[openssl-commits] Still FAILED build of OpenSSL branch master with options -d --strict-warnings no-dso

2019-01-29 Thread OpenSSL run-checker
Platform and configuration command:

$ uname -a
Linux run 4.4.0-135-generic #161-Ubuntu SMP Mon Aug 27 10:45:01 UTC 2018 x86_64 
x86_64 x86_64 GNU/Linux
$ CC=clang ../openssl/config -d --strict-warnings no-dso

Commit log since last time:

fa6b1ee111 Don't leak memory from ERR_add_error_vdata()
6e826c471b Android build: use ANDROID_NDK_HOME rather than ANDROID_NDK

Build log ended with (last 100 lines):

../../openssl/test/recipes/30-test_pkey_meth_kdf.t  ok
../../openssl/test/recipes/40-test_rehash.t ... ok
../../openssl/test/recipes/60-test_x509_check_cert_pkey.t . ok
../../openssl/test/recipes/60-test_x509_dup_cert.t  ok
../../openssl/test/recipes/60-test_x509_store.t ... ok
../../openssl/test/recipes/60-test_x509_time.t  ok
../../openssl/test/recipes/70-test_asyncio.t .. ok
../../openssl/test/recipes/70-test_bad_dtls.t . ok
../../openssl/test/recipes/70-test_clienthello.t .. ok
../../openssl/test/recipes/70-test_comp.t . skipped: 
test_comp needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_key_share.t  skipped: 
test_key_share needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_packet.t ... ok
../../openssl/test/recipes/70-test_recordlen.t  ok
../../openssl/test/recipes/70-test_renegotiation.t  skipped: 
test_renegotiation needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_servername.t ... ok
../../openssl/test/recipes/70-test_sslcbcpadding.t  skipped: 
test_sslcbcpadding needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslcertstatus.t  skipped: 
test_sslcertstatus needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslextension.t . skipped: 
test_sslextension needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslmessages.t .. skipped: 
test_sslmessages needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslrecords.t ... skipped: 
test_sslrecords needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslsessiontick.t ... skipped: 
test_sslsessiontick needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslsigalgs.t ... skipped: 
test_sslsigalgs needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslsignature.t . skipped: 
test_sslsignature needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslskewith0p.t . skipped: 
test_sslskewith0p needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslversions.t .. skipped: 
test_sslversions needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_sslvertol.t  skipped: 
test_sslextension needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_tls13alerts.t .. skipped: 
test_tls13alerts needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_tls13cookie.t .. skipped: 
test_tls13cookie needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_tls13downgrade.t ... skipped: 
test_tls13downgrade needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_tls13hrr.t . skipped: 
test_tls13hrr needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_tls13kexmodes.t  skipped: 
test_tls13kexmodes needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_tls13messages.t  skipped: 
test_tls13messages needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_tls13psk.t . skipped: 
test_tls13psk needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_tlsextms.t . skipped: 
test_tlsextms needs the dynamic engine feature enabled
../../openssl/test/recipes/70-test_verify_extra.t . ok
../../openssl/test/recipes/70-test_wpacket.t .. ok
../../openssl/test/recipes/80-test_ca.t ... ok
../../openssl/test/recipes/80-test_cipherbytes.t .. ok
../../openssl/test/recipes/80-test_cipherlist.t ... ok
../../openssl/test/recipes/80-test_ciphername.t ... ok
../../openssl/test/recipes/80-test_cms.t .. ok
../../openssl/test/recipes/80-test_cmsapi.t ... ok
../../openssl/test/recipes/80-test_ct.t ... ok
../../openssl/test/recipes/80-test_dane.t . ok
../../openssl/test/recipes/80-test_dtls.t . ok
../../openssl/test/recipes/80-test_dtls_mtu.t . ok
../../openssl/test/recipes/80-test_dtlsv1listen.t . ok

[openssl-commits] Build completed: openssl master.22139

2019-01-29 Thread AppVeyor


Build openssl master.22139 completed



Commit 9ff3dc27b3 by David Benjamin on 1/29/2019 11:41 PM:

Check for unpaired .cfi_remember_state


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] Build failed: openssl master.22138

2019-01-29 Thread AppVeyor



Build openssl master.22138 failed


Commit cc5ef67208 by FdaSilvaYY on 1/29/2019 10:54 PM:

CAdES: Fix SignerInfo attribute construction order.


Configure your notification preferences

_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2019-01-29 Thread Richard Levitte
The branch master has been updated
   via  04c0cb565a81ed4357722dcce70c50b3575e2863 (commit)
  from  895ee9dcaa50a72637b907dd3ab62723e23863f9 (commit)


- Log -
commit 04c0cb565a81ed4357722dcce70c50b3575e2863
Author: Richard Levitte 
Date:   Tue Jan 29 13:29:23 2019 +0100

mk-apropos: don't include non-manpage files

mk-apropos looks at all HTML files in a given directory, but failed to
recognise files that aren't rendered manpage, such as index.html.

Reviewed-by: Tim Hudson 
(Merged from https://github.com/openssl/web/pull/109)

---

Summary of changes:
 bin/mk-apropos | 5 +
 1 file changed, 5 insertions(+)

diff --git a/bin/mk-apropos b/bin/mk-apropos
index a9dd5b6..64899a4 100755
--- a/bin/mk-apropos
+++ b/bin/mk-apropos
@@ -6,6 +6,11 @@ cd $dir
 
 for m in `find . -name '*.html' | sort`; do
 description=`grep -F '||'`
+# If there isn't a description, it isn't a manpage and should not be
+# included
+if [ "$description" = "" ]; then
+   continue
+fi
 manfile=`echo $m | sed -e 's|\./||'`
 manname=`basename $manfile .html`
 origmanfile=`echo $manfile | sed -e "s|^$subdir|$origsubdir|"`
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2019-01-29 Thread Richard Levitte
The branch master has been updated
   via  895ee9dcaa50a72637b907dd3ab62723e23863f9 (commit)
  from  8557dd2bb3cebee18ec35347250271322b09d5da (commit)


- Log -
commit 895ee9dcaa50a72637b907dd3ab62723e23863f9
Author: Richard Levitte 
Date:   Tue Jan 29 12:43:41 2019 +0100

Markdown to OpenSSL HTML5 pages

Markdown is a popular format for text files, and some documents are
easier to read in this form than in HTML.  For future purposes, this
is the scripts we need to process markdown files into HTML5.

This script is based on pandoc, which is a pretty good translator
between a range of different document formats.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/108)

---

Summary of changes:
 bin/md-to-html5| 15 +++
 bin/md-to-html5.tmpl.html5 | 34 ++
 2 files changed, 49 insertions(+)
 create mode 100755 bin/md-to-html5
 create mode 100644 bin/md-to-html5.tmpl.html5

diff --git a/bin/md-to-html5 b/bin/md-to-html5
new file mode 100755
index 000..7bb815b
--- /dev/null
+++ b/bin/md-to-html5
@@ -0,0 +1,15 @@
+#! /bin/sh
+
+template="$0.tmpl.html5"
+
+for f in "$@"; do
+b=`basename "$f" .md`
+if [ "$f" != "$b" ]; then
+   bns=`echo "$b" | sed -e 's|  *||g'`
+   t=`dirname "$b"`.tmpl.html5
+   if [ ! -f "$t" ]; then
+   t="$template"
+   fi
+   pandoc -t html5 --template="$t" "$f" > "$bns.html"
+fi
+done
diff --git a/bin/md-to-html5.tmpl.html5 b/bin/md-to-html5.tmpl.html5
new file mode 100644
index 000..b1fbe38
--- /dev/null
+++ b/bin/md-to-html5.tmpl.html5
@@ -0,0 +1,34 @@
+
+
+
+
+
+
+
+  
+
+  
+
+$if(title)$
+
+$title$
+$if(subtitle)$
+$subtitle$
+$endif$
+$for(author)$
+$author$
+$endfor$
+$if(date)$
+$date$
+$endif$
+
+$endif$
+$body$
+
+  
+  
+
+  
+
+
+
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] OpenSSL_1_1_1-stable update

2019-01-29 Thread Matt Caswell
The branch OpenSSL_1_1_1-stable has been updated
   via  9ed9875f0599babfb34bc52c17455765dfc0ac42 (commit)
  from  6b4f989233c7eb22e40106cc77e3007eb223bf4c (commit)


- Log -
commit 9ed9875f0599babfb34bc52c17455765dfc0ac42
Author: Matt Caswell 
Date:   Mon Jan 28 17:17:59 2019 +

Don't leak memory from ERR_add_error_vdata()

If the call the ERR_set_error_data() in ERR_add_error_vdata() fails then
a mem leak can occur. This commit checks that we successfully added the
error data, and if not frees the buffer.

Fixes #8085

Reviewed-by: Paul Yang 
(Merged from https://github.com/openssl/openssl/pull/8105)

(cherry picked from commit fa6b1ee1115c1e5e3a8286d833dcbaa2c1ce2b77)

---

Summary of changes:
 crypto/err/err.c | 18 +++---
 1 file changed, 15 insertions(+), 3 deletions(-)

diff --git a/crypto/err/err.c b/crypto/err/err.c
index 7bac677..48d8cfa 100644
--- a/crypto/err/err.c
+++ b/crypto/err/err.c
@@ -790,20 +790,31 @@ int ERR_get_next_error_library(void)
 return ret;
 }
 
-void ERR_set_error_data(char *data, int flags)
+static int err_set_error_data_int(char *data, int flags)
 {
 ERR_STATE *es;
 int i;
 
 es = ERR_get_state();
 if (es == NULL)
-return;
+return 0;
 
 i = es->top;
 
 err_clear_data(es, i);
 es->err_data[i] = data;
 es->err_data_flags[i] = flags;
+
+return 1;
+}
+
+void ERR_set_error_data(char *data, int flags)
+{
+/*
+ * This function is void so we cannot propagate the error return. Since it
+ * is also in the public API we can't change the return type.
+ */
+err_set_error_data_int(data, flags);
 }
 
 void ERR_add_error_data(int num, ...)
@@ -843,7 +854,8 @@ void ERR_add_error_vdata(int num, va_list args)
 }
 OPENSSL_strlcat(str, a, (size_t)s + 1);
 }
-ERR_set_error_data(str, ERR_TXT_MALLOCED | ERR_TXT_STRING);
+if (!err_set_error_data_int(str, ERR_TXT_MALLOCED | ERR_TXT_STRING))
+OPENSSL_free(str);
 }
 
 int ERR_set_mark(void)
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [openssl] master update

2019-01-29 Thread Matt Caswell
The branch master has been updated
   via  fa6b1ee1115c1e5e3a8286d833dcbaa2c1ce2b77 (commit)
  from  6e826c471b7f0431391a4e9f9484f6ea2833774a (commit)


- Log -
commit fa6b1ee1115c1e5e3a8286d833dcbaa2c1ce2b77
Author: Matt Caswell 
Date:   Mon Jan 28 17:17:59 2019 +

Don't leak memory from ERR_add_error_vdata()

If the call the ERR_set_error_data() in ERR_add_error_vdata() fails then
a mem leak can occur. This commit checks that we successfully added the
error data, and if not frees the buffer.

Fixes #8085

Reviewed-by: Paul Yang 
(Merged from https://github.com/openssl/openssl/pull/8105)

---

Summary of changes:
 crypto/err/err.c | 18 +++---
 1 file changed, 15 insertions(+), 3 deletions(-)

diff --git a/crypto/err/err.c b/crypto/err/err.c
index 4505479..3aa3dae 100644
--- a/crypto/err/err.c
+++ b/crypto/err/err.c
@@ -791,20 +791,31 @@ int ERR_get_next_error_library(void)
 return ret;
 }
 
-void ERR_set_error_data(char *data, int flags)
+static int err_set_error_data_int(char *data, int flags)
 {
 ERR_STATE *es;
 int i;
 
 es = ERR_get_state();
 if (es == NULL)
-return;
+return 0;
 
 i = es->top;
 
 err_clear_data(es, i);
 es->err_data[i] = data;
 es->err_data_flags[i] = flags;
+
+return 1;
+}
+
+void ERR_set_error_data(char *data, int flags)
+{
+/*
+ * This function is void so we cannot propagate the error return. Since it
+ * is also in the public API we can't change the return type.
+ */
+err_set_error_data_int(data, flags);
 }
 
 void ERR_add_error_data(int num, ...)
@@ -844,7 +855,8 @@ void ERR_add_error_vdata(int num, va_list args)
 }
 OPENSSL_strlcat(str, a, (size_t)s + 1);
 }
-ERR_set_error_data(str, ERR_TXT_MALLOCED | ERR_TXT_STRING);
+if (!err_set_error_data_int(str, ERR_TXT_MALLOCED | ERR_TXT_STRING))
+OPENSSL_free(str);
 }
 
 int ERR_set_mark(void)
_
openssl-commits mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits


[openssl-commits] [web] master update

2019-01-29 Thread Richard Levitte
The branch master has been updated
   via  8557dd2bb3cebee18ec35347250271322b09d5da (commit)
  from  0ef1cccd789aa8434f9ef8e3783df637d506b53f (commit)


- Log -
commit 8557dd2bb3cebee18ec35347250271322b09d5da
Author: Richard Levitte 
Date:   Tue Dec 25 15:53:29 2018 +0100

Reformat FAQ files

Make them correct Markdown, and then use pandoc to create the FAQ HTML.
We then use CSS and a bit of Javascript to make it an accordion style
FAQ.

Reviewed-by: Matt Caswell 
(Merged from https://github.com/openssl/web/pull/103)

---

Summary of changes:
 bin/mk-faq   | 110 +++--
 docs/faq-1-legal.txt |  42 ++--
 docs/faq-2-user.txt  | 373 +++
 docs/faq-3-prog.txt  | 614 +--
 docs/faq-4-build.txt | 397 -
 docs/faq-5-misc.txt  | 177 ---
 docs/faq-6-old.txt   |  18 +-
 docs/faq.html|   9 +-
 inc/screen.css   | 121 ++
 9 files changed, 951 insertions(+), 910 deletions(-)

diff --git a/bin/mk-faq b/bin/mk-faq
index 531a6c6..0f92d2e 100755
--- a/bin/mk-faq
+++ b/bin/mk-faq
@@ -1,88 +1,30 @@
-#! /usr/bin/perl
-use strict;
-use warnings;
+#! /bin/sh
 
-# Filename->anchor name
-my %anchors;
-foreach my $f ( @ARGV ) {
-next unless $f =~ /faq-[0-9]-(.*).txt/;
-$anchors{$f} = uc($1);
-}
+cat />/' \
+   | sed -E -e 's/<([^<>]*)>\|([A-Z]*[0-9]*)\|/<\1 id="\2">/'
+done
diff --git a/docs/faq-1-legal.txt b/docs/faq-1-legal.txt
index dc69809..1dfc067 100644
--- a/docs/faq-1-legal.txt
+++ b/docs/faq-1-legal.txt
@@ -1,28 +1,28 @@
-Legal Questions
+ Legal Questions
 
-* Do I need patent licenses to use OpenSSL?
+*   Do I need patent licenses to use OpenSSL?
 
-For information on intellectual property rights, please consult a lawyer.
-The OpenSSL team does not offer legal advice.
+For information on intellectual property rights, please consult a lawyer.
+The OpenSSL team does not offer legal advice.
 
-You can configure OpenSSL so as not to use IDEA, MDC2 and RC5 by using
-
-./config no-idea no-mdc2 no-rc5
-
+You can configure OpenSSL so as not to use IDEA, MDC2 and RC5 by using
 
-* Can I use OpenSSL with GPL software?
+./config no-idea no-mdc2 no-rc5
 
-On many systems