[web] master update

2020-04-23 Thread Matt Caswell
The branch master has been updated
   via  8b89d4009750e75be8cc9ced269234c34290a775 (commit)
  from  fb2c1de49360a78822fcd5c5a2ad0a1f0fd94220 (commit)


- Log -
commit 8b89d4009750e75be8cc9ced269234c34290a775
Author: Matt Caswell 
Date:   Thu Apr 23 14:30:29 2020 +0100

Update newsflash for 3.0 alpha 1 release

Reviewed-by: Richard Levitte 

---

Summary of changes:
 news/newsflash.txt | 1 +
 1 file changed, 1 insertion(+)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 43ad814..38bf5e2 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+23-Apr-2020: Alpha 1 of OpenSSL 3.0 is now available: please download and test 
it
 21-Apr-2020: Security Advisory: one 
high severity fix in SSL_check_chain()
 21-Apr-2020: OpenSSL 1.1.1g is now available, including a security fix
 31-Mar-2020: OpenSSL 1.1.1f is now available, including bug fixes


[web] master update

2020-04-21 Thread Matt Caswell
The branch master has been updated
   via  fb2c1de49360a78822fcd5c5a2ad0a1f0fd94220 (commit)
  from  7432cc2319a591467575763dcbd5a1c968bf595e (commit)


- Log -
commit fb2c1de49360a78822fcd5c5a2ad0a1f0fd94220
Author: Matt Caswell 
Date:   Tue Apr 21 15:25:49 2020 +0100

Add a link to the Security Advisory into newsflash

Reviewed-by: Mark J. Cox 
(Merged from https://github.com/openssl/web/pull/172)

---

Summary of changes:
 news/newsflash.txt | 1 +
 1 file changed, 1 insertion(+)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 23da77d..43ad814 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+21-Apr-2020: Security Advisory: one 
high severity fix in SSL_check_chain()
 21-Apr-2020: OpenSSL 1.1.1g is now available, including a security fix
 31-Mar-2020: OpenSSL 1.1.1f is now available, including bug fixes
 17-Mar-2020: OpenSSL 1.1.1e is now available, including bug and security fixes


[web] master update

2020-04-21 Thread Matt Caswell
The branch master has been updated
   via  7432cc2319a591467575763dcbd5a1c968bf595e (commit)
  from  0ad7d3cbd190744b43db3517d8470b3bc5a09b20 (commit)


- Log -
commit 7432cc2319a591467575763dcbd5a1c968bf595e
Author: Matt Caswell 
Date:   Tue Apr 21 12:08:12 2020 +0100

Updates for 1.1.1g release

Reviewed-by: Richard Levitte 

---

Summary of changes:
 news/newsflash.txt   |  1 +
 news/secadv/20200421.txt | 48 
 news/vulnerabilities.xml | 25 -
 3 files changed, 73 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20200421.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 6e96930..23da77d 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+21-Apr-2020: OpenSSL 1.1.1g is now available, including a security fix
 31-Mar-2020: OpenSSL 1.1.1f is now available, including bug fixes
 17-Mar-2020: OpenSSL 1.1.1e is now available, including bug and security fixes
 17-Feb-2020: New Blog post: https://www.openssl.org/blog/blog/2020/02/17/QUIC-and-OpenSSL/";>QUIC and 
OpenSSL
diff --git a/news/secadv/20200421.txt b/news/secadv/20200421.txt
new file mode 100644
index 000..fe46b3f
--- /dev/null
+++ b/news/secadv/20200421.txt
@@ -0,0 +1,48 @@
+OpenSSL Security Advisory [21 April 2020]
+=
+
+Segmentation fault in SSL_check_chain (CVE-2020-1967)
+=
+
+Severity: High
+
+Server or client applications that call the SSL_check_chain() function during 
or
+after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a
+result of incorrect handling of the "signature_algorithms_cert" TLS extension.
+The crash occurs if an invalid or unrecognised signature algorithm is received
+from the peer. This could be exploited by a malicious peer in a Denial of
+Service attack.
+
+OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue.  This
+issue did not affect OpenSSL versions prior to 1.1.1d.
+
+Affected OpenSSL 1.1.1 users should upgrade to 1.1.1g
+
+This issue was found by Bernd Edlinger and reported to OpenSSL on 7th April
+2020. It was found using the new static analysis pass being implemented in GCC,
+-fanalyzer. Additional analysis was performed by Matt Caswell and Benjamin
+Kaduk.
+
+Note
+=
+
+This issue did not affect OpenSSL 1.0.2 however these versions are out of
+support and no longer receiving public updates. Extended support is available
+for premium support customers: https://www.openssl.org/support/contracts.html
+
+This issue did not affect OpenSSL 1.1.0 however these versions are out of
+support and no longer receiving updates.
+
+Users of these versions should upgrade to OpenSSL 1.1.1.
+
+References
+==
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20200421.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 08897ed..697c3c9 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,30 @@
 
 
-
+
+  
+
+
+
+
+
+
+  
+
+NULL pointer dereference
+Segmentation fault in SSL_check_chain
+
+  Server or client applications that call the SSL_check_chain() function 
during or
+  after a TLS 1.3 handshake may crash due to a NULL pointer dereference as 
a
+  result of incorrect handling of the "signature_algorithms_cert" TLS 
extension.
+  The crash occurs if an invalid or unrecognised signature algorithm is 
received
+  from the peer. This could be exploited by a malicious peer in a Denial of
+  Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected 
by this issue.  This
+  issue did not affect OpenSSL versions prior to 1.1.1d.
+
+
+
+  
   
 
 


[web] master update

2020-04-13 Thread Matt Caswell
The branch master has been updated
   via  0ad7d3cbd190744b43db3517d8470b3bc5a09b20 (commit)
  from  edaff9123a6cb70d686b93455572f9cf313563d5 (commit)


- Log -
commit 0ad7d3cbd190744b43db3517d8470b3bc5a09b20
Author: Matt Caswell 
Date:   Sat Apr 11 19:34:21 2020 +0100

Don't die if we only have one tarball

mk-latest incorrectly dies if there is only one tarball. The value of
$#tarballs is 0 if there is 1 tarball.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/170)

---

Summary of changes:
 bin/mk-latest | 1 -
 1 file changed, 1 deletion(-)

diff --git a/bin/mk-latest b/bin/mk-latest
index 37423cd..aa4432a 100755
--- a/bin/mk-latest
+++ b/bin/mk-latest
@@ -9,7 +9,6 @@ chdir $SRCDIR || die "Can't chdir $SRCDIR, $!";
 my @tarballs =
sort grep /openssl-\d+\.\d+\.\d+[a-z]*\.tar\.gz$/,
glob("openssl-*.tar.gz");
-die "No tgz files found in $SRCDIR?\n" if $#tarballs < 1;
 
 my %series = ();
 foreach(@tarballs) {


[web] master update

2020-04-11 Thread Matt Caswell
The branch master has been updated
   via  edaff9123a6cb70d686b93455572f9cf313563d5 (commit)
  from  37de7802c8761a93ce77322f3e840240d458a5bc (commit)


- Log -
commit edaff9123a6cb70d686b93455572f9cf313563d5
Author: Benjamin Kaduk 
Date:   Thu Mar 12 13:48:19 2020 -0700

Add FAQ entry for "server sends HTTP headers in a loop"

Older versions of a few commercial HTTPS servers don't handle
extended-master-secret and/or encrypt-then-mac very well, but we end up
getting asked about this weird behavior that shows up when people
upgrade to OpenSSL 1.1.0 clients.

Text largely taken from the discussion at
https://github.com/openssl/openssl/issues/9360 .

Reviewed-by: Tomas Mraz 
Reviewed-by: Matthias St. Pierre 
Reviewed-by: Mark J. Cox 
Reviewed-by: Paul Dale 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/157)

---

Summary of changes:
 docs/faq-2-user.txt | 15 +++
 1 file changed, 15 insertions(+)

diff --git a/docs/faq-2-user.txt b/docs/faq-2-user.txt
index 74126ab..3bc8ff7 100644
--- a/docs/faq-2-user.txt
+++ b/docs/faq-2-user.txt
@@ -213,3 +213,18 @@
 this increases the size of the default ClientHello message to more than
 255 bytes in length. Some software cannot handle this and hangs.
 
+*   Some secure servers emit an infinite loop of HTTP headers with an OpenSSL
+1.1.0 client, is this a bug?
+
+OpenSSL 1.1.0 introduced support for several new TLS extensions, including
+encrypt-then-mac and extended-master-secret, both of which provide
+significant security improvements.  Unfortunately, some deployed TLS
+servers are severely broken and do not implement extensibility in a
+standards-compliant manner; these servers may exhibit strange behavior
+such as repeating the HTTP headers in a loop after receiving a ClientHello
+that includes such TLS extensions unknown to them.  While these new TLS
+extensions provide significant security benefits to clients and are
+accordingly enabled by default in modern TLS clients, if bringing the
+server into compliance is not possible, the extension(s) in question can
+be disabled on a per-connection basis when talking to the buggy server, by
+using SSL_set_options(3).


[web] master update

2020-03-31 Thread Matt Caswell
The branch master has been updated
   via  37de7802c8761a93ce77322f3e840240d458a5bc (commit)
  from  4b0220368e888aab29972537aff8602a45b724e9 (commit)


- Log -
commit 37de7802c8761a93ce77322f3e840240d458a5bc
Author: Matt Caswell 
Date:   Tue Mar 31 13:38:54 2020 +0100

Update newsflash.txt for new release

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/167)

---

Summary of changes:
 news/newsflash.txt | 1 +
 1 file changed, 1 insertion(+)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index b07108b..6e96930 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+31-Mar-2020: OpenSSL 1.1.1f is now available, including bug fixes
 17-Mar-2020: OpenSSL 1.1.1e is now available, including bug and security fixes
 17-Feb-2020: New Blog post: https://www.openssl.org/blog/blog/2020/02/17/QUIC-and-OpenSSL/";>QUIC and 
OpenSSL
 20-Dec-2019: OpenSSL 1.0.2u is now available, including security fixes


[web] master update

2020-03-31 Thread Richard Levitte
The branch master has been updated
   via  4b0220368e888aab29972537aff8602a45b724e9 (commit)
  from  e06c12c5f7222ba0a7fc7982bf8e4b8f696d0222 (commit)


- Log -
commit 4b0220368e888aab29972537aff8602a45b724e9
Author: Richard Levitte 
Date:   Tue Mar 31 11:24:47 2020 +0200

Fix 'make relupd'

The release updating targets relied on the files CHANGES and NEWS.
With OpenSSL 3.0, those have changed name to CHANGES.md and NEWS.md,
so an adjustment is needed.

Experience shows that we get the best output with a 'commonmark'
pandoc reader, and a little bit of post processing the output.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/166)

---

Summary of changes:
 Makefile   | 28 +++-
 bin/from-tt| 33 ++---
 bin/post-process-html5 | 18 ++
 3 files changed, 59 insertions(+), 20 deletions(-)
 create mode 100755 bin/post-process-html5

diff --git a/Makefile b/Makefile
index df2d75e..d31a473 100644
--- a/Makefile
+++ b/Makefile
@@ -161,9 +161,10 @@ docs/fips.inc: $(wildcard docs/fips/*) bin/mk-filelist
@rm -f $@
./bin/mk-filelist docs/fips fips/ '*' >$@
 
-news/changelog.inc: news/changelog.txt bin/mk-changelog
+news/changelog.inc: news/changelog.md bin/mk-changelog
@rm -f $@
-   ./bin/mk-changelog $@
+   (echo 'Table of contents'; sed -e '1,/^OpenSSL Releases$$/d' < $<) \
+   | pandoc -t html5 -f commonmark | ./bin/post-process-html5 >$@
 news/changelog.html: news/changelog.html.tt news/changelog.inc
@rm -f $@
./bin/from-tt 'releases=$(SERIES)' $<
@@ -175,41 +176,42 @@ news/changelog.html: $(foreach S,$(SERIES),news/cl$(subst 
.,,$(S)).txt)
 # mknews_changelogtxt creates a target and ruleset for any changelog text
 # file depending on the CHANGES file from the target release.
 #
-# $(1) = output file, $(2) = source directory in CHECKOUTS
+# $(1) = output file, $(2) = CHANGES files, relative to CHECKOUTS
 define mknews_changelogtxt
-news/$(1): $(CHECKOUTS)/$(2)/CHANGES
+news/$(1): $(CHECKOUTS)/$(2)
@rm -f $$@
cp $$? $$@
 endef
 
 # Create the target 'news/changelog.txt', taking the source from
-# $(CHECKOUTS)/openssl/CHANGES
-$(eval $(call mknews_changelogtxt,changelog.txt,openssl))
+# $(CHECKOUTS)/openssl/CHANGES.md
+$(eval $(call mknews_changelogtxt,changelog.md,openssl/CHANGES.md))
 
 # Create the targets 'news/clxyz.txt' for all current releases, taking the
 # source from $(CHECKOUTS)/openssl-x.y.z-stable/CHANGES
 $(foreach S,$(SERIES),\
-$(eval $(call mknews_changelogtxt,cl$(subst .,,$(S)).txt,openssl-$(S)-stable)))
+$(eval $(call mknews_changelogtxt,cl$(subst 
.,,$(S)).txt,openssl-$(S)-stable/CHANGES)))
 
 # mknews_noteshtml creates two targets and rulesets for creating notes from
 # the NEWS file for each release.  One target is to create a wrapping HTML
 # file from a template, the other is to create the inclusion file with the
 # actual text.
 #
-# $(1) = release version
+# $(1) = release version, $(2) = NEWS file, relative to CHECKOUTS
 define mknews_noteshtml
 news/openssl-$(1)-notes.html: news/openssl-notes.html.tt
@rm -f $$@
-   ./bin/from-tt -d news release='$(1)' < $$< > $$@
-news/openssl-$(1)-notes.inc: $(CHECKOUTS)/openssl-$(1)-stable/NEWS bin/mk-notes
+   ./bin/from-tt -d news -i $$< -o $$@ release='$(1)'
+news/openssl-$(1)-notes.inc: $(CHECKOUTS)/$(2) bin/mk-notes
@rm -f $$@
-   ./bin/mk-notes $(1) < $(CHECKOUTS)/openssl-$(1)-stable/NEWS > $$@
+   ./bin/mk-notes $(1) < $(CHECKOUTS)/$(2) > $$@
 endef
 
 # Create the targets 'news/openssl-x.y.z-notes.html' and
 # 'news/openssl-x.y.z-notes.inc' for each release number x.y.z, taking
-# the source from $(CHECKOUTS)/openssl-$(1)-stable/NEWS
-$(foreach S,$(SERIES),$(eval $(call mknews_noteshtml,$(S
+# the source from the news file given as second argument.
+$(foreach S,$(SERIES),\
+$(eval $(call mknews_noteshtml,$(S),openssl-$(S)-stable/NEWS)))
 
 news/newsflash.inc: news/newsflash.txt
sed <$? >$@ \
diff --git a/bin/from-tt b/bin/from-tt
index e3ddf79..b5018b6 100755
--- a/bin/from-tt
+++ b/bin/from-tt
@@ -4,24 +4,31 @@ HERE=$(cd $(dirname $0); pwd)
 THIS=$(basename $0)
 
 dir=
+input=
+output=
 
-shortopts='d:h'
-longopts='dir:,help'
+shortopts='d:i:o:h'
+longopts='dir:,input:,output:,help'
 usage="\
 Usage 1: $THIS [ options ] [ key=value ... ] < file.tt > file
 Usage 2: $THIS [ options ] [ key=value ... ] file.tt ...
 
 Options:
 -d, --dir=DIR   Directory of the output file
+-i, --input=FILEInput file (usage 1 only)
+-o, --output=FILE   Output file (usage 1 only)
 -h, --help  Output this usage and do nothing else
 
-In usage 1, the template is read from standard input and 

[web] master update

2020-03-20 Thread Mark J . Cox
The branch master has been updated
   via  e06c12c5f7222ba0a7fc7982bf8e4b8f696d0222 (commit)
   via  9d0d2ec0fd21f46e4503282a9b9f1739869accfb (commit)
  from  9801203e145577c03541cf147946d107d9ae74c5 (commit)


- Log -
commit e06c12c5f7222ba0a7fc7982bf8e4b8f696d0222
Author: Mark J. Cox 
Date:   Fri Mar 20 09:02:32 2020 +

Simple fix for #159 if we can't open the schema tell the user how to work 
around it.  We
actually need to do that because some older? Ubuntu systems were having 
problems with the
CA cert from github

commit 9d0d2ec0fd21f46e4503282a9b9f1739869accfb
Author: Mark J. Cox 
Date:   Thu Mar 19 14:43:19 2020 +

Mitre have been stripping whitespace after commas on submitted entries, so 
let's
do that by default.  But they are keeping the whitespace after :.

fixes #160

---

Summary of changes:
 bin/vulnxml2json.py | 8 ++--
 1 file changed, 6 insertions(+), 2 deletions(-)

diff --git a/bin/vulnxml2json.py b/bin/vulnxml2json.py
index cffa29f..3b1dcbb 100755
--- a/bin/vulnxml2json.py
+++ b/bin/vulnxml2json.py
@@ -39,7 +39,11 @@ if not options.input:
exit();
 
 if options.schema:
-   response = urllib.urlopen(options.schema)
+   try:
+  response = urllib.urlopen(options.schema)
+   except:
+  print "Problem opening schema: try downloading it manually then specify 
it using --schema option: %s" % options.schema
+  exit()
schema_doc = json.loads(response.read())
 
 cvej = list()
@@ -146,7 +150,7 @@ for issue in cvej:
continue
 
 f = codecs.open(options.outputdir+"/"+fn, 'w', 'utf-8')
-f.write(json.dumps(issue, sort_keys=True, indent=4))
+f.write(json.dumps(issue, sort_keys=True, indent=4, separators=(',',': ')))
 print "wrote %s" %(options.outputdir+"/"+fn)
 f.close()
 


[web] master update

2020-03-19 Thread Mark J . Cox
The branch master has been updated
   via  9801203e145577c03541cf147946d107d9ae74c5 (commit)
   via  036255af6ba639dd58607c48b3099e13f41ad5bd (commit)
  from  b0b2c557bf523fc71a3f0393fb77fcd84b68c7a1 (commit)


- Log -
commit 9801203e145577c03541cf147946d107d9ae74c5
Author: Mark J. Cox 
Date:   Thu Mar 19 14:21:28 2020 +

Update security.txt to a clearsigned version with non-expired key matching 
the latest draft-foudil-securitytxt-09
fixes #145

commit 036255af6ba639dd58607c48b3099e13f41ad5bd
Author: Mark J. Cox 
Date:   Wed Mar 18 11:03:03 2020 +

typo
fixes: #86

---

Summary of changes:
 .well-known/security.txt | 24 +++-
 .well-known/security.txt.asc | 16 
 docs/faq-5-misc.txt  |  2 +-
 3 files changed, 24 insertions(+), 18 deletions(-)
 delete mode 100644 .well-known/security.txt.asc

diff --git a/.well-known/security.txt b/.well-known/security.txt
index d56daa5..6da9fbb 100644
--- a/.well-known/security.txt
+++ b/.well-known/security.txt
@@ -1,5 +1,27 @@
+-BEGIN PGP SIGNED MESSAGE-
+Hash: SHA256
+
+Canonical: https://www.openssl.org/.well-known/security.txt
 Contact: openssl-secur...@openssl.org
+Contact: https://www.openssl.org/community/#securityreports
 Encryption: https://www.openssl.org/news/openssl-security.asc
 Acknowledgement: https://www.openssl.org/news/vulnerabilities.html
 Policy: https://www.openssl.org/policies/secpolicy.html
-Signature: https://www.openssl.org/.well-known/security.txt.asc
+
+-BEGIN PGP SIGNATURE-
+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+=w4IR
+-END PGP SIGNATURE-
diff --git a/.well-known/security.txt.asc b/.well-known/security.txt.asc
deleted file mode 100644
index 3fa82a1..000
--- a/.well-known/security.txt.asc
+++ /dev/null
@@ -1,16 +0,0 @@
--BEGIN PGP SIGNATURE-
-
-iQIzBAABCAAdFiEE78CkZ9YTy4PH7W0w2JTizos9efUFAlpNnfIACgkQ2JTizos9
-efXBWg//YIzGg2gDBOxsL9TPw2JtCR7SiwgEyHuMKpiHZxhCTfBVlYC0PBJbIvzp
-jis9T4GQhmTkKswFzMjSnjLcIWPwUBsuRoZ6J25kAxOckNIa3Cj6HslU+nhxjKzU
-UWtSElJKm4TDoTljcl78Jh12xqB90QJU7m9nHyCphaIuCgAugVDfdJxbXS2PsEOP
-wClu+dq94BlyswC4jsQSvA7JcEq9JocooD/BYbcSRYK3MCnlu1WtT9JCYap02D5k
-lgkGJGNo/Vbi0IglM4WhLI83EWyEOPpEPkT63VeW2dyMFQww8FN/icT2W0geHvac
-VfBIKn/Eb357j1pQEufwhLmOb4Wf2EmGGV4uMnzxXk4DCx0PUDXCn8da+/2iBDvS
-OUiQ7ziVZdoW/rbA2S9mSIky6HaFQWasVYDCB95lpY20Nr5femLBUpDhp/vTskXJ
-dGwITxUxWhH32TGIYMMLFwDLpGb/ej26S+FunVn6gceqnMMQ8MVqTBfO1/3tQKjK
-/OJL6+sLWaJMxJK8skLXOUvIwGmeLGArRoITl1lzpzwu09hfTEy19F23DVlwvJ/S
-OOYNrJKWhfZwquU3lTZgNxLozGBFKuKvPcFvx25wIuwWnt7AGcfZNTIQb29WMoF2
-bBHJfCYwea2VPuGF++KeFNfOGlXGNK9CX/aKjkwwJK+Fws60oTQ=
-=W3nD
--END PGP SIGNATURE-
diff --git a/docs/faq-5-misc.txt b/docs/faq-5-misc.txt
index f06fd34..611f23a 100644
--- a/docs/faq-5-misc.txt
+++ b/docs/faq-5-misc.txt
@@ -48,7 +48,7 @@
 
 *   Where can I get a compiled version of OpenSSL?
 
-You can finder pointers to binary distributions in
+You can find pointers to binary distributions in
 https://www.openssl.org/community/binaries.html.
 
 Some applications that use OpenSSL are distributed in binary form.


[web] master update

2020-03-17 Thread Matt Caswell
The branch master has been updated
   via  b0b2c557bf523fc71a3f0393fb77fcd84b68c7a1 (commit)
  from  2e05fdcbb7391972e356b5ea43174e346b9ceca1 (commit)


- Log -
commit b0b2c557bf523fc71a3f0393fb77fcd84b68c7a1
Author: Matt Caswell 
Date:   Tue Mar 17 13:31:21 2020 +

Update website for new release

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/158)

---

Summary of changes:
 news/newsflash.txt   | 1 +
 news/vulnerabilities.xml | 2 +-
 2 files changed, 2 insertions(+), 1 deletion(-)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 3ca8706..b07108b 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+17-Mar-2020: OpenSSL 1.1.1e is now available, including bug and security fixes
 17-Feb-2020: New Blog post: https://www.openssl.org/blog/blog/2020/02/17/QUIC-and-OpenSSL/";>QUIC and 
OpenSSL
 20-Dec-2019: OpenSSL 1.0.2u is now available, including security fixes
 06-Dec-2019: Security Advisory: one 
low severity fix
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 60bfd33..08897ed 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -37,7 +37,7 @@
 
 
 
-
+
   
 
 


[web] master update

2020-02-17 Thread Matt Caswell
The branch master has been updated
   via  2e05fdcbb7391972e356b5ea43174e346b9ceca1 (commit)
  from  b0f7ee3640633f1be6e7de5962192ddcf44f7d25 (commit)


- Log -
commit 2e05fdcbb7391972e356b5ea43174e346b9ceca1
Author: Matt Caswell 
Date:   Mon Feb 17 12:22:56 2020 +

Add link to the QUIC blog post

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/156)

---

Summary of changes:
 news/newsflash.txt | 1 +
 1 file changed, 1 insertion(+)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 454b208..3ca8706 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+17-Feb-2020: New Blog post: https://www.openssl.org/blog/blog/2020/02/17/QUIC-and-OpenSSL/";>QUIC and 
OpenSSL
 20-Dec-2019: OpenSSL 1.0.2u is now available, including security fixes
 06-Dec-2019: Security Advisory: one 
low severity fix
 07-Nov-2019: New Blog post: https://www.openssl.org/blog/blog/2019/11/07/3.0-update/";>Update on 3.0 
Development, FIPS and 1.0.2 EOL


[web] master update

2020-01-22 Thread Matt Caswell
The branch master has been updated
   via  b0f7ee3640633f1be6e7de5962192ddcf44f7d25 (commit)
  from  2bc6b462e2a286361336a2c6bbab2c629dc38c6e (commit)


- Log -
commit b0f7ee3640633f1be6e7de5962192ddcf44f7d25
Author: Matt Caswell 
Date:   Tue Jan 7 16:47:23 2020 +

Update the Release Strategy for 3.0

Schedule some alpah and beta releases for 3.0

Reviewed-by: Richard Levitte 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/web/pull/154)

---

Summary of changes:
 policies/releasestrat.html | 28 +---
 1 file changed, 21 insertions(+), 7 deletions(-)

diff --git a/policies/releasestrat.html b/policies/releasestrat.html
index b0d3686..2fd9ad9 100644
--- a/policies/releasestrat.html
+++ b/policies/releasestrat.html
@@ -13,7 +13,7 @@
  Release Strategy
  
First issued 23rd December 2014
-   Last modified 25th February 2019
+   Last modified 7th January 2020
  

 
@@ -45,7 +45,7 @@
  
 
  
-   The current 1.1.1 and 1.0.2 versioning scheme remains unchanged:
+   The current 1.1.1 versioning scheme remains unchanged:
 

  As of release 1.0.0 the OpenSSL versioning scheme was improved
@@ -72,11 +72,10 @@
  
The next version of OpenSSL will be 3.0.0.
Version 1.1.1 will be supported until 2023-09-11 (LTS).
-   Version 1.1.0 will be supported until 2019-09-11.
-   Version 1.0.2 will be supported until 2019-12-31 (LTS).
-   Version 1.0.1 is no longer supported.
-   Version 1.0.0 is no longer supported.
-   Version 0.9.8 is no longer supported.
+   Version 1.0.2 is no longer supported. Extended support
+   for 1.0.2 to gain access to security fixes for that version is
+   available.
+   Versions 1.1.0, 1.0.1, 1.0.0 and 0.9.8 are no longer 
supported.
  
 
  We may designate a release as a Long Term Support (LTS)
@@ -108,6 +107,21 @@
Bug fixes only
  
 
+ The following alpha and beta releases for OpenSSL 3.0 are currently
+ scheduled. Note that these dates are subject to change and alpha or 
beta
+ releases may be inserted or removed as required:
+ 
+   alpha1, 2020-03-31: Basic functionality plus basic FIPS 
module
+   alpha2, 2020-04-21: Complete external provider support 
(serialization,
+   support for new algs, support for providers which only include
+   operations in a class)
+   alpha3, 2020-05-21: Aiming to test the API completeness before 
beta1
+   freezes it)
+   beta1, 2020-06-02: Code complete (API stable, feature 
freeze)
+   betaN: Other beta releases TBD
+   Final: 2020 early Q4
+ 
+  
  
For any major or minor release, we have defined the following
release criteria:


[web] master update

2020-01-07 Thread Matt Caswell
The branch master has been updated
   via  2bc6b462e2a286361336a2c6bbab2c629dc38c6e (commit)
  from  76f3aa014bf5bf3cf533cf9a0b51951dbd64e8a5 (commit)


- Log -
commit 2bc6b462e2a286361336a2c6bbab2c629dc38c6e
Author: Matt Caswell 
Date:   Mon Jan 6 16:22:17 2020 +

Update the website to remove a number of 1.0.2 references

Reviewed-by: Tim Hudson 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/153)

---

Summary of changes:
 Makefile | 28 
 bin/mk-manmap| 27 ---
 inc/mansidebar.shtml |  1 -
 source/index.html| 13 +
 4 files changed, 9 insertions(+), 60 deletions(-)
 delete mode 100755 bin/mk-manmap

diff --git a/Makefile b/Makefile
index 98ddd9f..df2d75e 100644
--- a/Makefile
+++ b/Makefile
@@ -17,14 +17,10 @@ RELEASEDIR = /var/www/openssl/source
 ##
 
 ##  Current series
-SERIES=1.1.1 1.0.2
+SERIES=1.1.1
 ##  Older series.  The second type is for source listings
-OLDSERIES=1.1.0 1.0.1 1.0.0 0.9.8 0.9.7 0.9.6
-OLDSERIES2=1.1.0 1.0.1 1.0.0 0.9.x
-##  Current series with newer and older manpage layout
-##  (when the number of old man layout releases drop to none, this goes away)
-NEWMANSERIES=1.1.1
-OLDMANSERIES=1.0.2
+OLDSERIES=1.1.0 1.0.2 1.0.1 1.0.0 0.9.8 0.9.7 0.9.6
+OLDSERIES2=1.1.0 1.0.2 1.0.1 1.0.0 0.9.x
 
 # All simple generated files.
 SIMPLE = newsflash.inc sitemap.txt \
@@ -113,17 +109,6 @@ manpages-$(2):
  < docs/sub-index.html.tt > docs/man$(2)/index.html
 endef
 
-# makeoldmanmap creates a .htaccess for the man-pages of a given OpenSSL
-# release.  This is only needed for OpenSSL releases where the subdirectories
-# of doc/ are apps/, crypto/ and ssl/.  OpenSSL 1.1.1 and later have a
-# different structure and don't need this: man1/, man3/, man5/ and man7/.
-#
-# $(1) = release version
-define makeoldmanmap
-manmap-$(1):
-   ./bin/mk-manmap docs/man$(1) > docs/man$(1)/.htaccess
-endef
-
 # Now that we have the generating macros in place, let's use them!
 #
 # Start off with creating the 'manpages-master' target, taking the
@@ -134,13 +119,8 @@ $(eval $(call makemanpages,openssl,master))
 # source from $(CHECKOUTS)/openssl-x.y.z-stable/doc
 $(foreach S,$(SERIES),$(eval $(call makemanpages,openssl-$(S)-stable,$(S
 
-# Finally, create 'manmap-x.y.z' for all releases with the old doc/
-# structure.
-$(foreach S,$(OLDMANSERIES),$(eval $(call makeoldmanmap,$(S
-
 manmaster: manpages-master
-manpages: $(foreach S,$(NEWMANSERIES),manpages-$(S)) \
- $(foreach S,$(OLDMANSERIES),manpages-$(S) manmap-$(S))
+manpages: $(foreach S,$(SERIES),manpages-$(S))
 
 mancross:
./bin/mk-mancross master $(SERIES)
diff --git a/bin/mk-manmap b/bin/mk-manmap
deleted file mode 100755
index 7bde661..000
--- a/bin/mk-manmap
+++ /dev/null
@@ -1,27 +0,0 @@
-#! /bin/sh
-# $1 is the top of the manual page tree to look through
-
-dir=$1
-cd $dir
-
-for m in `find . -name '*.html'`; do
-origsubdir=`grep -F '||' -e 's| ||g'`
-subdir=`grep -F '||' 
-e 's| ||g'`
-# If no subdir information is present, this is not a rendered manpage,
-# but something else, like index.html
-if [ "$origsubdir$subdir" = "" ]; then
-   continue
-fi
-manfile=`echo $m | sed -e 's|\./||'`
-origmanfile=`echo $manfile | sed -e "s|^$subdir|$origsubdir|"`
-case ${origsubdir}:${subdir} in
-   apps:man1 | crypto:man3 | ssl:man3 ) ;;
-   * ) echo Redirect permanent /$dir/$origmanfile /$dir/$manfile ;;
-esac
-done
-
-cat <
   master
   1.1.1
-  1.0.2
 
   
 
diff --git a/source/index.html b/source/index.html
index 122336a..b617cfe 100644
--- a/source/index.html
+++ b/source/index.html
@@ -32,14 +32,11 @@
 
Note: The latest stable version is the 1.1.1 series. 
This is
 also our Long Term Support (LTS) version, supported until 11th 
September
-2023. Our previous LTS version (1.0.2 series) will continue to be
-supported until 31st December 2019 (security fixes only during the last
-year of support). All users of 1.0.2 are encouraged to upgrade to 1.1.1
-as soon as possible. Extended support for 1.0.2 to gain access to
-security fixes beyond 31st December 2019 is
-available.
-The 0.9.8, 1.0.0, 1.0.1 and 1.1.0 versions are now out of support and
-should not be used.
+2023. All other versions (including 1.1.0, 1.0.2, 1.0.0 and 0.9.8) are
+now out of support and should not be used. Users of these older 
versions
+are encourage to upgrade to 1.1.1 as soon as possible. Extended support
+for 1.0.2 to gain access to security fixes for that version is
+available.
 
 The OpenSSL FIPS Object Module 2.0 (FOM) is also available for
 download. It is

[web] master update

2020-01-03 Thread Matt Caswell
The branch master has been updated
   via  76f3aa014bf5bf3cf533cf9a0b51951dbd64e8a5 (commit)
  from  f26e81f977a239116ab29fab62b4ed875d9099bc (commit)


- Log -
commit 76f3aa014bf5bf3cf533cf9a0b51951dbd64e8a5
Author: Matt Caswell 
Date:   Fri Jan 3 14:57:25 2020 +

Create an OTC page on the website

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/152)

---

Summary of changes:
 .gitignore  |  1 +
 Makefile|  6 --
 community/index.html|  2 ++
 community/otc.html  | 42 ++
 community/sidebar.shtml |  3 +++
 5 files changed, 52 insertions(+), 2 deletions(-)
 create mode 100644 community/otc.html

diff --git a/.gitignore b/.gitignore
index b307d34..83f4641 100644
--- a/.gitignore
+++ b/.gitignore
@@ -5,6 +5,7 @@ blog
 sitemap.txt
 community/committers.inc
 community/omc-alumni.inc
+community/otc.inc
 community/omc.inc
 docs/OpenSSL300Design.html
 docs/OpenSSLStrategicArchitecture.html
diff --git a/Makefile b/Makefile
index 82ffca8..98ddd9f 100644
--- a/Makefile
+++ b/Makefile
@@ -29,7 +29,7 @@ OLDMANSERIES=1.0.2
 # All simple generated files.
 SIMPLE = newsflash.inc sitemap.txt \
 community/committers.inc \
-community/omc.inc community/omc-alumni.inc \
+community/otc.inc community/omc.inc community/omc-alumni.inc \
 docs/faq.inc docs/fips.inc \
 docs/OpenSSLStrategicArchitecture.html \
 docs/OpenSSL300Design.html \
@@ -153,7 +153,7 @@ docs/manpages.html: docs/manpages.html.tt
 ##
 ##  $(SIMPLE) -- SIMPLE GENERATED FILES
 ##
-.PHONY: sitemap community/committers.inc community/omc.inc 
community/omc-alumni.inc
+.PHONY: sitemap community/committers.inc community/otc.inc community/omc.inc 
community/omc-alumni.inc
 newsflash.inc: news/newsflash.inc
@rm -f $@
head -7 $? >$@
@@ -167,6 +167,8 @@ community/committers.inc:
./bin/mk-committers $@
@rm -f Members
 
+community/otc.inc:
+   ./bin/mk-omc -n -t 'OTC Members' otc otc-inactive > $@
 community/omc.inc:
./bin/mk-omc -n -e -l -p -t 'OMC Members' omc omc-inactive > $@
 community/omc-alumni.inc:
diff --git a/community/index.html b/community/index.html
index e204c4b..72587ad 100644
--- a/community/index.html
+++ b/community/index.html
@@ -16,6 +16,8 @@
 team of committers.
 The overall project is run by the
 OpenSSL Management Committee.
+Technical decisions are made by the
+OpenSSL Technical Committee.
 We operate under a set of
 project bylaws
 and ask everyone to follow our
diff --git a/community/otc.html b/community/otc.html
new file mode 100644
index 000..19f9f54
--- /dev/null
+++ b/community/otc.html
@@ -0,0 +1,42 @@
+
+
+
+
+
+
+
+
+  
+
+  
+OpenSSL Technical Committee
+
+   The
+  OpenSSL Technical 
Committee
+  represents the official technical voice of the project. All
+  OTC decisions are taken on the basis of a vote.
+  
+  The current OTC consists of (in alphabetical order):
+  
+
+  
+
+  Names with an (I) are currently inactive as defined in our
+  bylaws.
+
+
+
+
+  You are here: Home
+  : Community
+  : OTC
+  Sitemap
+
+  
+
+
+  
+
+
+
+
diff --git a/community/sidebar.shtml b/community/sidebar.shtml
index 22d5ca0..1f888d0 100644
--- a/community/sidebar.shtml
+++ b/community/sidebar.shtml
@@ -6,6 +6,9 @@
   
  List of Committers
   
+  
+ OpenSSL Technical Committee
+  
   
  OpenSSL Management Committee
   


[web] master update

2020-01-03 Thread Matt Caswell
The branch master has been updated
   via  f26e81f977a239116ab29fab62b4ed875d9099bc (commit)
  from  23af72984b104ab0407873cd01c885be9635cb81 (commit)


- Log -
commit f26e81f977a239116ab29fab62b4ed875d9099bc
Author: Matt Caswell 
Date:   Thu Nov 21 13:44:27 2019 +

Update policies for OTC changes

Update other policies as necessary to reflect the bylaws changes that
introduced the OTC concept.

Reviewed-by: Paul Dale 
Reviewed-by: Matthias St. Pierre 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/146)

---

Summary of changes:
 policies/committers.html | 64 +++-
 policies/secpolicy.html  |  5 ++--
 policies/sidebar.shtml   |  4 +--
 3 files changed, 34 insertions(+), 39 deletions(-)

diff --git a/policies/committers.html b/policies/committers.html
index 46e2b74..96f1018 100644
--- a/policies/committers.html
+++ b/policies/committers.html
@@ -10,7 +10,7 @@

  

- Guidelines for OpenSSL Committers
+ Policy for OpenSSL Committers

 

@@ -24,8 +24,8 @@
 
   How to become a committer?
   Commit access is granted by the OpenSSL Management Committee
-  (OMC) (see the
-  OpenSSL bylaws).
+  (OMC) typically on the recommendation of the OpenSSL Technical 
Committee (OTC)
+  (see the OpenSSL Bylaws).
 
   We welcome contributors who become domain experts in some
   part of the library (for example, low-level crypto) as well as
@@ -45,42 +45,38 @@
   https://github.com/openssl/openssl/issues";>Github issue 
tracker,
   and our
   mailing lists
-  find impactful ideas to work on. Seek feedback from multiple OMC
-  members to understand the project, and to support your
-  application. Let them know that you'd like to become a committer
-  - they'll nominate you when your code review record demonstrates
-  impact as well as understanding of the codebase and coding style
-  (usually after a few months of activity). The final decision to
-  grant commit access is taken by an OMC vote.
-
-  How to maintain commit status?
-  To maintain commit status, you should stay active in the
-  project. As stated in the project bylaws, if you remain inactive
-  for several months, your commit access will be withdrawn - but
-  you are always welcome back, just ask an OMC member to
-  re-nominate you.
+  find impactful ideas to work on.
+
+  How to maintain committer status?
+  To maintain committer status, you must stay active in the
+  project. Refer to the OpenSSL Bylaws
+  for details.
   In the unlikely and unfortunate event that your actions
   conflict with the project objectives or are otherwise
-  disruptive, commit access may also be revoked by vote of the
-  OMC.
+  disruptive, committer status may also be revoked by the OMC.
 
-  Code reviews
+  Approvals and code reviews
   All submissions must be reviewed and approved by at least two
-  committers, one of whom must also be an OMC member. If the
+  committers, one of whom must also be an OTC member. If the
   author is also a committer then that counts as one of the
   reviews. In other words:
   
-OMC members need one approval from any committer
-Committers need one approval from a committer within the
-OMC
+OTC members need one approval from any committer
+Committers need one approval from an OTC member
 Contributors without commit rights need two approvals,
-including one from the OMC.
+including one from an OTC member.
   
 
-  This process may seem a little heavy, but OpenSSL is a large,
-  complicated codebase, and we think two reviews help prevent
-  security bugs, as well as disseminate knowledge to the growing
-  contributor base.
+  An OMC member may apply an OMC-hold to a submission.
+  An OTC member may apply an OTC-hold to a submission.
+  An OMC-hold may be cleared by being removed by the member
+  that put in place the hold or by a vote of the OMC.
+  An OTC-hold may be cleared by being removed by the member
+  that put in place the hold or by a vote of the OTC.
+
+  Appr

[web] master update

2020-01-03 Thread Mark J . Cox
The branch master has been updated
   via  23af72984b104ab0407873cd01c885be9635cb81 (commit)
   via  d357e46dce040f602bd150afa23c68d80a58abfa (commit)
   via  5ad619db6417b3405b9932e0d514112a60beb875 (commit)
   via  78cdcfd517424f1b95f8d8e195e5cbdd822a631e (commit)
  from  ba98fa477470b023d70a080fad35dd406b573f3f (commit)


- Log -
commit 23af72984b104ab0407873cd01c885be9635cb81
Merge: d357e46 78cdcfd
Author: Mark J. Cox 
Date:   Fri Jan 3 12:13:39 2020 +

Merge pull request #148 from mattcaswell/remove-110-additional

Remove an additional 1.1.0 reference

commit d357e46dce040f602bd150afa23c68d80a58abfa
Merge: ba98fa4 5ad619d
Author: Mark J. Cox 
Date:   Fri Jan 3 12:13:07 2020 +

Merge pull request #151 from iamamoose/eolstatements

Allow a default statement if our page is not for a specific base version

commit 5ad619db6417b3405b9932e0d514112a60beb875
Author: Mark J. Cox 
Date:   Fri Jan 3 11:48:09 2020 +

Allow a default statement if our page is not for a specific base version
also clean up the HTML we closed the p tag in the wrong place.  Add a
statement on all the versions out of support.

commit 78cdcfd517424f1b95f8d8e195e5cbdd822a631e
Author: Matt Caswell 
Date:   Tue Dec 17 14:26:51 2019 +

Remove an additional 1.1.0 reference

We previously removed references to 1.1.0 as a current release. There is
one remaining spot that was missed, so we update that too.

---

Summary of changes:
 bin/mk-cvepage   | 11 ++-
 inc/mansidebar.shtml |  1 -
 news/vulnerabilities.xml |  1 +
 3 files changed, 7 insertions(+), 6 deletions(-)

diff --git a/bin/mk-cvepage b/bin/mk-cvepage
index 8ab..abed8b4 100755
--- a/bin/mk-cvepage
+++ b/bin/mk-cvepage
@@ -138,12 +138,13 @@ for base in allyourbase(dom):
 bases.append( "%s" 
%(base,base))
 preface += "Show issues fixed only in OpenSSL " + ", ".join(bases)
 if options.base:
-preface += ", or all versions"
+preface += ", or all versions"
 preface += "Fixed in OpenSSL %s" %(options.base)
-for statement in dom.getElementsByTagName('statement'):
-if (statement.getAttribute("base") in options.base):
-preface += statement.firstChild.data.strip()
-preface += ""
+else:
+preface += ""
+for statement in dom.getElementsByTagName('statement'):
+if (statement.getAttribute("base") in (options.base or "none")):
+preface += ""+statement.firstChild.data.strip()+""
 if len(allyears)>1: # If only vulns in this year no need for the year table of 
contents
 preface += "Jump to year: " + ", ".join( "%s" %(year,year) for year in allyears)
 preface += ""
diff --git a/inc/mansidebar.shtml b/inc/mansidebar.shtml
index c794b16..5ec8083 100644
--- a/inc/mansidebar.shtml
+++ b/inc/mansidebar.shtml
@@ -5,7 +5,6 @@
 
   master
   1.1.1
-  1.1.0
   1.0.2
 
   
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 0378674..60bfd33 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7336,6 +7336,7 @@ default and not common.
   
 
 
+  Note: All OpenSSL versions before 1.1.1 are out of 
support and no longer receiving updates.  Extended support is available for 
1.0.2 from OpenSSL Software Services for premium support customers.
   OpenSSL 0.9.6 is out of support and no longer 
receiving updates.
   OpenSSL 0.9.7 is out of support and no longer 
receiving updates.
   OpenSSL 0.9.8 is out of support since 1st January 
2016 and no longer receiving updates.


[web] master update

2020-01-03 Thread Mark J . Cox
The branch master has been updated
   via  ba98fa477470b023d70a080fad35dd406b573f3f (commit)
   via  edfd2b0b8980e340b13d288fc373c8ee9b909307 (commit)
  from  9d8e43e70514d403e27663b13d06963c5381603b (commit)


- Log -
commit ba98fa477470b023d70a080fad35dd406b573f3f
Merge: 9d8e43e edfd2b0
Author: Mark J. Cox 
Date:   Fri Jan 3 10:05:39 2020 +

Merge pull request #150 from iamamoose/eolstatements

Update the vulnerability XML to also include some statements about EOL

commit edfd2b0b8980e340b13d288fc373c8ee9b909307
Author: Mark J. Cox 
Date:   Fri Jan 3 09:50:43 2020 +

Update the vulnerability XML to also include some statements about EOL 
versions
that was we can make it clear on the vulnerability page when things are EOL

---

Summary of changes:
 bin/mk-cvepage   | 3 +++
 news/vulnerabilities.xml | 8 
 2 files changed, 11 insertions(+)

diff --git a/bin/mk-cvepage b/bin/mk-cvepage
index 10654b6..8ab 100755
--- a/bin/mk-cvepage
+++ b/bin/mk-cvepage
@@ -140,6 +140,9 @@ preface += "Show issues fixed only in OpenSSL " + ", 
".join(bases)
 if options.base:
 preface += ", or all versions"
 preface += "Fixed in OpenSSL %s" %(options.base)
+for statement in dom.getElementsByTagName('statement'):
+if (statement.getAttribute("base") in options.base):
+preface += statement.firstChild.data.strip()
 preface += ""
 if len(allyears)>1: # If only vulns in this year no need for the year table of 
contents
 preface += "Jump to year: " + ", ".join( "%s" %(year,year) for year in allyears)
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index de81fa1..0378674 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7336,6 +7336,14 @@ default and not common.
   
 
 
+  OpenSSL 0.9.6 is out of support and no longer 
receiving updates.
+  OpenSSL 0.9.7 is out of support and no longer 
receiving updates.
+  OpenSSL 0.9.8 is out of support since 1st January 
2016 and no longer receiving updates.
+  OpenSSL 1.0.0 is out of support since 1st January 
2016 and no longer receiving updates.
+  OpenSSL 1.0.1 is out of support since 1st January 
2017 and no longer receiving updates.
+  OpenSSL 1.0.2 is out of support since 1st January 
2020 and is no longer receiving updates.  Extended support is available from 
OpenSSL Software Services for premium support customers
+  OpenSSL 1.1.0 is out of support since 12th September 
2019 and no longer receiving updates.
+
 
 
 


[web] master update

2019-12-20 Thread Matt Caswell
The branch master has been updated
   via  9d8e43e70514d403e27663b13d06963c5381603b (commit)
  from  d94a44ca1bb6183e692c86a5fe99b4f7bf2f28c0 (commit)


- Log -
commit 9d8e43e70514d403e27663b13d06963c5381603b
Author: Matt Caswell 
Date:   Fri Dec 20 13:21:39 2019 +

Updates for the 1.0.2u release

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/149)

---

Summary of changes:
 news/newsflash.txt   | 1 +
 news/vulnerabilities.xml | 2 +-
 2 files changed, 2 insertions(+), 1 deletion(-)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 0b6d94f..454b208 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+20-Dec-2019: OpenSSL 1.0.2u is now available, including security fixes
 06-Dec-2019: Security Advisory: one 
low severity fix
 07-Nov-2019: New Blog post: https://www.openssl.org/blog/blog/2019/11/07/3.0-update/";>Update on 3.0 
Development, FIPS and 1.0.2 EOL
 10-Sep-2019: Security Advisory: three 
low severity fixes
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 7409a4d..de81fa1 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -40,7 +40,7 @@
 
   
 
-
+
   
 
 Integer overflow bug


[web] master update

2019-12-17 Thread Matt Caswell
The branch master has been updated
   via  d94a44ca1bb6183e692c86a5fe99b4f7bf2f28c0 (commit)
  from  70947eca9c26af584ac69467a6f5fcd1a2fa6b5a (commit)


- Log -
commit d94a44ca1bb6183e692c86a5fe99b4f7bf2f28c0
Author: Matt Caswell 
Date:   Mon Dec 16 11:39:44 2019 +

Drop 1.1.0 as a current release

Don't refer to 1.1.0 as a current release since it is no longer supported.

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/147)

---

Summary of changes:
 Makefile  |  8 
 source/index.html | 11 ++-
 2 files changed, 10 insertions(+), 9 deletions(-)

diff --git a/Makefile b/Makefile
index 49b9845..82ffca8 100644
--- a/Makefile
+++ b/Makefile
@@ -17,14 +17,14 @@ RELEASEDIR = /var/www/openssl/source
 ##
 
 ##  Current series
-SERIES=1.1.1 1.1.0 1.0.2
+SERIES=1.1.1 1.0.2
 ##  Older series.  The second type is for source listings
-OLDSERIES=1.0.1 1.0.0 0.9.8 0.9.7 0.9.6
-OLDSERIES2=1.0.1 1.0.0 0.9.x
+OLDSERIES=1.1.0 1.0.1 1.0.0 0.9.8 0.9.7 0.9.6
+OLDSERIES2=1.1.0 1.0.1 1.0.0 0.9.x
 ##  Current series with newer and older manpage layout
 ##  (when the number of old man layout releases drop to none, this goes away)
 NEWMANSERIES=1.1.1
-OLDMANSERIES=1.1.0 1.0.2
+OLDMANSERIES=1.0.2
 
 # All simple generated files.
 SIMPLE = newsflash.inc sitemap.txt \
diff --git a/source/index.html b/source/index.html
index 605c009..122336a 100644
--- a/source/index.html
+++ b/source/index.html
@@ -34,11 +34,12 @@
 also our Long Term Support (LTS) version, supported until 11th 
September
 2023. Our previous LTS version (1.0.2 series) will continue to be
 supported until 31st December 2019 (security fixes only during the last
-year of support). The 1.1.0 series is currently only receiving security
-fixes and will go out of support on 11th September 2019. All users of
-1.0.2 and 1.1.0 are encouraged to upgrade to 1.1.1 as soon as possible.
-The 0.9.8, 1.0.0 and 1.0.1 versions are now out of support and should
-not be used.
+year of support). All users of 1.0.2 are encouraged to upgrade to 1.1.1
+as soon as possible. Extended support for 1.0.2 to gain access to
+security fixes beyond 31st December 2019 is
+available.
+The 0.9.8, 1.0.0, 1.0.1 and 1.1.0 versions are now out of support and
+should not be used.
 
 The OpenSSL FIPS Object Module 2.0 (FOM) is also available for
 download. It is no longer receiving updates. It must be used in


[web] master update

2019-12-16 Thread Matt Caswell
The branch master has been updated
   via  70947eca9c26af584ac69467a6f5fcd1a2fa6b5a (commit)
  from  420fb543c12b2a4a18aae85315f8eaefefcd1c33 (commit)


- Log -
commit 70947eca9c26af584ac69467a6f5fcd1a2fa6b5a
Author: Matt Caswell 
Date:   Thu Nov 21 13:44:10 2019 +

Update the by-laws to introduce the OTC concept

We split the responsibilities of the current OMC into two different
groups - the OMC and the OTC (OpenSSL Technical Committee). The OMC still
retains its overall management function but the OTC becomes responsible
for technical decision making.

PR reviews will then require approval from an OTC member instead of an
OMC member.

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/143)

---

Summary of changes:
 policies/omc-bylaws.html | 276 ---
 1 file changed, 211 insertions(+), 65 deletions(-)

diff --git a/policies/omc-bylaws.html b/policies/omc-bylaws.html
index af5a2ca..88704a8 100644
--- a/policies/omc-bylaws.html
+++ b/policies/omc-bylaws.html
@@ -13,7 +13,7 @@
   OpenSSL Bylaws
   
 First issued 13th February 2017
-   Last modified 20th December 2017
+Last modified 10th December 2019
   
 
 
@@ -72,10 +72,26 @@
   The OMC:
   
 makes all decisions regarding management and strategic 
direction
-of the project;
-sets and maintains all policies and procedures;
-nominates, elects and removes committers and OMC members as
-required;
+of the project; including:
+
+  business requirements;
+  feature requirements;
+  platform requirements;
+  roadmap requirements and priority;
+  end-of-life decisions;
+  release timing and requirement decisions;
+
+
+maintains the project infrastructure;
+maintains the project website;
+maintains the project code of conduct;
+sets and maintains all project Bylaws;
+sets and maintains all non-technical policies and 
non-technical procedures;
+nominates and elects OMC members as required;
+approves or rejects OTC nominations for committers and OTC 
members;
+adds or removes OMC, OTC, or committers as required;
+adjudicates any objections to OTC decisions;
+adjudicates any objections to any commits to project 
repositories;
 ensures security issues are dealt with in an appropriate
 manner;
 schedules releases and determines future release plans and the
@@ -95,13 +111,20 @@
   but the ones that count in order to participate in the OMC
   decision-making process are the ones listed below.
 
+  In general, the OMC will leave technical decisions to the OpenSSL
+  Technical Committee (OTC, see below) and not participate in
+  discussions related to development and documention of the OpenSSL
+  Toolkit. In exceptional cases however an OTC vote can be overruled
+  by an OMC vote. Such an exceptional case would be for example if an
+  OTC decision stands contrary to OMC policies or decisions.
+
   OMC members may become inactive. In order to remain active a 
member
   must, in any calendar quarter, contribute by:
   
 a) Having authored, or been recorded as a reviewer of, at least
 one commit made to any OpenSSL repository (including non-code based
 ones) and
-b) vote in at least two-thirds of the total votes closed in the
+b) vote in at least two-thirds of the OMC votes closed in the
 first two months of the quarter and the last month of the preceding
 quarter.
   
@@ -129,30 +152,7 @@
   to vote on and participate in discussions. They retain access to OMC
   internal resources.
 
-  OpenSSL Software Foundation (OSF)
-
-  The OpenSSL Software Foundation represents the OpenSSL project in
-  legal and most official formal capacities in relation to external
-  entities and individuals. This includes, but is not limited to,
-  managing contributor license agreements, managing donations,
-  registering and holding trademarks, registering and holding domain
-  names, obtaining external legal advice, and so on.
-
-  Any OMC member may serve as a director of OSF if they wish. To do
-  so they should send a request to any existing OSF director.
-
-  OpenSSL Software Services (OSS)
-
-  OpenSSL Software Services represents the OpenSSL p

[web] master update

2019-12-06 Thread Matt Caswell
The branch master has been updated
   via  420fb543c12b2a4a18aae85315f8eaefefcd1c33 (commit)
   via  af80178dcbad3919595cbbf7b7c1837c6ef68d67 (commit)
  from  4139e6e2815280bdd6fe1618a793918c1c7156f2 (commit)


- Log -
commit 420fb543c12b2a4a18aae85315f8eaefefcd1c33
Author: Matt Caswell 
Date:   Fri Dec 6 14:33:26 2019 +

Update newsflash for security advisory

Reviewed-by: Mark J. Cox 
(Merged from https://github.com/openssl/web/pull/144)

commit af80178dcbad3919595cbbf7b7c1837c6ef68d67
Author: Matt Caswell 
Date:   Fri Dec 6 14:26:44 2019 +

Add security advisory for CVE-2019-1551

Reviewed-by: Mark J. Cox 
(Merged from https://github.com/openssl/web/pull/144)

---

Summary of changes:
 news/newsflash.txt   |  1 +
 news/secadv/20191206.txt | 49 +
 news/vulnerabilities.xml | 52 +++-
 3 files changed, 101 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20191206.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 896266b..0b6d94f 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+06-Dec-2019: Security Advisory: one 
low severity fix
 07-Nov-2019: New Blog post: https://www.openssl.org/blog/blog/2019/11/07/3.0-update/";>Update on 3.0 
Development, FIPS and 1.0.2 EOL
 10-Sep-2019: Security Advisory: three 
low severity fixes
 10-Sep-2019: OpenSSL 1.1.1d is now available, including bug and security fixes
diff --git a/news/secadv/20191206.txt b/news/secadv/20191206.txt
new file mode 100644
index 000..3141f78
--- /dev/null
+++ b/news/secadv/20191206.txt
@@ -0,0 +1,49 @@
+OpenSSL Security Advisory [6 December 2019]
+===
+
+rsaz_512_sqr overflow bug on x86_64 (CVE-2019-1551)
+===
+
+Severity: Low
+
+There is an overflow bug in the x64_64 Montgomery squaring procedure used in
+exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis
+suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as 
a
+result of this defect would be very difficult to perform and are not believed
+likely. Attacks against DH512 are considered just feasible. However, for an
+attack the target would have to re-use the DH512 private key, which is not
+recommended anyway. Also applications directly using the low level API
+BN_mod_exp may be affected if they use BN_FLG_CONSTTIME.
+
+OpenSSL versions 1.1.1 and 1.0.2 are affected by this issue. However due to the
+low severity of this issue we are not creating new releases at this time. The
+1.1.1 mitigation for this issue can be found in commit 419102400. The 1.0.2
+mitigation for this issue can be found in commit f1c5eea8a.
+
+This issue was found by OSS-Fuzz and Guido Vranken and reported to OpenSSL on
+12th September 2019. The fix was developed by Andy Polyakov with additional
+analysis by Bernd Edlinger.
+
+Note
+=
+
+OpenSSL 1.0.2 is currently only receiving security updates. Support for 1.0.2
+will end on 31st December 2019. Extended support is available for premium
+support customers: https://www.openssl.org/support/contracts.html
+
+OpenSSL 1.1.0 is out of support and no longer receiving updates. It is unknown
+whether issues in this advisory affect it.
+
+Users of these versions should upgrade to OpenSSL 1.1.1.
+
+References
+==
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20191206.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index c3532a5..7409a4d 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,57 @@
 
 
-
+
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+  
+
+
+  
+
+Integer overflow bug
+rsaz_512_sqr overflow bug on x86_64
+
+  There is an overflow bug in the x64_64 Montgomery squaring procedure 
used in
+  exponentiation with 512-bit moduli. No EC algorithms are affected. 
Analysis
+  suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and 
DSA1024 as a
+  result of this defect would be very difficult to perform and are not 
believed
+  likely. Attacks against DH512 are considered just feasible. However, for 
an
+  attack the target would have to re-use the DH512 private key, which is 
not
+  recommended anyway. Al

[web] master update

2019-12-04 Thread Kurt Roeckx
The branch master has been updated
   via  4139e6e2815280bdd6fe1618a793918c1c7156f2 (commit)
  from  f4b6f035624adcd2228c450cb10e74c940aee37f (commit)


- Log -
commit 4139e6e2815280bdd6fe1618a793918c1c7156f2
Author: Kurt Roeckx 
Date:   Wed Dec 4 19:09:01 2019 +0100

Update key's expiration date

---

Summary of changes:
 news/openssl-security.asc | 74 +++
 1 file changed, 37 insertions(+), 37 deletions(-)

diff --git a/news/openssl-security.asc b/news/openssl-security.asc
index 9dddc89..2b32a4b 100644
--- a/news/openssl-security.asc
+++ b/news/openssl-security.asc
@@ -13,31 +13,31 @@ 
zYY6spdAN6VtKTMnXTm608yH118p+UOB5rJuKBqk3tMaiIjoyOcya4ImenX85rfK
 eCOVNtdOC/0N8McfO0eFc6fZxcy7ykZ1a7FLyqQDexpZM7OLoM5SXObX1QARAQAB
 tDRPcGVuU1NMIHNlY3VyaXR5IHRlYW0gPG9wZW5zc2wtc2VjdXJpdHlAb3BlbnNz
 bC5vcmc+iQJUBBMBCgA+AhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAFiEE78Ck
-Z9YTy4PH7W0w2JTizos9efUFAlvEwCcFCQmW/3kACgkQ2JTizos9efW23BAAqYqN
-dyXOqaK1R6IuYs2fcPcQmIr+sIa4YI3QQj5viT+mz29GjU9BJIUOKAbDod4grVaw
-V43moFytTUdUs3vzx/5MQEYPTceq2n7/Y0RdoqztBPPn2FNp1ds/Eo7no9rgCHzB
-CVtBpzibEf6Z5/muj9jWvKsLsKBKFltq08KoAjTj8E1gFqoAebGK7eTPEYZkmV1t
-L+jZggEFa5xmxLKoArgS6NFqsj7M1ugREKlLL4+GgALnEiGa9r2jeE514YNFXZSN
-X9RN9prNpUpDVxAnUmFnk9XllZ9pzyom6Xj6yV7hxxD9RqjPc+9PqLajZ+6myCK9
-mgrvWqAJHKmzQjOljehYGW9AR/1ywcmTOpLC4zuTg9QR0j5Cuxw0yw2k0BWG8x9S
-Labllr1YfpfeWuQJptyHOCWck28NCO0uJ9JaPiRuJfPVq1rGMACbI9QoZ9E4rRf1
-UzBuyTrRRygSszb1zmOx/Oc1PAMbwuZYrOby3qUnONTV8CaEe5fgsItYRSCSETuk
-UladwcCPpgEkWQJ/WWgqjcnwx4RUJ7aZ+tO6UZdnh7zueyjda9XyTmQcfD/aeEtL
-KgbPUFxeMDZQTNr/03uDBqvsM0EBbaHybgUhKTdIx6VbqRxmUVpAksnTOE6Aka8B
-IXJb9xr1JotVgM8tuUgW2keNPPwYBAE9l6+k1Fy0JU9wZW5TU0wgT01DIDxvcGVu
+Z9YTy4PH7W0w2JTizos9efUFAl3n9TkFCQvHY5oACgkQ2JTizos9efVbRQ//aItr
+wyVa5j+OtrMaIJI9x835ES4bBaEIY1YVwGzoKzj+MOxdai0spUR6KZ9TYnEC5R4b
+yFac7H9g+R4V5rv3+HogMBTYaCTmbFmZ4Y8viD7YaDsHHMcbHQymyV55l7ZfzyNt
+pw3D3acvS3nOij9JQqRTOHuIOtS5FtJh1/+pig5sEk1TigOemJ7cnC7uWmfkzDzx
+ywz29EBFZXeFV7Dg+hjkUuVtMqcbhouvjJlwvx7cgcAPwFRZcu7UoirVoq0+sSJj
+kxxohVekpc+daZK9ge6qpHi7LObgM64fVPjR4FizuTmHU+f7ptUaI7BEGxmPtmBa
+skj1Wi4lkSgQ4SfS7PpnlPphM2Tms7mG4gPO4f0cZ/qZriCoaU5DZ8kPx0xgY7Yf
+Uol3NyRxAXJZi7voSWsj/YM1rsyd8Q7bYFW0Rx/hcjbT2AwZcqruqAuYEM6+M3Sb
+JzOm28w+lnS7urnog8MBSSX9wsFzwHEXKBiqY2Qp+jU/fmSebqiDrRaAXJPvidCM
+gsPNrK6HrQOjemZTG7dReIxqIjWuguhcN4aoellXwJYuR0NOo0uRK79IGbjFU8Vy
+UBuv5AMCWgpblLaDyVHkhnQbNjnpvJnVoCqvTU4R0ttmjKQV4aWwgdryuc/a564J
+PKcfr4pmeb+4Lfh1SxpNP3O2pzI1OY1zSj5nFRm0JU9wZW5TU0wgT01DIDxvcGVu
 c3NsLW9tY0BvcGVuc3NsLm9yZz6JAlQEEwEKAD4CGwMFCwkIBwMFFQoJCAsFFgID
-AQACHgECF4AWIQTvwKRn1hPLg8ftbTDYlOLOiz159QUCW8TAGAUJCZb/eQAKCRDY
-lOLOiz159Xe0EACD9dOKa8Yy0K8xrC77KZteyEJb49O3e0fagjulquebwXQNjdzv
-SvAo3W67bwJ2zRA6kBRHzCxh70dtdd9PvD7gkbqombeZ8CKf1ADj0P31I3dOBJM4
-rupTWnzycKkSzR2JvhoXmA7bNqpGIgRtOSJBKNCVPMtLSR/Oc2Z/KckjbldY110s
-zaa6ef1lLtc9CrNnQb9GQNu4hrIbRrFFFyvyIb+46R8XPcjCTnwyfMpWo9/6ftk9
-MbpnsQRwsX3YujnzH6z20nlp+vRtNEbXCfkvz4j744QiffYLA9DQHoV4jjaN5cZ1
-3isaODNnIFuq9QPbN6LzlJrfTplQ4ugPmK5IBe1WTIratFGp8bLyb5HRNXVNDblK
-RBp1R/V/PWBL5C3IDgyG4zh/09hHqQ1TOMeQYDDDopMb5seKJB0A4oIQNhmDP1tj
-3BIPnd9BOHyvkOFD152AVABmwnlHmOi5m77lt4bxU/U66+AoDjvzL9VZfrGcosKo
-B+IX6nhp7RYNObZxCJnKyRMtDY1oLTESYCD0OBN3S/0215VUwp5WmloawTbW9pfu
-zbbw+Pax/wQDCXmKq1wlkxVUwd2Yx6uiN3QeeZY+mVsFWjBpNPEtwzP9eqWvGXvK
-WHo2oDeEUrUHCEWQAfogS9dia4Bk0S3MWX63ibmWwYeuUf6Wy1C5KXbm/7QnT3Bl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 blNTTCB0ZWFtIDxvcGVuc3NsLXRlYW1Ab3BlbnNzbC5vcmc+iQJZBDABCgBDFiEE
 78CkZ9YTy4PH7W0w2JTizos9efUFAlnZ9jUlHSBSZXBsYWNlZCBieSBvcGVuc3Ns
 LW9tY0BvcGVuc3NsLm9yZwAKCRDYlOLOiz159VAiD/wLVz8KE84z+iPBcDXJR4hr
@@ -63,17 +63,17 @@ 
ncd+VYvth6cM9jDWsTJAXEaqNoFjVfw227NnQ/hxqGCwEVzweBi7a7dix3nCa9JO
 w5eV3xCyezUohQ6nOBbDnoAnp3FLeUrhBJQXCPNtlb0fSMnj14EwBoD6EKO/xz/g
 EW5mr0a+xp+fjbkvHVX/c8UmU+7nlX7upaN46RLM1y0yWYKo9BV61tn+kcsAk7kh
 Q7dKhOzmSXpsBHMAEQEAAYkCPAQYAQoAJgIbDBYhBO/ApGfWE8uDx+1tMNiU4s6L
-PXn1BQJcCEC3BQkJl0OYAAoJENiU4s6LPXn12EAP/Aq6g9XE6Hodr9ig01NC5VtZ
-ryNvxSQtMnQuIJIiCcpY0rVzCLVI+Qcnd66vZIm+7w6WEBJQo6F/9zMPS36OQXDc
-2UE4Wz3Sgrwk1PYnRu77M/eEdDsCWsSNjQR0wvjqNuZEAxb8qOs1qkg2pXGdNWW5
-lZ6017A7osKOBhTOdYWR7LXtMRTY1npg6ayHomk

[web] master update

2019-11-14 Thread Matt Caswell
The branch master has been updated
   via  f4b6f035624adcd2228c450cb10e74c940aee37f (commit)
  from  0f13e11e18c095b1880821007c06719808ce1360 (commit)


- Log -
commit f4b6f035624adcd2228c450cb10e74c940aee37f
Author: Matt Caswell 
Date:   Thu Nov 14 10:50:53 2019 +

Clarify the Premium support contract wording

The current text is not correct.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/141)

---

Summary of changes:
 support/contracts.html | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/support/contracts.html b/support/contracts.html
index 1b91cd1..57302a3 100644
--- a/support/contracts.html
+++ b/support/contracts.html
@@ -40,10 +40,9 @@
Premium Level Support
US$50,000 annually

- A custom support contract designed to meet the needs of a 
specific Enterprise customer
+ A support contract designed to meet the needs of Enterprise 
customers
  Includes extended support for the immediately previous LTS 
release
  beyond the public EOL date for that release
- Exact costs will depend on the terms of the agreed support 
contract

The premium support plan is intended for the large enterprise
using OpenSSL as an essential component of multiple products or


[web] master update

2019-11-11 Thread Mark J . Cox
The branch master has been updated
   via  0f13e11e18c095b1880821007c06719808ce1360 (commit)
   via  5fbd49f0e4457fdae7e5c09a263792f97353c759 (commit)
   via  cea049657a3078c9cde30101ec0aef24169642c5 (commit)
  from  8930b3a506ef2147a434448fc21429c1d3e8027d (commit)


- Log -
commit 0f13e11e18c095b1880821007c06719808ce1360
Merge: 8930b3a 5fbd49f
Author: Mark J. Cox 
Date:   Mon Nov 11 12:35:06 2019 +

Merge pull request #140 from iamamoose/sponsorship

Sync the OSF sponsorship page with the current sponsors

commit 5fbd49f0e4457fdae7e5c09a263792f97353c759
Author: Mark J. Cox 
Date:   Mon Nov 11 12:13:54 2019 +

Better grammar for where the support goes

commit cea049657a3078c9cde30101ec0aef24169642c5
Author: Mark J. Cox 
Date:   Mon Nov 11 11:47:41 2019 +

Update the sponsorship page to be current with the list of OSF
sponsors.  Add a bronze level and the current sponsors at that level.
Add a link to the 'in kind' thanks page.

---

Summary of changes:
 support/acks.html  | 76 ++
 support/donations.html |  3 ++
 2 files changed, 49 insertions(+), 30 deletions(-)

diff --git a/support/acks.html b/support/acks.html
index eea4919..1f5714c 100644
--- a/support/acks.html
+++ b/support/acks.html
@@ -7,19 +7,19 @@
   
 
   
-   Sponsor Acknowledgements
+   Acknowledgements

  The OpenSSL project depends on volunteer efforts and financial
  support from the end user community.  That support comes
   in many forms.
 
- We would like to identify and thank the following such sponsors
- for their significant support of the OpenSSL project. Sponsors are
- listed alphabetically within categories.  Please note that we ask
- permission to identify sponsors and that some sponsors we consider
- eligible for inclusion here have requested to remain anonymous.
+  Sponsorship Donations
 
-  Current Sponsors:
+
+ We would like to identify and thank the following sponsors
+ for their donations which give significant support to the OpenSSL 
project.
+ Please note some sponsors remain anonymous.
+  
 
   
 .sponsorlogo {
@@ -37,44 +37,60 @@
 text-align: center !important;
 }
   
-  
- 
- Exceptional support:
+
+  Exceptional:
 
   
- https://www.akamai.com/";>
  https://www.smartisan.com/";>
   
 
-
- 
- Platinum support:
+  Platinum:
 
   
- https://www.bluecedar.com/";>  
  https://www.huawei.com/";>
- https://www.netapp.com/";>  
- https://www.oracle.com/";>
- https://www.vmware.com/";>
   
 
-
+  Bronze:
+  
+  https://cargurus.com/";>CarGurus
+  
 
+ Past sponsors include: 
+  
+2018: https://www.akamai.com/";>Akamai,
+  https://www.bluecedar.com/";>Blue Cedar,
+  https://www.handshake.org/";>Handshake,
+  https://www.huawei.com/";>Huawei,
+  https://levchinprize.com/";>Levchin Prize,
+  https://www.netapp.com/";>NetApp,
+  https://www.smartisan.com/";>Smartisan,
+  and
+  https://vmware.com/";>VMWare.
+
+2017: https://www.akamai.com/";>Akamai,
+  https://www.huawei.com/";>Huawei,
+  https://www.oracle.com/";>Oracle,
+  and
+  https://www.smartisan.com/";>Smartisan.
+
+2016: https://www.huawei.com/";>Huawei,
+  https://www.coreinfrastructure.org/";>Linux Foundation
+Core Infrastructure Initiative,
+  and
+  https://www.smartisan.com/";>Smartisan.
+
+  
   
   
-
+  Other Donations
+ 
+   
+ We also identify and thank organizations who contribute
+   in-kind donations to the 
project.
+   
+ 
 
  
  
diff --git a/support/donations.html b/support/donations.html
index 1e6d56e..731ac19 100644
--- a/support/donations.html
+++ b/support/donations.html
@@ -48,6 +48,9 @@
  Silver$10,000/yr
 Acknowledgement on openssl.org
 
+ Bronze$5,000/yr
+Acknowledgement on openssl.org
+

 
 


[web] master update

2019-11-11 Thread Matt Caswell
The branch master has been updated
   via  8930b3a506ef2147a434448fc21429c1d3e8027d (commit)
  from  121a1909bc25d24d6b11c0e3d084ecc5625a1a86 (commit)


- Log -
commit 8930b3a506ef2147a434448fc21429c1d3e8027d
Author: Matt Caswell 
Date:   Thu Nov 7 16:39:27 2019 +

Add a link to the new blog post

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/139)

---

Summary of changes:
 news/newsflash.txt | 1 +
 1 file changed, 1 insertion(+)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 3671610..896266b 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+07-Nov-2019: New Blog post: https://www.openssl.org/blog/blog/2019/11/07/3.0-update/";>Update on 3.0 
Development, FIPS and 1.0.2 EOL
 10-Sep-2019: Security Advisory: three 
low severity fixes
 10-Sep-2019: OpenSSL 1.1.1d is now available, including bug and security fixes
 10-Sep-2019: OpenSSL 1.1.0l is now available, including security fixes


[web] master update

2019-09-11 Thread Richard Levitte
The branch master has been updated
   via  121a1909bc25d24d6b11c0e3d084ecc5625a1a86 (commit)
  from  1cb8b8b472c5bc07856ee2c37fe4e211598d4094 (commit)


- Log -
commit 121a1909bc25d24d6b11c0e3d084ecc5625a1a86
Author: Richard Levitte 
Date:   Wed Sep 11 23:39:26 2019 +0200

.htaccess: force .sha256 files to application/binary

---

Summary of changes:
 .htaccess | 4 
 1 file changed, 4 insertions(+)

diff --git a/.htaccess b/.htaccess
index 717f682..653e58d 100644
--- a/.htaccess
+++ b/.htaccess
@@ -21,6 +21,10 @@ ForceType application/binary
 ForceType application/binary
 
 
+
+ForceType application/binary
+
+
 
 ForceType application/binary
 


[web] master update

2019-09-11 Thread Richard Levitte
The branch master has been updated
   via  1cb8b8b472c5bc07856ee2c37fe4e211598d4094 (commit)
  from  6239182447d80939a1e2170e4f7b79917561c165 (commit)


- Log -
commit 1cb8b8b472c5bc07856ee2c37fe4e211598d4094
Author: Richard Levitte 
Date:   Wed Sep 11 23:25:06 2019 +0200

source: Remove gz encoding on .gz.sha256 files

---

Summary of changes:
 bin/mk-latest | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/bin/mk-latest b/bin/mk-latest
index 8c2d3a7..37423cd 100755
--- a/bin/mk-latest
+++ b/bin/mk-latest
@@ -56,4 +56,7 @@ RewriteRule ^openssl-(fips.*)  old/fips/openssl-$1 [L]
 
 RemoveEncoding .gz
 
+
+RemoveEncoding .gz
+
 EOF


[web] master update

2019-09-11 Thread Matt Caswell
The branch master has been updated
   via  6239182447d80939a1e2170e4f7b79917561c165 (commit)
  from  81c6d01b55625c3071296caced494d5d61866083 (commit)


- Log -
commit 6239182447d80939a1e2170e4f7b79917561c165
Author: Matt Caswell 
Date:   Tue Sep 10 15:34:03 2019 +0100

Fix typo in advisories

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/137)

---

Summary of changes:
 news/secadv/20190730.txt | 2 +-
 news/secadv/20190910.txt | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/news/secadv/20190730.txt b/news/secadv/20190730.txt
index cff9b85..88a50f5 100644
--- a/news/secadv/20190730.txt
+++ b/news/secadv/20190730.txt
@@ -55,7 +55,7 @@ will end on 11th September 2019. Users of these versions 
should
 upgrade to OpenSSL 1.1.1.
 
 
-Referenses
+References
 ==
 
 URL for this Security Advisory:
diff --git a/news/secadv/20190910.txt b/news/secadv/20190910.txt
index 0358352..9af565e 100644
--- a/news/secadv/20190910.txt
+++ b/news/secadv/20190910.txt
@@ -94,7 +94,7 @@ last 1.1.0 release.
 Users of these versions should upgrade to OpenSSL 1.1.1.
 
 
-Referenses
+References
 ==
 
 URL for this Security Advisory:


[web] master update

2019-09-10 Thread Matt Caswell
The branch master has been updated
   via  81c6d01b55625c3071296caced494d5d61866083 (commit)
  from  b9cdda6cdbe4e87b1e2db37b23cddaca5fb7da9a (commit)


- Log -
commit 81c6d01b55625c3071296caced494d5d61866083
Author: Matt Caswell 
Date:   Tue Sep 10 12:05:36 2019 +0100

Website updates for new releases

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/136)

---

Summary of changes:
 news/newsflash.txt   |   4 ++
 news/secadv/20190910.txt | 107 +++
 news/vulnerabilities.xml | 164 ++-
 3 files changed, 274 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20190910.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 491bee5..3671610 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,10 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+10-Sep-2019: Security Advisory: three 
low severity fixes
+10-Sep-2019: OpenSSL 1.1.1d is now available, including bug and security fixes
+10-Sep-2019: OpenSSL 1.1.0l is now available, including security fixes
+10-Sep-2019: OpenSSL 1.0.2t is now available, including security fixes
 30-Jul-2019: Security Advisory: one 
low severity fix in Windows builds
 28-May-2019: OpenSSL 1.1.1c is now available, including bug and security fixes
 28-May-2019: OpenSSL 1.1.0k is now available, including bug and security fixes
diff --git a/news/secadv/20190910.txt b/news/secadv/20190910.txt
new file mode 100644
index 000..0358352
--- /dev/null
+++ b/news/secadv/20190910.txt
@@ -0,0 +1,107 @@
+OpenSSL Security Advisory [10 September 2019]
+=
+
+ECDSA remote timing attack (CVE-2019-1547)
+==
+
+Severity: Low
+
+Normally in OpenSSL EC groups always have a co-factor present and this is used
+in side channel resistant code paths. However, in some cases, it is possible to
+construct a group using explicit parameters (instead of using a named curve). 
In
+those cases it is possible that such a group does not have the cofactor 
present.
+This can occur even where all the parameters match a known named curve.
+
+If such a curve is used then OpenSSL falls back to non-side channel resistant
+code paths which may result in full key recovery during an ECDSA signature
+operation.
+
+In order to be vulnerable an attacker would have to have the ability to time
+the creation of a large number of signatures where explicit parameters with no
+co-factor present are in use by an application using libcrypto.
+
+For the avoidance of doubt libssl is not vulnerable because explicit parameters
+are never used.
+
+OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue.
+
+OpenSSL 1.1.1 users should upgrade to 1.1.1d
+OpenSSL 1.1.0 users should upgrade to 1.1.0l
+OpenSSL 1.0.2 users should upgrade to 1.0.2t
+
+This issue was reported by Cesar Pereida García, Sohaib ul Hassan,
+Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Brumley. 
The
+fix was developed by Billy Brumley. It was reported to OpenSSL on 5th August
+2019.
+
+
+Fork Protection (CVE-2019-1549)
+===
+
+Severity: Low
+
+OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was
+intended to include protection in the event of a fork() system call in order to
+ensure that the parent and child processes did not share the same RNG state.
+However this protection was not being used in the default case.
+
+A partial mitigation for this issue is that the output from a high precision
+timer is mixed into the RNG state so the likelihood of a parent and child
+process sharing state is significantly reduced.
+
+If an application already calls OPENSSL_init_crypto() explicitly using
+OPENSSL_INIT_ATFORK then this problem does not occur at all.
+
+OpenSSL version 1.1.1 is affected by this issue.
+
+OpenSSL 1.1.1 users should upgrade to 1.1.1d
+
+This issue was reported by Matt Caswell. The fix was developed by Matthias
+St. Pierre. It was reported to OpenSSL on 27th May 2019.
+
+
+Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey (CVE-2019-1563)
+
+
+Severity: Low
+
+In situations where an attacker receives automated notification of the success
+or failure of a decryption attempt an attacker, after sending a very large
+number of messages to be decrypted, can recover a CMS/PKCS7 transported
+encryption key or decrypt any RSA encrypted message that was encrypted with the
+public RSA key, using a Bleichenbacher padding oracle attack. Applications are
+not affected if they use a certificate together with the private RSA key to the
+CMS_decrypt or PKCS7_

[web] master update

2019-07-31 Thread Matt Caswell
The branch master has been updated
   via  b9cdda6cdbe4e87b1e2db37b23cddaca5fb7da9a (commit)
  from  e6ce68d75408edac4a22e85dc3af43444bc7fefc (commit)


- Log -
commit b9cdda6cdbe4e87b1e2db37b23cddaca5fb7da9a
Author: Matt Caswell 
Date:   Wed Jul 31 09:38:46 2019 +0100

Correct typo in security advisory

Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/web/pull/135)

---

Summary of changes:
 news/secadv/20190730.txt | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/news/secadv/20190730.txt b/news/secadv/20190730.txt
index 0714a04..cff9b85 100644
--- a/news/secadv/20190730.txt
+++ b/news/secadv/20190730.txt
@@ -42,7 +42,7 @@ The 1.1.1 and 1.1.0 mitigation set more appropriate defaults 
for
 mingw, while the 1.0.2 mitigation documents the issue and provides
 enhanced examples.
 
-This issue was reported by Rich Mirth.  The fix was developed by
+This issue was reported by Rich Mirch.  The fix was developed by
 Richard Levitte from the OpenSSL development team.  It was reported to
 OpenSSL on 9th Jun 2019.
 


[web] master update

2019-07-30 Thread Richard Levitte
The branch master has been updated
   via  e6ce68d75408edac4a22e85dc3af43444bc7fefc (commit)
  from  e784301605e11bb68c60d0f8c8e0c0ce5520eb17 (commit)


- Log -
commit e6ce68d75408edac4a22e85dc3af43444bc7fefc
Author: Richard Levitte 
Date:   Tue Jul 30 15:20:38 2019 +0200

CVE-2019-1552 security advisory

Reviewed-by: Mark J. Cox 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/134)

---

Summary of changes:
 news/newsflash.txt   |  1 +
 news/secadv/20190730.txt | 68 +++
 news/vulnerabilities.xml | 83 +++-
 3 files changed, 151 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20190730.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 7a47756..491bee5 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+30-Jul-2019: Security Advisory: one 
low severity fix in Windows builds
 28-May-2019: OpenSSL 1.1.1c is now available, including bug and security fixes
 28-May-2019: OpenSSL 1.1.0k is now available, including bug and security fixes
 28-May-2019: OpenSSL 1.0.2s is now available, including bug fixes
diff --git a/news/secadv/20190730.txt b/news/secadv/20190730.txt
new file mode 100644
index 000..0714a04
--- /dev/null
+++ b/news/secadv/20190730.txt
@@ -0,0 +1,68 @@
+OpenSSL Security Advisory [30 July 2019]
+
+
+Windows builds with insecure path defaults (CVE-2019-1552)
+==
+
+Severity: Low
+
+OpenSSL has internal defaults for a directory tree where it can find a
+configuration file as well as certificates used for verification in
+TLS.  This directory is most commonly referred to as OPENSSLDIR, and
+is configurable with the --prefix / --openssldir configuration options.
+
+For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets
+assume that resulting programs and libraries are installed in a
+Unix-like environment and the default prefix for program installation
+as well as for OPENSSLDIR should be '/usr/local'.
+
+However, mingw programs are Windows programs, and as such, find
+themselves looking at sub-directories of 'C:/usr/local', which may be
+world writable, which enables untrusted users to modify OpenSSL's
+default configuration, insert CA certificates, modify (or even
+replace) existing engine modules, etc.
+
+For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR
+on all Unix and Windows targets, including Visual C builds.  However,
+some build instructions for the diverse Windows targets on 1.0.2
+encourage you to specify your own --prefix.
+
+OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue.
+Due to the limited scope of affected deployments this has been
+assessed as low severity and therefore we are not creating new
+releases at this time.
+
+The mitigations are found in these commits:
+- For 1.1.1, commit 54aa9d51b09d67e90db443f682cface795f5af9e
+- For 1.1.0, commit e32bc855a81a2d48d215c506bdeb4f598045f7e9 and
+  b15a19c148384e73338aa7c5b12652138e35ed28
+- For 1.0.2, commit d333ebaf9c77332754a9d5e111e2f53e1de54fdd
+
+The 1.1.1 and 1.1.0 mitigation set more appropriate defaults for
+mingw, while the 1.0.2 mitigation documents the issue and provides
+enhanced examples.
+
+This issue was reported by Rich Mirth.  The fix was developed by
+Richard Levitte from the OpenSSL development team.  It was reported to
+OpenSSL on 9th Jun 2019.
+
+Note
+=
+
+OpenSSL 1.0.2 and 1.1.0 are currently only receiving security updates.
+Support for 1.0.2 will end on 31st December 2019. Support for 1.1.0
+will end on 11th September 2019. Users of these versions should
+upgrade to OpenSSL 1.1.1.
+
+
+Referenses
+==
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20190730.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index f9949ce..e66f6d8 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,88 @@
 
 
-
+
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+  
+
+
+  
+  
+
+
+  
+
+Insecure defaults
+Windows builds with insecure path defaults
+
+  OpenSSL has internal defaults for a directory tree where it can find a
+  

[web] master update

2019-07-07 Thread Dr . Paul Dale
The branch master has been updated
   via  e784301605e11bb68c60d0f8c8e0c0ce5520eb17 (commit)
  from  3b00096bd14d8a86ec486dcb132fe3055fc170df (commit)


- Log -
commit e784301605e11bb68c60d0f8c8e0c0ce5520eb17
Author: Pauli 
Date:   Mon Jul 8 07:47:18 2019 +1000

Include description of a trivial commit.

Trivial submissions are mentioned but not defined.

---

Summary of changes:
 policies/cla.html| 23 ---
 policies/committers.html |  6 +++---
 2 files changed, 23 insertions(+), 6 deletions(-)

diff --git a/policies/cla.html b/policies/cla.html
index efe0445..51876e4 100644
--- a/policies/cla.html
+++ b/policies/cla.html
@@ -12,7 +12,7 @@
  Contributor Agreements
  
 
-Every non-trival contribution to be
+Every non-trivial contribution to be
 covered by a signed
Contributor License Agreement (CLA).
We have modelled our policy based on the practice of
@@ -31,10 +31,27 @@
  the terms under which intellectual property has been contributed
  to OpenSSL and thereby allow us to defend the project should
  there be a legal dispute regarding the software at some future
- time.
+ time.
+ 
+
+ 
+ A submission is trivial if it is considered trivial under copyright
+ law. Since we are not lawyers, we place the bar for trivial
+ contributions very high. For example: corrections of grammatical or
+ typographical errors (including misspelled function names in manual
+ pages), simple whitespace changes and in some cases one-line
+ bugfixes might be accepted as trivial without requiring a CLA.
+ 
+
+ 
+ In practice, it is required that the author (in the git commit
+ message) and all approving team members (in the pull request thread)
+ agree that a change is trivial. The reviewers will normally post
+ a statement to the effect of "I agree that it is a trivial change."
+ 
 
  
- Please make sure that the email
+ When filling in the CLA, please make sure that the email
  address matches the one that you use for the "Author" in your
  git commits.  List multiple email addresses if necessary.
  
diff --git a/policies/committers.html b/policies/committers.html
index 80e31c8..46e2b74 100644
--- a/policies/committers.html
+++ b/policies/committers.html
@@ -123,9 +123,9 @@
   A note on CLAs
   All authors, including committers, must have current CLAs on
   file. A CLA is not required for trivial contributions (e.g. the
-  fix of a spelling mistake). If all reviewers as well as the
-  original author agree that the submission is trivial, the commit
-  text should include "CLA: trivial."
+  fix of a spelling mistake). Refer to the
+  CLA page for further details.
+  
 

 


[web] master update

2019-07-05 Thread Richard Levitte
The branch master has been updated
   via  3b00096bd14d8a86ec486dcb132fe3055fc170df (commit)
  from  dd74209e0beb5fdcb99aa967aec90b1d9b95c322 (commit)


- Log -
commit 3b00096bd14d8a86ec486dcb132fe3055fc170df
Author: Richard Levitte 
Date:   Sat Jun 22 09:44:24 2019 +0200

When producing HTML man-pages, include the original base name

For OpenSSL 1.1.0 and on, this isn't relevant any more, since all pod
names should be one of the names in the NAME section.  However, 1.0.2
pages were written differently, and people still refer to the original
base name to look up documentation.

Fixes openssl/openssl#9189

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/132)

---

Summary of changes:
 bin/mk-manpages | 14 +++---
 1 file changed, 11 insertions(+), 3 deletions(-)

diff --git a/bin/mk-manpages b/bin/mk-manpages
index efc95b1..6b57ead 100755
--- a/bin/mk-manpages
+++ b/bin/mk-manpages
@@ -64,9 +64,17 @@ sub main {
 print $fh $out or $class->die("Can't print $outinc: $!");
 close($fh) or $class->die("Can't close $outinc: $!");
 
-foreach my $htmlname (
-map { (my $x = $_) =~ s|/|-|g; $x }
-@{$data{names}}) {
+my @htmlnames =
+map { (my $x = $_) =~ s|/|-|g; $x } @{$data{names}};
+# Older OpenSSL pods have file names that do not correspond
+# to any of the names in the NAME section.
+# Strictly speaking, we shouldn't use that name, but HTML
+# pages with that name have been produced in the past, so
+# we keep doing so as long as it's relevant.
+if (! grep { $_ eq $origbase } @htmlnames) {
+push @htmlnames, $origbase;
+}
+foreach my $htmlname (@htmlnames) {
 my $htmlfile = File::Spec->catdir( "man$data{sectnum}",
"$htmlname.html" );
 my $outhtml = File::Spec->catfile( $wwwdir, $htmlfile );


[web] master update

2019-06-07 Thread Richard Levitte
The branch master has been updated
   via  dd74209e0beb5fdcb99aa967aec90b1d9b95c322 (commit)
  from  70aec4f068ead8d76605508b1eb6b104bf616f0f (commit)


- Log -
commit dd74209e0beb5fdcb99aa967aec90b1d9b95c322
Author: Matt Caswell 
Date:   Wed Jun 5 17:28:17 2019 +0100

Update the copyright date in the licence file

Reviewed-by: Tim Hudson 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/131)

---

Summary of changes:
 source/license-openssl-ssleay.txt | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/source/license-openssl-ssleay.txt 
b/source/license-openssl-ssleay.txt
index 0511f2e..9601ab4 100644
--- a/source/license-openssl-ssleay.txt
+++ b/source/license-openssl-ssleay.txt
@@ -10,7 +10,7 @@
   ---
 
 /* 
- * Copyright (c) 1998-2018 The OpenSSL Project.  All rights reserved.
+ * Copyright (c) 1998-2019 The OpenSSL Project.  All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
  * modification, are permitted provided that the following conditions


[web] master update

2019-05-28 Thread Richard Levitte
The branch master has been updated
   via  70aec4f068ead8d76605508b1eb6b104bf616f0f (commit)
  from  b506b4fae6ec2661f12c2ae522c83c2f4fc051b3 (commit)


- Log -
commit 70aec4f068ead8d76605508b1eb6b104bf616f0f
Author: Richard Levitte 
Date:   Tue May 28 15:39:56 2019 +0200

Updates for releases 1.0.2s, 1.1.0k and 1.1.1c

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/129)

---

Summary of changes:
 news/newsflash.txt   | 3 +++
 news/vulnerabilities.xml | 6 +++---
 2 files changed, 6 insertions(+), 3 deletions(-)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 1346f6e..7a47756 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,9 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+28-May-2019: OpenSSL 1.1.1c is now available, including bug and security fixes
+28-May-2019: OpenSSL 1.1.0k is now available, including bug and security fixes
+28-May-2019: OpenSSL 1.0.2s is now available, including bug fixes
 06-Mar-2019: Security Advisory: one 
low severity fix in ChaCha20-Poly1305
 26-Feb-2019: OpenSSL 1.1.1b is now available, including bug fixes
 26-Feb-2019: OpenSSL 1.0.2r is now available, including bug and security fixes
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 00518fb..f9949ce 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,7 @@
 
 
-
+
   
 
 
@@ -25,10 +25,10 @@
 
 
 
-
+
   
 
-
+
   
 
 Nonce Reuse


[web] master update

2019-05-12 Thread Kurt Roeckx
The branch master has been updated
   via  b506b4fae6ec2661f12c2ae522c83c2f4fc051b3 (commit)
   via  947d03ee10750815f8cf7a2e597dfb6441857295 (commit)
  from  5ea7530ac9bea4482635ec821e5babff35aec8c7 (commit)


- Log -
commit b506b4fae6ec2661f12c2ae522c83c2f4fc051b3
Author: Kurt Roeckx 
Date:   Sat Dec 8 20:12:01 2018 +0100

Update security policy

commit 947d03ee10750815f8cf7a2e597dfb6441857295
Author: Mark J. Cox 
Date:   Thu Nov 29 15:27:27 2018 +

Discussed at the OMC face to face that we should make it clear what things 
we consider in and out of scope of being OpenSSL vulnerabilities and therefore 
what we will assign a CVE for

---

Summary of changes:
 policies/secpolicy.html | 45 ++---
 1 file changed, 34 insertions(+), 11 deletions(-)

diff --git a/policies/secpolicy.html b/policies/secpolicy.html
index 3a298d4..d54fcc6 100644
--- a/policies/secpolicy.html
+++ b/policies/secpolicy.html
@@ -12,7 +12,7 @@
  
Security Policy

- Last modified 16th May 2018
+ Last modified 12th May 2019


  
@@ -21,11 +21,11 @@
 

 If you wish to report a possible security issue in OpenSSL
-please notify us.  
+please notify us.

 
 Issue triage
-
+

 Notifications are received by a group of OpenSSL Management 
Committee
 members.  We engage resources within
@@ -38,12 +38,35 @@
 

 
+   Threat Model
+
+Certain threats are currently considered outside of the scope 
of the OpenSSL threat model.
+  Accordingly, we do not consider OpenSSL secure against the 
following classes of attacks:
+  
+same physical system side channel
+CPU/hardware flaws
+physical fault injection
+physical observation side channels (e.g. power 
consumption, EM emissions, etc)
+  
+
+ Mitigations for security issues outside of our threat scope may
+   still be addressed, however we do not class these as OpenSSL 
vulnerabilities
+   and will therefore not issue CVEs for any mitigations to 
address these issues.
+
+ We are working towards making the same physical system side
+   channel attacks very hard.
+
+ Prior to the threat model being included in this policy, CVEs
+   were sometimes issued for these classes of attacks. The
+   existence of a previous CVE does not override this policy going
+   forward.
+
Issue severity
 
We will determine the risk of each issue,
taking into account our experience dealing with past
issues, versions affected, common defaults, and use cases.
-   We use the following severity categories:
+We use the following severity categories:
 

   CRITICAL Severity.
@@ -51,8 +74,8 @@
   be exploitable. Examples include significant disclosure of the
   contents of server memory (potentially revealing user details),
   vulnerabilities which can be easily exploited remotely to
-  compromise server private keys (excluding local, theoretical or
-  difficult to exploit side channel attacks) or where remote code
+  compromise server private keys
+  or where remote code
   execution is considered likely in common situations.  These
   issues will be kept private and will trigger a new release of
   all supported versions.  We will attempt to address these as
@@ -67,7 +90,7 @@
   versions.  We will attempt to keep the time these issues are
   private to a minimum; our aim would be no longer than a month
   where this is something under our control
-  
+
  
  MODERATE Severity.
  This includes issues like crashes in client applications,
@@ -75,12 +98,12 @@
  and local flaws.  These will in general be kept private until
  the next release, and that release will be scheduled so that it
  can roll up several such flaws at one time.
-  
+
  
  LOW Severity.
  This includes issues such as those that only affect the
- openssl command line utility, unlikely configurations, or hard
- to exploit timing (side channel) attacks.  These will in general
+ openssl command line utility, or unlikely configurations.
+ These will in general
  be fixed immediately in latest development versions, a

[web] master update

2019-05-08 Thread Richard Levitte
The branch master has been updated
   via  5ea7530ac9bea4482635ec821e5babff35aec8c7 (commit)
  from  76edf555401fd18e31b6968edee6b2bb46391edd (commit)


- Log -
commit 5ea7530ac9bea4482635ec821e5babff35aec8c7
Author: Richard Levitte 
Date:   Mon May 6 09:56:19 2019 +0200

Update of 3.0.0 design: addition of a provider context

This changes gives providers the opportunity to create a context for
the execution of the operations and algorithms it provides.

The idea is that OSSL_provider_init() will create that context, and
the teardown function will destroy it, and libcrypto is simply
responsible for saving away the pointer to the context and pass it
down to appropriate provider side functions (typically the
constructors of operation specific contexts).

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/128)

---

Summary of changes:
 docs/OpenSSL300Design.md | 30 +-
 1 file changed, 17 insertions(+), 13 deletions(-)

diff --git a/docs/OpenSSL300Design.md b/docs/OpenSSL300Design.md
index 83e718c..e552692 100644
--- a/docs/OpenSSL300Design.md
+++ b/docs/OpenSSL300Design.md
@@ -710,7 +710,8 @@ A provider module _must_ have the following  well known 
entry point:
 ``` C
 int OSSL_provider_init(const OSSL_PROVIDER *provider,
const OSSL_DISPATCH *in,
-   const OSSL_DISPATCH **out);
+   const OSSL_DISPATCH **out
+   void **provider_ctx);
 ```
 
 If the entry point does not exist in the dynamically loaded object,
@@ -721,6 +722,11 @@ then it is not a valid module and loading it will fail.
 `out` is an array of provider functions that the provider passes back
 to the Core.
 
+`provider_ctx` (may be shortened to `provctx` elsewhere in this
+document) is an object optionally created by the provider for its own
+use (storing data it needs to keep around safely).  This pointer will
+be passed back to appropriate provider functions.
+
 `provider` is a handle to a provider object belonging to the Core.
 This can serve as a unique provider identity which may be required in
 some API calls.  This object will also be populated with diverse data,
@@ -829,8 +835,6 @@ The `OSSL_provider_init` entry point does not register any 
algorithms
 that will be needed, but it will return at least these two callbacks
 to enable this process:
 
-
-
 1.  `OSSL_FUNC_QUERY_OPERATION`, which is used to find out what
 implementations of an operation are available.  This must return
 an array of `OSSL_ALGORITHM` (see further down), which maps
@@ -838,7 +842,7 @@ to enable this process:
 dispatch tables.  This function must also be able to indicate if
 the resulting array may be cached by the Core or not. This is
 explained in further detail below.
-1.  `OSSL_FUNC_TEARDOWN`, which is used when the provider is unloaded.
+2.  `OSSL_FUNC_TEARDOWN`, which is used when the provider is unloaded.
 
 The provider register callback can only be run after the
 `OSSL_provider_init()` call succeeds.
@@ -887,8 +891,8 @@ form of a function table.
 
 A provider will also offer a service for returning information (in the
 form of parameters as specified in
-[Appendix 2 - Parameter Passing](#appendix-2---parameter-passing)) via a 
callback provided by the
-provider, such as:
+[Appendix 2 - Parameter Passing](#appendix-2---parameter-passing)) via
+a callback provided by the provider, such as:
 
 
 *   version number
@@ -912,7 +916,7 @@ are required:
 #define OSSL_OP_DIGEST_UPDATE_FUNC 3
 #define OSSL_OP_DIGEST_FINAL_FUNC  4
 #define OSSL_OP_DIGEST_FREECTX_FUNC5
-typedef void *(*OSSL_OP_digest_newctx_fn)(const OSSL_PROVIDER *prov);
+typedef void *(*OSSL_OP_digest_newctx_fn)(void *provctx);
 typedef int (*OSSL_OP_digest_init_fn)(void *ctx);
 typedef int (*OSSL_OP_digest_update_fn)(void *ctx, void *data, size_t len);
 typedef int (*OSSL_OP_digest_final_fn)(void *ctx, void *md, size_t mdsize,
@@ -925,7 +929,7 @@ multi-part operations:
 
 ``` C
 #define OSSL_OP_DIGEST_FUNC6
-typedef int (*OSSL_OP_digest)(const OSSL_PROVIDER *prov,
+typedef int (*OSSL_OP_digest)(void *provctx,
   const void *data, size_t len,
   unsigned char *md, size_t mdsize,
   size_t *outlen);
@@ -974,8 +978,8 @@ The FIPS provider init module entry point function might 
look like
 this:
 
 ``` C
-static int fips_query_operation(const OSSL_PROVIDER *provider,
- int op_id, const OSSL_ALGORITHM **map)
+static int fips_query_operation(void *provctx, int op_id,
+const OSSL_ALGORITHM **map)
 {
 *map = NULL;
 switch (op_id) {
@@ -991,8 +995,7 @@ static int fips_query_operation(c

[web] master update

2019-03-15 Thread Richard Levitte
The branch master has been updated
   via  76edf555401fd18e31b6968edee6b2bb46391edd (commit)
  from  f9256cd07bd1f33a8359540133e03d7c37afdd42 (commit)


- Log -
commit 76edf555401fd18e31b6968edee6b2bb46391edd
Author: Dr. Matthias St. Pierre 
Date:   Fri Mar 15 00:58:43 2019 +0100

OpenSSL300Design: fix two broken links

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/126)

---

Summary of changes:
 docs/OpenSSL300Design.md | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/docs/OpenSSL300Design.md b/docs/OpenSSL300Design.md
index d30e8fe..83e718c 100644
--- a/docs/OpenSSL300Design.md
+++ b/docs/OpenSSL300Design.md
@@ -553,7 +553,7 @@ The OpenSSL Core and providers have to exchange data while 
keeping
 OpenSSL and provider structures opaque.  All composite values will be
 passed as an array of items, using the public data structure defined
 in
-[Appendix 2 - OpenSSL parameter passing](#openssl-parameter-passing).
+[Appendix 2 - OpenSSL parameter passing](#appendix-2---parameter-passing).
 Parameters will be identified using their name (as a string) and each
 contains its own type and size information.
 
@@ -2118,7 +2118,7 @@ All ASN.1 serialization/deserialization will be performed 
in
 libcrypto, with composite-value **key, parameter and signature**
 structures crossing the Core/provider boundary as an array of items,
 using the public data structure defined in
-[Appendix 2 - OpenSSL parameter 
passing](#appendix-2---openssl-parameter-passing).
+[Appendix 2 - OpenSSL parameter passing](#appendix-2---parameter-passing).
 
 The encoded digest OIDs used for **RSA PKCS #1 padding** will either
 be pre-generated (as was done in the old FIPS module using the SHA_DATA macro)


[web] master update

2019-03-15 Thread Richard Levitte
The branch master has been updated
   via  f9256cd07bd1f33a8359540133e03d7c37afdd42 (commit)
  from  497e8bf4a455aa2adc495777e49ad32e133a7d34 (commit)


- Log -
commit f9256cd07bd1f33a8359540133e03d7c37afdd42
Author: Dr. Matthias St. Pierre 
Date:   Fri Mar 15 01:25:06 2019 +0100

OpenSSL300Design: lighten watermark

The strong DRAFT watermark is very distracting while reading and makes
the eyes loose the current reading position while scrolling.

Reviewed-by: Tim Hudson 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/127)

---

Summary of changes:
 bin/md-to-html5.tmpl.html5 | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/bin/md-to-html5.tmpl.html5 b/bin/md-to-html5.tmpl.html5
index d784305..b1c597f 100644
--- a/bin/md-to-html5.tmpl.html5
+++ b/bin/md-to-html5.tmpl.html5
@@ -8,7 +8,7 @@ $endfor$
 

[web] master update

2019-03-06 Thread Matt Caswell
The branch master has been updated
   via  497e8bf4a455aa2adc495777e49ad32e133a7d34 (commit)
  from  b221da5e00d3e9304664f605c132a18674a343e5 (commit)


- Log -
commit 497e8bf4a455aa2adc495777e49ad32e133a7d34
Author: Matt Caswell 
Date:   Wed Mar 6 15:12:07 2019 +

Website updates for CVE-2019-1543

Reviewed-by: Mark J. Cox 
(Merged from https://github.com/openssl/web/pull/125)

---

Summary of changes:
 news/newsflash.txt   |  1 +
 news/secadv/20190306.txt | 61 
 news/vulnerabilities.xml | 58 -
 3 files changed, 119 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20190306.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index b458dc4..1346f6e 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+06-Mar-2019: Security Advisory: one 
low severity fix in ChaCha20-Poly1305
 26-Feb-2019: OpenSSL 1.1.1b is now available, including bug fixes
 26-Feb-2019: OpenSSL 1.0.2r is now available, including bug and security fixes
 11-Feb-2019: 3.0.0 Design (draft) is 
now available
diff --git a/news/secadv/20190306.txt b/news/secadv/20190306.txt
new file mode 100644
index 000..50b2744
--- /dev/null
+++ b/news/secadv/20190306.txt
@@ -0,0 +1,61 @@
+OpenSSL Security Advisory [6 March 2019]
+
+
+ChaCha20-Poly1305 with long nonces (CVE-2019-1543)
+==
+
+Severity: Low
+
+ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for 
every
+encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96
+bits (12 bytes). OpenSSL allows a variable nonce length and front pads the 
nonce
+with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a
+nonce to be set of up to 16 bytes. In this case only the last 12 bytes are
+significant and any additional leading bytes are ignored.
+
+It is a requirement of using this cipher that nonce values are unique. Messages
+encrypted using a reused nonce value are susceptible to serious confidentiality
+and integrity attacks. If an application changes the default nonce length to be
+longer than 12 bytes and then makes a change to the leading bytes of the nonce
+expecting the new value to be a new unique nonce then such an application could
+inadvertently encrypt messages with a reused nonce.
+
+Additionally the ignored bytes in a long nonce are not covered by the integrity
+guarantee of this cipher. Any application that relies on the integrity of these
+ignored leading bytes of a long nonce may be further affected.
+
+Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because
+no such use sets such a long nonce value. However user applications that use
+this cipher directly and set a non-default nonce length to be longer than 12
+bytes may be vulnerable.
+
+OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited
+scope of affected deployments this has been assessed as low severity and
+therefore we are not creating new releases at this time. The 1.1.1 mitigation
+for this issue can be found in commit f426625b6a. The 1.1.0 mitigation for this
+issue can be found in commit ee22257b14.
+
+This issue does not impact OpenSSL 1.0.2.
+
+This issue was discovered by Joran Dirk Greef of Ronomon. The fix was developed
+by Matt Caswell from the OpenSSL development team. It was reported to OpenSSL 
on
+26th February 2019.
+
+Note
+
+
+OpenSSL 1.0.2 and 1.1.0 are currently only receiving security updates. Support
+for 1.0.2 will end on 31st December 2019. Support for 1.1.0 will end on 11th
+September 2019. Users of these versions should upgrade to OpenSSL 1.1.1.
+
+References
+==
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20190306.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 5286f54..00518fb 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,63 @@
 
 
-
+
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+  
+
+
+  
+
+Nonce Reuse
+ChaCha20-Poly1305 with long nonces
+
+  ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input 
for every
+  encryption operation. RFC 7539 specifies that the nonce value (IV) 
should be 96
+  bits (12 bytes). OpenSSL allows a variable nonce length and front pads 

[web] master update

2019-03-04 Thread Richard Levitte
The branch master has been updated
   via  b221da5e00d3e9304664f605c132a18674a343e5 (commit)
  from  f6f50f59aea1b6ec6d9cf6849a1866dd1db8cb20 (commit)


- Log -
commit b221da5e00d3e9304664f605c132a18674a343e5
Author: Richard Levitte 
Date:   Fri Mar 1 10:11:51 2019 +0100

Don't try to hide section numbers / links in manpages

In previous times, we produced manpages in apps/, crypto/ and ssl/,
and having to deal with links containing '/man{n}/' was only tedious,
so we simply removed the section numbers from the L<> POD codes.

Now that we've switched to regular manpage layout, removing the
section numbers is not necessary any more, and also leads to incorrect
links when the L<> code refers to pages in a different man section.

Issue was reported on
[openssl-users](https://marc.info/?l=openssl-users&m=155138532927266&w=2).
Thank you Paul Smith

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/124)

---

Summary of changes:
 bin/mk-manpages | 22 +++---
 1 file changed, 7 insertions(+), 15 deletions(-)

diff --git a/bin/mk-manpages b/bin/mk-manpages
index bc9c793..efc95b1 100755
--- a/bin/mk-manpages
+++ b/bin/mk-manpages
@@ -41,7 +41,6 @@ sub main {
 #
 #   release => "..."# 
 #   subdir  => "..."# The original subdir
-#   sect=> "..."# Output section subdir
 #   sectnum => n# Default section number
 #
 my %data = (
@@ -52,7 +51,7 @@ sub main {
 );
 # These are for display
 my $podfile = File::Spec->catfile( $subdir, $ent );
-my $incfile = File::Spec->catfile( $data{sect},
+my $incfile = File::Spec->catfile( "man$data{sectnum}",
"$origbase.inc" );
 # These are files we're actually manipulating
 my $inpod = File::Spec->catfile( $srcdir, $podfile );
@@ -68,7 +67,7 @@ sub main {
 foreach my $htmlname (
 map { (my $x = $_) =~ s|/|-|g; $x }
 @{$data{names}}) {
-my $htmlfile = File::Spec->catdir( $data{sect},
+my $htmlfile = File::Spec->catdir( "man$data{sectnum}",
"$htmlname.html" );
 my $outhtml = File::Spec->catfile( $wwwdir, $htmlfile );
 $out = $class->genhtml( $release, $title, $origbase,
@@ -90,7 +89,7 @@ sub genhtml {
 
 
 
-
+
 
 
 
@@ -111,8 +110,8 @@ sub genhtml {
 : Docs
 : Manpages
 : $release
-: $data{sect}
-: $htmlbase
+: man$data{sectnum}
+: $htmlbase
 Sitemap
   
 
@@ -145,18 +144,12 @@ sub geninc {
 my $infile = do { local $/; <$fh>; };
 close( $fh );
 
-# L ==> L
-$infile =~ s/L<[^|>]*\|([^>]+)>/L<$1>/g;
-
-# L --> L
-$infile =~ s/L<([^>]+)\(\d\)>/L<$1>/g;
-
 my $out;
 my $pod = Pod::Simple::XHTML->new;
 $pod->html_h_level(3);
-$pod->perldoc_url_prefix("/docs/man$release/$data{sect}/");
+$pod->perldoc_url_prefix("/docs/man$release/man$data{sectnum}/");
 $pod->perldoc_url_postfix(".html");
-$pod->man_url_prefix("/docs/man$release/$data{sect}/");
+$pod->man_url_prefix("/docs/man$release/man");
 $pod->man_url_postfix(".html");
 $pod->html_header('');
 $pod->html_footer('');
@@ -183,7 +176,6 @@ sub getdata {
 s/\n/ /gm;
 if (/^=for comment openssl_manual_section:\s*(\d+)/) {
 $data{sectnum} = "$1";
-$data{sect} = "man$1";
 }
 elsif (/^=head1\s/) {
 $foundname = 0;


[web] master update

2019-02-28 Thread Richard Levitte
The branch master has been updated
   via  f6f50f59aea1b6ec6d9cf6849a1866dd1db8cb20 (commit)
  from  73fe28cd382b6b5fb3c84ec227e8dedce23c2ac4 (commit)


- Log -
commit f6f50f59aea1b6ec6d9cf6849a1866dd1db8cb20
Author: Richard Levitte 
Date:   Thu Feb 28 15:54:12 2019 +0100

bin/mk-manpages: allow slashes in names

The names in the NAME section may describe headers, which contain a slash
for OpenSSL headers.  We deal with that by converting slashes to dashes
for the file names.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/123)

---

Summary of changes:
 bin/mk-manpages | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/bin/mk-manpages b/bin/mk-manpages
index b756128..bc9c793 100755
--- a/bin/mk-manpages
+++ b/bin/mk-manpages
@@ -65,7 +65,9 @@ sub main {
 print $fh $out or $class->die("Can't print $outinc: $!");
 close($fh) or $class->die("Can't close $outinc: $!");
 
-foreach my $htmlname (@{$data{names}}) {
+foreach my $htmlname (
+map { (my $x = $_) =~ s|/|-|g; $x }
+@{$data{names}}) {
 my $htmlfile = File::Spec->catdir( $data{sect},
"$htmlname.html" );
 my $outhtml = File::Spec->catfile( $wwwdir, $htmlfile );


[web] master update

2019-02-28 Thread Richard Levitte
The branch master has been updated
   via  73fe28cd382b6b5fb3c84ec227e8dedce23c2ac4 (commit)
   via  3926d4eec53217895bed4a0dca5394707fbccc66 (commit)
   via  9873de29128aab496a239d4efb6f1f2a0fad6915 (commit)
   via  2caab96c8e0a03e6891a67f1a02b91f3f6f94952 (commit)
   via  ee0137412475ec26b9a9f5f60785d849c89f231f (commit)
   via  8bf82949d36d42eb11836202950256db99bfcc27 (commit)
   via  ea1a835c5069fcb1bdf1126093aeba88f90ef3f7 (commit)
   via  b654262bace5ca81b49e0fc2e62c8ad09809d77e (commit)
   via  d69832a8f9741ef27965e1315fdf53a081457d54 (commit)
   via  d8d36be2491589e2aae592c65fbd5de58383ea46 (commit)
   via  af3fbdeeb010afdb9dba864aee19e18115c0e3f5 (commit)
   via  eb90cf76b940668286deda9035faef001e771945 (commit)
   via  3dcc5b7ed327b993341fe3d25f62f4aba6b4a98c (commit)
   via  b0f6bb016691f83583ef9b7cac1f29901c1e51e6 (commit)
   via  e1b59a61f7397e2e08e572c77997e3ef6157f064 (commit)
  from  160ebaa336556bd42c4df6354f70cabeab77ca7c (commit)


- Log -
commit 73fe28cd382b6b5fb3c84ec227e8dedce23c2ac4
Author: Richard Levitte 
Date:   Mon Feb 25 22:08:15 2019 +0100

Add commentary in the Makefile to explain what is going on

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit 3926d4eec53217895bed4a0dca5394707fbccc66
Author: Richard Levitte 
Date:   Mon Feb 25 01:14:46 2019 +0100

Change news/openssl-notes.html.in to use Template Toolkit

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit 9873de29128aab496a239d4efb6f1f2a0fad6915
Author: Richard Levitte 
Date:   Mon Feb 25 01:00:36 2019 +0100

Clean up .gitignore

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit 2caab96c8e0a03e6891a67f1a02b91f3f6f94952
Author: Richard Levitte 
Date:   Mon Feb 25 00:56:11 2019 +0100

Remove redundancy: generate vulnerabilities indexes from templates

Adapt Makefile accordingly

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit ee0137412475ec26b9a9f5f60785d849c89f231f
Author: Richard Levitte 
Date:   Mon Feb 25 00:36:14 2019 +0100

Remove redundancy: generate source indexes from templates

Adapt Makefile accordingly

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit 8bf82949d36d42eb11836202950256db99bfcc27
Author: Richard Levitte 
Date:   Sun Feb 24 23:14:14 2019 +0100

Remove redundancy: remove the manpage dir cleanup from bin/mk-manpages

Let the Makefile take care of it instead

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit ea1a835c5069fcb1bdf1126093aeba88f90ef3f7
Author: Richard Levitte 
Date:   Sun Feb 24 23:13:23 2019 +0100

Remove redundancy: generate docs/manpages.html from template

Change Makefile accordingly

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit b654262bace5ca81b49e0fc2e62c8ad09809d77e
Author: Richard Levitte 
Date:   Sun Feb 24 23:07:03 2019 +0100

Remove redundancy: generate all manpage indexes from templates

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit d69832a8f9741ef27965e1315fdf53a081457d54
Author: Richard Levitte 
Date:   Sun Feb 24 14:12:54 2019 +0100

Remove redundancy: produce news/changelog.html from a template

This templates produces a list of links to release changelogs from a
passed list of release versions.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit d8d36be2491589e2aae592c65fbd5de58383ea46
Author: Richard Levitte 
Date:   Sun Feb 24 14:01:32 2019 +0100

Remove redundancy: add a template processing script

The choice comes to using [Template Toolkit], as it's powerful,
flexible, and consistent enough.

-

[Template Toolkit]: http://www.template-toolkit.org/

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit af3fbdeeb010afdb9dba864aee19e18115c0e3f5
Author: Richard Levitte 
Date:   Sun Feb 24 13:31:57 2019 +0100

Remove redundancy: strip away hard coded release versions from scripts

Adapt Makefile accordingly

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/120)

commit eb90cf76b940668286deda9035faef001e771945
Author: Richard Levitte 
Date:   Sun Feb 24 13:06:10 2019 +0100

Remove redundancy: documentation

Move the processing of changelogs and notes to use SERIES, using GNU
make features.

This only does part of the job.  A later commit will automatically
create the whole documentation directory structure from templates.

Reviewed-by: Matt Caswe

[web] master update

2019-02-28 Thread Matt Caswell
The branch master has been updated
   via  160ebaa336556bd42c4df6354f70cabeab77ca7c (commit)
  from  419c4314952ac1ad9586bb9b767447242bdfca79 (commit)


- Log -
commit 160ebaa336556bd42c4df6354f70cabeab77ca7c
Author: Matt Caswell 
Date:   Wed Feb 27 16:13:35 2019 +

Add extended support to the support contracts page

Reviewed-by: Tim Hudson 
Reviewed-by: Richard Levitte 
Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/web/pull/122)

---

Summary of changes:
 support/contracts.html | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/support/contracts.html b/support/contracts.html
index 7f35804..1b91cd1 100644
--- a/support/contracts.html
+++ b/support/contracts.html
@@ -41,6 +41,8 @@
US$50,000 annually

  A custom support contract designed to meet the needs of a 
specific Enterprise customer
+ Includes extended support for the immediately previous LTS 
release
+ beyond the public EOL date for that release
  Exact costs will depend on the terms of the agreed support 
contract

The premium support plan is intended for the large enterprise


[web] master update

2019-02-27 Thread Matt Caswell
The branch master has been updated
   via  419c4314952ac1ad9586bb9b767447242bdfca79 (commit)
   via  1700dfb97f7690b6656018b271cdddbc5c880f26 (commit)
   via  9d38ec2ec727e861507a0a71df35f080f981 (commit)
   via  19379975053b4f59b8a57fd6f9648c94589acffc (commit)
   via  5977b703ae5371458c39208dd5e3ba7257ee18f1 (commit)
  from  4b05bbb28879460b203a4c99ed0c70c12c63a265 (commit)


- Log -
commit 419c4314952ac1ad9586bb9b767447242bdfca79
Author: Matt Caswell 
Date:   Mon Feb 25 16:20:13 2019 +

Update the release strategy modification date

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/82)

commit 1700dfb97f7690b6656018b271cdddbc5c880f26
Author: Matt Caswell 
Date:   Fri Sep 21 14:11:32 2018 +0100

Add a stability policy to the release strategy

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/82)

commit 9d38ec2ec727e861507a0a71df35f080f981
Author: Richard Levitte 
Date:   Sun Jan 13 00:48:43 2019 +0100

Generalise the descriptions of alpha, beta, and release criteria

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/82)

commit 19379975053b4f59b8a57fd6f9648c94589acffc
Author: Richard Levitte 
Date:   Sun Jan 13 00:39:00 2019 +0100

Remove the 1.1.1 time table and add support information

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/82)

commit 5977b703ae5371458c39208dd5e3ba7257ee18f1
Author: Richard Levitte 
Date:   Sun Jan 13 00:31:36 2019 +0100

Release strategy: add text on the 3.0.0 versioning scheme

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/82)

---

Summary of changes:
 policies/releasestrat.html | 181 ++---
 1 file changed, 122 insertions(+), 59 deletions(-)

diff --git a/policies/releasestrat.html b/policies/releasestrat.html
index 0bb80f5..b0d3686 100644
--- a/policies/releasestrat.html
+++ b/policies/releasestrat.html
@@ -13,34 +13,68 @@
  Release Strategy
  
First issued 23rd December 2014
-   Last modified 29th May 2018
+   Last modified 25th February 2019
  

 

 
  
- As of release 1.0.0 the OpenSSL versioning scheme was improved
- to better meet developers' and vendors' expectations. Letter
- releases, such as 1.0.2a, exclusively contain bug and security
- fixes and no new features. Minor releases that change the
- last digit, e.g. 1.1.0 vs. 1.1.1, can and are likely to
- contain new features, but in a way that does not break binary
- compatibility. This means that an application compiled and
- dynamically linked with 1.1.0 does not need to be recompiled
- when the shared library is updated to 1.1.1. It should be
- noted that some features are transparent to the application
- such as the maximum negotiated TLS version and cipher suites,
- performance improvements and so on. There is no need to
- recompile applications to benefit from these features.
+   As of release 3.0.0, the OpenSSL versioning scheme is changing
+   to a more contemporary format: MAJOR.MINOR.PATCH
+ 
+
+ 
+   With this format, API/ABI compatibility will be guaranteed
+   for the same MAJOR version number. Previously we guaranteed
+   API/ABI compatibility across the same MAJOR.MINOR combination.
+ 
+
+ 
+   MAJOR: API/ABI incompatible changes will increase this 
number
+   MINOR: API/ABI compatible feature releases will change this
+   PATCH: Bug fix releases will increment this number. We also
+allow backporting of accessor functions in these releases.
+ 
+
+ 
+   This more closely aligns with the expectations of users who are
+   familiar with semantic versioning.  However, we have not adopted
+   semantic versioning in the strict sense of its rules, because it
+   would mean changing our current LTS policies and practices.
+ 
+
+ 
+   The current 1.1.1 and 1.0.2 versioning scheme remains unchanged:
+
+   
+ As of release 1.0.0 the OpenSSL versioning scheme was improved
+ to better meet developers' and vendors' expectations. Letter
+ releases, such as 1.0.2a, exclusively contain bug and security
+ fixes and no new features. Releases that change the last digit,
+ e.g. 1.1.0 vs. 1.1.1, can and are likely to
+ contain new features, but in a way that does not break binary
+ compatibility. This means that an application compiled 

[web] master update

2019-02-26 Thread Matt Caswell
The branch master has been updated
   via  4b05bbb28879460b203a4c99ed0c70c12c63a265 (commit)
  from  6f4edf054e16bec8cb590de4b77c523334ebfe28 (commit)


- Log -
commit 4b05bbb28879460b203a4c99ed0c70c12c63a265
Author: Matt Caswell 
Date:   Tue Feb 26 16:49:35 2019 +

Clarify the advisory regarding AEAD ciphersuites

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/121)

---

Summary of changes:
 news/secadv/20190226.txt | 4 +++-
 news/vulnerabilities.xml | 2 +-
 2 files changed, 4 insertions(+), 2 deletions(-)

diff --git a/news/secadv/20190226.txt b/news/secadv/20190226.txt
index 8a4a6dd..64cdbe2 100644
--- a/news/secadv/20190226.txt
+++ b/news/secadv/20190226.txt
@@ -18,7 +18,7 @@ In order for this to be exploitable "non-stitched" 
ciphersuites must be in use.
 Stitched ciphersuites are optimised implementations of certain commonly used
 ciphersuites. Also the application must call SSL_shutdown() twice even if a
 protocol error has occurred (applications should not do this but some do
-anyway).
+anyway). AEAD ciphersuites are not impacted.
 
 This issue does not impact OpenSSL 1.1.1 or 1.1.0.
 
@@ -28,6 +28,8 @@ This issue was discovered by Juraj Somorovsky, Robert Merget 
and Nimrod Aviram,
 with additional investigation by Steven Collison and Andrew Hourselt. It was
 reported to OpenSSL on 10th December 2018.
 
+Note: Advisory updated to make it clearer that AEAD ciphersuites are not 
impacted.
+
 Note
 
 
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 1732db5..5286f54 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -47,7 +47,7 @@
   Stitched ciphersuites are optimised implementations of certain commonly 
used
   ciphersuites. Also the application must call SSL_shutdown() twice even 
if a
   protocol error has occurred (applications should not do this but some do
-  anyway).
+  anyway). AEAD ciphersuites are not impacted.
 
 
 


[web] master update

2019-02-26 Thread Matt Caswell
The branch master has been updated
   via  6f4edf054e16bec8cb590de4b77c523334ebfe28 (commit)
  from  604491061a61f0e554cdd38354df341f57ee9fc1 (commit)


- Log -
commit 6f4edf054e16bec8cb590de4b77c523334ebfe28
Author: Matt Caswell 
Date:   Tue Feb 26 14:31:17 2019 +

Updates for new releases

Reviewed-by: Richard Levitte 

---

Summary of changes:
 news/newsflash.txt   |  2 ++
 news/secadv/20190226.txt | 48 
 news/vulnerabilities.xml | 46 +-
 3 files changed, 95 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20190226.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 5ded4d4..b458dc4 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,8 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+26-Feb-2019: OpenSSL 1.1.1b is now available, including bug fixes
+26-Feb-2019: OpenSSL 1.0.2r is now available, including bug and security fixes
 11-Feb-2019: 3.0.0 Design (draft) is 
now available
 11-Feb-2019: Strategic 
Architecture for OpenSSL 3.0.0 and beyond is now available
 20-Nov-2018: OpenSSL 1.1.1a is now available, including bug and security fixes
diff --git a/news/secadv/20190226.txt b/news/secadv/20190226.txt
new file mode 100644
index 000..8a4a6dd
--- /dev/null
+++ b/news/secadv/20190226.txt
@@ -0,0 +1,48 @@
+OpenSSL Security Advisory [26 February 2019]
+
+
+0-byte record padding oracle (CVE-2019-1559)
+
+
+Severity: Moderate
+
+If an application encounters a fatal protocol error and then calls
+SSL_shutdown() twice (once to send a close_notify, and once to receive one) 
then
+OpenSSL can respond differently to the calling application if a 0 byte record 
is
+received with invalid padding compared to if a 0 byte record is received with 
an
+invalid MAC. If the application then behaves differently based on that in a way
+that is detectable to the remote peer, then this amounts to a padding oracle
+that could be used to decrypt data.
+
+In order for this to be exploitable "non-stitched" ciphersuites must be in use.
+Stitched ciphersuites are optimised implementations of certain commonly used
+ciphersuites. Also the application must call SSL_shutdown() twice even if a
+protocol error has occurred (applications should not do this but some do
+anyway).
+
+This issue does not impact OpenSSL 1.1.1 or 1.1.0.
+
+OpenSSL 1.0.2 users should upgrade to 1.0.2r.
+
+This issue was discovered by Juraj Somorovsky, Robert Merget and Nimrod Aviram,
+with additional investigation by Steven Collison and Andrew Hourselt. It was
+reported to OpenSSL on 10th December 2018.
+
+Note
+
+
+OpenSSL 1.0.2 and 1.1.0 are currently only receiving security updates. Support
+for 1.0.2 will end on 31st December 2019. Support for 1.1.0 will end on 11th
+September 2019. Users of these versions should upgrade to OpenSSL 1.1.1.
+
+References
+==
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20190226.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index d9b42bd..1732db5 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,51 @@
 
 
-
+
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+  
+
+Padding Oracle
+0-byte record padding oracle
+
+  If an application encounters a fatal protocol error and then calls
+  SSL_shutdown() twice (once to send a close_notify, and once to receive 
one) then
+  OpenSSL can respond differently to the calling application if a 0 byte 
record is
+  received with invalid padding compared to if a 0 byte record is received 
with an
+  invalid MAC. If the application then behaves differently based on that 
in a way
+  that is detectable to the remote peer, then this amounts to a padding 
oracle
+  that could be used to decrypt data.
+
+  In order for this to be exploitable "non-stitched" ciphersuites must be 
in use.
+  Stitched ciphersuites are optimised implementations of certain commonly 
used
+  ciphersuites. Also the application must call SSL_shutdown() twice even 
if a
+  protocol error has occurred (applications should not do this but some do
+  anyway).
+
+
+
+  
   
 
 


[web] master update

2019-02-17 Thread Richard Levitte
The branch master has been updated
   via  604491061a61f0e554cdd38354df341f57ee9fc1 (commit)
   via  9a8296e24a0b4dc88cda33aacdab44676906f7c5 (commit)
  from  c2804b5a37217fccddacb44e5dc2791f962759ac (commit)


- Log -
commit 604491061a61f0e554cdd38354df341f57ee9fc1
Author: Richard Levitte 
Date:   Sat Feb 16 14:02:44 2019 +0100

3.0.0 design doc: /usr/share -> /usr/lib

/usr/share was a bad example for storing modules

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/119)

commit 9a8296e24a0b4dc88cda33aacdab44676906f7c5
Author: Richard Levitte 
Date:   Sat Feb 16 14:02:04 2019 +0100

3.0.0 design doc: mark all code sections with a language where possible

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/119)

---

Summary of changes:
 docs/OpenSSL300Design.md | 33 -
 1 file changed, 16 insertions(+), 17 deletions(-)

diff --git a/docs/OpenSSL300Design.md b/docs/OpenSSL300Design.md
index 30a02eb..d30e8fe 100644
--- a/docs/OpenSSL300Design.md
+++ b/docs/OpenSSL300Design.md
@@ -420,7 +420,7 @@ create and provide its own library context, an internal 
default one
 will be used.
 
 
-```
+``` C
 OPENSSL_CTX *OPENSSL_CTX_new();
 void OPENSSL_CTX_free(OPENSSL_CTX *ctx);
 ```
@@ -707,7 +707,7 @@ entry point.
 
 A provider module _must_ have the following  well known entry point:
 
-```
+``` C
 int OSSL_provider_init(const OSSL_PROVIDER *provider,
const OSSL_DISPATCH *in,
const OSSL_DISPATCH **out);
@@ -735,7 +735,7 @@ function-pointer >` tuple mentioned in the introduction of
 [Core and Provider Design](#core-and-provider-design):
 
 
-```
+``` C
 typedef struct ossl_dispatch_st {
 int function_id;
 void *(*function)();
@@ -760,7 +760,7 @@ numbers. More function numbers can be added in later 
releases as
 required without breaking backwards compatibility.
 
 
-```
+``` C
 /* Functions provided by the Core to the provider */
 #define OSSL_FUNC_ERR_PUT_ERROR1
 #define OSSL_FUNC_GET_PARAMS   2
@@ -773,7 +773,7 @@ required without breaking backwards compatibility.
 The Core will set up an array of the well known callback functions:
 
 
-```
+``` C
 static OSSL_DISPATCH core_callbacks[] = {
 { OSSL_FUNC_ERR_PUT_ERROR, ERR_put_error },
 /* int ossl_get_params(OSSL_PROVIDER *prov, OSSL_PARAM params[]); */
@@ -789,7 +789,7 @@ testing, instrumentation etc as the need comes up.
 Once the module is loaded and the well known entry point located, the
 init entry point can be invoked by the Core:
 
-```
+``` C
 /*
  * NOTE: this code is meant as a simple demonstration of what could happen
  * in the core.  This is an area where the OSSL_PROVIDER type is not opaque.
@@ -857,7 +857,7 @@ code.
 Operations are identified by a unique number. For example:
 
 
-```
+``` C
 #define OSSL_OP_DIGEST 1
 #define OSSL_OP_SYM_ENCRYPT2
 #define OSSL_OP_SEAL   3
@@ -906,7 +906,7 @@ for init functions for other operations, those will have 
their own
 unique numbers. For example, for the digest operation, these functions
 are required:
 
-```
+``` C
 #define OSSL_OP_DIGEST_NEWCTX_FUNC 1
 #define OSSL_OP_DIGEST_INIT_FUNC   2
 #define OSSL_OP_DIGEST_UPDATE_FUNC 3
@@ -923,7 +923,7 @@ typedef void (*OSSL_OP_digest_freectx_fn)(void *ctx);
 An all in one version is also advisable for devices that cannot handle
 multi-part operations:
 
-```
+``` C
 #define OSSL_OP_DIGEST_FUNC6
 typedef int (*OSSL_OP_digest)(const OSSL_PROVIDER *prov,
   const void *data, size_t len,
@@ -938,7 +938,7 @@ for each operation.  The algorithm descriptor was mentioned 
higher up,
 and would be publically defined like this:
 
 
-```
+``` C
 typedef struct ossl_algorithm_st {
 const char *name;
 const char *properties;
@@ -952,7 +952,7 @@ querying function such as `fips_query_operation` below 
returns) the
 FIPS module may define arrays like this for the SHA1 algorithm:
 
 
-```
+``` C
 static OSSL_DISPATCH fips_sha1_callbacks[] = {
 { OSSL_OP_DIGEST_NEWCTX_FUNC, fips_sha1_newctx },
 { OSSL_OP_DIGEST_INIT_FUNC, fips_sha1_init },
@@ -1105,8 +1105,7 @@ application to specify a non-default library context if 
required
 (`osslctx` in this example):
 
 
-```
-
+``` C
 EVP_CIPHER_CTX *ctx;
 EVP_CIPHER *ciph;
 
@@ -2344,7 +2343,7 @@ There is functionality to create diverse EVP method 
structures in
 OpenSSL 1.1.x, easily found like this:
 
 
-```
+``` shell
 grep EVP_CIPHER_meth util/libcrypto.num
 grep EVP_MD_meth util/libcrypto.num
 grep EVP_PKEY_meth util/libcrypto.num
@@ -2663,7 +2662,7 @@ time.
 
 We have macros to declare the type of content in `data_type`:
 
-```
+`

[web] master update

2019-02-17 Thread Matt Caswell
The branch master has been updated
   via  c2804b5a37217fccddacb44e5dc2791f962759ac (commit)
  from  d58a4110c94ead1c72693c86e1d5841620209660 (commit)


- Log -
commit c2804b5a37217fccddacb44e5dc2791f962759ac
Author: Matt Caswell 
Date:   Thu Feb 14 14:51:15 2019 +

Remove rel=canonical from head.shtml

With that line we are claiming that all our web pages are synonyms of the
home page.

Fixes #117

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/118)

---

Summary of changes:
 inc/head.shtml | 1 -
 1 file changed, 1 deletion(-)

diff --git a/inc/head.shtml b/inc/head.shtml
index 244afed..c622c8b 100644
--- a/inc/head.shtml
+++ b/inc/head.shtml
@@ -9,7 +9,6 @@
   
   
 
-  https://www.openssl.org/";>
   
   
 


[openssl-commits] [web] master update

2019-02-15 Thread Richard Levitte
The branch master has been updated
   via  d58a4110c94ead1c72693c86e1d5841620209660 (commit)
  from  5c98cb9a57ad617454a721aa640cb096e09b5e7b (commit)


- Log -
commit d58a4110c94ead1c72693c86e1d5841620209660
Author: Richard Levitte 
Date:   Fri Feb 15 10:16:46 2019 +0100

Typo

---

Summary of changes:
 news/newsflash.txt | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index d5d6e56..5ded4d4 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -5,7 +5,7 @@
 # headings.  URL paths must all be absolute.
 Date: Item
 11-Feb-2019: 3.0.0 Design (draft) is 
now available
-11-Feb-2019: Strategic 
Architecture for OpenSSL 3.0.0 and beyond is now available
+11-Feb-2019: Strategic 
Architecture for OpenSSL 3.0.0 and beyond is now available
 20-Nov-2018: OpenSSL 1.1.1a is now available, including bug and security fixes
 20-Nov-2018: OpenSSL 1.1.0j is now available, including bug and security fixes
 20-Nov-2018: OpenSSL 1.0.2q is now available, including bug and security fixes
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2019-02-11 Thread Richard Levitte
The branch master has been updated
   via  5c98cb9a57ad617454a721aa640cb096e09b5e7b (commit)
  from  f758bad1d2241ae88a3065b974313d78a8978200 (commit)


- Log -
commit 5c98cb9a57ad617454a721aa640cb096e09b5e7b
Author: Richard Levitte 
Date:   Mon Feb 11 23:59:21 2019 +0100

Fix CSS props for code color

The 'pre' CSS is enough, we have no need for variants for 'p code',
'li code', 'p pre code' and 'li pre code'...

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/116)

---

Summary of changes:
 inc/screen.css | 42 +-
 1 file changed, 21 insertions(+), 21 deletions(-)

diff --git a/inc/screen.css b/inc/screen.css
index 9938bcc..29b74b9 100644
--- a/inc/screen.css
+++ b/inc/screen.css
@@ -1084,27 +1084,27 @@ h3.filename + pre {
   border-top-right-radius: 0px;
 }
 
-p code, li code {
-  display: inline-block;
-  white-space: no-wrap;
-  background: #fff;
-  font-size: .8em;
-  line-height: 1.5em;
-  color: #555;
-  border: 1px solid #ddd;
-  -webkit-border-radius: 0.4em;
-  -moz-border-radius: 0.4em;
-  -ms-border-radius: 0.4em;
-  -o-border-radius: 0.4em;
-  border-radius: 0.4em;
-  padding: 0 .3em;
-  margin: -1px 0;
-}
-p pre code, li pre code {
-  font-size: 1em !important;
-  background: none;
-  border: none;
-}
+//p code, li code {
+//  display: inline-block;
+//  white-space: no-wrap;
+//  background: #fff;
+//  font-size: .8em;
+//  line-height: 1.5em;
+//  color: #555;
+//  border: 1px solid #ddd;
+//  -webkit-border-radius: 0.4em;
+//  -moz-border-radius: 0.4em;
+//  -ms-border-radius: 0.4em;
+//  -o-border-radius: 0.4em;
+//  border-radius: 0.4em;
+//  padding: 0 .3em;
+//  margin: -1px 0;
+//}
+//p pre code, li pre code {
+//  font-size: 1em !important;
+//  background: none;
+//  border: none;
+//}
 
 .pre-code, html .highlight pre, .highlight code {
   font-family: Menlo, Monaco, "Andale Mono", "lucida console", "Courier New", 
monospace !important;
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2019-02-11 Thread Richard Levitte
The branch master has been updated
   via  f758bad1d2241ae88a3065b974313d78a8978200 (commit)
  from  2377ab72410b9c117e9a88cecbad83c6a2827220 (commit)


- Log -
commit f758bad1d2241ae88a3065b974313d78a8978200
Author: Richard Levitte 
Date:   Mon Feb 11 22:41:12 2019 +0100

Stray 'q' begone!

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/115)

---

Summary of changes:
 docs/index.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/docs/index.html b/docs/index.html
index 1279b6d..a0297d0 100644
--- a/docs/index.html
+++ b/docs/index.html
@@ -46,7 +46,7 @@
It is highly recommended.

  
-q
+ 
You are here: Home
: Documentation
Sitemap
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2019-02-11 Thread Richard Levitte
The branch master has been updated
   via  2377ab72410b9c117e9a88cecbad83c6a2827220 (commit)
   via  e9ab2edffc56f8a840347ef7c35cc55cc6879744 (commit)
  from  e56baa71b5cc8028e08e8a3027ea9ecf3f27dbd0 (commit)


- Log -
commit 2377ab72410b9c117e9a88cecbad83c6a2827220
Author: Richard Levitte 
Date:   Mon Feb 11 20:49:51 2019 +0100

Make a general rule for converting markdown to html5

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/114)

commit e9ab2edffc56f8a840347ef7c35cc55cc6879744
Author: Richard Levitte 
Date:   Mon Feb 11 20:49:13 2019 +0100

Publish  the Strategic Architecture and 3.0.0 Design (draft) documents

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/114)

---

Summary of changes:
 Makefile   | 13 ++---
 docs/index.html| 11 ++-
 news/newsflash.txt |  2 ++
 3 files changed, 18 insertions(+), 8 deletions(-)

diff --git a/Makefile b/Makefile
index a8dbae6..37ffb75 100644
--- a/Makefile
+++ b/Makefile
@@ -43,6 +43,12 @@ SRCLISTS = \
   source/old/fips/index.inc \
 
 
+.SUFFIXES: .md .html
+
+.md.html:
+   @rm -f $@
+   ./bin/md-to-html5 $<
+
 all: suball manmaster mancross
 
 suball: $(SIMPLE) $(SRCLISTS)
@@ -108,13 +114,6 @@ docs/fips.inc: $(wildcard docs/fips/*) bin/mk-filelist
@rm -f $@
./bin/mk-filelist docs/fips fips/ '*' >$@
 
-docs/OpenSSLStrategicArchitecture.html: docs/OpenSSLStrategicArchitecture.md
-   @rm -f $@
-   ./bin/md-to-html5 $<
-docs/OpenSSL300Design.html: docs/OpenSSL300Design.md
-   @rm -f $@
-   ./bin/md-to-html5 $<
-
 news/changelog.inc: news/changelog.txt bin/mk-changelog
@rm -f $@
./bin/mk-changelog $@
diff --git a/docs/index.html b/docs/index.html
index 7fcbc9a..1279b6d 100644
--- a/docs/index.html
+++ b/docs/index.html
@@ -11,6 +11,15 @@

  Documentation
  
+   
+ We have a
+ Strategic
+ Architecture for the development of OpenSSL from
+ 3.0.0 and going forward, as well as a
+ design for 3.0.0 (draft)
+ specifically.
+   
+
The
frequently-asked questions (FAQ)
 is available.  So is an incomplete list of
@@ -37,7 +46,7 @@
It is highly recommended.

  
- 
+q
You are here: Home
: Documentation
Sitemap
diff --git a/news/newsflash.txt b/news/newsflash.txt
index 07229f2..d5d6e56 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,8 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+11-Feb-2019: 3.0.0 Design (draft) is 
now available
+11-Feb-2019: Strategic 
Architecture for OpenSSL 3.0.0 and beyond is now available
 20-Nov-2018: OpenSSL 1.1.1a is now available, including bug and security fixes
 20-Nov-2018: OpenSSL 1.1.0j is now available, including bug and security fixes
 20-Nov-2018: OpenSSL 1.0.2q is now available, including bug and security fixes
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2019-01-31 Thread Richard Levitte
The branch master has been updated
   via  86790fc138e335918125ccd51941958785e840d5 (commit)
   via  b36b544b878c13b91109743220590fa7e9af5508 (commit)
  from  1763c4db685b43c58b33d2ace0435da1a067ba24 (commit)


- Log -
commit 86790fc138e335918125ccd51941958785e840d5
Author: Richard Levitte 
Date:   Tue Jan 29 14:10:00 2019 +0100

Add the OpenSSL Strategic Architecture document

Includes notes on how to convert documents from Google Docs to Markdown.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/110)

commit b36b544b878c13b91109743220590fa7e9af5508
Author: Richard Levitte 
Date:   Wed Jan 30 13:50:48 2019 +0100

bin/md-to-html5: change output directory

The output directory should be the same as for the input file

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/111)

---

Summary of changes:
 Makefile |   5 +
 bin/md-to-html5  |   6 +-
 docs/OpenSSLStrategicArchitecture.md | 290 +++
 docs/README.googledocs.md|  77 ++
 docs/images/AsIsComponent.png| Bin 0 -> 52562 bytes
 docs/images/AsIsPackaging.png| Bin 0 -> 36348 bytes
 docs/images/ToBeComponent.png| Bin 0 -> 73449 bytes
 docs/images/ToBePackaging.png| Bin 0 -> 65063 bytes
 8 files changed, 375 insertions(+), 3 deletions(-)
 create mode 100644 docs/OpenSSLStrategicArchitecture.md
 create mode 100644 docs/README.googledocs.md
 create mode 100644 docs/images/AsIsComponent.png
 create mode 100644 docs/images/AsIsPackaging.png
 create mode 100644 docs/images/ToBeComponent.png
 create mode 100644 docs/images/ToBePackaging.png

diff --git a/Makefile b/Makefile
index d1a8651..f799e85 100644
--- a/Makefile
+++ b/Makefile
@@ -14,6 +14,7 @@ SIMPLE = newsflash.inc sitemap.txt \
 community/committers.inc \
 community/omc.inc community/omc-alumni.inc \
 docs/faq.inc docs/fips.inc \
+docs/OpenSSLStrategicArchitecture.html \
  news/changelog.inc news/changelog.txt \
  news/cl102.txt news/cl110.txt news/cl111.txt \
  news/openssl-1.0.2-notes.inc \
@@ -106,6 +107,10 @@ docs/fips.inc: $(wildcard docs/fips/*) bin/mk-filelist
@rm -f $@
./bin/mk-filelist docs/fips fips/ '*' >$@
 
+docs/OpenSSLStrategicArchitecture.html: docs/OpenSSLStrategicArchitecture.md
+   @rm -f $@
+   ./bin/md-to-html5 $<
+
 news/changelog.inc: news/changelog.txt bin/mk-changelog
@rm -f $@
./bin/mk-changelog $@
diff --git a/bin/md-to-html5 b/bin/md-to-html5
index 7bb815b..08aac34 100755
--- a/bin/md-to-html5
+++ b/bin/md-to-html5
@@ -4,12 +4,12 @@ template="$0.tmpl.html5"
 
 for f in "$@"; do
 b=`basename "$f" .md`
+d=`dirname "$f"`
 if [ "$f" != "$b" ]; then
-   bns=`echo "$b" | sed -e 's|  *||g'`
-   t=`dirname "$b"`.tmpl.html5
+   t="$d/$b.tmpl.html5"
if [ ! -f "$t" ]; then
t="$template"
fi
-   pandoc -t html5 --template="$t" "$f" > "$bns.html"
+   pandoc -t html5 --template="$t" "$f" > "$d/$b.html"
 fi
 done
diff --git a/docs/OpenSSLStrategicArchitecture.md 
b/docs/OpenSSLStrategicArchitecture.md
new file mode 100644
index 000..ecc8fd1
--- /dev/null
+++ b/docs/OpenSSLStrategicArchitecture.md
@@ -0,0 +1,290 @@
+---
+title: OpenSSL Strategic Architecture
+author: OpenSSL Management Committee (OMC)
+date: January, 2019
+---
+## Introduction
+
+This document outlines the OpenSSL strategic architecture. It will take
+multiple releases, starting from 3.0.0, to move the architecture from
+the current "as-is" (1.1.1), to the future "to-be" architecture.
+
+Numerous changes are anticipated in the to-be architecture. A migration
+path for handling the eventual transition will be provided. The OpenSSL
+3.0.0 release will have minimal impact to the vast majority of existing
+applications, almost all well-behaved applications will just need to be
+recompiled.
+
+The current functionality provided by the engine interface will be
+replaced over time via a provider interface. OpenSSL 3.0.0 will continue
+to support engines. The to-be architecture will not be fully realised
+until OpenSSL 4.0.0 at the earliest.
+
+## As-is architecture
+
+Currently, OpenSSL is split into four principal components:
+
+1.  libcrypto. This is the core library for providing implementations of
+numerous cryptographic primitives. In addition it provides a set of
+supporting services which are used by libssl and libcrypto, as well
+as implementations of protocols such as CMS and OCSP.
+
+2.  Engine. The functionality of libcrypto can be extended through the
+Engine API.
+
+Typically engines are dynamically loadable modules that are registered
+with libcrypto and use the availabl

[openssl-commits] [web] master update

2019-01-30 Thread Richard Levitte
The branch master has been updated
   via  1763c4db685b43c58b33d2ace0435da1a067ba24 (commit)
   via  8e80d7699c38ef890cc62da9fd713bcfc49152db (commit)
   via  98d1be0a1bcd7ae582753e54b523faf6b4bd1360 (commit)
  from  04c0cb565a81ed4357722dcce70c50b3575e2863 (commit)


- Log -
commit 1763c4db685b43c58b33d2ace0435da1a067ba24
Author: Richard Levitte 
Date:   Tue Jan 29 22:21:39 2019 +0100

bin/mk-mancross: new manpage cross reference script

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/107)

commit 8e80d7699c38ef890cc62da9fd713bcfc49152db
Author: Richard Levitte 
Date:   Tue Jan 29 21:33:30 2019 +0100

bin/mk-manpages: refactor to allow cross references between releases

So far, we created one HTML file for each POD file, and then made hard
links to it for other names that are in the POD file's NAMES section.

However, this came with the assumption that cross referencing between
releases would work simply be linking to the same name on other
releases.  This, however, did not take into account that manuals in
newer releases don't necessarily exist in older releases, or that some
files may have changed names.

Names in NAMES sections are, however, fairly constant, and are
therefore much safer to link to.  At the same time, it's safe to say
that if a particular name doesn't exist in some other releases, there
should simply not be a link.  A conclusion to draw from is that cross
referencing must be made on a per NAMES section name basis, rather
than on POD file name basis.

To allow this to happen and still not have to rewrite the same
Pod2Html result for every name in a specific POD file's NAMES section,
the structure of the rendered man pages are changed to this:

-   POD files are rendered into a .inc file with the exact same
basename as the POD file.
-   For every name in the NAMES section, am HTML file is created.  It
contains the standard header and footer stuff, and includes the
generated .inc file in the middle.  It also includes a .cross file
with the same basename as the HTML file as part of the sidebar.

In another commit, there will be a script for cross referencing, which
will generate the .cross files mentioned above.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/107)

commit 98d1be0a1bcd7ae582753e54b523faf6b4bd1360
Author: Richard Levitte 
Date:   Thu Jan 3 16:37:24 2019 +0100

Handle document sectioning correctly

Gone are the apps/, crypto/ and ssl/ directories.  We move to a Unix
manpage structure for older releases as well as new ones.

With that, there's no more need for a separate bin/mk-newmanpages,
bin/mk-manpages can handle both the old and the new POD directory
structure.

For a document tree that previously had apps/, crypto/ and ssl/, we
provide a .htaccess that accepts the old URLs and maps them correctly
to man1/ or man3/.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/107)

---

Summary of changes:
 .gitignore   |   1 +
 Makefile |  26 +-
 bin/mk-mancross  |  54 
 bin/mk-manmap|  27 ++
 bin/mk-manpages  | 300 ++---
 bin/mk-newmanpages   | 315 ---
 docs/man1.0.2/crypto/index.html  |  43 
 docs/man1.0.2/index.html |   7 +-
 docs/{man1.1.0/apps => man1.0.2/man1}/index.html |   5 +-
 docs/{man1.1.0/ssl => man1.0.2/man3}/index.html  |  17 +-
 docs/{man1.1.1/man7 => man1.0.2/man5}/index.html |   8 +-
 docs/{man1.1.1 => man1.0.2}/man7/index.html  |   8 +-
 docs/man1.1.0/crypto/index.html  |  43 
 docs/man1.1.0/index.html |   7 +-
 docs/{man1.0.2/apps => man1.1.0/man1}/index.html |   4 +-
 docs/{man1.0.2/ssl => man1.1.0/man3}/index.html  |  16 +-
 docs/{man1.1.1/man7 => man1.1.0/man5}/index.html |   8 +-
 docs/{man1.1.1/man1 => man1.1.0/man7}/index.html |   5 +-
 docs/man1.1.1/man3/index.html|   6 +
 docs/manmaster/man3/index.html   |   6 +
 20 files changed, 306 insertions(+), 600 deletions(-)
 create mode 100755 bin/mk-mancross
 create mode 100755 bin/mk-manmap
 delete mode 100755 bin/mk-newmanpages
 delete mode 100644 docs/man1.0.2/crypto/index.html
 rename docs/{man1.1.0/apps => man1.0.2/man1}/index.html (91%)
 rename docs/{man1.1.0/ssl => man1.0.2/man3}/index.html (68%)
 copy docs/{man1.1.1/man7 => man1.0.2/man5}/index.html (83%)
 copy docs/{man1.1.1 => man1.0.2}

[openssl-commits] [web] master update

2019-01-29 Thread Richard Levitte
The branch master has been updated
   via  04c0cb565a81ed4357722dcce70c50b3575e2863 (commit)
  from  895ee9dcaa50a72637b907dd3ab62723e23863f9 (commit)


- Log -
commit 04c0cb565a81ed4357722dcce70c50b3575e2863
Author: Richard Levitte 
Date:   Tue Jan 29 13:29:23 2019 +0100

mk-apropos: don't include non-manpage files

mk-apropos looks at all HTML files in a given directory, but failed to
recognise files that aren't rendered manpage, such as index.html.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/109)

---

Summary of changes:
 bin/mk-apropos | 5 +
 1 file changed, 5 insertions(+)

diff --git a/bin/mk-apropos b/bin/mk-apropos
index a9dd5b6..64899a4 100755
--- a/bin/mk-apropos
+++ b/bin/mk-apropos
@@ -6,6 +6,11 @@ cd $dir
 
 for m in `find . -name '*.html' | sort`; do
 description=`grep -F '||'`
+# If there isn't a description, it isn't a manpage and should not be
+# included
+if [ "$description" = "" ]; then
+   continue
+fi
 manfile=`echo $m | sed -e 's|\./||'`
 manname=`basename $manfile .html`
 origmanfile=`echo $manfile | sed -e "s|^$subdir|$origsubdir|"`
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2019-01-29 Thread Richard Levitte
The branch master has been updated
   via  895ee9dcaa50a72637b907dd3ab62723e23863f9 (commit)
  from  8557dd2bb3cebee18ec35347250271322b09d5da (commit)


- Log -
commit 895ee9dcaa50a72637b907dd3ab62723e23863f9
Author: Richard Levitte 
Date:   Tue Jan 29 12:43:41 2019 +0100

Markdown to OpenSSL HTML5 pages

Markdown is a popular format for text files, and some documents are
easier to read in this form than in HTML.  For future purposes, this
is the scripts we need to process markdown files into HTML5.

This script is based on pandoc, which is a pretty good translator
between a range of different document formats.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/108)

---

Summary of changes:
 bin/md-to-html5| 15 +++
 bin/md-to-html5.tmpl.html5 | 34 ++
 2 files changed, 49 insertions(+)
 create mode 100755 bin/md-to-html5
 create mode 100644 bin/md-to-html5.tmpl.html5

diff --git a/bin/md-to-html5 b/bin/md-to-html5
new file mode 100755
index 000..7bb815b
--- /dev/null
+++ b/bin/md-to-html5
@@ -0,0 +1,15 @@
+#! /bin/sh
+
+template="$0.tmpl.html5"
+
+for f in "$@"; do
+b=`basename "$f" .md`
+if [ "$f" != "$b" ]; then
+   bns=`echo "$b" | sed -e 's|  *||g'`
+   t=`dirname "$b"`.tmpl.html5
+   if [ ! -f "$t" ]; then
+   t="$template"
+   fi
+   pandoc -t html5 --template="$t" "$f" > "$bns.html"
+fi
+done
diff --git a/bin/md-to-html5.tmpl.html5 b/bin/md-to-html5.tmpl.html5
new file mode 100644
index 000..b1fbe38
--- /dev/null
+++ b/bin/md-to-html5.tmpl.html5
@@ -0,0 +1,34 @@
+
+
+
+
+
+
+
+  
+
+  
+
+$if(title)$
+
+$title$
+$if(subtitle)$
+$subtitle$
+$endif$
+$for(author)$
+$author$
+$endfor$
+$if(date)$
+$date$
+$endif$
+
+$endif$
+$body$
+
+  
+  
+
+  
+
+
+
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2019-01-29 Thread Richard Levitte
The branch master has been updated
   via  8557dd2bb3cebee18ec35347250271322b09d5da (commit)
  from  0ef1cccd789aa8434f9ef8e3783df637d506b53f (commit)


- Log -
commit 8557dd2bb3cebee18ec35347250271322b09d5da
Author: Richard Levitte 
Date:   Tue Dec 25 15:53:29 2018 +0100

Reformat FAQ files

Make them correct Markdown, and then use pandoc to create the FAQ HTML.
We then use CSS and a bit of Javascript to make it an accordion style
FAQ.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/103)

---

Summary of changes:
 bin/mk-faq   | 110 +++--
 docs/faq-1-legal.txt |  42 ++--
 docs/faq-2-user.txt  | 373 +++
 docs/faq-3-prog.txt  | 614 +--
 docs/faq-4-build.txt | 397 -
 docs/faq-5-misc.txt  | 177 ---
 docs/faq-6-old.txt   |  18 +-
 docs/faq.html|   9 +-
 inc/screen.css   | 121 ++
 9 files changed, 951 insertions(+), 910 deletions(-)

diff --git a/bin/mk-faq b/bin/mk-faq
index 531a6c6..0f92d2e 100755
--- a/bin/mk-faq
+++ b/bin/mk-faq
@@ -1,88 +1,30 @@
-#! /usr/bin/perl
-use strict;
-use warnings;
+#! /bin/sh
 
-# Filename->anchor name
-my %anchors;
-foreach my $f ( @ARGV ) {
-next unless $f =~ /faq-[0-9]-(.*).txt/;
-$anchors{$f} = uc($1);
-}
+cat />/' \
+   | sed -E -e 's/<([^<>]*)>\|([A-Z]*[0-9]*)\|/<\1 id="\2">/'
+done
diff --git a/docs/faq-1-legal.txt b/docs/faq-1-legal.txt
index dc69809..1dfc067 100644
--- a/docs/faq-1-legal.txt
+++ b/docs/faq-1-legal.txt
@@ -1,28 +1,28 @@
-Legal Questions
+ Legal Questions
 
-* Do I need patent licenses to use OpenSSL?
+*   Do I need patent licenses to use OpenSSL?
 
-For information on intellectual property rights, please consult a lawyer.
-The OpenSSL team does not offer legal advice.
+For information on intellectual property rights, please consult a lawyer.
+The OpenSSL team does not offer legal advice.
 
-You can configure OpenSSL so as not to use IDEA, MDC2 and RC5 by using
-
-./config no-idea no-mdc2 no-rc5
-
+You can configure OpenSSL so as not to use IDEA, MDC2 and RC5 by using
 
-* Can I use OpenSSL with GPL software?
+./config no-idea no-mdc2 no-rc5
 
-On many systems includi

[openssl-commits] [web] master update

The branch master has been updated
   via  0ef1cccd789aa8434f9ef8e3783df637d506b53f (commit)
   via  d5d657a5d4ee7aa2602d41cdcc5723b191c43a8b (commit)
  from  c49be85acdf6d10bfb17d0a5f1cb6405ae25fcaf (commit)


- Log -
commit 0ef1cccd789aa8434f9ef8e3783df637d506b53f
Merge: c49be85 d5d657a
Author: Mark J. Cox 
Date:   Tue Jan 15 12:02:31 2019 +

Merge pull request #105 from iamamoose/vulns

Add severities that were in the advisories but missing from the 
vulnerability pages, also found a missing vulnerability

commit d5d657a5d4ee7aa2602d41cdcc5723b191c43a8b
Author: Mark J. Cox 
Date:   Tue Jan 15 11:37:51 2019 +

Add severities that were in the advisories but missing from the
vulnerability pages, also found a missing vulnerability

---

Summary of changes:
 news/vulnerabilities.xml | 80 
 1 file changed, 80 insertions(+)

diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 2142ade..d9b42bd 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -3629,6 +3629,7 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+
 
 
 
@@ -3671,6 +3672,7 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+
 
 
 
@@ -3689,6 +3691,7 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+
 
 
 
@@ -3757,8 +3760,79 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+  A carefully crafted DTLS message can cause a segmentation fault in 
OpenSSL due
+  to a NULL pointer dereference. This could lead to a Denial Of Service 
attack.
+
+
+
+
+
   
 
+
 
 
 
@@ -3829,6 +3903,7 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+
 
 
 
@@ -3872,6 +3947,7 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+
 
 
 
@@ -3951,6 +4027,7 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+
 
 
 
@@ -4040,6 +4117,7 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+
 
 
 
@@ -4066,6 +4144,7 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+
 
 
 
@@ -4201,6 +4280,7 @@ the certificate key is invalid. This function is rarely 
used in practice.
 
   
 
+
 
 
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  c49be85acdf6d10bfb17d0a5f1cb6405ae25fcaf (commit)
   via  064a3b32b4890eff85cb8c905d91cf361673e485 (commit)
   via  6869d8b6065b187af840f29a574dace73d05f3c4 (commit)
  from  025f5f461ca3a67091aac0690de2496c03d3ba7f (commit)


- Log -
commit c49be85acdf6d10bfb17d0a5f1cb6405ae25fcaf
Author: Richard Levitte 
Date:   Thu Jan 3 17:23:54 2019 +0100

Generate apropos-like tables instead of filelists for manpages

This works together with bin/mk-manpages' generation of description comment.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/102)

commit 064a3b32b4890eff85cb8c905d91cf361673e485
Author: Richard Levitte 
Date:   Thu Jan 3 17:17:32 2019 +0100

Have bin/mk-manpages and bin/mk-newmanpages add a description comment

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/102)

commit 6869d8b6065b187af840f29a574dace73d05f3c4
Author: Richard Levitte 
Date:   Thu Jan 3 17:11:47 2019 +0100

Change getnames() to getdata(), for generic data retrieval from POD files

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/102)

---

Summary of changes:
 Makefile| 14 +++---
 bin/mk-apropos  | 13 +
 bin/mk-manpages | 43 -
 bin/mk-newmanpages  | 43 -
 docs/man1.0.2/apps/index.html   |  7 +++
 docs/man1.0.2/crypto/index.html |  7 +++
 docs/man1.0.2/ssl/index.html|  7 +++
 docs/man1.1.0/apps/index.html   |  7 +++
 docs/man1.1.0/crypto/index.html |  7 +++
 docs/man1.1.0/ssl/index.html|  7 +++
 docs/man1.1.1/man1/index.html   |  7 +++
 docs/man1.1.1/man3/index.html   |  7 +++
 docs/man1.1.1/man5/index.html   |  7 +++
 docs/man1.1.1/man7/index.html   |  7 +++
 docs/manmaster/man1/index.html  |  7 +++
 docs/manmaster/man3/index.html  |  7 +++
 docs/manmaster/man5/index.html  |  7 +++
 docs/manmaster/man7/index.html  |  7 +++
 18 files changed, 112 insertions(+), 99 deletions(-)
 create mode 100755 bin/mk-apropos

diff --git a/Makefile b/Makefile
index c6c54bb..2418e5e 100644
--- a/Makefile
+++ b/Makefile
@@ -58,16 +58,16 @@ rebuild: all
 
 define makemanpages
./bin/mk-manpages $(1) $(2) docs
-   ./bin/mk-filelist -a docs/man$(2)/apps '' '*.html' 
>docs/man$(2)/apps/index.inc
-   ./bin/mk-filelist -a docs/man$(2)/crypto '' '*.html' 
>docs/man$(2)/crypto/index.inc
-   ./bin/mk-filelist -a docs/man$(2)/ssl '' '*.html' 
>docs/man$(2)/ssl/index.inc
+   ./bin/mk-apropos docs/man$(2)/apps   > docs/man$(2)/apps/index.inc
+   ./bin/mk-apropos docs/man$(2)/crypto > docs/man$(2)/crypto/index.inc
+   ./bin/mk-apropos docs/man$(2)/ssl> docs/man$(2)/ssl/index.inc
 endef
 define newmakemanpages
./bin/mk-newmanpages $(1) $(2) docs
-   ./bin/mk-filelist -a docs/man$(2)/man1 '' '*.html' 
>docs/man$(2)/man1/index.inc
-   ./bin/mk-filelist -a docs/man$(2)/man3 '' '*.html' 
>docs/man$(2)/man3/index.inc
-   ./bin/mk-filelist -a docs/man$(2)/man5 '' '*.html' 
>docs/man$(2)/man5/index.inc
-   ./bin/mk-filelist -a docs/man$(2)/man7 '' '*.html' 
>docs/man$(2)/man7/index.inc
+   ./bin/mk-apropos docs/man$(2)/man1 > docs/man$(2)/man1/index.inc
+   ./bin/mk-apropos docs/man$(2)/man3 > docs/man$(2)/man3/index.inc
+   ./bin/mk-apropos docs/man$(2)/man5 > docs/man$(2)/man5/index.inc
+   ./bin/mk-apropos docs/man$(2)/man7 > docs/man$(2)/man7/index.inc
 endef
 manpages: manmaster
$(call newmakemanpages,$(CHECKOUTS)/openssl-1.1.1-stable,1.1.1)
diff --git a/bin/mk-apropos b/bin/mk-apropos
new file mode 100755
index 000..a9dd5b6
--- /dev/null
+++ b/bin/mk-apropos
@@ -0,0 +1,13 @@
+#! /bin/sh
+# $1 is the top of the manual page tree to look through
+
+dir=$1
+cd $dir
+
+for m in `find . -name '*.html' | sort`; do
+description=`grep -F '||'`
+manfile=`echo $m | sed -e 's|\./||'`
+manname=`basename $manfile .html`
+origmanfile=`echo $manfile | sed -e "s|^$subdir|$origsubdir|"`
+echo "$manname$description"
+done
diff --git a/bin/mk-manpages b/bin/mk-manpages
index f177f3f..0096ec2 100755
--- a/bin/mk-manpages
+++ b/bin/mk-manpages
@@ -56,17 +56,18 @@ sub main {
 my $filename = File::Spec->catfile( $dir, $ent );
 my $basename = basename( $ent, ".pod" );
 my $title = $basename;
+my %data = $class->getdata( $filename );
 my $out =
-  $class->genhtml( $release, $sect, $filename, $title, $basename );
+$class->genhtml( $release, $sect, $filename, $title, $basename,
+ $data{description});
 my $outf

[openssl-commits] [web] master update

The branch master has been updated
   via  025f5f461ca3a67091aac0690de2496c03d3ba7f (commit)
  from  2ee3b78b0e20e1e2e9fc3830813a843567ea94a2 (commit)


- Log -
commit 025f5f461ca3a67091aac0690de2496c03d3ba7f
Author: Dr. Matthias St. Pierre 
Date:   Thu Dec 27 18:33:03 2018 +0100

Add 1.1.1 to manual sidebar

Reviewed-by: Tim Hudson 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/100)

---

Summary of changes:
 inc/mansidebar.shtml | 1 +
 1 file changed, 1 insertion(+)

diff --git a/inc/mansidebar.shtml b/inc/mansidebar.shtml
index 64fd0e9..c794b16 100644
--- a/inc/mansidebar.shtml
+++ b/inc/mansidebar.shtml
@@ -4,6 +4,7 @@
 Manpages
 
   master
+  1.1.1
   1.1.0
   1.0.2
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  2ee3b78b0e20e1e2e9fc3830813a843567ea94a2 (commit)
  from  ad8f7120bad64bcc43861c36eedcf29fc2728f13 (commit)


- Log -
commit 2ee3b78b0e20e1e2e9fc3830813a843567ea94a2
Author: Matt Caswell 
Date:   Wed Dec 5 13:00:13 2018 +

Update CLA templates

Update the address in the CLA templates

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/97)

---

Summary of changes:
 policies/openssl_ccla.pdf | Bin 32971 -> 38288 bytes
 policies/openssl_icla.pdf | Bin 32488 -> 37641 bytes
 2 files changed, 0 insertions(+), 0 deletions(-)

diff --git a/policies/openssl_ccla.pdf b/policies/openssl_ccla.pdf
index 814c2f7..f341c27 100644
Binary files a/policies/openssl_ccla.pdf and b/policies/openssl_ccla.pdf differ
diff --git a/policies/openssl_icla.pdf b/policies/openssl_icla.pdf
index 25d1b96..cb24818 100644
Binary files a/policies/openssl_icla.pdf and b/policies/openssl_icla.pdf differ
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  ad8f7120bad64bcc43861c36eedcf29fc2728f13 (commit)
  from  0d92547742c3da2f066f4babaacf8a51bb2f5e3c (commit)


- Log -
commit ad8f7120bad64bcc43861c36eedcf29fc2728f13
Author: Rich Salz 
Date:   Mon Mar 19 18:20:32 2018 -0400

Switch to new (ASF) license

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/98)

---

Summary of changes:
 .gitignore|   1 -
 Makefile  |   4 -
 source/apache-license-2.0.txt | 177 ++
 source/license-openssl-ssleay.txt | 125 +++
 source/license.html   |  35 +---
 5 files changed, 327 insertions(+), 15 deletions(-)
 create mode 100644 source/apache-license-2.0.txt
 create mode 100644 source/license-openssl-ssleay.txt

diff --git a/.gitignore b/.gitignore
index be23066..86cadae 100644
--- a/.gitignore
+++ b/.gitignore
@@ -31,7 +31,6 @@ source/*.gz*
 source/*.patch
 source/.htaccess
 source/index.inc
-source/license.txt
 source/old/*/*.patch
 source/old/*/*.tar.gz*
 source/old/*/*.txt.asc
diff --git a/Makefile b/Makefile
index a495e0c..c6c54bb 100644
--- a/Makefile
+++ b/Makefile
@@ -30,7 +30,6 @@ SIMPLE = newsflash.inc sitemap.txt \
 news/vulnerabilities-0.9.7.inc \
 news/vulnerabilities-0.9.6.inc \
 source/.htaccess \
-source/license.txt \
 source/index.inc
 SRCLISTS = \
   source/old/0.9.x/index.inc \
@@ -174,9 +173,6 @@ news/vulnerabilities-0.9.6.inc: bin/mk-cvepage 
news/vulnerabilities.xml
 source/.htaccess: $(wildcard source/openssl-*.tar.gz) bin/mk-latest
@rm -f @?
./bin/mk-latest source >$@
-source/license.txt: $(SNAP)/LICENSE
-   @rm -f $@
-   cp $? $@
 source/index.inc: $(wildcard $(RELEASEDIR)/openssl-*.tar.gz) bin/mk-filelist
@rm -f $@
./bin/mk-filelist $(RELEASEDIR) '' 'openssl-*.tar.gz' >$@
diff --git a/source/apache-license-2.0.txt b/source/apache-license-2.0.txt
new file mode 100644
index 000..49cc83d
--- /dev/null
+++ b/source/apache-license-2.0.txt
@@ -0,0 +1,177 @@
+
+ Apache License
+   Version 2.0, January 2004
+https://www.apache.org/licenses/
+
+   TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+   1. Definitions.
+
+  "License" shall mean the terms and conditions for use, reproduction,
+  and distribution as defined by Sections 1 through 9 of this document.
+
+  "Licensor" shall mean the copyright owner or entity authorized by
+  the copyright owner that is granting the License.
+
+  "Legal Entity" shall mean the union of the acting entity and all
+  other entities that control, are controlled by, or are under common
+  control with that entity. For the purposes of this definition,
+  "control" means (i) the power, direct or indirect, to cause the
+  direction or management of such entity, whether by contract or
+  otherwise, or (ii) ownership of fifty percent (50%) or more of the
+  outstanding shares, or (iii) beneficial ownership of such entity.
+
+  "You" (or "Your") shall mean an individual or Legal Entity
+  exercising permissions granted by this License.
+
+  "Source" form shall mean the preferred form for making modifications,
+  including but not limited to software source code, documentation
+  source, and configuration files.
+
+  "Object" form shall mean any form resulting from mechanical
+  transformation or translation of a Source form, including but
+  not limited to compiled object code, generated documentation,
+  and conversions to other media types.
+
+  "Work" shall mean the work of authorship, whether in Source or
+  Object form, made available under the License, as indicated by a
+  copyright notice that is included in or attached to the work
+  (an example is provided in the Appendix below).
+
+  "Derivative Works" shall mean any work, whether in Source or Object
+  form, that is based on (or derived from) the Work and for which the
+  editorial revisions, annotations, elaborations, or other modifications
+  represent, as a whole, an original work of authorship. For the purposes
+  of this License, Derivative Works shall not include works that remain
+  separable from, or merely link (or bind by name) to the interfaces of,
+  the Work and Derivative Works thereof.
+
+  "Contribution" shall mean any work of authorship, including
+  the original version of the Work and any modifications or additions
+  to that Work or Derivative Works thereof, that is intentionally
+  submitted to Licensor for inclusion in the Work by the copyright owner
+

[openssl-commits] [web] master update

The branch master has been updated
   via  0d92547742c3da2f066f4babaacf8a51bb2f5e3c (commit)
  from  be4639ae76f20fccfd718dea2aaa7def1dbe8a55 (commit)


- Log -
commit 0d92547742c3da2f066f4babaacf8a51bb2f5e3c
Author: Kurt Roeckx 
Date:   Wed Dec 5 22:22:04 2018 +0100

Update PGP key

---

Summary of changes:
 news/openssl-security.asc | 80 +++
 1 file changed, 40 insertions(+), 40 deletions(-)

diff --git a/news/openssl-security.asc b/news/openssl-security.asc
index fb0482f..9dddc89 100644
--- a/news/openssl-security.asc
+++ b/news/openssl-security.asc
@@ -11,33 +11,33 @@ 
Ce9tWq6oK+o1MEc1Ejb1/kn9CeCloKlF8HkzhFLpqqkZ//3j73/6kuK45UVg5PbO
 5HCnafDroN5wF9jMVxFhmDOOdXyIeYkBVF6swwIlyq8VlYSjYWGAUtIb3rOiUNWc
 zYY6spdAN6VtKTMnXTm608yH118p+UOB5rJuKBqk3tMaiIjoyOcya4ImenX85rfK
 eCOVNtdOC/0N8McfO0eFc6fZxcy7ykZ1a7FLyqQDexpZM7OLoM5SXObX1QARAQAB
-tCVPcGVuU1NMIE9NQyA8b3BlbnNzbC1vbWNAb3BlbnNzbC5vcmc+iQJUBBMBCgA+
-AhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAFiEE78CkZ9YTy4PH7W0w2JTizos9
-efUFAlvEwBgFCQmW/3kACgkQ2JTizos9efV3tBAAg/XTimvGMtCvMawu+ymbXshC
-W+PTt3tH2oI7parnm8F0DY3c70rwKN1uu28Cds0QOpAUR8wsYe9HbXXfT7w+4JG6
-qJm3mfAin9QA49D99SN3TgSTOK7qU1p88nCpEs0dib4aF5gO2zaqRiIEbTkiQSjQ
-lTzLS0kfznNmfynJI25XWNddLM2munn9ZS7XPQqzZ0G/RkDbuIayG0axRRcr8iG/
-uOkfFz3Iwk58MnzKVqPf+n7ZPTG6Z7EEcLF92Lo58x+s9tJ5afr0bTRG1wn5L8+I
-++OEIn32CwPQ0B6FeI42jeXGdd4rGjgzZyBbqvUD2zei85Sa306ZUOLoD5iuSAXt
-VkyK2rRRqfGy8m+R0TV1TQ25SkQadUf1fz1gS+QtyA4MhuM4f9PYR6kNUzjHkGAw
-w6KTG+bHiiQdAOKCEDYZgz9bY9wSD53fQTh8r5DhQ9edgFQAZsJ5R5jouZu+5beG
-8VP1OuvgKA478y/VWX6xnKLCqAfiF+p4ae0WDTm2cQiZyskTLQ2NaC0xEmAg9DgT
-d0v9NteVVMKeVppaGsE21vaX7s228Pj2sf8EAwl5iqtcJZMVVMHdmMerojd0HnmW
-PplbBVowaTTxLcMz/Xqlrxl7ylh6NqA3hFK1BwhFkAH6IEvXYmuAZNEtzFl+t4m5
-lsGHrlH+lstQuSl25v+0NE9wZW5TU0wgc2VjdXJpdHkgdGVhbSA8b3BlbnNzbC1z
-ZWN1cml0eUBvcGVuc3NsLm9yZz6JAlQEEwEKAD4CGwMFCwkIBwMFFQoJCAsFFgID
-AQACHgECF4AWIQTvwKRn1hPLg8ftbTDYlOLOiz159QUCW8TAJwUJCZb/eQAKCRDY
-lOLOiz159bbcEACpio13Jc6porVHoi5izZ9w9xCYiv6whrhgjdBCPm+JP6bPb0aN
-T0EkhQ4oBsOh3iCtVrBXjeagXK1NR1Sze/PH/kxARg9Nx6rafv9jRF2irO0E8+fY
-U2nV2z8Sjuej2uAIfMEJW0GnOJsR/pnn+a6P2Na8qwuwoEoWW2rTwqgCNOPwTWAW
-qgB5sYrt5M8RhmSZXW0v6NmCAQVrnGbEsqgCuBLo0WqyPszW6BEQqUsvj4aAAucS
-IZr2vaN4TnXhg0VdlI1f1E32ms2lSkNXECdSYWeT1eWVn2nPKibpePrJXuHHEP1G
-qM9z70+otqNn7qbIIr2aCu9aoAkcqbNCM6WN6FgZb0BH/XLByZM6ksLjO5OD1BHS
-PkK7HDTLDaTQFYbzH1ItpuWWvVh+l95a5Amm3Ic4JZyTbw0I7S4n0lo+JG4l89Wr
-WsYwAJsj1Chn0TitF/VTMG7JOtFHKBKzNvXOY7H85zU8AxvC5lis5vLepSc41NXw
-JoR7l+Cwi1hFIJIRO6RSVp3BwI+mASRZAn9ZaCqNyfDHhFQntpn607pRl2eHvO57
-KN1r1fJOZBx8P9p4S0sqBs9QXF4wNlBM2v/Te4MGq+wzQQFtofJuBSEpN0jHpVup
-HGZRWkCSydM4ToCRrwEhclv3GvUmi1WAzy25SBbaR408/BgEAT2Xr6TUXLQnT3Bl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 blNTTCB0ZWFtIDxvcGVuc3NsLXRlYW1Ab3BlbnNzbC5vcmc+iQJZBDABCgBDFiEE
 78CkZ9YTy4PH7W0w2JTizos9efUFAlnZ9jUlHSBSZXBsYWNlZCBieSBvcGVuc3Ns
 LW9tY0BvcGVuc3NsLm9yZwAKCRDYlOLOiz159VAiD/wLVz8KE84z+iPBcDXJR4hr
@@ -63,17 +63,17 @@ 
ncd+VYvth6cM9jDWsTJAXEaqNoFjVfw227NnQ/hxqGCwEVzweBi7a7dix3nCa9JO
 w5eV3xCyezUohQ6nOBbDnoAnp3FLeUrhBJQXCPNtlb0fSMnj14EwBoD6EKO/xz/g
 EW5mr0a+xp+fjbkvHVX/c8UmU+7nlX7upaN46RLM1y0yWYKo9BV61

[openssl-commits] [web] master update

The branch master has been updated
   via  be4639ae76f20fccfd718dea2aaa7def1dbe8a55 (commit)
  from  af5e14f2df748257775c39faa63fcc755b81b1b9 (commit)


- Log -
commit be4639ae76f20fccfd718dea2aaa7def1dbe8a55
Author: Dr. Matthias St. Pierre 
Date:   Tue Nov 6 12:12:26 2018 +0100

cla.html: make CLA download links and email address more prominent

Reviewed-by: Paul Dale 
Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/92)

---

Summary of changes:
 policies/cla.html | 28 +---
 1 file changed, 25 insertions(+), 3 deletions(-)

diff --git a/policies/cla.html b/policies/cla.html
index f234dde..efe0445 100644
--- a/policies/cla.html
+++ b/policies/cla.html
@@ -25,7 +25,8 @@
  
  OpenSSL requires that all non-trivial contributors of ideas, code, or
  documentation complete, sign, and submit (via postal mail, fax
- or email) an Individual CLA [PDF].
+ or email) an
+ Individual Contributor License Agreement 
(ICLA).
  The purpose of this agreement is to clearly define
  the terms under which intellectual property has been contributed
  to OpenSSL and thereby allow us to defend the project should
@@ -39,8 +40,8 @@
  
 
  
- For a corporation that has assigned employees to work on OpenSSL,
- a Corporate CLA [PDF]
+ For a corporation that has assigned employees to work on OpenSSL, a
+ Corporate Contributor License Agreement 
(CCLA)
  is available for contributing intellectual property via
  the corporation, that may have been assigned as part of an
  employment agreement. Note that a Corporate CLA does not
@@ -49,6 +50,27 @@
  
 
  
+ If you have not already done so, please complete and sign a printout 
of the above
+ ICLA (and CCLA if necessary), then scan and email a pdf file of the 
Agreement(s) to
+ mailto:le...@opensslfoundation.org";>le...@opensslfoundation.org.
+ 
+
+ 
+ If you prefer snail mail, send an original signed Agreement to the
+ 
+
+ 
+ OpenSSL Software Foundation
+ 40 East Main Street
+ Suite 744
+ Newark, DE 19711
+ United States
+ 
+
+ Please read the document(s) carefully before signing and keep a copy 
for your records.
+ 
+
+ 
  Your Full name will be published unless you provide an alternative
  Public name. For example if your full name is Andrew Bernard Charles
  Dickens, but you wish to be known as Andrew Dickens, please enter
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  af5e14f2df748257775c39faa63fcc755b81b1b9 (commit)
  from  28c43932d579cd6ba18ec411bb828a2512c3419e (commit)


- Log -
commit af5e14f2df748257775c39faa63fcc755b81b1b9
Author: Matt Caswell 
Date:   Tue Nov 20 13:55:56 2018 +

Updates for new release

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/95)

---

Summary of changes:
 news/newsflash.txt   |  4 
 news/vulnerabilities.xml | 12 ++--
 2 files changed, 10 insertions(+), 6 deletions(-)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 2c05c1a..07229f2 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,10 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+20-Nov-2018: OpenSSL 1.1.1a is now available, including bug and security fixes
+20-Nov-2018: OpenSSL 1.1.0j is now available, including bug and security fixes
+20-Nov-2018: OpenSSL 1.0.2q is now available, including bug and security fixes
+12-Nov-2018: Security Advisory: one 
low severity fix in ECC scalar multiplication
 29-Oct-2018: Security Advisory: one 
low severity fix in DSA
 29-Oct-2018: Security Advisory: one 
low severity fix in ECDSA
 11-Sep-2018: Final version of OpenSSL 1.1.1 (LTS) is now available: please 
download and upgrade!
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 46cdcff..2142ade 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -40,7 +40,7 @@
 
   
 
-
+
   
 
 Side Channel Attack
@@ -85,13 +85,13 @@
 
 
 
-
+
   
 
-
+
   
 
-
+
   
 
 Constant time issue
@@ -118,10 +118,10 @@
 
 
 
-
+
   
 
-
+
   
 
 Constant time issue
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  28c43932d579cd6ba18ec411bb828a2512c3419e (commit)
  from  a7fc7eb4f8d9d6b21c3376d6e815d0735909bd7b (commit)


- Log -
commit 28c43932d579cd6ba18ec411bb828a2512c3419e
Author: Matt Caswell 
Date:   Mon Nov 12 15:02:14 2018 +

Updates for CVE-2018-5407

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/93)

---

Summary of changes:
 news/secadv/20181112.txt | 41 +
 news/vulnerabilities.xml | 48 +++-
 2 files changed, 88 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20181112.txt

diff --git a/news/secadv/20181112.txt b/news/secadv/20181112.txt
new file mode 100644
index 000..764520e
--- /dev/null
+++ b/news/secadv/20181112.txt
@@ -0,0 +1,41 @@
+OpenSSL Security Advisory [12 November 2018]
+
+
+Microarchitecture timing vulnerability in ECC scalar multiplication 
(CVE-2018-5407)
+===
+
+Severity: Low
+
+OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been shown
+to be vulnerable to a microarchitecture timing side channel attack. An attacker
+with sufficient access to mount local timing attacks during ECDSA signature
+generation could recover the private key.
+
+This issue does not impact OpenSSL 1.1.1 and is already fixed in the latest
+version of OpenSSL 1.1.0 (1.1.0i). OpenSSL 1.0.2 is affected but due to the low
+severity of this issue we are not creating a new release at this time. The 
1.0.2
+mitigation for this issue can be found in commit b18162a7c.
+
+OpenSSL 1.1.0 users should upgrade to 1.1.0i.
+
+This issue was reported to OpenSSL on 26th October 2018 by Alejandro Cabrera
+Aldaya, Billy Brumley, Sohaib ul Hassan, Cesar Pereida Garcia and Nicola 
Tuveri.
+
+Note
+
+
+OpenSSL 1.1.0 is currently only receiving security updates. Support for this
+version will end on 11th September 2019. Users of this version should upgrade 
to
+OpenSSL 1.1.1.
+
+References
+==
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20181112.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 86b18c0..46cdcff 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,53 @@
 
 
-
+
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+  
+
+
+  
+
+Side Channel Attack
+Microarchitecture timing vulnerability in ECC scalar 
multiplication
+
+  OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been 
shown
+  to be vulnerable to a microarchitecture timing side channel attack. An 
attacker
+  with sufficient access to mount local timing attacks during ECDSA 
signature
+  generation could recover the private key.
+
+
+
+  
   
 
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  a7fc7eb4f8d9d6b21c3376d6e815d0735909bd7b (commit)
   via  93507ac9b3d6cd013b2148f83c0726817cf71576 (commit)
   via  92a7bda034e49e626bf933f9e61b82a2cefe308c (commit)
  from  b78d963402ca83b6ede75f1a5d42d64ca61c2c49 (commit)


- Log -
commit a7fc7eb4f8d9d6b21c3376d6e815d0735909bd7b
Merge: b78d963 93507ac
Author: Mark J. Cox 
Date:   Mon Nov 12 16:09:29 2018 +

Merge pull request #94 from iamamoose/master

trivial changes - CVE-2015-1788 was missing severity tag, fix bad website 
includes

commit 93507ac9b3d6cd013b2148f83c0726817cf71576
Author: Mark J. Cox 
Date:   Mon Nov 12 16:01:40 2018 +

CVE-2015-1788 was missing the severity tag

commit 92a7bda034e49e626bf933f9e61b82a2cefe308c
Author: Mark J. Cox 
Date:   Sat Oct 13 10:29:45 2018 +0100

Remove broken include

---

Summary of changes:
 news/vulnerabilities.xml | 1 +
 1 file changed, 1 insertion(+)

diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 97ec427..86b18c0 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -2482,6 +2482,7 @@
   
   
 
+
 
 
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  b78d963402ca83b6ede75f1a5d42d64ca61c2c49 (commit)
  from  ec4583cb047f1dd56918b38f5a36941747d50d28 (commit)


- Log -
commit b78d963402ca83b6ede75f1a5d42d64ca61c2c49
Author: Pauli 
Date:   Fri Nov 2 08:40:27 2018 +1000

Update advisory for CVE-2018-0734 indicating that it introduced a new issue
and that this has been fixed.  Git commit versions are included.

---

Summary of changes:
 news/secadv/20181030.txt | 5 +
 1 file changed, 5 insertions(+)

diff --git a/news/secadv/20181030.txt b/news/secadv/20181030.txt
index b33ac41..7569b56 100644
--- a/news/secadv/20181030.txt
+++ b/news/secadv/20181030.txt
@@ -19,6 +19,11 @@ git repository.
 
 This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser.
 
+As a result of the changes made to mitigate this vulnerability, a new
+side channel attack was created.  The mitigation for this new vulnerability
+can be found in these commits: 6039651c43 (for 1.1.1), 26d7fce13d (for 1.1.0)
+and 880d1c76ed (for 1.0.2)
+
 References
 ==
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  ec4583cb047f1dd56918b38f5a36941747d50d28 (commit)
  from  54c39f92bbaae5b32b84c8b632c4daf2d7ad6132 (commit)


- Log -
commit ec4583cb047f1dd56918b38f5a36941747d50d28
Author: Matt Caswell 
Date:   Mon Oct 29 21:52:29 2018 +

Correct the security advisory name

Reviewed-by: Paul Dale 
(Merged from https://github.com/openssl/web/pull/91)

---

Summary of changes:
 news/secadv/{20181030.pdf => 20181030.txt} | 0
 1 file changed, 0 insertions(+), 0 deletions(-)
 rename news/secadv/{20181030.pdf => 20181030.txt} (100%)

diff --git a/news/secadv/20181030.pdf b/news/secadv/20181030.txt
similarity index 100%
rename from news/secadv/20181030.pdf
rename to news/secadv/20181030.txt
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  54c39f92bbaae5b32b84c8b632c4daf2d7ad6132 (commit)
   via  c84f2126b736207c23b1984cbc07d496c22ca85d (commit)
  from  43a3ec6622d22e8fb33324d50bd4aa4944e9e5fb (commit)


- Log -
commit 54c39f92bbaae5b32b84c8b632c4daf2d7ad6132
Merge: c84f212 43a3ec6
Author: Pauli 
Date:   Tue Oct 30 07:00:24 2018 +1000

Merge branch 'master' of git.openssl.org:openssl-web

commit c84f2126b736207c23b1984cbc07d496c22ca85d
Author: Pauli 
Date:   Tue Oct 30 07:00:08 2018 +1000

Add CVE-2018-0734

---

Summary of changes:
 news/newsflash.txt   |  3 ++-
 news/secadv/20181030.pdf | 32 +
 news/vulnerabilities.xml | 52 +++-
 3 files changed, 85 insertions(+), 2 deletions(-)
 create mode 100644 news/secadv/20181030.pdf

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 311c39b..2c05c1a 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,7 +4,8 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
-29-Oct-2018: Security Advisory: one 
low severity fix
+29-Oct-2018: Security Advisory: one 
low severity fix in DSA
+29-Oct-2018: Security Advisory: one 
low severity fix in ECDSA
 11-Sep-2018: Final version of OpenSSL 1.1.1 (LTS) is now available: please 
download and upgrade!
 21-Aug-2018: Beta 7 of OpenSSL 1.1.1 (pre release 9) is now available: please 
download and test it
 14-Aug-2018: OpenSSL 1.1.0i is now available, including bug and security fixes
diff --git a/news/secadv/20181030.pdf b/news/secadv/20181030.pdf
new file mode 100644
index 000..b33ac41
--- /dev/null
+++ b/news/secadv/20181030.pdf
@@ -0,0 +1,32 @@
+OpenSSL Security Advisory [30 October 2018]
+===
+
+Timing vulnerability in DSA signature generation (CVE-2018-0734)
+
+
+Severity: Low
+
+The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
+timing side channel attack. An attacker could use variations in the signing
+algorithm to recover the private key.
+
+Due to the low severity of this issue we are not issuing a new release
+of OpenSSL 1.1.1, 1.1.0 or 1.0.2 at this time. The fix will be included
+in OpenSSL 1.1.1a, OpenSSL 1.1.0j and OpenSSL 1.0.2q when they become
+available. The fix is also available in commit 8abfe72e8c (for 1.1.1),
+ef11e19d13 (for 1.1.0) and commit 43e6a58d49 (for 1.0.2) in the OpenSSL
+git repository.
+
+This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser.
+
+References
+==
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20181030.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 52cc185..97ec427 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,57 @@
 
 
-
+
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+  
+
+
+  
+
+
+  
+
+Constant time issue
+Timing attack against DSA
+
+  The OpenSSL DSA signature algorithm has been shown to be vulnerable
+  to a timing side channel attack. An attacker could use variations
+  in the signing algorithm to recover the private key.
+
+
+
+  
   
 
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  43a3ec6622d22e8fb33324d50bd4aa4944e9e5fb (commit)
  from  ecf0f6ced3b30e616932d3ccd7609e7e63520c8c (commit)


- Log -
commit 43a3ec6622d22e8fb33324d50bd4aa4944e9e5fb
Author: Matt Caswell 
Date:   Mon Oct 29 12:09:44 2018 +

Update vulnerabilities.xml

The new CVE is only fixed in the dev version. 1.1.1a and 1.1.0j are not
yet released.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/90)

---

Summary of changes:
 news/vulnerabilities.xml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 6067c1e..52cc185 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -22,10 +22,10 @@
 
 
 
-
+
   
 
-
+
   
 
 Constant time issue
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  ecf0f6ced3b30e616932d3ccd7609e7e63520c8c (commit)
  from  61572af57041195c7654c0485f8f323baec0ab66 (commit)


- Log -
commit ecf0f6ced3b30e616932d3ccd7609e7e63520c8c
Author: Pauli 
Date:   Mon Oct 29 10:54:02 2018 +1000

update vulnerability information again, this is the published version

---

Summary of changes:
 news/vulnerabilities.xml | 8 +++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index b2979db..6067c1e 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -10,7 +10,7 @@
 
   
 
-
+
 
 
 
@@ -22,6 +22,12 @@
 
 
 
+
+  
+
+
+  
+
 Constant time issue
 Timing attack against ECDSA signature generation
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  61572af57041195c7654c0485f8f323baec0ab66 (commit)
  from  c35854b022239196048f9bbd5418fb77dd4f7ee0 (commit)


- Log -
commit 61572af57041195c7654c0485f8f323baec0ab66
Author: Pauli 
Date:   Mon Oct 29 10:01:23 2018 +1000

fix vulnerability entry

---

Summary of changes:
 news/vulnerabilities.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 605f354..b2979db 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -10,7 +10,7 @@
 
   
 
-
+
 
 
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  c35854b022239196048f9bbd5418fb77dd4f7ee0 (commit)
  from  6e45814cbe2c0d6d40b7b24a7d5f238faafb4bd4 (commit)


- Log -
commit c35854b022239196048f9bbd5418fb77dd4f7ee0
Author: Pauli 
Date:   Mon Oct 29 09:58:52 2018 +1000

fix vulnerability entry

---

Summary of changes:
 news/vulnerabilities.xml | 50 
 1 file changed, 25 insertions(+), 25 deletions(-)

diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index a2a2de0..605f354 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,31 @@
 
 
-
+
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+Constant time issue
+Timing attack against ECDSA signature generation
+
+  The OpenSSL ECDSA signature algorithm has been shown to be
+  vulnerable to a timing side channel attack. An attacker could use
+  variations in the signing algorithm to recover the private key.
+
+
+
+  
   
 
 
@@ -54,30 +78,6 @@
 
 
   
-  
-
-
-
-
-
-
-
-
-
-
-
-
-
-Constant time issue
-Timing attack against ECDSA signature generation
-
-  The OpenSSL ECDSA signature algorithm has been shown to be
-  vulnerable to a timing side channel attack. An attacker could use
-  variations in the signing algorithm to recover the private key.
-
-
-
-  
   
 
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  6e45814cbe2c0d6d40b7b24a7d5f238faafb4bd4 (commit)
   via  911cdb11d835a00d901d3e9c1a728ed2613f84a6 (commit)
  from  fbf24147cb7b9e04c40ef0d14f76dc85d59a8413 (commit)


- Log -
commit 6e45814cbe2c0d6d40b7b24a7d5f238faafb4bd4
Merge: 911cdb1 fbf2414
Author: Pauli 
Date:   Mon Oct 29 09:06:01 2018 +1000

Merge branch 'master' of git.openssl.org:openssl-web

commit 911cdb11d835a00d901d3e9c1a728ed2613f84a6
Author: Pauli 
Date:   Mon Oct 29 09:03:42 2018 +1000

Update for ECDSA vulnerability CVS-2018-0735

---

Summary of changes:
 news/newsflash.txt   |  1 +
 news/secadv/20181029.txt | 31 +++
 news/vulnerabilities.xml | 24 
 3 files changed, 56 insertions(+)
 create mode 100644 news/secadv/20181029.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 1a0f0fb..311c39b 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+29-Oct-2018: Security Advisory: one 
low severity fix
 11-Sep-2018: Final version of OpenSSL 1.1.1 (LTS) is now available: please 
download and upgrade!
 21-Aug-2018: Beta 7 of OpenSSL 1.1.1 (pre release 9) is now available: please 
download and test it
 14-Aug-2018: OpenSSL 1.1.0i is now available, including bug and security fixes
diff --git a/news/secadv/20181029.txt b/news/secadv/20181029.txt
new file mode 100644
index 000..2194ef0
--- /dev/null
+++ b/news/secadv/20181029.txt
@@ -0,0 +1,31 @@
+OpenSSL Security Advisory [29 October 2018]
+===
+
+Timing vulnerability in ECDSA signature generation (CVE-2018-0735)
+==
+
+Severity: Low
+
+The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a
+timing side channel attack. An attacker could use variations in the signing
+algorithm to recover the private key.
+
+Due to the low severity of this issue we are not issuing a new release
+of OpenSSL 1.1.1 or 1.1.0 at this time. The fix will be included in
+OpenSSL 1.1.1a and OpenSSL 1.1.0j when they become available. The fix
+is also available in commit b1d6d55ece (for 1.1.1) and commit 56fb454d28
+(for 1.1.0) in the OpenSSL git repository.
+
+This issue was reported to OpenSSL on 25th October 2018 by Samuel Weiser.
+
+References
+==
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20181029.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 6ef9c56..a2a2de0 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -54,6 +54,30 @@
 
 
   
+  
+
+
+
+
+
+
+
+
+
+
+
+
+
+Constant time issue
+Timing attack against ECDSA signature generation
+
+  The OpenSSL ECDSA signature algorithm has been shown to be
+  vulnerable to a timing side channel attack. An attacker could use
+  variations in the signing algorithm to recover the private key.
+
+
+
+  
   
 
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  fbf24147cb7b9e04c40ef0d14f76dc85d59a8413 (commit)
  from  3b07e5291b0df2cef8469ab0494d1c787e84af87 (commit)


- Log -
commit fbf24147cb7b9e04c40ef0d14f76dc85d59a8413
Author: Joe 
Date:   Fri Oct 26 08:22:17 2018 +

Small typo fix

CLA: trivial

Reviewed-by: Matt Caswell 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/89)

---

Summary of changes:
 source/index.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/source/index.html b/source/index.html
index a4a98ce..605c009 100644
--- a/source/index.html
+++ b/source/index.html
@@ -17,7 +17,7 @@
 at https://github.com/openssl/openssl";>https://github.com/openssl/openssl.
 Bugs and pull patches (issues and pull requests) should be
-file on the GitHub repo.
+filed on the GitHub repo.
Please familiarize yourself with the
license.

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  3b07e5291b0df2cef8469ab0494d1c787e84af87 (commit)
  from  72c1892c6630fe39a3ba99980876a4e7e983a2d8 (commit)


- Log -
commit 3b07e5291b0df2cef8469ab0494d1c787e84af87
Author: Kurt Roeckx 
Date:   Mon Oct 15 18:32:18 2018 +0200

Update PGP key

---

Summary of changes:
 news/openssl-security.asc | 128 +++---
 1 file changed, 64 insertions(+), 64 deletions(-)

diff --git a/news/openssl-security.asc b/news/openssl-security.asc
index 217cbe7..fb0482f 100644
--- a/news/openssl-security.asc
+++ b/news/openssl-security.asc
@@ -12,68 +12,68 @@ 
Ce9tWq6oK+o1MEc1Ejb1/kn9CeCloKlF8HkzhFLpqqkZ//3j73/6kuK45UVg5PbO
 zYY6spdAN6VtKTMnXTm608yH118p+UOB5rJuKBqk3tMaiIjoyOcya4ImenX85rfK
 eCOVNtdOC/0N8McfO0eFc6fZxcy7ykZ1a7FLyqQDexpZM7OLoM5SXObX1QARAQAB
 tCVPcGVuU1NMIE9NQyA8b3BlbnNzbC1vbWNAb3BlbnNzbC5vcmc+iQJUBBMBCgA+
-FiEE78CkZ9YTy4PH7W0w2JTizos9efUFAlnZ8x0CGwMFCQefA0oFCwkIBwMFFQoJ
-CAsFFgIDAQACHgECF4AACgkQ2JTizos9efVNnw/9GHSauODL8PCSRcobbVm8/3tl
-ejky6YVmjBjpbKKLVCAyK6sM7ns1RDSoHSQfKdClZbD+n2ZLZFVbvdDbu873ntsE
-WdMZUk5dTW0a8mtaUFV5nkZiWbNn5Yr+gtUiqOtIDR6wbXOd4RtpaKawllqN0JX/
-oZdVUcV60tekt92rUe3J/KbFptACvZNkvm1c2zEWdNemEWIqYOierjaeNhqdgAbA
-kKA7EAYP53bursxTDfhQQZWzPOFXcl4ElHKHvVED2ZyGamRnuwD5F2YyjOCNlvt2
-si1mzTsvyjuNJv0OeK0rdPqX00OXWCuOb96rlGiSeaK3WFSTHeDiaFiCahwf9VJT
-I9kGA/FF6is8UW2SJEGzYHGnY/lsUL697XTuLEgWU2qHlYXExLY1cuz+pTLB0vsB
-suCGTe18BgjKF2und7z7+kDPB4uECXCwgPKjxLNM/JFhJswt3KTzDbcXz0/lg0+5
-3r1NsBV3JW0DxoRsmqWAn6anyCRDxN8GHzEymRkc88wacEt38JeyPuLiz6ejbpFR
-EYNHDrVVB9gDkkxafL7csKH/J69v1GAujzyXPcTsT08YyKgf7kOc5e26jyNq9KYs
-YJhE7yr/qcqcbcQTgntaFCas+1nBm/SM26xKLF4MkS8KEeGRUuCwQhDXPNORAsNj
-EIOh6s4v5T9Py3lpJNu0NE9wZW5TU0wgc2VjdXJpdHkgdGVhbSA8b3BlbnNzbC1z
-ZWN1cml0eUBvcGVuc3NsLm9yZz6JAlMEEwEKAD4CGwMFCwkIBwMFFQoJCAsFFgID
-AQACHgECF4AWIQTvwKRn1hPLg8ftbTDYlOLOiz159QUCWdny6QUJB58DSgAKCRDY
-lOLOiz159XxmD/dSmuPL95utayr83urce6FibwqWZeA7LldBiaKEn8ShxhVgb/HG
-EGfQKxF1cWXOe1NF3NEhmZD/JTYoMlqEyGARZMDR4klDPP0jhPWVcfnw8HoUjufE
-QptCagLhitZzfb0GEzvAOG63tFwit4bM6gT2po3VZH8o62j2PcBtcSmjHVqtaKwI
-i5MMXFRTaJnLQmLHg+W2nunw+CgTNdUgvn/oB0RPHXU+TlfPiuC7tAluZC+xYnIA
-nspHRRbge3H1R07JP5LZW8fu60VMj/o7t/0rCupjjra/qE2KScF1MsFI7eiv1I/Q
-68lgvtHLCpSqV/qqVmrdgGhV2pHQaEeB7sh/8E5+G0Yi6sYwztl/OeUUpdiGhXxU
-OPWPYExIwDrh1guIi/yva/78wksbi/ZQffZTR//OIwdGmMVxYfdCQ16PfqXpKJlW
-OcaH0Kbom13lha0Am0pXnqRnupOp5XrcrHJUcdFoS2df3wOh6aFejimjBWnvAajh
-rzNnXedY9rtxDlA5O/D1Yx0j8ZfAMrmqxFTc+XyT5gBwxYc2wCQ3ch20MfDpJ9/s
-eA4WS7dPGyOkziIcszT4vNCAtDnIs4Hr0uNb/1wF5R1UFq464Ghyqpt6SE2xfxsP
-Uty+iyvCYfrbL7ILwHmpgYUARL51ovSxVRQA7osSg8qrf6U26pIDXD63tCdPcGVu
-U1NMIHRlYW0gPG9wZW5zc2wtdGVhbUBvcGVuc3NsLm9yZz6JAlkEMAEKAEMWIQTv
-wKRn1hPLg8ftbTDYlOLOiz159QUCWdn2NSUdIFJlcGxhY2VkIGJ5IG9wZW5zc2wt
-b21jQG9wZW5zc2wub3JnAAoJENiU4s6LPXn1UCIP/AtXPwoTzjP6I8FwNclHiGuK
-w+gV5Sw3rRNyiKg9TL0dudcVfDsdtdxmBR1vughH0PNsYstNggflbGIefLTIuNTQ
-1qun5GTluLxZyWxcf6WJPMRTJdJpdy5BrIfXFaHrEohAQLBeL0P25gjXzOvA7C7Y
-wCuxkKG3FuQKyKr4HNy5WF1LKZIBPcjHEHD6sjLDaxD4KxQnHd31s1xdarDvEbXe
-G8MmiQApKUJ2fN9sGPdbrjBs1nBtgPksZHThT7g5FpuZfIWwOvg6XRaf2Ig538AG
-aq+rqKnZHE9HvCEbBqidhSe6h3hkr5BY5Bh2jj5CTOvZSSBBTAq47wUFTeG/B4XK
-m5yW561lRhQ8YEnYzb16swQyYA6jIRjeWRyYRoYmQ4tNrs6idKfjlMytQohKNPzH
-OzW+bFX72Kz+C6KikXHjXj4MGafCcDpwuVPOE1muqR2Jt64o36wTzzBXsfTQ0EPy
-hBSDYQDEFTFLY9osuQDT6arH7TiI7EX1lp/u0CIuBLmEQA3JZUWhyWkwQMyOep4J
-A2gOeaMmjJ0lJ7tH44Fk4g+AhFW7Eq0dJ1iSoQoOQ21cKv3SJqDdYiu/M4kenCXX
-kIXtxmPgHVnuwovu+U4mMvGZYfUs+JqZfNcUc/XmHDv4NMRusKTxP36rmvPwIHig
-KxCiVjdbrygghWc0Qe7quQINBFQv6Z8BEADAd7PvHauU/H1vm9znBroxHG4coLnO
-g+bIZTVrLgld1u/os7FVHvtIQ9WMA99Aus49vgiazMT0PwQd7t0m8hzAz+Xyi+xk
-IgP59fdoV9g7h8b0MJwzZB8WIIbaxSjpVwMrXtmsANHwvntKPJR2tWHdmWTapQwt
-t6ibSzCR/G1/AiK+fSnJDcr+uGxfoVTyDd3r54dQI5+APOfOPBGTEHI3nYO9jLAN
-01tg+KJmsmO3lxObrrexWHGOkjOKU4SAdl/QzN/UYMt6guDm7xJBH2lpyXx8cl4g
-PFxfhWbpF3P4jOvD9FUv7DJpfUD7GDFpzB3BpTnLs0CUQGpamScLitGSL6G4f2Pa
-2C8ax7TQoEo2hbkjfSv2IaQMbPNB+pVWuxgkgEk0a0tzr5mPvn07FD80jr4rdJKk
-H4ps4mMe0HCSGoBvdpr1Jrn9jxH870ouomiKjIWk2iauasTkdKuN9CmpEJLTT1+d
-x35Vi+2Hpwz2MNaxMkBcRqo2gWNV/Dbbs2dD+HGoYLARXPB4GLtrt2LHecJr0k7D
-l5XfELJ7NSiFDqc4FsOegCencUt5SuEElBcI822VvR9IyePXgTAGgPoQo7/HP+AR
-bmavRr7Gn5+NuS8dVf9zxSZT7ueVfu6lo3jpEszXLTJZgqj0FXrW2f6RywCTuSFD
-t0qE7OZJemwEcwARAQABiQI8BBgBCgAmAhsMFiEE78CkZ9YTy4PH7W0w2JTizos9
-efUFAlnZ9v8FCQefB2AACgkQ2JTizos9efVBOA/+ObcOrEGwKPI3KFaxKdkfbl/K
-UoTTC8L6F/AJTd9JREXgic/CKZRfa64S+RvRqH8kY1DEUCi6v6o/57kS6o1BS+6a
-PMeg/xi8nBmC5o+fqgOdIdFyUkJbwq/jWcHZ7Sjf89LCh0gtVqxsRYT3yZicCNJi
-8qrWe4I2iv6OHOjZbHeF3RKM7IKaqcUCI6jklJSge3MoCR74gOEpAAA/eUQ2YfVx
-pS1kMaJXLpa0gbkaylZALmt2uTvacOc5uipmZBzQRoVna9scM9+Fy0taus4TA+54
-8EMzjK7LUcgkgndXUf1hE29UGgZyOLBkLfXRZMl9hnOrurTnfUqthbpvZwQ892ba
-ZW0NDkk2nlGFOCJQsfrLQdwxKm0oeH/eJoXaSSZuzn1hL2+EzfMNwpAP03l7xagI
-sYkuyTUDyVGKwyT036yro9yqP0Iaa7CIgJ+DaxsyWthtG/NbJoRkmaJFKyu0pNa8
-dt04jmfMODToNAU7Ji8Ctan4gacGevYItgE8q30+kr1PPQD18DNXw6u36BLfjvPj
-27SS0R

[openssl-commits] [web] master update

The branch master has been updated
   via  72c1892c6630fe39a3ba99980876a4e7e983a2d8 (commit)
  from  e803b1e8aa04dde1595450e785bcb7b63f1ac7b5 (commit)


- Log -
commit 72c1892c6630fe39a3ba99980876a4e7e983a2d8
Author: Mark J. Cox 
Date:   Sat Oct 13 10:30:33 2018 +0100

Remove broken link

---

Summary of changes:
 docs/fips/verifycd.html | 1 -
 1 file changed, 1 deletion(-)

diff --git a/docs/fips/verifycd.html b/docs/fips/verifycd.html
index da76889..e02e28b 100644
--- a/docs/fips/verifycd.html
+++ b/docs/fips/verifycd.html
@@ -73,7 +73,6 @@
  

   
-  
 
   
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  e803b1e8aa04dde1595450e785bcb7b63f1ac7b5 (commit)
   via  fc3a76a7b2d8cfa3de18408ce1428785f4a9678e (commit)
  from  0fdc26a3da6206efb38025e5f2d94a97760f0614 (commit)


- Log -
commit e803b1e8aa04dde1595450e785bcb7b63f1ac7b5
Merge: 0fdc26a fc3a76a
Author: Mark J. Cox 
Date:   Sat Oct 13 10:26:44 2018 +0100

Merge pull request #88 from iamamoose/fipscd

Link to KeyPair arrangement for FIPS CD provision

commit fc3a76a7b2d8cfa3de18408ce1428785f4a9678e
Author: Mark J. Cox 
Date:   Sat Oct 13 09:35:14 2018 +0100

Link to KeyPair arrangement for FIPS CD provision

---

Summary of changes:
 docs/fips/verifycd.html | 26 +-
 1 file changed, 13 insertions(+), 13 deletions(-)

diff --git a/docs/fips/verifycd.html b/docs/fips/verifycd.html
index a30a9c1..da76889 100644
--- a/docs/fips/verifycd.html
+++ b/docs/fips/verifycd.html
@@ -40,20 +40,20 @@
 The requirement for this verification with an independently acquired
 FIPS 140-2 validated cryptographic module does not apply when the
 distribution file is distributed using a "secure" means. Distribution
-on physical media is considered secure in this context, so as a
-convenience a copy of the distribution files can be obtained from
-OSS as a CD-ROM disks via postal 
mail.
-
-The fee for this is $100 in US Dollars. At this time we are only able
-  to accept US wire transfers.
-Email us at mailto:osf-cont...@openssl.org";>osf-cont...@openssl.org
-and we will send you our ABA and account information.
-We cannot do credit cards, purchase orders, or anything other
-  than a US-based bank transfer at this time.
-We can mail internationally (the CD contains only open source code
-and so may be exported under the TSU exception of EAR ECCN 5D002).
-It will take a week or two to process your order.
+on physical media is considered secure in this context so you can
+verify by obtaining a copy of the distribution files on CD-ROM disks via
+postal mail.
 
+OpenSSL are not providing disks directly at this time.  However we have
+an arrangement with KeyPair Consulting who will
+https://keypair.us/2018/05/cd/";>send a disk to you at no
+  charge.
+
+Important Disclaimer: The listing of these third party 
products does not
+  imply any endorsement by the OpenSSL project, and these organizations 
are not
+  affiliated in any way with OpenSSL other than by the reference to their
+  independent web sites here.
+
 Note that the files you will receive on these CDs will be
 identical in every respect (except for formal FIPS 140-2
 compliance) with the files you can download from https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  0fdc26a3da6206efb38025e5f2d94a97760f0614 (commit)
  from  39045b9f57b5ff168bb646f44119bf4dc55ba37c (commit)


- Log -
commit 0fdc26a3da6206efb38025e5f2d94a97760f0614
Author: Matt Caswell 
Date:   Wed Oct 10 17:19:54 2018 +0100

Correct the contact email on the trademark page

Reviewed-by: Mark J. Cox 
(Merged from https://github.com/openssl/web/pull/87)

---

Summary of changes:
 policies/trademark.html | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/policies/trademark.html b/policies/trademark.html
index f669e46..39ecab7 100644
--- a/policies/trademark.html
+++ b/policies/trademark.html
@@ -134,7 +134,7 @@
 When in doubt about the use of OpenSSL trademarks, or to
 request permission for uses not allowed by this policy, please
 send an email to
-mailto:cont...@openssl.org";>cont...@openssl.org.
+mailto:osf-cont...@openssl.org";>osf-cont...@openssl.org.
 Be sure to include the following information in the body of your
 message:
 
@@ -160,7 +160,7 @@
 
 For any queries with respect to these guidelines, please send an
 email to
-mailto:cont...@openssl.org";>cont...@openssl.org.
+mailto:osf-cont...@openssl.org";>osf-cont...@openssl.org.
 
 Organisations Licensed to Use OpenSSL Trademarks
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  39045b9f57b5ff168bb646f44119bf4dc55ba37c (commit)
  from  2c0a67c87382d0e10d4ee02921e4d59358906039 (commit)


- Log -
commit 39045b9f57b5ff168bb646f44119bf4dc55ba37c
Author: Beat Bolli 
Date:   Sat Sep 29 00:20:38 2018 +0200

inc/screen.css: style  and  like  and 

pod2html emits the deprecated visual tags instead of the semantic ones,
so we have to style the visual tags as well.

Fixes #74

Reviewed-by: Tim Hudson 
Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/85)

---

Summary of changes:
 inc/screen.css | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/inc/screen.css b/inc/screen.css
index 9a5b157..e3d672c 100644
--- a/inc/screen.css
+++ b/inc/screen.css
@@ -239,11 +239,11 @@ ul ul, ul ol, ol ul, ol ol {
   margin-bottom: 0em;
 }
 
-strong {
+strong, b {
   font-weight: bold;
 }
 
-em {
+em, i {
   font-style: italic;
 }
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  2c0a67c87382d0e10d4ee02921e4d59358906039 (commit)
   via  14964aea93f2691734f6f40a3207e810349b9c2c (commit)
   via  e5d4e54cc90c3c5756e03b32b5490a2cbf26b42a (commit)
  from  d7b78dd4edd7fda96fc4b1fafdfd7686108d2b22 (commit)


- Log -
commit 2c0a67c87382d0e10d4ee02921e4d59358906039
Merge: d7b78dd 14964ae
Author: Mark J. Cox 
Date:   Mon Sep 24 10:42:11 2018 +0100

Merge pull request #84 from iamamoose/vulns111

Missing the 1.1.1 vulns page which will be needed when any issues get fixed

commit 14964aea93f2691734f6f40a3207e810349b9c2c
Author: Mark J. Cox 
Date:   Mon Sep 24 10:36:15 2018 +0100

Add page for 1.1.1 vulnerabilities, this will get automatically updated when
there are any (the breadcrumbs will get updated automatically at that time)

commit e5d4e54cc90c3c5756e03b32b5490a2cbf26b42a
Author: Mark J. Cox 
Date:   Mon Sep 24 10:35:14 2018 +0100

Don't imply there are no vulnerabilities at all, just that we've not 
released fixes for any yet

---

Summary of changes:
 bin/mk-cvepage  | 2 +-
 news/{vulnerabilities-1.0.2.html => vulnerabilities-1.1.1.html} | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)
 copy news/{vulnerabilities-1.0.2.html => vulnerabilities-1.1.1.html} (92%)

diff --git a/bin/mk-cvepage b/bin/mk-cvepage
index 8dbb864..10654b6 100755
--- a/bin/mk-cvepage
+++ b/bin/mk-cvepage
@@ -147,7 +147,7 @@ preface += ""
 if allissues != "":
 preface += allissues + ""
 else:
-preface += "No vulnerabilities"
+preface += "No vulnerabilities fixed"
 
 sys.stdout.write(preface.encode('utf-8'))
 
diff --git a/news/vulnerabilities-1.0.2.html b/news/vulnerabilities-1.1.1.html
similarity index 92%
copy from news/vulnerabilities-1.0.2.html
copy to news/vulnerabilities-1.1.1.html
index 0f1ac3b..db54fa1 100644
--- a/news/vulnerabilities-1.0.2.html
+++ b/news/vulnerabilities-1.1.1.html
@@ -15,7 +15,7 @@
   If you think you have found a security bug in OpenSSL,
   please report it to us.

-
+

  
  
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  d7b78dd4edd7fda96fc4b1fafdfd7686108d2b22 (commit)
  from  256ea23dae5b675ded6823625d6a966a353c2f5d (commit)


- Log -
commit d7b78dd4edd7fda96fc4b1fafdfd7686108d2b22
Author: Dr. Matthias St. Pierre 
Date:   Sat Sep 22 16:42:58 2018 +0200

Remove pre-release from 1.1.1

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/openssl/pull/83)

---

Summary of changes:
 docs/manpages.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/docs/manpages.html b/docs/manpages.html
index 91623d9..d75fec0 100644
--- a/docs/manpages.html
+++ b/docs/manpages.html
@@ -14,7 +14,7 @@

 
   master
-  1.1.1 (pre-release)
+  1.1.1
   1.1.0
   1.0.2
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  256ea23dae5b675ded6823625d6a966a353c2f5d (commit)
  from  2b448f5a972d0f89e4b141d0568984dc1d37d489 (commit)


- Log -
commit 256ea23dae5b675ded6823625d6a966a353c2f5d
Author: Richard Levitte 
Date:   Wed Sep 19 02:20:27 2018 +0200

inc/screen.css: no pre-wrap

There's no reason why the contents of  element should be wrapped on
line breaks.  Set white-space to 'normal' instead.

This property is useful in case we happen to inherit some other
setting of that property and want to get back to a normal setting.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/openssl/pull/79)

---

Summary of changes:
 inc/screen.css | 5 +
 1 file changed, 1 insertion(+), 4 deletions(-)

diff --git a/inc/screen.css b/inc/screen.css
index c526275..9a5b157 100644
--- a/inc/screen.css
+++ b/inc/screen.css
@@ -362,10 +362,7 @@ article blockquote cite:before {
 
 /* @extend this to force long lines of continuous text to wrap */
 .force-wrap, article a, aside.sidebar a {
-  white-space: -moz-pre-wrap;
-  white-space: -pre-wrap;
-  white-space: -o-pre-wrap;
-  white-space: pre-wrap;
+  white-space: normal;
   word-wrap: break-word;
 }
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  2b448f5a972d0f89e4b141d0568984dc1d37d489 (commit)
  from  8a1b9339b244cf9bf76bb1bed0eb6e6cd45b3871 (commit)


- Log -
commit 2b448f5a972d0f89e4b141d0568984dc1d37d489
Author: Richard Levitte 
Date:   Wed Sep 19 02:47:10 2018 +0200

Fix openssl.com htaccess

Redirect works with prefixes.  If only / should be redirected and not
any sub-path, use RedirectMatch

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/81)

---

Summary of changes:
 .htaccess.openssl.com | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/.htaccess.openssl.com b/.htaccess.openssl.com
index 90b3e57..2af9a82 100644
--- a/.htaccess.openssl.com
+++ b/.htaccess.openssl.com
@@ -1,4 +1,5 @@
 # -*- Apache -*-
-Redirect permanent / https://www.openssl.org/community/contacts.html
 Redirect permanent /verifycd.html 
https://www.openssl.org/docs/fips/verifycd.html
+
+RedirectMatch permanent "^/$" https://www.openssl.org/community/contacts.html
 RedirectMatch permanent "^(.*)$" "https://www.openssl.org$1";
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  8a1b9339b244cf9bf76bb1bed0eb6e6cd45b3871 (commit)
  from  53cc720aa09a60463d62d184ab6e23baccef5e71 (commit)


- Log -
commit 8a1b9339b244cf9bf76bb1bed0eb6e6cd45b3871
Author: Richard Levitte 
Date:   Wed Sep 19 02:25:26 2018 +0200

Add a openssl.com specific .htaccess

This allows us to redirect whatever openssl.com URLs we want freely.
The setup in the openssl.com site configuration will include this line:

AccessFileName .htaccess.openssl.com .htaccess

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/80)

---

Summary of changes:
 .htaccess.openssl.com | 4 
 1 file changed, 4 insertions(+)
 create mode 100644 .htaccess.openssl.com

diff --git a/.htaccess.openssl.com b/.htaccess.openssl.com
new file mode 100644
index 000..90b3e57
--- /dev/null
+++ b/.htaccess.openssl.com
@@ -0,0 +1,4 @@
+# -*- Apache -*-
+Redirect permanent / https://www.openssl.org/community/contacts.html
+Redirect permanent /verifycd.html 
https://www.openssl.org/docs/fips/verifycd.html
+RedirectMatch permanent "^(.*)$" "https://www.openssl.org$1";
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  53cc720aa09a60463d62d184ab6e23baccef5e71 (commit)
   via  7c369dac41a2f5a25d3533932686c860958b2643 (commit)
   via  fb942af17ae8fff1e18939d57676678931e9b7e4 (commit)
   via  a1a3195d8d9abdbc5238618b23f73cb774262d09 (commit)
   via  91ca9441703a779d4c065dc181653410914ee6f2 (commit)
  from  50ac168c298eedf5aced96da0b6eff5aee57b9fd (commit)


- Log -
commit 53cc720aa09a60463d62d184ab6e23baccef5e71
Merge: 50ac168 7c369da
Author: Mark J. Cox 
Date:   Tue Sep 18 14:07:12 2018 +0100

Merge pull request #77 from iamamoose/oss

Merge information from openssl.com and about OSS into main site

commit 7c369dac41a2f5a25d3533932686c860958b2643
Author: Mark J. Cox 
Date:   Tue Sep 18 13:09:05 2018 +0100

Update to the latest OSS bylaws

commit fb942af17ae8fff1e18939d57676678931e9b7e4
Author: Mark J. Cox 
Date:   Tue Sep 18 11:04:31 2018 +0100

Add verify CD image

commit a1a3195d8d9abdbc5238618b23f73cb774262d09
Author: Mark J. Cox 
Date:   Tue Sep 18 11:03:45 2018 +0100

Add the page from http://openssl.com/verifycd.html but update to
show we do not accept US cheques/checks at this time.

commit 91ca9441703a779d4c065dc181653410914ee6f2
Author: Mark J. Cox 
Date:   Tue Sep 18 10:49:41 2018 +0100

Add OSS bylaws and details of OSS to the contact page rather than using 
openssl.com
which we should deprecate.  Bring wording for FIPS in line with what we 
used on
openssl.com

---

Summary of changes:
 community/contacts.html |  19 
 docs/fips/verifycd.html |  81 
 docs/fips/verifycd.jpg  | Bin 0 -> 20887 bytes
 policies/oss-bylaws.pdf | Bin 0 -> 38884 bytes
 4 files changed, 94 insertions(+), 6 deletions(-)
 create mode 100644 docs/fips/verifycd.html
 create mode 100644 docs/fips/verifycd.jpg
 create mode 100644 policies/oss-bylaws.pdf

diff --git a/community/contacts.html b/community/contacts.html
index 5c6f6a6..8c0820e 100644
--- a/community/contacts.html
+++ b/community/contacts.html
@@ -17,10 +17,21 @@
  (US) non-profit corporation with its own bylaws.
 
+ OpenSSL Software Services
+   (OSS) also represents the OpenSSL project, for
+Support Contracts, and 
+as the
+   Vendor of Record for NIST Cryptographic Module
+https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/1747";>#1747
+(This is an open-source validation of FIPS-140 based on OpenSSL).  
+It is a Delaware (US) corporation with its own bylaws.
+
  
-  The best way to contact OSF is by sending an email to
+  The best way to contact OSF or OSS is by sending an email to
   mailto:osf-cont...@openssl.org";>osf-cont...@openssl.org.
-  For postal or telephone contact, use the following:
+  For postal contact, use the following:
 
  
40 E Main St, Suite 744
@@ -29,10 +40,6 @@
  
  
 
- https://www.openssl.com";>OpenSSL Software Services
- (OSS) also represents the OpenSSL project, most notably as the
- Vendor of Record for the FIPS validation.
-


  You are here: Home
diff --git a/docs/fips/verifycd.html b/docs/fips/verifycd.html
new file mode 100644
index 000..a30a9c1
--- /dev/null
+++ b/docs/fips/verifycd.html
@@ -0,0 +1,81 @@
+
+
+
+
+  
+  
+
+  
+   
+  FIPS 140-2 verification of the OpenSSL FIPS Object 
Module source distribution file
+ 
+
+
+
+The latest of the OpenSSL FIPS Object Module ("FIPS module")
+FIPS 140-2 validations saw the introduction of a new requirement
+by the CMVP:
+
+  The distribution tar file, shall be verified using an
+independently acquired FIPS 140-2 validated cryptographic
+module...
+
+Some prospective users of the OpenSSL FIPS Object Module 2.0 already
+have ready access to an existing securely-installed software product
+using FIPS 140-2 validated cryptography that is capable of calculating
+the HMAC-SHA-1 digest of a file on disk, in which case satisfying this
+requirement is easy (simply calculate the HMAC-SHA-1 digest of the
+source distribution file using the key "etaonrishdlcupfm"
+and confirm it is that same as documented in the http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm";>Security
 Policy
+document (e.g., "2cdd29913c6523df8ad38da11c342b80ed3f1dae" for
+openssl-fips-2.0.tar.gz).
+
+
+For most prospective users the identification, acquisition,
+installation, and configuration of a suitable product may be a challenge.
+(See Section 6.6 of our FIPS
+User
+  Guide)
+The requirement for this verification with an in

[openssl-commits] [web] master update

The branch master has been updated
   via  50ac168c298eedf5aced96da0b6eff5aee57b9fd (commit)
   via  6bde6d627da78566f2b1b1f1b4dfdd3781fa91ee (commit)
  from  a9e5da9e4698a64397f1f564337f13207518f3ee (commit)


- Log -
commit 50ac168c298eedf5aced96da0b6eff5aee57b9fd
Merge: a9e5da9 6bde6d6
Author: Mark J. Cox 
Date:   Tue Sep 18 13:24:11 2018 +0100

Merge pull request #78 from iamamoose/osf

Update to latest OSF bylaws

commit 6bde6d627da78566f2b1b1f1b4dfdd3781fa91ee
Author: Mark J. Cox 
Date:   Tue Sep 18 13:11:56 2018 +0100

Update to latest OSF bylaws

---

Summary of changes:
 policies/osf-bylaws.pdf | Bin 44509 -> 45594 bytes
 1 file changed, 0 insertions(+), 0 deletions(-)

diff --git a/policies/osf-bylaws.pdf b/policies/osf-bylaws.pdf
index ed4810c..b0a3994 100644
Binary files a/policies/osf-bylaws.pdf and b/policies/osf-bylaws.pdf differ
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  a9e5da9e4698a64397f1f564337f13207518f3ee (commit)
  from  b0d67bb874e71cd8708f374a0111b95fe76ffc87 (commit)


- Log -
commit a9e5da9e4698a64397f1f564337f13207518f3ee
Author: Matt Caswell 
Date:   Tue Sep 11 14:16:04 2018 +0100

Updates for the 1.1.1 release

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/76)

---

Summary of changes:
 news/newsflash.txt |  1 +
 source/index.html  | 28 
 2 files changed, 21 insertions(+), 8 deletions(-)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index f1001bd..1a0f0fb 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+11-Sep-2018: Final version of OpenSSL 1.1.1 (LTS) is now available: please 
download and upgrade!
 21-Aug-2018: Beta 7 of OpenSSL 1.1.1 (pre release 9) is now available: please 
download and test it
 14-Aug-2018: OpenSSL 1.1.0i is now available, including bug and security fixes
 14-Aug-2018: OpenSSL 1.0.2p is now available, including bug and security fixes
diff --git a/source/index.html b/source/index.html
index 6c6c066..a4a98ce 100644
--- a/source/index.html
+++ b/source/index.html
@@ -30,11 +30,20 @@
A list of mirror sites can be found here.

 
-   Note: The latest stable version is the 1.1.0 series.
-The 1.0.2 series is our Long Term
-   Support (LTS) release, supported until 31st December 2019.
-The 0.9.8, 1.0.0 and 1.0.1 versions are now out of support and
-   should not be used.
+   Note: The latest stable version is the 1.1.1 series. 
This is
+also our Long Term Support (LTS) version, supported until 11th 
September
+2023. Our previous LTS version (1.0.2 series) will continue to be
+supported until 31st December 2019 (security fixes only during the last
+year of support). The 1.1.0 series is currently only receiving security
+fixes and will go out of support on 11th September 2019. All users of
+1.0.2 and 1.1.0 are encouraged to upgrade to 1.1.1 as soon as possible.
+The 0.9.8, 1.0.0 and 1.0.1 versions are now out of support and should
+not be used.
+
+The OpenSSL FIPS Object Module 2.0 (FOM) is also available for
+download. It is no longer receiving updates. It must be used in
+conjunction with a FIPS capable version of OpenSSL (1.0.2 series). A
+new FIPS module is currently in development.
 

  
@@ -47,9 +56,12 @@
 
 
When building a release for the first time, please make sure
-   to look at the README and INSTALL files in the distribution.
-   If you have problems, look at the FAQ, which can be
-   found online.
+   to look at the INSTALL file in the distribution along with any NOTES
+file applicable to your platform. If you have problems, look at the 
FAQ,
+which can be found online. If you
+still need more help, then join the
+openssl-users email list and
+post a question there.
 
PGP keys for the signatures are available from the
https://www.openssl.org/community/omc.html";>OMC page.
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  b0d67bb874e71cd8708f374a0111b95fe76ffc87 (commit)
   via  963878785a6afbb5bbc714cc38a0cea7358e19cc (commit)
  from  6c27271343534942a6fee6fa97302072bde93e67 (commit)


- Log -
commit b0d67bb874e71cd8708f374a0111b95fe76ffc87
Merge: 6c27271 9638787
Author: Mark J. Cox 
Date:   Thu Aug 30 14:34:35 2018 +0100

Merge pull request #75 from iamamoose/mirrors

remove broken mirrors

commit 963878785a6afbb5bbc714cc38a0cea7358e19cc
Author: Mark J. Cox 
Date:   Thu Aug 30 14:21:26 2018 +0100

remove broken mirrors

---

Summary of changes:
 source/mirror.html | 4 
 1 file changed, 4 deletions(-)

diff --git a/source/mirror.html b/source/mirror.html
index 0e2419b..96c7386 100644
--- a/source/mirror.html
+++ b/source/mirror.html
@@ -16,10 +16,6 @@

  LocaleURL
 
- ATftp://gd.tuwien.ac.at/infosys/security/openssl/";>ftp://gd.tuwien.ac.at/infosys/security/openssl/
- CAhttp://openssl.skazkaforyou.com/";>http://openssl.skazkaforyou.com/
  CZftp://ftp.fi.muni.cz/pub/openssl/";>ftp://ftp.fi.muni.cz/pub/openssl/
  DEhttps://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  6c27271343534942a6fee6fa97302072bde93e67 (commit)
  from  60246d07484ce72139483e7bbcc52c7b45a3b408 (commit)


- Log -
commit 6c27271343534942a6fee6fa97302072bde93e67
Author: Richard Levitte 
Date:   Wed Aug 22 13:01:20 2018 +0200

Update the end copyright year

Reviewed-by: Matt Caswell 
Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/openssl/pull/72)

---

Summary of changes:
 inc/footer.shtml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/inc/footer.shtml b/inc/footer.shtml
index 89f8e84..65be9f1 100644
--- a/inc/footer.shtml
+++ b/inc/footer.shtml
@@ -4,7 +4,7 @@
 Please report problems with this website to webmaster at openssl.org.
   
   
-Copyright © 1999-2017, OpenSSL Software Foundation.
+Copyright © 1999-2018, OpenSSL Software Foundation.
   
 
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  60246d07484ce72139483e7bbcc52c7b45a3b408 (commit)
  from  46b7dc43cbd00b4d6cf275afb544a770a991a2ec (commit)


- Log -
commit 60246d07484ce72139483e7bbcc52c7b45a3b408
Author: Matt Caswell 
Date:   Tue Aug 21 15:30:13 2018 +0100

Update the support contracts page

In accordance with an OMC vote

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/71)

---

Summary of changes:
 support/contracts.html | 93 +++---
 1 file changed, 20 insertions(+), 73 deletions(-)

diff --git a/support/contracts.html b/support/contracts.html
index 0651184..7f35804 100644
--- a/support/contracts.html
+++ b/support/contracts.html
@@ -15,7 +15,9 @@
OpenSSL Software Services
offers three different types of support contract.  If you
have specific requirements not addressed by any of these plans,
-   or for more information, discuss custom arrangements.
+   or for more information, please contact us at
+   mailto:osf-cont...@openssl.org";>osf-cont...@openssl.org to
+   discuss custom arrangements.
 
Please see the list of definitions
at the bottom of the page for the definitions used below.
@@ -25,11 +27,11 @@
  Enterprise Level Support
  Designed for the large enterprise utilising OpenSSL
  extensively in product lines or critical infrastructure.
- Vendor Support
+ Vendor Support
  Designed for organisations requiring support of product
  lines using OpenSSL or for customised in-house versions of
  OpenSSL.
- Basic Support
+ Basic Support
  Basic technical support for application development shops or
  end users.

@@ -38,102 +40,47 @@
Premium Level Support
US$50,000 annually

- All technical support requests handled directly by a 
Designated Responder
- 24x7x365 availability
- Four Support Administrators
- Unlimited Service Requests
- Custom patch preparation and creation
- OpenSSL FIPS Object Module support included
- FIPS validation support
+ A custom support contract designed to meet the needs of a 
specific Enterprise customer
+ Exact costs will depend on the terms of the agreed support 
contract

-   The premium support plan is designed for the large enterprise
+   The premium support plan is intended for the large enterprise
using OpenSSL as an essential component of multiple products or
product lines or in support of in-house or commercially provided
-   services. Many prospective Premium Level customers have already
-   hired individual OpenSSL team members for specific tasks. The
-   typical large enterprise customer has a capable in-house technical
-   staff but still finds it cost-effective to engage the world class
-   talent of OpenSSL authors and maintainers.  Customisation of
-   OpenSSL by prospective Schedule A customers is common, as are
-   "private label" FIPS 140-2 validations.
-   Note we don't expect to sell very many of the premium support
-   plans, but those few customers will receive careful attention for
-   both immediate problems and long range strategic interests.
+   services. The typical large enterprise customer has a capable 
in-house
+   technical staff but still finds it cost-effective to engage OpenSSL
+   authors and maintainers directly.
 
Vendor Level Support
-   US$20,000 annually
+   US$25,000 annually

- Institutional Response with escalation to Designated 
Responder as appropriate.
- 12x5 availability
- Two Support Administrators
+ Email response
  Limit of four Service Requests per month
- Custom patch preparation
- OpenSSL FIPS Object Module support included
- FIPS validation support excluded
+ Patch preparation
+ Two Support Administrators

This plan is designed for the medium enterprise using OpenSSL
for a single product or product line. The prospective Vendor Level
Support customer has a proficient technical staff but no specific
-   expertise in cryptography or OpenSSL. Technical support is
-   provided for use of the unmodified OpenSSL FIPS Object Module, but
-   not for validations of derivative software.
+   expertise in cryptography or Op

[openssl-commits] [web] master update

The branch master has been updated
   via  46b7dc43cbd00b4d6cf275afb544a770a991a2ec (commit)
  from  b966818f2cf7a74e2535e6717f53a603f684fc89 (commit)


- Log -
commit 46b7dc43cbd00b4d6cf275afb544a770a991a2ec
Author: Matt Caswell 
Date:   Tue Aug 21 13:23:58 2018 +0100

Updates to newsflash for the pre9 release

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/70)

---

Summary of changes:
 news/newsflash.txt | 1 +
 1 file changed, 1 insertion(+)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 6913436..f1001bd 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+21-Aug-2018: Beta 7 of OpenSSL 1.1.1 (pre release 9) is now available: please 
download and test it
 14-Aug-2018: OpenSSL 1.1.0i is now available, including bug and security fixes
 14-Aug-2018: OpenSSL 1.0.2p is now available, including bug and security fixes
 20-Jun-2018: Beta 6 of OpenSSL 1.1.1 (pre release 8) is now available: please 
download and test it
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  b966818f2cf7a74e2535e6717f53a603f684fc89 (commit)
   via  75e2b7a51f0c104ebfbfecdc49d24e3f5b017581 (commit)
  from  69f29ba7e9075d3e7cb078a3ee0581665b8ce0bd (commit)


- Log -
commit b966818f2cf7a74e2535e6717f53a603f684fc89
Merge: 75e2b7a 69f29ba
Author: Mark J. Cox 
Date:   Fri Aug 17 10:21:51 2018 +0100

Merge branch 'master' of git.openssl.org:openssl-web

commit 75e2b7a51f0c104ebfbfecdc49d24e3f5b017581
Author: Mark J. Cox 
Date:   Fri Aug 17 10:21:21 2018 +0100

Rearrange to alphabetical order which makes more sense (ack'd by Tim)

---

Summary of changes:
 support/acks.html | 10 +-
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/support/acks.html b/support/acks.html
index 4094177..eea4919 100644
--- a/support/acks.html
+++ b/support/acks.html
@@ -15,7 +15,7 @@
 
  We would like to identify and thank the following such sponsors
  for their significant support of the OpenSSL project. Sponsors are
- listed chronologically within categories.  Please note that we ask
+ listed alphabetically within categories.  Please note that we ask
  permission to identify sponsors and that some sponsors we consider
  eligible for inclusion here have requested to remain anonymous.
 
@@ -53,15 +53,15 @@
  Platinum support:
 
   
- https://www.netapp.com/";>  
  https://www.bluecedar.com/";>  
- https://www.vmware.com/";>https://www.huawei.com/";>
+ https://www.netapp.com/";>  
  https://www.oracle.com/";>
- https://www.huawei.com/";>https://www.vmware.com/";>
   
 
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  69f29ba7e9075d3e7cb078a3ee0581665b8ce0bd (commit)
  from  22fe269070986cdb68933423044f4d126a154d0c (commit)


- Log -
commit 69f29ba7e9075d3e7cb078a3ee0581665b8ce0bd
Author: Matt Caswell 
Date:   Tue Aug 14 13:43:06 2018 +0100

Updates for the new releases

Reviewed-by: Richard Levitte 
(Merged from https://github.com/openssl/web/pull/68)

---

Summary of changes:
 news/newsflash.txt   |  2 ++
 news/vulnerabilities.xml | 10 +-
 2 files changed, 7 insertions(+), 5 deletions(-)

diff --git a/news/newsflash.txt b/news/newsflash.txt
index dabc4fa..6913436 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,8 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+14-Aug-2018: OpenSSL 1.1.0i is now available, including bug and security fixes
+14-Aug-2018: OpenSSL 1.0.2p is now available, including bug and security fixes
 20-Jun-2018: Beta 6 of OpenSSL 1.1.1 (pre release 8) is now available: please 
download and test it
 12-Jun-2018: Security Advisory: one 
low severity fix
 29-May-2018: Beta 5 of OpenSSL 1.1.1 (pre release 7) is now available: please 
download and test it
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index 97f818b..6ef9c56 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,7 @@
 
 
-
+
   
 
 
@@ -36,10 +36,10 @@
 
 
 
-
+
   
 
-
+
   
 
 Client side Denial of Service
@@ -82,10 +82,10 @@
 
 
 
-
+
   
 
-
+
   
 
 Constant time issue
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  22fe269070986cdb68933423044f4d126a154d0c (commit)
  from  23d754d753ebe6ed6b1ec6e8c9cecd67bdb0c6a1 (commit)


- Log -
commit 22fe269070986cdb68933423044f4d126a154d0c
Author: Rich Salz 
Date:   Tue Aug 14 07:59:18 2018 -0400

Add FIPS FAQ, update FIPS status.

---

Summary of changes:
 docs/faq-5-misc.txt |  7 +++
 docs/fips.html  | 21 ++---
 2 files changed, 21 insertions(+), 7 deletions(-)

diff --git a/docs/faq-5-misc.txt b/docs/faq-5-misc.txt
index f2810e5..006b323 100644
--- a/docs/faq-5-misc.txt
+++ b/docs/faq-5-misc.txt
@@ -33,6 +33,13 @@ that came with the version of OpenSSL you are using. The pod 
format
 documentation is included in each OpenSSL distribution under the docs
 directory.
 
+* I need a FIPS validated offering
+
+Please see
+@@@https://www.openssl.org/docs/fips.html@@@; the OpenSSL project is no longer
+involved in private label validations nor adding platforms to the existing
+certificates.
+
 * How can I contact the OpenSSL developers?
 
 The README file describes how to submit bug reports and patches to
diff --git a/docs/fips.html b/docs/fips.html
index 5c9b3ec..7bbce9c 100644
--- a/docs/fips.html
+++ b/docs/fips.html
@@ -10,7 +10,7 @@
  FIPS-140
  
 
-   The most recent open source based validation of a cryptographic
+   The current validation of a cryptographic
module (Module) compatible with the OpenSSL 1.0.2
is v2.0.16, FIPS 140-2 certificate https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/1747";>#1747.
@@ -28,6 +28,19 @@

 
 
+Neither validation will work with any release other than 1.0.2.
+The OpenSSL project is no longer maintaining either the 1747
+or the 2398 module. This includes adding platforms to those
+validations.
+We are starting work on a new validation, after the 1.1.1
+release completes.
+That module will have a small set of validated operational
+environments.
+The OpenSSL project is no longer involved in private label
+validations nor adding platforms to the existing certificates.
+
+
+
Here is the complete set of files. Note that if you are interested
 in the "1747" validation, you only need the three files mentioned
 above.
@@ -68,12 +81,6 @@
  source based validated module directly.  You must obtain your
  own validation.
 
-  None of the validations will work with OpenSSL 1.1.0 or
-  later.
-
-  We are starting work on a new validation based on the
-  upcoming 1.1.1 release.
-

 
  
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  23d754d753ebe6ed6b1ec6e8c9cecd67bdb0c6a1 (commit)
  from  556c539ce00cf8242a2d63018638942a21ef2319 (commit)


- Log -
commit 23d754d753ebe6ed6b1ec6e8c9cecd67bdb0c6a1
Author: Mark J. Cox 
Date:   Tue Aug 14 12:21:00 2018 +0100

Another try at table spacing for donations page

---

Summary of changes:
 support/donations.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/support/donations.html b/support/donations.html
index aa5c8c6..1e6d56e 100644
--- a/support/donations.html
+++ b/support/donations.html
@@ -30,7 +30,7 @@
 We provide Acknowledgements for sponsors
 depending on the level of funding:
 
-   
+   
  LevelAcknowledgement
 
  Exceptional$75,000+/yr
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  556c539ce00cf8242a2d63018638942a21ef2319 (commit)
  from  a696660505f56a54173bb0cf400fd22f0458bc77 (commit)


- Log -
commit 556c539ce00cf8242a2d63018638942a21ef2319
Author: Mark J. Cox 
Date:   Tue Aug 14 12:19:26 2018 +0100

Make the table look a tiny bit better

---

Summary of changes:
 support/donations.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/support/donations.html b/support/donations.html
index 9acfb51..aa5c8c6 100644
--- a/support/donations.html
+++ b/support/donations.html
@@ -30,7 +30,7 @@
 We provide Acknowledgements for sponsors
 depending on the level of funding:
 
-   
+   
  LevelAcknowledgement
 
  Exceptional$75,000+/yr
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

The branch master has been updated
   via  a696660505f56a54173bb0cf400fd22f0458bc77 (commit)
  from  eb318b531e5f84572847a0cd6e3620396b43dc99 (commit)


- Log -
commit a696660505f56a54173bb0cf400fd22f0458bc77
Author: Mark J. Cox 
Date:   Tue Aug 14 12:15:30 2018 +0100

Update sponsros and acks page to match reality

---

Summary of changes:
 support/acks.html  | 69 +-
 support/donations.html | 39 ++--
 2 files changed, 71 insertions(+), 37 deletions(-)

diff --git a/support/acks.html b/support/acks.html
index 5c60a0c..4094177 100644
--- a/support/acks.html
+++ b/support/acks.html
@@ -11,37 +11,70 @@

  The OpenSSL project depends on volunteer efforts and financial
  support from the end user community.  That support comes
- in the form of donations, contracts, and volunteer contributions.
- Since all of these activities support the continued development
- and improvement of OpenSSL, we consider all of them to be
- sponsors of the OpenSSL project.
+  in many forms.
 
  We would like to identify and thank the following such sponsors
- for their past or current significant support of the OpenSSL
- project. Except as noted sponsors are listed within categories in
- order of overall contribution value. Please note that we ask
+ for their significant support of the OpenSSL project. Sponsors are
+ listed chronologically within categories.  Please note that we ask
  permission to identify sponsors and that some sponsors we consider
  eligible for inclusion here have requested to remain anonymous.
 
+  Current Sponsors:
+
+  
+.sponsorlogo {
+height: 100px !important;
+width: 210px !important;
+object-fit: contain !important;
+object-position: 50% 50% !important;
+padding-left: 15px !important;
+padding-top: 10px !important;
+padding-bottom: 10px !important;
+padding-right: 15px !important;
+}
+.sponsorsection {
+background-color: #ff !important;
+text-align: center !important;
+}
+  
+  
  
  Exceptional support:
 
- http://www.smartisan.com/";>
+  
+ https://www.akamai.com/";>
+ https://www.smartisan.com/";>
+  
 
+
  
- Platinum sponsors (listed chronologically).  The
- sustainable funding provided by these sponsorships allows long term
- planning:
- http://www.huawei.com/";>
- https://www.oracle.com/";>
+ Platinum support:
 
- 
- Major support:
- https://www.akamai.com/";>
+  
+ https://www.netapp.com/";>  
+ https://www.bluecedar.com/";>  
+ https://www.vmware.com/";>
+ https://www.oracle.com/";>
+ https://www.huawei.com/";>
+  
+
+
+
+  
+  
+
 
  
  
diff --git a/support/donations.html b/support/donations.html
index 7c320e9..9acfb51 100644
--- a/support/donations.html
+++ b/support/donations.html
@@ -7,11 +7,19 @@
 
   

- Donations
+ Sponsorship and Donations
  
-   Your donation to the OpenSSL team will support the ongoing
-   development activities of the team members.
+The OpenSSL project relies on funding to maintain and improve
+OpenSSL.
 
+You can support the OpenSSL project financially with the
+purchase of a support contract, by a
+sponsorship donation, or by hiring OSF for consulting services or
+custom software development.
+
+We do not have a PayPal account. Please do not donate to any
+PayPal account claiming to be associated with us!
+
Please note that the
OpenSSL Software Foundation
(OSF) is incorporated in the the state of Delaware, United States,
@@ -19,20 +27,18 @@
charitable organisation under Section 501(c)(3) of the U.S.
 Internal Revenue Code.
 
-   In addition to direct financial contributions in the form of
-   donations or sponsorship you may also support the OpenSSL project
-   financially with the purchase of a
-support contract, or by hiring OSF
-   for consulting services or custom software development.  We
-   consider all sources of funding to be sponsors, because we use all
-   such funding, whether donations or pay for services rendered, for
-   the same purpose -- to i

<    1   2   3   4   5   6   7   8   >