Build completed: openssl master.36530

2020-08-31 Thread AppVeyor


Build openssl master.36530 completed



Commit 5feed4d6aa by Shane Lontis on 9/1/2020 2:45 AM:

Fix fipsinstall module path


Configure your notification preferences



Build failed: openssl master.36529

2020-08-31 Thread AppVeyor



Build openssl master.36529 failed


Commit ed285d6267 by Todd Short on 8/31/2020 11:59 PM:

Fix use of OPENSSL_realloc in provider


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d enable-fuzz-afl no-shared no-module

2020-08-31 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=afl-clang-fast ../openssl/config -d enable-fuzz-afl no-shared no-module

Commit log since last time:

458cb85d19 Fix ECX serializer import calls to use correct selection flags.
d9cdfda24f Fix RSA serializer import calls to use correct selection flags.
81fca0e7c1 Fix DSA serializer import calls to use correct selection flags.
3fab56631f Fix DH serializer import calls to use correct selection flags.
835b290016 Fix PKCS#7 so that it still works with non fetchable cipher 
algorithms.
bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest 
algorithms.
8e32ea633f Check whether we have MD5-SHA1 and whether we need it
7cd1420b3e Improve some error messages if a digest is not available
e3bf65da88 Include "legacy" in the name of the various MAC bridge functions
52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface
2ef9a7ac5e Improve code reuse in the provider MAC bridge
2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function
e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test
2cf765e5a2 Delete unused PKEY MAC files
a540ef90f5 Extend the provider MAC bridge for CMAC
4db71d0175 Extend the provider MAC bridge for Poly1305
8014b2a966 Don't require a default digest from signature algorithms
b27b31b628 Extend the provider MAC bridge for SIPHASH
6f0bd6ca1c Ensure libssl creates libctx aware MAC keys
ada0670bf6 Fix some EVP_MD_CTX_* functions
5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function
1bf625040c Fix evp_extra_test to not assume that HMAC is legacy
b571e662cd Make the provider side EVP PKEY MAC bridge available in default and 
fips
409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider 
bridge
e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider 
bridge
bddfea0271 TEST: Adapt some tests for a stricter 
PEM_write_bio_PrivateKey_traditional()
87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8
b6ef3c7089 Correct description of BN_mask_bits
33855c0af6 conf: add diagnostic option
3d94185718 provider_conf: report missing section on error
cd84d8832d Ignore vendor name in Clang version number.
4516bf7422 rand: instantiate the DRBGs upon first use.
edd53e9135 rand: add a note about a potentially misleading code analyzer 
warning.
1d6c86709c apps/pkcs12.c: Add -untrusted option
77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management
0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify()
fcc3a5204c apps: -msg flag enhancement 2/2
50c911b0c5 apps: -msg flag enhancement 1/2
625679b6d7 EVP: NULL pctx pointer after free.

Build log ended with (last 100 lines):

../../../../../enable-fuzz-afl/util/wrap.pl 
../../../../../enable-fuzz-afl/apps/openssl cmp -config ../Mock/test.cnf 
-section 'Mock credentials' -proxy '' -no_proxy 127.0.0.1 -cert "" -key "" 
-keypass "" -unprotected_requests => 0
not ok 38 - unprotected request
# --
#   Failed test 'unprotected request'
#   at ../openssl/test/recipes/81-test_cmp_cli.t line 184.
# Looks like you failed 3 tests of 38.
not ok 5 - CMP app CLI Mock credentials
# --
OPENSSL_FUNC:../openssl/apps/cmp.c:2951:CMP info: received from 127.0.0.1 
PKIStatus: accepted 
# OPENSSL_FUNC:../openssl/apps/cmp.c:2728:CMP info: using OpenSSL configuration 
file '../Mock/test.cnf'
# OPENSSL_FUNC:../openssl/apps/cmp.c:2337:CMP warning: argument of -proxy 
option is empty string, resetting option
# OPENSSL_FUNC:../openssl/apps/cmp.c:2063:CMP info: will contact 
http://127.0.0.1:1700/pkix/
# send_receive_check:../openssl/crypto/cmp/cmp_client.c:172:CMP info: sending IR
# send_receive_check:../openssl/crypto/cmp/cmp_client.c:190:CMP info: received 
IP
# send_receive_check:../openssl/crypto/cmp/cmp_client.c:172:CMP info: sending 
CERTCONF
# send_receive_check:../openssl/crypto/cmp/cmp_client.c:190:CMP info: received 
PKICONF
# OPENSSL_FUNC:../openssl/apps/cmp.c:2107:CMP info: received 1 enrolled 
certificate(s), saving to file 'test.cert.pem'
../../../../../enable-fuzz-afl/util/wrap.pl 
../../../../../enable-fuzz-afl/apps/openssl cmp -config ../Mock/test.cnf 
-section 'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd ir -newkey 
new.key -newkeypass 'pass:' -popo 0 -certout test.cert.pem -out_trusted 
root.crt => 0
not ok 43 - popo RAVERIFIED
# --
OPENSSL_FUNC:../openssl/apps/cmp.c:2951:CMP info: received from 127.0.0.1 
PKIStatus: accepted 
# OPENSSL_FUNC:../openssl/apps/cmp.c:2728:CMP info: using OpenSSL configuration 
file '../Mock/test.cnf'
# OPENSSL_FUNC:../openssl/apps/cmp.c:2337:CMP warning: argument of -proxy 
option is empty string, resetting option
# 

Build failed: openssl master.36521

2020-08-31 Thread AppVeyor



Build openssl master.36521 failed


Commit 673ff7f801 by Todd Short on 4/5/2019 6:17 PM:

Optimize session cache flushing


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-ui-console

2020-08-31 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-ui-console

Commit log since last time:

458cb85d19 Fix ECX serializer import calls to use correct selection flags.
d9cdfda24f Fix RSA serializer import calls to use correct selection flags.
81fca0e7c1 Fix DSA serializer import calls to use correct selection flags.
3fab56631f Fix DH serializer import calls to use correct selection flags.
835b290016 Fix PKCS#7 so that it still works with non fetchable cipher 
algorithms.
bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest 
algorithms.
8e32ea633f Check whether we have MD5-SHA1 and whether we need it
7cd1420b3e Improve some error messages if a digest is not available
e3bf65da88 Include "legacy" in the name of the various MAC bridge functions
52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface
2ef9a7ac5e Improve code reuse in the provider MAC bridge
2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function
e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test
2cf765e5a2 Delete unused PKEY MAC files
a540ef90f5 Extend the provider MAC bridge for CMAC
4db71d0175 Extend the provider MAC bridge for Poly1305
8014b2a966 Don't require a default digest from signature algorithms
b27b31b628 Extend the provider MAC bridge for SIPHASH
6f0bd6ca1c Ensure libssl creates libctx aware MAC keys
ada0670bf6 Fix some EVP_MD_CTX_* functions
5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function
1bf625040c Fix evp_extra_test to not assume that HMAC is legacy
b571e662cd Make the provider side EVP PKEY MAC bridge available in default and 
fips
409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider 
bridge
e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider 
bridge
bddfea0271 TEST: Adapt some tests for a stricter 
PEM_write_bio_PrivateKey_traditional()
87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8
b6ef3c7089 Correct description of BN_mask_bits
33855c0af6 conf: add diagnostic option
3d94185718 provider_conf: report missing section on error
cd84d8832d Ignore vendor name in Clang version number.
4516bf7422 rand: instantiate the DRBGs upon first use.
edd53e9135 rand: add a note about a potentially misleading code analyzer 
warning.
1d6c86709c apps/pkcs12.c: Add -untrusted option
77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management
0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify()
fcc3a5204c apps: -msg flag enhancement 2/2
50c911b0c5 apps: -msg flag enhancement 1/2
625679b6d7 EVP: NULL pctx pointer after free.

Build log ended with (last 100 lines):

#   Failed test 'p10cr csr empty file'
#   at ../openssl/test/recipes/81-test_cmp_cli.t line 184.
../../../../../no-ui-console/util/wrap.pl 
../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf -section 
'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd p10cr -newkey new.key 
-newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt -csr 
wrong.csr.pem => 139
not ok 78 - p10cr wrong csr
# --
#   Failed test 'p10cr wrong csr'
#   at ../openssl/test/recipes/81-test_cmp_cli.t line 184.
../../../../../no-ui-console/util/wrap.pl 
../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf -section 
'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd ir -newkey new.key 
-newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt -revreason 5 
=> 139
not ok 79 - ir + ignored revocation
# --
../../../../../no-ui-console/util/wrap.pl 
../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf -section 
'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd cr -newkey new.key 
-newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt => 139
not ok 82 - cr command
# --
#   Failed test 'cr command'
#   at ../openssl/test/recipes/81-test_cmp_cli.t line 184.
../../../../../no-ui-console/util/wrap.pl 
../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf -section 
'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd kur -newkey new.key 
-newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt -oldcert 
test.cert.pem -server '127.0.0.1:1700' -cert test.cert.pem -key new.key 
-extracerts issuing.crt => 139
not ok 83 - kur command explicit options
# --
#   Failed test 'kur command explicit options'
#   at ../openssl/test/recipes/81-test_cmp_cli.t line 184.
../../../../../no-ui-console/util/wrap.pl 
../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf 

Build completed: openssl OpenSSL_1_1_1-stable.36515

2020-08-31 Thread AppVeyor


Build openssl OpenSSL_1_1_1-stable.36515 completed



Commit e503f5c7d9 by Rutger Hendriks on 8/31/2020 12:38 PM:

CLA: trivial


Configure your notification preferences



Build failed: openssl master.36514

2020-08-31 Thread AppVeyor



Build openssl master.36514 failed


Commit 4de7050059 by Shane Lontis on 8/31/2020 10:08 AM:

fixup! Add RSASVE from SP800-56Br2


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-err

2020-08-31 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-err

Commit log since last time:

458cb85d19 Fix ECX serializer import calls to use correct selection flags.
d9cdfda24f Fix RSA serializer import calls to use correct selection flags.
81fca0e7c1 Fix DSA serializer import calls to use correct selection flags.
3fab56631f Fix DH serializer import calls to use correct selection flags.
835b290016 Fix PKCS#7 so that it still works with non fetchable cipher 
algorithms.
bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest 
algorithms.
8e32ea633f Check whether we have MD5-SHA1 and whether we need it
7cd1420b3e Improve some error messages if a digest is not available
e3bf65da88 Include "legacy" in the name of the various MAC bridge functions
52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface
2ef9a7ac5e Improve code reuse in the provider MAC bridge
2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function
e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test
2cf765e5a2 Delete unused PKEY MAC files
a540ef90f5 Extend the provider MAC bridge for CMAC
4db71d0175 Extend the provider MAC bridge for Poly1305
8014b2a966 Don't require a default digest from signature algorithms
b27b31b628 Extend the provider MAC bridge for SIPHASH
6f0bd6ca1c Ensure libssl creates libctx aware MAC keys
ada0670bf6 Fix some EVP_MD_CTX_* functions
5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function
1bf625040c Fix evp_extra_test to not assume that HMAC is legacy
b571e662cd Make the provider side EVP PKEY MAC bridge available in default and 
fips
409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider 
bridge
e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider 
bridge
bddfea0271 TEST: Adapt some tests for a stricter 
PEM_write_bio_PrivateKey_traditional()
87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8
b6ef3c7089 Correct description of BN_mask_bits
33855c0af6 conf: add diagnostic option
3d94185718 provider_conf: report missing section on error
cd84d8832d Ignore vendor name in Clang version number.
4516bf7422 rand: instantiate the DRBGs upon first use.
edd53e9135 rand: add a note about a potentially misleading code analyzer 
warning.
1d6c86709c apps/pkcs12.c: Add -untrusted option
77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management
0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify()
fcc3a5204c apps: -msg flag enhancement 2/2
50c911b0c5 apps: -msg flag enhancement 1/2
625679b6d7 EVP: NULL pctx pointer after free.

Build log ended with (last 100 lines):

65-test_cmp_status.t ... ok
65-test_cmp_vfy.t .. ok
70-test_asyncio.t .. ok
70-test_bad_dtls.t . ok
70-test_clienthello.t .. ok
70-test_comp.t . ok
70-test_key_share.t  ok
70-test_packet.t ... ok
70-test_recordlen.t  ok
70-test_renegotiation.t  ok
70-test_servername.t ... ok
70-test_sslcbcpadding.t  ok
70-test_sslcertstatus.t  ok
70-test_sslextension.t . ok
70-test_sslmessages.t .. ok
70-test_sslrecords.t ... ok
70-test_sslsessiontick.t ... ok
70-test_sslsigalgs.t ... ok
70-test_sslsignature.t . ok
70-test_sslskewith0p.t . ok
70-test_sslversions.t .. ok
70-test_sslvertol.t  ok
70-test_tls13alerts.t .. ok
70-test_tls13cookie.t .. ok
70-test_tls13downgrade.t ... ok
70-test_tls13hrr.t . ok
70-test_tls13kexmodes.t  ok
70-test_tls13messages.t  ok
70-test_tls13psk.t . ok
70-test_tlsextms.t . ok
70-test_verify_extra.t . ok
70-test_wpacket.t .. ok
71-test_ssl_ctx.t .. ok
80-test_ca.t ... ok
80-test_cipherbytes.t .. ok
80-test_cipherlist.t ... ok
80-test_ciphername.t ... ok

# 80-test_cms.t .. ok
80-test_cmsapi.t ... ok
80-test_ct.t ... ok
80-test_dane.t . ok
80-test_dtls.t . ok
80-test_dtls_mtu.t . ok
80-test_dtlsv1listen.t . ok
80-test_http.t . ok
80-test_ocsp.t . ok
80-test_pkcs12.t ... ok
80-test_ssl_new.t .. ok
80-test_ssl_old.t .. ok
80-test_ssl_test_ctx.t . ok
80-test_sslcorrupt.t ... ok
80-test_tsa.t .. ok
80-test_x509aux.t .. ok

# 81-test_cmp_cli.t .. ok
90-test_asn1_time.t  ok
90-test_async.t 

Still Failing: openssl/openssl#37052 (master - 72c1e37)

2020-08-31 Thread Travis CI
Build Update for openssl/openssl
-

Build: #37052
Status: Still Failing

Duration: 1 hr, 24 mins, and 55 secs
Commit: 72c1e37 (master)
Author: John Baldwin
Message: Use global 'libctx' with RAND_bytes_ex to generate sendfile temp data.

While here, check for failure from RAND_bytes_ex as well.

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/12111)

View the changeset: 
https://github.com/openssl/openssl/compare/23e77b0ba328...72c1e37421ff

View the full build log and details: 
https://travis-ci.com/github/openssl/openssl/builds/182040680?utm_medium=notification_source=email


--

You can unsubscribe from build emails from the openssl/openssl repository going 
to 
https://travis-ci.com/account/preferences/unsubscribe?repository=13885459_medium=notification_source=email.
Or unsubscribe from *all* email updating your settings at 
https://travis-ci.com/account/preferences/unsubscribe?utm_medium=notification_source=email.
Or configure specific recipients for build notifications in your .travis.yml 
file. See https://docs.travis-ci.com/user/notifications.



[openssl] master update

2020-08-31 Thread Matt Caswell
The branch master has been updated
   via  72c1e37421ffe9a4db4bba46f3d736dbc227c255 (commit)
   via  ab114c6ddef52384c3c5d579847b989284f51dfc (commit)
   via  18efb630169a5c2c58a77b0b67fc707a87cb8b93 (commit)
   via  cd03b5dc428568548163890081da99b6e5df11ba (commit)
   via  eb818d23c2f451ed56030d9e9fb94bd60ec48b07 (commit)
   via  c7b46b549d59797c3f1ea6541f8ff6f02009cbc5 (commit)
   via  b22a3ccc07e304df8fdbc79bf4168c1a880d0ac5 (commit)
   via  3c1641e8e86dc86028637251421a57827243f6ca (commit)
   via  0a90a90c4626dab3b6931e6a1e0bba9419720146 (commit)
   via  3e5826061baa7948ab1d2835357403d16470108d (commit)
   via  c34ca13a60f2acb4509be0aec9f506853ffbd1ea (commit)
  from  23e77b0ba328afe3492d990cd24f7b8896b4246f (commit)


- Log -
commit 72c1e37421ffe9a4db4bba46f3d736dbc227c255
Author: John Baldwin 
Date:   Wed Aug 5 16:24:24 2020 -0700

Use global 'libctx' with RAND_bytes_ex to generate sendfile temp data.

While here, check for failure from RAND_bytes_ex as well.

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/12111)

commit ab114c6ddef52384c3c5d579847b989284f51dfc
Author: Vadim Fedorenko 
Date:   Fri Jul 31 11:21:36 2020 -0700

Fix two issues with AES-CCM KTLS tests.

- Apply the cipher list to the server context as well as the client
  context.  The tests still worked for AES-GCM cipher suites as those
  are in the default list of ciphers.  AES-CCM cipher suites are not
  in the default list and require the cipher list to be set.

- Use the correct cipher name for AES-CCM.

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/12111)

commit 18efb630169a5c2c58a77b0b67fc707a87cb8b93
Author: John Baldwin 
Date:   Wed Jul 29 15:08:54 2020 -0700

Skip tests using KTLS RX for TLS 1.3.

KTLS RX is not yet supported for TLS 1.3.

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/12111)

commit cd03b5dc428568548163890081da99b6e5df11ba
Author: John Baldwin 
Date:   Wed Jul 29 15:08:25 2020 -0700

Skip tests using KTLS RX if KTLS RX is not supported.

This skips tests using KTLS RX when run on systems that only support
KTLS TX.

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/12111)

commit eb818d23c2f451ed56030d9e9fb94bd60ec48b07
Author: John Baldwin 
Date:   Wed Jul 29 14:56:58 2020 -0700

Refactor the KTLS tests to minimize code duplication.

Use the low 4 bits of the test number directly as flags for which of
the connection sides should use KTLS or not for each test instead of
having 16 nearly identical functions to do the same thing.

This makes it easier to skip tests that aren't supported (e.g. KTLS RX
on TLS 1.3).

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/12111)

commit c7b46b549d59797c3f1ea6541f8ff6f02009cbc5
Author: John Baldwin 
Date:   Mon Jul 27 11:35:13 2020 -0700

Move KTLS inline functions only used by libssl into ssl/ktls.c.

These functions are a bit large to inline and are not usable outside
of libssl.

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/12111)

commit b22a3ccc07e304df8fdbc79bf4168c1a880d0ac5
Author: John Baldwin 
Date:   Wed Dec 4 16:50:06 2019 -0800

Support for KTLS TX on FreeBSD for TLS 1.3.

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/12111)

commit 3c1641e8e86dc86028637251421a57827243f6ca
Author: John Baldwin 
Date:   Thu Mar 5 11:26:06 2020 -0800

Don't check errno if ktls_read_record() returned 0.

errno is only valid if ktls_read_record() fails with a negative return
value.

Reviewed-by: Tomas Mraz 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/12111)

commit 0a90a90c4626dab3b6931e6a1e0bba9419720146
Author: John Baldwin 
Date:   Thu Oct 31 16:49:40 2019 -0700

Add support for KTLS receive for TLS 1.1-1.2 on FreeBSD.

Similar to KTLS receive for Linux, KTLS receive for FreeBSD is enabled
by passing a session key to the kernel via a new socket option.  Once
KTLS receive is enabled on a socket, the socket returns records via
recvmsg().  A control message attached to each record supplies the
original TLS header, and the decrypted plaintext is returned in the
data buffer passed to recvmsg().

To support the case that the userland buffer may already contain
pending encrypted records (which is already handled by Linux's KTLS

Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-dgram

2020-08-31 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-dgram

Commit log since last time:

458cb85d19 Fix ECX serializer import calls to use correct selection flags.
d9cdfda24f Fix RSA serializer import calls to use correct selection flags.
81fca0e7c1 Fix DSA serializer import calls to use correct selection flags.
3fab56631f Fix DH serializer import calls to use correct selection flags.
835b290016 Fix PKCS#7 so that it still works with non fetchable cipher 
algorithms.
bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest 
algorithms.
8e32ea633f Check whether we have MD5-SHA1 and whether we need it
7cd1420b3e Improve some error messages if a digest is not available
e3bf65da88 Include "legacy" in the name of the various MAC bridge functions
52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface
2ef9a7ac5e Improve code reuse in the provider MAC bridge
2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function
e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test
2cf765e5a2 Delete unused PKEY MAC files
a540ef90f5 Extend the provider MAC bridge for CMAC
4db71d0175 Extend the provider MAC bridge for Poly1305
8014b2a966 Don't require a default digest from signature algorithms
b27b31b628 Extend the provider MAC bridge for SIPHASH
6f0bd6ca1c Ensure libssl creates libctx aware MAC keys
ada0670bf6 Fix some EVP_MD_CTX_* functions
5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function
1bf625040c Fix evp_extra_test to not assume that HMAC is legacy
b571e662cd Make the provider side EVP PKEY MAC bridge available in default and 
fips
409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider 
bridge
e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider 
bridge
bddfea0271 TEST: Adapt some tests for a stricter 
PEM_write_bio_PrivateKey_traditional()
87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8
b6ef3c7089 Correct description of BN_mask_bits
33855c0af6 conf: add diagnostic option
3d94185718 provider_conf: report missing section on error
cd84d8832d Ignore vendor name in Clang version number.
4516bf7422 rand: instantiate the DRBGs upon first use.
edd53e9135 rand: add a note about a potentially misleading code analyzer 
warning.
1d6c86709c apps/pkcs12.c: Add -untrusted option
77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management
0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify()
fcc3a5204c apps: -msg flag enhancement 2/2
50c911b0c5 apps: -msg flag enhancement 1/2
625679b6d7 EVP: NULL pctx pointer after free.

Build log ended with (last 100 lines):


# 80-test_cms.t .. ok
80-test_cmsapi.t ... ok
80-test_ct.t ... ok
80-test_dane.t . ok
80-test_dtls.t . skipped: No DTLS protocols are supported 
by this OpenSSL build
80-test_dtls_mtu.t . skipped: test_dtls_mtu needs DTLS and PSK 
support enabled
80-test_dtlsv1listen.t . ok
80-test_http.t . ok
80-test_ocsp.t . ok
80-test_pkcs12.t ... ok

# ERROR: (ptr) 'server_ctx != NULL' failed @ 
../openssl/test/ssl_test.c:479
# 0x0
not ok 7 - iteration 7
# --
# ERROR: (ptr) 'server_ctx != NULL' failed @ 
../openssl/test/ssl_test.c:479
# 0x0
not ok 8 - iteration 8
# --
# ERROR: (ptr) 'server_ctx != NULL' failed @ 
../openssl/test/ssl_test.c:479
# 0x0
not ok 9 - iteration 9
# --
# ERROR: (ptr) 'server_ctx != NULL' failed @ 
../openssl/test/ssl_test.c:479
# 0x0
not ok 10 - iteration 10
# --
# ERROR: (ptr) 'server_ctx != NULL' failed @ 
../openssl/test/ssl_test.c:479
# 0x0
not ok 11 - iteration 11
# --
# ERROR: (ptr) 'server_ctx != NULL' failed @ 
../openssl/test/ssl_test.c:479
# 0x0
not ok 12 - iteration 12
# --
not ok 1 - test_handshake
# --
../../util/wrap.pl ../../test/ssl_test 04-client_auth.cnf.fips fips 
../../../openssl/test/fips.cnf => 1
not ok 9 - running ssl_test 04-client_auth.cnf
# --
#   

Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-des

2020-08-31 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-des

Commit log since last time:

458cb85d19 Fix ECX serializer import calls to use correct selection flags.
d9cdfda24f Fix RSA serializer import calls to use correct selection flags.
81fca0e7c1 Fix DSA serializer import calls to use correct selection flags.
3fab56631f Fix DH serializer import calls to use correct selection flags.
835b290016 Fix PKCS#7 so that it still works with non fetchable cipher 
algorithms.
bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest 
algorithms.
8e32ea633f Check whether we have MD5-SHA1 and whether we need it
7cd1420b3e Improve some error messages if a digest is not available
e3bf65da88 Include "legacy" in the name of the various MAC bridge functions
52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface
2ef9a7ac5e Improve code reuse in the provider MAC bridge
2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function
e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test
2cf765e5a2 Delete unused PKEY MAC files
a540ef90f5 Extend the provider MAC bridge for CMAC
4db71d0175 Extend the provider MAC bridge for Poly1305
8014b2a966 Don't require a default digest from signature algorithms
b27b31b628 Extend the provider MAC bridge for SIPHASH
6f0bd6ca1c Ensure libssl creates libctx aware MAC keys
ada0670bf6 Fix some EVP_MD_CTX_* functions
5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function
1bf625040c Fix evp_extra_test to not assume that HMAC is legacy
b571e662cd Make the provider side EVP PKEY MAC bridge available in default and 
fips
409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider 
bridge
e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider 
bridge
bddfea0271 TEST: Adapt some tests for a stricter 
PEM_write_bio_PrivateKey_traditional()
87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8
b6ef3c7089 Correct description of BN_mask_bits
33855c0af6 conf: add diagnostic option
3d94185718 provider_conf: report missing section on error
cd84d8832d Ignore vendor name in Clang version number.
4516bf7422 rand: instantiate the DRBGs upon first use.
edd53e9135 rand: add a note about a potentially misleading code analyzer 
warning.
1d6c86709c apps/pkcs12.c: Add -untrusted option
77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management
0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify()
fcc3a5204c apps: -msg flag enhancement 2/2
50c911b0c5 apps: -msg flag enhancement 1/2
625679b6d7 EVP: NULL pctx pointer after free.

Build log ended with (last 100 lines):

../../../../../no-des/util/wrap.pl ../../../../../no-des/apps/openssl cmp 
-config ../Mock/test.cnf -section 'Mock enrollment' -proxy '' -no_proxy 
127.0.0.1 -cmd ir -newkey new.key -newkeypass 'pass:' -certout test.cert.pem 
-out_trusted root.crt -revreason 5 => 1
not ok 79 - ir + ignored revocation
# --
Could not read any key of private key for CMP client certificate from signer.p12
C060D810787F:error::digital envelope routines:EVP_PBE_CipherInit:unknown 
cipher:../openssl/crypto/evp/evp_pbe.c:116:
C060D810787F:error::PKCS12 routines:PKCS12_pbe_crypt:pkcs12 algor 
cipherinit error:../openssl/crypto/pkcs12/p12_decr.c:37:
C060D810787F:error::PKCS12 routines:PKCS12_item_decrypt_d2i:pkcs12 pbe 
crypt error:../openssl/crypto/pkcs12/p12_decr.c:90:
C060D810787F:error::PKCS12 routines:PKCS12_parse:parse 
error:../openssl/crypto/pkcs12/p12_kiss.c:87:
Unable to load private key for CMP client certificate
OPENSSL_FUNC:../openssl/apps/cmp.c:2885:CMP error: cannot set up CMP context
# OPENSSL_FUNC:../openssl/apps/cmp.c:2728:CMP info: using OpenSSL configuration 
file '../Mock/test.cnf'
# OPENSSL_FUNC:../openssl/apps/cmp.c:2337:CMP warning: argument of -proxy 
option is empty string, resetting option
../../../../../no-des/util/wrap.pl ../../../../../no-des/apps/openssl cmp 
-config ../Mock/test.cnf -section 'Mock enrollment' -proxy '' -no_proxy 
127.0.0.1 -cmd cr -newkey new.key -newkeypass 'pass:' -certout test.cert.pem 
-out_trusted root.crt => 1
not ok 82 - cr command
# --
#   Failed test 'cr command'
#   at ../openssl/test/recipes/81-test_cmp_cli.t line 184.
Could not open file or uri test.cert.pem for loading CMP client certificate 
(and optionally extra certs)
Could not read any cert of CMP client certificate (and optionally extra certs) 
from test.cert.pem
C0408467B77F:error::system library:file_open_with_libctx:No such file or 
directory:../openssl/crypto/store/loader_file.c:935:calling stat(test.cert.pem)
OPENSSL_FUNC:../openssl/apps/cmp.c:2885:CMP error: cannot set up CMP context
# 

Still Failing: openssl/openssl#37047 (master - 23e77b0)

2020-08-31 Thread Travis CI
Build Update for openssl/openssl
-

Build: #37047
Status: Still Failing

Duration: 1 hr, 23 mins, and 31 secs
Commit: 23e77b0 (master)
Author: Jon Spillett
Message: Update test data for DSA public key text

Reviewed-by: Matt Caswell 
Reviewed-by: Shane Lontis 
(Merged from https://github.com/openssl/openssl/pull/12688)

View the changeset: 
https://github.com/openssl/openssl/compare/458cb85d1985...23e77b0ba328

View the full build log and details: 
https://travis-ci.com/github/openssl/openssl/builds/182009783?utm_medium=notification_source=email


--

You can unsubscribe from build emails from the openssl/openssl repository going 
to 
https://travis-ci.com/account/preferences/unsubscribe?repository=13885459_medium=notification_source=email.
Or unsubscribe from *all* email updating your settings at 
https://travis-ci.com/account/preferences/unsubscribe?utm_medium=notification_source=email.
Or configure specific recipients for build notifications in your .travis.yml 
file. See https://docs.travis-ci.com/user/notifications.