djm [Thu, 18 Nov 2021 03:50:41 +0000 (03:50 +0000)]
ssh-keygen -Y find-principals was verifying key validity when using
ca certs but not with simple key lifetimes within the allowed
signers file.
Since it returns the first keys principal it finds this could
result in a principal with an expired key even though a valid
one is just below.
patch from Fabian Stelzer; feedback/ok djm markus
djm [Thu, 18 Nov 2021 03:31:44 +0000 (03:31 +0000)]
check for POLLHUP wherever we check for POLLIN
djm [Thu, 18 Nov 2021 03:07:59 +0000 (03:07 +0000)]
fd leak in sshd listen loop error path; from Gleb Smirnoff
djm [Thu, 18 Nov 2021 03:07:20 +0000 (03:07 +0000)]
check for POLLHUP as well as POLLIN in sshd listen loop;
ok deraadt millert
djm [Thu, 18 Nov 2021 03:06:03 +0000 (03:06 +0000)]
check for POLLHUP as well as POLLIN, handle transient IO errors as well
as half-close on the output side; ok deraadt millert
deraadt [Thu, 18 Nov 2021 01:31:02 +0000 (01:31 +0000)]
sync
cheloha [Wed, 17 Nov 2021 23:09:38 +0000 (23:09 +0000)]
uniq(1): ignore trailing newlines when comparing lines
POSIX.1-2008 tweaked the uniq definition in light of AGI 1003.1-2001
#133. uniq must now *ignore* the trailing newline when comparing
lines from the input.
In practice this means that if the last line in the input is missing a
trailing newline it isn't necessarily different from the line
preceding it.
So, uniq(1) now stubs the trailing newline before doing any line
comparisons.
For sake of simplicity, this patch introduces a second change: if the
last line in the input is missing a trailing newline and we choose to
print the line, a newline is appended when we print it.
Adopting the newline change aligns our implementation with with
POSIX.1-2008 (which we already claim in the manpage). Adopting both
changes aligns our behavior with that of FreeBSD and GNU uniq. For
better or worse, OpenBSD's uniq no longer behaves like NetBSD's uniq
in this corner case.
References:
POSIX.1-2001 uniq:
https://pubs.opengroup.org/onlinepubs/
009695399/utilities/uniq.html
Austin Group Interpretation 1003.1-2001 #133:
https://collaboration.opengroup.org/austin/interps/documents/14355/AI-133.txt
POSIX.1-2008 uniq:
https://pubs.opengroup.org/onlinepubs/
9699919799/utilities/uniq.html
--
Discussed with millert@. With input from schwarze@. Positive feedback
from bcallah@.
Thread: https://marc.info/?l=openbsd-tech&m=
163581613829524&w=2
ok millert@
mvs [Wed, 17 Nov 2021 22:56:19 +0000 (22:56 +0000)]
When unp_connect() releases both solock() and vnode(9) locks the socket we
were connected could be closed by concurrent thread. Check connection
state and return ECONNREFUSED if the connection was lost.
ok bluhm@
djm [Wed, 17 Nov 2021 21:06:39 +0000 (21:06 +0000)]
set num_listen_socks to 0 on close-all instead of -1, which
interferes with the new poll()-based listen loop; spotted and
debugged by anton@+deraadt@
bket [Wed, 17 Nov 2021 18:00:24 +0000 (18:00 +0000)]
Display DNS information from sppp(4) in ifconfig(8)
Behaviour is similar to that of umb(4).
OK kn@
schwarze [Wed, 17 Nov 2021 16:08:32 +0000 (16:08 +0000)]
In x509_vfy.h rev. 1.37 and x509_vfy.c rev. 1.91, tb@ provided
X509_STORE_CTX_set_verify(3) and X509_STORE_CTX_get_verify(3).
Document them.
In the next bump, tb@ will also provide X509_STORE_CTX_verify_fn(3)
and X509_STORE_set_verify(3) and restore X509_STORE_set_verify_func(3)
to working order. For efficiency of documentation work, already
document those three, too, but keep the text temporariy .if'ed out
until they become available.
Delete X509_STORE_set_verify_func(3) from X509_STORE_set_verify_cb_func(3)
because it was misplaced in that page: it is not related to the
verification callback.
tb@ agrees with the general direction.
stsp [Wed, 17 Nov 2021 15:15:32 +0000 (15:15 +0000)]
Disable active scanning on iwm(4) 9260 and 9560.
For some reason, if we send a scan command that actively scans for a
particular SSID with probe requests, the device will occasionally lock
up after associating to the AP, with no interrupts, totally dead.
The symptom of this is an interface that shows as "active" in ifconfig
but does not receive or transmit any packets.
Observed by kmos@ for some time already, and myself while testing new
Intel wifi firmware versions on iwm(4) 9560.
This problem was also observed on AX200 by me with old firmware. We had
the same workaround in place for iwx(4) for some time, until we upgraded
that driver to use newer firmware which uses a different scan command.
Workaround tested by kmos@ and myself.
kn [Wed, 17 Nov 2021 15:13:36 +0000 (15:13 +0000)]
Clarify BUGS wrt. reserving memory for the hypervisor
The previous wording might be understood as "leave memory unused in the
primary domain", which is precisely what causes the hypervisor to reject
the configuration since ldomctl(8) would implicitly allocate all remaining
memory for the primary domain.
Make sure that primary domain memory should be assigned explicitly so the
total amount of allocated memory is less than physically available, i.e.
the hypervisor will have even more memory available and configurations can
boot again.
OK stsp
kn [Wed, 17 Nov 2021 13:48:12 +0000 (13:48 +0000)]
Provide real output for the "ldomctl console" EXAMPLE
espie [Wed, 17 Nov 2021 12:53:05 +0000 (12:53 +0000)]
explicitly talk a bit about "informal" specs
espie [Wed, 17 Nov 2021 10:59:13 +0000 (10:59 +0000)]
forbid non-sensical empty parts
explicitly forbid % to be in packages-specs, so that people don't get confused
about it.
espie [Wed, 17 Nov 2021 10:58:21 +0000 (10:58 +0000)]
add more checks for badly specified pkgspecs
anton [Wed, 17 Nov 2021 06:22:14 +0000 (06:22 +0000)]
uhidpp does claim multiple report ids
anton [Wed, 17 Nov 2021 06:21:23 +0000 (06:21 +0000)]
ucc does not claim multiple report ids
anton [Wed, 17 Nov 2021 06:20:30 +0000 (06:20 +0000)]
Fix a double free in uhidev_close() caused by a race between
uhidev_open() and uhidev_close(). In uhidev_close() the UHIDEV_OPEN flag
is cleared early on but the same thread can end up sleeping while
closing the input or output pipe. This allows another thread to enter
uhidev_open() but only to fail opening either the input or output pipe
since they are already open for exclusive use. The uhidev_open() error
path frees the input buffer but leaves a dangling pointer around;
causing uhidev_close() to free the same buffer.
This can at least happen on xhci(4) which can end up sleeping in
xhci_pipe_close().
Reported by and ok gnezdo@
cheloha [Tue, 16 Nov 2021 23:34:24 +0000 (23:34 +0000)]
wc(1): fix NULL pointer dereference in cnt()
If the "file" argument to cnt() is NULL and we call warn(3) we will
get a NULL dereference.
Change the name of the argument to "path" and make "file" a local
variable. Ensure that we set "file" to a valid C-string, even if
"path" is NULL.
While we're here, const the file name pointers, too.
Thread: https://marc.info/?l=openbsd-tech&m=
163708784422157&w=2
ok millert@
deraadt [Tue, 16 Nov 2021 21:55:21 +0000 (21:55 +0000)]
fix an accidental NULL deref introduced last year, found by patrick.
rewrite the code with a goto so this never happens again.
ok patrick millert
tobhe [Tue, 16 Nov 2021 21:43:36 +0000 (21:43 +0000)]
Zero all copies of pre-shared key.
ok markus@
sthen [Tue, 16 Nov 2021 21:19:24 +0000 (21:19 +0000)]
document GH_DISTFILE that was added to ports/infrastructure/mk/bsd.port.mk
sashan [Tue, 16 Nov 2021 20:51:30 +0000 (20:51 +0000)]
move memory allocations in pfr_add_addrs() outside of NET_LOCK()/PF_LOCK()
scope.
feedback by bluhm@
OK bluhm@
kn [Tue, 16 Nov 2021 16:45:23 +0000 (16:45 +0000)]
Validate RTM_PROPOSAL in resolver not frontend
The resolver is the actual consumer and shouldn't trust the frontend.
Fold the IPv4/IPv6 specific checks thanks to the previous commit.
Idea from florian
OK florian
kn [Tue, 16 Nov 2021 16:37:52 +0000 (16:37 +0000)]
Simplify address family handling, ditch inet_ntop(3)
Reduce duplicate code and use getnameinfo(3) for IPv4 as well.
This commit is the equivalent of sbin/resolvd/resolvd.c revision 1.21
"Simplify address family handling, ditch inet_ntop(3)".
OK florian
kn [Tue, 16 Nov 2021 16:30:42 +0000 (16:30 +0000)]
Install missing scope identifier for IPv6 link-local addresses
RTM_PROPOSAL's list of IP addresses does not contain scope IDs by design.
This is not a problem as the proposal is always bound to an interface,
as long as we use it...
Fill in the scope ID for link-local IPs and replace inet_ntop(3) usage with
getnameinfo(3) in the IPv6 case such that it actually turns up in the string
representation.
This is the unwind specific fix to ensure working IPv6LL; libunbound still
requires another fix.
This commit is the equivalent of sbin/resolvd/resolvd.c revision 1.20
"Install missing scope identifier for IPv6 link-local addresses".
OK florian
kn [Tue, 16 Nov 2021 16:24:22 +0000 (16:24 +0000)]
Use size of struct not pointer
Pointed out by florian, thanks.
No change as the sockaddr remains unused by getnameinfo() in this case.
espie [Tue, 16 Nov 2021 15:59:58 +0000 (15:59 +0000)]
add a few more checks for incorrect specs
espie [Tue, 16 Nov 2021 15:56:44 +0000 (15:56 +0000)]
really nail down the flavor part better... write this as an extended
regexp because it's not that readable
espie [Tue, 16 Nov 2021 15:38:52 +0000 (15:38 +0000)]
tweak the packages-specs regexp a bit:
stem-* shouldn't have any cruft added.
schwarze [Tue, 16 Nov 2021 14:07:57 +0000 (14:07 +0000)]
In x509_vfy.h rev. 1.37 and x509_vfy.c rev. 1.91, tb@ provided
X509_STORE_CTX_get_verify_cb(3); document it.
bluhm [Tue, 16 Nov 2021 13:53:14 +0000 (13:53 +0000)]
To debug IPsec and tdb refcounting it is useful to have "show tdb"
and "show all tdbs" in ddb.
tested by Hrvoje Popovski; OK mvs@
visa [Tue, 16 Nov 2021 13:48:23 +0000 (13:48 +0000)]
Use nowake when poll/select has empty fd set
When the fd set is empty, the code waits for a signal or timeout.
Wakeups from the kqueue are neither expected nor wanted.
OK cheloha@, millert@, anton@, mpi@
visa [Tue, 16 Nov 2021 13:46:16 +0000 (13:46 +0000)]
Remove an old note about poor performance
The new kqueue-based poll/select implementation does not suffer from
select collisions.
OK cheloha@, millert@
stsp [Tue, 16 Nov 2021 12:56:11 +0000 (12:56 +0000)]
fix typo in an error message printed by iwx_phy_ctxt_update()
stsp [Tue, 16 Nov 2021 12:55:50 +0000 (12:55 +0000)]
fix typo in an error message printed by iwm_phy_ctxt_update()
schwarze [Tue, 16 Nov 2021 12:06:57 +0000 (12:06 +0000)]
Recently, tb@ provided the following functions:
X509_STORE_CTX_set_error_depth x509_vfy.h 1.37 x509_vfy.c 1.91
X509_STORE_CTX_set_current_cert x509_vfy.h 1.37 x509_vfy.c 1.91
X509_STORE_CTX_get_num_untrusted x509_vfy.h 1.36 x509_vfy.c 1.90
X509_STORE_CTX_set0_verified_chain x509_vfy.h 1.37 x509_vfy.c 1.91
Merge the documentation from the OpenSSL 1.1.1 branch,
which is still under a free license; tweaked by me.
landry [Tue, 16 Nov 2021 10:20:52 +0000 (10:20 +0000)]
hilkbd(4): Fix swedish keyboard layout botch on non-PS/2 style keyboards
introduced in 1.7 and preventing `o' and `p' keys from working as
intended. Reported by Anders Gustafsson.
From miod@
mvs [Tue, 16 Nov 2021 08:56:19 +0000 (08:56 +0000)]
Move UNIX domain sockets garbage collector out of `unp_lock.
Except `unp_ino' this leaves only per-socket data protected by
`unp_lock'. The `unp_ino' protection is not the big deal and will be
done with mutex(9) in the future diff.
The garbage collector flags moved from from `unp_flags' to unp_gcflags'.
The two new locks introduced to protect garbage collector data. The
`unp_gc_lock' rwlock(9) protects `unp_defer', `unp_gcing', `unp_gcflags'
and `unp_link' list. The `unp_df_lock' protects `ud_link' list.
We need to simultaneously lock `unp_gc_lock' and `unp_lock'. When we
perform unp_attach() or unp_detach() we link PCB to `unp_link' list with
`unp_lock' held. But when unp_gc() does `unp_link' list walkthrough with
the `unp_gc_lock' lock held it should lock socket while performs
`so_rcv' buffer scan and the lock order should be the opposite.
In the future diff `unp_lock' will be replaced by per-socket `so_lock'
so it's better to enforce `unp_gc_lock' -> `unp_lock' (solock()) lock
order and release `unp_lock' in the unp_attach() and unp_detach() paths.
The previously committed diffs made this safe.
The `unp_df_lock' introduced because the `unp_lock' and `unp_gc_lock'
state are unknown when unp_discard() called. Since it touches only
`ud_link' list the re-lock dances are unwanted in this path. Also this
keeps M_WAITOK allocation outside rwlock(9) when unp_discard() called
from unp_externalize() error path.
ok bluhm@
guenther [Tue, 16 Nov 2021 02:46:46 +0000 (02:46 +0000)]
Sync boot.h with ld.so's boot.c, getting rid of struct boot_dyn,
only initializing the variables we need to, and switching to a
"while < end-of-array" style for DT_REL/RELA processing
ok drahn@ kettenis@
tobhe [Mon, 15 Nov 2021 22:37:35 +0000 (22:37 +0000)]
style
kn [Mon, 15 Nov 2021 18:25:52 +0000 (18:25 +0000)]
Pass sockaddr length to be on the safe side, still
kn [Mon, 15 Nov 2021 18:23:45 +0000 (18:23 +0000)]
Revert previous
sockaddr_storage should stay since it is preferred and less error prone.
From deraadt
OK florian
deraadt [Mon, 15 Nov 2021 17:42:50 +0000 (17:42 +0000)]
sync
kn [Mon, 15 Nov 2021 17:33:51 +0000 (17:33 +0000)]
Avoid huge sockaddr_storage
sockaddr_{in,in6} are enough and a simple sockaddr pointer is enough to
abstract them (sockaddr_storage is what worked for me, there is no other
reason to use it).
While here, be portable and pass a non-zero length to getnameinfo(3);
while OpenBSD's implementation ignores it in the NI_NUMERICHOST case,
at least the old KAME stack didn't.
No functional change.
Prodded by florian
OK florian
deraadt [Mon, 15 Nov 2021 17:14:51 +0000 (17:14 +0000)]
Copy p_p->ps_pledge into a local variable (called pledge) in every function
which checks PLEDGE_* bits more than once. Some functions are called without
locking, and this avoids misinterpreting bits which have some coupled behaviour.
ok cheloha kettenis
claudio [Mon, 15 Nov 2021 16:32:15 +0000 (16:32 +0000)]
Adjust how the repository count limit works. Instead of failing hard just
fall back to a possible cache and try to validate what is available.
This still limits the number of repositories fetched but allows valid
repositories to finish with the available data.
OK job@
schwarze [Mon, 15 Nov 2021 16:18:36 +0000 (16:18 +0000)]
new manual page ASN1_BIT_STRING_set(3) documenting four BIT STRING accessors
visa [Mon, 15 Nov 2021 15:48:54 +0000 (15:48 +0000)]
Revert to eager removal of poll/select knotes
This should prevent a panic that bluhm@ has reported.
anton [Mon, 15 Nov 2021 15:38:08 +0000 (15:38 +0000)]
Third attempt to solve the claim multiple report ids conflict. Using the
report id to signal that multiple ones should be claimed by the match
routines does not work. All valid report ids 1-255 cannot of course be
used and 0 which is reserved by the USB HID specification is internally
used to represents devices lacking an explicit report id.
Therefore, use presence of the claimed array to signal that multiple
report ids can be claimed.
Tested by gnezdo@
anton [Mon, 15 Nov 2021 15:36:24 +0000 (15:36 +0000)]
In preparation for once again trying the resolve the claim multiple
report ids conflict, extract the claim multiple report ids conditional
in order to minimize the required upcoming changes to resolve the
conflict.
Tested by gnezdo@
millert [Mon, 15 Nov 2021 15:14:24 +0000 (15:14 +0000)]
No need to declare optind, optarg or opterr; unistd.h does this for us.
From Jan Stary. OK deraadt@
claudio [Mon, 15 Nov 2021 14:57:57 +0000 (14:57 +0000)]
Change printing of maps to use qsort to order the output using a pointer
array. This replaces the current solution that only prints one element for
a certain value and not all elements with tha same value.
This can be further optimized but printing is not really a hot path in btrace.
OK mpi@
schwarze [Mon, 15 Nov 2021 13:39:40 +0000 (13:39 +0000)]
document ASN1_PRINTABLE_type(3) and ASN1_UNIVERSALSTRING_to_string(3)
ajacoutot [Mon, 15 Nov 2021 12:56:11 +0000 (12:56 +0000)]
Tidy up; no change.
schwarze [Mon, 15 Nov 2021 11:51:09 +0000 (11:51 +0000)]
document ASN1_item_pack(3) and ASN1_item_unpack(3)
nicm [Mon, 15 Nov 2021 10:58:13 +0000 (10:58 +0000)]
Leave the hardware cursor at the position of the selected line in choose
modes and current editing position and at the command prompt. It is
invisible but this is helpful for people using screen readers. GitHub
issue 2970.
schwarze [Mon, 15 Nov 2021 10:41:11 +0000 (10:41 +0000)]
document i2a_ASN1_STRING(3) and a2i_ASN1_STRING(3)
tb [Sun, 14 Nov 2021 22:31:29 +0000 (22:31 +0000)]
Fix a strange check in the auto DH codepath
The code assumes that the server certificate has an RSA key and bases
the calculation of the size of the ephemeral DH key on this assumption.
So instead of checking whether we have any key by inspecting the dh
part of the union, let's check that we actually have an RSA key.
While here, make sure that its length is non-negative.
ok jsing
guenther [Sun, 14 Nov 2021 22:07:38 +0000 (22:07 +0000)]
Delete all the no-op RELOC_GOT() macros and their uses.
Annotate RELOC_DYN() on non-hppa as only used in lib/csu.
Delete some inconsistent comments, adjust whitespace, and reorder
mips64's archdep.h so that the ld.so/*/archdep.h files look
(almost) the same.
ok visa@ kettenis@
guenther [Sun, 14 Nov 2021 21:51:48 +0000 (21:51 +0000)]
Make sure efiboot is built with RELA/REL relocations and not RELR,
as self_reloc.c only handles the former.
ok deraadt@ kettenis@
deraadt [Sun, 14 Nov 2021 18:47:43 +0000 (18:47 +0000)]
use ppoll() instead of pselect()
with djm
florian [Sun, 14 Nov 2021 18:13:19 +0000 (18:13 +0000)]
When we transition from RENEWING to REBINDING state we have to
calculate the next timeout based on the rebinding time (T2), not
renewal time (T1). At this point T1 already expired and we would wait
way too long, past the lease lifetime.
Spotted while investigating a problem reported by Zack Newman on misc@
krw [Sun, 14 Nov 2021 17:28:29 +0000 (17:28 +0000)]
Calculate initial OpenBSD partition start/size using LBA values
instead of CHS values. Shorter, easier to follow.
No intentional functional change.
schwarze [Sun, 14 Nov 2021 13:40:16 +0000 (13:40 +0000)]
the last argument of BIO_gets(3) is called "size", not "len"
schwarze [Sun, 14 Nov 2021 11:22:36 +0000 (11:22 +0000)]
fix a typo; diff from Matthias Schmidt <xosc dot org> on tech@
ajacoutot [Sun, 14 Nov 2021 09:31:44 +0000 (09:31 +0000)]
Improve and simplify timer handling in "stop" and "reload".
Rename _rc_wait to _rc_wait_for_start since only "start" uses this now (to
handle rc_bg daemons).
In any situation, none of these actions should be able to hang boot or shutdown.
We should now be able to manage most corner cases out there ("most" because it's
unreasonable to assume we can cope with all the non-default
rc_{start,stop,reload} crazyness).
Several tests have been made and no obvious regression has been found.
But that doesn't mean there isn't; if some behavior changed for the worst, talk
to me.
ok robert@ sthen@
jsing [Sun, 14 Nov 2021 08:21:47 +0000 (08:21 +0000)]
Put curly brace on the correct line.
deraadt [Sun, 14 Nov 2021 06:15:36 +0000 (06:15 +0000)]
match .events with .fd better
deraadt [Sun, 14 Nov 2021 03:25:10 +0000 (03:25 +0000)]
convert select() to poll()
ok djm
kn [Sun, 14 Nov 2021 03:02:06 +0000 (03:02 +0000)]
"autoconf" is an automatic "up"
OK deraadt
guenther [Sun, 14 Nov 2021 00:45:38 +0000 (00:45 +0000)]
Split out the hppa and mips64 versions of boot.h similar to how I
split ld.so/boot.c in 2019:
* delete extraneous #includes
* delete jmprel handling on non-hppa
* delete RELOC_GOT() and DT_PROC bits on non-mips64
ok visa@
kettenis [Sat, 13 Nov 2021 23:24:24 +0000 (23:24 +0000)]
Catch up with (proposed) Linux device tree bindings.
deraadt [Sat, 13 Nov 2021 21:14:13 +0000 (21:14 +0000)]
replace select() with ppoll(), including converting timeval's to timespec's
to make things easier.
back and forth and ok; djm
tobhe [Sat, 13 Nov 2021 20:56:51 +0000 (20:56 +0000)]
The key/nonce disclaimers were copied from ipsec.conf.5 but aren't relevant
to iked. Encryption keys and nonces are generated by the handshake and don't
have to be supplied in the config.
schwarze [Sat, 13 Nov 2021 20:50:14 +0000 (20:50 +0000)]
Test ASN1_STRING_copy(3).
As a side effect, this also tests various aspects of ASN1_STRING_new(3),
ASN1_STRING_set(3), ASN1_STRING_length_set(3), ASN1_STRING_get0_data(3),
ASN1_STRING_length(3), and ASN1_STRING_type(3).
schwarze [Sat, 13 Nov 2021 20:44:00 +0000 (20:44 +0000)]
Fix a nasty quirk in ASN1_STRING_copy(3).
In case of failure, it reported the failure
but corrupted the type of the destination string.
Instead, let's make sure that in case of failure,
existing objects remain in their original state.
OK tb@
schwarze [Sat, 13 Nov 2021 19:21:17 +0000 (19:21 +0000)]
Document the interactions of X509_V_FLAG_USE_CHECK_TIME,
X509_V_FLAG_NO_CHECK_TIME, X509_VERIFY_PARAM_set_time(3),
X509_VERIFY_PARAM_set_flags(3), and X509_VERIFY_PARAM_clear_flags(3)
in detail because the API design is both surprising and surprisingly
complicated in this respect, and the resulting nasty traps have
already caused bugs in the past.
schwarze [Sat, 13 Nov 2021 18:50:31 +0000 (18:50 +0000)]
Mark the public X509_VP_FLAG_* constants as intentionally undocumented.
With LibreSSL, they can only be used internally in the library itself,
and even with OpenSSL, no real-world application code uses them.
OK tb@
schwarze [Sat, 13 Nov 2021 18:24:45 +0000 (18:24 +0000)]
Fix a bug in check_crl_time() that could result in incomplete
verification, accepting CRLs that ought to be rejected, if an unusual
combination of verification flags was specified.
If time verification was explicitly requested with
X509_V_FLAG_USE_CHECK_TIME, it was skipped on CRLs if
X509_V_FLAG_NO_CHECK_TIME was also set, even though the former is
documented to override the latter both in the OpenSSL and in the
LibreSSL X509_VERIFY_PARAM_set_flags(3) manual page.
The same bug in x509_check_cert_time() was already fixed by beck@
in rev. 1.57 on 2017/01/20.
This syncs the beginning of the function check_crl_time() with the
OpenSSL 1.1.1 branch, which is still under a free license.
OK beck@
This teaches that having too many flags and options is bad because they
breed bugs, and even more so if they are poorly designed to override
each other in surprising ways.
kn [Sat, 13 Nov 2021 18:18:59 +0000 (18:18 +0000)]
Use long filenames by default on FAT filesystems
These days, 8.3 filenames are often a problem, filesystems containing
firmware with long names must not truncate them -- it's also a sane default
as portable file system between OSes, anyway.
Altough undocumented in mount_msdos(8), the default for FAT32 already is to
use long filenames: ever since its import from NetBSD in 1998.
Previously, mount_msdos would ignore long filenames and default to short
filenames unless a flag was used or long ones were found on the filesystem
prior to mounting it.
Just always mount with support for long filenames (unless `-s' is used).
As various install media use FAT filesystems, adjust the remaining ones to
also pass explicit mount option reflecting the previous default.
OK deraadt
kn [Sat, 13 Nov 2021 17:49:40 +0000 (17:49 +0000)]
Simplify address family handling, ditch inet_ntop(3)
Reduce duplicate code, use getnameinfo(3) for IPv4 as well and use
gai_strerror(3) in case of failure.
This was split out as part of the previous IPv6-LL fix.
kn [Sat, 13 Nov 2021 17:32:46 +0000 (17:32 +0000)]
Install missing scope identifier for IPv6 link-local addresses
RTM_PROPOSAL's list of IP addresses does not contain scope IDs by design.
This is not a problem as the proposal is always bound to an interface,
as long as we use it...
Fill in the scope ID for link-local IPs and replace inet_ntop(3) usage with
getnameinfo(3) in the IPv6 case such that it actually turns up in the string
representation.
Otherwise resolv.conf(5) ends up with "nameserver fe80::1" entries and
libc/asr won't be able to resolve without an interface.
deraadt [Sat, 13 Nov 2021 17:26:13 +0000 (17:26 +0000)]
It really looks like pledge "stdio dns" is possible earlier.
Discussed with mestre
schwarze [Sat, 13 Nov 2021 17:12:18 +0000 (17:12 +0000)]
document ASN1_STRING_copy(3)
kn [Sat, 13 Nov 2021 12:09:30 +0000 (12:09 +0000)]
Use a proper PKGPATH in the WRKOBJDIR example
www/mozilla is a module, www/mozilla-firefox is an actual port.
OK sthen
matthieu [Sat, 13 Nov 2021 08:48:50 +0000 (08:48 +0000)]
Un-hook the X11 tests. The new X server doesn't install libfb anymore.
ok kettenis@, anton@
anton [Sat, 13 Nov 2021 08:25:42 +0000 (08:25 +0000)]
hook up unfdpassfail and ungc
visa [Sat, 13 Nov 2021 06:04:02 +0000 (06:04 +0000)]
Let filt_fileattach() run without the kernel lock
This makes it possible to attach pipe, socket and kqueue event filters
without acquiring the kernel lock. Event filters behind vn_kqfilter()
are not MP-safe yet, so vn_kqfilter() has to take KERNEL_LOCK().
dmabuf_kqfilter() can skip locking because it has no side effects.
OK anton@, mpi@
guenther [Fri, 12 Nov 2021 22:28:13 +0000 (22:28 +0000)]
Add support for RELR relocations in the executable and share objects.
This doesn't affect ld.so's self-reloc, which still requires DT_REL/DT_RELA
ok kettenis@
guenther [Fri, 12 Nov 2021 22:23:40 +0000 (22:23 +0000)]
Teach binutils enough about RELR relocations to not break them and for
readelf to display them in a way compatible with llvm-readelf, including
the --raw-relr debugging option
ok kettenis@
guenther [Fri, 12 Nov 2021 22:20:57 +0000 (22:20 +0000)]
Add #defines and typedefs for RELR, a compressed form for relative relocations
ok kettenis@
schwarze [Fri, 12 Nov 2021 18:56:00 +0000 (18:56 +0000)]
Document the public constants X509_V_FLAG_POLICY_MASK
and X509_V_FLAG_USE_CHECK_TIME.
While here, fix a typo and improve the wording
for X509_V_FLAG_NOTIFY_POLICY.
cheloha [Fri, 12 Nov 2021 17:57:13 +0000 (17:57 +0000)]
sigsuspend(2): sleep on &nowake channel
sigsuspend(2) only returns upon delivery of a signal: we do not expect
a wakeup(9). Indicate this by sleeping on &nowake instead of
&p->p_p->ps_sigacts. We still need to loop here to handle spurious
wakeups, though.
Spurious wakeup case pointed out by kettenis@.
ok claudio@
kettenis [Fri, 12 Nov 2021 17:05:15 +0000 (17:05 +0000)]
Add support for controlling keyboard LEDs.
ok patrick@
kettenis [Fri, 12 Nov 2021 17:04:32 +0000 (17:04 +0000)]
Use a mutex to lock the bus such that we can safely access the bus from
interrupt handlers and process context.
ok patrick@
claudio [Fri, 12 Nov 2021 16:57:24 +0000 (16:57 +0000)]
Implement the probe variable. Can be used for example with
@map[probe] = count();
OK mpi@
deraadt [Fri, 12 Nov 2021 15:49:41 +0000 (15:49 +0000)]
"netconfigd" is now better known as resolvd(8)