[openssl-commits] [openssl] master update

2017-03-11 Thread Richard Levitte
The branch master has been updated
   via  8e3d46e58ba1b754f0c3f47f7c451f0b2b23 (commit)
  from  6e470e190853f59a394dc92fefd74666c94266f4 (commit)


- Log -
commit 8e3d46e58ba1b754f0c3f47f7c451f0b2b23
Author: Richard Levitte 
Date:   Sat Mar 11 10:51:04 2017 +0100

UI docs: Rephrase the UI method function return value description

It seems the =item isn't supposed to have pure numbers, or so tells me
perldoc.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/2906)

---

Summary of changes:
 doc/man3/UI_create_method.pod | 23 ---
 1 file changed, 4 insertions(+), 19 deletions(-)

diff --git a/doc/man3/UI_create_method.pod b/doc/man3/UI_create_method.pod
index c1d3088..1c40153 100644
--- a/doc/man3/UI_create_method.pod
+++ b/doc/man3/UI_create_method.pod
@@ -85,28 +85,13 @@ by closing the channel to the tty, maybe by destroying a 
dialog box.
 
 =back
 
-All of these functions are expected to return one of these values:
-
-=over 4
-
-=item 0
-
-on error.
-
-=item 1
-
-on success.
-
-=item -1
-
-on out-off-band events, for example if some prompting has been
-cancelled (by pressing Ctrl-C, for example).
-This is only expected to be returned by the flusher or the reader.
+All of these functions are expected to return 0 on error, 1 on
+success, or -1 on out-off-band events, for example if some prompting
+has been cancelled (by pressing Ctrl-C, for example).
+Only the flusher or the reader are expected to return -1.
 If returned by another of the functions, it's treated as if 0 was
 returned.
 
-=back
-
 Regarding the writer and the reader, don't assume the former should
 only write and don't assume the latter should only read.
 This depends on the needs of the method.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2017-03-11 Thread Richard Levitte
The branch OpenSSL_1_1_0-stable has been updated
   via  1639a910b97581ef3050d310e8e09d5a28eadca5 (commit)
  from  f31c714e923e76f54ff3b492f646662ef57f7d59 (commit)


- Log -
commit 1639a910b97581ef3050d310e8e09d5a28eadca5
Author: Richard Levitte 
Date:   Sat Mar 11 10:51:04 2017 +0100

UI docs: Rephrase the UI method function return value description

It seems the =item isn't supposed to have pure numbers, or so tells me
perldoc.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/2906)
(cherry picked from commit 8e3d46e58ba1b754f0c3f47f7c451f0b2b23)

---

Summary of changes:
 doc/crypto/UI_create_method.pod | 23 ---
 1 file changed, 4 insertions(+), 19 deletions(-)

diff --git a/doc/crypto/UI_create_method.pod b/doc/crypto/UI_create_method.pod
index c1d3088..1c40153 100644
--- a/doc/crypto/UI_create_method.pod
+++ b/doc/crypto/UI_create_method.pod
@@ -85,28 +85,13 @@ by closing the channel to the tty, maybe by destroying a 
dialog box.
 
 =back
 
-All of these functions are expected to return one of these values:
-
-=over 4
-
-=item 0
-
-on error.
-
-=item 1
-
-on success.
-
-=item -1
-
-on out-off-band events, for example if some prompting has been
-cancelled (by pressing Ctrl-C, for example).
-This is only expected to be returned by the flusher or the reader.
+All of these functions are expected to return 0 on error, 1 on
+success, or -1 on out-off-band events, for example if some prompting
+has been cancelled (by pressing Ctrl-C, for example).
+Only the flusher or the reader are expected to return -1.
 If returned by another of the functions, it's treated as if 0 was
 returned.
 
-=back
-
 Regarding the writer and the reader, don't assume the former should
 only write and don't assume the latter should only read.
 This depends on the needs of the method.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2017-03-11 Thread Richard Levitte
The branch OpenSSL_1_0_2-stable has been updated
   via  6fe43af8d77b119f8af913c284149bca482ee58c (commit)
  from  2b194874c14bdaa8f60280f37d5ad0c154cebfe2 (commit)


- Log -
commit 6fe43af8d77b119f8af913c284149bca482ee58c
Author: Richard Levitte 
Date:   Sat Mar 11 11:19:20 2017 +0100

Revert "Use the callbacks from the SSL object instead of the SSL_CTX object"

This shouldn't have been applied to the 1.0.2 branch.

This reverts commit 5247c0388610bfdcc8f44b777d75ab681120753d.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/2907)

---

Summary of changes:
 ssl/ssl_rsa.c | 14 --
 1 file changed, 8 insertions(+), 6 deletions(-)

diff --git a/ssl/ssl_rsa.c b/ssl/ssl_rsa.c
index fbb85cb..af03d45 100644
--- a/ssl/ssl_rsa.c
+++ b/ssl/ssl_rsa.c
@@ -102,8 +102,8 @@ int SSL_use_certificate_file(SSL *ssl, const char *file, 
int type)
 x = d2i_X509_bio(in, NULL);
 } else if (type == SSL_FILETYPE_PEM) {
 j = ERR_R_PEM_LIB;
-x = PEM_read_bio_X509(in, NULL, ssl->default_passwd_callback,
-  ssl->default_passwd_callback_userdata);
+x = PEM_read_bio_X509(in, NULL, ssl->ctx->default_passwd_callback,
+  ssl->ctx->default_passwd_callback_userdata);
 } else {
 SSLerr(SSL_F_SSL_USE_CERTIFICATE_FILE, SSL_R_BAD_SSL_FILETYPE);
 goto end;
@@ -261,8 +261,9 @@ int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, 
int type)
 } else if (type == SSL_FILETYPE_PEM) {
 j = ERR_R_PEM_LIB;
 rsa = PEM_read_bio_RSAPrivateKey(in, NULL,
- ssl->default_passwd_callback,
- 
ssl->default_passwd_callback_userdata);
+ ssl->ctx->default_passwd_callback,
+ ssl->
+ 
ctx->default_passwd_callback_userdata);
 } else {
 SSLerr(SSL_F_SSL_USE_RSAPRIVATEKEY_FILE, SSL_R_BAD_SSL_FILETYPE);
 goto end;
@@ -334,8 +335,9 @@ int SSL_use_PrivateKey_file(SSL *ssl, const char *file, int 
type)
 if (type == SSL_FILETYPE_PEM) {
 j = ERR_R_PEM_LIB;
 pkey = PEM_read_bio_PrivateKey(in, NULL,
-   ssl->default_passwd_callback,
-   ssl->default_passwd_callback_userdata);
+   ssl->ctx->default_passwd_callback,
+   ssl->
+   ctx->default_passwd_callback_userdata);
 } else if (type == SSL_FILETYPE_ASN1) {
 j = ERR_R_ASN1_LIB;
 pkey = d2i_PrivateKey_bio(in, NULL);
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Still Failing: openssl/openssl#9362 (master - 8e3d46e)

2017-03-11 Thread Travis CI
Build Update for openssl/openssl
-

Build: #9362
Status: Still Failing

Duration: 16 minutes and 52 seconds
Commit: 8e3d46e (master)
Author: Richard Levitte
Message: UI docs: Rephrase the UI method function return value description

It seems the =item isn't supposed to have pure numbers, or so tells me
perldoc.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/2906)

View the changeset: 
https://github.com/openssl/openssl/compare/6e470e190853...8e3d46e58ba1

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/210022576

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Fixed: openssl/openssl#9364 (OpenSSL_1_0_2-stable - 6fe43af)

2017-03-11 Thread Travis CI
Build Update for openssl/openssl
-

Build: #9364
Status: Fixed

Duration: 6 minutes and 38 seconds
Commit: 6fe43af (OpenSSL_1_0_2-stable)
Author: Richard Levitte
Message: Revert "Use the callbacks from the SSL object instead of the SSL_CTX 
object"

This shouldn't have been applied to the 1.0.2 branch.

This reverts commit 5247c0388610bfdcc8f44b777d75ab681120753d.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/2907)

View the changeset: 
https://github.com/openssl/openssl/compare/2b194874c14b...6fe43af8d77b

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/210022984

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2017-03-11 Thread Rich Salz
The branch master has been updated
   via  9e183d2271653cbba2d9cf56d40c1356705207aa (commit)
  from  8e3d46e58ba1b754f0c3f47f7c451f0b2b23 (commit)


- Log -
commit 9e183d2271653cbba2d9cf56d40c1356705207aa
Author: Rich Salz 
Date:   Sat Mar 11 08:56:44 2017 -0500

Fix many doc L<> errors

Add 2017 copyright year
Add missing typedef to NAME
Remove ec(7) and bn(7) doc links
Remove .pod link errors, bogus links, make a few typo corrections
Fix some typo's in links and some missing items.
Don't link to C runtime functions (See OPENSSL_malloc for example/precedent)
Document ASN1_tag2str(), add a few typedef's that were missing from NAME
Update doc-nits target; addresses
https://github.com/openssl/openssl/pull/1900#issuecomment-259943891,
Merge check-doc-links into find-doc-nits; if run regularly, would have found
https://github.com/openssl/openssl/pull/2825

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/2862)

---

Summary of changes:
 Configurations/unix-Makefile.tmpl   |  4 +-
 doc/man3/ASN1_STRING_print_ex.pod   |  8 +-
 doc/man3/BN_BLINDING_new.pod|  6 +-
 doc/man3/BN_CTX_new.pod |  4 +-
 doc/man3/BN_add.pod |  4 +-
 doc/man3/BN_add_word.pod|  4 +-
 doc/man3/BN_bn2bin.pod  |  4 +-
 doc/man3/BN_cmp.pod |  6 +-
 doc/man3/BN_copy.pod|  4 +-
 doc/man3/BN_generate_prime.pod  |  4 +-
 doc/man3/BN_mod_inverse.pod |  4 +-
 doc/man3/BN_mod_mul_montgomery.pod  |  4 +-
 doc/man3/BN_mod_mul_reciprocal.pod  |  4 +-
 doc/man3/BN_new.pod |  4 +-
 doc/man3/BN_num_bytes.pod   |  4 +-
 doc/man3/BN_rand.pod|  4 +-
 doc/man3/BN_set_bit.pod |  4 +-
 doc/man3/BN_swap.pod|  4 +-
 doc/man3/BN_zero.pod|  4 +-
 doc/man3/CONF_modules_load_file.pod |  3 +-
 doc/man3/CRYPTO_get_ex_new_index.pod|  2 +-
 doc/man3/ECPKParameters_print.pod   |  4 +-
 doc/man3/EC_GFp_simple_method.pod   |  4 +-
 doc/man3/EC_GROUP_copy.pod  |  4 +-
 doc/man3/EC_GROUP_new.pod   |  4 +-
 doc/man3/EC_KEY_get_enc_flags.pod   |  4 +-
 doc/man3/EC_KEY_new.pod |  4 +-
 doc/man3/EC_POINT_add.pod   |  4 +-
 doc/man3/EC_POINT_new.pod   |  4 +-
 doc/man3/OPENSSL_init_crypto.pod|  4 +-
 doc/man3/SCT_new.pod|  4 +-
 doc/man3/SMIME_read_PKCS7.pod   |  6 +-
 doc/man3/SSL_CTX_set_ct_validation_callback.pod |  7 +-
 doc/man3/SSL_CTX_set_keylog_callback.pod|  3 +-
 doc/man3/SSL_CTX_set_verify.pod | 14 +++-
 doc/man3/SSL_set_bio.pod|  4 +-
 doc/man3/UI_new.pod |  2 +-
 doc/man3/X509_LOOKUP_hash_dir.pod   |  7 +-
 doc/man3/X509_digest.pod|  2 +-
 doc/man3/d2i_PrivateKey.pod |  4 +-
 doc/man7/ct.pod |  6 +-
 doc/man7/des_modes.pod  |  5 +-
 doc/man7/ssl.pod|  4 +-
 doc/man7/x509.pod   |  8 +-
 util/check-doc-links.pl | 99 -
 util/{find-doc-nits.pl => find-doc-nits}| 90 +-
 46 files changed, 186 insertions(+), 204 deletions(-)
 delete mode 100644 util/check-doc-links.pl
 rename util/{find-doc-nits.pl => find-doc-nits} (73%)

diff --git a/Configurations/unix-Makefile.tmpl 
b/Configurations/unix-Makefile.tmpl
index 01f5665..26858d4 100644
--- a/Configurations/unix-Makefile.tmpl
+++ b/Configurations/unix-Makefile.tmpl
@@ -289,7 +289,7 @@ clean: libclean
-$(RM) `find . -name '*{- $depext -}' -a \! -path "./.git/*"`
-$(RM) `find . -name '*{- $objext -}' -a \! -path "./.git/*"`
$(RM) core
-   $(RM) tags TAGS
+   $(RM) tags TAGS doc-nits
$(RM) test/.rnd
$(RM) openssl.pc libcrypto.pc libssl.pc
-$(RM) `find . -type l -a \! -path "./.git/*"`
@@ -597,7 +597,7 @@ generate: generate_apps generate_crypto_bn 
generate_crypto_objects \
 
 doc-nits:
(cd $(SRCDIR); $(PERL) util/find-doc-nits.pl -n ) >doc-nits
-   if [ -s doc-nits ] ; then cat doc-nits; exit 1; fi
+   if [ -s doc-nits ] ; then cat doc-nits; rm doc-nits ; exit 1; fi
 
 # Test coverage is a good idea for the future
 #coverage: $(PROGRAMS) $(TESTPROGRAMS)
diff --g

[openssl-commits] Still Failing: openssl/openssl#9365 (master - 9e183d2)

2017-03-11 Thread Travis CI
Build Update for openssl/openssl
-

Build: #9365
Status: Still Failing

Duration: 19 minutes and 0 seconds
Commit: 9e183d2 (master)
Author: Rich Salz
Message: Fix many doc L<> errors

Add 2017 copyright year
Add missing typedef to NAME
Remove ec(7) and bn(7) doc links
Remove .pod link errors, bogus links, make a few typo corrections
Fix some typo's in links and some missing items.
Don't link to C runtime functions (See OPENSSL_malloc for example/precedent)
Document ASN1_tag2str(), add a few typedef's that were missing from NAME
Update doc-nits target; addresses
https://github.com/openssl/openssl/pull/1900#issuecomment-259943891,
Merge check-doc-links into find-doc-nits; if run regularly, would have found
https://github.com/openssl/openssl/pull/2825

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/2862)

View the changeset: 
https://github.com/openssl/openssl/compare/8e3d46e58ba1...9e183d227165

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/210055383

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2017-03-11 Thread Rich Salz
The branch OpenSSL_1_1_0-stable has been updated
   via  8d92311c50e58dee074bbbf7fa390e592ee8df77 (commit)
  from  1639a910b97581ef3050d310e8e09d5a28eadca5 (commit)


- Log -
commit 8d92311c50e58dee074bbbf7fa390e592ee8df77
Author: Rich Salz 
Date:   Sat Mar 11 08:56:44 2017 -0500

Fix many doc L<> errors

Add 2017 copyright year
Add missing typedef to NAME
Remove ec(7) and bn(7) doc links
Remove .pod link errors, bogus links, make a few typo corrections
Fix some typo's in links and some missing items.
Don't link to C runtime functions (See OPENSSL_malloc for example/precedent)
Document ASN1_tag2str(), add a few typedef's that were missing from NAME
Update doc-nits target; addresses
https://github.com/openssl/openssl/pull/1900#issuecomment-259943891,
Merge check-doc-links into find-doc-nits; if run regularly, would have found
https://github.com/openssl/openssl/pull/2825

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/2862)
(cherry picked from commit 9e183d2271653cbba2d9cf56d40c1356705207aa)

---

Summary of changes:
 Configurations/unix-Makefile.tmpl  |   6 +-
 doc/crypto/ASN1_STRING_print_ex.pod|   8 +-
 doc/crypto/BN_BLINDING_new.pod |   6 +-
 doc/crypto/BN_CTX_new.pod  |   4 +-
 doc/crypto/BN_add.pod  |   4 +-
 doc/crypto/BN_add_word.pod |   4 +-
 doc/crypto/BN_bn2bin.pod   |   4 +-
 doc/crypto/BN_cmp.pod  |   6 +-
 doc/crypto/BN_copy.pod |   4 +-
 doc/crypto/BN_generate_prime.pod   |   4 +-
 doc/crypto/BN_mod_inverse.pod  |   4 +-
 doc/crypto/BN_mod_mul_montgomery.pod   |   4 +-
 doc/crypto/BN_mod_mul_reciprocal.pod   |   4 +-
 doc/crypto/BN_new.pod  |   4 +-
 doc/crypto/BN_num_bytes.pod|   4 +-
 doc/crypto/BN_rand.pod |   5 +-
 doc/crypto/BN_set_bit.pod  |   4 +-
 doc/crypto/BN_swap.pod |   4 +-
 doc/crypto/BN_zero.pod |   4 +-
 doc/crypto/CONF_modules_load_file.pod  |   3 +-
 doc/crypto/CRYPTO_get_ex_new_index.pod |   3 +-
 doc/crypto/ECPKParameters_print.pod|   4 +-
 doc/crypto/EC_GFp_simple_method.pod|   4 +-
 doc/crypto/EC_GROUP_copy.pod   |   4 +-
 doc/crypto/EC_GROUP_new.pod|   4 +-
 doc/crypto/EC_KEY_get_enc_flags.pod|   4 +-
 doc/crypto/EC_KEY_new.pod  |   4 +-
 doc/crypto/EC_POINT_add.pod|   4 +-
 doc/crypto/EC_POINT_new.pod|   4 +-
 doc/crypto/OPENSSL_init_crypto.pod |   4 +-
 doc/crypto/SCT_new.pod |   6 +-
 doc/crypto/SMIME_read_PKCS7.pod|   6 +-
 doc/crypto/UI_new.pod  |   8 +-
 doc/crypto/X509_LOOKUP_hash_dir.pod|   7 +-
 doc/crypto/X509_digest.pod |   2 +-
 doc/crypto/ct.pod  |   8 +-
 doc/crypto/d2i_PrivateKey.pod  |   6 +-
 doc/crypto/x509.pod|  10 +-
 doc/ssl/SSL_CTX_set_ct_validation_callback.pod |   7 +-
 doc/ssl/SSL_CTX_set_verify.pod |  14 +-
 doc/ssl/SSL_set_bio.pod|  18 +--
 doc/ssl/ssl.pod|  22 +--
 util/{find-doc-nits.pl => find-doc-nits}   | 198 +++--
 43 files changed, 311 insertions(+), 130 deletions(-)
 rename util/{find-doc-nits.pl => find-doc-nits} (54%)

diff --git a/Configurations/unix-Makefile.tmpl 
b/Configurations/unix-Makefile.tmpl
index 27b34b9..6df1cce 100644
--- a/Configurations/unix-Makefile.tmpl
+++ b/Configurations/unix-Makefile.tmpl
@@ -284,7 +284,7 @@ clean: libclean
-$(RM) `find . -name '*{- $depext -}' -a \! -path "./.git/*"`
-$(RM) `find . -name '*{- $objext -}' -a \! -path "./.git/*"`
$(RM) core
-   $(RM) tags TAGS
+   $(RM) tags TAGS doc-nits
$(RM) test/.rnd
$(RM) openssl.pc libcrypto.pc libssl.pc
-$(RM) `find . -type l -a \! -path "./.git/*"`
@@ -581,6 +581,10 @@ update: generate errors ordinals
 generate: generate_apps generate_crypto_bn generate_crypto_objects \
   generate_crypto_conf generate_crypto_asn1
 
+doc-nits:
+   (cd $(SRCDIR); $(PERL) util/find-doc-nits.pl -n ) >doc-nits
+   if [ -s doc-nits ] ; then cat doc-nits; rm doc-nits ; exit 1; fi
+
 # Test coverage is a good idea for the future
 #coverage: $(PROGRAMS) $(TESTPROGRAMS)
 #  ...
diff --git a/doc/crypto/ASN1_STRING_print_ex.pod 
b/doc/crypto/ASN1_STRING_print_ex.pod
index d2bf538..a521f78 100644
--- a/

[openssl-commits] [openssl] master update

2017-03-11 Thread Rich Salz
The branch master has been updated
   via  a3b0d466930ec45bc3ddf4c9e853d73d37783f44 (commit)
  from  9e183d2271653cbba2d9cf56d40c1356705207aa (commit)


- Log -
commit a3b0d466930ec45bc3ddf4c9e853d73d37783f44
Author: Rich Salz 
Date:   Sat Mar 11 10:28:45 2017 -0500

Handle find-doc-nits script rename

Reviewed-by: Richard Levitte 

---

Summary of changes:
 Configurations/unix-Makefile.tmpl | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/Configurations/unix-Makefile.tmpl 
b/Configurations/unix-Makefile.tmpl
index 26858d4..0070fbf 100644
--- a/Configurations/unix-Makefile.tmpl
+++ b/Configurations/unix-Makefile.tmpl
@@ -596,7 +596,7 @@ generate: generate_apps generate_crypto_bn 
generate_crypto_objects \
   generate_crypto_conf generate_crypto_asn1
 
 doc-nits:
-   (cd $(SRCDIR); $(PERL) util/find-doc-nits.pl -n ) >doc-nits
+   (cd $(SRCDIR); $(PERL) util/find-doc-nits -n ) >doc-nits
if [ -s doc-nits ] ; then cat doc-nits; rm doc-nits ; exit 1; fi
 
 # Test coverage is a good idea for the future
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2017-03-11 Thread Rich Salz
The branch OpenSSL_1_1_0-stable has been updated
   via  a3b56f2f43b4f405a7023f055520075e327501bd (commit)
  from  8d92311c50e58dee074bbbf7fa390e592ee8df77 (commit)


- Log -
commit a3b56f2f43b4f405a7023f055520075e327501bd
Author: Rich Salz 
Date:   Sat Mar 11 10:28:45 2017 -0500

Handle find-doc-nits script rename

Reviewed-by: Richard Levitte 
(cherry picked from commit a3b0d466930ec45bc3ddf4c9e853d73d37783f44)

---

Summary of changes:
 Configurations/unix-Makefile.tmpl | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/Configurations/unix-Makefile.tmpl 
b/Configurations/unix-Makefile.tmpl
index 6df1cce..2cc37cd 100644
--- a/Configurations/unix-Makefile.tmpl
+++ b/Configurations/unix-Makefile.tmpl
@@ -582,7 +582,7 @@ generate: generate_apps generate_crypto_bn 
generate_crypto_objects \
   generate_crypto_conf generate_crypto_asn1
 
 doc-nits:
-   (cd $(SRCDIR); $(PERL) util/find-doc-nits.pl -n ) >doc-nits
+   (cd $(SRCDIR); $(PERL) util/find-doc-nits -n ) >doc-nits
if [ -s doc-nits ] ; then cat doc-nits; rm doc-nits ; exit 1; fi
 
 # Test coverage is a good idea for the future
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Still Failing: openssl/openssl#9367 (master - a3b0d46)

2017-03-11 Thread Travis CI
Build Update for openssl/openssl
-

Build: #9367
Status: Still Failing

Duration: 18 minutes and 41 seconds
Commit: a3b0d46 (master)
Author: Rich Salz
Message: Handle find-doc-nits script rename

Reviewed-by: Richard Levitte 

View the changeset: 
https://github.com/openssl/openssl/compare/9e183d227165...a3b0d466930e

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/210067978

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-chacha

2017-03-11 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux test 4.4.0-64-generic #85-Ubuntu SMP Mon Feb 20 11:50:30 UTC 2017 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-chacha

Commit log since last time:

a3b0d46 Handle find-doc-nits script rename
9e183d2 Fix many doc L<> errors
8e3d46e UI docs: Rephrase the UI method function return value description
6e470e1 Fix UI_get0_action_string()
5469600 Document UI_METHOD and UI_STRING, both useful for UI_METHOD creators

Build log ended with (last 100 lines):

../../openssl/test/recipes/15-test_dh.t .. ok
../../openssl/test/recipes/15-test_dsa.t . ok
../../openssl/test/recipes/15-test_ec.t .. ok
../../openssl/test/recipes/15-test_ecdh.t  ok
../../openssl/test/recipes/15-test_ecdsa.t ... ok
../../openssl/test/recipes/15-test_genrsa.t .. ok
../../openssl/test/recipes/15-test_rsa.t . ok
../../openssl/test/recipes/20-test_enc.t . ok
../../openssl/test/recipes/20-test_enc_more.t  ok
../../openssl/test/recipes/20-test_passwd.t .. ok
../../openssl/test/recipes/25-test_crl.t . ok
../../openssl/test/recipes/25-test_d2i.t . ok
../../openssl/test/recipes/25-test_pkcs7.t ... ok
../../openssl/test/recipes/25-test_req.t . ok
../../openssl/test/recipes/25-test_sid.t . ok
../../openssl/test/recipes/25-test_verify.t .. ok
../../openssl/test/recipes/25-test_x509.t  ok
../../openssl/test/recipes/30-test_afalg.t ... ok
../../openssl/test/recipes/30-test_engine.t .. ok
../../openssl/test/recipes/30-test_evp.t . ok
../../openssl/test/recipes/30-test_evp_extra.t ... ok
../../openssl/test/recipes/30-test_pbelu.t ... ok
../../openssl/test/recipes/30-test_pkey_meth.t ... ok
../../openssl/test/recipes/40-test_rehash.t .. ok
../../openssl/test/recipes/60-test_x509_store.t .. ok
../../openssl/test/recipes/60-test_x509_time.t ... ok
../../openssl/test/recipes/70-test_asyncio.t . ok
../../openssl/test/recipes/70-test_bad_dtls.t  ok
../../openssl/test/recipes/70-test_clienthello.t . ok
../../openssl/test/recipes/70-test_key_share.t ... skipped: 
test_key_share needs TLS1.3 enabled
../../openssl/test/recipes/70-test_packet.t .. ok
../../openssl/test/recipes/70-test_recordlen.t ... ok
../../openssl/test/recipes/70-test_renegotiation.t ... ok
../../openssl/test/recipes/70-test_sslcbcpadding.t ... ok
../../openssl/test/recipes/70-test_sslcertstatus.t ... ok
../../openssl/test/recipes/70-test_sslextension.t  ok
../../openssl/test/recipes/70-test_sslmessages.t . ok
../../openssl/test/recipes/70-test_sslrecords.t .. ok
../../openssl/test/recipes/70-test_sslsessiontick.t .. ok
../../openssl/test/recipes/70-test_sslsigalgs.t .. ok
../../openssl/test/recipes/70-test_sslsignature.t  ok
../../openssl/test/recipes/70-test_sslskewith0p.t  ok
../../openssl/test/recipes/70-test_sslversions.t . skipped: 
test_sslversions needs TLS1.3, TLS1.2 and TLS1.1 enabled
../../openssl/test/recipes/70-test_sslvertol.t ... ok
../../openssl/test/recipes/70-test_tls13cookie.t . skipped: 
test_tls13cookie needs TLS1.3 enabled
../../openssl/test/recipes/70-test_tls13kexmodes.t ... skipped: 
test_tls13kexmodes needs TLSv1.3 enabled
../../openssl/test/recipes/70-test_tls13messages.t ... skipped: 
test_tls13messages needs TLSv1.3 enabled
../../openssl/test/recipes/70-test_tls13psk.t  skipped: 
test_tls13psk needs TLSv1.3 enabled
../../openssl/test/recipes/70-test_tlsextms.t  ok
../../openssl/test/recipes/70-test_verify_extra.t  ok
../../openssl/test/recipes/70-test_wpacket.t . ok
../../openssl/test/recipes/80-test_ca.t .. ok
../../openssl/test/recipes/80-test_cipherbytes.t . ok
../../openssl/test/recipes/80-test_cipherlist.t .. ok
../../openssl/test/recipes/80-test_cms.t . ok
../../openssl/test/recipes/80-test_ct.t .. ok
../../openssl/test/recipes/80-test_dane.t  ok
../../openssl/test/recipes/80-test_dtls.t  ok
../../openssl/test/recipes/80-test_dtls_mtu.t  ok
../../openssl/test/recipes/80-test_dtlsv1listen.t  ok
../../openssl/test/recipes/80-test_ocsp.t  ok
../../openssl/test/recipes/80-test_pkcs12.t .. ok
../../openssl/test/recipes/80-test_ssl_new.t . ok
../../openssl/test/recipes/80-test_ssl_old.t . ok
../../openssl/test/recipes/80-test_ssl_test_ctx.t  ok
../../openssl/test/recipes/80-test_sslcorrupt.t .. ok
../../openssl/test/recipes/80-test_tsa.t . ok
../../ope

[openssl-commits] [openssl] master update

2017-03-11 Thread Matt Caswell
The branch master has been updated
   via  8a585601fea1091022034dd14b961c1ecd5916c3 (commit)
  from  a3b0d466930ec45bc3ddf4c9e853d73d37783f44 (commit)


- Log -
commit 8a585601fea1091022034dd14b961c1ecd5916c3
Author: Matt Caswell 
Date:   Fri Mar 10 10:51:35 2017 +

Fix out-of-memory condition in conf

conf has the ability to expand variables in config files. Repeatedly doing
this can lead to an exponential increase in the amount of memory required.
This places a limit on the length of a value that can result from an
expansion.

Credit to OSS-Fuzz for finding this problem.

Reviewed-by: Rich Salz 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/2894)

---

Summary of changes:
 crypto/conf/conf_def.c | 16 +++--
 crypto/conf/conf_err.c |  4 ++-
 doc/man5/config.pod|  3 +-
 .../conf/0d7ad6e04c0235cdc590756ceec867a05cff5823  | 41 ++
 include/openssl/conf.h |  1 +
 5 files changed, 61 insertions(+), 4 deletions(-)
 create mode 100644 fuzz/corpora/conf/0d7ad6e04c0235cdc590756ceec867a05cff5823

diff --git a/crypto/conf/conf_def.c b/crypto/conf/conf_def.c
index 8861b3a..a7b11d1 100644
--- a/crypto/conf/conf_def.c
+++ b/crypto/conf/conf_def.c
@@ -20,6 +20,12 @@
 #include 
 #include 
 
+/*
+ * The maximum length we can grow a value to after variable expansion. 64k
+ * should be more than enough for all reasonable uses.
+ */
+#define MAX_CONF_VALUE_LENGTH   65536
+
 static char *eat_ws(CONF *conf, char *p);
 static char *eat_alpha_numeric(CONF *conf, char *p);
 static void clear_comments(CONF *conf, char *p);
@@ -457,6 +463,8 @@ static int str_copy(CONF *conf, char *section, char **pto, 
char *from)
 } else if (IS_EOF(conf, *from))
 break;
 else if (*from == '$') {
+size_t newsize;
+
 /* try to expand it */
 rrp = NULL;
 s = &(from[1]);
@@ -511,8 +519,12 @@ static int str_copy(CONF *conf, char *section, char **pto, 
char *from)
 CONFerr(CONF_F_STR_COPY, CONF_R_VARIABLE_HAS_NO_VALUE);
 goto err;
 }
-if (!BUF_MEM_grow_clean(buf,
-(strlen(p) + buf->length - (e - from {
+newsize = strlen(p) + buf->length - (e - from);
+if (newsize > MAX_CONF_VALUE_LENGTH) {
+CONFerr(CONF_F_STR_COPY, CONF_R_VARIABLE_EXPANSION_TOO_LONG);
+goto err;
+}
+if (!BUF_MEM_grow_clean(buf, newsize)) {
 CONFerr(CONF_F_STR_COPY, ERR_R_MALLOC_FAILURE);
 goto err;
 }
diff --git a/crypto/conf/conf_err.c b/crypto/conf/conf_err.c
index b583c05..0863bc4 100644
--- a/crypto/conf/conf_err.c
+++ b/crypto/conf/conf_err.c
@@ -1,6 +1,6 @@
 /*
  * Generated by util/mkerr.pl DO NOT EDIT
- * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved.
  *
  * Licensed under the OpenSSL license (the "License").  You may not use
  * this file except in compliance with the License.  You can obtain a copy
@@ -60,6 +60,8 @@ static ERR_STRING_DATA CONF_str_reasons[] = {
 {ERR_REASON(CONF_R_UNABLE_TO_CREATE_NEW_SECTION),
  "unable to create new section"},
 {ERR_REASON(CONF_R_UNKNOWN_MODULE_NAME), "unknown module name"},
+{ERR_REASON(CONF_R_VARIABLE_EXPANSION_TOO_LONG),
+ "variable expansion too long"},
 {ERR_REASON(CONF_R_VARIABLE_HAS_NO_VALUE), "variable has no value"},
 {0, NULL}
 };
diff --git a/doc/man5/config.pod b/doc/man5/config.pod
index 24ebafb..ba9a8ab 100644
--- a/doc/man5/config.pod
+++ b/doc/man5/config.pod
@@ -44,7 +44,8 @@ or B<${section::name}>. By using the form B<$ENV::name> 
environment
 variables can be substituted. It is also possible to assign values to
 environment variables by using the name B, this will work
 if the program looks up environment variables using the B library
-instead of calling getenv() directly.
+instead of calling getenv() directly. The value string must not exceed 64k in
+length after variable expansion. Otherwise an error will occur.
 
 It is possible to escape certain characters by using any kind of quote
 or the B<\> character. By making the last character of a line a B<\>
diff --git a/fuzz/corpora/conf/0d7ad6e04c0235cdc590756ceec867a05cff5823 
b/fuzz/corpora/conf/0d7ad6e04c0235cdc590756ceec867a05cff5823
new file mode 100644
index 000..b0ed191
--- /dev/null
+++ b/fuzz/corpora/conf/0d7ad6e04c0235cdc590756ceec867a05cff5823
@@ -0,0 +1,41 @@
+=;2I8
+=$$󠁉
+=$$$
+=$$$
+=$$$󠁷
+=$$$
+=$$$
+=$$$
+=
+=$$$
+=$$$
+=$$$󠁷
+=$$$
+=$$$
+=$$$
+=$$$
+=$$$
+=$$$
+=$$$
+=$$$
+=$

[openssl-commits] [openssl] OpenSSL_1_0_2-stable update

2017-03-11 Thread Matt Caswell
The branch OpenSSL_1_0_2-stable has been updated
   via  6a6213556a80ab0a9eb926a1d6023b8bf44f2afd (commit)
  from  6fe43af8d77b119f8af913c284149bca482ee58c (commit)


- Log -
commit 6a6213556a80ab0a9eb926a1d6023b8bf44f2afd
Author: Matt Caswell 
Date:   Fri Mar 10 10:51:35 2017 +

Fix out-of-memory condition in conf

conf has the ability to expand variables in config files. Repeatedly doing
this can lead to an exponential increase in the amount of memory required.
This places a limit on the length of a value that can result from an
expansion.

Credit to OSS-Fuzz for finding this problem.

Reviewed-by: Rich Salz 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/2894)
(cherry picked from commit 8a585601fea1091022034dd14b961c1ecd5916c3)

---

Summary of changes:
 crypto/conf/conf.h |  1 +
 crypto/conf/conf_def.c | 16 ++--
 crypto/conf/conf_err.c |  2 ++
 doc/apps/config.pod|  3 ++-
 4 files changed, 19 insertions(+), 3 deletions(-)

diff --git a/crypto/conf/conf.h b/crypto/conf/conf.h
index 8d926d5..fe49113 100644
--- a/crypto/conf/conf.h
+++ b/crypto/conf/conf.h
@@ -259,6 +259,7 @@ void ERR_load_CONF_strings(void);
 # define CONF_R_NO_VALUE  108
 # define CONF_R_UNABLE_TO_CREATE_NEW_SECTION  103
 # define CONF_R_UNKNOWN_MODULE_NAME   113
+# define CONF_R_VARIABLE_EXPANSION_TOO_LONG   116
 # define CONF_R_VARIABLE_HAS_NO_VALUE 104
 
 #ifdef  __cplusplus
diff --git a/crypto/conf/conf_def.c b/crypto/conf/conf_def.c
index 68c77ce..75e309a 100644
--- a/crypto/conf/conf_def.c
+++ b/crypto/conf/conf_def.c
@@ -69,6 +69,12 @@
 #include 
 #include 
 
+/*
+ * The maximum length we can grow a value to after variable expansion. 64k
+ * should be more than enough for all reasonable uses.
+ */
+#define MAX_CONF_VALUE_LENGTH   65536
+
 static char *eat_ws(CONF *conf, char *p);
 static char *eat_alpha_numeric(CONF *conf, char *p);
 static void clear_comments(CONF *conf, char *p);
@@ -530,6 +536,8 @@ static int str_copy(CONF *conf, char *section, char **pto, 
char *from)
 } else if (IS_EOF(conf, *from))
 break;
 else if (*from == '$') {
+size_t newsize;
+
 /* try to expand it */
 rrp = NULL;
 s = &(from[1]);
@@ -584,8 +592,12 @@ static int str_copy(CONF *conf, char *section, char **pto, 
char *from)
 CONFerr(CONF_F_STR_COPY, CONF_R_VARIABLE_HAS_NO_VALUE);
 goto err;
 }
-if (!BUF_MEM_grow_clean(buf,
-(strlen(p) + buf->length - (e - from {
+newsize = strlen(p) + buf->length - (e - from);
+if (newsize > MAX_CONF_VALUE_LENGTH) {
+CONFerr(CONF_F_STR_COPY, CONF_R_VARIABLE_EXPANSION_TOO_LONG);
+goto err;
+}
+if (!BUF_MEM_grow_clean(buf, newsize)) {
 CONFerr(CONF_F_STR_COPY, ERR_R_MALLOC_FAILURE);
 goto err;
 }
diff --git a/crypto/conf/conf_err.c b/crypto/conf/conf_err.c
index bb5e2fe..b0b6896 100644
--- a/crypto/conf/conf_err.c
+++ b/crypto/conf/conf_err.c
@@ -115,6 +115,8 @@ static ERR_STRING_DATA CONF_str_reasons[] = {
 {ERR_REASON(CONF_R_UNABLE_TO_CREATE_NEW_SECTION),
  "unable to create new section"},
 {ERR_REASON(CONF_R_UNKNOWN_MODULE_NAME), "unknown module name"},
+{ERR_REASON(CONF_R_VARIABLE_EXPANSION_TOO_LONG),
+ "variable expansion too long"},
 {ERR_REASON(CONF_R_VARIABLE_HAS_NO_VALUE), "variable has no value"},
 {0, NULL}
 };
diff --git a/doc/apps/config.pod b/doc/apps/config.pod
index e125915..3f607d3 100644
--- a/doc/apps/config.pod
+++ b/doc/apps/config.pod
@@ -47,7 +47,8 @@ or B<${section::name}>. By using the form B<$ENV::name> 
environment
 variables can be substituted. It is also possible to assign values to
 environment variables by using the name B, this will work
 if the program looks up environment variables using the B library
-instead of calling B directly.
+instead of calling B directly. The value string must not exceed 64k 
in
+length after variable expansion. Otherwise an error will occur.
 
 It is possible to escape certain characters by using any kind of quote
 or the B<\> character. By making the last character of a line a B<\>
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

2017-03-11 Thread Matt Caswell
The branch OpenSSL_1_1_0-stable has been updated
   via  c2f9144e52a3168a6faca83839367b0adfedfc50 (commit)
  from  a3b56f2f43b4f405a7023f055520075e327501bd (commit)


- Log -
commit c2f9144e52a3168a6faca83839367b0adfedfc50
Author: Matt Caswell 
Date:   Fri Mar 10 10:51:35 2017 +

Fix out-of-memory condition in conf

conf has the ability to expand variables in config files. Repeatedly doing
this can lead to an exponential increase in the amount of memory required.
This places a limit on the length of a value that can result from an
expansion.

Credit to OSS-Fuzz for finding this problem.

Reviewed-by: Rich Salz 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/2894)
(cherry picked from commit 8a585601fea1091022034dd14b961c1ecd5916c3)

---

Summary of changes:
 crypto/conf/conf_def.c | 16 +++--
 crypto/conf/conf_err.c |  4 ++-
 doc/apps/config.pod|  3 +-
 .../conf/0d7ad6e04c0235cdc590756ceec867a05cff5823  | 41 ++
 include/openssl/conf.h |  1 +
 5 files changed, 61 insertions(+), 4 deletions(-)
 create mode 100644 fuzz/corpora/conf/0d7ad6e04c0235cdc590756ceec867a05cff5823

diff --git a/crypto/conf/conf_def.c b/crypto/conf/conf_def.c
index 8861b3a..a7b11d1 100644
--- a/crypto/conf/conf_def.c
+++ b/crypto/conf/conf_def.c
@@ -20,6 +20,12 @@
 #include 
 #include 
 
+/*
+ * The maximum length we can grow a value to after variable expansion. 64k
+ * should be more than enough for all reasonable uses.
+ */
+#define MAX_CONF_VALUE_LENGTH   65536
+
 static char *eat_ws(CONF *conf, char *p);
 static char *eat_alpha_numeric(CONF *conf, char *p);
 static void clear_comments(CONF *conf, char *p);
@@ -457,6 +463,8 @@ static int str_copy(CONF *conf, char *section, char **pto, 
char *from)
 } else if (IS_EOF(conf, *from))
 break;
 else if (*from == '$') {
+size_t newsize;
+
 /* try to expand it */
 rrp = NULL;
 s = &(from[1]);
@@ -511,8 +519,12 @@ static int str_copy(CONF *conf, char *section, char **pto, 
char *from)
 CONFerr(CONF_F_STR_COPY, CONF_R_VARIABLE_HAS_NO_VALUE);
 goto err;
 }
-if (!BUF_MEM_grow_clean(buf,
-(strlen(p) + buf->length - (e - from {
+newsize = strlen(p) + buf->length - (e - from);
+if (newsize > MAX_CONF_VALUE_LENGTH) {
+CONFerr(CONF_F_STR_COPY, CONF_R_VARIABLE_EXPANSION_TOO_LONG);
+goto err;
+}
+if (!BUF_MEM_grow_clean(buf, newsize)) {
 CONFerr(CONF_F_STR_COPY, ERR_R_MALLOC_FAILURE);
 goto err;
 }
diff --git a/crypto/conf/conf_err.c b/crypto/conf/conf_err.c
index b583c05..0863bc4 100644
--- a/crypto/conf/conf_err.c
+++ b/crypto/conf/conf_err.c
@@ -1,6 +1,6 @@
 /*
  * Generated by util/mkerr.pl DO NOT EDIT
- * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved.
  *
  * Licensed under the OpenSSL license (the "License").  You may not use
  * this file except in compliance with the License.  You can obtain a copy
@@ -60,6 +60,8 @@ static ERR_STRING_DATA CONF_str_reasons[] = {
 {ERR_REASON(CONF_R_UNABLE_TO_CREATE_NEW_SECTION),
  "unable to create new section"},
 {ERR_REASON(CONF_R_UNKNOWN_MODULE_NAME), "unknown module name"},
+{ERR_REASON(CONF_R_VARIABLE_EXPANSION_TOO_LONG),
+ "variable expansion too long"},
 {ERR_REASON(CONF_R_VARIABLE_HAS_NO_VALUE), "variable has no value"},
 {0, NULL}
 };
diff --git a/doc/apps/config.pod b/doc/apps/config.pod
index a9cde89..76f282f 100644
--- a/doc/apps/config.pod
+++ b/doc/apps/config.pod
@@ -46,7 +46,8 @@ or B<${section::name}>. By using the form B<$ENV::name> 
environment
 variables can be substituted. It is also possible to assign values to
 environment variables by using the name B, this will work
 if the program looks up environment variables using the B library
-instead of calling getenv() directly.
+instead of calling getenv() directly. The value string must not exceed 64k in
+length after variable expansion. Otherwise an error will occur.
 
 It is possible to escape certain characters by using any kind of quote
 or the B<\> character. By making the last character of a line a B<\>
diff --git a/fuzz/corpora/conf/0d7ad6e04c0235cdc590756ceec867a05cff5823 
b/fuzz/corpora/conf/0d7ad6e04c0235cdc590756ceec867a05cff5823
new file mode 100644
index 000..b0ed191
--- /dev/null
+++ b/fuzz/corpora/conf/0d7ad6e04c0235cdc590756ceec867a05cff5823
@@ -0,0 +1,41 @@
+=;2I8
+=$$󠁉
+=$$$
+=$$$
+=$$$󠁷
+=$$$
+=

[openssl-commits] Still Failing: openssl/openssl#9372 (master - 8a58560)

2017-03-11 Thread Travis CI
Build Update for openssl/openssl
-

Build: #9372
Status: Still Failing

Duration: 15 minutes and 15 seconds
Commit: 8a58560 (master)
Author: Matt Caswell
Message: Fix out-of-memory condition in conf

conf has the ability to expand variables in config files. Repeatedly doing
this can lead to an exponential increase in the amount of memory required.
This places a limit on the length of a value that can result from an
expansion.

Credit to OSS-Fuzz for finding this problem.

Reviewed-by: Rich Salz 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/2894)

View the changeset: 
https://github.com/openssl/openssl/compare/a3b0d466930e...8a585601fea1

View the full build log and details: 
https://travis-ci.org/openssl/openssl/builds/210164635

--

You can configure recipients for build notifications in your .travis.yml file. 
See https://docs.travis-ci.com/user/notifications

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed in Jenkins: 1_0_2_abi #396

2017-03-11 Thread openssl . sanity
See 

Changes:

[Richard Levitte] Revert "Use the callbacks from the SSL object instead of the 
SSL_CTX

[Matt Caswell] Fix out-of-memory condition in conf

--
[...truncated 1902 lines...]
make[3]: Leaving directory 
`
make[2]: Leaving directory 
`
make[1]: Leaving directory 
`
making all in apps...
make[1]: Entering directory 
`
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o verify.o verify.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o asn1pars.o asn1pars.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o req.o req.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o dgst.o dgst.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o dh.o dh.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o dhparam.o dhparam.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o enc.o enc.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o passwd.o passwd.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o gendh.o gendh.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 
-DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM 
-DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM 
-DECP_NISTZ256_ASM   -c -o errstr.o errstr.c
gcc -DMONOLITH -I.. -I../include  -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS 
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -g -Wa,--noexecstack -m64 -DL_ENDIAN 
-Og -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN

[openssl-commits] Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-poly1305

2017-03-11 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux test 4.4.0-64-generic #85-Ubuntu SMP Mon Feb 20 11:50:30 UTC 2017 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-poly1305

Commit log since last time:

a3b0d46 Handle find-doc-nits script rename
9e183d2 Fix many doc L<> errors
8e3d46e UI docs: Rephrase the UI method function return value description
6e470e1 Fix UI_get0_action_string()
5469600 Document UI_METHOD and UI_STRING, both useful for UI_METHOD creators

Build log ended with (last 100 lines):

../../openssl/test/recipes/15-test_dh.t .. ok
../../openssl/test/recipes/15-test_dsa.t . ok
../../openssl/test/recipes/15-test_ec.t .. ok
../../openssl/test/recipes/15-test_ecdh.t  ok
../../openssl/test/recipes/15-test_ecdsa.t ... ok
../../openssl/test/recipes/15-test_genrsa.t .. ok
../../openssl/test/recipes/15-test_rsa.t . ok
../../openssl/test/recipes/20-test_enc.t . ok
../../openssl/test/recipes/20-test_enc_more.t  ok
../../openssl/test/recipes/20-test_passwd.t .. ok
../../openssl/test/recipes/25-test_crl.t . ok
../../openssl/test/recipes/25-test_d2i.t . ok
../../openssl/test/recipes/25-test_pkcs7.t ... ok
../../openssl/test/recipes/25-test_req.t . ok
../../openssl/test/recipes/25-test_sid.t . ok
../../openssl/test/recipes/25-test_verify.t .. ok
../../openssl/test/recipes/25-test_x509.t  ok
../../openssl/test/recipes/30-test_afalg.t ... ok
../../openssl/test/recipes/30-test_engine.t .. ok
../../openssl/test/recipes/30-test_evp.t . ok
../../openssl/test/recipes/30-test_evp_extra.t ... ok
../../openssl/test/recipes/30-test_pbelu.t ... ok
../../openssl/test/recipes/30-test_pkey_meth.t ... ok
../../openssl/test/recipes/40-test_rehash.t .. ok
../../openssl/test/recipes/60-test_x509_store.t .. ok
../../openssl/test/recipes/60-test_x509_time.t ... ok
../../openssl/test/recipes/70-test_asyncio.t . ok
../../openssl/test/recipes/70-test_bad_dtls.t  ok
../../openssl/test/recipes/70-test_clienthello.t . ok
../../openssl/test/recipes/70-test_key_share.t ... skipped: 
test_key_share needs TLS1.3 enabled
../../openssl/test/recipes/70-test_packet.t .. ok
../../openssl/test/recipes/70-test_recordlen.t ... ok
../../openssl/test/recipes/70-test_renegotiation.t ... ok
../../openssl/test/recipes/70-test_sslcbcpadding.t ... ok
../../openssl/test/recipes/70-test_sslcertstatus.t ... ok
../../openssl/test/recipes/70-test_sslextension.t  ok
../../openssl/test/recipes/70-test_sslmessages.t . ok
../../openssl/test/recipes/70-test_sslrecords.t .. ok
../../openssl/test/recipes/70-test_sslsessiontick.t .. ok
../../openssl/test/recipes/70-test_sslsigalgs.t .. ok
../../openssl/test/recipes/70-test_sslsignature.t  ok
../../openssl/test/recipes/70-test_sslskewith0p.t  ok
../../openssl/test/recipes/70-test_sslversions.t . skipped: 
test_sslversions needs TLS1.3, TLS1.2 and TLS1.1 enabled
../../openssl/test/recipes/70-test_sslvertol.t ... ok
../../openssl/test/recipes/70-test_tls13cookie.t . skipped: 
test_tls13cookie needs TLS1.3 enabled
../../openssl/test/recipes/70-test_tls13kexmodes.t ... skipped: 
test_tls13kexmodes needs TLSv1.3 enabled
../../openssl/test/recipes/70-test_tls13messages.t ... skipped: 
test_tls13messages needs TLSv1.3 enabled
../../openssl/test/recipes/70-test_tls13psk.t  skipped: 
test_tls13psk needs TLSv1.3 enabled
../../openssl/test/recipes/70-test_tlsextms.t  ok
../../openssl/test/recipes/70-test_verify_extra.t  ok
../../openssl/test/recipes/70-test_wpacket.t . ok
../../openssl/test/recipes/80-test_ca.t .. ok
../../openssl/test/recipes/80-test_cipherbytes.t . ok
../../openssl/test/recipes/80-test_cipherlist.t .. ok
../../openssl/test/recipes/80-test_cms.t . ok
../../openssl/test/recipes/80-test_ct.t .. ok
../../openssl/test/recipes/80-test_dane.t  ok
../../openssl/test/recipes/80-test_dtls.t  ok
../../openssl/test/recipes/80-test_dtls_mtu.t  ok
../../openssl/test/recipes/80-test_dtlsv1listen.t  ok
../../openssl/test/recipes/80-test_ocsp.t  ok
../../openssl/test/recipes/80-test_pkcs12.t .. ok
../../openssl/test/recipes/80-test_ssl_new.t . ok
../../openssl/test/recipes/80-test_ssl_old.t . ok
../../openssl/test/recipes/80-test_ssl_test_ctx.t  ok
../../openssl/test/recipes/80-test_sslcorrupt.t .. ok
../../openssl/test/recipes/80-test_tsa.t . ok
../../o

[openssl-commits] Jenkins build is back to normal : 1_0_2_basic #774

2017-03-11 Thread openssl . sanity
See 

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits