sni ircd

Text

$ openssl s_client -connect localhost:6697 -servername test.hackint.org -tlsextdebug
[...]
Certificate chain
0 s:/C=CH/ST=test.hackint.org/L=test.hackint.org/O=test.hackint.org/OU=test.hackint.org/CN=test.hackint.org/emailAddress=test.hackint.org
i:/C=CH/ST=test.hackint.org/L=test.hackint.org/O=test.hackint.org/OU=test.hackint.org/CN=test.hackint.org/emailAddress=test.hackint.org
[...]
:test.hub NOTICE * :*** You are connected with TLS

valgrind

Text

==17680== Jump to the invalid address stated on the next line
==17680== at 0x0: ???
==17680== by 0x5F283DB: SSL_CTX_use_certificate_chain_file (in /usr/lib/libssl.so.1.0.0)
==17680== by 0x4E45ABA: rb_setup_ssl_vserver (openssl.c:605)
==17680== by 0x13CD4C: validate_conf (s_conf.c:886)
==17680== by 0x13CD4C: read_conf (s_conf.c:845)
==17680== by 0x13CD4C: read_conf_files (s_conf.c:1429)
==17680== by 0x119439: main (ircd.c:674)
==17680== Address 0x0 is not stack'd, malloc'd or (recently) free'd

https://events.ccc.de/congress/2015/wiki/Special:Ask/-5B-5BHas-20object-20type::Event/-3FHas-20event-20title%3Dsummary/-3FHas-20start-20time%3Dstart/-3FHas-20end-20time%3Dend/-3FHas-20session-20location%3Dlocation/-3FHas-20url%3Durl/-3FHas-20description%3Ddescription/format%3Djson/limit%3D2342/searchlabel%3DExport-20this-20calendar-20as-20iCal/offset%3D0/prettyprint%3Dyes/

dmesg

Text

[ 0.000000] Initializing cgroup subsys cpuset
[ 0.000000] Initializing cgroup subsys cpu
[ 0.000000] Initializing cgroup subsys cpuacct
[ 0.000000] Linux version 4.3.0-1-MANJARO (builduser@manjaro) (gcc version 5.2.0 (GCC) ) #1 SMP PREEMPT Mon Nov 2 09:11:04 UTC 2015
[ 0.000000] x86/fpu: xstate_offset[2]: 0240, xstate_sizes[2]: 0100
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x01: 'x87 floating point registers'
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x02: 'SSE registers'
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x04: 'AVX registers'
[ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 0x340 bytes, using 'standard' format.
[ 0.000000] x86/fpu: Using 'eager' FPU context switches.

mantis

Text

abi@manjaro ~]$ dmesg | egrep -i "(mantis|dvb)"
[ 10.446368] found a VP-2040 PCI DVB-C device on (03:00.0),
[ 10.446454] Mantis Rev 1 [153b:1178], irq: 16, latency: 32
[ 10.446468] mantis_stream_control (0): Set stream to HIF
[ 10.446526] mantis_i2c_init (0): Initializing I2C ..
[ 10.446542] mantis_i2c_init (0): Disabling I2C interrupt
[ 10.446554] mantis_i2c_xfer (0): Messages:2
[ 10.446561] mantis_i2c_write: Address=[0x50] <W>[ 08 ]
[ 10.446573] mantis_i2c_read: Address=[0x50] <R>[ ff ff ff ff ff ff ]
[ 10.446655] mantis_dma_init (0): Mantis DMA init

#!/usr/bin/perl
use strict;
my %result;
sgetopt( [ 'h', 'e:', 'c:', 'o:', 'n' ], \%result);
print_usage() if (exists $result{'h'});
print_usage("Missing -c <core file> option") if (! exists $result{'c'});

libs

Text

(gdb) info sharedlibrary
From To Syms Read Shared Object Library
No linux-vdso.so.1
No /lib/x86_64-linux-gnu/libcrypt.so.1
No /home/atheme/shalture/lib/libmowgli-2.so.0
No /home/atheme/shalture/lib/libathemecore.so.1
No /lib/x86_64-linux-gnu/libc.so.6
No /lib/x86_64-linux-gnu/libdl.so.2
No /lib/x86_64-linux-gnu/librt.so.1
No /usr/lib/x86_64-linux-gnu/libssl.so.1.0.0

void Blowfish_Encrypt_Buffer_CBC(BLOWFISH_CTX *ctx, void *buffer_,
size_t length, void *iv_) {
uint64_t *buffer = buffer_;
uint64_t *iv = iv_;
uint64_t lastcb = *iv;
size_t i;
for (i = 0; i < length / 8; ++i) {
buffer[i] ^= lastcb;
Blowfish_Encrypt(ctx, (uint32_t *)(buffer+i), (uint32_t *)(buffer+i)+1);

void Blowfish_Encrypt_Buffer_CBC(BLOWFISH_CTX *ctx, void *buffer_,
size_t length, void *iv_) {
uint64_t *buffer = buffer_;
uint64_t *iv = iv_;
uint64_t lastcb = *iv;
size_t i;
for (i = 0; i < length / 8; ++i) {
buffer[i] ^= lastcb;
Blowfish_Encrypt(ctx, (uint32_t *)(buffer+i), (uint32_t *)(buffer+i)+1);

void Blowfish_Encrypt_Buffer_CBC(BLOWFISH_CTX *ctx, void *buffer_,
size_t length, void *iv_) {
uint64_t *buffer = buffer_;
uint64_t *iv = iv_;
uint64_t lastcb = *iv;
size_t i;
for (i = 0; i < length / 8; ++i) {
buffer[i] ^= lastcb;
Blowfish_Encrypt(ctx, (uint32_t *)(buffer+i), (uint32_t *)(buffer+i)+1);