Age | Commit message (Collapse) | Author |
|
via OpenSSL commit 3266cf58 Mar 10 13:13:23 2018 -0500
|
|
code in imxgpio(4) with splhigh() and splx() which is MI and should be
good enough for the job.
Discussed with kettenis@
|
|
were not needed anymore since we switched to the FDT-based GPIO code.
|
|
BoringSSL rather than from OpenSSL and that it is not hooked into evp(3).
So delete all text from OpenSSL including the Copyright and license
and replace it by some text assembled from comments in BoringSSL
code and headers and some text written myself, all under ISC license.
In particular, also describe X25519_keypair(3), add SYNOPSIS, RETURN
VALUES, STANDARDS, and a reference to D. J. Bernsteins instructions
on how to use the algorithm. Delete the text related to EVP_PKEY
describing features we do not support.
|
|
OK visa@
|
|
OK visa@
|
|
thus creates an erroneous line break.
|
|
|
|
|
|
issues with upcoming NFSnode's locks.
ok visa@
|
|
ok kettenis@
|
|
|
|
ok kettenis@
|
|
On 64 bit systems an integer overflow between strtol and int casting
could occur, resulting in out of boundary writes. Using strtonum fixes
this issue and leads to better error messages.
ok schwarze
|
|
|
|
suggested by coverity (via daniel@)
|
|
from Matt Caswell <matt at openssl dot org>
via OpenSSL commit f929439f Mar 15 12:19:16 2018 +0000
|
|
manual page, which is below the threshold of originality, so there is
no need to change the Copyright headers. The rest of that page is less
clear and less precise than what we already have in our various pages.
|
|
|
|
The comment in EVP_DigestInit.pod is:
"EVP_MD_pkey_type() returns the NID of the public key signing algorithm
associated with this digest. For example EVP_sha1() is associated with
RSA so this will return NID_sha1WithRSAEncryption. Since digests and
signature algorithms are no longer linked this function is only retained
for compatibility reasons."
So there is no link anymore.
From <paul dot dale at oracle dot com>
via OpenSSL commit 79b49fb0 Mar 20 10:03:10 2018 +1000
|
|
from Kurt Roeckx <kurt at roeckx dot be>
via OpenSSL commit b38fa985 Mar 10 16:32:55 2018 +0100
|
|
EC_POINT_get_affine_coordinates_GF2m(3);
from David Benjamin <davidben at google dot com>
via OpenSSL commit ddc1caac Mar 6 14:00:24 2018 -0500
|
|
from <Bernd dot Edlinger at hotmail dot de>
via OpenSSL commit c911e5da Mar 19 14:20:53 2018 +0100
|
|
While here, qname minimisation is an RFC since some time.
tweak & OK sthen
|
|
Discussed with kettenis@
|
|
from <Matthias dot St dot Pierre at ncp dash e dot com>
via OpenSSL commit 36359cec Mar 7 14:37:23 2018 +0100
|
|
via OpenSSL commit d47eaaf4 Mar 9 07:11:13 2018 -0500
|
|
via OpenSSL commit 4a56d2a3 Feb 25 16:49:27 2018 +0300
|
|
ok kettenis@
|
|
errors.
Pointed out by benno
|
|
testing tb, sthen
OK benno, sthen
|
|
ok kettenis@
|
|
brings us very basic support for the SolidRun MACCHIATOBin.
|
|
|
|
|
|
loaded. This makes sure that the local prefix specied in the config is
always used.
OK ccardenas@
|
|
|
|
|
|
SPI numbers. Makes higher numbered GICP interrupts actually work.
|
|
Minus eight lines of code, no functional change.
OK martijn@.
|
|
1. setlocale(LC_ALL, "A"); setlocale(LC_CTYPE, "T"); setlocale(LC_ALL, NULL);
must return "A/T/A/A/A/A", not "A". Fix this by always initializing the
LC_ALL entry of newgl to "" in dupgl(). Reported by Karl Williamson
<public at khwilliamson dot com> on bugs@, thanks!
2. Do not leak newgl when strdup(3) fails in setlocale(3).
3. For setlocale(LC_ALL, "C/C/fr_FR.UTF-8/C/C/C"); correctly set
_GlobalRuneLocale; i found 2. and 3. while looking at the code.
Feedback on a buggy earlier version and OK martijn@.
|
|
USB PHY support and add support for "usb-nop-xceiv" PHYs.
ok patrick@, jsg@
|
|
These are the direct sources from NLnet Labs upstream, minus these:
compat contrib libunbound/python pythonmod testcode testdata winrc
ok deraadt@ jakob@
|
|
handle open until a kernel has been loaded from the softraid volume.
This works around an apparent memory leak in the firmware on T5220
which fails to load an ldom guest kernel from softraid with a "Fast
Data Access MMU Miss" trap after many OF_open()/OF_close() calls.
This problem goes away when we call OF_open()/OF_close() just once
instead of for every block we want to read.
Crank ofwboot version to 1.10.
Make sure to keep working boot media around before upgrading!
Softraid boot of an T5220 ldom guest (CRYPTO), and a v240 (RAID 1),
have been tested and are known to work. Please report issues to bugs@.
ok kettenis@
|
|
issue 1299. Patch from Thomas Adam.
|
|
ok dlg@ mpi@
|
|
Fixes for CVE-2018-0739.
Copied from commit below, and modified for adaption to our code.
https://github.com/openssl/openssl/commit/9310d45087ae546e27e61ddf8f6367f29848220d
ok bcook@ beck@ jsing@
|
|
was already disabled, but reporting it as available and then failing it
caused SmartOS to crash during boot.
ok pd@
|
|
|
|
implicitly putting it in the padding to page-size. This eliminates a
couple Coverity issues from the Meltdown work.
testing daniel@
ok mlarkin@
|