summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-02-10Add a warning that scan_ffs doesn't support FFS2 filesystemsJeremie Courreges-Anglas
Hints and wording from jmc@
2019-02-10Drop useless .TH line; ok jmc@Jeremie Courreges-Anglas
2019-02-10On OpenBSD/powerpc (and NetBSD/powerpc) long double == double like onMark Kettenis
FreeBSD/powerpc. From George Koehler. ok millert@, deraadt@, visa@
2019-02-10"non-existant" is one of those words that don't exist, so use "non-existent"Peter Hessler
instead From Pamela Mosiejczuk, many thanks! OK phessler@ deraadt@
2019-02-10ssh-keygen -D pkcs11.so needs to initialize pkcs11 interactive,Sebastian Benoit
so it can ask for the smartcards PIN. ok markus@
2019-02-10Anchor names must not be emptykn
The parser would allow bogus input and sometimes even produce invalid rules on empty anchor names, so error out immediately. OK sashan
2019-02-10Unify anchor name sanity checkskn
For anchor names, make `load anchor' use the same grammar as `anchor' and merge unique checks from both places so that anchor names are validated regardless of the specific rule at hand. OK sashan
2019-02-10Simplify trust anchor handling.Florian Obser
Open trust anchor file for reading and writing on startup and pass it to the frontend process. The frontend process seeks and truncates the file apropriately when writing out new trust anchors learned via DNS but never closes the file. On error the file is truncated to zero length. This is in turn handled on startup by switching to the built in trust anchor when no trustanchor can be read from disk. This side steps the need for an unveil'ed directory with "c" permission and also removes the wpath and cpath pledges from the parent process. deraadt@ pointed out that my previous design didn't make sense and I had confused myself along the way. (It did work, but was too complicated for no good reason). While here validate that we actually read a trust anchor from disk by trying to parse it and checking that it is a DNSKEY. Unfortunately ub_ctx_add_ta() accepts just any string as a trust anchor without any validation.
2019-02-10log X509 peer's cert subject name when tls client authentication is used,Sebastian Benoit
in the same way as the http authenticated username is loged. From Karel Gardas, gardask at gmail dot com, Thanks! ok florian@
2019-02-10Preserve the transcript hash at specific stages of the TLSv1.3 handshake.Joel Sing
There are various points where we need the hash of all messages prior to the current message. Support this by having the handshake code preserve the transcript hash prior to recording the current message, which avoids the need to sprinkle this throughout multiple handlers. ok inoguchi@ tb@
2019-02-10Add Allwinner V3s support. Also update some Allwinner A80 pin names toMark Kettenis
what is used by more recent Linux kernels. Partly from SASANO Takayoshi.
2019-02-10Handle "broken-cd" as "non-removable" for now. This will generate someMark Kettenis
error messages if a card is absent from the slot, but other workarounds are much more complicated. From SASANO Takayoshi.
2018-04-06Import LLVM 6.0.1 release including clang, lld and lldb.Patrick Wildt
"where is the kaboom?" deraadt@
2019-02-10when checking that filenames sent by the server side match what theDamien Miller
client requested, be prepared to handle shell-style brace alternations, e.g. "{foo,bar}". "looks good to me" millert@ + in snaps for the last week courtesy deraadt@
2019-02-10syslog when connection is dropped for attempting to run a commandDamien Miller
when ForceCommand=internal-sftp is in effect; bz2960; ok dtucker@
2019-02-10Remove old X proto documentation directoriesMatthieu Herrb
2019-02-10crank limits because of mesaTheo de Raadt
2019-02-09Revert previous.Ingo Schwarze
It appears the flag combination -S -p not only preserved the modification time as documented, but also the file mode unless the file content changed, so with the change in rev. 1.68, the flag -p no longer applies the given file mode if the file content does not change. Regression in the lang/go-boostrap build system reported by espie@.
2019-02-09The horizontal line in a data cell containing only "_" or "="Ingo Schwarze
connects to the horizontally adjacent vertical line or cell; fixing a bug reported by bentley@.
2019-02-09Completion of command-alias members.Nicholas Marriott
2019-02-09add a BUGS section explaining the situation with box and line drawingIngo Schwarze
in UTF-8 output; suggested by bentley@
2019-02-09ignore empty request lines in the table data reader;Ingo Schwarze
fixing a minibug reported by bentley@
2019-02-09Fix weird wrap showing cipher list in interactive modeKinichiro Inoguchi
ok jsing@ tb@
2019-02-09Rename the file that contains the transcript handling code.Joel Sing
ok inoguchi@ tb@
2019-02-09Rename tls1_handshake_hash*() to tls1_transcript_hash*().Joel Sing
While handshake hash is correct (in as far as it is a hash of handshake messages), using tls1_transcript_hash*() aligns them with the naming of the tls1_transcript*() functions. Additionally, the TLSv1.3 specification uses Transcript-Hash and "transcript hash", which this matches. ok inoguchi@ tb@
2019-02-09Provide a reference from the TLSv1.3 context to the handshake state.Joel Sing
This allows ctx->hs to be used throughout the TLSv1.3 code, rather than S3I(ctx->ssl)->hs_tls13. ok inoguchi@ tb@
2019-02-09The am335x_boneblack U-Boot target has been removed in the U-BootJonathan Gray
repository and will not be in the next major release. Switch to the am335x_evm target a FIT image for multiple am335x boards including the BeagleBone Black. u-boot-arm >= 2019.01p2 is now required to build armv7 releases. ok deraadt@ phessler@
2019-02-09Summarize the 4 same name functions and move it to apps.cKinichiro Inoguchi
ok tb@ jsing@
2019-02-09major() and minor() are documented as returning unsigned, so do soPhilip Guenther
ok deraadt@
2019-02-09vmm(4): add a debug printf when processing vmxon operationsMike Larkin
2019-02-08Fix typo: "a data cells" -> "a data cell".Anthony J. Bentley
ok schwarze@
2019-02-08Backport r5108 from unbound upstream, pointed out by florian@.Stuart Henderson
Shouldn't affect unwind but keeping in sync. r5108 | wouter | 2019-02-08 15:05:24 +0000 (Fri, 08 Feb 2019) | 3 lines - Fix #4225: clients seem to erroneously receive no answer with DNS-over-TLS and qname-minimisation.
2019-02-08fix ipv4 checksum fixup; this trick requires an accumulator of exactly twice ↵Richard Procter
the checksum's width ok dlg@
2019-02-08Fix kernel info leak in routing message.Alexander Bluhm
from NetBSD; OK deraadt@ visa@
2019-02-08Convert powerpc assembly code into something clangs internal assemblerMark Kettenis
understands. ok mpi@, visa@
2019-02-08Fix a race condition: do not unlink(2) a file and then open(2) itIngo Schwarze
with O_CREAT|O_EXCL; instead, always create it with a temporary name, then rename(2) it into place atomically. For example, the race caused failures in parallel builds that (foolishly) install the same file twice. This patch makes the -S option a no-op, making install(1) always behave like -S used to. Based on a minimally different patch from Lauri Tirkkonen <lotheac at iki dot fi>, and including a manual page tweak from deraadt@. OK deraadt@; "seems the right thing to do" tedu@.
2019-02-08Fix stack info leak in execve(2). There are 2x4 bytes of paddingAlexander Bluhm
in struct ps_strings. from NetBSD; OK deraadt@ guenther@ visa@
2019-02-08Improve fastcgi socket documentation and mention that TCP is supported inFlorian Obser
addition to UNIX domain sockets. Prompted by a mail from Daniel Gracia ( paladdin AT gmail ) pointing out that we are not documenting TCP support at all, thanks! Prodding by and with jmc@
2016-09-03Import libunwind 3.9.0Patrick Wildt
2019-02-08update unwind's copy of libunbound to match the new 1.9.0 update inStuart Henderson
/usr/src/usr.sbin/unbound, diff from florian@
2019-02-08merge unbound-1.9.0Stuart Henderson
2019-02-08import unbound 1.9.0, ok florian@Stuart Henderson
2019-02-08Oops, unbreak captive portal detection.Florian Obser
The captive portal process needs to receive sockets from the main process to speak http to.
2019-02-08add libelf; ok jsgJason McIntyre
2019-02-07syncTheo de Raadt
2019-02-07Remove rpath from pledge when only stdin is used.Tobias Stoeckmann
ok schwarze@
2019-02-07No need to run unbound-anchor anymore. Unwind(8) handles the bootstrapFlorian Obser
correctly itself now. At leat considering the end of life times of OpenBSD releases and the speed at which the root key signing key (KSK) rolls. On the other hand, unbound-anchor assumes a certain network quality which we cannot guarantee in places where we want to run unwind(8). This in turn can lead to unbound-anchor stalling the boot process.
2019-02-07Rewrite trust anchor handling.Florian Obser
Do not use the libunbound's auto trust anchor file feature since it then the resolver process needs rpath, wpath, and cpath pledges and permission on the trust anchor file. Instead configure the trust anchor as resource record strings. The parent process opens the file, passes a filedescriptor to the frontend process to parse the file and then passes trust anchors to the resolver process to (re-) configure the resolver contexts. The resolver process periodically probes for new trust anchors (DNSKEY records of the root zone) and passes those to the frontend process. This in turn requests a file descripter for writing from the parent process. Once the trust anchors have been written the parent process renames the tmp file to the final location. Also provide a built in trust anchor for boot strapping purposes if no file is found on disk. That way we can get rid of unbound-anchor in unwind's rc.d script.
2019-02-07minor formatting tweaks, and add the missing RETURN VALUES section;Ingo Schwarze
OK cheloha@ jmc@
2019-02-07Implement processing of EncryptedExtensions in the TLS 1.3 client.Joel Sing
ok bcook@ tb@