jmc [Mon, 15 Jul 2024 05:36:08 +0000 (05:36 +0000)]
bioctl.8:
- tweak bioctl text
- don;t repeat the device examples
- reinstate softraid device being always softraid0
usage():
- add vertical blank between two formats
- rewrap to match 80col (shorter and matches man)
feedback/ok krw kn
anton [Mon, 15 Jul 2024 05:24:02 +0000 (05:24 +0000)]
enable warnings and apply a dash of knfmt
jsg [Mon, 15 Jul 2024 00:11:59 +0000 (00:11 +0000)]
ocurred -> occurred
sashan [Sun, 14 Jul 2024 19:51:08 +0000 (19:51 +0000)]
This change allows user to define table inside the anchor like that:
anchor foo {
table <bar> { 192.168.1.1 }
pass in from <bar> to <self>
}
Without this diff one must either create table <bar> in main
ruleset (root) or use 'pfctl -a foo -t bar -T add 192.168.1.1'
This glitch is hard to notice. Not many human admins try to attach
tables to non-global anchors. Deamons which configure pf(4) automatically
at run time such as relayd(8) and spamd(8) create tables attached to
thair anchors (for example 'relayd/*') but the deamons use way similar
to pfctl(8) to add and manage those tables.
The reason why I'd like to seal this gap is that my long term goal
is to turn global `pfr_ktable` in pf(4) into member of pf_anchor.
So each ruleset will get its own tree of tables.
feedback and OK bluhm@
miod [Sun, 14 Jul 2024 19:33:59 +0000 (19:33 +0000)]
Add missing <machine/elf.h> for compound arches.
The spice^Wkernel must flow^Wbuild.
bluhm [Sun, 14 Jul 2024 18:53:39 +0000 (18:53 +0000)]
Unlock IPv6 sysctl net.inet6.ip6.forwarding from net lock.
Use atomic operations to read ip6_forwarding while processing packets
in the network stack.
To make clear where actually the router property is needed, use the
i_am_router variable based on ip6_forwarding. It already existed
in nd6_nbr. Move i_am_router setting up the call stack until all
users are independent.
The forwarding decisions in pf_test, pf_refragment6, ip6_input do
also not interfere.
Use a new array ipv6ctl_vars_unlocked to make transition of all the
integer sysctls easier. Adapt IPv4 to the new style.
OK mvs@
anton [Sun, 14 Jul 2024 18:49:32 +0000 (18:49 +0000)]
enable warnings and fix complaints
jmc [Sun, 14 Jul 2024 18:11:18 +0000 (18:11 +0000)]
fix SEE ALSO and a word tweak;
jmc [Sun, 14 Jul 2024 18:09:05 +0000 (18:09 +0000)]
grammar and macro tweaks;
jmc [Sun, 14 Jul 2024 18:03:59 +0000 (18:03 +0000)]
zap a stray Nd line;
yasuoka [Sun, 14 Jul 2024 16:22:59 +0000 (16:22 +0000)]
Add radiusd_file(5) and link it from radiusd.conf(5).
yasuoka [Sun, 14 Jul 2024 16:09:23 +0000 (16:09 +0000)]
Add new radiusd_eap2mschap module. It provides conversions from EAP
to MSCHAPv2.
krw [Sun, 14 Jul 2024 16:09:06 +0000 (16:09 +0000)]
Shuffle verbiage to make page more general. e.g. by mentioning
nvme(4).
Feedback jmc@ jmatthew@ deraadt@ kn@
ok jmc@ kn@
tb [Sun, 14 Jul 2024 16:06:31 +0000 (16:06 +0000)]
Rewrite EVP_PKEY_add1_attr_by_NID()
Instead of jumping through many layers that cause headache, we can achieve
the same in an entirely straightforward way without losing clarity.
ok jsing
tb [Sun, 14 Jul 2024 16:04:10 +0000 (16:04 +0000)]
Disable most EVP_PKEY_*attr* API
There is a single consumer of this entire family of function, namely
the openssl(1) pkcs12 command uses EVP_PKEY_add1_attr_by_NID, so leave
that one intact for now.
ok jsing
tb [Sun, 14 Jul 2024 15:56:08 +0000 (15:56 +0000)]
Forgot to annotate the TMP UGLY CAST[S] as requested by jsing
h/t to levitte
tb [Sun, 14 Jul 2024 15:48:24 +0000 (15:48 +0000)]
Document SSL_CIPHER_get_handshake_digest(3)
bluhm [Sun, 14 Jul 2024 15:42:23 +0000 (15:42 +0000)]
Fix source and drain confusion in socket splicing somove().
If a large mbuf in the source socket buffer does not fit into the
drain buffer, split the mbuf. But if the drain buffer still has
some data in it, stop moving data and try again later. This skips
a potentially expensive mbuf operation.
When looking which socket buffer has to be locked, I found that the
length of the source send buffer was checked. Change it to drain.
As this is a performance optimization for a special corner case,
noone noticed the bug.
OK sashan@
tb [Sun, 14 Jul 2024 15:39:36 +0000 (15:39 +0000)]
Prepare to provide SSL_CIPHER_get_handshake_digest()
Needed by newer freeradius. This is a straightforward implementation that
essentially duplicates tls13_cipher_hash().
ok jsing
yasuoka [Sun, 14 Jul 2024 15:31:49 +0000 (15:31 +0000)]
Move radius_attr_{,un}hide() to radius_subr.c.
yasuoka [Sun, 14 Jul 2024 15:27:57 +0000 (15:27 +0000)]
Add "authentication-filter". Add new 2 imsg types so that
authentication modules can request the next authentication and the
next authentication can receive the result of the previous and modify
the result.
yasuoka [Sun, 14 Jul 2024 15:13:41 +0000 (15:13 +0000)]
Set length of MPPE send/recv key.
jsing [Sun, 14 Jul 2024 14:32:45 +0000 (14:32 +0000)]
Remove lhash_local.h.
lhash_local.h was previously needed since conf/conf_api.c and
objects/obj_dat.c were fiddling with lhash internals when deleting via a
callback. Since we no longer need to do that, inline the structs in
lhash.c and remove the header.
ok tb@
jca [Sun, 14 Jul 2024 14:32:02 +0000 (14:32 +0000)]
Zap trailing whitespace
Dummy commit to trigger the git exporter.
jmatthew [Sun, 14 Jul 2024 14:04:16 +0000 (14:04 +0000)]
Only match if we can find a corresponding cpu device. This means the
many extra ACPI0007 instances found in current generation servers no
longer fill up dmesg with noise.
ok kettenis@
jmatthew [Sun, 14 Jul 2024 13:58:57 +0000 (13:58 +0000)]
For specific hids (currently only ACPI0007, acpicpu(4)), use a print
function that always returns QUIET so instances that don't get matched
are not reported.
ok kettenis@
yasuoka [Sun, 14 Jul 2024 13:44:30 +0000 (13:44 +0000)]
Add radiusd_file(8) module. It provides authencation by a local file.
yasuoka [Sun, 14 Jul 2024 13:36:44 +0000 (13:36 +0000)]
Add "radiusd" field to struct radius_query.
millert [Sun, 14 Jul 2024 13:31:50 +0000 (13:31 +0000)]
Fix printf(3) signal safety for wide character strings.
The %ls (wide char string) support in printf(3) currently uses
malloc(3), which violates the promise in in sigaction(2). This
makes it use mmap(2) instead. OK deraadt@
tobhe [Sun, 14 Jul 2024 13:13:33 +0000 (13:13 +0000)]
Fail explicitly on unexptected imsg->hdr_type. Otherwise the following
comparison is undefined.
jca [Sun, 14 Jul 2024 11:36:54 +0000 (11:36 +0000)]
Actually provide *definitions* for hwcap & hwcap2
Double checked by kettenis@
Sorry for the time window with breakage visible on arm64 and riscv64. :-/
jca [Sun, 14 Jul 2024 11:14:29 +0000 (11:14 +0000)]
Actually set up hwcap AUX_* entries when available
Erroneously dropped from the last elf_aux_info(3) diff I sent on tech@.
Lack of this chunk would affect arm64 and riscv64 as they're the two
architectures providing hwcap*.
Should have been ok kettenis@
yasuoka [Sun, 14 Jul 2024 11:12:32 +0000 (11:12 +0000)]
Mistakenly the same challenge is used for testing CHAP.
yasuoka [Sun, 14 Jul 2024 10:52:50 +0000 (10:52 +0000)]
Make the lines of md5chap understandable.
kettenis [Sun, 14 Jul 2024 10:50:39 +0000 (10:50 +0000)]
In addition to setting the PCI power state, also run the appropriate _PSx
method that matches the target state.
ok deraadt@
kettenis [Sun, 14 Jul 2024 10:48:55 +0000 (10:48 +0000)]
Upon first suspend, turn off all power resources that haven't been
referenced.
ok deraadt@
jsg [Sun, 14 Jul 2024 10:19:23 +0000 (10:19 +0000)]
fix double word; ok dtucker@
jca [Sun, 14 Jul 2024 10:04:17 +0000 (10:04 +0000)]
Add wcsnlen(3) declaration, missed in previous.
jca [Sun, 14 Jul 2024 09:57:11 +0000 (09:57 +0000)]
Sync sets after elf_aux_info(3) and wcsnlen(3) additions + libc bump
jca [Sun, 14 Jul 2024 09:54:56 +0000 (09:54 +0000)]
Bump minor after elf_aux_info(3) and wcsnlen(3) additions
jca [Sun, 14 Jul 2024 09:51:18 +0000 (09:51 +0000)]
Add wcsnlen(3), wcslen(3) with a max len argument
Missing function hit by fcambus@ some time ago. ok millert@
jca [Sun, 14 Jul 2024 09:48:48 +0000 (09:48 +0000)]
Add elf_aux_info(3)
Designed to let userland peek at AT_HWCAP and AT_HWCAP2 using an already
existing interface coming from FreeBSD. Headers bits were snatched from
there. Input & ok kettenis@
libc bump and sets sync will follow soon
deraadt [Sun, 14 Jul 2024 09:41:43 +0000 (09:41 +0000)]
sync
matthieu [Sun, 14 Jul 2024 09:39:15 +0000 (09:39 +0000)]
Add /usr/X11R6/include/va. ok tb@
florian [Sun, 14 Jul 2024 08:57:32 +0000 (08:57 +0000)]
sync slaacd(8) log.c to dhcpleased(8)'s version.
We don't built log.c on the ramdisk so no need for ifndef small.
florian [Sun, 14 Jul 2024 08:45:05 +0000 (08:45 +0000)]
log_getverbose() is a void function
pointed out by tb
florian [Sun, 14 Jul 2024 08:41:54 +0000 (08:41 +0000)]
sync slaacd(8) log.h to dhcpleased(8) log.h
- include stdlib.h for exit(3)
- knf fixes
- define log_getverbose as (0) instead of 0
input & OK tb
dv [Sun, 14 Jul 2024 07:57:42 +0000 (07:57 +0000)]
vmm(4)/vmx: update host cr3, invept on cpu migration.
Since vmm handles nested page faults in the vcpu run loop, trying
to avoid trips back to userland, it's possible for the thread to
move host cpus. vmm(4) already updates some local cpu state when
this happens, but also needs to update the host cr3 in the vmcs to
allow vmx to restore the proper cr3 value on the next vm exit.
Additionally, we should be flushing the ept cache on the new cpu.
If the single context flush is available, use that instead of the
global flush.
ok mlarkin@
tb [Sun, 14 Jul 2024 06:34:04 +0000 (06:34 +0000)]
Unbreak tree by defining log_getverbose() for SMALL builds
ok anton florian
jsg [Sun, 14 Jul 2024 05:53:09 +0000 (05:53 +0000)]
"please refer" -> "refer"
missed in 2022 "remove please from manual pages" commit
ok tb@
jsg [Sun, 14 Jul 2024 03:58:49 +0000 (03:58 +0000)]
new sentence, new line
jsg [Sun, 14 Jul 2024 03:53:18 +0000 (03:53 +0000)]
spelling
jsg [Sun, 14 Jul 2024 03:47:44 +0000 (03:47 +0000)]
spelling
mlarkin [Sat, 13 Jul 2024 22:12:41 +0000 (22:12 +0000)]
mmio.c is now empty and can be removed
mmio.c was moved to x86_mmio.c with dv@'s recent refactoring. The resulting
empty file can be removed now.
tb [Sat, 13 Jul 2024 18:33:18 +0000 (18:33 +0000)]
ssl2.h and ssl23.h join the party in the attic
Now that the SSL2 client hello support is gone, nothing uses this anymore,
except that a few ports still need SSL2_VERSION.
ok beck
tb [Sat, 13 Jul 2024 17:42:13 +0000 (17:42 +0000)]
Make error constants const in libssl
This could be made cleaner if we expose ERR_load_const_strings(), but for
now this hackier version with casts achieves the same and removes the last
unprotected modifiable globals in this library.
ok jsing
tb [Sat, 13 Jul 2024 16:43:56 +0000 (16:43 +0000)]
Move the sigaction next to multi
Reduces diff in -portable
dv [Sat, 13 Jul 2024 16:13:45 +0000 (16:13 +0000)]
Add missing RCS header to vmd(8)'s vmm.h.
Apparently it never had one. It's rarely touched, so went unnoticed.
florian [Sat, 13 Jul 2024 16:06:34 +0000 (16:06 +0000)]
Reduce if_indextoname(3) usage.
Don't ask the kernel to translate an if_index to a name if we are not
running with verbose logging, it's not free.
kettenis [Sat, 13 Jul 2024 15:38:21 +0000 (15:38 +0000)]
Implement some more suspend/resume Linux compat such that inteldrm(4) can
achieve RC6 and save a significant amount of power for S0i.
ok jsg@
krw [Sat, 13 Jul 2024 15:28:42 +0000 (15:28 +0000)]
Mention nvme(4) and gdt(4) as devices that register with bio(4).
ok deraadt@
tb [Sat, 13 Jul 2024 15:08:58 +0000 (15:08 +0000)]
Unify X.509v3 extension methods
Use C99 initializers for all structs (some were forgotten).
Make all the structs static, call them x509v3_ext_* matching NID_*.
Add accessors called x509v3_ext_method_* and use these to implement
X509V3_EXT_get_nid().
This adds consistency and avoids a few contortions like grouping
a few extensions in arrays to save a couple externs.
ok beck jsing
beck [Sat, 13 Jul 2024 14:37:55 +0000 (14:37 +0000)]
Revert the vdoom change, while it prevents the crashes on joel's go
builder and avoids the ufs_inactive problems, bluhm hits panics on
shutdown and filesystem unmount on the regress testers.
We'll have to try the other approach of detecting the corrupted
vnode perhaps.
yasuoka [Sat, 13 Jul 2024 14:28:27 +0000 (14:28 +0000)]
NULL check must be inside the loop. found tobhe
ok tobhe
yasuoka [Sat, 13 Jul 2024 14:19:09 +0000 (14:19 +0000)]
Fix radius.c again^2. Cancel previous and revert the latest one
(sent to tech@).
yasuoka [Sat, 13 Jul 2024 14:08:53 +0000 (14:08 +0000)]
Fix radius.c again. Previous was old one.
bluhm [Sat, 13 Jul 2024 13:20:44 +0000 (13:20 +0000)]
Add condition to ip_gre.c in files.
Use gre condition in conf/files for compiling netinet/ip_gre.c only
if needed. Remove #if NGRE > 0 from ip_gre.c that caused ramdisk
build to compile an empty C file.
OK kn@ deraadt@; input jsg@
yasuoka [Sat, 13 Jul 2024 13:06:47 +0000 (13:06 +0000)]
Use calloc(3) instead of malloc(3). "accounting" is used without
initialization. Also don't check request authenticator for other than
Accounting-Request.
jmc [Sat, 13 Jul 2024 12:58:51 +0000 (12:58 +0000)]
grammar/macro fixes for the radius text;
yasuoka [Sat, 13 Jul 2024 12:25:07 +0000 (12:25 +0000)]
Fix radius.c. Previous it was broken.
yasuoka [Sat, 13 Jul 2024 12:22:46 +0000 (12:22 +0000)]
Add RADIUS support. Authentication, accounting, and "Dynamic
Authorization Extensions"(DAE) are supported.
feedback markus stu
ok tobhe
bluhm [Sat, 13 Jul 2024 12:00:11 +0000 (12:00 +0000)]
Mark IP protocol GRE as MP safe from socket layer.
The pipex code in gre_send() matches more or less what udp_send()
does. This has been MP safe for a long time. rip_send() is already
called with PR_MPSOCKET.
OK mvs@
bluhm [Sat, 13 Jul 2024 10:09:40 +0000 (10:09 +0000)]
Previous commit broke RAMDISK_CD kernel build. Always include udp.h
in ip6_forward.c.
bluhm [Sat, 13 Jul 2024 09:34:26 +0000 (09:34 +0000)]
Do not store full IPv6 packet in common forwarding case.
Forwarding IPv6 packets is slower than IPv4. Reason is that m_copym()
is done for every packet. Just in case we may have to send an ICMP6
packet, ip6_forward() creates a mbuf copy. After that mbuf cluster
is read only, so for the ethernet header another mbuf is allocated.
pf NAT and RDR ignores readonly clusters, so it also modifies the
potential ICMP6 packet.
IPv4 ip_forward() avoids all these problems by copying the leading
68 bytes of the original packets onto the stack. More is not need
for ICMP. IPv6 RFC 4443 2.4. (c) requires up to 1232 bytes in the
ICMP6 packet. This cannot be copied to the stack.
The reason for the difference in the standard seems to be that the
ICMP6 packet has to contain the full header chain. If we have a
simple TCP, UDP or ESP packet without chain, do a shortcut and just
preserve the header for the ICMP6 packet.
Small packets already use stack memory, large packets need extra
mbuf allocation. Now truncate ICMP6 packet to a reasonable length
if the original packets has a final protocol header directly after
the IPv6 header. List of suitable protocols contains TCP, UDP, ESP
as they cover the common cases and anything behind the header should
not be needed for path MTU discovery.
OK deraadt@ florian@ mvs@
dv [Sat, 13 Jul 2024 08:59:41 +0000 (08:59 +0000)]
Backout previous change related to not freeing memory on suspend.
It broke resume from hibernate. :(
asou [Sat, 13 Jul 2024 07:25:38 +0000 (07:25 +0000)]
Implement investigate kernel corefile to lldb.
bluhm [Fri, 12 Jul 2024 19:50:35 +0000 (19:50 +0000)]
Remove internet PCB mutex.
All incpb locking has been converted to socket receive buffer mutex.
Per PCB mutex inp_mtx is not needed anymore. Also delete PRU related
locking functions. A flag PR_MPSOCKET indicates whether protocol
functions support parallel access with per socket rw-lock.
TCP is the only protocol that is not MP capable from the socket
layer and needs exclusive netlock.
OK mvs@
florian [Fri, 12 Jul 2024 19:11:25 +0000 (19:11 +0000)]
Rewrite bytes/sec calculation using fixed point math.
This makes signal handler safe on OpenBSD.
To avoid overflows the accuracy is scaled. Above 10 minutes run time
we only care about second accuracy. Between 1 seconds and 10 minutes
we use millisecond accuracy.
Below one second we use nanoseconds, but those numbers are probably
meaningless.
Signal handler problem pointed out by deraadt
OK deraadt, millert, tb
beck [Fri, 12 Jul 2024 18:15:10 +0000 (18:15 +0000)]
Fix the horrible and undocumented behaviour of X509_check_trust
Of allowing you to pass in a NID directly, instead of a trust_id,
and have it work, as long as the trust_id's and the NID's did not
overlap.
This screwball behaviour was depended upon by the OCSP code that
called X509_check_trust with the NID, instead of the trust id, so
let's fix that.
We also rename the confusingly named X509_TRUST_DEFAULT to
X509_TRUST_ACCEPT_ALL which makes a lot more sense, and rototill
this to remove the confusingly named static functions.
This will shortly be follwed up by making this function private,
so we have not bothered to fix the amazingly obtuse man page
as it will be taken behind the barn at that time.
ok tb@
mvs [Fri, 12 Jul 2024 17:20:18 +0000 (17:20 +0000)]
Switch `so_snd' of udp(4) sockets to the new locking scheme.
udp_send() and following udp{,6}_output() do not append packets to
`so_snd' socket buffer. This mean the sosend() and sosplice() sending
paths are dummy pru_send() and there is no problems to simultaneously
run them on the same socket.
Push shared solock() deep down to sesend() and take it only around
pru_send(), but keep somove() running unedr exclusive solock(). Since
sosend() doesn't modify `so_snd' the unlocked `so_snd' space checks
within somove() are safe. Corresponding `sb_state' and `sb_flags'
modifications are protected by `sb_mtx' mutex(9).
Tested and OK bluhm.
yasuoka [Fri, 12 Jul 2024 15:54:52 +0000 (15:54 +0000)]
Fix a typo in log
yasuoka [Fri, 12 Jul 2024 15:54:11 +0000 (15:54 +0000)]
Fix Disconnect-Ack not to have an Error-Cause attribute. Tweak
some log messages.
beck [Fri, 12 Jul 2024 15:53:51 +0000 (15:53 +0000)]
Clean up in X509_check_trust.
The XXX comment in here is now outdated. Our behaviour matches boringssl
in that passing in a 0 trust gets the default behavior, which is to
trust the certificate only if it has EKU any, or is self signed.
Remove the goofy unused nid argument to "trust_compat" and rename it to
what it really does, instead of some bizzare abstraction to something
simple so the code need not change if we ever change our mind on what
"compat" is for X.509, which will probably only happen when we are back
to identifying things by something more sensible like recognizable grunts
and smells.
ok jsing@
dv [Fri, 12 Jul 2024 14:53:09 +0000 (14:53 +0000)]
Simplify nvme suspend/resume by resetting queues and not deallocating
memory. This removes memory allocation from the resume-side of
device activation.
ok deraadt@
jan [Fri, 12 Jul 2024 14:34:08 +0000 (14:34 +0000)]
vmd(8): Fix error handling in tx path.
ok dv@
deraadt [Fri, 12 Jul 2024 14:30:27 +0000 (14:30 +0000)]
refactor the signal handlers for clarity, inverting the situation:
the signal handler was calling a big function which is shared between
multiple contexts -- that hides the rule that this big function has
signal safe requirements (which it fails). now, the signal handler
contains all the code, and everyone else calls the signal handler function
as a regular function, from their (normal) contexts.
the signal handler context is the most strict, so this pattern is better.
ok florian
dv [Fri, 12 Jul 2024 13:51:12 +0000 (13:51 +0000)]
Quiet vmd debug logging about page faults.
When we get bumped to userland and the fault is already handled,
don't log anything. It's way too chatty and helps nobody trying to
debug things.
deraadt [Fri, 12 Jul 2024 13:10:58 +0000 (13:10 +0000)]
manual ret-clean; ok mlarkin
florian [Fri, 12 Jul 2024 12:35:32 +0000 (12:35 +0000)]
Recommend veb(4) instead of bridge(4).
bridge(4) has weird interactions with traffic crossing the bridge.
Missing change after updating the faq pointed out by ajacoutot
OK dv
nicm [Fri, 12 Jul 2024 11:21:18 +0000 (11:21 +0000)]
UTF-8 keys now contain the internal representation and not the Unicode
codepoint, so convert extended keys properly. From Stanislav Kljuhhin.
deraadt [Fri, 12 Jul 2024 11:01:40 +0000 (11:01 +0000)]
Improve signal handlers guidance.
ok beck kettenis, earlier versions jmc
tobhe [Fri, 12 Jul 2024 10:01:28 +0000 (10:01 +0000)]
Add pool to allocate individual rtkit task arguments instead of passing a
shared argument. This fixes a race condition where a message could overwrite
rtkep->msg of a previously scheduled task resulting in a refcounting error later
on causing the screen to stay dark after waking up from suspend.
ok kettenis@
tb [Fri, 12 Jul 2024 09:57:04 +0000 (09:57 +0000)]
Drop the unused evp include
tb [Fri, 12 Jul 2024 09:55:38 +0000 (09:55 +0000)]
Rename the sk in this file to exts
tb [Fri, 12 Jul 2024 09:53:30 +0000 (09:53 +0000)]
Avoid using ret for an X509_EXTENSION
Instead rename the **ext in this file to **out_ext, freeing up ext in
X509_EXTENSION_create_by_OBJ()
Appeases some jsing grumbling on review
tb [Fri, 12 Jul 2024 09:47:49 +0000 (09:47 +0000)]
Tweak variable names in X509v3_add_ext()
x -> out_ext, sk -> exts
requested by jsing on review
tb [Fri, 12 Jul 2024 09:42:24 +0000 (09:42 +0000)]
Rename crit to critical in this file
requested by jsing on review
tb [Fri, 12 Jul 2024 09:35:54 +0000 (09:35 +0000)]
Simplify X509_EXTENSION_get_critical()
This is a silly API, but there are worse.
ok jsing
tb [Fri, 12 Jul 2024 09:33:05 +0000 (09:33 +0000)]
Lose a few extra lines in X509_EXTENSION_set_object()
ok jsing
tb [Fri, 12 Jul 2024 09:31:28 +0000 (09:31 +0000)]
Streamline X509_EXTENSION_create_by_OBJ()
ok jsing