| Commit message (Collapse) | Author | Age | Files | Lines |
|\
| |
| | |
Improve maps status visibility
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| | |
* Do not skip numeric indexes that are non-integer or outside of ipairs range when logging table contents
* Simplify the code, drop redundant checks
* Allow negative stack indexes in lua_logger_out_*() functions
|
|/
|
|
|
|
|
|
| |
* Simplify lua_logger_out_str(), fix length check when doing hex output
* Add lua_logger_out() with embedded lua_logger_trace struct
* Replace high level lua_logger_out_type() calls with lua_logger_out()
* Remove unused lua_logger_trace struct references
* Include string terminator into buffer length checks, adjust affected places accordingly
|
|\
| |
| | |
[Minor] Fix and improve format string processing in lua_logger_log_format()
|
| |
| |
| |
| |
| |
| |
| | |
* Fix handling of %s after % with numeric argument
* Fix argument number check
* Preserve unhandled % in the output
* Redesign to simplify the code
|
|/
|
|
| |
Issue: #5258
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
In fact, it just checks if string1 and string2 intersect or not, and
it is definitely not the check we want there.
|
|\
| |
| | |
[Fix] Use cumulative timeout when dealing with TCP connections
|
| | |
|
|/ |
|
|
|
|
|
|
| |
Simdutf is faster and has way better support of the architectures (especially
when it comes to non-x86 stuff). Hence, it is a good idea to use it instead
of the non-supported fastutf8 stuff.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Signing of ARC-Seal headers was recently broken; the created signatures
failed to validate. Most likely, this was caused by commit 1e661a2fc6e3,
which changed the way signatures are created in lua_rsa_sign_memory
without adding the calls to EVP_PKEY_CTX_set_rsa_padding and
EVP_PKEY_CTX_set_signature_md needed with the new interface.
After fixing this, some existing tests failed, because the test values
passed to the hash parameter did not have the correct size for a sha256
hash. I fixed these by adjusting the length of the test values.
Additionally, I extended the "RSA sign" unit test to compare the created
signature against the expected one. This is possible because RSA signing
is deterministic, and should prevent the same bug from occuring again.
Fixes: https://github.com/rspamd/rspamd/issues/5173
|
| |
|
| |
|
|\ |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
OpenSSL uses 65537 by default, no need in explicit set.
|
| | |
|
|\| |
|
| | |
|
| | |
|
|\| |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* [Fix] Provide support for OpenSSL 3.0
* [Feature] Provide function to encode header with configured public key
* [Feature] Provide function to decode header with configured public key
* [Test] Add tests for maybe encode/decode header
* [Minor] Fix tests for encode/decode header
* [Minor] Small clean up
* [Minor] Small clean up
* [Minor] Small fix for OpenSSL 3.0 support
* [Minor] Provide logging
* [Minor] Small fix
* [Fix] Fix typo error
* [Fix] Another typo
* [Minor] Little clean up
* [Minor] Little fix
* [Minor] Small fix
* [Minor] Small fix
* [Minor] Rewrite the arguments of secretbox:encrypt/decrypt functions to a more understandable format
* [Fix] Fix problem with nonce was not provided
* [Test] Add test for nonce
* [Minor] Little clean up
* [Minor] Little clean up
* [Test] Test
* [Test] Test
* [Test] Test
* [Minor] Little fix
* [Minor] Small fix
* [Minor] Small fix
* [Test] Small fix
* [Test] Test
* [Test] Test
* [Test] Test
* [Test] Test
* [Minor] Small fix for fips provider
* [Minor] Change provider apply logic
* [Test] Little fix for provider
* [Minor] Provide OpenSSL <3.0 support
* [Test] Possible provider fix
* [Test] Possible provider fix
* [Test] Little fix
* [Minor] Fix provider issue
* [Minor] Small clean up
* [Minor] Change logging errors
* Update lualib/lua_util.lua
---------
Co-authored-by: Vsevolod Stakhov <vsevolod@rspamd.com>
|
|\| |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
I'm curious why this bug has been not mentioned for such a long time...
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* [Fix] Provide OSSL 3.0 support for lua_rsa (not working)
* [Fix] Provide full OpenSSL 3.0 for lua_rsa
* [Minor] Little clean up
* [Minor] Clean up code from debug
* [Test] Replace for fixed size fstring allocation
* [Test] Add rsa padding and signature md for pctx
* [Test] Little changes
* [Fix] Little fix for rsa_sign_memory work correctly
* [Minor] Little clean up
* [Minor] Small fix
* [Minor] Little clean up
* [Test] Add signature verification test for rsa2048
|
| | |
|