[openssl-commits] Coverity Scan: Analysis completed for OpenSSL-1.0.2

2017-12-09 Thread scan-admin

Your request for analysis of OpenSSL-1.0.2 has been completed successfully.
The results are available at 
https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRakUl6QyjujEohY7rPpoYUEeuRTZVWU4ku8PUBnVPw8PQ-3D-3D_19DGMz38yO7VfzGQuXkecdlEmzBoDG4v8Dvyanv-2F1I02Z-2FIegxdSegfwiPVdKnGD3xwkJdBvSZM2brG77kH1TExqND1aaQ8ytV3wM7jRlZium9yXZrjhxQkSQeUeHEUK09dTxmeVDcJJniwEKkDw4LPeCoGfVwqHXrMxtzaJhDzFfEV0zpfHsef9Pod6GIlDWhNtDztadiEBQlUpAmpcLNCGYrvJ2wfKJ-2FOOiyCcQdw-3D

Build ID: 188244

Analysis Summary:
   New defects found: 0
   Defects eliminated: 0

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Coverity Scan: Analysis completed for openssl/openssl

2017-12-09 Thread scan-admin

Your request for analysis of openssl/openssl has been completed 
successfully.
The results are available at 
https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRakUl6QyjujEohY7rPpoYUEcf-2B75FkFkxwwFKGZV8c1xA-3D-3D_19DGMz38yO7VfzGQuXkecdlEmzBoDG4v8Dvyanv-2F1I1qc5G1IKdeTzB3obrZnkN9NJaZWo6KkUMLVXBHFtQUYIyZCgiOxiw5NfIu-2BIFA9of8b-2B8-2FFLqWSoryqjtfTFnrKBqf0KntpZKFL81aLcsVB3YK9q-2F-2F0yk0On1W18DvjKjFmQ-2Fhs09cs2rWWL1zVxt9pddmUAkZH1BLtfbp8e2WfWVO8QCp2uA09qlSMugVg60-3D

Build ID: 188234

Analysis Summary:
   New defects found: 2
   Defects eliminated: 7

If you have difficulty understanding any defects, email us at 
scan-ad...@coverity.com,
or post your question to StackOverflow
at 
https://u2389337.ct.sendgrid.net/wf/click?upn=OgIsEqWzmIl4S-2FzEUMxLXL-2BukuZt9UUdRZhgmgzAKchwAzH1nH3073xDEXNRgHN6q227lMNIWoOb8ZgSjAjKcg-3D-3D_19DGMz38yO7VfzGQuXkecdlEmzBoDG4v8Dvyanv-2F1I1qc5G1IKdeTzB3obrZnkN9NJaZWo6KkUMLVXBHFtQUYHuvOHBsuj2M93LVs6PDTHe2opGvVtfJc-2BbTpyaJHjLhpIgIlxYm9H5FgNZydrVm9kCBhLt-2BNtwYagsgTWup9cV6omF1u2ZhvnLSxTOo9bZIBEfcrwdR5grbnprUdfQL74FP3oOPBzmBQNFtjKP7oDs-3D
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed in Jenkins: master_aarch64 #235

2017-12-09 Thread osslsanity
See 


Changes:

[appro] Make BIO_METHOD struct definitions consistent

[appro] doc/man3/EVP_EncryptInit.pod: add EVP_CIPHER_CTX_rand_key

[appro] apps/speed.c: generate evp_cipher keys implicitly

[appro] apps/speed.c: initialize buffers

--
Started by upstream project "1_0_2_basic" build number 240
originally caused by:
 Started by timer
Building in workspace 

 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://github.com/openssl/openssl.git # 
 > timeout=10
Fetching upstream changes from https://github.com/openssl/openssl.git
 > git --version # timeout=10
 > git fetch --tags --progress https://github.com/openssl/openssl.git 
 > +refs/heads/*:refs/remotes/origin/*
 > git rev-parse refs/remotes/origin/master^{commit} # timeout=10
 > git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10
Checking out Revision 397e23f8db5aecfaef4d470b0c421d2cd84da6f7 
(refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 397e23f8db5aecfaef4d470b0c421d2cd84da6f7
 > git rev-list 6aff543b9bf14bdac7f5385a9e56b8785b30f6d8 # timeout=10
[master_aarch64] $ /bin/sh -xe /tmp/jenkins7575358070146268497.sh
+ export 
PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games:/usr/local/buildroot-2017.02/output/host/usr/bin/
+ export CROSS_COMPILE=aarch64-linux-
+ ./Configure linux-aarch64
Using implicit seed configuration
Configuring OpenSSL version 1.1.1-dev (0x10101000L)
for linux-aarch64
no-aria [default]  OPENSSL_NO_ARIA (skip dir)
no-asan [default]  OPENSSL_NO_ASAN
no-crypto-mdebug [default]  OPENSSL_NO_CRYPTO_MDEBUG
no-crypto-mdebug-backtrace [default]  OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE
no-devcryptoeng [default]  OPENSSL_NO_DEVCRYPTOENG
no-ec_nistp_64_gcc_128 [default]  OPENSSL_NO_EC_NISTP_64_GCC_128
no-egd  [default]  OPENSSL_NO_EGD
no-external-tests [default]  OPENSSL_NO_EXTERNAL_TESTS
no-fuzz-afl [default]  OPENSSL_NO_FUZZ_AFL
no-fuzz-libfuzzer [default]  OPENSSL_NO_FUZZ_LIBFUZZER
no-heartbeats   [default]  OPENSSL_NO_HEARTBEATS
no-md2  [default]  OPENSSL_NO_MD2 (skip dir)
no-msan [default]  OPENSSL_NO_MSAN
no-rc5  [default]  OPENSSL_NO_RC5 (skip dir)
no-sctp [default]  OPENSSL_NO_SCTP
no-ssl-trace[default]  OPENSSL_NO_SSL_TRACE
no-ssl3 [default]  OPENSSL_NO_SSL3
no-ssl3-method  [default]  OPENSSL_NO_SSL3_METHOD
no-tls13downgrade [default]  OPENSSL_NO_TLS13DOWNGRADE
no-tls1_3   [default]  OPENSSL_NO_TLS1_3
no-ubsan[default]  OPENSSL_NO_UBSAN
no-unit-test[default]  OPENSSL_NO_UNIT_TEST
no-weak-ssl-ciphers [default]  OPENSSL_NO_WEAK_SSL_CIPHERS
no-zlib [default] 
no-zlib-dynamic [default] 

PERL  =/usr/bin/perl
PERLVERSION   =5.18.2 for x86_64-linux-gnu-thread-multi
HASHBANGPERL  =/usr/bin/env perl
CC=aarch64-linux-gcc
CFLAG =-Wall -O3 -pthread 
CXX   =aarch64-linux-g++
CXXFLAG   =-Wall -O3 -pthread 
DEFINES   =DSO_DLFCN HAVE_DLFCN_H NDEBUG OPENSSL_THREADS 
OPENSSL_NO_STATIC_ENGINE OPENSSL_PIC OPENSSL_BN_ASM_MONT SHA1_ASM SHA256_ASM 
SHA512_ASM VPAES_ASM ECP_NISTZ256_ASM POLY1305_ASM
EX_LIBS   =-ldl 
+ make depend
+ make clean
rm -f libcrypto.so.1.1
rm -f libcrypto.so
rm -f libssl.so.1.1
rm -f libssl.so
rm -f
rm -f libcrypto.a libssl.a test/libtestutil.a
rm -f *.map
rm -f apps/openssl fuzz/asn1-test fuzz/asn1parse-test fuzz/bignum-test 
fuzz/bndiv-test fuzz/client-test fuzz/cms-test fuzz/conf-test fuzz/crl-test 
fuzz/ct-test fuzz/server-test fuzz/x509-test test/aborttest test/afalgtest 
test/asn1_encode_test test/asn1_internal_test test/asn1_string_table_test 
test/asn1_time_test test/asynciotest test/asynctest test/bad_dtls_test 
test/bftest test/bio_enc_test test/bioprinttest test/bntest test/buildtest_aes 
test/buildtest_asn1 test/buildtest_asn1err test/buildtest_asn1t 
test/buildtest_async test/buildtest_asyncerr test/buildtest_bio 
test/buildtest_bioerr test/buildtest_blowfish test/buildtest_bn 
test/buildtest_bnerr test/buildtest_buffer test/buildtest_buffererr 
test/buildtest_camellia test/buildtest_cast test/buildtest_cmac 
test/buildtest_cms test/buildtest_cmserr test/buildtest_comp 
test/buildtest_comperr test/buildtest_conf test/buildtest_conf_api 
test/buildtest_conferr test/buildtest_crypto test/buildtest_cryptoerr 
test/buildtest_ct test/buildte
 st_cterr test/buildtest_des test/buildtest_dh test/buildtest_dherr 
test/buildtest_dsa test/buildtest_dsaerr test/buildtest_dtls1 
test/buildtest_e_os2 test/buildtest_ebcdic test/buildtest_ec 
test/buildtest_ecdh test/buildtest_ecdsa 

[openssl-commits] [openssl] master update

2017-12-09 Thread Andy Polyakov
The branch master has been updated
   via  397e23f8db5aecfaef4d470b0c421d2cd84da6f7 (commit)
   via  6b1fe3d059d8c5b3b86a7203faf59a7538fc9f0d (commit)
  from  5c5eb286afc046094cf48ecc49b10d04a1a3146c (commit)


- Log -
commit 397e23f8db5aecfaef4d470b0c421d2cd84da6f7
Author: Patrick Steuer 
Date:   Mon Dec 4 18:32:12 2017 +0100

apps/speed.c: initialize buffers

Stop valgrind's complaints about uninitialized values.

Signed-off-by: Patrick Steuer 

Reviewed-by: Rich Salz 
Reviewed-by: Andy Polyakov 
(Merged from https://github.com/openssl/openssl/pull/4842)

commit 6b1fe3d059d8c5b3b86a7203faf59a7538fc9f0d
Author: Patrick Steuer 
Date:   Mon Dec 4 17:40:23 2017 +0100

apps/speed.c: generate evp_cipher keys implicitly

Generate keys using EVP_CIPHER's key generation routine to support
keys of a specific form.

Signed-off-by: Patrick Steuer 

Reviewed-by: Rich Salz 
Reviewed-by: Andy Polyakov 
(Merged from https://github.com/openssl/openssl/pull/4842)

---

Summary of changes:
 apps/speed.c | 44 +---
 1 file changed, 29 insertions(+), 15 deletions(-)

diff --git a/apps/speed.c b/apps/speed.c
index 610716d..4c6ee08 100644
--- a/apps/speed.c
+++ b/apps/speed.c
@@ -141,6 +141,7 @@ typedef struct loopargs_st {
 unsigned char *buf2;
 unsigned char *buf_malloc;
 unsigned char *buf2_malloc;
+unsigned char *key;
 unsigned int siglen;
 #ifndef OPENSSL_NO_RSA
 RSA *rsa_key[RSA_NUM];
@@ -1266,6 +1267,8 @@ int speed_main(int argc, char **argv)
 int ret = 1, i, k, misalign = 0;
 long count = 0;
 int size_num = OSSL_NELEM(lengths_list);
+int keylen;
+int buflen;
 #ifndef NO_FORK
 int multi = 0;
 #endif
@@ -1603,12 +1606,12 @@ int speed_main(int argc, char **argv)
 }
 }
 
-loopargs[i].buf_malloc =
-app_malloc(lengths[size_num - 1] + MAX_MISALIGNMENT + 1,
-   "input buffer");
-loopargs[i].buf2_malloc =
-app_malloc(lengths[size_num - 1] + MAX_MISALIGNMENT + 1,
-   "input buffer");
+buflen = lengths[size_num - 1] + MAX_MISALIGNMENT + 1;
+loopargs[i].buf_malloc = app_malloc(buflen, "input buffer");
+loopargs[i].buf2_malloc = app_malloc(buflen, "input buffer");
+memset(loopargs[i].buf_malloc, 0, buflen);
+memset(loopargs[i].buf2_malloc, 0, buflen);
+
 /* Align the start of buffers on a 64 byte boundary */
 loopargs[i].buf = loopargs[i].buf_malloc + misalign;
 loopargs[i].buf2 = loopargs[i].buf2_malloc + misalign;
@@ -2407,13 +2410,17 @@ int speed_main(int argc, char **argv)
 
 for (k = 0; k < loopargs_len; k++) {
 loopargs[k].ctx = EVP_CIPHER_CTX_new();
-if (decrypt)
-EVP_DecryptInit_ex(loopargs[k].ctx, evp_cipher, NULL,
-   key32, iv);
-else
-EVP_EncryptInit_ex(loopargs[k].ctx, evp_cipher, NULL,
-   key32, iv);
+EVP_CipherInit_ex(loopargs[k].ctx, evp_cipher, NULL, NULL,
+  iv, decrypt ? 0 : 1);
+
 EVP_CIPHER_CTX_set_padding(loopargs[k].ctx, 0);
+
+keylen = EVP_CIPHER_CTX_key_length(loopargs[k].ctx);
+loopargs[k].key = app_malloc(keylen, "evp_cipher key");
+EVP_CIPHER_CTX_rand_key(loopargs[k].ctx, loopargs[k].key);
+EVP_CipherInit_ex(loopargs[k].ctx, NULL, NULL,
+  loopargs[k].key, NULL, -1);
+OPENSSL_clear_free(loopargs[k].key, keylen);
 }
 switch (EVP_CIPHER_mode(evp_cipher)) {
 case EVP_CIPH_CCM_MODE:
@@ -3241,9 +3248,9 @@ static void multiblock_speed(const EVP_CIPHER 
*evp_cipher, const SEC *seconds)
 static const int mblengths_list[] =
 { 8 * 1024, 2 * 8 * 1024, 4 * 8 * 1024, 8 * 8 * 1024, 8 * 16 * 1024 };
 const int *mblengths = mblengths_list;
-int j, count, num = OSSL_NELEM(mblengths_list);
+int j, count, keylen, num = OSSL_NELEM(mblengths_list);
 const char *alg_name;
-unsigned char *inp, *out, no_key[32], no_iv[16];
+unsigned char *inp, *out, *key, no_key[32], no_iv[16];
 EVP_CIPHER_CTX *ctx;
 double d = 0.0;
 
@@ -3255,7 +3262,14 @@ static void multiblock_speed(const EVP_CIPHER 
*evp_cipher, const SEC *seconds)
 inp = app_malloc(mblengths[num - 1], "multiblock input 

[openssl-commits] [openssl] master update

2017-12-09 Thread Andy Polyakov
The branch master has been updated
   via  5c5eb286afc046094cf48ecc49b10d04a1a3146c (commit)
  from  27ab91951c96364351f1ea0652dbf14622440345 (commit)


- Log -
commit 5c5eb286afc046094cf48ecc49b10d04a1a3146c
Author: Patrick Steuer 
Date:   Tue Dec 5 00:36:43 2017 +0100

doc/man3/EVP_EncryptInit.pod: add EVP_CIPHER_CTX_rand_key

Signed-off-by: Patrick Steuer 

Reviewed-by: Rich Salz 
Reviewed-by: Andy Polyakov 
(Merged from https://github.com/openssl/openssl/pull/4843)

---

Summary of changes:
 doc/man3/EVP_EncryptInit.pod | 8 
 1 file changed, 8 insertions(+)

diff --git a/doc/man3/EVP_EncryptInit.pod b/doc/man3/EVP_EncryptInit.pod
index d82468c..29ebf74 100644
--- a/doc/man3/EVP_EncryptInit.pod
+++ b/doc/man3/EVP_EncryptInit.pod
@@ -91,6 +91,7 @@ EVP_enc_null
  int EVP_CIPHER_CTX_set_padding(EVP_CIPHER_CTX *x, int padding);
  int EVP_CIPHER_CTX_set_key_length(EVP_CIPHER_CTX *x, int keylen);
  int EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr);
+ int EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, unsigned char *key);
 
  const EVP_CIPHER *EVP_get_cipherbyname(const char *name);
  const EVP_CIPHER *EVP_get_cipherbynid(int nid);
@@ -274,6 +275,11 @@ is not supported.
 EVP_CIPHER_CTX_ctrl() allows various cipher specific parameters to be 
determined
 and set.
 
+EVP_CIPHER_CTX_rand_key() generates a random key of the appropriate length
+based on the cipher context. The EVP_CIPHER can provide its own random key
+generation routine to support keys of a specific form. B must point to a
+buffer at least as big as the value returned by EVP_CIPHER_CTX_key_length().
+
 =head1 RETURN VALUES
 
 EVP_CIPHER_CTX_new() returns a pointer to a newly created
@@ -314,6 +320,8 @@ EVP_CIPHER_CTX_cipher() returns an B structure.
 EVP_CIPHER_param_to_asn1() and EVP_CIPHER_asn1_to_param() return greater
 than zero for success and zero or a negative number.
 
+EVP_CIPHER_CTX_rand_key() returns 1 for success.
+
 =head1 CIPHER LISTING
 
 All algorithms have a fixed key length unless otherwise stated.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2017-12-09 Thread Andy Polyakov
The branch master has been updated
   via  27ab91951c96364351f1ea0652dbf14622440345 (commit)
  from  6aff543b9bf14bdac7f5385a9e56b8785b30f6d8 (commit)


- Log -
commit 27ab91951c96364351f1ea0652dbf14622440345
Author: Daniel Bevenius 
Date:   Fri Dec 8 08:20:10 2017 +0100

Make BIO_METHOD struct definitions consistent

I noticed that some of the BIO_METHOD structs are placing the name on
the same line as the type and some don't. This commit places the name
on a separate line for consistency (which looks like what the majority
do)

CLA: trivial

Reviewed-by: Andy Polyakov 
Reviewed-by: Paul Dale 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/4878)

---

Summary of changes:
 crypto/bio/bss_fd.c  | 3 ++-
 crypto/bio/bss_log.c | 3 ++-
 crypto/evp/bio_b64.c | 3 ++-
 crypto/evp/bio_enc.c | 3 ++-
 crypto/evp/bio_md.c  | 3 ++-
 crypto/evp/bio_ok.c  | 3 ++-
 ssl/bio_ssl.c| 3 ++-
 7 files changed, 14 insertions(+), 7 deletions(-)

diff --git a/crypto/bio/bss_fd.c b/crypto/bio/bss_fd.c
index 9c1826c..269a08b 100644
--- a/crypto/bio/bss_fd.c
+++ b/crypto/bio/bss_fd.c
@@ -58,7 +58,8 @@ static int fd_free(BIO *data);
 int BIO_fd_should_retry(int s);
 
 static const BIO_METHOD methods_fdp = {
-BIO_TYPE_FD, "file descriptor",
+BIO_TYPE_FD,
+"file descriptor",
 /* TODO: Convert to new style write function */
 bwrite_conv,
 fd_write,
diff --git a/crypto/bio/bss_log.c b/crypto/bio/bss_log.c
index b5b9363..040fbcd 100644
--- a/crypto/bio/bss_log.c
+++ b/crypto/bio/bss_log.c
@@ -85,7 +85,8 @@ static void xsyslog(BIO *bp, int priority, const char 
*string);
 static void xcloselog(BIO *bp);
 
 static const BIO_METHOD methods_slg = {
-BIO_TYPE_MEM, "syslog",
+BIO_TYPE_MEM,
+"syslog",
 /* TODO: Convert to new style write function */
 bwrite_conv,
 slg_write,
diff --git a/crypto/evp/bio_b64.c b/crypto/evp/bio_b64.c
index 85fbeab..87a0cce 100644
--- a/crypto/evp/bio_b64.c
+++ b/crypto/evp/bio_b64.c
@@ -44,7 +44,8 @@ typedef struct b64_struct {
 } BIO_B64_CTX;
 
 static const BIO_METHOD methods_b64 = {
-BIO_TYPE_BASE64, "base64 encoding",
+BIO_TYPE_BASE64,
+"base64 encoding",
 /* TODO: Convert to new style write function */
 bwrite_conv,
 b64_write,
diff --git a/crypto/evp/bio_enc.c b/crypto/evp/bio_enc.c
index 4e1f8bf..366e2e9 100644
--- a/crypto/evp/bio_enc.c
+++ b/crypto/evp/bio_enc.c
@@ -40,7 +40,8 @@ typedef struct enc_struct {
 } BIO_ENC_CTX;
 
 static const BIO_METHOD methods_enc = {
-BIO_TYPE_CIPHER, "cipher",
+BIO_TYPE_CIPHER,
+"cipher",
 /* TODO: Convert to new style write function */
 bwrite_conv,
 enc_write,
diff --git a/crypto/evp/bio_md.c b/crypto/evp/bio_md.c
index a59c2d3..50069f0 100644
--- a/crypto/evp/bio_md.c
+++ b/crypto/evp/bio_md.c
@@ -29,7 +29,8 @@ static int md_free(BIO *data);
 static long md_callback_ctrl(BIO *h, int cmd, bio_info_cb *fp);
 
 static const BIO_METHOD methods_md = {
-BIO_TYPE_MD, "message digest",
+BIO_TYPE_MD,
+"message digest",
 /* TODO: Convert to new style write function */
 bwrite_conv,
 md_write,
diff --git a/crypto/evp/bio_ok.c b/crypto/evp/bio_ok.c
index 738ced4..0f744fc 100644
--- a/crypto/evp/bio_ok.c
+++ b/crypto/evp/bio_ok.c
@@ -108,7 +108,8 @@ typedef struct ok_struct {
 } BIO_OK_CTX;
 
 static const BIO_METHOD methods_ok = {
-BIO_TYPE_CIPHER, "reliable",
+BIO_TYPE_CIPHER,
+"reliable",
 /* TODO: Convert to new style write function */
 bwrite_conv,
 ok_write,
diff --git a/ssl/bio_ssl.c b/ssl/bio_ssl.c
index 722d942..5516260 100644
--- a/ssl/bio_ssl.c
+++ b/ssl/bio_ssl.c
@@ -34,7 +34,8 @@ typedef struct bio_ssl_st {
 } BIO_SSL;
 
 static const BIO_METHOD methods_sslp = {
-BIO_TYPE_SSL, "ssl",
+BIO_TYPE_SSL,
+"ssl",
 ssl_write,
 NULL,
 ssl_read,
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl master.14426

2017-12-09 Thread AppVeyor


Build openssl master.14426 completed



Commit a9f8cc7a2e by FdaSilvaYY on 12/9/2017 2:49 PM:

Useless NULL test


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl OpenSSL_1_0_2-stable.14425

2017-12-09 Thread AppVeyor



Build openssl OpenSSL_1_0_2-stable.14425 failed


Commit bc03a663a0 by Matt Hauck on 12/9/2017 6:23 AM:

Fix windows 32-bit build


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits