1
I Use This!
Very High Activity

Commits : Listings

Analyzed about 24 hours ago. based on code collected 1 day ago.
Aug 28, 2024 — Aug 28, 2025
Commit Message Contributor Files Modified Lines Added Lines Removed Code Location Date
core: rewritten _Safe(ExpectedKind) overload More... about 2 months ago
core: avoid unexpected GPF and memory leak on invalid input - i.e. avoid EDocVariant in TDocVariantData.InternalAddBuf() More... about 2 months ago
core: new TDocVariantData.AddValue overload from JSON input More... about 2 months ago
core: new TDocVariantData.IsKind method More... about 2 months ago
core: use ARM v8 asm as soon as possible More... about 2 months ago
core: minor code or comments refactoring - with no functional change More... about 2 months ago
core: rewritten FillSystemRandom() on POSIX - don't retry to open inaccessible /dev/urandom or /dev/random on chroot systems - sysutils.CreateGUID() are likely to be also unstable in this context - see https://groups.google.com/g/golang-codereviews/c/XFjxbaDcL6E More... about 2 months ago
core: rewritten XorEntropy() on POSIX - no /dev/random call for XorEntropy() to avoid endless recursive call and GPF at startup if access to the procsys files failed (e.g. on some chroot systems) More... about 2 months ago
crypt: refactored TSha256.Update with no actual functional change More... about 2 months ago
core: fixed fpOpen/fpClose when EINTR is triggered More... about 2 months ago
core: rewritten XorEntropy() to enhance its output More... about 2 months ago
core: some documentation and comments precisions and fixes More... about 2 months ago
crypt: fixed Delphi compilation warning More... about 2 months ago
crypt: rewritten TAesPrng.FillRandom methods - to reuse the same AES-CTR generator code for safety and consistency and simplicity - would ease any external audit of the implementation More... about 2 months ago
crypt: rewritten TAesPrng.Seed - to use PBKDF2-SHA-256 key derivation from the gathered entropy - fix IV.H (i.e. the CTR part) as 0 to avoid any overflow replay - set random from entropy into IV.L to enhance unpredictability More... about 2 months ago
crypt: some documentation precisions More... about 2 months ago
core: fixed GPF regression on FPC Win64 - some weird struct alignement issue on FPC only (Delphi seem not affected) More... about 2 months ago
rest: fixed TRest.InternalLogResponse() More... about 2 months ago
soa: let sllServiceCall use TRest.LogResponseMaxBytes More... about 2 months ago
rest: new TRest.InternalLogResponse overload More... about 2 months ago
core: new TSynLog.LogText overload - also include those LogText methods to ISynLog More... about 2 months ago
core: refactored TSynLog internal PUtf8Char process More... about 2 months ago
core: fixed TSynLog.LogEscape output - it was written random memory bytes to the log file :( More... about 2 months ago
net: rewritten THttpServerSocketGeneric.Authorization - enhanced logged output - better response generation on Negotiate/Kerberos More... about 2 months ago
all: fixed logged content after exception More... about 2 months ago
lib: new TServerSspiKeyTab.ComputeServerHeader method - able to implement Kerberos authentication on server side via GSSAPI - with an optional keytab file support, and automated file hot reload More... about 2 months ago
core: fixed library late binding on Windows - use our safer LibraryResolve() function instead of GetProcAddress (misleading on some Delphi revisions) - delay low-level ntdll resolution only when really needed - may reduce antivirus heuristics false positives More... about 2 months ago
core: moved low-level Windows Security API to mormot.core.os.security More... about 2 months ago
core: moved more low-level WinAPI to mormot.core.os.security - for consistency, and to reduce mormot.core.os pressure More... about 2 months ago
tests: refined some comments More... about 2 months ago