tb [Mon, 10 Jan 2022 13:42:28 +0000 (13:42 +0000)]
Prepare to provide the EVP_MD_meth_* API
This allows implementations to add their own EVP_MD_METHODs.
Only the setters are provided.
This is used by erlang for the otp_test_engine.
ok inoguchi jsing
dlg [Mon, 10 Jan 2022 13:09:29 +0000 (13:09 +0000)]
speeling
dlg [Mon, 10 Jan 2022 13:04:52 +0000 (13:04 +0000)]
this should be most of the necessary info for this driver.
tb [Mon, 10 Jan 2022 12:19:26 +0000 (12:19 +0000)]
Document openssl pkey -check,-pubcheck and param -check
tb [Mon, 10 Jan 2022 12:17:49 +0000 (12:17 +0000)]
Implement openssl pkey -{,pub}check and pkeyparam -check
These expose EVP_PKEY_{,public_,param_}check() to the command line.
They are currently noops and will be enabled in the upcoming bump.
ok inoguchi jsing
tb [Mon, 10 Jan 2022 12:10:26 +0000 (12:10 +0000)]
Prepare to provide EVP_PKEY_{public,param}_check
This implements checking of a public key and of key generation
parameters for DH and EC keys. With the same logic and setters
and const quirks as for EVP_PKEY_check().
There are a couple of quirks: For DH no default EVP_PKEY_check()
is implemented, instead EVP_PKEY_param_check() calls DH_check_ex()
even though DH_param_check_ex() was added for this purpose.
EVP_PKEY_public_check() for EC curves also checks the private key
if present.
ok inoguchi jsing
tb [Mon, 10 Jan 2022 12:00:52 +0000 (12:00 +0000)]
Provide DH_check*_ex and many error codes
DH_check{,_pub_key}_ex() wrap their non-ex versions to translate
the flags argument of the original functions into OpenSSL errors.
For this almost a dozen new error codes need to be added.
DH_params_check{,_ex}() is a new version of DH_check that only
performs a cheap subset of the checks.
They are needed to implement EVP_PKEY_{public,param}_check()
(observe the consistent naming) although the actual implementation
of EVP_PKEY_param_check() chose to use DH_check_ex().
As far as I can tell, the only raison d'ĂȘtre of the _ex functions
and error codes is to spew them to stderr in a couple of openssl(1)
commands. This couldn't have been solved differently...
These functions will not be exposed publicly.
ok inoguchi jsing
tb [Mon, 10 Jan 2022 11:52:43 +0000 (11:52 +0000)]
Prepare to provide EVP_PKEY_check()
This allows checking the validity of an EVP_PKEY. Only RSA and EC keys
are supported. If a check function is set the EVP_PKEY_METHOD, it will
be used, otherwise the check function on the EVP_PKEY_ASN1_METHOD is
used. The default ASN.1 methods wrap RSA_check_key() and
EC_KEY_check_key(), respectively.
The corresponding setters are EVP_PKEY_{asn1,meth}_set_check().
It is unclear why the PKEY method has no const while the ASN.1 method
has const.
Requested by tobhe and used by PHP 8.1.
Based on OpenSSL commit
2aee35d3
ok inoguchi jsing
dlg [Mon, 10 Jan 2022 10:54:54 +0000 (10:54 +0000)]
add a bit more.
tb [Mon, 10 Jan 2022 10:51:31 +0000 (10:51 +0000)]
Prevent a double free in EVP_MD_CTX_copy_ex()
NULL out two pointer values after memcpy() to avoid a double free.
In the event that both in->pctx and in->md_data are non-NULL and
the calloc() of out->md_data fails, a double free could occur.
ok inoguchi jsing
dlg [Mon, 10 Jan 2022 10:20:31 +0000 (10:20 +0000)]
tweak slightly
kettenis [Mon, 10 Jan 2022 09:20:27 +0000 (09:20 +0000)]
In pmap_enter(9), only perform a TLB flush if we actually changed a PTE.
To make this intent more obvious, group the call to the TLB flush function
togther with the call that inserts/updates/removes a PTE.
Remove an incorrect comment related to this.
ok patrick@
kettenis [Mon, 10 Jan 2022 09:16:30 +0000 (09:16 +0000)]
aplsmc(4)
kettenis [Mon, 10 Jan 2022 09:07:28 +0000 (09:07 +0000)]
Add aplsmc(4), a driver for the SMC found on Apple M1 SoCs.
The SMC implements a lot of functionality. For now the driver only
implements a bunch of sensors. This is a small subset of the sensors
that are made available by the SMC as we don't know what measurments
are provided for most sensors.
ok patrick@
dlg [Mon, 10 Jan 2022 07:51:23 +0000 (07:51 +0000)]
hang some flesh off the bones that jsg provided.
dlg [Mon, 10 Jan 2022 07:01:50 +0000 (07:01 +0000)]
mark up the ioctl requests with Dv
jsg [Mon, 10 Jan 2022 04:59:19 +0000 (04:59 +0000)]
initial kstat.4
ok dlg@
dlg [Mon, 10 Jan 2022 04:47:53 +0000 (04:47 +0000)]
provide access to the hardware counters (MIB counters in the doc) via kstat
dlg [Mon, 10 Jan 2022 04:11:13 +0000 (04:11 +0000)]
handle the status ring entries as 64bit words instead of a struct.
the status ring entries are 8 bytes/64bit, and depending on the
type of entry it has fields all over the place. this loads the
descriptor with a single 64bit read, and then shifts and masks the
bits out of it depending on the type of descriptor. this looks
cleaner for the tx completions in particular.
tb [Mon, 10 Jan 2022 00:09:06 +0000 (00:09 +0000)]
zap trailing whitespace
tb [Mon, 10 Jan 2022 00:03:02 +0000 (00:03 +0000)]
Check that the RSA exponent is neither even nor 1 in RSA_check_key()
Part of OpenSSL commit
464d59a5
ok inoguchi jsing
tb [Sun, 9 Jan 2022 23:55:31 +0000 (23:55 +0000)]
Use C99 initializers for test_sha_md
ok inoguchi jsing
tb [Sun, 9 Jan 2022 23:50:10 +0000 (23:50 +0000)]
Add an essentially empty comp_local.h and include it where it will
be needed.
discussed with jsing
patrick [Sun, 9 Jan 2022 23:28:19 +0000 (23:28 +0000)]
Simplify igc_rxrinfo() to improve consistency and appease Coverity.
CID
1510483
ok kevlo@
tb [Sun, 9 Jan 2022 18:46:56 +0000 (18:46 +0000)]
unwind/unbound: prepare for opaque DSA and RSA.
Use the OpenSSL 1.1 codepath using accessors that have been available
since LibreSSL 2.7 instead of reaching into the structs.
ok sthen
robert [Sun, 9 Jan 2022 16:39:06 +0000 (16:39 +0000)]
do not call ranlib -t anymore because it does nothing except wasting time;
ok jca@, millert@
jsing [Sun, 9 Jan 2022 15:55:37 +0000 (15:55 +0000)]
ssl_check_srvr_ecc_cert_and_alg() only returns 0/1 - test accordingly.
jsing [Sun, 9 Jan 2022 15:53:52 +0000 (15:53 +0000)]
Swap arguments to ssl_check_srvr_ecc_cert_and_alg()
If a libssl function takes an SSL *, it should normally be the first
argument.
jsing [Sun, 9 Jan 2022 15:40:13 +0000 (15:40 +0000)]
Clean up ssl3_{send,get}_client_kex_gost()
Fix leaks, use sizeof() instead of hardcoded sizes, actually check return
codes, explicit_bzero() the premaster secret on the server side and
generally try to kick the GOST kex code into some sort of shape.
ok inoguchi@ tb@
jsing [Sun, 9 Jan 2022 15:34:21 +0000 (15:34 +0000)]
Return 0/1 from ssl3_{send,get}_client_kex_gost()
Like other KEX handling functions, there is no need to return anything
other than failure/success here.
ok inoguchi@ tb@
jsing [Sun, 9 Jan 2022 15:29:42 +0000 (15:29 +0000)]
Remove a comment from Captain Obvious.
jsing [Sun, 9 Jan 2022 15:28:47 +0000 (15:28 +0000)]
Fix GOST skip certificate verify handling.
GOST skip certificate verify handling got broken in r1.132 of s3_srvr.c
circa 2016. Prior to this, ssl3_get_client_key_exchange() returned an
'extra special' value to indicate that the state machine should skip
certificate verify. Fix this by setting and checking the
TLS1_FLAGS_SKIP_CERT_VERIFY flag, which is the same as is done in the
client.
ok inoguchi@ tb@
tb [Sun, 9 Jan 2022 15:15:25 +0000 (15:15 +0000)]
Prepare to provide EVP_MD_CTX{,_set}_pkey_ctx()
This API with very strange ownership handling is used by Ruby 3.1,
unfortunately.
For unclear reasons, it was decided that the caller retains ownership of
the pctx passed in. EVP_PKEY_CTX aren't refcounted, so a flag was added to
make sure that md_ctx->pctx is not freed in EVP_MD_CTX_{cleanup,reset}().
Since EVP_MD_CTX_copy_ex() duplicates the md_ctx->pctx, the flag also needs
to be unset on the duplicated EVP_MD_CTX.
ok inoguchi jsing
visa [Sun, 9 Jan 2022 13:27:47 +0000 (13:27 +0000)]
Indicate that mvpxa(4) depends on sdhc code.
OK deraadt@ phessler@
visa [Sun, 9 Jan 2022 13:26:08 +0000 (13:26 +0000)]
Add attribute for indicating sdhc dependency.
OK deraadt@ phessler@
jsing [Sun, 9 Jan 2022 13:17:33 +0000 (13:17 +0000)]
Clean up pkey handling in ssl3_get_server_key_exchange()
With TLSv1.2 and earlier, the authentication algorithm used to sign the
ServerKeyExchange message is dependent on the cipher suite in use and has
nothing to do with the key exchange algorithm. As such, check the
authentication algorithm based on the cipher suite in
ssl3_get_server_key_exchange() and handle things accordingly.
ok inoguchi@ tb@
claudio [Sun, 9 Jan 2022 10:36:52 +0000 (10:36 +0000)]
Add two test cases from semarie@ which are solved by the last unveil
commit.
claudio [Sun, 9 Jan 2022 10:28:07 +0000 (10:28 +0000)]
Add an UNVEIL_USERSET flag which is set when a unveil node is added via
unveil(2). It is not set for nodes that are added as a result of a file
being added via unveil(2). Use this flag to test if backtracking should
be done or not. Also introduce UNVEIL_MASK which checks if any user flags
are set and is used to properly return EACCES vs ENOENT.
This fixes a problem where unveil("/", "r") & unveil("/usr/bin/id", "rx")
cause an error when read accessing "/usr/bin". It also makes sure that
unveil(path, "") will return ENOENT for any access of anything under path.
Reported by and OK semarie@
otto [Sun, 9 Jan 2022 07:18:50 +0000 (07:18 +0000)]
Increase the max size of allocations, in prep for a large cache implementation.
jsg [Sun, 9 Jan 2022 05:42:36 +0000 (05:42 +0000)]
spelling
feedback and ok tb@ jmc@ ok ratchov@
guenther [Sat, 8 Jan 2022 22:54:49 +0000 (22:54 +0000)]
__LDPGSZ hasn't been used here since rev 1.23 (2013).
Delete comment referring to it
ok jsg@
afresh1 [Sat, 8 Jan 2022 22:32:00 +0000 (22:32 +0000)]
Don't download SHA256.sig unless it's needed
This allows installing local files without network.
it *might* work now deraadt@
tb [Sat, 8 Jan 2022 21:36:39 +0000 (21:36 +0000)]
Prepare to provide OBJ_length() and OBJ_get0_data()
OBJ_length() turns the int obj->length into a size_t, so add
an overflow check. While obj->length should never be negative,
who knows...
ok jsing
deraadt [Sat, 8 Jan 2022 18:30:18 +0000 (18:30 +0000)]
archdep.h needed for _dl_dcbf, on powerpc
deraadt [Sat, 8 Jan 2022 17:28:49 +0000 (17:28 +0000)]
need "archdep.h" for _dl_md_plabel on hppa
patrick [Sat, 8 Jan 2022 17:05:30 +0000 (17:05 +0000)]
Use ${.ALLSRC:M*.y} instead of ${.IMPSRC} as the input file for yacc,
to fix a bug where ${.IMPSRC} (aka $<) is used in a context where it
is not neccessarily defined by OpenBSD make. This would sometime show
up trying to build libpcap with the following error message:
Using $< in a non-suffix rule context is a GNUmake idiom (<bsd.dep.mk>:47)
The issue is with the rule for the grammar.h file that is generated
by yacc from grammar.c. You can easily reproduce the bug with the
following steps:
- build libpcap from scratch: cd src/lib/libpcap && make clean all
- remove the generated grammar.h file: rm obj*/grammar.h
- build libpcap again (incremental build): make
In normal builds this does not trigger as grammar.h is implicitly
generated by the rule for grammar.c and when make checks for
dependencies it simply finds grammar.h uptodate. However, incremental
or parallel builds might decide to make grammar.h from grammar.y.
Now, why is this only a problem for grammar.h but not for grammar.c?
The answer to this question is burried deeply in OpenBSD's mk files.
The snippet in bsd.dep.mk that triggers the error is a single rule
statement that generates foo.c and foo.h from foo.y with a call to
yacc -d. The rule is generated with a loop, i.e. it is not a prefix
rule. However, a prefix rule context is required for the use of
${.IMPSRC} aka $<. For the .c file such a prefix rule is provided by
bsd.sys.mk and this rule is in scope when make evaluates the yacc rule.
However, for .h file generation from a .y file there is no such prefix
rule defined in any of the Makefiles. Even if it were the .h suffix is
missing from .SUFFIXES and the rule would not be considered.
The obvious way to fix this would be to use $f instead of ${.IMPSRC}.
However, this does not work as $f is then missing the path prefix and
yacc won't find it if an obj directory is used. This is probably the
reason for the use of ${.IMPSRC} in the first place.
Committing on behalf of ehrhardt@
"I like the diff" deraadt@
ok guenther@
tb [Sat, 8 Jan 2022 15:34:59 +0000 (15:34 +0000)]
tiny whitespace tweak
kettenis [Sat, 8 Jan 2022 15:30:46 +0000 (15:30 +0000)]
Remove apldwusb(4). This driver is now unused.
kettenis [Sat, 8 Jan 2022 15:23:42 +0000 (15:23 +0000)]
Oops, missed a compatible string in the previous commit.
jsing [Sat, 8 Jan 2022 12:59:58 +0000 (12:59 +0000)]
Merge SESS_CERT into SSL_SESSION.
There is no reason for SESS_CERT to exist - remove it and merge its members
into SSL_SESSION for the time being. More clean up to follow.
ok inoguchi@ tb@
jsing [Sat, 8 Jan 2022 12:54:32 +0000 (12:54 +0000)]
Remove commented out CERT_* defines.
jsing [Sat, 8 Jan 2022 12:43:44 +0000 (12:43 +0000)]
Rename CERT to SSL_CERT and CERT_PKEY to SSL_CERT_PKEY.
Nearly all structs in libssl start with an SSL_ suffix, rename CERT and
CERT_PKEY for consistency.
ok inoguchi@ tb@
tobias [Sat, 8 Jan 2022 11:07:51 +0000 (11:07 +0000)]
Fix possible use after free with long lines
Files with very long lines on machines with tight memory restrictions
can provoke a failing realloc in expand_linebuf. This error condition
was improperly handled, which could lead to a user after free bug by
using the already freed linebuf variable again.
with input by and okay guenther@
dtucker [Sat, 8 Jan 2022 07:55:26 +0000 (07:55 +0000)]
Remove errant "set -x" left over from debugging.
djm [Sat, 8 Jan 2022 07:37:32 +0000 (07:37 +0000)]
use status error message to communicate ~user expansion failures;
provides better experience for scp in sftp mode, where ~user paths
are more likely to be used; spotted jsg, feedback jsg & deraadt
ok jsg & markus
djm [Sat, 8 Jan 2022 07:36:11 +0000 (07:36 +0000)]
fix some corner-case bugs in scp sftp-mode handling of ~-prefixed
paths; spotted by jsg; feedback jsg & deraadt, ok jsg & markus
djm [Sat, 8 Jan 2022 07:34:57 +0000 (07:34 +0000)]
more idiomatic error messages; spotted by jsg & deraadt
ok jsg & markus
djm [Sat, 8 Jan 2022 07:33:54 +0000 (07:33 +0000)]
add a variant of send_status() that allows overriding the default,
generic error message. feedback/ok markus & jsg
djm [Sat, 8 Jan 2022 07:32:45 +0000 (07:32 +0000)]
refactor tilde_expand_filename() and make it handle ~user paths with no
trailing slash; feedback/ok markus and jsg
tb [Sat, 8 Jan 2022 07:25:52 +0000 (07:25 +0000)]
x509_cpols.c will need to include x509_lcl.h soon
dtucker [Sat, 8 Jan 2022 07:01:13 +0000 (07:01 +0000)]
Enable all supported hostkey algorithms (but no others). Allows hostbased
test to pass when built without OpenSSL.
guenther [Sat, 8 Jan 2022 06:49:41 +0000 (06:49 +0000)]
Prep .c files for removing the #includes from */archdep.h
* replace #include "archdep.h" with #includes of what is used, pulling in
"syscall.h", "util.h", and "archdep.h" as needed
* delete #include <sys/syscall.h> from syscall.h
* only pull in <sys/stat.h> to the three files that use _dl_fstat(),
forward declare struct stat in syscall.h for the others
* NBBY is for <sys/select.h> macros; just use '8' in dl_printf.c
* <machine/vmparam.h> is only needed on i386; conditionalize it
* stop using __LDPGSZ: use _MAX_PAGE_SHIFT (already used by malloc.c)
where necessary
* delete other bogus #includes, order legit per style: <sys/*> then
<*/*>, then <*>, then "*"
dir.c improvement from jsg@
ok and testing assistance deraadt@
inoguchi [Sat, 8 Jan 2022 06:05:39 +0000 (06:05 +0000)]
Indicate current default cipher
visa [Sat, 8 Jan 2022 05:40:19 +0000 (05:40 +0000)]
Remove verbose PCI and USB device info from BOOT
BOOT kernels do not print kernel messages, and currently there is no
way to change this at runtime. Remove the verbose device information
to save some space.
visa [Sat, 8 Jan 2022 05:34:54 +0000 (05:34 +0000)]
Adjust debug printfs after pcitag_t type change.
jmatthew [Sat, 8 Jan 2022 00:20:10 +0000 (00:20 +0000)]
Apply mpsafe changes from dwge(4) to dwxe(4):
Rework the tx path to use the consumer and producer positions to work out
the number of slots available, and to put packets on the ring until fewer
than DWXE_NTXSEGS slots are left, making dwxe_start() and dwxe_txeof()
work independently. While here, only write to DWXE_TX_CTL1 once
per call to dwxe_start() rather than once per packet.
Adjust the rx interrupt path to check the number of slots in use and
return slots once per interrupt.
Add interrupt and ifq barriers before taking the interface down.
With all of this done, we can mark dwxe(4) mpsafe.
tested on arm64 (a64 sopine) by mlarkin@ and armv7 (h2+) by me
ok dlg@
tb [Fri, 7 Jan 2022 22:46:05 +0000 (22:46 +0000)]
Add some workarounds to make build_addr_block_test_data const.
tb [Fri, 7 Jan 2022 21:58:17 +0000 (21:58 +0000)]
Prepare to provide EVP_AEAD_CTX_{new,free}()
ok jsing
kettenis [Fri, 7 Jan 2022 19:03:57 +0000 (19:03 +0000)]
Add code to initialize the PCIe host bridge hardware. We currently rely on
U-Boot to initialize the hardware for us, but it is better if we can cope
with this ourselves.
ok patrick@
tb [Fri, 7 Jan 2022 17:17:02 +0000 (17:17 +0000)]
Revert previous accidental commit
otto [Fri, 7 Jan 2022 17:14:42 +0000 (17:14 +0000)]
If no date could be parsed, bail out early and fix an error return that
leaked; ok florian@
jsing [Fri, 7 Jan 2022 16:45:06 +0000 (16:45 +0000)]
Rename dh_tmp to dhe_params.
Support for non-ephemeral DH was removed a long time ago - as such, the
dh_tmp and dh_tmp_cb are used for DHE parameters. Rename them to reflect
reality.
ok inoguchi@ tb@
deraadt [Fri, 7 Jan 2022 16:39:18 +0000 (16:39 +0000)]
SIOCSIFXFLAGS drops into the SIOCSIFFLAGS to perform auto-up of the
interface. If this operation fails (probably due to missing firmware),
we must undo changes to the SIOCSIFXFLAGS xflags.
ok stsp.
jsing [Fri, 7 Jan 2022 15:56:33 +0000 (15:56 +0000)]
Stop attempting to duplicate the public and private key of dh_tmp.
Support for non-ephemeral DH was removed a very long time ago - the only
way that dh_tmp is set is via DHparams_dup(), hence the public and private
keys are always going to be NULL.
ok inoguchi@ tb@
jsing [Fri, 7 Jan 2022 15:46:30 +0000 (15:46 +0000)]
Convert legacy server to tls_key_share.
This requires a few more additions to the DHE key share code - we need to
be able to either set the DHE parameters or specify the number of key bits
for use with auto DHE parameters. Additionally, we need to be able to
serialise the DHE parameters to send to the client.
This removes the infamous 'tmp' struct from ssl3_state_internal_st.
ok inoguchi@ tb@
kevlo [Fri, 7 Jan 2022 13:56:54 +0000 (13:56 +0000)]
.glue_7 is used for arm code calling thumb code, and .glue_7t is used for
thumb code calling arm code, no need to put these input sections at the text
output section.
ok jsg@ kettenis@
tb [Fri, 7 Jan 2022 12:24:17 +0000 (12:24 +0000)]
A few more files need asn1_locl.h.
tb [Fri, 7 Jan 2022 11:13:54 +0000 (11:13 +0000)]
include asn1_locl.h where it will be needed for the bump.
discussed with jsing
visa [Fri, 7 Jan 2022 10:48:59 +0000 (10:48 +0000)]
Add missing dependency.
martijn [Fri, 7 Jan 2022 10:20:11 +0000 (10:20 +0000)]
Somehow I always forget that the more global LC_ALL takes precedence over
the more specific LC_CTYPE. Things are weird that way.
The problem here was that "eval" and "LC_ALL=" were swapped, not the
priority of variables.
pointed out by naddy@
OK tb@
tb [Fri, 7 Jan 2022 09:55:31 +0000 (09:55 +0000)]
Prepare to make RSA and RSA_METHOD opaque by including rsa_locl.h
where it will be needed in the upcoming bump.
discussed with jsing
tb [Fri, 7 Jan 2022 09:45:52 +0000 (09:45 +0000)]
Add an essentially empty ocsp_local.h and include it in the files
that will need it in the upcoming bump.
discussed with jsing
tb [Fri, 7 Jan 2022 09:40:03 +0000 (09:40 +0000)]
gost needs to look into ecs_locl.h
tb [Fri, 7 Jan 2022 09:35:36 +0000 (09:35 +0000)]
Prepare the move of DSA_SIG, DSA_METHOD and DSA to dsa_locl.h by
including the local header where it will be needed.
discussed with jsing
tb [Fri, 7 Jan 2022 09:27:13 +0000 (09:27 +0000)]
Add an essentially empty dh_local.h and include it in the files where
it will be needed in the upcoming bump.
discussed with jsing
tb [Fri, 7 Jan 2022 09:21:21 +0000 (09:21 +0000)]
zap trailing whitespace
jsg [Fri, 7 Jan 2022 09:08:15 +0000 (09:08 +0000)]
fix aac build after -Wno-uninitialized was removed
tb [Fri, 7 Jan 2022 09:07:00 +0000 (09:07 +0000)]
Let dtlstest peek into bio_local.h
tb [Fri, 7 Jan 2022 09:02:17 +0000 (09:02 +0000)]
Add a new, mostly empty, bio_local.h and include it in the files
that will need it in the upcoming bump.
discussed with jsing
tb [Fri, 7 Jan 2022 07:34:34 +0000 (07:34 +0000)]
Sync EVP_MD_CTX to heap switch from npppd.
ok millert
tb [Fri, 7 Jan 2022 07:33:35 +0000 (07:33 +0000)]
npppd: convert to EVP_MD_CTX on heap
In the upcoming libcrypto bump, EVP_MD_CTX will become opaque, so
all EVP_MD_CTX variables will need to be moved from the stack to
the heap. This is a mechanical conversion which also switches
from EVP_Digest{Init,Final}() to their _ex() versions as suggested
by millert.
We cannot do error checking since this code is structured in
several layers of void functions. This will have to be fixed
by someone else.
ok millert
guenther [Fri, 7 Jan 2022 02:47:06 +0000 (02:47 +0000)]
hibernate_clear_signature() is only used by hibernate_resume(), so
pass in the already read hibernate_info instead of reading it again.
ok deraadt@
guenther [Fri, 7 Jan 2022 02:26:53 +0000 (02:26 +0000)]
Extract the slice from the zeroth swap device instead of assuming
it's the 'b' slice and (sanity) check against the partition count.
Also, make the "is union hibernate_info too large?" a compile time
check.
ok deraadt@
afresh1 [Fri, 7 Jan 2022 02:25:40 +0000 (02:25 +0000)]
whitespace
jsg [Fri, 7 Jan 2022 01:16:26 +0000 (01:16 +0000)]
regen
jsg [Fri, 7 Jan 2022 01:13:15 +0000 (01:13 +0000)]
stop creating old drm device nodes
jsg [Fri, 7 Jan 2022 00:44:17 +0000 (00:44 +0000)]
mention radeondrm on riscv64
jsg [Thu, 6 Jan 2022 23:44:21 +0000 (23:44 +0000)]
stop chowning old drm device nodes
dtucker [Thu, 6 Jan 2022 22:14:25 +0000 (22:14 +0000)]
Don't explicitly set HostbasedAuthentication in sshd_config.
It defaults to "no", and not explicitly setting it allows us to enable
it for the (optional) hostbased test.
djm [Thu, 6 Jan 2022 22:06:51 +0000 (22:06 +0000)]
allow hostbased auth to select RSA keys when only RSA/SHA2 are
configured (this is the default case); ok markus@