[Openvpn-devel] [PATCH v2 3/3] ssl: remove unneeded if block

2021-04-05 Thread Antonio Quartulli
From: Antonio Quartulli There is no need to check the result of a boolean function and then assign a constant value to a variable based on that check. Directly assign the return value of the function to the variable. Signed-off-by: Antonio Quartulli --- src/openvpn/ssl.c | 7 ++- 1 file c

Re: [Openvpn-devel] [PATCH 3/3] ssl: remove unneeded if block

2021-04-05 Thread Antonio Quartulli
Hi, On 05/04/2021 12:38, Gert Doering wrote: > Hi, > > On Mon, Apr 05, 2021 at 10:00:07AM +0200, Antonio Quartulli wrote: >> /* compute PRF */ >> -if (!ssl_tls1_PRF(BPTR(&seed), BLEN(&seed), secret, secret_len, output, >> output_len)) >> -{ >> -ret = false; >> -} >> +

[Openvpn-devel] [PATCH applied] Re: Remove conditionals compilation for P2MP, ENABLE_SHAPER and TIME_BACKTRACK_PROTECTION

2021-04-05 Thread Gert Doering
Acked-by: Gert Doering (As the original mail already claimed :-) ) I have stared-at-diff and grepped for P2MP, SHAPER and BACKTRACK remains (no complaints). Client-side tested, server-side tested in all combinations I have (p2mp, p2p), no surprises. I did not test --shaper, but I am reasonabl

[Openvpn-devel] [PATCH applied] Re: openssl: avoid NULL pointer dereference

2021-04-05 Thread Gert Doering
Acked-by: Gert Doering According to OpenSSL documentation, this can indeed return NULL, so catch it... (Note: as for 1/3, this code is only in master, so no need to backport to release/2.5) Your patch has been applied to the master branch. commit f3c7698957483e0ea0f14e712502d34c826c53ca Author

[Openvpn-devel] [PATCH applied] Re: openssl: fix EVP_PKEY_CTX memory leak

2021-04-05 Thread Gert Doering
Acked-by: Gert Doering Looks reasonable, matches coding style & OpenSSL documentation, and passes my client-side tests with OpenSSL 1.1.1 Your patch has been applied to the master branch. commit 24e58164b845614c2176bc6b2a939856fd830c53 Author: Antonio Quartulli Date: Mon Apr 5 10:00:05 2021 +

Re: [Openvpn-devel] [PATCH 3/3] ssl: remove unneeded if block

2021-04-05 Thread Gert Doering
Hi, On Mon, Apr 05, 2021 at 10:00:07AM +0200, Antonio Quartulli wrote: > /* compute PRF */ > -if (!ssl_tls1_PRF(BPTR(&seed), BLEN(&seed), secret, secret_len, output, > output_len)) > -{ > -ret = false; > -} > +ret = ssl_tls1_PRF(BPTR(&seed), BLEN(&seed), secret, secre

Re: [Openvpn-devel] [PATCH] Fix 'compress migrate' for 2.2 clients.

2021-04-05 Thread Simon Matter
> Hi, > > On Mon, Apr 05, 2021 at 10:16:07AM +0200, Simon Matter wrote: >> Then I misunderstood what is written here? >> >> https://community.openvpn.net/openvpn/wiki/DeprecatedOptions#Option:--compress >> >> "Compression is not recommended and is a feature users should avoid >> using. >> To signal

Re: [Openvpn-devel] [PATCH] Fix 'compress migrate' for 2.2 clients.

2021-04-05 Thread Arne Schwabe
Am 05.04.21 um 09:38 schrieb Simon Matter: >> Hi, >> >> On Sat, Apr 03, 2021 at 03:07:11PM +0200, Simon Matter wrote: >>> Apr 3 15:00:30 gw-X1 openvpn[1477]: pre-compress bytes,833300152 >>> Apr 3 15:00:30 gw-X1 openvpn[1477]: post-compress bytes,796650159 >>> Apr 3 15:00:30 gw-X1 openvpn[1477]:

Re: [Openvpn-devel] [PATCH] Fix 'compress migrate' for 2.2 clients.

2021-04-05 Thread Gert Doering
Hi, On Mon, Apr 05, 2021 at 10:16:07AM +0200, Simon Matter wrote: > Then I misunderstood what is written here? > > https://community.openvpn.net/openvpn/wiki/DeprecatedOptions#Option:--compress > > "Compression is not recommended and is a feature users should avoid using. > To signal this clearl

Re: [Openvpn-devel] [PATCH] Fix 'compress migrate' for 2.2 clients.

2021-04-05 Thread Simon Matter
> Hi Simon > > On 05/04/2021 09:38, Simon Matter wrote: >>> Hi, >>> >>> On Sat, Apr 03, 2021 at 03:07:11PM +0200, Simon Matter wrote: Apr 3 15:00:30 gw-X1 openvpn[1477]: pre-compress bytes,833300152 Apr 3 15:00:30 gw-X1 openvpn[1477]: post-compress bytes,796650159 Apr 3 15:00:30 g

[Openvpn-devel] [PATCH 1/3] openssl: fix EVP_PKEY_CTX memory leak

2021-04-05 Thread Antonio Quartulli
From: Antonio Quartulli A context allocated with EVP_PKEY_CTX_new_id() must be ultimately free'd by Eng VP_PKEY_CTX_free(). Failing to do so will result in a memory leak. This bug was discovered using GCC with "-fsanitize=address". Signed-off-by: Antonio Quartulli --- src/openvpn/crypto_opens

[Openvpn-devel] [PATCH 3/3] ssl: remove unneeded if block

2021-04-05 Thread Antonio Quartulli
From: Antonio Quartulli There is no need to check the result of a boolean function and then assign a constant value to a variable based on that check. Directly assign the return value of the function to the variable. Signed-off-by: Antonio Quartulli --- src/openvpn/ssl.c | 6 ++ 1 file ch

[Openvpn-devel] [PATCH 2/3] openssl: avoid NULL pointer dereference

2021-04-05 Thread Antonio Quartulli
From: Antonio Quartulli EVP_PKEY_CTX_new_id() may return NULL and for this reason we must check its return value and bail out in case of failure. Failing to do so, may result in NULL pointer dereferece when we pass the returned pointer (NULL) to other functions. Signed-off-by: Antonio Quartulli

Re: [Openvpn-devel] [PATCH] Fix 'compress migrate' for 2.2 clients.

2021-04-05 Thread Antonio Quartulli
Hi Simon On 05/04/2021 09:38, Simon Matter wrote: >> Hi, >> >> On Sat, Apr 03, 2021 at 03:07:11PM +0200, Simon Matter wrote: >>> Apr 3 15:00:30 gw-X1 openvpn[1477]: pre-compress bytes,833300152 >>> Apr 3 15:00:30 gw-X1 openvpn[1477]: post-compress bytes,796650159 >>> Apr 3 15:00:30 gw-X1 openvp

Re: [Openvpn-devel] [PATCH] Fix 'compress migrate' for 2.2 clients.

2021-04-05 Thread Simon Matter
> Hi, > > On Sat, Apr 03, 2021 at 03:07:11PM +0200, Simon Matter wrote: >> Apr 3 15:00:30 gw-X1 openvpn[1477]: pre-compress bytes,833300152 >> Apr 3 15:00:30 gw-X1 openvpn[1477]: post-compress bytes,796650159 >> Apr 3 15:00:30 gw-X1 openvpn[1477]: pre-decompress bytes,343572096 >> Apr 3 15:00:3