summaryrefslogtreecommitdiff
path: root/deps/hiredis
Commit message (Collapse)AuthorAgeFilesLines
* Correct 'certificate' typo. (#10867)Chris Lamb2022-06-152-2/+2
|
* Reapply: Rename sds calls so they don't conflict.michael-grunder2022-02-1411-627/+721
| | | | | | Reapply this commit on top of hiredis as a local change. Previosuly it was pulled from a private hiredis branch, which resulted with it going away on subtree pull.
* Merge commit '418de21d8feb35303904ec718fcd1387e4699d2f' into refresh-hiredisYossi Gottlieb2022-02-1432-1039/+2181
|
* hiredis: improve calloc() overflow fix. (#9630)Yossi Gottlieb2021-10-123-1/+9
| | | | Cherry pick a more complete fix to 0215324a6 that also doesn't leak memory from latest hiredis.
* Fix redis-cli / redis-sential overflow on some platforms (CVE-2021-32762) ↵Oran Agra2021-10-042-0/+15
| | | | | | | | | | | | | | | | (#9587) The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most modern systems do and are therefore not likely to be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator which is also not vulnerable. Co-authored-by: Yossi Gottlieb <yossigo@gmail.com>
* Allow to override OPENSSL_PREFIX (#9567)Yunier Pérez2021-09-301-1/+6
| | | | While the original issue was on Linux, this should work for other platforms as well.
* Fix some redundancy use of semicolon in do-while macros (#8221)sundb2020-12-211-1/+1
| | | * Fix some redundancy use of semicolon in do-while macros
* Fix redis-cli crash on nil invalidate messages. (#8183)Yossi Gottlieb2020-12-132-8/+33
| | | | | This is a backport of redis/hiredis@b9b9f44. Co-authored-by: michael-grunder <michael.grunder@gmail.com>
* Merge commit 'bffbbeaa9a1a6b8e81384297272cb0631502e8fd' into ↵michael-grunder2020-08-1511-627/+721
| | | | hiredis-unique-sds-symbols
* Merge commit '7ee5a41aac7e5abc90d050fa509fa953ca7f1da1' as 'deps/hiredis'michael-grunder2020-08-0658-0/+12772
|
* Remove hiredis so we can add it as a subtreemichael-grunder2020-08-0653-10872/+0
|
* hiredis udpated (RESP3 WIP).antirez2019-09-231-4/+5
|
* hiredis updated to master version.antirez2019-09-2033-323/+2175
|
* Add <strings.h> include to deps/hiredis/read.c to fix Implicit Declaration ↵Angus Pearson2019-05-081-0/+1
| | | | of strcasecmp warning
* RESP3: hiredis: implement bool type.antirez2019-01-093-1/+35
|
* RESP3: hiredis: save the original double string.antirez2019-01-094-5/+20
|
* RESP3: hiredis: implement null type.antirez2019-01-091-0/+9
|
* RESP3: hiredis: fix double implementation.antirez2019-01-091-4/+4
|
* RESP3: hiredis: initial double implementation.antirez2019-01-095-1/+64
|
* RESP3: hiredis: fix hiredis.c assert for new types.antirez2019-01-091-2/+6
|
* RESP3: hiredis: free map and set replies.antirez2019-01-091-1/+3
|
* RESP3: hiredis: fix read.c assert for new types.antirez2019-01-092-2/+6
|
* RESP3: hiredis updated with recent version + some RESP3 support.antirez2019-01-0916-228/+501
|
* Backport hiredis issue 525 fix to compile on FreeBSD.antirez2018-05-251-1/+1
| | | | Close #4947.
* deps/hiredis updated to latest version.antirez2016-12-2134-817/+2393
| | | | Close #3687.
* Lua debugger: use sds_malloc() to allocate eval cli array.antirez2015-11-172-0/+17
| | | | | | | | | | | | | Redis-cli handles the debugger "eval" command in a special way since sdssplitargs() would not be ok: we need to send the Redis debugger the whole Lua script without any parsing. However in order to later free the argument vector inside redis-cli using just sdsfreesplitres(), we need to allocate the array of SDS pointers using the same allocator SDS is using, that may differ to what Redis is using. So now a newer version of SDS exports sds_malloc() and other allocator functions to give access, to the program it is linked to, the allocator used internally by SDS.
* deps/hiredis SDS updated to version 2.0.0.antirez2015-07-253-145/+513
|
* Fix Sentinel memory leak (hiredis bug)antirez2015-04-281-0/+1
| | | | | | | | | | | | | | | | | | | This fixes issue #2535, that was actually an hiredis library bug (I submitted an issue and fix to the redis/hiredis repo as well). When an asynchronous hiredis connection subscribes to a Pub/Sub channel and gets an error, and in other related conditions, the function redisProcessCallbacks() enters a code path where the link is disconnected, however the function returns before freeing the allocated reply object. This causes a memory leak. The memory leak was trivial to trigger in Redis Sentinel, which uses hiredis, every time we tried to subscribe to an instance that required a password, in case the Sentinel was configured either with the wrong password or without password at all. In this case, the -AUTH error caused the leaking code path to be executed. It was verified with Valgrind that after this change the leak no longer happens in Sentinel with a misconfigured authentication password.
* Fix typosAaron Rutkovsky2014-09-291-1/+1
| | | | Closes #1513
* Fix hiredis getaddrinfo leakMatt Stancliff2014-09-181-0/+1
| | | | | | | | Fixed in Redis by 1a5e5b6, but since that part of code is largely copy/paste from Redis, the fix needs to be ported over too. Closes #2012
* Missing va_end also added in hiredis copy of sds.c.antirez2014-08-261-0/+1
|
* Missing assert removal from sdsIncrLen()Mariano Pérez Rodríguez2014-08-251-1/+0
| | | Companion for 8eeb1802ec42682a614a5ebca318a0ba44ca7c03, but dealing with hiredis.
* Use unsigned integers in SDS header.antirez2014-08-132-5/+8
| | | | This raises the max string to 4GB without any downside.
* Add support for compiling on AIXsiahl2014-08-072-1/+5
| | | | Closes #1900
* Silence different signs comparison warning in sds.c.antirez2014-06-231-1/+1
|
* Use Redis updated sds.c for deps/hiredis.antirez2014-06-232-76/+269
|
* Dummy zmalloc.h restored into deps/hiredis.antirez2014-06-231-0/+13
|
* hiredis: Update to latest versionMatt Stancliff2014-06-2322-196/+730
| | | | | | | | This is hiredis f225c276be7fd0646019b51023e3f41566633dfe This update includes all changes that diverged inside of Redis since the last update. This version also allows optional source address binding for connections which we need for some Sentinel deployments.
* Fix sdsempty() prototype in sds.h.antirez2013-08-121-1/+1
|
* Use latest sds.c in the hiredis library under deps.antirez2013-07-254-120/+422
|
* hiredis: minimal IPv6 support.antirez2013-07-111-2/+10
|
* Added missing license and copyright in deps/hiredis.antirez2012-12-173-0/+90
|
* Define _XOPEN_SOURCE appropriately on NetBSD.Patrick TJ McPhee2012-12-121-1/+1
|
* hiredis library updated.antirez2012-08-215-28/+90
| | | | | | | | This version of hiredis merges modifications of the Redis fork with latest changes in the hiredis repository. The same version was pushed on the hiredis repository and will probably merged into the master branch in short time.
* Fix 32bit build of hiredisantirez2012-02-191-2/+2
|
* Applied a few modifications to hiredis to tune it for speed ↵antirez2012-02-192-4/+6
| | | | (redis-benchmark) and ability to read more deeply nested replies (redis-cli).
* The hiredis lib shipped with Redis was updated to latest version.antirez2012-02-1921-734/+1261
|
* hiredis/redis changes for speed with big payloads: read buffer size setantirez2011-11-081-2/+3
| | | | | | to 16k, request buffer size is no longer destroyed when emtpy and large (better fix needed). Redis clients static output buffer set to 16k as well.
* hiredis max multi bulk nesting level raised to 7antirez2011-06-301-3/+3
|
* Update hiredisPieter Noordhuis2011-05-0515-179/+1187
|