[openssl-commits] Build completed: openssl master.16649

2018-03-20 Thread AppVeyor


Build openssl master.16649 completed



Commit 4af14b7b01 by Matthias Kraft on 3/21/2018 1:33 AM:

Add dladdr() for AIX


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.16648

2018-03-20 Thread AppVeyor



Build openssl master.16648 failed


Commit 9ff31e2518 by Rich Salz on 3/21/2018 2:05 AM:

Fix copyright in MSFT VersionInfo


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-03-20 Thread Rich Salz
The branch master has been updated
   via  4af14b7b018750bf3584587068211948924738fb (commit)
  from  d316cdcf6d8d6934663278145fe0a8191e14a8c5 (commit)


- Log -
commit 4af14b7b018750bf3584587068211948924738fb
Author: Matthias Kraft 
Date:   Mon Mar 19 13:37:46 2018 -0400

Add dladdr() for AIX

Although it deviates from the actual prototype of DSO_dsobyaddr(), this
is now ISO C compliant and gcc -Wpedantic accepts the code.

Added DATA segment checking to catch ptrgl virtual addresses. Avoid
memleaks with every AIX/dladdr() call. Removed debug-fprintf()s.
Added test case for DSO_dsobyaddr(), which will eventually call dladdr().
Removed unecessary AIX ifdefs again.

The implementation can only lookup function symbols, no data symbols.
Added PIC-flag to aix*-cc build targets.

As AIX is missing a dladdr() implementation it is currently uncertain our
exit()-handlers can still be called when the application exits. After
dlclose() the whole library might have been unloaded already.

Signed-off-by: Matthias Kraft 

Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5668)

---

Summary of changes:
 Configurations/10-main.conf  |  2 +
 crypto/dso/dso_dlfcn.c   | 80 ++--
 crypto/init.c| 15 
 test/recipes/90-test_shlibload.t |  6 ++-
 test/shlibloadtest.c | 49 +++-
 5 files changed, 145 insertions(+), 7 deletions(-)

diff --git a/Configurations/10-main.conf b/Configurations/10-main.conf
index a0a9e17..72695d5 100644
--- a/Configurations/10-main.conf
+++ b/Configurations/10-main.conf
@@ -1212,6 +1212,7 @@ my %targets = (
 perlasm_scheme   => "aix32",
 dso_scheme   => "dlfcn",
 shared_target=> "aix-shared",
+shared_cflag => "-qpic",
 shared_ldflag=> "-G",
 shared_extension => ".so.\$(SHLIB_VERSION_NUMBER)",
 arflags  => "-X32 r",
@@ -1232,6 +1233,7 @@ my %targets = (
 perlasm_scheme   => "aix64",
 dso_scheme   => "dlfcn",
 shared_target=> "aix-shared",
+shared_cflag => "-qpic",
 shared_ldflag=> "-G",
 shared_extension => ".so.\$(SHLIB_VERSION_NUMBER)",
 arflags  => "-X64 r",
diff --git a/crypto/dso/dso_dlfcn.c b/crypto/dso/dso_dlfcn.c
index 26f98bf..7abfe66 100644
--- a/crypto/dso/dso_dlfcn.c
+++ b/crypto/dso/dso_dlfcn.c
@@ -1,5 +1,5 @@
 /*
- * Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.
  *
  * Licensed under the OpenSSL license (the "License").  You may not use
  * this file except in compliance with the License.  You can obtain a copy
@@ -26,7 +26,7 @@
 #  endif
 #  include 
 #  define HAVE_DLINFO 1
-#  if defined(_AIX) || defined(__CYGWIN__) || \
+#  if defined(__CYGWIN__) || \
  defined(__SCO_VERSION__) || defined(_SCO_ELF) || \
  (defined(__osf__) && !defined(RTLD_NEXT)) || \
  (defined(__OpenBSD__) && !defined(RTLD_SELF)) || \
@@ -308,6 +308,73 @@ static int dladdr(void *address, Dl_info *dl)
 }
 # endif /* __sgi */
 
+# ifdef _AIX
+/*-
+ * See IBM's AIX Version 7.2, Technical Reference:
+ *  Base Operating System and Extensions, Volume 1 and 2
+ *  
https://www.ibm.com/support/knowledgecenter/ssw_aix_72/com.ibm.aix.base/technicalreferences.htm
+ */
+#  include 
+#  include 
+/* ~ 64 * (sizeof(struct ld_info) + _XOPEN_PATH_MAX + _XOPEN_NAME_MAX) */
+#  define DLFCN_LDINFO_SIZE 86976
+typedef struct Dl_info {
+const char *dli_fname;
+} Dl_info;
+/*
+ * This dladdr()-implementation will also find the ptrgl (Pointer Glue) virtual
+ * address of a function, which is just located in the DATA segment instead of
+ * the TEXT segment.
+ */
+static int dladdr(void *addr, Dl_info *dl)
+{
+unsigned int found = 0;
+struct ld_info *ldinfos, *next_ldi, *this_ldi;
+
+if ((ldinfos = (struct ld_info *)OPENSSL_malloc(DLFCN_LDINFO_SIZE)) == 
NULL) {
+errno = ENOMEM;
+dl->dli_fname = NULL;
+return 0;
+}
+
+if ((loadquery(L_GETINFO, (void *)ldinfos, DLFCN_LDINFO_SIZE)) < 0) {
+/*-
+ * Error handling is done through errno and dlerror() reading errno:
+ *  ENOMEM (ldinfos buffer is too small),
+ *  EINVAL (invalid flags),
+ *  EFAULT (invalid ldinfos ptr)
+ */
+OPENSSL_free((void *)ldinfos);
+dl->dli_fname = NULL;
+return 0;
+}
+next_ldi = ldinfos;
+
+do {
+this_ldi = next_ldi;
+if (((addr >= this_ldi->ldinfo_textorg)
+ 

[openssl-commits] Build completed: openssl master.16644

2018-03-20 Thread AppVeyor


Build openssl master.16644 completed



Commit d316cdcf6d by Benjamin Kaduk on 3/21/2018 12:30 AM:

Do not cache sessions with zero sid_ctx_length when SSL_VERIFY_PEER


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-03-20 Thread kaduk
The branch master has been updated
   via  d316cdcf6d8d6934663278145fe0a8191e14a8c5 (commit)
  from  79b49fb00d61f8bc41fe20694da26a18ddfd3b02 (commit)


- Log -
commit d316cdcf6d8d6934663278145fe0a8191e14a8c5
Author: Benjamin Kaduk 
Date:   Fri Jan 26 11:16:21 2018 -0600

Do not cache sessions with zero sid_ctx_length when SSL_VERIFY_PEER

The sid_ctx is something of a "certificate request context" or a
"session ID context" -- something from the application that gives
extra indication of what sort of thing this session is/was for/from.
Without a sid_ctx, we only know that there is a session that we
issued, but it could have come from a number of things, especially
with an external (shared) session cache.  Accordingly, when resuming,
we will hard-error the handshake when presented with a session with
zero-length sid_ctx and SSL_VERIFY_PEER is set -- we simply have no
information about the peer to verify, so the verification must fail.

In order to prevent these future handshake failures, proactively
decline to add the problematic sessions to the session cache.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/5175)

---

Summary of changes:
 ssl/ssl_lib.c | 12 
 1 file changed, 12 insertions(+)

diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
index 062f5ce..b66cd71 100644
--- a/ssl/ssl_lib.c
+++ b/ssl/ssl_lib.c
@@ -3427,6 +3427,18 @@ void ssl_update_cache(SSL *s, int mode)
 if (s->session->session_id_length == 0)
 return;
 
+/*
+ * If sid_ctx_length is 0 there is no specific application context
+ * associated with this session, so when we try to resume it and
+ * SSL_VERIFY_PEER is requested, we have no indication that this is
+ * actually a session for the proper application context, and the
+ * *handshake* will fail, not just the resumption attempt.
+ * Do not cache these sessions that are not resumable.
+ */
+if (s->session->sid_ctx_length == 0
+&& (s->verify_mode & SSL_VERIFY_PEER) != 0)
+return;
+
 i = s->session_ctx->session_cache_mode;
 if ((i & mode) != 0
 && (!s->hit || SSL_IS_TLS13(s))
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.16643

2018-03-20 Thread AppVeyor



Build openssl master.16643 failed


Commit 9b9a93c0fa by Peter Wu on 3/20/2018 8:16 PM:

Add support for logging TLS 1.3 exporter secret


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] SUCCESSFUL build of OpenSSL branch master with options -d --strict-warnings no-psk

2018-03-20 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.4.0-116-generic #140-Ubuntu SMP Mon Feb 12 21:23:04 UTC 2018 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-psk

Commit log since last time:

59f124f Fix: drbgtest fails when tests are executed in random order
8f8be10 s_client, s_server: do generic SSL configuration first, specialization 
after
27df459 Fix no-sm3/no-sm2 (with strict-warnings)
9802002 Fix no-sm3 (and no-sm2)
3830c19 Don't generate buildtest_*err.c
7d7f683 Enhance ssltestlib's create_ssl_ctx_pair to take min and max proto 
version
2e2faa8 In TLSProxy::Proxy, specify TLSv1.3 as maximum allowable protocol
43110de Support "-min_protocol" and "-max_protocol" in s_server and s_client
dad8c26 Fix no-ec
1bf2cc2 Fix no-sm2
1a54618 Fix no-posix-io compile failure
4bfb96f Place ticket keys into secure memory
c2b290c Fix no-psk
69e2b8d Revise and cleanup; use strict,warnings
8a5ed9d Apply system_default configuration on SSL_CTX_new().
440bce8 Add a multithread rand test
16cfc2c Don't use a ssl specific DRBG anymore
7caf122 Make the public and private DRBG thread local
4e66475 Handle evp_tests assumption of EVP_PKEY_FLAG_AUTOARGLEN
dceb99a Support SM2 ECIES scheme via EVP
3d328a4 Add SM2 signature and ECIES schemes
df3a155 Configurations/15-android.conf: detect clang by PATH, not by CC.
f39276f Add NOTES.ANDROID.
87ba25e Configurations/15-android.conf: default to RC4_CHAR whenever possible.
9d3cab4 MIPS assembly pack: default heuristic detection to little-endian.
f41c867 Configurations/15-android.conf: refine clang support.
6d5e74f Configure: pass -no-integrated-as.
c911e5d Fix bio callback backward compatibility
d4ef4fb Fix a crash in SSLfatal due to invalid enc_write_ctx
df6d51e Fix no-cmac
66a925e Fix no-ec
3ec9e4e Add a CHANGES entry to mention the replay protection capabilities
d2d67a4 Document the replay protection capabilities
78fb537 Add a test for 0RTT replay protection
66d7de1 Add an anti-replay mechanism
f023ba2 Don't update the session cache when processing a client certificate in 
TLSv1.3
32305f8 Always call the new_session_cb when issuing a NewSessionTicket in 
TLSv1.3
51cf8ba engines/asm/e_padlock*: add support for Zhaoxin's x86 platform
ec4c389 Clarify a couple of details around "make variables"
00c8f1b Stop test/shlibloadtest.c from failing in a regression test
b4d46ad Add a simple method to run regression tests
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2018-03-20 Thread paul . dale
The branch OpenSSL_1_1_0-stable has been updated
   via  b9b5e7144af84dd9b66d31ed6d009b40c5bcd514 (commit)
  from  418c784b114a37fe948517ea0a257bea905b3c37 (commit)


- Log -
commit b9b5e7144af84dd9b66d31ed6d009b40c5bcd514
Author: Pauli 
Date:   Tue Mar 20 11:09:38 2018 +1000

Remove mentioned link between message digests and public key algorithms.

Refer #5682 This is the same but for 1.1.0

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5683)

---

Summary of changes:
 doc/crypto/EVP_SignInit.pod   | 5 -
 doc/crypto/EVP_VerifyInit.pod | 5 -
 2 files changed, 10 deletions(-)

diff --git a/doc/crypto/EVP_SignInit.pod b/doc/crypto/EVP_SignInit.pod
index c40da1e..9279ce7 100644
--- a/doc/crypto/EVP_SignInit.pod
+++ b/doc/crypto/EVP_SignInit.pod
@@ -59,11 +59,6 @@ The B interface to digital signatures should almost 
always be used in
 preference to the low level interfaces. This is because the code then becomes
 transparent to the algorithm used and much more flexible.
 
-Due to the link between message digests and public key algorithms the correct
-digest algorithm must be used with the correct public key type. A list of
-algorithms and associated public key algorithms appears in
-L.
-
 When signing with DSA private keys the random number generator must be seeded
 or the operation will fail. The random number generator does not need to be
 seeded for RSA signatures.
diff --git a/doc/crypto/EVP_VerifyInit.pod b/doc/crypto/EVP_VerifyInit.pod
index ffb6f14..ee1578a 100644
--- a/doc/crypto/EVP_VerifyInit.pod
+++ b/doc/crypto/EVP_VerifyInit.pod
@@ -51,11 +51,6 @@ The B interface to digital signatures should almost 
always be used in
 preference to the low level interfaces. This is because the code then becomes
 transparent to the algorithm used and much more flexible.
 
-Due to the link between message digests and public key algorithms the correct
-digest algorithm must be used with the correct public key type. A list of
-algorithms and associated public key algorithms appears in
-L.
-
 The call to EVP_VerifyFinal() internally finalizes a copy of the digest 
context.
 This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can be called
 later to digest and verify additional data.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] SUCCESSFUL build of OpenSSL branch master with options -d --strict-warnings no-posix-io

2018-03-20 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.4.0-116-generic #140-Ubuntu SMP Mon Feb 12 21:23:04 UTC 2018 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-posix-io

Commit log since last time:

59f124f Fix: drbgtest fails when tests are executed in random order
8f8be10 s_client, s_server: do generic SSL configuration first, specialization 
after
27df459 Fix no-sm3/no-sm2 (with strict-warnings)
9802002 Fix no-sm3 (and no-sm2)
3830c19 Don't generate buildtest_*err.c
7d7f683 Enhance ssltestlib's create_ssl_ctx_pair to take min and max proto 
version
2e2faa8 In TLSProxy::Proxy, specify TLSv1.3 as maximum allowable protocol
43110de Support "-min_protocol" and "-max_protocol" in s_server and s_client
dad8c26 Fix no-ec
1bf2cc2 Fix no-sm2
1a54618 Fix no-posix-io compile failure
4bfb96f Place ticket keys into secure memory
c2b290c Fix no-psk
69e2b8d Revise and cleanup; use strict,warnings
8a5ed9d Apply system_default configuration on SSL_CTX_new().
440bce8 Add a multithread rand test
16cfc2c Don't use a ssl specific DRBG anymore
7caf122 Make the public and private DRBG thread local
4e66475 Handle evp_tests assumption of EVP_PKEY_FLAG_AUTOARGLEN
dceb99a Support SM2 ECIES scheme via EVP
3d328a4 Add SM2 signature and ECIES schemes
df3a155 Configurations/15-android.conf: detect clang by PATH, not by CC.
f39276f Add NOTES.ANDROID.
87ba25e Configurations/15-android.conf: default to RC4_CHAR whenever possible.
9d3cab4 MIPS assembly pack: default heuristic detection to little-endian.
f41c867 Configurations/15-android.conf: refine clang support.
6d5e74f Configure: pass -no-integrated-as.
c911e5d Fix bio callback backward compatibility
d4ef4fb Fix a crash in SSLfatal due to invalid enc_write_ctx
df6d51e Fix no-cmac
66a925e Fix no-ec
3ec9e4e Add a CHANGES entry to mention the replay protection capabilities
d2d67a4 Document the replay protection capabilities
78fb537 Add a test for 0RTT replay protection
66d7de1 Add an anti-replay mechanism
f023ba2 Don't update the session cache when processing a client certificate in 
TLSv1.3
32305f8 Always call the new_session_cb when issuing a NewSessionTicket in 
TLSv1.3
51cf8ba engines/asm/e_padlock*: add support for Zhaoxin's x86 platform
ec4c389 Clarify a couple of details around "make variables"
00c8f1b Stop test/shlibloadtest.c from failing in a regression test
b4d46ad Add a simple method to run regression tests
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-03-20 Thread paul . dale
The branch master has been updated
   via  79b49fb00d61f8bc41fe20694da26a18ddfd3b02 (commit)
  from  a9dd51a800f1920aa7545dc2f4f831000a60af48 (commit)


- Log -
commit 79b49fb00d61f8bc41fe20694da26a18ddfd3b02
Author: Pauli 
Date:   Tue Mar 20 10:03:10 2018 +1000

Remove mention of link between message digests and public key algorithms.

The comment in EVP_DigestInit.pod is:

> Returns the NID of the public key signing algorithm associated with this
digest. For example EVP_sha1() is associated with RSA so this will return
B. Since digests and signature algorithms are no
longer linked this function is only retained for compatibility reasons.


I.e. there is no link anymore.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5682)

---

Summary of changes:
 doc/man3/EVP_SignInit.pod   | 5 -
 doc/man3/EVP_VerifyInit.pod | 5 -
 2 files changed, 10 deletions(-)

diff --git a/doc/man3/EVP_SignInit.pod b/doc/man3/EVP_SignInit.pod
index 987526c..c171b4c 100644
--- a/doc/man3/EVP_SignInit.pod
+++ b/doc/man3/EVP_SignInit.pod
@@ -66,11 +66,6 @@ The B interface to digital signatures should almost 
always be used in
 preference to the low level interfaces. This is because the code then becomes
 transparent to the algorithm used and much more flexible.
 
-Due to the link between message digests and public key algorithms the correct
-digest algorithm must be used with the correct public key type. A list of
-algorithms and associated public key algorithms appears in
-L.
-
 When signing with DSA private keys the random number generator must be seeded
 or the operation will fail. The random number generator does not need to be
 seeded for RSA signatures.
diff --git a/doc/man3/EVP_VerifyInit.pod b/doc/man3/EVP_VerifyInit.pod
index ad8a8c0..f0d734c 100644
--- a/doc/man3/EVP_VerifyInit.pod
+++ b/doc/man3/EVP_VerifyInit.pod
@@ -52,11 +52,6 @@ The B interface to digital signatures should almost 
always be used in
 preference to the low level interfaces. This is because the code then becomes
 transparent to the algorithm used and much more flexible.
 
-Due to the link between message digests and public key algorithms the correct
-digest algorithm must be used with the correct public key type. A list of
-algorithms and associated public key algorithms appears in
-L.
-
 The call to EVP_VerifyFinal() internally finalizes a copy of the digest 
context.
 This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can be called
 later to digest and verify additional data.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-03-20 Thread paul . dale
The branch master has been updated
   via  a9dd51a800f1920aa7545dc2f4f831000a60af48 (commit)
  from  f6add6ac2c42df37d63b36dbef43e701875893d7 (commit)


- Log -
commit a9dd51a800f1920aa7545dc2f4f831000a60af48
Author: Eric Covener 
Date:   Sat Mar 17 14:00:15 2018 -0400

aix compat fixes for ocsp.c

WCOREDUMP and vsyslog are not portable

Reviewed-by: Paul Dale 
Reviewed-by: Matt Caswell 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5657)

---

Summary of changes:
 apps/ocsp.c | 10 --
 1 file changed, 8 insertions(+), 2 deletions(-)

diff --git a/apps/ocsp.c b/apps/ocsp.c
index 7581531..015f4d3 100644
--- a/apps/ocsp.c
+++ b/apps/ocsp.c
@@ -813,7 +813,10 @@ log_message(int level, const char *fmt, ...)
 va_start(ap, fmt);
 # ifdef OCSP_DAEMON
 if (multi) {
-vsyslog(level, fmt, ap);
+char buf[1024];
+if (vsnprintf(buf, sizeof(buf), fmt, ap) > 0) {
+syslog(level, "%s", buf);
+}
 if (level >= LOG_ERR)
 ERR_print_errors_cb(print_syslog, );
 }
@@ -928,7 +931,10 @@ static void spawn_loop(void)
 else if (WIFSIGNALED(status))
 syslog(LOG_WARNING, "child process: %ld, term signal 
%d%s",
(long)fpid, WTERMSIG(status),
-   WCOREDUMP(status) ? " (core dumped)" : "");
+#ifdef WCOREDUMP
+   WCOREDUMP(status) ? " (core dumped)" :
+#endif
+   "");
 sleep(1);
 }
 break;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl master.16634

2018-03-20 Thread AppVeyor


Build openssl master.16634 completed



Commit 0810b8a7e6 by Johannes Bauer on 3/20/2018 7:06 PM:

Add documentation


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2018-03-20 Thread Matt Caswell
The branch OpenSSL_1_1_0-stable has been updated
   via  418c784b114a37fe948517ea0a257bea905b3c37 (commit)
  from  c081558cc4d94f4cd1a4498ba43339d1bf05f5d7 (commit)


- Log -
commit 418c784b114a37fe948517ea0a257bea905b3c37
Author: Johannes Bauer 
Date:   Tue Mar 20 20:34:41 2018 +0100

Make pkeyutl a bit more user-friendly

Give meaningful error messages when the user incorrectly uses pkeyutl;
backport to OpenSSL_1_1_0-stable, cherrypicked from
f6add6ac2c42df37d63b36dbef43e701875893d7.

Reviewed-by: Rich Salz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/5699)

---

Summary of changes:
 apps/pkeyutl.c | 41 ++---
 1 file changed, 30 insertions(+), 11 deletions(-)

diff --git a/apps/pkeyutl.c b/apps/pkeyutl.c
index 962a389..db8f0e0 100644
--- a/apps/pkeyutl.c
+++ b/apps/pkeyutl.c
@@ -81,8 +81,7 @@ int pkeyutl_main(int argc, char **argv)
 char hexdump = 0, asn1parse = 0, rev = 0, *prog;
 unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL;
 OPTION_CHOICE o;
-int buf_inlen = 0, siglen = -1, keyform = FORMAT_PEM, peerform =
-FORMAT_PEM;
+int buf_inlen = 0, siglen = -1, keyform = FORMAT_PEM, peerform = 
FORMAT_PEM;
 int keysize = -1, pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY;
 int engine_impl = 0;
 int ret = 1, rv = -1;
@@ -193,10 +192,18 @@ int pkeyutl_main(int argc, char **argv)
 goto opthelp;
 
 if (kdfalg != NULL) {
-if (kdflen == 0)
+if (kdflen == 0) {
+BIO_printf(bio_err,
+   "%s: no KDF length given (-kdflen parameter).\n", prog);
 goto opthelp;
-} else if ((inkey == NULL)
-|| (peerkey != NULL && pkey_op != EVP_PKEY_OP_DERIVE)) {
+}
+} else if (inkey == NULL) {
+BIO_printf(bio_err,
+   "%s: no private key given (-inkey parameter).\n", prog);
+goto opthelp;
+} else if (peerkey != NULL && pkey_op != EVP_PKEY_OP_DERIVE) {
+BIO_printf(bio_err,
+   "%s: no peer key given (-peerkey parameter).\n", prog);
 goto opthelp;
 }
 ctx = init_ctx(kdfalg, , inkey, keyform, key_type,
@@ -219,7 +226,8 @@ int pkeyutl_main(int argc, char **argv)
 const char *opt = sk_OPENSSL_STRING_value(pkeyopts, i);
 
 if (pkey_ctrl_string(ctx, opt) <= 0) {
-BIO_printf(bio_err, "%s: Can't set parameter:\n", prog);
+BIO_printf(bio_err, "%s: Can't set parameter \"%s\":\n",
+   prog, opt);
 ERR_print_errors(bio_err);
 goto end;
 }
@@ -307,7 +315,11 @@ int pkeyutl_main(int argc, char **argv)
   buf_in, (size_t)buf_inlen);
 }
 if (rv <= 0) {
-BIO_puts(bio_err, "Public Key operation error\n");
+if (pkey_op != EVP_PKEY_OP_DERIVE) {
+BIO_puts(bio_err, "Public Key operation error\n");
+} else {
+BIO_puts(bio_err, "Key derivation failed\n");
+}
 ERR_print_errors(bio_err);
 goto end;
 }
@@ -383,8 +395,15 @@ static EVP_PKEY_CTX *init_ctx(const char *kdfalg, int 
*pkeysize,
 
 if (kdfalg) {
 int kdfnid = OBJ_sn2nid(kdfalg);
-if (kdfnid == NID_undef)
-goto end;
+
+if (kdfnid == NID_undef) {
+kdfnid = OBJ_ln2nid(kdfalg);
+if (kdfnid == NID_undef) {
+BIO_printf(bio_err, "The given KDF \"%s\" is unknown.\n",
+   kdfalg);
+goto end;
+}
+}
 ctx = EVP_PKEY_CTX_new_id(kdfnid, impl);
 } else {
 if (pkey == NULL)
@@ -435,10 +454,10 @@ static EVP_PKEY_CTX *init_ctx(const char *kdfalg, int 
*pkeysize,
 }
 
 static int setup_peer(EVP_PKEY_CTX *ctx, int peerform, const char *file,
-  ENGINE* e)
+  ENGINE *e)
 {
 EVP_PKEY *peer = NULL;
-ENGINE* engine = NULL;
+ENGINE *engine = NULL;
 int ret;
 
 if (peerform == FORMAT_ENGINE)
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.16633

2018-03-20 Thread AppVeyor



Build openssl master.16633 failed


Commit 21ce2b135c by Bernd Edlinger on 7/17/2017 2:46 PM:

Cleanup the s_time command.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.16629

2018-03-20 Thread AppVeyor



Build openssl master.16629 failed


Commit d7819ff417 by Arthur Williams on 3/20/2018 5:03 PM:

Add files via upload


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-03-20 Thread Matt Caswell
The branch master has been updated
   via  f6add6ac2c42df37d63b36dbef43e701875893d7 (commit)
  from  9e0d82f681f35ab0ae417b04e3e9096bd895d6b9 (commit)


- Log -
commit f6add6ac2c42df37d63b36dbef43e701875893d7
Author: Johannes Bauer 
Date:   Fri Jul 21 22:19:35 2017 +0200

Make pkeyutl a bit more user-friendly

Give meaningful error messages when the user incorrectly uses pkeyutl.

Reviewed-by: Viktor Dukhovni 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/3987)

---

Summary of changes:
 apps/pkeyutl.c | 35 +--
 1 file changed, 25 insertions(+), 10 deletions(-)

diff --git a/apps/pkeyutl.c b/apps/pkeyutl.c
index 77926de..911cc57 100644
--- a/apps/pkeyutl.c
+++ b/apps/pkeyutl.c
@@ -84,8 +84,7 @@ int pkeyutl_main(int argc, char **argv)
 char hexdump = 0, asn1parse = 0, rev = 0, *prog;
 unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL;
 OPTION_CHOICE o;
-int buf_inlen = 0, siglen = -1, keyform = FORMAT_PEM, peerform =
-FORMAT_PEM;
+int buf_inlen = 0, siglen = -1, keyform = FORMAT_PEM, peerform = 
FORMAT_PEM;
 int keysize = -1, pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY;
 int engine_impl = 0;
 int ret = 1, rv = -1;
@@ -200,10 +199,18 @@ int pkeyutl_main(int argc, char **argv)
 goto opthelp;
 
 if (kdfalg != NULL) {
-if (kdflen == 0)
+if (kdflen == 0) {
+BIO_printf(bio_err,
+   "%s: no KDF length given (-kdflen parameter).\n", prog);
 goto opthelp;
-} else if ((inkey == NULL)
-|| (peerkey != NULL && pkey_op != EVP_PKEY_OP_DERIVE)) {
+}
+} else if (inkey == NULL) {
+BIO_printf(bio_err,
+   "%s: no private key given (-inkey parameter).\n", prog);
+goto opthelp;
+} else if (peerkey != NULL && pkey_op != EVP_PKEY_OP_DERIVE) {
+BIO_printf(bio_err,
+   "%s: no peer key given (-peerkey parameter).\n", prog);
 goto opthelp;
 }
 ctx = init_ctx(kdfalg, , inkey, keyform, key_type,
@@ -226,7 +233,8 @@ int pkeyutl_main(int argc, char **argv)
 const char *opt = sk_OPENSSL_STRING_value(pkeyopts, i);
 
 if (pkey_ctrl_string(ctx, opt) <= 0) {
-BIO_printf(bio_err, "%s: Can't set parameter:\n", prog);
+BIO_printf(bio_err, "%s: Can't set parameter \"%s\":\n",
+   prog, opt);
 ERR_print_errors(bio_err);
 goto end;
 }
@@ -313,7 +321,11 @@ int pkeyutl_main(int argc, char **argv)
   buf_in, (size_t)buf_inlen);
 }
 if (rv <= 0) {
-BIO_puts(bio_err, "Public Key operation error\n");
+if (pkey_op != EVP_PKEY_OP_DERIVE) {
+BIO_puts(bio_err, "Public Key operation error\n");
+} else {
+BIO_puts(bio_err, "Key derivation failed\n");
+}
 ERR_print_errors(bio_err);
 goto end;
 }
@@ -393,8 +405,11 @@ static EVP_PKEY_CTX *init_ctx(const char *kdfalg, int 
*pkeysize,
 
 if (kdfnid == NID_undef) {
 kdfnid = OBJ_ln2nid(kdfalg);
-if (kdfnid == NID_undef)
+if (kdfnid == NID_undef) {
+BIO_printf(bio_err, "The given KDF \"%s\" is unknown.\n",
+   kdfalg);
 goto end;
+}
 }
 ctx = EVP_PKEY_CTX_new_id(kdfnid, impl);
 } else {
@@ -446,10 +461,10 @@ static EVP_PKEY_CTX *init_ctx(const char *kdfalg, int 
*pkeysize,
 }
 
 static int setup_peer(EVP_PKEY_CTX *ctx, int peerform, const char *file,
-  ENGINE* e)
+  ENGINE *e)
 {
 EVP_PKEY *peer = NULL;
-ENGINE* engine = NULL;
+ENGINE *engine = NULL;
 int ret;
 
 if (peerform == FORMAT_ENGINE)
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Passed: openssl/openssl#17326 (master - 9e0d82f)

2018-03-20 Thread Travis CI
Build Update for openssl/openssl
-

Build: #17326
Status: Passed

Duration: 34 minutes and 22 seconds
Commit: 9e0d82f (master)
Author: Matt Caswell
Message: Reduce the verbosity of test_store

The travis logs are going above 4Mb causing the builds to fail. One
test creates excessive output. This change reduces that output by approx
180k.

[extended tests]

Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5694)

View the changeset: 
https://github.com/openssl/openssl/compare/e46931108a1c...9e0d82f681f3

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/355947024?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications







This email was sent to openssl-commits@openssl.org 
(mailto:openssl-commits@openssl.org)
unsubscribe from this list 
(http://clicks.travis-ci.com/track/unsub.php?u=14313403=88c2ec9ef15945feadd9333cc10fc298.S4RW6Clmvqc3YBhWrklxhpwfgC8%3D=https%3A%2F%2Fmandrillapp.com%2Funsub%3Fmd_email%3Dopenssl-commits%2540openssl.org)_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#17325 (master - e469311)

2018-03-20 Thread Travis CI
Build Update for openssl/openssl
-

Build: #17325
Status: Errored

Duration: 46 minutes and 58 seconds
Commit: e469311 (master)
Author: Matt Caswell
Message: Fix the OCSP responder mode

Broken by commit 3e3c7c36.

Fixes #5681

Reviewed-by: Matthias St. Pierre 
(Merged from https://github.com/openssl/openssl/pull/5688)

View the changeset: 
https://github.com/openssl/openssl/compare/9fcfd0cd8606...e46931108a1c

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/355922815?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications







This email was sent to openssl-commits@openssl.org 
(mailto:openssl-commits@openssl.org)
unsubscribe from this list 
(http://clicks.travis-ci.com/track/unsub.php?u=14313403=25e98db2d5a741068177c0bb09a954c3.S4RW6Clmvqc3YBhWrklxhpwfgC8%3D=https%3A%2F%2Fmandrillapp.com%2Funsub%3Fmd_email%3Dopenssl-commits%2540openssl.org)_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-03-20 Thread Matt Caswell
The branch master has been updated
   via  9e0d82f681f35ab0ae417b04e3e9096bd895d6b9 (commit)
  from  e46931108a1c4ae35903e4b6b481b341545f3ea3 (commit)


- Log -
commit 9e0d82f681f35ab0ae417b04e3e9096bd895d6b9
Author: Matt Caswell 
Date:   Tue Mar 20 15:48:33 2018 +

Reduce the verbosity of test_store

The travis logs are going above 4Mb causing the builds to fail. One
test creates excessive output. This change reduces that output by approx
180k.

[extended tests]

Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5694)

---

Summary of changes:
 test/recipes/90-test_store.t | 71 
 1 file changed, 38 insertions(+), 33 deletions(-)

diff --git a/test/recipes/90-test_store.t b/test/recipes/90-test_store.t
index 2a6414b..d453512 100644
--- a/test/recipes/90-test_store.t
+++ b/test/recipes/90-test_store.t
@@ -89,84 +89,89 @@ indir "store_$$" => sub {
 foreach (@noexist_files) {
 my $file = srctop_file($_);
 
-ok(!run(app(["openssl", "storeutl", $file])));
-ok(!run(app(["openssl", "storeutl", to_abs_file($file)])));
+ok(!run(app(["openssl", "storeutl", "-noout", $file])));
+ok(!run(app(["openssl", "storeutl", "-noout",
+ to_abs_file($file)])));
 {
 local $ENV{MSYS2_ARG_CONV_EXCL} = "file:";
 
-ok(!run(app(["openssl", "storeutl", to_abs_file_uri($file)])));
+ok(!run(app(["openssl", "storeutl", "-noout",
+ to_abs_file_uri($file)])));
 }
 }
 foreach (@src_files) {
 my $file = srctop_file($_);
 
-ok(run(app(["openssl", "storeutl", $file])));
-ok(run(app(["openssl", "storeutl", to_abs_file($file)])));
+ok(run(app(["openssl", "storeutl", "-noout", $file])));
+ok(run(app(["openssl", "storeutl", "-noout", 
to_abs_file($file)])));
 {
 local $ENV{MSYS2_ARG_CONV_EXCL} = "file:";
 
-ok(run(app(["openssl", "storeutl", to_abs_file_uri($file)])));
-ok(run(app(["openssl", "storeutl",
+ok(run(app(["openssl", "storeutl", "-noout",
+to_abs_file_uri($file)])));
+ok(run(app(["openssl", "storeutl", "-noout",
 to_abs_file_uri($file, 0, "")])));
-ok(run(app(["openssl", "storeutl",
+ok(run(app(["openssl", "storeutl", "-noout",
 to_abs_file_uri($file, 0, "localhost")])));
-ok(!run(app(["openssl", "storeutl",
+ok(!run(app(["openssl", "storeutl", "-noout",
  to_abs_file_uri($file, 0, "dummy")])));
 }
 }
 foreach (@generated_files) {
-ok(run(app(["openssl", "storeutl", "-passin", "pass:password",
-$_])));
-ok(run(app(["openssl", "storeutl", "-passin", "pass:password",
-to_abs_file($_)])));
+ok(run(app(["openssl", "storeutl", "-noout", "-passin",
+"pass:password", $_])));
+ok(run(app(["openssl", "storeutl",  "-noout", "-passin",
+"pass:password", to_abs_file($_)])));
 
 {
 local $ENV{MSYS2_ARG_CONV_EXCL} = "file:";
 
-ok(run(app(["openssl", "storeutl", "-passin", "pass:password",
-to_abs_file_uri($_)])));
-ok(!run(app(["openssl", "storeutl", "-passin", "pass:password",
- to_file_uri($_)])));
+ok(run(app(["openssl", "storeutl", "-noout", "-passin",
+"pass:password", to_abs_file_uri($_)])));
+ok(!run(app(["openssl", "storeutl", "-noout", "-passin",
+ "pass:password", to_file_uri($_)])));
 }
 }
 foreach (values %generated_file_files) {
 local $ENV{MSYS2_ARG_CONV_EXCL} = "file:";
 
-ok(run(app(["openssl", "storeutl", $_])));
+ok(run(app(["openssl", "storeutl",  "-noout", $_])));
 }
 foreach (@noexist_file_files) {
 local $ENV{MSYS2_ARG_CONV_EXCL} = "file:";
 
-ok(!run(app(["openssl", "storeutl", $_])));
+ok(!run(app(["openssl", "storeutl",  "-noout", $_])));
 }
 {
 my $dir = srctop_dir("test", "certs");
 
-ok(run(app(["openssl", "storeutl", $dir])));
-ok(run(app(["openssl", "storeutl", to_abs_file($dir, 1)])));
+

[openssl-commits] Build failed: openssl OpenSSL_1_1_1-pre3.16623

2018-03-20 Thread AppVeyor



Build openssl OpenSSL_1_1_1-pre3.16623 failed


Commit be2df12a34 by Matt Caswell on 3/20/2018 1:13 PM:

Prepare for 1.1.1-pre3 release


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-03-20 Thread Matt Caswell
The branch master has been updated
   via  e46931108a1c4ae35903e4b6b481b341545f3ea3 (commit)
  from  9fcfd0cd860610d69268414b9671b5ed3274bfcd (commit)


- Log -
commit e46931108a1c4ae35903e4b6b481b341545f3ea3
Author: Matt Caswell 
Date:   Tue Mar 20 11:16:39 2018 +

Fix the OCSP responder mode

Broken by commit 3e3c7c36.

Fixes #5681

Reviewed-by: Matthias St. Pierre 
(Merged from https://github.com/openssl/openssl/pull/5688)

---

Summary of changes:
 apps/ocsp.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/apps/ocsp.c b/apps/ocsp.c
index ed2281a..7581531 100644
--- a/apps/ocsp.c
+++ b/apps/ocsp.c
@@ -551,7 +551,7 @@ int ocsp_main(int argc, char **argv)
 }
 
 if (ridx_filename != NULL
-&& (rkey != NULL || rsigner != NULL || rca_cert != NULL)) {
+&& (rkey == NULL || rsigner == NULL || rca_cert == NULL)) {
 BIO_printf(bio_err,
"Responder mode requires certificate, key, and CA.\n");
 goto end;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2018-03-20 Thread bernd . edlinger
The branch OpenSSL_1_0_2-stable has been updated
   via  c03db40dcfa8b9e0d71837fcc70d1af6b9994cf1 (commit)
  from  16a345e5c8b5c1166a5e214a8ee7ebf21d447fbe (commit)


- Log -
commit c03db40dcfa8b9e0d71837fcc70d1af6b9994cf1
Author: Bernd Edlinger 
Date:   Wed Feb 21 15:48:02 2018 +0100

Fix some bugs with the cfb1 bitsize handling

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/5450)

---

Summary of changes:
 crypto/evp/e_aes.c  | 2 ++
 crypto/evp/e_camellia.c | 2 ++
 crypto/evp/evp_locl.h   | 2 +-
 3 files changed, 5 insertions(+), 1 deletion(-)

diff --git a/crypto/evp/e_aes.c b/crypto/evp/e_aes.c
index b45b364..febfe32 100644
--- a/crypto/evp/e_aes.c
+++ b/crypto/evp/e_aes.c
@@ -1089,6 +1089,8 @@ static int aes_cfb1_cipher(EVP_CIPHER_CTX *ctx, unsigned 
char *out,
 CRYPTO_cfb128_1_encrypt(in, out, MAXBITCHUNK * 8, >ks,
 ctx->iv, >num, ctx->encrypt, dat->block);
 len -= MAXBITCHUNK;
+out += MAXBITCHUNK;
+in  += MAXBITCHUNK;
 }
 if (len)
 CRYPTO_cfb128_1_encrypt(in, out, len * 8, >ks,
diff --git a/crypto/evp/e_camellia.c b/crypto/evp/e_camellia.c
index f273f9c..ba8fd06 100644
--- a/crypto/evp/e_camellia.c
+++ b/crypto/evp/e_camellia.c
@@ -356,6 +356,8 @@ static int camellia_cfb1_cipher(EVP_CIPHER_CTX *ctx, 
unsigned char *out,
 CRYPTO_cfb128_1_encrypt(in, out, MAXBITCHUNK * 8, >ks,
 ctx->iv, >num, ctx->encrypt, dat->block);
 len -= MAXBITCHUNK;
+out += MAXBITCHUNK;
+in  += MAXBITCHUNK;
 }
 if (len)
 CRYPTO_cfb128_1_encrypt(in, out, len * 8, >ks,
diff --git a/crypto/evp/evp_locl.h b/crypto/evp/evp_locl.h
index 2bb709a..003b1e4 100644
--- a/crypto/evp/evp_locl.h
+++ b/crypto/evp/evp_locl.h
@@ -116,7 +116,7 @@ static int cname##_cfb##cbits##_cipher(EVP_CIPHER_CTX *ctx, 
unsigned char *out,
 if (inl=chunk)\
 {\
-cprefix##_cfb##cbits##_encrypt(in, out, (long)((cbits==1) && 
!(ctx->flags & EVP_CIPH_FLAG_LENGTH_BITS) ?inl*8:inl), &((kstruct 
*)ctx->cipher_data)->ksched, ctx->iv, >num, ctx->encrypt);\
+cprefix##_cfb##cbits##_encrypt(in, out, (long)((cbits==1) && 
!(ctx->flags & EVP_CIPH_FLAG_LENGTH_BITS) ?chunk*8:chunk), &((kstruct 
*)ctx->cipher_data)->ksched, ctx->iv, >num, ctx->encrypt);\
 inl-=chunk;\
 in +=chunk;\
 out+=chunk;\
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#17320 (master - 9fcfd0c)

2018-03-20 Thread Travis CI
Build Update for openssl/openssl
-

Build: #17320
Status: Errored

Duration: 38 minutes and 37 seconds
Commit: 9fcfd0c (master)
Author: Matt Caswell
Message: Prepare for 1.1.1-pre4-dev

Reviewed-by: Richard Levitte 

View the changeset: 
https://github.com/openssl/openssl/compare/b0edda11cbfe...9fcfd0cd8606

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/355865632?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications







This email was sent to openssl-commits@openssl.org 
(mailto:openssl-commits@openssl.org)
unsubscribe from this list 
(http://clicks.travis-ci.com/track/unsub.php?u=14313403=9c3b4ccf922444f188b024b9dec33f12.S4RW6Clmvqc3YBhWrklxhpwfgC8%3D=https%3A%2F%2Fmandrillapp.com%2Funsub%3Fmd_email%3Dopenssl-commits%2540openssl.org)_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#17321 (OpenSSL_1_1_1-pre3 - be2df12)

2018-03-20 Thread Travis CI
Build Update for openssl/openssl
-

Build: #17321
Status: Errored

Duration: 51 minutes and 16 seconds
Commit: be2df12 (OpenSSL_1_1_1-pre3)
Author: Matt Caswell
Message: Prepare for 1.1.1-pre3 release

Reviewed-by: Richard Levitte 

View the changeset: 
https://github.com/openssl/openssl/compare/OpenSSL_1_1_1-pre3

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/355865701?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications







This email was sent to openssl-commits@openssl.org 
(mailto:openssl-commits@openssl.org)
unsubscribe from this list 
(http://clicks.travis-ci.com/track/unsub.php?u=14313403=0a098ef8e4c443e2989aca7f27ee61e6.S4RW6Clmvqc3YBhWrklxhpwfgC8%3D=https%3A%2F%2Fmandrillapp.com%2Funsub%3Fmd_email%3Dopenssl-commits%2540openssl.org)_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [tools] master update

2018-03-20 Thread Matt Caswell
The branch master has been updated
   via  c24b4571fda7c7bfa526f91494d61f7bc94c4807 (commit)
  from  c4cba40bbb70057a10b858829a8d2c3289cb356d (commit)


- Log -
commit c24b4571fda7c7bfa526f91494d61f7bc94c4807
Author: Matt Caswell 
Date:   Tue Mar 20 14:28:56 2018 +

Tweak the release instructions

---

Summary of changes:
 release-tools/README.md | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/release-tools/README.md b/release-tools/README.md
index 7b3767e..acdceb3 100644
--- a/release-tools/README.md
+++ b/release-tools/README.md
@@ -170,12 +170,13 @@ Check the download page has updated properly:
 
 Check the notes look sensible at:
 
-https://www.openssl.org/news/news.html
+https://www.openssl.org/news/newslog.html
 
 Also check the notes here:
 
 https://www.openssl.org/news/openssl-1.0.2-notes.html
 https://www.openssl.org/news/openssl-1.1.0-notes.html
+https://www.openssl.org/news/openssl-1.1.1-notes.html
 
 ## Send the announcement mail
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#17317 (master - b0edda1)

2018-03-20 Thread Travis CI
Build Update for openssl/openssl
-

Build: #17317
Status: Errored

Duration: 35 minutes and 2 seconds
Commit: b0edda1 (master)
Author: Matt Caswell
Message: Update copyright year

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/5689)

View the changeset: 
https://github.com/openssl/openssl/compare/93bf19458468...b0edda11cbfe

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/355843580?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications







This email was sent to openssl-commits@openssl.org 
(mailto:openssl-commits@openssl.org)
unsubscribe from this list 
(http://clicks.travis-ci.com/track/unsub.php?u=14313403=cedaef63fea346b1b62cd4a7230e6473.S4RW6Clmvqc3YBhWrklxhpwfgC8%3D=https%3A%2F%2Fmandrillapp.com%2Funsub%3Fmd_email%3Dopenssl-commits%2540openssl.org)_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2018-03-20 Thread Matt Caswell
The branch master has been updated
   via  3519dc1324f73e6d902f46ccb3685cef98ef78c8 (commit)
  from  89540fdb4b0aecc7dcd8a544a97d6a41aec6384e (commit)


- Log -
commit 3519dc1324f73e6d902f46ccb3685cef98ef78c8
Author: Matt Caswell 
Date:   Tue Mar 20 13:53:52 2018 +

Updates for beta 1 release

---

Summary of changes:
 news/newsflash.txt | 1 +
 1 file changed, 1 insertion(+)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 9a4e602..b812aa0 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+20-Mar-2018: Beta 1 of OpenSSL 1.1.1 is now available: please download and 
test it
 01-Mar-2018: New Blog post: https://www.openssl.org/blog/blog/2018/03/01/last-license/;>Seeking Last 
Group of Contributors
 27-Feb-2018: Alpha 2 of OpenSSL 1.1.1 is now available: please download and 
test it
 13-Feb-2018: Alpha 1 of OpenSSL 1.1.1 is now available: please download and 
test it
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_1-pre3 create

2018-03-20 Thread Matt Caswell
The annotated tag OpenSSL_1_1_1-pre3 has been created
at  096f15afa75dec6afbab7673825044e11ea1df4e (tag)
   tagging  be2df12a349eae53805dd3cb19aa18e3d022acd7 (commit)
  replaces  OpenSSL_1_1_1-pre2
 tagged by  Matt Caswell
on  Tue Mar 20 13:13:56 2018 +

- Log -
OpenSSL 1.1.1-pre3 release tag
-BEGIN PGP SIGNATURE-

iQEuBAABCAAYBQJasQkUERxtYXR0QG9wZW5zc2wub3JnAAoJENnE0m0OYESRbgsH
/inDuVSpQA+9+jbMpTZ6xAEkdmqNquF2Wv73qS9naLazib8bKSgyBkBULDU4Cif9
JAhMam3NE2U90jFfxad3AYBC1u5xW5CbiHdXjqY3sfVtTyShdniqo/toqtDfmhwO
xZEwmD6CyBWIExQMeQSKiNMwSqLiDoNY4YlyHxtcy91PzjgWcT3kwWQfxeiuk3i3
cbtqDIye09EsT00ocIUfc6Dj/FAIU/HvPUDGIOcrD0JIJ8BJG/iiAm2sLTr1Ajck
oFnVTLDcbb56ouh0JH6Ea9W9rugSSYrFLwcz7I+7hF3vd+54YvQPRzuuHFvEn0Vk
IFg/afObA5m20nOyT6eJef4=
=dYWx
-END PGP SIGNATURE-

Alex Gaynor (7):
  Fixed a typo in a man page
  Fixed a typo in a man page
  Fix a typo in the s_client man page
  Corrected two typos in a man page
  Fixed several readability issues in DH_generate_parameters.pod
  Fixed a spelling mistake in ASN1_TIME_set.pod
  Fixed a handful of typos

Andy Polyakov (23):
  ec/asm/x25519-x86_64.pl: remove redundant carry chain.
  ec/curve448/curve448.c: fix undefined behaviour sanitizer failure.
  ec/curve448/f_generic.c: fix VC-WIN32 debug build failure.
  mem_sec.c: portability fixup.
  test/ctype_internal_test.c: portability fixup.
  Configurations/10-main.conf: add -fno-common back to darwin-ppc-cc.
  crypto/armcap.c: mask SHA512 hardware detection on iOS.
  Configurations/10-main.conf: amend out-dated comments.
  Configurations/windows-makefile.tmpl: simplify install-path "flavour"-ing.
  Configurations/50-win-onecore.conf: add Windows 10 OneCore targets.
  Configurations/unix-Makefile.tmpl: overhaul assembler make rules.
  Configurations/10-main.conf: VC- cleanups.
  mem_sec.c: portability fixup.
  store/loader_file.c: rename variables causing conflicts with Android NDK.
  ec/curve25519.c: resolve regression with Android NDK's arm64 gcc.
  Configurations/*.conf: overhaul Android targets.
  NOTES.WIN: classify targets to "native" and "hosted" and restructure.
  Configure: pass -no-integrated-as.
  Configurations/15-android.conf: refine clang support.
  MIPS assembly pack: default heuristic detection to little-endian.
  Configurations/15-android.conf: default to RC4_CHAR whenever possible.
  Add NOTES.ANDROID.
  Configurations/15-android.conf: detect clang by PATH, not by CC.

Ben Kaduk (2):
  Fix doc-nits
  Attempt to fix boringssl tests

Benjamin Kaduk (4):
  Do not set a nonzero default max_early_data
  Fix type error in PEM processing
  Reuse extension_is_relevant() in should_add_extension()
  Document more X509_STORE functions

Benjamin Saunders (1):
  Introduce SSL_CTX_set_stateless_cookie_{generate,verify}_cb

Bernd Edlinger (8):
  Fix a possible memory leak in engine_table_register
  Fix a bunch of gcc warnings in packettest.c
  Fix error handling in b2i_dss and b2i_rsa
  Fixed a crash in error handing of rand_drbg_new
  Fix a memory leak in n_ssl3_mac
  Fix a memory leak in tls1_mac
  Fix a crash in SSLfatal due to invalid enc_write_ctx
  Fix bio callback backward compatibility

Brad Spencer (1):
  Test the result of CMS_RecipientInfo_ktri_get0_algs() before using its 
output in rsa_cms_encrypt().

Bryan Donlan (1):
  Fix issues in ia32 RDRAND asm leading to reduced entropy

David Benjamin (1):
  Always use adr with __thumb2__.

David Makepeace (1):
  Fixed typo in description of EVP_CIPHER_meth_set_iv_length().

Dr. Matthias St. Pierre (7):
  bio_b64.c: prevent base64 filter BIO from decoding out-of-bound data
  BIO_s_mem.pod: fix indirection for out parameter **pp
  RAND_DRBG: add a function for setting the reseeding defaults
  Publish the RAND_DRBG API
  RAND_DRBG: add a function for setting the default DRBG type and flags
  Fix miscellaneous typos in docs and source
  Fix: drbgtest fails when tests are executed in random order

FdaSilvaYY (1):
  Duplicate entries ssl_handshake_tbl trace entries...

Ivan Filenko (1):
  Fix typo in ASN1_STRING_length doc

Jack Lloyd (3):
  Add SM2 signature and ECIES schemes
  Support SM2 ECIES scheme via EVP
  Handle evp_tests assumption of EVP_PKEY_FLAG_AUTOARGLEN

JeffZhao (1):
  engines/asm/e_padlock*: add support for Zhaoxin's x86 platform

Kurt Roeckx (9):
  Tell the ciphers which DRBG to use for generating random bytes.
  bnrand_range: Always call bnrand() with the correct flag
  Check the parent DRBG's strength
  Fix propotype to include the const qualifier
  Propagate the request for prediction resistance to the get entropy call
  Return error when trying to use prediction resistance
  Make the 

[openssl-commits] [openssl] master update

2018-03-20 Thread Matt Caswell
The branch master has been updated
   via  9fcfd0cd860610d69268414b9671b5ed3274bfcd (commit)
   via  be2df12a349eae53805dd3cb19aa18e3d022acd7 (commit)
  from  b0edda11cbfe91e8b99b09909a80a810d0143891 (commit)


- Log -
commit 9fcfd0cd860610d69268414b9671b5ed3274bfcd
Author: Matt Caswell 
Date:   Tue Mar 20 13:15:39 2018 +

Prepare for 1.1.1-pre4-dev

Reviewed-by: Richard Levitte 

commit be2df12a349eae53805dd3cb19aa18e3d022acd7
Author: Matt Caswell 
Date:   Tue Mar 20 13:13:56 2018 +

Prepare for 1.1.1-pre3 release

Reviewed-by: Richard Levitte 

---

Summary of changes:
 README | 2 +-
 include/openssl/opensslv.h | 4 ++--
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/README b/README
index 84913bc..b24d318 100644
--- a/README
+++ b/README
@@ -1,5 +1,5 @@
 
- OpenSSL 1.1.1-pre3-dev
+ OpenSSL 1.1.1-pre4-dev
 
  Copyright (c) 1998-2018 The OpenSSL Project
  Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
diff --git a/include/openssl/opensslv.h b/include/openssl/opensslv.h
index 32b6f4d..c3bd6af 100644
--- a/include/openssl/opensslv.h
+++ b/include/openssl/opensslv.h
@@ -39,8 +39,8 @@ extern "C" {
  * (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for
  *  major minor fix final patch/beta)
  */
-# define OPENSSL_VERSION_NUMBER  0x10101003L
-# define OPENSSL_VERSION_TEXT"OpenSSL 1.1.1-pre3-dev  xx XXX "
+# define OPENSSL_VERSION_NUMBER  0x10101004L
+# define OPENSSL_VERSION_TEXT"OpenSSL 1.1.1-pre4-dev  xx XXX "
 
 #define OPENSSL_MAKE_VERSION(maj,min,fix,patch) 
((0x1000L)+((maj&0xff)<<20)+((min&0xff)<<12)+((fix&0xff)<<4)+patch)
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] SUCCESSFUL build of OpenSSL branch master with options -d --strict-warnings no-ec

2018-03-20 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.4.0-116-generic #140-Ubuntu SMP Mon Feb 12 21:23:04 UTC 2018 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-ec

Commit log since last time:

59f124f Fix: drbgtest fails when tests are executed in random order
8f8be10 s_client, s_server: do generic SSL configuration first, specialization 
after
27df459 Fix no-sm3/no-sm2 (with strict-warnings)
9802002 Fix no-sm3 (and no-sm2)
3830c19 Don't generate buildtest_*err.c
7d7f683 Enhance ssltestlib's create_ssl_ctx_pair to take min and max proto 
version
2e2faa8 In TLSProxy::Proxy, specify TLSv1.3 as maximum allowable protocol
43110de Support "-min_protocol" and "-max_protocol" in s_server and s_client
dad8c26 Fix no-ec
1bf2cc2 Fix no-sm2
1a54618 Fix no-posix-io compile failure
4bfb96f Place ticket keys into secure memory
c2b290c Fix no-psk
69e2b8d Revise and cleanup; use strict,warnings
8a5ed9d Apply system_default configuration on SSL_CTX_new().
440bce8 Add a multithread rand test
16cfc2c Don't use a ssl specific DRBG anymore
7caf122 Make the public and private DRBG thread local
4e66475 Handle evp_tests assumption of EVP_PKEY_FLAG_AUTOARGLEN
dceb99a Support SM2 ECIES scheme via EVP
3d328a4 Add SM2 signature and ECIES schemes
df3a155 Configurations/15-android.conf: detect clang by PATH, not by CC.
f39276f Add NOTES.ANDROID.
87ba25e Configurations/15-android.conf: default to RC4_CHAR whenever possible.
9d3cab4 MIPS assembly pack: default heuristic detection to little-endian.
f41c867 Configurations/15-android.conf: refine clang support.
6d5e74f Configure: pass -no-integrated-as.
c911e5d Fix bio callback backward compatibility
d4ef4fb Fix a crash in SSLfatal due to invalid enc_write_ctx
df6d51e Fix no-cmac
66a925e Fix no-ec
3ec9e4e Add a CHANGES entry to mention the replay protection capabilities
d2d67a4 Document the replay protection capabilities
78fb537 Add a test for 0RTT replay protection
66d7de1 Add an anti-replay mechanism
f023ba2 Don't update the session cache when processing a client certificate in 
TLSv1.3
32305f8 Always call the new_session_cb when issuing a NewSessionTicket in 
TLSv1.3
51cf8ba engines/asm/e_padlock*: add support for Zhaoxin's x86 platform
ec4c389 Clarify a couple of details around "make variables"
00c8f1b Stop test/shlibloadtest.c from failing in a regression test
b4d46ad Add a simple method to run regression tests
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-03-20 Thread Matt Caswell
The branch master has been updated
   via  b0edda11cbfe91e8b99b09909a80a810d0143891 (commit)
  from  93bf19458468d0fb1d4a4f88d672c584f0cf3d45 (commit)


- Log -
commit b0edda11cbfe91e8b99b09909a80a810d0143891
Author: Matt Caswell 
Date:   Tue Mar 20 13:00:17 2018 +

Update copyright year

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/5689)

---

Summary of changes:
 apps/CA.pl.in| 2 +-
 apps/tsget.in| 2 +-
 config   | 2 +-
 crypto/aes/asm/aes-armv4.pl  | 2 +-
 crypto/aes/asm/aes-mips.pl   | 2 +-
 crypto/aes/asm/bsaes-armv7.pl| 2 +-
 crypto/asn1/standard_methods.h   | 2 +-
 crypto/bn/asm/ppc.pl | 2 +-
 crypto/bn/bn_rand.c  | 2 +-
 crypto/ec/ec_curve.c | 2 +-
 crypto/ec/ec_pmeth.c | 2 +-
 crypto/ec/ecx_meth.c | 2 +-
 crypto/engine/eng_table.c| 2 +-
 crypto/evp/bio_b64.c | 2 +-
 crypto/evp/e_aria.c  | 2 +-
 crypto/evp/evp_enc.c | 2 +-
 crypto/evp/p_lib.c   | 2 +-
 crypto/evp/pmeth_lib.c   | 2 +-
 crypto/hmac/hm_ameth.c   | 2 +-
 crypto/include/internal/asn1_int.h   | 2 +-
 crypto/include/internal/cryptlib_int.h   | 2 +-
 crypto/include/internal/rand_int.h   | 2 +-
 crypto/kdf/tls1_prf.c| 2 +-
 crypto/objects/obj_dat.c | 2 +-
 crypto/pem/pem_lib.c | 2 +-
 crypto/pem/pvkfmt.c  | 2 +-
 crypto/pkcs7/pk7_doit.c  | 2 +-
 crypto/poly1305/poly1305_ameth.c | 2 +-
 crypto/rand/rand_vms.c   | 2 +-
 crypto/rc4/asm/rc4-c64xplus.pl   | 2 +-
 crypto/rsa/rsa_ameth.c   | 2 +-
 crypto/sha/asm/keccak1600-armv4.pl   | 2 +-
 crypto/sha/asm/keccak1600-avx2.pl| 2 +-
 crypto/sha/asm/keccak1600-avx512.pl  | 2 +-
 crypto/sha/asm/keccak1600-avx512vl.pl| 2 +-
 crypto/sha/asm/keccak1600-c64x.pl| 2 +-
 crypto/sha/asm/sha1-mips.pl  | 2 +-
 crypto/sha/asm/sha512-mips.pl| 2 +-
 crypto/siphash/siphash_ameth.c   | 2 +-
 crypto/sm2/sm2_crypt.c   | 2 +-
 crypto/sm2/sm2_err.c | 2 +-
 crypto/sm2/sm2_sign.c| 2 +-
 crypto/sm2/sm2_za.c  | 2 +-
 crypto/ts/ts_rsp_sign.c  | 2 +-
 crypto/x509/x509type.c   | 2 +-
 doc/man1/ca.pod  | 2 +-
 doc/man1/ciphers.pod | 2 +-
 doc/man1/genpkey.pod | 2 +-
 doc/man1/openssl.pod | 2 +-
 doc/man1/pkeyutl.pod | 2 +-
 doc/man1/s_server.pod| 2 +-
 doc/man1/s_time.pod  | 2 +-
 doc/man1/speed.pod   | 2 +-
 doc/man3/ASN1_TIME_set.pod   | 2 +-
 doc/man3/DH_generate_parameters.pod  | 2 +-
 doc/man3/EVP_CIPHER_meth_new.pod | 2 +-
 doc/man3/EVP_PKEY_ASN1_METHOD.pod| 2 +-
 doc/man3/EVP_PKEY_CTX_ctrl.pod   | 2 +-
 doc/man3/EVP_PKEY_new.pod| 2 +-
 doc/man3/EVP_md5.pod | 2 +-
 doc/man3/OSSL_STORE_open.pod | 2 +-
 doc/man3/SSL_CTX_set_cipher_list.pod | 2 +-
 doc/man3/SSL_CTX_set_psk_client_callback.pod | 2 +-
 doc/man3/SSL_CTX_set_session_ticket_cb.pod   | 2 +-
 doc/man3/SSL_CTX_set_tlsext_use_srtp.pod | 2 +-
 doc/man3/SSL_CTX_use_certificate.pod | 2 +-
 doc/man3/SSL_CTX_use_psk_identity_hint.pod   | 2 +-
 doc/man3/SSL_read_early_data.pod | 2 +-
 doc/man3/UI_STRING.pod   | 2 +-
 doc/man3/X509_STORE_add_cert.pod | 2 +-
 doc/man3/d2i_PrivateKey.pod  | 2 +-
 doc/man5/config.pod  | 2 +-
 engines/asm/e_padlock-x86.pl | 2 +-
 engines/asm/e_padlock-x86_64.pl  | 2 +-
 include/openssl/err.h| 2 +-
 include/openssl/sm2.h| 2 +-
 include/openssl/sm2err.h | 2 +-
 ssl/record/record_locl.h | 2 +-
 ssl/record/ssl3_record_tls13.c   | 2 +-
 ssl/s3_enc.c | 2 +-
 ssl/ssl_asn1.c   | 2 +-
 ssl/ssl_cert_table.h | 2 +-
 ssl/ssl_mcnf.c   | 

[openssl-commits] SUCCESSFUL build of OpenSSL branch master with options -d --strict-warnings no-cmac

2018-03-20 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.4.0-116-generic #140-Ubuntu SMP Mon Feb 12 21:23:04 UTC 2018 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-cmac

Commit log since last time:

59f124f Fix: drbgtest fails when tests are executed in random order
8f8be10 s_client, s_server: do generic SSL configuration first, specialization 
after
27df459 Fix no-sm3/no-sm2 (with strict-warnings)
9802002 Fix no-sm3 (and no-sm2)
3830c19 Don't generate buildtest_*err.c
7d7f683 Enhance ssltestlib's create_ssl_ctx_pair to take min and max proto 
version
2e2faa8 In TLSProxy::Proxy, specify TLSv1.3 as maximum allowable protocol
43110de Support "-min_protocol" and "-max_protocol" in s_server and s_client
dad8c26 Fix no-ec
1bf2cc2 Fix no-sm2
1a54618 Fix no-posix-io compile failure
4bfb96f Place ticket keys into secure memory
c2b290c Fix no-psk
69e2b8d Revise and cleanup; use strict,warnings
8a5ed9d Apply system_default configuration on SSL_CTX_new().
440bce8 Add a multithread rand test
16cfc2c Don't use a ssl specific DRBG anymore
7caf122 Make the public and private DRBG thread local
4e66475 Handle evp_tests assumption of EVP_PKEY_FLAG_AUTOARGLEN
dceb99a Support SM2 ECIES scheme via EVP
3d328a4 Add SM2 signature and ECIES schemes
df3a155 Configurations/15-android.conf: detect clang by PATH, not by CC.
f39276f Add NOTES.ANDROID.
87ba25e Configurations/15-android.conf: default to RC4_CHAR whenever possible.
9d3cab4 MIPS assembly pack: default heuristic detection to little-endian.
f41c867 Configurations/15-android.conf: refine clang support.
6d5e74f Configure: pass -no-integrated-as.
c911e5d Fix bio callback backward compatibility
d4ef4fb Fix a crash in SSLfatal due to invalid enc_write_ctx
df6d51e Fix no-cmac
66a925e Fix no-ec
3ec9e4e Add a CHANGES entry to mention the replay protection capabilities
d2d67a4 Document the replay protection capabilities
78fb537 Add a test for 0RTT replay protection
66d7de1 Add an anti-replay mechanism
f023ba2 Don't update the session cache when processing a client certificate in 
TLSv1.3
32305f8 Always call the new_session_cb when issuing a NewSessionTicket in 
TLSv1.3
51cf8ba engines/asm/e_padlock*: add support for Zhaoxin's x86 platform
ec4c389 Clarify a couple of details around "make variables"
00c8f1b Stop test/shlibloadtest.c from failing in a regression test
b4d46ad Add a simple method to run regression tests
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#17314 (master - 93bf194)

2018-03-20 Thread Travis CI
Build Update for openssl/openssl
-

Build: #17314
Status: Errored

Duration: 32 minutes and 56 seconds
Commit: 93bf194 (master)
Author: Richard Levitte
Message: crypto/rand/rand_vms.c: include "internal/rand_int.h"

Without it, the RAND_POOL typedef is missing

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/5685)

View the changeset: 
https://github.com/openssl/openssl/compare/59f124f90f52...93bf19458468

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/355760030?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications







This email was sent to openssl-commits@openssl.org 
(mailto:openssl-commits@openssl.org)
unsubscribe from this list 
(http://clicks.travis-ci.com/track/unsub.php?u=14313403=39bfe933a4154efbb505bf3bffc2151f.S4RW6Clmvqc3YBhWrklxhpwfgC8%3D=https%3A%2F%2Fmandrillapp.com%2Funsub%3Fmd_email%3Dopenssl-commits%2540openssl.org)_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Jenkins build is back to normal : master_noec #442

2018-03-20 Thread osslsanity
See 


_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-03-20 Thread Matt Caswell
The branch master has been updated
   via  93bf19458468d0fb1d4a4f88d672c584f0cf3d45 (commit)
  from  59f124f90f52395c240fcd2f387a91234b0d25be (commit)


- Log -
commit 93bf19458468d0fb1d4a4f88d672c584f0cf3d45
Author: Richard Levitte 
Date:   Tue Mar 20 08:31:10 2018 +0100

crypto/rand/rand_vms.c: include "internal/rand_int.h"

Without it, the RAND_POOL typedef is missing

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/5685)

---

Summary of changes:
 crypto/rand/rand_vms.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/crypto/rand/rand_vms.c b/crypto/rand/rand_vms.c
index eb68c8a..ff9e1aa 100644
--- a/crypto/rand/rand_vms.c
+++ b/crypto/rand/rand_vms.c
@@ -11,6 +11,7 @@
 
 #if defined(OPENSSL_SYS_VMS)
 # include 
+# include "internal/rand_int.h"
 # include "rand_lcl.h"
 # include 
 # include 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] SUCCESSFUL build of OpenSSL branch master with options -d --strict-warnings

2018-03-20 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.4.0-116-generic #140-Ubuntu SMP Mon Feb 12 21:23:04 UTC 2018 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings

Commit log since last time:

59f124f Fix: drbgtest fails when tests are executed in random order
8f8be10 s_client, s_server: do generic SSL configuration first, specialization 
after
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits