Build completed: openssl master.36530
Build openssl master.36530 completed Commit 5feed4d6aa by Shane Lontis on 9/1/2020 2:45 AM: Fix fipsinstall module path Configure your notification preferences
Build failed: openssl master.36529
Build openssl master.36529 failed Commit ed285d6267 by Todd Short on 8/31/2020 11:59 PM: Fix use of OPENSSL_realloc in provider Configure your notification preferences
Still FAILED build of OpenSSL branch master with options -d enable-fuzz-afl no-shared no-module
Platform and configuration command: $ uname -a Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux $ CC=afl-clang-fast ../openssl/config -d enable-fuzz-afl no-shared no-module Commit log since last time: 458cb85d19 Fix ECX serializer import calls to use correct selection flags. d9cdfda24f Fix RSA serializer import calls to use correct selection flags. 81fca0e7c1 Fix DSA serializer import calls to use correct selection flags. 3fab56631f Fix DH serializer import calls to use correct selection flags. 835b290016 Fix PKCS#7 so that it still works with non fetchable cipher algorithms. bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest algorithms. 8e32ea633f Check whether we have MD5-SHA1 and whether we need it 7cd1420b3e Improve some error messages if a digest is not available e3bf65da88 Include "legacy" in the name of the various MAC bridge functions 52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface 2ef9a7ac5e Improve code reuse in the provider MAC bridge 2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test 2cf765e5a2 Delete unused PKEY MAC files a540ef90f5 Extend the provider MAC bridge for CMAC 4db71d0175 Extend the provider MAC bridge for Poly1305 8014b2a966 Don't require a default digest from signature algorithms b27b31b628 Extend the provider MAC bridge for SIPHASH 6f0bd6ca1c Ensure libssl creates libctx aware MAC keys ada0670bf6 Fix some EVP_MD_CTX_* functions 5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function 1bf625040c Fix evp_extra_test to not assume that HMAC is legacy b571e662cd Make the provider side EVP PKEY MAC bridge available in default and fips 409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider bridge e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider bridge bddfea0271 TEST: Adapt some tests for a stricter PEM_write_bio_PrivateKey_traditional() 87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8 b6ef3c7089 Correct description of BN_mask_bits 33855c0af6 conf: add diagnostic option 3d94185718 provider_conf: report missing section on error cd84d8832d Ignore vendor name in Clang version number. 4516bf7422 rand: instantiate the DRBGs upon first use. edd53e9135 rand: add a note about a potentially misleading code analyzer warning. 1d6c86709c apps/pkcs12.c: Add -untrusted option 77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management 0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify() fcc3a5204c apps: -msg flag enhancement 2/2 50c911b0c5 apps: -msg flag enhancement 1/2 625679b6d7 EVP: NULL pctx pointer after free. Build log ended with (last 100 lines): ../../../../../enable-fuzz-afl/util/wrap.pl ../../../../../enable-fuzz-afl/apps/openssl cmp -config ../Mock/test.cnf -section 'Mock credentials' -proxy '' -no_proxy 127.0.0.1 -cert "" -key "" -keypass "" -unprotected_requests => 0 not ok 38 - unprotected request # -- # Failed test 'unprotected request' # at ../openssl/test/recipes/81-test_cmp_cli.t line 184. # Looks like you failed 3 tests of 38. not ok 5 - CMP app CLI Mock credentials # -- OPENSSL_FUNC:../openssl/apps/cmp.c:2951:CMP info: received from 127.0.0.1 PKIStatus: accepted # OPENSSL_FUNC:../openssl/apps/cmp.c:2728:CMP info: using OpenSSL configuration file '../Mock/test.cnf' # OPENSSL_FUNC:../openssl/apps/cmp.c:2337:CMP warning: argument of -proxy option is empty string, resetting option # OPENSSL_FUNC:../openssl/apps/cmp.c:2063:CMP info: will contact http://127.0.0.1:1700/pkix/ # send_receive_check:../openssl/crypto/cmp/cmp_client.c:172:CMP info: sending IR # send_receive_check:../openssl/crypto/cmp/cmp_client.c:190:CMP info: received IP # send_receive_check:../openssl/crypto/cmp/cmp_client.c:172:CMP info: sending CERTCONF # send_receive_check:../openssl/crypto/cmp/cmp_client.c:190:CMP info: received PKICONF # OPENSSL_FUNC:../openssl/apps/cmp.c:2107:CMP info: received 1 enrolled certificate(s), saving to file 'test.cert.pem' ../../../../../enable-fuzz-afl/util/wrap.pl ../../../../../enable-fuzz-afl/apps/openssl cmp -config ../Mock/test.cnf -section 'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd ir -newkey new.key -newkeypass 'pass:' -popo 0 -certout test.cert.pem -out_trusted root.crt => 0 not ok 43 - popo RAVERIFIED # -- OPENSSL_FUNC:../openssl/apps/cmp.c:2951:CMP info: received from 127.0.0.1 PKIStatus: accepted # OPENSSL_FUNC:../openssl/apps/cmp.c:2728:CMP info: using OpenSSL configuration file '../Mock/test.cnf' # OPENSSL_FUNC:../openssl/apps/cmp.c:2337:CMP warning: argument of -proxy option is empty string, resetting option #
Build failed: openssl master.36521
Build openssl master.36521 failed Commit 673ff7f801 by Todd Short on 4/5/2019 6:17 PM: Optimize session cache flushing Configure your notification preferences
Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-ui-console
Platform and configuration command: $ uname -a Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux $ CC=clang ../openssl/config -d --strict-warnings no-ui-console Commit log since last time: 458cb85d19 Fix ECX serializer import calls to use correct selection flags. d9cdfda24f Fix RSA serializer import calls to use correct selection flags. 81fca0e7c1 Fix DSA serializer import calls to use correct selection flags. 3fab56631f Fix DH serializer import calls to use correct selection flags. 835b290016 Fix PKCS#7 so that it still works with non fetchable cipher algorithms. bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest algorithms. 8e32ea633f Check whether we have MD5-SHA1 and whether we need it 7cd1420b3e Improve some error messages if a digest is not available e3bf65da88 Include "legacy" in the name of the various MAC bridge functions 52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface 2ef9a7ac5e Improve code reuse in the provider MAC bridge 2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test 2cf765e5a2 Delete unused PKEY MAC files a540ef90f5 Extend the provider MAC bridge for CMAC 4db71d0175 Extend the provider MAC bridge for Poly1305 8014b2a966 Don't require a default digest from signature algorithms b27b31b628 Extend the provider MAC bridge for SIPHASH 6f0bd6ca1c Ensure libssl creates libctx aware MAC keys ada0670bf6 Fix some EVP_MD_CTX_* functions 5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function 1bf625040c Fix evp_extra_test to not assume that HMAC is legacy b571e662cd Make the provider side EVP PKEY MAC bridge available in default and fips 409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider bridge e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider bridge bddfea0271 TEST: Adapt some tests for a stricter PEM_write_bio_PrivateKey_traditional() 87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8 b6ef3c7089 Correct description of BN_mask_bits 33855c0af6 conf: add diagnostic option 3d94185718 provider_conf: report missing section on error cd84d8832d Ignore vendor name in Clang version number. 4516bf7422 rand: instantiate the DRBGs upon first use. edd53e9135 rand: add a note about a potentially misleading code analyzer warning. 1d6c86709c apps/pkcs12.c: Add -untrusted option 77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management 0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify() fcc3a5204c apps: -msg flag enhancement 2/2 50c911b0c5 apps: -msg flag enhancement 1/2 625679b6d7 EVP: NULL pctx pointer after free. Build log ended with (last 100 lines): # Failed test 'p10cr csr empty file' # at ../openssl/test/recipes/81-test_cmp_cli.t line 184. ../../../../../no-ui-console/util/wrap.pl ../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf -section 'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd p10cr -newkey new.key -newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt -csr wrong.csr.pem => 139 not ok 78 - p10cr wrong csr # -- # Failed test 'p10cr wrong csr' # at ../openssl/test/recipes/81-test_cmp_cli.t line 184. ../../../../../no-ui-console/util/wrap.pl ../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf -section 'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd ir -newkey new.key -newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt -revreason 5 => 139 not ok 79 - ir + ignored revocation # -- ../../../../../no-ui-console/util/wrap.pl ../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf -section 'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd cr -newkey new.key -newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt => 139 not ok 82 - cr command # -- # Failed test 'cr command' # at ../openssl/test/recipes/81-test_cmp_cli.t line 184. ../../../../../no-ui-console/util/wrap.pl ../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf -section 'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd kur -newkey new.key -newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt -oldcert test.cert.pem -server '127.0.0.1:1700' -cert test.cert.pem -key new.key -extracerts issuing.crt => 139 not ok 83 - kur command explicit options # -- # Failed test 'kur command explicit options' # at ../openssl/test/recipes/81-test_cmp_cli.t line 184. ../../../../../no-ui-console/util/wrap.pl ../../../../../no-ui-console/apps/openssl cmp -config ../Mock/test.cnf
Build completed: openssl OpenSSL_1_1_1-stable.36515
Build openssl OpenSSL_1_1_1-stable.36515 completed Commit e503f5c7d9 by Rutger Hendriks on 8/31/2020 12:38 PM: CLA: trivial Configure your notification preferences
Build failed: openssl master.36514
Build openssl master.36514 failed Commit 4de7050059 by Shane Lontis on 8/31/2020 10:08 AM: fixup! Add RSASVE from SP800-56Br2 Configure your notification preferences
Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-err
Platform and configuration command: $ uname -a Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux $ CC=clang ../openssl/config -d --strict-warnings no-err Commit log since last time: 458cb85d19 Fix ECX serializer import calls to use correct selection flags. d9cdfda24f Fix RSA serializer import calls to use correct selection flags. 81fca0e7c1 Fix DSA serializer import calls to use correct selection flags. 3fab56631f Fix DH serializer import calls to use correct selection flags. 835b290016 Fix PKCS#7 so that it still works with non fetchable cipher algorithms. bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest algorithms. 8e32ea633f Check whether we have MD5-SHA1 and whether we need it 7cd1420b3e Improve some error messages if a digest is not available e3bf65da88 Include "legacy" in the name of the various MAC bridge functions 52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface 2ef9a7ac5e Improve code reuse in the provider MAC bridge 2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test 2cf765e5a2 Delete unused PKEY MAC files a540ef90f5 Extend the provider MAC bridge for CMAC 4db71d0175 Extend the provider MAC bridge for Poly1305 8014b2a966 Don't require a default digest from signature algorithms b27b31b628 Extend the provider MAC bridge for SIPHASH 6f0bd6ca1c Ensure libssl creates libctx aware MAC keys ada0670bf6 Fix some EVP_MD_CTX_* functions 5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function 1bf625040c Fix evp_extra_test to not assume that HMAC is legacy b571e662cd Make the provider side EVP PKEY MAC bridge available in default and fips 409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider bridge e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider bridge bddfea0271 TEST: Adapt some tests for a stricter PEM_write_bio_PrivateKey_traditional() 87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8 b6ef3c7089 Correct description of BN_mask_bits 33855c0af6 conf: add diagnostic option 3d94185718 provider_conf: report missing section on error cd84d8832d Ignore vendor name in Clang version number. 4516bf7422 rand: instantiate the DRBGs upon first use. edd53e9135 rand: add a note about a potentially misleading code analyzer warning. 1d6c86709c apps/pkcs12.c: Add -untrusted option 77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management 0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify() fcc3a5204c apps: -msg flag enhancement 2/2 50c911b0c5 apps: -msg flag enhancement 1/2 625679b6d7 EVP: NULL pctx pointer after free. Build log ended with (last 100 lines): 65-test_cmp_status.t ... ok 65-test_cmp_vfy.t .. ok 70-test_asyncio.t .. ok 70-test_bad_dtls.t . ok 70-test_clienthello.t .. ok 70-test_comp.t . ok 70-test_key_share.t ok 70-test_packet.t ... ok 70-test_recordlen.t ok 70-test_renegotiation.t ok 70-test_servername.t ... ok 70-test_sslcbcpadding.t ok 70-test_sslcertstatus.t ok 70-test_sslextension.t . ok 70-test_sslmessages.t .. ok 70-test_sslrecords.t ... ok 70-test_sslsessiontick.t ... ok 70-test_sslsigalgs.t ... ok 70-test_sslsignature.t . ok 70-test_sslskewith0p.t . ok 70-test_sslversions.t .. ok 70-test_sslvertol.t ok 70-test_tls13alerts.t .. ok 70-test_tls13cookie.t .. ok 70-test_tls13downgrade.t ... ok 70-test_tls13hrr.t . ok 70-test_tls13kexmodes.t ok 70-test_tls13messages.t ok 70-test_tls13psk.t . ok 70-test_tlsextms.t . ok 70-test_verify_extra.t . ok 70-test_wpacket.t .. ok 71-test_ssl_ctx.t .. ok 80-test_ca.t ... ok 80-test_cipherbytes.t .. ok 80-test_cipherlist.t ... ok 80-test_ciphername.t ... ok # 80-test_cms.t .. ok 80-test_cmsapi.t ... ok 80-test_ct.t ... ok 80-test_dane.t . ok 80-test_dtls.t . ok 80-test_dtls_mtu.t . ok 80-test_dtlsv1listen.t . ok 80-test_http.t . ok 80-test_ocsp.t . ok 80-test_pkcs12.t ... ok 80-test_ssl_new.t .. ok 80-test_ssl_old.t .. ok 80-test_ssl_test_ctx.t . ok 80-test_sslcorrupt.t ... ok 80-test_tsa.t .. ok 80-test_x509aux.t .. ok # 81-test_cmp_cli.t .. ok 90-test_asn1_time.t ok 90-test_async.t
Still Failing: openssl/openssl#37052 (master - 72c1e37)
Build Update for openssl/openssl - Build: #37052 Status: Still Failing Duration: 1 hr, 24 mins, and 55 secs Commit: 72c1e37 (master) Author: John Baldwin Message: Use global 'libctx' with RAND_bytes_ex to generate sendfile temp data. While here, check for failure from RAND_bytes_ex as well. Reviewed-by: Tomas Mraz Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/12111) View the changeset: https://github.com/openssl/openssl/compare/23e77b0ba328...72c1e37421ff View the full build log and details: https://travis-ci.com/github/openssl/openssl/builds/182040680?utm_medium=notification_source=email -- You can unsubscribe from build emails from the openssl/openssl repository going to https://travis-ci.com/account/preferences/unsubscribe?repository=13885459_medium=notification_source=email. Or unsubscribe from *all* email updating your settings at https://travis-ci.com/account/preferences/unsubscribe?utm_medium=notification_source=email. Or configure specific recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications.
[openssl] master update
The branch master has been updated via 72c1e37421ffe9a4db4bba46f3d736dbc227c255 (commit) via ab114c6ddef52384c3c5d579847b989284f51dfc (commit) via 18efb630169a5c2c58a77b0b67fc707a87cb8b93 (commit) via cd03b5dc428568548163890081da99b6e5df11ba (commit) via eb818d23c2f451ed56030d9e9fb94bd60ec48b07 (commit) via c7b46b549d59797c3f1ea6541f8ff6f02009cbc5 (commit) via b22a3ccc07e304df8fdbc79bf4168c1a880d0ac5 (commit) via 3c1641e8e86dc86028637251421a57827243f6ca (commit) via 0a90a90c4626dab3b6931e6a1e0bba9419720146 (commit) via 3e5826061baa7948ab1d2835357403d16470108d (commit) via c34ca13a60f2acb4509be0aec9f506853ffbd1ea (commit) from 23e77b0ba328afe3492d990cd24f7b8896b4246f (commit) - Log - commit 72c1e37421ffe9a4db4bba46f3d736dbc227c255 Author: John Baldwin Date: Wed Aug 5 16:24:24 2020 -0700 Use global 'libctx' with RAND_bytes_ex to generate sendfile temp data. While here, check for failure from RAND_bytes_ex as well. Reviewed-by: Tomas Mraz Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/12111) commit ab114c6ddef52384c3c5d579847b989284f51dfc Author: Vadim Fedorenko Date: Fri Jul 31 11:21:36 2020 -0700 Fix two issues with AES-CCM KTLS tests. - Apply the cipher list to the server context as well as the client context. The tests still worked for AES-GCM cipher suites as those are in the default list of ciphers. AES-CCM cipher suites are not in the default list and require the cipher list to be set. - Use the correct cipher name for AES-CCM. Reviewed-by: Tomas Mraz Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/12111) commit 18efb630169a5c2c58a77b0b67fc707a87cb8b93 Author: John Baldwin Date: Wed Jul 29 15:08:54 2020 -0700 Skip tests using KTLS RX for TLS 1.3. KTLS RX is not yet supported for TLS 1.3. Reviewed-by: Tomas Mraz Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/12111) commit cd03b5dc428568548163890081da99b6e5df11ba Author: John Baldwin Date: Wed Jul 29 15:08:25 2020 -0700 Skip tests using KTLS RX if KTLS RX is not supported. This skips tests using KTLS RX when run on systems that only support KTLS TX. Reviewed-by: Tomas Mraz Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/12111) commit eb818d23c2f451ed56030d9e9fb94bd60ec48b07 Author: John Baldwin Date: Wed Jul 29 14:56:58 2020 -0700 Refactor the KTLS tests to minimize code duplication. Use the low 4 bits of the test number directly as flags for which of the connection sides should use KTLS or not for each test instead of having 16 nearly identical functions to do the same thing. This makes it easier to skip tests that aren't supported (e.g. KTLS RX on TLS 1.3). Reviewed-by: Tomas Mraz Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/12111) commit c7b46b549d59797c3f1ea6541f8ff6f02009cbc5 Author: John Baldwin Date: Mon Jul 27 11:35:13 2020 -0700 Move KTLS inline functions only used by libssl into ssl/ktls.c. These functions are a bit large to inline and are not usable outside of libssl. Reviewed-by: Tomas Mraz Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/12111) commit b22a3ccc07e304df8fdbc79bf4168c1a880d0ac5 Author: John Baldwin Date: Wed Dec 4 16:50:06 2019 -0800 Support for KTLS TX on FreeBSD for TLS 1.3. Reviewed-by: Tomas Mraz Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/12111) commit 3c1641e8e86dc86028637251421a57827243f6ca Author: John Baldwin Date: Thu Mar 5 11:26:06 2020 -0800 Don't check errno if ktls_read_record() returned 0. errno is only valid if ktls_read_record() fails with a negative return value. Reviewed-by: Tomas Mraz Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/12111) commit 0a90a90c4626dab3b6931e6a1e0bba9419720146 Author: John Baldwin Date: Thu Oct 31 16:49:40 2019 -0700 Add support for KTLS receive for TLS 1.1-1.2 on FreeBSD. Similar to KTLS receive for Linux, KTLS receive for FreeBSD is enabled by passing a session key to the kernel via a new socket option. Once KTLS receive is enabled on a socket, the socket returns records via recvmsg(). A control message attached to each record supplies the original TLS header, and the decrypted plaintext is returned in the data buffer passed to recvmsg(). To support the case that the userland buffer may already contain pending encrypted records (which is already handled by Linux's KTLS
Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-dgram
Platform and configuration command: $ uname -a Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux $ CC=clang ../openssl/config -d --strict-warnings no-dgram Commit log since last time: 458cb85d19 Fix ECX serializer import calls to use correct selection flags. d9cdfda24f Fix RSA serializer import calls to use correct selection flags. 81fca0e7c1 Fix DSA serializer import calls to use correct selection flags. 3fab56631f Fix DH serializer import calls to use correct selection flags. 835b290016 Fix PKCS#7 so that it still works with non fetchable cipher algorithms. bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest algorithms. 8e32ea633f Check whether we have MD5-SHA1 and whether we need it 7cd1420b3e Improve some error messages if a digest is not available e3bf65da88 Include "legacy" in the name of the various MAC bridge functions 52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface 2ef9a7ac5e Improve code reuse in the provider MAC bridge 2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test 2cf765e5a2 Delete unused PKEY MAC files a540ef90f5 Extend the provider MAC bridge for CMAC 4db71d0175 Extend the provider MAC bridge for Poly1305 8014b2a966 Don't require a default digest from signature algorithms b27b31b628 Extend the provider MAC bridge for SIPHASH 6f0bd6ca1c Ensure libssl creates libctx aware MAC keys ada0670bf6 Fix some EVP_MD_CTX_* functions 5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function 1bf625040c Fix evp_extra_test to not assume that HMAC is legacy b571e662cd Make the provider side EVP PKEY MAC bridge available in default and fips 409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider bridge e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider bridge bddfea0271 TEST: Adapt some tests for a stricter PEM_write_bio_PrivateKey_traditional() 87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8 b6ef3c7089 Correct description of BN_mask_bits 33855c0af6 conf: add diagnostic option 3d94185718 provider_conf: report missing section on error cd84d8832d Ignore vendor name in Clang version number. 4516bf7422 rand: instantiate the DRBGs upon first use. edd53e9135 rand: add a note about a potentially misleading code analyzer warning. 1d6c86709c apps/pkcs12.c: Add -untrusted option 77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management 0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify() fcc3a5204c apps: -msg flag enhancement 2/2 50c911b0c5 apps: -msg flag enhancement 1/2 625679b6d7 EVP: NULL pctx pointer after free. Build log ended with (last 100 lines): # 80-test_cms.t .. ok 80-test_cmsapi.t ... ok 80-test_ct.t ... ok 80-test_dane.t . ok 80-test_dtls.t . skipped: No DTLS protocols are supported by this OpenSSL build 80-test_dtls_mtu.t . skipped: test_dtls_mtu needs DTLS and PSK support enabled 80-test_dtlsv1listen.t . ok 80-test_http.t . ok 80-test_ocsp.t . ok 80-test_pkcs12.t ... ok # ERROR: (ptr) 'server_ctx != NULL' failed @ ../openssl/test/ssl_test.c:479 # 0x0 not ok 7 - iteration 7 # -- # ERROR: (ptr) 'server_ctx != NULL' failed @ ../openssl/test/ssl_test.c:479 # 0x0 not ok 8 - iteration 8 # -- # ERROR: (ptr) 'server_ctx != NULL' failed @ ../openssl/test/ssl_test.c:479 # 0x0 not ok 9 - iteration 9 # -- # ERROR: (ptr) 'server_ctx != NULL' failed @ ../openssl/test/ssl_test.c:479 # 0x0 not ok 10 - iteration 10 # -- # ERROR: (ptr) 'server_ctx != NULL' failed @ ../openssl/test/ssl_test.c:479 # 0x0 not ok 11 - iteration 11 # -- # ERROR: (ptr) 'server_ctx != NULL' failed @ ../openssl/test/ssl_test.c:479 # 0x0 not ok 12 - iteration 12 # -- not ok 1 - test_handshake # -- ../../util/wrap.pl ../../test/ssl_test 04-client_auth.cnf.fips fips ../../../openssl/test/fips.cnf => 1 not ok 9 - running ssl_test 04-client_auth.cnf # -- #
Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-des
Platform and configuration command: $ uname -a Linux run 4.15.0-106-generic #107-Ubuntu SMP Thu Jun 4 11:27:52 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux $ CC=clang ../openssl/config -d --strict-warnings no-des Commit log since last time: 458cb85d19 Fix ECX serializer import calls to use correct selection flags. d9cdfda24f Fix RSA serializer import calls to use correct selection flags. 81fca0e7c1 Fix DSA serializer import calls to use correct selection flags. 3fab56631f Fix DH serializer import calls to use correct selection flags. 835b290016 Fix PKCS#7 so that it still works with non fetchable cipher algorithms. bd1bbbfe51 Fix PKCS#7 so that it still works with non fetchable digest algorithms. 8e32ea633f Check whether we have MD5-SHA1 and whether we need it 7cd1420b3e Improve some error messages if a digest is not available e3bf65da88 Include "legacy" in the name of the various MAC bridge functions 52ae0f8fc2 Add some documentation about the EVP_PKEY MAC interface 2ef9a7ac5e Improve code reuse in the provider MAC bridge 2106b04719 Document the EVP_PKEY_new_CMAC_key_with_libctx() function e5bc0ce2ae Extend test_CMAC_keygen in evp_extra_test 2cf765e5a2 Delete unused PKEY MAC files a540ef90f5 Extend the provider MAC bridge for CMAC 4db71d0175 Extend the provider MAC bridge for Poly1305 8014b2a966 Don't require a default digest from signature algorithms b27b31b628 Extend the provider MAC bridge for SIPHASH 6f0bd6ca1c Ensure libssl creates libctx aware MAC keys ada0670bf6 Fix some EVP_MD_CTX_* functions 5d51925a90 Convert EVP_PKEY_CTX_set_mac_key() into a function 1bf625040c Fix evp_extra_test to not assume that HMAC is legacy b571e662cd Make the provider side EVP PKEY MAC bridge available in default and fips 409910be16 Implement signature functions for EVP_PKEY MAC to EVP_MAC provider bridge e538294f8f Implement key management for the EVP_PKEY MAC to EVP_MAC provider bridge bddfea0271 TEST: Adapt some tests for a stricter PEM_write_bio_PrivateKey_traditional() 87d91d223b Fix PEM_write_bio_PrivateKey_traditional() to not output PKCS#8 b6ef3c7089 Correct description of BN_mask_bits 33855c0af6 conf: add diagnostic option 3d94185718 provider_conf: report missing section on error cd84d8832d Ignore vendor name in Clang version number. 4516bf7422 rand: instantiate the DRBGs upon first use. edd53e9135 rand: add a note about a potentially misleading code analyzer warning. 1d6c86709c apps/pkcs12.c: Add -untrusted option 77a9bb83d7 X509_add_certs(): Add to doc some warning notes on memory management 0495a3ec4a Add OCSP_PARTIAL_CHAIN to OCSP_basic_verify() fcc3a5204c apps: -msg flag enhancement 2/2 50c911b0c5 apps: -msg flag enhancement 1/2 625679b6d7 EVP: NULL pctx pointer after free. Build log ended with (last 100 lines): ../../../../../no-des/util/wrap.pl ../../../../../no-des/apps/openssl cmp -config ../Mock/test.cnf -section 'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd ir -newkey new.key -newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt -revreason 5 => 1 not ok 79 - ir + ignored revocation # -- Could not read any key of private key for CMP client certificate from signer.p12 C060D810787F:error::digital envelope routines:EVP_PBE_CipherInit:unknown cipher:../openssl/crypto/evp/evp_pbe.c:116: C060D810787F:error::PKCS12 routines:PKCS12_pbe_crypt:pkcs12 algor cipherinit error:../openssl/crypto/pkcs12/p12_decr.c:37: C060D810787F:error::PKCS12 routines:PKCS12_item_decrypt_d2i:pkcs12 pbe crypt error:../openssl/crypto/pkcs12/p12_decr.c:90: C060D810787F:error::PKCS12 routines:PKCS12_parse:parse error:../openssl/crypto/pkcs12/p12_kiss.c:87: Unable to load private key for CMP client certificate OPENSSL_FUNC:../openssl/apps/cmp.c:2885:CMP error: cannot set up CMP context # OPENSSL_FUNC:../openssl/apps/cmp.c:2728:CMP info: using OpenSSL configuration file '../Mock/test.cnf' # OPENSSL_FUNC:../openssl/apps/cmp.c:2337:CMP warning: argument of -proxy option is empty string, resetting option ../../../../../no-des/util/wrap.pl ../../../../../no-des/apps/openssl cmp -config ../Mock/test.cnf -section 'Mock enrollment' -proxy '' -no_proxy 127.0.0.1 -cmd cr -newkey new.key -newkeypass 'pass:' -certout test.cert.pem -out_trusted root.crt => 1 not ok 82 - cr command # -- # Failed test 'cr command' # at ../openssl/test/recipes/81-test_cmp_cli.t line 184. Could not open file or uri test.cert.pem for loading CMP client certificate (and optionally extra certs) Could not read any cert of CMP client certificate (and optionally extra certs) from test.cert.pem C0408467B77F:error::system library:file_open_with_libctx:No such file or directory:../openssl/crypto/store/loader_file.c:935:calling stat(test.cert.pem) OPENSSL_FUNC:../openssl/apps/cmp.c:2885:CMP error: cannot set up CMP context #
Still Failing: openssl/openssl#37047 (master - 23e77b0)
Build Update for openssl/openssl - Build: #37047 Status: Still Failing Duration: 1 hr, 23 mins, and 31 secs Commit: 23e77b0 (master) Author: Jon Spillett Message: Update test data for DSA public key text Reviewed-by: Matt Caswell Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/12688) View the changeset: https://github.com/openssl/openssl/compare/458cb85d1985...23e77b0ba328 View the full build log and details: https://travis-ci.com/github/openssl/openssl/builds/182009783?utm_medium=notification_source=email -- You can unsubscribe from build emails from the openssl/openssl repository going to https://travis-ci.com/account/preferences/unsubscribe?repository=13885459_medium=notification_source=email. Or unsubscribe from *all* email updating your settings at https://travis-ci.com/account/preferences/unsubscribe?utm_medium=notification_source=email. Or configure specific recipients for build notifications in your .travis.yml file. See https://docs.travis-ci.com/user/notifications.