visa [Sat, 6 Nov 2021 05:48:47 +0000 (05:48 +0000)]
Make kqread event filter MP-safe
Use the monitored kqueue's kq_lock to serialize kqueue and knote access.
Typically, the "object lock" would cover also the klist, but that is not
possible with kqueues. knote_activate() needs kq_lock of the monitoring
kqueue, which would create lock order troubles if kq_lock was held when
calling KNOTE(&kq->kq_sel.si_note). Avoid this by using a separate klist
lock for kqueues.
The new klist lock is system-wide. Each kqueue instance could have
a dedicated klist lock. However, the efficacy of dedicated versus
system-wide lock is somewhat limited because the current implementation
activates kqueue knotes through a single thread.
OK mpi@
visa [Sat, 6 Nov 2021 05:26:33 +0000 (05:26 +0000)]
Allocate socket and initialize so_lock in one place
This makes witness(4) use a single lock type for tracking so_lock.
Previously, so_lock was covered by two distinct lock types because there
were separate rw_init() initializers in socreate() and sonewconn().
OK kettenis@
kn [Sat, 6 Nov 2021 01:37:02 +0000 (01:37 +0000)]
Add missing newline to fix markup
kn [Sat, 6 Nov 2021 01:32:10 +0000 (01:32 +0000)]
Add "install.site" and "upgrade.site" as additional manual names
This makes "man upgrade.site" work, which is quite convenient for what is
sort of a configuration/script file -- similar to boot.conf(8) which lives
in boot.8 as additional Nm.
kn [Sat, 6 Nov 2021 01:24:37 +0000 (01:24 +0000)]
Add site(8), OpenBSD installation and upgrade customization
This is practically https://www.openbsd.org/faq/faq4.html#site
"Customizing the Install Process"++ with practical examples and references
to/from relevant manuals.
Prodding/first diff from Aaron Poffenberger <akp AT hypernote DOT com>
"I didn't know about it and now I'm using it on all my systems." florian
Feedback semarie afresh1
OK afresh1
tobhe [Fri, 5 Nov 2021 22:51:56 +0000 (22:51 +0000)]
Clarify iface option.
tb [Fri, 5 Nov 2021 22:03:25 +0000 (22:03 +0000)]
typo: a static objects -> a static object
tb [Fri, 5 Nov 2021 21:39:45 +0000 (21:39 +0000)]
First pass of streamlining X509_STORE_get1_{certs,crls}()
These functions are quite messy. On top of the tricky logic querying the
cache, then refreshing the cache (unconditionally or not), then querying
again, then extracting a list of certs/crls and bumping their refcounts,
things are intermixed with locking and needlessly early allocations that
then need to be cleaned up again.
Use X509_STORE_CTX_get_obj_by_subject() to avoid using an object on the
stack and defer allocation of the returned stack of certs to later.
Flatten the logic a bit and prepare for further refactoring.
ok jsing
tb [Fri, 5 Nov 2021 20:35:14 +0000 (20:35 +0000)]
Trade an abort() neutered by a comment for a blank line elsewhere.
otto [Fri, 5 Nov 2021 19:54:08 +0000 (19:54 +0000)]
Correct auto table entry for /var: it's 4G plus 2x physmem
benno [Fri, 5 Nov 2021 19:01:02 +0000 (19:01 +0000)]
Perform stricter checking on the version string (which RFC 7230 says
must be "HTTP" "/" DIGIT "." DIGIT), and answer 505 version not
supported when the number is outside of what we support, and 400 bad
request when the version format is wrong.
from Ross L Richardson, thanks!
ok claudio@
schwarze [Fri, 5 Nov 2021 18:03:00 +0000 (18:03 +0000)]
Make sure that the configuration file is always read, even when
running with the -M option or with a MANPATH environment variable
that has neither a leading or trailing ":" nor any "::". If -M or
MANPATH override the configuration file rather than adding to it,
just ignore any "manpath" directives while processing the configuration
file.
This fixes a bug reported by Jan Stary <hans at stare dot cz>
on misc@.
tb [Fri, 5 Nov 2021 17:15:05 +0000 (17:15 +0000)]
Clean up X509_STORE_add_{cert,crl}().
Add a X509_STORE_add_object() function that adds an X509 object to the
store and takes care of locking and cleaning up. This way we can set up
an X509_OBJECT for both the cert and CRL case and hand over to the new
function.
There is one intentional change of behavior: if there is an attempt to
add an object which is already present in the store, succeed instead of
throwing an error. This makes sense and is also the OpenSSL behavior.
As pointed out by jsing, this is a partial fix for the long standing
GH issue #100 on libtls where connections would fail if the store
contains duplicate certificates.
Also: remove the internal X509_OBJECT_dec_ref_count(), which is no
longer used.
ok jsing
tb [Fri, 5 Nov 2021 17:13:14 +0000 (17:13 +0000)]
Unify variable names in X509_STORE_{free,up_ref,add_lookup}().
simplify the flow of X509_add_lookup().
ok jsing
tb [Fri, 5 Nov 2021 17:11:28 +0000 (17:11 +0000)]
Rename the ret variable in X509_OBJECT_new() to obj..
ok jsing
tb [Fri, 5 Nov 2021 17:09:36 +0000 (17:09 +0000)]
Garbage collect the unused skip member of X509_LOOKUP and
the unused cache member of X509_STORE.
ok jsing
tb [Fri, 5 Nov 2021 17:08:12 +0000 (17:08 +0000)]
Use calloc() to remove the need of silly zeroing of most members.
Check for allocation failures and if one happens push an error on
the stack and clean up using X509_STORE_free().
ok jsing
tb [Fri, 5 Nov 2021 17:06:42 +0000 (17:06 +0000)]
Streamline and shorten x509_object_cmp() a bit.
ok jsing
tb [Fri, 5 Nov 2021 17:05:52 +0000 (17:05 +0000)]
Drop a bunch of unnecesary parentheses and unify the order in which
callbacks are called.
ok jsing
tb [Fri, 5 Nov 2021 17:03:15 +0000 (17:03 +0000)]
Cleanup X509_LOOKUP_new()
Switch from malloc() to calloc() and drop a bunch of initializations
to 0. Call the returned object lu instead of the generic ret.
ok jsing
patrick [Fri, 5 Nov 2021 15:18:24 +0000 (15:18 +0000)]
Newer i.MX device trees store the skew information in the PHY's node, which
we can access through the phy-handle. If there's no reference, keep doing
what we have been doing so far.
ok kettenis@
claudio [Fri, 5 Nov 2021 14:30:53 +0000 (14:30 +0000)]
Show the attribute name like in the other non conforming attribute errors
for snapshost and delta files.
OK deraadt@
kn [Fri, 5 Nov 2021 13:08:58 +0000 (13:08 +0000)]
Zap unused variables
OK martijn
mpi [Fri, 5 Nov 2021 11:38:51 +0000 (11:38 +0000)]
Constify struct cfattach.
mpi [Fri, 5 Nov 2021 11:38:29 +0000 (11:38 +0000)]
Constify struct cfattach.
claudio [Fri, 5 Nov 2021 10:50:41 +0000 (10:50 +0000)]
Simplify how IP addresses and AS numbers are passed between processes.
Since they are stored in an array just blast the full array in and out
of the io buffers at once instead of iterating element by element.
It also allows to remove a lot of extra code.
OK benno@ job@
jan [Fri, 5 Nov 2021 10:18:50 +0000 (10:18 +0000)]
Fix bootorder string for disk
ok mlarkin@
patrick [Fri, 5 Nov 2021 09:36:30 +0000 (09:36 +0000)]
Newer i.MX device trees retriee the USB phy using the more generic property
name "phys". To handle those, make sure that we look it up and in case it's
not there fall back to "fsl,usbphy".
ok kettenis@
claudio [Fri, 5 Nov 2021 08:20:36 +0000 (08:20 +0000)]
Add getmonotime() to test-http.c so that the test compiles again.
Noticed as ususal by anton@
tb [Fri, 5 Nov 2021 07:25:36 +0000 (07:25 +0000)]
Garbage collect xobj->data.{ptr,pkey}
Both these are essentially unused. Remove the last use of data.ptr
by initializing and copying the X509_OBJECT using memset() and
struct assignment in X509_STORE_CTX_get_subject_by_name() and add
a missing error check for X509_OBJECT_up_ref_count() while there.
ok beck
djm [Fri, 5 Nov 2021 03:10:58 +0000 (03:10 +0000)]
move cert_filter_principals() to earlier in the file for reuse;
no code change
beck [Thu, 4 Nov 2021 23:52:34 +0000 (23:52 +0000)]
Cache sha512 hash and parsed not_before and not_after with X509 cert.
Replace sha1 hash use with sha512 for certificate comparisons internal
to the library. use the cached sha512 for the validator's verification
cache.
Reduces our recomputation of hashes, and heavy use of time1 time
conversion functions noticed bu claudio@ in rpki client.
ok jsing@ tb@
claudio [Thu, 4 Nov 2021 18:26:48 +0000 (18:26 +0000)]
Cleanup some old XXX needed comments. cert_parse() returns a referenced
x509 object from the call and that reference needs to be freed. There is
a second inside of struct cert but that reference is still held.
So the X509_free() calls are indeed needed and by moving them up a bit
the code gets a bit simpler too.
With and OK tb@
claudio [Thu, 4 Nov 2021 18:00:07 +0000 (18:00 +0000)]
On errors related to the pipes to the childs don't error out right away.
Instead exit the main event loop and use waitpid to know why a child
went away. This should make it hopefully more clear when shit hits the fan.
OK tb@ deraadt@
jan [Thu, 4 Nov 2021 17:50:05 +0000 (17:50 +0000)]
Fix broken "boot device cdrom" feature after a fix in seabios.
seabios fixes wrong LUN handling upstream. Thus, we have to adapt the LUN
of our cdrom bootorder string, too.
ok brynet@, dv@
claudio [Thu, 4 Nov 2021 17:35:09 +0000 (17:35 +0000)]
Instead of creating a struct repo for each unique caRepository URI
use the rsync URI (a base version of caRepository) and the notify URI
to identify repositories. If both rsync URI and notify URI are the same
then the repo is the same. The notify URI is optional and can be NULL
so the lookup needs to be a bit careful.
This reduces the number of struct repos from 26k to around 50.
OK tb@
tobhe [Thu, 4 Nov 2021 14:45:07 +0000 (14:45 +0000)]
The authenticator is removed elsewhere.
ok patrick@
claudio [Thu, 4 Nov 2021 14:24:41 +0000 (14:24 +0000)]
Move and promote getmonotime() to an internal API function.
claudio [Thu, 4 Nov 2021 14:21:19 +0000 (14:21 +0000)]
Use the same spacing for all defines.
kn [Thu, 4 Nov 2021 13:15:13 +0000 (13:15 +0000)]
Fix mandoc HTML rendering for command aliases
Replace hand-rolled parentheses with the proper mdoc(7) macro,
otherwise the closing ")" ends up inside the command description.
Reported by Josh Rickmar, thanks!
jsg [Thu, 4 Nov 2021 12:52:37 +0000 (12:52 +0000)]
revert rev 1.30 of ttm_bo_util.c
Laurence Tratt reported firefox would hard lock a machine
with polaris12 with the ttm change from linux 5.10.77.
robert@ also hit the same problem.
claudio [Thu, 4 Nov 2021 11:32:55 +0000 (11:32 +0000)]
Instead of passing tal descriptions around just pass a tal id and
use a small lookup table to print the description in the output path.
OK tb@
yasuoka [Thu, 4 Nov 2021 04:20:14 +0000 (04:20 +0000)]
Tweaks (improve previous commit)
from jmc
yasuoka [Thu, 4 Nov 2021 03:53:57 +0000 (03:53 +0000)]
Clarify "aes" will accept keys which length is in 128:256 bits. Also
correct "cast" in ipsec.conf.5 to "cast128", add missing
"chacha20-poly1305", and sync iked.conf.5 and ipsec.conf.5 some
places.
ok jmc sthen
deraadt [Wed, 3 Nov 2021 22:00:56 +0000 (22:00 +0000)]
Many downstreams expect ssh to compile as non-C99...
sthen [Wed, 3 Nov 2021 21:40:03 +0000 (21:40 +0000)]
log the interface along with the neighbour ID in various ospfd/ospf6d
messages. ok remi@ benno@
if a neighbour is reachable over multiple network links, some problems
may be related to the link itself rather than the neighbour, so knowing
the interface can be important when trying to locate the source of a
problem.
jmc [Wed, 3 Nov 2021 19:54:28 +0000 (19:54 +0000)]
adjust for perfpolicy being auto by default; ok deraadt
tb [Wed, 3 Nov 2021 18:10:12 +0000 (18:10 +0000)]
When handling CRLF and nulling out the optional CR, point nl at the
right NUL so that valid_url() and the .cer check work.
Tweaked version of a diff by claudio.
ok claudio
claudio [Wed, 3 Nov 2021 17:30:13 +0000 (17:30 +0000)]
Add a test tal that has comments and also comes with CRLF
schwarze [Wed, 3 Nov 2021 15:02:14 +0000 (15:02 +0000)]
document d2i_X509_ALGORS(3) and i2d_X509_ALGORS(3)
claudio [Wed, 3 Nov 2021 14:59:37 +0000 (14:59 +0000)]
Limit the number of rsync processes being spawned by stopping to accept
new requests when over the limit. Use a generous limit of 16.
OK deraadt@
deraadt [Wed, 3 Nov 2021 14:42:12 +0000 (14:42 +0000)]
whitespace observed during a read-through
schwarze [Wed, 3 Nov 2021 14:36:21 +0000 (14:36 +0000)]
Fix five bugs in X509_REQ_to_X509(3):
* memory leak in X509_set_subject_name(ret, X509_NAME_dup(xn));
* memory leak in X509_set_issuer_name(ret, X509_NAME_dup(xn));
* memory leak in X509_set_pubkey(ret, X509_REQ_get_pubkey(r));
* missing return value check of X509_REQ_get_pubkey(r);
* missing return value check of X509_set_pubkey(...);
Some of these bugs have survived for twenty-five years.
I noticed the first two bugs while documenting the function,
then found that a commit in the OpenSSL 1.1.1 branch, which is
still under a free license, fixed all of them in 2016.
In the function X509_REQ_to_X509(3), merge everything worth merging
from OpenSSL 1.1.1, in particular the relevant parts of:
*
222561fe Apr 30 17:33:59 2015 -0400 (err: label cleanup)
*
0517538d Mar 17 00:15:48 2016 +0100 (the bugfix)
*
c5137473 Apr 3 23:37:32 2016 +0200 (code simplification)
While here, delete some commented out code that is wrong in
multiple ways and untouched since the SSLeay era.
One code tweak for readability by tb@, and OK tb@.
deraadt [Wed, 3 Nov 2021 13:48:46 +0000 (13:48 +0000)]
use some sizeof, rather than INADDRSZ/IN6ADDRSZ; ok claudio
tb [Wed, 3 Nov 2021 13:44:15 +0000 (13:44 +0000)]
Fix ASN1_TIME_diff() with NULL times
The ASN1_TIME_diff() API accepts NULL ASN1_TIMEs and interprets them
as "now". This is used in sysutils/monit, as found by semarie with a
crash after update. Implement this behavior by porting a version of
ASN1_TIME_to_tm() to LibreSSL and using it in ASN1_TIME_diff().
Tested by semarie
ok beck jsing semarie
nicm [Wed, 3 Nov 2021 13:37:17 +0000 (13:37 +0000)]
Add a cursor-style option, from Alexis Hildebrandt in GitHub issue 2960.
claudio [Wed, 3 Nov 2021 13:30:56 +0000 (13:30 +0000)]
Print the name of the non conforming attribute in the XML parse error.
OK beck@
claudio [Wed, 3 Nov 2021 13:29:28 +0000 (13:29 +0000)]
For chunked encoding on switch to STATE_RESPONSE_CHUNKED_TRAILER when
the full chunk was fetched. If the chunk size is bigger than
HTTP_BUF_SIZE iosz will be not zero and STATE_RESPONSE_DATA should
be used to fetch another buffer full of data.
OK beck@
schwarze [Wed, 3 Nov 2021 13:27:28 +0000 (13:27 +0000)]
Some cleanup in X509_REQ_get_extensions(3), no functional change.
In this function, merge everything that is worth merging
from the OpenSSL 1.1.1 branch, which is still under a free license,
mostly the relevant part of commit
9b0a4531 Mar 14 23:48:47 2015 +0000
to use X509_ATTRIBUTE_get0_type(3) rather than re-implementing it.
While here,
* use d2i_X509_EXTENSIONS(3) rather than ASN1_item_d2i(3);
* test pointers explicitly against NULL, not with '!', as suggested by tb@;
* drop some useless parentheses as suggested by tb@.
OK tb@
schwarze [Wed, 3 Nov 2021 13:08:57 +0000 (13:08 +0000)]
Test adding extensions to certification requests.
Related to the bugfixes in x509_req.c rev. 1.25.
OK tb@.
schwarze [Wed, 3 Nov 2021 12:53:25 +0000 (12:53 +0000)]
Fix two bugs in X509_REQ_add_extensions_nid(3)
that i noticed while documneting the function:
* missing return value check for ASN1_item_i2d(3) and
* missing return value check for OBJ_nid2obj(3).
In the function X509_REQ_add_extensions_nid(3), merge everything
that is worth merging from the OpenSSL 1.1.1 branch, which is still
under a free license; that's mostly parts of the commit
9b0a4531
Mar 14 23:48:47 2015 +0000 (containing the bugfix, even though the
OpenSSL commit message did not mention the bugs) and some minor
stylistic changes from
0f113f3e and
26a7d938.
While here, use i2d_X509_EXTENSIONS(3) instead of the layer-violating
call to ASN1_item_i2d(3), and include a few stylistic tweaks from tb@.
OK tb@, and jsing@ agreed on the general direction.
krw [Wed, 3 Nov 2021 11:52:59 +0000 (11:52 +0000)]
In addition to the WEP key(s) being set at device initialization with
'nwid'/'nwkey', the keys will be set at random times when 'join'/'nwkey' is
used. So also stop trying to set IEEE80211_CIPHER_NONE keys on that path.
James Hastings confirms this fixes his '(null node)' panics on run(4). Thanks!
ok stsp@
claudio [Wed, 3 Nov 2021 10:50:18 +0000 (10:50 +0000)]
Move the MAX_CERT_DEPTH to extern.h and adjust the comments of all limits
a bit.
claudio [Wed, 3 Nov 2021 10:19:22 +0000 (10:19 +0000)]
In proc_parser_roa() adjust the expiry calculation to walk all of
the auth tree (including the TA) and be more careful to not dereference
NULL pointers. Both valid_ski_aki() and get_crl() can return NULL
pointers. In these situations X509_verify_cert() should fail and
the affected code should be not reachable but better be prepared.
With and OK tb@
claudio [Wed, 3 Nov 2021 08:30:14 +0000 (08:30 +0000)]
Add missing copyright statement. Reminded by deraadt@
yasuoka [Wed, 3 Nov 2021 05:59:25 +0000 (05:59 +0000)]
Clarify that ANY can be used for several parameters of IPsec transform.
ok jmc sthen
jsg [Wed, 3 Nov 2021 02:37:48 +0000 (02:37 +0000)]
drm/amdgpu: fix out of bounds write
From Thelford Williams
eb3b6805e3e9d98b2507201fd061a231988ce623 in linux 5.10.y/5.10.77
5afa7898ab7a0ec9c28556a91df714bf3c2f725e in mainline linux
jsg [Wed, 3 Nov 2021 02:33:46 +0000 (02:33 +0000)]
drm/ttm: fix memleak in ttm_transfered_destroy
From Christian Koenig
c21b4002214c1c7e7b627b9b53375612f7aab6db in linux 5.10.y/5.10.77
0db55f9a1bafbe3dac750ea669de9134922389b5 in mainline linux
kn [Wed, 3 Nov 2021 02:02:36 +0000 (02:02 +0000)]
Zap swapips remnants
There since 1998, probably dead long before.
"I am sure swabips died before you were born." deraadt
jsg [Wed, 3 Nov 2021 00:48:08 +0000 (00:48 +0000)]
mention hw.power
ok deraadt@
kn [Tue, 2 Nov 2021 23:39:27 +0000 (23:39 +0000)]
fix previous
kn [Tue, 2 Nov 2021 23:36:43 +0000 (23:36 +0000)]
Return non-zero on failed "nwkey" command
Fail early and exit non-zero immediately instead of indicating success and
possibly carrying the next ifconfig command.
Found at install when wifi interfaces are reset with "-nwid -nwkey -wpa":
Which network interface do you wish to configure? (or 'done') [bse0] bwfm0
ifconfig: SIOCS80211NWKEY: Operation not supported by device
Access point? (ESSID, 'any', list# or '?') [any] 2
Security protocol? (O)pen, (W)EP, WPA-(P)SK [O]
bwfm(4) currently does not support WEP.
OK stsp
mlarkin [Tue, 2 Nov 2021 23:30:15 +0000 (23:30 +0000)]
Remove trailing whitespace
djm [Tue, 2 Nov 2021 22:57:27 +0000 (22:57 +0000)]
crank SSH_SK_VERSION_MAJOR to match recent change in usr/bin/ssh
djm [Tue, 2 Nov 2021 22:56:40 +0000 (22:56 +0000)]
Better handle FIDO keys on tokens that provide user verification (UV)
on the device itself, including biometric keys.
Query the token during key creation to determine whether it supports
on-token UV and, if so, clear the SSH_SK_USER_VERIFICATION_REQD flag
in the key so that ssh(1) doesn't automatically prompty for PIN later.
When making signatures with the key, query the token's capabilities
again and check whether the token is able (right now) to perform user-
verification without a PIN. If it is then the PIN prompt is bypassed
and user verification delegated to the token. If not (e.g. the token
is biometric capable, but no biometric are enrolled), then fall back
to user verification via the usual PIN prompt.
Work by Pedro Martelletto; ok myself and markus@
NB. cranks SSH_SK_VERSION_MAJOR
kn [Tue, 2 Nov 2021 22:26:46 +0000 (22:26 +0000)]
Add standard EXIT STATUS
OK deraadt
deraadt [Tue, 2 Nov 2021 22:07:33 +0000 (22:07 +0000)]
sync
claudio [Tue, 2 Nov 2021 19:30:30 +0000 (19:30 +0000)]
Only add CA certificates to the auth tree, skip BGPsec certificates.
Also make sure that trust anchors are not BGPsec certs.
While there fix some overly long lines.
OK benno@
kn [Tue, 2 Nov 2021 16:54:01 +0000 (16:54 +0000)]
Remove "!" escape handling from WEP/WPA passphrase questions
Answering any question (except user password prompts) with "!" drops to
the shell ("!foo" executes "foo" immediately), but this is an obviously
bad idea for the wifi passphrase questions in case the magic words start
with... an "!":
WPA passphrase? (will echo) !
2345678
/install:
2345678: not found
WPA passphrase? (will echo)
Adapt the existing password prompt code into a new self-contained
ask_passphrase() which prompts only once and echos its input (like the
passphrase question has been doing all the time), doing no input parsing
whatsoever (as with user passwords):
WPA passphrase? (will echo) !
2345678
IPv4 address for bwfm0? (or 'autoconf' or 'none') [autoconf]
Reported by Pasi-Pekka Karppinen <ppkarppi AT icloud DOT com>, thanks!
Feedback tb (wifi passphrases should still be printed)
OK deraadt
fcambus [Tue, 2 Nov 2021 16:31:27 +0000 (16:31 +0000)]
Enable spleen16x32 and spleen32x64 on powerpc64 for GENERIC kernels.
Pointed out by Brad, thanks!
OK kettenis@, deraadt@
cheloha [Tue, 2 Nov 2021 15:45:52 +0000 (15:45 +0000)]
tr(1): main(): eliminate isstring2 variable
If only there we a way to express how many positional arguments we
needed to run tr(1) in a given operating mode.
... oh. Wait. We have argc for that.
Remove the isstring2 variable to simplify some of the logic in main().
millert [Tue, 2 Nov 2021 15:29:41 +0000 (15:29 +0000)]
Update awk to October 12, 2021 version.
Fixes a decision bug with trailing stuff in lib.c:is_valid_number.
All other fixes were already present.
millert [Tue, 2 Nov 2021 15:12:09 +0000 (15:12 +0000)]
Add HISTORY section. OK schwarze@.
patrick [Tue, 2 Nov 2021 14:49:53 +0000 (14:49 +0000)]
Recognize BCM43436, as seen on the Raspberry Pi Zero 2 W.
ok jsg@
jsing [Tue, 2 Nov 2021 14:39:09 +0000 (14:39 +0000)]
Add regress that calls SSL_set_tlsext_host_name() with a NULL host name.
tb [Tue, 2 Nov 2021 13:59:29 +0000 (13:59 +0000)]
Do not take the strlen() of a NULL name. Defer the CBS_init() to later.
Found the hard way by sthen.
ok sthen
nicm [Tue, 2 Nov 2021 10:57:04 +0000 (10:57 +0000)]
fatalx on unknown enum members in a couple of places, from Ben Boeckel.
dlg [Tue, 2 Nov 2021 09:52:40 +0000 (09:52 +0000)]
add handling for parity and character size config.
i wanted to talk modbus to a thing using a uchcom rs485 adapter,
but i needed even parity enabled to do that which the code didnt
support. this pulls in the necessary changes from netbsd uchcom.c
r1.26. it does not pull in the reset changes in 1.26 because netbsd
r1.28 reverts the reset code back to what we have now.
existing functionality tested by felix kronlage-dammers
ok patrick@
patrick [Tue, 2 Nov 2021 08:39:23 +0000 (08:39 +0000)]
igc(4)
patrick [Tue, 2 Nov 2021 08:25:47 +0000 (08:25 +0000)]
Enable igc(4).
Tested by kevlo@
cheloha [Tue, 2 Nov 2021 03:09:15 +0000 (03:09 +0000)]
tr(1): plug leak in genclass()
If we have already generated a given character class we don't need to
do it again. We can also return some of the memory we allocated for
the class. NCHARS is an upper bound, most character classes are
small.
This fixes a small leak in genclass().
While here, switch to an ANSI function definition.
Thread: https://marc.info/?l=openbsd-tech&m=
163571942030440&w=2
ok millert@
deraadt [Tue, 2 Nov 2021 02:17:56 +0000 (02:17 +0000)]
knf
cheloha [Mon, 1 Nov 2021 23:20:35 +0000 (23:20 +0000)]
uniq(1): support arbitrarily long input lines
Switch from fgets(3) to getline(3) to support input lines of any
length.
Tested by sthen@, who uncovered a dumb bug that cut throughput in
half. getline(3) is indeed slower than fgets(3), but not *twice* as
slow.
millert@ suggests that preallocating both line buffers might be
worthwhile. I will need to do some additional testing to figure out
whether 8KB buffers (like we had for fgets(3)) are appropriate
starting lengths. For now I am not preallocating either buffer.
ok millert@ sthen@
tb [Mon, 1 Nov 2021 20:53:08 +0000 (20:53 +0000)]
Move the now internal X.509-related structs into x509_lcl.h.
Garbage collect the now unused LIBRESSL_CRYPTO_INTERNAL and
LIBRESSL_OPAQUE_X509. Include "x509_lcl.h" where needed and
fix a couple of unnecessary reacharounds.
ok jsing
kettenis [Mon, 1 Nov 2021 20:22:12 +0000 (20:22 +0000)]
Remove backwards compat code.
kettenis [Mon, 1 Nov 2021 20:04:11 +0000 (20:04 +0000)]
Catch up with the Linux device tree bindings. Put the USB DARTs into bypass
mode for now as we need to enter translations into both of them which is
hard to do now that they have separate device tree bindings.
fcambus [Mon, 1 Nov 2021 18:43:04 +0000 (18:43 +0000)]
Enable spleen16x32 and spleen32x64 on riscv64 for GENERIC kernels.
OK deraadt@
millert [Mon, 1 Nov 2021 18:28:24 +0000 (18:28 +0000)]
awkgetline: do not access unitialized data on EOF
getrec() returns 0 on EOF and leaves the contents of buf unchanged.
From https://github.com/onetrueawk/awk/pull/134
ratchov [Mon, 1 Nov 2021 18:23:09 +0000 (18:23 +0000)]
Remove unused struct name
tb [Mon, 1 Nov 2021 17:20:50 +0000 (17:20 +0000)]
In X509_STORE_CTX_get_obj_from_subject() rename X509_OBJECT from
the generic 'ret' to obj' in X509.
Requested by jsing