Log - commit e314c340736830a6fc0260cf72cc51ea0c227e9d Author: Dr. Stephen HensonDate: Fri Feb 12 22:24:39 2016 + fix warnings on 32 bit builds Reviewed-by: Viktor Dukhovni --- Summary of changes: include/openssl/e_os2.h | 6 +- test/dtlsv1listentest.c | 4 ++-- 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/include/openssl/e_os2.h b/include/openssl/e_os2.h index 04e1c05..519b8ce 100644 --- a/include/openssl/e_os2.h +++ b/include/openssl/e_os2.h @@ -317,7 +317,11 @@ typedef unsigned __int64 uint64_t; * isn't available or did not define it, just go with hard-coded. */ # ifndef PRIu64 -# define PRIu64 "lu" +# ifdef SIXTY_FOUR_BIT_LONG +# define PRIu64 "lu" +# else +# define PRIu64 "llu" +# endif # endif /* ossl_inline: portable inline definition usable in public headers */ diff --git a/test/dtlsv1listentest.c b/test/dtlsv1listentest.c index d12d93a..78ac83a 100644 --- a/test/dtlsv1listentest.c +++ b/test/dtlsv1listentest.c @@ -377,7 +377,7 @@ int main(void) char *data; long datalen; int ret, success = 0; -size_t i; +long i; ctx = SSL_CTX_new(DTLS_server_method()); if (ctx == NULL || peer == NULL) @@ -397,7 +397,7 @@ int main(void) SSL_set_wbio(ssl, outbio); success = 1; -for (i = 0; i < OSSL_NELEM(testpackets) && success; i++) { +for (i = 0; i < (long)OSSL_NELEM(testpackets) && success; i++) { inbio = BIO_new_mem_buf((char *)testpackets[i].in, testpackets[i].inlen); if (inbio == NULL) { _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#1745 (master - c619e81)
Build Update for openssl/openssl - Build: #1745 Status: Still Failing Duration: 51 minutes and 28 seconds Commit: c619e81 (master) Author: Andy Polyakov Message: Update .gitignore. Not all git versions understand **/Makefile, but all recognize that filename without any path applies to all directories. Reviewed-by: Richard LevitteView the changeset: https://github.com/openssl/openssl/compare/dbf9a33c433d...c619e8101120 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/108887384 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl OpenSSL_1_0_1-stable.1058
Build openssl OpenSSL_1_0_1-stable.1058 failed Commit 3629c49d7a by Andy Polyakov on 2/12/2016 9:01 PM: modes/ctr128.c: pay attention to ecount_buf alignment in CRYPTO_ctr128_encrypt. Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl ct_ssl.40
Build openssl ct_ssl.40 failed Commit 2c4c402ed1 by Rob Percival on 2/12/2016 1:03 PM: Extends s_client to allow a basic CT policy to be enabled Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits