Skip to content
Snippets Groups Projects
Select Git revision
  • 1.2
  • add-version-in-lua
  • additional-path-fixes
  • anb/cache-stats
  • cache-aggr
  • cache-aggr-wip
  • ci-enable-infer
  • ci-ulimit
  • client-subnet-wip
  • dns-over-tls-client
  • dnssec-by-default
  • docker-fix
  • dont-fragment-mtu
  • draft-huston-kskroll-sentinel
  • http-allow-reuseport
  • http-server
  • icann-servfail
  • ioreq_spawn-assert
  • keyfile-arg
  • kresc
  • v1.5.1
  • v1.5.0
  • v1.99.1-alpha
  • v1.4.0
  • v1.3.3
  • v1.3.2
  • v1.3.1
  • v1.3.0
  • 1.3.0-rc1
  • v1.2.6
  • v1.2.5
  • v1.2.4
  • v1.2.3
  • v1.2.2
  • v1.2.1
  • v1.2.0
  • v1.2.0-rc3
  • v1.2.0-rc2
  • v1.2.0-rc1
  • v1.1.1
40 results
You can move around the graph by using the arrow keys.
Created with Raphaël 2.2.011Aug9865429Jul282019171613121165130Jun2822211631May3029272627252322211917181714121065317Apr151413765429Mar281085324Feb232217121183230Jan29222120191815121110823Dec1711109876543229Nov28272625242120191817161513125329Oct28272624232220191815141312111098765432130Sep2928272524232221191817Preparations for using nsrep mechanism to guess response origin.Temporarily fixed packet corruption when adding cookie data.Added code trying to obtain client IP address from libuv UDP handle.Using actual remote server address to re-generate cookie.Obtaining server IP address when generating query.Resolver is able to insert dummy client cookies into generated requests.Trying to insert cookies into request form layer.Introduced empty cookies module.lib/generic: fixed typo in lru codescripts: bumped used libknot version to 2.3.0daemon/lua: support new libknot 2.3 soversionMerge branch 'fix-segfault-in-early-quit' into 'master' Fix segmentation fault in early shutdown from `quit()` in configMerge branch 'tls-listen' into 'master' Merge branch 'unbuffer-kr_log_info' into 'master' Ensure that kr_log_info() gets sent promptly to stdoutdaemon/tls: cleanup, documented tls functionsMake the travis builds verbosegnutls_certificate_get_x509_crt requires gnutls 3.4.0Log key-pinning strings for TLS keysdaemon/main.c, daemon/bindings.c, daemon/tls.c, daemon/worker.h: cleanupMove tls_credentials to struct networkprovide a way for systemd-supervised services to listen on TLS via socket activationinitialize GnuTLS logging cleanly, once at daemon/worker start.Remove the extra indirection in tls_certificate_freeMove struct tls_credentials_t from daemon/worker.h to daemon/tls.hdaemon/tls: cleanupFix the memory leak by returning kr_error(ECONNRESET) on end of streamAdd reference counting to gnutls credentials, so they don't get destroyed while usedInitialize global TLS credentials in the worker_ctx and initialize GnuTLS logging at global levelMiscelaneous fixes in coding styleRevert default EDNS0 buffer size to 4096daemon: lower minimum allowed edns bufsize to 512listen using TLS on specific socketsfix kresd internal help docs, describe --tls in kresd(8)Handle more processing from tls_process to worker_process_tcpdaemon/tls: fixed improper use of callback, leaksdaemon/tls: process all records on inputWIP: first pass at TLS implementationdaemon/network: global TLS certificate and key configuration