Hi, On Thu, May 20, 2021 at 05:11:45PM +0200, Arne Schwabe wrote: > Since generating data channel keys does not happen when we have reach the > S_ACTIVE/S_GOT_KEY state anymore like it used to be before NCP, the > state that data channel keys deserves its own state in the TLS session > state machine.
Master as of today (ccee09d1478a) + this patch crashes on p2p --secret 2021-07-02 15:06:31 us=336025 Peer Connection Initiated with [AF_INET6]::ffff:194.97.140.21:41858 2021-07-02 15:06:31 us=336099 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this 2021-07-02 15:06:31 us=336118 Initialization Sequence Completed Program received signal SIGSEGV, Segmentation fault. 0x00005555555794c9 in do_up (c=c@entry=0x7fffffffd660, pulled_options=pulled_options@entry=false, option_types_found=option_types_found@entry=0) at init.c:2205 2205 c->c2.tls_multi->multi_state = CAS_CONNECT_DONE; (gdb) print c->c2.tls_multi $1 = (struct tls_multi *) 0x0 I'm fairly sure it should not do that :-) Is this fixed in 7/9...9/9? Or do we need a v3 of this one? gert -- "If was one thing all people took for granted, was conviction that if you feed honest figures into a computer, honest figures come out. Never doubted it myself till I met a computer with a sense of humor." Robert A. Heinlein, The Moon is a Harsh Mistress Gert Doering - Munich, Germany g...@greenie.muc.de
signature.asc
Description: PGP signature
_______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel