{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":48270072,"defaultBranch":"master","name":"sslsplit","ownerLogin":"jakuta-tech","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2015-12-19T05:42:13.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/4783832?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1613717606.137999","currentOid":""},"activityList":{"items":[{"before":"b2128fc9a7cbd715cbf15595ebd564a74100b602","after":"4b6c15d319d2cd8ab4eece36d3bcab08475deca9","ref":"refs/heads/develop","pushedAt":"2024-07-03T04:18:23.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"pull[bot]","name":null,"path":"/apps/pull","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/12910?s=80&v=4"},"commit":{"message":" fix clang-static-analysis warnings (#336)\n\ncachedsess.c:214:2: warning: Null pointer passed to 2nd parameter expecting 'nonnull' [core.NonNullParamChecker]\r\n memcpy(db->buf + tmp.sz + sizeof(port), sni, snilen);\r\n ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\r\n\r\n log.c:1716:46: warning: argument 3 of type ‘int[5]’ with mismatched bound [-Warray-parameter=]\r\n 1716 | log_init(opts_t *opts, proxy_ctx_t *ctx, int clisock[5])\r\n | ~~~~^~~~~~~~~~\r\n In file included from log.c:29:\r\n log.h:97:39: note: previously declared as ‘int[3]’\r\n 97 | int log_init(opts_t *, proxy_ctx_t *, int[3]) NONNULL(1,2) WUNRES;\r\n | ^~~~~~~\r\n\r\n ssl.c:1683:10: warning: Potential leak of memory pointed to by 'cn' [unix.Malloc]\r\n return NULL;\r\n ^~~~","shortMessageHtmlLink":" fix clang-static-analysis warnings (droe#336)"}},{"before":"69e67fbadbc1708a5919324a6685bd4ae2997180","after":"b2128fc9a7cbd715cbf15595ebd564a74100b602","ref":"refs/heads/develop","pushedAt":"2023-06-29T17:11:28.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"pull[bot]","name":null,"path":"/apps/pull","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/12910?s=80&v=4"},"commit":{"message":"fix privsep_server_opensock_verify retrun value errors (#328)","shortMessageHtmlLink":"fix privsep_server_opensock_verify retrun value errors (droe#328)"}},{"before":"4a94ecd1c7d3429740e691c34fa2f1d4ec1bedfa","after":"69e67fbadbc1708a5919324a6685bd4ae2997180","ref":"refs/heads/develop","pushedAt":"2023-05-19T06:09:34.046Z","pushType":"push","commitsCount":1,"pusher":{"login":"pull[bot]","name":null,"path":"/apps/pull","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/12910?s=80&v=4"},"commit":{"message":"Fix possible integer overflow (#327)\n\nThe value of an arithmetic expression p[1] + (p[0] << 8) is subject\r\n to overflow due to a failure to cast operands to a larger data type\r\n before perfoming arithmetic","shortMessageHtmlLink":"Fix possible integer overflow (droe#327)"}},{"before":"111cfc2ea2f558290581caa8e169284c8e737279","after":"4a94ecd1c7d3429740e691c34fa2f1d4ec1bedfa","ref":"refs/heads/develop","pushedAt":"2023-05-16T15:18:19.031Z","pushType":"push","commitsCount":21,"pusher":{"login":"pull[bot]","name":null,"path":"/apps/pull","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/12910?s=80&v=4"},"commit":{"message":"Fix possible NULL deref in opts_set_option (#326)","shortMessageHtmlLink":"Fix possible NULL deref in opts_set_option (droe#326)"}},{"before":"e17de8454a65d2b9ba432856971405dfcf1e7522","after":"111cfc2ea2f558290581caa8e169284c8e737279","ref":"refs/heads/develop","pushedAt":"2023-05-13T23:52:11.189Z","pushType":"push","commitsCount":3,"pusher":{"login":"pull[bot]","name":null,"path":"/apps/pull","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/12910?s=80&v=4"},"commit":{"message":"Fix header-size calculation in IPv6 packet mirroring (#314)\n\nThanks to @matoro\r\n\r\nI found this issue because my packet inspection system was able to\r\ncorrectly process decrypted IPv4 packets mirrored to a dummy interface,\r\nbut was unable to process decrypted IPv6 ones. When running tcpdump on\r\nthe interface, it marked the packets as \"truncated-ip6\".\r\n\r\nWireshark complained about \"IPv6 payload length exceeds framing length\".\r\nComparing different packets of different sizes, I measured that each\r\npacket had a Payload Length field 40 bytes larger than it should be, the\r\nsize of the IPv6 header.\r\n\r\nI found the explanation here:\r\nhttps://www.opus1.com/ipv6/whatdoesapacketlooklike.html\r\n\r\n> Payload Length - This 16-bit field is similar to the IPv4 Total Length\r\nField, except that with IPv6 the Payload Length field is the length of\r\nthe data carried after the header, whereas with IPv4 the Total Length\r\nField included the header.\r\n\r\nTherefore for IPv6, the packet length we should pass to libnet is the\r\nsize of the TCP header plus the size of the payload, but NOT including\r\nthe size of the IPv6 header. This patch fixed the problem for me and\r\nnow my packet inspection system properly reads the packets, and\r\nWireshark no longer complains about malformed packets :)","shortMessageHtmlLink":"Fix header-size calculation in IPv6 packet mirroring (droe#314)"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEdXRLiAA","startCursor":null,"endCursor":null}},"title":"Activity · jakuta-tech/sslsplit"}