| Commit message (Collapse) | Author | Age | Files | Lines |
|\
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* PHP-5.4:
Fix bug #70019 - limit extracted files to given directory
Do not do convert_to_* on unserialize, it messes up references
Fix #69793 - limit what we accept when unserializing exception
Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList)
Fixed bug #70166 - Use After Free Vulnerability in unserialize() with SPLArrayObject
ignore signatures for packages too
Fix bug #70168 - Use After Free Vulnerability in unserialize() with SplObjectStorage
Fixed bug #69892
Fix bug #70014 - use RAND_bytes instead of deprecated RAND_pseudo_bytes
Improved fix for Bug #69441
Fix bug #70068 (Dangling pointer in the unserialization of ArrayObject items)
Fix bug #70121 (unserialize() could lead to unexpected methods execution / NULL pointer deref)
Fix bug #70081: check types for SOAP variables
Conflicts:
.gitignore
ext/date/php_date.c
ext/spl/spl_array.c
ext/spl/spl_observer.c
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
|\ \
| |/
| |
| |
| |
| | |
* PHP-5.4:
Update NEWS
Fixed bug #55618 (use case-insensitive cert name matching)
|
| | |
|
| | |
|
|\ \
| |/
| |
| |
| | |
* PHP-5.4:
Fix missing type checks in various functions
|
| | |
|
|\ \
| |/
| |
| |
| | |
* PHP-5.4:
Added support for parsing ssl certificates using GeneralizedTime format.
|
| |
| |
| |
| |
| | |
fix bug #65698
fix bug #66636
|
|\ \
| |/
| |
| |
| |
| |
| |
| |
| | |
* PHP-5.4:
Fix #66942: openssl_seal() memory leak
ws fix
Conflicts:
ext/openssl/openssl.c
|
| |
| |
| |
| | |
Fix #66952: memory leak in openssl_open()
|
|\ \
| |/
| |
| |
| |
| | |
* PHP-5.4:
NEWS
Fixed Bug #66833 Default digest algo is still MD5
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Switch to SHA1, which match internal openssl hardcoded algo.
In most case, won't even be noticed
- priority on user input (default_md)
- fallback on system config
- fallback on this default value
Recent system reject MD5 digest, noticed in bug36732.phpt failure.
While SHA1 is better than MD5, SHA256 is recommenced,
and defined as default algo in provided configuration on
recent system (Fedora 21, RHEL-7, ...). But the idea is to
keep in sync with openssl internal value for PHP internal value.
|
|\ \
| |/
| |
| |
| | |
* PHP-5.4:
Typo fix: sicret -> secret
|
| | |
|
|\ \
| |/
| |
| |
| |
| |
| |
| | |
* PHP-5.4:
Skip failing tests when EC unavailable (RHEL)
Conflicts:
ext/openssl/openssl.c
|
| | |
|
|\ \
| |/
| |
| |
| | |
* PHP-5.4:
Fixed broken build when EC unavailable
|
| | |
|
|\ \
| |/
| |
| |
| | |
* PHP-5.4:
Fix for bug66501 - "key type not supported in this PHP build"
|
| | |
|
| | |
|
| | |
|
|\ \
| |/
| |
| |
| |
| | |
* PHP-5.4:
5.3.29-dev
Fix CVE-2013-6420 - memory corruption in openssl_x509_parse
|
| |\
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
* PHP-5.3:
5.3.29-dev
Fix CVE-2013-6420 - memory corruption in openssl_x509_parse
Conflicts:
configure.in
main/php_version.h
|
| | | |
|
|\ \ \
| |/ /
| | |
| | |
| | | |
* PHP-5.4:
C89 compatibility
|
| | | |
|
|\ \ \
| |/ /
| | |
| | |
| | |
| | |
| | |
| | | |
* PHP-5.4:
Fixed segfault when built with OpenSSL >= 1.0.1
fixing a minor typo in CODING_STANDARDS document
FIX BUG #65219 - Typo correction
FIX BUG #65219 - USE DB not being sent for FreeTDS version < 0.92 FreeTDS <0.92 does not support DBSETLDBNAME option and therefore will not work with SQL Azure. Fallback to dbuse command in letter versions.
|
| | |
| | |
| | |
| | | |
(PR #481)
|
| | |
| | |
| | |
| | | |
warning: unused variable ‘j’ [-Wunused-variable]
|
| | |
| | |
| | |
| | |
| | |
| | | |
variable ‘obj_cnt’ set but not used [-Wunused-but-set-variable]
unused variable ‘last’ [-Wunused-variable]
unused variable ‘j’ [-Wunused-variable]
|
|\ \ \
| |/ /
| | |
| | |
| | | |
* PHP-5.4:
fix using wrong buffer pointer
|
| |\ \
| | |/
| | |
| | |
| | | |
* PHP-5.3:
fix using wrong buffer pointer
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
the default size for the case of a variable key length cipher.
The result is a key of 448 bits being passed to the blowfish algorithm would be truncated to 128 bit.
Also fixed an error in the zend_parse_parameters() having an invalid character being used.
|
| | |
| | |
| | |
| | | |
and not TS)
|
| | |
| | |
| | |
| | |
| | | |
that way in our code as well.
|
| | | |
|