Skip to content
Snippets Groups Projects
  1. Feb 01, 2025
    • Deucе's avatar
      Add support for TLS PSK auth · 4590555c
      Deucе authored
      For use by broker.js which now requires a Sysop User ID and password
      as the TLS PSK, and requires the system password in the MQTT password
      field.
      4590555c
  2. Jan 14, 2025
    • Rob Swindell's avatar
      First pass run of uncrustify (code beautification) · 45c8fa94
      Rob Swindell authored
      White-space changes only, exception being the rare insertion of NL before
      closing brace (couldn't find the option to disable that behavior).
      
      I excluded some header files (e.g. sbbs.h) since uncrustify seemed to be doing
      more harm than good there. I might just end up applying different set of rules
      to .h files.
      45c8fa94
  3. Feb 24, 2024
    • Rob Swindell's avatar
      Report getaddrinfo() failure result in Socket.error and error_str (not errno) · 6a5cf7f6
      Rob Swindell authored
      As Nelgin pointed out, a Socket.connect() failure for reasons of address/host
      lookup failure would report a stale/nonsense Socket.error/error_str value.
      
      This change required us to query/store the socket API/getaddrinfo error string
      at the time of failure (for the Socket.error_str property value) rather than
      converting from number to string at the time the property is read.
      
      This does mean that sometimes Socket.error is a errno value and sometimes its
      a getaddrinfo (EAI_*) error value. Since the EAI_* values are negative, it
      should be obvious which is which.
      6a5cf7f6
  4. Jan 21, 2024
  5. Apr 02, 2021
    • Deucе's avatar
      Initial work on setTimeout() · 19289739
      Deucе authored
      This appears to work and the event handler *should* work on other
      event types already.
      
      Note, this is *nix-only due to the use of poll().  select() will
      need to be used for Windows to keep XP compatability.
      19289739
  6. Aug 21, 2019
  7. Mar 19, 2018
  8. Mar 03, 2018
    • deuce's avatar
      Store the certificate context in scfg_t. This allows static services to be · 81de76be
      deuce authored
      TLS servers without all of them needing to separately load the ssl certificate.
      
      It's destroyed in free_scfg(), and the config *must* be prepped both to
      destroy the certificate and to load it.  This is because the "no cert"
      value is -1, not 0, so the prepped flag is all we really have to indicate
      if it's zero because it's a valid certificate or zero because no certificate
      has been loaded.
      81de76be
  9. Jan 09, 2018
    • deuce's avatar
      Fix up TLS sessions. · 62af52ba
      deuce authored
      1) Only call crpytFlushData() if there *is* data.
      2) Only call cryptFlushData() once per call to do_CryptFlush()
      3) If cryptPushData() does a short write, flush immediately, regardless of
         the preferences
      4) Pass the whole private data pointer to do_CryptFlush() so it can only
         call cryptFlushData() if there's unflushed data
      5) Extend the private data structure to track unflushed data
      62af52ba
  10. Oct 04, 2015
  11. Aug 20, 2015
    • deuce's avatar
      Update to 3.17a · dbbfabf1
      deuce authored
      New Features:
      - Multiple bindings for each service
        Use comma-separated interfaces on Interface= lines in the ini file.
        Default is now "0.0.0.0,::"
      - IPv6 support
      - TLS support for the webserver and (non-static) services
        New TLS option in services.ini (ie: Options=TLS)
      - Decrease LEN_SCAN_CMD to 35 chars, increase the CID field to 45 chars,
        and rename the MAIL_CMD string to IPADDR.  I think this frees up the
        note field for SysOp use.
      dbbfabf1
  12. Jul 20, 2012
Loading