[openssl-commits] Fixed: mouse07410/openssl#2 (OpenSSL_1_0_2-stable - 0ca6764)

2016-04-25 Thread Travis CI
Build Update for mouse07410/openssl
-

Build: #2
Status: Fixed

Duration: 4 minutes and 37 seconds
Commit: 0ca6764 (OpenSSL_1_0_2-stable)
Author: Matt Caswell
Message: Fix a signed/unsigned warning

This causes a compilation failure when using --strict-warnings in 1.0.2
and 1.0.1

Reviewed-by: Viktor Dukhovni 

View the changeset: 
https://github.com/mouse07410/openssl/compare/2442382e11c0...0ca67644dded

View the full build log and details: 
https://travis-ci.org/mouse07410/openssl/builds/125737313

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Failed: FdaSilvaYY/openssl#585 (ex_data-fixes - d35091b)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #585
Status: Failed

Duration: 26 minutes and 50 seconds
Commit: d35091b (ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_set_ex_data return value
Fix possible leak in danetest.c

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/2cc2d1d30249...d35091b0e095

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125706938

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Failed: FdaSilvaYY/openssl#584 (set_ex_data-fixes - d35091b)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #584
Status: Failed

Duration: 23 minutes and 32 seconds
Commit: d35091b (set_ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_set_ex_data return value
Fix possible leak in danetest.c

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/2cc2d1d30249...d35091b0e095

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125706778

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Passed: FdaSilvaYY/openssl#583 (new_ex_data-fixes - 20ed268)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #583
Status: Passed

Duration: 22 minutes and 13 seconds
Commit: 20ed268 (new_ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_new_ex_data return value...
with some adaptation to new multi-threading API.

Once reference, lock, meth and flag fields are setup,
DSA_free/DH_free can be called directly.

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/e3331237e910^...20ed2680d7c6

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125706502

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#582 (set_ex_data-fixes - 2cc2d1d)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #582
Status: Errored

Duration: 15 seconds
Commit: 2cc2d1d (set_ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_new_ex_data return value...
with some adaptation to new multi-threading API.

Once reference, lock, meth and flag fields are setup,
DSA_free/DH_free can be called directly.

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/set_ex_data-fixes

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125706188

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#581 (ex_data-fixes - 2cc2d1d)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #581
Status: Errored

Duration: 6 minutes and 8 seconds
Commit: 2cc2d1d (ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_new_ex_data return value...
with some adaptation to new multi-threading API.

Once reference, lock, meth and flag fields are setup,
DSA_free/DH_free can be called directly.

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/2e68243796bc...2cc2d1d30249

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125704473

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#574 (ex_data-fixes - 3c194b7)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #574
Status: Errored

Duration: 4 minutes and 30 seconds
Commit: 3c194b7 (ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_new_ex_data return value
 with some adaptation to new multi-threading API.

Once reference, lock, meth, and flag fields are setup,  DSA_free/DH_free
can be called directly.

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/c61839028208...3c194b76ae00

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125687038

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2799

2016-04-25 Thread AppVeyor



Build openssl master.2799 failed


Commit 35638c3f22 by FdaSilvaYY on 3/7/2016 9:45 PM:

Unify _up_ref methods signature and behaviour.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Broken: FdaSilvaYY/openssl#572 (102-backport-leak-fix - 16ae7b6)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #572
Status: Broken

Duration: 3 minutes and 29 seconds
Commit: 16ae7b6 (102-backport-leak-fix)
Author: FdaSilvaYY
Message: Fix a few leaks in X509_REQ_to_X509.
Fix a possible leak on NETSCAPE_SPKI_verify failure.

Backport of 0517538d1a39bc
Backport of f6c006ea76304a

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/7f206b4f8c9b...16ae7b6273e2

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125629452

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#570 (102-backport-leak-fix - 7f206b4)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #570
Status: Errored

Duration: 8 seconds
Commit: 7f206b4 (102-backport-leak-fix)
Author: FdaSilvaYY
Message: Fix a few leaks in X509_REQ_to_X509

Backport of 0517538d1a39bc

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/d7927cfad946...7f206b4f8c9b

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125626316

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2798

2016-04-25 Thread AppVeyor



Build openssl master.2798 failed


Commit 83024debfc by FdaSilvaYY on 3/8/2016 7:11 PM:

Add checks on CRYPTO_new_ex_data return value


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#567 (up_ref_api_unify - b95d6ef)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #567
Status: Errored

Duration: 8 minutes and 12 seconds
Commit: b95d6ef (up_ref_api_unify)
Author: FdaSilvaYY
Message: Unify _up_ref methods signature and behaviour.

Add a status return value instead of void.
Add some sanity checks on reference counter value.
Update the docs.

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/115d4a4d32aa...b95d6ef7a4d9

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125625899

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2797

2016-04-25 Thread AppVeyor



Build openssl master.2797 failed


Commit df5e63c88d by FdaSilvaYY on 3/20/2016 8:14 PM:

Add help message to some progs options.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Broken: openssl/openssl#3485 (master - 5a6694e)

2016-04-25 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3485
Status: Broken

Duration: 2 minutes and 36 seconds
Commit: 5a6694e (master)
Author: Viktor Dukhovni
Message: make update

And recycle some disused slots.

Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/openssl/openssl/compare/2036fd50466b...5a6694e30340

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/125654552

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2796

2016-04-25 Thread AppVeyor



Build openssl master.2796 failed


Commit 66abf67d7b by FdaSilvaYY on 4/4/2016 6:42 PM:

Fix an error code spelling.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2795

2016-04-25 Thread AppVeyor



Build openssl master.2795 failed


Commit 2036fd5046 by Richard Levitte on 4/25/2016 4:06 PM:

Document the enhancements for DEPEND and INCLUDE and use a better example


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#562 (ex_data-fixes - c618390)

2016-04-25 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #562
Status: Errored

Duration: 16 seconds
Commit: c618390 (ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_new_ex_data return value
 with some adaptation to new multi-threading API.

Once reference, lock, meth, and flag fields are setup,  DSA_free/DH_free
can be called directly.

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/842f9fc8abe6...c61839028208

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/125625119

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-04-25 Thread Andy Polyakov
The branch master has been updated
   via  dc3c5067cd90f3f2159e5d53c57b92730c687d7e (commit)
  from  5a6694e30340d36fcf0b1dd349a7373010fb2524 (commit)


- Log -
commit dc3c5067cd90f3f2159e5d53c57b92730c687d7e
Author: Andy Polyakov 
Date:   Fri Apr 15 16:30:29 2016 +0200

crypto/poly1305/asm: chase overflow bit on x86 and ARM platforms.

Even though no test could be found to trigger this, paper-n-pencil
estimate suggests that x86 and ARM inner loop lazy reductions can
loose a bit in H4>>*5+H0 step.

Reviewed-by: Emilia Käsper 

---

Summary of changes:
 crypto/poly1305/asm/poly1305-armv4.pl | 57 ---
 crypto/poly1305/asm/poly1305-armv8.pl | 32 +++-
 crypto/poly1305/asm/poly1305-x86.pl   |  5 +--
 crypto/poly1305/poly1305.c| 18 ++-
 4 files changed, 89 insertions(+), 23 deletions(-)

diff --git a/crypto/poly1305/asm/poly1305-armv4.pl 
b/crypto/poly1305/asm/poly1305-armv4.pl
index aa3f228..95e2133 100755
--- a/crypto/poly1305/asm/poly1305-armv4.pl
+++ b/crypto/poly1305/asm/poly1305-armv4.pl
@@ -10,7 +10,7 @@
 #  IALU(*)/gcc-4.4 NEON
 #
 # ARM11xx(ARMv6)   7.78/+100%  -
-# Cortex-A56.35/+130%  2.96
+# Cortex-A56.35/+130%  3.00
 # Cortex-A86.25/+115%  2.36
 # Cortex-A95.10/+95%   2.55
 # Cortex-A15   3.85/+85%   1.25(**)
@@ -523,6 +523,51 @@ poly1305_init_neon:

@ lazy reduction as discussed in "NEON crypto" by D.J. Bernstein
@ and P. Schwabe
+   @
+   @ H0>>+H1>>+H2>>+H3>>+H4
+   @ H3>>+H4>>*5+H0>>+H1
+   @
+   @ Trivia.
+   @
+   @ Result of multiplication of n-bit number by m-bit number is
+   @ n+m bits wide. However! Even though 2^n is a n+1-bit number,
+   @ m-bit number multiplied by 2^n is still n+m bits wide.
+   @
+   @ Sum of two n-bit numbers is n+1 bits wide, sum of three - n+2,
+   @ and so is sum of four. Sum of 2^m n-m-bit numbers and n-bit
+   @ one is n+1 bits wide.
+   @
+   @ >>+ denotes Hnext += Hn>>26, Hn &= 0x3ff. This means that
+   @ H0, H2, H3 are guaranteed to be 26 bits wide, while H1 and H4
+   @ can be 27. However! In cases when their width exceeds 26 bits
+   @ they are limited by 2^26+2^6. This in turn means that *sum*
+   @ of the products with these values can still be viewed as sum
+   @ of 52-bit numbers as long as the amount of addends is not a
+   @ power of 2. For example,
+   @
+   @ H4 = H4*R0 + H3*R1 + H2*R2 + H1*R3 + H0 * R4,
+   @
+   @ which can't be larger than 5 * (2^26 + 2^6) * (2^26 + 2^6), or
+   @ 5 * (2^52 + 2*2^32 + 2^12), which in turn is smaller than
+   @ 8 * (2^52) or 2^55. However, the value is then multiplied by
+   @ by 5, so we should be looking at 5 * 5 * (2^52 + 2^33 + 2^12),
+   @ which is less than 32 * (2^52) or 2^57. And when processing
+   @ data we are looking at triple as many addends...
+   @
+   @ In key setup procedure pre-reduced H0 is limited by 5*4+1 and
+   @ 5*H4 - by 5*5 52-bit addends, or 57 bits. But when hashing the
+   @ input H0 is limited by (5*4+1)*3 addends, or 58 bits, while
+   @ 5*H4 by 5*5*3, or 59[!] bits. How is this relevant? vmlal.u32
+   @ instruction accepts 2x32-bit input and writes 2x64-bit result.
+   @ This means that result of reduction have to be compressed upon
+   @ loop wrap-around. This can be done in the process of reduction
+   @ to minimize amount of instructions [as well as amount of
+   @ 128-bit instructions, which benefits low-end processors], but
+   @ one has to watch for H2 (which is narrower than H0) and 5*H4
+   @ not being wider than 58 bits, so that result of right shift
+   @ by 26 bits fits in 32 bits. This is also useful on x86,
+   @ because it allows to use paddd in place for paddq, which
+   @ benefits Atom, where paddq is ridiculously slow.
 
vshr.u64$T0,$D3,#26
vmovn.i64   $D3#lo,$D3
@@ -887,7 +932,8 @@ poly1305_blocks_neon:
 # endif
 

-   @ lazy reduction interleaved with base 2^32 -> base 2^26
+   @ lazy reduction interleaved with base 2^32 -> base 2^26 of
+   @ inp[0:3] previously loaded to $H0-$H3 and smashed to $H0-$H4.
 
vshr.u64$T0,$D3,#26
vmovn.i64   $D3#lo,$D3
@@ -915,19 +961,20 @@ poly1305_blocks_neon:
  vbic.i32  $H3,#0xfc00
 vshrn.u64  $T1#lo,$D2,#26
 vmovn.i64  $D2#lo,$D2
-   vadd.i32

[openssl-commits] [openssl] master update

2016-04-25 Thread Rich Salz
The branch master has been updated
   via  5a6694e30340d36fcf0b1dd349a7373010fb2524 (commit)
   via  51227177b13b53ff5d6c77fd701f5172b6c1b358 (commit)
  from  2036fd50466b0586326bbc260a4f77020467531a (commit)


- Log -
commit 5a6694e30340d36fcf0b1dd349a7373010fb2524
Author: Viktor Dukhovni 
Date:   Mon Apr 25 15:13:27 2016 -0400

make update

And recycle some disused slots.

Reviewed-by: Rich Salz 

commit 51227177b13b53ff5d6c77fd701f5172b6c1b358
Author: Viktor Dukhovni 
Date:   Mon Apr 25 15:02:02 2016 -0400

Added missing X509_STORE_CTX_set_error_depth() accessor

Reviewed-by: Rich Salz 

---

Summary of changes:
 crypto/x509/x509_vfy.c  |  5 +
 doc/crypto/X509_STORE_CTX_get_error.pod | 19 ---
 include/openssl/x509_vfy.h  |  1 +
 util/libcrypto.num  |  9 -
 4 files changed, 22 insertions(+), 12 deletions(-)

diff --git a/crypto/x509/x509_vfy.c b/crypto/x509/x509_vfy.c
index efa6bca..b895ffe 100644
--- a/crypto/x509/x509_vfy.c
+++ b/crypto/x509/x509_vfy.c
@@ -1989,6 +1989,11 @@ int X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx)
 return ctx->error_depth;
 }
 
+void X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth)
+{
+ctx->error_depth = depth;
+}
+
 X509 *X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx)
 {
 return ctx->current_cert;
diff --git a/doc/crypto/X509_STORE_CTX_get_error.pod 
b/doc/crypto/X509_STORE_CTX_get_error.pod
index 1cc6bb5..8c3975c 100644
--- a/doc/crypto/X509_STORE_CTX_get_error.pod
+++ b/doc/crypto/X509_STORE_CTX_get_error.pod
@@ -3,8 +3,8 @@
 =head1 NAME
 
 X509_STORE_CTX_get_error, X509_STORE_CTX_set_error,
-X509_STORE_CTX_get_error_depth, X509_STORE_CTX_get_current_cert,
-X509_STORE_CTX_get0_cert,
+X509_STORE_CTX_get_error_depth, X509_STORE_CTX_set_error_depth,
+X509_STORE_CTX_get_current_cert, X509_STORE_CTX_get0_cert,
 X509_STORE_CTX_get1_chain, X509_verify_cert_error_string - get or set 
certificate verification status information
 
 =head1 SYNOPSIS
@@ -12,11 +12,12 @@ X509_STORE_CTX_get1_chain, X509_verify_cert_error_string - 
get or set certificat
  #include 
  #include 
 
- int   X509_STORE_CTX_get_error(X509_STORE_CTX *ctx);
- void  X509_STORE_CTX_set_error(X509_STORE_CTX *ctx,int s);
- int   X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx);
- X509 *X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx);
- X509 *X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx);
+ int   X509_STORE_CTX_get_error(X509_STORE_CTX *ctx);
+ void  X509_STORE_CTX_set_error(X509_STORE_CTX *ctx,int s);
+ int   X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx);
+ void  X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth);
+ X509 *X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx);
+ X509 *X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx);
 
  STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx);
 
@@ -39,6 +40,10 @@ non-negative integer representing where in the certificate 
chain the error
 occurred. If it is zero it occurred in the end entity certificate, one if
 it is the certificate which signed the end entity certificate and so on.
 
+X509_STORE_CTX_set_error_depth() sets the error B.
+This can be used in combination with X509_STORE_CTX_set_error() to set the
+depth at which an error condition was detected.
+
 X509_STORE_CTX_get0_cert() returns the leaf certificate being verified.
 
 X509_STORE_CTX_get_current_cert() returns the certificate in B which
diff --git a/include/openssl/x509_vfy.h b/include/openssl/x509_vfy.h
index 99d5e21..f357d1a 100644
--- a/include/openssl/x509_vfy.h
+++ b/include/openssl/x509_vfy.h
@@ -366,6 +366,7 @@ void *X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int 
idx);
 int X509_STORE_CTX_get_error(X509_STORE_CTX *ctx);
 void X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int s);
 int X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx);
+void X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth);
 X509 *X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx);
 X509 *X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx);
 X509_CRL *X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx);
diff --git a/util/libcrypto.num b/util/libcrypto.num
index efa5063..b9a9a84 100644
--- a/util/libcrypto.num
+++ b/util/libcrypto.num
@@ -4198,12 +4198,11 @@ X509_STORE_get_X509_by_subject  40711_1_0   
EXIST::FUNCTION:
 X509_OBJECT_free4072   1_1_0   EXIST::FUNCTION:
 X509_OBJECT_get0_X509   4073   1_1_0   EXIST::FUNCTION:
 X509_STORE_CTX_get0_untrusted   4074   1_1_0   EXIST::FUNCTION:
-X509_STORE_CTX_set0_chain   4075   1_1_0   NOEXIST::FUNCTION:
+X509_STORE_CTX_set_error_depth  4075   1_1_0   

[openssl-commits] Build completed: openssl OpenSSL_1_0_2-stable.2793

2016-04-25 Thread AppVeyor


Build openssl OpenSSL_1_0_2-stable.2793 completed



Commit d31bc179b3 by Rich Salz on 4/25/2016 3:44 PM:

Fix NULL deref in apps/pkcs7


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2016-04-25 Thread Matt Caswell
The branch OpenSSL_1_0_2-stable has been updated
   via  0ca67644ddedfd656d43a6639d89a6236ff64652 (commit)
  from  d31bc179b3a48351025c55756ce8be82bf9bfa4c (commit)


- Log -
commit 0ca67644ddedfd656d43a6639d89a6236ff64652
Author: Matt Caswell 
Date:   Mon Apr 25 17:45:11 2016 +0100

Fix a signed/unsigned warning

This causes a compilation failure when using --strict-warnings in 1.0.2
and 1.0.1

Reviewed-by: Viktor Dukhovni 

---

Summary of changes:
 crypto/asn1/asn1_lib.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/asn1/asn1_lib.c b/crypto/asn1/asn1_lib.c
index 54b683c..874b1af 100644
--- a/crypto/asn1/asn1_lib.c
+++ b/crypto/asn1/asn1_lib.c
@@ -175,7 +175,7 @@ static int asn1_get_length(const unsigned char **pp, int 
*inf, long *rl,
 *inf = 0;
 i = *p & 0x7f;
 if (*(p++) & 0x80) {
-if (i > sizeof(ret) || max < i)
+if (i > sizeof(ret) || max < (long)i)
 return 0;
 while (i-- > 0) {
 ret <<= 8L;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2016-04-25 Thread Matt Caswell
The branch OpenSSL_1_0_1-stable has been updated
   via  1ee454157636a69400af56ea19f57c0b05c344ef (commit)
  from  184ebf0fca31685bb03e2ed225f2c474769fe646 (commit)


- Log -
commit 1ee454157636a69400af56ea19f57c0b05c344ef
Author: Matt Caswell 
Date:   Mon Apr 25 17:45:11 2016 +0100

Fix a signed/unsigned warning

This causes a compilation failure when using --strict-warnings in 1.0.2
and 1.0.1

Reviewed-by: Viktor Dukhovni 
(cherry picked from commit 0ca67644ddedfd656d43a6639d89a6236ff64652)

---

Summary of changes:
 crypto/asn1/asn1_lib.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/crypto/asn1/asn1_lib.c b/crypto/asn1/asn1_lib.c
index 54b683c..874b1af 100644
--- a/crypto/asn1/asn1_lib.c
+++ b/crypto/asn1/asn1_lib.c
@@ -175,7 +175,7 @@ static int asn1_get_length(const unsigned char **pp, int 
*inf, long *rl,
 *inf = 0;
 i = *p & 0x7f;
 if (*(p++) & 0x80) {
-if (i > sizeof(ret) || max < i)
+if (i > sizeof(ret) || max < (long)i)
 return 0;
 while (i-- > 0) {
 ret <<= 8L;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2792

2016-04-25 Thread AppVeyor



Build openssl master.2792 failed


Commit 79356a83b7 by Rich Salz on 4/25/2016 3:44 PM:

Fix NULL deref in apps/pkcs7


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2791

2016-04-25 Thread AppVeyor



Build openssl master.2791 failed


Commit 458f13099b by Richard Levitte on 4/25/2016 1:46 PM:

RSA, DSA, DH: Do not free pointers if the same is reassigned


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-04-25 Thread Richard Levitte
The branch master has been updated
   via  2036fd50466b0586326bbc260a4f77020467531a (commit)
   via  8d34daf0ce3bd2fc08dda0f1b0d1213dec452a1d (commit)
  from  79356a83b78a2d936dcd022847465d9ebf6c67b1 (commit)


- Log -
commit 2036fd50466b0586326bbc260a4f77020467531a
Author: Richard Levitte 
Date:   Thu Apr 21 21:08:42 2016 +0200

Document the enhancements for DEPEND and INCLUDE and use a better example

Reviewed-by: Emilia Käsper 

commit 8d34daf0ce3bd2fc08dda0f1b0d1213dec452a1d
Author: Richard Levitte 
Date:   Thu Apr 21 14:30:08 2016 +0200

Build system: add include directories and dependencies for generators

In the case of generating a file like this:

GENERATE[foo.S]=mkfoo.pl arg1 arg2

the 'mkfoo.pl' generator itself might need to include other files,
such as perl modules within our source tree.  We can reuse already
existing syntax for it, like this:

INCLUDE[mkfoo.pl]=module/path

or:

DEPEND[mkfoo.pl]=modules/mymodule.pm

This change implements the support for such constructs, and for the
DEPEND statement, for any value that indicates a perl module (.pm
file), it will automatically infer an INCLUDE statement for its
directory, just like it does for C header files, so you won't have do
write this:

DEPEND[mkfoo.pl]=modules/mymodule.pm
INCLUDE[mkfoo.pl]=modules

Reviewed-by: Emilia Käsper 

---

Summary of changes:
 Configurations/README| 27 +---
 Configurations/README.design | 80 ++--
 Configurations/common.tmpl   |  3 ++
 Configurations/descrip.mms.tmpl  |  5 ++-
 Configurations/unix-Makefile.tmpl|  9 ++--
 Configurations/windows-makefile.tmpl |  7 ++--
 Configure| 30 ++
 7 files changed, 117 insertions(+), 44 deletions(-)

diff --git a/Configurations/README b/Configurations/README
index 3534ea6..8451b44 100644
--- a/Configurations/README
+++ b/Configurations/README
@@ -379,6 +379,18 @@ item muct be the generator file.  It is, however, entirely 
up to the
 build file template to define exactly how those command lines should
 be handled, how the output is captured and so on.
 
+Sometimes, the generator file itself depends on other files, for
+example if it is a perl script that depends on other perl modules.
+This can be expressed using DEPEND like this:
+
+DEPEND[asm/something.pl]=../perlasm/Foo.pm
+
+There may also be cases where the exact file isn't easily specified,
+but an inclusion directory still needs to be specified.  INCLUDE can
+be used in that case:
+
+INCLUDE[asm/something.pl]=../perlasm
+
 NOTE: GENERATE lines are limited to one command only per GENERATE.
 
 As a last resort, it's possible to have raw build file lines, between
@@ -498,6 +510,8 @@ They are all expected to return a string with the lines 
they produce.
 
 generatesrc(src => "PATH/TO/tobegenerated",
 generator => [ "generatingfile", ... ]
+generator_incs => [ "INCL/PATH", ... ]
+generator_deps => [ "dep1", ... ]
 generator => [ "generatingfile", ... ]
 incs => [ "INCL/PATH", ... ],
 deps => [ "dep1", ... ],
@@ -509,11 +523,14 @@ They are all expected to return a string with the lines 
they produce.
   expected to be the file to generate from.
   generatesrc() is expected to analyse and figure out
   exactly how to apply that file and how to capture
-  the result.  'incs' and 'deps' are include
-  directories and files that are used if $(CC) used as
-  an intermediary step when generating the end product
-  (the file indicated by 'src').  'intent' indicates
-  what the generated file is going to be used for.
+  the result.  'generator_incs' and 'generator_deps'
+  are include directories and files that the generator
+  file itself depends on.  'incs' and 'deps' are
+  include directories and files that are used if $(CC)
+  is used as an intermediary step when generating the
+  end product (the file indicated by 'src').  'intent'
+  indicates what the generated file is going to be
+  used for.
 
 src2obj - function that produces build file lines to build an
   object file from source files and associated data.
diff --git 

[openssl-commits] Build failed: openssl master.2790

2016-04-25 Thread AppVeyor



Build openssl master.2790 failed


Commit 0322e23f55 by Richard Levitte on 4/25/2016 1:46 PM:

RSA, DSA, DH: Do not free pointers if the same is reassigned


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2016-04-25 Thread Rich Salz
The branch OpenSSL_1_0_1-stable has been updated
   via  184ebf0fca31685bb03e2ed225f2c474769fe646 (commit)
  from  697283ba418b21c4c0682d7050264b492e2ea4e2 (commit)


- Log -
commit 184ebf0fca31685bb03e2ed225f2c474769fe646
Author: Rich Salz 
Date:   Mon Apr 25 08:56:54 2016 -0400

Fix NULL deref in apps/pkcs7

Thanks to Brian Carpenter for finding and reporting this.

Reviewed-by: Emilia Käsper 
(cherry picked from commit 79356a83b78a2d936dcd022847465d9ebf6c67b1)

---

Summary of changes:
 apps/pkcs7.c | 12 
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git a/apps/pkcs7.c b/apps/pkcs7.c
index 643507f..b677633 100644
--- a/apps/pkcs7.c
+++ b/apps/pkcs7.c
@@ -235,12 +235,16 @@ int MAIN(int argc, char **argv)
 i = OBJ_obj2nid(p7->type);
 switch (i) {
 case NID_pkcs7_signed:
-certs = p7->d.sign->cert;
-crls = p7->d.sign->crl;
+if (p7->d.sign != NULL) {
+certs = p7->d.sign->cert;
+crls = p7->d.sign->crl;
+}
 break;
 case NID_pkcs7_signedAndEnveloped:
-certs = p7->d.signed_and_enveloped->cert;
-crls = p7->d.signed_and_enveloped->crl;
+if (p7->d.signed_and_enveloped != NULL) {
+certs = p7->d.signed_and_enveloped->cert;
+crls = p7->d.signed_and_enveloped->crl;
+}
 break;
 default:
 break;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2016-04-25 Thread Rich Salz
The branch OpenSSL_1_0_2-stable has been updated
   via  d31bc179b3a48351025c55756ce8be82bf9bfa4c (commit)
  from  0b48a24ce993d1a4409d7bde26295f6df0d173cb (commit)


- Log -
commit d31bc179b3a48351025c55756ce8be82bf9bfa4c
Author: Rich Salz 
Date:   Mon Apr 25 08:56:54 2016 -0400

Fix NULL deref in apps/pkcs7

Thanks to Brian Carpenter for finding and reporting this.

Reviewed-by: Emilia Käsper 
(cherry picked from commit 79356a83b78a2d936dcd022847465d9ebf6c67b1)

---

Summary of changes:
 apps/pkcs7.c | 12 
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git a/apps/pkcs7.c b/apps/pkcs7.c
index 643507f..b677633 100644
--- a/apps/pkcs7.c
+++ b/apps/pkcs7.c
@@ -235,12 +235,16 @@ int MAIN(int argc, char **argv)
 i = OBJ_obj2nid(p7->type);
 switch (i) {
 case NID_pkcs7_signed:
-certs = p7->d.sign->cert;
-crls = p7->d.sign->crl;
+if (p7->d.sign != NULL) {
+certs = p7->d.sign->cert;
+crls = p7->d.sign->crl;
+}
 break;
 case NID_pkcs7_signedAndEnveloped:
-certs = p7->d.signed_and_enveloped->cert;
-crls = p7->d.signed_and_enveloped->crl;
+if (p7->d.signed_and_enveloped != NULL) {
+certs = p7->d.signed_and_enveloped->cert;
+crls = p7->d.signed_and_enveloped->crl;
+}
 break;
 default:
 break;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-04-25 Thread Rich Salz
The branch master has been updated
   via  79356a83b78a2d936dcd022847465d9ebf6c67b1 (commit)
  from  1755d4601231f96e9011abc3d2f40e7bd31320ee (commit)


- Log -
commit 79356a83b78a2d936dcd022847465d9ebf6c67b1
Author: Rich Salz 
Date:   Mon Apr 25 08:56:54 2016 -0400

Fix NULL deref in apps/pkcs7

Thanks to Brian Carpenter for finding and reporting this.

Reviewed-by: Emilia Käsper 

---

Summary of changes:
 apps/pkcs7.c | 12 
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git a/apps/pkcs7.c b/apps/pkcs7.c
index ad8330d..a2c1c6d 100644
--- a/apps/pkcs7.c
+++ b/apps/pkcs7.c
@@ -222,12 +222,16 @@ int pkcs7_main(int argc, char **argv)
 i = OBJ_obj2nid(p7->type);
 switch (i) {
 case NID_pkcs7_signed:
-certs = p7->d.sign->cert;
-crls = p7->d.sign->crl;
+if (p7->d.sign != NULL) {
+certs = p7->d.sign->cert;
+crls = p7->d.sign->crl;
+}
 break;
 case NID_pkcs7_signedAndEnveloped:
-certs = p7->d.signed_and_enveloped->cert;
-crls = p7->d.signed_and_enveloped->crl;
+if (p7->d.signed_and_enveloped != NULL) {
+certs = p7->d.signed_and_enveloped->cert;
+crls = p7->d.signed_and_enveloped->crl;
+}
 break;
 default:
 break;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2789

2016-04-25 Thread AppVeyor



Build openssl master.2789 failed


Commit 1755d46012 by Viktor Dukhovni on 4/25/2016 11:46 AM:

API compat macros for renamed X509_STORE_CTX functions


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl OpenSSL_1_0_2-stable.2788

2016-04-25 Thread AppVeyor


Build openssl OpenSSL_1_0_2-stable.2788 completed



Commit 0b48a24ce9 by Andy Polyakov on 4/25/2016 9:54 AM:

s390x assembly pack: cache capability query results.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed in Jenkins: master_windows #1583

2016-04-25 Thread openssl . sanity
See 

Changes:

[rsalz] API compat macros for renamed X509_STORE_CTX functions

--
Started by upstream project "master_basic" build number 1847
originally caused by:
 Started by an SCM change
Building remotely on windows-slave in workspace 

 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://github.com/openssl/openssl.git # 
 > timeout=10
Fetching upstream changes from https://github.com/openssl/openssl.git
 > git --version # timeout=10
 > git -c core.askpass=true fetch --tags --progress 
 > https://github.com/openssl/openssl.git +refs/heads/*:refs/remotes/origin/*
 > git rev-parse "refs/remotes/origin/master^{commit}" # timeout=10
 > git rev-parse "refs/remotes/origin/origin/master^{commit}" # timeout=10
Checking out Revision 1755d4601231f96e9011abc3d2f40e7bd31320ee 
(refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 1755d4601231f96e9011abc3d2f40e7bd31320ee
 > git rev-list 670ad0fbf6ebcf113e278d8174081a7e2d2fa44c # timeout=10
[master_windows] $ cmd /c call 
C:\Users\ADMINI~1\AppData\Local\Temp\1\hudson7614335444849364823.bat

call> "c:\program 
files (x86)\microsoft visual studio 12.0\vc\bin\vcvars32.bat" 

set> 
PROCESSOR_ARCHITECTURE=x86 

perl> Configure 
VC-WIN32 
Configuring OpenSSL version 1.1.0-pre6-dev (0x0x1016L)
no-crypto-mdebug [default]  OPENSSL_NO_CRYPTO_MDEBUG (skip dir)
no-crypto-mdebug-backtrace [forced]   OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE 
(skip dir)
no-ec_nistp_64_gcc_128 [default]  OPENSSL_NO_EC_NISTP_64_GCC_128 (skip dir)
no-egd  [default]  OPENSSL_NO_EGD (skip dir)
no-heartbeats   [default]  OPENSSL_NO_HEARTBEATS (skip dir)
no-md2  [default]  OPENSSL_NO_MD2 (skip dir)
no-rc5  [default]  OPENSSL_NO_RC5 (skip dir)
no-sctp [default]  OPENSSL_NO_SCTP (skip dir)
no-ssl-trace[default]  OPENSSL_NO_SSL_TRACE (skip dir)
no-ssl3 [default]  OPENSSL_NO_SSL3 (skip dir)
no-ssl3-method  [default]  OPENSSL_NO_SSL3_METHOD (skip dir)
no-unit-test[default]  OPENSSL_NO_UNIT_TEST (skip dir)
no-weak-ssl-ciphers [default]  OPENSSL_NO_WEAK_SSL_CIPHERS (skip dir)
no-zlib [default] 
no-zlib-dynamic [default] 
Configuring for VC-WIN32
CC=cl
CFLAG =-W3 -wd4090 -Gs0 -GF -Gy -nologo -DOPENSSL_SYS_WIN32 
-DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE -DUNICODE 
-D_UNICODE /MD /Ox /O2 /Ob2 
SHARED_CFLAG  =
DEFINES   =OPENSSL_USE_APPLINK DSO_WIN32 NDEBUG OPENSSL_THREADS 
OPENSSL_NO_STATIC_ENGINE OPENSSL_PIC OPENSSL_BN_ASM_PART_WORDS 
OPENSSL_IA32_SSE2 OPENSSL_BN_ASM_MONT OPENSSL_BN_ASM_GF2m SHA1_ASM SHA256_ASM 
SHA512_ASM MD5_ASM RMD160_ASM AES_ASM VPAES_ASM WHIRLPOOL_ASM GHASH_ASM 
ECP_NISTZ256_ASM POLY1305_ASM
LFLAG =/nologo /debug
PLIB_LFLAG=
EX_LIBS   =ws2_32.lib gdi32.lib advapi32.lib crypt32.lib user32.lib 
APPS_OBJ  =../ms/applink.o
CPUID_OBJ =x86cpuid.o
UPLINK_OBJ=../ms/uplink.o
BN_ASM=bn-586.o co-586.o x86-mont.o x86-gf2m.o
EC_ASM=ecp_nistz256.o ecp_nistz256-x86.o
DES_ENC   =des-586.o crypt586.o
AES_ENC   =aes-586.o vpaes-x86.o aesni-x86.o
BF_ENC=bf-586.o
CAST_ENC  =c_enc.o
RC4_ENC   =rc4-586.o
RC5_ENC   =rc5-586.o
MD5_OBJ_ASM   =md5-586.o
SHA1_OBJ_ASM  =sha1-586.o sha256-586.o sha512-586.o
RMD160_OBJ_ASM=rmd-586.o
CMLL_ENC  =cmll-x86.o
MODES_OBJ =ghash-x86.o
PADLOCK_OBJ   =e_padlock-x86.o
CHACHA_ENC=chacha-x86.o
POLY1305_OBJ  =poly1305-x86.o
BLAKE2_OBJ=
PROCESSOR =
RANLIB=true
ARFLAGS   =/nologo
PERL  =C:\Perl64\bin\perl.exe

THIRTY_TWO_BIT mode
BN_LLONG mode

Configured for VC-WIN32.

exit> 0 
[master_windows] $ cmd /c call 
C:\Users\ADMINI~1\AppData\Local\Temp\1\hudson4352053161620802442.bat

call> "c:\program 
files (x86)\microsoft visual studio 12.0\vc\bin\vcvars32.bat" 

set> 
PROCESSOR_ARCHITECTURE=x86 

nmake>

Microsoft (R) Program Maintenance Utility Version 12.00.21005.1
Copyright (C) Microsoft Corporation.  All rights reserved.

C:\Perl64\bin\perl.exe util\mkbuildinf.pl "cl " "VC-WIN32" > 
crypto\buildinf.h
cl -DOPENSSL_USE_APPLINK -DDSO_WIN32 -DNDEBUG -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSL_BN_ASM_PART_WORDS 
-DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT 

[openssl-commits] Build failed: openssl master.2787

2016-04-25 Thread AppVeyor



Build openssl master.2787 failed


Commit 670ad0fbf6 by Andy Polyakov on 4/25/2016 9:53 AM:

s390x assembly pack: cache capability query results.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-04-25 Thread Rich Salz
The branch master has been updated
   via  1755d4601231f96e9011abc3d2f40e7bd31320ee (commit)
  from  670ad0fbf6ebcf113e278d8174081a7e2d2fa44c (commit)


- Log -
commit 1755d4601231f96e9011abc3d2f40e7bd31320ee
Author: Viktor Dukhovni 
Date:   Sat Apr 23 00:39:20 2016 -0400

API compat macros for renamed X509_STORE_CTX functions

Reviewed-by: Rich Salz 

---

Summary of changes:
 include/openssl/x509_vfy.h | 6 ++
 1 file changed, 6 insertions(+)

diff --git a/include/openssl/x509_vfy.h b/include/openssl/x509_vfy.h
index 4bf27e9..99d5e21 100644
--- a/include/openssl/x509_vfy.h
+++ b/include/openssl/x509_vfy.h
@@ -316,6 +316,12 @@ void X509_STORE_CTX_set_verify(X509_STORE_CTX *ctx,
X509_STORE_CTX_verify verify);
 X509_STORE_CTX_verify X509_STORE_CTX_get_verify(X509_STORE_CTX *ctx);
 
+#if OPENSSL_API_COMPAT < 0x1010L
+# define X509_STORE_CTX_get_chain X509_STORE_CTX_get0_chain
+# define X509_STORE_CTX_set_chain X509_STORE_CTX_set0_untrusted
+# define X509_STORE_CTX_trusted_stack X509_STORE_CTX_set0_trusted_stack
+#endif
+
 X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m);
 X509_LOOKUP_METHOD *X509_LOOKUP_hash_dir(void);
 X509_LOOKUP_METHOD *X509_LOOKUP_file(void);
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2786

2016-04-25 Thread AppVeyor



Build openssl master.2786 failed


Commit 299ccadcdb by Andy Polyakov on 4/25/2016 9:50 AM:

crypto/sparc_arch.h: reserve more SPARCv9 capability bits.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed in Jenkins: master_windows #1582

2016-04-25 Thread openssl . sanity
See 

Changes:

[appro] chacha/asm/chacha-ppc.pl: get misalignment corner case right on 
big-endian.

[appro] crypto/sparc_arch.h: reserve more SPARCv9 capability bits.

[appro] s390x assembly pack: cache capability query results.

--
Started by upstream project "master_basic" build number 1846
originally caused by:
 Started by an SCM change
Building remotely on windows-slave in workspace 

 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://github.com/openssl/openssl.git # 
 > timeout=10
Fetching upstream changes from https://github.com/openssl/openssl.git
 > git --version # timeout=10
 > git -c core.askpass=true fetch --tags --progress 
 > https://github.com/openssl/openssl.git +refs/heads/*:refs/remotes/origin/*
 > git rev-parse "refs/remotes/origin/master^{commit}" # timeout=10
 > git rev-parse "refs/remotes/origin/origin/master^{commit}" # timeout=10
Checking out Revision 670ad0fbf6ebcf113e278d8174081a7e2d2fa44c 
(refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 670ad0fbf6ebcf113e278d8174081a7e2d2fa44c
 > git rev-list acde647fb0347f64af8f8678b73ce41f2f499c02 # timeout=10
[master_windows] $ cmd /c call 
C:\Users\ADMINI~1\AppData\Local\Temp\1\hudson1259790948384713235.bat

call> "c:\program 
files (x86)\microsoft visual studio 12.0\vc\bin\vcvars32.bat" 

set> 
PROCESSOR_ARCHITECTURE=x86 

perl> Configure 
VC-WIN32 
Configuring OpenSSL version 1.1.0-pre6-dev (0x0x1016L)
no-crypto-mdebug [default]  OPENSSL_NO_CRYPTO_MDEBUG (skip dir)
no-crypto-mdebug-backtrace [forced]   OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE 
(skip dir)
no-ec_nistp_64_gcc_128 [default]  OPENSSL_NO_EC_NISTP_64_GCC_128 (skip dir)
no-egd  [default]  OPENSSL_NO_EGD (skip dir)
no-heartbeats   [default]  OPENSSL_NO_HEARTBEATS (skip dir)
no-md2  [default]  OPENSSL_NO_MD2 (skip dir)
no-rc5  [default]  OPENSSL_NO_RC5 (skip dir)
no-sctp [default]  OPENSSL_NO_SCTP (skip dir)
no-ssl-trace[default]  OPENSSL_NO_SSL_TRACE (skip dir)
no-ssl3 [default]  OPENSSL_NO_SSL3 (skip dir)
no-ssl3-method  [default]  OPENSSL_NO_SSL3_METHOD (skip dir)
no-unit-test[default]  OPENSSL_NO_UNIT_TEST (skip dir)
no-weak-ssl-ciphers [default]  OPENSSL_NO_WEAK_SSL_CIPHERS (skip dir)
no-zlib [default] 
no-zlib-dynamic [default] 
Configuring for VC-WIN32
CC=cl
CFLAG =-W3 -wd4090 -Gs0 -GF -Gy -nologo -DOPENSSL_SYS_WIN32 
-DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE -DUNICODE 
-D_UNICODE /MD /Ox /O2 /Ob2 
SHARED_CFLAG  =
DEFINES   =OPENSSL_USE_APPLINK DSO_WIN32 NDEBUG OPENSSL_THREADS 
OPENSSL_NO_STATIC_ENGINE OPENSSL_PIC OPENSSL_BN_ASM_PART_WORDS 
OPENSSL_IA32_SSE2 OPENSSL_BN_ASM_MONT OPENSSL_BN_ASM_GF2m SHA1_ASM SHA256_ASM 
SHA512_ASM MD5_ASM RMD160_ASM AES_ASM VPAES_ASM WHIRLPOOL_ASM GHASH_ASM 
ECP_NISTZ256_ASM POLY1305_ASM
LFLAG =/nologo /debug
PLIB_LFLAG=
EX_LIBS   =ws2_32.lib gdi32.lib advapi32.lib crypt32.lib user32.lib 
APPS_OBJ  =../ms/applink.o
CPUID_OBJ =x86cpuid.o
UPLINK_OBJ=../ms/uplink.o
BN_ASM=bn-586.o co-586.o x86-mont.o x86-gf2m.o
EC_ASM=ecp_nistz256.o ecp_nistz256-x86.o
DES_ENC   =des-586.o crypt586.o
AES_ENC   =aes-586.o vpaes-x86.o aesni-x86.o
BF_ENC=bf-586.o
CAST_ENC  =c_enc.o
RC4_ENC   =rc4-586.o
RC5_ENC   =rc5-586.o
MD5_OBJ_ASM   =md5-586.o
SHA1_OBJ_ASM  =sha1-586.o sha256-586.o sha512-586.o
RMD160_OBJ_ASM=rmd-586.o
CMLL_ENC  =cmll-x86.o
MODES_OBJ =ghash-x86.o
PADLOCK_OBJ   =e_padlock-x86.o
CHACHA_ENC=chacha-x86.o
POLY1305_OBJ  =poly1305-x86.o
BLAKE2_OBJ=
PROCESSOR =
RANLIB=true
ARFLAGS   =/nologo
PERL  =C:\Perl64\bin\perl.exe

THIRTY_TWO_BIT mode
BN_LLONG mode

Configured for VC-WIN32.

exit> 0 
[master_windows] $ cmd /c call 
C:\Users\ADMINI~1\AppData\Local\Temp\1\hudson4305204377502548323.bat

call> "c:\program 
files (x86)\microsoft visual studio 12.0\vc\bin\vcvars32.bat" 

set> 
PROCESSOR_ARCHITECTURE=x86 

nmake>

Microsoft (R) Program Maintenance Utility Version 12.00.21005.1
Copyright (C) Microsoft Corporation.  All rights reserved.

C:\Perl64\bin\perl.exe util\mkbuildinf.pl "cl " "VC-WIN32" > 
crypto\buildinf.h
cl -DOPENSSL_USE_APPLINK 

[openssl-commits] Still Failing: openssl/openssl#3470 (OpenSSL_1_0_2-stable - 0b48a24)

2016-04-25 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3470
Status: Still Failing

Duration: 3 minutes and 53 seconds
Commit: 0b48a24 (OpenSSL_1_0_2-stable)
Author: Andy Polyakov
Message: s390x assembly pack: cache capability query results.

IBM argues that in certain scenarios capability query is really
expensive. At the same time it's asserted that query results can
be safely cached, because disabling CPACF is incompatible with
reboot-free operation.

Reviewed-by: Tim Hudson 
(cherry picked from commit 670ad0fbf6ebcf113e278d8174081a7e2d2fa44c)

View the changeset: 
https://github.com/openssl/openssl/compare/2442382e11c0...0b48a24ce993

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/125523956

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2785

2016-04-25 Thread AppVeyor



Build openssl master.2785 failed


Commit a82a9f71ad by Andy Polyakov on 4/25/2016 9:48 AM:

chacha/asm/chacha-ppc.pl: get misalignment corner case right on big-endian.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2016-04-25 Thread Andy Polyakov
The branch OpenSSL_1_0_2-stable has been updated
   via  0b48a24ce993d1a4409d7bde26295f6df0d173cb (commit)
  from  2442382e11c022aaab4fdc6975bd15d5a75c4db2 (commit)


- Log -
commit 0b48a24ce993d1a4409d7bde26295f6df0d173cb
Author: Andy Polyakov 
Date:   Fri Apr 15 16:39:22 2016 +0200

s390x assembly pack: cache capability query results.

IBM argues that in certain scenarios capability query is really
expensive. At the same time it's asserted that query results can
be safely cached, because disabling CPACF is incompatible with
reboot-free operation.

Reviewed-by: Tim Hudson 
(cherry picked from commit 670ad0fbf6ebcf113e278d8174081a7e2d2fa44c)

---

Summary of changes:
 crypto/aes/asm/aes-s390x.pl | 29 ++-
 crypto/modes/asm/ghash-s390x.pl |  4 +---
 crypto/s390xcpuid.S | 44 +++--
 crypto/sha/asm/sha1-s390x.pl|  7 ++-
 crypto/sha/asm/sha512-s390x.pl  |  7 ++-
 5 files changed, 53 insertions(+), 38 deletions(-)

diff --git a/crypto/aes/asm/aes-s390x.pl b/crypto/aes/asm/aes-s390x.pl
index e75dcd0..76ca8e5 100644
--- a/crypto/aes/asm/aes-s390x.pl
+++ b/crypto/aes/asm/aes-s390x.pl
@@ -818,13 +818,9 @@ $code.=<<___ if (!$softonly);
tmhl%r0,0x4000  # check for message-security assist
jz  .Lekey_internal
 
-   lghi%r0,0   # query capability vector
-   la  %r1,16($sp)
-   .long   0xb92f0042  # kmc %r4,%r2
-
-   llihh   %r1,0x8000
-   srlg%r1,%r1,0(%r5)
-   ng  %r1,16($sp)
+   llihh   %r0,0x8000
+   srlg%r0,%r0,0(%r5)
+   ng  %r0,48(%r1) # check kmc capability vector
jz  .Lekey_internal
 
lmg %r0,%r1,0($inp) # just copy 128 bits...
@@ -1444,13 +1440,10 @@ $code.=<<___ if (0);# kmctr code was 
measured to be ~12% slower
 
llgfr   $s0,%r0
lgr $s1,%r1
-   lghi%r0,0
-   la  %r1,16($sp)
-   .long   0xb92d2042  # kmctr %r4,%r2,%r2
-
+   larl%r1,OPENSSL_s390xcap_P
llihh   %r0,0x8000  # check if kmctr supports the function code
srlg%r0,%r0,0($s0)
-   ng  %r0,16($sp)
+   ng  %r0,64(%r1) # check kmctr capability vector
lgr %r0,$s0
lgr %r1,$s1
jz  .Lctr32_km_loop
@@ -1597,12 +1590,10 @@ $code.=<<___ if(1);
llgfr   $s0,%r0 # put aside the function code
lghi$s1,0x7f
nr  $s1,%r0
-   lghi%r0,0   # query capability vector
-   la  %r1,$tweak-16($sp)
-   .long   0xb92e0042  # km %r4,%r2
-   llihh   %r1,0x8000
-   srlg%r1,%r1,32($s1) # check for 32+function code
-   ng  %r1,$tweak-16($sp)
+   larl%r1,OPENSSL_s390xcap_P
+   llihh   %r0,0x8000
+   srlg%r0,%r0,32($s1) # check for 32+function code
+   ng  %r0,32(%r1) # check km capability vector
lgr %r0,$s0 # restore the function code
la  %r1,0($key1)# restore $key1
jz  .Lxts_km_vanilla
@@ -2229,7 +2220,7 @@ ___
 }
 $code.=<<___;
 .string"AES for s390x, CRYPTOGAMS by "
-.comm  OPENSSL_s390xcap_P,16,8
+.comm  OPENSSL_s390xcap_P,80,8
 ___
 
 $code =~ s/\`([^\`]*)\`/eval $1/gem;
diff --git a/crypto/modes/asm/ghash-s390x.pl b/crypto/modes/asm/ghash-s390x.pl
index 39096b4..be7d55f 100644
--- a/crypto/modes/asm/ghash-s390x.pl
+++ b/crypto/modes/asm/ghash-s390x.pl
@@ -85,9 +85,7 @@ $code.=<<___ if(!$softonly && 0); # hardware is slow for 
single block...
tmhl%r0,0x4000  # check for message-security-assist
jz  .Lsoft_gmult
lghi%r0,0
-   la  %r1,16($sp)
-   .long   0xb93e0004  # kimd %r0,%r4
-   lg  %r1,24($sp)
+   lg  %r1,24(%r1) # load second word of kimd capabilities vector
tmhh%r1,0x4000  # check for function 65
jz  .Lsoft_gmult
stg %r0,16($sp) # arrange 16 bytes of zero input
diff --git a/crypto/s390xcpuid.S b/crypto/s390xcpuid.S
index 0681534..d91d5bc 100644
--- a/crypto/s390xcpuid.S
+++ b/crypto/s390xcpuid.S
@@ -5,14 +5,46 @@
 .align 16
 OPENSSL_s390x_facilities:
lghi%r0,0
-   larl%r2,OPENSSL_s390xcap_P
-   stg %r0,8(%r2)
-   .long   0xb2b02000  # stfle 0(%r2)
+   larl%r4,OPENSSL_s390xcap_P
+   stg %r0,8(%r4)  # wipe capability vectors
+   stg %r0,16(%r4)
+   stg %r0,24(%r4)
+   stg %r0,32(%r4)
+   stg %r0,40(%r4)
+   stg %r0,48(%r4)
+   stg %r0,56(%r4)
+   stg %r0,64(%r4)
+   stg %r0,72(%r4)
+
+   .long   0xb2b04000  # 

[openssl-commits] [openssl] master update

2016-04-25 Thread Andy Polyakov
The branch master has been updated
   via  670ad0fbf6ebcf113e278d8174081a7e2d2fa44c (commit)
  from  299ccadcdb99001c618d188fb243c1c86a1c (commit)


- Log -
commit 670ad0fbf6ebcf113e278d8174081a7e2d2fa44c
Author: Andy Polyakov 
Date:   Fri Apr 15 16:39:22 2016 +0200

s390x assembly pack: cache capability query results.

IBM argues that in certain scenarios capability query is really
expensive. At the same time it's asserted that query results can
be safely cached, because disabling CPACF is incompatible with
reboot-free operation.

Reviewed-by: Tim Hudson 

---

Summary of changes:
 crypto/aes/asm/aes-s390x.pl | 29 ++-
 crypto/modes/asm/ghash-s390x.pl |  4 +---
 crypto/s390xcpuid.S | 44 +++--
 crypto/sha/asm/sha1-s390x.pl|  7 ++-
 crypto/sha/asm/sha512-s390x.pl  |  7 ++-
 5 files changed, 53 insertions(+), 38 deletions(-)

diff --git a/crypto/aes/asm/aes-s390x.pl b/crypto/aes/asm/aes-s390x.pl
index 4aacf1b..231a299 100644
--- a/crypto/aes/asm/aes-s390x.pl
+++ b/crypto/aes/asm/aes-s390x.pl
@@ -818,13 +818,9 @@ $code.=<<___ if (!$softonly);
tmhl%r0,0x4000  # check for message-security assist
jz  .Lekey_internal
 
-   lghi%r0,0   # query capability vector
-   la  %r1,16($sp)
-   .long   0xb92f0042  # kmc %r4,%r2
-
-   llihh   %r1,0x8000
-   srlg%r1,%r1,0(%r5)
-   ng  %r1,16($sp)
+   llihh   %r0,0x8000
+   srlg%r0,%r0,0(%r5)
+   ng  %r0,48(%r1) # check kmc capability vector
jz  .Lekey_internal
 
lmg %r0,%r1,0($inp) # just copy 128 bits...
@@ -1444,13 +1440,10 @@ $code.=<<___ if (0);# kmctr code was 
measured to be ~12% slower
 
llgfr   $s0,%r0
lgr $s1,%r1
-   lghi%r0,0
-   la  %r1,16($sp)
-   .long   0xb92d2042  # kmctr %r4,%r2,%r2
-
+   larl%r1,OPENSSL_s390xcap_P
llihh   %r0,0x8000  # check if kmctr supports the function code
srlg%r0,%r0,0($s0)
-   ng  %r0,16($sp)
+   ng  %r0,64(%r1) # check kmctr capability vector
lgr %r0,$s0
lgr %r1,$s1
jz  .Lctr32_km_loop
@@ -1597,12 +1590,10 @@ $code.=<<___ if(1);
llgfr   $s0,%r0 # put aside the function code
lghi$s1,0x7f
nr  $s1,%r0
-   lghi%r0,0   # query capability vector
-   la  %r1,$tweak-16($sp)
-   .long   0xb92e0042  # km %r4,%r2
-   llihh   %r1,0x8000
-   srlg%r1,%r1,32($s1) # check for 32+function code
-   ng  %r1,$tweak-16($sp)
+   larl%r1,OPENSSL_s390xcap_P
+   llihh   %r0,0x8000
+   srlg%r0,%r0,32($s1) # check for 32+function code
+   ng  %r0,32(%r1) # check km capability vector
lgr %r0,$s0 # restore the function code
la  %r1,0($key1)# restore $key1
jz  .Lxts_km_vanilla
@@ -2229,7 +2220,7 @@ ___
 }
 $code.=<<___;
 .string"AES for s390x, CRYPTOGAMS by "
-.comm  OPENSSL_s390xcap_P,16,8
+.comm  OPENSSL_s390xcap_P,80,8
 ___
 
 $code =~ s/\`([^\`]*)\`/eval $1/gem;
diff --git a/crypto/modes/asm/ghash-s390x.pl b/crypto/modes/asm/ghash-s390x.pl
index a46f3eb..8c3ce69 100644
--- a/crypto/modes/asm/ghash-s390x.pl
+++ b/crypto/modes/asm/ghash-s390x.pl
@@ -85,9 +85,7 @@ $code.=<<___ if(!$softonly && 0); # hardware is slow for 
single block...
tmhl%r0,0x4000  # check for message-security-assist
jz  .Lsoft_gmult
lghi%r0,0
-   la  %r1,16($sp)
-   .long   0xb93e0004  # kimd %r0,%r4
-   lg  %r1,24($sp)
+   lg  %r1,24(%r1) # load second word of kimd capabilities vector
tmhh%r1,0x4000  # check for function 65
jz  .Lsoft_gmult
stg %r0,16($sp) # arrange 16 bytes of zero input
diff --git a/crypto/s390xcpuid.S b/crypto/s390xcpuid.S
index 3402a24..3efad55 100644
--- a/crypto/s390xcpuid.S
+++ b/crypto/s390xcpuid.S
@@ -5,14 +5,46 @@
 .align 16
 OPENSSL_s390x_facilities:
lghi%r0,0
-   larl%r2,OPENSSL_s390xcap_P
-   stg %r0,8(%r2)
-   .long   0xb2b02000  # stfle 0(%r2)
+   larl%r4,OPENSSL_s390xcap_P
+   stg %r0,8(%r4)  # wipe capability vectors
+   stg %r0,16(%r4)
+   stg %r0,24(%r4)
+   stg %r0,32(%r4)
+   stg %r0,40(%r4)
+   stg %r0,48(%r4)
+   stg %r0,56(%r4)
+   stg %r0,64(%r4)
+   stg %r0,72(%r4)
+
+   .long   0xb2b04000  # stfle 0(%r4)
brc 8,.Ldone
lghi%r0,1
-   .long   0xb2b02000 

[openssl-commits] [openssl] master update

2016-04-25 Thread Andy Polyakov
The branch master has been updated
   via  299ccadcdb99001c618d188fb243c1c86a1c (commit)
  from  a82a9f71ad0149380a680cae4c0cc693e6324679 (commit)


- Log -
commit 299ccadcdb99001c618d188fb243c1c86a1c
Author: Andy Polyakov 
Date:   Sat Apr 23 19:10:04 2016 +0200

crypto/sparc_arch.h: reserve more SPARCv9 capability bits.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 crypto/sparc_arch.h |  9 -
 crypto/sparcv9cap.c | 17 -
 2 files changed, 20 insertions(+), 6 deletions(-)

diff --git a/crypto/sparc_arch.h b/crypto/sparc_arch.h
index 6f8969f..5bcdd9f 100644
--- a/crypto/sparc_arch.h
+++ b/crypto/sparc_arch.h
@@ -5,12 +5,16 @@
 # define SPARCV9_PREFER_FPU  (1<<1)
 # define SPARCV9_VIS1(1<<2)
 # define SPARCV9_VIS2(1<<3)/* reserved */
-# define SPARCV9_FMADD   (1<<4)/* reserved for SPARC64 V */
+# define SPARCV9_FMADD   (1<<4)
 # define SPARCV9_BLK (1<<5)/* VIS1 block copy */
 # define SPARCV9_VIS3(1<<6)
 # define SPARCV9_RANDOM  (1<<7)
 # define SPARCV9_64BIT_STACK (1<<8)
 # define SPARCV9_FJAESX  (1<<9)/* Fujitsu SPARC64 X AES */
+# define SPARCV9_FJDESX  (1<<10)/* Fujitsu SPARC64 X DES, reserved */
+# define SPARCV9_FJHPCACE(1<<11)/* Fujitsu HPC-ACE, reserved */
+# define SPARCV9_IMA (1<<13)/* reserved */
+# define SPARCV9_VIS4(1<<14)/* reserved */
 
 /*
  * OPENSSL_sparcv9cap_P[1] is copy of Compatibility Feature Register,
@@ -29,6 +33,9 @@
 # define CFR_MONTMUL 0x0200/* Supports MONTMUL opcodes */
 # define CFR_MONTSQR 0x0400/* Supports MONTSQR opcodes */
 # define CFR_CRC32C  0x0800/* Supports CRC32C opcodes */
+# define CFR_XMPMUL  0x1000/* Supports XMPMUL opcodes */
+# define CFR_XMONTMUL0x2000/* Supports XMONTMUL opcodes */
+# define CFR_XMONTSQR0x4000/* Supports XMONTSQR opcodes */
 
 # if defined(OPENSSL_PIC) && !defined(__PIC__)
 #  define __PIC__
diff --git a/crypto/sparcv9cap.c b/crypto/sparcv9cap.c
index e1e6d73..30c384b 100644
--- a/crypto/sparcv9cap.c
+++ b/crypto/sparcv9cap.c
@@ -149,17 +149,24 @@ void OPENSSL_cpuid_setup(void)
 unsigned int vec[1];
 
 if (getisax (vec,1)) {
-if (vec[0]&0x0020)  OPENSSL_sparcv9cap_P[0] |= SPARCV9_VIS1;
-if (vec[0]&0x0040)  OPENSSL_sparcv9cap_P[0] |= SPARCV9_VIS2;
-if (vec[0]&0x0080)  OPENSSL_sparcv9cap_P[0] |= SPARCV9_BLK;
-if (vec[0]&0x0100)  OPENSSL_sparcv9cap_P[0] |= SPARCV9_FMADD;
-if (vec[0]&0x0400)  OPENSSL_sparcv9cap_P[0] |= SPARCV9_VIS3;
+if (vec[0]&0x00020) OPENSSL_sparcv9cap_P[0] |= SPARCV9_VIS1;
+if (vec[0]&0x00040) OPENSSL_sparcv9cap_P[0] |= SPARCV9_VIS2;
+if (vec[0]&0x00080) OPENSSL_sparcv9cap_P[0] |= SPARCV9_BLK;
+if (vec[0]&0x00100) OPENSSL_sparcv9cap_P[0] |= SPARCV9_FMADD;
+if (vec[0]&0x00400) OPENSSL_sparcv9cap_P[0] |= SPARCV9_VIS3;
+if (vec[0]&0x01000) OPENSSL_sparcv9cap_P[0] |= SPARCV9_FJHPCACE;
+if (vec[0]&0x02000) OPENSSL_sparcv9cap_P[0] |= SPARCV9_FJDESX;
+if (vec[0]&0x08000) OPENSSL_sparcv9cap_P[0] |= SPARCV9_IMA;
 if (vec[0]&0x1) OPENSSL_sparcv9cap_P[0] |= SPARCV9_FJAESX;
+if (vec[1]&0x8) OPENSSL_sparcv9cap_P[0] |= SPARCV9_VIS4;
 
 /* reconstruct %cfr copy */
 OPENSSL_sparcv9cap_P[1] = (vec[0]>>17)&0x3ff;
 OPENSSL_sparcv9cap_P[1] |= 
(OPENSSL_sparcv9cap_P[1]_MONTMUL)<<1;
 if (vec[0]&0x2000) OPENSSL_sparcv9cap_P[1] |= CFR_CRC32C;
+if (vec[1]&0x0020) OPENSSL_sparcv9cap_P[1] |= CFR_XMPMUL;
+if (vec[1]&0x0040)
+OPENSSL_sparcv9cap_P[1] |= CFR_XMONTMUL|CFR_XMONTSQR;
 
 /* Some heuristics */
 /* all known VIS2-capable CPUs have unprivileged tick counter */
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-04-25 Thread Andy Polyakov
The branch master has been updated
   via  a82a9f71ad0149380a680cae4c0cc693e6324679 (commit)
  from  acde647fb0347f64af8f8678b73ce41f2f499c02 (commit)


- Log -
commit a82a9f71ad0149380a680cae4c0cc693e6324679
Author: Andy Polyakov 
Date:   Sat Apr 23 19:16:56 2016 +0200

chacha/asm/chacha-ppc.pl: get misalignment corner case right on big-endian.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 crypto/chacha/asm/chacha-ppc.pl | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/crypto/chacha/asm/chacha-ppc.pl b/crypto/chacha/asm/chacha-ppc.pl
index 2bb3fce..4c5d2d1 100755
--- a/crypto/chacha/asm/chacha-ppc.pl
+++ b/crypto/chacha/asm/chacha-ppc.pl
@@ -527,9 +527,11 @@ $code.=<<___;
?lvsl   $outperm,0,$out # prepare for unaligned store
?vperm  $outmask,$outmask,$T0,$outperm
 
+   be?lvsl $T0,0,@x[0] # 0x00..0f
be?vspltisb $T1,3   # 0x03..03
-   be?vxor $inpperm,$inpperm,$T1   # swap bytes within words
+   be?vxor $T0,$T0,$T1 # swap bytes within words
be?vxor $outperm,$outperm,$T1
+   be?vperm $inpperm,$inpperm,$inpperm,$T0
 
b   Loop_outer_vmx
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed in Jenkins: master_windows #1581

2016-04-25 Thread openssl . sanity
See 

Changes:

[Richard Levitte] Warn when doing an out-of-source build and finding in-source 
build artifacts

[steve] Harden ASN.1 BIO handling of large amounts of data.

[steve] In d2i_test return error for malloc failure.

[steve] add test for CVE-2016-2109

[steve] Fix EC_KEY_set_private_key() to call key->group->meth->set_private()

--
Started by upstream project "master_basic" build number 1845
originally caused by:
 Started by an SCM change
Building remotely on windows-slave in workspace 

 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://github.com/openssl/openssl.git # 
 > timeout=10
Fetching upstream changes from https://github.com/openssl/openssl.git
 > git --version # timeout=10
 > git -c core.askpass=true fetch --tags --progress 
 > https://github.com/openssl/openssl.git +refs/heads/*:refs/remotes/origin/*
 > git rev-parse "refs/remotes/origin/master^{commit}" # timeout=10
 > git rev-parse "refs/remotes/origin/origin/master^{commit}" # timeout=10
Checking out Revision acde647fb0347f64af8f8678b73ce41f2f499c02 
(refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f acde647fb0347f64af8f8678b73ce41f2f499c02
 > git rev-list e2ab7fb343b28fba997cdf4a26bb616c26783c38 # timeout=10
[master_windows] $ cmd /c call 
C:\Users\ADMINI~1\AppData\Local\Temp\1\hudson6055829652161480739.bat

call> "c:\program 
files (x86)\microsoft visual studio 12.0\vc\bin\vcvars32.bat" 

set> 
PROCESSOR_ARCHITECTURE=x86 

perl> Configure 
VC-WIN32 
Configuring OpenSSL version 1.1.0-pre6-dev (0x0x1016L)
no-crypto-mdebug [default]  OPENSSL_NO_CRYPTO_MDEBUG (skip dir)
no-crypto-mdebug-backtrace [forced]   OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE 
(skip dir)
no-ec_nistp_64_gcc_128 [default]  OPENSSL_NO_EC_NISTP_64_GCC_128 (skip dir)
no-egd  [default]  OPENSSL_NO_EGD (skip dir)
no-heartbeats   [default]  OPENSSL_NO_HEARTBEATS (skip dir)
no-md2  [default]  OPENSSL_NO_MD2 (skip dir)
no-rc5  [default]  OPENSSL_NO_RC5 (skip dir)
no-sctp [default]  OPENSSL_NO_SCTP (skip dir)
no-ssl-trace[default]  OPENSSL_NO_SSL_TRACE (skip dir)
no-ssl3 [default]  OPENSSL_NO_SSL3 (skip dir)
no-ssl3-method  [default]  OPENSSL_NO_SSL3_METHOD (skip dir)
no-unit-test[default]  OPENSSL_NO_UNIT_TEST (skip dir)
no-weak-ssl-ciphers [default]  OPENSSL_NO_WEAK_SSL_CIPHERS (skip dir)
no-zlib [default] 
no-zlib-dynamic [default] 
Configuring for VC-WIN32
CC=cl
CFLAG =-W3 -wd4090 -Gs0 -GF -Gy -nologo -DOPENSSL_SYS_WIN32 
-DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE -DUNICODE 
-D_UNICODE /MD /Ox /O2 /Ob2 
SHARED_CFLAG  =
DEFINES   =OPENSSL_USE_APPLINK DSO_WIN32 NDEBUG OPENSSL_THREADS 
OPENSSL_NO_STATIC_ENGINE OPENSSL_PIC OPENSSL_BN_ASM_PART_WORDS 
OPENSSL_IA32_SSE2 OPENSSL_BN_ASM_MONT OPENSSL_BN_ASM_GF2m SHA1_ASM SHA256_ASM 
SHA512_ASM MD5_ASM RMD160_ASM AES_ASM VPAES_ASM WHIRLPOOL_ASM GHASH_ASM 
ECP_NISTZ256_ASM POLY1305_ASM
LFLAG =/nologo /debug
PLIB_LFLAG=
EX_LIBS   =ws2_32.lib gdi32.lib advapi32.lib crypt32.lib user32.lib 
APPS_OBJ  =../ms/applink.o
CPUID_OBJ =x86cpuid.o
UPLINK_OBJ=../ms/uplink.o
BN_ASM=bn-586.o co-586.o x86-mont.o x86-gf2m.o
EC_ASM=ecp_nistz256.o ecp_nistz256-x86.o
DES_ENC   =des-586.o crypt586.o
AES_ENC   =aes-586.o vpaes-x86.o aesni-x86.o
BF_ENC=bf-586.o
CAST_ENC  =c_enc.o
RC4_ENC   =rc4-586.o
RC5_ENC   =rc5-586.o
MD5_OBJ_ASM   =md5-586.o
SHA1_OBJ_ASM  =sha1-586.o sha256-586.o sha512-586.o
RMD160_OBJ_ASM=rmd-586.o
CMLL_ENC  =cmll-x86.o
MODES_OBJ =ghash-x86.o
PADLOCK_OBJ   =e_padlock-x86.o
CHACHA_ENC=chacha-x86.o
POLY1305_OBJ  =poly1305-x86.o
BLAKE2_OBJ=
PROCESSOR =
RANLIB=true
ARFLAGS   =/nologo
PERL  =C:\Perl64\bin\perl.exe

THIRTY_TWO_BIT mode
BN_LLONG mode

Configured for VC-WIN32.

exit> 0 
[master_windows] $ cmd /c call 
C:\Users\ADMINI~1\AppData\Local\Temp\1\hudson1655246727473186806.bat

call> "c:\program 
files (x86)\microsoft visual studio 12.0\vc\bin\vcvars32.bat" 

set> 
PROCESSOR_ARCHITECTURE=x86 

nmake>

Microsoft (R) Program Maintenance Utility Version 12.00.21005.1
Copyright (C) Microsoft Corporation.  All rights reserved.

cl