Still Failing: openssl/openssl#28311 (master - a218770)

2019-09-14 Thread Travis CI
Build Update for openssl/openssl
-

Build: #28311
Status: Still Failing

Duration: 19 mins and 19 secs
Commit: a218770 (master)
Author: Pauli
Message: Fix examples in the section 7 KDF man pages.

All of the examples called EVP_KDF_set_params() when they should have been
calling EVP_KDF_CTX_set_params().

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/9898)

View the changeset: 
https://github.com/openssl/openssl/compare/f3f3318a25e6...a218770d4de8

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/585100312?utm_medium=notification&utm_source=email

--

You can unsubscribe from build emails from the openssl/openssl repository going 
to 
https://travis-ci.org/account/preferences/unsubscribe?repository=5849220&utm_medium=notification&utm_source=email.
Or unsubscribe from *all* email updating your settings at 
https://travis-ci.org/account/preferences/unsubscribe?utm_medium=notification&utm_source=email.
Or configure specific recipients for build notifications in your .travis.yml 
file. See https://docs.travis-ci.com/user/notifications.



[openssl] master update

2019-09-14 Thread Dr . Paul Dale
The branch master has been updated
   via  a218770d4de819afc9453284dc13b609eeea4639 (commit)
  from  f3f3318a25e62f471a69e1e8dd117bf30191da20 (commit)


- Log -
commit a218770d4de819afc9453284dc13b609eeea4639
Author: Pauli 
Date:   Sun Sep 15 09:44:14 2019 +1000

Fix examples in the section 7 KDF man pages.

All of the examples called EVP_KDF_set_params() when they should have been
calling EVP_KDF_CTX_set_params().

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/9898)

---

Summary of changes:
 doc/man7/EVP_KDF-HKDF.pod |  4 ++--
 doc/man7/EVP_KDF-SCRYPT.pod   |  4 ++--
 doc/man7/EVP_KDF-SS.pod   | 12 ++--
 doc/man7/EVP_KDF-SSHKDF.pod   |  2 +-
 doc/man7/EVP_KDF-TLS1_PRF.pod |  4 ++--
 doc/man7/EVP_KDF-X942.pod |  4 ++--
 doc/man7/EVP_KDF-X963.pod |  4 ++--
 7 files changed, 17 insertions(+), 17 deletions(-)

diff --git a/doc/man7/EVP_KDF-HKDF.pod b/doc/man7/EVP_KDF-HKDF.pod
index 746e7fb972..fb675b2d45 100644
--- a/doc/man7/EVP_KDF-HKDF.pod
+++ b/doc/man7/EVP_KDF-HKDF.pod
@@ -119,8 +119,8 @@ salt value "salt" and info value "label":
  *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SALT,
   "salt", (size_t)4);
  *p = OSSL_PARAM_construct_end();
- if (EVP_KDF_set_params(kctx, params) <= 0) {
- error("EVP_KDF_set_params");
+ if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
+ error("EVP_KDF_CTX_set_params");
  }
  if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
  error("EVP_KDF_derive");
diff --git a/doc/man7/EVP_KDF-SCRYPT.pod b/doc/man7/EVP_KDF-SCRYPT.pod
index ce22aaa7ca..dff8e15f39 100644
--- a/doc/man7/EVP_KDF-SCRYPT.pod
+++ b/doc/man7/EVP_KDF-SCRYPT.pod
@@ -93,8 +93,8 @@ This example derives a 64-byte long test vector using scrypt 
with the password
  *p++ = OSSL_PARAM_construct_uint32(OSSL_KDF_PARAM_SCRYPT_R, (uint32_t)8);
  *p++ = OSSL_PARAM_construct_uint32(OSSL_KDF_PARAM_SCRYPT_P, (uint32_t)16);
  *p = OSSL_PARAM_construct_end();
- if (EVP_KDF_set_params(kctx, params) <= 0) {
- error("EVP_KDF_set_params");
+ if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
+ error("EVP_KDF_CTX_set_params");
  }
  if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
  error("EVP_KDF_derive");
diff --git a/doc/man7/EVP_KDF-SS.pod b/doc/man7/EVP_KDF-SS.pod
index be69606701..be45d9e3c7 100644
--- a/doc/man7/EVP_KDF-SS.pod
+++ b/doc/man7/EVP_KDF-SS.pod
@@ -92,8 +92,8 @@ and fixedinfo value "label":
  *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_INFO,
   "label", (size_t)5);
  *p = OSSL_PARAM_construct_end();
- if (EVP_KDF_set_params(kctx, params) <= 0) {
- error("EVP_KDF_set_params");
+ if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
+ error("EVP_KDF_CTX_set_params");
  }
  if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
  error("EVP_KDF_derive");
@@ -124,8 +124,8 @@ fixedinfo value "label" and salt "salt":
  *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SALT,
   "salt", (size_t)4);
  *p = OSSL_PARAM_construct_end();
- if (EVP_KDF_set_params(kctx, params) <= 0) {
- error("EVP_KDF_set_params");
+ if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
+ error("EVP_KDF_CTX_set_params");
  }
  if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
  error("EVP_KDF_derive");
@@ -157,8 +157,8 @@ fixedinfo value "label", salt of "salt" and KMAC outlen of 
20:
   "salt", (size_t)4);
  *p++ = OSSL_PARAM_construct_size_t(OSSL_KDF_PARAM_MAC_SIZE, (size_t)20);
  *p = OSSL_PARAM_construct_end();
- if (EVP_KDF_set_params(kctx, params) <= 0) {
- error("EVP_KDF_set_params");
+ if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
+ error("EVP_KDF_CTX_set_params");
  }
  if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
  error("EVP_KDF_derive");
diff --git a/doc/man7/EVP_KDF-SSHKDF.pod b/doc/man7/EVP_KDF-SSHKDF.pod
index 0ed57626ef..cd05abe9dd 100644
--- a/doc/man7/EVP_KDF-SSHKDF.pod
+++ b/doc/man7/EVP_KDF-SSHKDF.pod
@@ -125,7 +125,7 @@ This example derives an 8 byte IV using SHA-256 with a 1K 
"key" and appropriate
  *p++ = OSSL_PARAM_construct_int(OSSL_KDF_PARAM_SSHKDF_TYPE,
  EVP_KDF_SSHKDF_TYPE_INITIAL_IV_CLI_TO_SRV);
  *p = OSSL_PARAM_construct_end();
- if (EVP_KDF_set_params(kctx, params) <= 0)
+ if (EVP_KDF_CTX_set_params(kctx, params) <= 0)
  /* Error */
 
  if (EVP_KDF_derive(kctx, out, &outlen) <= 0)
diff --git a/doc/man7/EVP_KDF-TLS1_PRF.pod b/doc/man7/EVP_KDF-TLS1_PRF.pod
index a04f811792..2adcf9f0aa 100644
--- a/doc/man7/EVP_KDF-TLS1_PRF.pod
+++ b/doc/man7/EVP_KDF-TLS1_PRF.pod
@@ -80,8 +80,8 @@ and seed value "seed":
  *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,
   "seed"

Still Failing: openssl/openssl#28305 (OpenSSL_1_1_1-stable - b8f2701)

2019-09-14 Thread Travis CI
Build Update for openssl/openssl
-

Build: #28305
Status: Still Failing

Duration: 13 mins and 26 secs
Commit: b8f2701 (OpenSSL_1_1_1-stable)
Author: Richard Levitte
Message: Do no mention private headers in public headers

Reviewed-by: Matthias St. Pierre 
(Merged from https://github.com/openssl/openssl/pull/9812)

(cherry picked from commit bd9faf117db1e53b2ad2ee9cbfe8def8c98ecb7b)

View the changeset: 
https://github.com/openssl/openssl/compare/32bfa2e66ef8...b8f2701c38cf

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/585065351?utm_medium=notification&utm_source=email

--

You can unsubscribe from build emails from the openssl/openssl repository going 
to 
https://travis-ci.org/account/preferences/unsubscribe?repository=5849220&utm_medium=notification&utm_source=email.
Or unsubscribe from *all* email updating your settings at 
https://travis-ci.org/account/preferences/unsubscribe?utm_medium=notification&utm_source=email.
Or configure specific recipients for build notifications in your .travis.yml 
file. See https://docs.travis-ci.com/user/notifications.



[openssl] OpenSSL_1_1_1-stable update

2019-09-14 Thread matthias . st . pierre
The branch OpenSSL_1_1_1-stable has been updated
   via  b8f2701c38cf07f364a9899dfc20c972a9dafaef (commit)
  from  32bfa2e66ef81d2bc7e1ae1896efca01d03cdc10 (commit)


- Log -
commit b8f2701c38cf07f364a9899dfc20c972a9dafaef
Author: Richard Levitte 
Date:   Mon Sep 9 02:41:26 2019 +0200

Do no mention private headers in public headers

Reviewed-by: Matthias St. Pierre 
(Merged from https://github.com/openssl/openssl/pull/9812)

(cherry picked from commit bd9faf117db1e53b2ad2ee9cbfe8def8c98ecb7b)

---

Summary of changes:
 include/openssl/ct.h| 2 --
 include/openssl/dtls1.h | 2 +-
 include/openssl/evp.h   | 2 +-
 3 files changed, 2 insertions(+), 4 deletions(-)

diff --git a/include/openssl/ct.h b/include/openssl/ct.h
index d4262fa048..ebdba34d67 100644
--- a/include/openssl/ct.h
+++ b/include/openssl/ct.h
@@ -463,8 +463,6 @@ __owur int CTLOG_STORE_load_file(CTLOG_STORE *store, const 
char *file);
 
 /*
  * Loads the default CT log list into a |store|.
- * See internal/cryptlib.h for the environment variable and file path that are
- * consulted to find the default file.
  * Returns 1 if loading is successful, or 0 otherwise.
  */
 __owur int CTLOG_STORE_load_default_file(CTLOG_STORE *store);
diff --git a/include/openssl/dtls1.h b/include/openssl/dtls1.h
index a312e386cf..d55ca9c332 100644
--- a/include/openssl/dtls1.h
+++ b/include/openssl/dtls1.h
@@ -43,7 +43,7 @@ extern "C" {
 
 # define DTLS1_AL_HEADER_LENGTH   2
 
-/* Timeout multipliers (timeout slice is defined in apps/timeouts.h */
+/* Timeout multipliers */
 # define DTLS1_TMO_READ_COUNT  2
 # define DTLS1_TMO_WRITE_COUNT 2
 
diff --git a/include/openssl/evp.h b/include/openssl/evp.h
index 545654a98b..8abcd8a8a3 100644
--- a/include/openssl/evp.h
+++ b/include/openssl/evp.h
@@ -180,7 +180,7 @@ int (*EVP_MD_meth_get_ctrl(const EVP_MD *md))(EVP_MD_CTX 
*ctx, int cmd,
  * if the following flag is set.
  */
 # define EVP_MD_CTX_FLAG_FINALISE0x0200
-/* NOTE: 0x0400 is reserved for internal usage in evp_int.h */
+/* NOTE: 0x0400 is reserved for internal usage */
 
 EVP_CIPHER *EVP_CIPHER_meth_new(int cipher_type, int block_size, int key_len);
 EVP_CIPHER *EVP_CIPHER_meth_dup(const EVP_CIPHER *cipher);


Build failed: openssl master.27732

2019-09-14 Thread AppVeyor



Build openssl master.27732 failed


Commit 1dac75a6de by Richard Levitte on 9/14/2019 2:45 PM:

apps/list.c: modify to handle multiple names per algorithm implementation


Configure your notification preferences



Still Failing: openssl/openssl#28298 (master - f3f3318)

2019-09-14 Thread Travis CI
Build Update for openssl/openssl
-

Build: #28298
Status: Still Failing

Duration: 22 mins and 5 secs
Commit: f3f3318 (master)
Author: Andreas Kretschmer
Message: fix CRMF symmetric key handling

Reviewed-by: Bernd Edlinger 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/9774)

View the changeset: 
https://github.com/openssl/openssl/compare/7b6b194b5281...f3f3318a25e6

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/584920185?utm_medium=notification&utm_source=email

--

You can unsubscribe from build emails from the openssl/openssl repository going 
to 
https://travis-ci.org/account/preferences/unsubscribe?repository=5849220&utm_medium=notification&utm_source=email.
Or unsubscribe from *all* email updating your settings at 
https://travis-ci.org/account/preferences/unsubscribe?utm_medium=notification&utm_source=email.
Or configure specific recipients for build notifications in your .travis.yml 
file. See https://docs.travis-ci.com/user/notifications.



[openssl] master update

2019-09-14 Thread Matt Caswell
The branch master has been updated
   via  f3f3318a25e62f471a69e1e8dd117bf30191da20 (commit)
  from  7b6b194b5281649ad5c50ecead0f3725d2d2a6a0 (commit)


- Log -
commit f3f3318a25e62f471a69e1e8dd117bf30191da20
Author: Andreas Kretschmer 
Date:   Thu Sep 5 13:21:03 2019 +0200

fix CRMF symmetric key handling

Reviewed-by: Bernd Edlinger 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/9774)

---

Summary of changes:
 crypto/crmf/crmf_lib.c | 39 ---
 1 file changed, 24 insertions(+), 15 deletions(-)

diff --git a/crypto/crmf/crmf_lib.c b/crypto/crmf/crmf_lib.c
index e519c50677..2974341446 100644
--- a/crypto/crmf/crmf_lib.c
+++ b/crypto/crmf/crmf_lib.c
@@ -29,6 +29,7 @@
 #include 
 
 #include "crmf_int.h"
+#include "internal/constant_time_locl.h"
 
 /* explicit #includes not strictly needed since implied by the above: */
 #include 
@@ -654,7 +655,9 @@ X509 
*OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert(OSSL_CRMF_ENCRYPTEDVALUE *ecert,
 X509 *cert = NULL; /* decrypted certificate */
 EVP_CIPHER_CTX *evp_ctx = NULL; /* context for symmetric encryption */
 unsigned char *ek = NULL; /* decrypted symmetric encryption key */
+size_t eksize = 0; /* size of decrypted symmetric encryption key */
 const EVP_CIPHER *cipher = NULL; /* used cipher */
+int cikeysize = 0; /* key size from cipher */
 unsigned char *iv = NULL; /* initial vector for symmetric encryption */
 unsigned char *outbuf = NULL; /* decryption output buffer */
 const unsigned char *p = NULL; /* needed for decoding ASN1 */
@@ -673,18 +676,31 @@ X509 
*OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert(OSSL_CRMF_ENCRYPTEDVALUE *ecert,
 CRMF_R_UNSUPPORTED_CIPHER);
 return NULL;
 }
-
+/* select symmetric cipher based on algorithm given in message */
+if ((cipher = EVP_get_cipherbynid(symmAlg)) == NULL) {
+CRMFerr(CRMF_F_OSSL_CRMF_ENCRYPTEDVALUE_GET1_ENCCERT,
+CRMF_R_UNSUPPORTED_CIPHER);
+goto end;
+}
+cikeysize = EVP_CIPHER_key_length(cipher);
 /* first the symmetric key needs to be decrypted */
 pkctx = EVP_PKEY_CTX_new(pkey, NULL);
 if (pkctx != NULL && EVP_PKEY_decrypt_init(pkctx)) {
 ASN1_BIT_STRING *encKey = ecert->encSymmKey;
-size_t eksize = 0;
+size_t failure;
+int retval;
 
-if (EVP_PKEY_decrypt(pkctx, NULL, &eksize, encKey->data, 
encKey->length)
-<= 0
-|| (ek = OPENSSL_malloc(eksize)) == NULL
-|| EVP_PKEY_decrypt(pkctx, ek, &eksize, encKey->data,
-encKey->length) <= 0) {
+if (EVP_PKEY_decrypt(pkctx, NULL, &eksize,
+ encKey->data, encKey->length) <= 0
+|| (ek = OPENSSL_malloc(eksize)) == NULL)
+goto oom;
+retval = EVP_PKEY_decrypt(pkctx, ek, &eksize,
+  encKey->data, encKey->length);
+ERR_clear_error(); /* error state may have sensitive information */
+failure = ~constant_time_is_zero_s(constant_time_msb(retval)
+   | constant_time_is_zero(retval));
+failure |= ~constant_time_eq_s(eksize, (size_t)cikeysize);
+if (failure) {
 CRMFerr(CRMF_F_OSSL_CRMF_ENCRYPTEDVALUE_GET1_ENCCERT,
 CRMF_R_ERROR_DECRYPTING_SYMMETRIC_KEY);
 goto end;
@@ -692,13 +708,6 @@ X509 
*OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert(OSSL_CRMF_ENCRYPTEDVALUE *ecert,
 } else {
 goto oom;
 }
-
-/* select symmetric cipher based on algorithm given in message */
-if ((cipher = EVP_get_cipherbynid(symmAlg)) == NULL) {
-CRMFerr(CRMF_F_OSSL_CRMF_ENCRYPTEDVALUE_GET1_ENCCERT,
-CRMF_R_UNSUPPORTED_CIPHER);
-goto end;
-}
 if ((iv = OPENSSL_malloc(EVP_CIPHER_iv_length(cipher))) == NULL)
 goto oom;
 if (ASN1_TYPE_get_octetstring(ecert->symmAlg->parameter, iv,
@@ -743,7 +752,7 @@ X509 
*OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert(OSSL_CRMF_ENCRYPTEDVALUE *ecert,
 EVP_PKEY_CTX_free(pkctx);
 OPENSSL_free(outbuf);
 EVP_CIPHER_CTX_free(evp_ctx);
-OPENSSL_free(ek);
+OPENSSL_clear_free(ek, eksize);
 OPENSSL_free(iv);
 return cert;
 }