[openssl-commits] Passed: openssl/openssl#3639 (OpenSSL_1_0_2-stable - c5e603e)

2016-05-02 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3639
Status: Passed

Duration: 16 minutes and 37 seconds
Commit: c5e603e (OpenSSL_1_0_2-stable)
Author: Dr. Stephen Henson
Message: Fix i2d_X509_AUX: pp can be NULL.

Reported by David Benjamin

Reviewed-by: Emilia Käsper 
(cherry picked from commit 05aef4bbdbc18e7b9490512cdee41e8a608bcc0e)

View the changeset: 
https://github.com/openssl/openssl/compare/a8d40f64d820...c5e603ee182b

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/127349799

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications


_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2016-05-02 Thread Dr . Stephen Henson
The branch OpenSSL_1_0_2-stable has been updated
   via  c5e603ee182b40ede7713c6e229c15a8f3fdb58a (commit)
  from  a8d40f64d820e199c87a21597acd92a530286885 (commit)


- Log -
commit c5e603ee182b40ede7713c6e229c15a8f3fdb58a
Author: Dr. Stephen Henson 
Date:   Mon May 2 17:33:50 2016 +0100

Fix i2d_X509_AUX: pp can be NULL.

Reported by David Benjamin

Reviewed-by: Emilia Käsper 
(cherry picked from commit 05aef4bbdbc18e7b9490512cdee41e8a608bcc0e)

---

Summary of changes:
 crypto/asn1/x_x509.c | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/crypto/asn1/x_x509.c b/crypto/asn1/x_x509.c
index ccdf6df..e31e1e7 100644
--- a/crypto/asn1/x_x509.c
+++ b/crypto/asn1/x_x509.c
@@ -202,14 +202,15 @@ X509 *d2i_X509_AUX(X509 **a, const unsigned char **pp, 
long length)
 int i2d_X509_AUX(X509 *a, unsigned char **pp)
 {
 int length, tmplen;
-unsigned char *start = *pp;
+unsigned char *start = pp != NULL ? *pp : NULL;
 length = i2d_X509(a, pp);
 if (length < 0 || a == NULL)
 return length;
 
 tmplen = i2d_X509_CERT_AUX(a->aux, pp);
 if (tmplen < 0) {
-*pp = start;
+if (start != NULL)
+*pp = start;
 return tmplen;
 }
 length += tmplen;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2016-05-02 Thread Dr . Stephen Henson
The branch OpenSSL_1_0_1-stable has been updated
   via  1d29506fe0cfd585afcb17dfdf3ac42a30ab4087 (commit)
  from  66ce2861c172b2eb344906f424e593337fbd1af8 (commit)


- Log -
commit 1d29506fe0cfd585afcb17dfdf3ac42a30ab4087
Author: Dr. Stephen Henson 
Date:   Mon May 2 17:33:50 2016 +0100

Fix i2d_X509_AUX: pp can be NULL.

Reported by David Benjamin

Reviewed-by: Emilia Käsper 
(cherry picked from commit 05aef4bbdbc18e7b9490512cdee41e8a608bcc0e)

---

Summary of changes:
 crypto/asn1/x_x509.c | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/crypto/asn1/x_x509.c b/crypto/asn1/x_x509.c
index 38ede71..1500871 100644
--- a/crypto/asn1/x_x509.c
+++ b/crypto/asn1/x_x509.c
@@ -202,14 +202,15 @@ X509 *d2i_X509_AUX(X509 **a, const unsigned char **pp, 
long length)
 int i2d_X509_AUX(X509 *a, unsigned char **pp)
 {
 int length, tmplen;
-unsigned char *start = *pp;
+unsigned char *start = pp != NULL ? *pp : NULL;
 length = i2d_X509(a, pp);
 if (length < 0 || a == NULL)
 return length;
 
 tmplen = i2d_X509_CERT_AUX(a->aux, pp);
 if (tmplen < 0) {
-*pp = start;
+if (start != NULL)
+*pp = start;
 return tmplen;
 }
 length += tmplen;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-02 Thread Dr . Stephen Henson
The branch master has been updated
   via  05aef4bbdbc18e7b9490512cdee41e8a608bcc0e (commit)
  from  5a1f853b9870fc32a2e8960763d62209108ff519 (commit)


- Log -
commit 05aef4bbdbc18e7b9490512cdee41e8a608bcc0e
Author: Dr. Stephen Henson 
Date:   Mon May 2 17:33:50 2016 +0100

Fix i2d_X509_AUX: pp can be NULL.

Reported by David Benjamin

Reviewed-by: Emilia Käsper 

---

Summary of changes:
 crypto/x509/x_x509.c | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/crypto/x509/x_x509.c b/crypto/x509/x_x509.c
index 11e758b..043ab07 100644
--- a/crypto/x509/x_x509.c
+++ b/crypto/x509/x_x509.c
@@ -184,14 +184,15 @@ X509 *d2i_X509_AUX(X509 **a, const unsigned char **pp, 
long length)
 int i2d_X509_AUX(X509 *a, unsigned char **pp)
 {
 int length, tmplen;
-unsigned char *start = *pp;
+unsigned char *start = pp != NULL ? *pp : NULL;
 length = i2d_X509(a, pp);
 if (length < 0 || a == NULL)
 return length;
 
 tmplen = i2d_X509_CERT_AUX(a->aux, pp);
 if (tmplen < 0) {
-*pp = start;
+if (start != NULL)
+*pp = start;
 return tmplen;
 }
 length += tmplen;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl master.2944

2016-05-02 Thread AppVeyor


Build openssl master.2944 completed



Commit afce395cba by Richard Levitte on 5/2/2016 6:19 PM:

Document the addition of OPENSSL_LOCAL_CONFIG_DIR


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-02 Thread Rich Salz
The branch master has been updated
   via  5a1f853b9870fc32a2e8960763d62209108ff519 (commit)
  from  5c4b8c6f613e82d8fb35ceb6e7f799cedd4d173f (commit)


- Log -
commit 5a1f853b9870fc32a2e8960763d62209108ff519
Author: Rich Salz 
Date:   Mon May 2 17:03:55 2016 -0400

GH875: Document -no_check_time
Date:   Tue Mar 15 15:19:44 2016 +0100

This commit updates the documentation of cms, ocsp, s_client,
s_server, and verify to reflect the new "-no_check_time"
option introduced in commit d35ff2c0ade0a12e84aaa2e9841b4983a2f3cf45
on 2015-07-31.

Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 

---

Summary of changes:
 doc/apps/cms.pod  | 3 ++-
 doc/apps/ocsp.pod | 3 ++-
 doc/apps/s_client.pod | 3 ++-
 doc/apps/s_server.pod | 3 ++-
 doc/apps/verify.pod   | 7 +++
 5 files changed, 15 insertions(+), 4 deletions(-)

diff --git a/doc/apps/cms.pod b/doc/apps/cms.pod
index 42c3514..e0e8e7d 100644
--- a/doc/apps/cms.pod
+++ b/doc/apps/cms.pod
@@ -47,6 +47,7 @@ B B
 [B<-ignore_critical>]
 [B<-inhibit_any>]
 [B<-inhibit_map>]
+[B<-no_check_time>]
 [B<-partial_chain>]
 [B<-policy arg>]
 [B<-policy_check>]
@@ -473,7 +474,7 @@ address matches that specified in the From: address.
 
 =item B<-attime>, B<-check_ss_sig>, B<-crl_check>, B<-crl_check_all>,
 B<-explicit_policy>, B<-extended_crl>, B<-ignore_critical>, B<-inhibit_any>,
-B<-inhibit_map>, B<-no_alt_chains>, B<-partial_chain>, B<-policy>,
+B<-inhibit_map>, B<-no_alt_chains>, B<-no_check_time>, B<-partial_chain>, 
B<-policy>,
 B<-policy_check>, B<-policy_print>, B<-purpose>, B<-suiteB_128>,
 B<-suiteB_128_only>, B<-suiteB_192>, B<-trusted_first>, B<-use_deltas>,
 B<-auth_level>, B<-verify_depth>, B<-verify_email>, B<-verify_hostname>,
diff --git a/doc/apps/ocsp.pod b/doc/apps/ocsp.pod
index c796fd5..3e667e6 100644
--- a/doc/apps/ocsp.pod
+++ b/doc/apps/ocsp.pod
@@ -42,6 +42,7 @@ B B
 [B<-ignore_critical>]
 [B<-inhibit_any>]
 [B<-inhibit_map>]
+[B<-no_check_time>]
 [B<-partial_chain>]
 [B<-policy arg>]
 [B<-policy_check>]
@@ -195,7 +196,7 @@ Do not load the trusted CA certificates from the default 
directory location
 
 =item B<-attime>, B<-check_ss_sig>, B<-crl_check>, B<-crl_check_all>,
 B<-explicit_policy>, B<-extended_crl>, B<-ignore_critical>, B<-inhibit_any>,
-B<-inhibit_map>, B<-no_alt_chains>, B<-partial_chain>, B<-policy>,
+B<-inhibit_map>, B<-no_alt_chains>, B<-no_check_time>, B<-partial_chain>, 
B<-policy>,
 B<-policy_check>, B<-policy_print>, B<-purpose>, B<-suiteB_128>,
 B<-suiteB_128_only>, B<-suiteB_192>, B<-trusted_first>, B<-use_deltas>,
 B<-auth_level>, B<-verify_depth>, B<-verify_email>, B<-verify_hostname>,
diff --git a/doc/apps/s_client.pod b/doc/apps/s_client.pod
index e06af14..2a62656 100644
--- a/doc/apps/s_client.pod
+++ b/doc/apps/s_client.pod
@@ -34,6 +34,7 @@ B B
 [B<-ignore_critical>]
 [B<-inhibit_any>]
 [B<-inhibit_map>]
+[B<-no_check_time>]
 [B<-partial_chain>]
 [B<-policy arg>]
 [B<-policy_check>]
@@ -227,7 +228,7 @@ whitespace is ignored in the associated data field.  For 
example:
 
 =item B<-attime>, B<-check_ss_sig>, B<-crl_check>, B<-crl_check_all>,
 B<-explicit_policy>, B<-extended_crl>, B<-ignore_critical>, B<-inhibit_any>,
-B<-inhibit_map>, B<-no_alt_chains>, B<-partial_chain>, B<-policy>,
+B<-inhibit_map>, B<-no_alt_chains>, B<-no_check_time>, B<-partial_chain>, 
B<-policy>,
 B<-policy_check>, B<-policy_print>, B<-purpose>, B<-suiteB_128>,
 B<-suiteB_128_only>, B<-suiteB_192>, B<-trusted_first>, B<-use_deltas>,
 B<-auth_level>, B<-verify_depth>, B<-verify_email>, B<-verify_hostname>,
diff --git a/doc/apps/s_server.pod b/doc/apps/s_server.pod
index 08554f4..ef27867 100644
--- a/doc/apps/s_server.pod
+++ b/doc/apps/s_server.pod
@@ -44,6 +44,7 @@ B B
 [B<-ignore_critical>]
 [B<-inhibit_any>]
 [B<-inhibit_map>]
+[B<-no_check_time>]
 [B<-partial_chain>]
 [B<-policy arg>]
 [B<-policy_check>]
@@ -232,7 +233,7 @@ anonymous ciphersuite or PSK) this option has no effect.
 
 =item B<-attime>, B<-check_ss_sig>, B<-crl_check>, B<-crl_check_all>,
 B<-explicit_policy>, B<-extended_crl>, B<-ignore_critical>, B<-inhibit_any>,
-B<-inhibit_map>, B<-no_alt_chains>, B<-partial_chain>, B<-policy>,
+B<-inhibit_map>, B<-no_alt_chains>, B<-no_check_time>, B<-partial_chain>, 
B<-policy>,
 B<-policy_check>, B<-policy_print>, B<-purpose>, B<-suiteB_128>,
 B<-suiteB_128_only>, B<-suiteB_192>, B<-trusted_first>, B<-use_deltas>,
 B<-auth_level>, B<-verify_depth>, B<-verify_email>, B<-verify_hostname>,
diff --git a/doc/apps/verify.pod b/doc/apps/verify.pod
index 96d6be4..673a05a 100644
--- a/doc/apps/verify.pod
+++ b/doc/apps/verify.pod
@@ -24,6 +24,7 @@ B B
 [B<-ignore_critical>]
 [B<-inhibit_any>]
 [B<-inhibit_map>]
+[B<-no_check_time>]
 [B<-partial_chain>]
 [B<-policy arg>]
 [B<-policy_check>]
@@ -145,6 

[openssl-commits] Build failed: openssl master.2943

2016-05-02 Thread AppVeyor



Build openssl master.2943 failed


Commit ed1cacb1d0 by FdaSilvaYY on 3/20/2016 8:14 PM:

Add help message to some progs options.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-02 Thread Rich Salz
The branch master has been updated
   via  5c4b8c6f613e82d8fb35ceb6e7f799cedd4d173f (commit)
   via  5f18bc589865e6cc07e47ba7412a4cfd208abd04 (commit)
  from  afce395cba521e395e6eecdaf9589105f61e4411 (commit)


- Log -
commit 5c4b8c6f613e82d8fb35ceb6e7f799cedd4d173f
Author: TJ Saunders 
Date:   Fri Apr 29 07:41:50 2016 -0700

Remove confusing comment.

Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 

commit 5f18bc589865e6cc07e47ba7412a4cfd208abd04
Author: TJ Saunders 
Date:   Wed Mar 23 11:55:53 2016 -0700

Issue #719:

If no serverinfo extension is found in some cases, do not abort the 
handshake,
but simply omit/skip that extension.

Check for already-registered serverinfo callbacks during serverinfo
registration.

Update SSL_CTX_use_serverinfo() documentation to mention the need to reload 
the
same serverinfo per certificate, for servers with multiple server 
certificates.

Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 

---

Summary of changes:
 doc/ssl/SSL_CTX_use_serverinfo.pod |  8 
 ssl/ssl_rsa.c  | 28 +---
 2 files changed, 29 insertions(+), 7 deletions(-)

diff --git a/doc/ssl/SSL_CTX_use_serverinfo.pod 
b/doc/ssl/SSL_CTX_use_serverinfo.pod
index 318e052..caeb28d 100644
--- a/doc/ssl/SSL_CTX_use_serverinfo.pod
+++ b/doc/ssl/SSL_CTX_use_serverinfo.pod
@@ -30,6 +30,14 @@ must consist of a 2-byte Extension Type, a 2-byte length, 
and then length
 bytes of extension_data.  Each PEM extension name must begin with the phrase
 "BEGIN SERVERINFO FOR ".
 
+If more than one certificate (RSA/DSA) is installed using
+SSL_CTX_use_certificate(), the serverinfo extension will be loaded into the
+last certificate installed.  If e.g. the last item was a RSA certificate, the
+loaded serverinfo extension data will be loaded for that certificate.  To
+use the serverinfo extension for multiple certificates,
+SSL_CTX_use_serverinfo() needs to be called multiple times, once B
+each time a certificate is loaded.
+
 =head1 NOTES
 
 =head1 RETURN VALUES
diff --git a/ssl/ssl_rsa.c b/ssl/ssl_rsa.c
index 00bf887..f1280ad 100644
--- a/ssl/ssl_rsa.c
+++ b/ssl/ssl_rsa.c
@@ -831,7 +831,7 @@ static int serverinfo_srv_add_cb(SSL *s, unsigned int 
ext_type,
 return 0;   /* No extension found, don't send extension */
 return 1;   /* Send extension */
 }
-return -1;  /* No serverinfo data found, don't send
+return 0;   /* No serverinfo data found, don't send
  * extension */
 }
 
@@ -860,12 +860,26 @@ static int serverinfo_process_buffer(const unsigned char 
*serverinfo,
 
 /* Register callbacks for extensions */
 ext_type = (serverinfo[0] << 8) + serverinfo[1];
-if (ctx && !SSL_CTX_add_server_custom_ext(ctx, ext_type,
-  serverinfo_srv_add_cb,
-  NULL, NULL,
-  serverinfo_srv_parse_cb,
-  NULL))
-return 0;
+if (ctx) {
+int have_ext_cbs = 0;
+size_t i;
+custom_ext_methods *exts = >cert->srv_ext;
+custom_ext_method *meth = exts->meths;
+
+for (i = 0; i < exts->meths_count; i++, meth++) {
+if (ext_type == meth->ext_type) {
+have_ext_cbs = 1;
+break;
+}
+}
+
+if (!have_ext_cbs && !SSL_CTX_add_server_custom_ext(ctx, ext_type,
+
serverinfo_srv_add_cb,
+NULL, NULL,
+
serverinfo_srv_parse_cb,
+NULL))
+return 0;
+}
 
 serverinfo += 2;
 serverinfo_length -= 2;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: FdaSilvaYY/openssl#692 (OpenSSL_1_0_2-stable - a8d40f6)

2016-05-02 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #692
Status: Errored

Duration: 28 minutes and 52 seconds
Commit: a8d40f6 (OpenSSL_1_0_2-stable)
Author: TJ Saunders
Message: Remove confusing comment.

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/9676402c3a66...a8d40f64d820

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/127297070

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-02 Thread Richard Levitte
The branch master has been updated
   via  afce395cba521e395e6eecdaf9589105f61e4411 (commit)
   via  38add2300f5f6ef9c46eabc13537eaf50c51131d (commit)
   via  b5293d4c8dde9f71df27723071869ac8b62a0649 (commit)
   via  85e2fe81136087961ef1b6a40058d3916db08d70 (commit)
  from  e8408681b3fff91b794a1a5c65fd190019d6e9ee (commit)


- Log -
commit afce395cba521e395e6eecdaf9589105f61e4411
Author: Richard Levitte 
Date:   Mon May 2 20:00:12 2016 +0200

Document the addition of OPENSSL_LOCAL_CONFIG_DIR

Reviewed-by: Stephen Henson 

commit 38add2300f5f6ef9c46eabc13537eaf50c51131d
Author: Richard Levitte 
Date:   Mon May 2 17:05:48 2016 +0200

Add the possibility for local build file templates

Use the environment variable OPENSSL_LOCAL_CONFIG_DIR to find build
file templates as well.

Reviewed-by: Stephen Henson 

commit b5293d4c8dde9f71df27723071869ac8b62a0649
Author: Richard Levitte 
Date:   Mon May 2 16:50:51 2016 +0200

Add the possibility to have an extra local OpenSSL configs directory

The environment variable OPENSSL_LOCAL_CONFIG_DIR is used to indicate
that there's a local directory with extra configuration files.

Reviewed-by: Stephen Henson 

commit 85e2fe81136087961ef1b6a40058d3916db08d70
Author: Richard Levitte 
Date:   Mon May 2 16:02:04 2016 +0200

Remove personal configs from version control

As per a team decision back in 2014.

Reviewed-by: Stephen Henson 

---

Summary of changes:
 CHANGES |  7 +++
 Configurations/99-personal-ben.conf | 95 -
 Configurations/99-personal-bodo.conf| 21 
 Configurations/99-personal-geoff.conf   | 29 --
 Configurations/99-personal-levitte.conf | 21 
 Configurations/99-personal-rse.conf | 12 -
 Configurations/99-personal-steve.conf   | 50 -
 Configure   | 43 ---
 8 files changed, 44 insertions(+), 234 deletions(-)
 delete mode 100644 Configurations/99-personal-ben.conf
 delete mode 100644 Configurations/99-personal-bodo.conf
 delete mode 100644 Configurations/99-personal-geoff.conf
 delete mode 100644 Configurations/99-personal-levitte.conf
 delete mode 100644 Configurations/99-personal-rse.conf
 delete mode 100644 Configurations/99-personal-steve.conf

diff --git a/CHANGES b/CHANGES
index 477d185..41bc9a4 100644
--- a/CHANGES
+++ b/CHANGES
@@ -4,6 +4,13 @@
 
  Changes between 1.0.2g and 1.1.0  [xx XXX ]
 
+  *) To enable users to have their own config files and build file templates,
+ Configure looks in the directory indicated by the environment variable
+ OPENSSL_LOCAL_CONFIG_DIR as well as the in-source Configurations/
+ directory.  On VMS, OPENSSL_LOCAL_CONFIG_DIR is expected to be a logical
+ name and is used as is.
+ [Richard Levitte]
+
   *) The following datatypes were made opaque: X509_OBJECT, X509_STORE_CTX,
  X509_STORE, X509_LOOKUP, and X509_LOOKUP_METHOD.  The unused type
  X509_CERT_FILE_CTX was removed.
diff --git a/Configurations/99-personal-ben.conf 
b/Configurations/99-personal-ben.conf
deleted file mode 100644
index 50b9315..000
--- a/Configurations/99-personal-ben.conf
+++ /dev/null
@@ -1,95 +0,0 @@
-## -*- mode: perl; -*-
-## Personal configuration targets
-
-%targets = (
-"debug-ben" => {
-cc   => "gcc",
-cflags   => "$gcc_devteam_warn -DBN_DEBUG -DREF_DEBUG 
-DCONF_DEBUG -DBN_CTX_DEBUG -DDEBUG_SAFESTACK -O2 -pipe",
-thread_scheme=> "(unknown)",
-},
-"debug-ben-openbsd" => {
-cc   => "gcc",
-cflags   => "-DBN_DEBUG -DREF_DEBUG -DCONF_DEBUG 
-DBN_CTX_DEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DOPENSSL_OPENBSD_DEV_CRYPTO 
-DOPENSSL_NO_ASM -O2 -pedantic -Wall -Wshadow -Werror -pipe",
-thread_scheme=> "(unknown)",
-},
-"debug-ben-openbsd-debug" => {
-cc   => "gcc",
-cflags   => "-DBN_DEBUG -DREF_DEBUG -DCONF_DEBUG 
-DBN_CTX_DEBUG -DPEDANTIC -DDEBUG_SAFESTACK -DOPENSSL_OPENBSD_DEV_CRYPTO 
-DOPENSSL_NO_ASM -g3 -O2 -pedantic -Wall -Wshadow -Werror -pipe",
-thread_scheme=> "(unknown)",
-},
-"debug-ben-debug" => {
-cc   => "gcc",
-cflags   => "$gcc_devteam_warn -DBN_DEBUG -DCONF_DEBUG 
-DDEBUG_SAFESTACK -DOPENSSL_NO_HW_PADLOCK -g3 -O2 -pipe",
-thread_scheme=> "(unknown)",
-},
-"debug-ben-debug-64" => {
-inherit_from => [ "x86_64_asm" ],
-cc   => "gcc",
-cflags   => combine("$gcc_devteam_warn 

[openssl-commits] Errored: openssl/openssl#3623 (OpenSSL_1_0_2-stable - a8d40f6)

2016-05-02 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3623
Status: Errored

Duration: 21 minutes and 31 seconds
Commit: a8d40f6 (OpenSSL_1_0_2-stable)
Author: TJ Saunders
Message: Remove confusing comment.

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/openssl/openssl/compare/64eaf6c928f4...a8d40f64d820

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/127273781

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-02 Thread Rich Salz
The branch master has been updated
   via  e8408681b3fff91b794a1a5c65fd190019d6e9ee (commit)
  from  fbaf30d087a2db2b4e22279e819d481fca21ac5c (commit)


- Log -
commit e8408681b3fff91b794a1a5c65fd190019d6e9ee
Author: Todd Short 
Date:   Mon Apr 11 16:03:42 2016 -0400

Secure memory fixes

Fix some of the variables to be (s)size_t, so that more than 1GB of
secure memory can be allocated. The arena has to be a power of 2, and
2GB fails because it ends up being a negative 32-bit signed number.

The |too_late| flag is not strictly necessary; it is easy to figure
out if something is secure memory by looking at the arena. As before,
secure memory allocations will not fail, but now they can be freed
correctly. Once initialized, secure memory can still be used, even if
allocations occured before initialization.

Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 

---

Summary of changes:
 crypto/mem_sec.c | 70 +-
 doc/crypto/OPENSSL_secure_malloc.pod | 30 +++
 include/openssl/crypto.h |  2 +-
 test/secmemtest.c| 73 +---
 4 files changed, 116 insertions(+), 59 deletions(-)

diff --git a/crypto/mem_sec.c b/crypto/mem_sec.c
index 31c0525..d61d945 100644
--- a/crypto/mem_sec.c
+++ b/crypto/mem_sec.c
@@ -37,7 +37,6 @@
 static size_t secure_mem_used;
 
 static int secure_mem_initialized;
-static int too_late;
 
 static CRYPTO_RWLOCK *sec_malloc_lock = NULL;
 
@@ -48,7 +47,7 @@ static int sh_init(size_t size, int minsize);
 static char *sh_malloc(size_t size);
 static void sh_free(char *ptr);
 static void sh_done(void);
-static int sh_actual_size(char *ptr);
+static size_t sh_actual_size(char *ptr);
 static int sh_allocated(const char *ptr);
 #endif
 
@@ -57,10 +56,6 @@ int CRYPTO_secure_malloc_init(size_t size, int minsize)
 #ifdef IMPLEMENTED
 int ret = 0;
 
-if (too_late)
-return ret;
-
-OPENSSL_assert(!secure_mem_initialized);
 if (!secure_mem_initialized) {
 sec_malloc_lock = CRYPTO_THREAD_lock_new();
 if (sec_malloc_lock == NULL)
@@ -75,13 +70,17 @@ int CRYPTO_secure_malloc_init(size_t size, int minsize)
 #endif /* IMPLEMENTED */
 }
 
-void CRYPTO_secure_malloc_done()
+int CRYPTO_secure_malloc_done()
 {
 #ifdef IMPLEMENTED
-sh_done();
-secure_mem_initialized = 0;
-CRYPTO_THREAD_lock_free(sec_malloc_lock);
+if (secure_mem_used == 0) {
+sh_done();
+secure_mem_initialized = 0;
+CRYPTO_THREAD_lock_free(sec_malloc_lock);
+return 1;
+}
 #endif /* IMPLEMENTED */
+return 0;
 }
 
 int CRYPTO_secure_malloc_initialized()
@@ -100,7 +99,6 @@ void *CRYPTO_secure_malloc(size_t num, const char *file, int 
line)
 size_t actual_size;
 
 if (!secure_mem_initialized) {
-too_late = 1;
 return CRYPTO_malloc(num, file, line);
 }
 CRYPTO_THREAD_write_lock(sec_malloc_lock);
@@ -130,7 +128,7 @@ void CRYPTO_secure_free(void *ptr, const char *file, int 
line)
 
 if (ptr == NULL)
 return;
-if (!secure_mem_initialized) {
+if (!CRYPTO_secure_allocated(ptr)) {
 CRYPTO_free(ptr, file, line);
 return;
 }
@@ -208,9 +206,11 @@ size_t CRYPTO_secure_actual_size(void *ptr)
  * place.
  */
 
-# define TESTBIT(t, b)  (t[(b) >> 3] &  (1 << ((b) & 7)))
-# define SETBIT(t, b)   (t[(b) >> 3] |= (1 << ((b) & 7)))
-# define CLEARBIT(t, b) (t[(b) >> 3] &= (0xFF & ~(1 << ((b) & 7
+#define ONE ((size_t)1)
+
+# define TESTBIT(t, b)  (t[(b) >> 3] &  (ONE << ((b) & 7)))
+# define SETBIT(t, b)   (t[(b) >> 3] |= (ONE << ((b) & 7)))
+# define CLEARBIT(t, b) (t[(b) >> 3] &= (0xFF & ~(ONE << ((b) & 7
 
 #define WITHIN_ARENA(p) \
 ((char*)(p) >= sh.arena && (char*)(p) < [sh.arena_size])
@@ -229,21 +229,21 @@ typedef struct sh_st
 char* map_result;
 size_t map_size;
 char *arena;
-int arena_size;
+size_t arena_size;
 char **freelist;
-int freelist_size;
-int minsize;
+ossl_ssize_t freelist_size;
+size_t minsize;
 unsigned char *bittable;
 unsigned char *bitmalloc;
-int bittable_size; /* size in bits */
+size_t bittable_size; /* size in bits */
 } SH;
 
 static SH sh;
 
-static int sh_getlist(char *ptr)
+static size_t sh_getlist(char *ptr)
 {
-int list = sh.freelist_size - 1;
-int bit = (sh.arena_size + ptr - sh.arena) / sh.minsize;
+ossl_ssize_t list = sh.freelist_size - 1;
+size_t bit = (sh.arena_size + ptr - sh.arena) / sh.minsize;
 
 for (; bit; bit >>= 1, list--) {
 if (TESTBIT(sh.bittable, bit))
@@ -257,22 +257,22 @@ static int sh_getlist(char *ptr)
 
 static int sh_testbit(char *ptr, int list, unsigned char *table)
 {
-int 

[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2016-05-02 Thread Rich Salz
The branch OpenSSL_1_0_2-stable has been updated
   via  a8d40f64d820e199c87a21597acd92a530286885 (commit)
   via  876931488652438645427b041da058883cbb3513 (commit)
  from  64eaf6c928f4066d62aa86f805796ef05bd0b1cc (commit)


- Log -
commit a8d40f64d820e199c87a21597acd92a530286885
Author: TJ Saunders 
Date:   Fri Apr 29 07:40:28 2016 -0700

Remove confusing comment.

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 

commit 876931488652438645427b041da058883cbb3513
Author: TJ Saunders 
Date:   Wed Mar 23 11:55:53 2016 -0700

Issue #719:

If no serverinfo extension is found in some cases, do not abort the 
handshake,
but simply omit/skip that extension.

Check for already-registered serverinfo callbacks during serverinfo
registration.

Update SSL_CTX_use_serverinfo() documentation to mention the need to reload 
the
same serverinfo per certificate, for servers with multiple server 
certificates.

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 

---

Summary of changes:
 doc/ssl/SSL_CTX_use_serverinfo.pod |  8 
 ssl/ssl_rsa.c  | 28 +---
 2 files changed, 29 insertions(+), 7 deletions(-)

diff --git a/doc/ssl/SSL_CTX_use_serverinfo.pod 
b/doc/ssl/SSL_CTX_use_serverinfo.pod
index 318e052..caeb28d 100644
--- a/doc/ssl/SSL_CTX_use_serverinfo.pod
+++ b/doc/ssl/SSL_CTX_use_serverinfo.pod
@@ -30,6 +30,14 @@ must consist of a 2-byte Extension Type, a 2-byte length, 
and then length
 bytes of extension_data.  Each PEM extension name must begin with the phrase
 "BEGIN SERVERINFO FOR ".
 
+If more than one certificate (RSA/DSA) is installed using
+SSL_CTX_use_certificate(), the serverinfo extension will be loaded into the
+last certificate installed.  If e.g. the last item was a RSA certificate, the
+loaded serverinfo extension data will be loaded for that certificate.  To
+use the serverinfo extension for multiple certificates,
+SSL_CTX_use_serverinfo() needs to be called multiple times, once B
+each time a certificate is loaded.
+
 =head1 NOTES
 
 =head1 RETURN VALUES
diff --git a/ssl/ssl_rsa.c b/ssl/ssl_rsa.c
index b0f75c9..8202247 100644
--- a/ssl/ssl_rsa.c
+++ b/ssl/ssl_rsa.c
@@ -841,7 +841,7 @@ static int serverinfo_srv_add_cb(SSL *s, unsigned int 
ext_type,
 return 0;   /* No extension found, don't send extension */
 return 1;   /* Send extension */
 }
-return -1;  /* No serverinfo data found, don't send
+return 0;   /* No serverinfo data found, don't send
  * extension */
 }
 
@@ -870,12 +870,26 @@ static int serverinfo_process_buffer(const unsigned char 
*serverinfo,
 
 /* Register callbacks for extensions */
 ext_type = (serverinfo[0] << 8) + serverinfo[1];
-if (ctx && !SSL_CTX_add_server_custom_ext(ctx, ext_type,
-  serverinfo_srv_add_cb,
-  NULL, NULL,
-  serverinfo_srv_parse_cb,
-  NULL))
-return 0;
+if (ctx) {
+int have_ext_cbs = 0;
+size_t i;
+custom_ext_methods *exts = >cert->srv_ext;
+custom_ext_method *meth = exts->meths;
+
+for (i = 0; i < exts->meths_count; i++, meth++) {
+if (ext_type == meth->ext_type) {
+have_ext_cbs = 1;
+break;
+}
+}
+
+if (!have_ext_cbs && !SSL_CTX_add_server_custom_ext(ctx, ext_type,
+
serverinfo_srv_add_cb,
+NULL, NULL,
+
serverinfo_srv_parse_cb,
+NULL))
+return 0;
+}
 
 serverinfo += 2;
 serverinfo_length -= 2;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Jenkins build is back to normal : master_basic #1860

2016-05-02 Thread openssl . sanity
See 

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl master.2940

2016-05-02 Thread AppVeyor


Build openssl master.2940 completed



Commit fbaf30d087 by Andy Polyakov on 5/2/2016 1:23 PM:

ssl/record/rec_layer_s3.c: fix typo from previous commit.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Passed: openssl/openssl#3622 (master - fbaf30d)

2016-05-02 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3622
Status: Passed

Duration: 23 minutes and 1 second
Commit: fbaf30d (master)
Author: Andy Polyakov
Message: ssl/record/rec_layer_s3.c: fix typo from previous commit.

Reviewed-by: Richard Levitte 

View the changeset: 
https://github.com/openssl/openssl/compare/d244dd559d0e...fbaf30d087a2

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/127216005

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-02 Thread Andy Polyakov
The branch master has been updated
   via  fbaf30d087a2db2b4e22279e819d481fca21ac5c (commit)
  from  d244dd559d0e6e594e4a0f911e49509e8a7b158b (commit)


- Log -
commit fbaf30d087a2db2b4e22279e819d481fca21ac5c
Author: Andy Polyakov 
Date:   Mon May 2 15:20:41 2016 +0200

ssl/record/rec_layer_s3.c: fix typo from previous commit.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 ssl/record/rec_layer_s3.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/ssl/record/rec_layer_s3.c b/ssl/record/rec_layer_s3.c
index 12df578..f250fa0 100644
--- a/ssl/record/rec_layer_s3.c
+++ b/ssl/record/rec_layer_s3.c
@@ -125,7 +125,7 @@
 #if defined(OPENSSL_SMALL_FOOTPRINT) || \
 !(  defined(AES_ASM) && ( \
 defined(__x86_64)   || defined(__x86_64__)  || \
-defined(_M_AMD64)   || defined(_M_X64)  )
+defined(_M_AMD64)   || defined(_M_X64)  ) \
 )
 # undef EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK
 # define EVP_CIPH_FLAG_TLS1_1_MULTIBLOCK 0
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#3621 (master - d244dd5)

2016-05-02 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3621
Status: Errored

Duration: 15 minutes and 0 seconds
Commit: d244dd5 (master)
Author: Rich Salz
Message: Handle multi-line "written by/for" comments.

Reviewed-by: Richard Levitte 

View the changeset: 
https://github.com/openssl/openssl/compare/cba792a1e941...d244dd559d0e

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/127204848

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2939

2016-05-02 Thread AppVeyor



Build openssl master.2939 failed


Commit d244dd559d by Rich Salz on 5/2/2016 12:27 PM:

Handle multi-line "written by/for" comments.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-02 Thread Rich Salz
The branch master has been updated
   via  d244dd559d0e6e594e4a0f911e49509e8a7b158b (commit)
  from  cba792a1e941788cba7dc700a2ef59420e7f2522 (commit)


- Log -
commit d244dd559d0e6e594e4a0f911e49509e8a7b158b
Author: Rich Salz 
Date:   Sun May 1 09:23:38 2016 -0400

Handle multi-line "written by/for" comments.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 util/copyright.pl | 6 ++
 1 file changed, 6 insertions(+)

diff --git a/util/copyright.pl b/util/copyright.pl
index ccc70af..4367f15 100644
--- a/util/copyright.pl
+++ b/util/copyright.pl
@@ -30,6 +30,12 @@ sub check_comment()
 }
 }
 
+# Look for a multi-line "written by" comment.
+if ( ! $skipit ) {
+my $text = join('', @lines);
+$skipit = 1 if $text =~ m/Written by.*for the OpenSSL Project/is;
+}
+
 print @lines unless $skipit;
 return $skipit;
 }
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.2938

2016-05-02 Thread AppVeyor



Build openssl master.2938 failed


Commit cba792a1e9 by Andy Polyakov on 5/2/2016 10:49 AM:

Android build fixes.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Broken: openssl/openssl#3620 (master - cba792a)

2016-05-02 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3620
Status: Broken

Duration: 14 minutes and 32 seconds
Commit: cba792a (master)
Author: Andy Polyakov
Message: Android build fixes.

Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/openssl/openssl/compare/24c2cd3967ed...cba792a1e941

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/127197371

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-02 Thread Andy Polyakov
The branch master has been updated
   via  cba792a1e941788cba7dc700a2ef59420e7f2522 (commit)
   via  b1a07c38540105077878ad80a6a87c96fdbc18f1 (commit)
   via  8e9f1bb99e035e30450c85595150408dc1ac3d82 (commit)
  from  24c2cd3967ed23acc0bd31a3781c4525e2e42a2c (commit)


- Log -
commit cba792a1e941788cba7dc700a2ef59420e7f2522
Author: Andy Polyakov 
Date:   Sun May 1 13:35:31 2016 +0200

Android build fixes.

Reviewed-by: Rich Salz 

commit b1a07c38540105077878ad80a6a87c96fdbc18f1
Author: Andy Polyakov 
Date:   Sun May 1 14:14:34 2016 +0200

Remove obsolete defined(__INTEL__) condition.

This macro was defined by no-longer-supported __MWERKS__ compiler.

Reviewed-by: Richard Levitte 

commit 8e9f1bb99e035e30450c85595150408dc1ac3d82
Author: Andy Polyakov 
Date:   Sun May 1 14:09:15 2016 +0200

chacha/asm/chacha-x86.pl: make it compile on legacy systems.

Usage of $ymm variable is a bit misleading here, it doesn't refer
to %ymm register bank, but rather to VEX instruction encoding,
which AMD XOP code path depends on.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 Configurations/10-main.conf| 16 +---
 Configurations/unix-Makefile.tmpl  |  2 +-
 crypto/async/arch/async_posix.h|  2 +-
 crypto/chacha/asm/chacha-x86.pl|  4 +++-
 crypto/cryptlib.c  |  1 -
 crypto/evp/e_aes.c |  3 +--
 crypto/evp/e_aes_cbc_hmac_sha1.c   |  3 +--
 crypto/evp/e_aes_cbc_hmac_sha256.c |  3 +--
 crypto/evp/e_rc4_hmac_md5.c|  3 +--
 crypto/md5/md5_locl.h  |  2 +-
 crypto/ripemd/rmd_locl.h   |  2 +-
 engines/e_padlock.c|  3 +--
 ssl/record/rec_layer_s3.c  |  3 +--
 13 files changed, 18 insertions(+), 29 deletions(-)

diff --git a/Configurations/10-main.conf b/Configurations/10-main.conf
index 9d3f3ff..601dbe5 100644
--- a/Configurations/10-main.conf
+++ b/Configurations/10-main.conf
@@ -896,17 +896,14 @@ sub vms_info {
 # Special note about unconditional -fPIC and -pie. The underlying
 # reason is that Lollipop refuses to run non-PIE. But what about
 # older systems and NDKs? -fPIC was never problem, so the only
-# concern if -pie. Older toolchains, e.g. r4, appear to handle it
+# concern is -pie. Older toolchains, e.g. r4, appear to handle it
 # and binaries turn mostly functional. "Mostly" means that oldest
 # Androids, such as Froyo, fail to handle executable, but newer
 # systems are perfectly capable of executing binaries targeting
 # Froyo. Keep in mind that in the nutshell Android builds are
 # about JNI, i.e. shared libraries, not applications.
-cflags   => picker(default => "-mandroid -fPIC 
--sysroot=\$(CROSS_SYSROOT) -Wa,--noexecstack -Wall",
-   debug   => "-O0 -g",
-   release => "-O3"),
-lflags   => "-pie",
-shared_cflag => "",
+cflags   => add(picker(default => "-mandroid -fPIC 
--sysroot=\$(CROSS_SYSROOT) -Wa,--noexecstack")),
+bin_cflags   => "-pie",
 },
 "android-x86" => {
 inherit_from => [ "android", asm("x86_asm") ],
@@ -945,11 +942,8 @@ sub vms_info {
 
 "android64" => {
 inherit_from => [ "linux-generic64" ],
-cflags   => picker(default => "-mandroid -fPIC 
--sysroot=\$(CROSS_SYSROOT) -Wa,--noexecstack -Wall",
-   debug   => "-O0 -g",
-   release => "-O3"),
-lflags   => "-pie",
-shared_cflag => "",
+cflags   => add(picker(default => "-mandroid -fPIC 
--sysroot=\$(CROSS_SYSROOT) -Wa,--noexecstack")),
+bin_cflags   => "-pie",
 },
 "android64-aarch64" => {
 inherit_from => [ "android64", asm("aarch64_asm") ],
diff --git a/Configurations/unix-Makefile.tmpl 
b/Configurations/unix-Makefile.tmpl
index 164b533..974a978 100644
--- a/Configurations/unix-Makefile.tmpl
+++ b/Configurations/unix-Makefile.tmpl
@@ -172,7 +172,7 @@ LIB_LDFLAGS={- $target{shared_ldflag}." 
".$config{shared_ldflag}
 RCFLAGS={- $target{shared_rcflag} -}
 DSO_CFLAGS={- $target{shared_cflag} || "" -}
 DSO_LDFLAGS=$(LIB_LDFLAGS)
-BIN_CFLAGS={- "" -}
+BIN_CFLAGS={- $target{bin_cflags} -}
 
 PERL={- $config{perl} -}
 
diff --git a/crypto/async/arch/async_posix.h b/crypto/async/arch/async_posix.h
index de80f95..1a611ba 100644
--- a/crypto/async/arch/async_posix.h
+++ b/crypto/async/arch/async_posix.h
@@ -53,7 +53,7 @@
 #define OPENSSL_ASYNC_ARCH_ASYNC_POSIX_H
 #include 
 
-#if (defined(OPENSSL_SYS_UNIX) || 

[openssl-commits] Build failed in Jenkins: master_windows #1594

2016-05-02 Thread openssl . sanity
See 

Changes:

[Matt Caswell] Make header signature of CRYPTO_mem_leaks BIO instead of struct 
bio_st

[Matt Caswell] The x509_name_canon function doesn't check for an error return

[Matt Caswell] Check for failed malloc in BIO_ADDR_new

[Matt Caswell] Check for a NULL return value from a call to X509_STORE_CTX_new()

[Matt Caswell] Avoid a NULL ptr deref if group is not set

[Matt Caswell] Don't use an uninitialised variable in srp application

[Matt Caswell] Remove some dead code from EC_GROUP_check()

[rsalz] Add asn1_mac

[Richard Levitte] Change 'struct bio_st' in all public header where applicable

[Richard Levitte] Remove BIO_dummy, it's old cruft

[steve] Add size limit to X509_NAME structure.

[steve] Sanity check buffer length.

[steve] Add checks to X509_NAME_oneline()

[Matt Caswell] Fix some X509_STORE macros

[Richard Levitte] Skip blank lines if old copyright comment was removed, and 
only then

[Richard Levitte] Adjust a last few generators to new license boilerplate and C 
code style

[Richard Levitte] Add the adjusted perl scripts to the set of "update" scripts

[Richard Levitte] make update

[rsalz] Fix spelling in pod files

--
Started by upstream project "master_basic" build number 1858
originally caused by:
 Started by an SCM change
Building remotely on windows-slave in workspace 

 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://github.com/openssl/openssl.git # 
 > timeout=10
Fetching upstream changes from https://github.com/openssl/openssl.git
 > git --version # timeout=10
 > git -c core.askpass=true fetch --tags --progress 
 > https://github.com/openssl/openssl.git +refs/heads/*:refs/remotes/origin/*
 > git rev-parse "refs/remotes/origin/master^{commit}" # timeout=10
 > git rev-parse "refs/remotes/origin/origin/master^{commit}" # timeout=10
Checking out Revision 24c2cd3967ed23acc0bd31a3781c4525e2e42a2c 
(refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 24c2cd3967ed23acc0bd31a3781c4525e2e42a2c
 > git rev-list 87a8405b66e94cbfc40c44104c3b52f342a623d5 # timeout=10
[master_windows] $ cmd /c call 
C:\Users\ADMINI~1\AppData\Local\Temp\1\hudson2851036782590381414.bat

call> "c:\program 
files (x86)\microsoft visual studio 12.0\vc\bin\vcvars32.bat" 

set> 
PROCESSOR_ARCHITECTURE=x86 

perl> Configure 
VC-WIN32 
Configuring OpenSSL version 1.1.0-pre6-dev (0x0x1016L)
no-crypto-mdebug [default]  OPENSSL_NO_CRYPTO_MDEBUG (skip dir)
no-crypto-mdebug-backtrace [forced]   OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE 
(skip dir)
no-ec_nistp_64_gcc_128 [default]  OPENSSL_NO_EC_NISTP_64_GCC_128 (skip dir)
no-egd  [default]  OPENSSL_NO_EGD (skip dir)
no-heartbeats   [default]  OPENSSL_NO_HEARTBEATS (skip dir)
no-md2  [default]  OPENSSL_NO_MD2 (skip dir)
no-rc5  [default]  OPENSSL_NO_RC5 (skip dir)
no-sctp [default]  OPENSSL_NO_SCTP (skip dir)
no-ssl-trace[default]  OPENSSL_NO_SSL_TRACE (skip dir)
no-ssl3 [default]  OPENSSL_NO_SSL3 (skip dir)
no-ssl3-method  [default]  OPENSSL_NO_SSL3_METHOD (skip dir)
no-unit-test[default]  OPENSSL_NO_UNIT_TEST (skip dir)
no-weak-ssl-ciphers [default]  OPENSSL_NO_WEAK_SSL_CIPHERS (skip dir)
no-zlib [default] 
no-zlib-dynamic [default] 
Configuring for VC-WIN32
CC=cl
CFLAG =-W3 -wd4090 -Gs0 -GF -Gy -nologo -DOPENSSL_SYS_WIN32 
-DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE -DUNICODE 
-D_UNICODE /MD /Ox /O2 /Ob2 
SHARED_CFLAG  =
DEFINES   =OPENSSL_USE_APPLINK DSO_WIN32 NDEBUG OPENSSL_THREADS 
OPENSSL_NO_STATIC_ENGINE OPENSSL_PIC OPENSSL_BN_ASM_PART_WORDS 
OPENSSL_IA32_SSE2 OPENSSL_BN_ASM_MONT OPENSSL_BN_ASM_GF2m SHA1_ASM SHA256_ASM 
SHA512_ASM MD5_ASM RMD160_ASM AES_ASM VPAES_ASM WHIRLPOOL_ASM GHASH_ASM 
ECP_NISTZ256_ASM POLY1305_ASM
LFLAG =/nologo /debug
PLIB_LFLAG=
EX_LIBS   =ws2_32.lib gdi32.lib advapi32.lib crypt32.lib user32.lib 
APPS_OBJ  =../ms/applink.o
CPUID_OBJ =x86cpuid.o
UPLINK_OBJ=../ms/uplink.o
BN_ASM=bn-586.o co-586.o x86-mont.o x86-gf2m.o
EC_ASM=ecp_nistz256.o ecp_nistz256-x86.o
DES_ENC   =des-586.o crypt586.o
AES_ENC   =aes-586.o vpaes-x86.o aesni-x86.o
BF_ENC=bf-586.o
CAST_ENC  =c_enc.o
RC4_ENC   =rc4-586.o
RC5_ENC   =rc5-586.o
MD5_OBJ_ASM   =md5-586.o
SHA1_OBJ_ASM  =sha1-586.o sha256-586.o sha512-586.o
RMD160_OBJ_ASM=rmd-586.o
CMLL_ENC  =cmll-x86.o
MODES_OBJ =ghash-x86.o
PADLOCK_OBJ   =e_padlock-x86.o
CHACHA_ENC=chacha-x86.o

[openssl-commits] Errored: FdaSilvaYY/openssl#684 (pod-spelling-fix - d4ec93c)

2016-05-02 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #684
Status: Errored

Duration: 3 minutes and 46 seconds
Commit: d4ec93c (pod-spelling-fix)
Author: FdaSilvaYY
Message: Fix spelling in pod files

View the changeset: https://github.com/FdaSilvaYY/openssl/commit/d4ec93ceef25

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/127157220

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits