Compare commits

..

3 Commits

Author SHA1 Message Date
Dennis Schwerdel dec23b79c8 Bugfix release 2019-02-16 15:42:03 +01:00
Dennis Schwerdel 8e678271af Fixed bug in new hex secret key functionality 2019-02-16 15:21:02 +01:00
Dennis Schwerdel d2b6eb84cc Renamed PID file to .pid 2019-02-16 14:36:29 +01:00
6 changed files with 15 additions and 5 deletions

View File

@ -2,6 +2,10 @@
This project follows [semantic versioning](http://semver.org).
### v0.9.1 (2019-02-16)
-[fixed] Fixed bug in new hex secret key functionality
### v0.9.0 (2019-02-15)
- [added] Added support for cross-compilation

2
Cargo.lock generated
View File

@ -622,7 +622,7 @@ source = "registry+https://github.com/rust-lang/crates.io-index"
[[package]]
name = "vpncloud"
version = "0.9.0"
version = "0.9.1"
dependencies = [
"bitflags 1.0.4 (registry+https://github.com/rust-lang/crates.io-index)",
"cc 1.0.29 (registry+https://github.com/rust-lang/crates.io-index)",

View File

@ -1,6 +1,6 @@
[package]
name = "vpncloud"
version = "0.9.0"
version = "0.9.1"
authors = ["Dennis Schwerdel <schwerdel@googlemail.com>"]
build = "build.rs"
license = "GPL-3.0"

View File

@ -1,3 +1,9 @@
vpncloud (0.9.1) stable; urgency=medium
* [fixed] Fixed bug in new hex secret key functionality
-- Dennis Schwerdel <schwerdel@googlemail.com> Sat, 16 Jan 2019 15:21:32 +0100
vpncloud (0.9.0) stable; urgency=medium
* [added] Added support for cross-compilation

View File

@ -4,9 +4,9 @@ Before=systemd-user-sessions.service
[Service]
Type=forking
ExecStart=/usr/bin/vpncloud --config /etc/vpncloud/%i.net --daemon --log-file /var/log/vpncloud-%i.log --stats-file /var/log/vpncloud-%i.stats --pid-file /run/vpncloud-%i.run
ExecStart=/usr/bin/vpncloud --config /etc/vpncloud/%i.net --daemon --log-file /var/log/vpncloud-%i.log --stats-file /var/log/vpncloud-%i.stats --pid-file /run/vpncloud-%i.pid
WorkingDirectory=/etc/vpncloud
PIDFile=/run/vpncloud-%i.run
PIDFile=/run/vpncloud-%i.pid
[Install]
WantedBy=multi-user.target

View File

@ -107,7 +107,7 @@ impl Crypto {
fail!("Raw secret key must be exactly {} bytes long", algo.key_len());
}
for i in 0..algo.key_len() {
key[i] = try_fail!(u8::from_str_radix(&password[2*i..2*i+1], 16), "Failed to parse raw secret key: {}");
key[i] = try_fail!(u8::from_str_radix(&password[2*i..=2*i+1], 16), "Failed to parse raw secret key: {}");
}
} else {
let password = if password.starts_with(HASH_PREFIX) {