1. 28 Feb, 2022 1 commit
    • Deucе's avatar
      Enable ctypes in jsdoor · c7cbdd4c
      Deucе authored
      SpiderMokey is now built with ctypes, but the object is only
      being created in jsdoor for now.
      c7cbdd4c
  2. 25 Feb, 2022 1 commit
  3. 22 Dec, 2021 1 commit
    • Luke Walker's avatar
      Fix build on arm64 · e02e118b
      Luke Walker authored
      - Update SpiderMonkey config.guess
      - Include patch for SpiderMonkey Mozilla bug 638056
      e02e118b
  4. 14 Dec, 2021 1 commit
    • Deucе's avatar
      Increase the Cyrptlib object limit from 1024 to 16384 · 3adb964d
      Deucе authored
      This may fix various out of resources issues.  Here's what the source
      has to say about this number:
      
      /* The maximum number of objects.  By default we use a fixed limit set to an
         appropriate large-enough value because the only time anyone that would
         really be creating thousands of objects is if they're leaking them and
         setting a fixed limit means this is detected without the code having to
         run for days or weeks leaking handles, however we allow a dynamically-
         configurable limit set via CONFIG_NUM_OBJECTS if someone really needs to
         use vast numbers of objects */
      3adb964d
  5. 10 Dec, 2021 1 commit
  6. 07 Dec, 2021 1 commit
    • Deucе's avatar
      Remove check for fd <= FD_SETSIZE · fd214111
      Deucе authored
      This was preventing cryptlib from working with socket descriptors
      over FD_SETSIZE despite being patched to use poll() to avoid the
      issue it's protecting against.
      
      May fix the various SSH/SSL internal error issues.
      fd214111
  7. 19 Oct, 2021 3 commits
  8. 12 Apr, 2021 1 commit
  9. 04 Apr, 2021 1 commit
    • Rob Swindell's avatar
      A poll() failure with EINTR does not mean a socket is closed. · fcf58640
      Rob Swindell authored
      This won't impact Synchronet as it has a separate signal handling
      thread, but we still need to behave properly for processes that
      don't.  I'm also saying that ENOMEM does not indicate a disconnection,
      though it may be better to pretend it was disconnected...
      fcf58640
  10. 30 Mar, 2021 1 commit
  11. 21 Mar, 2021 2 commits
  12. 20 Mar, 2021 1 commit
    • Deucе's avatar
      Add support for MinGW-w64 · 1dc1a6b9
      Deucе authored
      MinGW32 is getting long in the tooth and is missing a lot of modern
      Windows features as well as having broken headers.  Most people will
      be using MinGW-w64 at this point, so add support for it.  Once I
      ensure SyncTERM works properly with it, MinGW32 support will be
      discontinued.
      
      I suspect this will impact exactly zero people since the reason this
      exists is to build the Win32 versions of SyncTERM on FreeBSD.
      
      Changes:
      - Explicitly request 32-bit Windows output
      - Detect the string "mingw32" anywhere in the hardware description
      - Explicitly link with libuuid
      - Add a terrible hack to syncterm.c to block wincrypt.h
      1dc1a6b9
  13. 16 Mar, 2021 2 commits
    • Deucе's avatar
      Add support for the SSH "none" auth method. · f4d43d13
      Deucе authored
      This is used by some BBSs to enable encryption without needing to
      integrate the BBS user base into their SSH server (and presumably
      so they don't need to run multiple SSH servers).  All users log in
      with the same username (ie: "bbs") and no password is requested or
      required.
      
      Once the BBS starts, it prompts for the BBS user name and password
      as normal.
      
      In SyncTERM, the user/password/syspass fields are redefined as
      SSHuser/BBSuser/BBSpassword and they are moved around when you
      change the connection type.  This means that if you change a listing
      that has a syspass to SSH (no auth) and back, the syspass is lost.
      
      I'm not sure if I plan to fix this or not.
      f4d43d13
    • Deucе's avatar
      Fix indentation warning from Clang in JS header · 98c77fde
      Deucе authored
      It would be fine if this only warned while building JS, we're used
      to ignoring that, but this bugger warns while building Synchronet
      stuff.
      98c77fde
  14. 15 Mar, 2021 2 commits
  15. 14 Mar, 2021 1 commit
  16. 13 Mar, 2021 1 commit
  17. 26 Jan, 2021 1 commit
    • Deucе's avatar
      Allow PKCS#12 import/export. · f1094791
      Deucе authored
      While PKCS#12 export likely works "fine", PKCS#12 import almost
      certainly doesn't.  Cryptlib supports a basic strict PKCS#12 read,
      while OpenSSL used wild and crazy extensions.
      f1094791
  18. 24 Jan, 2021 5 commits
  19. 19 Dec, 2020 2 commits
  20. 16 Aug, 2020 1 commit
  21. 02 May, 2020 2 commits
  22. 01 May, 2020 1 commit
  23. 29 Apr, 2020 1 commit
  24. 14 Apr, 2020 1 commit
  25. 02 Apr, 2020 1 commit
  26. 17 Feb, 2020 2 commits
    • deuce's avatar
      Disable TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 again, there's more issues · b3a09056
      deuce authored
      here, and it's not really needed.
      b3a09056
    • deuce's avatar
      Fix incorrect AES blocksizes. · 7e13901c
      deuce authored
      The block sizes for TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 and
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 were incorrect in the suite
      definitions.
      
      This is the root cause befind the old cl-suites.patch which disabled
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (no great loss).  This patch also
      fixes the TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 suite, which may be what
      new Apple phones were negotiating for pop3s connections.
      7e13901c
  27. 14 Feb, 2020 2 commits