kn [Sat, 13 Nov 2021 17:49:40 +0000 (17:49 +0000)]
Simplify address family handling, ditch inet_ntop(3)
Reduce duplicate code, use getnameinfo(3) for IPv4 as well and use
gai_strerror(3) in case of failure.
This was split out as part of the previous IPv6-LL fix.
kn [Sat, 13 Nov 2021 17:32:46 +0000 (17:32 +0000)]
Install missing scope identifier for IPv6 link-local addresses
RTM_PROPOSAL's list of IP addresses does not contain scope IDs by design.
This is not a problem as the proposal is always bound to an interface,
as long as we use it...
Fill in the scope ID for link-local IPs and replace inet_ntop(3) usage with
getnameinfo(3) in the IPv6 case such that it actually turns up in the string
representation.
Otherwise resolv.conf(5) ends up with "nameserver fe80::1" entries and
libc/asr won't be able to resolve without an interface.
deraadt [Sat, 13 Nov 2021 17:26:13 +0000 (17:26 +0000)]
It really looks like pledge "stdio dns" is possible earlier.
Discussed with mestre
schwarze [Sat, 13 Nov 2021 17:12:18 +0000 (17:12 +0000)]
document ASN1_STRING_copy(3)
kn [Sat, 13 Nov 2021 12:09:30 +0000 (12:09 +0000)]
Use a proper PKGPATH in the WRKOBJDIR example
www/mozilla is a module, www/mozilla-firefox is an actual port.
OK sthen
matthieu [Sat, 13 Nov 2021 08:48:50 +0000 (08:48 +0000)]
Un-hook the X11 tests. The new X server doesn't install libfb anymore.
ok kettenis@, anton@
anton [Sat, 13 Nov 2021 08:25:42 +0000 (08:25 +0000)]
hook up unfdpassfail and ungc
visa [Sat, 13 Nov 2021 06:04:02 +0000 (06:04 +0000)]
Let filt_fileattach() run without the kernel lock
This makes it possible to attach pipe, socket and kqueue event filters
without acquiring the kernel lock. Event filters behind vn_kqfilter()
are not MP-safe yet, so vn_kqfilter() has to take KERNEL_LOCK().
dmabuf_kqfilter() can skip locking because it has no side effects.
OK anton@, mpi@
guenther [Fri, 12 Nov 2021 22:28:13 +0000 (22:28 +0000)]
Add support for RELR relocations in the executable and share objects.
This doesn't affect ld.so's self-reloc, which still requires DT_REL/DT_RELA
ok kettenis@
guenther [Fri, 12 Nov 2021 22:23:40 +0000 (22:23 +0000)]
Teach binutils enough about RELR relocations to not break them and for
readelf to display them in a way compatible with llvm-readelf, including
the --raw-relr debugging option
ok kettenis@
guenther [Fri, 12 Nov 2021 22:20:57 +0000 (22:20 +0000)]
Add #defines and typedefs for RELR, a compressed form for relative relocations
ok kettenis@
schwarze [Fri, 12 Nov 2021 18:56:00 +0000 (18:56 +0000)]
Document the public constants X509_V_FLAG_POLICY_MASK
and X509_V_FLAG_USE_CHECK_TIME.
While here, fix a typo and improve the wording
for X509_V_FLAG_NOTIFY_POLICY.
cheloha [Fri, 12 Nov 2021 17:57:13 +0000 (17:57 +0000)]
sigsuspend(2): sleep on &nowake channel
sigsuspend(2) only returns upon delivery of a signal: we do not expect
a wakeup(9). Indicate this by sleeping on &nowake instead of
&p->p_p->ps_sigacts. We still need to loop here to handle spurious
wakeups, though.
Spurious wakeup case pointed out by kettenis@.
ok claudio@
kettenis [Fri, 12 Nov 2021 17:05:15 +0000 (17:05 +0000)]
Add support for controlling keyboard LEDs.
ok patrick@
kettenis [Fri, 12 Nov 2021 17:04:32 +0000 (17:04 +0000)]
Use a mutex to lock the bus such that we can safely access the bus from
interrupt handlers and process context.
ok patrick@
claudio [Fri, 12 Nov 2021 16:57:24 +0000 (16:57 +0000)]
Implement the probe variable. Can be used for example with
@map[probe] = count();
OK mpi@
deraadt [Fri, 12 Nov 2021 15:49:41 +0000 (15:49 +0000)]
"netconfigd" is now better known as resolvd(8)
ajacoutot [Fri, 12 Nov 2021 15:40:19 +0000 (15:40 +0000)]
Bump maxproc-cur to 512 for the pbuild user.
This will prevent recurring failures in bulks ('cannot fork').
ok tb@ sthen@ deraadt@
millert [Fri, 12 Nov 2021 15:16:58 +0000 (15:16 +0000)]
Update awk to Nov 03, 2021 version.
We already had the fix so no actual code changes.
schwarze [Fri, 12 Nov 2021 14:34:57 +0000 (14:34 +0000)]
mention what X509_cmp_time(3) does with a cmp_time argument of NULL
tobhe [Fri, 12 Nov 2021 14:18:54 +0000 (14:18 +0000)]
Refactor order of checks when handling IKEv2 message fragments.
Only modify SA after sucessful ikev2_msg_decrypt().
ok patrick@
schwarze [Fri, 12 Nov 2021 14:05:28 +0000 (14:05 +0000)]
As pointed out by tb@, LibreSSL no longer supports user-defined
X509_LOOKUP_METHODs because these objects are now opaque.
Simplify the documentation accordingly, shortening it by
about 35 input lines in total, but continue providing the
information which RETURN VALUES functions might return with
other implementations of the library.
OK tb@
schwarze [Fri, 12 Nov 2021 11:41:50 +0000 (11:41 +0000)]
In x509_vfy.h rev. 1.41, tb@ provided X509_STORE_CTX_get_by_subject(3),
changed the return type of X509_OBJECT_get_type(3) and argument
types of X509_LOOKUP_by_subject(3), X509_LOOKUP_by_issuer_serial(3),
X509_LOOKUP_by_fingerprint(3), X509_LOOKUP_by_alias(3),
X509_OBJECT_idx_by_subject(3), X509_OBJECT_retrieve_by_subject(3),
and X509_STORE_get_by_subject(3) from int to X509_LOOKUP_TYPE, and
in rev. 1.42, he provided X509_STORE_CTX_get_obj_by_subject(3).
Adjust the documentation.
Joint work with and OK tb@.
stsp [Fri, 12 Nov 2021 11:41:04 +0000 (11:41 +0000)]
Add support for 40MHz channels to the iwn(4) driver.
Tested:
4965: jsg
5300: stsp, Jan Stary
6030: Fred Crowsons
6200: stsp
6205: stsp, Josh Grosse
6300: okan, afresh1
stsp [Fri, 12 Nov 2021 11:40:35 +0000 (11:40 +0000)]
Sync the iwn(4) "enhanced Tx power" eeprom data structure with Linux.
No functional change, as this data is not being used anywhere yet.
robert [Fri, 12 Nov 2021 10:09:58 +0000 (10:09 +0000)]
sync after libc++abi minor bump
robert [Fri, 12 Nov 2021 10:08:35 +0000 (10:08 +0000)]
backport https://reviews.llvm.org/
D107127 to fix shared libraries using emutls
Our emulated TLS implementation relies on local state (e.g. for the pthread
key), and if we duplicate this state across different shared libraries,
accesses to the same TLS variable from different shared libraries will yield
different results (see https://github.com/android/ndk/issues/1551 for an
example). __emutls_get_address is the only external entry point for emulated
TLS, and by making it default visibility and weak, we can rely on the dynamic
linker to coalesce multiple copies at runtime and ensure a single unique copy
of TLS state. This is a best effort;
Also bump the libc++abi minor because now it picks up the __emutls_get_address
symbol.
ok kettenis@
ajacoutot [Fri, 12 Nov 2021 08:47:02 +0000 (08:47 +0000)]
Consistency in test; no behavior change.
ajacoutot [Fri, 12 Nov 2021 08:44:05 +0000 (08:44 +0000)]
Set SECONDS to 0 in _rc_wait.
While this is not strictly required, it's a failsafe and more fair to
daemon_timeout as we will effectively wait for the start/stop/reload sequence
instead of the duration of the rc.d script itself.
ajacoutot [Fri, 12 Nov 2021 08:38:02 +0000 (08:38 +0000)]
Simplify _rc_exit.
anton [Fri, 12 Nov 2021 06:53:51 +0000 (06:53 +0000)]
honor objdir
deraadt [Fri, 12 Nov 2021 05:23:49 +0000 (05:23 +0000)]
aggressively pre-fill the pollfd array with fd=-1
visa [Fri, 12 Nov 2021 04:34:22 +0000 (04:34 +0000)]
Keep knotes between poll/select systems calls
Reduce the time overhead of kqueue-based poll(2) and select(2) by
keeping knotes registered between the system calls. It is expected that
the set of monitored file descriptors is relatively unchanged between
consecutive iterations of these system calls. By keeping the knotes,
the system saves the effort of repeated knote unregistering and
re-registering.
To avoid receiving events from file descriptors that are no longer in
the monitored set, each poll/select knote is assigned an increasing
serial number. Every iteration of poll/select uses a previously unused
range of serials for its knotes. In the setup stage, kqueue_register()
updates the serials of any existing knotes in the currently monitored
set. Function kqueue_scan() delivers only the events whose serials are
recent enough; expired knotes are dropped. When the serial range is
about to wrap around, all the knotes in the kqueue backend are dropped.
This change is a space-time tradeoff. Memory usage is increased somewhat
because of the retained knotes. The increase is limited by the number
of open file descriptors and active threads.
Idea from DragonFly BSD, initial patch by mpi@, kqueue_scan()-based
approach by me.
Tested by anton@ and mpi@
OK mpi@
tobhe [Thu, 11 Nov 2021 22:12:52 +0000 (22:12 +0000)]
Add test case for INVALID_KE in IKE_SA_INIT fallback.
kn [Thu, 11 Nov 2021 21:05:46 +0000 (21:05 +0000)]
nwid -> join
Missed in the previous commit to the installer and wifi driver manuals:
---
Use ifconfig(8)'s "join" command by default
Its adoption went quite well, so install "join" rather than the old "nwid"
in new hostname.if(5) files and follow this trend in our wifi manuals.
OK deraadt sthen
---
Spotted/diff from From Raf Czlonka < rczlonka AT gmail DOT com>, thanks!
Tweak the example sentence while here.
Feedback jmc sthen
jmc [Thu, 11 Nov 2021 20:42:54 +0000 (20:42 +0000)]
add some missing Ns; from leon fischer
kn [Thu, 11 Nov 2021 20:25:56 +0000 (20:25 +0000)]
Make "config -e" work with ramdisk kernels
amd64, alpha, i386 and macppc strip *all* symbols off the ramdisk bsd.rd
(before compressing it) and thus break config(8)'s modification feature:
$ gzcat bsd.rd > bsd.rd.raw
$ config -e bsd.rd.raw
...
config: failed to get first cfdata
This is different from "boot> boot /bsd.rd -c" which sucessfully drops into
UKC on all platforms regardless of stripping.
Having needed "config -e" this on arm64 made me look into this for all
platforms. Other platforms work because they don't strip these symbols.
Tweak objcopy(1)'s stripping on amd64 and macppc to unbreak permanent
modifications. I have no alpha or i386 to test, so these remain broken.
macppc works without cranking media size.
amd64 was cranked to the smallest possible size.
OK deraadt
kettenis [Thu, 11 Nov 2021 18:43:05 +0000 (18:43 +0000)]
The Apple DART has a nifty feature that allows us protection of subranges
of a page with a granularity of 32-bit words. Use this to expose just
those parts of memory to devices that we want the device to see. This
means that handing down a small mbuf to a network card driver no longer
gives the hardware access to other mbufs in the same page.
It turns out that bge(4) always does aligned 64-bit access to memory though.
So round up/down to the nearest 64-bit boundary to prevent triggering an
IOMMU fault.
ok patrick@
mvs [Thu, 11 Nov 2021 18:36:59 +0000 (18:36 +0000)]
Fix GENERIC kernel compilation.
bluhm [Thu, 11 Nov 2021 18:08:17 +0000 (18:08 +0000)]
Do not call ip_deliver() recursively from IPsec. As there is no
crypto task anymore, it is possible to return the next protocol.
Then ip_deliver() will walk the header chain in its loop.
IPsec bridge(4) tested by jan@
OK mvs@ tobhe@ jan@
jmc [Thu, 11 Nov 2021 17:33:10 +0000 (17:33 +0000)]
remove switch(4) entry in SEE ALSO;
mvs [Thu, 11 Nov 2021 17:20:02 +0000 (17:20 +0000)]
Use vnode(9) lock to protect `v_socket' dereference.
The bind(2)ed UNIX socket hat the reference from the file system layer.
When we bind(2) such socket we link it to `v_socket' of associated
vnode(9). When we connect(2) to the socket we previously bind(2)ed we
finding it by namei(9) and obtain it's reference through `v_socket'. When
we close(2) this socket we set `v_socket' of associated vnode(9) to NULL.
This time the global `unp_lock' rwlock(9) protects the whole layer and the
dereference of `v_socket'. With the upcoming fine grained locking diffs it
will be replaced by per-socket solock(). So the dereference of `v_socket'
will be unsafe because it will be unlocked and has no extra reference in
the associated file descriptor.
Actually we have vnode(9) locked while we perform unp_bind() and
unp_connect() paths so use vnode(9) lock in the unp_detach() path too when
we disconnect dying socket from the associated vnode(9). This makes
`v_socket' locking consistent because `v_socket' relies to vnode(9) layer.
Also this makes `v_socket' dereference safe for the upcoming fine grained
locking diffs.
Do `v_socket' unlinking before `unp_refs' list cleanup to prevent
concurrent connections while dying socket `so' is unlocked.
ok bluhm@
deraadt [Thu, 11 Nov 2021 16:41:39 +0000 (16:41 +0000)]
sync
mvs [Thu, 11 Nov 2021 16:35:09 +0000 (16:35 +0000)]
Destroy protocol control block before perform `so_q0' and `so_q' queues
cleanup.
The dying socket is already unlinked from the file descriptor layer, but
still accessible from the stack or from the file system layer. We need to
unlink the socket to prevent concurrent connection when we unlocked dying
socket while we perform `so_q0' or `so_q' queues cleanup or while we
perform (*pr_detach)(). This unlocking will be appeared with the upcoming
fine grained locked sockets diffs.
ok bluhm@
mbuhl [Thu, 11 Nov 2021 16:01:38 +0000 (16:01 +0000)]
exponential_test passes on i386.
schwarze [Thu, 11 Nov 2021 15:58:49 +0000 (15:58 +0000)]
mention the public constants XN_FLAG_SEP_MASK and XN_FLAG_FN_MASK
claudio [Thu, 11 Nov 2021 15:52:33 +0000 (15:52 +0000)]
Move the assignment of http_query down. Also do not assign a non-malloced
string to it since the code assumes it can call free on it.
Fixes crashes noticed by tobhe@ and florian@
OK otto@ tobhe@
deraadt [Thu, 11 Nov 2021 15:32:32 +0000 (15:32 +0000)]
Convert from select() to ppoll(). Along the way, I observed that the
select() code was using exceptfds incorrectly..
ok millert
kn [Thu, 11 Nov 2021 14:03:21 +0000 (14:03 +0000)]
Ignore tags files
Besides obj (and all the build objects inside), tags seem to be the only
thing that's automatically created by our build infrastructure which should
never be committed.
CVS ignores "tags" due to its builtin list of ignore patterns.
Git does not ignore tags, although it has a builtin list (e.g. "*.o").
Got has no such builtin list.
Add "**/tags" to .gitignore specifically to provide a sane default for
Got checkouts.
Mirror .gitignore with sys/.gitignore to have the same experience with
kernel-only checkouts, as is common practise with Got.
OK stsp sthen
schwarze [Thu, 11 Nov 2021 13:58:59 +0000 (13:58 +0000)]
Mention the X509v3_KU_* aliases for the KU_* constants
because some third party application code uses them.
List the full names (even though they are long)
such that they can be found with "man -k Dv=...".
stsp [Thu, 11 Nov 2021 13:36:58 +0000 (13:36 +0000)]
Fix iwn(4) with 4965 devices.
Our driver was using the wrong data structure for RXON_ASSOC commands on
4965 devices. This resulted in fatal firmware errors during association.
Problem found and fix tested on 4965 by jsg@.
Patch also tested on 6200 by me.
schwarze [Thu, 11 Nov 2021 13:13:38 +0000 (13:13 +0000)]
Explicitly list all public functions in roff(7) comments
that are related to this page but intentionally undocumented,
to better support grepping the source directory for function names.
sashan [Thu, 11 Nov 2021 12:49:53 +0000 (12:49 +0000)]
add tests to cover DIOCCHANGERULE ioctl(2)
OK bluhm@
sashan [Thu, 11 Nov 2021 12:35:01 +0000 (12:35 +0000)]
Allow pfi_kif_get() callers to pre-allocate buffer for new kif. If kif
object exists already, then caller must free the pre-allocated buffer.
If caller does not pre-allocate buffer, the pfi_kif_get() will get
memory from pool using M_NOWAIT flag.
Commit is also polishing pfi_initialize() a bit so it uses M_WAITOK
allocation for pfi_all.
there is no change in current behaviour.
feedback by bluhm@
OK bluhm@
ajacoutot [Thu, 11 Nov 2021 12:23:15 +0000 (12:23 +0000)]
Tweak rc_stop and rc_reload description by mentioning their corresponding
_signal variable.
Fix a warning from 'mandoc -T lint' while here.
ajacoutot [Thu, 11 Nov 2021 12:08:36 +0000 (12:08 +0000)]
Run "_rc_wait stop" _before_ stopping the daemon and not after...
This doesn't change the default behavior but fixes rc.d scripts with a home made
rc_stop() function that can block and potentially hangs halt/reboot forever.
ok robert@
schwarze [Thu, 11 Nov 2021 12:06:25 +0000 (12:06 +0000)]
new manual page X509_policy_tree_get0_policies(3),
also documenting X509_policy_tree_get0_user_policies(3)
ajacoutot [Thu, 11 Nov 2021 10:37:36 +0000 (10:37 +0000)]
Return 0 in case we reach KILL; this allows "restart" to work as expected
in this situation.
reported by and ok robert@
claudio [Thu, 11 Nov 2021 10:03:54 +0000 (10:03 +0000)]
Remove switchd regress tests.
claudio [Thu, 11 Nov 2021 10:03:08 +0000 (10:03 +0000)]
Retire switch(4) it never really was production ready and the OpenFlow
API implemented is a deadend.
OK akoshibe@ yasuoka@ deraadt@ kn@ patrick@ sthen@
claudio [Thu, 11 Nov 2021 09:59:19 +0000 (09:59 +0000)]
Retire switchd and switchctl. While interesting they never managed to
really get into a usable state. The OpenFlow API is mostly superseeded
by P4 and so this is a bit of a dead end.
OK akoshibe@ yasuoka@ deraadt@ kn@ patrick@ sthen@
claudio [Thu, 11 Nov 2021 09:52:24 +0000 (09:52 +0000)]
Unhook switchd and switchctl
claudio [Thu, 11 Nov 2021 09:51:32 +0000 (09:51 +0000)]
Regen after switch(4) removal
claudio [Thu, 11 Nov 2021 09:49:29 +0000 (09:49 +0000)]
Regen after switch(4) removal
claudio [Thu, 11 Nov 2021 09:47:32 +0000 (09:47 +0000)]
/dev/switch[0-4] is no longer needed.
claudio [Thu, 11 Nov 2021 09:45:27 +0000 (09:45 +0000)]
Unhook switch.4 and update bridge.4 since some switch(4) specific ioctls
will be removed soon.
OK sthen@ kn@ patrick@
claudio [Thu, 11 Nov 2021 09:39:16 +0000 (09:39 +0000)]
Remove switch(4) specific bits from ifconfig.
OK deraadt@ patrick@
claudio [Thu, 11 Nov 2021 09:38:14 +0000 (09:38 +0000)]
switch(4) and switchd(8) are retiering. Unhook them from various
configuration files.
OK sthen@ kn@ patrick@
tb [Thu, 11 Nov 2021 09:34:27 +0000 (09:34 +0000)]
Convert a for loop into LIST_FOREACH to reduce the diff to NetBSD.
ok millert mpi
claudio [Thu, 11 Nov 2021 09:33:36 +0000 (09:33 +0000)]
switch(4) is being retired, sthen@ already removed the bits in the code
adjust the man page as well.
OK sthen@ kn@ patrick@
nicm [Thu, 11 Nov 2021 09:31:16 +0000 (09:31 +0000)]
If automatic-rename is off, allow the escape sequence to set an empty
window name, GitHub issue 2964.
nicm [Thu, 11 Nov 2021 09:22:33 +0000 (09:22 +0000)]
If trimming menu item text, show key if it would take up less than a
quarter of the space; from Alexis Hildebrandt.
Also new sentence, new line in tmux.1, from jmc.
mestre [Thu, 11 Nov 2021 08:48:48 +0000 (08:48 +0000)]
remove whitespace
mestre [Thu, 11 Nov 2021 08:42:31 +0000 (08:42 +0000)]
There's no need to call pledge(2) so many times, or on many places, with the
same promises, just call it once before the switch case while at the same time
hoisting one unveil(2) so they are all grouped.
The call to pledge(2) on file() can also be simplified since "stdio rpath getpw"
will already be activated when we reach it.
OK deraadt@
anton [Thu, 11 Nov 2021 07:04:45 +0000 (07:04 +0000)]
Here we go again, revert the second attempt to resolve the
UHIDEV_CLAIM_MULTIPLE_REPORTID conflict.
Breaks fido(4) as reported by gnezdo@
bket [Thu, 11 Nov 2021 05:52:03 +0000 (05:52 +0000)]
resolvd(8) also monitors proposals learned by sppp(4)
OK kn@
bluhm [Wed, 10 Nov 2021 21:59:47 +0000 (21:59 +0000)]
When sending via UDP, syslogd(8) can use iovec with sendmsg(2)
instead of copying the strings with snprintf(3).
OK martijn@
sthen [Wed, 10 Nov 2021 20:49:04 +0000 (20:49 +0000)]
Remove switch(4) pieces, feedback/missing piece millert@ ok claudio@ mlarkin@
bket [Wed, 10 Nov 2021 20:24:22 +0000 (20:24 +0000)]
Give sppp(4) its own RTP_PROPOSAL priority
OK semarie@
otto [Wed, 10 Nov 2021 20:15:26 +0000 (20:15 +0000)]
Max size of src also changed. Noted by Mikhail <mp39590@gmail.com>
otto [Wed, 10 Nov 2021 18:38:51 +0000 (18:38 +0000)]
Add missing chunk form previous commit
deraadt [Wed, 10 Nov 2021 16:25:15 +0000 (16:25 +0000)]
sync
schwarze [Wed, 10 Nov 2021 15:06:24 +0000 (15:06 +0000)]
remove a pointless call of setlocale(3);
patch from Jan Stary <hans at stare dot cz>;
OK martijn@
bket [Wed, 10 Nov 2021 15:04:26 +0000 (15:04 +0000)]
sppp(4) - support PPP IPCP extensions for DNS
RFC 1877 extends the family of network control protocols for
establishing and configuring the IPCP over PPP, defining the negotiation
of primary and secondary DNS addresses. After negotiation,
rtm_proposal() is used to send out DNS updates.
Feedback from claudio@ and kn@.
OK claudio@, kn@
schwarze [Wed, 10 Nov 2021 14:34:21 +0000 (14:34 +0000)]
Merge a few additional X509error(ERR_R_MALLOC_FAILURE) calls
and various style improvements from the OpenSSL 1.1.1 branch,
which is still under a free license.
- No need to #include <openssl/lhash.h>.
- BUF_MEM_free(3) and sk_pop_free(3) can handle NULL.
- sk_value(3) can handle -1.
- Test pointers with "== NULL" rather than with "!".
- Use the safer "p = malloc(sizeof(*p))" idiom.
- return is not a function.
- Delete very wrong commented out code.
Including parts of the these commits from the 2015 to 2018 time range:
25aaa98a b4faea50 90945fa3 f32b0abe 26a7d938 7fcdbd83 208056b2 5b37fef0
Requested by and OK tb@.
schwarze [Wed, 10 Nov 2021 13:57:42 +0000 (13:57 +0000)]
If X509_load_cert_crl_file(3) does not find any certificates
and/or CRLs in the PEM input file (for example, if the file
is empty), provide an error message in addition to returning 0.
This merges another part of this OpenSSL commit,
which is still under a free license:
commit
c0452248ea1a59a41023a4765ef7d9825e80a62b
Author: Rich Salz <rsalz@openssl.org>
Date: Thu Apr 20 15:33:42 2017 -0400
I did *not* add the similar message types X509_R_NO_CERTIFICATE_FOUND
and X509_R_NO_CRL_FOUND because both code inspection and testing
have shown that the code generating them is unreachable.
OK tb@
tobhe [Wed, 10 Nov 2021 13:09:05 +0000 (13:09 +0000)]
Look for INVALID_KE group from IKE_SA_INIT in IKE transforms,
not ESP transforms. Fixes broken key exchange negotiation with
matching proposals.
ok patrick@ markus@
krw [Wed, 10 Nov 2021 13:01:08 +0000 (13:01 +0000)]
Set correct prt_flag to 0.
claudio [Wed, 10 Nov 2021 09:31:19 +0000 (09:31 +0000)]
Add a test for the redirect loop limit. It would be great if someone
rewrote these tests to use a local HTTP server instead of some random
external ones.
schwarze [Wed, 10 Nov 2021 09:19:25 +0000 (09:19 +0000)]
Sync some code style improvements from the OpenSSL 1.1.1 branch,
which is still under a free license. No functional change.
- No need to #include <openssl/lhash.h> here.
- return is not a function.
- Do not use the pointless macro BIO_s_file_internal().
- No need to check for NULL before X509_CRL_free(3).
This includes parts of the following OpenSSL commits from
the 2015 to 2017 timeframe:
222561fe,
9982cbbb,
f32b0abe,
26a7d938
OK tb@
claudio [Wed, 10 Nov 2021 09:15:29 +0000 (09:15 +0000)]
Collaps the AFI specific IP print functions into ip_addr_print() their
only difference was the buffersize and AF argument to inet_ntop.
Use INET6_ADDRSTRLEN as the buffer size and convert the AFI to AF in
a switch statement.
OK denis@ kn@ deraadt@
claudio [Wed, 10 Nov 2021 09:13:30 +0000 (09:13 +0000)]
Sync the encoding functions for URI with the version of ftp(1)
This removes ~ from the list of "unsafe" characters.
OK kn@
schwarze [Wed, 10 Nov 2021 09:00:21 +0000 (09:00 +0000)]
Merge two bug fixes from the OpenSSL 1.1.1 branch, which is still
under a free license:
1. If the three X509_load_*(3) functions are called with a NULL
file argument, do not return 1 to the caller because the return
value 1 means "i loaded one certificate or CRL into the store".
2. When calling PEM load functions, do not ask the user for a
password in an interactive manner.
This includes parts of the following commits:
commit
c0452248ea1a59a41023a4765ef7d9825e80a62b
Author: Rich Salz <rsalz@openssl.org>
Date: Thu Apr 20 15:33:42 2017 -0400
Message: [...] Remove NULL checks and allow a segv to occur. [...]
commit
db854bb14a7010712cfc02861731399b1b587474
Author: Bernd Edlinger <bernd.edlinger@hotmail.de>
Date: Mon Aug 7 18:02:53 2017 +0200
Message: Avoid surpising password dialog in X509 file lookup.
OK tb@
job [Wed, 10 Nov 2021 08:34:48 +0000 (08:34 +0000)]
Increase maximum filesize of RPKI objects to 4MB
Based on feedback from Ties de Kock
OK tb@
kn [Wed, 10 Nov 2021 07:32:55 +0000 (07:32 +0000)]
Revert previous
I overlooked the autoinstall case where "Requesting ..." is used,
but those messages that got fixed where omitted in ftp's SMALL version.
Noticed the hard way by anton
anton [Wed, 10 Nov 2021 06:33:30 +0000 (06:33 +0000)]
Second attempt to resolve UHIDEV_CLAIM_MULTIPLE_REPORTID conflict, this
time without using sentinel that cannot be represented using a single
byte. Instead, use 0 as this report ID is reserved according to the USB
HID specification. Fixes attachment of some upd devices which exposes up
to 256 report IDs.
Thanks to Damien Couderc <openbsd at petrocore dot eu> for reporting and
testing.
djm [Wed, 10 Nov 2021 06:29:25 +0000 (06:29 +0000)]
add the sntrup761x25519-sha512@openssh.com hybrid ECDH/x25519 +
Streamlined NTRU Prime post-quantum KEX to the default KEXAlgorithms
list (after the ECDH methods but before the prime-group DH ones).
ok markus@
djm [Wed, 10 Nov 2021 06:25:08 +0000 (06:25 +0000)]
fix ssh-keysign for KEX algorithms that use SHA384/512 exchange hashes;
feedback/ok markus@
dlg [Wed, 10 Nov 2021 04:46:25 +0000 (04:46 +0000)]
whitespace tweak, no functional change.
enjoy rebuilding all the things cos i deleted a space.
dlg [Wed, 10 Nov 2021 04:45:15 +0000 (04:45 +0000)]
whitespace tweaks, no functional change.