[openssl-commits] Build failed in Jenkins: 1_0_2_basic #416

2016-02-27 Thread openssl . sanity
See 

Changes:

[kurt] Revert "Don't check RSA_FLAG_SIGN_VER."

[appro] modes/asm/ghash-x86_64.pl: refine GNU assembler version detection.

[rsalz] Fix possible memory leak on BUF_MEM_grow_clean failure

[rsalz] Fix two possible leaks

--
[...truncated 2517 lines...]
NIST curve B-409 -- Generator:
 x = 
0x15D4860D088DDB3496B0C6064756260441CDE4AF1771D4DB01FFE5B34E59703DC255A868A1180515603AEAB60794E54BB7996A7
 y = 
0x61B1CFAB6BE5F32BBFA78324ED106A7636B9C5A7BD198D0158AA4F5488D08F38514F1FDF4B4F40D2181B3681C364BA0273C706
verify degree ... ok
verify group order  ok
long/negative scalar tests allowing precomputation ... without precomputation 
... ok

NIST curve K-571 -- Generator:
 x = 
0x26EB7A859923FBC82189631F8103FE4AC9CA2970012D5D46024804801841CA44370958493B205E647DA304DB4CEB08CBBD1BA39494776FB988B47174DCA88C7E2945283A01C8972
 y = 
0x349DC807F4FBF374F4AEADE3BCA95314DD58CEC9F307A54FFC61EFC006D8A2C9D4979C0AC44AEA74FBEBBB9F772AEDCB620B01A7BA7AF1B320430C8591984F601CD4C143EF1C7A3
verify degree ... ok
verify group order  ok
long/negative scalar tests allowing precomputation ... without precomputation 
... ok

NIST curve B-571 -- Generator:
 x = 
0x303001D34B856296C16C0D40D3CD7750A93D1D2955FA80AA5F40FC8DB7B2ABDBDE53950F4C0D293CDD711A35B67FB1499AE60038614F1394ABFA3B4C850D927E1E7769C8EEC2D19
 y = 
0x37BF27342DA639B6DCCFFFEB73D69D78C6C27A6009CBBCA1980F8533921E8A684423E43BAB08A576291AF8F461BB2A8B3531D2F0485C19B16E2F1516E23DD3C1A4827AF1B8AC15B
verify degree ... ok
verify group order  ok
long/negative scalar tests allowing precomputation ... without precomputation 
... ok
combined multiplication . ok

testing internal curves: 
.
 ok

test ecdsa
../util/shlib_wrap.sh ./ecdsatest
some tests from X9.62:
testing prime192v1:  ok
testing prime239v1:  ok
testing c2tnb191v1:  ok
testing c2tnb239v1:  ok

testing ECDSA_sign() and ECDSA_verify() with some internal curves:
secp160k1:  ok
secp160r1:  ok
secp160r2:  ok
secp192k1:  ok
secp224k1:  ok
secp224r1:  ok
secp256k1:  ok
secp384r1:  ok
secp521r1:  ok
prime192v1:  ok
prime192v2:  ok
prime192v3:  ok
prime239v1:  ok
prime239v2:  ok
prime239v3:  ok
prime256v1:  ok
sect163k1:  ok
sect163r1:  ok
sect163r2:  ok
sect193r1:  ok
sect193r2:  ok
sect233k1:  ok
sect233r1:  ok
sect239k1:  ok
sect283k1:  ok
sect283r1:  ok
sect409k1:  ok
sect409r1:  ok
sect571k1:  ok
sect571r1:  ok
c2pnb163v1:  ok
c2pnb163v2:  ok
c2pnb163v3:  ok
c2pnb176v1:  ok
c2tnb191v1:  ok
c2tnb191v2:  ok
c2tnb191v3:  ok
c2pnb208w1:  ok
c2tnb239v1:  ok
c2tnb239v2:  ok
c2tnb239v3:  ok
c2pnb272w1:  ok
c2pnb304w1:  ok
c2tnb359v1:  ok
c2pnb368w1:  ok
c2tnb431r1:  ok
wap-wsg-idm-ecid-wtls3:  ok
wap-wsg-idm-ecid-wtls5:  ok
wap-wsg-idm-ecid-wtls7:  ok
wap-wsg-idm-ecid-wtls9:  ok
wap-wsg-idm-ecid-wtls10:  ok
wap-wsg-idm-ecid-wtls11:  ok
wap-wsg-idm-ecid-wtls12:  ok
brainpoolP160r1:  ok
brainpoolP160t1:  ok
brainpoolP192r1:  ok
brainpoolP192t1:  ok
brainpoolP224r1:  ok
brainpoolP224t1:  ok
brainpoolP256r1:  ok
brainpoolP256t1:  ok
brainpoolP320r1:  ok
brainpoolP320t1:  ok
brainpoolP384r1:  ok
brainpoolP384t1:  ok
brainpoolP512r1:  ok
brainpoolP512t1:  ok

ECDSA test passed
test ecdh
../util/shlib_wrap.sh ./ecdhtest
Testing key generation with NIST Prime-Curve P-192  ok
Testing key generation with NIST Prime-Curve P-224  ok
Testing key generation with NIST Prime-Curve P-256  ok
Testing key generation with NIST Prime-Curve P-384  ok
Testing key generation with NIST Prime-Curve P-521  ok
Testing key generation with NIST Binary-Curve K-163  ok
Testing key generation with NIST Binary-Curve B-163  ok
Testing key generation with NIST Binary-Curve K-233  ok
Testing key generation with NIST Binary-Curve B-233  ok
Testing key generation with NIST Binary-Curve K-283  ok
Testing key generation with NIST Binary-Curve B-283  ok
Testing key generation with NIST Binary-Curve K-409  ok
Testing key generation with NIST Binary-Curve B-409  ok
Testing key generation with NIST Binary-Curve K-571  ok
Testing key generation with NIST Binary-Curve B-571  ok
Testing ECDH shared secret with Brainpool Prime-Curve brainpoolP256r1 ok
Testing ECDH shared secret with Brainpool Prime-Curve brainpoolP384r1 ok
Testing ECDH shared secret with 

[openssl-commits] Build failed: openssl master.1576

2016-02-27 Thread AppVeyor



Build openssl master.1576 failed


Commit 228e248d44 by Diego F. Aranha on 2/28/2016 3:04 AM:

Attempt these two again.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.1570

2016-02-27 Thread AppVeyor



Build openssl master.1570 failed


Commit ab018e52e0 by Diego F. Aranha on 2/28/2016 1:28 AM:

Found other places to improve BN_CTX handling and simplified point2oct.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#2230 (master - c490b9b)

2016-02-27 Thread Travis CI
Build Update for openssl/openssl
-

Build: #2230
Status: Errored

Duration: 17 minutes and 16 seconds
Commit: c490b9b (master)
Author: Ben Laurie
Message: testutil.c includes e_os.h.

Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/openssl/openssl/compare/b6453a68bbb3...c490b9b5c275

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/112262876

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.1566

2016-02-27 Thread AppVeyor



Build openssl master.1566 failed


Commit 83b3f1a03f by kirill on 2/28/2016 12:42 AM:

Optimized BIO mem read - without reallocation


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.1565

2016-02-27 Thread AppVeyor



Build openssl master.1565 failed


Commit 340da949cc by Richard Levitte on 2/28/2016 12:16 AM:

Make generation of dependency files more efficient when possible


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Richard Levitte
The branch master has been updated
   via  340da949ccde13f6506177e327ccc21f49f56d3b (commit)
  from  e0b5108c605b541252e601608ff70e8fb57d256f (commit)


- Log -
commit 340da949ccde13f6506177e327ccc21f49f56d3b
Author: Richard Levitte 
Date:   Sun Feb 28 00:20:50 2016 +0100

Make generation of dependency files more efficient when possible

When building with GNU C, clang or VMS C, it's more efficient to
generate dependency file and object file in one call rather than two.
Have the dependency output in a temporary file and compare it with the
previous one if available to see if replacement is waranted, thereby
avoiding unnecessary reconstruction of Makefile / descrip.mms.

Github issue #750

Reviewed-by: Rich Salz 

---

Summary of changes:
 Configurations/descrip.mms.tmpl   | 14 +-
 Configurations/unix-Makefile.tmpl | 11 ++-
 2 files changed, 11 insertions(+), 14 deletions(-)

diff --git a/Configurations/descrip.mms.tmpl b/Configurations/descrip.mms.tmpl
index eb60b4a..b7e047b 100644
--- a/Configurations/descrip.mms.tmpl
+++ b/Configurations/descrip.mms.tmpl
@@ -435,19 +435,15 @@ configdata.pm : {- sourcefile("Configurations", 
"descrip.mms.tmpl") -} $(SRCDIR)
   my $after = $unified_info{after}->{$obj.".OBJ"} || "\@ !";
 
   return <<"EOF";
-$obj.MMS : $deps
+$obj.OBJ : $deps
 ${before}
 SET DEFAULT $forward
-\$(CC) \$(CFLAGS)${incs} 
/MMS=(FILE=${objd}${objn}.MMS,TARGET=$obj.OBJ) /NOOBJECT $srcs
-SET DEFAULT $backward
-${after}
-- PURGE $obj.MMS
-$obj.OBJ : $obj.MMS
-${before}
-SET DEFAULT $forward
-\$(CC) \$(CFLAGS)${incs} /OBJECT=${objd}${objn}.OBJ 
/REPOSITORY=$backward $srcs
+\$(CC) \$(CFLAGS)${incs} 
/MMS=(FILE=${objd}${objn}.tmp-MMS,TARGET=$obj.OBJ) /OBJECT=${objd}${objn}.OBJ 
/REPOSITORY=$backward $srcs
 SET DEFAULT $backward
 ${after}
+\@ PIPE ( \$(PERL) -e "use File::Compare qw/compare_text/; my \$x = 
compare_text(""$obj.MMS"",""$obj.tmp-MMS""); exit(0x1000 + (\$x == 0));" || 
-
+ RENAME $obj.tmp-MMS $obj.mms )
+\@ IF F\$SEARCH("$obj.tmp-MMS") .NES. "" THEN DELETE $obj.tmp-MMS;*
 - PURGE $obj.OBJ
 EOF
   }
diff --git a/Configurations/unix-Makefile.tmpl 
b/Configurations/unix-Makefile.tmpl
index b9fc5f8..cff0023 100644
--- a/Configurations/unix-Makefile.tmpl
+++ b/Configurations/unix-Makefile.tmpl
@@ -847,11 +847,12 @@ $obj$objext: $obj$depext
 EOF
   }
   return <<"EOF";
-$obj$depext: $deps
-   \$(CC) \$(CFLAGS) $ecflags$incs -MM -MF \$\@ -MQ $obj$objext $srcs
-   touch \$\@
-$obj$objext: $obj$depext
-   \$(CC) \$(CFLAGS) $ecflags$incs -c -o \$\@ $srcs
+$obj$objext: $deps
+   \$(CC) \$(CFLAGS) $ecflags$incs -MMD -MF $obj$depext.tmp -MT \$\@ -c -o 
\$\@ $srcs
+   \@touch $obj$depext.tmp
+   \@if ! cmp $obj$depext.tmp $obj$depext > /dev/null 2> /dev/null; then \\
+   mv $obj$depext.tmp $obj$depext; \\
+   fi
 EOF
   }
   # On Unix, we build shlibs from static libs, so we're ignoring the
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Rich Salz
The branch master has been updated
   via  e0b5108c605b541252e601608ff70e8fb57d256f (commit)
  from  d631602533d2e06f9a7a7645ee66638190e0db54 (commit)


- Log -
commit e0b5108c605b541252e601608ff70e8fb57d256f
Author: Jeffrey Walton 
Date:   Sat Feb 27 17:08:50 2016 -0500

RT4354: Add some cross-refs

Stack Overflow has a number of questions related to mutual authentication,
the client and its certificate. Those visiting the man pages for functions
like SSL_CTX_use_certificate and SSL_CTX_load_verify_locations don't
receive the benefit of a cross reference to SSL_CTX_set_client_CA_list.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 doc/ssl/SSL_CTX_load_verify_locations.pod | 3 ++-
 doc/ssl/SSL_CTX_use_certificate.pod   | 1 +
 2 files changed, 3 insertions(+), 1 deletion(-)

diff --git a/doc/ssl/SSL_CTX_load_verify_locations.pod 
b/doc/ssl/SSL_CTX_load_verify_locations.pod
index de388d3..53e119e 100644
--- a/doc/ssl/SSL_CTX_load_verify_locations.pod
+++ b/doc/ssl/SSL_CTX_load_verify_locations.pod
@@ -141,6 +141,7 @@ L,
 L,
 L,
 L,
-L
+L,
+L
 
 =cut
diff --git a/doc/ssl/SSL_CTX_use_certificate.pod 
b/doc/ssl/SSL_CTX_use_certificate.pod
index 2bb0ea6..13bb277 100644
--- a/doc/ssl/SSL_CTX_use_certificate.pod
+++ b/doc/ssl/SSL_CTX_use_certificate.pod
@@ -154,6 +154,7 @@ L, L, L,
 L,
 L,
 L,
+L,
 L,
 L
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Richard Levitte
The branch master has been updated
   via  e5ed5f6a595748e2d447ac7af2823471d2f91f45 (commit)
  from  d3cdab17362b9ab0f1a0525b736c862937a9cd2f (commit)


- Log -
commit e5ed5f6a595748e2d447ac7af2823471d2f91f45
Author: Richard Levitte 
Date:   Sat Feb 27 21:23:01 2016 +0100

Remove last remains of old config strings

Reviewed-by: Andy Polyakov 

---

Summary of changes:
 Configure | 5 -
 1 file changed, 5 deletions(-)

diff --git a/Configure b/Configure
index 09376c8..274712e 100755
--- a/Configure
+++ b/Configure
@@ -677,11 +677,6 @@ foreach (@argvcopy)
$user_cflags.=" ".$_;
}
}
-   elsif ($_ =~ /^([^:]+):(.+)$/)
-   {
-   eval "\$table{\$1} = \"$2\""; # allow $xxx constructs in the 
string
-   $target=$1;
-   }
else
{
die "target already defined - $target (offending arg: $_)\n" if 
($target ne "");
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Andy Polyakov
The branch master has been updated
   via  d3cdab17362b9ab0f1a0525b736c862937a9cd2f (commit)
  from  f218822871957a841acf63a3e39a7e8eecdd05b4 (commit)


- Log -
commit d3cdab17362b9ab0f1a0525b736c862937a9cd2f
Author: Andy Polyakov 
Date:   Wed Feb 24 20:07:06 2016 +0100

modes/asm/ghash-x86_64.pl: refine GNU assembler version detection.

Even though AVX support was added in GAS 2.19 vpclmulqdq was apparently
added in 2.20.

Reviewed-by: Rich Salz 

---

Summary of changes:
 crypto/modes/asm/aesni-gcm-x86_64.pl | 2 +-
 crypto/modes/asm/ghash-x86_64.pl | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/crypto/modes/asm/aesni-gcm-x86_64.pl 
b/crypto/modes/asm/aesni-gcm-x86_64.pl
index 53b961b..8f5026b 100644
--- a/crypto/modes/asm/aesni-gcm-x86_64.pl
+++ b/crypto/modes/asm/aesni-gcm-x86_64.pl
@@ -44,7 +44,7 @@ die "can't locate x86_64-xlate.pl";
 
 if (`$ENV{CC} -Wa,-v -c -o /dev/null -x assembler /dev/null 2>&1`
=~ /GNU assembler version ([2-9]\.[0-9]+)/) {
-   $avx = ($1>=2.19) + ($1>=2.22);
+   $avx = ($1>=2.20) + ($1>=2.22);
 }
 
 if (!$avx && $win64 && ($flavour =~ /nasm/ || $ENV{ASM} =~ /nasm/) &&
diff --git a/crypto/modes/asm/ghash-x86_64.pl b/crypto/modes/asm/ghash-x86_64.pl
index 47a80eb..006215e 100644
--- a/crypto/modes/asm/ghash-x86_64.pl
+++ b/crypto/modes/asm/ghash-x86_64.pl
@@ -93,7 +93,7 @@ die "can't locate x86_64-xlate.pl";
 
 if (`$ENV{CC} -Wa,-v -c -o /dev/null -x assembler /dev/null 2>&1`
=~ /GNU assembler version ([2-9]\.[0-9]+)/) {
-   $avx = ($1>=2.19) + ($1>=2.22);
+   $avx = ($1>=2.20) + ($1>=2.22);
 }
 
 if (!$avx && $win64 && ($flavour =~ /nasm/ || $ENV{ASM} =~ /nasm/) &&
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Andy Polyakov
The branch master has been updated
   via  f218822871957a841acf63a3e39a7e8eecdd05b4 (commit)
  from  80757ad46b0a75755d1d051d03b3d9810e292063 (commit)


- Log -
commit f218822871957a841acf63a3e39a7e8eecdd05b4
Author: Andy Polyakov 
Date:   Sun Feb 21 21:16:36 2016 +0100

chacha/asm/chacha-*.pl: fix typos in tail processing.

RT#4323

Reviewed-by: Rich Salz 

---

Summary of changes:
 crypto/chacha/asm/chacha-armv4.pl  | 22 +++---
 crypto/chacha/asm/chacha-s390x.pl  |  6 +++---
 crypto/chacha/asm/chacha-x86_64.pl |  8 
 3 files changed, 18 insertions(+), 18 deletions(-)

diff --git a/crypto/chacha/asm/chacha-armv4.pl 
b/crypto/chacha/asm/chacha-armv4.pl
index 55ebc9e..6c20755 100755
--- a/crypto/chacha/asm/chacha-armv4.pl
+++ b/crypto/chacha/asm/chacha-armv4.pl
@@ -440,9 +440,9 @@ $code.=<<___;
eorhs   @x[4],@x[4],@t[0]
eorhs   @x[5],@x[5],@t[1]
 # ifdef__thumb2__
-   it  hi
+it ne
 # endif
-ldrhi  @t[0],[sp,#4*(32+2)]@ re-load len
+ldrne  @t[0],[sp,#4*(32+2)]@ re-load len
 # ifdef__thumb2__
itt hs
 # endif
@@ -584,9 +584,9 @@ ___
 }
 $code.=<<___;
 # ifdef__thumb2__
-   it  hi
+   it  ne
 # endif
-   ldrhi   @t[0],[sp,#4*(32+2)]@ re-load len
+   ldrne   @t[0],[sp,#4*(32+2)]@ re-load len
 # ifdef__thumb2__
it  hs
 # endif
@@ -598,15 +598,15 @@ $code.=<<___;
 
 .Ltail:
ldr r12,[sp,#4*(32+1)]  @ load inp
-   add @t[2],sp,#4*(0)
+   add @t[1],sp,#4*(0)
ldr r14,[sp,#4*(32+0)]  @ load out
 
 .Loop_tail:
-   ldrb@t[0],[@t[2]],#1@ read buffer on stack
-   ldrb@t[1],[r12],#1  @ read input
-   subs@t[3],@t[3],#1
-   eor @t[0],@t[0],@t[1]
-   strb@t[0],[r14],#1  @ store output
+   ldrb@t[2],[@t[1]],#1@ read buffer on stack
+   ldrb@t[3],[r12],#1  @ read input
+   subs@t[0],@t[0],#1
+   eor @t[3],@t[3],@t[2]
+   strb@t[3],[r14],#1  @ store output
bne .Loop_tail
 
 .Ldone:
@@ -1120,7 +1120,7 @@ $code.=<<___;
 # endif
stmia   @t[0],{@x[0]-@x[7]}
 add@t[2],sp,#4*(0)
-sub@t[3],@t[0],#64*3   @ len-=64*3
+sub@t[3],@t[3],#64*3   @ len-=64*3
 
 .Loop_tail_neon:
ldrb@t[0],[@t[2]],#1@ read buffer on stack
diff --git a/crypto/chacha/asm/chacha-s390x.pl 
b/crypto/chacha/asm/chacha-s390x.pl
index e637dc2..00e4a14 100755
--- a/crypto/chacha/asm/chacha-s390x.pl
+++ b/crypto/chacha/asm/chacha-s390x.pl
@@ -257,11 +257,11 @@ $code.=<<___;
 st @x[1],4*9(@t[0])
 x  @x[3],4*11(%r14)
 st @x[2],4*10(@t[0])
-   la  %r14,64(%r14)
 st @x[3],4*11(@t[0])
 
cl${g}r %r14,@t[1]  # done yet?
-   jle .Loop_outer
+   la  %r14,64(%r14)
+   jl  .Loop_outer
 
 .Ldone:
xgr %r0,%r0
@@ -291,7 +291,7 @@ $code.=<<___;
lrvr@x[1],@x[1]
lrvr@x[2],@x[2]
lrvr@x[3],@x[3]
-   stm @x[0],@x[3],$stdframe+4*8+4*8($sp)
+   stm @x[0],@x[3],$stdframe+4*8($sp)
 
 .Loop_tail:
llgc@x[4],0(@x[6],%r14)
diff --git a/crypto/chacha/asm/chacha-x86_64.pl 
b/crypto/chacha/asm/chacha-x86_64.pl
index 107fc70..4b36b58 100755
--- a/crypto/chacha/asm/chacha-x86_64.pl
+++ b/crypto/chacha/asm/chacha-x86_64.pl
@@ -1544,13 +1544,13 @@ $code.=<<___;
je  .Ldone4xop
 
lea 0x40($inp),$inp # inp+=64*3
-   vmovdqa $xa2,0x00(%rsp)
+   vmovdqa $xa3,0x00(%rsp)
xor %r10,%r10
-   vmovdqa $xb2,0x10(%rsp)
+   vmovdqa $xb3,0x10(%rsp)
lea 0x40($out),$out # out+=64*3
-   vmovdqa $xc2,0x20(%rsp)
+   vmovdqa $xc3,0x20(%rsp)
sub \$192,$len  # len-=64*3
-   vmovdqa $xd2,0x30(%rsp)
+   vmovdqa $xd3,0x30(%rsp)
 
 .Loop_tail4xop:
movzb   ($inp,%r10),%eax
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Failed: FdaSilvaYY/openssl#79 (fix-leaks-on-102 - 7331d3e)

2016-02-27 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #79
Status: Failed

Duration: 2 minutes and 17 seconds
Commit: 7331d3e (fix-leaks-on-102)
Author: FdaSilvaYY
Message: Fix two possible leaks

Backport of 98637bd

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/b41c6b8c234f...7331d3e2e9d0

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/112258118

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#78 (ex_data-fixes - 6074f7c)

2016-02-27 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #78
Status: Errored

Duration: 1 hour, 19 minutes, and 16 seconds
Commit: 6074f7c (ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_set_ex_data return value

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/801f36abb27c...6074f7c97998

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/112257366

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Dr . Stephen Henson
The branch master has been updated
   via  80757ad46b0a75755d1d051d03b3d9810e292063 (commit)
  from  ba8108154dafb081b510cc628783c6b44c95cb0e (commit)


- Log -
commit 80757ad46b0a75755d1d051d03b3d9810e292063
Author: Dr. Stephen Henson 
Date:   Sat Feb 27 13:06:17 2016 +

Reformat and update EC_KEY_new manual page.

Add some missing parentheses and reformat.

Document EC_KEY_oct2key(), EC_KEY_key2buf(), EC_KEY_oct2priv(),
EC_KEY_priv2oct() and EC_KEY_priv2buf()

Reviewed-by: Rich Salz 

---

Summary of changes:
 doc/crypto/EC_KEY_new.pod | 142 ++
 1 file changed, 106 insertions(+), 36 deletions(-)

diff --git a/doc/crypto/EC_KEY_new.pod b/doc/crypto/EC_KEY_new.pod
index 2d7194e..6bfd180 100644
--- a/doc/crypto/EC_KEY_new.pod
+++ b/doc/crypto/EC_KEY_new.pod
@@ -2,7 +2,16 @@
 
 =head1 NAME
 
-EC_KEY_new, EC_KEY_get_flags, EC_KEY_set_flags, EC_KEY_clear_flags, 
EC_KEY_new_by_curve_name, EC_KEY_free, EC_KEY_copy, EC_KEY_dup, EC_KEY_up_ref, 
EC_KEY_get0_group, EC_KEY_set_group, EC_KEY_get0_private_key, 
EC_KEY_set_private_key, EC_KEY_get0_public_key, EC_KEY_set_public_key, 
EC_KEY_get_enc_flags, EC_KEY_set_enc_flags, EC_KEY_get_conv_form, 
EC_KEY_set_conv_form, EC_KEY_set_asn1_flag, EC_KEY_precompute_mult, 
EC_KEY_generate_key, EC_KEY_check_key, EC_KEY_set_public_key_affine_coordinates 
- Functions for creating, destroying and manipulating B objects.
+EC_KEY_new, EC_KEY_get_flags, EC_KEY_set_flags, EC_KEY_clear_flags,
+EC_KEY_new_by_curve_name, EC_KEY_free, EC_KEY_copy, EC_KEY_dup, EC_KEY_up_ref,
+EC_KEY_get0_group, EC_KEY_set_group, EC_KEY_get0_private_key,
+EC_KEY_set_private_key, EC_KEY_get0_public_key, EC_KEY_set_public_key,
+EC_KEY_get_enc_flags, EC_KEY_set_enc_flags, EC_KEY_get_conv_form,
+EC_KEY_set_conv_form, EC_KEY_set_asn1_flag, EC_KEY_precompute_mult,
+EC_KEY_generate_key, EC_KEY_check_key, 
EC_KEY_set_public_key_affine_coordinates,
+EC_KEY_oct2key, EC_KEY_key2buf, EC_KEY_oct2priv, EC_KEY_priv2oct,
+EC_KEY_priv2buf - Functions for creating, destroying and manipulating
+EC_KEY objects.
 
 =head1 SYNOPSIS
 
@@ -30,61 +39,120 @@ EC_KEY_new, EC_KEY_get_flags, EC_KEY_set_flags, 
EC_KEY_clear_flags, EC_KEY_new_b
  int EC_KEY_precompute_mult(EC_KEY *key, BN_CTX *ctx);
  int EC_KEY_generate_key(EC_KEY *key);
  int EC_KEY_check_key(const EC_KEY *key);
- int EC_KEY_set_public_key_affine_coordinates(EC_KEY *key, BIGNUM *x, BIGNUM 
*y);
+ int EC_KEY_set_public_key_affine_coordinates(EC_KEY *key,
+  BIGNUM *x, BIGNUM *y);
  const EC_KEY_METHOD *EC_KEY_get_method(const EC_KEY *key);
  int EC_KEY_set_method(EC_KEY *key, const EC_KEY_METHOD *meth);
 
+ int EC_KEY_oct2key(EC_KEY *eckey, const unsigned char *buf, size_t len,
+BN_CTX *ctx);
+ size_t EC_KEY_key2buf(const EC_KEY *eckey, point_conversion_form_t form,
+   unsigned char **pbuf, BN_CTX *ctx);
+
+ int EC_KEY_oct2priv(EC_KEY *eckey, unsigned char *buf, size_t len);
+ size_t EC_KEY_priv2oct(const EC_KEY *eckey, unsigned char *buf, size_t len);
+
+ size_t EC_KEY_priv2buf(const EC_KEY *eckey, unsigned char **pbuf);
+
 =head1 DESCRIPTION
 
-An EC_KEY represents a public key and (optionally) an associated private key. 
A new EC_KEY (with no associated curve) can be constructed by calling 
EC_KEY_new().
-The reference count for the newly created EC_KEY is initially set to 1. A 
curve can be associated with the EC_KEY by calling
+An EC_KEY represents a public key and, optionally, the associated private
+key. A new EC_KEY with no associated curve can be constructed by calling
+EC_KEY_new(). The reference count for the newly created EC_KEY is initially
+set to 1. A curve can be associated with the EC_KEY by calling
 EC_KEY_set_group().
 
-Alternatively a new EC_KEY can be constructed by calling 
EC_KEY_new_by_curve_name() and supplying the nid of the associated curve. Refer 
to L for a description of curve names. This function simply 
wraps calls to EC_KEY_new() and
-EC_GROUP_new_by_curve_name().
+Alternatively a new EC_KEY can be constructed by calling
+EC_KEY_new_by_curve_name() and supplying the nid of the associated curve. See
+L for a description of curve names. This function simply
+wraps calls to EC_KEY_new() and EC_GROUP_new_by_curve_name().
 
-Calling EC_KEY_free() decrements the reference count for the EC_KEY object, 
and if it has dropped to zero then frees the memory associated
-with it.
-If B is NULL nothing is done.
+Calling EC_KEY_free() decrements the reference count for the EC_KEY object,
+and if it has dropped to zero then frees the memory associated with it.  If
+B is NULL nothing is done.
 
 EC_KEY_copy() copies the contents of the EC_KEY in B into B.
 
 EC_KEY_dup() creates a 

[openssl-commits] [openssl] master update

2016-02-27 Thread Rich Salz
The branch master has been updated
   via  ba8108154dafb081b510cc628783c6b44c95cb0e (commit)
  from  6ab364149d8b76b5d2341a2e708e727cad060416 (commit)


- Log -
commit ba8108154dafb081b510cc628783c6b44c95cb0e
Author: Rich Salz 
Date:   Sat Feb 27 13:24:28 2016 -0500

RT2275: use BIO_sock_nbio()

Now that BIO_sock_nbio is available, use it in the apps.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 apps/s_client.c | 14 ++
 apps/s_server.c | 29 ++---
 2 files changed, 8 insertions(+), 35 deletions(-)

diff --git a/apps/s_client.c b/apps/s_client.c
index 9889cb0..85fca1f 100644
--- a/apps/s_client.c
+++ b/apps/s_client.c
@@ -168,11 +168,6 @@ typedef unsigned int u_int;
 #include "s_apps.h"
 #include "timeouts.h"
 
-#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 7000)
-/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
-# undef FIONBIO
-#endif
-
 #if defined(__has_feature)
 # if __has_feature(memory_sanitizer)
 #  include 
@@ -792,9 +787,7 @@ OPTIONS s_client_options[] = {
 #ifdef WATT32
 {"wdebug", OPT_WDEBUG, '-', "WATT-32 tcp debugging"},
 #endif
-#ifdef FIONBIO
 {"nbio", OPT_NBIO, '-', "Use non-blocking IO"},
-#endif
 #ifndef OPENSSL_NO_PSK
 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity"},
 {"psk", OPT_PSK, 's', "PSK in hex (without 0x)"},
@@ -1705,16 +1698,13 @@ int s_client_main(int argc, char **argv)
 }
 BIO_printf(bio_c_out, "CONNECTED(%08X)\n", s);
 
-#ifdef FIONBIO
 if (c_nbio) {
-unsigned long l = 1;
-BIO_printf(bio_c_out, "turning on non blocking io\n");
-if (BIO_socket_ioctl(s, FIONBIO, ) < 0) {
+if (!BIO_socket_nbio(s, 1)) {
 ERR_print_errors(bio_err);
 goto end;
 }
+BIO_printf(bio_c_out, "Turned on non blocking io\n");
 }
-#endif
 if (socket_type == SOCK_DGRAM) {
 
 sbio = BIO_new_dgram(s, BIO_NOCLOSE);
diff --git a/apps/s_server.c b/apps/s_server.c
index 6645dc8..c28aa51 100644
--- a/apps/s_server.c
+++ b/apps/s_server.c
@@ -185,11 +185,6 @@ typedef unsigned int u_int;
 #include "s_apps.h"
 #include "timeouts.h"
 
-#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 7000)
-/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
-# undef FIONBIO
-#endif
-
 static int not_resumable_sess_cb(SSL *s, int is_forward_secure);
 static int sv_body(int s, int stype, unsigned char *context);
 static int www_body(int s, int stype, unsigned char *context);
@@ -226,9 +221,7 @@ static const char *s_cert_file = TEST_CERT, *s_key_file =
 
 static const char *s_cert_file2 = TEST_CERT2, *s_key_file2 = NULL;
 static char *s_dcert_file = NULL, *s_dkey_file = NULL, *s_dchain_file = NULL;
-#ifdef FIONBIO
 static int s_nbio = 0;
-#endif
 static int s_nbio_test = 0;
 static int s_crlf = 0;
 static SSL_CTX *ctx = NULL;
@@ -948,9 +941,7 @@ OPTIONS s_server_options[] = {
 OPT_S_OPTIONS,
 OPT_V_OPTIONS,
 OPT_X_OPTIONS,
-#ifdef FIONBIO
 {"nbio", OPT_NBIO, '-', "Use non-blocking IO"},
-#endif
 #ifndef OPENSSL_NO_PSK
 {"psk_hint", OPT_PSK_HINT, 's', "PSK identity hint to use"},
 {"psk", OPT_PSK, 's', "PSK in hex (without 0x)"},
@@ -2072,16 +2063,12 @@ static int sv_body(int s, int stype, unsigned char 
*context)
 #endif
 
 buf = app_malloc(bufsize, "server buffer");
-#ifdef FIONBIO
 if (s_nbio) {
-unsigned long sl = 1;
-
-if (!s_quiet)
-BIO_printf(bio_err, "turning on non blocking io\n");
-if (BIO_socket_ioctl(s, FIONBIO, ) < 0)
+if (!BIO_socket_nbio(s, 1))
 ERR_print_errors(bio_err);
+else if (!s_quiet)
+BIO_printf(bio_err, "Turned on non blocking io\n");
 }
-#endif
 
 if (con == NULL) {
 con = SSL_new(ctx);
@@ -2670,16 +2657,12 @@ static int www_body(int s, int stype, unsigned char 
*context)
 if ((io == NULL) || (ssl_bio == NULL))
 goto err;
 
-#ifdef FIONBIO
 if (s_nbio) {
-unsigned long sl = 1;
-
-if (!s_quiet)
-BIO_printf(bio_err, "turning on non blocking io\n");
-if (BIO_socket_ioctl(s, FIONBIO, ) < 0)
+if (!BIO_socket_nbio(s, 1))
 ERR_print_errors(bio_err);
+else if (!s_quiet)
+BIO_printf(bio_err, "Turned on non blocking io\n");
 }
-#endif
 
 /* lets make the output buffer a reasonable size */
 if (!BIO_set_write_buffer_size(io, bufsize))
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Richard Levitte
The branch master has been updated
   via  b23238f9aa95bcc31a369d3b24616f4f99691052 (commit)
  from  150a4790cb01d003b2eb9b86c9906efc4353e6d9 (commit)


- Log -
commit b23238f9aa95bcc31a369d3b24616f4f99691052
Author: Richard Levitte 
Date:   Sat Feb 27 19:12:14 2016 +0100

Keep a cache of files that already have a recipe, in common.tmpl

We don't want recipes for the same files generated more than once

Reviewed-by: Rich Salz 

---

Summary of changes:
 Configurations/common.tmpl | 13 -
 1 file changed, 12 insertions(+), 1 deletion(-)

diff --git a/Configurations/common.tmpl b/Configurations/common.tmpl
index f8f37ae..7e452dd 100644
--- a/Configurations/common.tmpl
+++ b/Configurations/common.tmpl
@@ -1,6 +1,7 @@
 {- # -*- Mode: perl -*-
 
- my $a;
+ # A cache of objects for which a recipe has already been generated
+ my %cache;
 
  # resolvedepends and reducedepends work in tandem to make sure
  # there are no duplicate dependencies and that they are in the
@@ -35,6 +36,7 @@
  # object files as well as dependency files.
  sub doobj {
  my $obj = shift;
+ return "" if $cache{$obj};
  (my $obj_no_o = $obj) =~ s|\.o$||;
  my $bin = shift;
  my %opts = @_;
@@ -46,6 +48,7 @@
@{$unified_info{includes}->{$obj}} ],
  %opts);
  }
+ $cache{$obj} = 1;
  }
 
  # dolib is responsible for building libraries.  It will call
@@ -54,6 +57,7 @@
  # built.
  sub dolib {
  my $lib = shift;
+ return "" if $cache{$lib};
  unless ($disabled{shared}) {
  my %ordinals =
  $unified_info{ordinals}->{$lib}
@@ -69,6 +73,7 @@
  objs => [ map { (my $x = $_) =~ s|\.o$||; $x }
@{$unified_info{sources}->{$lib}} ]);
  map { doobj($_, $lib, intent => "lib") } 
@{$unified_info{sources}->{$lib}};
+ $cache{$lib} = 1;
  }
 
  # doengine is responsible for building engines.  It will call
@@ -76,31 +81,37 @@
  # are built.
  sub doengine {
  my $lib = shift;
+ return "" if $cache{$lib};
  $OUT .= obj2dso(lib => $lib,
  objs => [ map { (my $x = $_) =~ s|\.o$||; $x }
@{$unified_info{sources}->{$lib}} ],
  deps => [ resolvedepends($lib) ]);
  map { doobj($_, $lib, intent => "dso") } 
@{$unified_info{sources}->{$lib}};
+ $cache{$lib} = 1;
  }
 
  # dobin is responsible for building programs.  It will call obj2bin,
  # and also makes sure all object files for the library are built.
  sub dobin {
  my $bin = shift;
+ return "" if $cache{$bin};
  my $deps = [ reducedepends(resolvedepends($bin)) ];
  $OUT .= obj2bin(bin => $bin,
  objs => [ map { (my $x = $_) =~ s|\.o$||; $x }
@{$unified_info{sources}->{$bin}} ],
  deps => $deps);
  map { doobj($_, $bin, intent => "bin") } 
@{$unified_info{sources}->{$bin}};
+ $cache{$bin} = 1;
  }
 
  # dobin is responsible for building scripts from templates.  It will
  # call in2script.
  sub doscript {
  my $script = shift;
+ return "" if $cache{$script};
  $OUT .= in2script(script => $script,
sources => $unified_info{sources}->{$script});
+ $cache{$script} = 1;
  }
 
  # Build all known libraries, engines, programs and scripts.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#77 (more-spelling - 2a8aa7c)

2016-02-27 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #77
Status: Errored

Duration: 35 minutes and 7 seconds
Commit: 2a8aa7c (more-spelling)
Author: FdaSilvaYY
Message: More spelling fix

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/5d2fa79d2e90...2a8aa7ca4d8a

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/112257115

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl OpenSSL_1_0_2-stable.1536

2016-02-27 Thread AppVeyor



Build openssl OpenSSL_1_0_2-stable.1536 failed


Commit e0066a13d1 by FdaSilvaYY on 1/29/2016 6:53 PM:

Fix two possible leaks


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl ct_test_buildinfo.124

2016-02-27 Thread AppVeyor



Build openssl ct_test_buildinfo.124 failed


Commit 2af0aa3ced by Rob Percival on 2/26/2016 7:20 PM:

ct_test uses testutil, so include that in SOURCE[ct_test]


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#76 (master - 7930221)

2016-02-27 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #76
Status: Errored

Duration: 1 hour, 13 minutes, and 46 seconds
Commit: 7930221 (master)
Author: Richard Levitte
Message: Apply default after having checked the given config target is valid

Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/a8d177acf0bb...79302211cc17

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/112256748

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Ben Laurie
The branch master has been updated
   via  150a4790cb01d003b2eb9b86c9906efc4353e6d9 (commit)
  from  c490b9b5c2758e427efa8bfa80f9dfbd5c4a06c0 (commit)


- Log -
commit 150a4790cb01d003b2eb9b86c9906efc4353e6d9
Author: Ben Laurie 
Date:   Sat Feb 27 16:19:34 2016 +

FreeBSD, at least, can restrict symbols in a shared library - so use the
Linux target that does that.

Reviewed-by: Rich Salz 
Reviewed-by: Richard Levitte 

---

Summary of changes:
 Makefile.shared | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/Makefile.shared b/Makefile.shared
index 2e9f3f5..c556129 100644
--- a/Makefile.shared
+++ b/Makefile.shared
@@ -562,7 +562,8 @@ symlink.cygwin symlink.alpha-osf1 symlink.tru64 
symlink.tru64-rpath:
 
 # Compatibility targets
 link_dso.bsd-gcc-shared link_dso.linux-shared link_dso.gnu-shared: link_dso.gnu
-link_shlib.bsd-gcc-shared link_shlib.gnu-shared: link_shlib.gnu
+link_shlib.bsd-gcc-shared: link_shlib.linux-shared
+link_shlib.gnu-shared: link_shlib.gnu
 link_app.bsd-gcc-shared link_app.linux-shared link_app.gnu-shared: link_app.gnu
 symlink.bsd-gcc-shared symlink.bsd-shared symlink.linux-shared 
symlink.gnu-shared: symlink.gnu
 link_dso.bsd-shared: link_dso.bsd
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Ben Laurie
The branch master has been updated
   via  c490b9b5c2758e427efa8bfa80f9dfbd5c4a06c0 (commit)
  from  b6453a68bbb34c901a2eaf24012d0a3afcbf52ff (commit)


- Log -
commit c490b9b5c2758e427efa8bfa80f9dfbd5c4a06c0
Author: Ben Laurie 
Date:   Sat Feb 27 12:44:31 2016 +

testutil.c includes e_os.h.

Reviewed-by: Rich Salz 

---

Summary of changes:
 test/build.info | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/test/build.info b/test/build.info
index d39b5ab..3e21e83 100644
--- a/test/build.info
+++ b/test/build.info
@@ -204,7 +204,7 @@ INCLUDE[dtlsv1listentest]={- 
rel2abs(catdir($builddir,"../include")) -} .. ../in
 DEPEND[dtlsv1listentest]=../libssl
 
 SOURCE[ct_test]=ct_test.c testutil.c
-INCLUDE[ct_test]={- rel2abs(catdir($builddir,"../include")) -} 
../crypto/include ../include
+INCLUDE[ct_test]={- rel2abs(catdir($builddir,"../include")) -} 
../crypto/include ../include ..
 DEPEND[ct_test]=../libcrypto
 
 SOURCE[threadstest]=threadstest.c
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Rich Salz
The branch master has been updated
   via  b6453a68bbb34c901a2eaf24012d0a3afcbf52ff (commit)
  from  79302211cc171d5b7c443448434b8565efa1d2c8 (commit)


- Log -
commit b6453a68bbb34c901a2eaf24012d0a3afcbf52ff
Author: FdaSilvaYY 
Date:   Fri Feb 26 20:30:15 2016 +0100

GH753: More spelling fix

Signed-off-by: Rich Salz 
Reviewed-by: Kurt Roeckx 

---

Summary of changes:
 CHANGES |  2 +-
 Configurations/10-main.conf |  4 ++--
 Configurations/README   |  6 +++---
 Configurations/README.design| 12 ++--
 crypto/asn1/bio_ndef.c  |  2 +-
 doc/ssl/ssl.pod |  4 ++--
 include/openssl/opensslv.h  |  2 +-
 test/recipes/40-test_rehash.t   |  2 +-
 test/recipes/70-test_tlsextms.t |  4 ++--
 9 files changed, 19 insertions(+), 19 deletions(-)

diff --git a/CHANGES b/CHANGES
index be2330d..e0ac799 100644
--- a/CHANGES
+++ b/CHANGES
@@ -71,7 +71,7 @@
  The "unified" build system is aimed to be a common system for all
  platforms we support.  With it comes new support for VMS.
 
- This system builds supports building in a differnt directory tree
+ This system builds supports building in a different directory tree
  than the source tree.  It produces one Makefile (for unix family
  or lookalikes), or one descrip.mms (for VMS).
 
diff --git a/Configurations/10-main.conf b/Configurations/10-main.conf
index 6e5e71a..2ad53e7 100644
--- a/Configurations/10-main.conf
+++ b/Configurations/10-main.conf
@@ -284,7 +284,7 @@
 #   more sense?
 # - Keep in mind that the HP compiler by default generates code
 #   suitable for execution on the host you're currently compiling at.
-#   If the toolkit is ment to be used on various PA-RISC processors
+#   If the toolkit is meant to be used on various PA-RISC processors
 #   consider './Configure hpux-parisc-[g]cc +DAportable'.
 # - -DMD32_XARRAY triggers workaround for compiler bug we ran into in
 #   32-bit message digests. (For the moment of this writing) HP C
@@ -292,7 +292,7 @@
 #   chew forever:-). For more details look-up MD32_XARRAY comment in
 #   crypto/sha/sha_lcl.h.
 # - originally there were 32-bit hpux-parisc2-* targets. They were
-#   scrapped, because a) they were not interchangable with other 32-bit
+#   scrapped, because a) they were not interchangeable with other 32-bit
 #   targets; a) when critical 32-bit assembly modules detect if they
 #   are executed on PA-RISC 2.0 and thus adequate performance is
 #   provided. 
diff --git a/Configurations/README b/Configurations/README
index c031884..1885157 100644
--- a/Configurations/README
+++ b/Configurations/README
@@ -216,7 +216,7 @@ In each table entry, the following keys are significant:
 'inherit_from' that indicate what other configurations to inherit
 data from.  These are resolved recursively.
 
-Inheritance works as a set of default values that can be overriden
+Inheritance works as a set of default values that can be overridden
 by corresponding key values in the inheriting configuration.
 
 Note 1: any configuration table can be used as a template.
@@ -530,7 +530,7 @@ They are all expected to return a string with the lines 
they produce.
 
   'lib' has the intended library file name *without*
   extension, libobj2shlib is expected to add that.
-  'shlib' has the correcponding shared library name
+  'shlib' has the corresponding shared library name
   *without* extension.  'deps' has the list of other
   libraries (also *without* extension) this library
   needs to be linked with.  'objs' has the list of
@@ -596,7 +596,7 @@ the build file actions run with the build tree top as 
current working
 directory.
 
 Make sure to end the section with these functions with a string that
-you thing is apropriate for the resulting build file.  If nothing
+you thing is appropriate for the resulting build file.  If nothing
 else, end it like this:
 
   "";   # Make sure no lingering values end up in the Makefile
diff --git a/Configurations/README.design b/Configurations/README.design
index 362b967..8b94e22 100644
--- a/Configurations/README.design
+++ b/Configurations/README.design
@@ -28,11 +28,11 @@ information needed to build output files, and therefore 
only (with a
 few possible exceptions [1]) have information about end products (such
 as scripts, library files and programs) and source files (such as C
 files, C header files, assembler files, etc).  Intermediate files such
-as object files are rarely directly refered to in build.info files (and
+as object files are rarely directly referred to in build.info files (and
 when they are, it's always with the file name extension .o), 

[openssl-commits] Build failed: openssl ct_x509_log_names.123

2016-02-27 Thread AppVeyor



Build openssl ct_x509_log_names.123 failed


Commit 63681d4308 by Rob Percival on 2/26/2016 6:12 PM:

Makes x509 app show name of CT log that each SCT came from


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl 1.0.9

2016-02-27 Thread AppVeyor



Build openssl 1.0.9 failed


Commit bfe02ea512 by Andrea Grandi on 2/27/2016 6:14 AM:

Remove unnecessary memset() to 0 and check for NULL before OPENSSL_free()


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: agrandi/openssl#10 (speed-async - bfe02ea)

2016-02-27 Thread Travis CI
Build Update for agrandi/openssl
-

Build: #10
Status: Errored

Duration: 21 minutes and 29 seconds
Commit: bfe02ea (speed-async)
Author: Andrea Grandi
Message: Remove unnecessary memset() to 0 and check for NULL before 
OPENSSL_free()

View the changeset: 
https://github.com/agrandi/openssl/compare/40d2f5865799...bfe02ea5122c

View the full build log and details: 
https://travis-ci.org/agrandi/openssl/builds/112235369

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-02-27 Thread Richard Levitte
The branch master has been updated
   via  79302211cc171d5b7c443448434b8565efa1d2c8 (commit)
  from  800fe8e339f0926b0ddda9cd1959c19bd17dc65b (commit)


- Log -
commit 79302211cc171d5b7c443448434b8565efa1d2c8
Author: Richard Levitte 
Date:   Sat Feb 27 10:23:15 2016 +0100

Apply default after having checked the given config target is valid

Reviewed-by: Rich Salz 

---

Summary of changes:
 Configure | 5 -
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/Configure b/Configure
index b1985ea..09376c8 100755
--- a/Configure
+++ b/Configure
@@ -841,10 +841,13 @@ if ($d) {
 }
 $config{target} = $target;
 delete $table{$base_target}->{template}; # or the next test will fail.
-my %target = ( %{$table{$base_target}}, resolve_config($target) );
+my %target = resolve_config($target);
 
  if (!%target || $target{template});
 
+# Set up defaults
+my %target = ( %{$table{$base_target}}, %target );
+
 $target{exe_extension}="";
 $target{exe_extension}=".exe" if ($config{target} eq "DJGPP"
   || $config{target} =~ /^(?:Cygwin|mingw)/);
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl ct_ssl.122

2016-02-27 Thread AppVeyor



Build openssl ct_ssl.122 failed


Commit 7e743e93fc by Rob Percival on 2/26/2016 6:10 PM:

Extends s_client to allow a basic CT policy to be enabled


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2016-02-27 Thread Kurt Roeckx
The branch OpenSSL_1_0_1-stable has been updated
   via  f16bc6f06c8eb454b8fcb457ef890c185d1d5746 (commit)
  from  a801bf263849a2ef773e5bc0c86438cbba720835 (commit)


- Log -
commit f16bc6f06c8eb454b8fcb457ef890c185d1d5746
Author: Kurt Roeckx 
Date:   Sat Feb 27 13:38:01 2016 +0100

Revert "Don't check RSA_FLAG_SIGN_VER."

This reverts commit 23a58779f53a9060c823d00d76b3070cad61d9a3.

This broke existing engines that didn't properly implement the sign and 
verify
functions.

Reviewed-by: Richard Levitte 

MR: #2077

---

Summary of changes:
 crypto/rsa/rsa_sign.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/crypto/rsa/rsa_sign.c b/crypto/rsa/rsa_sign.c
index cf4c026..41c827f 100644
--- a/crypto/rsa/rsa_sign.c
+++ b/crypto/rsa/rsa_sign.c
@@ -84,7 +84,7 @@ int RSA_sign(int type, const unsigned char *m, unsigned int 
m_len,
 return 0;
 }
 #endif
-if (rsa->meth->rsa_sign) {
+if ((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_sign) {
 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa);
 }
 /* Special case: SSL signature, just check the length */
@@ -304,7 +304,7 @@ int RSA_verify(int dtype, const unsigned char *m, unsigned 
int m_len,
const unsigned char *sigbuf, unsigned int siglen, RSA *rsa)
 {
 
-if (rsa->meth->rsa_verify) {
+if ((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_verify) {
 return rsa->meth->rsa_verify(dtype, m, m_len, sigbuf, siglen, rsa);
 }
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2016-02-27 Thread Kurt Roeckx
The branch OpenSSL_1_0_2-stable has been updated
   via  5361af815d1cf6510202bb0ff32fa98af50e1ba7 (commit)
  from  578b956fe741bf8e84055547b1e83c28dd902c73 (commit)


- Log -
commit 5361af815d1cf6510202bb0ff32fa98af50e1ba7
Author: Kurt Roeckx 
Date:   Sat Feb 20 15:29:45 2016 +0100

Revert "Don't check RSA_FLAG_SIGN_VER."

This reverts commit 6656ba7152dfe4bba865e327dd362ea08544aa80.

This broke existing engines that didn't properly implement the sign and 
verify
functions.

Reviewed-by: Richard Levitte 

MR: #2077

---

Summary of changes:
 crypto/rsa/rsa_sign.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/crypto/rsa/rsa_sign.c b/crypto/rsa/rsa_sign.c
index ed63a1d..82ca832 100644
--- a/crypto/rsa/rsa_sign.c
+++ b/crypto/rsa/rsa_sign.c
@@ -84,7 +84,7 @@ int RSA_sign(int type, const unsigned char *m, unsigned int 
m_len,
 return 0;
 }
 #endif
-if (rsa->meth->rsa_sign) {
+if ((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_sign) {
 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa);
 }
 /* Special case: SSL signature, just check the length */
@@ -293,7 +293,7 @@ int RSA_verify(int dtype, const unsigned char *m, unsigned 
int m_len,
const unsigned char *sigbuf, unsigned int siglen, RSA *rsa)
 {
 
-if (rsa->meth->rsa_verify) {
+if ((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_verify) {
 return rsa->meth->rsa_verify(dtype, m, m_len, sigbuf, siglen, rsa);
 }
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#2196 (master - 875856e)

2016-02-27 Thread Travis CI
Build Update for openssl/openssl
-

Build: #2196
Status: Errored

Duration: 9 minutes and 54 seconds
Commit: 875856e (master)
Author: Emilia Kasper
Message: Don't build sanitizer builds with --debug

They're too slow.

Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/openssl/openssl/compare/b6e785842a8e...875856efd6a6

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/112066827

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl ct_verify.120

2016-02-27 Thread AppVeyor



Build openssl ct_verify.120 failed


Commit 94ada916b4 by Rob Percival on 2/26/2016 6:03 PM:

Fixes potential double free and memory leak in ct_b64.c


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits