kettenis [Tue, 28 Jun 2022 08:14:03 +0000 (08:14 +0000)]
Add hardware ID for XHCI-compliant USB controller without standard debug.
ok jsg@
mvs [Tue, 28 Jun 2022 08:01:40 +0000 (08:01 +0000)]
Introduce `pipexoutq' mbuf(9) queue, and put outgoing pipex(4) related
PPPOE packets within. Do (*if_output)() calls within netisr handler with
netlock held.
We can't predict netlock state when pipex(4) related (*if_qstart)()
handlers called. This means we can't use netlock within pppac_qstart()
and pppx_if_qstart() handlers.
ok bluhm@
beck [Tue, 28 Jun 2022 07:56:34 +0000 (07:56 +0000)]
Fix the legacy verifier callback behaviour for untrusted certs.
The verifier callback is used by mutt to do a form of certificate
pinning where the callback gets fired and depending on a
cert saved to a file will decide to accept an untrusted cert.
This corrects two problems that affected this. The callback was not
getting the correct depth and chain for the error where mutt would
save the certificate in the first place, and then the callback was not
getting fired to allow it to override the failing certificate
validation.
thanks to Avon Robertson <avon.r@xtra.co.nz> for the report and
sthen@ for analysis.
"The callback is not an API, it's a gordian knot - tb@"
ok jsing@
nicm [Tue, 28 Jun 2022 07:36:52 +0000 (07:36 +0000)]
tparm %l should push strlen(pop) onto the stack not insert it into the
result, from ncurses 5.9 patch
20130126:
+ change %l behavior in tparm to push the string length onto the
stack rather than saving the formatted length into the output
buffer (report by Roy Marples, cf: 980620).
ok millert
jmc [Tue, 28 Jun 2022 06:09:14 +0000 (06:09 +0000)]
reflect the update to -D arg name in usage();
tb [Tue, 28 Jun 2022 05:49:05 +0000 (05:49 +0000)]
Unbreak tree: add log_policy() implementation missing from previous commit.
jsg [Tue, 28 Jun 2022 04:36:29 +0000 (04:36 +0000)]
spelling
job [Tue, 28 Jun 2022 01:40:29 +0000 (01:40 +0000)]
Remove superfluous 'any'
jsg [Tue, 28 Jun 2022 01:12:44 +0000 (01:12 +0000)]
transistion -> transition
jsg [Tue, 28 Jun 2022 00:26:21 +0000 (00:26 +0000)]
Entensions -> Extensions
djm [Mon, 27 Jun 2022 21:41:55 +0000 (21:41 +0000)]
allow arguments to sftp -D option, e.g.
sftp -D "/usr/libexec/sftp-server -el debug3"
ok markus@
claudio [Mon, 27 Jun 2022 21:26:46 +0000 (21:26 +0000)]
Rework the rttimer code. Instead of a global queue and a global timeout
use a per rttimer struct timeout. On enqueue the struct rttimer belongs
to the timeout, in case the route is removed before the timer fires
cleanup based on the timeout_del() return value. If the timeout currently
running then just clear the rtt_rt pointer and let the timeout handle the
cleanup. This should hopefully fix the icmp_pmtu_timeout crashes reported
by some people.
OK bluhm@
bluhm [Mon, 27 Jun 2022 20:47:10 +0000 (20:47 +0000)]
Push the kernel lock down into arpresolve(). We still need it to
prevent concurrent access to rt_llinfo from rtrequest_delete().
But the common case, when the MAC address is already known, works
without lock.
tested by Hrvoje Popovski; OK mvs@
miod [Mon, 27 Jun 2022 20:22:26 +0000 (20:22 +0000)]
Revert 1.44; that slow getsecs() workaround had been added for the sake of
an i386 system noone remembers details about and which is unlikely to be
relevant those days, and has been found to misbehave on some modern systems,
such as the OnLogic Helix 500, or RPi4 with glass console.
miod [Mon, 27 Jun 2022 20:14:51 +0000 (20:14 +0000)]
Fix comment.
bluhm [Mon, 27 Jun 2022 17:15:35 +0000 (17:15 +0000)]
Fix white space and wrap long lines.
jmc [Mon, 27 Jun 2022 16:39:34 +0000 (16:39 +0000)]
zap extraneous .Pp
jmc [Mon, 27 Jun 2022 16:27:03 +0000 (16:27 +0000)]
tweak the tso text a little;
deraadt [Mon, 27 Jun 2022 16:10:07 +0000 (16:10 +0000)]
Delete the ancient "hold Shift key to force CHS" code. Noone has needed
this in decades.
ok sthen krw
dv [Mon, 27 Jun 2022 15:12:14 +0000 (15:12 +0000)]
vmm: move ept pointer configuration to vcpu_init_vmx
No need to be twiddling eptp in vcpu_reset_regs.
ok mlarkin@
jan [Mon, 27 Jun 2022 15:11:23 +0000 (15:11 +0000)]
Introduce Large Receive Offloading of TCP segment offloading for ix(4). It is
disabled by default. Also add a tso option to ifconfig(8) to enable and
disable this feature.
ok deraadt
dv [Mon, 27 Jun 2022 15:05:34 +0000 (15:05 +0000)]
vmm: zero virtual addresses of vcpu state pages after freeing
Consolidate the km_free calls while at it.
ok mlarkin@
beck [Mon, 27 Jun 2022 15:03:11 +0000 (15:03 +0000)]
Correct misleading comment for URI parsing
ok jsing@
cheloha [Mon, 27 Jun 2022 14:26:05 +0000 (14:26 +0000)]
kbind(2): unlock syscall, push kernel lock down to binding loop
- Rearrange the security check code in sys_kbind() so that we only
need to take the kernel lock once if we need to raise SIGILL.
- Protect process.ps_kbind_addr and process.ps_kbind_cookie with
process.ps_mtx. This is easier to do after the aforementioned
rearrangement. Under normal circumstances this isn't necessary:
the process is single-threaded when we initialize kbind(2).
But in stranger situations this brief mutex ensures that the
first thread to reach sys_kbind() initializes both variables.
- Wrap the binding loop with the kernel lock. We need to carefully
confirm that uvm_unmap_remove(), uvm_map_extract(), and
uvm_unmap_detach() are MP-safe in a subsequent patch before
completely removing the kernel lock from sys_kbind().
- Remove the kernel lock from kbind(2) in syscalls.master.
Prompted by mpi@, dlg@, and deraadt@. Current patch workshopped with
deraadt@. Based on a patch from dlg@.
With input from dlg@, bluhm@, mpi@, kettenis@, deraadt@, and
guenther@.
Thread: https://marc.info/?l=openbsd-tech&m=
165274831829349&w=2
ok deraadt@ kettenis@ mpi@
beck [Mon, 27 Jun 2022 14:23:40 +0000 (14:23 +0000)]
Add function to free all of the issuer cache.
ok jsing@
visa [Mon, 27 Jun 2022 14:11:44 +0000 (14:11 +0000)]
Remove switch(4) leftovers.
OK deraadt@ mpi@ claudio@ miod@
tb [Mon, 27 Jun 2022 14:10:22 +0000 (14:10 +0000)]
Allow security_level to mestastasize into the verifier
The tentacles are everywhere. This checks that all certs in a chain
have keys and signature algorithms matching the requirements of the
security_level configured in the verify parameters.
ok beck jsing
tb [Mon, 27 Jun 2022 14:00:09 +0000 (14:00 +0000)]
Prepare to provide X509_VERIFY_PARAM_set_auth_level()
For some unknown reason this needed a different name than security_level,
both internally and in the public API. Obviously it is exactly the same
garbage.
ok beck jsing
beck [Mon, 27 Jun 2022 13:54:57 +0000 (13:54 +0000)]
Add new time manipulation funcitons that OpenSSL has exposed that
the world seems to be using.
Symbols.list changes and exposure to wait for minor bump
ok jsing@ jca@
deraadt [Mon, 27 Jun 2022 13:48:38 +0000 (13:48 +0000)]
install script no longer creates a dhclient.conf under any circumstances,
so we do not need to copy it to the new system.
visa [Mon, 27 Jun 2022 13:39:58 +0000 (13:39 +0000)]
Fix lock order reversal in nfs_inactive()
Make the silly file removal happen after the vnode has been unlocked.
This avoids a file-directory reversal in the vnode locking order.
OK jca@
visa [Mon, 27 Jun 2022 13:35:21 +0000 (13:35 +0000)]
kqueue: Clear task when closing kqueue
When closing a kqueue, block until any pending wakeup task has finished.
Otherwise, if a pending task progressed slowly, the kqueue could stay
alive longer than the associated file descriptor table, causing
a use-after-free in KQRELE().
This also fixes a failed assertion "p->p_kq->kq_refcnt.r_refs == 1" in
kqpoll_exit().
The use-after-free bug had existed since the introduction of
kqueue_task() (the bug could occur if fdplock() blocked in KQRELE()).
However, the issue became worse when the task was allowed to run without
the kernel lock in sys/kern/kern_event.c r1.187.
Prompted by a report from Mikhail on bugs@.
OK mpi@
Reported-by: syzbot+fca7e4fa773c90886819@syzkaller.appspotmail.com
claudio [Mon, 27 Jun 2022 13:29:40 +0000 (13:29 +0000)]
Regress test for the open policy role capability. Make sure it properly
fails when enforced or there is a missmatch and that the session is accepeted
if the roles match.
claudio [Mon, 27 Jun 2022 13:27:38 +0000 (13:27 +0000)]
bgpctl bits for RFC 9234 support.
OK tb@
claudio [Mon, 27 Jun 2022 13:26:51 +0000 (13:26 +0000)]
Add support for RFC 9234 - Route Leak Prevention and Detection Using Roles
With this it is possible to send a role in the OPEN message and if that
was successful the RDE will add the new OTC attribute if necessary.
OK tb@
jan [Mon, 27 Jun 2022 13:14:49 +0000 (13:14 +0000)]
Remember the error of ucomreadcb() for the next ucomread() call and returns an
EIO. Thus the userland notices the error and closes the device. We forget the
error on reopen and the device works again.
Ok mbuhl
anton [Mon, 27 Jun 2022 13:03:32 +0000 (13:03 +0000)]
Allow the pluart(4) baud rate to be changed.
It's most likely that users have the wrong baud rate in /etc/ttys as
this was corrected in revision 1.11 of sys/dev/ic/pluart.c. Make sure to
change the console baud rate from 38400 to 115200 in /etc/ttys before
upgrading.
ok visa@
bluhm [Mon, 27 Jun 2022 12:47:07 +0000 (12:47 +0000)]
Instead of calling getuptime() all the time in ARP code, do it only
once per function. This gives a more consistent time value.
OK claudio@ miod@ mvs@
tb [Mon, 27 Jun 2022 12:36:05 +0000 (12:36 +0000)]
Prepare to provide EVP_PKEY_security_bits()
This also provides a pkey_security_bits member to the PKEY ASN.1 methods
and a corresponding setter EVP_PKEY_asn1_set_security_bits().
ok beck jsing
tb [Mon, 27 Jun 2022 12:31:38 +0000 (12:31 +0000)]
Prepare to provide DH_security_bits()
ok beck jsing
tb [Mon, 27 Jun 2022 12:30:28 +0000 (12:30 +0000)]
Prepare to provide RSA_security_bits()
ok beck jsing
tb [Mon, 27 Jun 2022 12:28:46 +0000 (12:28 +0000)]
Prepare to provide DSA_security_bits()
ok beck jsing
tb [Mon, 27 Jun 2022 12:25:49 +0000 (12:25 +0000)]
Prepare to provide BN_security_bits()
ok beck jsing
sthen [Mon, 27 Jun 2022 11:01:41 +0000 (11:01 +0000)]
Move rc.firsttime additions before some slower jobs run from install.sub.
Reduces the risk of post-upgrade steps (sysmerge -b etc) being missed if
there was some issue with those jobs e.g. fw_update or reorder_kernel
triggering watchdog or an impatient admin to reboot the system. ok florian@
martijn [Mon, 27 Jun 2022 10:31:17 +0000 (10:31 +0000)]
Mostly rewrite appl_request_upstream_reply.
The old code had a potential off by one underflow, which is unlikely to be
hit with the current builtin backend, and didn't show the returned
varbindlist correct.
OK sthen@
martijn [Mon, 27 Jun 2022 10:25:32 +0000 (10:25 +0000)]
Initialize oidbuf and regionbuf when registering a region in appl_region.
This prevents us from spewing garbage on error.
regionbuf case pointed out by tb@
OK deraadt@ tb@
job [Mon, 27 Jun 2022 10:18:27 +0000 (10:18 +0000)]
Add skiplist option to steer clear of skiplisted hosts
Blocking outbound connections towards RPKI publication servers based
on IP or IPv6 address in external instrumentation like HTTP proxies
or pf(4) rules is somewhat unwieldy. It might be easier for operators
if we offer a mechanism that cuts at the CA cert SIA parsing step.
OK claudio@ tb@
bluhm [Mon, 27 Jun 2022 10:02:20 +0000 (10:02 +0000)]
Do not run receive and transmit interrupt handlers when the bnxt(4)
interface is not running. Prevents a panic triggered by ifconfig
bnxt0 down.
found by Hrvoje Popovski; OK jmatthew@
stsp [Mon, 27 Jun 2022 09:16:56 +0000 (09:16 +0000)]
Fix bwfm(4) ifconfig media display on devices with sta_info command version 3.
ok jsg@
nicm [Mon, 27 Jun 2022 09:16:54 +0000 (09:16 +0000)]
Tweak previous - find end of style correctly.
nicm [Mon, 27 Jun 2022 09:14:49 +0000 (09:14 +0000)]
Do not expand single character format aliases inside #[] since they
interfere with colours. GitHub issue 3239 from Magnus Gross.
claudio [Mon, 27 Jun 2022 08:15:38 +0000 (08:15 +0000)]
Don't copy more than sa_len from the sockaddr to the sysctl / rt msg buffer.
In the rt msg buffer the size of the full buffer is calculated first then
filled out after allocating the mbuf. In the sysctl code this is not needed
since the buffer is already provided.
OK mvs@
mlarkin [Mon, 27 Jun 2022 08:00:31 +0000 (08:00 +0000)]
Whitespace/KNF
mlarkin [Mon, 27 Jun 2022 07:55:28 +0000 (07:55 +0000)]
amdgpio(4): restore pin configuration on resume
Save/restore the pin configuration on suspend/resume for amdgpio(4).
This fixes missing interrupts after resume for trackpads on some
machines, including the ROG Zephyrus 14 and the HP DevOne (and probably
others).
Code based on pchgpio(4).
ok deraadt, kettenis
mvs [Sun, 26 Jun 2022 22:51:58 +0000 (22:51 +0000)]
Mark `pipex_enable' as atomic. We never check `pipex_enable' within
(*if_qstart)() and we don't worry it's not serialized with the rest of
output path. Also we will process already enqueued pipex(4) packets
regardless on `pipex_enable' state.
Use the local copy of `pipex_enable' within pppx_if_output(), otherwise we
loose consistency.
pointed and ok by bluhm@
mvs [Sun, 26 Jun 2022 21:29:34 +0000 (21:29 +0000)]
Don't reset `idle_time' timeout on closed pipex(4) sessions in packet
processing path. Such sessions already reached time to live timeout, and
the garbage collector waits a little to before kill them. Otherwise we
could make session's life time more then PIPEX_CLOSE_TIMEOUT.
ok bluhm@
mvs [Sun, 26 Jun 2022 21:19:53 +0000 (21:19 +0000)]
Don't take kernel lock on pipex(4) pppoe input. This extra serialization
is not required. In packet processing path we have shared netlock held,
but we do read-only access on per session `flags' and `ifindex'. We always
modify them from ioctl(2) path with exclusive netlock held. The rest of
pipex(4) session is immutable or uses per-session locks.
ok bluhm@
schwarze [Sun, 26 Jun 2022 20:30:00 +0000 (20:30 +0000)]
In groff commit
78e66624 on May 7 20:15:33 2021 +1000,
G. Branden Robinson changed the -T ascii rendering
of \(sd, the "second" symbol, U+2033 DOUBLE PRIME, from '' to ".
Follow suit in mandoc.
sthen [Sun, 26 Jun 2022 20:05:06 +0000 (20:05 +0000)]
add a few missing drivers for recent nics, input from jmatthew kettenis mbuhl deraadt
mvs [Sun, 26 Jun 2022 18:56:09 +0000 (18:56 +0000)]
Fix spacing.
op [Sun, 26 Jun 2022 18:48:10 +0000 (18:48 +0000)]
add --null to usage() forgot in previous commit. reminded by jmc@, thanks!
claudio [Sun, 26 Jun 2022 16:07:00 +0000 (16:07 +0000)]
Switch walkargs for the buffer size to size_t and change the overflow
check to the less awkward w->w_needed <= w->w_given.
OK bluhm@
florian [Sun, 26 Jun 2022 16:01:39 +0000 (16:01 +0000)]
remove outdated comment
mvs [Sun, 26 Jun 2022 15:50:21 +0000 (15:50 +0000)]
The "ifq_set_maxlen(..., 1);" hack we use to enforce pipex(4) related
(*if_qstart)() be always called with netlock held doesn't work anymore
with PPPOE sessions.
Introduce `pipex_list_mtx' mutex(9) and use it to protect global pipex(4)
lists and radix trees.
Protect pipex(4) `session' dereference with reference counters, because we
could sleep when accessing pipex(4) from ioctl(2) path, and this is not
possible with mutex(9) held.
ok bluhm@
jmatthew [Sun, 26 Jun 2022 15:38:11 +0000 (15:38 +0000)]
Add missing splx before returning when urtwn_ccmp_decap() fails.
from Christian Ludwig
jmatthew [Sun, 26 Jun 2022 15:33:37 +0000 (15:33 +0000)]
Break out of the switch statement rather than returning early on ioctl
errors, ensuring the IPL is correctly restored.
from Christian Ludwig
jmatthew [Sun, 26 Jun 2022 15:25:03 +0000 (15:25 +0000)]
add missing splx in error path
from Christian Ludwig
mvs [Sun, 26 Jun 2022 13:14:37 +0000 (13:14 +0000)]
'pipex_mppe' and 'pipex_session' structures have uint16_t bit fields
which represent flags. We mix unlocked access to immutable flags with
protected access to mutable ones. This could be not MP independent on
some architectures, so convert these fields to u_int `flags' variables.
ok bluhm@
jsing [Sun, 26 Jun 2022 13:10:15 +0000 (13:10 +0000)]
Provide and use long_{get,set}()
Apparently at some point a LONG_it was misaligned - provide and use
long_{get,set}() so that we always memcpy() rather than doing it some times
but not others. While here provide long_clear() rather than abusing and
reusing long_free().
ok tb@
deraadt [Sun, 26 Jun 2022 12:34:41 +0000 (12:34 +0000)]
Discourage nfs mounting of /var by not talking about it.
ok sthen florian
mbuhl [Sun, 26 Jun 2022 11:37:08 +0000 (11:37 +0000)]
Allow waiting during ktable allocation in pf_ioctl.
OK bluhm
Reported-by: syzbot+50ea4f33ed5dd9264918@syzkaller.appspotmail.com
Reported-by: syzbot+df65f8b7ee8c0089e885@syzkaller.appspotmail.com
beck [Sun, 26 Jun 2022 11:29:27 +0000 (11:29 +0000)]
Fix URI name constraints, allow for URI's with no host part.
Such uri's must be parsed and allowed, but then should
fail if a name constraint is present.
Adds regress testing for this same case.
fixes https://github.com/libressl-portable/openbsd/issues/131
ok tb@
op [Sun, 26 Jun 2022 10:57:36 +0000 (10:57 +0000)]
grep: add --null flag
makes grep print an ASCII NUL byte after the file name to make the
output unambiguous even in the presence of file names with funny
characters.
A previous iteration of this diff was improved by benno@ and tedu@ and
discussed also with sthen@ and deraadt@. deraadt@ also improved the
manpage changes in this version of the diff.
OK deraadt@
jsg [Sun, 26 Jun 2022 10:51:11 +0000 (10:51 +0000)]
drm/amd/display: Don't reinitialize DMCUB on s0ix resume
From Nicholas Kazlauskas
7fd1d002852f93f5c03b3188f585245c50b52aea in linux 5.15.y/5.15.50
79d6b9351f086e0f914a26915d96ab52286ec46c in mainline linux
florian [Sun, 26 Jun 2022 09:43:39 +0000 (09:43 +0000)]
gc trust, it's never set.
OK beck
florian [Sun, 26 Jun 2022 09:36:13 +0000 (09:36 +0000)]
Wait for autoconf interfaces to come up in netstart(8) instead of
rc(8). This makes tunnel interfaces work that depend on working
autoconf interfaces.
OK deraadt
florian [Sun, 26 Jun 2022 08:08:23 +0000 (08:08 +0000)]
Start network auto configuration daemons earlier so that tunnel
interfaces can depend on dhcp or slaac.
dhcpleased needs /var mounted so pull that up, we do not support /var
on nfs.
With & OK deraadt, earlier version OK sthen
jsg [Sun, 26 Jun 2022 07:15:49 +0000 (07:15 +0000)]
sync with arm64.html
mlarkin [Sun, 26 Jun 2022 07:14:55 +0000 (07:14 +0000)]
Delete trailing whitespace. No code change.
dv [Sun, 26 Jun 2022 06:49:09 +0000 (06:49 +0000)]
vmd: create a copy of bios at 4g boundary
Newer Linux kernels call into the bios to perform a reboot and our
version of SeaBIOS assumes there's a "copy" of the bios ending at
4g. When SeaBIOS reads from this area, since vmd doesn't perform
mmio yet, guests terminate with an unhandled fault.
Carve out some space ending at 4g and copy the bios there. Technically
we could load garbage there, but give SeaBIOS what it wants for
now.
ok mlarkin@
deraadt [Sun, 26 Jun 2022 06:28:51 +0000 (06:28 +0000)]
catch up on some country name changes
jsg [Sun, 26 Jun 2022 06:11:49 +0000 (06:11 +0000)]
allow HW_USERMEM64 in sysctl pledge
chromium loads vulkan when going to chrome://gpu
anv, the Intel vulkan driver in Mesa uses HW_USERMEM64
ok sthen@ deraadt@
jsg [Sun, 26 Jun 2022 05:54:38 +0000 (05:54 +0000)]
Pignatoro -> Pignataro
jsg [Sun, 26 Jun 2022 05:24:06 +0000 (05:24 +0000)]
CLang -> Clang
visa [Sun, 26 Jun 2022 05:20:42 +0000 (05:20 +0000)]
Remove unused VOP_POLL().
OK mpi@
tb [Sun, 26 Jun 2022 04:14:43 +0000 (04:14 +0000)]
whitespace
mbuhl [Sat, 25 Jun 2022 20:33:40 +0000 (20:33 +0000)]
Use in_addr for AF_INET.
OK bluhm
tb [Sat, 25 Jun 2022 20:25:43 +0000 (20:25 +0000)]
Don't add unknown filetypes to the entity queue. Otherwise we bail out
without good reason. Regression introduced in a recent refactoring found
by job
ok claudio job
beck [Sat, 25 Jun 2022 20:01:43 +0000 (20:01 +0000)]
Move leaf certificate checks to the last thing after chain validation.
While seemingly illogical and not what is done in Go's validator, this
mimics OpenSSL's behavior so that callback overrides for the expiry of
a certificate will not "sticky" override a failure to build a chain.
ok jsing@
claudio [Sat, 25 Jun 2022 19:21:27 +0000 (19:21 +0000)]
Since 128bit addressing is not enough add some addition 32bit of
scope_id to struct kroute6 to make link local addresses work.
OK tb@
mbuhl [Sat, 25 Jun 2022 19:19:39 +0000 (19:19 +0000)]
Increase the auto partitioner's maximum /usr size to 30G.
OK bluhm, otto, deraadt
mlarkin [Sat, 25 Jun 2022 18:51:52 +0000 (18:51 +0000)]
Add some airports I've landed airplanes at.
jsing [Sat, 25 Jun 2022 17:43:56 +0000 (17:43 +0000)]
Use ints for boolean values.
Switch to using ints for boolean values and use 0 or 1 for constructed,
rather than using 0 the ASN.1 tag encoded value (1 << 5).
ok tb@
mbuhl [Sat, 25 Jun 2022 16:48:57 +0000 (16:48 +0000)]
Add HFE in Ahnui, China.
I flew from there to Xi'an in 2019.
jsing [Sat, 25 Jun 2022 16:15:18 +0000 (16:15 +0000)]
Reuse ASN1_INTEGER functions for ASN1_ENUMERATED_{get,set}()
Instead of having a separate get/set implementation, reuse the ASN1_INTEGER
code. Also prepare to provide ASN1_ENUMERATED_{get,set}_int64().
ok beck@ tb@
jsing [Sat, 25 Jun 2022 15:49:28 +0000 (15:49 +0000)]
Check pointer argument after {d2i,i2d}_ASN1_{BIT_STRING,BOOLEAN,INTEGER}()
jsing [Sat, 25 Jun 2022 15:41:14 +0000 (15:41 +0000)]
Add regress for ASN1_INTEGER_{get,set}_{u,}int64()
jsing [Sat, 25 Jun 2022 15:39:12 +0000 (15:39 +0000)]
Rewrite ASN1_INTEGER_{get,set}() using CBS/CBB
In the process, prepare to provide ASN1_INTEGER_{get,set}_{u,}int64().
ok beck@ tb@
florian [Sat, 25 Jun 2022 15:38:22 +0000 (15:38 +0000)]
remove unused struct members
jsing [Sat, 25 Jun 2022 14:22:54 +0000 (14:22 +0000)]
Simplify ASN1_INTEGER_cmp()
ok beck@ tb@