[openssl-commits] Build failed: openssl 1.0.44

2016-05-06 Thread AppVeyor



Build openssl 1.0.44 failed


Commit e29ecf25b2 by FdaSilvaYY on 5/6/2016 10:35 PM:

Few cleanups in s_client, s_server apps.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Fixed: FdaSilvaYY/openssl#781 (ex_data-fixes - 0cbcb26)

2016-05-06 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #781
Status: Fixed

Duration: 22 minutes and 32 seconds
Commit: 0cbcb26 (ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_set_ex_data return value
Fix possible leak in danetest.c

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/6c967902d9ad...0cbcb2656e5d

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/128423581

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Passed: FdaSilvaYY/openssl#779 (err-raise-fix - 9d8c4f2)

2016-05-06 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #779
Status: Passed

Duration: 21 minutes and 54 seconds
Commit: 9d8c4f2 (err-raise-fix)
Author: FdaSilvaYY
Message: Raise an Err when CRYPTO_THREAD_lock_new fails

Add missing error raise call, as it is done everyxhere else.
and as CRYPTO_THREAD_lock_new don't do it internally.

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/31a22f681c8c...9d8c4f2b966f

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/128423154

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl 1.0.40

2016-05-06 Thread AppVeyor


Build openssl 1.0.40 completed



Commit 8b633ebc21 by FdaSilvaYY on 5/6/2016 10:20 PM:

Disable Travis Notifications


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Fixed: FdaSilvaYY/openssl#777 (more-zalloc2 - c3288b7)

2016-05-06 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #777
Status: Fixed

Duration: 28 minutes and 37 seconds
Commit: c3288b7 (more-zalloc2)
Author: FdaSilvaYY
Message: Add more zalloc

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/887d797bbc65...c3288b711ea2

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/128420749

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl 1.0.39

2016-05-06 Thread AppVeyor



Build openssl 1.0.39 failed


Commit 31a22f681c by FdaSilvaYY on 5/6/2016 10:17 PM:

Raise an Err when CRYPTO_THREAD_lock_new fails


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Failed: FdaSilvaYY/openssl#775 (err-raise-fix - 31a22f6)

2016-05-06 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #775
Status: Failed

Duration: 23 minutes and 30 seconds
Commit: 31a22f6 (err-raise-fix)
Author: FdaSilvaYY
Message: Raise an Err when CRYPTO_THREAD_lock_new fails

Add missing error raise call, as it is done everyxhere else.
and as CRYPTO_THREAD_lock_new don't do it internally.

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/436348a648d7...31a22f681c8c

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/128420174

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Fixed: openssl/openssl#3758 (OpenSSL_1_0_2-stable - b1f8ba4)

2016-05-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3758
Status: Fixed

Duration: 20 minutes and 57 seconds
Commit: b1f8ba4 (OpenSSL_1_0_2-stable)
Author: Dr. Stephen Henson
Message: Constify PKCS12_newpass()

PR#4449

Reviewed-by: Rich Salz 
(cherry picked from commit 049f5bbce3eebdf4ec2030042eb2ae64bb67aedb)
Conflicts:
doc/crypto/PKCS12_newpass.pod

View the changeset: 
https://github.com/openssl/openssl/compare/6e216ba689c3...b1f8ba4dc703

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/128401993

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Fixed: openssl/openssl#3757 (master - 049f5bb)

2016-05-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3757
Status: Fixed

Duration: 27 minutes and 6 seconds
Commit: 049f5bb (master)
Author: Dr. Stephen Henson
Message: Constify PKCS12_newpass()

PR#4449

Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/openssl/openssl/compare/708cf5ded249...049f5bbce3ee

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/128395907

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2016-05-06 Thread Dr . Stephen Henson
The branch OpenSSL_1_0_1-stable has been updated
   via  0377ad3974acabf15f7585df4383717c96285455 (commit)
   via  5255b49fb736350de1840d9df0bd1fb78fefb3d0 (commit)
  from  4d71891ad13f3e1e1b1f55f5e8fa55b497f1cd43 (commit)


- Log -
commit 0377ad3974acabf15f7585df4383717c96285455
Author: Dr. Stephen Henson 
Date:   Fri May 6 03:46:09 2016 +0100

Constify PKCS12_newpass()

PR#4449

Reviewed-by: Rich Salz 

(cherry picked from commit b1f8ba4dc7032a061d60b960c393178263e4a471)

commit 5255b49fb736350de1840d9df0bd1fb78fefb3d0
Author: Dr. Stephen Henson 
Date:   Thu May 5 15:37:23 2016 +0100

Tidy up PKCS12_newpass() fix memory leaks.

PR#4466

Reviewed-by: Rich Salz 

(cherry picked from commit 06227924ad77fee9ead79189328aebf078c37add)

---

Summary of changes:
 crypto/pkcs12/p12_npas.c | 113 ++-
 crypto/pkcs12/pkcs12.h   |   2 +-
 2 files changed, 55 insertions(+), 60 deletions(-)

diff --git a/crypto/pkcs12/p12_npas.c b/crypto/pkcs12/p12_npas.c
index a89b61a..9e8ebb2 100644
--- a/crypto/pkcs12/p12_npas.c
+++ b/crypto/pkcs12/p12_npas.c
@@ -66,17 +66,18 @@
 
 /* PKCS#12 password change routine */
 
-static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
-static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass,
-char *newpass);
-static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
+static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass);
+static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *oldpass,
+const char *newpass);
+static int newpass_bag(PKCS12_SAFEBAG *bag, const char *oldpass,
+const char *newpass);
 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen);
 
 /*
  * Change the password on a PKCS#12 structure.
  */
 
-int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass)
+int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass)
 {
 /* Check for NULL PKCS12 structure */
 
@@ -103,20 +104,21 @@ int PKCS12_newpass(PKCS12 *p12, char *oldpass, char 
*newpass)
 
 /* Parse the outer PKCS#12 structure */
 
-static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass)
+static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass)
 {
-STACK_OF(PKCS7) *asafes, *newsafes;
-STACK_OF(PKCS12_SAFEBAG) *bags;
+STACK_OF(PKCS7) *asafes = NULL, *newsafes = NULL;
+STACK_OF(PKCS12_SAFEBAG) *bags = NULL;
 int i, bagnid, pbe_nid = 0, pbe_iter = 0, pbe_saltlen = 0;
 PKCS7 *p7, *p7new;
-ASN1_OCTET_STRING *p12_data_tmp = NULL, *macnew = NULL;
+ASN1_OCTET_STRING *p12_data_tmp = NULL;
 unsigned char mac[EVP_MAX_MD_SIZE];
 unsigned int maclen;
+int rv = 0;
 
-if (!(asafes = PKCS12_unpack_authsafes(p12)))
-return 0;
-if (!(newsafes = sk_PKCS7_new_null()))
-return 0;
+if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL)
+goto err;
+if ((newsafes = sk_PKCS7_new_null()) == NULL)
+goto err;
 for (i = 0; i < sk_PKCS7_num(asafes); i++) {
 p7 = sk_PKCS7_value(asafes, i);
 bagnid = OBJ_obj2nid(p7->type);
@@ -125,67 +127,57 @@ static int newpass_p12(PKCS12 *p12, char *oldpass, char 
*newpass)
 } else if (bagnid == NID_pkcs7_encrypted) {
 bags = PKCS12_unpack_p7encdata(p7, oldpass, -1);
 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
- _nid, _iter, _saltlen)) {
-sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
-bags = NULL;
-}
-} else
+ _nid, _iter, _saltlen))
+goto err;
+} else {
 continue;
-if (!bags) {
-sk_PKCS7_pop_free(asafes, PKCS7_free);
-return 0;
-}
-if (!newpass_bags(bags, oldpass, newpass)) {
-sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
-sk_PKCS7_pop_free(asafes, PKCS7_free);
-return 0;
 }
+if (bags == NULL)
+goto err;
+if (!newpass_bags(bags, oldpass, newpass))
+goto err;
 /* Repack bag in same form with new password */
 if (bagnid == NID_pkcs7_data)
 p7new = PKCS12_pack_p7data(bags);
 else
 p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL,
   pbe_saltlen, pbe_iter, bags);
+if (!p7new || !sk_PKCS7_push(newsafes, p7new))
+goto err;
 sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
-if (!p7new) {
-sk_PKCS7_pop_free(asafes, 

[openssl-commits] Fixed: openssl/openssl#3755 (OpenSSL_1_0_2-stable - 6e216ba)

2016-05-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3755
Status: Fixed

Duration: 19 minutes and 54 seconds
Commit: 6e216ba (OpenSSL_1_0_2-stable)
Author: Dr. Stephen Henson
Message: Only set CMS parameter when encrypting

Reviewed-by: Rich Salz 
(cherry picked from commit 708cf5ded249f871fcd5e3de27d9281b1f37ae71)

View the changeset: 
https://github.com/openssl/openssl/compare/0c4465ede784...6e216ba689c3

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/128394209

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-06 Thread Dr . Stephen Henson
The branch master has been updated
   via  049f5bbce3eebdf4ec2030042eb2ae64bb67aedb (commit)
   via  c95a8b4eb51cec25ddce846dfbd922b016d54d0c (commit)
   via  d800d0f45b7618c30692c01d4dbf96042468b932 (commit)
  from  708cf5ded249f871fcd5e3de27d9281b1f37ae71 (commit)


- Log -
commit 049f5bbce3eebdf4ec2030042eb2ae64bb67aedb
Author: Dr. Stephen Henson 
Date:   Fri May 6 03:46:09 2016 +0100

Constify PKCS12_newpass()

PR#4449

Reviewed-by: Rich Salz 

commit c95a8b4eb51cec25ddce846dfbd922b016d54d0c
Author: Jeffrey Walton 
Date:   Thu May 5 14:26:26 2016 +0100

Add documentation of PKCS12_newpass()

PR#4478

Reviewed-by: Rich Salz 
Reviewed-by: Stephen Henson 

commit d800d0f45b7618c30692c01d4dbf96042468b932
Author: Dr. Stephen Henson 
Date:   Thu May 5 15:37:23 2016 +0100

Tidy up PKCS12_newpass() fix memory leaks.

PR#4466

Reviewed-by: Rich Salz 

---

Summary of changes:
 crypto/pkcs12/p12_npas.c  | 93 +-
 doc/crypto/PKCS12_newpass.pod | 94 +++
 include/openssl/pkcs12.h  |  2 +-
 3 files changed, 142 insertions(+), 47 deletions(-)
 create mode 100644 doc/crypto/PKCS12_newpass.pod

diff --git a/crypto/pkcs12/p12_npas.c b/crypto/pkcs12/p12_npas.c
index e23d035..000d7fb 100644
--- a/crypto/pkcs12/p12_npas.c
+++ b/crypto/pkcs12/p12_npas.c
@@ -66,17 +66,18 @@
 
 /* PKCS#12 password change routine */
 
-static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass);
-static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, char *oldpass,
-char *newpass);
-static int newpass_bag(PKCS12_SAFEBAG *bag, char *oldpass, char *newpass);
+static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass);
+static int newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *oldpass,
+const char *newpass);
+static int newpass_bag(PKCS12_SAFEBAG *bag, const char *oldpass,
+const char *newpass);
 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen);
 
 /*
  * Change the password on a PKCS#12 structure.
  */
 
-int PKCS12_newpass(PKCS12 *p12, char *oldpass, char *newpass)
+int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass)
 {
 /* Check for NULL PKCS12 structure */
 
@@ -103,20 +104,21 @@ int PKCS12_newpass(PKCS12 *p12, char *oldpass, char 
*newpass)
 
 /* Parse the outer PKCS#12 structure */
 
-static int newpass_p12(PKCS12 *p12, char *oldpass, char *newpass)
+static int newpass_p12(PKCS12 *p12, const char *oldpass, const char *newpass)
 {
-STACK_OF(PKCS7) *asafes, *newsafes;
-STACK_OF(PKCS12_SAFEBAG) *bags;
+STACK_OF(PKCS7) *asafes = NULL, *newsafes = NULL;
+STACK_OF(PKCS12_SAFEBAG) *bags = NULL;
 int i, bagnid, pbe_nid = 0, pbe_iter = 0, pbe_saltlen = 0;
 PKCS7 *p7, *p7new;
 ASN1_OCTET_STRING *p12_data_tmp = NULL, *macoct = NULL;
 unsigned char mac[EVP_MAX_MD_SIZE];
 unsigned int maclen;
+int rv = 0;
 
 if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL)
-return 0;
+goto err;
 if ((newsafes = sk_PKCS7_new_null()) == NULL)
-return 0;
+goto err;
 for (i = 0; i < sk_PKCS7_num(asafes); i++) {
 p7 = sk_PKCS7_value(asafes, i);
 bagnid = OBJ_obj2nid(p7->type);
@@ -125,63 +127,59 @@ static int newpass_p12(PKCS12 *p12, char *oldpass, char 
*newpass)
 } else if (bagnid == NID_pkcs7_encrypted) {
 bags = PKCS12_unpack_p7encdata(p7, oldpass, -1);
 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
- _nid, _iter, _saltlen)) {
-sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
-bags = NULL;
-}
-} else
+ _nid, _iter, _saltlen))
+goto err;
+} else {
 continue;
-if (!bags) {
-sk_PKCS7_pop_free(asafes, PKCS7_free);
-return 0;
-}
-if (!newpass_bags(bags, oldpass, newpass)) {
-sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
-sk_PKCS7_pop_free(asafes, PKCS7_free);
-return 0;
 }
+if (bags == NULL)
+goto err;
+if (!newpass_bags(bags, oldpass, newpass))
+goto err;
 /* Repack bag in same form with new password */
 if (bagnid == NID_pkcs7_data)
 p7new = PKCS12_pack_p7data(bags);
 else
 p7new = PKCS12_pack_p7encdata(pbe_nid, newpass, -1, NULL,
   pbe_saltlen, pbe_iter, bags);
+if (!p7new || 

[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2016-05-06 Thread Dr . Stephen Henson
The branch OpenSSL_1_0_1-stable has been updated
   via  4d71891ad13f3e1e1b1f55f5e8fa55b497f1cd43 (commit)
  from  b0e1362a9432ccc65b529602e64a59f108ca539d (commit)


- Log -
commit 4d71891ad13f3e1e1b1f55f5e8fa55b497f1cd43
Author: Dr. Stephen Henson 
Date:   Fri May 6 19:27:49 2016 +0100

Only set CMS parameter when encrypting

Reviewed-by: Rich Salz 
(cherry picked from commit 708cf5ded249f871fcd5e3de27d9281b1f37ae71)

---

Summary of changes:
 crypto/cms/cms_enc.c | 31 ---
 1 file changed, 16 insertions(+), 15 deletions(-)

diff --git a/crypto/cms/cms_enc.c b/crypto/cms/cms_enc.c
index 9f8e514..e282c9d 100644
--- a/crypto/cms/cms_enc.c
+++ b/crypto/cms/cms_enc.c
@@ -179,21 +179,22 @@ BIO 
*cms_EncryptedContent_init_bio(CMS_EncryptedContentInfo *ec)
CMS_R_CIPHER_INITIALISATION_ERROR);
 goto err;
 }
-
-calg->parameter = ASN1_TYPE_new();
-if (calg->parameter == NULL) {
-CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, ERR_R_MALLOC_FAILURE);
-goto err;
-}
-if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) {
-CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO,
-   CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR);
-goto err;
-}
-/* If parameter type not set omit parameter */
-if (calg->parameter->type == V_ASN1_UNDEF) {
-ASN1_TYPE_free(calg->parameter);
-calg->parameter = NULL;
+if (enc) {
+calg->parameter = ASN1_TYPE_new();
+if (calg->parameter == NULL) {
+CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, ERR_R_MALLOC_FAILURE);
+goto err;
+}
+if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) {
+CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO,
+   CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR);
+goto err;
+}
+/* If parameter type not set omit parameter */
+if (calg->parameter->type == V_ASN1_UNDEF) {
+ASN1_TYPE_free(calg->parameter);
+calg->parameter = NULL;
+}
 }
 ok = 1;
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-06 Thread Dr . Stephen Henson
The branch master has been updated
   via  708cf5ded249f871fcd5e3de27d9281b1f37ae71 (commit)
  from  ec5b56f3c5c47346c7740e5640d5f66ee2394267 (commit)


- Log -
commit 708cf5ded249f871fcd5e3de27d9281b1f37ae71
Author: Dr. Stephen Henson 
Date:   Fri May 6 19:27:49 2016 +0100

Only set CMS parameter when encrypting

Reviewed-by: Rich Salz 

---

Summary of changes:
 crypto/cms/cms_enc.c | 31 ---
 1 file changed, 16 insertions(+), 15 deletions(-)

diff --git a/crypto/cms/cms_enc.c b/crypto/cms/cms_enc.c
index 4c4c9f2..7093511 100644
--- a/crypto/cms/cms_enc.c
+++ b/crypto/cms/cms_enc.c
@@ -175,21 +175,22 @@ BIO 
*cms_EncryptedContent_init_bio(CMS_EncryptedContentInfo *ec)
CMS_R_CIPHER_INITIALISATION_ERROR);
 goto err;
 }
-
-calg->parameter = ASN1_TYPE_new();
-if (calg->parameter == NULL) {
-CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, ERR_R_MALLOC_FAILURE);
-goto err;
-}
-if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) {
-CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO,
-   CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR);
-goto err;
-}
-/* If parameter type not set omit parameter */
-if (calg->parameter->type == V_ASN1_UNDEF) {
-ASN1_TYPE_free(calg->parameter);
-calg->parameter = NULL;
+if (enc) {
+calg->parameter = ASN1_TYPE_new();
+if (calg->parameter == NULL) {
+CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO, ERR_R_MALLOC_FAILURE);
+goto err;
+}
+if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0) {
+CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO,
+   CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR);
+goto err;
+}
+/* If parameter type not set omit parameter */
+if (calg->parameter->type == V_ASN1_UNDEF) {
+ASN1_TYPE_free(calg->parameter);
+calg->parameter = NULL;
+}
 }
 ok = 1;
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Broken: FdaSilvaYY/openssl#773 (ex_data-fixes - 6c96790)

2016-05-06 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #773
Status: Broken

Duration: 1 hour, 25 minutes, and 49 seconds
Commit: 6c96790 (ex_data-fixes)
Author: FdaSilvaYY
Message: Add checks on CRYPTO_set_ex_data return value
Fix possible leak in danetest.c

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/962b9716550c...6c967902d9ad

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/128298511

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Still Failing: openssl/openssl#3750 (master - ec5b56f)

2016-05-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3750
Status: Still Failing

Duration: 1 hour, 4 minutes, and 24 seconds
Commit: ec5b56f (master)
Author: isnotnick
Message: RT3513: req doesn't display attributes using utf8string

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 

View the changeset: 
https://github.com/openssl/openssl/compare/4b16fa791d3a...ec5b56f3c5c4

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/128307148

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-06 Thread Richard Levitte
The branch master has been updated
   via  ec5b56f3c5c47346c7740e5640d5f66ee2394267 (commit)
  from  4b16fa791d3ad8c6d9d3cb575b749247e774299a (commit)


- Log -
commit ec5b56f3c5c47346c7740e5640d5f66ee2394267
Author: isnotnick 
Date:   Tue Dec 16 16:25:59 2014 +0100

RT3513: req doesn't display attributes using utf8string

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 

---

Summary of changes:
 crypto/x509/t_req.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/crypto/x509/t_req.c b/crypto/x509/t_req.c
index afe59c4..94da0de 100644
--- a/crypto/x509/t_req.c
+++ b/crypto/x509/t_req.c
@@ -181,6 +181,7 @@ int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long 
nmflags,
 goto err;
 if ((type == V_ASN1_PRINTABLESTRING) ||
 (type == V_ASN1_T61STRING) ||
+(type == V_ASN1_UTF8STRING) ||
 (type == V_ASN1_IA5STRING)) {
 if (BIO_write(bp, (char *)bs->data, bs->length)
 != bs->length)
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Still Failing: openssl/openssl#3748 (master - 4b16fa7)

2016-05-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3748
Status: Still Failing

Duration: 27 minutes and 32 seconds
Commit: 4b16fa7 (master)
Author: Andy Polyakov
Message: README.PERL: clarify "matching" Perl requirement on Windows.

Reviewed-by: Rich Salz 

View the changeset: 
https://github.com/openssl/openssl/compare/3992e8c0235f...4b16fa791d3a

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/128238860

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl 1.0.34

2016-05-06 Thread AppVeyor



Build openssl 1.0.34 failed


Commit 2d2ca4127e by FdaSilvaYY on 5/6/2016 7:37 AM:

Fix "warning: missing field 'one-field' initializer" in progs.h


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Still Failing: openssl/openssl#3746 (master - 2841165)

2016-05-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3746
Status: Still Failing

Duration: 24 minutes and 39 seconds
Commit: 2841165 (master)
Author: Andy Polyakov
Message: poly1305/asm/poly1305-x86_64.pl: make it cross-compile.

Reviewed-by: Richard Levitte 

View the changeset: 
https://github.com/openssl/openssl/compare/3732f12c6684...284116575d37

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/128238467

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Still Failing: openssl/openssl#3745 (master - 3732f12)

2016-05-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3745
Status: Still Failing

Duration: 23 minutes and 48 seconds
Commit: 3732f12 (master)
Author: Andy Polyakov
Message: testlib/OpenSSL/Test.pm: address 5.10 warnings.

Reviewed-by: Richard Levitte 

View the changeset: 
https://github.com/openssl/openssl/compare/9a2d2fb338d6...3732f12c6684

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/128238252

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Still Failing: openssl/openssl#3744 (master - 9a2d2fb)

2016-05-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #3744
Status: Still Failing

Duration: 25 minutes and 53 seconds
Commit: 9a2d2fb (master)
Author: Andy Polyakov
Message: test/evp_test.c: exercise different combinations of data misalignment.

Reviewed-by: Emilia Käsper 

View the changeset: 
https://github.com/openssl/openssl/compare/c0aa8c274843...9a2d2fb338d6

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/128237817

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications


_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl 1.0.32

2016-05-06 Thread AppVeyor


Build openssl 1.0.32 completed



Commit f6df6ca9a4 by FdaSilvaYY on 5/6/2016 7:32 AM:

Raise an Err when CRYPTO_THREAD_lock_new fails


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Broken: FdaSilvaYY/openssl#769 (more-zalloc2 - 887d797)

2016-05-06 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #769
Status: Broken

Duration: 24 minutes and 52 seconds
Commit: 887d797 (more-zalloc2)
Author: FdaSilvaYY
Message: Add more zalloc

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/8181f35d6b71...887d797bbc65

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/128237037

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-06 Thread Andy Polyakov
The branch master has been updated
   via  4b16fa791d3ad8c6d9d3cb575b749247e774299a (commit)
  from  3992e8c0235f374d0582060e768480f0596ab77f (commit)


- Log -
commit 4b16fa791d3ad8c6d9d3cb575b749247e774299a
Author: Andy Polyakov 
Date:   Thu May 5 17:07:06 2016 +0200

README.PERL: clarify "matching" Perl requirement on Windows.

Reviewed-by: Rich Salz 

---

Summary of changes:
 README.PERL | 12 ++--
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/README.PERL b/README.PERL
index 184b377..eda812d 100644
--- a/README.PERL
+++ b/README.PERL
@@ -30,12 +30,12 @@
  Notes on Perl on Windows
  
 
- If you will build on Cygwin (and possibly some other POSIX layers),
- Perl is already part of your distribution.  Simply use the Cygwin
- package manager to make sure Perl gets installed.
-
- Otherwise, you will need to install Perl separately.  The Perl
- package that we know of is ActiveState Perl, available from
+ There are a number of build targets that can be viewed as "Windows".
+ Indeed, there are VC-* configs targeting VisualStudio C, as well as
+ MinGW and Cygwin. The key recommendation is to use "matching" Perl,
+ one that matches build environment. For example, if you will build
+ on Cygwin be sure to use the Cygwin package manager to install Perl.
+ For VC-* builds we recommend ActiveState Perl, available from
  http://www.activestate.com/ActivePerl.
 
  Notes on Perl on VMS
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-06 Thread Andy Polyakov
The branch master has been updated
   via  3992e8c0235f374d0582060e768480f0596ab77f (commit)
  from  284116575d375729e672256cb2b754e8362c5bce (commit)


- Log -
commit 3992e8c0235f374d0582060e768480f0596ab77f
Author: Andy Polyakov 
Date:   Wed May 4 23:53:06 2016 +0200

poly1305/asm/poly1305-x86_64.pl: contain symbols within shared lib.

We don't need it, but external users might find it handy.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 crypto/poly1305/asm/poly1305-x86_64.pl | 4 
 1 file changed, 4 insertions(+)

diff --git a/crypto/poly1305/asm/poly1305-x86_64.pl 
b/crypto/poly1305/asm/poly1305-x86_64.pl
index 89acc5f..3099556 100755
--- a/crypto/poly1305/asm/poly1305-x86_64.pl
+++ b/crypto/poly1305/asm/poly1305-x86_64.pl
@@ -130,8 +130,12 @@ $code.=<<___;
 .externOPENSSL_ia32cap_P
 
 .globl poly1305_init
+.hiddenpoly1305_init
 .globl poly1305_blocks
+.hiddenpoly1305_blocks
 .globl poly1305_emit
+.hiddenpoly1305_emit
+
 .type  poly1305_init,\@function,3
 .align 32
 poly1305_init:
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-06 Thread Andy Polyakov
The branch master has been updated
   via  284116575d375729e672256cb2b754e8362c5bce (commit)
  from  3732f12c668421b229eddcc1b3af2a4806ec9865 (commit)


- Log -
commit 284116575d375729e672256cb2b754e8362c5bce
Author: Andy Polyakov 
Date:   Wed May 4 23:45:35 2016 +0200

poly1305/asm/poly1305-x86_64.pl: make it cross-compile.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 crypto/poly1305/asm/poly1305-x86_64.pl | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/crypto/poly1305/asm/poly1305-x86_64.pl 
b/crypto/poly1305/asm/poly1305-x86_64.pl
index e2a38ec..89acc5f 100755
--- a/crypto/poly1305/asm/poly1305-x86_64.pl
+++ b/crypto/poly1305/asm/poly1305-x86_64.pl
@@ -495,10 +495,10 @@ poly1305_blocks_avx:
 
# base 2^26 -> base 2^64
mov $d1#d,$h0#d
-   and \$`-1<<31`,$d1
+   and \$`-1*(1<<31)`,$d1
mov $d2,$r1 # borrow $r1
mov $d2#d,$h1#d
-   and \$`-1<<31`,$d2
+   and \$`-1*(1<<31)`,$d2
 
shr \$6,$d1
shl \$52,$r1
@@ -1383,10 +1383,10 @@ poly1305_blocks_avx2:
 
# base 2^26 -> base 2^64
mov $d1#d,$h0#d
-   and \$`-1<<31`,$d1
+   and \$`-1*(1<<31)`,$d1
mov $d2,$r1 # borrow $r1
mov $d2#d,$h1#d
-   and \$`-1<<31`,$d2
+   and \$`-1*(1<<31)`,$d2
 
shr \$6,$d1
shl \$52,$r1
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-06 Thread Andy Polyakov
The branch master has been updated
   via  3732f12c668421b229eddcc1b3af2a4806ec9865 (commit)
  from  9a2d2fb338d67d3001aebcb2aa8e11d0fd7d2f80 (commit)


- Log -
commit 3732f12c668421b229eddcc1b3af2a4806ec9865
Author: Andy Polyakov 
Date:   Wed May 4 23:42:57 2016 +0200

testlib/OpenSSL/Test.pm: address 5.10 warnings.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 test/testlib/OpenSSL/Test.pm | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/test/testlib/OpenSSL/Test.pm b/test/testlib/OpenSSL/Test.pm
index f2d0c9b..8a7d0a0 100644
--- a/test/testlib/OpenSSL/Test.pm
+++ b/test/testlib/OpenSSL/Test.pm
@@ -735,8 +735,8 @@ sub __exeext {
 sub __test_file {
 BAIL_OUT("Must run setup() first") if (! $test_name);
 
-my $f = pop . __exeext();
-$f = catfile($directories{BLDTEST},@_,$f);
+my $f = pop;
+$f = catfile($directories{BLDTEST},@_,$f . __exeext());
 $f = catfile($directories{SRCTEST},@_,$f) unless -x $f;
 return $f;
 }
@@ -753,8 +753,8 @@ sub __perltest_file {
 sub __apps_file {
 BAIL_OUT("Must run setup() first") if (! $test_name);
 
-my $f = pop . __exeext();
-$f = catfile($directories{BLDAPPS},@_,$f);
+my $f = pop;
+$f = catfile($directories{BLDAPPS},@_,$f . __exeext());
 $f = catfile($directories{SRCAPPS},@_,$f) unless -x $f;
 return $f;
 }
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-05-06 Thread Andy Polyakov
The branch master has been updated
   via  9a2d2fb338d67d3001aebcb2aa8e11d0fd7d2f80 (commit)
  from  c0aa8c274843c5b8a70d70fc05d71fa3dfd510db (commit)


- Log -
commit 9a2d2fb338d67d3001aebcb2aa8e11d0fd7d2f80
Author: Andy Polyakov 
Date:   Sat Apr 23 19:14:21 2016 +0200

test/evp_test.c: exercise different combinations of data misalignment.

Reviewed-by: Emilia Käsper 

---

Summary of changes:
 test/evp_test.c | 79 +++--
 1 file changed, 55 insertions(+), 24 deletions(-)

diff --git a/test/evp_test.c b/test/evp_test.c
index 56c821b..f8506d4 100644
--- a/test/evp_test.c
+++ b/test/evp_test.c
@@ -251,7 +251,7 @@ struct evp_test {
 /* start line of current test */
 unsigned int start_line;
 /* Error string for test */
-const char *err;
+const char *err, *aux_err;
 /* Expected error value of test */
 char *expected_err;
 /* Number of tests */
@@ -364,8 +364,13 @@ static int check_test_error(struct evp_test *t)
 if (!t->err && !t->expected_err)
 return 1;
 if (t->err && !t->expected_err) {
-fprintf(stderr, "Test line %d: unexpected error %s\n",
-t->start_line, t->err);
+if (t->aux_err != NULL) {
+fprintf(stderr, "Test line %d(%s): unexpected error %s\n",
+t->start_line, t->aux_err, t->err);
+} else {
+fprintf(stderr, "Test line %d: unexpected error %s\n",
+t->start_line, t->err);
+}
 print_expected(t);
 return 0;
 }
@@ -830,7 +835,8 @@ static int cipher_test_parse(struct evp_test *t, const char 
*keyword,
 return 0;
 }
 
-static int cipher_test_enc(struct evp_test *t, int enc)
+static int cipher_test_enc(struct evp_test *t, int enc,
+   size_t out_misalign, size_t inp_misalign)
 {
 struct cipher_data *cdat = t->data;
 unsigned char *in, *out, *tmp = NULL;
@@ -854,9 +860,21 @@ static int cipher_test_enc(struct evp_test *t, int enc)
 out = cdat->plaintext;
 out_len = cdat->plaintext_len;
 }
-tmp = OPENSSL_malloc(in_len + 2 * EVP_MAX_BLOCK_LENGTH);
+inp_misalign += 16 - ((out_misalign + in_len) & 15);
+/*
+ * 'tmp' will store both output and copy of input. We make the copy
+ * of input to specifically aligned part of 'tmp'. So we just
+ * figured out how much padding would ensure the required alignment,
+ * now we allocate extended buffer and finally copy the input just
+ * past inp_misalign in expression below. Output will be written
+ * past out_misalign...
+ */
+tmp = OPENSSL_malloc(out_misalign + in_len + 2 * EVP_MAX_BLOCK_LENGTH +
+ inp_misalign + in_len);
 if (!tmp)
 goto err;
+in = memcpy(tmp + out_misalign + in_len + 2 * EVP_MAX_BLOCK_LENGTH +
+inp_misalign, in, in_len);
 err = "CIPHERINIT_ERROR";
 if (!EVP_CipherInit_ex(ctx, cdat->cipher, NULL, NULL, NULL, enc))
 goto err;
@@ -918,20 +936,20 @@ static int cipher_test_enc(struct evp_test *t, int enc)
 }
 EVP_CIPHER_CTX_set_padding(ctx, 0);
 err = "CIPHERUPDATE_ERROR";
-if (!EVP_CipherUpdate(ctx, tmp, , in, in_len))
+if (!EVP_CipherUpdate(ctx, tmp + out_misalign, , in, in_len))
 goto err;
 if (cdat->aead == EVP_CIPH_CCM_MODE)
 tmpflen = 0;
 else {
 err = "CIPHERFINAL_ERROR";
-if (!EVP_CipherFinal_ex(ctx, tmp + tmplen, ))
+if (!EVP_CipherFinal_ex(ctx, tmp + out_misalign + tmplen, ))
 goto err;
 }
 err = "LENGTH_MISMATCH";
 if (out_len != (size_t)(tmplen + tmpflen))
 goto err;
 err = "VALUE_MISMATCH";
-if (check_output(t, out, tmp, out_len))
+if (check_output(t, out, tmp + out_misalign, out_len))
 goto err;
 if (enc && cdat->aead) {
 unsigned char rtag[16];
@@ -961,6 +979,8 @@ static int cipher_test_run(struct evp_test *t)
 {
 struct cipher_data *cdat = t->data;
 int rv;
+size_t out_misalign, inp_misalign;
+
 if (!cdat->key) {
 t->err = "NO_KEY";
 return 0;
@@ -976,24 +996,35 @@ static int cipher_test_run(struct evp_test *t)
 t->err = "NO_TAG";
 return 0;
 }
-if (cdat->enc) {
-rv = cipher_test_enc(t, 1);
-/* Not fatal errors: return */
-if (rv != 1) {
-if (rv < 0)
-return 0;
-return 1;
-}
-}
-if (cdat->enc != 1) {
-rv = cipher_test_enc(t, 0);
-/* Not fatal errors: return */
-if (rv != 1) {
-if (rv < 0)
-return 0;
-return 1;
+for (out_misalign = 0; out_misalign <= 1; out_misalign++) {
+static char aux_err[64];
+t->aux_err =