[openssl-commits] Build failed: openssl 1.0.44
Build openssl 1.0.44 failed Commit e29ecf25b2 by FdaSilvaYY on 5/6/2016 10:35 PM: Few cleanups in s_client, s_server apps. Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Fixed: FdaSilvaYY/openssl#781 (ex_data-fixes - 0cbcb26)
Build Update for FdaSilvaYY/openssl - Build: #781 Status: Fixed Duration: 22 minutes and 32 seconds Commit: 0cbcb26 (ex_data-fixes) Author: FdaSilvaYY Message: Add checks on CRYPTO_set_ex_data return value Fix possible leak in danetest.c View the changeset: https://github.com/FdaSilvaYY/openssl/compare/6c967902d9ad...0cbcb2656e5d View the full build log and details: https://travis-ci.org/FdaSilvaYY/openssl/builds/128423581 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Passed: FdaSilvaYY/openssl#779 (err-raise-fix - 9d8c4f2)
Build Update for FdaSilvaYY/openssl - Build: #779 Status: Passed Duration: 21 minutes and 54 seconds Commit: 9d8c4f2 (err-raise-fix) Author: FdaSilvaYY Message: Raise an Err when CRYPTO_THREAD_lock_new fails Add missing error raise call, as it is done everyxhere else. and as CRYPTO_THREAD_lock_new don't do it internally. View the changeset: https://github.com/FdaSilvaYY/openssl/compare/31a22f681c8c...9d8c4f2b966f View the full build log and details: https://travis-ci.org/FdaSilvaYY/openssl/builds/128423154 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build completed: openssl 1.0.40
Build openssl 1.0.40 completed Commit 8b633ebc21 by FdaSilvaYY on 5/6/2016 10:20 PM: Disable Travis Notifications Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Fixed: FdaSilvaYY/openssl#777 (more-zalloc2 - c3288b7)
Build Update for FdaSilvaYY/openssl - Build: #777 Status: Fixed Duration: 28 minutes and 37 seconds Commit: c3288b7 (more-zalloc2) Author: FdaSilvaYY Message: Add more zalloc View the changeset: https://github.com/FdaSilvaYY/openssl/compare/887d797bbc65...c3288b711ea2 View the full build log and details: https://travis-ci.org/FdaSilvaYY/openssl/builds/128420749 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl 1.0.39
Build openssl 1.0.39 failed Commit 31a22f681c by FdaSilvaYY on 5/6/2016 10:17 PM: Raise an Err when CRYPTO_THREAD_lock_new fails Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Failed: FdaSilvaYY/openssl#775 (err-raise-fix - 31a22f6)
Build Update for FdaSilvaYY/openssl - Build: #775 Status: Failed Duration: 23 minutes and 30 seconds Commit: 31a22f6 (err-raise-fix) Author: FdaSilvaYY Message: Raise an Err when CRYPTO_THREAD_lock_new fails Add missing error raise call, as it is done everyxhere else. and as CRYPTO_THREAD_lock_new don't do it internally. View the changeset: https://github.com/FdaSilvaYY/openssl/compare/436348a648d7...31a22f681c8c View the full build log and details: https://travis-ci.org/FdaSilvaYY/openssl/builds/128420174 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Fixed: openssl/openssl#3758 (OpenSSL_1_0_2-stable - b1f8ba4)
Build Update for openssl/openssl - Build: #3758 Status: Fixed Duration: 20 minutes and 57 seconds Commit: b1f8ba4 (OpenSSL_1_0_2-stable) Author: Dr. Stephen Henson Message: Constify PKCS12_newpass() PR#4449 Reviewed-by: Rich Salz(cherry picked from commit 049f5bbce3eebdf4ec2030042eb2ae64bb67aedb) Conflicts: doc/crypto/PKCS12_newpass.pod View the changeset: https://github.com/openssl/openssl/compare/6e216ba689c3...b1f8ba4dc703 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/128401993 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Fixed: openssl/openssl#3757 (master - 049f5bb)
Build Update for openssl/openssl - Build: #3757 Status: Fixed Duration: 27 minutes and 6 seconds Commit: 049f5bb (master) Author: Dr. Stephen Henson Message: Constify PKCS12_newpass() PR#4449 Reviewed-by: Rich SalzView the changeset: https://github.com/openssl/openssl/compare/708cf5ded249...049f5bbce3ee View the full build log and details: https://travis-ci.org/openssl/openssl/builds/128395907 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] OpenSSL_1_0_1-stable update
The branch OpenSSL_1_0_1-stable has been updated via 0377ad3974acabf15f7585df4383717c96285455 (commit) via 5255b49fb736350de1840d9df0bd1fb78fefb3d0 (commit) from 4d71891ad13f3e1e1b1f55f5e8fa55b497f1cd43 (commit) - Log - commit 0377ad3974acabf15f7585df4383717c96285455 Author: Dr. Stephen HensonDate: Fri May 6 03:46:09 2016 +0100 Constify PKCS12_newpass() PR#4449 Reviewed-by: Rich Salz (cherry picked from commit b1f8ba4dc7032a061d60b960c393178263e4a471) commit 5255b49fb736350de1840d9df0bd1fb78fefb3d0 Author: Dr. Stephen Henson Date: Thu May 5 15:37:23 2016 +0100 Tidy up PKCS12_newpass() fix memory leaks. PR#4466 Reviewed-by: Rich Salz (cherry picked from commit 06227924ad77fee9ead79189328aebf078c37add) --- Summary of changes: crypto/pkcs12/p12_npas.c | 113 ++- crypto/pkcs12/pkcs12.h | 2 +- 2 files changed, 55 insertions(+), 60 deletions(-) diff --git a/crypto/pkcs12/p12_npas.c b/crypto/pkcs12/p12_npas.c index a89b61a..9e8ebb2 100644 --- a/crypto/pkcs12/p12_npas.c +++ b/crypto/pkcs12/p12_npas.c @@ -66,17 +66,18 @@ /* PKCS#12 password change routine */ -static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); -static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass, -char *newpass); -static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); +static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); +static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *oldpass, +const char *newpass); +static int newpass_bag(PKCS12_SAFEBAG *bag, const char *oldpass, +const char *newpass); static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); /* * Change the password on a PKCS#12 structure. */ -int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) +int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) { /* Check for NULL PKCS12 structure */ @@ -103,20 +104,21 @@ int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) /* Parse the outer PKCS#12 structure */ -static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) +static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) { -STACK_OF(PKCS7) *asafes, *newsafes; -STACK_OF(PKCS12_SAFEBAG) *bags; +STACK_OF(PKCS7) *asafes = NULL, *newsafes = NULL; +STACK_OF(PKCS12_SAFEBAG) *bags = NULL; int i, bagnid, pbe_nid = 0, pbe_iter = 0, pbe_saltlen = 0; PKCS7 *p7, *p7new; -ASN1_OCTET_STRING *p12_data_tmp = NULL, *macnew = NULL; +ASN1_OCTET_STRING *p12_data_tmp = NULL; unsigned char mac[EVP_MAX_MD_SIZE]; unsigned int maclen; +int rv = 0; -if (!(asafes = PKCS12_unpack_authsafes(p12))) -return 0; -if (!(newsafes = sk_PKCS7_new_null())) -return 0; +if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) +goto err; +if ((newsafes = sk_PKCS7_new_null()) == NULL) +goto err; for (i = 0; i < sk_PKCS7_num(asafes); i++) { p7 = sk_PKCS7_value(asafes, i); bagnid = OBJ_obj2nid(p7->type); @@ -125,67 +127,57 @@ static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) } else if (bagnid == NID_pkcs7_encrypted) { bags = PKCS12_unpack_p7encdata(p7, oldpass, -1); if (!alg_get(p7->d.encrypted->enc_data->algorithm, - _nid, _iter, _saltlen)) { -sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); -bags = NULL; -} -} else + _nid, _iter, _saltlen)) +goto err; +} else { continue; -if (!bags) { -sk_PKCS7_pop_free(asafes, PKCS7_free); -return 0; -} -if (!newpass_bags(bags, oldpass, newpass)) { -sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); -sk_PKCS7_pop_free(asafes, PKCS7_free); -return 0; } +if (bags == NULL) +goto err; +if (!newpass_bags(bags, oldpass, newpass)) +goto err; /* Repack bag in same form with new password */ if (bagnid == NID_pkcs7_data) p7new = PKCS12_pack_p7data(bags); else p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL, pbe_saltlen, pbe_iter, bags); +if (!p7new || !sk_PKCS7_push(newsafes, p7new)) +goto err; sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); -if (!p7new) { -sk_PKCS7_pop_free(asafes,
[openssl-commits] Fixed: openssl/openssl#3755 (OpenSSL_1_0_2-stable - 6e216ba)
Build Update for openssl/openssl - Build: #3755 Status: Fixed Duration: 19 minutes and 54 seconds Commit: 6e216ba (OpenSSL_1_0_2-stable) Author: Dr. Stephen Henson Message: Only set CMS parameter when encrypting Reviewed-by: Rich Salz(cherry picked from commit 708cf5ded249f871fcd5e3de27d9281b1f37ae71) View the changeset: https://github.com/openssl/openssl/compare/0c4465ede784...6e216ba689c3 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/128394209 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 049f5bbce3eebdf4ec2030042eb2ae64bb67aedb (commit) via c95a8b4eb51cec25ddce846dfbd922b016d54d0c (commit) via d800d0f45b7618c30692c01d4dbf96042468b932 (commit) from 708cf5ded249f871fcd5e3de27d9281b1f37ae71 (commit) - Log - commit 049f5bbce3eebdf4ec2030042eb2ae64bb67aedb Author: Dr. Stephen HensonDate: Fri May 6 03:46:09 2016 +0100 Constify PKCS12_newpass() PR#4449 Reviewed-by: Rich Salz commit c95a8b4eb51cec25ddce846dfbd922b016d54d0c Author: Jeffrey Walton Date: Thu May 5 14:26:26 2016 +0100 Add documentation of PKCS12_newpass() PR#4478 Reviewed-by: Rich Salz Reviewed-by: Stephen Henson commit d800d0f45b7618c30692c01d4dbf96042468b932 Author: Dr. Stephen Henson Date: Thu May 5 15:37:23 2016 +0100 Tidy up PKCS12_newpass() fix memory leaks. PR#4466 Reviewed-by: Rich Salz --- Summary of changes: crypto/pkcs12/p12_npas.c | 93 +- doc/crypto/PKCS12_newpass.pod | 94 +++ include/openssl/pkcs12.h | 2 +- 3 files changed, 142 insertions(+), 47 deletions(-) create mode 100644 doc/crypto/PKCS12_newpass.pod diff --git a/crypto/pkcs12/p12_npas.c b/crypto/pkcs12/p12_npas.c index e23d035..000d7fb 100644 --- a/crypto/pkcs12/p12_npas.c +++ b/crypto/pkcs12/p12_npas.c @@ -66,17 +66,18 @@ /* PKCS#12 password change routine */ -static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass); -static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass, -char *newpass); -static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass); +static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass); +static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *oldpass, +const char *newpass); +static int newpass_bag(PKCS12_SAFEBAG *bag, const char *oldpass, +const char *newpass); static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); /* * Change the password on a PKCS#12 structure. */ -int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) +int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass) { /* Check for NULL PKCS12 structure */ @@ -103,20 +104,21 @@ int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass) /* Parse the outer PKCS#12 structure */ -static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) +static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass) { -STACK_OF(PKCS7) *asafes, *newsafes; -STACK_OF(PKCS12_SAFEBAG) *bags; +STACK_OF(PKCS7) *asafes = NULL, *newsafes = NULL; +STACK_OF(PKCS12_SAFEBAG) *bags = NULL; int i, bagnid, pbe_nid = 0, pbe_iter = 0, pbe_saltlen = 0; PKCS7 *p7, *p7new; ASN1_OCTET_STRING *p12_data_tmp = NULL, *macoct = NULL; unsigned char mac[EVP_MAX_MD_SIZE]; unsigned int maclen; +int rv = 0; if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL) -return 0; +goto err; if ((newsafes = sk_PKCS7_new_null()) == NULL) -return 0; +goto err; for (i = 0; i < sk_PKCS7_num(asafes); i++) { p7 = sk_PKCS7_value(asafes, i); bagnid = OBJ_obj2nid(p7->type); @@ -125,63 +127,59 @@ static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass) } else if (bagnid == NID_pkcs7_encrypted) { bags = PKCS12_unpack_p7encdata(p7, oldpass, -1); if (!alg_get(p7->d.encrypted->enc_data->algorithm, - _nid, _iter, _saltlen)) { -sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); -bags = NULL; -} -} else + _nid, _iter, _saltlen)) +goto err; +} else { continue; -if (!bags) { -sk_PKCS7_pop_free(asafes, PKCS7_free); -return 0; -} -if (!newpass_bags(bags, oldpass, newpass)) { -sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); -sk_PKCS7_pop_free(asafes, PKCS7_free); -return 0; } +if (bags == NULL) +goto err; +if (!newpass_bags(bags, oldpass, newpass)) +goto err; /* Repack bag in same form with new password */ if (bagnid == NID_pkcs7_data) p7new = PKCS12_pack_p7data(bags); else p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL, pbe_saltlen, pbe_iter, bags); +if (!p7new ||
[openssl-commits] [openssl] OpenSSL_1_0_1-stable update
The branch OpenSSL_1_0_1-stable has been updated via 4d71891ad13f3e1e1b1f55f5e8fa55b497f1cd43 (commit) from b0e1362a9432ccc65b529602e64a59f108ca539d (commit) - Log - commit 4d71891ad13f3e1e1b1f55f5e8fa55b497f1cd43 Author: Dr. Stephen HensonDate: Fri May 6 19:27:49 2016 +0100 Only set CMS parameter when encrypting Reviewed-by: Rich Salz (cherry picked from commit 708cf5ded249f871fcd5e3de27d9281b1f37ae71) --- Summary of changes: crypto/cms/cms_enc.c | 31 --- 1 file changed, 16 insertions(+), 15 deletions(-) diff --git a/crypto/cms/cms_enc.c b/crypto/cms/cms_enc.c index 9f8e514..e282c9d 100644 --- a/crypto/cms/cms_enc.c +++ b/crypto/cms/cms_enc.c @@ -179,21 +179,22 @@ BIO *cms_EncryptedContent_init_bio(CMS_EncryptedContentInfo *ec) CMS_R_CIPHER_INITIALISATION_ERROR); goto err; } - -calg->parameter = ASN1_TYPE_new(); -if (calg->parameter == NULL) { -CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, ERR_R_MALLOC_FAILURE); -goto err; -} -if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) { -CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, - CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR); -goto err; -} -/* If parameter type not set omit parameter */ -if (calg->parameter->type == V_ASN1_UNDEF) { -ASN1_TYPE_free(calg->parameter); -calg->parameter = NULL; +if (enc) { +calg->parameter = ASN1_TYPE_new(); +if (calg->parameter == NULL) { +CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, ERR_R_MALLOC_FAILURE); +goto err; +} +if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) { +CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, + CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR); +goto err; +} +/* If parameter type not set omit parameter */ +if (calg->parameter->type == V_ASN1_UNDEF) { +ASN1_TYPE_free(calg->parameter); +calg->parameter = NULL; +} } ok = 1; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 708cf5ded249f871fcd5e3de27d9281b1f37ae71 (commit) from ec5b56f3c5c47346c7740e5640d5f66ee2394267 (commit) - Log - commit 708cf5ded249f871fcd5e3de27d9281b1f37ae71 Author: Dr. Stephen HensonDate: Fri May 6 19:27:49 2016 +0100 Only set CMS parameter when encrypting Reviewed-by: Rich Salz --- Summary of changes: crypto/cms/cms_enc.c | 31 --- 1 file changed, 16 insertions(+), 15 deletions(-) diff --git a/crypto/cms/cms_enc.c b/crypto/cms/cms_enc.c index 4c4c9f2..7093511 100644 --- a/crypto/cms/cms_enc.c +++ b/crypto/cms/cms_enc.c @@ -175,21 +175,22 @@ BIO *cms_EncryptedContent_init_bio(CMS_EncryptedContentInfo *ec) CMS_R_CIPHER_INITIALISATION_ERROR); goto err; } - -calg->parameter = ASN1_TYPE_new(); -if (calg->parameter == NULL) { -CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, ERR_R_MALLOC_FAILURE); -goto err; -} -if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) { -CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, - CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR); -goto err; -} -/* If parameter type not set omit parameter */ -if (calg->parameter->type == V_ASN1_UNDEF) { -ASN1_TYPE_free(calg->parameter); -calg->parameter = NULL; +if (enc) { +calg->parameter = ASN1_TYPE_new(); +if (calg->parameter == NULL) { +CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, ERR_R_MALLOC_FAILURE); +goto err; +} +if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) { +CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, + CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR); +goto err; +} +/* If parameter type not set omit parameter */ +if (calg->parameter->type == V_ASN1_UNDEF) { +ASN1_TYPE_free(calg->parameter); +calg->parameter = NULL; +} } ok = 1; _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Broken: FdaSilvaYY/openssl#773 (ex_data-fixes - 6c96790)
Build Update for FdaSilvaYY/openssl - Build: #773 Status: Broken Duration: 1 hour, 25 minutes, and 49 seconds Commit: 6c96790 (ex_data-fixes) Author: FdaSilvaYY Message: Add checks on CRYPTO_set_ex_data return value Fix possible leak in danetest.c View the changeset: https://github.com/FdaSilvaYY/openssl/compare/962b9716550c...6c967902d9ad View the full build log and details: https://travis-ci.org/FdaSilvaYY/openssl/builds/128298511 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#3750 (master - ec5b56f)
Build Update for openssl/openssl - Build: #3750 Status: Still Failing Duration: 1 hour, 4 minutes, and 24 seconds Commit: ec5b56f (master) Author: isnotnick Message: RT3513: req doesn't display attributes using utf8string Reviewed-by: Matt CaswellReviewed-by: Richard Levitte View the changeset: https://github.com/openssl/openssl/compare/4b16fa791d3a...ec5b56f3c5c4 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/128307148 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via ec5b56f3c5c47346c7740e5640d5f66ee2394267 (commit) from 4b16fa791d3ad8c6d9d3cb575b749247e774299a (commit) - Log - commit ec5b56f3c5c47346c7740e5640d5f66ee2394267 Author: isnotnickDate: Tue Dec 16 16:25:59 2014 +0100 RT3513: req doesn't display attributes using utf8string Reviewed-by: Matt Caswell Reviewed-by: Richard Levitte --- Summary of changes: crypto/x509/t_req.c | 1 + 1 file changed, 1 insertion(+) diff --git a/crypto/x509/t_req.c b/crypto/x509/t_req.c index afe59c4..94da0de 100644 --- a/crypto/x509/t_req.c +++ b/crypto/x509/t_req.c @@ -181,6 +181,7 @@ int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long nmflags, goto err; if ((type == V_ASN1_PRINTABLESTRING) || (type == V_ASN1_T61STRING) || +(type == V_ASN1_UTF8STRING) || (type == V_ASN1_IA5STRING)) { if (BIO_write(bp, (char *)bs->data, bs->length) != bs->length) _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#3748 (master - 4b16fa7)
Build Update for openssl/openssl - Build: #3748 Status: Still Failing Duration: 27 minutes and 32 seconds Commit: 4b16fa7 (master) Author: Andy Polyakov Message: README.PERL: clarify "matching" Perl requirement on Windows. Reviewed-by: Rich SalzView the changeset: https://github.com/openssl/openssl/compare/3992e8c0235f...4b16fa791d3a View the full build log and details: https://travis-ci.org/openssl/openssl/builds/128238860 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build failed: openssl 1.0.34
Build openssl 1.0.34 failed Commit 2d2ca4127e by FdaSilvaYY on 5/6/2016 7:37 AM: Fix "warning: missing field 'one-field' initializer" in progs.h Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#3746 (master - 2841165)
Build Update for openssl/openssl - Build: #3746 Status: Still Failing Duration: 24 minutes and 39 seconds Commit: 2841165 (master) Author: Andy Polyakov Message: poly1305/asm/poly1305-x86_64.pl: make it cross-compile. Reviewed-by: Richard LevitteView the changeset: https://github.com/openssl/openssl/compare/3732f12c6684...284116575d37 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/128238467 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#3745 (master - 3732f12)
Build Update for openssl/openssl - Build: #3745 Status: Still Failing Duration: 23 minutes and 48 seconds Commit: 3732f12 (master) Author: Andy Polyakov Message: testlib/OpenSSL/Test.pm: address 5.10 warnings. Reviewed-by: Richard LevitteView the changeset: https://github.com/openssl/openssl/compare/9a2d2fb338d6...3732f12c6684 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/128238252 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Still Failing: openssl/openssl#3744 (master - 9a2d2fb)
Build Update for openssl/openssl - Build: #3744 Status: Still Failing Duration: 25 minutes and 53 seconds Commit: 9a2d2fb (master) Author: Andy Polyakov Message: test/evp_test.c: exercise different combinations of data misalignment. Reviewed-by: Emilia KäsperView the changeset: https://github.com/openssl/openssl/compare/c0aa8c274843...9a2d2fb338d6 View the full build log and details: https://travis-ci.org/openssl/openssl/builds/128237817 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Build completed: openssl 1.0.32
Build openssl 1.0.32 completed Commit f6df6ca9a4 by FdaSilvaYY on 5/6/2016 7:32 AM: Raise an Err when CRYPTO_THREAD_lock_new fails Configure your notification preferences _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] Broken: FdaSilvaYY/openssl#769 (more-zalloc2 - 887d797)
Build Update for FdaSilvaYY/openssl - Build: #769 Status: Broken Duration: 24 minutes and 52 seconds Commit: 887d797 (more-zalloc2) Author: FdaSilvaYY Message: Add more zalloc View the changeset: https://github.com/FdaSilvaYY/openssl/compare/8181f35d6b71...887d797bbc65 View the full build log and details: https://travis-ci.org/FdaSilvaYY/openssl/builds/128237037 -- You can configure recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 4b16fa791d3ad8c6d9d3cb575b749247e774299a (commit) from 3992e8c0235f374d0582060e768480f0596ab77f (commit) - Log - commit 4b16fa791d3ad8c6d9d3cb575b749247e774299a Author: Andy PolyakovDate: Thu May 5 17:07:06 2016 +0200 README.PERL: clarify "matching" Perl requirement on Windows. Reviewed-by: Rich Salz --- Summary of changes: README.PERL | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/README.PERL b/README.PERL index 184b377..eda812d 100644 --- a/README.PERL +++ b/README.PERL @@ -30,12 +30,12 @@ Notes on Perl on Windows - If you will build on Cygwin (and possibly some other POSIX layers), - Perl is already part of your distribution. Simply use the Cygwin - package manager to make sure Perl gets installed. - - Otherwise, you will need to install Perl separately. The Perl - package that we know of is ActiveState Perl, available from + There are a number of build targets that can be viewed as "Windows". + Indeed, there are VC-* configs targeting VisualStudio C, as well as + MinGW and Cygwin. The key recommendation is to use "matching" Perl, + one that matches build environment. For example, if you will build + on Cygwin be sure to use the Cygwin package manager to install Perl. + For VC-* builds we recommend ActiveState Perl, available from http://www.activestate.com/ActivePerl. Notes on Perl on VMS _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 3992e8c0235f374d0582060e768480f0596ab77f (commit) from 284116575d375729e672256cb2b754e8362c5bce (commit) - Log - commit 3992e8c0235f374d0582060e768480f0596ab77f Author: Andy PolyakovDate: Wed May 4 23:53:06 2016 +0200 poly1305/asm/poly1305-x86_64.pl: contain symbols within shared lib. We don't need it, but external users might find it handy. Reviewed-by: Richard Levitte --- Summary of changes: crypto/poly1305/asm/poly1305-x86_64.pl | 4 1 file changed, 4 insertions(+) diff --git a/crypto/poly1305/asm/poly1305-x86_64.pl b/crypto/poly1305/asm/poly1305-x86_64.pl index 89acc5f..3099556 100755 --- a/crypto/poly1305/asm/poly1305-x86_64.pl +++ b/crypto/poly1305/asm/poly1305-x86_64.pl @@ -130,8 +130,12 @@ $code.=<<___; .externOPENSSL_ia32cap_P .globl poly1305_init +.hiddenpoly1305_init .globl poly1305_blocks +.hiddenpoly1305_blocks .globl poly1305_emit +.hiddenpoly1305_emit + .type poly1305_init,\@function,3 .align 32 poly1305_init: _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 284116575d375729e672256cb2b754e8362c5bce (commit) from 3732f12c668421b229eddcc1b3af2a4806ec9865 (commit) - Log - commit 284116575d375729e672256cb2b754e8362c5bce Author: Andy PolyakovDate: Wed May 4 23:45:35 2016 +0200 poly1305/asm/poly1305-x86_64.pl: make it cross-compile. Reviewed-by: Richard Levitte --- Summary of changes: crypto/poly1305/asm/poly1305-x86_64.pl | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/crypto/poly1305/asm/poly1305-x86_64.pl b/crypto/poly1305/asm/poly1305-x86_64.pl index e2a38ec..89acc5f 100755 --- a/crypto/poly1305/asm/poly1305-x86_64.pl +++ b/crypto/poly1305/asm/poly1305-x86_64.pl @@ -495,10 +495,10 @@ poly1305_blocks_avx: # base 2^26 -> base 2^64 mov $d1#d,$h0#d - and \$`-1<<31`,$d1 + and \$`-1*(1<<31)`,$d1 mov $d2,$r1 # borrow $r1 mov $d2#d,$h1#d - and \$`-1<<31`,$d2 + and \$`-1*(1<<31)`,$d2 shr \$6,$d1 shl \$52,$r1 @@ -1383,10 +1383,10 @@ poly1305_blocks_avx2: # base 2^26 -> base 2^64 mov $d1#d,$h0#d - and \$`-1<<31`,$d1 + and \$`-1*(1<<31)`,$d1 mov $d2,$r1 # borrow $r1 mov $d2#d,$h1#d - and \$`-1<<31`,$d2 + and \$`-1*(1<<31)`,$d2 shr \$6,$d1 shl \$52,$r1 _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 3732f12c668421b229eddcc1b3af2a4806ec9865 (commit) from 9a2d2fb338d67d3001aebcb2aa8e11d0fd7d2f80 (commit) - Log - commit 3732f12c668421b229eddcc1b3af2a4806ec9865 Author: Andy PolyakovDate: Wed May 4 23:42:57 2016 +0200 testlib/OpenSSL/Test.pm: address 5.10 warnings. Reviewed-by: Richard Levitte --- Summary of changes: test/testlib/OpenSSL/Test.pm | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/test/testlib/OpenSSL/Test.pm b/test/testlib/OpenSSL/Test.pm index f2d0c9b..8a7d0a0 100644 --- a/test/testlib/OpenSSL/Test.pm +++ b/test/testlib/OpenSSL/Test.pm @@ -735,8 +735,8 @@ sub __exeext { sub __test_file { BAIL_OUT("Must run setup() first") if (! $test_name); -my $f = pop . __exeext(); -$f = catfile($directories{BLDTEST},@_,$f); +my $f = pop; +$f = catfile($directories{BLDTEST},@_,$f . __exeext()); $f = catfile($directories{SRCTEST},@_,$f) unless -x $f; return $f; } @@ -753,8 +753,8 @@ sub __perltest_file { sub __apps_file { BAIL_OUT("Must run setup() first") if (! $test_name); -my $f = pop . __exeext(); -$f = catfile($directories{BLDAPPS},@_,$f); +my $f = pop; +$f = catfile($directories{BLDAPPS},@_,$f . __exeext()); $f = catfile($directories{SRCAPPS},@_,$f) unless -x $f; return $f; } _ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits
[openssl-commits] [openssl] master update
The branch master has been updated via 9a2d2fb338d67d3001aebcb2aa8e11d0fd7d2f80 (commit) from c0aa8c274843c5b8a70d70fc05d71fa3dfd510db (commit) - Log - commit 9a2d2fb338d67d3001aebcb2aa8e11d0fd7d2f80 Author: Andy PolyakovDate: Sat Apr 23 19:14:21 2016 +0200 test/evp_test.c: exercise different combinations of data misalignment. Reviewed-by: Emilia Käsper --- Summary of changes: test/evp_test.c | 79 +++-- 1 file changed, 55 insertions(+), 24 deletions(-) diff --git a/test/evp_test.c b/test/evp_test.c index 56c821b..f8506d4 100644 --- a/test/evp_test.c +++ b/test/evp_test.c @@ -251,7 +251,7 @@ struct evp_test { /* start line of current test */ unsigned int start_line; /* Error string for test */ -const char *err; +const char *err, *aux_err; /* Expected error value of test */ char *expected_err; /* Number of tests */ @@ -364,8 +364,13 @@ static int check_test_error(struct evp_test *t) if (!t->err && !t->expected_err) return 1; if (t->err && !t->expected_err) { -fprintf(stderr, "Test line %d: unexpected error %s\n", -t->start_line, t->err); +if (t->aux_err != NULL) { +fprintf(stderr, "Test line %d(%s): unexpected error %s\n", +t->start_line, t->aux_err, t->err); +} else { +fprintf(stderr, "Test line %d: unexpected error %s\n", +t->start_line, t->err); +} print_expected(t); return 0; } @@ -830,7 +835,8 @@ static int cipher_test_parse(struct evp_test *t, const char *keyword, return 0; } -static int cipher_test_enc(struct evp_test *t, int enc) +static int cipher_test_enc(struct evp_test *t, int enc, + size_t out_misalign, size_t inp_misalign) { struct cipher_data *cdat = t->data; unsigned char *in, *out, *tmp = NULL; @@ -854,9 +860,21 @@ static int cipher_test_enc(struct evp_test *t, int enc) out = cdat->plaintext; out_len = cdat->plaintext_len; } -tmp = OPENSSL_malloc(in_len + 2 * EVP_MAX_BLOCK_LENGTH); +inp_misalign += 16 - ((out_misalign + in_len) & 15); +/* + * 'tmp' will store both output and copy of input. We make the copy + * of input to specifically aligned part of 'tmp'. So we just + * figured out how much padding would ensure the required alignment, + * now we allocate extended buffer and finally copy the input just + * past inp_misalign in expression below. Output will be written + * past out_misalign... + */ +tmp = OPENSSL_malloc(out_misalign + in_len + 2 * EVP_MAX_BLOCK_LENGTH + + inp_misalign + in_len); if (!tmp) goto err; +in = memcpy(tmp + out_misalign + in_len + 2 * EVP_MAX_BLOCK_LENGTH + +inp_misalign, in, in_len); err = "CIPHERINIT_ERROR"; if (!EVP_CipherInit_ex(ctx, cdat->cipher, NULL, NULL, NULL, enc)) goto err; @@ -918,20 +936,20 @@ static int cipher_test_enc(struct evp_test *t, int enc) } EVP_CIPHER_CTX_set_padding(ctx, 0); err = "CIPHERUPDATE_ERROR"; -if (!EVP_CipherUpdate(ctx, tmp, , in, in_len)) +if (!EVP_CipherUpdate(ctx, tmp + out_misalign, , in, in_len)) goto err; if (cdat->aead == EVP_CIPH_CCM_MODE) tmpflen = 0; else { err = "CIPHERFINAL_ERROR"; -if (!EVP_CipherFinal_ex(ctx, tmp + tmplen, )) +if (!EVP_CipherFinal_ex(ctx, tmp + out_misalign + tmplen, )) goto err; } err = "LENGTH_MISMATCH"; if (out_len != (size_t)(tmplen + tmpflen)) goto err; err = "VALUE_MISMATCH"; -if (check_output(t, out, tmp, out_len)) +if (check_output(t, out, tmp + out_misalign, out_len)) goto err; if (enc && cdat->aead) { unsigned char rtag[16]; @@ -961,6 +979,8 @@ static int cipher_test_run(struct evp_test *t) { struct cipher_data *cdat = t->data; int rv; +size_t out_misalign, inp_misalign; + if (!cdat->key) { t->err = "NO_KEY"; return 0; @@ -976,24 +996,35 @@ static int cipher_test_run(struct evp_test *t) t->err = "NO_TAG"; return 0; } -if (cdat->enc) { -rv = cipher_test_enc(t, 1); -/* Not fatal errors: return */ -if (rv != 1) { -if (rv < 0) -return 0; -return 1; -} -} -if (cdat->enc != 1) { -rv = cipher_test_enc(t, 0); -/* Not fatal errors: return */ -if (rv != 1) { -if (rv < 0) -return 0; -return 1; +for (out_misalign = 0; out_misalign <= 1; out_misalign++) { +static char aux_err[64]; +t->aux_err =