1. 10 7月, 2012 6 次提交
  2. 09 7月, 2012 4 次提交
  3. 08 7月, 2012 4 次提交
  4. 23 6月, 2012 1 次提交
    • Michael Rash's avatar
      Bug fix to not force asymmetric gpg decryption · adbc6a8f
      Michael Rash 创作于
      fwknopd access stanzas can have both Rijndael and GnuPG keys, so this
      commit fixes a bug where any gpg info would force only gpg decryption
      attempts even if a Rijndael key is provided in the stanza.
      adbc6a8f
  5. 17 6月, 2012 2 次提交
    • Michael Rash's avatar
      added test for invalid SOURCE access lines · c6a2680b
      Michael Rash 创作于
      c6a2680b
    • Michael Rash's avatar
      Bug fix to throw out invalid access.conf SOURCE entries · 5f8e3f4a
      Michael Rash 创作于
      This commit causes fwknopd to exit whenever an invalid SOURCE entry is seen
      such as ":ANY".  Previous to this commit, valgrind threw the following errors
      with ":ANY" as an access.conf SOURCE entry:
      
      Invalid read of size 8
         at 0x117695: free_acc_source_list (access.c:512)
         by 0x1177E3: free_acc_stanza_data (access.c:564)
         by 0x117C67: free_acc_stanzas (access.c:654)
         by 0x10E32E: free_configs (config_init.c:106)
         by 0x10D085: main (fwknopd.c:376)
       Address 0x5a80658 is 8 bytes inside a block of size 16 free'd
         at 0x4C2A82E: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
         by 0x116AE0: add_source_mask (access.c:255)
         by 0x116D57: expand_acc_source (access.c:303)
         by 0x117A82: expand_acc_ent_lists (access.c:620)
         by 0x119570: parse_access_file (access.c:1043)
         by 0x10C77E: main (fwknopd.c:193)
      
      Invalid free() / delete / delete[] / realloc()
         at 0x4C2A82E: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
         by 0x1176A8: free_acc_source_list (access.c:514)
         by 0x1177E3: free_acc_stanza_data (access.c:564)
         by 0x117C67: free_acc_stanzas (access.c:654)
         by 0x10E32E: free_configs (config_init.c:106)
         by 0x10D085: main (fwknopd.c:376)
       Address 0x5a80650 is 0 bytes inside a block of size 16 free'd
         at 0x4C2A82E: free (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
         by 0x116AE0: add_source_mask (access.c:255)
         by 0x116D57: expand_acc_source (access.c:303)
         by 0x117A82: expand_acc_ent_lists (access.c:620)
         by 0x119570: parse_access_file (access.c:1043)
         by 0x10C77E: main (fwknopd.c:193)
      
      HEAP SUMMARY:
          in use at exit: 8 bytes in 1 blocks
        total heap usage: 1,659 allocs, 1,659 frees, 238,310 bytes allocated
      5f8e3f4a
  6. 15 6月, 2012 1 次提交
    • Michael Rash's avatar
      Test suite support for function coverage testing via gcov · 10d380d1
      Michael Rash 创作于
      Added --enable-profile-coverage to the configure script to have the fwknop
      binaries compiled with gcc profiling support in order to see which functions
      get executed by the test suite via gcov.  The last test executed by the test
      suite under --enable-profile-coverage contains all fwknop functions that
      were not executed under the test run (function execution totals are
      cumlative).
      10d380d1
  7. 28 5月, 2012 4 次提交
  8. 13 2月, 2012 3 次提交
  9. 10 2月, 2012 4 次提交
  10. 09 2月, 2012 2 次提交
  11. 08 2月, 2012 3 次提交
  12. 06 2月, 2012 2 次提交
  13. 30 1月, 2012 1 次提交
  14. 29 1月, 2012 1 次提交
  15. 25 1月, 2012 1 次提交
    • Michael Rash's avatar
      Update to make AES encryption modes selectable · 4c3d2188
      Michael Rash 创作于
      This is a significant update to allow AES encryption modes to be selected on a
      per-key basis.  For now, only ECB and CBC (recommended) modes are supported.
      The default is ECB modes in order to maintain backwards compatibility with the
      older perl version of fwknop and the Crypt::CBC CPAN module.  This will likely
      be changed to use CBC mode by default because of its better security
      properties.
      
      In the access.conf file on the server side, there is a new configuration
      variable "ENCRYPTION_MODE" that controls the mode for the corresponding AES
      key.  On the client side, a new command line argument "--encryption-mode"
      controls how the client encrypts SPA packets.
      4c3d2188
  16. 15 1月, 2012 1 次提交