$ git clone -n https://gitee.com/ocs-commit/openssl.git /home/lib/mock/dist-ocs23-base-build-325340-34848/root/chroot_tmpdir/scmroot/openssl 正克隆到 '/home/lib/mock/dist-ocs23-base-build-325340-34848/root/chroot_tmpdir/scmroot/openssl'... $ git fetch origin master:KOJI_FETCH_HEAD 来自 https://gitee.com/ocs-commit/openssl * [新分支] master -> KOJI_FETCH_HEAD $ git reset --hard KOJI_FETCH_HEAD HEAD 现在位于 ff2558d - [Type] bugfix - [DESC] Apply patches from rpm-tracker - [Bug Fix] 92669566a1906f22443b256d56f8691e89060acb.patch: Fix libctx passing for CMS PWRI use - [Bug Fix] 6b95c2cb9e960e24e2ba8ac181d16318ca0e0e70.patch: add_uris_recursive(): Avoid OSSL_STORE_INFO leak on error - [Bug Fix] 0edc5b05ece339d0ce403e6e85f5ee826cdf2185.patch: Fix potential leak in error path in cert_response() - [Bug Fix] 2a65dcec25c30e1a6af5af4e994722187504966f.patch: fix: add OOM handler for x509 fuzz test - [Bug Fix] 7060afbf6c1888c280e572ad59ea11f008d15417.patch: fix: add check for NULL zalloc in tls-provider.c (reverse if statement) - [Bug Fix] b1d6cc76ff2806f52cb5176892d7b424c0fad026.patch: Fix passing struct by value rather than by reference to syscall - [Bug Fix] 4e6bf40bee715a70f2b859e4dd0ca0c2ff6453ee.patch: eddsa_signverify_init(): Avoid memory leak on error - [Bug Fix] b5cc61564a21edb838340f9026e122029e8724b1.patch: mac_legacy_kmgmt.c: Avoid possible memory leak on error - [Bug Fix] f2c2cdc722f2148d78483fb78ae3c710b29d1134.patch: kdf_scrypt_reset(): NULLify freed pointers - [Bug Fix] 01c31ac770d020281f7251405551993f03e6302f.patch: scrypt: Do not free the context itself when fetch fails - [Bug Fix] 6369c76b9abf48c8ae26899cf210de6bb3c3c45a.patch: s_socket: naccept: close listening socket after accepting clients - [Bug Fix] 4697789ecce201875dd13cbe41248fb2900bacf5.patch: Fix data race in asn1_str2tag() on tntmp which was accidentally made static - [Bug Fix] 643de602771f6b38ad7823e26d5a63c669eb185b.patch: If you call X509_add_cert with cert == NULL and the X509_ADD_FLAG_UP_REF - [Bug Fix] e20c983bed0eb395b7588f333cf08ad41b6d5c2f.patch: Workaround for RSA on AArch64 Big Endian - [Bug Fix] d1a3c862291d48f9c62b315b83cd6962ebae9094.patch: Fix test failure in 30-test_evp_pkey_provided.t - [Bug Fix] 1b8e37576c78754d25fb02e16c3694f861c607cc.patch: Fix intermittent test failure in 80-test_cmp_http.t - [Bug Fix] 187be88cd362d7e23414d5fb273aa4b29f2d470d.patch: Take into account no_store when pushing algorithm - [Bug Fix] a91ef0fb6416ea2efafa1cf2c75472269c5cb52f.patch: Fix memory leaks from missing checks of return value from sk_OPENSSL_STRING_push() - [Bug Fix] d2a904b228c768a9a0602f367109dbf21781e91a.patch: Fix the use of OPENSSL_HTTP_PROXY / OPENSSL_HTTPS_PROXY - [Bug Fix] aa10f67e24da72b7400247dfaeb614b447056411.patch: Fix test failure in 90-test_memleak.t - [Bug Fix] 4bd1070a332ec201133c051b95cc52cbf2fc9395.patch: Fix originator cert leak in cms app - [Bug Fix] be7893a4219575db59c1e5102582853912215541.patch: Reject invalid FFDHE and ECDHE key shares with SSL_AD_ILLEGAL_PARAMETER alert - [Bug Fix] add0facc81261f2de97a6a4b487a7d0d6a1737bf.patch: Fix potential memory leak in BIO_get_accept_socket()