[openssl-commits] Build failed: openssl 1.0.547

2016-06-29 Thread AppVeyor



Build openssl 1.0.547 failed


Commit 03a525af08 by FdaSilvaYY on 6/29/2016 10:02 PM:

Add /* ndef OPENSSL_NO_CMS */ after #endif


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#4761 (master - 6b4a77f)

2016-06-29 Thread Travis CI
Build Update for openssl/openssl
-

Build: #4761
Status: Errored

Duration: 3 hours, 14 minutes, and 41 seconds
Commit: 6b4a77f (master)
Author: FdaSilvaYY
Message: Whitespace cleanup in apps

Reviewed-by: Andy Polyakov 
Reviewed-by: Kurt Roeckx 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/1264)

View the changeset: 
https://github.com/openssl/openssl/compare/cbddeebe49ae...6b4a77f56e14

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/141087378

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed in Jenkins: 1_0_2_abi #162

2016-06-29 Thread openssl . sanity
See 

Changes:

[Richard Levitte] Check that the subject name in a proxy cert complies to RFC 
3820

[Richard Levitte] Fix proxy certificate pathlength verification

[Richard Levitte] Allow proxy certs to be present when verifying a chain

--
[...truncated 1903 lines...]
make[4]: Entering directory 
`
make[4]: Leaving directory 
`
make[3]: Leaving directory 
`
make[2]: Leaving directory 
`
make[1]: Leaving directory 
`
making all in apps...
make[1]: Entering directory 
`
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
verify.o verify.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
asn1pars.o asn1pars.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
req.o req.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
dgst.o dgst.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
dh.o dh.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
dhparam.o dhparam.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
enc.o enc.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
passwd.o passwd.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
gendh.o gendh.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM 
-DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM   -c -o 
errstr.o errstr.c
gcc -DMONOLITH -I.. -I../include 

[openssl-commits] [openssl] master update

2016-06-29 Thread Richard Levitte
The branch master has been updated
   via  8e21938ce3a5306df753eb40a20fe30d17cf4a68 (commit)
  from  6b4a77f56e14c002ce3cf960f622682be3b8424b (commit)


- Log -
commit 8e21938ce3a5306df753eb40a20fe30d17cf4a68
Author: Richard Levitte 
Date:   Thu Jun 30 01:23:36 2016 +0200

Remove the envvar hack to enable proxy cert processing

When the proxy cert code was initially added, some application authors
wanted to get them verified without having to change their code, so a
check of the env var OPENSSL_ALLOW_PROXY_CERTS was added.

Since then, the use of this variable has become irrelevant, as it's
likely that code has been changed since, so it's time it gets removed.

Reviewed-by: Tim Hudson 

---

Summary of changes:
 crypto/x509/x509_vfy.c | 6 --
 1 file changed, 6 deletions(-)

diff --git a/crypto/x509/x509_vfy.c b/crypto/x509/x509_vfy.c
index b400ce4..c8ebc50 100644
--- a/crypto/x509/x509_vfy.c
+++ b/crypto/x509/x509_vfy.c
@@ -461,12 +461,6 @@ static int check_chain_extensions(X509_STORE_CTX *ctx)
 } else {
 allow_proxy_certs =
 ! !(ctx->param->flags & X509_V_FLAG_ALLOW_PROXY_CERTS);
-/*
- * A hack to keep people who don't want to modify their software
- * happy
- */
-if (getenv("OPENSSL_ALLOW_PROXY_CERTS"))
-allow_proxy_certs = 1;
 purpose = ctx->param->purpose;
 }
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_1-stable update

2016-06-29 Thread Richard Levitte
The branch OpenSSL_1_0_1-stable has been updated
   via  08327bfb261eea4a3c356d6ebff81d838f063d1b (commit)
   via  f7c95287b602191a971c1cec9427029b453a68e8 (commit)
   via  26576cf9cea7841c9abb54e0609cdf09d3f4c663 (commit)
  from  05200ee5c61ecd38cdcacf9c547b0c3877e8cfef (commit)


- Log -
commit 08327bfb261eea4a3c356d6ebff81d838f063d1b
Author: Richard Levitte 
Date:   Sun Jun 19 10:55:43 2016 +0200

Allow proxy certs to be present when verifying a chain

Reviewed-by: Rich Salz 
(cherry picked from commit 6ad8c48291622a6ccc51489b9a230c9a05ca5614)

commit f7c95287b602191a971c1cec9427029b453a68e8
Author: Richard Levitte 
Date:   Sun Jun 19 10:55:29 2016 +0200

Fix proxy certificate pathlength verification

While travelling up the certificate chain, the internal
proxy_path_length must be updated with the pCPathLengthConstraint
value, or verification will not work properly.  This corresponds to
RFC 3820, 4.1.4 (a).

Reviewed-by: Rich Salz 
(cherry picked from commit 30aeb3128199c15760a785d88a4eda9e156d5af6)

commit 26576cf9cea7841c9abb54e0609cdf09d3f4c663
Author: Richard Levitte 
Date:   Sun Jun 19 10:55:16 2016 +0200

Check that the subject name in a proxy cert complies to RFC 3820

The subject name MUST be the same as the issuer name, with a single CN
entry added.

RT#1852

Reviewed-by: Rich Salz 
(cherry picked from commit 338fb1688fbfb7efe0bdd475b01791a6de5ef94b)

---

Summary of changes:
 apps/apps.c|   2 +
 crypto/x509/x509.h |   6 ++-
 crypto/x509/x509_err.c |   1 +
 crypto/x509/x509_txt.c |   2 +
 crypto/x509/x509_vfy.c | 103 +
 crypto/x509/x509_vfy.h |   2 +
 doc/apps/verify.pod|   5 +++
 7 files changed, 112 insertions(+), 9 deletions(-)

diff --git a/apps/apps.c b/apps/apps.c
index 8ab4833..ca9179e 100644
--- a/apps/apps.c
+++ b/apps/apps.c
@@ -2241,6 +2241,8 @@ int args_verify(char ***pargs, int *pargc,
 flags |= X509_V_FLAG_CHECK_SS_SIGNATURE;
 else if (!strcmp(arg, "-no_alt_chains"))
 flags |= X509_V_FLAG_NO_ALT_CHAINS;
+else if (!strcmp(arg, "-allow_proxy_certs"))
+flags |= X509_V_FLAG_ALLOW_PROXY_CERTS;
 else
 return 0;
 
diff --git a/crypto/x509/x509.h b/crypto/x509/x509.h
index bd600de..dc326a7 100644
--- a/crypto/x509/x509.h
+++ b/crypto/x509/x509.h
@@ -1216,6 +1216,7 @@ int X509_TRUST_get_trust(X509_TRUST *xp);
  * The following lines are auto generated by the script mkerr.pl. Any changes
  * made after this point may be overwritten when the script is next run.
  */
+
 void ERR_load_X509_strings(void);
 
 /* Error codes for the X509 functions. */
@@ -1223,6 +1224,7 @@ void ERR_load_X509_strings(void);
 /* Function codes. */
 # define X509_F_ADD_CERT_DIR  100
 # define X509_F_BY_FILE_CTRL  101
+# define X509_F_CHECK_NAME_CONSTRAINTS106
 # define X509_F_CHECK_POLICY  145
 # define X509_F_DIR_CTRL  102
 # define X509_F_GET_CERT_BY_SUBJECT   103
@@ -1296,7 +1298,7 @@ void ERR_load_X509_strings(void);
 # define X509_R_WRONG_LOOKUP_TYPE 112
 # define X509_R_WRONG_TYPE122
 
-#ifdef  __cplusplus
+# ifdef  __cplusplus
 }
-#endif
+# endif
 #endif
diff --git a/crypto/x509/x509_err.c b/crypto/x509/x509_err.c
index a2b8b7f..174b65e 100644
--- a/crypto/x509/x509_err.c
+++ b/crypto/x509/x509_err.c
@@ -72,6 +72,7 @@
 static ERR_STRING_DATA X509_str_functs[] = {
 {ERR_FUNC(X509_F_ADD_CERT_DIR), "ADD_CERT_DIR"},
 {ERR_FUNC(X509_F_BY_FILE_CTRL), "BY_FILE_CTRL"},
+{ERR_FUNC(X509_F_CHECK_NAME_CONSTRAINTS), "CHECK_NAME_CONSTRAINTS"},
 {ERR_FUNC(X509_F_CHECK_POLICY), "CHECK_POLICY"},
 {ERR_FUNC(X509_F_DIR_CTRL), "DIR_CTRL"},
 {ERR_FUNC(X509_F_GET_CERT_BY_SUBJECT), "GET_CERT_BY_SUBJECT"},
diff --git a/crypto/x509/x509_txt.c b/crypto/x509/x509_txt.c
index 0952813..b249d42 100644
--- a/crypto/x509/x509_txt.c
+++ b/crypto/x509/x509_txt.c
@@ -187,6 +187,8 @@ const char *X509_verify_cert_error_string(long n)
 return ("Invalid certificate verification context");
 case X509_V_ERR_STORE_LOOKUP:
 return ("Issuer certificate lookup error");
+case X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION:
+return ("proxy subject name violation");
 
 default:
 BIO_snprintf(buf, sizeof buf, "error number %ld", n);
diff --git a/crypto/x509/x509_vfy.c b/crypto/x509/x509_vfy.c
index 2e2287e..f0fa7f4 100644
--- a/crypto/x509/x509_vfy.c
+++ b/crypto/x509/x509_vfy.c
@@ -633,13 +633,27 @@ static int 

[openssl-commits] Errored: openssl/openssl#4759 (master - cbddeeb)

2016-06-29 Thread Travis CI
Build Update for openssl/openssl
-

Build: #4759
Status: Errored

Duration: 1 hour, 8 minutes, and 34 seconds
Commit: cbddeeb (master)
Author: Ben Laurie
Message: Some interfaces may have IPv6 addresses even if an IPv6 address is not
"configured on the local system". Whatever that means. Example that is biting
me is loopback has ::1 as an address, but the network interface is v4 only.

Reviewed-by: Richard Levitte 

View the changeset: 
https://github.com/openssl/openssl/compare/03cb37acec0c...cbddeebe49ae

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/141054163

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2016-06-29 Thread Richard Levitte
The branch OpenSSL_1_0_2-stable has been updated
   via  6ad8c48291622a6ccc51489b9a230c9a05ca5614 (commit)
   via  30aeb3128199c15760a785d88a4eda9e156d5af6 (commit)
   via  338fb1688fbfb7efe0bdd475b01791a6de5ef94b (commit)
  from  ad64a69e02f7dda422d0f4f53dce7b1278715380 (commit)


- Log -
commit 6ad8c48291622a6ccc51489b9a230c9a05ca5614
Author: Richard Levitte 
Date:   Sun Jun 19 10:55:43 2016 +0200

Allow proxy certs to be present when verifying a chain

Reviewed-by: Rich Salz 

commit 30aeb3128199c15760a785d88a4eda9e156d5af6
Author: Richard Levitte 
Date:   Sun Jun 19 10:55:29 2016 +0200

Fix proxy certificate pathlength verification

While travelling up the certificate chain, the internal
proxy_path_length must be updated with the pCPathLengthConstraint
value, or verification will not work properly.  This corresponds to
RFC 3820, 4.1.4 (a).

Reviewed-by: Rich Salz 

commit 338fb1688fbfb7efe0bdd475b01791a6de5ef94b
Author: Richard Levitte 
Date:   Sun Jun 19 10:55:16 2016 +0200

Check that the subject name in a proxy cert complies to RFC 3820

The subject name MUST be the same as the issuer name, with a single CN
entry added.

RT#1852

Reviewed-by: Rich Salz 

---

Summary of changes:
 apps/apps.c|   2 +
 crypto/x509/x509.h |   6 ++-
 crypto/x509/x509_err.c |   3 +-
 crypto/x509/x509_txt.c |   2 +
 crypto/x509/x509_vfy.c | 103 +
 crypto/x509/x509_vfy.h |   2 +
 doc/apps/verify.pod|   5 +++
 7 files changed, 113 insertions(+), 10 deletions(-)

diff --git a/apps/apps.c b/apps/apps.c
index b1dd970..0385490 100644
--- a/apps/apps.c
+++ b/apps/apps.c
@@ -2374,6 +2374,8 @@ int args_verify(char ***pargs, int *pargc,
 flags |= X509_V_FLAG_PARTIAL_CHAIN;
 else if (!strcmp(arg, "-no_alt_chains"))
 flags |= X509_V_FLAG_NO_ALT_CHAINS;
+else if (!strcmp(arg, "-allow_proxy_certs"))
+flags |= X509_V_FLAG_ALLOW_PROXY_CERTS;
 else
 return 0;
 
diff --git a/crypto/x509/x509.h b/crypto/x509/x509.h
index fc613ce..6fa28eb 100644
--- a/crypto/x509/x509.h
+++ b/crypto/x509/x509.h
@@ -1234,6 +1234,7 @@ int X509_TRUST_get_trust(X509_TRUST *xp);
  * The following lines are auto generated by the script mkerr.pl. Any changes
  * made after this point may be overwritten when the script is next run.
  */
+
 void ERR_load_X509_strings(void);
 
 /* Error codes for the X509 functions. */
@@ -1241,6 +1242,7 @@ void ERR_load_X509_strings(void);
 /* Function codes. */
 # define X509_F_ADD_CERT_DIR  100
 # define X509_F_BY_FILE_CTRL  101
+# define X509_F_CHECK_NAME_CONSTRAINTS106
 # define X509_F_CHECK_POLICY  145
 # define X509_F_DIR_CTRL  102
 # define X509_F_GET_CERT_BY_SUBJECT   103
@@ -1322,7 +1324,7 @@ void ERR_load_X509_strings(void);
 # define X509_R_WRONG_LOOKUP_TYPE 112
 # define X509_R_WRONG_TYPE122
 
-#ifdef  __cplusplus
+# ifdef  __cplusplus
 }
-#endif
+# endif
 #endif
diff --git a/crypto/x509/x509_err.c b/crypto/x509/x509_err.c
index 1e779fe..a2a8e1b 100644
--- a/crypto/x509/x509_err.c
+++ b/crypto/x509/x509_err.c
@@ -1,6 +1,6 @@
 /* crypto/x509/x509_err.c */
 /* 
- * Copyright (c) 1999-2012 The OpenSSL Project.  All rights reserved.
+ * Copyright (c) 1999-2016 The OpenSSL Project.  All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions
@@ -72,6 +72,7 @@
 static ERR_STRING_DATA X509_str_functs[] = {
 {ERR_FUNC(X509_F_ADD_CERT_DIR), "ADD_CERT_DIR"},
 {ERR_FUNC(X509_F_BY_FILE_CTRL), "BY_FILE_CTRL"},
+{ERR_FUNC(X509_F_CHECK_NAME_CONSTRAINTS), "CHECK_NAME_CONSTRAINTS"},
 {ERR_FUNC(X509_F_CHECK_POLICY), "CHECK_POLICY"},
 {ERR_FUNC(X509_F_DIR_CTRL), "DIR_CTRL"},
 {ERR_FUNC(X509_F_GET_CERT_BY_SUBJECT), "GET_CERT_BY_SUBJECT"},
diff --git a/crypto/x509/x509_txt.c b/crypto/x509/x509_txt.c
index 4475715..35db095 100644
--- a/crypto/x509/x509_txt.c
+++ b/crypto/x509/x509_txt.c
@@ -208,6 +208,8 @@ const char *X509_verify_cert_error_string(long n)
 return ("Invalid certificate verification context");
 case X509_V_ERR_STORE_LOOKUP:
 return ("Issuer certificate lookup error");
+case X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION:
+return ("proxy subject name violation");
 
 default:
 BIO_snprintf(buf, sizeof buf, "error number %ld", n);
diff --git 

[openssl-commits] Build completed: openssl master.4082

2016-06-29 Thread AppVeyor


Build openssl master.4082 completed



Commit 3c09718643 by Rich Salz on 6/29/2016 4:23 PM:

Cleanup obj_dat.h, obj_dat.pl


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl OpenSSL_1_0_2-stable.4081

2016-06-29 Thread AppVeyor



Build openssl OpenSSL_1_0_2-stable.4081 failed


Commit 907e01c908 by Cristian Stoica on 6/29/2016 2:45 PM:

s_server: fix warnings unused-but-set-variable (no-dh)


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-06-29 Thread Rich Salz
The branch master has been updated
   via  6b4a77f56e14c002ce3cf960f622682be3b8424b (commit)
   via  0485d5406a3b76dd02e73c1c7dcabebe64f9f8a2 (commit)
   via  02e112a88579ff2592f34015f73dc85f4ed76ad5 (commit)
   via  0517ffc47c79136ba09fb34400e9e26c539615d1 (commit)
   via  9d22666eb89af7f4ca5c3d52490b7da89276cf90 (commit)
  from  cbddeebe49ae024e8debc9ae4f90f22ee15a69e2 (commit)


- Log -
commit 6b4a77f56e14c002ce3cf960f622682be3b8424b
Author: FdaSilvaYY 
Date:   Tue Jun 28 22:51:51 2016 +0200

Whitespace cleanup in apps

Reviewed-by: Andy Polyakov 
Reviewed-by: Kurt Roeckx 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/1264)

commit 0485d5406a3b76dd02e73c1c7dcabebe64f9f8a2
Author: FdaSilvaYY 
Date:   Tue Jun 28 22:51:27 2016 +0200

Whitespace cleanup in ssl folder

Reviewed-by: Andy Polyakov 
Reviewed-by: Kurt Roeckx 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/1264)

commit 02e112a88579ff2592f34015f73dc85f4ed76ad5
Author: FdaSilvaYY 
Date:   Tue Jun 28 22:51:01 2016 +0200

Whitespace cleanup in crypto

Reviewed-by: Andy Polyakov 
Reviewed-by: Kurt Roeckx 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/1264)

commit 0517ffc47c79136ba09fb34400e9e26c539615d1
Author: FdaSilvaYY 
Date:   Tue Jun 28 22:50:03 2016 +0200

Whitespace cleanup in docs

Reviewed-by: Andy Polyakov 
Reviewed-by: Kurt Roeckx 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/1264)

commit 9d22666eb89af7f4ca5c3d52490b7da89276cf90
Author: FdaSilvaYY 
Date:   Tue Jun 28 22:39:55 2016 +0200

Spelling

Reviewed-by: Andy Polyakov 
Reviewed-by: Kurt Roeckx 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/1264)

---

Summary of changes:
 apps/apps.c |  4 ++--
 apps/req.c  |  2 +-
 apps/ts.c   |  4 ++--
 crypto/aes/aes_core.c   |  2 +-
 crypto/aes/aes_x86core.c| 10 +-
 crypto/asn1/asn1_par.c  |  2 +-
 crypto/bn/bn_div.c  |  2 +-
 crypto/bn/bn_exp.c  |  2 +-
 crypto/bn/bn_gcd.c  |  4 ++--
 crypto/bn/bn_prime.c|  2 +-
 crypto/conf/conf_mod.c  |  4 ++--
 crypto/ec/ec_lib.c  |  1 -
 crypto/evp/bio_ok.c |  2 +-
 crypto/evp/e_aes_cbc_hmac_sha1.c|  2 +-
 crypto/modes/ocb128.c   |  2 +-
 crypto/objects/obj_dat.h|  4 ++--
 crypto/pkcs7/pk7_doit.c |  2 +-
 crypto/rsa/rsa_pk1.c|  2 +-
 crypto/ts/ts_rsp_verify.c   |  2 +-
 crypto/x509/x509_obj.c  |  2 +-
 crypto/x509/x509_vfy.c  |  2 +-
 crypto/x509v3/v3_addr.c |  2 +-
 doc/crypto/BIO_s_file.pod   |  2 +-
 doc/crypto/BN_mod_mul_reciprocal.pod|  2 +-
 doc/crypto/ECPKParameters_print.pod |  3 ++-
 doc/crypto/ERR_remove_state.pod |  2 +-
 doc/crypto/EVP_CIPHER_meth_new.pod  |  2 +-
 doc/crypto/EVP_EncryptInit.pod  |  6 +++---
 doc/crypto/EVP_MD_meth_new.pod  |  2 +-
 doc/crypto/EVP_PKEY_CTX_ctrl.pod|  3 ++-
 doc/crypto/EVP_PKEY_cmp.pod |  3 ++-
 doc/crypto/OPENSSL_ia32cap.pod  |  2 +-
 doc/crypto/OPENSSL_malloc.pod   |  2 +-
 doc/crypto/PEM_read.pod |  4 ++--
 doc/crypto/X509V3_get_d2i.pod   |  4 ++--
 doc/ssl/SSL_CTX_dane_enable.pod |  2 +-
 doc/ssl/SSL_CTX_new.pod |  2 +-
 doc/ssl/SSL_CTX_set_tmp_dh_callback.pod |  2 +-
 include/openssl/bn.h|  2 +-
 include/openssl/buffer.h|  2 +-
 include/openssl/err.h   |  2 +-
 include/openssl/pkcs12.h|  4 ++--
 include/openssl/pkcs7.h |  2 +-
 include/openssl/srp.h   |  2 +-
 include/openssl/x509v3.h|  2 +-
 ssl/d1_lib.c|  2 +-
 ssl/d1_msg.c|  2 +-
 ssl/record/rec_layer_d1.c   |  4 ++--
 ssl/record/rec_layer_s3.c   |  2 +-
 ssl/record/record.h |  2 +-
 ssl/record/ssl3_buffer.c|  2 +-
 ssl/ssl_mcnf.c 

[openssl-commits] Passed: FdaSilvaYY/openssl#1268 (speling_n_cleanup - 090ca5a)

2016-06-29 Thread Travis CI
Build Update for FdaSilvaYY/openssl
-

Build: #1268
Status: Passed

Duration: 11 minutes and 56 seconds
Commit: 090ca5a (speling_n_cleanup)
Author: FdaSilvaYY
Message: Whitespace cleanup in apps

View the changeset: 
https://github.com/FdaSilvaYY/openssl/compare/bdc5c60f6951...090ca5a6a1bc

View the full build log and details: 
https://travis-ci.org/FdaSilvaYY/openssl/builds/140939252

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2016-06-29 Thread Ben Laurie
The branch master has been updated
   via  cbddeebe49ae024e8debc9ae4f90f22ee15a69e2 (commit)
  from  03cb37acec0c23a01bee4357cd59ec9f97e528ba (commit)


- Log -
commit cbddeebe49ae024e8debc9ae4f90f22ee15a69e2
Author: Ben Laurie 
Date:   Sat Jun 25 17:42:14 2016 +0100

Some interfaces may have IPv6 addresses even if an IPv6 address is not
"configured on the local system". Whatever that means. Example that is 
biting
me is loopback has ::1 as an address, but the network interface is v4 only.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 crypto/bio/b_addr.c | 3 ---
 1 file changed, 3 deletions(-)

diff --git a/crypto/bio/b_addr.c b/crypto/bio/b_addr.c
index e5352db..b77fd4b 100644
--- a/crypto/bio/b_addr.c
+++ b/crypto/bio/b_addr.c
@@ -666,9 +666,6 @@ int BIO_lookup(const char *host, const char *service,
 struct addrinfo hints;
 memset(, 0, sizeof hints);
 
-# ifdef AI_ADDRCONFIG
-hints.ai_flags = AI_ADDRCONFIG;
-# endif
 hints.ai_family = family;
 hints.ai_socktype = socktype;
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits