32c99c9d66
kike: avoid crash with a wildcard address
...
A most unfortunate 06d3b3b
regression, mostly stemming from
forgetting why the `break` was in place and not documenting it.
2020-10-31 17:34:32 +01:00
8ccf38ad76
Minor rebranding
...
There's nothing experimental about this project anymore. It's stable.
Maybe we should add a photo of Hitler or something.
2020-10-31 13:42:56 +01:00
06d3b3bd2b
kike: ensure NULL binds to both IPv4 and IPv6
2020-10-29 00:39:57 +01:00
132e4a38b8
kike: document the "operators" setting usefully
...
Now our user just needs to be able to guess that it's a hex string.
2020-10-28 23:53:03 +01:00
383f6af344
Improve OpenSSL integration
...
Ensure the error stack is cleared after errors are processed.
Also handle NULL returns safely.
Makes the debug mode spew more data, though almost none of
the contexts is in reaction to network peer data.
2020-10-20 01:55:46 +02:00
559232ccb5
kike: fix up debug messages
2020-10-12 04:33:39 +02:00
2759c311fa
kike: use read/write rather than recv/send
...
read/write support non-sockets, otherwise they're the same here.
This is in preparation for fuzzing.
2020-10-12 04:04:06 +02:00
289193dd1a
kike: silence an annoying build warning
2020-09-20 13:43:59 +02:00
deb096a0e9
Name change
2020-09-02 19:37:29 +02:00
4179a9bd49
Update NEWS, bump version
2018-10-21 05:44:39 +02:00
f80226620c
kike: fix wildcard handling in WHOIS
2018-10-21 05:40:24 +02:00
2fccfb10f7
kike: allow STATS with no parameters
...
We were in plain conflict with RFC 2812 for no apparent reason.
2018-10-21 05:40:16 +02:00
b9eddabedd
kike: explicit conversion from pointer to boolean
...
In practice the values in the map may only be 1 or 0, so it doesn't
matter, but in C it is better to be safe than sorry.
2018-08-01 09:22:59 +02:00
50ed74a740
kike: break out properly on errors in MODE processing
...
We used to only abort the inner loop, which was insufficient.
2018-08-01 09:21:37 +02:00
3ca08badc2
kike: reset user modes while processing USER
...
Since the processing always succeeds and registration cannot be undone,
this doesn't seem to fix any real issue.
2018-08-01 09:17:45 +02:00
b0f5b8c10d
kike: do nothing on equivalent renicks
2018-08-01 09:17:12 +02:00
d87d533078
kike: code cleanups
2018-08-01 09:16:45 +02:00
3c47e5b354
kike: fix grammar in hostname validation
...
This has an entry in RFC 2812 errata, although it's held for document
update. We can afford the strictness.
2018-08-01 09:16:45 +02:00
54d3406175
kike: fix grammar in config item description
2018-08-01 09:16:44 +02:00
f79dd027e9
kike: add a comment about identifier encoding
2018-08-01 09:16:44 +02:00
a0e9ede3e3
Relicense to 0BSD, update mail address
...
I've come to the conclusion that copyright mostly just stands in the way
of software development. In my jurisdiction I cannot give up my own
copyright and 0BSD seems to be the closest thing to public domain.
The updated mail address, also used in my author/committer lines,
is shorter and looks nicer. People rarely interact anyway.
2018-06-21 23:46:03 +02:00
19400ee8b7
kike: disable TLS session reuse
2018-01-09 06:25:16 +01:00
674ffb2f6d
kike: handle accept() errors better
...
Might prevent some denial of service attacks.
2018-01-09 05:48:36 +01:00
6c30452b28
kike: thorough review, no functional changes
2018-01-09 05:47:37 +01:00
670e1c5770
kike: introduce cstr_set()
2018-01-08 23:16:14 +01:00
dc47b16034
Bump liberty, avoid fall-through warnings
2018-01-07 17:37:19 +01:00
a2611cdc3c
Rework constructors/destructors
2017-06-22 22:56:24 +02:00
68bc297809
Bump liberty
2017-06-22 22:39:39 +02:00
933760c2a2
kike: fix two memory leaks
2017-06-22 20:36:21 +02:00
c3d62b8799
Avoid the "poller_fd::closed" feature
...
Reliability enhancement for Linux.
This feature was created for ponymap, however we don't care about an
extra syscall in most places. Doing it right even saves lines.
2017-05-06 21:35:44 +02:00
9e5725662f
Bump liberty
2017-01-23 23:50:27 +01:00
eb70bf3fbc
Cleanup
2016-12-28 12:44:27 +01:00
d86a68f510
Add support for OpenSSL 1.1.0
2016-12-28 12:40:47 +01:00
8028c7fa47
Bump liberty
2016-10-11 10:52:49 +02:00
92a4d4b5a7
Better support for the KILL command
2016-09-23 22:50:30 +02:00
695d615225
ZyklonB, kike: Use pledge(2) in OpenBSD
...
degesch has something like "stdio wpath cpath inet tty proc exec"
but given that it's user-extensible and very annoying for users to
have it crash, I'm leaving it unrestricted for now.
2016-03-30 00:50:44 +02:00
90842c23a2
kike: fix daemonization on *BSD
...
Bump liberty.
2016-03-13 16:44:58 +01:00
0c19a384f1
Fix typos
2016-02-09 04:50:51 +01:00
10a264ec3d
kike: add support for IRCv3.2 server-time
2016-01-31 21:43:23 +01:00
6db40c4503
Bump liberty
2016-01-17 04:43:43 +01:00
f070523085
Bump liberty
2016-01-16 06:30:08 +01:00
dac5c9df6d
kike: more cleanup
2016-01-16 06:30:08 +01:00
ced2a57cfc
kike: allow messages before protocol establishment
...
We can just queue them.
2016-01-16 06:30:08 +01:00
f36d66b0cb
kike: asynchronous address resolution
...
As well as some refactoring and cleanup.
2016-01-16 06:30:08 +01:00
aeb047260f
Bump liberty, enable TLS SNI
...
Involves some rewrites to fit the new APIs.
SNI has been implemented Mostly just because we can, I don't think it's
widely in use and kike doesn't support this feature of the protocol either.
2016-01-04 01:12:42 +01:00
1d14abd875
Cleanup
2015-12-31 05:07:28 +01:00
36c59ff375
Enable TCP_NODELAY
2015-11-22 02:12:52 +01:00
abd892cbd7
Bump liberty
2015-08-17 00:13:05 +02:00
637a3d2bf7
More SSL -> TLS renaming
2015-07-28 20:31:42 +02:00
6f3b48e4eb
SSL -> TLS; fix error handling
2015-07-15 23:34:36 +02:00