hiura
c36d7187a8
Fix 'RemoveDefGwOnDhcpForLocalhost' function No.2: Change the minimum size of DHCP reply
2024-04-16 10:30:10 +09:00
domosekai
1bb01e55e5
Mayaqua/TcpIp.c: Fix building DHCP static routes in new format
...
Fixes: 1708998
(Change IP structure so that IPv4 addresses are stored in RFC3493 format)
2021-07-14 08:11:05 +00:00
sl077
f9a1d72ce7
Fix IPv6 Neighbor Discovery for PPP based protocols
2021-05-09 13:55:31 +02:00
Ilya Shipitsin
cf318d7219
src/Mayaqua/TcpIp.c: remove redundant condition
...
src/Mayaqua/TcpIp.c 4236 warn V560 A part of conditional expression is always true: o2 == NULL.
2021-04-24 12:47:29 +05:00
Ilya Shipitsin
92f41341d9
src/Mayaqua/TcpIp.c: remove redundant check
...
src/Mayaqua/TcpIp.c 1811 warn V560 A part of conditional expression is always false: udp->Checksum == 0.
2021-04-23 15:39:11 +05:00
Davide Beatrici
1708998a11
Change IP structure so that IPv4 addresses are stored in RFC3493 format
...
In addition to saving 4 bytes for each instantiation, this change makes IP-related operations faster and clearer.
https://tools.ietf.org/html/rfc3493.html#section-3.7
2021-04-07 21:24:55 +02:00
Davide Beatrici
a6ba9b8788
Include headers properly
2021-04-05 04:48:25 +02:00
Tetsuo Sugiyama
d726719602
Fixed that NewDhcpOption did not handle DHCP options longer than 255 bytes correctly
2020-05-22 11:05:36 +09:00
Evengard
2cfe031398
Fixing most errors, the link on Windows is working and is stable
2020-05-12 18:10:06 +03:00
Evengard
f627b64264
Auto formatting with AStyle
2020-05-12 17:59:25 +03:00
Evengard
1d6a4d3ec8
Preliminary IPC IPv6 implementation (untested)
2020-05-12 17:59:24 +03:00
Daiyuu Nobori
881f34ac56
Compacting headers, updating trivial texts to fit to the license change from GPLv2 to Apache License 2.0.
2019-01-14 12:25:53 +09:00
Daiyuu Nobori
ee9990317b
Fix bugs reported by Coverity Scan.
2018-09-28 22:39:38 +09:00
Ilya Shipitsin
8ca0ce3efc
src/Mayaqua/TcpIp: remove dead code, unused variables and fuctions
...
found by coverity, cppcheck
[src/Mayaqua/TcpIp.c:578]: (style) Variable 'tcp_size' is assigned a value that is never used.
[src/Mayaqua/TcpIp.c:1034]: (style) Variable 'has_vlan_tag' is assigned a value that is never used.
[src/Mayaqua/TcpIp.c:1996]: (style) Variable 'tcp_header_size' is assigned a value that is never used.
[src/Mayaqua/TcpIp.c:127]: (style) The function 'IcmpEchoSend' is never used.
[src/Mayaqua/TcpIp.c:2194]: (style) The function 'ParsePacketL2' is never used.
[src/Mayaqua/TcpIp.c:251]: (style) The function 'IcmpEchoSendBySocket' is never used.
2018-08-18 00:27:17 +05:00
Josh Soref
ac865f04fc
Correct Spelling ( #458 )
...
* spelling: accepts
* spelling: account
* spelling: accept
* spelling: accumulate
* spelling: adapter
* spelling: address
* spelling: additional
* spelling: aggressive
* spelling: adhered
* spelling: allowed
* spelling: ambiguous
* spelling: amount
* spelling: anonymous
* spelling: acquisition
* spelling: assemble
* spelling: associated
* spelling: assigns
* spelling: attach
* spelling: attempt
* spelling: attribute
* spelling: authenticate
* spelling: authentication
* spelling: available
* spelling: bridging
* spelling: cascade
* spelling: cancel
* spelling: check
* spelling: challenge
* spelling: changing
* spelling: characters
* spelling: cloud
* spelling: compare
* spelling: communication
* spelling: compatible
* spelling: compatibility
* spelling: completion
* spelling: complete
* spelling: computers
* spelling: configure
* spelling: configuration
* spelling: conformant
* spelling: connection
* spelling: contains
* spelling: continuously
* spelling: continue
* spelling: convert
* spelling: counters
* spelling: create
* spelling: created
* spelling: cumulate
* spelling: currently
* spelling: debugging
* spelling: decryption
* spelling: description
* spelling: default
* spelling: driver
* spelling: delete
* spelling: destination
* spelling: disabled
* spelling: different
* spelling: dynamically
* spelling: directory
* spelling: disappeared
* spelling: disable
* spelling: doesn't
* spelling: download
* spelling: dropped
* spelling: enable
* spelling: established
* spelling: ether
* spelling: except
* spelling: expired
* spelling: field
* spelling: following
* spelling: forever
* spelling: firewall
* spelling: first
* spelling: fragment
* spelling: function
* spelling: gateway
* spelling: identifier
* spelling: identify
* spelling: incoming
* spelling: information
* spelling: initialize
* spelling: injection
* spelling: inner
* spelling: instead
* spelling: installation
* spelling: inserted
* spelling: integer
* spelling: interrupt
* spelling: intuitive
* spelling: interval
* spelling: january
* spelling: keybytes
* spelling: know
* spelling: language
* spelling: length
* spelling: library
* spelling: listener
* spelling: maintain
* spelling: modified
* spelling: necessary
* spelling: number
* spelling: obsoleted
* spelling: occurred
* spelling: occurring
* spelling: occur
* spelling: original
* spelling: omittable
* spelling: omit
* spelling: opening
* spelling: operation
* spelling: packet
* spelling: parameters
* spelling: pointed
* spelling: popupmenuopen
* spelling: privilege
* spelling: product
* spelling: protection
* spelling: promiscuous
* spelling: prompt
* spelling: query
* spelling: random
* spelling: reconnection
* spelling: revocation
* spelling: received
* spelling: red hat
* spelling: registry
* spelling: release
* spelling: retrieve
2018-05-16 23:47:10 +02:00
Daiyuu Nobori
7de986dcca
7 missing memory boundaries checks and similar memory problems. There are no risk of arbitrary code execution or intrusion on these bugs in my analysis. However, these problems may lead to crash the running server process. So these bugs must be fixed.
...
Buffer overread in ParseL2TPPacket()
Memory corruption in IcmpParseResult
Missing bounds check in ParseUDP() can lead to invalid memory access
Out-of-bounds read in IPsec_PPP.c (unterminated string buffer)
Overlapping parameters to memcpy() via StrToIp6()
PACK ReadValue() crash vulnerability
Potential use of uninitialized memory via IPToInAddr6()
4 memory leaks. While the amount of leakage is very small per time, these bugs can finally cause process crash by out of memory. So these bugs must be fixed.
Memory leak in NnReadDnsRecord
Memory leak in RadiusLogin()
Memory leak via ParsePacketIPv4WithDummyMacHeader
Remote memory leak in OpenVPN server code
1 coding improvement. This is not a bug, however, I fixed the code to avoid furture misunderstanding.
RecvAll can return success on failure (leading to use of uninitialized memory)
Contributors for this bugfix:
- Max Planck Institute for Molecular Genetics
- Guido Vranken
2018-01-15 10:25:10 +09:00
Daiyuu Nobori
ce3d35c595
Added the function to save the DNS query log on the packet logs. (fix)
2017-12-22 07:26:06 +09:00
Daiyuu Nobori
a0b54d7c6d
Added the TCP destination port 3128 (well known as Squid default port) to assume as the HTTP proxy port on the packet logging.
2017-12-21 23:25:08 +09:00
Daiyuu Nobori
97e7a82be2
Added the function to save the DNS query log on the packet logs.
2017-12-21 23:23:17 +09:00
Daiyuu Nobori
9f9dc459a7
Preparing the development branch
2017-10-19 15:00:41 +09:00
dnobori
faee11ff09
v4.23-9647-beta
2017-10-18 18:24:21 +09:00
dnobori
4df2eb4f9c
v4.22-9634-beta
2016-11-27 17:43:14 +09:00
Ilya Shipitsin
84f95447a3
cppcheck issues:
...
[src/Cedar/WebUI.c:1728] -> [src/Cedar/WebUI.c:1730]: (warning) Either the condition 'buf==0' is redundant or there is possible null pointer dereference: buf.
[src/Mayaqua/FileIO.c:383] -> [src/Mayaqua/FileIO.c:386]: (warning) Either the condition 'p==0' is redundant or there is possible null pointer dereference: p.
[src/Mayaqua/TcpIp.c:1837] -> [src/Mayaqua/TcpIp.c:1839]: (warning) Either the condition 'tcp!=0' is redundant or there is possible null pointer dereference: tcp.
2016-04-29 23:59:35 +05:00
dnobori
17e624ac26
v4.19-9605-beta
2016-03-06 23:16:01 +09:00
dnobori
4e862a7e40
v4.19-9582-beta
2015-10-06 20:18:00 +09:00
dnobori
860f743dd7
v4.17-9566-beta
2015-07-17 00:31:57 +09:00
dnobori
75f9836ce5
v4.12-9514-beta
2014-11-18 12:05:48 +09:00
dnobori
10d4b2c43d
v4.10-9505-beta
2014-10-04 00:09:23 +09:00
dnobori
9f7d8578a7
v4.10-9472-beta
2014-07-12 02:06:20 +09:00
dnobori
719ee999d6
v4.07-9448-rtm
2014-06-06 06:53:20 +09:00
dnobori
cf2a6a42bc
v4.06-9430-beta
2014-03-20 05:45:05 +09:00
dnobori
001fd910fe
v4.04-9412-rtm
2014-01-15 18:01:42 +09:00
dnobori
749497dde0
v4.03-9408-rtm
2014-01-04 22:00:08 +09:00