Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-11-02 | Move dead procs to the reaper queue immediately after context switch. | Visa Hankala | |
This eliminates a forced context switch to the idle proc. In addition, sched_exit() no longer needs to sum proc runtime because mi_switch() will do it. OK mpi@ a while ago | |||
2019-11-02 | switch ASN1_STRING_data() with constified ASN1_STRING_get0_data() | Gilles Chehade | |
2019-11-02 | Write debug messages to stderr instead of stdout | Jeremie Courreges-Anglas | |
ok kn@ mpi@ | |||
2019-11-02 | Zap remnants from "cpu throttling on mp systems" introduced in rev 1.46 | Jeremie Courreges-Anglas | |
That logic is now in the kernel. ok kn@ mpi@ | |||
2019-11-01 | Kill resched_proc() and instead call need_resched() when a thread is | Martin Pieuchot | |
added to the runqueue of a CPU. This fix out-of-sync cases when the priority of a thread wasn't reflecting the runqueue it was sitting in leading to unnecessary context switch. ok visa@ | |||
2019-11-01 | Reduce BOOTRANDOM_MAX to 256. naddy pointed out there's no point having | Theo de Raadt | |
it larger than RC4STATE. A long discussion ensued. In conclusion all entropy inputs are either satisfactory enough, or just as shitty at 512. | |||
2019-11-01 | Limit lazy resize to panes in attached sessions only - those in | Nicholas Marriott | |
unattached are likely to have been resized by something like split-window where the user probably wants the resize to happen immediately. GitHub issue 1963. | |||
2019-11-01 | In evp/pmeth_lib.c rev. 1.16, jsing@ enabled EVP_PKEY_RSA_PSS. | Ingo Schwarze | |
Document it. | |||
2019-11-01 | In rsa.h rev. 1.45, jsing@ provided | Ingo Schwarze | |
the three macro constants RSA_PSS_SALTLEN_*; document them. The wording is a combination of our existing text and the wording in the OpenSSL 1.1.1 branch, which is still under a free license. | |||
2019-11-01 | Push the KERNEL_LOCK() down in uvm_map_inentry(). | Martin Pieuchot | |
The lookup in uvm_map_inentry_fix() is already serialized by the vm_map_lock and such lookup is already executed w/o the KERNEL_LOCK(). ok kettenis@, deraadt@ | |||
2019-11-01 | Keep local function definitions in C files. | Martin Pieuchot | |
2019-11-01 | Document that p_{sp,pc}inentry are owned by the current thread. | Martin Pieuchot | |
2019-11-01 | sync | Theo de Raadt | |
2019-11-01 | Correctly group initialization of AF_UNIX socket. | Florian Obser | |
spotted by deraadt in new code, sweep by me. OK deraadt | |||
2019-11-01 | Fix an off-by-one in db_save_stack_trace(). | Martin Pieuchot | |
Save the PC after checking if it belongs to the kernel. | |||
2019-11-01 | Flush the register windows before unwinding the stack. | Martin Pieuchot | |
This makes db_save_stack_trace() and db_stack_dump() work. ok deraadt@, kettenis@ | |||
2019-11-01 | Remove duplicated header. | Martin Pieuchot | |
2019-11-01 | Add DSA CMS support. | Joel Sing | |
From OpenSSL 1.1.1d. ok tb@ | |||
2019-11-01 | Add RSA CMS support. | Joel Sing | |
From OpenSSL 1.1.1d. ok tb@ | |||
2019-11-01 | Provide NID for pSpecified. | Joel Sing | |
ok tb@ | |||
2019-11-01 | Wire up PKEY methods for RSA-PSS. | Joel Sing | |
ok tb@ | |||
2019-11-01 | Wire up ASN.1 methods for RSA-PSS. | Joel Sing | |
ok tb@ | |||
2019-11-01 | In rsa.h rev. 1.45, jsing@ provided the three | Ingo Schwarze | |
macros EVP_PKEY_CTX_set_rsa_pss_keygen_*(3); document them. Text mostly taken from the OpenSSL 1.1.1 branch, which is still under a free license, but rearranged to fit the structure of our manual pages. | |||
2019-11-01 | move the PSS macros to the end in preparation for adding more macros, | Ingo Schwarze | |
reduce text duplication by forming subsections, and some minor corrections | |||
2019-11-01 | fix miscellaneous text problems; ok djm@ | Christian Weisgerber | |
2019-11-01 | The EVP_PKEY_CTX_ctrl(3) manual page requires additions for RSA-PSS | Ingo Schwarze | |
but it is growing to excessive size, so split out RSA_pkey_ctx_ctrl(3). | |||
2019-11-01 | Handle the various different forms of rgb colour strings. | Nicholas Marriott | |
2019-11-01 | update currency exchange rates; | Jason McIntyre | |
2019-11-01 | fix a race condition in the SIGCHILD handler that could turn in | Damien Miller | |
to a kill(-1); bz3084, reported by Gao Rui, ok dtucker@ | |||
2019-11-01 | Update RSA ASN.1 code to handle RSA-PSS. | Joel Sing | |
From OpenSSL 1.1.1d. ok tb@ | |||
2019-11-01 | Clean up RSA_new_method(). | Joel Sing | |
Use calloc() instead of malloc() for initialisation and remove explicit zero initialisation of members. This ensures that new members always get initialised. Also use a single error return path, simplifying code. ok tb@ | |||
2019-11-01 | remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL path | Damien Miller | |
2019-11-01 | more additional source files | Damien Miller | |
2019-11-01 | additional source files here too | Damien Miller | |
2019-11-01 | adapt to extra sshkey_sign() argument and additional dependencies | Damien Miller | |
2019-11-01 | skip security-key key types for tests until we have a dummy | Damien Miller | |
U2F middleware to use. | |||
2019-11-01 | sort; | Jason McIntyre | |
2019-11-01 | sync | Theo de Raadt | |
2019-10-31 | In 2013, when OpenBSD/armv7 was still rather early, improvements for | Patrick Wildt | |
that platform have been trickling in bit by bit. One of those changes unfortunately introduced a regression in cache flushes. The check for the length in the cache-flush-loop was changed from the instruction bpl to bhi. This has the effect that it does not branch on zero anymore. Due to the length decrement at the beginning of the function, which was not removed, a length of (n * cacheline) + 1 means that the loop misses one run! This means it is possible that the last byte of a DMA transfer was incorrect, as one could see on network packets often enough. Remove that instruction, which makes it even more similar to the OpenBSD/arm64 code. ok deraadt@ | |||
2019-10-31 | undo debugging bits that shouldn't have been committed | Damien Miller | |
2019-10-31 | fix -Wshadow warning | Damien Miller | |
2019-10-31 | Refactor signing - use sshkey_sign for everything, including the new | Damien Miller | |
U2F signatures. Don't use sshsk_ecdsa_sign() directly, instead make it reachable via sshkey_sign() like all other signature operations. This means that we need to add a provider argument to sshkey_sign(), so most of this change is mechanically adding that. Suggested by / ok markus@ | |||
2019-10-31 | ssh-agent support for U2F/FIDO keys | Damien Miller | |
feedback & ok markus@ | |||
2019-10-31 | ssh AddKeysToAgent support for U2F/FIDO keys | Damien Miller | |
feedback & ok markus@ | |||
2019-10-31 | ssh-add support for U2F/FIDO keys | Damien Miller | |
2019-10-31 | add new agent key constraint for U2F/FIDO provider | Damien Miller | |
feedback & ok markus@ | |||
2019-10-31 | ssh client support for U2F/FIDO keys | Damien Miller | |
2019-10-31 | Separate myproposal.h userauth pubkey types | Damien Miller | |
U2F/FIDO keys are not supported for host authentication, so we need a separate list for user keys. feedback & ok markus@ | |||
2019-10-31 | ssh-keygen support for generating U2F/FIDO keys | Damien Miller | |
2019-10-31 | U2F/FIDO middleware interface | Damien Miller | |
Supports enrolling (generating) keys and signatures. feedback & ok markus@ |