Build failed: openssl master.40908
Build openssl master.40908 failed Commit 3a3fcf8078 by Eric Curtin on 3/20/2021 9:41 PM: Added boolean flag grease_seeded Configure your notification preferences
Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-autoerrinit
Platform and configuration command: $ uname -a Linux run 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux $ CC=clang ../openssl/config -d --strict-warnings no-autoerrinit Commit log since last time: 6e34a1048c ASN1: Reset the content dump flag after dumping abded2ced4 evp: fix coverity 1473380: copy into fixed size buffer c38048e793 sslapitest: fix problem in cleanup on failure path b6d1bd4eb8 evp: fix coverity 1473381 - dereference after null check 72ded6f2a9 x509: coverity 1472673 & 1472693 - dereference after null checks f1619160c8 test: coverity 1469426 - dereference after null check 88ce406c89 ssl: coverity 1465527 - dereference after null check 8f586f5bc1 test: coverity 1455749 - dereference after null check 337ace06b9 test: coverity 1455747 - dereference after null check b6f0f546ff async: coverity 1446224 - dereference after null check 28c21fa048 evp: fix coverity 1445872 - dereference after null check 07aa88cccf decoder: fix Coverity 1473236 & 1473386: resource leaks 77b8b49bdd apps: fix Coverity 1472670 & 1472685: resource leaks bca681aa5b rsa: fix coverity 1472658: resource leak 7153f54437 evp: fix coverity 1470561: resource leak 9b0f76e12f test: fix coverity 1470559: resource leak 015b221a5f test: fix coverity 1455330, 1455332, 1455334, 1455342, 1455344 : resource leak e22105d1b3 ssl: fix coverity 1451495: resource leak 65bf029d49 test: fix coverity 1414449 & 1414471: resource leak c0cd48fcb9 test: fix coverity 1414445: resource leak 316c8dafd4 test: fix coverity 1454040: resource leak 743840d56f test: fix coverity 1451562: resource leak b573d0ceea test: fix coverity 1451553: resource leak aff442dc38 Make ossl_d2i_PUBKEY_legacy() completely libcrypto internal 695c96ba51 Make evp_privatekey_from_binary() completely libcrypto internal 55d9ccca8e TEST: Clarify and adjust test/recipes/30-test_evp.t c640b68785 STORE: Use the same error avoidance criteria as for the DER->key decoder ff1c10d920 TEST: Modify test/endecode_test.c to give the decoder callback the structure f4e46b817d PROV: Add type specific MSBLOB and PVK decoding for the MS->key decoders cf33379997 PROV: Add type specific PKCS#8 decoding to the DER->key decoders e0be34beee PROV: Add RSA-PSS specific OSSL_FUNC_KEYMGMT_LOAD function 06f6761280 PROV: Add type specific SubjectPublicKeyInfo decoding to the DER->key decoders 65ef000ec2 PROV: Refactor DER->key decoder 2d101b0f49 Configure: check all DEPEND values against GENERATE, not just .h files 6084b5c2c9 EVP_PKEY_get_*_param should work with legacy 03cd9d2f23 ASYNC_start_job: Reset libctx when async_fibre_swapcontext fails 0e2f87c03e Added functions for printing EVP_PKEYs to FILE * 39f6bf33e5 test: fix Coverity 1454818: use after free ebdb5cccde Fix windows build compiler issue. 2154a7a754 Update README-FIPS.md 9fe4f5bc82 Fix a missing rand -> ossl_rand rename ee067bc066 Ensure we deregister thread handlers even after a failed init 7e7e034a10 apps: fix coverity 966560: division by zero 3de7f014a9 ssl: fix coverity 1451515: out of bounds memory access 145f12d12d modes: fix coverity 1449860: overlapping memory copy b875e0e820 modes: fix coverity 1449851: overlapping memory copy cf3306dc6b Remove TODO comment. Resolves #14396 628d2d3a7f Fixing stack buffer overflow error caused by incorrectly sized array. c8830891e6 Add ossl_provider symbols 3022b7f404 Rename CMS_si_check_attributes to ossl_cms_si_check_attributes 78715dcc31 rename err_get_state_int() to ossl_err_get_state_int() 6d7776892f Add ossl_is_partially_overlapping symbol 4e17fb0061 Add ossl_pkcs5_pbkdf2_hmac_ex symbol b78c016649 Add ossl_pem_check_suffix symbol 4669015d7b Add ossl_ x509 symbols 6dd4b77a85 Add ossl_gost symbols 285aa80ef1 Add ossl_lhash symbols b54cab31d2 Add ossl_ symbol to x509 policy fc27fca84a Add ossl_bn_group symbols ff0266eddc Add ossl_sa symbols 8a6e912520 Add ossl_ symbols for sm3 and sm4 7bbadfc15a Add ossl_siv symbols 78f32a3165 Add ossl_aria symbols f148f7034c Add ossl_ conf symbols 054d43ff97 Add ossl_ ecx symbols 47864aeafd Add ossl_v3 symbols 4158b0dc1d Add ossl_rsa symbols 2858156e03 Add ossl_encode symbols adf7e6d1d6 Add ossl_asn1 symbols 1335ca4b07 Add ossl_rand symbols 9500c8234d Fix misc external ossl_ symbols. e4bec86910 Fix external symbols for crypto_* 63b64f19c1 TS and CMS CAdES-BES: Refactor check_signing_certs() funcs into common ESS func bef876f97e ts_check_signing_certs(): Make sure both ESSCertID and ESSCertIDv2 are checked 6b937ae3a7 TS ESS: Invert the search logic of ts_check_signing_certs() to correctly cover cert ID list 49f07be43d apps.c: Fix missing newline in warn_cert_msg() output d07d805799 Add tests for the limited Unicode code point range eb27d75788 ASN1: check the Unicode code point range in ASN1_mbstring_copy() ba64e5a92a ASN1: limit the Unicode code point range in UTF8_getc() and UTF8_putc() 90165623a5 ASN1: add an internal header to validate Unicode ranges 11c7874d0c ci: add a no-legacy build Build log ended with
Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-autoalginit
Platform and configuration command: $ uname -a Linux run 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux $ CC=clang ../openssl/config -d --strict-warnings no-autoalginit Commit log since last time: 6e34a1048c ASN1: Reset the content dump flag after dumping abded2ced4 evp: fix coverity 1473380: copy into fixed size buffer c38048e793 sslapitest: fix problem in cleanup on failure path b6d1bd4eb8 evp: fix coverity 1473381 - dereference after null check 72ded6f2a9 x509: coverity 1472673 & 1472693 - dereference after null checks f1619160c8 test: coverity 1469426 - dereference after null check 88ce406c89 ssl: coverity 1465527 - dereference after null check 8f586f5bc1 test: coverity 1455749 - dereference after null check 337ace06b9 test: coverity 1455747 - dereference after null check b6f0f546ff async: coverity 1446224 - dereference after null check 28c21fa048 evp: fix coverity 1445872 - dereference after null check 07aa88cccf decoder: fix Coverity 1473236 & 1473386: resource leaks 77b8b49bdd apps: fix Coverity 1472670 & 1472685: resource leaks bca681aa5b rsa: fix coverity 1472658: resource leak 7153f54437 evp: fix coverity 1470561: resource leak 9b0f76e12f test: fix coverity 1470559: resource leak 015b221a5f test: fix coverity 1455330, 1455332, 1455334, 1455342, 1455344 : resource leak e22105d1b3 ssl: fix coverity 1451495: resource leak 65bf029d49 test: fix coverity 1414449 & 1414471: resource leak c0cd48fcb9 test: fix coverity 1414445: resource leak 316c8dafd4 test: fix coverity 1454040: resource leak 743840d56f test: fix coverity 1451562: resource leak b573d0ceea test: fix coverity 1451553: resource leak aff442dc38 Make ossl_d2i_PUBKEY_legacy() completely libcrypto internal 695c96ba51 Make evp_privatekey_from_binary() completely libcrypto internal 55d9ccca8e TEST: Clarify and adjust test/recipes/30-test_evp.t c640b68785 STORE: Use the same error avoidance criteria as for the DER->key decoder ff1c10d920 TEST: Modify test/endecode_test.c to give the decoder callback the structure f4e46b817d PROV: Add type specific MSBLOB and PVK decoding for the MS->key decoders cf33379997 PROV: Add type specific PKCS#8 decoding to the DER->key decoders e0be34beee PROV: Add RSA-PSS specific OSSL_FUNC_KEYMGMT_LOAD function 06f6761280 PROV: Add type specific SubjectPublicKeyInfo decoding to the DER->key decoders 65ef000ec2 PROV: Refactor DER->key decoder 2d101b0f49 Configure: check all DEPEND values against GENERATE, not just .h files 6084b5c2c9 EVP_PKEY_get_*_param should work with legacy 03cd9d2f23 ASYNC_start_job: Reset libctx when async_fibre_swapcontext fails 0e2f87c03e Added functions for printing EVP_PKEYs to FILE * 39f6bf33e5 test: fix Coverity 1454818: use after free ebdb5cccde Fix windows build compiler issue. 2154a7a754 Update README-FIPS.md 9fe4f5bc82 Fix a missing rand -> ossl_rand rename ee067bc066 Ensure we deregister thread handlers even after a failed init 7e7e034a10 apps: fix coverity 966560: division by zero 3de7f014a9 ssl: fix coverity 1451515: out of bounds memory access 145f12d12d modes: fix coverity 1449860: overlapping memory copy b875e0e820 modes: fix coverity 1449851: overlapping memory copy cf3306dc6b Remove TODO comment. Resolves #14396 628d2d3a7f Fixing stack buffer overflow error caused by incorrectly sized array. c8830891e6 Add ossl_provider symbols 3022b7f404 Rename CMS_si_check_attributes to ossl_cms_si_check_attributes 78715dcc31 rename err_get_state_int() to ossl_err_get_state_int() 6d7776892f Add ossl_is_partially_overlapping symbol 4e17fb0061 Add ossl_pkcs5_pbkdf2_hmac_ex symbol b78c016649 Add ossl_pem_check_suffix symbol 4669015d7b Add ossl_ x509 symbols 6dd4b77a85 Add ossl_gost symbols 285aa80ef1 Add ossl_lhash symbols b54cab31d2 Add ossl_ symbol to x509 policy fc27fca84a Add ossl_bn_group symbols ff0266eddc Add ossl_sa symbols 8a6e912520 Add ossl_ symbols for sm3 and sm4 7bbadfc15a Add ossl_siv symbols 78f32a3165 Add ossl_aria symbols f148f7034c Add ossl_ conf symbols 054d43ff97 Add ossl_ ecx symbols 47864aeafd Add ossl_v3 symbols 4158b0dc1d Add ossl_rsa symbols 2858156e03 Add ossl_encode symbols adf7e6d1d6 Add ossl_asn1 symbols 1335ca4b07 Add ossl_rand symbols 9500c8234d Fix misc external ossl_ symbols. e4bec86910 Fix external symbols for crypto_* 63b64f19c1 TS and CMS CAdES-BES: Refactor check_signing_certs() funcs into common ESS func bef876f97e ts_check_signing_certs(): Make sure both ESSCertID and ESSCertIDv2 are checked 6b937ae3a7 TS ESS: Invert the search logic of ts_check_signing_certs() to correctly cover cert ID list 49f07be43d apps.c: Fix missing newline in warn_cert_msg() output d07d805799 Add tests for the limited Unicode code point range eb27d75788 ASN1: check the Unicode code point range in ASN1_mbstring_copy() ba64e5a92a ASN1: limit the Unicode code point range in UTF8_getc() and UTF8_putc() 90165623a5 ASN1: add an internal header to validate Unicode ranges 11c7874d0c ci: add a no-legacy build Build log ended with
Build failed: openssl master.40906
Build openssl master.40906 failed Commit a173522398 by Tanzinul Islam on 12/14/2020 11:31 PM: Remove crypt32.lib from C++Builder configuration Configure your notification preferences
Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-asm
Platform and configuration command: $ uname -a Linux run 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux $ CC=clang ../openssl/config -d --strict-warnings no-asm Commit log since last time: 6e34a1048c ASN1: Reset the content dump flag after dumping abded2ced4 evp: fix coverity 1473380: copy into fixed size buffer c38048e793 sslapitest: fix problem in cleanup on failure path b6d1bd4eb8 evp: fix coverity 1473381 - dereference after null check 72ded6f2a9 x509: coverity 1472673 & 1472693 - dereference after null checks f1619160c8 test: coverity 1469426 - dereference after null check 88ce406c89 ssl: coverity 1465527 - dereference after null check 8f586f5bc1 test: coverity 1455749 - dereference after null check 337ace06b9 test: coverity 1455747 - dereference after null check b6f0f546ff async: coverity 1446224 - dereference after null check 28c21fa048 evp: fix coverity 1445872 - dereference after null check 07aa88cccf decoder: fix Coverity 1473236 & 1473386: resource leaks 77b8b49bdd apps: fix Coverity 1472670 & 1472685: resource leaks bca681aa5b rsa: fix coverity 1472658: resource leak 7153f54437 evp: fix coverity 1470561: resource leak 9b0f76e12f test: fix coverity 1470559: resource leak 015b221a5f test: fix coverity 1455330, 1455332, 1455334, 1455342, 1455344 : resource leak e22105d1b3 ssl: fix coverity 1451495: resource leak 65bf029d49 test: fix coverity 1414449 & 1414471: resource leak c0cd48fcb9 test: fix coverity 1414445: resource leak 316c8dafd4 test: fix coverity 1454040: resource leak 743840d56f test: fix coverity 1451562: resource leak b573d0ceea test: fix coverity 1451553: resource leak aff442dc38 Make ossl_d2i_PUBKEY_legacy() completely libcrypto internal 695c96ba51 Make evp_privatekey_from_binary() completely libcrypto internal 55d9ccca8e TEST: Clarify and adjust test/recipes/30-test_evp.t c640b68785 STORE: Use the same error avoidance criteria as for the DER->key decoder ff1c10d920 TEST: Modify test/endecode_test.c to give the decoder callback the structure f4e46b817d PROV: Add type specific MSBLOB and PVK decoding for the MS->key decoders cf33379997 PROV: Add type specific PKCS#8 decoding to the DER->key decoders e0be34beee PROV: Add RSA-PSS specific OSSL_FUNC_KEYMGMT_LOAD function 06f6761280 PROV: Add type specific SubjectPublicKeyInfo decoding to the DER->key decoders 65ef000ec2 PROV: Refactor DER->key decoder 2d101b0f49 Configure: check all DEPEND values against GENERATE, not just .h files 6084b5c2c9 EVP_PKEY_get_*_param should work with legacy 03cd9d2f23 ASYNC_start_job: Reset libctx when async_fibre_swapcontext fails 0e2f87c03e Added functions for printing EVP_PKEYs to FILE * 39f6bf33e5 test: fix Coverity 1454818: use after free ebdb5cccde Fix windows build compiler issue. 2154a7a754 Update README-FIPS.md 9fe4f5bc82 Fix a missing rand -> ossl_rand rename ee067bc066 Ensure we deregister thread handlers even after a failed init 7e7e034a10 apps: fix coverity 966560: division by zero 3de7f014a9 ssl: fix coverity 1451515: out of bounds memory access 145f12d12d modes: fix coverity 1449860: overlapping memory copy b875e0e820 modes: fix coverity 1449851: overlapping memory copy cf3306dc6b Remove TODO comment. Resolves #14396 628d2d3a7f Fixing stack buffer overflow error caused by incorrectly sized array. c8830891e6 Add ossl_provider symbols 3022b7f404 Rename CMS_si_check_attributes to ossl_cms_si_check_attributes 78715dcc31 rename err_get_state_int() to ossl_err_get_state_int() 6d7776892f Add ossl_is_partially_overlapping symbol 4e17fb0061 Add ossl_pkcs5_pbkdf2_hmac_ex symbol b78c016649 Add ossl_pem_check_suffix symbol 4669015d7b Add ossl_ x509 symbols 6dd4b77a85 Add ossl_gost symbols 285aa80ef1 Add ossl_lhash symbols b54cab31d2 Add ossl_ symbol to x509 policy fc27fca84a Add ossl_bn_group symbols ff0266eddc Add ossl_sa symbols 8a6e912520 Add ossl_ symbols for sm3 and sm4 7bbadfc15a Add ossl_siv symbols 78f32a3165 Add ossl_aria symbols f148f7034c Add ossl_ conf symbols 054d43ff97 Add ossl_ ecx symbols 47864aeafd Add ossl_v3 symbols 4158b0dc1d Add ossl_rsa symbols 2858156e03 Add ossl_encode symbols adf7e6d1d6 Add ossl_asn1 symbols 1335ca4b07 Add ossl_rand symbols 9500c8234d Fix misc external ossl_ symbols. e4bec86910 Fix external symbols for crypto_* 63b64f19c1 TS and CMS CAdES-BES: Refactor check_signing_certs() funcs into common ESS func bef876f97e ts_check_signing_certs(): Make sure both ESSCertID and ESSCertIDv2 are checked 6b937ae3a7 TS ESS: Invert the search logic of ts_check_signing_certs() to correctly cover cert ID list 49f07be43d apps.c: Fix missing newline in warn_cert_msg() output d07d805799 Add tests for the limited Unicode code point range eb27d75788 ASN1: check the Unicode code point range in ASN1_mbstring_copy() ba64e5a92a ASN1: limit the Unicode code point range in UTF8_getc() and UTF8_putc() 90165623a5 ASN1: add an internal header to validate Unicode ranges 11c7874d0c ci: add a no-legacy build Build log ended with (last 100
[openssl] master update
The branch master has been updated via 251c48183b4d8934716ac1e5e66e2a10b81373fe (commit) from 6e34a1048ce4871371eac224b995c3b4338f6166 (commit) - Log - commit 251c48183b4d8934716ac1e5e66e2a10b81373fe Author: Shane Lontis Date: Thu Mar 18 15:00:23 2021 +1000 Fix DER reading from stdin for BIO_f_readbuffer Fixes #14559 The intitial implementation of the gets() function tried using the next bio's gets() function. For a file BIO this returned incorrect data for binary data containing 0x00. Just buffering all data during gets() did not work however since some applications open and close the bio multiple times when dealing with pem files containing multiple entries.. This does not work when reading from stdin unless the data if buffered one byte at a time. Reviewed-by: Tomas Mraz Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/14599) --- Summary of changes: crypto/bio/bf_readbuff.c | 92 ++-- test/bio_readbuffer_test.c| 131 ++ test/build.info | 7 +- test/recipes/61-test_bio_readbuffer.t | 29 4 files changed, 222 insertions(+), 37 deletions(-) create mode 100644 test/bio_readbuffer_test.c create mode 100644 test/recipes/61-test_bio_readbuffer.t diff --git a/crypto/bio/bf_readbuff.c b/crypto/bio/bf_readbuff.c index 673d592ec0..135ccef83b 100644 --- a/crypto/bio/bf_readbuff.c +++ b/crypto/bio/bf_readbuff.c @@ -57,7 +57,7 @@ static int readbuffer_new(BIO *bi) if (ctx == NULL) return 0; ctx->ibuf_size = DEFAULT_BUFFER_SIZE; -ctx->ibuf = OPENSSL_malloc(DEFAULT_BUFFER_SIZE); +ctx->ibuf = OPENSSL_zalloc(DEFAULT_BUFFER_SIZE); if (ctx->ibuf == NULL) { OPENSSL_free(ctx); return 0; @@ -220,6 +220,7 @@ static int readbuffer_gets(BIO *b, char *buf, int size) BIO_F_BUFFER_CTX *ctx; int num = 0, num_chars, found_newline; char *p; +int i, j; if (size == 0) return 0; @@ -227,42 +228,61 @@ static int readbuffer_gets(BIO *b, char *buf, int size) ctx = (BIO_F_BUFFER_CTX *)b->ptr; BIO_clear_retry_flags(b); -for (;;) { -if (ctx->ibuf_len > 0) { -p = &(ctx->ibuf[ctx->ibuf_off]); -found_newline = 0; -for (num_chars = 0; - (num_chars < ctx->ibuf_len) && (num_chars < size); - num_chars++) { -*(buf++) = p[num_chars]; -if (p[num_chars] == '\n') { -found_newline = 1; -num_chars++; -break; -} -} -num += num_chars; -size -= num_chars; -ctx->ibuf_len -= num_chars; -ctx->ibuf_off += num_chars; -if (found_newline || size == 0) { -*buf = '\0'; -return num; -} -} else { -/* read another line and resize if we have to */ -if (!readbuffer_resize(ctx, size)) -return 0; - -/* Read another line from the next bio using BIO_gets */ -num_chars = BIO_gets(b->next_bio, ctx->ibuf + ctx->ibuf_off, - 1 + size); -if (num_chars <= 0) { -BIO_copy_next_retry(b); -*buf = '\0'; -return num > 0 ? num : num_chars; +/* If data is already buffered then use this first */ +if (ctx->ibuf_len > 0) { +p = ctx->ibuf + ctx->ibuf_off; +found_newline = 0; +for (num_chars = 0; + (num_chars < ctx->ibuf_len) && (num_chars < size); + num_chars++) { +*buf++ = p[num_chars]; +if (p[num_chars] == '\n') { +found_newline = 1; +num_chars++; +break; } -ctx->ibuf_len = num_chars; +} +num += num_chars; +size -= num_chars; +ctx->ibuf_len -= num_chars; +ctx->ibuf_off += num_chars; +if (found_newline || size == 0) { +*buf = '\0'; +return num; } } +/* + * If there is no buffered data left then read any remaining data from the + * next bio. + */ + + /* Resize if we have to */ + if (!readbuffer_resize(ctx, 1 + size)) + return 0; + /* + * Read more data from the next bio using BIO_read_ex: + * Note we cannot use BIO_gets() here as it does not work on a + * binary stream that contains 0x00. (Since strlen() will stop at + * any 0x00 not at the last read '\n' in a FILE bio). + * Also note that some applications open and close the file bio + * multiple times and need to read the next available
Build failed: openssl master.40905
Build openssl master.40905 failed Commit 875d468e74 by FdaSilvaYY on 2/20/2021 11:04 PM: ssl: rework "e_os.h" inclusions Configure your notification preferences
Build failed: openssl master.40901
Build openssl master.40901 failed Commit 35472835d3 by Armin Fuerst on 3/20/2021 2:29 AM: Merge branch 'Issue_13944_testing' of https://arminfuerst:5300c98fd86a504dfaae7218b7e304365ea78...@github.com/arminfuerst/openssl.git Configure your notification preferences
Build failed: openssl master.40892
Build openssl master.40892 failed Commit 24ad5dc6c8 by Kevin Cadieux on 3/19/2021 8:54 PM: memleaktest with MSVC's AddressSanitizer Configure your notification preferences
Build failed: openssl master.40891
Build openssl master.40891 failed Commit 8adeb73907 by Rich Salz on 2/17/2021 9:15 PM: Fetch and free cipher and md's Configure your notification preferences
Build failed: openssl master.40890
Build openssl master.40890 failed Commit da2c267c87 by David Benjamin on 3/19/2021 6:00 PM: Merge OFB encrypt and decrypt test vectors. Configure your notification preferences
Build failed: openssl master.40889
Build openssl master.40889 failed Commit 9e966bbcad by Todd Short on 6/5/2019 3:39 PM: Add support for compressed certificates (RFC8879) Configure your notification preferences
Coverity Scan: Analysis completed for OpenSSL-1.0.2
Your request for analysis of OpenSSL-1.0.2 has been completed successfully. The results are available at https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yoN-2BQSVjTtaSz8wS4wOr7Hlun-2FGpeF2rhqKLKnzox0Gkw-3D-3DJkGZ_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeHojm6ntkWlKaqpW1WcSbf6MyCKsZXaZfQ8Yvk9cqa2FRKF4YkWMhVnkvGmFqtrqIKfghLdkOqHQBIInmpeRM9e9TuIwJMB8IgzpceW-2BcMJ6MthBUM6ETA8bcOgH9KsVzetwV0mzZ3cFGXRsjhmQ6vKfP1mNw6sTfD-2F6Uq0xQlZ2Flhd8Mhleeepfge9E419o4-3D Build ID: 376425 Analysis Summary: New defects found: 0 Defects eliminated: 0
Coverity Scan: Analysis completed for openssl/openssl
Your request for analysis of openssl/openssl has been completed successfully. The results are available at https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P0qcxCbhZ31OYv50yoN-2BQSVjTtaSz8wS4wOr7HlekBtV1P4YRtWclMVkCdvAA-3D-3DESF-_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeF0zgil-2BkfnYPpQYg-2B9FosKj2DONmw-2B2NRolx49MRx5vnBx3EGrY0V54iCXKfBIFYK5ddLF7j8YJJUrZ0j3Hm06JJILUw9OrQtQ5s-2FrZVaiZEp1hXRP5wKplBkdrLMDiltaONWZa-2FHd8aaU4oQDfrBoorwYuKpOHHbBqS8DD5f6RfoFOJp7HaLu8lS07pXojoU-3D Build ID: 376424 Analysis Summary: New defects found: 11 Defects eliminated: 42 If you have difficulty understanding any defects, email us at scan-ad...@coverity.com, or post your question to StackOverflow at https://u15810271.ct.sendgrid.net/ls/click?upn=CTPegkVN6peWFCMEieYYmPWIi1E4yUS9EoqKFcNAiqhRq8qmgeBE-2Bdt3uvFRAFXd-2FlwX83-2FVVdybfzIMOby0qA-3D-3DTiap_MulOTlHne1IxTRELXXnGni8d68xSVF-2BUCe3a7Ux-2BjeF0zgil-2BkfnYPpQYg-2B9FosKj2DONmw-2B2NRolx49MRx5vqhwV1ea5THPe5SdQAgOWuR0vKVYHemnOpE-2B2PARCJfGEnzxm8NivRAm261O7nsdlt8KcUNbV-2BHT-2Bhsi34na17xCsC-2FE9qCpDaD2IFcOC4bayPJX9akvy1mQxkarrwAnI8OvjvhV3HaXCpZAYL-2B5FTM-3D
[openssl] OpenSSL_1_1_1-stable update
The branch OpenSSL_1_1_1-stable has been updated via ffefffa000437da5703dd8a173386623304b055d (commit) from b402f00ee26157ad4e7e6e52f3a736743e3de46f (commit) - Log - commit ffefffa000437da5703dd8a173386623304b055d Author: Richard Levitte Date: Sat Mar 20 09:09:40 2021 +0100 ASN1: Reset the content dump flag after dumping When encountering a badly coded item, the DER printer (ASN1_print_dump()) sets a flag to ensure that an additional hex dump of the offending content is printed as part of the output. Unfortunately, this flag is never reset, which means that all following items are printed with the extra hex dump, whether they are faulty or not. Resetting the flag after hex dumping ensures that only the faulty contents are printed with the additional hex dump. Fixes #14626 Reviewed-by: Tim Hudson (Merged from https://github.com/openssl/openssl/pull/14627) (cherry picked from commit 6e34a1048ce4871371eac224b995c3b4338f6166) --- Summary of changes: crypto/asn1/asn1_par.c | 1 + 1 file changed, 1 insertion(+) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index 3f10c7cb94..d45f810bce 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -325,6 +325,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, } if (BIO_puts(bp, "]") <= 0) goto end; +dump_cont = 0; } if (!nl) {
[openssl] master update
The branch master has been updated via 6e34a1048ce4871371eac224b995c3b4338f6166 (commit) from abded2ced44b94d96f08ea5cf01df6519b80f5d3 (commit) - Log - commit 6e34a1048ce4871371eac224b995c3b4338f6166 Author: Richard Levitte Date: Sat Mar 20 09:09:40 2021 +0100 ASN1: Reset the content dump flag after dumping When encountering a badly coded item, the DER printer (ASN1_print_dump()) sets a flag to ensure that an additional hex dump of the offending content is printed as part of the output. Unfortunately, this flag is never reset, which means that all following items are printed with the extra hex dump, whether they are faulty or not. Resetting the flag after hex dumping ensures that only the faulty contents are printed with the additional hex dump. Fixes #14626 Reviewed-by: Tim Hudson (Merged from https://github.com/openssl/openssl/pull/14627) --- Summary of changes: crypto/asn1/asn1_par.c | 1 + 1 file changed, 1 insertion(+) diff --git a/crypto/asn1/asn1_par.c b/crypto/asn1/asn1_par.c index cf6d48ce10..c51a8f7571 100644 --- a/crypto/asn1/asn1_par.c +++ b/crypto/asn1/asn1_par.c @@ -337,6 +337,7 @@ static int asn1_parse2(BIO *bp, const unsigned char **pp, long length, } if (BIO_puts(bp, "]") <= 0) goto end; +dump_cont = 0; } if (!nl) {
Build failed: openssl master.40888
Build openssl master.40888 failed Commit abea55ec6b by Tomas Mraz on 3/19/2021 5:45 PM: Implement EVP_PKEY_dup() function Configure your notification preferences
Build failed: openssl master.40887
Build openssl master.40887 failed Commit bdbdb3a1ff by Rich Salz on 2/16/2021 10:51 PM: Add "origin" field to EVP_CIPHER, EVP_MD Configure your notification preferences