Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 Mock Version: 1.1.14 ENTER do(['bash', '--login', '-c', 'rpmbuild -bs --target x86_64 --nodeps builddir/build/SPECS/pyOpenSSL.spec'], False, '/var/lib/mock/fedora-16-x86_64/root/', None, 0, True, False, 500, 475, None, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bs --target x86_64 --nodeps builddir/build/SPECS/pyOpenSSL.spec'] Building target platforms: x86_64 Building for target x86_64 Wrote: /builddir/build/SRPMS/pyOpenSSL-0.12-2.fc16.src.rpm Child returncode was: 0 LEAVE do --> ENTER do(['bash', '--login', '-c', 'rpmbuild -bb --target x86_64 --nodeps builddir/build/SPECS/pyOpenSSL.spec'], False, '/var/lib/mock/fedora-16-x86_64/root/', None, 0, True, False, 500, 475, None, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bb --target x86_64 --nodeps builddir/build/SPECS/pyOpenSSL.spec'] Building target platforms: x86_64 Building for target x86_64 Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.RTA4rB + umask 022 + cd /builddir/build/BUILD + LANG=C + export LANG + unset DISPLAY + cd /builddir/build/BUILD + rm -rf pyOpenSSL-0.12 + /usr/bin/gzip -dc /builddir/build/SOURCES/pyOpenSSL-0.12.tar.gz + /bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd pyOpenSSL-0.12 + /bin/chmod -Rf a+rX,u+w,g-w,o-w . + echo 'Patch #2 (pyOpenSSL-elinks.patch):' Patch #2 (pyOpenSSL-elinks.patch): + /bin/cat /builddir/build/SOURCES/pyOpenSSL-elinks.patch + /usr/bin/patch -s -p1 -b --suffix .elinks --fuzz=0 + echo 'Patch #3 (pyOpenSSL-nopdfout.patch):' Patch #3 (pyOpenSSL-nopdfout.patch): + /bin/cat /builddir/build/SOURCES/pyOpenSSL-nopdfout.patch + /usr/bin/patch -s -p1 -b --suffix .nopdfout --fuzz=0 + /bin/chmod -x OpenSSL/ssl/connection.c + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.rhIWuX + umask 022 + cd /builddir/build/BUILD + cd pyOpenSSL-0.12 + LANG=C + export LANG + unset DISPLAY + CFLAGS='-fplugin=python2 -fplugin-arg-python2-script=/test.py -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic -fno-strict-aliasing' + /usr/bin/python setup.py build /usr/lib64/python2.7/distutils/dist.py:267: UserWarning: Unknown distribution option: 'zip_safe' warnings.warn(msg) running build running build_py creating build creating build/lib.linux-x86_64-2.7 creating build/lib.linux-x86_64-2.7/OpenSSL copying OpenSSL/__init__.py -> build/lib.linux-x86_64-2.7/OpenSSL copying OpenSSL/tsafe.py -> build/lib.linux-x86_64-2.7/OpenSSL copying OpenSSL/version.py -> build/lib.linux-x86_64-2.7/OpenSSL creating build/lib.linux-x86_64-2.7/OpenSSL/test copying OpenSSL/test/__init__.py -> build/lib.linux-x86_64-2.7/OpenSSL/test copying OpenSSL/test/util.py -> build/lib.linux-x86_64-2.7/OpenSSL/test copying OpenSSL/test/test_crypto.py -> build/lib.linux-x86_64-2.7/OpenSSL/test copying OpenSSL/test/test_rand.py -> build/lib.linux-x86_64-2.7/OpenSSL/test copying OpenSSL/test/test_ssl.py -> build/lib.linux-x86_64-2.7/OpenSSL/test running build_ext building 'OpenSSL.crypto' extension creating build/temp.linux-x86_64-2.7 creating build/temp.linux-x86_64-2.7/OpenSSL creating build/temp.linux-x86_64-2.7/OpenSSL/crypto gcc -pthread -DNDEBUG -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic -D_GNU_SOURCE -fPIC -fwrapv -fplugin=python2 -fplugin-arg-python2-script=/test.py -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic -fno-strict-aliasing -fPIC -I/usr/include/python2.7 -c OpenSSL/crypto/crypto.c -o build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.o OpenSSL/crypto/crypto.c: In function 'initcrypto': OpenSSL/crypto/crypto.c:808:27: note: this function is too complicated for the reference-count checker to fully analyze: not all paths were analyzed OpenSSL/crypto/crypto.c:888:1: warning: ob_refcnt of '*crypto_Error.0' is 1 too low [enabled by default] OpenSSL/crypto/crypto.c:888:1: note: was expecting final ob_refcnt to be N + 1 (for some unknown N) OpenSSL/crypto/crypto.c:888:1: note: due to object being referenced by: crypto_Error OpenSSL/crypto/crypto.c:888:1: note: but final ob_refcnt is N + 0 OpenSSL/crypto/crypto.c:843:38: note: new exception object from PyErr_NewException allocated at: crypto_Error = PyErr_NewException("OpenSSL.crypto.Error", NULL, NULL); OpenSSL/crypto/crypto.c:821:12: note: when Py_InitModule4_64() succeeds at: module = Py_InitModule3("crypto", crypto_methods, crypto_doc); OpenSSL/crypto/crypto.c:824:8: note: taking False path at: if (module == NULL) { OpenSSL/crypto/crypto.c:830:42: note: reaching: crypto_API[crypto_X509_New_NUM] = (void *)crypto_X509_New; OpenSSL/crypto/crypto.c:838:18: note: when PyCObject_FromVoidPtr() succeeds at: c_api_object = PyCObject_FromVoidPtr((void *)crypto_API, NULL); OpenSSL/crypto/crypto.c:839:8: note: taking True path at: if (c_api_object != NULL) OpenSSL/crypto/crypto.c:840:27: note: reaching: PyModule_AddObject(module, "_C_API", c_api_object); OpenSSL/crypto/crypto.c:840:27: note: when PyModule_AddObject() succeeds at: PyModule_AddObject(module, "_C_API", c_api_object); OpenSSL/crypto/crypto.c:843:38: note: reaching: crypto_Error = PyErr_NewException("OpenSSL.crypto.Error", NULL, NULL); OpenSSL/crypto/crypto.c:843:38: note: when PyErr_NewException() succeeds at: crypto_Error = PyErr_NewException("OpenSSL.crypto.Error", NULL, NULL); OpenSSL/crypto/crypto.c:843:38: note: ob_refcnt is now refs: 1 + N where N >= 0 OpenSSL/crypto/crypto.c:843:18: note: '*crypto_Error.0' is now referenced by 1 non-stack value(s): crypto_Error OpenSSL/crypto/crypto.c:844:8: note: taking False path at: if (crypto_Error == NULL) OpenSSL/crypto/crypto.c:846:27: note: reaching: if (PyModule_AddObject(module, "Error", crypto_Error) != 0) OpenSSL/crypto/crypto.c:846:27: note: when PyModule_AddObject() succeeds at: if (PyModule_AddObject(module, "Error", crypto_Error) != 0) OpenSSL/crypto/crypto.c:846:27: note: ob_refcnt is now refs: 0 + N where N >= 1 OpenSSL/crypto/crypto.c:846:8: note: taking False path at: if (PyModule_AddObject(module, "Error", crypto_Error) != 0) OpenSSL/crypto/crypto.c:849:28: note: reaching: PyModule_AddIntConstant(module, "FILETYPE_PEM", X509_FILETYPE_PEM); OpenSSL/crypto/crypto.c:849:28: note: when PyModule_AddIntConstant() succeeds at: PyModule_AddIntConstant(module, "FILETYPE_PEM", X509_FILETYPE_PEM); OpenSSL/crypto/crypto.c:850:28: note: when PyModule_AddIntConstant() succeeds at: PyModule_AddIntConstant(module, "FILETYPE_ASN1", X509_FILETYPE_ASN1); OpenSSL/crypto/crypto.c:851:28: note: when PyModule_AddIntConstant() succeeds at: PyModule_AddIntConstant(module, "FILETYPE_TEXT", X509_FILETYPE_TEXT); OpenSSL/crypto/crypto.c:853:28: note: when PyModule_AddIntConstant() succeeds at: PyModule_AddIntConstant(module, "TYPE_RSA", crypto_TYPE_RSA); OpenSSL/crypto/crypto.c:854:28: note: when PyModule_AddIntConstant() succeeds at: PyModule_AddIntConstant(module, "TYPE_DSA", crypto_TYPE_DSA); OpenSSL/crypto/crypto.c:857:8: note: when considering range: -0x80000000 <= value <= -1 at: if (!init_openssl_threads()) OpenSSL/crypto/crypto.c:857:8: note: taking False path at: if (!init_openssl_threads()) OpenSSL/crypto/crypto.c:860:26: note: reaching: if (!init_crypto_x509(module)) OpenSSL/crypto/crypto.c:860:8: note: when considering range: -0x80000000 <= value <= -1 at: if (!init_crypto_x509(module)) OpenSSL/crypto/crypto.c:860:8: note: taking False path at: if (!init_crypto_x509(module)) OpenSSL/crypto/crypto.c:862:30: note: reaching: if (!init_crypto_x509name(module)) OpenSSL/crypto/crypto.c:862:8: note: when considering range: -0x80000000 <= value <= -1 at: if (!init_crypto_x509name(module)) OpenSSL/crypto/crypto.c:862:8: note: taking False path at: if (!init_crypto_x509name(module)) OpenSSL/crypto/crypto.c:864:31: note: reaching: if (!init_crypto_x509store(module)) OpenSSL/crypto/crypto.c:864:8: note: when considering range: -0x80000000 <= value <= -1 at: if (!init_crypto_x509store(module)) OpenSSL/crypto/crypto.c:864:8: note: taking False path at: if (!init_crypto_x509store(module)) OpenSSL/crypto/crypto.c:866:29: note: reaching: if (!init_crypto_x509req(module)) OpenSSL/crypto/crypto.c:866:8: note: when considering range: -0x80000000 <= value <= -1 at: if (!init_crypto_x509req(module)) OpenSSL/crypto/crypto.c:866:8: note: taking False path at: if (!init_crypto_x509req(module)) OpenSSL/crypto/crypto.c:868:26: note: reaching: if (!init_crypto_pkey(module)) OpenSSL/crypto/crypto.c:868:8: note: when considering range: -0x80000000 <= value <= -1 at: if (!init_crypto_pkey(module)) OpenSSL/crypto/crypto.c:868:8: note: taking False path at: if (!init_crypto_pkey(module)) OpenSSL/crypto/crypto.c:870:35: note: reaching: if (!init_crypto_x509extension(module)) OpenSSL/crypto/crypto.c:870:8: note: when considering range: -0x80000000 <= value <= -1 at: if (!init_crypto_x509extension(module)) OpenSSL/crypto/crypto.c:870:8: note: taking False path at: if (!init_crypto_x509extension(module)) OpenSSL/crypto/crypto.c:872:27: note: reaching: if (!init_crypto_pkcs7(module)) OpenSSL/crypto/crypto.c:872:8: note: when considering range: 1 <= value <= 0x7fffffff at: if (!init_crypto_pkcs7(module)) OpenSSL/crypto/crypto.c:872:8: note: taking False path at: if (!init_crypto_pkcs7(module)) OpenSSL/crypto/crypto.c:874:28: note: reaching: if (!init_crypto_pkcs12(module)) OpenSSL/crypto/crypto.c:874:8: note: when considering range: 1 <= value <= 0x7fffffff at: if (!init_crypto_pkcs12(module)) OpenSSL/crypto/crypto.c:874:8: note: taking False path at: if (!init_crypto_pkcs12(module)) OpenSSL/crypto/crypto.c:876:35: note: reaching: if (!init_crypto_netscape_spki(module)) OpenSSL/crypto/crypto.c:876:8: note: when considering range: -0x80000000 <= value <= -1 at: if (!init_crypto_netscape_spki(module)) OpenSSL/crypto/crypto.c:876:8: note: taking False path at: if (!init_crypto_netscape_spki(module)) OpenSSL/crypto/crypto.c:878:25: note: reaching: if (!init_crypto_crl(module)) OpenSSL/crypto/crypto.c:878:8: note: when considering range: -0x80000000 <= value <= -1 at: if (!init_crypto_crl(module)) OpenSSL/crypto/crypto.c:878:8: note: taking False path at: if (!init_crypto_crl(module)) OpenSSL/crypto/crypto.c:880:29: note: reaching: if (!init_crypto_revoked(module)) OpenSSL/crypto/crypto.c:888:1: note: returning OpenSSL/crypto/crypto.c:888:1: note: found 27 similar trace(s) to this OpenSSL/crypto/crypto.c:808:27: note: graphical error report for function 'initcrypto' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.initcrypto-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_exception_from_error_queue': OpenSSL/crypto/crypto.c:604:5: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:604:5: note: returning at: return NULL; OpenSSL/crypto/crypto.c:602:67: note: graphical error report for function 'crypto_exception_from_error_queue' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_exception_from_error_queue-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_verify': OpenSSL/crypto/crypto.c:677:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "O!t#ss:verify" [enabled by default] argument 4 ("&cert") had type "struct crypto_X509Obj * *" but was expecting ""struct PyObject * *"" (unfamiliar with PyTypeObject: 'crypto_X509_Type') for format code "O!" OpenSSL/crypto/crypto.c:677:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "O!t#ss:verify" [enabled by default] argument 5 ("&signature") had type "unsigned char * *" but was expecting "char * *" for format code "t#" OpenSSL/crypto/crypto.c:677:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "O!t#ss:verify" [enabled by default] argument 7 ("&data") had type "char * *" but was expecting "const char * *" for format code "s" OpenSSL/crypto/crypto.c:677:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "O!t#ss:verify" [enabled by default] argument 8 ("&digest_name") had type "char * *" but was expecting "const char * *" for format code "s" OpenSSL/crypto/crypto.c:705:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:677:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "O!t#ss:verify", &crypto_X509_Type, &cert, &signature, &sig_len, &data, &digest_name)) { OpenSSL/crypto/crypto.c:677:8: note: taking False path at: if (!PyArg_ParseTuple(args, "O!t#ss:verify", &crypto_X509_Type, &cert, &signature, &sig_len, &data, &digest_name)) { OpenSSL/crypto/crypto.c:682:39: note: reaching: if ((digest = EVP_get_digestbyname(digest_name)) == NULL){ OpenSSL/crypto/crypto.c:682:8: note: when treating unknown const struct EVP_MD * from OpenSSL/crypto/crypto.c:682 as non-NULL at: if ((digest = EVP_get_digestbyname(digest_name)) == NULL){ OpenSSL/crypto/crypto.c:682:8: note: taking False path at: if ((digest = EVP_get_digestbyname(digest_name)) == NULL){ OpenSSL/crypto/crypto.c:687:32: note: reaching: pkey = X509_get_pubkey(cert->x509); OpenSSL/crypto/crypto.c:688:8: note: when treating unknown struct EVP_PKEY * from OpenSSL/crypto/crypto.c:687 as non-NULL at: if (pkey == NULL) { OpenSSL/crypto/crypto.c:688:8: note: taking False path at: if (pkey == NULL) { OpenSSL/crypto/crypto.c:693:5: note: reaching: EVP_VerifyInit(&md_ctx, digest); OpenSSL/crypto/crypto.c:698:8: note: when considering range: -0x80000000 <= value <= 0 at: if (err != 1) { OpenSSL/crypto/crypto.c:698:8: note: taking True path at: if (err != 1) { OpenSSL/crypto/crypto.c:699:35: note: reaching: exception_from_error_queue(crypto_Error); OpenSSL/crypto/crypto.c:705:1: note: returning OpenSSL/crypto/crypto.c:705:1: note: found 1 similar trace(s) to this OpenSSL/crypto/crypto.c:664:47: note: graphical error report for function 'crypto_verify' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_verify-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_sign': OpenSSL/crypto/crypto.c:628:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "O!ss:sign" [enabled by default] argument 4 ("&pkey") had type "struct crypto_PKeyObj * *" but was expecting ""struct PyObject * *"" (unfamiliar with PyTypeObject: 'crypto_PKey_Type') for format code "O!" OpenSSL/crypto/crypto.c:628:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "O!ss:sign" [enabled by default] argument 5 ("&data") had type "char * *" but was expecting "const char * *" for format code "s" OpenSSL/crypto/crypto.c:628:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "O!ss:sign" [enabled by default] argument 6 ("&digest_name") had type "char * *" but was expecting "const char * *" for format code "s" OpenSSL/crypto/crypto.c:651:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:628:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple( OpenSSL/crypto/crypto.c:628:8: note: taking False path at: if (!PyArg_ParseTuple( OpenSSL/crypto/crypto.c:634:39: note: reaching: if ((digest = EVP_get_digestbyname(digest_name)) == NULL) { OpenSSL/crypto/crypto.c:634:8: note: when treating unknown const struct EVP_MD * from OpenSSL/crypto/crypto.c:634 as non-NULL at: if ((digest = EVP_get_digestbyname(digest_name)) == NULL) { OpenSSL/crypto/crypto.c:634:8: note: taking False path at: if ((digest = EVP_get_digestbyname(digest_name)) == NULL) { OpenSSL/crypto/crypto.c:639:5: note: reaching: EVP_SignInit(&md_ctx, digest); OpenSSL/crypto/crypto.c:644:8: note: when considering range: -0x80000000 <= value <= 0 at: if (err != 1) { OpenSSL/crypto/crypto.c:644:8: note: taking True path at: if (err != 1) { OpenSSL/crypto/crypto.c:645:35: note: reaching: exception_from_error_queue(crypto_Error); OpenSSL/crypto/crypto.c:651:1: note: returning OpenSSL/crypto/crypto.c:651:1: note: found 1 similar trace(s) to this OpenSSL/crypto/crypto.c:617:45: note: graphical error report for function 'crypto_sign' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_sign-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_load_pkcs12': OpenSSL/crypto/crypto.c:561:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "s#|s:load_pkcs12" [enabled by default] argument 3 ("&buffer") had type "char * *" but was expecting "const char * *" for format code "s#" OpenSSL/crypto/crypto.c:561:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "s#|s:load_pkcs12" [enabled by default] argument 5 ("&passphrase") had type "char * *" but was expecting "const char * *" for format code "s" OpenSSL/crypto/crypto.c:574:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:561:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "s#|s:load_pkcs12", &buffer, &len, &passphrase)) OpenSSL/crypto/crypto.c:561:8: note: taking False path at: if (!PyArg_ParseTuple(args, "s#|s:load_pkcs12", &buffer, &len, &passphrase)) OpenSSL/crypto/crypto.c:564:26: note: reaching: bio = BIO_new_mem_buf(buffer, len); OpenSSL/crypto/crypto.c:565:8: note: when treating unknown struct PKCS12 * from OpenSSL/crypto/crypto.c:565 as NULL at: if ((p12 = d2i_PKCS12_bio(bio, NULL)) == NULL) OpenSSL/crypto/crypto.c:565:8: note: taking True path at: if ((p12 = d2i_PKCS12_bio(bio, NULL)) == NULL) OpenSSL/crypto/crypto.c:567:15: note: reaching: BIO_free(bio); OpenSSL/crypto/crypto.c:574:1: note: returning OpenSSL/crypto/crypto.c:555:1: note: graphical error report for function 'crypto_load_pkcs12' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_load_pkcs12-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_load_pkcs7_data': OpenSSL/crypto/crypto.c:509:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "is#:load_pkcs7_data" [enabled by default] argument 4 ("&buffer") had type "char * *" but was expecting "const char * *" for format code "s#" OpenSSL/crypto/crypto.c:543:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:509:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "is#:load_pkcs7_data", &type, &buffer, &len)) OpenSSL/crypto/crypto.c:509:8: note: taking False path at: if (!PyArg_ParseTuple(args, "is#:load_pkcs7_data", &type, &buffer, &len)) OpenSSL/crypto/crypto.c:515:26: note: reaching: bio = BIO_new_mem_buf(buffer, len); OpenSSL/crypto/crypto.c:516:5: note: when following case 1 at: switch (type) OpenSSL/crypto/crypto.c:536:8: note: when treating unknown struct PKCS7 * from OpenSSL/crypto/crypto.c:519 as NULL at: if (pkcs7 == NULL) OpenSSL/crypto/crypto.c:536:8: note: taking True path at: if (pkcs7 == NULL) OpenSSL/crypto/crypto.c:538:35: note: reaching: exception_from_error_queue(crypto_Error); OpenSSL/crypto/crypto.c:543:1: note: returning OpenSSL/crypto/crypto.c:543:1: note: found 1 similar trace(s) to this OpenSSL/crypto/crypto.c:503:1: note: graphical error report for function 'crypto_load_pkcs7_data' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_load_pkcs7_data-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_load_crl': OpenSSL/crypto/crypto.c:464:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "is#:load_crl" [enabled by default] argument 4 ("&buffer") had type "char * *" but was expecting "const char * *" for format code "s#" OpenSSL/crypto/crypto.c:491:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:464:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "is#:load_crl", &type, &buffer, &len)) { OpenSSL/crypto/crypto.c:464:8: note: taking False path at: if (!PyArg_ParseTuple(args, "is#:load_crl", &type, &buffer, &len)) { OpenSSL/crypto/crypto.c:468:26: note: reaching: bio = BIO_new_mem_buf(buffer, len); OpenSSL/crypto/crypto.c:469:5: note: when following case 1 at: switch (type) { OpenSSL/crypto/crypto.c:485:8: note: when treating unknown struct X509_CRL * from OpenSSL/crypto/crypto.c:471 as NULL at: if (crl == NULL) { OpenSSL/crypto/crypto.c:485:8: note: taking True path at: if (crl == NULL) { OpenSSL/crypto/crypto.c:486:35: note: reaching: exception_from_error_queue(crypto_Error); OpenSSL/crypto/crypto.c:491:1: note: returning OpenSSL/crypto/crypto.c:491:1: note: found 1 similar trace(s) to this OpenSSL/crypto/crypto.c:458:49: note: graphical error report for function 'crypto_load_crl' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_load_crl-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_dump_certificate_request': OpenSSL/crypto/crypto.c:409:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "iO!:dump_certificate_request" [enabled by default] argument 5 ("&req") had type "struct crypto_X509ReqObj * *" but was expecting ""struct PyObject * *"" (unfamiliar with PyTypeObject: 'crypto_X509Req_Type') for format code "O!" OpenSSL/crypto/crypto.c:446:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:409:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "iO!:dump_certificate_request", &type, OpenSSL/crypto/crypto.c:409:8: note: taking False path at: if (!PyArg_ParseTuple(args, "iO!:dump_certificate_request", &type, OpenSSL/crypto/crypto.c:413:18: note: reaching: bio = BIO_new(BIO_s_mem()); OpenSSL/crypto/crypto.c:414:5: note: when following case 1 at: switch (type) OpenSSL/crypto/crypto.c:434:8: note: when considering value == (int)0 from OpenSSL/crypto/crypto.c:417 at: if (ret == 0) OpenSSL/crypto/crypto.c:434:8: note: taking True path at: if (ret == 0) OpenSSL/crypto/crypto.c:436:17: note: reaching: BIO_free(bio); OpenSSL/crypto/crypto.c:446:1: note: returning OpenSSL/crypto/crypto.c:446:1: note: found 2 similar trace(s) to this OpenSSL/crypto/crypto.c:402:1: note: graphical error report for function 'crypto_dump_certificate_request' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_dump_certificate_request-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_load_certificate_request': OpenSSL/crypto/crypto.c:362:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "is#:load_certificate_request" [enabled by default] argument 4 ("&buffer") had type "char * *" but was expecting "const char * *" for format code "s#" OpenSSL/crypto/crypto.c:390:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:362:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "is#:load_certificate_request", &type, &buffer, &len)) OpenSSL/crypto/crypto.c:362:8: note: taking False path at: if (!PyArg_ParseTuple(args, "is#:load_certificate_request", &type, &buffer, &len)) OpenSSL/crypto/crypto.c:365:26: note: reaching: bio = BIO_new_mem_buf(buffer, len); OpenSSL/crypto/crypto.c:366:5: note: when following case 1 at: switch (type) OpenSSL/crypto/crypto.c:383:8: note: when treating unknown struct X509_REQ * from OpenSSL/crypto/crypto.c:369 as NULL at: if (req == NULL) OpenSSL/crypto/crypto.c:383:8: note: taking True path at: if (req == NULL) OpenSSL/crypto/crypto.c:385:35: note: reaching: exception_from_error_queue(crypto_Error); OpenSSL/crypto/crypto.c:390:1: note: returning OpenSSL/crypto/crypto.c:390:1: note: found 1 similar trace(s) to this OpenSSL/crypto/crypto.c:355:1: note: graphical error report for function 'crypto_load_certificate_request' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_load_certificate_request-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_dump_certificate': OpenSSL/crypto/crypto.c:306:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "iO!:dump_certificate" [enabled by default] argument 5 ("&cert") had type "struct crypto_X509Obj * *" but was expecting ""struct PyObject * *"" (unfamiliar with PyTypeObject: 'crypto_X509_Type') for format code "O!" OpenSSL/crypto/crypto.c:343:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:306:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "iO!:dump_certificate", &type, OpenSSL/crypto/crypto.c:306:8: note: taking False path at: if (!PyArg_ParseTuple(args, "iO!:dump_certificate", &type, OpenSSL/crypto/crypto.c:310:18: note: reaching: bio = BIO_new(BIO_s_mem()); OpenSSL/crypto/crypto.c:311:5: note: when following case 1 at: switch (type) OpenSSL/crypto/crypto.c:331:8: note: when considering value == (int)0 from OpenSSL/crypto/crypto.c:314 at: if (ret == 0) OpenSSL/crypto/crypto.c:331:8: note: taking True path at: if (ret == 0) OpenSSL/crypto/crypto.c:333:17: note: reaching: BIO_free(bio); OpenSSL/crypto/crypto.c:343:1: note: returning OpenSSL/crypto/crypto.c:343:1: note: found 2 similar trace(s) to this OpenSSL/crypto/crypto.c:299:1: note: graphical error report for function 'crypto_dump_certificate' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_dump_certificate-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_load_certificate': OpenSSL/crypto/crypto.c:259:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "is#:load_certificate" [enabled by default] argument 4 ("&buffer") had type "char * *" but was expecting "const char * *" for format code "s#" OpenSSL/crypto/crypto.c:287:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:259:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "is#:load_certificate", &type, &buffer, &len)) OpenSSL/crypto/crypto.c:259:8: note: taking False path at: if (!PyArg_ParseTuple(args, "is#:load_certificate", &type, &buffer, &len)) OpenSSL/crypto/crypto.c:262:26: note: reaching: bio = BIO_new_mem_buf(buffer, len); OpenSSL/crypto/crypto.c:263:5: note: when following case 1 at: switch (type) OpenSSL/crypto/crypto.c:280:8: note: when treating unknown struct X509 * from OpenSSL/crypto/crypto.c:266 as NULL at: if (cert == NULL) OpenSSL/crypto/crypto.c:280:8: note: taking True path at: if (cert == NULL) OpenSSL/crypto/crypto.c:282:35: note: reaching: exception_from_error_queue(crypto_Error); OpenSSL/crypto/crypto.c:287:1: note: returning OpenSSL/crypto/crypto.c:287:1: note: found 1 similar trace(s) to this OpenSSL/crypto/crypto.c:252:1: note: graphical error report for function 'crypto_load_certificate' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_load_certificate-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_dump_privatekey': OpenSSL/crypto/crypto.c:166:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "iO!|sO:dump_privatekey" [enabled by default] argument 5 ("&pkey") had type "struct crypto_PKeyObj * *" but was expecting ""struct PyObject * *"" (unfamiliar with PyTypeObject: 'crypto_PKey_Type') for format code "O!" OpenSSL/crypto/crypto.c:166:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "iO!|sO:dump_privatekey" [enabled by default] argument 6 ("&cipher_name") had type "char * *" but was expecting "const char * *" for format code "s" OpenSSL/crypto/crypto.c:153:1: note: this function is too complicated for the reference-count checker to fully analyze: not all paths were analyzed OpenSSL/crypto/crypto.c:240:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:166:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "iO!|sO:dump_privatekey", &type, OpenSSL/crypto/crypto.c:166:8: note: taking False path at: if (!PyArg_ParseTuple(args, "iO!|sO:dump_privatekey", &type, OpenSSL/crypto/crypto.c:170:21: note: reaching: if (cipher_name != NULL && pw == NULL) OpenSSL/crypto/crypto.c:170:8: note: when treating unknown const char * from OpenSSL/crypto/crypto.c:166 as non-NULL at: if (cipher_name != NULL && pw == NULL) OpenSSL/crypto/crypto.c:170:8: note: taking True path at: if (cipher_name != NULL && pw == NULL) OpenSSL/crypto/crypto.c:170:35: note: reaching: if (cipher_name != NULL && pw == NULL) OpenSSL/crypto/crypto.c:170:29: note: taking False path at: if (cipher_name != NULL && pw == NULL) OpenSSL/crypto/crypto.c:175:21: note: reaching: if (cipher_name != NULL) OpenSSL/crypto/crypto.c:175:8: note: taking True path at: if (cipher_name != NULL) OpenSSL/crypto/crypto.c:177:38: note: reaching: cipher = EVP_get_cipherbyname(cipher_name); OpenSSL/crypto/crypto.c:178:12: note: when treating unknown const struct EVP_CIPHER * from OpenSSL/crypto/crypto.c:177 as non-NULL at: if (cipher == NULL) OpenSSL/crypto/crypto.c:178:12: note: taking False path at: if (cipher == NULL) OpenSSL/crypto/crypto.c:183:13: note: reaching: if (PyBytes_Check(pw)) OpenSSL/crypto/crypto.c:183:13: note: when treating unknown struct _typeobject * from OpenSSL/crypto/crypto.c:183 as non-NULL at: if (PyBytes_Check(pw)) OpenSSL/crypto/crypto.c:183:12: note: when considering range: 1 <= value <= 0x8000000 at: if (PyBytes_Check(pw)) OpenSSL/crypto/crypto.c:183:12: note: taking True path at: if (PyBytes_Check(pw)) OpenSSL/crypto/crypto.c:185:16: note: reaching: cb = NULL; OpenSSL/crypto/crypto.c:186:20: note: when PyString_AsString() succeeds at: cb_arg = PyBytes_AsString(pw); OpenSSL/crypto/crypto.c:201:5: note: when following case 1 at: switch (type) OpenSSL/crypto/crypto.c:205:31: note: PyErr_Occurred() at: if (PyErr_Occurred()) OpenSSL/crypto/crypto.c:205:16: note: taking False path at: if (PyErr_Occurred()) OpenSSL/crypto/crypto.c:228:8: note: reaching: if (ret == 0) OpenSSL/crypto/crypto.c:228:8: note: when considering value == (int)0 from OpenSSL/crypto/crypto.c:204 at: if (ret == 0) OpenSSL/crypto/crypto.c:228:8: note: taking True path at: if (ret == 0) OpenSSL/crypto/crypto.c:230:17: note: reaching: BIO_free(bio); OpenSSL/crypto/crypto.c:240:1: note: returning OpenSSL/crypto/crypto.c:240:1: note: found 3 similar trace(s) to this OpenSSL/crypto/crypto.c:153:1: note: graphical error report for function 'crypto_dump_privatekey' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_dump_privatekey-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'global_passphrase_callback': OpenSSL/crypto/crypto.c:62:1: warning: ob_refcnt of '*ret' is 1 too high [enabled by default] OpenSSL/crypto/crypto.c:62:1: note: was expecting final ob_refcnt to be N + 0 (for some unknown N) OpenSSL/crypto/crypto.c:62:1: note: but final ob_refcnt is N + 1 OpenSSL/crypto/crypto.c:48:9: note: new ref from call to PyEval_CallObjectWithKeywords allocated at: ret = PyEval_CallObject(func, argv); OpenSSL/crypto/crypto.c:47:10: note: when Py_BuildValue() succeeds at: argv = Py_BuildValue("(i)", rwflag); OpenSSL/crypto/crypto.c:48:9: note: when treating unknown void * from OpenSSL/crypto/crypto.c:41 as non-NULL at: ret = PyEval_CallObject(func, argv); OpenSSL/crypto/crypto.c:48:9: note: when PyEval_CallObjectWithKeywords() succeeds at: ret = PyEval_CallObject(func, argv); OpenSSL/crypto/crypto.c:48:9: note: ob_refcnt is now refs: 1 + N where N >= 0 OpenSSL/crypto/crypto.c:49:5: note: when taking True path at: Py_DECREF(argv); OpenSSL/crypto/crypto.c:50:8: note: reaching: if (ret == NULL) OpenSSL/crypto/crypto.c:50:8: note: taking False path at: if (ret == NULL) OpenSSL/crypto/crypto.c:52:10: note: reaching: if (!PyBytes_Check(ret)) OpenSSL/crypto/crypto.c:52:8: note: when considering value == (long int)0 from OpenSSL/crypto/crypto.c:52 at: if (!PyBytes_Check(ret)) OpenSSL/crypto/crypto.c:52:8: note: taking True path at: if (!PyBytes_Check(ret)) OpenSSL/crypto/crypto.c:54:24: note: reaching: PyErr_SetString(PyExc_ValueError, "String expected"); OpenSSL/crypto/crypto.c:54:24: note: calling PyErr_SetString() at: PyErr_SetString(PyExc_ValueError, "String expected"); OpenSSL/crypto/crypto.c:62:1: note: returning OpenSSL/crypto/crypto.c:62:1: note: found 17 similar trace(s) to this OpenSSL/crypto/crypto.c:49:5: warning: dereferencing NULL (argv->ob_refcnt) at OpenSSL/crypto/crypto.c:49 [enabled by default] OpenSSL/crypto/crypto.c:47:10: note: when Py_BuildValue() fails at: argv = Py_BuildValue("(i)", rwflag); OpenSSL/crypto/crypto.c:48:9: note: when treating unknown void * from OpenSSL/crypto/crypto.c:41 as non-NULL at: ret = PyEval_CallObject(func, argv); OpenSSL/crypto/crypto.c:48:9: note: when PyEval_CallObjectWithKeywords() succeeds at: ret = PyEval_CallObject(func, argv); OpenSSL/crypto/crypto.c:49:5: note: found 1 similar trace(s) to this OpenSSL/crypto/crypto.c:42:1: note: graphical error report for function 'global_passphrase_callback' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.global_passphrase_callback-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'crypto_load_privatekey': OpenSSL/crypto/crypto.c:88:26: warning: Mismatching type in call to PyArg_ParseTuple with format code "is#|O:load_privatekey" [enabled by default] argument 4 ("&buffer") had type "char * *" but was expecting "const char * *" for format code "s#" OpenSSL/crypto/crypto.c:135:1: warning: returning (PyObject*)NULL without setting an exception [enabled by default] OpenSSL/crypto/crypto.c:88:26: note: when PyArg_ParseTuple() succeeds at: if (!PyArg_ParseTuple(args, "is#|O:load_privatekey", &type, &buffer, &len, &pw)) OpenSSL/crypto/crypto.c:88:8: note: taking False path at: if (!PyArg_ParseTuple(args, "is#|O:load_privatekey", &type, &buffer, &len, &pw)) OpenSSL/crypto/crypto.c:91:12: note: reaching: if (pw != NULL) OpenSSL/crypto/crypto.c:91:8: note: taking True path at: if (pw != NULL) OpenSSL/crypto/crypto.c:93:13: note: reaching: if (PyBytes_Check(pw)) OpenSSL/crypto/crypto.c:93:13: note: when treating unknown struct _typeobject * from OpenSSL/crypto/crypto.c:93 as non-NULL at: if (PyBytes_Check(pw)) OpenSSL/crypto/crypto.c:93:12: note: when considering value == (long int)0 from OpenSSL/crypto/crypto.c:93 at: if (PyBytes_Check(pw)) OpenSSL/crypto/crypto.c:93:12: note: taking False path at: if (PyBytes_Check(pw)) OpenSSL/crypto/crypto.c:98:34: note: reaching: else if (PyCallable_Check(pw)) OpenSSL/crypto/crypto.c:98:34: note: when PyCallable_Check() returns 1 (true) at: else if (PyCallable_Check(pw)) OpenSSL/crypto/crypto.c:98:17: note: taking True path at: else if (PyCallable_Check(pw)) OpenSSL/crypto/crypto.c:100:16: note: reaching: cb = global_passphrase_callback; OpenSSL/crypto/crypto.c:111:5: note: when following case 1 at: switch (type) OpenSSL/crypto/crypto.c:128:8: note: when treating unknown struct EVP_PKEY * from OpenSSL/crypto/crypto.c:114 as NULL at: if (pkey == NULL) OpenSSL/crypto/crypto.c:128:8: note: taking True path at: if (pkey == NULL) OpenSSL/crypto/crypto.c:130:35: note: reaching: exception_from_error_queue(crypto_Error); OpenSSL/crypto/crypto.c:135:1: note: returning OpenSSL/crypto/crypto.c:135:1: note: found 3 similar trace(s) to this OpenSSL/crypto/crypto.c:78:1: note: graphical error report for function 'crypto_load_privatekey' written out to 'build/temp.linux-x86_64-2.7/OpenSSL/crypto/crypto.c.crypto_load_privatekey-refcount-errors.html' OpenSSL/crypto/crypto.c: In function 'init_openssl_threads': OpenSSL/crypto/crypto.c:764:46: error: Unhandled Python exception raised calling 'execute' method Traceback (most recent call last): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/__init__.py", line 75, in execute self._check_refcounts(fun) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/__init__.py", line 79, in _check_refcounts self.show_possible_null_derefs) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/refcounts.py", line 3668, in check_refcounts limits=limits) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2893, in iter_traces transitions = curstate.get_transitions() File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2013, in get_transitions return self._get_transitions_for_stmt(stmt) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2029, in _get_transitions_for_stmt return self._get_transitions_for_GimpleCall(stmt) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2212, in _get_transitions_for_GimpleCall raise NotImplementedError('not yet implemented: %s' % fnname) NotImplementedError: not yet implemented: PyThread_allocate_lock OpenSSL/crypto/crypto.c: In function 'locking_function': OpenSSL/crypto/crypto.c:745:30: error: Unhandled Python exception raised calling 'execute' method Traceback (most recent call last): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/__init__.py", line 75, in execute self._check_refcounts(fun) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/__init__.py", line 79, in _check_refcounts self.show_possible_null_derefs) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/refcounts.py", line 3668, in check_refcounts limits=limits) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2929, in iter_traces depth + 1): File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2893, in iter_traces transitions = curstate.get_transitions() File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2013, in get_transitions return self._get_transitions_for_stmt(stmt) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2029, in _get_transitions_for_stmt return self._get_transitions_for_GimpleCall(stmt) File "/usr/lib/gcc/x86_64-redhat-linux/4.6.2/plugin/python2/libcpychecker/absinterp.py", line 2212, in _get_transitions_for_GimpleCall raise NotImplementedError('not yet implemented: %s' % fnname) NotImplementedError: not yet implemented: PyThread_release_lock error: command 'gcc' failed with exit status 1 error: Bad exit status from /var/tmp/rpm-tmp.rhIWuX (%build) Bad exit status from /var/tmp/rpm-tmp.rhIWuX (%build) RPM build errors: Child returncode was: 1 EXCEPTION: Command failed. See logs for output. # ['bash', '--login', '-c', 'rpmbuild -bb --target x86_64 --nodeps builddir/build/SPECS/pyOpenSSL.spec'] Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/mockbuild/trace_decorator.py", line 70, in trace result = func(*args, **kw) File "/usr/lib/python2.7/site-packages/mockbuild/util.py", line 328, in do raise mockbuild.exception.Error, ("Command failed. See logs for output.\n # %s" % (command,), child.returncode) Error: Command failed. See logs for output. # ['bash', '--login', '-c', 'rpmbuild -bb --target x86_64 --nodeps builddir/build/SPECS/pyOpenSSL.spec'] LEAVE do --> EXCEPTION RAISED