| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Signing of ARC-Seal headers was recently broken; the created signatures
failed to validate. Most likely, this was caused by commit 1e661a2fc6e3,
which changed the way signatures are created in lua_rsa_sign_memory
without adding the calls to EVP_PKEY_CTX_set_rsa_padding and
EVP_PKEY_CTX_set_signature_md needed with the new interface.
After fixing this, some existing tests failed, because the test values
passed to the hash parameter did not have the correct size for a sha256
hash. I fixed these by adjusting the length of the test values.
Additionally, I extended the "RSA sign" unit test to compare the created
signature against the expected one. This is possible because RSA signing
is deterministic, and should prevent the same bug from occuring again.
Fixes: https://github.com/rspamd/rspamd/issues/5173
|
| |
|
| |
|
|\ |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
OpenSSL uses 65537 by default, no need in explicit set.
|
| | |
|
|\| |
|
| | |
|
| | |
|
|\| |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* [Fix] Provide support for OpenSSL 3.0
* [Feature] Provide function to encode header with configured public key
* [Feature] Provide function to decode header with configured public key
* [Test] Add tests for maybe encode/decode header
* [Minor] Fix tests for encode/decode header
* [Minor] Small clean up
* [Minor] Small clean up
* [Minor] Small fix for OpenSSL 3.0 support
* [Minor] Provide logging
* [Minor] Small fix
* [Fix] Fix typo error
* [Fix] Another typo
* [Minor] Little clean up
* [Minor] Little fix
* [Minor] Small fix
* [Minor] Small fix
* [Minor] Rewrite the arguments of secretbox:encrypt/decrypt functions to a more understandable format
* [Fix] Fix problem with nonce was not provided
* [Test] Add test for nonce
* [Minor] Little clean up
* [Minor] Little clean up
* [Test] Test
* [Test] Test
* [Test] Test
* [Minor] Little fix
* [Minor] Small fix
* [Minor] Small fix
* [Test] Small fix
* [Test] Test
* [Test] Test
* [Test] Test
* [Test] Test
* [Minor] Small fix for fips provider
* [Minor] Change provider apply logic
* [Test] Little fix for provider
* [Minor] Provide OpenSSL <3.0 support
* [Test] Possible provider fix
* [Test] Possible provider fix
* [Test] Little fix
* [Minor] Fix provider issue
* [Minor] Small clean up
* [Minor] Change logging errors
* Update lualib/lua_util.lua
---------
Co-authored-by: Vsevolod Stakhov <vsevolod@rspamd.com>
|
|\| |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
I'm curious why this bug has been not mentioned for such a long time...
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* [Fix] Provide OSSL 3.0 support for lua_rsa (not working)
* [Fix] Provide full OpenSSL 3.0 for lua_rsa
* [Minor] Little clean up
* [Minor] Clean up code from debug
* [Test] Replace for fixed size fstring allocation
* [Test] Add rsa padding and signature md for pctx
* [Test] Little changes
* [Fix] Little fix for rsa_sign_memory work correctly
* [Minor] Little clean up
* [Minor] Small fix
* [Minor] Little clean up
* [Test] Add signature verification test for rsa2048
|
| | |
|
| |\
| | |
| | | |
[Feature] Allow to set negative group score limit via `min_score`
|
| | | |
|
| |/ |
|
| | |
|
| | |
|
| |
| |
| |
| | |
Issue: #4996
|
|/ |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* [Fix] Fix issue with task:inject_url
* [Minor] Code clean up
* [Minor] Clean up
* [Minor] Small fix
* [Minor] Fix small typo
* [Test] Debug
* [Test] Debug
* [Test] Debug inject_url
* [Test] Debugging
* [Test] Debugging task:inject test
* [Test] Debugging task:inject test
* [Test] Debugging task:inject test
* [Minor] Debug task:inject_url test
* [Minor] Small fix
* [Minor] Debug task:inject_url test
* [Test] Test base task:inject
* [Test] Test updated task:inject
* [Test] Test updated task:inject
* [Test] Test updated task:inject
* [Test] Test updated task:inject
* [Test] Test updated task:inject
* [Test] Test fixed task:inject
* [Test] Test fixed task:inject
* [Test] Testing task:inject
* [Test] Testing task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Test] Test base task:inject
* [Test] Test base task:inject
* [Test] Test base task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Test] Fix task:inject
* [Minor] Clean up code in task:inject
* [Minor] Updated test for task:inject
* [Test] Debug test for task:inject_url
* [Test] Debug test for task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Fix task:inject_url
* [Test] Check task:inject_url
* [Test] Check task:inject_url
* [Test] Check task:inject_url
* [Test] Check task:inject_url
* [Test] Check task:inject_url
* [Test] Check task:inject_url
* [Minor] Clean up code
* [Minor] Clean up code
* [Minor] Little fix for error messages in url.create function
* [Test] Change way to inject url
* [Test] Fix inject url
* [Test] Fix inject url
* [Test] Fix inject url
* [Test] Fix inject url
* [Test] Fix inject url
* [Minor] Clean up code
* [Test] Without fake mime_part
* [Test] Without fake mime_part
* [Minor] Clean up
* [Test] Mime part of the task
* [Test] Mpart should exist
* [Test] Mpart should exist
* [Test] Mpart should exist
* [Test] Another check for mpart->urls
* [Minor] Clean up
* [Minor] Clean up
* [Fix] Fixing OpenSSL 3.0 compatibility
* [Fix] Reverted
|
|
|
|
| |
It should consider characters in unicase scripts as being not uppercase.
|
| |
|
|
|
|
|
| |
Issue: #4885
Closes: #4885
|
| |
|
|
|
|
| |
This types have constant conflicts with the system ones especially on OSX.
|
| |
|
| |
|
|
|
|
|
|
| |
Rspamd currently sends reply in JSON format. However, message pack seems to
be a better choice for a compatible client. It is faster and does not need
escaping or even UTF8 validation. This is a surface for further updates.
|
|
|
|
|
|
|
|
|
|
| |
We check userdata very frequently, so the idea here is the following:
- Store the address of classname (converted to int) in the metatable at index 1
- When we need to check some udata, we can just compare the static address with
the integer stored in metatable
- This avoid quite an expensive `lua_rawequal` call for two tables as we know that
our classes are quite static
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|