Hi,

Here's the summary of the previous IRC meeting / sprint.

---

COMMUNITY MEETING

Place: #openvpn-devel on irc.freenode.net
List-Post: openvpn-devel@lists.sourceforge.net
Date: Thursday 8th Sep 2011
Time: 18:00 UTC

Planned meeting topics for this meeting were on this page:

<https://community.openvpn.net/openvpn/wiki/Topics-2011-09-08>

Next meeting will be announced in advance, but will probably be on the same
weekday and at the same time. Your local meeting time is easy to check
from services such as

<http://www.timeanddate.com/worldclock>

or with

$ date -u


SUMMARY

andj, d457k, krzee, jamesyonan, mattock and uuuppz participated in
this meeting.

--

Discussed the "Fix warnings in event.c when building for win32-64" patch:

<http://thread.gmane.org/gmane.network.openvpn.devel/4941>

Although %p is not a standard printf feature, this patch only affects
Windows where %p is guaranteed to be available. Therefore jamesyonan and
andj gave this patch an ACK.  For further details, see:

<http://stackoverflow.com/questions/2369541/where-is-p-useful-with-printf>

--

Discussed the "Remove wrapper code for Windows CryptoAPI function" patch:

<http://thread.gmane.org/gmane.network.openvpn.devel/4937>

Jamesyonan gave this patch an ACK.

--

Discussed the "Better --auto-proxy support for Windows" patchset:

<http://thread.gmane.org/gmane.network.openvpn.devel/4927>

Suggested the following modifications:

Patch [1/3]: Add MinGW WinHTTP compatibility layer

- Make use of import libraries:
<http://www.mingw.org/wiki/CreateImportLibraries>

Patch [2/3]: Do automatic proxy detection on Windows right...
Patch [3/3]: Query auto-proxy information when connecting...

- Verify that these patches play well with existing functionality:
  - PROXY queries from the management interface
  - http-proxy-fallback option
  - http-proxy-override option

--

Discussed Adriaan's (andj's) PolarSSL patches. All remaining "SSL
library separation" patches were reviewed and ACKed. The full status of
the PolarSSL patchset before and after the meeting:

<https://community.openvpn.net/openvpn/wiki/PolarSSLintegration?version=54>
<https://community.openvpn.net/openvpn/wiki/PolarSSLintegration?version=60>

If you have any comments regarding any of the patches (or ACKs) please
chime in. If there are no complaints, the ACKed patches will be merged
to the main Git repository soon.

It will probably take 1-2 IRC sprints to go through the remaining
PolarSSL patches.

---

Full chatlog as an attachment

-- 
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc

irc freenode net: mattock

andj 21:02:36
evening 

mattock 21:02:38
so, I can finally start creating proper Windows snapshots
hi jamesyonan 21:02:39
 
jamesyonan 21:02:49
hi      

mattock 21:02:51
https://community.openvpn.net/openvpn/wiki/Topics-2011-09-08    

vpnHelper 21:02:52
Title: Topics-2011-09-08 – OpenVPN Community (at community.openvpn.net)       

mattock 21:03:50
dazo suggested starting with d12fk's patches (on top)   

andj 21:04:08
cool    

mattock 21:04:11
d12fk: there?   

d457k 21:04:52
jepp    

mattock 21:05:07
ah, d457k atm 
jamesyonan: can you take a look at 
http://thread.gmane.org/gmane.network.openvpn.devel/4941 21:05:23
 
vpnHelper 21:05:26
Title: Gmane Loom (at thread.gmane.org) 

d457k 21:05:34
yes, i'm still in the process of moving to a bouncer =) 

andj 21:07:48
don't see a problem with that patch on gcc, but not sure what other compilers 
do with %p        

d457k 21:08:16
%p is a windows feature so there souldn't be problems   

andj 21:08:32
ok      

jamesyonan 21:08:35
yeah, I'm wondering that as well -- is %p a printf standard?    

d457k 21:08:35
of the c runtime to be precise
no but a common extension 21:08:46
however the code is windows only 21:08:55
i think %p is sus or s.th. similar 21:09:19
iso doesn't have it 21:09:40
 
andj 21:10:04
for what it's worth: 
http://stackoverflow.com/questions/2369541/where-is-p-useful-with-printf   

vpnHelper 21:10:05
Title: c++ - Where is `%p` useful with printf? - Stack Overflow (at 
stackoverflow.com)  

jamesyonan 21:10:27
does glibc support it?  

andj 21:10:44
it seems to be common
jamesyonan: yes 21:11:15
 
d457k 21:11:16
jamesyonan: yes 

andj 21:11:20
lol
well timed 21:11:22
 
d457k 21:11:34
yeah    

andj 21:12:19
so ack  

jamesyonan 21:12:34
I don't see %p mentioned on the Mac OS X manpage for printf
but I see it for Linux 21:12:44
 
d457k 21:13:54
jamesyonan: teh code is within #ifdef win32     

andj 21:14:15
http://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man3/printf.3.html
      

vpnHelper 21:14:16
Title: Loading (at developer.apple.com) 

andj 21:14:28
p The void * pointer argument is printed in hexadecimal (as if by `%#x' or 
`%#lx').
so it should be ok 21:14:40
 
jamesyonan 21:14:41
sure, that's fine then if it's windows-only     

andj 21:15:18
what's next?    

mattock 21:15:42
http://thread.gmane.org/gmane.network.openvpn.devel/4937 ?      

vpnHelper 21:15:44
Title: Gmane Loom (at thread.gmane.org) 
andj bows out 21:16     

d457k 21:18:43
basically just the wrapper code removed since mingw supports it since several 
versions  

jamesyonan 21:18:52
sure, that looks fine   

mattock 21:19:02
nice! next one is: http://thread.gmane.org/gmane.network.openvpn.devel/4927     

vpnHelper 21:19:05
Title: Gmane Loom (at thread.gmane.org) 

d457k 21:19:28
let's start with 1/3
during configure it's check if winhttp code compiles, is not the compat layer 
macro is defined 21:20:29
the macros themselfes caused concerns by some ppl 21:21:31
i of course don't see any probs =) 21:23:17
 
andj 21:25:47
not too familiar with this kind of code 

jamesyonan 21:26:04
Why do we have to add so much ugly code to deal with the fact that mingw is not 
up-to-date?
Can't mingw be updated with latest windows headers? 21:26:32
 
d457k 21:26:33
mingw does not support winhttp at all so far    

jamesyonan 21:26:59
but isn't it just a library?    

d457k 21:27:33
yes, i've requested support, but it's not in sight      

jamesyonan 21:27:47
it seems that anything that can be loaded at run time with LoadLibrary can also 
be bound at link time   

d457k 21:28:23
iff you have the .lib and .h
the lib on windows is there, but the link lib and headers are missing in 
mingw/unis cross-compile env 21:29:01
if we don't have the compat layer openvpn cannot be compiled in linux or with 
gcc/cygwin/msys on windows 21:30:40
 
jamesyonan 21:31:50
wouldn't it be easier to add the right header to mingw for this library
not sure how you do this with mingw, but in VC it would just be the C 
prototypes with declspec dllexport, and that would generate the .lib 21:33:11
 
d457k 21:33:27
haven't looked into mingw yet, I think it should be doable be someone. however 
it will take a while until that gets into distributions
there's a .a for every .dll in mingw, guess gcc does have that feature 21:35:35
*not have 21:35:45
 
jamesyonan 21:36:38
why not just generate the .a as a part of the build process when using mingw    

uuuppz 21:36:39
who is the primary user for the mingw build?    

mattock 21:37:10
uuuppz: there are quite a few people using it, but we got no numbers    

jamesyonan 21:37:19
that keeps the LoadLibrary ugliness (and possible security issues) out of the 
OpenVPN code      

d457k 21:37:22
i'm one of them 

mattock 21:37:42
d457k: is jamesyonan's solution ok for you?     

d457k 21:37:58
don't know how to do such an .a
LoadLibrary is secure if you use full paths 21:38:30
 
uuuppz 21:38:52
http://www.mingw.org/wiki/CreateImportLibraries 

vpnHelper 21:38:53
Title: HOWTO Create an Import Library for a DLL using MinGW | MinGW (at 
www.mingw.org)  

d457k 21:40:13
cool, I'll look into it 

mattock 21:40:16
nice!
next one? 21:40:19
 
d457k 21:40:23
yes     

mattock 21:40:49
http://thread.gmane.org/gmane.network.openvpn.devel/4927/focus=4929     

vpnHelper 21:40:50
Title: Gmane Loom (at thread.gmane.org) 

mattock 21:42:00
no discussion on the ml it seems        

andj 21:42:29
+ options->auto_proxy_info = get_proxy_settings ("https://openvpn.net";, &error, 
&options->gc);
does that mean that openvpn.net is always chosen 21:42:39
as a reference? 21:42:50
 
jamesyonan 21:44:20
yeah, I don't understand why https://openvpn.net is in this code        

vpnHelper 21:44:22
Title: OpenVPN - Open Source VPN (at openvpn.net)       

mattock 21:45:02
leftover from testing?  

andj 21:45:23
I assumed it was to query proxy settings for reaching that url
as opposed to a different, local one 21:45:38
 
d457k 21:45:43
no that will be resolved in 3/3 

andj 21:45:50
ah, ok  

d457k 21:45:58
it's just temporary so to say
the hostname/ip address of the actual server will be used then 21:46:27
 
mattock 21:46:45
pretty big patch, definitely needs testing... but besides that, does it look 
ok?        

andj 21:49:19
codewise I haven't got a problem with it, I just don't know the API, which 
means I don't know any weirdness with it     

mattock 21:49:50
jamesyonan: any thoughts?       

jamesyonan 21:50:23
does this patch have any interactions with management interface command 
http-proxy-fallback and >PROXY notifications?   

d457k 21:50:48
no just replaces the code query functionality
however it could be that 3/3 introduces issues 21:51:18
 
jamesyonan 21:51:54
I'm concerned about breaking existing functionality     

d457k 21:52:27
it moves the time auto_proxy_info is queried to init
whats http-proxy-fallback and >PROXY 21:52:50
we should look at 3/3 as well right now mattock 21:53:33
 
mattock 21:53:37
ok      

jamesyonan 21:53:47
http-proxy-fallback is a way to automatically fall back to using a proxy if a 
direct connection fails   

mattock 21:53:56
http://thread.gmane.org/gmane.network.openvpn.devel/4927/focus=4926     

vpnHelper 21:53:58
Title: Gmane Loom (at thread.gmane.org) 

d457k 21:54:38
ok i'll investigate that
and >PROXY? 21:54:44
http-proxy-fallback is not in the manual, is it? 21:55:52
 
jamesyonan 21:56:11
it may not be, it's a relatively new feature
it's designed to allow the client that's driving the management interface to 
communicate the proxy info, but only if it's needed because a direct connection 
failed 21:56:59
 
andj 21:57:58
ack on 3/3
fwiw 21:58:02
 
d457k 21:58:28
but isn't that obsolete with wpad?
where should the client get the info from if not from wpad or the IE settings? 
21:58:58
what other itch does the feature scratch 21:59:43
 
uuuppz 22:00:13
well I can think of one issue.....      

jamesyonan 22:00:20
well it's a portability issue...        

uuuppz 22:00:21
if client is running as service
its likely not to be running under the same user account 22:00:35
as the gui using the MI 22:00:39
afaik IE proxy settings are per user 22:00:51
might be wrong.... 22:01:05
 
jamesyonan 22:01:15
yes, that's an issue as well    

d457k 22:01:19
wpad is not per user and the code also queries the system proxy settings set 
via proxycfg
also, with the interactive service openvpn will be running as the user 22:01:53
 
jamesyonan 22:01:54
it's basically (a) proxy detection is os-specific, and (b) may be user-specific 
as well 

d457k 22:02:16
os is an issue, ack     

uuuppz 22:02:17
imo tho
in this case 22:02:19
for my GUI if I add proxy support - I would expect to pass the proxy as a CLI 
param. I should know this before I start the con. 22:02:44
(sorry not if, when, I promise I will !) 22:02:56
 
d457k 22:03:42
valid argument  

jamesyonan 22:03:54
well it's a performance issue -- it takes time to get proxy info via WPAD 
because multiple strategies need to be tried  

d457k 22:04:10
either you pass --auto-proxy or --http-proxy    

mattock 22:04:44
I think IE is/was doing tons of proxy auto-detection also, which makes/made 
startups really slow
different strategies, that is 22:04:54
with timeouts 22:05:06
maybe it's using WPAD 22:05:19
 
andj 22:05:42
there's not much of a problem with a choice is there? either do it manually, or 
do it automatically?    

d457k 22:05:43
this can be disabled on a per connection basis, tho     

jamesyonan 22:05:46
yeah, but http-proxy-fallback is a more automatic solution because it only 
tries the proxy if direct connect fails
so there's no WPAD-related startup overhead in the case where direct connect 
succeeds 22:05:47
 
andj 22:06:12
and auto should be pretty exhaustive from an end-user's standpoint      

d457k 22:06:34
in my test wpad did not take more than 2-3 sec. if it was not configured        

jamesyonan 22:06:51
andj: sure, just want to make sure that this patch plays well with the existing 
functionality   

d457k 22:06:58
and one the pac file was located and loaded it's unfortunately cached   

andj 22:07:31
jamesyonan: agree on not breaking the fallback option to try directly first     

d457k 22:08:00
yes I'll check out if it breaks that, wasn't aware of the functionality
is it mgmt itf only? 22:08:09
 
jamesyonan 22:08:28
yeah    

d457k 22:08:35
how is it activated?
or can you always pass the info 22:08:48
 
jamesyonan 22:10:00
the options http-proxy-fallback and http-proxy-override control it      

d457k 22:10:42
so you need both to be asked by ovpn via mgmt?  

jamesyonan 22:12:17
basically the MI sends a >PROXY notification if it needs proxy settings 

d457k 22:12:33
ok now i understand     

andj 22:13:07
so verify PROXY, http-proxy-fallback, and http-proxy-override during tests?
for an ACK? 22:13:11
 
d457k 22:13:17
i think i should have stumbled over the feature if it would have been in the way
but i'll verify until next week 22:13:31
 
jamesyonan 22:13:40
that sounds good        

d457k 22:14:34
ok so 1/3 with dlltool nad 2/3 & 3/3 need verification regarding fallback 
breakage
be be back on the list regarding both 22:14:53
 
mattock 22:15:03
d457k: excellent!       

andj 22:15:11
cool    

mattock 22:15:16
shall we tackle a few SSL library separation patches: 
https://community.openvpn.net/openvpn/wiki/PolarSSLintegration#SSLlibraryseparation
       

vpnHelper 22:15:18
Title: PolarSSLintegration – OpenVPN Community (at community.openvpn.net)     

andj 22:15:24
http://article.gmane.org/gmane.network.openvpn.devel/4957 ?     

vpnHelper 22:15:26
Title: Gmane -- Mail To News And Back Again (at article.gmane.org)      

mattock 22:15:30
not that many left, actually    

andj 22:15:36
seems relatively straightforward        

mattock 22:15:48
andj: the show is yours         

andj 22:15:54
to finish off the other patch queue, but Polar is cool too      

mattock 22:16:06
oh, we (=I) forgot one patch    

andj 22:16:08
ok: 
https://github.com/andj/openvpn-ssl-refactoring/commit/df9b63c5c0b3333d7171e76dd3dab87b9274cbf8
     

vpnHelper 22:16:09
Title: Commit df9b63c5c0b3333d7171e76dd3dab87b9274cbf8 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 22:16:13
almost got acked last week      

mattock 22:16:16
http://article.gmane.org/gmane.network.openvpn.devel/4957       

vpnHelper 22:16:17
Title: Gmane -- Mail To News And Back Again (at article.gmane.org)      

andj 22:16:23
https://gist.github.com/1171353 

vpnHelper 22:16:24
Title: andj's gist: 1171353 Gist (at gist.github.com)   

andj 22:16:33
However there was a question from dazo
abot the code at line 56 of the gist 22:16:41
 
mattock 22:16:53
disregard my link above, let's tackle polarssl first    

andj 22:16:54
carefull consideration shows that the removed code is dead code
since that function got called with "SSL_FILETYPE_PEM" 22:17:36
 
krzee 22:17:38
(RIP dead code) 

andj 22:17:41
hard coded      

d457k 22:18:37
i'm out guys
thanks for the feedback 22:18:45
 
andj 22:18:50
thanks d457k    

mattock 22:19:06
bye!    

krzee 22:19:17
later d457k!    

jamesyonan 22:19:57
take care
ok, so you're saying the line 56 code would never be called? 22:20:40
 
andj 22:20:58
it would never be called
I think it got copy-pasted from the openssl code 22:21:16
but openvpn always uses PEM 22:21:32
 
jamesyonan 22:24:19
right, that makes sense 

andj 22:25:00
the other difference is that the late call to 
SSL_CTX_use_certificate_chain_file  is gone
and moved to the tls_ctx_load_cert_file() function 22:25:12
used to be: "SSL_CTX_use_certificate_file " is now 
"SSL_CTX_use_certificate_chain_file " 22:26:13
since that makes more sense to call directly, instead of waiting 22:26:30
was that an ack? or do you want to check the second point 22:27:57
 
jamesyonan 22:29:43
but isn't SSL_CTX_use_certificate_chain_file somewhat different than 
SSL_CTX_use_certificate_file?      

andj 22:30:19
yes, but if you use the former, in the original code
using_file or something is set 22:30:46
and it's called anyway 22:30:49
which just overrides the previous choice 22:30:57
I remember asking about it on -devel at some point 22:31:06
https://github.com/andj/openvpn-ssl-refactoring/commit/df9b63c5c0b3333d7171e76dd3dab87b9274cbf8#L0L1998
 22:31:25
 
vpnHelper 22:31:28
Title: Commit df9b63c5c0b3333d7171e76dd3dab87b9274cbf8 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 22:31:36
and 
https://github.com/andj/openvpn-ssl-refactoring/commit/df9b63c5c0b3333d7171e76dd3dab87b9274cbf8#L0L2106
     

vpnHelper 22:31:37
Title: Commit df9b63c5c0b3333d7171e76dd3dab87b9274cbf8 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 22:31:50
so the latter is just moved forward a little
to ease the split in SSL library 22:32:01
to: 
https://github.com/andj/openvpn-ssl-refactoring/commit/df9b63c5c0b3333d7171e76dd3dab87b9274cbf8#L2R431
 22:32:38
 
vpnHelper 22:32:39
Title: Commit df9b63c5c0b3333d7171e76dd3dab87b9274cbf8 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 22:33:28
the non-chain version just doesn't load the chained CAs
while the chained version does 22:33:34
which is the desired behaviour 22:33:41
otherwise you wouldn't be supplying a chain 22:33:56
 
jamesyonan 22:34:57
does this interact in any way with "extra-certs" option?        

andj 22:35:21
that's the next patch, or one of the next ones, let me get a link
https://github.com/andj/openvpn-ssl-refactoring/commit/b5ceb7049dd57ac8e7fa05d542c479382a4ed1ed
 22:35:50
 
vpnHelper 22:35:51
Title: Commit b5ceb7049dd57ac8e7fa05d542c479382a4ed1ed to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

jamesyonan 22:36:39
re: chained vs. non-chained, shouldn't the cert file contain a singleton cert, 
and have intermediates necessary to build up the chain be in ca list?    

andj 22:37:12
it can be in the pem file as well, that's why the code at 
https://github.com/andj/openvpn-ssl-refactoring/commit/df9b63c5c0b3333d7171e76dd3dab87b9274cbf8#L0L2106
 was there     

vpnHelper 22:37:13
Title: Commit df9b63c5c0b3333d7171e76dd3dab87b9274cbf8 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 22:37:44
it's about the chain sent to remote, not the one used to verify
anyway, to answer your earlier question about extra_certs 22:38:45
 
jamesyonan 22:38:53
right   

andj 22:39:00
those are loaded after the chain is loaded
which should be fine 22:39:04
 
jamesyonan 22:39:56
some people use a different CA chain to sign servers vs. clients        

andj 22:40:08
that's still very much valid    

jamesyonan 22:40:13
cool    

mattock 22:40:18
ACK?    

jamesyonan 22:40:26
yes, ACK        

andj 22:40:42
next up is mgmt key loading     

mattock 22:40:44
andj: what exactly did we get ACKed?    

andj 22:40:46
https://github.com/andj/openvpn-ssl-refactoring/commit/2a5f084332fc7a619107513b17b2f4a3dc0c31b2
 

vpnHelper 22:40:48
Title: Commit 2a5f084332fc7a619107513b17b2f4a3dc0c31b2 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

mattock 22:40:49
so many links...        

andj 22:40:55
df9b63c5c0b     

mattock 22:40:57
ok      

andj 22:41:21
the gist is here https://gist.github.com/1171413        

vpnHelper 22:41:23
Title: andj's gist: 1171413 Gist (at gist.github.com)   

andj 22:41:25
for the last one
shows that not much canged 22:41:34
+c 22:41:38
+h even 22:41:40
just got moved 22:41:47
to the openssl-specific part 22:42:36
 
jamesyonan 22:44:51
is this to support management-external-key?     

andj 22:45:01
yes, that's it
moves to the openssl-specific backend 22:45:13
 
jamesyonan 22:46:28
right, this is fine     

andj 22:46:43
ok, extra certs got ack'ed by dazo
so: 
https://github.com/andj/openvpn-ssl-refactoring/commit/899913d235502a2a6bd754e368bbe5a782a83911
 22:46:56
 
vpnHelper 22:46:58
Title: Commit 899913d235502a2a6bd754e368bbe5a782a83911 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 22:47:14
that moves the keystate ssl-specific stuff into an extra struct
https://gist.github.com/1171454 22:47:14
 
vpnHelper 22:47:15
Title: andj's gist: 1171454 Gist (at gist.github.com)   

andj 22:47:26
not much difference, just a struct added
if you look at the gist 22:47:32
the ks_ssl struct is library-specific 22:47:57
and contains the BIOs, or whatever $library uses 22:48:18
 
jamesyonan 22:50:35
where do configuration file boolean options end up?     

andj 22:51:07
in ssl_common.h
see 
https://github.com/andj/openvpn-ssl-refactoring/commit/899913d235502a2a6bd754e368bbe5a782a83911#L3L45
 22:51:21
 
vpnHelper 22:51:22
Title: Commit 899913d235502a2a6bd754e368bbe5a782a83911 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

jamesyonan 22:51:51
so this is just a pure refactor then?   

andj 22:51:53
they were copied there in an earlier patch
yes 22:51:55
 
jamesyonan 22:52:05
looks fine to me        

andj 22:52:15
ok, same for the next patch: 
https://github.com/andj/openvpn-ssl-refactoring/commit/68adc0eff8f06eef9d98a4bd12eb36bcbfc62164
    

vpnHelper 22:52:16
Title: Commit 68adc0eff8f06eef9d98a4bd12eb36bcbfc62164 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 22:52:18
https://gist.github.com/1171458 

vpnHelper 22:52:20
Title: andj's gist: 1171458 Gist (at gist.github.com)   

andj 22:52:26
does the same, but for init
basically, just moves the key state init to the backend 22:53:07
 
jamesyonan 22:54:05
looks good      

andj 22:54:11
https://github.com/andj/openvpn-ssl-refactoring/commit/fc50119c1fe1b37cebc76913c66854bce103b68f
 

vpnHelper 22:54:12
Title: Commit fc50119c1fe1b37cebc76913c66854bce103b68f to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 22:54:15
for the write functions
https://gist.github.com/1140049 22:54:23
 
vpnHelper 22:54:24
Title: andj's gist: 1140049 Gist (at gist.github.com)   

andj 22:54:38
this is the actual refactor
of the key state write 22:54:54
that's the wrong gist 22:56:24
oops 22:56:36
let me make a new one 22:56:59
 
mattock 22:57:17
I think I got so split soon, early wakeup tomorrow      

andj 22:57:34
almost there 
correct gist: https://gist.github.com/1140049 22:57:54
 
vpnHelper 22:57:56
Title: andj's gist: 1140049 Gist (at gist.github.com)   

andj 22:58:11
after this 1 more, and we have separation done
oh wait, missed one 22:59:05
2 more after this 22:59:08
jamesyonan: still here, and on the correct gist now? 23:00:04
 
mattock 23:00:11
yeah, 2 

jamesyonan 23:00:17
yes, I'm looking at it  

andj 23:01:35
ok, sorry, just checking that I wasn't wasting your time        

jamesyonan 23:02:51
why is it that struct tls_multi* multi is no longer passed to some of the 
functions, like bio_write?    

andj 23:03:14
wasn't used if I'm not mistaken
yeah, it was passed straight to bio_write 23:04:06
and bio_write only used the ks_ssl parts of it 23:04:27
 
jamesyonan 23:04:51
yeah, I see     

andj 23:05:01
so it cleans up nicely 
bio stuff doesn't need to know about openvpn structs anyway 23:05:16
 
jamesyonan 23:07:12
this one looks fine     

andj 23:07:17
ok, read code: 
https://github.com/andj/openvpn-ssl-refactoring/commit/72e75b9776e7528a8e36671f8e5337a00aa840ba
 with gist at https://gist.github.com/1171480     

vpnHelper 23:07:18
Title: Commit 72e75b9776e7528a8e36671f8e5337a00aa840ba to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

mattock 23:08:32
second last     

andj 23:08:39
whee    

mattock 23:08:40
\o/     

andj 23:08:40
        

jamesyonan 23:09:14
looks fine      

andj 23:09:26
https://github.com/andj/openvpn-ssl-refactoring/commit/7e4fb7ce9e061e180ab2f6a78da15ac0b797cc77
 

vpnHelper 23:09:27
Title: Commit 7e4fb7ce9e061e180ab2f6a78da15ac0b797cc77 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 23:09:31
no gist
that removes the ks and ks_lame macro's 23:09:39
since they weren't used everywhere 23:09:50
and confused the hell out of me at first 23:09:58
especially since they were undefed halfway through the file 23:10:15
this does the same thing, but makes it a little easier on the eyes 23:10:52
ok, a quick request: the next large patch is the PolarSSL addition one, the 
rest are just small bugfixes and such 23:12:54
could people have a look at the PolarSSL one in their spare time? 23:13:07
 
jamesyonan 23:13:16
sure that makes sense -- but why does the diff not show '-' for removed 
ks/ks_lame      

andj 23:13:23
I don't think a 2-hour session will cut it
https://github.com/andj/openvpn-ssl-refactoring/commit/7e4fb7ce9e061e180ab2f6a78da15ac0b797cc77#L0L2754
 23:13:29
 
vpnHelper 23:13:30
Title: Commit 7e4fb7ce9e061e180ab2f6a78da15ac0b797cc77 to 
andj/openvpn-ssl-refactoring - GitHub (at github.com) 

andj 23:13:50
it used to be a macro
at that location 23:14:06
 
jamesyonan 23:14:38
ah, right -- yes, I agree that it's more clear to lose the macro        

andj 23:14:53
cool, that's it for OpenSSL separation
thanks 23:14:55
 
mattock 23:14:58
nice!   

jamesyonan 23:14:59
great   

andj 23:15:20
next patch is the big one, but that's for another time
and there's lots of small ones 23:15:33
 
jamesyonan 23:15:40
andj: BTW, what is the code size difference between OpenSSL and PolarSSL?       

mattock 23:15:40
patch tracking page up-to-date: 
https://community.openvpn.net/openvpn/wiki/PolarSSLintegration?version=60       

vpnHelper 23:15:42
Title: PolarSSLintegration – OpenVPN Community (at community.openvpn.net)     

andj 23:15:58
not entirely sure, significant is all I can say
thanks, mattock 23:16:05
 
mattock 23:16:15
thanks to everyone!     

andj 23:16:18
you can disable most modules in polarssl
http://polarssl.org/source_code 23:16:34
 
vpnHelper 23:16:35
Title: PolarSSL Source Code overview - PolarSSL (at polarssl.org)       

mattock 23:16:48
I'll write the summary tomorrow

Reply via email to