validns
validns copied to clipboard
DNS and DNSSEC zone file validator
The 'bad signature' error messages appear to have changed. Adjust test to accept both old anew new style openssl error strings.
First patch gets it compiled with gcc-8. Second patch is updated patch initially made by FauxFaux. I addressed my own review by checking for possible NULL pointer and dropping the...
Mostly cosmetic changes, apart from the change to free the `ctx` in `rrsig.c`'s `verify_all_keys`. I'm pretty sure this is the correct place, but the threading and allocation code is quite...
[root@d59634ac316b validns]# rpm -q Judy-devel Judy-devel-1.0.5-18.module+el8+2765+cfa4f87b.x86_64 [root@d59634ac316b validns]# rpm -q openssl-devel openssl-devel-1.1.1g-15.el8_3.x86_64 [root@d59634ac316b validns]# rpm -q gcc gcc-8.4.1-1.el8.x86_64 ``` rrsig.c:30:16: error: field 'ctx' has incomplete type EVP_MD_CTX ctx; ^~~ rrsig.c:...
It would be great if valiDNS would be able to take advantage of all available CPU power to speed things up.
- Draft Recommendations: https://tools.ietf.org/html/draft-mu-curdle-ssh-xmss-00 - Done during IETF 106 Hackathon
I found two occurences of NULL pointer dereferences when fuzzing validns with American Fuzzy Lop. 1) The first occurence happens in the name2findable_name() function, and can be triggered with the...
In other words, it must either be EOF or a value representable by an unsigned char. Here we simply cast all the arguments to these functions to "unsigned char".
please port to openssl-1.1 and gcc8