Hi, On Thu, May 20, 2021 at 05:11:45PM +0200, Arne Schwabe wrote: > Since generating data channel keys does not happen when we have reach the > S_ACTIVE/S_GOT_KEY state anymore like it used to be before NCP, the > state that data channel keys deserves its own state in the TLS session > state machine.
Master as of today (ccee09d1478a) + this patch crashes on p2p --secret
2021-07-02 15:06:31 us=336025 Peer Connection Initiated with
[AF_INET6]::ffff:194.97.140.21:41858
2021-07-02 15:06:31 us=336099 WARNING: this configuration may cache passwords
in memory -- use the auth-nocache option to prevent this
2021-07-02 15:06:31 us=336118 Initialization Sequence Completed
Program received signal SIGSEGV, Segmentation fault.
0x00005555555794c9 in do_up (c=c@entry=0x7fffffffd660,
pulled_options=pulled_options@entry=false,
option_types_found=option_types_found@entry=0) at init.c:2205
2205 c->c2.tls_multi->multi_state = CAS_CONNECT_DONE;
(gdb) print c->c2.tls_multi
$1 = (struct tls_multi *) 0x0
I'm fairly sure it should not do that :-)
Is this fixed in 7/9...9/9? Or do we need a v3 of this one?
gert
--
"If was one thing all people took for granted, was conviction that if you
feed honest figures into a computer, honest figures come out. Never doubted
it myself till I met a computer with a sense of humor."
Robert A. Heinlein, The Moon is a Harsh Mistress
Gert Doering - Munich, Germany [email protected]
signature.asc
Description: PGP signature
_______________________________________________ Openvpn-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/openvpn-devel
