commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
upstream: spelling ok dtucker@ OpenBSD-Commit-ID: bfc7ba74c22c928de2e257328b3f1274a3dfdf19
cb885178f36b83d0f14cfe9f345d2068103feed0
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/cb885178f36b83d0f14cfe9f345d2068103feed0
2022-01-01 01:55:30+00:00
upstream: memleak in unittest; found by valgrind OpenBSD-Regress-ID: 168c23b0fb09fc3d0b438628990d3fd9260a8a5e
2f131e1b34502aa19f345e89cabf6fa3fc097f09
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/2f131e1b34502aa19f345e89cabf6fa3fc097f09
2018-07-16 03:09:59+00:00
upstream commit spelling; Upstream-ID: 606f933c8e2d0be902ea663946bc15e3eee40b25
40962198e3b132cecdb32e9350acd4294e6a1082
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/40962198e3b132cecdb32e9350acd4294e6a1082
2017-06-24 06:57:04+00:00
upstream: spelling errors in comments; no code change from OpenBSD-Commit-ID: 166ea64f6d84f7bac5636dbd38968592cb5eb924
d081f017c20a3564255873ed99fd7d024cac540f
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d081f017c20a3564255873ed99fd7d024cac540f
2020-03-13 03:17:07+00:00
upstream commit Fix a logic bug in sshd_exchange_identification which prevented clients using major protocol version 2 from connecting to the server. ok millert@ OpenBSD-Commit-ID: 8668dec04586e27f1c0eb039ef1feb93d80a5ee9
c9c1bba06ad1c7cad8548549a68c071bd807af60
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/c9c1bba06ad1c7cad8548549a68c071bd807af60
2018-01-23 20:00:58+00:00
upstream commit Fix memory leaks in match_filter_list() error paths. ok dtucker@ markus@ Upstream-ID: c7f96ac0877f6dc9188bbc908100a8d246cc7f0e
b2afdaf1b52231aa23d2153f4a8c5a60a694dda4
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/b2afdaf1b52231aa23d2153f4a8c5a60a694dda4
2017-02-15 23:38:31+00:00
upstream commit memleak of algorithm name in mm_answer_sign; reported by Jakub Jelen Upstream-ID: ccd742cd25952240ebd23d7d4d6b605862584d08
24c9bded569d9f2449ded73f92fb6d12db7a9eec
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/24c9bded569d9f2449ded73f92fb6d12db7a9eec
2016-02-15 23:32:37+00:00
upstream commit - Fix error message: passphrase needs to be at least 5 characters, not 4. - Remove unused function argument. - Remove two unnecessary variables. OK djm@ Upstream-ID: 13010c05bfa8b523da1c0dc19e81dd180662bc30
3c019a936b43f3e2773f3edbde7c114d73caaa4c
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/3c019a936b43f3e2773f3edbde7c114d73caaa4c
2015-09-13 14:39:16+00:00
upstream: fix minor memleak of kex->hostkey_alg on rekex OpenBSD-Commit-ID: 2c3969c74966d4ccdfeff5e5f0df0791919aef50
553b90feedd7da5b90901d73005f86705456d686
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/553b90feedd7da5b90901d73005f86705456d686
2020-12-04 02:27:57+00:00
upstream: spelling fixes; from paul tagliamonte amendments to his diff are noted on tech OpenBSD-Commit-ID: d776dd03d0b882ca9c83b84f6b384f6f9bd7de4a
0872663a7be0301bcc3d49acdbc9b740a3d972d4
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/0872663a7be0301bcc3d49acdbc9b740a3d972d4
2022-12-26 19:16:03+00:00
upstream: Switch ssh_config parsing to use argv_split() This fixes a couple of problems with the previous tokeniser, strdelim() 1. strdelim() is permissive wrt accepting '=' characters. This is intended to allow it to tokenise "Option=value" but because it cannot keep state, it will incorrectly split "Opt=val=val2". 2. strdelim() has rudimentry handling of quoted strings, but it is incomplete and inconsistent. E.g. it doesn't handle escaped quotes inside a quoted string. 3. It has no support for stopping on a (unquoted) comment. Because of this readconf.c r1.343 added chopping of lines at '#', but this caused a regression because these characters may legitimately appear inside quoted strings. The new tokeniser is stricter is a number of cases, including #1 above but previously it was also possible for some directives to appear without arguments. AFAIK these were nonsensical in all cases, and the new tokeniser refuses to accept them. The new code handles quotes much better, permitting quoted space as well as escaped closing quotes. Finally, comment handling should be fixed - the tokeniser will terminate only on unquoted # characters. feedback & ok markus@ tested in snaps for the last five or so days - thanks Theo and those who caught bugs OpenBSD-Commit-ID: dc72fd12af9d5398f4d9e159d671f9269c5b14d5
ea9e45c89a4822d74a9d97fef8480707d584da4d
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/ea9e45c89a4822d74a9d97fef8480707d584da4d
2021-06-08 07:07:15+00:00
upstream: put back the mux_ctx memleak fix, but only for channels of type SSH_CHANNEL_MUX_LISTENER; Specifically SSH_CHANNEL_MUX_PROXY channels should not have this structure freed. OpenBSD-Commit-ID: f3b213ae60405f77439e2b06262f054760c9d325
aa6fa4bf3023fa0e5761cd8f4b2cd015d2de74dd
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/aa6fa4bf3023fa0e5761cd8f4b2cd015d2de74dd
2020-07-03 07:25:18+00:00
upstream commit Fix compression output stats broken in rev 1.201. Patch originally by Russell Coker via Debian bug #797964 and Christoph Biedl. ok djm@ Upstream-ID: 83a1903b95ec2e4ed100703debb4b4a313b01016
550c053168123fcc0791f9952abad684704b5760
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/550c053168123fcc0791f9952abad684704b5760
2017-06-06 09:12:17+00:00
memleak of buffer in sshpam_query coverity report via Ed Maste; ok dtucker@
ec0e6243660bf2df30c620a6a0d83eded376c9c6
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/ec0e6243660bf2df30c620a6a0d83eded376c9c6
2019-09-13 13:14:39+10:00
upstream: memleak introduced in r1.83; from Colin Watson OpenBSD-Commit-ID: 5c019104c280cbd549a264a7217b67665e5732dc
7fef173c28f7462dcd8ee017fdf12b5073f54c02
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/7fef173c28f7462dcd8ee017fdf12b5073f54c02
2018-08-23 03:01:08+00:00
upstream: fix bug in PermitRemoteOpen which caused it to ignore its first argument unless it was one of the special keywords "any" or "none". Reported by Georges Chaudy in bz3515; ok dtucker@ OpenBSD-Commit-ID: c5678a39f1ff79993d5ae3cfac5746a4ae148ea5
b3daa8dc582348d6ab8150bc1e571b7aa08c5388
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/b3daa8dc582348d6ab8150bc1e571b7aa08c5388
2023-01-02 07:03:30+00:00
Skip reexec test on OpenSSL 1.1.1 specifically. OpenSSL 1.1.1 has a bug in its RNG that breaks reexec fallback, so skip that test. See bz#3483 for details.
ca98d3f8c64cfc51af81e1b01c36a919d5947ec2
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/ca98d3f8c64cfc51af81e1b01c36a919d5947ec2
2022-11-09 20:59:20+11:00
upstream: fix memory leak of mux_ctx; patch from Sergiy Lozovsky via bz3189 ok dtucker OpenBSD-Commit-ID: db249bd4526fd42d0f4f43f72f7b8b7705253bde
1b90ddde49e2ff377204082b6eb130a096411dc1
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/1b90ddde49e2ff377204082b6eb130a096411dc1
2020-07-03 05:08:41+00:00
upstream: fix memleak in process_extension(); oss-fuzz issue #42719 OpenBSD-Commit-ID: d8d49f840162fb7b8949e3a5adb8107444b6de1e
a23698c3082ffe661abed14b020eac9b0c25eb9f
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/a23698c3082ffe661abed14b020eac9b0c25eb9f
2022-01-01 04:18:06+00:00
upstream: fix memleak in test OpenBSD-Regress-ID: 5e529d0982aa04666604936df43242e97a7a6f81
1a4d1da9188d7c88f646b61f0d6a3b34f47c5439
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/1a4d1da9188d7c88f646b61f0d6a3b34f47c5439
2021-05-21 04:03:47+00:00
disable valgrind memleak checking by default Add VALGRIND_CHECK_LEAKS knob to turn it back on.
d20720d373d8563ee737d1a45dc5e0804d622dbc
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d20720d373d8563ee737d1a45dc5e0804d622dbc
2018-07-11 09:56:36+10:00
spelling mistakes from https://fossies.org/linux/misc/openssh-8.2p1.tar.gz/codespell.html
def31bc5427579ec3f7f2ce99f2da1338fdc0c9f
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/def31bc5427579ec3f7f2ce99f2da1338fdc0c9f
2020-03-13 14:23:07+11:00
upstream: memleak in error path; spotted by oss-fuzz, ok markus@ OpenBSD-Commit-ID: d6ed260cbbc297ab157ad63931802fb1ef7a4266
d7d116b6d9e6cb79cc235e9801caa683d3db3181
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d7d116b6d9e6cb79cc235e9801caa683d3db3181
2019-10-14 06:00:02+00:00
upstream: memleak of DH public bignum; found with libfuzzer OpenBSD-Commit-ID: 0e913b542c3764b100b1571fdb0d0e5cc086fe97
3b98b6e27f8a122dbfda9966b1afeb3e371cce91
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/3b98b6e27f8a122dbfda9966b1afeb3e371cce91
2020-12-04 02:29:25+00:00
upstream: fix a bug that prevented serialisation of ed25519-sk keys OpenBSD-Commit-ID: 066682b79333159cac04fcbe03ebd9c8dcc152a9
4bfc0503ad94a2a7190686a89649567c20b8534f
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/4bfc0503ad94a2a7190686a89649567c20b8534f
2019-11-18 06:58:00+00:00
openssl-config: add example libssl system-defaults Provide a "simple" example for affecting the systemwide default behavior of libssl. The large number of mandatory nested sections makes this less simple than the main description might suggest. Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10937)
3472082b4b6d73e0803a7c47f03e96ec0a69f77b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3472082b4b6d73e0803a7c47f03e96ec0a69f77b
2020-01-23 17:08:34-08:00
Only call memcpy when the length is larger than 0. Reviewed-by: Rich Salz <[email protected]> GH: #2050
a19fc66a6b5f99ad00305e152bdb41460d728640
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a19fc66a6b5f99ad00305e152bdb41460d728640
2016-12-08 19:20:55+01:00
Fix a memory leak in X509_issuer_and_serial_hash This is reproducible with my error injection patch. The test vector has been validated on the 1.1.1 branch but the issue is of course identical in all branches. $ ERROR_INJECT=1653267699 ../util/shlib_wrap.sh ./x509-test ./corpora/x509/5f4034ae85d6587dcad4da3e812e80f3d312894d ERROR_INJECT=1653267699 #0 0x7fd485a6ad4f in __sanitizer_print_stack_trace ../../../../src/libsanitizer/asan/asan_stack.cc:36 #1 0x55c12d268724 in my_malloc fuzz/test-corpus.c:114 #2 0x7fd484f51a75 in CRYPTO_zalloc crypto/mem.c:230 #3 0x7fd484ed778d in EVP_DigestInit_ex crypto/evp/digest.c:139 #4 0x7fd4850a9849 in X509_issuer_and_serial_hash crypto/x509/x509_cmp.c:44 #5 0x55c12d268951 in FuzzerTestOneInput fuzz/x509.c:44 #6 0x55c12d268239 in testfile fuzz/test-corpus.c:182 #7 0x55c12d267c7f in main fuzz/test-corpus.c:226 #8 0x7fd483a42082 in __libc_start_main ../csu/libc-start.c:308 #9 0x55c12d267e5d in _start (/home/ed/OPCToolboxV5/Source/Core/OpenSSL/openssl/fuzz/x509-test+0x3e5d) ================================================================= ==1058475==ERROR: LeakSanitizer: detected memory leaks Direct leak of 268 byte(s) in 1 object(s) allocated from: #0 0x7fd485a5dc3e in __interceptor_realloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:163 #1 0x7fd484d2eb9b in BUF_MEM_grow crypto/buffer/buffer.c:97 #2 0x7fd4850b2913 in X509_NAME_oneline crypto/x509/x509_obj.c:43 #3 0x7fd4850a982f in X509_issuer_and_serial_hash crypto/x509/x509_cmp.c:41 #4 0x55c12d268951 in FuzzerTestOneInput fuzz/x509.c:44 #5 0x55c12d268239 in testfile fuzz/test-corpus.c:182 #6 0x55c12d267c7f in main fuzz/test-corpus.c:226 #7 0x7fd483a42082 in __libc_start_main ../csu/libc-start.c:308 SUMMARY: AddressSanitizer: 268 byte(s) leaked in 1 allocation(s). Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18371)
b7e28c0bb1cdc07e36c7dc2467083236b931de31
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b7e28c0bb1cdc07e36c7dc2467083236b931de31
2022-05-21 15:41:46+02:00
Document that the openssl fipsinstall self test callback may not be used. Fixes #16260 If the user autoloads a fips module from a config file, then it will run the self tests early (before the self test callback is set), and they may not get triggered again during the fipsinstall process. In order for this to happen there must already be a valid fips config file. As the main purpose of the application is to generate the fips config file, this case has just been documented. Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16475)
8d257d0dc6ed9d5aeb8366de6be0af01538557ea
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8d257d0dc6ed9d5aeb8366de6be0af01538557ea
2021-08-31 10:59:20+10:00
fix coverity 1485660 improper use of negative value Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15635)
6c1d17c802678364a8a8d7d69ee2aba2ac76a854
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6c1d17c802678364a8a8d7d69ee2aba2ac76a854
2021-06-07 09:23:41+10:00
Don't leak memory on error path in dane_ctx_enable() The function dane_ctx_enable() allocated some memory that it did not free in an error path. Reviewed-by: Richard Levitte <[email protected]>
b3bd3d5af8ed31f438db4367ce3a4bd43067e764
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b3bd3d5af8ed31f438db4367ce3a4bd43067e764
2016-04-27 14:22:20+01:00
Manual fixes after copyright consolidation Reviewed-by: Richard Levitte <[email protected]>
b6cff313cbb1d0381b329fe4f6a8f009cdb270e4
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b6cff313cbb1d0381b329fe4f6a8f009cdb270e4
2016-05-17 17:38:18-04:00
Add missing SIZE_MAX define for windows Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/9559)
ac5a61caf87652733545e9c2a9219e5986b6a35a
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ac5a61caf87652733545e9c2a9219e5986b6a35a
2019-08-09 21:38:42+10:00
test/run_tests.pl: Improve indentation parsing workaround for VFO and VFP mode Reviewed-by: Nicola Tuveri <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12175)
93a7d24179ee5f61a2350b547dfcd522f6a4b9b0
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/93a7d24179ee5f61a2350b547dfcd522f6a4b9b0
2020-06-20 17:20:20+02:00
updated macro spacing for styling purposes Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Matt Caswell <[email protected]> CLA: trivial
6974fca49d9d0b110c02c83a7bbe01907472ac5e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6974fca49d9d0b110c02c83a7bbe01907472ac5e
2016-12-05 17:17:11-05:00
Refactor linker script generation The generation of linker scripts was badly balanced, as all sorts of platform dependent stuff went into the top build.info, when that part should really be made as simply and generic as possible. Therefore, we move a lot of the "magic" to the build files templates, since they are the place for platform dependent things. What remains is to parametrize just enough in the build.info file to generate the linker scripts correctly for each associated library. "linker script" is a term usually reserved for certain Unix linkers. However, we only use them to say what symbols should be exported, so we use the term loosely for all platforms. The internal extension is '.ld', and is changed by the build file templates as appropriate for each target platform. Note that this adds extra meaning to the value of the shared_target attribute. Reviewed-by: Tim Hudson <[email protected]> (Merged from https://github.com/openssl/openssl/pull/7333)
ef2dfc9902e015de91f015177bdf235c9000839e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ef2dfc9902e015de91f015177bdf235c9000839e
2018-09-30 14:44:59+02:00
app_isdir() cleanup I think it's better to use `GetFileAttributes` to obtain the attributes of a file than `FindFirstFile`. If the input name contains `*`, this function should return failure rather than check whether the first match happens to be a file or a directory. Reviewed-by: Andy Polyakov <[email protected]> Reviewed-by: Bernd Edlinger <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3991)
5bd051a0dcd4f04bc9ea197f74b34612b3fcca84
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5bd051a0dcd4f04bc9ea197f74b34612b3fcca84
2017-07-22 01:57:27-04:00
Correctly compare EdiPartyName in GENERAL_NAME_cmp() If a GENERAL_NAME field contained EdiPartyName data then it was incorrectly being handled as type "other". This could lead to a segmentation fault. Many thanks to David Benjamin from Google for reporting this issue. CVE-2020-1971 Reviewed-by: Tomas Mraz <[email protected]>
b33c48b75aaf33c93aeda42d7138616b9e6a64cb
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b33c48b75aaf33c93aeda42d7138616b9e6a64cb
2020-11-11 16:12:58+00:00
Remove old config that used non-exist util script Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/5016)
b44a65512a4a0a299f8f817b63df472e74a0007a
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/b44a65512a4a0a299f8f817b63df472e74a0007a
2018-01-04 13:02:37-05:00
Add a documentation clarification suggested by Matt Caswell Signed-off-by: Matt Caswell <[email protected]> Reviewed-by: Tim Hudson <[email protected]>
9ef175148b7da12cb09f5e78f32bc6ab58d78b83
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9ef175148b7da12cb09f5e78f32bc6ab58d78b83
2015-05-26 09:46:57-04:00
CORE: Add an algorithm_description field to OSSL_ALGORITHM This corresponds to the |info| field in EVP_PKEY_ASN1_METHOD, as well as the generic use of OBJ_nid2ln() as a one line description. We also add the base functionality to make use of this field. Fixes #14514 Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/14656)
309a78aa305ee14878e453c78ccf9a7dc91264cf
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/309a78aa305ee14878e453c78ccf9a7dc91264cf
2021-03-16 14:14:43+01:00
Don't run the symbol presence test on windows Fixes #17109 Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/17119)
d09f4501e47e0b969caec5a3059af52d227e961a
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d09f4501e47e0b969caec5a3059af52d227e961a
2021-11-23 15:22:27+00:00
Remove unused BoringSSL specific flags We will rely on the -allow-unimplemented feature instead. Reviewed-by: Richard Levitte <[email protected]>
8beda2c12dc58389dd3c036b0858e15b010567da
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8beda2c12dc58389dd3c036b0858e15b010567da
2016-10-19 11:03:38+01:00
OSSL_HTTP_open(): Complete documentation of checks for server and proxy args Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/17186)
59b6b5a94f5a5f756aa323d1fb061697ca9eadf8
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/59b6b5a94f5a5f756aa323d1fb061697ca9eadf8
2021-12-01 08:01:31+01:00
This is an int Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3149)
8dcb87fdbaba2be3e75fdaf16382c827165d2af5
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8dcb87fdbaba2be3e75fdaf16382c827165d2af5
2017-04-07 20:58:50-04:00
Added Perl installation instructions to NOTES-PERL.md for HPE NonStop. Fixes #14931. Signed-off-by: Randall S. Becker <[email protected]> Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matthias St. Pierre <[email protected]> (Merged from https://github.com/openssl/openssl/pull/14932)
2de02e7dca0a875b1ae5b6a4a4f946705eb71edc
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2de02e7dca0a875b1ae5b6a4a4f946705eb71edc
2021-04-19 13:32:36-04:00
Build system: VC-WIN64I fixups. Reviewed-by: Richard Levitte <[email protected]>
6ddb62a575a31940785fdf3db8a24ca6006e5d2a
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6ddb62a575a31940785fdf3db8a24ca6006e5d2a
2016-03-23 20:33:29+01:00
Copyright consolidation 02/10 Reviewed-by: Richard Levitte <[email protected]>
440e5d805f449d662520313b33fd90aeee86980b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/440e5d805f449d662520313b33fd90aeee86980b
2016-05-17 14:20:24-04:00
Add documentation for the new testing framework Reviewed-by: Rich Salz <[email protected]>
5ab4f893ce6d10e9286fd746acebe382c36cd32d
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/5ab4f893ce6d10e9286fd746acebe382c36cd32d
2015-09-03 12:00:28+02:00
Document EVP_CIPHER_CTX IV accessors Including the ones that were added in commit 83b06347023a573433b6aa23c8042f89df869f9e with a note that they "may go away" and are now deprecated. Remove the missingcrypto.txt entries for the now-deprecated functions. [extended tests] Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12233)
c76ffc78a513660b5f62bc32a64f44c62edede74
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/c76ffc78a513660b5f62bc32a64f44c62edede74
2020-06-22 11:37:31-07:00
Make PKCS12 structures opaque Reviewed-by: Rich Salz <[email protected]>
54c38b7f0dda668be82199b4e4aa56c1f6afe3ea
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/54c38b7f0dda668be82199b4e4aa56c1f6afe3ea
2015-09-26 12:26:51+01:00
Build cleanup: don't use SHARED_SOURCE with modules SHARED_SOURCE is reserved for products that are expected to come in dual shared / non-shared form, i.e. the routine libraries like libcrypto and libssl, to distinguish source that should only appear in their shared form. Modules are always shared, so there's no need for them to have this type of distinction. Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/8623)
22b414672d0260904ef2f5f5304b02f96c67dd7e
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/22b414672d0260904ef2f5f5304b02f96c67dd7e
2019-03-31 15:14:00+02:00
Fix ECDH key identifier support. PR#3789 Reviewed-by: Rich Salz <[email protected]>
7a317fa07cf3d9952c574e7d214d371798fee42a
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7a317fa07cf3d9952c574e7d214d371798fee42a
2015-04-10 02:33:44+01:00
coverity 1462576 Resource leak Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11651)
6f0bdf41a34d21a0a7abf154c2a454fb5437251e
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/6f0bdf41a34d21a0a7abf154c2a454fb5437251e
2020-04-27 09:25:42+10:00
Add an error to the stack on failure in dtls1_write_bytes() Reviewed-by: Tim Hudson <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3496)
42bd7a16d020de40ad166336fe60409aa9256f9b
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/42bd7a16d020de40ad166336fe60409aa9256f9b
2017-05-22 12:36:11+01:00
move ECDSA_SIG definition Reviewed-by: Richard Levitte <[email protected]>
714b2abb298552698d19818d42d6cc19ffdb7cf2
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/714b2abb298552698d19818d42d6cc19ffdb7cf2
2015-10-27 18:18:18+00:00
GH721: Duplicated flags in doc Reviewed-by: Richard Levitte <[email protected]>
ed233db7421b98b2058da2a07f6c46b52917b918
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/ed233db7421b98b2058da2a07f6c46b52917b918
2016-02-22 10:58:20-05:00
also zero pad DHE public key in ClientKeyExchange message for interop Reviewed-by: Ben Kaduk <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12331)
807b0a1dbb65fcf0d432184326e76e9f745dc3f1
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/807b0a1dbb65fcf0d432184326e76e9f745dc3f1
2020-06-30 22:57:36+02:00
Correcting typo that causes make install fail Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Richard Levitte <[email protected]>
2d5a1cfab8af8a282c62a3e1562aab1ad905b3e9
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2d5a1cfab8af8a282c62a3e1562aab1ad905b3e9
2016-04-01 14:20:11-04:00
Use local IV storage in e_sm4.c Inline the pre-13273237a65d46186b6bea0b51aec90670d4598a versions of EVP_CIPHER_CTX_iv(), EVP_CIPHER_CTX_original_iv(), and EVP_CIPHER_CTX_iv_noconst() in e_sm4.c. For the legacy implementations, there's no need to use an in-provider storage for the IV, when the crypto operations themselves will be performed outside of the provider. Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12233)
1453d736b5bb8abaa18482652828096b44c4bf3a
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1453d736b5bb8abaa18482652828096b44c4bf3a
2020-07-02 14:12:33-07:00
Remind people to have 'Fixes #XXXX' in the commit message It's of course also possible to just add them to the PR description, but having these lines in the commit messages provide better automation. Reviewed-by: Andy Polyakov <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3104)
92e2ed5689671bbc003bfe752f660f769e86bf50
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/92e2ed5689671bbc003bfe752f660f769e86bf50
2017-04-02 11:38:23+02:00
Retry SSL_read on ERROR_WANT_READ. This resolves the retry issue in general, but also the specific case where a TLS 1.3 server sends a post-handshake NewSessionTicket message prior to appdata. Reviewed-by: Tim Hudson <[email protected]> Reviewed-by: Bernd Edlinger <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/3925)
f32bf051cf1c376216bf4fec905fafebeb6ec2dc
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f32bf051cf1c376216bf4fec905fafebeb6ec2dc
2017-07-13 13:07:26-04:00
Init the child providers immediately on creation of the child libctx We were deferring the initial creation of the child providers until the first fetch. This is a carry over from an earlier iteration of the child lib ctx development and is no longer necessary. In fact we need to init the child providers immediately otherwise not all providers quite init correctly. Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15270)
36a89c04390f2d98e740b9c53a1eead9dcb5f188
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/36a89c04390f2d98e740b9c53a1eead9dcb5f188
2021-05-13 15:35:42+01:00
Fix a couple nits in DEFINE_STACK_OF.pod Only the 'new' variant of sk_TYPE_new_reserve() deals with compression functions. Mention both new 'reserve' APIs as being added in OpenSSL 1.1.1. Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/4591)
689c17883ac20d0991427b822eb98d2f0e6b78e7
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/689c17883ac20d0991427b822eb98d2f0e6b78e7
2017-10-26 08:06:50-05:00
Fix ossl_x509v3_cache_extensions(): EXFLAG_NO_FINGERPRINT should not be an error This allows reverting the recent workaround on cmp_ctx_test regarding X509_new() Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Dmitry Belyavskiy <[email protected]> Reviewed-by: David von Oheimb <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16043)
2c05607cd91fc5aab6d61f0324104d63a091d705
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2c05607cd91fc5aab6d61f0324104d63a091d705
2021-07-11 18:55:12+02:00
Fix clang complaints about uninitialised variables. Reviewed-by: Rich Salz <[email protected]>
39d5193201cd0d73afebbd8c08f641b541c02b77
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/39d5193201cd0d73afebbd8c08f641b541c02b77
2015-12-07 20:37:08+01:00
Ensure pkey_set_type handles ENGINE references correctly pkey_set_type should not consume the ENGINE references that may be passed to it. Fixes #16757 Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16846)
f7d6868d0d48fedd5d9daad0c3e0cbcaef423ff3
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f7d6868d0d48fedd5d9daad0c3e0cbcaef423ff3
2021-10-15 16:23:31+01:00
err: remove TODOs Reviewed-by: Tim Hudson <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15539)
3b90a847ece93b3886f14adc7061e70456d564e1
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3b90a847ece93b3886f14adc7061e70456d564e1
2021-05-31 14:29:55+10:00
PKCS7_dataVerify(): fix missing use of CRLs in PKCS#7 message Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> Reviewed-by: David von Oheimb <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18913)
2b44565476d9d6d86f5af0ec736a7bf6f77a839e
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2b44565476d9d6d86f5af0ec736a7bf6f77a839e
2022-07-30 20:53:44+02:00
hpke: fix tests with disabled chacha20 or poly1305 Reviewed-by: Matt Caswell <[email protected]> Reviewed-by: Shane Lontis <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19784)
36b4d7a69836fdf0ede1ea00879b26047bf93056
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/36b4d7a69836fdf0ede1ea00879b26047bf93056
2022-11-29 13:50:27+01:00
Fix memory leak in mac_newctx() on error Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13702)
47b784a41b729d5df9ad47c99355db2f2026a709
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/47b784a41b729d5df9ad47c99355db2f2026a709
2020-12-17 22:28:17+01:00
GH784: Better variable name Signed-off-by: Rich Salz <[email protected]> Reviewed-by: Emilia Käsper <[email protected]>
fbff671659bd51a7b124065ea6caf5b554111211
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/fbff671659bd51a7b124065ea6caf5b554111211
2016-03-04 10:34:47+03:00
Add a missing comma in OPENSSL_malloc.pod Reviewed-by: Rich Salz <[email protected]>
eae029244d09b185287da0e1dc60f6289c775b89
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/eae029244d09b185287da0e1dc60f6289c775b89
2016-05-21 20:49:58+02:00
Fix crash in genpkey app when -pkeyopt digest:name is used for DH or DSA. By the time the keygen is called the references to strings inside the gen ctx are floating pointers. A strdup solves this problem. Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13432)
f2a7151849a566892912737f7b633c04f64a2b9e
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f2a7151849a566892912737f7b633c04f64a2b9e
2020-11-18 11:32:33+10:00
Fix 12 Boring tests involving NULL-SHA ciphersuites The Boring runner attempts to enable the NULL-SHA ciphersuite using the cipherstring "DEFAULT:NULL-SHA". However in OpenSSL DEFAULT permanently switches off NULL ciphersuites, so we fix this up to be "ALL:NULL-SHA" instead. We can't change the runner so we have to change the shim to detect this. (Merged from https://github.com/openssl/openssl/pull/2933) Reviewed-by: Rich Salz <[email protected]> Reviewed-by: Emilia Käsper <[email protected]>
64e2b23ce3b75fc6c73ac8c979894e190c9e78d1
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/64e2b23ce3b75fc6c73ac8c979894e190c9e78d1
2017-03-14 14:16:19+00:00
Fix memset call in stack.c The function sk_zero is supposed to zero the elements held within a stack. It uses memset to do this. However it calculates the size of each element as being sizeof(char **) instead of sizeof(char *). This probably doesn't make much practical difference in most cases, but isn't a portable assumption. Reviewed-by: Richard Levitte <[email protected]>
7132ac830fa08d9a936e011d7c541b0c52115b33
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7132ac830fa08d9a936e011d7c541b0c52115b33
2015-03-12 12:54:44+00:00
prov/drbg: fix misspelling of '#ifdef FIPS_MODULE' Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/12866)
1d30b0a4ada5707e10ee9a94ca4acd2e45004d01
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1d30b0a4ada5707e10ee9a94ca4acd2e45004d01
2020-09-13 00:17:35+02:00
Remove unused 1bit GCM implementation Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/18835)
7b6e19fc4e6cc1a7000f71789ef50636dacdbb85
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7b6e19fc4e6cc1a7000f71789ef50636dacdbb85
2022-07-20 09:48:21-04:00
Fix parameter types in sshkdf Handling of parameter OSSL_KDF_PARAM_SSHKDF_TYPE mixed integer and string parameters. This caused endianness problems on big-endian machines. As a result, it is not possible to pass FIPS tests since the parameter was stored with an integer value but read via a cast to char pointer. While this works on little endian machines, big endian s390 read the most significant bits instead of the least significant (as done by, e.g., x86). Change the parameter to char array and fix the usages. Signed-off-by: Juergen Christ <[email protected]> Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Patrick Steuer <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13781)
270a5ce1d9ea579a2f1d45887971582b1ef2b6a1
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/270a5ce1d9ea579a2f1d45887971582b1ef2b6a1
2020-12-14 17:36:22+01:00
Fix BIO_eof() for BIO pairs BIO_eof() was always returning true when using a BIO pair. It should only be true if the peer BIO is empty and has been shutdown. RT#1215 Reviewed-by: Richard Levitte <[email protected]>
3105d695358d86c0f2a404b2b74a1870b941ce5e
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/3105d695358d86c0f2a404b2b74a1870b941ce5e
2016-05-09 15:04:11+01:00
Fix d2i_PublicKey() for EC keys o2i_ECPublicKey() requires an EC_KEY structure filled with an EC_GROUP. o2i_ECPublicKey() is called by d2i_PublicKey(). In order to fulfill the o2i_ECPublicKey()'s requirement, d2i_PublicKey() needs to be called with an EVP_PKEY with an EC_KEY containing an EC_GROUP. However, the call to EVP_PKEY_set_type() frees any existing key structure inside the EVP_PKEY, thus freeing the EC_KEY with the EC_GROUP that o2i_ECPublicKey() needs. This means you can't d2i_PublicKey() for an EC key... The fix is to check to see if the type is already set appropriately, and if so, not call EVP_PKEY_set_type(). Reviewed-by: Paul Yang <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/8168)
2aa2beb06cc25c1f8accdc3d87b946205becfd86
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/2aa2beb06cc25c1f8accdc3d87b946205becfd86
2019-02-04 16:04:11-05:00
Avoid races in tserver test code Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/20348)
99ed85bba9de5d9983d3796c18e62041d3ce6575
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/99ed85bba9de5d9983d3796c18e62041d3ce6575
2023-02-22 17:01:28+00:00
timing_load_creds: Fix typos in the timersub macro Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Matt Caswell <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19865) (cherry picked from commit f1b104953af8e3a82f7c5ee33f0403fc067c8516)
1cf2557063b142db3684b780c301f8ed609f1e84
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1cf2557063b142db3684b780c301f8ed609f1e84
2022-12-12 11:49:21+01:00
Fix enable-weak-ssl-ciphers Commit e260bee broke the enable-weak-ssl-ciphers option. The stitched rc4-hmac-md5 cipher implementation did not recognise the tls_version parameter, and therefore was being incorrectly handled. Fixes #13795 Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Ben Kaduk <[email protected]> (Merged from https://github.com/openssl/openssl/pull/13803)
1dccccf33351a732dac3c700b2de05d34f708e33
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/1dccccf33351a732dac3c700b2de05d34f708e33
2021-01-07 17:40:09+00:00
nmake: fix install_html_docs target The nmake rule contains actually two errors: 1. The $< target[1] does not work for regular rules and is expanded to an empty string after issuing the warning NMAKE : warning U4006: special macro undefined : '$<"' Solution: replace $< by $? 2. The substitution regex is not quoted correctly, which leads to the following error message by cmd.exe: 'href' is not recognized as an internal or external command, operable program or batch file. Solution: Quoting arguments for cmd.exe is really a nightmare, but with the help of the excellent description [2] I was able to properly quote the regex. Things were complicated by the fact that a lot of levels of unquoting needed to be considered: * perl (windows-makefile.tmpl -> makefile) * make (reading the makefile) * cmd.exe (executed by make) * perl (scanning command line using CommandLineToArgvW()) The fix works, but the regex has become unmaintainable. It would actually be better to wrap the entire command (including the regex) into a little perl script which can be called by make directly. [1] https://docs.microsoft.com/en-us/cpp/build/reference/filename-macros [2] https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/ Fixes #10648 Fixes #10749 [extended tests] Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/10719)
a9e4e3c39eb361ddfb438edb27c754947009eed6
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/a9e4e3c39eb361ddfb438edb27c754947009eed6
2019-12-28 23:03:29+01:00
Fix SipHash init order. Setting the SipHash hash size and setting its key is done with two independent functions... and yet, the internals depend on both. Unfortunately, the function to change the size wasn't adapted for the possibility that the key was set first, with a different hash size. This changes the hash setting function to fix the internal values (which is easy, fortunately) according to the hash size. evpmac.txt value for digestsize:8 is also corrected. Reviewed-by: Paul Dale <[email protected]> (Merged from https://github.com/openssl/openssl/pull/7613)
425036130dfb3cfbef5937772f7526ce60133264
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/425036130dfb3cfbef5937772f7526ce60133264
2018-11-11 12:23:26+01:00
rsaz_exp_x2.c: Remove unused ALIGN64 macro Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Hugo Landau <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19597)
4b65d79d7132d6e46bfb385a76082f6502ef617b
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/4b65d79d7132d6e46bfb385a76082f6502ef617b
2022-11-03 14:01:56+01:00
Add *.d.tmp files to .gitignore These are temporary files generated by the build process that should not be checked in. Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/11122)
7b5108dff4cfde059ca278147a188fb6254603d1
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/7b5108dff4cfde059ca278147a188fb6254603d1
2020-02-18 16:08:30+00:00
Configure: recognize -static as link option and disable incompatible options. Reviewed-by: Rich Salz <[email protected]>
9d46752dfecf26ccd62de33811eb30a19ffb87ac
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9d46752dfecf26ccd62de33811eb30a19ffb87ac
2016-08-14 17:24:10+02:00
Add BN_check_prime() Add a new API to test for primes that can't be misused, deprecated the old APIs. Suggested by Jake Massimo and Kenneth Paterson Reviewed-by: Paul Dale <[email protected]> GH: #9272
42619397eb5db1a77d077250b0841b9c9f2b8984
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/42619397eb5db1a77d077250b0841b9c9f2b8984
2019-10-06 17:21:16+02:00
Update manual to reference the IANA TLS Cipher Suites Registry Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/16179)
0865200fe59e7b18fbef07077897e09ab39741dc
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0865200fe59e7b18fbef07077897e09ab39741dc
2021-07-30 01:43:36+02:00
Make it possible to select or deselect test groups by number Examples of possible expressions (adapt to your platform): make test TESTS=-99 make test TESTS=10 make test TESTS=-9? make test TESTS=-[89]0 make test TESTS=[89]0 Reviewed-by: Rich Salz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2887)
e5fd8ca43beeb40d33d421b519fb7e1d20358b94
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/e5fd8ca43beeb40d33d421b519fb7e1d20358b94
2017-03-09 19:08:03+01:00
Cleansing all the temporary data for s390x Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> (Merged from https://github.com/openssl/openssl/pull/17486)
79c7acc59bb98c2b8451b048ed1dd8cc517df76e
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/79c7acc59bb98c2b8451b048ed1dd8cc517df76e
2022-01-12 16:54:45+01:00
Don't use select on Windows Windows "select" only works for sockets so don't use it to wait for async. Reviewed-by: Rich Salz <[email protected]>
d6e03b707796747442be86c56e88c653f91ac9ed
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/d6e03b707796747442be86c56e88c653f91ac9ed
2016-04-20 12:56:54+01:00
Move sequence increment to post encryption processing This change make dtls_write_records virtuall the same as tls_write_records_default, which will enable us to merge them in a subsequent commit. Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Tomas Mraz <[email protected]> Reviewed-by: Hugo Landau <[email protected]> (Merged from https://github.com/openssl/openssl/pull/19424)
421386e392151c267ac7d3de6a2dd23c0ab62aed
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/421386e392151c267ac7d3de6a2dd23c0ab62aed
2022-10-17 14:42:09+01:00
Fix the parameter types of the CRYPTO_EX_dup function type. This fixes a strict aliasing issue in ui_dup_method_data. The parameter type of CRYPTO_EX_dup's from_d parameter is in fact void **, since it points to a pointer. This function is rarely used, therefore fix the param type although that may be considered an API breaking change. Reviewed-by: Richard Levitte <[email protected]> (Merged from https://github.com/openssl/openssl/pull/2986)
712e8debb5b2238450b303acb5f24298382c63a5
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/712e8debb5b2238450b303acb5f24298382c63a5
2017-03-20 17:29:28+01:00
providers: remove TODOs Reviewed-by: Tim Hudson <[email protected]> (Merged from https://github.com/openssl/openssl/pull/15539)
0848b943a8c481e3fb1e08b70735392d6d6d70f4
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/0848b943a8c481e3fb1e08b70735392d6d6d70f4
2021-05-31 14:27:58+10:00
Fix mis-named macro in packet_locl.h A couple of the WPACKET_sub_memcpy* macros were mis-named. Reviewed-by: Rich Salz <[email protected]>
f308416e27cc8b6639841497bbc782363c17b11d
openssl
neuralsentry
0
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f308416e27cc8b6639841497bbc782363c17b11d
2016-09-29 16:39:32+01:00
fix undoes errors introduced by https://github.com/openssl/openssl/commit/fc6076ca272f74eb1364c29e6974ad5da5ef9777?diff=split#diff-1014acebaa2c13d44ca196b9a433ef2eR184 Reviewed-by: Richard Levitte <[email protected]> Reviewed-by: Matt Caswell <[email protected]> CLA: trivial
8bd62abe00b893573920a7a12769fb00bd8da234
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/8bd62abe00b893573920a7a12769fb00bd8da234
2016-12-05 16:57:25-05:00
Fix some doc nits. Reviewed-by: Matt Caswell <[email protected]>
9d8c2dfe14cb371d242c04a52182aa0aee25ed18
openssl
neuralsentry
1
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/9d8c2dfe14cb371d242c04a52182aa0aee25ed18
2016-08-17 16:38:08-04:00