Build failed: openssl master.40908

2021-03-21 Thread AppVeyor



Build openssl master.40908 failed


Commit 3a3fcf8078 by Eric Curtin on 3/20/2021 9:41 PM:

Added boolean flag grease_seeded


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-autoerrinit

2021-03-21 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-autoerrinit

Commit log since last time:

6e34a1048c ASN1: Reset the content dump flag after dumping
abded2ced4 evp: fix coverity 1473380: copy into fixed size buffer
c38048e793 sslapitest: fix problem in cleanup on failure path
b6d1bd4eb8 evp: fix coverity 1473381 - dereference after null check
72ded6f2a9 x509: coverity 1472673 & 1472693 - dereference after null checks
f1619160c8 test: coverity 1469426 - dereference after null check
88ce406c89 ssl: coverity 1465527 - dereference after null check
8f586f5bc1 test: coverity 1455749 - dereference after null check
337ace06b9 test: coverity 1455747 - dereference after null check
b6f0f546ff async: coverity 1446224 - dereference after null check
28c21fa048 evp: fix coverity 1445872 - dereference after null check
07aa88cccf decoder: fix Coverity 1473236 & 1473386: resource leaks
77b8b49bdd apps: fix Coverity 1472670 & 1472685: resource leaks
bca681aa5b rsa: fix coverity 1472658: resource leak
7153f54437 evp: fix coverity 1470561: resource leak
9b0f76e12f test: fix coverity 1470559: resource leak
015b221a5f test: fix coverity 1455330, 1455332, 1455334, 1455342, 1455344 : 
resource leak
e22105d1b3 ssl: fix coverity 1451495: resource leak
65bf029d49 test: fix coverity 1414449 & 1414471: resource leak
c0cd48fcb9 test: fix coverity 1414445: resource leak
316c8dafd4 test: fix coverity 1454040: resource leak
743840d56f test: fix coverity 1451562: resource leak
b573d0ceea test: fix coverity 1451553: resource leak
aff442dc38 Make ossl_d2i_PUBKEY_legacy() completely libcrypto internal
695c96ba51 Make evp_privatekey_from_binary() completely libcrypto internal
55d9ccca8e TEST: Clarify and adjust test/recipes/30-test_evp.t
c640b68785 STORE: Use the same error avoidance criteria as for the DER->key 
decoder
ff1c10d920 TEST: Modify test/endecode_test.c to give the decoder callback the 
structure
f4e46b817d PROV: Add type specific MSBLOB and PVK decoding for the MS->key 
decoders
cf33379997 PROV: Add type specific PKCS#8 decoding to the DER->key decoders
e0be34beee PROV: Add RSA-PSS specific OSSL_FUNC_KEYMGMT_LOAD function
06f6761280 PROV: Add type specific SubjectPublicKeyInfo decoding to the 
DER->key decoders
65ef000ec2 PROV: Refactor DER->key decoder
2d101b0f49 Configure: check all DEPEND values against GENERATE, not just .h 
files
6084b5c2c9 EVP_PKEY_get_*_param should work with legacy
03cd9d2f23 ASYNC_start_job: Reset libctx when async_fibre_swapcontext fails
0e2f87c03e Added functions for printing EVP_PKEYs to FILE *
39f6bf33e5 test: fix Coverity 1454818: use after free
ebdb5cccde Fix windows build compiler issue.
2154a7a754 Update README-FIPS.md
9fe4f5bc82 Fix a missing rand -> ossl_rand rename
ee067bc066 Ensure we deregister thread handlers even after a failed init
7e7e034a10 apps: fix coverity 966560: division by zero
3de7f014a9 ssl: fix coverity 1451515: out of bounds memory access
145f12d12d modes: fix coverity 1449860: overlapping memory copy
b875e0e820 modes: fix coverity 1449851: overlapping memory copy
cf3306dc6b Remove TODO comment. Resolves #14396
628d2d3a7f Fixing stack buffer overflow error caused by incorrectly sized array.
c8830891e6 Add ossl_provider symbols
3022b7f404 Rename CMS_si_check_attributes to ossl_cms_si_check_attributes
78715dcc31 rename err_get_state_int() to ossl_err_get_state_int()
6d7776892f Add ossl_is_partially_overlapping symbol
4e17fb0061 Add ossl_pkcs5_pbkdf2_hmac_ex symbol
b78c016649 Add ossl_pem_check_suffix symbol
4669015d7b Add ossl_ x509 symbols
6dd4b77a85 Add ossl_gost symbols
285aa80ef1 Add ossl_lhash symbols
b54cab31d2 Add ossl_ symbol to x509 policy
fc27fca84a Add ossl_bn_group symbols
ff0266eddc Add ossl_sa symbols
8a6e912520 Add ossl_ symbols for sm3 and sm4
7bbadfc15a Add ossl_siv symbols
78f32a3165 Add ossl_aria symbols
f148f7034c Add ossl_ conf symbols
054d43ff97 Add ossl_ ecx symbols
47864aeafd Add ossl_v3 symbols
4158b0dc1d Add ossl_rsa symbols
2858156e03 Add ossl_encode symbols
adf7e6d1d6 Add ossl_asn1 symbols
1335ca4b07 Add ossl_rand symbols
9500c8234d Fix misc external ossl_ symbols.
e4bec86910 Fix external symbols for crypto_*
63b64f19c1 TS and CMS CAdES-BES: Refactor check_signing_certs() funcs into 
common ESS func
bef876f97e ts_check_signing_certs(): Make sure both ESSCertID and ESSCertIDv2 
are checked
6b937ae3a7 TS ESS: Invert the search logic of ts_check_signing_certs() to 
correctly cover cert ID list
49f07be43d apps.c: Fix missing newline in warn_cert_msg() output
d07d805799 Add tests for the limited Unicode code point range
eb27d75788 ASN1: check the Unicode code point range in ASN1_mbstring_copy()
ba64e5a92a ASN1: limit the Unicode code point range in UTF8_getc() and 
UTF8_putc()
90165623a5 ASN1: add an internal header to validate Unicode ranges
11c7874d0c ci: add a no-legacy build

Build log ended with 

Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-autoalginit

2021-03-21 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-autoalginit

Commit log since last time:

6e34a1048c ASN1: Reset the content dump flag after dumping
abded2ced4 evp: fix coverity 1473380: copy into fixed size buffer
c38048e793 sslapitest: fix problem in cleanup on failure path
b6d1bd4eb8 evp: fix coverity 1473381 - dereference after null check
72ded6f2a9 x509: coverity 1472673 & 1472693 - dereference after null checks
f1619160c8 test: coverity 1469426 - dereference after null check
88ce406c89 ssl: coverity 1465527 - dereference after null check
8f586f5bc1 test: coverity 1455749 - dereference after null check
337ace06b9 test: coverity 1455747 - dereference after null check
b6f0f546ff async: coverity 1446224 - dereference after null check
28c21fa048 evp: fix coverity 1445872 - dereference after null check
07aa88cccf decoder: fix Coverity 1473236 & 1473386: resource leaks
77b8b49bdd apps: fix Coverity 1472670 & 1472685: resource leaks
bca681aa5b rsa: fix coverity 1472658: resource leak
7153f54437 evp: fix coverity 1470561: resource leak
9b0f76e12f test: fix coverity 1470559: resource leak
015b221a5f test: fix coverity 1455330, 1455332, 1455334, 1455342, 1455344 : 
resource leak
e22105d1b3 ssl: fix coverity 1451495: resource leak
65bf029d49 test: fix coverity 1414449 & 1414471: resource leak
c0cd48fcb9 test: fix coverity 1414445: resource leak
316c8dafd4 test: fix coverity 1454040: resource leak
743840d56f test: fix coverity 1451562: resource leak
b573d0ceea test: fix coverity 1451553: resource leak
aff442dc38 Make ossl_d2i_PUBKEY_legacy() completely libcrypto internal
695c96ba51 Make evp_privatekey_from_binary() completely libcrypto internal
55d9ccca8e TEST: Clarify and adjust test/recipes/30-test_evp.t
c640b68785 STORE: Use the same error avoidance criteria as for the DER->key 
decoder
ff1c10d920 TEST: Modify test/endecode_test.c to give the decoder callback the 
structure
f4e46b817d PROV: Add type specific MSBLOB and PVK decoding for the MS->key 
decoders
cf33379997 PROV: Add type specific PKCS#8 decoding to the DER->key decoders
e0be34beee PROV: Add RSA-PSS specific OSSL_FUNC_KEYMGMT_LOAD function
06f6761280 PROV: Add type specific SubjectPublicKeyInfo decoding to the 
DER->key decoders
65ef000ec2 PROV: Refactor DER->key decoder
2d101b0f49 Configure: check all DEPEND values against GENERATE, not just .h 
files
6084b5c2c9 EVP_PKEY_get_*_param should work with legacy
03cd9d2f23 ASYNC_start_job: Reset libctx when async_fibre_swapcontext fails
0e2f87c03e Added functions for printing EVP_PKEYs to FILE *
39f6bf33e5 test: fix Coverity 1454818: use after free
ebdb5cccde Fix windows build compiler issue.
2154a7a754 Update README-FIPS.md
9fe4f5bc82 Fix a missing rand -> ossl_rand rename
ee067bc066 Ensure we deregister thread handlers even after a failed init
7e7e034a10 apps: fix coverity 966560: division by zero
3de7f014a9 ssl: fix coverity 1451515: out of bounds memory access
145f12d12d modes: fix coverity 1449860: overlapping memory copy
b875e0e820 modes: fix coverity 1449851: overlapping memory copy
cf3306dc6b Remove TODO comment. Resolves #14396
628d2d3a7f Fixing stack buffer overflow error caused by incorrectly sized array.
c8830891e6 Add ossl_provider symbols
3022b7f404 Rename CMS_si_check_attributes to ossl_cms_si_check_attributes
78715dcc31 rename err_get_state_int() to ossl_err_get_state_int()
6d7776892f Add ossl_is_partially_overlapping symbol
4e17fb0061 Add ossl_pkcs5_pbkdf2_hmac_ex symbol
b78c016649 Add ossl_pem_check_suffix symbol
4669015d7b Add ossl_ x509 symbols
6dd4b77a85 Add ossl_gost symbols
285aa80ef1 Add ossl_lhash symbols
b54cab31d2 Add ossl_ symbol to x509 policy
fc27fca84a Add ossl_bn_group symbols
ff0266eddc Add ossl_sa symbols
8a6e912520 Add ossl_ symbols for sm3 and sm4
7bbadfc15a Add ossl_siv symbols
78f32a3165 Add ossl_aria symbols
f148f7034c Add ossl_ conf symbols
054d43ff97 Add ossl_ ecx symbols
47864aeafd Add ossl_v3 symbols
4158b0dc1d Add ossl_rsa symbols
2858156e03 Add ossl_encode symbols
adf7e6d1d6 Add ossl_asn1 symbols
1335ca4b07 Add ossl_rand symbols
9500c8234d Fix misc external ossl_ symbols.
e4bec86910 Fix external symbols for crypto_*
63b64f19c1 TS and CMS CAdES-BES: Refactor check_signing_certs() funcs into 
common ESS func
bef876f97e ts_check_signing_certs(): Make sure both ESSCertID and ESSCertIDv2 
are checked
6b937ae3a7 TS ESS: Invert the search logic of ts_check_signing_certs() to 
correctly cover cert ID list
49f07be43d apps.c: Fix missing newline in warn_cert_msg() output
d07d805799 Add tests for the limited Unicode code point range
eb27d75788 ASN1: check the Unicode code point range in ASN1_mbstring_copy()
ba64e5a92a ASN1: limit the Unicode code point range in UTF8_getc() and 
UTF8_putc()
90165623a5 ASN1: add an internal header to validate Unicode ranges
11c7874d0c ci: add a no-legacy build

Build log ended with 

Build failed: openssl master.40906

2021-03-21 Thread AppVeyor



Build openssl master.40906 failed


Commit a173522398 by Tanzinul Islam on 12/14/2020 11:31 PM:

Remove crypt32.lib from C++Builder configuration


Configure your notification preferences



Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-asm

2021-03-21 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-asm

Commit log since last time:

6e34a1048c ASN1: Reset the content dump flag after dumping
abded2ced4 evp: fix coverity 1473380: copy into fixed size buffer
c38048e793 sslapitest: fix problem in cleanup on failure path
b6d1bd4eb8 evp: fix coverity 1473381 - dereference after null check
72ded6f2a9 x509: coverity 1472673 & 1472693 - dereference after null checks
f1619160c8 test: coverity 1469426 - dereference after null check
88ce406c89 ssl: coverity 1465527 - dereference after null check
8f586f5bc1 test: coverity 1455749 - dereference after null check
337ace06b9 test: coverity 1455747 - dereference after null check
b6f0f546ff async: coverity 1446224 - dereference after null check
28c21fa048 evp: fix coverity 1445872 - dereference after null check
07aa88cccf decoder: fix Coverity 1473236 & 1473386: resource leaks
77b8b49bdd apps: fix Coverity 1472670 & 1472685: resource leaks
bca681aa5b rsa: fix coverity 1472658: resource leak
7153f54437 evp: fix coverity 1470561: resource leak
9b0f76e12f test: fix coverity 1470559: resource leak
015b221a5f test: fix coverity 1455330, 1455332, 1455334, 1455342, 1455344 : 
resource leak
e22105d1b3 ssl: fix coverity 1451495: resource leak
65bf029d49 test: fix coverity 1414449 & 1414471: resource leak
c0cd48fcb9 test: fix coverity 1414445: resource leak
316c8dafd4 test: fix coverity 1454040: resource leak
743840d56f test: fix coverity 1451562: resource leak
b573d0ceea test: fix coverity 1451553: resource leak
aff442dc38 Make ossl_d2i_PUBKEY_legacy() completely libcrypto internal
695c96ba51 Make evp_privatekey_from_binary() completely libcrypto internal
55d9ccca8e TEST: Clarify and adjust test/recipes/30-test_evp.t
c640b68785 STORE: Use the same error avoidance criteria as for the DER->key 
decoder
ff1c10d920 TEST: Modify test/endecode_test.c to give the decoder callback the 
structure
f4e46b817d PROV: Add type specific MSBLOB and PVK decoding for the MS->key 
decoders
cf33379997 PROV: Add type specific PKCS#8 decoding to the DER->key decoders
e0be34beee PROV: Add RSA-PSS specific OSSL_FUNC_KEYMGMT_LOAD function
06f6761280 PROV: Add type specific SubjectPublicKeyInfo decoding to the 
DER->key decoders
65ef000ec2 PROV: Refactor DER->key decoder
2d101b0f49 Configure: check all DEPEND values against GENERATE, not just .h 
files
6084b5c2c9 EVP_PKEY_get_*_param should work with legacy
03cd9d2f23 ASYNC_start_job: Reset libctx when async_fibre_swapcontext fails
0e2f87c03e Added functions for printing EVP_PKEYs to FILE *
39f6bf33e5 test: fix Coverity 1454818: use after free
ebdb5cccde Fix windows build compiler issue.
2154a7a754 Update README-FIPS.md
9fe4f5bc82 Fix a missing rand -> ossl_rand rename
ee067bc066 Ensure we deregister thread handlers even after a failed init
7e7e034a10 apps: fix coverity 966560: division by zero
3de7f014a9 ssl: fix coverity 1451515: out of bounds memory access
145f12d12d modes: fix coverity 1449860: overlapping memory copy
b875e0e820 modes: fix coverity 1449851: overlapping memory copy
cf3306dc6b Remove TODO comment. Resolves #14396
628d2d3a7f Fixing stack buffer overflow error caused by incorrectly sized array.
c8830891e6 Add ossl_provider symbols
3022b7f404 Rename CMS_si_check_attributes to ossl_cms_si_check_attributes
78715dcc31 rename err_get_state_int() to ossl_err_get_state_int()
6d7776892f Add ossl_is_partially_overlapping symbol
4e17fb0061 Add ossl_pkcs5_pbkdf2_hmac_ex symbol
b78c016649 Add ossl_pem_check_suffix symbol
4669015d7b Add ossl_ x509 symbols
6dd4b77a85 Add ossl_gost symbols
285aa80ef1 Add ossl_lhash symbols
b54cab31d2 Add ossl_ symbol to x509 policy
fc27fca84a Add ossl_bn_group symbols
ff0266eddc Add ossl_sa symbols
8a6e912520 Add ossl_ symbols for sm3 and sm4
7bbadfc15a Add ossl_siv symbols
78f32a3165 Add ossl_aria symbols
f148f7034c Add ossl_ conf symbols
054d43ff97 Add ossl_ ecx symbols
47864aeafd Add ossl_v3 symbols
4158b0dc1d Add ossl_rsa symbols
2858156e03 Add ossl_encode symbols
adf7e6d1d6 Add ossl_asn1 symbols
1335ca4b07 Add ossl_rand symbols
9500c8234d Fix misc external ossl_ symbols.
e4bec86910 Fix external symbols for crypto_*
63b64f19c1 TS and CMS CAdES-BES: Refactor check_signing_certs() funcs into 
common ESS func
bef876f97e ts_check_signing_certs(): Make sure both ESSCertID and ESSCertIDv2 
are checked
6b937ae3a7 TS ESS: Invert the search logic of ts_check_signing_certs() to 
correctly cover cert ID list
49f07be43d apps.c: Fix missing newline in warn_cert_msg() output
d07d805799 Add tests for the limited Unicode code point range
eb27d75788 ASN1: check the Unicode code point range in ASN1_mbstring_copy()
ba64e5a92a ASN1: limit the Unicode code point range in UTF8_getc() and 
UTF8_putc()
90165623a5 ASN1: add an internal header to validate Unicode ranges
11c7874d0c ci: add a no-legacy build

Build log ended with (last 100 

[openssl] master update

2021-03-21 Thread shane . lontis
The branch master has been updated
   via  251c48183b4d8934716ac1e5e66e2a10b81373fe (commit)
  from  6e34a1048ce4871371eac224b995c3b4338f6166 (commit)


- Log -
commit 251c48183b4d8934716ac1e5e66e2a10b81373fe
Author: Shane Lontis 
Date:   Thu Mar 18 15:00:23 2021 +1000

Fix DER reading from stdin for BIO_f_readbuffer

Fixes #14559

The intitial implementation of the gets() function tried using the next 
bio's gets() function.
For a file BIO this returned incorrect data for binary data containing 0x00.
Just buffering all data during gets() did not work however since some
applications open and close the bio multiple times when dealing with pem
files containing multiple entries.. This does not work
when reading from stdin unless the data if buffered one byte at a time.

Reviewed-by: Tomas Mraz 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/openssl/pull/14599)

---

Summary of changes:
 crypto/bio/bf_readbuff.c  |  92 ++--
 test/bio_readbuffer_test.c| 131 ++
 test/build.info   |   7 +-
 test/recipes/61-test_bio_readbuffer.t |  29 
 4 files changed, 222 insertions(+), 37 deletions(-)
 create mode 100644 test/bio_readbuffer_test.c
 create mode 100644 test/recipes/61-test_bio_readbuffer.t

diff --git a/crypto/bio/bf_readbuff.c b/crypto/bio/bf_readbuff.c
index 673d592ec0..135ccef83b 100644
--- a/crypto/bio/bf_readbuff.c
+++ b/crypto/bio/bf_readbuff.c
@@ -57,7 +57,7 @@ static int readbuffer_new(BIO *bi)
 if (ctx == NULL)
 return 0;
 ctx->ibuf_size = DEFAULT_BUFFER_SIZE;
-ctx->ibuf = OPENSSL_malloc(DEFAULT_BUFFER_SIZE);
+ctx->ibuf = OPENSSL_zalloc(DEFAULT_BUFFER_SIZE);
 if (ctx->ibuf == NULL) {
 OPENSSL_free(ctx);
 return 0;
@@ -220,6 +220,7 @@ static int readbuffer_gets(BIO *b, char *buf, int size)
 BIO_F_BUFFER_CTX *ctx;
 int num = 0, num_chars, found_newline;
 char *p;
+int i, j;
 
 if (size == 0)
 return 0;
@@ -227,42 +228,61 @@ static int readbuffer_gets(BIO *b, char *buf, int size)
 ctx = (BIO_F_BUFFER_CTX *)b->ptr;
 BIO_clear_retry_flags(b);
 
-for (;;) {
-if (ctx->ibuf_len > 0) {
-p = &(ctx->ibuf[ctx->ibuf_off]);
-found_newline = 0;
-for (num_chars = 0;
- (num_chars < ctx->ibuf_len) && (num_chars < size);
- num_chars++) {
-*(buf++) = p[num_chars];
-if (p[num_chars] == '\n') {
-found_newline = 1;
-num_chars++;
-break;
-}
-}
-num += num_chars;
-size -= num_chars;
-ctx->ibuf_len -= num_chars;
-ctx->ibuf_off += num_chars;
-if (found_newline || size == 0) {
-*buf = '\0';
-return num;
-}
-} else {
-/* read another line and resize if we have to */
-if (!readbuffer_resize(ctx, size))
-return 0;
-
-/* Read another line from the next bio using BIO_gets */
-num_chars = BIO_gets(b->next_bio, ctx->ibuf + ctx->ibuf_off,
- 1 + size);
-if (num_chars <= 0) {
-BIO_copy_next_retry(b);
-*buf = '\0';
-return num > 0 ? num : num_chars;
+/* If data is already buffered then use this first */
+if (ctx->ibuf_len > 0) {
+p = ctx->ibuf + ctx->ibuf_off;
+found_newline = 0;
+for (num_chars = 0;
+ (num_chars < ctx->ibuf_len) && (num_chars < size);
+ num_chars++) {
+*buf++ = p[num_chars];
+if (p[num_chars] == '\n') {
+found_newline = 1;
+num_chars++;
+break;
 }
-ctx->ibuf_len = num_chars;
+}
+num += num_chars;
+size -= num_chars;
+ctx->ibuf_len -= num_chars;
+ctx->ibuf_off += num_chars;
+if (found_newline || size == 0) {
+*buf = '\0';
+return num;
 }
 }
+/*
+ * If there is no buffered data left then read any remaining data from the
+ * next bio.
+ */
+
+ /* Resize if we have to */
+ if (!readbuffer_resize(ctx, 1 + size))
+ return 0;
+ /*
+  * Read more data from the next bio using BIO_read_ex:
+  * Note we cannot use BIO_gets() here as it does not work on a
+  * binary stream that contains 0x00. (Since strlen() will stop at
+  * any 0x00 not at the last read '\n' in a FILE bio).
+  * Also note that some applications open and close the file bio
+  * multiple times and need to read the next available 

Build failed: openssl master.40905

2021-03-21 Thread AppVeyor



Build openssl master.40905 failed


Commit 875d468e74 by FdaSilvaYY on 2/20/2021 11:04 PM:

ssl: rework "e_os.h" inclusions


Configure your notification preferences



Build failed: openssl master.40901

2021-03-21 Thread AppVeyor



Build openssl master.40901 failed


Commit 35472835d3 by Armin Fuerst on 3/20/2021 2:29 AM:

Merge branch 'Issue_13944_testing' of https://arminfuerst:5300c98fd86a504dfaae7218b7e304365ea78...@github.com/arminfuerst/openssl.git


Configure your notification preferences



Build failed: openssl master.40892

2021-03-21 Thread AppVeyor



Build openssl master.40892 failed


Commit 24ad5dc6c8 by Kevin Cadieux on 3/19/2021 8:54 PM:

memleaktest with MSVC's AddressSanitizer


Configure your notification preferences



Build failed: openssl master.40891

2021-03-21 Thread AppVeyor



Build openssl master.40891 failed


Commit 8adeb73907 by Rich Salz on 2/17/2021 9:15 PM:

Fetch and free cipher and md's


Configure your notification preferences



Build failed: openssl master.40890

2021-03-21 Thread AppVeyor



Build openssl master.40890 failed


Commit da2c267c87 by David Benjamin on 3/19/2021 6:00 PM:

Merge OFB encrypt and decrypt test vectors.


Configure your notification preferences



Build failed: openssl master.40889

2021-03-21 Thread AppVeyor



Build openssl master.40889 failed


Commit 9e966bbcad by Todd Short on 6/5/2019 3:39 PM:

Add support for compressed certificates (RFC8879)


Configure your notification preferences



Coverity Scan: Analysis completed for OpenSSL-1.0.2

2021-03-21 Thread scan-admin


Your request for analysis of OpenSSL-1.0.2 has been completed successfully.
The results are available at 
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yoN-2BQSVjTtaSz8wS4wOr7Hlun-2FGpeF2rhqKLKnzox0Gkw-3D-3DJkGZ_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeHojm6ntkWlKaqpW1WcSbf6MyCKsZXaZfQ8Yvk9cqa2FRKF4YkWMhVnkvGmFqtrqIKfghLdkOqHQBIInmpeRM9e9TuIwJMB8IgzpceW-2BcMJ6MthBUM6ETA8bcOgH9KsVzetwV0mzZ3cFGXRsjhmQ6vKfP1mNw6sTfD-2F6Uq0xQlZ2Flhd8Mhleeepfge9E419o4-3D

Build ID: 376425

Analysis Summary:
   New defects found: 0
   Defects eliminated: 0



Coverity Scan: Analysis completed for openssl/openssl

2021-03-21 Thread scan-admin


Your request for analysis of openssl/openssl has been completed 
successfully.
The results are available at 
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yoN-2BQSVjTtaSz8wS4wOr7HlekBtV1P4YRtWclMVkCdvAA-3D-3DESF-_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeF0zgil-2BkfnYPpQYg-2B9FosKj2DONmw-2B2NRolx49MRx5vnBx3EGrY0V54iCXKfBIFYK5ddLF7j8YJJUrZ0j3Hm06JJILUw9OrQtQ5s-2FrZVaiZEp1hXRP5wKplBkdrLMDiltaONWZa-2FHd8aaU4oQDfrBoorwYuKpOHHbBqS8DD5f6RfoFOJp7HaLu8lS07pXojoU-3D

Build ID: 376424

Analysis Summary:
   New defects found: 11
   Defects eliminated: 42

If you have difficulty understanding any defects, email us at 
scan-ad...@coverity.com,
or post your question to StackOverflow
at 
https://u15810271.ct.sendgrid.net/ls/click?upn=CTPegkVN6peWFCMEieYYmPWIi1E4yUS9EoqKFcNAiqhRq8qmgeBE-2Bdt3uvFRAFXd-2FlwX83-2FVVdybfzIMOby0qA-3D-3DTiap_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeF0zgil-2BkfnYPpQYg-2B9FosKj2DONmw-2B2NRolx49MRx5vqhwV1ea5THPe5SdQAgOWuR0vKVYHemnOpE-2B2PARCJfGEnzxm8NivRAm261O7nsdlt8KcUNbV-2BHT-2Bhsi34na17xCsC-2FE9qCpDaD2IFcOC4bayPJX9akvy1mQxkarrwAnI8OvjvhV3HaXCpZAYL-2B5FTM-3D


[openssl] OpenSSL_1_1_1-stable update

2021-03-21 Thread Richard Levitte
The branch OpenSSL_1_1_1-stable has been updated
   via  ffefffa000437da5703dd8a173386623304b055d (commit)
  from  b402f00ee26157ad4e7e6e52f3a736743e3de46f (commit)


- Log -
commit ffefffa000437da5703dd8a173386623304b055d
Author: Richard Levitte 
Date:   Sat Mar 20 09:09:40 2021 +0100

ASN1: Reset the content dump flag after dumping

When encountering a badly coded item, the DER printer (ASN1_print_dump())
sets a flag to ensure that an additional hex dump of the offending content
is printed as part of the output.  Unfortunately, this flag is never reset,
which means that all following items are printed with the extra hex dump,
whether they are faulty or not.

Resetting the flag after hex dumping ensures that only the faulty contents
are printed with the additional hex dump.

Fixes #14626

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/14627)

(cherry picked from commit 6e34a1048ce4871371eac224b995c3b4338f6166)

---

Summary of changes:
 crypto/asn1/asn1_par.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index 3f10c7cb94..d45f810bce 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -325,6 +325,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 }
 if (BIO_puts(bp, "]") <= 0)
 goto end;
+dump_cont = 0;
 }
 
 if (!nl) {


[openssl] master update

2021-03-21 Thread Richard Levitte
The branch master has been updated
   via  6e34a1048ce4871371eac224b995c3b4338f6166 (commit)
  from  abded2ced44b94d96f08ea5cf01df6519b80f5d3 (commit)


- Log -
commit 6e34a1048ce4871371eac224b995c3b4338f6166
Author: Richard Levitte 
Date:   Sat Mar 20 09:09:40 2021 +0100

ASN1: Reset the content dump flag after dumping

When encountering a badly coded item, the DER printer (ASN1_print_dump())
sets a flag to ensure that an additional hex dump of the offending content
is printed as part of the output.  Unfortunately, this flag is never reset,
which means that all following items are printed with the extra hex dump,
whether they are faulty or not.

Resetting the flag after hex dumping ensures that only the faulty contents
are printed with the additional hex dump.

Fixes #14626

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/14627)

---

Summary of changes:
 crypto/asn1/asn1_par.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c
index cf6d48ce10..c51a8f7571 100644
--- a/crypto/asn1/asn1_par.c
+++ b/crypto/asn1/asn1_par.c
@@ -337,6 +337,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, 
long length,
 }
 if (BIO_puts(bp, "]") <= 0)
 goto end;
+dump_cont = 0;
 }
 
 if (!nl) {


Build failed: openssl master.40888

2021-03-21 Thread AppVeyor



Build openssl master.40888 failed


Commit abea55ec6b by Tomas Mraz on 3/19/2021 5:45 PM:

Implement EVP_PKEY_dup() function


Configure your notification preferences



Build failed: openssl master.40887

2021-03-21 Thread AppVeyor



Build openssl master.40887 failed


Commit bdbdb3a1ff by Rich Salz on 2/16/2021 10:51 PM:

Add "origin" field to EVP_CIPHER, EVP_MD


Configure your notification preferences