[openssl-commits] Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-comp

2017-03-07 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux test 4.4.0-64-generic #85-Ubuntu SMP Mon Feb 20 11:50:30 UTC 2017 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-comp

Commit log since last time:

75e314f Fix the number of tests to skip if TLSv1.3 is disabled
774c909 Add a test for records not on the record boundary
524420d Check TLSv1.3 ServerHello, Finished and KeyUpdates are on record 
boundary
b8c4961 Provide a function to test whether we have unread records pending
c1f84df Remove doc reference to non-existant GCM example
9015d34 Get pointer type right in BIO_ssl_shutdown()
f8418d8 crypto/x86_64cpuid.pl: move extended feature detection upwards.
ee6d9df test: add chacha_internal_test.
bf580d5 Increase the password buffer size to APP_PASS_LEN.

Build log ended with (last 100 lines):

Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/1 subtests 
../../openssl/test/recipes/70-test_renegotiation.t  ok
../../openssl/test/recipes/70-test_sslcbcpadding.t  ok
../../openssl/test/recipes/70-test_sslcertstatus.t  ok
../../openssl/test/recipes/70-test_sslextension.t . ok
../../openssl/test/recipes/70-test_sslmessages.t .. ok
../../openssl/test/recipes/70-test_sslrecords.t ... ok
../../openssl/test/recipes/70-test_sslsessiontick.t ... ok
../../openssl/test/recipes/70-test_sslsigalgs.t ... ok
../../openssl/test/recipes/70-test_sslsignature.t . ok
../../openssl/test/recipes/70-test_sslskewith0p.t . ok
../../openssl/test/recipes/70-test_sslversions.t .. skipped: 
test_sslversions needs TLS1.3, TLS1.2 and TLS1.1 enabled
../../openssl/test/recipes/70-test_sslvertol.t  ok
../../openssl/test/recipes/70-test_tls13cookie.t .. skipped: 
test_tls13cookie needs TLS1.3 enabled
../../openssl/test/recipes/70-test_tls13kexmodes.t  skipped: 
test_tls13kexmodes needs TLSv1.3 enabled
../../openssl/test/recipes/70-test_tls13messages.t  skipped: 
test_tls13messages needs TLSv1.3 enabled
../../openssl/test/recipes/70-test_tlsextms.t . ok
../../openssl/test/recipes/70-test_verify_extra.t . ok
../../openssl/test/recipes/70-test_wpacket.t .. ok
../../openssl/test/recipes/80-test_ca.t ... ok
../../openssl/test/recipes/80-test_cipherbytes.t .. ok
../../openssl/test/recipes/80-test_cipherlist.t ... ok
../../openssl/test/recipes/80-test_cms.t .. ok
../../openssl/test/recipes/80-test_ct.t ... ok
../../openssl/test/recipes/80-test_dane.t . ok
../../openssl/test/recipes/80-test_dtls.t . ok
../../openssl/test/recipes/80-test_dtls_mtu.t . ok
../../openssl/test/recipes/80-test_dtlsv1listen.t . ok
../../openssl/test/recipes/80-test_ocsp.t . ok
../../openssl/test/recipes/80-test_pkcs12.t ... ok

#   Failed test 'running ssl_test 13-fragmentation.conf'
#   at ../../openssl/test/recipes/80-test_ssl_new.t line 135.
# Looks like you failed 1 test of 3.

#   Failed test 'Test configuration 13-fragmentation.conf'
#   at ../../openssl/test/recipes/80-test_ssl_new.t line 101.
# Looks like you failed 1 test of 22.
../../openssl/test/recipes/80-test_ssl_new.t .. 
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/22 subtests 
../../openssl/test/recipes/80-test_ssl_old.t .. ok
../../openssl/test/recipes/80-test_ssl_test_ctx.t . ok

#   Failed test 'running sslcorrupttest'
#   at ../../openssl/test/recipes/80-test_sslcorrupt.t line 19.
# Looks like you failed 1 test of 1.
../../openssl/test/recipes/80-test_sslcorrupt.t ... 
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/1 subtests 
../../openssl/test/recipes/80-test_tsa.t .. ok
../../openssl/test/recipes/80-test_x509aux.t .. ok
../../openssl/test/recipes/90-test_async.t  ok
../../openssl/test/recipes/90-test_bio_enc.t .. ok
../../openssl/test/recipes/90-test_bioprint.t . ok
../../openssl/test/recipes/90-test_constant_time.t  ok
../../openssl/test/recipes/90-test_external.t . skipped: No external 
tests in this configuration
../../openssl/test/recipes/90-test_gmdiff.t ... ok
../../openssl/test/recipes/90-test_ige.t .. ok
../../openssl/test/recipes/90-test_memleak.t .. ok
../../openssl/test/recipes/90-test_overhead.t . skipped: Only supported 
in no-shared builds
../../openssl/test/recipes/90-test_secmem.t ... ok
../../openssl/test/recipes/90-test_shlibload.t  ok
../../openssl/test/recipes/90-test_srp.t .. ok

#   Failed test 'running sslapitest'
#   at ../../openssl/test/recipes/90-test_sslapi.t line 20.
# Looks like you failed 1 test of 1.
../../openssl/test/recipes/90-test_sslapi.t ... 
Dubious, test returned 1 (wstat 256, 0x100)
Failed 1/1 subtests 
../../openssl/test/recipes/90-test_threads.t .. ok
../../openssl/test/recipes/90-test_tls13encryption.t .. skipped: 
tls13encryption is not supported in this 

[openssl-commits] [openssl] master update

2017-03-07 Thread Matt Caswell
The branch master has been updated
   via  75e314f2d573d4f984ff6a371be7a4966bf5f4c5 (commit)
   via  774c909bc9bba503bd3657c5d89a9b689c4da2f3 (commit)
   via  524420d8459fa07a8e4900bc9dfb558b215edbbd (commit)
   via  b8c49611bc26c8f9a980b814496a3069cd524b79 (commit)
  from  c1f84df2484d9d6745f5aaf1eb708f0bcd3faf28 (commit)


- Log -
commit 75e314f2d573d4f984ff6a371be7a4966bf5f4c5
Author: Matt Caswell 
Date:   Tue Mar 7 16:21:38 2017 +

Fix the number of tests to skip if TLSv1.3 is disabled

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/2875)

commit 774c909bc9bba503bd3657c5d89a9b689c4da2f3
Author: Matt Caswell 
Date:   Tue Mar 7 12:03:10 2017 +

Add a test for records not on the record boundary

Test that we check that key change messages appear on a record boundary.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/2875)

commit 524420d8459fa07a8e4900bc9dfb558b215edbbd
Author: Matt Caswell 
Date:   Tue Mar 7 10:21:58 2017 +

Check TLSv1.3 ServerHello, Finished and KeyUpdates are on record boundary

In TLSv1.3 the above messages signal a key change. The spec requires that
the end of these messages must align with a record boundary. We can detect
this by checking for decrypted but as yet unread record data sitting in
OpenSSL buffers at the point where we process the messages.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/2875)

commit b8c49611bc26c8f9a980b814496a3069cd524b79
Author: Matt Caswell 
Date:   Fri Mar 3 12:41:39 2017 +

Provide a function to test whether we have unread records pending

Also updates SSL_has_pending() to use it. This actually fixes a bug in
SSL_has_pending() which is supposed to return 1 if we have any processed
or unprocessed data sitting in OpenSSL buffers. However it failed to return
1 if we had processed non-application data pending.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/2875)

---

Summary of changes:
 include/openssl/ssl.h |   1 +
 ssl/record/rec_layer_s3.c |  13 
 ssl/record/record.h   |   1 +
 ssl/ssl_err.c |   1 +
 ssl/ssl_lib.c |   2 +-
 ssl/statem/statem_clnt.c  |  10 
 ssl/statem/statem_lib.c   |  20 +++
 test/recipes/70-test_sslrecords.t | 123 ++
 8 files changed, 159 insertions(+), 12 deletions(-)

diff --git a/include/openssl/ssl.h b/include/openssl/ssl.h
index c569407..9fbf3d1 100644
--- a/include/openssl/ssl.h
+++ b/include/openssl/ssl.h
@@ -2575,6 +2575,7 @@ int ERR_load_SSL_strings(void);
 # define SSL_R_MISSING_SRP_PARAM  358
 # define SSL_R_MISSING_TMP_DH_KEY 171
 # define SSL_R_MISSING_TMP_ECDH_KEY   311
+# define SSL_R_NOT_ON_RECORD_BOUNDARY 182
 # define SSL_R_NO_CERTIFICATES_RETURNED   176
 # define SSL_R_NO_CERTIFICATE_ASSIGNED177
 # define SSL_R_NO_CERTIFICATE_SET 179
diff --git a/ssl/record/rec_layer_s3.c b/ssl/record/rec_layer_s3.c
index 2cdc62d..a14d372 100644
--- a/ssl/record/rec_layer_s3.c
+++ b/ssl/record/rec_layer_s3.c
@@ -77,11 +77,24 @@ void RECORD_LAYER_release(RECORD_LAYER *rl)
 SSL3_RECORD_release(rl->rrec, SSL_MAX_PIPELINES);
 }
 
+/* Checks if we have unprocessed read ahead data pending */
 int RECORD_LAYER_read_pending(const RECORD_LAYER *rl)
 {
 return SSL3_BUFFER_get_left(>rbuf) != 0;
 }
 
+/* Checks if we have decrypted unread record data pending */
+int RECORD_LAYER_processed_read_pending(const RECORD_LAYER *rl)
+{
+size_t curr_rec = 0, num_recs = RECORD_LAYER_get_numrpipes(rl);
+const SSL3_RECORD *rr = rl->rrec;
+
+while (curr_rec < num_recs && SSL3_RECORD_is_read([curr_rec]))
+curr_rec++;
+
+return curr_rec < num_recs;
+}
+
 int RECORD_LAYER_write_pending(const RECORD_LAYER *rl)
 {
 return (rl->numwpipes > 0)
diff --git a/ssl/record/record.h b/ssl/record/record.h
index 2c9b9dd..6880f77 100644
--- a/ssl/record/record.h
+++ b/ssl/record/record.h
@@ -207,6 +207,7 @@ void RECORD_LAYER_init(RECORD_LAYER *rl, SSL *s);
 void RECORD_LAYER_clear(RECORD_LAYER *rl);
 void RECORD_LAYER_release(RECORD_LAYER *rl);
 int RECORD_LAYER_read_pending(const RECORD_LAYER *rl);
+int RECORD_LAYER_processed_read_pending(const RECORD_LAYER *rl);
 int RECORD_LAYER_write_pending(const RECORD_LAYER *rl);
 void RECORD_LAYER_reset_read_sequence(RECORD_LAYER *rl);
 void 

[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2017-03-07 Thread Matt Caswell
The branch OpenSSL_1_1_0-stable has been updated
   via  b1f723c503b371776b2ae67a8cb78c8765387174 (commit)
  from  9c8d082a44b663ed4cdd472dcc3f21831d0b92be (commit)


- Log -
commit b1f723c503b371776b2ae67a8cb78c8765387174
Author: Matt Caswell 
Date:   Fri Mar 3 12:41:39 2017 +

Provide a function to test whether we have unread records pending

Also updates SSL_has_pending() to use it. This actually fixes a bug in
SSL_has_pending() which is supposed to return 1 if we have any processed
or unprocessed data sitting in OpenSSL buffers. However it failed to return
1 if we had processed non-application data pending.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/2875)
(cherry picked from commit b8c49611bc26c8f9a980b814496a3069cd524b79)

---

Summary of changes:
 ssl/record/rec_layer_s3.c | 13 +
 ssl/record/record.h   |  1 +
 ssl/ssl_lib.c |  2 +-
 3 files changed, 15 insertions(+), 1 deletion(-)

diff --git a/ssl/record/rec_layer_s3.c b/ssl/record/rec_layer_s3.c
index 4a7e59b..2f105a4 100644
--- a/ssl/record/rec_layer_s3.c
+++ b/ssl/record/rec_layer_s3.c
@@ -76,11 +76,24 @@ void RECORD_LAYER_release(RECORD_LAYER *rl)
 SSL3_RECORD_release(rl->rrec, SSL_MAX_PIPELINES);
 }
 
+/* Checks if we have unprocessed read ahead data pending */
 int RECORD_LAYER_read_pending(const RECORD_LAYER *rl)
 {
 return SSL3_BUFFER_get_left(>rbuf) != 0;
 }
 
+/* Checks if we have decrypted unread record data pending */
+int RECORD_LAYER_processed_read_pending(const RECORD_LAYER *rl)
+{
+size_t curr_rec = 0, num_recs = RECORD_LAYER_get_numrpipes(rl);
+const SSL3_RECORD *rr = rl->rrec;
+
+while (curr_rec < num_recs && SSL3_RECORD_is_read([curr_rec]))
+curr_rec++;
+
+return curr_rec < num_recs;
+}
+
 int RECORD_LAYER_write_pending(const RECORD_LAYER *rl)
 {
 return (rl->numwpipes > 0)
diff --git a/ssl/record/record.h b/ssl/record/record.h
index 3e1530f..9bb2431 100644
--- a/ssl/record/record.h
+++ b/ssl/record/record.h
@@ -207,6 +207,7 @@ void RECORD_LAYER_init(RECORD_LAYER *rl, SSL *s);
 void RECORD_LAYER_clear(RECORD_LAYER *rl);
 void RECORD_LAYER_release(RECORD_LAYER *rl);
 int RECORD_LAYER_read_pending(const RECORD_LAYER *rl);
+int RECORD_LAYER_processed_read_pending(const RECORD_LAYER *rl);
 int RECORD_LAYER_write_pending(const RECORD_LAYER *rl);
 int RECORD_LAYER_set_data(RECORD_LAYER *rl, const unsigned char *buf, int len);
 void RECORD_LAYER_reset_read_sequence(RECORD_LAYER *rl);
diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
index 08af56b..e6e59f2 100644
--- a/ssl/ssl_lib.c
+++ b/ssl/ssl_lib.c
@@ -1313,7 +1313,7 @@ int SSL_has_pending(const SSL *s)
  * data. That data may not result in any application data, or we may fail
  * to parse the records for some reason.
  */
-if (SSL_pending(s))
+if (RECORD_LAYER_processed_read_pending(>rlayer))
 return 1;
 
 return RECORD_LAYER_read_pending(>rlayer);
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Still FAILED build of OpenSSL branch OpenSSL_1_1_0-stable with options -d --strict-warnings no-asm -ansi

2017-03-07 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux test 4.4.0-64-generic #85-Ubuntu SMP Mon Feb 20 11:50:30 UTC 2017 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-asm -ansi

Commit log since last time:

bf1c92f Increase the password buffer size to APP_PASS_LEN.
6542af0 Unix Makefile: Have manual generation use the same perl script as 
Windows and VMS
b7a9c3f util/process_docs.pl: make it possible to add a suffix to man docs
c6d8bbd Remove some duplicate manpage entries
08beac4 Add documentation on platform specific checks
a40b5be Add a platform specific configuration checker
0d41526 Fix an endless loop in rsa_builtin_keygen.

Build log ended with (last 100 lines):

clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g -pthread -m64 
-DL_ENDIAN -Wextra -Qunused-arguments  -DDEBUG_UNUSED -DPEDANTIC -pedantic 
-Wno-long-long -Wall -Wsign-compare -Wmissing-prototypes -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Qunused-arguments -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wno-language-extension-token 
-Wno-extended-offsetof -Wconditional-uninitialized 
-Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -ansi -fPIC -DOPENSSL_USE_NODELETE -MMD -MF 
crypto/asn1/asn1_lib.d.tmp -MT crypto/asn1/asn1_lib.o -c -o 
crypto/asn1/asn1_lib.o ../openssl/crypto/asn1/asn1_lib.c
clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g -pthread -m64 
-DL_ENDIAN -Wextra -Qunused-arguments  -DDEBUG_UNUSED -DPEDANTIC -pedantic 
-Wno-long-long -Wall -Wsign-compare -Wmissing-prototypes -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Qunused-arguments -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wno-language-extension-token 
-Wno-extended-offsetof -Wconditional-uninitialized 
-Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -ansi -fPIC -DOPENSSL_USE_NODELETE -MMD -MF 
crypto/asn1/asn1_par.d.tmp -MT crypto/asn1/asn1_par.o -c -o 
crypto/asn1/asn1_par.o ../openssl/crypto/asn1/asn1_par.c
clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g -pthread -m64 
-DL_ENDIAN -Wextra -Qunused-arguments  -DDEBUG_UNUSED -DPEDANTIC -pedantic 
-Wno-long-long -Wall -Wsign-compare -Wmissing-prototypes -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Qunused-arguments -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wno-language-extension-token 
-Wno-extended-offsetof -Wconditional-uninitialized 
-Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -ansi -fPIC -DOPENSSL_USE_NODELETE -MMD -MF 
crypto/asn1/asn_mime.d.tmp -MT crypto/asn1/asn_mime.o -c -o 
crypto/asn1/asn_mime.o ../openssl/crypto/asn1/asn_mime.c
clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g -pthread -m64 
-DL_ENDIAN -Wextra -Qunused-arguments  -DDEBUG_UNUSED -DPEDANTIC -pedantic 
-Wno-long-long -Wall -Wsign-compare -Wmissing-prototypes -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Qunused-arguments -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wno-language-extension-token 
-Wno-extended-offsetof -Wconditional-uninitialized 
-Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -ansi -fPIC -DOPENSSL_USE_NODELETE -MMD -MF 
crypto/asn1/asn_moid.d.tmp -MT crypto/asn1/asn_moid.o -c -o 
crypto/asn1/asn_moid.o ../openssl/crypto/asn1/asn_moid.c
clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g -pthread -m64 
-DL_ENDIAN -Wextra -Qunused-arguments  -DDEBUG_UNUSED -DPEDANTIC -pedantic 
-Wno-long-long -Wall -Wsign-compare -Wmissing-prototypes -Wshadow -Wformat 
-Wtype-limits -Wundef -Werror -Qunused-arguments -Wextra -Wno-unused-parameter 
-Wno-missing-field-initializers -Wno-language-extension-token 
-Wno-extended-offsetof -Wconditional-uninitialized 
-Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations 

[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2017-03-07 Thread Rich Salz
The branch OpenSSL_1_0_2-stable has been updated
   via  5c09502be4821a36e7023f74223386f77c2b2d14 (commit)
  from  540739d8757f88fe65832b644b0e0077ddb4d6d1 (commit)


- Log -
commit 5c09502be4821a36e7023f74223386f77c2b2d14
Author: Pauli 
Date:   Tue Mar 7 08:45:48 2017 +1000

Remove doc reference to non-existant GCM example

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/2866)

(cherry picked from commit c1f84df2484d9d6745f5aaf1eb708f0bcd3faf28)

---

Summary of changes:
 doc/crypto/EVP_EncryptInit.pod | 2 --
 1 file changed, 2 deletions(-)

diff --git a/doc/crypto/EVP_EncryptInit.pod b/doc/crypto/EVP_EncryptInit.pod
index d951333..9b223c9 100644
--- a/doc/crypto/EVP_EncryptInit.pod
+++ b/doc/crypto/EVP_EncryptInit.pod
@@ -395,8 +395,6 @@ Sets the expected tag to B bytes from B. This 
call is only legal
 when decrypting data and must be made B any data is processed (e.g.
 before any EVP_DecryptUpdate() call). 
 
-See L below for an example of the use of GCM mode.
-
 =head1 CCM Mode
 
 The behaviour of CCM mode ciphers is similar to CCM mode but with a few
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2017-03-07 Thread Rich Salz
The branch master has been updated
   via  c1f84df2484d9d6745f5aaf1eb708f0bcd3faf28 (commit)
  from  9015d34e141af747f7c750f8d08f862b2a8273c7 (commit)


- Log -
commit c1f84df2484d9d6745f5aaf1eb708f0bcd3faf28
Author: Pauli 
Date:   Tue Mar 7 08:45:48 2017 +1000

Remove doc reference to non-existant GCM example

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/2866)

---

Summary of changes:
 doc/man3/EVP_EncryptInit.pod | 2 --
 1 file changed, 2 deletions(-)

diff --git a/doc/man3/EVP_EncryptInit.pod b/doc/man3/EVP_EncryptInit.pod
index db578e5..6695f02 100644
--- a/doc/man3/EVP_EncryptInit.pod
+++ b/doc/man3/EVP_EncryptInit.pod
@@ -455,8 +455,6 @@ length can only be set before specifying an IV. If not 
called a default tag
 length is used. For OCB AES the default is 16 (i.e. 128 bits). This is also the
 maximum tag length for OCB.
 
-See L below for an example of the use of GCM mode.
-
 =head1 CCM Mode
 
 The behaviour of CCM mode ciphers is similar to GCM mode but with a few
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2017-03-07 Thread Rich Salz
The branch OpenSSL_1_1_0-stable has been updated
   via  9c8d082a44b663ed4cdd472dcc3f21831d0b92be (commit)
  from  51800912006b2b09ed61607842fce8dbb2f44a9c (commit)


- Log -
commit 9c8d082a44b663ed4cdd472dcc3f21831d0b92be
Author: Pauli 
Date:   Tue Mar 7 08:45:48 2017 +1000

Remove doc reference to non-existing GCM example

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/2866)
(cherry picked from commit f6ff4e32d48f8929fa33781bff5e6e42c713564f)

---

Summary of changes:
 doc/crypto/EVP_EncryptInit.pod | 2 --
 1 file changed, 2 deletions(-)

diff --git a/doc/crypto/EVP_EncryptInit.pod b/doc/crypto/EVP_EncryptInit.pod
index db578e5..6695f02 100644
--- a/doc/crypto/EVP_EncryptInit.pod
+++ b/doc/crypto/EVP_EncryptInit.pod
@@ -455,8 +455,6 @@ length can only be set before specifying an IV. If not 
called a default tag
 length is used. For OCB AES the default is 16 (i.e. 128 bits). This is also the
 maximum tag length for OCB.
 
-See L below for an example of the use of GCM mode.
-
 =head1 CCM Mode
 
 The behaviour of CCM mode ciphers is similar to GCM mode but with a few
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2017-03-07 Thread Rich Salz
The branch OpenSSL_1_1_0-stable has been updated
   via  51800912006b2b09ed61607842fce8dbb2f44a9c (commit)
  from  c6e4fdbf8b44010ba12b72d519e437bbd2da71e6 (commit)


- Log -
commit 51800912006b2b09ed61607842fce8dbb2f44a9c
Author: Rich Salz 
Date:   Thu Feb 16 11:13:47 2017 -0500

Get pointer type right in BIO_ssl_shutdown()

Also, restore 1.0.2 behavior of looping over all BIO's in the chain.
Thanks to Joseph Bester for finding this and suggesting a fix to the
crash.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/2651)
(cherry picked from commit 9015d34e141af747f7c750f8d08f862b2a8273c7)

---

Summary of changes:
 ssl/bio_ssl.c | 17 +
 1 file changed, 9 insertions(+), 8 deletions(-)

diff --git a/ssl/bio_ssl.c b/ssl/bio_ssl.c
index 3dd09cf..5322c03 100644
--- a/ssl/bio_ssl.c
+++ b/ssl/bio_ssl.c
@@ -517,12 +517,13 @@ int BIO_ssl_copy_session_id(BIO *t, BIO *f)
 
 void BIO_ssl_shutdown(BIO *b)
 {
-SSL *s;
-
-b = BIO_find_type(b, BIO_TYPE_SSL);
-if (b == NULL)
-return;
-
-s = BIO_get_data(b);
-SSL_shutdown(s);
+BIO_SSL *bdata;
+
+for (; b != NULL; b = BIO_next(b)) {
+if (BIO_method_type(b) != BIO_TYPE_SSL)
+continue;
+bdata = BIO_get_data(b);
+if (bdata != NULL && bdata->ssl != NULL)
+SSL_shutdown(bdata->ssl);
+}
 }
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2017-03-07 Thread Rich Salz
The branch master has been updated
   via  9015d34e141af747f7c750f8d08f862b2a8273c7 (commit)
  from  f8418d87e191e46b81e1b9548326ab2876fa0907 (commit)


- Log -
commit 9015d34e141af747f7c750f8d08f862b2a8273c7
Author: Rich Salz 
Date:   Thu Feb 16 11:13:47 2017 -0500

Get pointer type right in BIO_ssl_shutdown()

Also, restore 1.0.2 behavior of looping over all BIO's in the chain.
Thanks to Joseph Bester for finding this and suggesting a fix to the
crash.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/2651)

---

Summary of changes:
 ssl/bio_ssl.c | 17 +
 1 file changed, 9 insertions(+), 8 deletions(-)

diff --git a/ssl/bio_ssl.c b/ssl/bio_ssl.c
index 8b5036f..29ae258 100644
--- a/ssl/bio_ssl.c
+++ b/ssl/bio_ssl.c
@@ -506,12 +506,13 @@ int BIO_ssl_copy_session_id(BIO *t, BIO *f)
 
 void BIO_ssl_shutdown(BIO *b)
 {
-SSL *s;
-
-b = BIO_find_type(b, BIO_TYPE_SSL);
-if (b == NULL)
-return;
-
-s = BIO_get_data(b);
-SSL_shutdown(s);
+BIO_SSL *bdata;
+
+for (; b != NULL; b = BIO_next(b)) {
+if (BIO_method_type(b) != BIO_TYPE_SSL)
+continue;
+bdata = BIO_get_data(b);
+if (bdata != NULL && bdata->ssl != NULL)
+SSL_shutdown(bdata->ssl);
+}
 }
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2017-03-07 Thread Rich Salz
The branch master has been updated
   via  72d16fefd72ff9d0237beb134675c669c33630e0 (commit)
  from  0b797eb70c7a49b545a556932376a676658b3845 (commit)


- Log -
commit 72d16fefd72ff9d0237beb134675c669c33630e0
Author: Rich Salz 
Date:   Tue Mar 7 10:00:02 2017 -0500

Fix typo in example

Thanks to Cory Benfield for finding and fixing this.

---

Summary of changes:
 policies/releasestrat.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/policies/releasestrat.html b/policies/releasestrat.html
index 033af50..f442cd0 100644
--- a/policies/releasestrat.html
+++ b/policies/releasestrat.html
@@ -28,7 +28,7 @@
  contain new features, but in a way that does not break binary
  compatibility. This means that an application compiled and
  dynamically linked with 1.1.0 does not need to be recompiled
- when the shared library is updated to 1.1.0. It should be
+ when the shared library is updated to 1.1.1. It should be
  noted that some features are transparent to the application
  such as the maximum negotiated TLS version and cipher suites,
  performance improvements and so on. There is no need to
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2017-03-07 Thread Andy Polyakov
The branch OpenSSL_1_0_2-stable has been updated
   via  540739d8757f88fe65832b644b0e0077ddb4d6d1 (commit)
  from  f2d779931abd5cbfea249f8290c95b909562d7c7 (commit)


- Log -
commit 540739d8757f88fe65832b644b0e0077ddb4d6d1
Author: Andy Polyakov 
Date:   Sun Mar 5 20:38:36 2017 +0100

crypto/x86_64cpuid.pl: move extended feature detection upwards.

Exteneded feature flags were not pulled on AMD processors, as result a
number of extensions were effectively masked on Ryzen. It should have
been reported for Excavator since it implements AVX2 extension, but
apparently nobody noticed or cared...

Reviewed-by: Rich Salz 
(cherry picked from commit f8418d87e191e46b81e1b9548326ab2876fa0907)

---

Summary of changes:
 crypto/x86_64cpuid.pl | 18 ++
 1 file changed, 10 insertions(+), 8 deletions(-)

diff --git a/crypto/x86_64cpuid.pl b/crypto/x86_64cpuid.pl
index d208d02..a430ab9 100644
--- a/crypto/x86_64cpuid.pl
+++ b/crypto/x86_64cpuid.pl
@@ -63,6 +63,16 @@ OPENSSL_ia32_cpuid:
cpuid
mov %eax,%r11d  # max value for standard query level
 
+   cmp \$7,%eax
+   jb  .Lno_extended_info
+
+   mov \$7,%eax
+   xor %ecx,%ecx
+   cpuid
+   mov %ebx,8(%rdi)
+
+.Lno_extended_info:
+
xor %eax,%eax
cmp \$0x756e6547,%ebx   # "Genu"
setne   %al
@@ -127,14 +137,6 @@ OPENSSL_ia32_cpuid:
shr \$14,%r10d
and \$0xfff,%r10d   # number of cores -1 per L1D
 
-   cmp \$7,%r11d
-   jb  .Lnocacheinfo
-
-   mov \$7,%eax
-   xor %ecx,%ecx
-   cpuid
-   mov %ebx,8(%rdi)
-
 .Lnocacheinfo:
mov \$1,%eax
cpuid
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2017-03-07 Thread Andy Polyakov
The branch OpenSSL_1_1_0-stable has been updated
   via  c6e4fdbf8b44010ba12b72d519e437bbd2da71e6 (commit)
  from  bf1c92faf6d3adba62165432164f5732da3d99c9 (commit)


- Log -
commit c6e4fdbf8b44010ba12b72d519e437bbd2da71e6
Author: Andy Polyakov 
Date:   Sun Mar 5 20:38:36 2017 +0100

crypto/x86_64cpuid.pl: move extended feature detection upwards.

Exteneded feature flags were not pulled on AMD processors, as result a
number of extensions were effectively masked on Ryzen. It should have
been reported for Excavator since it implements AVX2 extension, but
apparently nobody noticed or cared...

Reviewed-by: Rich Salz 
(cherry picked from commit f8418d87e191e46b81e1b9548326ab2876fa0907)

---

Summary of changes:
 crypto/x86_64cpuid.pl | 18 ++
 1 file changed, 10 insertions(+), 8 deletions(-)

diff --git a/crypto/x86_64cpuid.pl b/crypto/x86_64cpuid.pl
index 6cb1521..21d48ee 100644
--- a/crypto/x86_64cpuid.pl
+++ b/crypto/x86_64cpuid.pl
@@ -70,6 +70,16 @@ OPENSSL_ia32_cpuid:
cpuid
mov %eax,%r11d  # max value for standard query level
 
+   cmp \$7,%eax
+   jb  .Lno_extended_info
+
+   mov \$7,%eax
+   xor %ecx,%ecx
+   cpuid
+   mov %ebx,8(%rdi)
+
+.Lno_extended_info:
+
xor %eax,%eax
cmp \$0x756e6547,%ebx   # "Genu"
setne   %al
@@ -134,14 +144,6 @@ OPENSSL_ia32_cpuid:
shr \$14,%r10d
and \$0xfff,%r10d   # number of cores -1 per L1D
 
-   cmp \$7,%r11d
-   jb  .Lnocacheinfo
-
-   mov \$7,%eax
-   xor %ecx,%ecx
-   cpuid
-   mov %ebx,8(%rdi)
-
 .Lnocacheinfo:
mov \$1,%eax
cpuid
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2017-03-07 Thread Andy Polyakov
The branch master has been updated
   via  f8418d87e191e46b81e1b9548326ab2876fa0907 (commit)
  from  ee6d9dfb39ff90a31027c51b80362d274918e3dd (commit)


- Log -
commit f8418d87e191e46b81e1b9548326ab2876fa0907
Author: Andy Polyakov 
Date:   Sun Mar 5 20:38:36 2017 +0100

crypto/x86_64cpuid.pl: move extended feature detection upwards.

Exteneded feature flags were not pulled on AMD processors, as result a
number of extensions were effectively masked on Ryzen. It should have
been reported for Excavator since it implements AVX2 extension, but
apparently nobody noticed or cared...

Reviewed-by: Rich Salz 

---

Summary of changes:
 crypto/x86_64cpuid.pl | 18 ++
 1 file changed, 10 insertions(+), 8 deletions(-)

diff --git a/crypto/x86_64cpuid.pl b/crypto/x86_64cpuid.pl
index e08e1c4..c2a7d72 100644
--- a/crypto/x86_64cpuid.pl
+++ b/crypto/x86_64cpuid.pl
@@ -72,6 +72,16 @@ OPENSSL_ia32_cpuid:
cpuid
mov %eax,%r11d  # max value for standard query level
 
+   cmp \$7,%eax
+   jb  .Lno_extended_info
+
+   mov \$7,%eax
+   xor %ecx,%ecx
+   cpuid
+   mov %ebx,8(%rdi)
+
+.Lno_extended_info:
+
xor %eax,%eax
cmp \$0x756e6547,%ebx   # "Genu"
setne   %al
@@ -136,14 +146,6 @@ OPENSSL_ia32_cpuid:
shr \$14,%r10d
and \$0xfff,%r10d   # number of cores -1 per L1D
 
-   cmp \$7,%r11d
-   jb  .Lnocacheinfo
-
-   mov \$7,%eax
-   xor %ecx,%ecx
-   cpuid
-   mov %ebx,8(%rdi)
-
 .Lnocacheinfo:
mov \$1,%eax
cpuid
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2017-03-07 Thread Andy Polyakov
The branch master has been updated
   via  ee6d9dfb39ff90a31027c51b80362d274918e3dd (commit)
  from  bf580d5f30368f7ebc4c44f10575b5f0b411d594 (commit)


- Log -
commit ee6d9dfb39ff90a31027c51b80362d274918e3dd
Author: Andy Polyakov 
Date:   Sat Mar 4 23:11:16 2017 +0100

test: add chacha_internal_test.

Reviewed-by: Richard Levitte 

---

Summary of changes:
 test/build.info |   7 ++
 test/chacha_internal_test.c | 191 
 test/recipes/03-test_internal.t |   1 +
 3 files changed, 199 insertions(+)
 create mode 100644 test/chacha_internal_test.c

diff --git a/test/build.info b/test/build.info
index f1f97f9..d0ca28c 100644
--- a/test/build.info
+++ b/test/build.info
@@ -330,6 +330,9 @@ IF[{- !$disabled{tests} -}]
 IF[{- !$disabled{poly1305} -}]
   PROGRAMS_NO_INST=poly1305_internal_test
 ENDIF
+IF[{- !$disabled{chacha} -}]
+  PROGRAMS_NO_INST=chacha_internal_test
+ENDIF
 IF[{- !$disabled{siphash} -}]
   PROGRAMS_NO_INST=siphash_internal_test
 ENDIF
@@ -338,6 +341,10 @@ IF[{- !$disabled{tests} -}]
 INCLUDE[poly1305_internal_test]=.. ../include ../crypto/include
 DEPEND[poly1305_internal_test]=../libcrypto.a
 
+SOURCE[chacha_internal_test]=chacha_internal_test.c
+INCLUDE[chacha_internal_test]=.. ../include ../crypto/include
+DEPEND[chacha_internal_test]=../libcrypto.a
+
 SOURCE[asn1_internal_test]=asn1_internal_test.c testutil.c test_main.c
 INCLUDE[asn1_internal_test]=.. ../include ../crypto/include
 DEPEND[asn1_internal_test]=../libcrypto.a
diff --git a/test/chacha_internal_test.c b/test/chacha_internal_test.c
new file mode 100644
index 000..9b2f361
--- /dev/null
+++ b/test/chacha_internal_test.c
@@ -0,0 +1,191 @@
+/*
+ * Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.
+ *
+ * Licensed under the OpenSSL license (the "License").  You may not use
+ * this file except in compliance with the License.  You can obtain a copy
+ * in the file LICENSE in the source distribution or at
+ * https://www.openssl.org/source/license.html
+ */
+
+/*
+ * Internal tests for the chacha module. EVP tests would exercise
+ * complete 32-byte blocks. This test goes per byte...
+ */
+
+#include 
+#include 
+
+#include 
+#include "internal/chacha.h"
+
+const static unsigned int key[] = {
+0x03020100, 0x07060504, 0x0b0a0908, 0x0f0e0d0c,
+0x13121110, 0x17161514, 0x1b1a1918, 0x1f1e1d1c
+};
+
+const static unsigned int ivp[] = {
+0x, 0x, 0x03020100, 0x07060504
+};
+
+const static unsigned char ref[] = {
+0xf7, 0x98, 0xa1, 0x89, 0xf1, 0x95, 0xe6, 0x69,
+0x82, 0x10, 0x5f, 0xfb, 0x64, 0x0b, 0xb7, 0x75,
+0x7f, 0x57, 0x9d, 0xa3, 0x16, 0x02, 0xfc, 0x93,
+0xec, 0x01, 0xac, 0x56, 0xf8, 0x5a, 0xc3, 0xc1,
+0x34, 0xa4, 0x54, 0x7b, 0x73, 0x3b, 0x46, 0x41,
+0x30, 0x42, 0xc9, 0x44, 0x00, 0x49, 0x17, 0x69,
+0x05, 0xd3, 0xbe, 0x59, 0xea, 0x1c, 0x53, 0xf1,
+0x59, 0x16, 0x15, 0x5c, 0x2b, 0xe8, 0x24, 0x1a,
+0x38, 0x00, 0x8b, 0x9a, 0x26, 0xbc, 0x35, 0x94,
+0x1e, 0x24, 0x44, 0x17, 0x7c, 0x8a, 0xde, 0x66,
+0x89, 0xde, 0x95, 0x26, 0x49, 0x86, 0xd9, 0x58,
+0x89, 0xfb, 0x60, 0xe8, 0x46, 0x29, 0xc9, 0xbd,
+0x9a, 0x5a, 0xcb, 0x1c, 0xc1, 0x18, 0xbe, 0x56,
+0x3e, 0xb9, 0xb3, 0xa4, 0xa4, 0x72, 0xf8, 0x2e,
+0x09, 0xa7, 0xe7, 0x78, 0x49, 0x2b, 0x56, 0x2e,
+0xf7, 0x13, 0x0e, 0x88, 0xdf, 0xe0, 0x31, 0xc7,
+0x9d, 0xb9, 0xd4, 0xf7, 0xc7, 0xa8, 0x99, 0x15,
+0x1b, 0x9a, 0x47, 0x50, 0x32, 0xb6, 0x3f, 0xc3,
+0x85, 0x24, 0x5f, 0xe0, 0x54, 0xe3, 0xdd, 0x5a,
+0x97, 0xa5, 0xf5, 0x76, 0xfe, 0x06, 0x40, 0x25,
+0xd3, 0xce, 0x04, 0x2c, 0x56, 0x6a, 0xb2, 0xc5,
+0x07, 0xb1, 0x38, 0xdb, 0x85, 0x3e, 0x3d, 0x69,
+0x59, 0x66, 0x09, 0x96, 0x54, 0x6c, 0xc9, 0xc4,
+0xa6, 0xea, 0xfd, 0xc7, 0x77, 0xc0, 0x40, 0xd7,
+0x0e, 0xaf, 0x46, 0xf7, 0x6d, 0xad, 0x39, 0x79,
+0xe5, 0xc5, 0x36, 0x0c, 0x33, 0x17, 0x16, 0x6a,
+0x1c, 0x89, 0x4c, 0x94, 0xa3, 0x71, 0x87, 0x6a,
+0x94, 0xdf, 0x76, 0x28, 0xfe, 0x4e, 0xaa, 0xf2,
+0xcc, 0xb2, 0x7d, 0x5a, 0xaa, 0xe0, 0xad, 0x7a,
+0xd0, 0xf9, 0xd4, 0xb6, 0xad, 0x3b, 0x54, 0x09,
+0x87, 0x46, 0xd4, 0x52, 0x4d, 0x38, 0x40, 0x7a,
+0x6d, 0xeb, 0x3a, 0xb7, 0x8f, 0xab, 0x78, 0xc9,
+0x42, 0x13, 0x66, 0x8b, 0xbb, 0xd3, 0x94, 0xc5,
+0xde, 0x93, 0xb8, 0x53, 0x17, 0x8a, 0xdd, 0xd6,
+0xb9, 0x7f, 0x9f, 0xa1, 0xec, 0x3e, 0x56, 0xc0,
+0x0c, 0x9d, 0xdf, 0xf0, 0xa4, 0x4a, 0x20, 0x42,
+0x41, 0x17, 0x5a, 0x4c, 0xab, 0x0f, 0x96, 0x1b,
+0xa5, 0x3e, 0xde, 0x9b, 0xdf, 0x96, 0x0b, 0x94,
+0xf9, 0x82, 0x9b, 0x1f, 0x34, 0x14, 0x72, 0x64,
+0x29, 0xb3, 0x62, 0xc5, 0xb5, 0x38, 0xe3, 0x91,
+0x52, 0x0f, 0x48, 0x9b, 0x7e, 0xd8, 0xd2, 0x0a,
+0xe3, 0xfd, 0x49, 0xe9, 0xe2, 0x59, 

[openssl-commits] Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-asm -ansi

2017-03-07 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux test 4.4.0-64-generic #85-Ubuntu SMP Mon Feb 20 11:50:30 UTC 2017 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-asm -ansi

Commit log since last time:

cadb015 Unix Makefile: Have manual generation use the same perl script as 
Windows and VMS
579a674 util/process_docs.pl: make it possible to add a suffix to man docs
c1074ce Add a test to check that we correctly handle record overflows
4321969 Tweak the TLSv1.3 record overflow limits
febb0af Fix double free in cookie generation.
6556519 Remove some duplicate manpage entries
44eb65c Add documentation on platform specific checks
d192a3a Add a platform specific configuration checker
6979583 Fix an endless loop in rsa_builtin_keygen.
e498d95 Fix no-ec
548d015 Fix a test failure with no-tls1_1
593a2aa Fix no-psk
e6941c7 Don't call memcmp with a NULL pointer

Build log ended with (last 100 lines):

clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g -pthread -m64 
-DL_ENDIAN -Wextra -Qunused-arguments  -DDEBUG_UNUSED -Wswitch -DPEDANTIC 
-pedantic -Wno-long-long -Wall -Wsign-compare -Wmissing-prototypes -Wshadow 
-Wformat -Wtype-limits -Wundef -Werror -Qunused-arguments -Wextra 
-Wswitch-default -Wno-unused-parameter -Wno-parentheses-equality 
-Wno-missing-field-initializers -Wno-language-extension-token 
-Wno-extended-offsetof -Wconditional-uninitialized 
-Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -ansi -fPIC -DOPENSSL_USE_NODELETE -MMD -MF 
crypto/asn1/asn1_lib.d.tmp -MT crypto/asn1/asn1_lib.o -c -o 
crypto/asn1/asn1_lib.o ../openssl/crypto/asn1/asn1_lib.c
clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g -pthread -m64 
-DL_ENDIAN -Wextra -Qunused-arguments  -DDEBUG_UNUSED -Wswitch -DPEDANTIC 
-pedantic -Wno-long-long -Wall -Wsign-compare -Wmissing-prototypes -Wshadow 
-Wformat -Wtype-limits -Wundef -Werror -Qunused-arguments -Wextra 
-Wswitch-default -Wno-unused-parameter -Wno-parentheses-equality 
-Wno-missing-field-initializers -Wno-language-extension-token 
-Wno-extended-offsetof -Wconditional-uninitialized 
-Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -ansi -fPIC -DOPENSSL_USE_NODELETE -MMD -MF 
crypto/asn1/asn1_par.d.tmp -MT crypto/asn1/asn1_par.o -c -o 
crypto/asn1/asn1_par.o ../openssl/crypto/asn1/asn1_par.c
clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g -pthread -m64 
-DL_ENDIAN -Wextra -Qunused-arguments  -DDEBUG_UNUSED -Wswitch -DPEDANTIC 
-pedantic -Wno-long-long -Wall -Wsign-compare -Wmissing-prototypes -Wshadow 
-Wformat -Wtype-limits -Wundef -Werror -Qunused-arguments -Wextra 
-Wswitch-default -Wno-unused-parameter -Wno-parentheses-equality 
-Wno-missing-field-initializers -Wno-language-extension-token 
-Wno-extended-offsetof -Wconditional-uninitialized 
-Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -ansi -fPIC -DOPENSSL_USE_NODELETE -MMD -MF 
crypto/asn1/asn_mime.d.tmp -MT crypto/asn1/asn_mime.o -c -o 
crypto/asn1/asn_mime.o ../openssl/crypto/asn1/asn_mime.c
clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g -pthread -m64 
-DL_ENDIAN -Wextra -Qunused-arguments  -DDEBUG_UNUSED -Wswitch -DPEDANTIC 
-pedantic -Wno-long-long -Wall -Wsign-compare -Wmissing-prototypes -Wshadow 
-Wformat -Wtype-limits -Wundef -Werror -Qunused-arguments -Wextra 
-Wswitch-default -Wno-unused-parameter -Wno-parentheses-equality 
-Wno-missing-field-initializers -Wno-language-extension-token 
-Wno-extended-offsetof -Wconditional-uninitialized 
-Wincompatible-pointer-types-discards-qualifiers 
-Wmissing-variable-declarations -ansi -fPIC -DOPENSSL_USE_NODELETE -MMD -MF 
crypto/asn1/asn_moid.d.tmp -MT crypto/asn1/asn_moid.o -c -o 
crypto/asn1/asn_moid.o ../openssl/crypto/asn1/asn_moid.c
clang  -I. -Icrypto/include -Iinclude -I../openssl -I../openssl/crypto/include 
-I../openssl/include -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_THREADS 
-DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSLDIR="\"/usr/local/ssl\"" 
-DENGINESDIR="\"/usr/local/lib/engines-1.1\"" -Wall -O0 -g