commit_msg
stringlengths 1
24.2k
| commit_hash
stringlengths 2
84
⌀ | project
stringlengths 2
40
| source
stringclasses 4
values | labels
int64 0
1
| repo_url
stringlengths 26
70
⌀ | commit_url
stringlengths 74
118
⌀ | commit_date
stringlengths 25
25
⌀ |
---|---|---|---|---|---|---|---|
upstream: spelling ok dtucker@
OpenBSD-Commit-ID: bfc7ba74c22c928de2e257328b3f1274a3dfdf19
| cb885178f36b83d0f14cfe9f345d2068103feed0 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/cb885178f36b83d0f14cfe9f345d2068103feed0 | 2022-01-01 01:55:30+00:00 |
upstream: memleak in unittest; found by valgrind
OpenBSD-Regress-ID: 168c23b0fb09fc3d0b438628990d3fd9260a8a5e
| 2f131e1b34502aa19f345e89cabf6fa3fc097f09 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/2f131e1b34502aa19f345e89cabf6fa3fc097f09 | 2018-07-16 03:09:59+00:00 |
upstream commit
spelling;
Upstream-ID: 606f933c8e2d0be902ea663946bc15e3eee40b25
| 40962198e3b132cecdb32e9350acd4294e6a1082 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/40962198e3b132cecdb32e9350acd4294e6a1082 | 2017-06-24 06:57:04+00:00 |
upstream: spelling errors in comments; no code change from
OpenBSD-Commit-ID: 166ea64f6d84f7bac5636dbd38968592cb5eb924
| d081f017c20a3564255873ed99fd7d024cac540f | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d081f017c20a3564255873ed99fd7d024cac540f | 2020-03-13 03:17:07+00:00 |
upstream commit
Fix a logic bug in sshd_exchange_identification which
prevented clients using major protocol version 2 from connecting to the
server. ok millert@
OpenBSD-Commit-ID: 8668dec04586e27f1c0eb039ef1feb93d80a5ee9
| c9c1bba06ad1c7cad8548549a68c071bd807af60 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/c9c1bba06ad1c7cad8548549a68c071bd807af60 | 2018-01-23 20:00:58+00:00 |
upstream commit
Fix memory leaks in match_filter_list() error paths.
ok dtucker@ markus@
Upstream-ID: c7f96ac0877f6dc9188bbc908100a8d246cc7f0e
| b2afdaf1b52231aa23d2153f4a8c5a60a694dda4 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/b2afdaf1b52231aa23d2153f4a8c5a60a694dda4 | 2017-02-15 23:38:31+00:00 |
upstream commit
memleak of algorithm name in mm_answer_sign; reported by
Jakub Jelen
Upstream-ID: ccd742cd25952240ebd23d7d4d6b605862584d08
| 24c9bded569d9f2449ded73f92fb6d12db7a9eec | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/24c9bded569d9f2449ded73f92fb6d12db7a9eec | 2016-02-15 23:32:37+00:00 |
upstream commit
- Fix error message: passphrase needs to be at least 5
characters, not 4. - Remove unused function argument. - Remove two
unnecessary variables.
OK djm@
Upstream-ID: 13010c05bfa8b523da1c0dc19e81dd180662bc30
| 3c019a936b43f3e2773f3edbde7c114d73caaa4c | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/3c019a936b43f3e2773f3edbde7c114d73caaa4c | 2015-09-13 14:39:16+00:00 |
upstream: fix minor memleak of kex->hostkey_alg on rekex
OpenBSD-Commit-ID: 2c3969c74966d4ccdfeff5e5f0df0791919aef50
| 553b90feedd7da5b90901d73005f86705456d686 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/553b90feedd7da5b90901d73005f86705456d686 | 2020-12-04 02:27:57+00:00 |
upstream: spelling fixes; from paul tagliamonte amendments to his
diff are noted on tech
OpenBSD-Commit-ID: d776dd03d0b882ca9c83b84f6b384f6f9bd7de4a
| 0872663a7be0301bcc3d49acdbc9b740a3d972d4 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/0872663a7be0301bcc3d49acdbc9b740a3d972d4 | 2022-12-26 19:16:03+00:00 |
upstream: Switch ssh_config parsing to use argv_split()
This fixes a couple of problems with the previous tokeniser,
strdelim()
1. strdelim() is permissive wrt accepting '=' characters. This is
intended to allow it to tokenise "Option=value" but because it
cannot keep state, it will incorrectly split "Opt=val=val2".
2. strdelim() has rudimentry handling of quoted strings, but it
is incomplete and inconsistent. E.g. it doesn't handle escaped
quotes inside a quoted string.
3. It has no support for stopping on a (unquoted) comment. Because
of this readconf.c r1.343 added chopping of lines at '#', but
this caused a regression because these characters may legitimately
appear inside quoted strings.
The new tokeniser is stricter is a number of cases, including #1 above
but previously it was also possible for some directives to appear
without arguments. AFAIK these were nonsensical in all cases, and the
new tokeniser refuses to accept them.
The new code handles quotes much better, permitting quoted space as
well as escaped closing quotes. Finally, comment handling should be
fixed - the tokeniser will terminate only on unquoted # characters.
feedback & ok markus@
tested in snaps for the last five or so days - thanks Theo and those who
caught bugs
OpenBSD-Commit-ID: dc72fd12af9d5398f4d9e159d671f9269c5b14d5
| ea9e45c89a4822d74a9d97fef8480707d584da4d | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/ea9e45c89a4822d74a9d97fef8480707d584da4d | 2021-06-08 07:07:15+00:00 |
upstream: put back the mux_ctx memleak fix, but only for channels of
type SSH_CHANNEL_MUX_LISTENER; Specifically SSH_CHANNEL_MUX_PROXY channels
should not have this structure freed.
OpenBSD-Commit-ID: f3b213ae60405f77439e2b06262f054760c9d325
| aa6fa4bf3023fa0e5761cd8f4b2cd015d2de74dd | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/aa6fa4bf3023fa0e5761cd8f4b2cd015d2de74dd | 2020-07-03 07:25:18+00:00 |
upstream commit
Fix compression output stats broken in rev 1.201. Patch
originally by Russell Coker via Debian bug #797964 and Christoph Biedl. ok
djm@
Upstream-ID: 83a1903b95ec2e4ed100703debb4b4a313b01016
| 550c053168123fcc0791f9952abad684704b5760 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/550c053168123fcc0791f9952abad684704b5760 | 2017-06-06 09:12:17+00:00 |
memleak of buffer in sshpam_query
coverity report via Ed Maste; ok dtucker@
| ec0e6243660bf2df30c620a6a0d83eded376c9c6 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/ec0e6243660bf2df30c620a6a0d83eded376c9c6 | 2019-09-13 13:14:39+10:00 |
upstream: memleak introduced in r1.83; from Colin Watson
OpenBSD-Commit-ID: 5c019104c280cbd549a264a7217b67665e5732dc
| 7fef173c28f7462dcd8ee017fdf12b5073f54c02 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/7fef173c28f7462dcd8ee017fdf12b5073f54c02 | 2018-08-23 03:01:08+00:00 |
upstream: fix bug in PermitRemoteOpen which caused it to ignore its
first argument unless it was one of the special keywords "any" or "none".
Reported by Georges Chaudy in bz3515; ok dtucker@
OpenBSD-Commit-ID: c5678a39f1ff79993d5ae3cfac5746a4ae148ea5
| b3daa8dc582348d6ab8150bc1e571b7aa08c5388 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/b3daa8dc582348d6ab8150bc1e571b7aa08c5388 | 2023-01-02 07:03:30+00:00 |
Skip reexec test on OpenSSL 1.1.1 specifically.
OpenSSL 1.1.1 has a bug in its RNG that breaks reexec fallback, so skip
that test. See bz#3483 for details.
| ca98d3f8c64cfc51af81e1b01c36a919d5947ec2 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/ca98d3f8c64cfc51af81e1b01c36a919d5947ec2 | 2022-11-09 20:59:20+11:00 |
upstream: fix memory leak of mux_ctx; patch from Sergiy Lozovsky
via bz3189 ok dtucker
OpenBSD-Commit-ID: db249bd4526fd42d0f4f43f72f7b8b7705253bde
| 1b90ddde49e2ff377204082b6eb130a096411dc1 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/1b90ddde49e2ff377204082b6eb130a096411dc1 | 2020-07-03 05:08:41+00:00 |
upstream: fix memleak in process_extension(); oss-fuzz issue #42719
OpenBSD-Commit-ID: d8d49f840162fb7b8949e3a5adb8107444b6de1e
| a23698c3082ffe661abed14b020eac9b0c25eb9f | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/a23698c3082ffe661abed14b020eac9b0c25eb9f | 2022-01-01 04:18:06+00:00 |
upstream: fix memleak in test
OpenBSD-Regress-ID: 5e529d0982aa04666604936df43242e97a7a6f81
| 1a4d1da9188d7c88f646b61f0d6a3b34f47c5439 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/1a4d1da9188d7c88f646b61f0d6a3b34f47c5439 | 2021-05-21 04:03:47+00:00 |
disable valgrind memleak checking by default
Add VALGRIND_CHECK_LEAKS knob to turn it back on.
| d20720d373d8563ee737d1a45dc5e0804d622dbc | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d20720d373d8563ee737d1a45dc5e0804d622dbc | 2018-07-11 09:56:36+10:00 |
spelling mistakes
from https://fossies.org/linux/misc/openssh-8.2p1.tar.gz/codespell.html
| def31bc5427579ec3f7f2ce99f2da1338fdc0c9f | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/def31bc5427579ec3f7f2ce99f2da1338fdc0c9f | 2020-03-13 14:23:07+11:00 |
upstream: memleak in error path; spotted by oss-fuzz, ok markus@
OpenBSD-Commit-ID: d6ed260cbbc297ab157ad63931802fb1ef7a4266
| d7d116b6d9e6cb79cc235e9801caa683d3db3181 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d7d116b6d9e6cb79cc235e9801caa683d3db3181 | 2019-10-14 06:00:02+00:00 |
upstream: memleak of DH public bignum; found with libfuzzer
OpenBSD-Commit-ID: 0e913b542c3764b100b1571fdb0d0e5cc086fe97
| 3b98b6e27f8a122dbfda9966b1afeb3e371cce91 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/3b98b6e27f8a122dbfda9966b1afeb3e371cce91 | 2020-12-04 02:29:25+00:00 |
upstream: fix a bug that prevented serialisation of ed25519-sk keys
OpenBSD-Commit-ID: 066682b79333159cac04fcbe03ebd9c8dcc152a9
| 4bfc0503ad94a2a7190686a89649567c20b8534f | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/4bfc0503ad94a2a7190686a89649567c20b8534f | 2019-11-18 06:58:00+00:00 |
openssl-config: add example libssl system-defaults
Provide a "simple" example for affecting the systemwide default behavior
of libssl. The large number of mandatory nested sections makes this
less simple than the main description might suggest.
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/10937)
| 3472082b4b6d73e0803a7c47f03e96ec0a69f77b | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/3472082b4b6d73e0803a7c47f03e96ec0a69f77b | 2020-01-23 17:08:34-08:00 |
Only call memcpy when the length is larger than 0.
Reviewed-by: Rich Salz <[email protected]>
GH: #2050
| a19fc66a6b5f99ad00305e152bdb41460d728640 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/a19fc66a6b5f99ad00305e152bdb41460d728640 | 2016-12-08 19:20:55+01:00 |
Fix a memory leak in X509_issuer_and_serial_hash
This is reproducible with my error injection patch.
The test vector has been validated on the 1.1.1 branch
but the issue is of course identical in all branches.
$ ERROR_INJECT=1653267699 ../util/shlib_wrap.sh ./x509-test ./corpora/x509/5f4034ae85d6587dcad4da3e812e80f3d312894d
ERROR_INJECT=1653267699
#0 0x7fd485a6ad4f in __sanitizer_print_stack_trace ../../../../src/libsanitizer/asan/asan_stack.cc:36
#1 0x55c12d268724 in my_malloc fuzz/test-corpus.c:114
#2 0x7fd484f51a75 in CRYPTO_zalloc crypto/mem.c:230
#3 0x7fd484ed778d in EVP_DigestInit_ex crypto/evp/digest.c:139
#4 0x7fd4850a9849 in X509_issuer_and_serial_hash crypto/x509/x509_cmp.c:44
#5 0x55c12d268951 in FuzzerTestOneInput fuzz/x509.c:44
#6 0x55c12d268239 in testfile fuzz/test-corpus.c:182
#7 0x55c12d267c7f in main fuzz/test-corpus.c:226
#8 0x7fd483a42082 in __libc_start_main ../csu/libc-start.c:308
#9 0x55c12d267e5d in _start (/home/ed/OPCToolboxV5/Source/Core/OpenSSL/openssl/fuzz/x509-test+0x3e5d)
=================================================================
==1058475==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 268 byte(s) in 1 object(s) allocated from:
#0 0x7fd485a5dc3e in __interceptor_realloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cc:163
#1 0x7fd484d2eb9b in BUF_MEM_grow crypto/buffer/buffer.c:97
#2 0x7fd4850b2913 in X509_NAME_oneline crypto/x509/x509_obj.c:43
#3 0x7fd4850a982f in X509_issuer_and_serial_hash crypto/x509/x509_cmp.c:41
#4 0x55c12d268951 in FuzzerTestOneInput fuzz/x509.c:44
#5 0x55c12d268239 in testfile fuzz/test-corpus.c:182
#6 0x55c12d267c7f in main fuzz/test-corpus.c:226
#7 0x7fd483a42082 in __libc_start_main ../csu/libc-start.c:308
SUMMARY: AddressSanitizer: 268 byte(s) leaked in 1 allocation(s).
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/18371)
| b7e28c0bb1cdc07e36c7dc2467083236b931de31 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/b7e28c0bb1cdc07e36c7dc2467083236b931de31 | 2022-05-21 15:41:46+02:00 |
Document that the openssl fipsinstall self test callback may not be used.
Fixes #16260
If the user autoloads a fips module from a config file, then it will run the self tests early (before the self test callback is set),
and they may not get triggered again during the fipsinstall process.
In order for this to happen there must already be a valid fips config file.
As the main purpose of the application is to generate the fips config file, this case has just been documented.
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/16475)
| 8d257d0dc6ed9d5aeb8366de6be0af01538557ea | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/8d257d0dc6ed9d5aeb8366de6be0af01538557ea | 2021-08-31 10:59:20+10:00 |
fix coverity 1485660 improper use of negative value
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/15635)
| 6c1d17c802678364a8a8d7d69ee2aba2ac76a854 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/6c1d17c802678364a8a8d7d69ee2aba2ac76a854 | 2021-06-07 09:23:41+10:00 |
Don't leak memory on error path in dane_ctx_enable()
The function dane_ctx_enable() allocated some memory that it did not
free in an error path.
Reviewed-by: Richard Levitte <[email protected]>
| b3bd3d5af8ed31f438db4367ce3a4bd43067e764 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/b3bd3d5af8ed31f438db4367ce3a4bd43067e764 | 2016-04-27 14:22:20+01:00 |
Manual fixes after copyright consolidation
Reviewed-by: Richard Levitte <[email protected]>
| b6cff313cbb1d0381b329fe4f6a8f009cdb270e4 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/b6cff313cbb1d0381b329fe4f6a8f009cdb270e4 | 2016-05-17 17:38:18-04:00 |
Add missing SIZE_MAX define for windows
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/9559)
| ac5a61caf87652733545e9c2a9219e5986b6a35a | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/ac5a61caf87652733545e9c2a9219e5986b6a35a | 2019-08-09 21:38:42+10:00 |
test/run_tests.pl: Improve indentation parsing workaround for VFO and VFP mode
Reviewed-by: Nicola Tuveri <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12175)
| 93a7d24179ee5f61a2350b547dfcd522f6a4b9b0 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/93a7d24179ee5f61a2350b547dfcd522f6a4b9b0 | 2020-06-20 17:20:20+02:00 |
updated macro spacing for styling purposes
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
CLA: trivial
| 6974fca49d9d0b110c02c83a7bbe01907472ac5e | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/6974fca49d9d0b110c02c83a7bbe01907472ac5e | 2016-12-05 17:17:11-05:00 |
Refactor linker script generation
The generation of linker scripts was badly balanced, as all sorts of
platform dependent stuff went into the top build.info, when that part
should really be made as simply and generic as possible.
Therefore, we move a lot of the "magic" to the build files templates,
since they are the place for platform dependent things. What remains
is to parametrize just enough in the build.info file to generate the
linker scripts correctly for each associated library.
"linker script" is a term usually reserved for certain Unix linkers.
However, we only use them to say what symbols should be exported, so
we use the term loosely for all platforms. The internal extension is
'.ld', and is changed by the build file templates as appropriate for
each target platform.
Note that this adds extra meaning to the value of the shared_target
attribute.
Reviewed-by: Tim Hudson <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/7333)
| ef2dfc9902e015de91f015177bdf235c9000839e | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/ef2dfc9902e015de91f015177bdf235c9000839e | 2018-09-30 14:44:59+02:00 |
app_isdir() cleanup
I think it's better to use `GetFileAttributes` to obtain the attributes
of a file than `FindFirstFile`. If the input name contains `*`, this
function should return failure rather than check whether the first match
happens to be a file or a directory.
Reviewed-by: Andy Polyakov <[email protected]>
Reviewed-by: Bernd Edlinger <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3991)
| 5bd051a0dcd4f04bc9ea197f74b34612b3fcca84 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/5bd051a0dcd4f04bc9ea197f74b34612b3fcca84 | 2017-07-22 01:57:27-04:00 |
Correctly compare EdiPartyName in GENERAL_NAME_cmp()
If a GENERAL_NAME field contained EdiPartyName data then it was
incorrectly being handled as type "other". This could lead to a
segmentation fault.
Many thanks to David Benjamin from Google for reporting this issue.
CVE-2020-1971
Reviewed-by: Tomas Mraz <[email protected]>
| b33c48b75aaf33c93aeda42d7138616b9e6a64cb | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/b33c48b75aaf33c93aeda42d7138616b9e6a64cb | 2020-11-11 16:12:58+00:00 |
Remove old config that used non-exist util script
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/5016)
| b44a65512a4a0a299f8f817b63df472e74a0007a | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/b44a65512a4a0a299f8f817b63df472e74a0007a | 2018-01-04 13:02:37-05:00 |
Add a documentation clarification suggested by Matt Caswell
Signed-off-by: Matt Caswell <[email protected]>
Reviewed-by: Tim Hudson <[email protected]>
| 9ef175148b7da12cb09f5e78f32bc6ab58d78b83 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/9ef175148b7da12cb09f5e78f32bc6ab58d78b83 | 2015-05-26 09:46:57-04:00 |
CORE: Add an algorithm_description field to OSSL_ALGORITHM
This corresponds to the |info| field in EVP_PKEY_ASN1_METHOD, as well
as the generic use of OBJ_nid2ln() as a one line description.
We also add the base functionality to make use of this field.
Fixes #14514
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/14656)
| 309a78aa305ee14878e453c78ccf9a7dc91264cf | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/309a78aa305ee14878e453c78ccf9a7dc91264cf | 2021-03-16 14:14:43+01:00 |
Don't run the symbol presence test on windows
Fixes #17109
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/17119)
| d09f4501e47e0b969caec5a3059af52d227e961a | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/d09f4501e47e0b969caec5a3059af52d227e961a | 2021-11-23 15:22:27+00:00 |
Remove unused BoringSSL specific flags
We will rely on the -allow-unimplemented feature instead.
Reviewed-by: Richard Levitte <[email protected]>
| 8beda2c12dc58389dd3c036b0858e15b010567da | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/8beda2c12dc58389dd3c036b0858e15b010567da | 2016-10-19 11:03:38+01:00 |
OSSL_HTTP_open(): Complete documentation of checks for server and proxy args
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/17186)
| 59b6b5a94f5a5f756aa323d1fb061697ca9eadf8 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/59b6b5a94f5a5f756aa323d1fb061697ca9eadf8 | 2021-12-01 08:01:31+01:00 |
This is an int
Reviewed-by: Matt Caswell <[email protected]>
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3149) | 8dcb87fdbaba2be3e75fdaf16382c827165d2af5 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/8dcb87fdbaba2be3e75fdaf16382c827165d2af5 | 2017-04-07 20:58:50-04:00 |
Added Perl installation instructions to NOTES-PERL.md for HPE NonStop.
Fixes #14931.
Signed-off-by: Randall S. Becker <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Matthias St. Pierre <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/14932)
| 2de02e7dca0a875b1ae5b6a4a4f946705eb71edc | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/2de02e7dca0a875b1ae5b6a4a4f946705eb71edc | 2021-04-19 13:32:36-04:00 |
Build system: VC-WIN64I fixups.
Reviewed-by: Richard Levitte <[email protected]>
| 6ddb62a575a31940785fdf3db8a24ca6006e5d2a | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/6ddb62a575a31940785fdf3db8a24ca6006e5d2a | 2016-03-23 20:33:29+01:00 |
Copyright consolidation 02/10
Reviewed-by: Richard Levitte <[email protected]>
| 440e5d805f449d662520313b33fd90aeee86980b | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/440e5d805f449d662520313b33fd90aeee86980b | 2016-05-17 14:20:24-04:00 |
Add documentation for the new testing framework
Reviewed-by: Rich Salz <[email protected]>
| 5ab4f893ce6d10e9286fd746acebe382c36cd32d | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/5ab4f893ce6d10e9286fd746acebe382c36cd32d | 2015-09-03 12:00:28+02:00 |
Document EVP_CIPHER_CTX IV accessors
Including the ones that were added in commit
83b06347023a573433b6aa23c8042f89df869f9e with a note that they "may go
away" and are now deprecated.
Remove the missingcrypto.txt entries for the now-deprecated functions.
[extended tests]
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12233)
| c76ffc78a513660b5f62bc32a64f44c62edede74 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/c76ffc78a513660b5f62bc32a64f44c62edede74 | 2020-06-22 11:37:31-07:00 |
Make PKCS12 structures opaque
Reviewed-by: Rich Salz <[email protected]>
| 54c38b7f0dda668be82199b4e4aa56c1f6afe3ea | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/54c38b7f0dda668be82199b4e4aa56c1f6afe3ea | 2015-09-26 12:26:51+01:00 |
Build cleanup: don't use SHARED_SOURCE with modules
SHARED_SOURCE is reserved for products that are expected to come in
dual shared / non-shared form, i.e. the routine libraries like
libcrypto and libssl, to distinguish source that should only appear in
their shared form.
Modules are always shared, so there's no need for them to have this
type of distinction.
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/8623)
| 22b414672d0260904ef2f5f5304b02f96c67dd7e | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/22b414672d0260904ef2f5f5304b02f96c67dd7e | 2019-03-31 15:14:00+02:00 |
Fix ECDH key identifier support.
PR#3789
Reviewed-by: Rich Salz <[email protected]>
| 7a317fa07cf3d9952c574e7d214d371798fee42a | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/7a317fa07cf3d9952c574e7d214d371798fee42a | 2015-04-10 02:33:44+01:00 |
coverity 1462576 Resource leak
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/11651)
| 6f0bdf41a34d21a0a7abf154c2a454fb5437251e | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/6f0bdf41a34d21a0a7abf154c2a454fb5437251e | 2020-04-27 09:25:42+10:00 |
Add an error to the stack on failure in dtls1_write_bytes()
Reviewed-by: Tim Hudson <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3496)
| 42bd7a16d020de40ad166336fe60409aa9256f9b | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/42bd7a16d020de40ad166336fe60409aa9256f9b | 2017-05-22 12:36:11+01:00 |
move ECDSA_SIG definition
Reviewed-by: Richard Levitte <[email protected]>
| 714b2abb298552698d19818d42d6cc19ffdb7cf2 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/714b2abb298552698d19818d42d6cc19ffdb7cf2 | 2015-10-27 18:18:18+00:00 |
GH721: Duplicated flags in doc
Reviewed-by: Richard Levitte <[email protected]>
| ed233db7421b98b2058da2a07f6c46b52917b918 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/ed233db7421b98b2058da2a07f6c46b52917b918 | 2016-02-22 10:58:20-05:00 |
also zero pad DHE public key in ClientKeyExchange message for interop
Reviewed-by: Ben Kaduk <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12331)
| 807b0a1dbb65fcf0d432184326e76e9f745dc3f1 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/807b0a1dbb65fcf0d432184326e76e9f745dc3f1 | 2020-06-30 22:57:36+02:00 |
Correcting typo that causes make install fail
Reviewed-by: Rich Salz <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
| 2d5a1cfab8af8a282c62a3e1562aab1ad905b3e9 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/2d5a1cfab8af8a282c62a3e1562aab1ad905b3e9 | 2016-04-01 14:20:11-04:00 |
Use local IV storage in e_sm4.c
Inline the pre-13273237a65d46186b6bea0b51aec90670d4598a versions
of EVP_CIPHER_CTX_iv(), EVP_CIPHER_CTX_original_iv(), and
EVP_CIPHER_CTX_iv_noconst() in e_sm4.c.
For the legacy implementations, there's no need to use an
in-provider storage for the IV, when the crypto operations
themselves will be performed outside of the provider.
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12233)
| 1453d736b5bb8abaa18482652828096b44c4bf3a | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/1453d736b5bb8abaa18482652828096b44c4bf3a | 2020-07-02 14:12:33-07:00 |
Remind people to have 'Fixes #XXXX' in the commit message
It's of course also possible to just add them to the PR description,
but having these lines in the commit messages provide better
automation.
Reviewed-by: Andy Polyakov <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3104) | 92e2ed5689671bbc003bfe752f660f769e86bf50 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/92e2ed5689671bbc003bfe752f660f769e86bf50 | 2017-04-02 11:38:23+02:00 |
Retry SSL_read on ERROR_WANT_READ.
This resolves the retry issue in general, but also the specific case where a TLS 1.3 server sends a post-handshake NewSessionTicket message prior to appdata.
Reviewed-by: Tim Hudson <[email protected]>
Reviewed-by: Bernd Edlinger <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/3925)
| f32bf051cf1c376216bf4fec905fafebeb6ec2dc | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/f32bf051cf1c376216bf4fec905fafebeb6ec2dc | 2017-07-13 13:07:26-04:00 |
Init the child providers immediately on creation of the child libctx
We were deferring the initial creation of the child providers until the
first fetch. This is a carry over from an earlier iteration of the child
lib ctx development and is no longer necessary. In fact we need to init
the child providers immediately otherwise not all providers quite init
correctly.
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/15270)
| 36a89c04390f2d98e740b9c53a1eead9dcb5f188 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/36a89c04390f2d98e740b9c53a1eead9dcb5f188 | 2021-05-13 15:35:42+01:00 |
Fix a couple nits in DEFINE_STACK_OF.pod
Only the 'new' variant of sk_TYPE_new_reserve() deals with
compression functions.
Mention both new 'reserve' APIs as being added in OpenSSL 1.1.1.
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/4591)
| 689c17883ac20d0991427b822eb98d2f0e6b78e7 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/689c17883ac20d0991427b822eb98d2f0e6b78e7 | 2017-10-26 08:06:50-05:00 |
Fix ossl_x509v3_cache_extensions(): EXFLAG_NO_FINGERPRINT should not be an error
This allows reverting the recent workaround on cmp_ctx_test regarding X509_new()
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Dmitry Belyavskiy <[email protected]>
Reviewed-by: David von Oheimb <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/16043)
| 2c05607cd91fc5aab6d61f0324104d63a091d705 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/2c05607cd91fc5aab6d61f0324104d63a091d705 | 2021-07-11 18:55:12+02:00 |
Fix clang complaints about uninitialised variables.
Reviewed-by: Rich Salz <[email protected]>
| 39d5193201cd0d73afebbd8c08f641b541c02b77 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/39d5193201cd0d73afebbd8c08f641b541c02b77 | 2015-12-07 20:37:08+01:00 |
Ensure pkey_set_type handles ENGINE references correctly
pkey_set_type should not consume the ENGINE references that may be
passed to it.
Fixes #16757
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/16846)
| f7d6868d0d48fedd5d9daad0c3e0cbcaef423ff3 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/f7d6868d0d48fedd5d9daad0c3e0cbcaef423ff3 | 2021-10-15 16:23:31+01:00 |
err: remove TODOs
Reviewed-by: Tim Hudson <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/15539)
| 3b90a847ece93b3886f14adc7061e70456d564e1 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/3b90a847ece93b3886f14adc7061e70456d564e1 | 2021-05-31 14:29:55+10:00 |
PKCS7_dataVerify(): fix missing use of CRLs in PKCS#7 message
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: David von Oheimb <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/18913)
| 2b44565476d9d6d86f5af0ec736a7bf6f77a839e | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/2b44565476d9d6d86f5af0ec736a7bf6f77a839e | 2022-07-30 20:53:44+02:00 |
hpke: fix tests with disabled chacha20 or poly1305
Reviewed-by: Matt Caswell <[email protected]>
Reviewed-by: Shane Lontis <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/19784)
| 36b4d7a69836fdf0ede1ea00879b26047bf93056 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/36b4d7a69836fdf0ede1ea00879b26047bf93056 | 2022-11-29 13:50:27+01:00 |
Fix memory leak in mac_newctx() on error
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/13702)
| 47b784a41b729d5df9ad47c99355db2f2026a709 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/47b784a41b729d5df9ad47c99355db2f2026a709 | 2020-12-17 22:28:17+01:00 |
GH784: Better variable name
Signed-off-by: Rich Salz <[email protected]>
Reviewed-by: Emilia Käsper <[email protected]>
| fbff671659bd51a7b124065ea6caf5b554111211 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/fbff671659bd51a7b124065ea6caf5b554111211 | 2016-03-04 10:34:47+03:00 |
Add a missing comma in OPENSSL_malloc.pod
Reviewed-by: Rich Salz <[email protected]>
| eae029244d09b185287da0e1dc60f6289c775b89 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/eae029244d09b185287da0e1dc60f6289c775b89 | 2016-05-21 20:49:58+02:00 |
Fix crash in genpkey app when -pkeyopt digest:name is used for DH or DSA.
By the time the keygen is called the references to strings inside the
gen ctx are floating pointers. A strdup solves this problem.
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/13432)
| f2a7151849a566892912737f7b633c04f64a2b9e | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/f2a7151849a566892912737f7b633c04f64a2b9e | 2020-11-18 11:32:33+10:00 |
Fix 12 Boring tests involving NULL-SHA ciphersuites
The Boring runner attempts to enable the NULL-SHA ciphersuite using the
cipherstring "DEFAULT:NULL-SHA". However in OpenSSL DEFAULT permanently
switches off NULL ciphersuites, so we fix this up to be "ALL:NULL-SHA"
instead. We can't change the runner so we have to change the shim to
detect this.
(Merged from https://github.com/openssl/openssl/pull/2933)
Reviewed-by: Rich Salz <[email protected]>
Reviewed-by: Emilia Käsper <[email protected]>
| 64e2b23ce3b75fc6c73ac8c979894e190c9e78d1 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/64e2b23ce3b75fc6c73ac8c979894e190c9e78d1 | 2017-03-14 14:16:19+00:00 |
Fix memset call in stack.c
The function sk_zero is supposed to zero the elements held within a stack.
It uses memset to do this. However it calculates the size of each element
as being sizeof(char **) instead of sizeof(char *). This probably doesn't
make much practical difference in most cases, but isn't a portable
assumption.
Reviewed-by: Richard Levitte <[email protected]>
| 7132ac830fa08d9a936e011d7c541b0c52115b33 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/7132ac830fa08d9a936e011d7c541b0c52115b33 | 2015-03-12 12:54:44+00:00 |
prov/drbg: fix misspelling of '#ifdef FIPS_MODULE'
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/12866)
| 1d30b0a4ada5707e10ee9a94ca4acd2e45004d01 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/1d30b0a4ada5707e10ee9a94ca4acd2e45004d01 | 2020-09-13 00:17:35+02:00 |
Remove unused 1bit GCM implementation
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/18835)
| 7b6e19fc4e6cc1a7000f71789ef50636dacdbb85 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/7b6e19fc4e6cc1a7000f71789ef50636dacdbb85 | 2022-07-20 09:48:21-04:00 |
Fix parameter types in sshkdf
Handling of parameter OSSL_KDF_PARAM_SSHKDF_TYPE mixed integer and string
parameters. This caused endianness problems on big-endian machines. As a
result, it is not possible to pass FIPS tests since the parameter was stored
with an integer value but read via a cast to char pointer. While this works
on little endian machines, big endian s390 read the most significant bits
instead of the least significant (as done by, e.g., x86). Change the
parameter to char array and fix the usages.
Signed-off-by: Juergen Christ <[email protected]>
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Patrick Steuer <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/13781)
| 270a5ce1d9ea579a2f1d45887971582b1ef2b6a1 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/270a5ce1d9ea579a2f1d45887971582b1ef2b6a1 | 2020-12-14 17:36:22+01:00 |
Fix BIO_eof() for BIO pairs
BIO_eof() was always returning true when using a BIO pair. It should only
be true if the peer BIO is empty and has been shutdown.
RT#1215
Reviewed-by: Richard Levitte <[email protected]>
| 3105d695358d86c0f2a404b2b74a1870b941ce5e | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/3105d695358d86c0f2a404b2b74a1870b941ce5e | 2016-05-09 15:04:11+01:00 |
Fix d2i_PublicKey() for EC keys
o2i_ECPublicKey() requires an EC_KEY structure filled with an EC_GROUP.
o2i_ECPublicKey() is called by d2i_PublicKey(). In order to fulfill the
o2i_ECPublicKey()'s requirement, d2i_PublicKey() needs to be called with
an EVP_PKEY with an EC_KEY containing an EC_GROUP.
However, the call to EVP_PKEY_set_type() frees any existing key structure
inside the EVP_PKEY, thus freeing the EC_KEY with the EC_GROUP that
o2i_ECPublicKey() needs.
This means you can't d2i_PublicKey() for an EC key...
The fix is to check to see if the type is already set appropriately, and
if so, not call EVP_PKEY_set_type().
Reviewed-by: Paul Yang <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/8168)
| 2aa2beb06cc25c1f8accdc3d87b946205becfd86 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/2aa2beb06cc25c1f8accdc3d87b946205becfd86 | 2019-02-04 16:04:11-05:00 |
Avoid races in tserver test code
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/20348)
| 99ed85bba9de5d9983d3796c18e62041d3ce6575 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/99ed85bba9de5d9983d3796c18e62041d3ce6575 | 2023-02-22 17:01:28+00:00 |
timing_load_creds: Fix typos in the timersub macro
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/19865)
(cherry picked from commit f1b104953af8e3a82f7c5ee33f0403fc067c8516)
| 1cf2557063b142db3684b780c301f8ed609f1e84 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/1cf2557063b142db3684b780c301f8ed609f1e84 | 2022-12-12 11:49:21+01:00 |
Fix enable-weak-ssl-ciphers
Commit e260bee broke the enable-weak-ssl-ciphers option. The stitched
rc4-hmac-md5 cipher implementation did not recognise the tls_version
parameter, and therefore was being incorrectly handled.
Fixes #13795
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Ben Kaduk <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/13803)
| 1dccccf33351a732dac3c700b2de05d34f708e33 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/1dccccf33351a732dac3c700b2de05d34f708e33 | 2021-01-07 17:40:09+00:00 |
nmake: fix install_html_docs target
The nmake rule contains actually two errors:
1. The $< target[1] does not work for regular rules and is
expanded to an empty string after issuing the warning
NMAKE : warning U4006: special macro undefined : '$<"'
Solution: replace $< by $?
2. The substitution regex is not quoted correctly, which leads
to the following error message by cmd.exe:
'href' is not recognized as an internal or external command,
operable program or batch file.
Solution: Quoting arguments for cmd.exe is really a nightmare,
but with the help of the excellent description [2] I was able to
properly quote the regex. Things were complicated by the fact that
a lot of levels of unquoting needed to be considered:
* perl (windows-makefile.tmpl -> makefile)
* make (reading the makefile)
* cmd.exe (executed by make)
* perl (scanning command line using CommandLineToArgvW())
The fix works, but the regex has become unmaintainable. It would actually
be better to wrap the entire command (including the regex) into a little
perl script which can be called by make directly.
[1] https://docs.microsoft.com/en-us/cpp/build/reference/filename-macros
[2] https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/
Fixes #10648
Fixes #10749
[extended tests]
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/10719)
| a9e4e3c39eb361ddfb438edb27c754947009eed6 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/a9e4e3c39eb361ddfb438edb27c754947009eed6 | 2019-12-28 23:03:29+01:00 |
Fix SipHash init order.
Setting the SipHash hash size and setting its key is done with two
independent functions... and yet, the internals depend on both.
Unfortunately, the function to change the size wasn't adapted for the
possibility that the key was set first, with a different hash size.
This changes the hash setting function to fix the internal values
(which is easy, fortunately) according to the hash size.
evpmac.txt value for digestsize:8 is also corrected.
Reviewed-by: Paul Dale <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/7613)
| 425036130dfb3cfbef5937772f7526ce60133264 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/425036130dfb3cfbef5937772f7526ce60133264 | 2018-11-11 12:23:26+01:00 |
rsaz_exp_x2.c: Remove unused ALIGN64 macro
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Hugo Landau <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/19597)
| 4b65d79d7132d6e46bfb385a76082f6502ef617b | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/4b65d79d7132d6e46bfb385a76082f6502ef617b | 2022-11-03 14:01:56+01:00 |
Add *.d.tmp files to .gitignore
These are temporary files generated by the build process that should not
be checked in.
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/11122)
| 7b5108dff4cfde059ca278147a188fb6254603d1 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/7b5108dff4cfde059ca278147a188fb6254603d1 | 2020-02-18 16:08:30+00:00 |
Configure: recognize -static as link option and disable incompatible options.
Reviewed-by: Rich Salz <[email protected]>
| 9d46752dfecf26ccd62de33811eb30a19ffb87ac | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/9d46752dfecf26ccd62de33811eb30a19ffb87ac | 2016-08-14 17:24:10+02:00 |
Add BN_check_prime()
Add a new API to test for primes that can't be misused, deprecated the
old APIs.
Suggested by Jake Massimo and Kenneth Paterson
Reviewed-by: Paul Dale <[email protected]>
GH: #9272
| 42619397eb5db1a77d077250b0841b9c9f2b8984 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/42619397eb5db1a77d077250b0841b9c9f2b8984 | 2019-10-06 17:21:16+02:00 |
Update manual to reference the IANA TLS Cipher Suites Registry
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/16179)
| 0865200fe59e7b18fbef07077897e09ab39741dc | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/0865200fe59e7b18fbef07077897e09ab39741dc | 2021-07-30 01:43:36+02:00 |
Make it possible to select or deselect test groups by number
Examples of possible expressions (adapt to your platform):
make test TESTS=-99
make test TESTS=10
make test TESTS=-9?
make test TESTS=-[89]0
make test TESTS=[89]0
Reviewed-by: Rich Salz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/2887) | e5fd8ca43beeb40d33d421b519fb7e1d20358b94 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/e5fd8ca43beeb40d33d421b519fb7e1d20358b94 | 2017-03-09 19:08:03+01:00 |
Cleansing all the temporary data for s390x
Reviewed-by: Paul Dale <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/17486)
| 79c7acc59bb98c2b8451b048ed1dd8cc517df76e | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/79c7acc59bb98c2b8451b048ed1dd8cc517df76e | 2022-01-12 16:54:45+01:00 |
Don't use select on Windows
Windows "select" only works for sockets so don't use it to wait for async.
Reviewed-by: Rich Salz <[email protected]>
| d6e03b707796747442be86c56e88c653f91ac9ed | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/d6e03b707796747442be86c56e88c653f91ac9ed | 2016-04-20 12:56:54+01:00 |
Move sequence increment to post encryption processing
This change make dtls_write_records virtuall the same as
tls_write_records_default, which will enable us to merge them in a
subsequent commit.
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
Reviewed-by: Hugo Landau <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/19424)
| 421386e392151c267ac7d3de6a2dd23c0ab62aed | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/421386e392151c267ac7d3de6a2dd23c0ab62aed | 2022-10-17 14:42:09+01:00 |
Fix the parameter types of the CRYPTO_EX_dup function type.
This fixes a strict aliasing issue in ui_dup_method_data.
The parameter type of CRYPTO_EX_dup's from_d parameter
is in fact void **, since it points to a pointer.
This function is rarely used, therefore fix the param type
although that may be considered an API breaking change.
Reviewed-by: Richard Levitte <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/2986)
| 712e8debb5b2238450b303acb5f24298382c63a5 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/712e8debb5b2238450b303acb5f24298382c63a5 | 2017-03-20 17:29:28+01:00 |
providers: remove TODOs
Reviewed-by: Tim Hudson <[email protected]>
(Merged from https://github.com/openssl/openssl/pull/15539)
| 0848b943a8c481e3fb1e08b70735392d6d6d70f4 | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/0848b943a8c481e3fb1e08b70735392d6d6d70f4 | 2021-05-31 14:27:58+10:00 |
Fix mis-named macro in packet_locl.h
A couple of the WPACKET_sub_memcpy* macros were mis-named.
Reviewed-by: Rich Salz <[email protected]>
| f308416e27cc8b6639841497bbc782363c17b11d | openssl | neuralsentry | 0 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/f308416e27cc8b6639841497bbc782363c17b11d | 2016-09-29 16:39:32+01:00 |
fix undoes errors introduced by https://github.com/openssl/openssl/commit/fc6076ca272f74eb1364c29e6974ad5da5ef9777?diff=split#diff-1014acebaa2c13d44ca196b9a433ef2eR184
Reviewed-by: Richard Levitte <[email protected]>
Reviewed-by: Matt Caswell <[email protected]>
CLA: trivial
| 8bd62abe00b893573920a7a12769fb00bd8da234 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/8bd62abe00b893573920a7a12769fb00bd8da234 | 2016-12-05 16:57:25-05:00 |
Fix some doc nits.
Reviewed-by: Matt Caswell <[email protected]>
| 9d8c2dfe14cb371d242c04a52182aa0aee25ed18 | openssl | neuralsentry | 1 | https://github.com/openssl/openssl | https://github.com/openssl/openssl/commit/9d8c2dfe14cb371d242c04a52182aa0aee25ed18 | 2016-08-17 16:38:08-04:00 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.