[openssl-commits] Coverity Scan: Analysis failed for OpenSSL-1.0.2

2018-01-06 Thread scan-admin
Your request for analysis of OpenSSL-1.0.2  is failed.
Analysis status: Failure
Please fix the error and upload the build again.

Error details:
 :Failed to retrieve tar file 
For more detail explanation on the error, please check: 
https://u2389337.ct.sendgrid.net/wf/click?upn=OgIsEqWzmIl4S-2FzEUMxLXL-2BukuZt9UUdRZhgmgzAKchwAzH1nH3073xDEXNRgHN6q227lMNIWoOb8ZgSjAjKcg-3D-3D_19DGMz38yO7VfzGQuXkecdlEmzBoDG4v8Dvyanv-2F1I3D1CyHcERNkqwX202lKimfwqikTLiYBtU6AVIWy7AgwtNIZYxkOLLguAEdrXAsePJg3rItMfyUNiiu1Idk7a-2FZPGONrOyTneKuWJUhWNsVh0VlqmlsDzzWR1jUS4-2BmIEZITvkw0LlRzhndlKt8Io2XcOE4Dev3sAKhsKZFv-2Bjq0zh6lMVR-2BheRxMrWCQGRSPM-3D

If your build process isn't going smoothly, email us at 
scan-ad...@coverity.com
with your cov-int/build-log.txt file attached for assistance, or post your 
issue
to the StackOverflow at 
https://u2389337.ct.sendgrid.net/wf/click?upn=OgIsEqWzmIl4S-2FzEUMxLXL-2BukuZt9UUdRZhgmgzAKchwAzH1nH3073xDEXNRgHN6q227lMNIWoOb8ZgSjAjKcg-3D-3D_19DGMz38yO7VfzGQuXkecdlEmzBoDG4v8Dvyanv-2F1I3D1CyHcERNkqwX202lKimfwqikTLiYBtU6AVIWy7AgwuMow1Ao-2BTOe9wb0l-2Fe-2BZC8vk7zOkf9k-2BYGFiffueZ9fzEzXMJOJwcr2kkrIXozg9FTVhUvB20i-2FxT-2F-2FNQIgf2wQHOZU76Oj9ZsKjP-2FS9roNwjp0yy-2FFFVknMYylPswcQL-2B2Q-2FgsQYnnl2WPOtxUL8o-3D
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Coverity Scan: Analysis completed for openssl/openssl

2018-01-06 Thread scan-admin

Your request for analysis of openssl/openssl has been completed 
successfully.
The results are available at 
https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRakUl6QyjujEohY7rPpoYUEcf-2B75FkFkxwwFKGZV8c1xA-3D-3D_19DGMz38yO7VfzGQuXkecdlEmzBoDG4v8Dvyanv-2F1I0-2BMk4iuIQVra7Xs7lSTOsaabLCx5eSU2ggzTPlXTz8a3p269aGBRjKtMZIuClmEAJFAAcY0m-2Fd2z-2FO8Wb1AJiObkkR7u0Jo3q8AJusatj1xdEM5j4A-2BRl22RJgkDJ09mkOrbplC2MWeaOzA8YOtUNHyoC7SvTgNkICw34Z7glwQGaywNO5cMNm2SSTXPklPZI-3D

Build ID: 193601

Analysis Summary:
   New defects found: 0
   Defects eliminated: 0

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed in Jenkins: master_aarch64 #263

2018-01-06 Thread osslsanity
See 


Changes:

[bernd.edlinger] Stop using unimplemented cipher classes. Add comments to no 
longer

[bernd.edlinger] Fix error handling in X509_REQ_print_ex

[bernd.edlinger] Corrected 'cms' exit status when key or certificate cannot be 
opened

[levitte] apps: make sure prog_init only calculates once

[levitte] Add the possibility to do 'openssl help [command]'

[rsalz] Add fingerprint text, remove MD5

--
Started by upstream project "1_0_2_basic" build number 268
originally caused by:
 Started by timer
Building in workspace 

 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://github.com/openssl/openssl.git # 
 > timeout=10
Fetching upstream changes from https://github.com/openssl/openssl.git
 > git --version # timeout=10
 > git fetch --tags --progress https://github.com/openssl/openssl.git 
 > +refs/heads/*:refs/remotes/origin/*
 > git rev-parse refs/remotes/origin/master^{commit} # timeout=10
 > git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10
Checking out Revision 9422d45de2b70cabec5f6e6a5c812e0647e6d3ab 
(refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 9422d45de2b70cabec5f6e6a5c812e0647e6d3ab
 > git rev-list cc94da4ea38cc2a4a47e0a14ef9e361a2d723eff # timeout=10
[master_aarch64] $ /bin/sh -xe /tmp/jenkins5627159810578502181.sh
+ export 
PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games:/usr/local/buildroot-2017.02/output/host/usr/bin/
+ export CROSS_COMPILE=aarch64-linux-
+ ./Configure linux-aarch64
Using implicit seed configuration
Configuring OpenSSL version 1.1.1-dev (0x10101000L)
for linux-aarch64
no-asan [default]  OPENSSL_NO_ASAN
no-crypto-mdebug [default]  OPENSSL_NO_CRYPTO_MDEBUG
no-crypto-mdebug-backtrace [default]  OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE
no-devcryptoeng [default]  OPENSSL_NO_DEVCRYPTOENG
no-ec_nistp_64_gcc_128 [default]  OPENSSL_NO_EC_NISTP_64_GCC_128
no-egd  [default]  OPENSSL_NO_EGD
no-external-tests [default]  OPENSSL_NO_EXTERNAL_TESTS
no-fuzz-afl [default]  OPENSSL_NO_FUZZ_AFL
no-fuzz-libfuzzer [default]  OPENSSL_NO_FUZZ_LIBFUZZER
no-heartbeats   [default]  OPENSSL_NO_HEARTBEATS
no-md2  [default]  OPENSSL_NO_MD2 (skip dir)
no-msan [default]  OPENSSL_NO_MSAN
no-rc5  [default]  OPENSSL_NO_RC5 (skip dir)
no-sctp [default]  OPENSSL_NO_SCTP
no-ssl-trace[default]  OPENSSL_NO_SSL_TRACE
no-ssl3 [default]  OPENSSL_NO_SSL3
no-ssl3-method  [default]  OPENSSL_NO_SSL3_METHOD
no-tls13downgrade [default]  OPENSSL_NO_TLS13DOWNGRADE
no-tls1_3   [default]  OPENSSL_NO_TLS1_3
no-ubsan[default]  OPENSSL_NO_UBSAN
no-unit-test[default]  OPENSSL_NO_UNIT_TEST
no-weak-ssl-ciphers [default]  OPENSSL_NO_WEAK_SSL_CIPHERS
no-zlib [default] 
no-zlib-dynamic [default] 

PERL  =/usr/bin/perl
PERLVERSION   =5.18.2 for x86_64-linux-gnu-thread-multi
HASHBANGPERL  =/usr/bin/env perl
CC=aarch64-linux-gcc
CFLAG =-Wall -O3 -pthread 
CXX   =aarch64-linux-g++
CXXFLAG   =-Wall -O3 -pthread 
DEFINES   =DSO_DLFCN HAVE_DLFCN_H NDEBUG OPENSSL_THREADS 
OPENSSL_NO_STATIC_ENGINE OPENSSL_PIC OPENSSL_BN_ASM_MONT SHA1_ASM SHA256_ASM 
SHA512_ASM VPAES_ASM ECP_NISTZ256_ASM POLY1305_ASM
EX_LIBS   =-ldl 
+ make depend
+ make clean
rm -f libcrypto.so.1.1
rm -f libcrypto.so
rm -f libssl.so.1.1
rm -f libssl.so
rm -f
rm -f libcrypto.a libssl.a test/libtestutil.a
rm -f *.map
rm -f apps/openssl fuzz/asn1-test fuzz/asn1parse-test fuzz/bignum-test 
fuzz/bndiv-test fuzz/client-test fuzz/cms-test fuzz/conf-test fuzz/crl-test 
fuzz/ct-test fuzz/server-test fuzz/x509-test test/aborttest test/afalgtest 
test/asn1_encode_test test/asn1_internal_test test/asn1_string_table_test 
test/asn1_time_test test/asynciotest test/asynctest test/bad_dtls_test 
test/bftest test/bio_enc_test test/bioprinttest test/bntest test/buildtest_aes 
test/buildtest_asn1 test/buildtest_asn1err test/buildtest_asn1t 
test/buildtest_async test/buildtest_asyncerr test/buildtest_bio 
test/buildtest_bioerr test/buildtest_blowfish test/buildtest_bn 
test/buildtest_bnerr test/buildtest_buffer test/buildtest_buffererr 
test/buildtest_camellia test/buildtest_cast test/buildtest_cmac 
test/buildtest_cms test/buildtest_cmserr test/buildtest_comp 
test/buildtest_comperr test/buildtest_conf test/buildtest_conf_api 
test/buildtest_conferr test/buildtest_crypto test/buildtest_cryptoerr 
test/buildtest_ct test/buildte
 st_cterr test/buildtest_des test/buildtest_dh test/buildtest_dherr 
test/buildtest_dsa test/buildtest_dsaerr test/buildtest_dtls1 

[openssl-commits] Still Failing: openssl/openssl#15474 (master - 9422d45)

2018-01-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #15474
Status: Still Failing

Duration: 30 minutes and 37 seconds
Commit: 9422d45 (master)
Author: Rich Salz
Message: Add fingerprint text, remove MD5

Reviewed-by: Ben Kaduk 
(Merged from https://github.com/openssl/openssl/pull/4906)

View the changeset: 
https://github.com/openssl/openssl/compare/da6be198f7ab...9422d45de2b7

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/325948089?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2018-01-06 Thread Rich Salz
The branch OpenSSL_1_1_0-stable has been updated
   via  794bf5f756ad4748735e9b333c40d2b1bf685c36 (commit)
  from  f20aa0a6e91f25dccfbaeeba9ad8f2f6800d7bc4 (commit)


- Log -
commit 794bf5f756ad4748735e9b333c40d2b1bf685c36
Author: Rich Salz 
Date:   Sat Jan 6 22:32:59 2018 -0500

Add fingerprint text, remove MD5

Reviewed-by: Ben Kaduk 
(Merged from https://github.com/openssl/openssl/pull/4906)
(Cherry-picked from commit 9422d45de2b70cabec5f6e6a5c812e0647e6d3ab)

---

Summary of changes:
 doc/apps/x509.pod | 18 +-
 1 file changed, 5 insertions(+), 13 deletions(-)

diff --git a/doc/apps/x509.pod b/doc/apps/x509.pod
index 62520b3..a032639 100644
--- a/doc/apps/x509.pod
+++ b/doc/apps/x509.pod
@@ -231,8 +231,11 @@ non-zero if yes it will expire or zero if not.
 
 =item B<-fingerprint>
 
-prints out the digest of the DER encoded version of the whole certificate
-(see digest options).
+Calculates and outputs the digest of the DER encoded version of the entire
+certificate (see digest options).
+This is commonly called a "fingerprint". Because of the nature of message
+digests, the fingerprint of a certificate is unique to that certificate and
+two certificates with the same fingerprint can be considered to be the same.
 
 =item B<-C>
 
@@ -687,10 +690,6 @@ supporting UTF8:
 
  openssl x509 -in cert.pem -noout -subject -nameopt oneline,-esc_msb
 
-Display the certificate MD5 fingerprint:
-
- openssl x509 -in cert.pem -noout -fingerprint
-
 Display the certificate SHA1 fingerprint:
 
  openssl x509 -sha1 -in cert.pem -noout -fingerprint
@@ -744,13 +743,6 @@ T61Strings use the ISO8859-1 character set. This is wrong 
but Netscape
 and MSIE do this as do many certificates. So although this is incorrect
 it is more likely to display the majority of certificates correctly.
 
-The B<-fingerprint> option takes the digest of the DER encoded certificate.
-This is commonly called a "fingerprint". Because of the nature of message
-digests the fingerprint of a certificate is unique to that certificate and
-two certificates with the same fingerprint can be considered to be the same.
-
-The Netscape fingerprint uses MD5 whereas MSIE uses SHA1.
-
 The B<-email> option searches the subject name and the subject alternative
 name extension. Only unique email addresses will be printed out: it will
 not print the same address more than once.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2018-01-06 Thread Rich Salz
The branch OpenSSL_1_0_2-stable has been updated
   via  a353f94ae693b464bb8ea1b0eb87729142fe6f56 (commit)
  from  5e7cd29c95767d214cc98bc7adfb91c6271ac87a (commit)


- Log -
commit a353f94ae693b464bb8ea1b0eb87729142fe6f56
Author: Rich Salz 
Date:   Sat Jan 6 22:32:59 2018 -0500

Add fingerprint text, remove MD5

Reviewed-by: Ben Kaduk 
(Merged from https://github.com/openssl/openssl/pull/4906)
(cherry picked from commit 794bf5f756ad4748735e9b333c40d2b1bf685c36)

---

Summary of changes:
 doc/apps/x509.pod | 18 +-
 1 file changed, 5 insertions(+), 13 deletions(-)

diff --git a/doc/apps/x509.pod b/doc/apps/x509.pod
index d506258..408a5c6 100644
--- a/doc/apps/x509.pod
+++ b/doc/apps/x509.pod
@@ -225,8 +225,11 @@ non-zero if yes it will expire or zero if not.
 
 =item B<-fingerprint>
 
-prints out the digest of the DER encoded version of the whole certificate
-(see digest options).
+Calculates and outputs the digest of the DER encoded version of the entire
+certificate (see digest options).
+This is commonly called a "fingerprint". Because of the nature of message
+digests, the fingerprint of a certificate is unique to that certificate and
+two certificates with the same fingerprint can be considered to be the same.
 
 =item B<-C>
 
@@ -674,10 +677,6 @@ supporting UTF8:
 
  openssl x509 -in cert.pem -noout -subject -nameopt oneline,-esc_msb
 
-Display the certificate MD5 fingerprint:
-
- openssl x509 -in cert.pem -noout -fingerprint
-
 Display the certificate SHA1 fingerprint:
 
  openssl x509 -sha1 -in cert.pem -noout -fingerprint
@@ -731,13 +730,6 @@ T61Strings use the ISO8859-1 character set. This is wrong 
but Netscape
 and MSIE do this as do many certificates. So although this is incorrect
 it is more likely to display the majority of certificates correctly.
 
-The B<-fingerprint> option takes the digest of the DER encoded certificate.
-This is commonly called a "fingerprint". Because of the nature of message
-digests the fingerprint of a certificate is unique to that certificate and
-two certificates with the same fingerprint can be considered to be the same.
-
-The Netscape fingerprint uses MD5 whereas MSIE uses SHA1.
-
 The B<-email> option searches the subject name and the subject alternative
 name extension. Only unique email addresses will be printed out: it will
 not print the same address more than once.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-01-06 Thread Rich Salz
The branch master has been updated
   via  9422d45de2b70cabec5f6e6a5c812e0647e6d3ab (commit)
  from  da6be198f7ab690b8ace83f35502bca8dd9218e5 (commit)


- Log -
commit 9422d45de2b70cabec5f6e6a5c812e0647e6d3ab
Author: Rich Salz 
Date:   Sat Nov 4 10:40:49 2017 -0400

Add fingerprint text, remove MD5

Reviewed-by: Ben Kaduk 
(Merged from https://github.com/openssl/openssl/pull/4906)

---

Summary of changes:
 doc/man1/x509.pod | 18 +-
 1 file changed, 5 insertions(+), 13 deletions(-)

diff --git a/doc/man1/x509.pod b/doc/man1/x509.pod
index e57e18b..1140e25 100644
--- a/doc/man1/x509.pod
+++ b/doc/man1/x509.pod
@@ -259,8 +259,11 @@ non-zero if yes it will expire or zero if not.
 
 =item B<-fingerprint>
 
-Prints out the digest of the DER encoded version of the whole certificate
-(see digest options).
+Calculates and outputs the digest of the DER encoded version of the entire
+certificate (see digest options).
+This is commonly called a "fingerprint". Because of the nature of message
+digests, the fingerprint of a certificate is unique to that certificate and
+two certificates with the same fingerprint can be considered to be the same.
 
 =item B<-C>
 
@@ -725,10 +728,6 @@ supporting UTF8:
 
  openssl x509 -in cert.pem -noout -subject -nameopt oneline,-esc_msb
 
-Display the certificate MD5 fingerprint:
-
- openssl x509 -in cert.pem -noout -fingerprint
-
 Display the certificate SHA1 fingerprint:
 
  openssl x509 -sha1 -in cert.pem -noout -fingerprint
@@ -782,13 +781,6 @@ T61Strings use the ISO8859-1 character set. This is wrong 
but Netscape
 and MSIE do this as do many certificates. So although this is incorrect
 it is more likely to display the majority of certificates correctly.
 
-The B<-fingerprint> option takes the digest of the DER encoded certificate.
-This is commonly called a "fingerprint". Because of the nature of message
-digests the fingerprint of a certificate is unique to that certificate and
-two certificates with the same fingerprint can be considered to be the same.
-
-The Netscape fingerprint uses MD5 whereas MSIE uses SHA1.
-
 The B<-email> option searches the subject name and the subject alternative
 name extension. Only unique email addresses will be printed out: it will
 not print the same address more than once.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build completed: openssl master.14764

2018-01-06 Thread AppVeyor


Build openssl master.14764 completed



Commit c23a9bbd8e by Dr. Matthias St. Pierre on 1/7/2018 1:38 AM:

Update all OpenSSL Copyright statements to 2018


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.14763

2018-01-06 Thread AppVeyor



Build openssl master.14763 failed


Commit 63457114d0 by Jan Zak on 2/8/2017 10:06 AM:

Support AEAD ciphers in enc app. Fixes #471


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Broken: openssl/openssl#15467 (master - da6be19)

2018-01-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #15467
Status: Broken

Duration: 32 minutes and 24 seconds
Commit: da6be19 (master)
Author: Richard Levitte
Message: Add the possibility to do 'openssl help [command]'

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5002)

View the changeset: 
https://github.com/openssl/openssl/compare/a032ed0a7ba3...da6be198f7ab

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/325845562?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2018-01-06 Thread Richard Levitte
The branch OpenSSL_1_0_2-stable has been updated
   via  5e7cd29c95767d214cc98bc7adfb91c6271ac87a (commit)
   via  ceee07cee5d7f07f1b48798ba8fe790204644b9e (commit)
  from  2157adf66a3cb43b25a1441c5dcca0b287fa7c0d (commit)


- Log -
commit 5e7cd29c95767d214cc98bc7adfb91c6271ac87a
Author: Richard Levitte 
Date:   Sat Jan 6 12:32:36 2018 +0100

test/maketests.com: remove irrelevant comment

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5017)

commit ceee07cee5d7f07f1b48798ba8fe790204644b9e
Author: Richard Levitte 
Date:   Thu Jan 4 22:37:34 2018 +0100

Add missing tests to the VMS test scripts

Thanks to Douglas Fyfe @ VSI for making me aware of this

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5017)

---

Summary of changes:
 test/maketests.com |  7 +--
 test/tests.com | 15 ++-
 2 files changed, 19 insertions(+), 3 deletions(-)

diff --git a/test/maketests.com b/test/maketests.com
index 6223659..f4e418b 100644
--- a/test/maketests.com
+++ b/test/maketests.com
@@ -150,8 +150,8 @@ $ TEST_FILES = 
"BNTEST,ECTEST,ECDSATEST,ECDHTEST,IDEATEST,"+ -
   "EVP_TEST,EVP_EXTRA_TEST,IGETEST,JPAKETEST,SRPTEST,"+ -
   "ASN1TEST,V3NAMETEST,HEARTBEAT_TEST,"+ -
   "CONSTANT_TIME_TEST,VERIFY_EXTRA_TEST,"+ -
-   "CLIENTHELLOTEST,SSLV2CONFTEST,DTLSTEST"
-$! Should we add MTTEST,PQ_TEST,LH_TEST,DIVTEST,TABTEST as well?
+   "CLIENTHELLOTEST,SSLV2CONFTEST,DTLSTEST,"+ -
+   "BAD_DTLS_TEST,FATALERRTEST"
 $!
 $! Additional directory information.
 $ T_D_BNTEST := [-.crypto.bn]
@@ -194,10 +194,13 @@ $ T_D_HEARTBEAT_TEST := [-.ssl]
 $ T_D_CONSTANT_TIME_TEST := [-.crypto]
 $ T_D_VERIFY_EXTRA_TEST := [-.crypto.x509]
 $ T_D_CLIENTHELLOTEST := [-.ssl]
+$ T_D_BAD_DTLS_TEST   := [-.ssl]
 $ T_D_SSLV2CONFTEST := [-.ssl]
 $ T_D_DTLSTEST   := [-.ssl]
+$ T_D_FATALERRTEST := [-.ssl]
 $
 $ EXOBJ_DTLSTEST := SSLTESTLIB
+$ EXOBJ_FATALERRTEST := SSLTESTLIB
 $!
 $ TCPIP_PROGRAMS = ",,"
 $ IF COMPILER .EQS. "VAXC" THEN -
diff --git a/test/tests.com b/test/tests.com
index 59745e1..27b01b6 100644
--- a/test/tests.com
+++ b/test/tests.com
@@ -57,7 +57,8 @@ $ tests := -
test_gen,test_req,test_pkcs7,test_verify,test_dh,test_dsa,-

test_ss,test_ca,test_engine,test_evp,test_evp_extra,test_ssl,test_tsa,test_ige,-
test_jpake,test_srp,test_cms,test_ocsp,test_v3name,test_heartbeat,-
-   
test_constant_time,test_verify_extra,test_clienthello,test_sslv2conftest,test_dtls
+   
test_constant_time,test_verify_extra,test_clienthello,test_sslv2conftest,-
+   test_dtls,test_bad_dtls,test_fatalerr
 $  endif
 $  tests = f$edit(tests,"COLLAPSE")
 $
@@ -102,8 +103,10 @@ $  HEARTBEATTEST :=heartbeat_test
 $  CONSTTIMETEST :=constant_time_test
 $  VERIFYEXTRATEST :=  verify_extra_test
 $  CLIENTHELLOTEST :=  clienthellotest
+$  BADDTLSTEST :=  bad_dtls_test
 $  SSLV2CONFTEST :=sslv2conftest
 $  DTLSTEST := dtlstest
+$  FATALERRTEST := fatalerrtest
 $!
 $  tests_i = 0
 $ loop_tests:
@@ -402,6 +405,16 @@ $ test_clienthello:
 $  write sys$output "''START' test_clienthello"
 $  mcr 'texe_dir''clienthellotest'
 $   return
+$ test_bad_dtls:
+$  write sys$output "''START' test_bad_dtls"
+$  mcr 'texe_dir''baddtlstest'
+$  return
+$
+$ test_fatalerr:
+$  write sys$output "''START' test_fatalerrtest"
+$  mcr 'texe_dir''fatalerrtest' 'ROOT'.APPS]server.pem 
'ROOT'.APPS]server.pem
+$  return
+$
 $ test_sslv2conftest:
 $  write sys$output "''START' test_sslv2conftest"
 $  mcr 'texe_dir''sslv2conftest'
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-01-06 Thread Richard Levitte
The branch master has been updated
   via  da6be198f7ab690b8ace83f35502bca8dd9218e5 (commit)
   via  391e987e9cd837446d3d0bf5505bbc7aa44b627e (commit)
  from  a032ed0a7ba3a276fe7d9880d26c0c5f2ba702c7 (commit)


- Log -
commit da6be198f7ab690b8ace83f35502bca8dd9218e5
Author: Richard Levitte 
Date:   Sun Dec 31 08:44:26 2017 +0100

Add the possibility to do 'openssl help [command]'

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5002)

commit 391e987e9cd837446d3d0bf5505bbc7aa44b627e
Author: Richard Levitte 
Date:   Sun Dec 31 08:44:12 2017 +0100

apps: make sure prog_init only calculates once

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5002)

---

Summary of changes:
 apps/openssl.c | 21 +++--
 1 file changed, 19 insertions(+), 2 deletions(-)

diff --git a/apps/openssl.c b/apps/openssl.c
index 2cb49cb..4ab6be8 100644
--- a/apps/openssl.c
+++ b/apps/openssl.c
@@ -442,6 +442,8 @@ typedef enum HELP_CHOICE {
 } HELP_CHOICE;
 
 const OPTIONS help_options[] = {
+{OPT_HELP_STR, 1, '-', "Usage: help [options]\n"},
+{OPT_HELP_STR, 1, '-', "   help [command]\n"},
 {"help", OPT_hHELP, '-', "Display this summary"},
 {NULL}
 };
@@ -469,6 +471,14 @@ int help_main(int argc, char **argv)
 }
 }
 
+if (opt_num_rest() == 1) {
+char *new_argv[3];
+
+new_argv[0] = opt_rest()[0];
+new_argv[1] = "--help";
+new_argv[2] = NULL;
+return do_cmd(prog_init(), 2, new_argv);
+}
 if (opt_num_rest() != 0) {
 BIO_printf(bio_err, "Usage: %s\n", prog);
 return 1;
@@ -787,12 +797,19 @@ static void list_disabled(void)
 
 static LHASH_OF(FUNCTION) *prog_init(void)
 {
-LHASH_OF(FUNCTION) *ret;
+static LHASH_OF(FUNCTION) *ret = NULL;
+static int prog_inited = 0;
 FUNCTION *f;
 size_t i;
 
+if (prog_inited)
+return ret;
+
+prog_inited = 1;
+
 /* Sort alphabetically within category. For nicer help displays. */
-for (i = 0, f = functions; f->name != NULL; ++f, ++i) ;
+for (i = 0, f = functions; f->name != NULL; ++f, ++i)
+;
 qsort(functions, i, sizeof(*functions), SortFnByName);
 
 if ((ret = lh_FUNCTION_new(function_hash, function_cmp)) == NULL)
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Passed: openssl/openssl#15466 (master - a032ed0)

2018-01-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #15466
Status: Passed

Duration: 31 minutes and 20 seconds
Commit: a032ed0 (master)
Author: Konstantin Shemyak
Message: Corrected 'cms' exit status when key or certificate cannot be opened

Fixes #4996.

Reviewed-by: Matt Caswell 
Reviewed-by: Andy Polyakov 
(Merged from https://github.com/openssl/openssl/pull/4997)

View the changeset: 
https://github.com/openssl/openssl/compare/ae880ae6719e...a032ed0a7ba3

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/325792440?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#15462 (OpenSSL_1_1_0-stable - 508ff7f)

2018-01-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #15462
Status: Errored

Duration: 15 minutes and 29 seconds
Commit: 508ff7f (OpenSSL_1_1_0-stable)
Author: Bernd Edlinger
Message: Stop using unimplemented cipher classes.
Add comments to no longer usable ciphers.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5023)

(cherry picked from commit 643d91fea409b0f010ce990f8f0fac234ae058bc)

View the changeset: 
https://github.com/openssl/openssl/compare/35a37158181f...508ff7f6b4c0

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/325788567?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Errored: openssl/openssl#15461 (master - 643d91f)

2018-01-06 Thread Travis CI
Build Update for openssl/openssl
-

Build: #15461
Status: Errored

Duration: 19 minutes and 39 seconds
Commit: 643d91f (master)
Author: Bernd Edlinger
Message: Stop using unimplemented cipher classes.
Add comments to no longer usable ciphers.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5023)

View the changeset: 
https://github.com/openssl/openssl/compare/cc94da4ea38c...643d91fea409

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/325788038?utm_source=email_medium=notification

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-01-06 Thread bernd . edlinger
The branch master has been updated
   via  a032ed0a7ba3a276fe7d9880d26c0c5f2ba702c7 (commit)
  from  ae880ae6719e7c850b14193b2bc0a8e401c4b2b8 (commit)


- Log -
commit a032ed0a7ba3a276fe7d9880d26c0c5f2ba702c7
Author: Konstantin Shemyak 
Date:   Thu Dec 28 23:12:59 2017 +0200

Corrected 'cms' exit status when key or certificate cannot be opened

Fixes #4996.

Reviewed-by: Matt Caswell 
Reviewed-by: Andy Polyakov 
(Merged from https://github.com/openssl/openssl/pull/4997)

---

Summary of changes:
 apps/cms.c | 8 ++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/apps/cms.c b/apps/cms.c
index 1457cab..6900ddf 100644
--- a/apps/cms.c
+++ b/apps/cms.c
@@ -921,11 +921,15 @@ int cms_main(int argc, char **argv)
 keyfile = sk_OPENSSL_STRING_value(skkeys, i);
 
 signer = load_cert(signerfile, FORMAT_PEM, "signer certificate");
-if (signer == NULL)
+if (signer == NULL) {
+ret = 2;
 goto end;
+}
 key = load_key(keyfile, keyform, 0, passin, e, "signing key file");
-if (key == NULL)
+if (key == NULL) {
+ret = 2;
 goto end;
+}
 for (kparam = key_first; kparam; kparam = kparam->next) {
 if (kparam->idx == i) {
 tflags |= CMS_KEY_PARAM;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2018-01-06 Thread bernd . edlinger
The branch OpenSSL_1_0_2-stable has been updated
   via  2157adf66a3cb43b25a1441c5dcca0b287fa7c0d (commit)
  from  58cc2962db17183c039bbbd08e31e179c1126c63 (commit)


- Log -
commit 2157adf66a3cb43b25a1441c5dcca0b287fa7c0d
Author: Konstantin Shemyak 
Date:   Thu Dec 28 23:12:59 2017 +0200

Corrected 'cms' exit status when key or certificate cannot be opened

A backport of #4997.
Fixes #4996.

Reviewed-by: Matt Caswell 
Reviewed-by: Bernd Edlinger 
(Merged from https://github.com/openssl/openssl/pull/5020)

---

Summary of changes:
 apps/cms.c | 8 ++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/apps/cms.c b/apps/cms.c
index f9a63bc..2626bbb 100644
--- a/apps/cms.c
+++ b/apps/cms.c
@@ -977,12 +977,16 @@ int MAIN(int argc, char **argv)
 
 signer = load_cert(bio_err, signerfile, FORMAT_PEM, NULL,
e, "signer certificate");
-if (!signer)
+if (!signer) {
+ret = 2;
 goto end;
+}
 key = load_key(bio_err, keyfile, keyform, 0, passin, e,
"signing key file");
-if (!key)
+if (!key) {
+ret = 2;
 goto end;
+}
 for (kparam = key_first; kparam; kparam = kparam->next) {
 if (kparam->idx == i) {
 tflags |= CMS_KEY_PARAM;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2018-01-06 Thread bernd . edlinger
The branch OpenSSL_1_1_0-stable has been updated
   via  f20aa0a6e91f25dccfbaeeba9ad8f2f6800d7bc4 (commit)
  from  508ff7f6b4c038c017a7adaf8dd8cda3efe853ec (commit)


- Log -
commit f20aa0a6e91f25dccfbaeeba9ad8f2f6800d7bc4
Author: Konstantin Shemyak 
Date:   Thu Dec 28 23:12:59 2017 +0200

Corrected 'cms' exit status when key or certificate cannot be opened

A backport of #4997.
Fixes #4996.

Reviewed-by: Matt Caswell 
Reviewed-by: Bernd Edlinger 
(Merged from https://github.com/openssl/openssl/pull/5021)

---

Summary of changes:
 apps/cms.c | 8 ++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/apps/cms.c b/apps/cms.c
index 579b227..7246658 100644
--- a/apps/cms.c
+++ b/apps/cms.c
@@ -931,11 +931,15 @@ int cms_main(int argc, char **argv)
 keyfile = sk_OPENSSL_STRING_value(skkeys, i);
 
 signer = load_cert(signerfile, FORMAT_PEM, "signer certificate");
-if (!signer)
+if (!signer) {
+ret = 2;
 goto end;
+}
 key = load_key(keyfile, keyform, 0, passin, e, "signing key file");
-if (!key)
+if (!key) {
+ret = 2;
 goto end;
+}
 for (kparam = key_first; kparam; kparam = kparam->next) {
 if (kparam->idx == i) {
 tflags |= CMS_KEY_PARAM;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-01-06 Thread bernd . edlinger
The branch master has been updated
   via  ae880ae6719e7c850b14193b2bc0a8e401c4b2b8 (commit)
  from  643d91fea409b0f010ce990f8f0fac234ae058bc (commit)


- Log -
commit ae880ae6719e7c850b14193b2bc0a8e401c4b2b8
Author: Bernd Edlinger 
Date:   Sat Jan 6 15:21:46 2018 +0100

Fix error handling in X509_REQ_print_ex

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5025)

---

Summary of changes:
 crypto/x509/t_req.c | 24 
 1 file changed, 16 insertions(+), 8 deletions(-)

diff --git a/crypto/x509/t_req.c b/crypto/x509/t_req.c
index 7c0bd42..2fcc43e 100644
--- a/crypto/x509/t_req.c
+++ b/crypto/x509/t_req.c
@@ -93,10 +93,12 @@ int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long 
nmflags,
 
 pkey = X509_REQ_get0_pubkey(x);
 if (pkey == NULL) {
-BIO_printf(bp, "%12sUnable to load Public Key\n", "");
+if (BIO_printf(bp, "%12sUnable to load Public Key\n", "") <= 0)
+goto err;
 ERR_print_errors(bp);
 } else {
-EVP_PKEY_print_public(bp, pkey, 16, NULL);
+if (EVP_PKEY_print_public(bp, pkey, 16, NULL) <= 0)
+goto err;
 }
 }
 
@@ -143,10 +145,12 @@ int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long 
nmflags,
 if (BIO_write(bp, (char *)bs->data, bs->length)
 != bs->length)
 goto err;
-BIO_puts(bp, "\n");
+if (BIO_puts(bp, "\n") <= 0)
+goto err;
 break;
 default:
-BIO_puts(bp, "unable to print attribute\n");
+if (BIO_puts(bp, "unable to print attribute\n") <= 0)
+goto err;
 break;
 }
 if (++ii < count)
@@ -157,7 +161,8 @@ int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long 
nmflags,
 if (!(cflag & X509_FLAG_NO_EXTENSIONS)) {
 exts = X509_REQ_get_extensions(x);
 if (exts) {
-BIO_printf(bp, "%8sRequested Extensions:\n", "");
+if (BIO_printf(bp, "%8sRequested Extensions:\n", "") <= 0)
+goto err;
 for (i = 0; i < sk_X509_EXTENSION_num(exts); i++) {
 ASN1_OBJECT *obj;
 X509_EXTENSION *ex;
@@ -166,13 +171,16 @@ int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long 
nmflags,
 if (BIO_printf(bp, "%12s", "") <= 0)
 goto err;
 obj = X509_EXTENSION_get_object(ex);
-i2a_ASN1_OBJECT(bp, obj);
+if (i2a_ASN1_OBJECT(bp, obj) <= 0)
+goto err;
 critical = X509_EXTENSION_get_critical(ex);
 if (BIO_printf(bp, ": %s\n", critical ? "critical" : "") <= 0)
 goto err;
 if (!X509V3_EXT_print(bp, ex, cflag, 16)) {
-BIO_printf(bp, "%16s", "");
-ASN1_STRING_print(bp, X509_EXTENSION_get_data(ex));
+if (BIO_printf(bp, "%16s", "") <= 0
+|| ASN1_STRING_print(bp,
+ X509_EXTENSION_get_data(ex)) <= 0)
+goto err;
 }
 if (BIO_write(bp, "\n", 1) <= 0)
 goto err;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2018-01-06 Thread bernd . edlinger
The branch OpenSSL_1_1_0-stable has been updated
   via  508ff7f6b4c038c017a7adaf8dd8cda3efe853ec (commit)
  from  35a37158181fb0129b632b450ded1114fe4fbb37 (commit)


- Log -
commit 508ff7f6b4c038c017a7adaf8dd8cda3efe853ec
Author: Bernd Edlinger 
Date:   Fri Jan 5 18:50:09 2018 +0100

Stop using unimplemented cipher classes.
Add comments to no longer usable ciphers.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5023)

(cherry picked from commit 643d91fea409b0f010ce990f8f0fac234ae058bc)

---

Summary of changes:
 include/openssl/ssl.h  | 16 
 ssl/ssl_ciph.c |  4 
 test/recipes/80-test_ssl_old.t |  2 +-
 3 files changed, 9 insertions(+), 13 deletions(-)

diff --git a/include/openssl/ssl.h b/include/openssl/ssl.h
index 4e7f82f..4cdcdcf 100644
--- a/include/openssl/ssl.h
+++ b/include/openssl/ssl.h
@@ -95,14 +95,14 @@ extern "C" {
 # define SSL_TXT_NULL"NULL"
 
 # define SSL_TXT_kRSA"kRSA"
-# define SSL_TXT_kDHr"kDHr"
-# define SSL_TXT_kDHd"kDHd"
-# define SSL_TXT_kDH "kDH"
+# define SSL_TXT_kDHr"kDHr"/* this cipher class has been removed */
+# define SSL_TXT_kDHd"kDHd"/* this cipher class has been removed */
+# define SSL_TXT_kDH "kDH"/* this cipher class has been removed */
 # define SSL_TXT_kEDH"kEDH"/* alias for kDHE */
 # define SSL_TXT_kDHE"kDHE"
-# define SSL_TXT_kECDHr  "kECDHr"
-# define SSL_TXT_kECDHe  "kECDHe"
-# define SSL_TXT_kECDH   "kECDH"
+# define SSL_TXT_kECDHr  "kECDHr"/* this cipher class has been removed 
*/
+# define SSL_TXT_kECDHe  "kECDHe"/* this cipher class has been removed 
*/
+# define SSL_TXT_kECDH   "kECDH"/* this cipher class has been removed 
*/
 # define SSL_TXT_kEECDH  "kEECDH"/* alias for kECDHE */
 # define SSL_TXT_kECDHE  "kECDHE"
 # define SSL_TXT_kPSK"kPSK"
@@ -114,8 +114,8 @@ extern "C" {
 
 # define SSL_TXT_aRSA"aRSA"
 # define SSL_TXT_aDSS"aDSS"
-# define SSL_TXT_aDH "aDH"
-# define SSL_TXT_aECDH   "aECDH"
+# define SSL_TXT_aDH "aDH"/* this cipher class has been removed */
+# define SSL_TXT_aECDH   "aECDH"/* this cipher class has been removed 
*/
 # define SSL_TXT_aECDSA  "aECDSA"
 # define SSL_TXT_aPSK"aPSK"
 # define SSL_TXT_aGOST94 "aGOST94"
diff --git a/ssl/ssl_ciph.c b/ssl/ssl_ciph.c
index da6e298..4026d46 100644
--- a/ssl/ssl_ciph.c
+++ b/ssl/ssl_ciph.c
@@ -1384,10 +1384,6 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const 
SSL_METHOD *ssl_method, STACK
 ssl_cipher_apply_rule(0, 0, SSL_aNULL, 0, 0, 0, 0, CIPHER_ORD, -1, ,
   );
 
-/*
- * ssl_cipher_apply_rule(0, 0, SSL_aDH, 0, 0, 0, 0, CIPHER_ORD, -1,
- * , );
- */
 ssl_cipher_apply_rule(0, SSL_kRSA, 0, 0, 0, 0, 0, CIPHER_ORD, -1, ,
   );
 ssl_cipher_apply_rule(0, SSL_kPSK, 0, 0, 0, 0, 0, CIPHER_ORD, -1, ,
diff --git a/test/recipes/80-test_ssl_old.t b/test/recipes/80-test_ssl_old.t
index 1cce9fb..97ef821 100644
--- a/test/recipes/80-test_ssl_old.t
+++ b/test/recipes/80-test_ssl_old.t
@@ -424,7 +424,7 @@ sub testssl {
 subtest "Testing ciphersuites" => sub {
 
 my @exkeys = ();
-my $ciphers = "-EXP:-PSK:-SRP:-kDH:-kECDHe";
+my $ciphers = "-PSK:-SRP";
 
 if ($no_dh) {
 note "skipping DHE tests\n";
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2018-01-06 Thread bernd . edlinger
The branch master has been updated
   via  643d91fea409b0f010ce990f8f0fac234ae058bc (commit)
  from  cc94da4ea38cc2a4a47e0a14ef9e361a2d723eff (commit)


- Log -
commit 643d91fea409b0f010ce990f8f0fac234ae058bc
Author: Bernd Edlinger 
Date:   Fri Jan 5 18:50:09 2018 +0100

Stop using unimplemented cipher classes.
Add comments to no longer usable ciphers.

Reviewed-by: Rich Salz 
(Merged from https://github.com/openssl/openssl/pull/5023)

---

Summary of changes:
 include/openssl/ssl.h  | 16 
 ssl/ssl_ciph.c |  4 
 test/recipes/80-test_ssl_old.t |  2 +-
 3 files changed, 9 insertions(+), 13 deletions(-)

diff --git a/include/openssl/ssl.h b/include/openssl/ssl.h
index 98a106b..84f14f7 100644
--- a/include/openssl/ssl.h
+++ b/include/openssl/ssl.h
@@ -67,14 +67,14 @@ extern "C" {
 # define SSL_TXT_NULL"NULL"
 
 # define SSL_TXT_kRSA"kRSA"
-# define SSL_TXT_kDHr"kDHr"
-# define SSL_TXT_kDHd"kDHd"
-# define SSL_TXT_kDH "kDH"
+# define SSL_TXT_kDHr"kDHr"/* this cipher class has been removed */
+# define SSL_TXT_kDHd"kDHd"/* this cipher class has been removed */
+# define SSL_TXT_kDH "kDH"/* this cipher class has been removed */
 # define SSL_TXT_kEDH"kEDH"/* alias for kDHE */
 # define SSL_TXT_kDHE"kDHE"
-# define SSL_TXT_kECDHr  "kECDHr"
-# define SSL_TXT_kECDHe  "kECDHe"
-# define SSL_TXT_kECDH   "kECDH"
+# define SSL_TXT_kECDHr  "kECDHr"/* this cipher class has been removed 
*/
+# define SSL_TXT_kECDHe  "kECDHe"/* this cipher class has been removed 
*/
+# define SSL_TXT_kECDH   "kECDH"/* this cipher class has been removed 
*/
 # define SSL_TXT_kEECDH  "kEECDH"/* alias for kECDHE */
 # define SSL_TXT_kECDHE  "kECDHE"
 # define SSL_TXT_kPSK"kPSK"
@@ -86,8 +86,8 @@ extern "C" {
 
 # define SSL_TXT_aRSA"aRSA"
 # define SSL_TXT_aDSS"aDSS"
-# define SSL_TXT_aDH "aDH"
-# define SSL_TXT_aECDH   "aECDH"
+# define SSL_TXT_aDH "aDH"/* this cipher class has been removed */
+# define SSL_TXT_aECDH   "aECDH"/* this cipher class has been removed 
*/
 # define SSL_TXT_aECDSA  "aECDSA"
 # define SSL_TXT_aPSK"aPSK"
 # define SSL_TXT_aGOST94 "aGOST94"
diff --git a/ssl/ssl_ciph.c b/ssl/ssl_ciph.c
index 19b592a..94bff7c 100644
--- a/ssl/ssl_ciph.c
+++ b/ssl/ssl_ciph.c
@@ -1368,10 +1368,6 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const 
SSL_METHOD *ssl_method, STACK
 ssl_cipher_apply_rule(0, 0, SSL_aNULL, 0, 0, 0, 0, CIPHER_ORD, -1, ,
   );
 
-/*
- * ssl_cipher_apply_rule(0, 0, SSL_aDH, 0, 0, 0, 0, CIPHER_ORD, -1,
- * , );
- */
 ssl_cipher_apply_rule(0, SSL_kRSA, 0, 0, 0, 0, 0, CIPHER_ORD, -1, ,
   );
 ssl_cipher_apply_rule(0, SSL_kPSK, 0, 0, 0, 0, 0, CIPHER_ORD, -1, ,
diff --git a/test/recipes/80-test_ssl_old.t b/test/recipes/80-test_ssl_old.t
index 2f3d3be..35bf904 100644
--- a/test/recipes/80-test_ssl_old.t
+++ b/test/recipes/80-test_ssl_old.t
@@ -396,7 +396,7 @@ sub testssl {
 subtest "Testing ciphersuites" => sub {
 
 my @exkeys = ();
-my $ciphers = "-EXP:-PSK:-SRP:-kDH:-kECDHe";
+my $ciphers = "-PSK:-SRP";
 
 if (!$no_dsa) {
 push @exkeys, "-s_cert", "certD.ss", "-s_key", "keyD.ss";
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.14753

2018-01-06 Thread AppVeyor



Build openssl master.14753 failed


Commit 37ef837047 by Jan Zak on 2/8/2017 10:06 AM:

Support AEAD ciphers in enc app. Fixes #471


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits