Errored: openssl/openssl#37486 (master - 4343a41)

2020-09-15 Thread Travis CI
Build Update for openssl/openssl
-

Build: #37486
Status: Errored

Duration: 1 hr, 17 mins, and 2 secs
Commit: 4343a41 (master)
Author: Shane Lontis
Message: Add self tests for rsa encryption

SP800-56br2 requires seperate KAT's (fips self tests) to be tested for both 
encryption and decryption
using the RSA primitive (i.e. no padding). This is specified in FIPS140-2 IG D.9

A copy of the methods EVP_PKEY_encrypt_init(), EVP_PKEY_encrypt(), 
EVP_PKEY_decrypt_init(), EVP_PKEY_decrypt()
are now in the fips module.

Removed the #ifdef FIPS_MODULE in evp_pkey_ctx_free_old_ops().

Added corruption test

Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/12835)

View the changeset: 
https://github.com/openssl/openssl/compare/a268ed3acf16...4343a4187d28

View the full build log and details: 
https://travis-ci.com/github/openssl/openssl/builds/184533598?utm_medium=notification_source=email


--

You can unsubscribe from build emails from the openssl/openssl repository going 
to 
https://travis-ci.com/account/preferences/unsubscribe?repository=13885459_medium=notification_source=email.
Or unsubscribe from *all* email updating your settings at 
https://travis-ci.com/account/preferences/unsubscribe?utm_medium=notification_source=email.
Or configure specific recipients for build notifications in your .travis.yml 
file. See https://docs.travis-ci.com/user/notifications.



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-cms

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-cms

Commit log since last time:

a268ed3acf free memory use on error in cert verify
871881856f generate_cookie_callback: free temporary memory on an error path
30f3b4e1c1 PKCS5 PBE: free allocations on unlikely / impossible failure path
e2d66c0d00 PKCS#8: free data on error path in newpass_bag
48ff651ecc DTLS: free allocated memory on error paths
4f14a378f8 prov/drbg: cleanup some RAND_DRBG leftovers
1d30b0a4ad prov/drbg: fix misspelling of '#ifdef FIPS_MODULE'

Build log ended with (last 100 lines):

clang  -Iinclude -Iapps/include -I../openssl/include -I../openssl/apps/include  
-pthread -m64 -Wa,--noexecstack -Qunused-arguments -Wall -O0 -g -DDEBUG_UNUSED 
-DPEDANTIC -pedantic -Wno-long-long -Wall -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wswitch -Wsign-compare -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Wmissing-prototypes -Wstrict-prototypes 
-Wno-unknown-warning-option -Wswitch-default -Wno-parentheses-equality 
-Wno-language-extension-token -Wno-extended-offsetof 
-Wconditional-uninitialized -Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -DOPENSSL_BUILDING_OPENSSL  -MMD -MF 
test/ssl_ctx_test-bin-ssl_ctx_test.d.tmp -MT 
test/ssl_ctx_test-bin-ssl_ctx_test.o -c -o test/ssl_ctx_test-bin-ssl_ctx_test.o 
../openssl/test/ssl_ctx_test.c
clang  -I. -Iinclude -I../openssl -I../openssl/include -Iinclude -Iapps/include 
-I../openssl/include -I../openssl/apps/include  -pthread -m64 -Wa,--noexecstack 
-Qunused-arguments -Wall -O0 -g -DDEBUG_UNUSED -DPEDANTIC -pedantic 
-Wno-long-long -Wall -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wswitch -Wsign-compare -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Wmissing-prototypes -Wstrict-prototypes 
-Wno-unknown-warning-option -Wswitch-default -Wno-parentheses-equality 
-Wno-language-extension-token -Wno-extended-offsetof 
-Wconditional-uninitialized -Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -DOPENSSL_BUILDING_OPENSSL  -MMD -MF 
test/ssl_test-bin-handshake_helper.d.tmp -MT 
test/ssl_test-bin-handshake_helper.o -c -o test/ssl_test-bin-handshake_helper.o 
../openssl/test/handshake_helper.c
clang  -Iinclude -Iapps/include -I../openssl/include -I../openssl/apps/include  
-pthread -m64 -Wa,--noexecstack -Qunused-arguments -Wall -O0 -g -DDEBUG_UNUSED 
-DPEDANTIC -pedantic -Wno-long-long -Wall -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wswitch -Wsign-compare -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Wmissing-prototypes -Wstrict-prototypes 
-Wno-unknown-warning-option -Wswitch-default -Wno-parentheses-equality 
-Wno-language-extension-token -Wno-extended-offsetof 
-Wconditional-uninitialized -Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -DOPENSSL_BUILDING_OPENSSL  -MMD -MF 
test/ssl_test-bin-ssl_test.d.tmp -MT test/ssl_test-bin-ssl_test.o -c -o 
test/ssl_test-bin-ssl_test.o ../openssl/test/ssl_test.c
clang  -Iinclude -I../openssl/include -Iinclude -Iapps/include 
-I../openssl/include -I../openssl/apps/include  -pthread -m64 -Wa,--noexecstack 
-Qunused-arguments -Wall -O0 -g -DDEBUG_UNUSED -DPEDANTIC -pedantic 
-Wno-long-long -Wall -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wswitch -Wsign-compare -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Wmissing-prototypes -Wstrict-prototypes 
-Wno-unknown-warning-option -Wswitch-default -Wno-parentheses-equality 
-Wno-language-extension-token -Wno-extended-offsetof 
-Wconditional-uninitialized -Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -DOPENSSL_BUILDING_OPENSSL  -MMD -MF 
test/ssl_test-bin-ssl_test_ctx.d.tmp -MT test/ssl_test-bin-ssl_test_ctx.o -c -o 
test/ssl_test-bin-ssl_test_ctx.o ../openssl/test/ssl_test_ctx.c
clang  -Iinclude -I../openssl/include -Iinclude -Iapps/include 
-I../openssl/include -I../openssl/apps/include  -pthread -m64 -Wa,--noexecstack 
-Qunused-arguments -Wall -O0 -g -DDEBUG_UNUSED -DPEDANTIC -pedantic 
-Wno-long-long -Wall -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wswitch -Wsign-compare -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Wmissing-prototypes -Wstrict-prototypes 
-Wno-unknown-warning-option -Wswitch-default -Wno-parentheses-equality 
-Wno-language-extension-token -Wno-extended-offsetof 
-Wconditional-uninitialized -Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -DOPENSSL_BUILDING_OPENSSL  -MMD -MF 
test/ssl_test_ctx_test-bin-ssl_test_ctx.d.tmp -MT 
test/ssl_test_ctx_test-bin-ssl_test_ctx.o -c -o 
test/ssl_test_ctx_test-bin-ssl_test_ctx.o ../openssl/test/ssl_test_ctx.c
clang  -Iinclude -Iapps/include -I../openssl/include -I../openssl/apps/include  
-pthread -m64 -Wa,--noexecstack 

[openssl] master update

2020-09-15 Thread shane . lontis
The branch master has been updated
   via  4343a4187d28d719006642a610afea6e186832bf (commit)
  from  a268ed3acf16948c0e19ba67b2b3f89b3312a416 (commit)


- Log -
commit 4343a4187d28d719006642a610afea6e186832bf
Author: Shane Lontis 
Date:   Wed Sep 16 14:10:23 2020 +1000

Add self tests for rsa encryption

SP800-56br2 requires seperate KAT's (fips self tests) to be tested for both 
encryption and decryption
using the RSA primitive (i.e. no padding). This is specified in FIPS140-2 
IG D.9

A copy of the methods EVP_PKEY_encrypt_init(), EVP_PKEY_encrypt(), 
EVP_PKEY_decrypt_init(), EVP_PKEY_decrypt()
are now in the fips module.

Removed the #ifdef FIPS_MODULE in evp_pkey_ctx_free_old_ops().

Added corruption test

Reviewed-by: Tomas Mraz 
(Merged from https://github.com/openssl/openssl/pull/12835)

---

Summary of changes:
 crypto/evp/{pmeth_fn.c => asymcipher.c} |   0
 crypto/evp/build.info   |   3 +-
 crypto/evp/pmeth_lib.c  |   6 +-
 doc/man7/OSSL_PROVIDER-FIPS.pod |  10 +++
 include/openssl/self_test.h |   3 +
 providers/fips/self_test_data.inc   | 106 +++-
 providers/fips/self_test_kats.c | 102 +-
 test/recipes/03-test_fipsinstall.t  |  12 +++-
 8 files changed, 230 insertions(+), 12 deletions(-)
 rename crypto/evp/{pmeth_fn.c => asymcipher.c} (100%)

diff --git a/crypto/evp/pmeth_fn.c b/crypto/evp/asymcipher.c
similarity index 100%
rename from crypto/evp/pmeth_fn.c
rename to crypto/evp/asymcipher.c
diff --git a/crypto/evp/build.info b/crypto/evp/build.info
index 4f155f1393..36fac11683 100644
--- a/crypto/evp/build.info
+++ b/crypto/evp/build.info
@@ -2,7 +2,7 @@ LIBS=../../libcrypto
 $COMMON=digest.c evp_enc.c evp_lib.c evp_fetch.c cmeth_lib.c evp_utils.c \
 mac_lib.c mac_meth.c keymgmt_meth.c keymgmt_lib.c kdf_lib.c kdf_meth.c 
\
 m_sigver.c pmeth_lib.c signature.c p_lib.c pmeth_gn.c exchange.c \
-pmeth_check.c evp_rand.c
+pmeth_check.c evp_rand.c asymcipher.c
 
 SOURCE[../../libcrypto]=$COMMON\
 encode.c evp_key.c evp_cnf.c \
@@ -13,7 +13,6 @@ SOURCE[../../libcrypto]=$COMMON\
 bio_md.c bio_b64.c bio_enc.c evp_err.c e_null.c \
 c_allc.c c_alld.c bio_ok.c \
 evp_pkey.c evp_pbe.c p5_crpt.c p5_crpt2.c pbe_scrypt.c \
-pmeth_fn.c\
 e_aes_cbc_hmac_sha1.c e_aes_cbc_hmac_sha256.c e_rc4_hmac_md5.c \
 e_chacha20_poly1305.c \
 legacy_sha.c
diff --git a/crypto/evp/pmeth_lib.c b/crypto/evp/pmeth_lib.c
index 12f09ed79b..38f42eca7d 100644
--- a/crypto/evp/pmeth_lib.c
+++ b/crypto/evp/pmeth_lib.c
@@ -396,10 +396,7 @@ void evp_pkey_ctx_free_old_ops(EVP_PKEY_CTX *ctx)
 EVP_KEYEXCH_free(ctx->op.kex.exchange);
 ctx->op.kex.exchprovctx = NULL;
 ctx->op.kex.exchange = NULL;
-}
-/* TODO(3.0): add dependancies and uncomment this when available for fips mode 
*/
-#ifndef FIPS_MODULE
-else if (EVP_PKEY_CTX_IS_ASYM_CIPHER_OP(ctx)) {
+} else if (EVP_PKEY_CTX_IS_ASYM_CIPHER_OP(ctx)) {
 if (ctx->op.ciph.ciphprovctx != NULL && ctx->op.ciph.cipher != NULL)
 ctx->op.ciph.cipher->freectx(ctx->op.ciph.ciphprovctx);
 EVP_ASYM_CIPHER_free(ctx->op.ciph.cipher);
@@ -409,7 +406,6 @@ void evp_pkey_ctx_free_old_ops(EVP_PKEY_CTX *ctx)
 if (ctx->op.keymgmt.genctx != NULL && ctx->keymgmt != NULL)
 evp_keymgmt_gen_cleanup(ctx->keymgmt, ctx->op.keymgmt.genctx);
 }
-#endif
 }
 
 void EVP_PKEY_CTX_free(EVP_PKEY_CTX *ctx)
diff --git a/doc/man7/OSSL_PROVIDER-FIPS.pod b/doc/man7/OSSL_PROVIDER-FIPS.pod
index d404716b23..2ae999e023 100644
--- a/doc/man7/OSSL_PROVIDER-FIPS.pod
+++ b/doc/man7/OSSL_PROVIDER-FIPS.pod
@@ -184,6 +184,10 @@ file after successfully running the self tests during 
installation.
 
 Known answer test for a symmetric cipher.
 
+=item "KAT_AsymmetricCipher" (B)
+
+Known answer test for a asymmetric cipher.
+
 =item "KAT_Digest" (B)
 
 Known answer test for a digest.
@@ -237,6 +241,12 @@ The FIPS module passes the following descriptions(s) to 
OSSL_SELF_TEST_onbegin()
 
 Key generation tests used with the "Pairwise_Consistency_Test" type.
 
+=item "RSA_Encrypt" (B)
+
+=item "RSA_Decrypt" (B)
+
+"KAT_AsymmetricCipher" uses this to indicate an encrypt or decrypt KAT.
+
 =item "AES_GCM" (B)
 
 =item "TDES" (B)
diff --git a/include/openssl/self_test.h b/include/openssl/self_test.h
index aa153581fa..4d99aaa4e3 100644
--- a/include/openssl/self_test.h
+++ b/include/openssl/self_test.h
@@ -30,6 +30,7 @@ extern "C" {
 # define OSSL_SELF_TEST_TYPE_CRNG   "Continuous_RNG_Test"
 # define OSSL_SELF_TEST_TYPE_PCT"Pairwise_Consistency_Test"
 # define OSSL_SELF_TEST_TYPE_KAT_CIPHER "KAT_Cipher"
+# define 

Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-autoerrinit

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-autoerrinit

Commit log since last time:

a268ed3acf free memory use on error in cert verify
871881856f generate_cookie_callback: free temporary memory on an error path
30f3b4e1c1 PKCS5 PBE: free allocations on unlikely / impossible failure path
e2d66c0d00 PKCS#8: free data on error path in newpass_bag
48ff651ecc DTLS: free allocated memory on error paths
4f14a378f8 prov/drbg: cleanup some RAND_DRBG leftovers
1d30b0a4ad prov/drbg: fix misspelling of '#ifdef FIPS_MODULE'

Build log ended with (last 100 lines):

65-test_cmp_vfy.t .. ok
66-test_ossl_store.t ... ok
70-test_asyncio.t .. ok
70-test_bad_dtls.t . ok
70-test_clienthello.t .. ok
70-test_comp.t . ok
70-test_key_share.t  ok
70-test_packet.t ... ok
70-test_recordlen.t  ok
70-test_renegotiation.t  ok
70-test_servername.t ... ok
70-test_sslcbcpadding.t  ok
70-test_sslcertstatus.t  ok
70-test_sslextension.t . ok
70-test_sslmessages.t .. ok
70-test_sslrecords.t ... ok
70-test_sslsessiontick.t ... ok
70-test_sslsigalgs.t ... ok
70-test_sslsignature.t . ok
70-test_sslskewith0p.t . ok
70-test_sslversions.t .. ok
70-test_sslvertol.t  ok
70-test_tls13alerts.t .. ok
70-test_tls13cookie.t .. ok
70-test_tls13downgrade.t ... ok
70-test_tls13hrr.t . ok
70-test_tls13kexmodes.t  ok
70-test_tls13messages.t  ok
70-test_tls13psk.t . ok
70-test_tlsextms.t . ok
70-test_verify_extra.t . ok
70-test_wpacket.t .. ok
71-test_ssl_ctx.t .. ok
80-test_ca.t ... ok
80-test_cipherbytes.t .. ok
80-test_cipherlist.t ... ok
80-test_ciphername.t ... ok

# 80-test_cms.t .. ok
80-test_cmsapi.t ... ok
80-test_ct.t ... ok
80-test_dane.t . ok
80-test_dtls.t . ok
80-test_dtls_mtu.t . ok
80-test_dtlsv1listen.t . ok
80-test_http.t . ok
80-test_ocsp.t . ok
80-test_pkcs12.t ... ok
80-test_ssl_new.t .. ok
80-test_ssl_old.t .. ok
80-test_ssl_test_ctx.t . ok
80-test_sslcorrupt.t ... ok
80-test_tsa.t .. ok
80-test_x509aux.t .. ok

# 81-test_cmp_cli.t .. ok
90-test_asn1_time.t  ok
90-test_async.t  ok
90-test_bio_enc.t .. ok
90-test_bio_memleak.t .. ok
90-test_constant_time.t  ok
90-test_fatalerr.t . ok
90-test_gmdiff.t ... ok
90-test_gost.t . ok
90-test_ige.t .. ok
90-test_includes.t . ok
90-test_memleak.t .. ok
90-test_overhead.t . ok
90-test_secmem.t ... ok
90-test_shlibload.t  ok
90-test_srp.t .. ok
90-test_sslapi.t ... ok
90-test_sslbuffers.t ... ok
90-test_store.t  ok
90-test_sysdefault.t ... ok
90-test_threads.t .. ok
90-test_time_offset.t .. ok
90-test_tls13ccs.t . ok
90-test_tls13encryption.t .. ok
90-test_tls13secrets.t . ok
90-test_v3name.t ... ok
95-test_external_boringssl.t ... skipped: No external tests in this 
configuration
95-test_external_gost_engine.t . skipped: No external tests in this 
configuration
95-test_external_krb5.t  skipped: No external tests in this 
configuration
95-test_external_pyca.t  skipped: No external tests in this 
configuration
99-test_ecstress.t . ok
99-test_fuzz.t . ok

Test Summary Report
---
04-test_err.t(Wstat: 256 Tests: 1 Failed: 1)
  Failed test:  1
  Non-zero exit status: 1
Files=212, Tests=3434, 723 wallclock secs (14.31 usr  1.46 sys + 652.47 cusr 
63.59 csys = 731.83 CPU)
Result: FAIL
Makefile:3151: recipe for target '_tests' failed
make[1]: *** [_tests] Error 1
make[1]: Leaving directory '/home/openssl/run-checker/no-autoerrinit'
Makefile:3149: recipe for target 'tests' failed
make: *** [tests] Error 2


Still FAILED build of OpenSSL branch master with options -d --strict-warnings enable-asan no-shared -DOPENSSL_SMALL_FOOTPRINT

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings enable-asan no-shared 
-DOPENSSL_SMALL_FOOTPRINT

Commit log since last time:

a268ed3acf free memory use on error in cert verify
871881856f generate_cookie_callback: free temporary memory on an error path
30f3b4e1c1 PKCS5 PBE: free allocations on unlikely / impossible failure path
e2d66c0d00 PKCS#8: free data on error path in newpass_bag
48ff651ecc DTLS: free allocated memory on error paths
4f14a378f8 prov/drbg: cleanup some RAND_DRBG leftovers
1d30b0a4ad prov/drbg: fix misspelling of '#ifdef FIPS_MODULE'

Build log ended with (last 100 lines):

# Server sent alert unexpected_message but client received no alert.
# 807748C3C07F:error::SSL routines::unexpected 
message:../openssl/ssl/statem/statem_srvr.c:314:
not ok 9 - iteration 9
# --
not ok 1 - test_handshake
# --
../../util/wrap.pl ../../test/ssl_test 25-cipher.cnf.default default => 1
not ok 6 - running ssl_test 25-cipher.cnf
# --
# Looks like you failed 2 tests of 9.
not ok 26 - Test configuration 25-cipher.cnf
# --
# Looks like you failed 1 test of 31.80-test_ssl_new.t .. 
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/31 subtests 
80-test_ssl_old.t .. ok
80-test_ssl_test_ctx.t . ok

# INFO:  @ ../openssl/test/sslcorrupttest.c:197
# Starting #2, ECDHE-RSA-CHACHA20-POLY1305
# ERROR: (int) 'SSL_get_error(clientssl, 0) == SSL_ERROR_WANT_READ' 
failed @ ../openssl/test/ssltestlib.c:1032
# [1] compared to [2]
# ERROR: (bool) 'create_ssl_connection(server, client, SSL_ERROR_NONE) 
== true' failed @ ../openssl/test/sslcorrupttest.c:227
# false
# 80779470FF7E:error::SSL routines::unexpected 
message:../openssl/ssl/statem/statem_clnt.c:399:
not ok 3 - iteration 3
# --
# INFO:  @ ../openssl/test/sslcorrupttest.c:197
# Starting #3, DHE-RSA-CHACHA20-POLY1305
# ERROR: (int) 'SSL_get_error(clientssl, 0) == SSL_ERROR_WANT_READ' 
failed @ ../openssl/test/ssltestlib.c:1032
# [1] compared to [2]
# ERROR: (bool) 'create_ssl_connection(server, client, SSL_ERROR_NONE) 
== true' failed @ ../openssl/test/sslcorrupttest.c:227
# false
# 80779470FF7E:error::SSL routines::unexpected 
message:../openssl/ssl/statem/statem_clnt.c:399:
not ok 4 - iteration 4
# --
not ok 1 - test_ssl_corrupt
# --
../../util/wrap.pl ../../test/sslcorrupttest ../../../openssl/apps/server.pem 
../../../openssl/apps/server.pem => 1
not ok 1 - running sslcorrupttest
# --
#   Failed test 'running sslcorrupttest'
#   at ../openssl/test/recipes/80-test_sslcorrupt.t line 19.
# Looks like you failed 1 test of 1.80-test_sslcorrupt.t ... 
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/1 subtests 
80-test_tsa.t .. ok
80-test_x509aux.t .. ok

# 81-test_cmp_cli.t .. ok
90-test_asn1_time.t  ok
90-test_async.t  ok
90-test_bio_enc.t .. ok
90-test_bio_memleak.t .. ok
90-test_constant_time.t  ok
90-test_fatalerr.t . ok
90-test_gmdiff.t ... ok
90-test_gost.t . skipped: GOST support is disabled in this 
OpenSSL build
90-test_ige.t .. ok
90-test_includes.t . ok
90-test_memleak.t .. ok
90-test_overhead.t . ok
90-test_secmem.t ... ok
90-test_shlibload.t  skipped: Test only supported in a shared 
build
90-test_srp.t .. ok
90-test_sslapi.t ... ok
90-test_sslbuffers.t ... ok
90-test_store.t  ok
90-test_sysdefault.t ... ok
90-test_threads.t .. ok
90-test_time_offset.t .. ok
90-test_tls13ccs.t . ok
90-test_tls13encryption.t .. ok
90-test_tls13secrets.t . skipped: tls13secrets is not supported in 
this build
90-test_v3name.t ... ok
95-test_external_boringssl.t ... skipped: No external tests in this 
configuration

Errored: openssl/openssl#37481 (master - a268ed3)

2020-09-15 Thread Travis CI
Build Update for openssl/openssl
-

Build: #37481
Status: Errored

Duration: 1 hr, 20 mins, and 50 secs
Commit: a268ed3 (master)
Author: Pauli
Message: free memory use on error in cert verify

Reviewed-by: Richard Levitte 
Reviewed-by: Kurt Roeckx 
(Merged from https://github.com/openssl/openssl/pull/12870)

View the changeset: 
https://github.com/openssl/openssl/compare/4f14a378f807...a268ed3acf16

View the full build log and details: 
https://travis-ci.com/github/openssl/openssl/builds/184466265?utm_medium=notification_source=email


--

You can unsubscribe from build emails from the openssl/openssl repository going 
to 
https://travis-ci.com/account/preferences/unsubscribe?repository=13885459_medium=notification_source=email.
Or unsubscribe from *all* email updating your settings at 
https://travis-ci.com/account/preferences/unsubscribe?utm_medium=notification_source=email.
Or configure specific recipients for build notifications in your .travis.yml 
file. See https://docs.travis-ci.com/user/notifications.



[openssl] master update

2020-09-15 Thread Dr . Paul Dale
The branch master has been updated
   via  a268ed3acf16948c0e19ba67b2b3f89b3312a416 (commit)
   via  871881856fa1da2c175b17c52f6b0b1c15d791a1 (commit)
   via  30f3b4e1c15cda063ed3e5ffc893b202afd671a3 (commit)
   via  e2d66c0d007ad8bcf80890dadf681135d24d86cd (commit)
   via  48ff651eccf2f43ddbc221a0f9ddac57169aa255 (commit)
  from  4f14a378f807e989aa0b328267732409c8d6ac68 (commit)


- Log -
commit a268ed3acf16948c0e19ba67b2b3f89b3312a416
Author: Pauli 
Date:   Mon Sep 14 07:50:40 2020 +1000

free memory use on error in cert verify

Reviewed-by: Richard Levitte 
Reviewed-by: Kurt Roeckx 
(Merged from https://github.com/openssl/openssl/pull/12870)

commit 871881856fa1da2c175b17c52f6b0b1c15d791a1
Author: Pauli 
Date:   Mon Sep 14 07:47:26 2020 +1000

generate_cookie_callback: free temporary memory on an error path

Reviewed-by: Richard Levitte 
Reviewed-by: Kurt Roeckx 
(Merged from https://github.com/openssl/openssl/pull/12870)

commit 30f3b4e1c15cda063ed3e5ffc893b202afd671a3
Author: Pauli 
Date:   Mon Sep 14 07:44:45 2020 +1000

PKCS5 PBE: free allocations on unlikely / impossible failure path

Reviewed-by: Richard Levitte 
Reviewed-by: Kurt Roeckx 
(Merged from https://github.com/openssl/openssl/pull/12870)

commit e2d66c0d007ad8bcf80890dadf681135d24d86cd
Author: Pauli 
Date:   Mon Sep 14 07:40:58 2020 +1000

PKCS#8: free data on error path in newpass_bag

Reviewed-by: Richard Levitte 
Reviewed-by: Kurt Roeckx 
(Merged from https://github.com/openssl/openssl/pull/12870)

commit 48ff651eccf2f43ddbc221a0f9ddac57169aa255
Author: Pauli 
Date:   Mon Sep 14 07:36:02 2020 +1000

DTLS: free allocated memory on error paths

Reviewed-by: Richard Levitte 
Reviewed-by: Kurt Roeckx 
(Merged from https://github.com/openssl/openssl/pull/12870)

---

Summary of changes:
 apps/lib/s_cb.c  | 1 +
 crypto/evp/p5_crpt.c | 2 +-
 crypto/pkcs12/p12_npas.c | 4 +++-
 crypto/x509/x509_vfy.c   | 1 +
 ssl/statem/statem_dtls.c | 8 ++--
 5 files changed, 12 insertions(+), 4 deletions(-)

diff --git a/apps/lib/s_cb.c b/apps/lib/s_cb.c
index ec52cef158..72fb98402d 100644
--- a/apps/lib/s_cb.c
+++ b/apps/lib/s_cb.c
@@ -786,6 +786,7 @@ int generate_cookie_callback(SSL *ssl, unsigned char 
*cookie,
 /* Create buffer with peer's address and port */
 if (!BIO_ADDR_rawaddress(peer, NULL, )) {
 BIO_printf(bio_err, "Failed getting peer address\n");
+BIO_ADDR_free(lpeer);
 return 0;
 }
 OPENSSL_assert(length != 0);
diff --git a/crypto/evp/p5_crpt.c b/crypto/evp/p5_crpt.c
index 4e9603757b..7e9a80e5c0 100644
--- a/crypto/evp/p5_crpt.c
+++ b/crypto/evp/p5_crpt.c
@@ -91,7 +91,7 @@ int PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char 
*pass, int passlen,
 goto err;
 mdsize = EVP_MD_size(md);
 if (mdsize < 0)
-return 0;
+goto err;
 for (i = 1; i < iter; i++) {
 if (!EVP_DigestInit_ex(ctx, md, NULL))
 goto err;
diff --git a/crypto/pkcs12/p12_npas.c b/crypto/pkcs12/p12_npas.c
index ee35c45abb..7f04ce10de 100644
--- a/crypto/pkcs12/p12_npas.c
+++ b/crypto/pkcs12/p12_npas.c
@@ -157,8 +157,10 @@ static int newpass_bag(PKCS12_SAFEBAG *bag, const char 
*oldpass,
 if ((p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1)) == NULL)
 return 0;
 X509_SIG_get0(bag->value.shkeybag, , NULL);
-if (!alg_get(shalg, _nid, _iter, _saltlen))
+if (!alg_get(shalg, _nid, _iter, _saltlen)) {
+PKCS8_PRIV_KEY_INFO_free(p8);
 return 0;
+}
 p8new = PKCS8_encrypt(p8_nid, NULL, newpass, -1, NULL, p8_saltlen,
   p8_iter, p8);
 PKCS8_PRIV_KEY_INFO_free(p8);
diff --git a/crypto/x509/x509_vfy.c b/crypto/x509/x509_vfy.c
index 5520f08e28..f234ec0df6 100644
--- a/crypto/x509/x509_vfy.c
+++ b/crypto/x509/x509_vfy.c
@@ -3214,6 +3214,7 @@ static int build_chain(X509_STORE_CTX *ctx)
 }
 self_signed = X509_self_signed(x, 0);
 if (self_signed < 0) {
+sk_X509_free(sktmp);
 ctx->error = X509_V_ERR_UNSPECIFIED;
 return 0;
 }
diff --git a/ssl/statem/statem_dtls.c b/ssl/statem/statem_dtls.c
index 564829c808..84ae35b655 100644
--- a/ssl/statem/statem_dtls.c
+++ b/ssl/statem/statem_dtls.c
@@ -1051,12 +1051,16 @@ int dtls1_buffer_message(SSL *s, int is_ccs)
 if (!ossl_assert(s->d1->w_msg_hdr.msg_len +
  ((s->version ==
DTLS1_BAD_VER) ? 3 : DTLS1_CCS_HEADER_LENGTH)
- == (unsigned int)s->init_num))
+ == (unsigned int)s->init_num)) {
+dtls1_hm_fragment_free(frag);
 return 0;
+}

Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-tls1_3

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-tls1_3

Commit log since last time:

ec0ce188f4 EVP: Centralise fetching error reporting
225c9660a5 Ignore unused return values from some sk_*() macros
89b46350a3 Don't complain about stack related macros
0490314f65 Make 'make errors' work again
962963395c Make 'make ordinals' work again
83ecb26f2b util/mknum.pl: Fix file opening
c6029deab2 Streamline the safestack generated code
316054147a Add a CHANGES entry for the safestack updates
262cda1cda Remove some safestack things that are no longer needed
9cedfc90ce Fix safestack issues in ui.h
add3392727 Fix safestack issues in pkcs12.h
15c3dcfc78 Fix safestack issues in crypto.h
e74e562f1c Fix safestack issues in conf.h
dd73147420 Fix safestack issues in bio.h
1e14bca233 Fix safestack issues in ess.h
0b28254015 Fix safestack issues in asn1t.h
9d01ac71a0 Fix safestack issues in ct.h
98c35dc48d Fix safestack issues in crmf.h
c5a5581127 Fix safestack issues in x509_vfy.h
22fbfe6a7d Fix safestack issues in srp.h
02199cc39d Fix safestack issues in pkcs7.h
fd3ed85c67 Fix safestack issues in ocsp.h
904e1f92b3 Fix safestack issues in cms.h
798f932980 Fix safestack issues in cmp.h
b4780134df Fix safestack issues in asn1.h
24c4ea958e Fix stacks of OPENSSL_STRING, OPENSSL_CSTRING and OPENSSL_BLOCK
e144fd36ce Fix safestack issues in x509v3.h
e6623cfbff Fix safestack issues in x509.h
6ac1cd10ba Fix safestack issues in ssl.h
08073700cc NonStop port updates for 3.0.0.
f0c62c5328 TEST: Add a test of EC key generation with encoding spec
655f73cecf EVP: Add the internal convenience function evp_keymgmt_util_export()
96bb4ff9b8 Fix EVP_PKEY_CTX_ctrl() documentation
33dd828d97 Update doc for EVP_PKEY_CTX_set_ec_param_enc()
7229a2f4ab EC: Reimplement EVP_PKEY_CTX_set_ec_param_enc() to support providers
4588f35b5a dev/release.sh: Rework to be smoother
35e6ea3bdc keygen: add FIPS error state management to conditional self tests
801ed9edba CRNGT: enter FIPS error state if the test fails
5736923f12 FIPS: error mode is set from failed self tests and produced a 
limited number of errors when algorithm accesses are attempted
f99d3eedf7 ciphers: add FIPS error state handling
422cbcee61 keymgmt: add FIPS error state handling
f590a5ea1a signature: add FIPS error state handling
ca94057fc3 exchange: add FIPS error state handling
2b9e4e956b kdf: add FIPS error state handling
5b104a81f0 mac: add FIPS error state handling
aef30ad0b6 rand: add FIPS error state handling
87fe138d35 asymciphers: add FIPS error state handling
1c1daab94c digests: add FIPS error state handling
6cf3730267 FIPS: rename the status call to is_running.
eab7b4240d provider: add an 'is_running' call to all providers.
5e8cd0a4f4 Fix coverity issue: CID 1466479 - Resource leak in apps/pkcs12.c
97f7a6d42e Fix coverity issue: CID 1466482 - Resource leak in 
OSSL_STORE_SEARCH_by_key_fingerprint()
9951eaf467 Fix coverity issue: CID 1466483 - Improper use of Negative value in 
dh_ctrl.c
0f0b7dfbe5 Fix coverity issue: CID 1466484 - Remove dead code in 
PKCS7_dataInit()
6e417f951c Fix coverity issue: CID 1466485 - Explicit NULL dereference in 
OSSL_STORE_find()
3481694946 Fix coverity issue: CID 1466486 - Resource leak in OSSL_STORE
c1aba0763c OSSL_DECODER 'decode' function must never be NULL.
c88f6f0e40 TEST: skip POSIX errcode zero in tesst/recipes/02-test_errstr.t
c9352933fe fuzz/test-corpus: check if PATH_MAX is already defined
64713cb10d apps/ca: allow CRL lastUpdate/nextUpdate fields to be specified
0e60ce6334 Improve robustness and performance of building Unix static libraries
5ea4c6e553 apps/cmp.c: Improve example given for -geninfo option (also in man 
page)
1cd77e2eca OSSL_CMP_CTX_new.pod: improve doc of 
OSSL_CMP_CTX_get1_{extraCertsIn,caPubs}
4d2b2889da openssl-cmp.pod.in: Update Insta Demo CA port number in case needed
62261446b2 apps/cmp.c: Improve user guidance on missing -subject etc. options
7a7d6b514f apps/cmp.c: Improve documentation of -extracerts, -untrusted, and 
-otherpass
ef2d3588e8 apps/cmp.c: Improve documentation of -secret, -cert, and -key options
82bdd64193 check_chain_extensions(): Require X.509 v3 if extensions are present
e41a2c4c60 check_chain_extensions(): Change exclusion condition w.r.t. RFC 6818 
section 2
d72c8b457b x509_vfy.c: Make sure that strict checks are not done for 
self-issued EE certs
bb377c8d6c check_chain_extensions(): Add check that CA cert includes key usage 
extension
da6c691d6d check_chain_extensions(): Add check that on empty Subject the SAN 
must be marked critical
89f13ca434 check_chain_extensions(): Add check that AKID and SKID are not 
marked critical
8a639b9d72 check_chain_extensions(): Add check that Basic Constraints of CA 
cert are marked critical
1e41dadfa7 Extend X509 cert checks and error reporting in v3_{purp,crld}.c and 
x509_{set,vfy}.c
b0a4cbead3 apps/cmp.c: 

Build completed: openssl master.36940

2020-09-15 Thread AppVeyor


Build openssl master.36940 completed



Commit 62a9415f6f by Matt Caswell on 9/15/2020 3:48 PM:

Make sure we properly test for EdDSA with alg ids


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-dtls1_2-method

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-dtls1_2-method

Commit log since last time:

ec0ce188f4 EVP: Centralise fetching error reporting
225c9660a5 Ignore unused return values from some sk_*() macros
89b46350a3 Don't complain about stack related macros
0490314f65 Make 'make errors' work again
962963395c Make 'make ordinals' work again
83ecb26f2b util/mknum.pl: Fix file opening
c6029deab2 Streamline the safestack generated code
316054147a Add a CHANGES entry for the safestack updates
262cda1cda Remove some safestack things that are no longer needed
9cedfc90ce Fix safestack issues in ui.h
add3392727 Fix safestack issues in pkcs12.h
15c3dcfc78 Fix safestack issues in crypto.h
e74e562f1c Fix safestack issues in conf.h
dd73147420 Fix safestack issues in bio.h
1e14bca233 Fix safestack issues in ess.h
0b28254015 Fix safestack issues in asn1t.h
9d01ac71a0 Fix safestack issues in ct.h
98c35dc48d Fix safestack issues in crmf.h
c5a5581127 Fix safestack issues in x509_vfy.h
22fbfe6a7d Fix safestack issues in srp.h
02199cc39d Fix safestack issues in pkcs7.h
fd3ed85c67 Fix safestack issues in ocsp.h
904e1f92b3 Fix safestack issues in cms.h
798f932980 Fix safestack issues in cmp.h
b4780134df Fix safestack issues in asn1.h
24c4ea958e Fix stacks of OPENSSL_STRING, OPENSSL_CSTRING and OPENSSL_BLOCK
e144fd36ce Fix safestack issues in x509v3.h
e6623cfbff Fix safestack issues in x509.h
6ac1cd10ba Fix safestack issues in ssl.h
08073700cc NonStop port updates for 3.0.0.
f0c62c5328 TEST: Add a test of EC key generation with encoding spec
655f73cecf EVP: Add the internal convenience function evp_keymgmt_util_export()
96bb4ff9b8 Fix EVP_PKEY_CTX_ctrl() documentation
33dd828d97 Update doc for EVP_PKEY_CTX_set_ec_param_enc()
7229a2f4ab EC: Reimplement EVP_PKEY_CTX_set_ec_param_enc() to support providers
4588f35b5a dev/release.sh: Rework to be smoother
35e6ea3bdc keygen: add FIPS error state management to conditional self tests
801ed9edba CRNGT: enter FIPS error state if the test fails
5736923f12 FIPS: error mode is set from failed self tests and produced a 
limited number of errors when algorithm accesses are attempted
f99d3eedf7 ciphers: add FIPS error state handling
422cbcee61 keymgmt: add FIPS error state handling
f590a5ea1a signature: add FIPS error state handling
ca94057fc3 exchange: add FIPS error state handling
2b9e4e956b kdf: add FIPS error state handling
5b104a81f0 mac: add FIPS error state handling
aef30ad0b6 rand: add FIPS error state handling
87fe138d35 asymciphers: add FIPS error state handling
1c1daab94c digests: add FIPS error state handling
6cf3730267 FIPS: rename the status call to is_running.
eab7b4240d provider: add an 'is_running' call to all providers.
5e8cd0a4f4 Fix coverity issue: CID 1466479 - Resource leak in apps/pkcs12.c
97f7a6d42e Fix coverity issue: CID 1466482 - Resource leak in 
OSSL_STORE_SEARCH_by_key_fingerprint()
9951eaf467 Fix coverity issue: CID 1466483 - Improper use of Negative value in 
dh_ctrl.c
0f0b7dfbe5 Fix coverity issue: CID 1466484 - Remove dead code in 
PKCS7_dataInit()
6e417f951c Fix coverity issue: CID 1466485 - Explicit NULL dereference in 
OSSL_STORE_find()
3481694946 Fix coverity issue: CID 1466486 - Resource leak in OSSL_STORE
c1aba0763c OSSL_DECODER 'decode' function must never be NULL.
c88f6f0e40 TEST: skip POSIX errcode zero in tesst/recipes/02-test_errstr.t
c9352933fe fuzz/test-corpus: check if PATH_MAX is already defined
64713cb10d apps/ca: allow CRL lastUpdate/nextUpdate fields to be specified
0e60ce6334 Improve robustness and performance of building Unix static libraries
5ea4c6e553 apps/cmp.c: Improve example given for -geninfo option (also in man 
page)
1cd77e2eca OSSL_CMP_CTX_new.pod: improve doc of 
OSSL_CMP_CTX_get1_{extraCertsIn,caPubs}
4d2b2889da openssl-cmp.pod.in: Update Insta Demo CA port number in case needed
62261446b2 apps/cmp.c: Improve user guidance on missing -subject etc. options
7a7d6b514f apps/cmp.c: Improve documentation of -extracerts, -untrusted, and 
-otherpass
ef2d3588e8 apps/cmp.c: Improve documentation of -secret, -cert, and -key options
82bdd64193 check_chain_extensions(): Require X.509 v3 if extensions are present
e41a2c4c60 check_chain_extensions(): Change exclusion condition w.r.t. RFC 6818 
section 2
d72c8b457b x509_vfy.c: Make sure that strict checks are not done for 
self-issued EE certs
bb377c8d6c check_chain_extensions(): Add check that CA cert includes key usage 
extension
da6c691d6d check_chain_extensions(): Add check that on empty Subject the SAN 
must be marked critical
89f13ca434 check_chain_extensions(): Add check that AKID and SKID are not 
marked critical
8a639b9d72 check_chain_extensions(): Add check that Basic Constraints of CA 
cert are marked critical
1e41dadfa7 Extend X509 cert checks and error reporting in v3_{purp,crld}.c and 
x509_{set,vfy}.c
b0a4cbead3 

Build failed: openssl master.36939

2020-09-15 Thread AppVeyor



Build openssl master.36939 failed


Commit 43ef55025a by Tomas Mraz on 9/11/2020 1:27 PM:

Rename check_chain_extensions to check_chain


Configure your notification preferences



Build failed: openssl master.36938

2020-09-15 Thread AppVeyor



Build openssl master.36938 failed


Commit 1fa4b7d775 by Richard Levitte on 9/15/2020 3:40 PM:

Configurations/unix-Makefile.tmpl: Don't specify headers twice


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-dtls1_2

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-dtls1_2

Commit log since last time:

ec0ce188f4 EVP: Centralise fetching error reporting
225c9660a5 Ignore unused return values from some sk_*() macros
89b46350a3 Don't complain about stack related macros
0490314f65 Make 'make errors' work again
962963395c Make 'make ordinals' work again
83ecb26f2b util/mknum.pl: Fix file opening
c6029deab2 Streamline the safestack generated code
316054147a Add a CHANGES entry for the safestack updates
262cda1cda Remove some safestack things that are no longer needed
9cedfc90ce Fix safestack issues in ui.h
add3392727 Fix safestack issues in pkcs12.h
15c3dcfc78 Fix safestack issues in crypto.h
e74e562f1c Fix safestack issues in conf.h
dd73147420 Fix safestack issues in bio.h
1e14bca233 Fix safestack issues in ess.h
0b28254015 Fix safestack issues in asn1t.h
9d01ac71a0 Fix safestack issues in ct.h
98c35dc48d Fix safestack issues in crmf.h
c5a5581127 Fix safestack issues in x509_vfy.h
22fbfe6a7d Fix safestack issues in srp.h
02199cc39d Fix safestack issues in pkcs7.h
fd3ed85c67 Fix safestack issues in ocsp.h
904e1f92b3 Fix safestack issues in cms.h
798f932980 Fix safestack issues in cmp.h
b4780134df Fix safestack issues in asn1.h
24c4ea958e Fix stacks of OPENSSL_STRING, OPENSSL_CSTRING and OPENSSL_BLOCK
e144fd36ce Fix safestack issues in x509v3.h
e6623cfbff Fix safestack issues in x509.h
6ac1cd10ba Fix safestack issues in ssl.h
08073700cc NonStop port updates for 3.0.0.
f0c62c5328 TEST: Add a test of EC key generation with encoding spec
655f73cecf EVP: Add the internal convenience function evp_keymgmt_util_export()
96bb4ff9b8 Fix EVP_PKEY_CTX_ctrl() documentation
33dd828d97 Update doc for EVP_PKEY_CTX_set_ec_param_enc()
7229a2f4ab EC: Reimplement EVP_PKEY_CTX_set_ec_param_enc() to support providers
4588f35b5a dev/release.sh: Rework to be smoother
35e6ea3bdc keygen: add FIPS error state management to conditional self tests
801ed9edba CRNGT: enter FIPS error state if the test fails
5736923f12 FIPS: error mode is set from failed self tests and produced a 
limited number of errors when algorithm accesses are attempted
f99d3eedf7 ciphers: add FIPS error state handling
422cbcee61 keymgmt: add FIPS error state handling
f590a5ea1a signature: add FIPS error state handling
ca94057fc3 exchange: add FIPS error state handling
2b9e4e956b kdf: add FIPS error state handling
5b104a81f0 mac: add FIPS error state handling
aef30ad0b6 rand: add FIPS error state handling
87fe138d35 asymciphers: add FIPS error state handling
1c1daab94c digests: add FIPS error state handling
6cf3730267 FIPS: rename the status call to is_running.
eab7b4240d provider: add an 'is_running' call to all providers.
5e8cd0a4f4 Fix coverity issue: CID 1466479 - Resource leak in apps/pkcs12.c
97f7a6d42e Fix coverity issue: CID 1466482 - Resource leak in 
OSSL_STORE_SEARCH_by_key_fingerprint()
9951eaf467 Fix coverity issue: CID 1466483 - Improper use of Negative value in 
dh_ctrl.c
0f0b7dfbe5 Fix coverity issue: CID 1466484 - Remove dead code in 
PKCS7_dataInit()
6e417f951c Fix coverity issue: CID 1466485 - Explicit NULL dereference in 
OSSL_STORE_find()
3481694946 Fix coverity issue: CID 1466486 - Resource leak in OSSL_STORE
c1aba0763c OSSL_DECODER 'decode' function must never be NULL.
c88f6f0e40 TEST: skip POSIX errcode zero in tesst/recipes/02-test_errstr.t
c9352933fe fuzz/test-corpus: check if PATH_MAX is already defined
64713cb10d apps/ca: allow CRL lastUpdate/nextUpdate fields to be specified
0e60ce6334 Improve robustness and performance of building Unix static libraries
5ea4c6e553 apps/cmp.c: Improve example given for -geninfo option (also in man 
page)
1cd77e2eca OSSL_CMP_CTX_new.pod: improve doc of 
OSSL_CMP_CTX_get1_{extraCertsIn,caPubs}
4d2b2889da openssl-cmp.pod.in: Update Insta Demo CA port number in case needed
62261446b2 apps/cmp.c: Improve user guidance on missing -subject etc. options
7a7d6b514f apps/cmp.c: Improve documentation of -extracerts, -untrusted, and 
-otherpass
ef2d3588e8 apps/cmp.c: Improve documentation of -secret, -cert, and -key options
82bdd64193 check_chain_extensions(): Require X.509 v3 if extensions are present
e41a2c4c60 check_chain_extensions(): Change exclusion condition w.r.t. RFC 6818 
section 2
d72c8b457b x509_vfy.c: Make sure that strict checks are not done for 
self-issued EE certs
bb377c8d6c check_chain_extensions(): Add check that CA cert includes key usage 
extension
da6c691d6d check_chain_extensions(): Add check that on empty Subject the SAN 
must be marked critical
89f13ca434 check_chain_extensions(): Add check that AKID and SKID are not 
marked critical
8a639b9d72 check_chain_extensions(): Add check that Basic Constraints of CA 
cert are marked critical
1e41dadfa7 Extend X509 cert checks and error reporting in v3_{purp,crld}.c and 
x509_{set,vfy}.c
b0a4cbead3 apps/cmp.c: 

Build completed: openssl OpenSSL_1_1_1-stable.36936

2020-09-15 Thread AppVeyor


Build openssl OpenSSL_1_1_1-stable.36936 completed



Commit 5468e48c2e by Meik Kreyenkoetter on 9/15/2020 3:11 PM:

Merge branch 'OpenSSL_1_1_1-stable' into win10ecccomp


Configure your notification preferences



Build failed: openssl master.36935

2020-09-15 Thread AppVeyor



Build openssl master.36935 failed


Commit 7e06c712e1 by Matt Caswell on 9/15/2020 1:32 PM:

Temporarily display more diagnostic information


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-dtls

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-dtls

Commit log since last time:

ec0ce188f4 EVP: Centralise fetching error reporting
225c9660a5 Ignore unused return values from some sk_*() macros
89b46350a3 Don't complain about stack related macros
0490314f65 Make 'make errors' work again
962963395c Make 'make ordinals' work again
83ecb26f2b util/mknum.pl: Fix file opening
c6029deab2 Streamline the safestack generated code
316054147a Add a CHANGES entry for the safestack updates
262cda1cda Remove some safestack things that are no longer needed
9cedfc90ce Fix safestack issues in ui.h
add3392727 Fix safestack issues in pkcs12.h
15c3dcfc78 Fix safestack issues in crypto.h
e74e562f1c Fix safestack issues in conf.h
dd73147420 Fix safestack issues in bio.h
1e14bca233 Fix safestack issues in ess.h
0b28254015 Fix safestack issues in asn1t.h
9d01ac71a0 Fix safestack issues in ct.h
98c35dc48d Fix safestack issues in crmf.h
c5a5581127 Fix safestack issues in x509_vfy.h
22fbfe6a7d Fix safestack issues in srp.h
02199cc39d Fix safestack issues in pkcs7.h
fd3ed85c67 Fix safestack issues in ocsp.h
904e1f92b3 Fix safestack issues in cms.h
798f932980 Fix safestack issues in cmp.h
b4780134df Fix safestack issues in asn1.h
24c4ea958e Fix stacks of OPENSSL_STRING, OPENSSL_CSTRING and OPENSSL_BLOCK
e144fd36ce Fix safestack issues in x509v3.h
e6623cfbff Fix safestack issues in x509.h
6ac1cd10ba Fix safestack issues in ssl.h
08073700cc NonStop port updates for 3.0.0.
f0c62c5328 TEST: Add a test of EC key generation with encoding spec
655f73cecf EVP: Add the internal convenience function evp_keymgmt_util_export()
96bb4ff9b8 Fix EVP_PKEY_CTX_ctrl() documentation
33dd828d97 Update doc for EVP_PKEY_CTX_set_ec_param_enc()
7229a2f4ab EC: Reimplement EVP_PKEY_CTX_set_ec_param_enc() to support providers
4588f35b5a dev/release.sh: Rework to be smoother
35e6ea3bdc keygen: add FIPS error state management to conditional self tests
801ed9edba CRNGT: enter FIPS error state if the test fails
5736923f12 FIPS: error mode is set from failed self tests and produced a 
limited number of errors when algorithm accesses are attempted
f99d3eedf7 ciphers: add FIPS error state handling
422cbcee61 keymgmt: add FIPS error state handling
f590a5ea1a signature: add FIPS error state handling
ca94057fc3 exchange: add FIPS error state handling
2b9e4e956b kdf: add FIPS error state handling
5b104a81f0 mac: add FIPS error state handling
aef30ad0b6 rand: add FIPS error state handling
87fe138d35 asymciphers: add FIPS error state handling
1c1daab94c digests: add FIPS error state handling
6cf3730267 FIPS: rename the status call to is_running.
eab7b4240d provider: add an 'is_running' call to all providers.
5e8cd0a4f4 Fix coverity issue: CID 1466479 - Resource leak in apps/pkcs12.c
97f7a6d42e Fix coverity issue: CID 1466482 - Resource leak in 
OSSL_STORE_SEARCH_by_key_fingerprint()
9951eaf467 Fix coverity issue: CID 1466483 - Improper use of Negative value in 
dh_ctrl.c
0f0b7dfbe5 Fix coverity issue: CID 1466484 - Remove dead code in 
PKCS7_dataInit()
6e417f951c Fix coverity issue: CID 1466485 - Explicit NULL dereference in 
OSSL_STORE_find()
3481694946 Fix coverity issue: CID 1466486 - Resource leak in OSSL_STORE
c1aba0763c OSSL_DECODER 'decode' function must never be NULL.
c88f6f0e40 TEST: skip POSIX errcode zero in tesst/recipes/02-test_errstr.t
c9352933fe fuzz/test-corpus: check if PATH_MAX is already defined
64713cb10d apps/ca: allow CRL lastUpdate/nextUpdate fields to be specified
0e60ce6334 Improve robustness and performance of building Unix static libraries
5ea4c6e553 apps/cmp.c: Improve example given for -geninfo option (also in man 
page)
1cd77e2eca OSSL_CMP_CTX_new.pod: improve doc of 
OSSL_CMP_CTX_get1_{extraCertsIn,caPubs}
4d2b2889da openssl-cmp.pod.in: Update Insta Demo CA port number in case needed
62261446b2 apps/cmp.c: Improve user guidance on missing -subject etc. options
7a7d6b514f apps/cmp.c: Improve documentation of -extracerts, -untrusted, and 
-otherpass
ef2d3588e8 apps/cmp.c: Improve documentation of -secret, -cert, and -key options
82bdd64193 check_chain_extensions(): Require X.509 v3 if extensions are present
e41a2c4c60 check_chain_extensions(): Change exclusion condition w.r.t. RFC 6818 
section 2
d72c8b457b x509_vfy.c: Make sure that strict checks are not done for 
self-issued EE certs
bb377c8d6c check_chain_extensions(): Add check that CA cert includes key usage 
extension
da6c691d6d check_chain_extensions(): Add check that on empty Subject the SAN 
must be marked critical
89f13ca434 check_chain_extensions(): Add check that AKID and SKID are not 
marked critical
8a639b9d72 check_chain_extensions(): Add check that Basic Constraints of CA 
cert are marked critical
1e41dadfa7 Extend X509 cert checks and error reporting in v3_{purp,crld}.c and 
x509_{set,vfy}.c
b0a4cbead3 apps/cmp.c: 

Build failed: openssl master.36934

2020-09-15 Thread AppVeyor



Build openssl master.36934 failed


Commit 88a87a7eea by Matt Caswell on 9/15/2020 1:00 PM:

Fix some doc-nits and make update errors


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-ui

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-ui

Commit log since last time:

ec0ce188f4 EVP: Centralise fetching error reporting
225c9660a5 Ignore unused return values from some sk_*() macros
89b46350a3 Don't complain about stack related macros
0490314f65 Make 'make errors' work again
962963395c Make 'make ordinals' work again
83ecb26f2b util/mknum.pl: Fix file opening
c6029deab2 Streamline the safestack generated code
316054147a Add a CHANGES entry for the safestack updates
262cda1cda Remove some safestack things that are no longer needed
9cedfc90ce Fix safestack issues in ui.h
add3392727 Fix safestack issues in pkcs12.h
15c3dcfc78 Fix safestack issues in crypto.h
e74e562f1c Fix safestack issues in conf.h
dd73147420 Fix safestack issues in bio.h
1e14bca233 Fix safestack issues in ess.h
0b28254015 Fix safestack issues in asn1t.h
9d01ac71a0 Fix safestack issues in ct.h
98c35dc48d Fix safestack issues in crmf.h
c5a5581127 Fix safestack issues in x509_vfy.h
22fbfe6a7d Fix safestack issues in srp.h
02199cc39d Fix safestack issues in pkcs7.h
fd3ed85c67 Fix safestack issues in ocsp.h
904e1f92b3 Fix safestack issues in cms.h
798f932980 Fix safestack issues in cmp.h
b4780134df Fix safestack issues in asn1.h
24c4ea958e Fix stacks of OPENSSL_STRING, OPENSSL_CSTRING and OPENSSL_BLOCK
e144fd36ce Fix safestack issues in x509v3.h
e6623cfbff Fix safestack issues in x509.h
6ac1cd10ba Fix safestack issues in ssl.h
08073700cc NonStop port updates for 3.0.0.
f0c62c5328 TEST: Add a test of EC key generation with encoding spec
655f73cecf EVP: Add the internal convenience function evp_keymgmt_util_export()
96bb4ff9b8 Fix EVP_PKEY_CTX_ctrl() documentation
33dd828d97 Update doc for EVP_PKEY_CTX_set_ec_param_enc()
7229a2f4ab EC: Reimplement EVP_PKEY_CTX_set_ec_param_enc() to support providers
4588f35b5a dev/release.sh: Rework to be smoother
35e6ea3bdc keygen: add FIPS error state management to conditional self tests
801ed9edba CRNGT: enter FIPS error state if the test fails
5736923f12 FIPS: error mode is set from failed self tests and produced a 
limited number of errors when algorithm accesses are attempted
f99d3eedf7 ciphers: add FIPS error state handling
422cbcee61 keymgmt: add FIPS error state handling
f590a5ea1a signature: add FIPS error state handling
ca94057fc3 exchange: add FIPS error state handling
2b9e4e956b kdf: add FIPS error state handling
5b104a81f0 mac: add FIPS error state handling
aef30ad0b6 rand: add FIPS error state handling
87fe138d35 asymciphers: add FIPS error state handling
1c1daab94c digests: add FIPS error state handling
6cf3730267 FIPS: rename the status call to is_running.
eab7b4240d provider: add an 'is_running' call to all providers.
5e8cd0a4f4 Fix coverity issue: CID 1466479 - Resource leak in apps/pkcs12.c
97f7a6d42e Fix coverity issue: CID 1466482 - Resource leak in 
OSSL_STORE_SEARCH_by_key_fingerprint()
9951eaf467 Fix coverity issue: CID 1466483 - Improper use of Negative value in 
dh_ctrl.c
0f0b7dfbe5 Fix coverity issue: CID 1466484 - Remove dead code in 
PKCS7_dataInit()
6e417f951c Fix coverity issue: CID 1466485 - Explicit NULL dereference in 
OSSL_STORE_find()
3481694946 Fix coverity issue: CID 1466486 - Resource leak in OSSL_STORE
c1aba0763c OSSL_DECODER 'decode' function must never be NULL.
c88f6f0e40 TEST: skip POSIX errcode zero in tesst/recipes/02-test_errstr.t
c9352933fe fuzz/test-corpus: check if PATH_MAX is already defined
64713cb10d apps/ca: allow CRL lastUpdate/nextUpdate fields to be specified
0e60ce6334 Improve robustness and performance of building Unix static libraries
5ea4c6e553 apps/cmp.c: Improve example given for -geninfo option (also in man 
page)
1cd77e2eca OSSL_CMP_CTX_new.pod: improve doc of 
OSSL_CMP_CTX_get1_{extraCertsIn,caPubs}
4d2b2889da openssl-cmp.pod.in: Update Insta Demo CA port number in case needed
62261446b2 apps/cmp.c: Improve user guidance on missing -subject etc. options
7a7d6b514f apps/cmp.c: Improve documentation of -extracerts, -untrusted, and 
-otherpass
ef2d3588e8 apps/cmp.c: Improve documentation of -secret, -cert, and -key options
82bdd64193 check_chain_extensions(): Require X.509 v3 if extensions are present
e41a2c4c60 check_chain_extensions(): Change exclusion condition w.r.t. RFC 6818 
section 2
d72c8b457b x509_vfy.c: Make sure that strict checks are not done for 
self-issued EE certs
bb377c8d6c check_chain_extensions(): Add check that CA cert includes key usage 
extension
da6c691d6d check_chain_extensions(): Add check that on empty Subject the SAN 
must be marked critical
89f13ca434 check_chain_extensions(): Add check that AKID and SKID are not 
marked critical
8a639b9d72 check_chain_extensions(): Add check that Basic Constraints of CA 
cert are marked critical
1e41dadfa7 Extend X509 cert checks and error reporting in v3_{purp,crld}.c and 
x509_{set,vfy}.c
b0a4cbead3 apps/cmp.c: Improve 

Still FAILED build of OpenSSL branch master with options -d --strict-warnings enable-ubsan -DPEDANTIC -DOPENSSL_SMALL_FOOTPRINT -fno-sanitize=alignment

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings enable-ubsan -DPEDANTIC 
-DOPENSSL_SMALL_FOOTPRINT -fno-sanitize=alignment

Commit log since last time:

ec0ce188f4 EVP: Centralise fetching error reporting
225c9660a5 Ignore unused return values from some sk_*() macros
89b46350a3 Don't complain about stack related macros
0490314f65 Make 'make errors' work again
962963395c Make 'make ordinals' work again
83ecb26f2b util/mknum.pl: Fix file opening
c6029deab2 Streamline the safestack generated code
316054147a Add a CHANGES entry for the safestack updates
262cda1cda Remove some safestack things that are no longer needed
9cedfc90ce Fix safestack issues in ui.h
add3392727 Fix safestack issues in pkcs12.h
15c3dcfc78 Fix safestack issues in crypto.h
e74e562f1c Fix safestack issues in conf.h
dd73147420 Fix safestack issues in bio.h
1e14bca233 Fix safestack issues in ess.h
0b28254015 Fix safestack issues in asn1t.h
9d01ac71a0 Fix safestack issues in ct.h
98c35dc48d Fix safestack issues in crmf.h
c5a5581127 Fix safestack issues in x509_vfy.h
22fbfe6a7d Fix safestack issues in srp.h
02199cc39d Fix safestack issues in pkcs7.h
fd3ed85c67 Fix safestack issues in ocsp.h
904e1f92b3 Fix safestack issues in cms.h
798f932980 Fix safestack issues in cmp.h
b4780134df Fix safestack issues in asn1.h
24c4ea958e Fix stacks of OPENSSL_STRING, OPENSSL_CSTRING and OPENSSL_BLOCK
e144fd36ce Fix safestack issues in x509v3.h
e6623cfbff Fix safestack issues in x509.h
6ac1cd10ba Fix safestack issues in ssl.h
08073700cc NonStop port updates for 3.0.0.
f0c62c5328 TEST: Add a test of EC key generation with encoding spec
655f73cecf EVP: Add the internal convenience function evp_keymgmt_util_export()
96bb4ff9b8 Fix EVP_PKEY_CTX_ctrl() documentation
33dd828d97 Update doc for EVP_PKEY_CTX_set_ec_param_enc()
7229a2f4ab EC: Reimplement EVP_PKEY_CTX_set_ec_param_enc() to support providers
4588f35b5a dev/release.sh: Rework to be smoother
35e6ea3bdc keygen: add FIPS error state management to conditional self tests
801ed9edba CRNGT: enter FIPS error state if the test fails
5736923f12 FIPS: error mode is set from failed self tests and produced a 
limited number of errors when algorithm accesses are attempted
f99d3eedf7 ciphers: add FIPS error state handling
422cbcee61 keymgmt: add FIPS error state handling
f590a5ea1a signature: add FIPS error state handling
ca94057fc3 exchange: add FIPS error state handling
2b9e4e956b kdf: add FIPS error state handling
5b104a81f0 mac: add FIPS error state handling
aef30ad0b6 rand: add FIPS error state handling
87fe138d35 asymciphers: add FIPS error state handling
1c1daab94c digests: add FIPS error state handling
6cf3730267 FIPS: rename the status call to is_running.
eab7b4240d provider: add an 'is_running' call to all providers.
5e8cd0a4f4 Fix coverity issue: CID 1466479 - Resource leak in apps/pkcs12.c
97f7a6d42e Fix coverity issue: CID 1466482 - Resource leak in 
OSSL_STORE_SEARCH_by_key_fingerprint()
9951eaf467 Fix coverity issue: CID 1466483 - Improper use of Negative value in 
dh_ctrl.c
0f0b7dfbe5 Fix coverity issue: CID 1466484 - Remove dead code in 
PKCS7_dataInit()
6e417f951c Fix coverity issue: CID 1466485 - Explicit NULL dereference in 
OSSL_STORE_find()
3481694946 Fix coverity issue: CID 1466486 - Resource leak in OSSL_STORE
c1aba0763c OSSL_DECODER 'decode' function must never be NULL.
c88f6f0e40 TEST: skip POSIX errcode zero in tesst/recipes/02-test_errstr.t
c9352933fe fuzz/test-corpus: check if PATH_MAX is already defined
64713cb10d apps/ca: allow CRL lastUpdate/nextUpdate fields to be specified
0e60ce6334 Improve robustness and performance of building Unix static libraries
5ea4c6e553 apps/cmp.c: Improve example given for -geninfo option (also in man 
page)
1cd77e2eca OSSL_CMP_CTX_new.pod: improve doc of 
OSSL_CMP_CTX_get1_{extraCertsIn,caPubs}
4d2b2889da openssl-cmp.pod.in: Update Insta Demo CA port number in case needed
62261446b2 apps/cmp.c: Improve user guidance on missing -subject etc. options
7a7d6b514f apps/cmp.c: Improve documentation of -extracerts, -untrusted, and 
-otherpass
ef2d3588e8 apps/cmp.c: Improve documentation of -secret, -cert, and -key options
82bdd64193 check_chain_extensions(): Require X.509 v3 if extensions are present
e41a2c4c60 check_chain_extensions(): Change exclusion condition w.r.t. RFC 6818 
section 2
d72c8b457b x509_vfy.c: Make sure that strict checks are not done for 
self-issued EE certs
bb377c8d6c check_chain_extensions(): Add check that CA cert includes key usage 
extension
da6c691d6d check_chain_extensions(): Add check that on empty Subject the SAN 
must be marked critical
89f13ca434 check_chain_extensions(): Add check that AKID and SKID are not 
marked critical
8a639b9d72 check_chain_extensions(): Add check that Basic Constraints of CA 
cert are marked critical
1e41dadfa7 Extend X509 cert checks and error reporting in 

Build completed: openssl master.36932

2020-09-15 Thread AppVeyor


Build openssl master.36932 completed



Commit f337c70579 by Richard Levitte on 9/15/2020 8:33 AM:

fixup! ENCODER: Refactor the OSSL_ENCODER API to be more like OSSL_DECODER


Configure your notification preferences



Build failed: openssl master.36931

2020-09-15 Thread AppVeyor



Build openssl master.36931 failed


Commit 87a059ad1f by Shane Lontis on 9/15/2020 7:06 AM:

fixup! Add a copy of OSSL_SELF_TEST_get_callback() to the fips module.


Configure your notification preferences



Build completed: openssl master.36930

2020-09-15 Thread AppVeyor


Build openssl master.36930 completed



Commit 10fb89d5bf by Dmitry Belyavskiy on 9/15/2020 5:46 AM:

fixup! HMAC should work with non-provided digests


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-sock

2020-09-15 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-sock

Commit log since last time:

ec0ce188f4 EVP: Centralise fetching error reporting
225c9660a5 Ignore unused return values from some sk_*() macros
89b46350a3 Don't complain about stack related macros
0490314f65 Make 'make errors' work again
962963395c Make 'make ordinals' work again
83ecb26f2b util/mknum.pl: Fix file opening
c6029deab2 Streamline the safestack generated code
316054147a Add a CHANGES entry for the safestack updates
262cda1cda Remove some safestack things that are no longer needed
9cedfc90ce Fix safestack issues in ui.h
add3392727 Fix safestack issues in pkcs12.h
15c3dcfc78 Fix safestack issues in crypto.h
e74e562f1c Fix safestack issues in conf.h
dd73147420 Fix safestack issues in bio.h
1e14bca233 Fix safestack issues in ess.h
0b28254015 Fix safestack issues in asn1t.h
9d01ac71a0 Fix safestack issues in ct.h
98c35dc48d Fix safestack issues in crmf.h
c5a5581127 Fix safestack issues in x509_vfy.h
22fbfe6a7d Fix safestack issues in srp.h
02199cc39d Fix safestack issues in pkcs7.h
fd3ed85c67 Fix safestack issues in ocsp.h
904e1f92b3 Fix safestack issues in cms.h
798f932980 Fix safestack issues in cmp.h
b4780134df Fix safestack issues in asn1.h
24c4ea958e Fix stacks of OPENSSL_STRING, OPENSSL_CSTRING and OPENSSL_BLOCK
e144fd36ce Fix safestack issues in x509v3.h
e6623cfbff Fix safestack issues in x509.h
6ac1cd10ba Fix safestack issues in ssl.h
08073700cc NonStop port updates for 3.0.0.
f0c62c5328 TEST: Add a test of EC key generation with encoding spec
655f73cecf EVP: Add the internal convenience function evp_keymgmt_util_export()
96bb4ff9b8 Fix EVP_PKEY_CTX_ctrl() documentation
33dd828d97 Update doc for EVP_PKEY_CTX_set_ec_param_enc()
7229a2f4ab EC: Reimplement EVP_PKEY_CTX_set_ec_param_enc() to support providers
4588f35b5a dev/release.sh: Rework to be smoother
35e6ea3bdc keygen: add FIPS error state management to conditional self tests
801ed9edba CRNGT: enter FIPS error state if the test fails
5736923f12 FIPS: error mode is set from failed self tests and produced a 
limited number of errors when algorithm accesses are attempted
f99d3eedf7 ciphers: add FIPS error state handling
422cbcee61 keymgmt: add FIPS error state handling
f590a5ea1a signature: add FIPS error state handling
ca94057fc3 exchange: add FIPS error state handling
2b9e4e956b kdf: add FIPS error state handling
5b104a81f0 mac: add FIPS error state handling
aef30ad0b6 rand: add FIPS error state handling
87fe138d35 asymciphers: add FIPS error state handling
1c1daab94c digests: add FIPS error state handling
6cf3730267 FIPS: rename the status call to is_running.
eab7b4240d provider: add an 'is_running' call to all providers.
5e8cd0a4f4 Fix coverity issue: CID 1466479 - Resource leak in apps/pkcs12.c
97f7a6d42e Fix coverity issue: CID 1466482 - Resource leak in 
OSSL_STORE_SEARCH_by_key_fingerprint()
9951eaf467 Fix coverity issue: CID 1466483 - Improper use of Negative value in 
dh_ctrl.c
0f0b7dfbe5 Fix coverity issue: CID 1466484 - Remove dead code in 
PKCS7_dataInit()
6e417f951c Fix coverity issue: CID 1466485 - Explicit NULL dereference in 
OSSL_STORE_find()
3481694946 Fix coverity issue: CID 1466486 - Resource leak in OSSL_STORE
c1aba0763c OSSL_DECODER 'decode' function must never be NULL.
c88f6f0e40 TEST: skip POSIX errcode zero in tesst/recipes/02-test_errstr.t
c9352933fe fuzz/test-corpus: check if PATH_MAX is already defined
64713cb10d apps/ca: allow CRL lastUpdate/nextUpdate fields to be specified
0e60ce6334 Improve robustness and performance of building Unix static libraries
5ea4c6e553 apps/cmp.c: Improve example given for -geninfo option (also in man 
page)
1cd77e2eca OSSL_CMP_CTX_new.pod: improve doc of 
OSSL_CMP_CTX_get1_{extraCertsIn,caPubs}
4d2b2889da openssl-cmp.pod.in: Update Insta Demo CA port number in case needed
62261446b2 apps/cmp.c: Improve user guidance on missing -subject etc. options
7a7d6b514f apps/cmp.c: Improve documentation of -extracerts, -untrusted, and 
-otherpass
ef2d3588e8 apps/cmp.c: Improve documentation of -secret, -cert, and -key options
82bdd64193 check_chain_extensions(): Require X.509 v3 if extensions are present
e41a2c4c60 check_chain_extensions(): Change exclusion condition w.r.t. RFC 6818 
section 2
d72c8b457b x509_vfy.c: Make sure that strict checks are not done for 
self-issued EE certs
bb377c8d6c check_chain_extensions(): Add check that CA cert includes key usage 
extension
da6c691d6d check_chain_extensions(): Add check that on empty Subject the SAN 
must be marked critical
89f13ca434 check_chain_extensions(): Add check that AKID and SKID are not 
marked critical
8a639b9d72 check_chain_extensions(): Add check that Basic Constraints of CA 
cert are marked critical
1e41dadfa7 Extend X509 cert checks and error reporting in v3_{purp,crld}.c and 
x509_{set,vfy}.c
b0a4cbead3 apps/cmp.c: 

Build failed: openssl master.36929

2020-09-15 Thread AppVeyor



Build openssl master.36929 failed


Commit 5b3b9cb92b by Shane Lontis on 9/15/2020 4:45 AM:

Fix ec keygen so that it passes the library context to SSL_SELF_TEST_get_callback().


Configure your notification preferences