History log of /openbsd/usr.sbin/rpki-client/ip.c (Results 1 – 25 of 33)
Revision Date Author Comments
# 335482ab 19-Mar-2024 tb <tb@openbsd.org>

Rename parent to issuer in struct auth

Parent is confusing and issuer is the appropriate terminology. This is
a mechanical diff. The only remaining uses of 'parent' in this code
base now mean 'paren

Rename parent to issuer in struct auth

Parent is confusing and issuer is the appropriate terminology. This is
a mechanical diff. The only remaining uses of 'parent' in this code
base now mean 'parent process'.

discussed with beck and job
ok job

show more ...


# 4032f119 27-Dec-2023 tb <tb@openbsd.org>

Rework the warnings on internet resources

Unify the printing of warnings about AS numbers and IP address blocks to
use a call to as_warn() and ip_warn(). Fix a bug in the latter where the
upper boun

Rework the warnings on internet resources

Unify the printing of warnings about AS numbers and IP address blocks to
use a call to as_warn() and ip_warn(). Fix a bug in the latter where the
upper bound of an IP range didn't take the RFC 3779 encoding into account
and passed the address directly to inet_pton() rather than filling the
missing bits with 1. Switch the argument order to match the warnings and
tweak some warning messages.

ok claudio job

show more ...


# 76dbb2b6 18-Oct-2023 tb <tb@openbsd.org>

rpki-client: move inherit in {ip,as}_warn()

While alphabetic order makes sense, having inherit between individual
AS and IP entries and ranges makes little sense. Use the order that we
have elsewher

rpki-client: move inherit in {ip,as}_warn()

While alphabetic order makes sense, having inherit between individual
AS and IP entries and ranges makes little sense. Use the order that we
have elsewhere.

ok claudio job

show more ...


# 8b5bbbc5 18-Oct-2023 tb <tb@openbsd.org>

rpki-client: rework ip_addr_check_overlap()

Avoid conditional early returns and significantly simplify the printing
of ip addresses/ranges by using the new ip_warn(). This also eliminates
an extreme

rpki-client: rework ip_addr_check_overlap()

Avoid conditional early returns and significantly simplify the printing
of ip addresses/ranges by using the new ip_warn(). This also eliminates
an extremely weird usage of the comma operator and reduces noise levels
quite a bit.

ok claudio job

show more ...


# 891d6bce 13-Oct-2023 job <job@openbsd.org>

Allow imposing constraints on RPKI trust anchors

The ability to constrain a RPKI Trust Anchor's effective signing
authority to a limited set of Internet Number Resources allows
Relying Parties to en

Allow imposing constraints on RPKI trust anchors

The ability to constrain a RPKI Trust Anchor's effective signing
authority to a limited set of Internet Number Resources allows
Relying Parties to enjoy the potential benefits of assuming trust,
within a bounded scope.

Some examples: ARIN does not support inter-RIR IPv6 transfers, so
it wouldn't make any sense to see a ROA subordinate to ARIN's trust
anchor covering RIPE-managed IPv6 space. Conversely, it wouldn't
make sense to observe a ROA covering ARIN-managed IPv6 space under
APNIC's, LACNIC's, or RIPE's trust anchor - even if a derived trust
arc (a cryptographically valid certificate path) existed. Along these
same lines, AFRINIC doesn't support inter-RIR transfers of any kind,
and none of the RIRs have authority over private resources like
10.0.0.0/8 and 2001:db8::/32.

For more background see:
https://datatracker.ietf.org/doc/draft-snijders-constraining-rpki-trust-anchors/
https://mailman.nanog.org/pipermail/nanog/2023-September/223354.html

With and OK tb@, OK claudio@

show more ...


# 782a58ff 25-Sep-2023 job <job@openbsd.org>

Introduce ip_addr_range_print() to avoid code repetition

OK tb@


# 77e4b1bd 29-Nov-2022 job <job@openbsd.org>

Only include stdarg.h, if we call any of va_{start,end}()

OK tb@


# cd1c3779 29-Nov-2022 job <job@openbsd.org>

Only include assert.h if we call assert()

OK tb@


# e89c20d8 15-May-2022 tb <tb@openbsd.org>

More KNF and whitespace fixes.


# 5ddaa218 15-May-2022 deraadt <deraadt@openbsd.org>

whitespace spotted during read-thru


# 9eb589bc 13-May-2022 tb <tb@openbsd.org>

Fix unused bits handling for ip addresses

If ASN1_STRING_FLAG_BITS_LEFT is set, only the lower three bits of the
flags represent the unused bits. Other flags have nothing to with
lengths, so stop in

Fix unused bits handling for ip addresses

If ASN1_STRING_FLAG_BITS_LEFT is set, only the lower three bits of the
flags represent the unused bits. Other flags have nothing to with
lengths, so stop interpreting them as such and throwing strange errors.

ok claudio

show more ...


# 1377f46c 11-May-2022 tb <tb@openbsd.org>

Zap stray space


# 6822deef 26-Dec-2021 tb <tb@openbsd.org>

fix spelling of inheritance


# 83e5a181 10-Nov-2021 claudio <claudio@openbsd.org>

Collaps the AFI specific IP print functions into ip_addr_print() their
only difference was the buffersize and AF argument to inet_ntop.
Use INET6_ADDRSTRLEN as the buffer size and convert the AFI to

Collaps the AFI specific IP print functions into ip_addr_print() their
only difference was the buffersize and AF argument to inet_ntop.
Use INET6_ADDRSTRLEN as the buffer size and convert the AFI to AF in
a switch statement.
OK denis@ kn@ deraadt@

show more ...


# 4ef6f693 05-Nov-2021 claudio <claudio@openbsd.org>

Simplify how IP addresses and AS numbers are passed between processes.
Since they are stored in an array just blast the full array in and out
of the io buffers at once instead of iterating element by

Simplify how IP addresses and AS numbers are passed between processes.
Since they are stored in an array just blast the full array in and out
of the io buffers at once instead of iterating element by element.
It also allows to remove a lot of extra code.
OK benno@ job@

show more ...


# 7eb79a4a 23-Oct-2021 claudio <claudio@openbsd.org>

Finnally move away from blocking reads in rpki-client. The code was a
mish mash of poll, non-blocking writes and blocking reads. Using the
introduced ibuf size header in io_buf_new()/io_buf_close() t

Finnally move away from blocking reads in rpki-client. The code was a
mish mash of poll, non-blocking writes and blocking reads. Using the
introduced ibuf size header in io_buf_new()/io_buf_close() the read
side can be changed to pull in a full ibuf and only start the un-marshal
once all data has been read.
OK benno@

show more ...


# 95b65f7c 19-Apr-2021 deraadt <deraadt@openbsd.org>

code review results in KNF, and moving local variables into lowest scope
ok claudio


# cdf38902 29-Mar-2021 deraadt <deraadt@openbsd.org>

Check all inet_ntop() calls, in case we screw up the parameters somehow we
prefer a failure rather than some sort of weird truncation
ok claudio


# 039499fc 29-Mar-2021 deraadt <deraadt@openbsd.org>

3 additional snprintf() range checks (inconceivable these would ever
truncate, but if they do, we prefer to know)
ok job claudio


# 08db1177 08-Jan-2021 claudio <claudio@openbsd.org>

Start using the ibuf API (ibuf_dynamic, ibuf_add, ibuf_close) for writing
data between processes. This completely decouples the write side.
rpki-client can't really use the imsg framework but it can

Start using the ibuf API (ibuf_dynamic, ibuf_add, ibuf_close) for writing
data between processes. This completely decouples the write side.
rpki-client can't really use the imsg framework but it can use the ibuf
bits wich imsg is built on.
OK benno@ job@

show more ...


# 0102fb1b 12-Sep-2020 claudio <claudio@openbsd.org>

Include openssl/x509.h in extern.h since it uses a few of the typedefs from
there in structs and prototypes. Remove the openssl/ssl.h and other strange
openssl includes in the .c files that don't use

Include openssl/x509.h in extern.h since it uses a few of the typedefs from
there in structs and prototypes. Remove the openssl/ssl.h and other strange
openssl includes in the .c files that don't use openssl specific functions.
OK beck@ and tb@

show more ...


# fac5751d 16-Apr-2020 claudio <claudio@openbsd.org>

It is unclear why data is memcpy-ed into a char buf[2] that is used as
argument to ntohs(). Just memcpy to a uint16_t value and ntohs this value.
Fixes possible alignment issues as reported by newer

It is unclear why data is memcpy-ed into a char buf[2] that is used as
argument to ntohs(). Just memcpy to a uint16_t value and ntohs this value.
Fixes possible alignment issues as reported by newer gcc compilers.
OK beck@

show more ...


# fd8880f6 16-Apr-2020 claudio <claudio@openbsd.org>

Revert last commit, this file slipped in.


# 541ce356 16-Apr-2020 claudio <claudio@openbsd.org>

Replace deprecated ERR_remove_state(0) with ERR_remove_thread_state(NULL);
OK tb@


# 60b5b204 27-Nov-2019 deraadt <deraadt@openbsd.org>

swap some comparisons


12