Commit Graph

119 Commits

Author SHA1 Message Date
383f6af344
Improve OpenSSL integration
Ensure the error stack is cleared after errors are processed.

Also handle NULL returns safely.

Makes the debug mode spew more data, though almost none of
the contexts is in reaction to network peer data.
2020-10-20 01:55:46 +02:00
559232ccb5
kike: fix up debug messages 2020-10-12 04:33:39 +02:00
2759c311fa
kike: use read/write rather than recv/send
read/write support non-sockets, otherwise they're the same here.

This is in preparation for fuzzing.
2020-10-12 04:04:06 +02:00
289193dd1a
kike: silence an annoying build warning 2020-09-20 13:43:59 +02:00
deb096a0e9
Name change 2020-09-02 19:37:29 +02:00
4179a9bd49
Update NEWS, bump version 2018-10-21 05:44:39 +02:00
f80226620c
kike: fix wildcard handling in WHOIS 2018-10-21 05:40:24 +02:00
2fccfb10f7
kike: allow STATS with no parameters
We were in plain conflict with RFC 2812 for no apparent reason.
2018-10-21 05:40:16 +02:00
b9eddabedd
kike: explicit conversion from pointer to boolean
In practice the values in the map may only be 1 or 0, so it doesn't
matter, but in C it is better to be safe than sorry.
2018-08-01 09:22:59 +02:00
50ed74a740
kike: break out properly on errors in MODE processing
We used to only abort the inner loop, which was insufficient.
2018-08-01 09:21:37 +02:00
3ca08badc2
kike: reset user modes while processing USER
Since the processing always succeeds and registration cannot be undone,
this doesn't seem to fix any real issue.
2018-08-01 09:17:45 +02:00
b0f5b8c10d
kike: do nothing on equivalent renicks 2018-08-01 09:17:12 +02:00
d87d533078
kike: code cleanups 2018-08-01 09:16:45 +02:00
3c47e5b354
kike: fix grammar in hostname validation
This has an entry in RFC 2812 errata, although it's held for document
update.  We can afford the strictness.
2018-08-01 09:16:45 +02:00
54d3406175
kike: fix grammar in config item description 2018-08-01 09:16:44 +02:00
f79dd027e9
kike: add a comment about identifier encoding 2018-08-01 09:16:44 +02:00
a0e9ede3e3
Relicense to 0BSD, update mail address
I've come to the conclusion that copyright mostly just stands in the way
of software development.  In my jurisdiction I cannot give up my own
copyright and 0BSD seems to be the closest thing to public domain.

The updated mail address, also used in my author/committer lines,
is shorter and looks nicer.  People rarely interact anyway.
2018-06-21 23:46:03 +02:00
19400ee8b7
kike: disable TLS session reuse 2018-01-09 06:25:16 +01:00
674ffb2f6d
kike: handle accept() errors better
Might prevent some denial of service attacks.
2018-01-09 05:48:36 +01:00
6c30452b28
kike: thorough review, no functional changes 2018-01-09 05:47:37 +01:00
670e1c5770
kike: introduce cstr_set() 2018-01-08 23:16:14 +01:00
dc47b16034
Bump liberty, avoid fall-through warnings 2018-01-07 17:37:19 +01:00
a2611cdc3c
Rework constructors/destructors 2017-06-22 22:56:24 +02:00
68bc297809
Bump liberty 2017-06-22 22:39:39 +02:00
933760c2a2
kike: fix two memory leaks 2017-06-22 20:36:21 +02:00
c3d62b8799
Avoid the "poller_fd::closed" feature
Reliability enhancement for Linux.

This feature was created for ponymap, however we don't care about an
extra syscall in most places.  Doing it right even saves lines.
2017-05-06 21:35:44 +02:00
9e5725662f
Bump liberty 2017-01-23 23:50:27 +01:00
eb70bf3fbc
Cleanup 2016-12-28 12:44:27 +01:00
d86a68f510
Add support for OpenSSL 1.1.0 2016-12-28 12:40:47 +01:00
8028c7fa47
Bump liberty 2016-10-11 10:52:49 +02:00
92a4d4b5a7
Better support for the KILL command 2016-09-23 22:50:30 +02:00
695d615225 ZyklonB, kike: Use pledge(2) in OpenBSD
degesch has something like "stdio wpath cpath inet tty proc exec"
but given that it's user-extensible and very annoying for users to
have it crash, I'm leaving it unrestricted for now.
2016-03-30 00:50:44 +02:00
90842c23a2 kike: fix daemonization on *BSD
Bump liberty.
2016-03-13 16:44:58 +01:00
0c19a384f1 Fix typos 2016-02-09 04:50:51 +01:00
10a264ec3d kike: add support for IRCv3.2 server-time 2016-01-31 21:43:23 +01:00
6db40c4503 Bump liberty 2016-01-17 04:43:43 +01:00
f070523085 Bump liberty 2016-01-16 06:30:08 +01:00
dac5c9df6d kike: more cleanup 2016-01-16 06:30:08 +01:00
ced2a57cfc kike: allow messages before protocol establishment
We can just queue them.
2016-01-16 06:30:08 +01:00
f36d66b0cb kike: asynchronous address resolution
As well as some refactoring and cleanup.
2016-01-16 06:30:08 +01:00
aeb047260f Bump liberty, enable TLS SNI
Involves some rewrites to fit the new APIs.

SNI has been implemented Mostly just because we can, I don't think it's
widely in use and kike doesn't support this feature of the protocol either.
2016-01-04 01:12:42 +01:00
1d14abd875 Cleanup 2015-12-31 05:07:28 +01:00
36c59ff375 Enable TCP_NODELAY 2015-11-22 02:12:52 +01:00
abd892cbd7 Bump liberty 2015-08-17 00:13:05 +02:00
637a3d2bf7 More SSL -> TLS renaming 2015-07-28 20:31:42 +02:00
6f3b48e4eb SSL -> TLS; fix error handling 2015-07-15 23:34:36 +02:00
c8496a83d8 Unfuck OpenSSL error messages
We still take just the first error message in the queue, though.
2015-07-15 23:11:12 +02:00
ad08545f8f Bump liberty 2015-07-15 22:56:53 +02:00
d6a4ca1434 Bump liberty, fix map iterators 2015-07-14 22:25:30 +02:00
e86dc2fbcd Disable SSL 2 and 3 2015-07-13 00:13:14 +02:00