summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2014-06-15Fix 0x67 prefixed near CALL decoding.Paul Irofti
Heads-up from Xen Li (delphij@FreeBSD), thanks! Tested on Sony VGN-P530H. Okay mlarkin@, matthieu@
2014-06-15oops, typo. James Hartley is fast at trying -currentTheo de Raadt
2014-06-15In srandomdev(), use arc4random_buf() instead of from the kernel.Theo de Raadt
discussion with matthew
2014-06-14Preallocate sgmap extent regions for tsp, cia and mcpcia dma maps, which fallJonathan Matthew
back to sgmap if the direct mapping fails. ok miod@
2014-06-14Rather than truncating KERN_ARND requests silently, return EINVALTheo de Raadt
ok miod
2014-06-14temporarily (maybe 3 weeks?) crank KERN_ARND maximum buffer from 256Theo de Raadt
to 512, to make it easier for people to build to -current. ok miod
2014-06-14Make _dl_randombuf invoke sysctl KERN_ARND in 256-byte chunks, for this isMiod Vallat
(currently) the largest output you can get from it. ok deraadt@
2014-06-14Avoid infinite loop if cluster chain is a cyclic list.Tobias Stoeckmann
Inspired by Android's commit b6ee08aadb580341a4d80943741b80de16a88b5d, but fixing the actually offending cluster, not a random one. ok krw@
2014-06-14syncTheo de Raadt
2014-06-14Change return value of getentropy() to int 0 for success. MaximumTheo de Raadt
buffersize is enforced strictly, this supplies sufficient entropy payload to act as seed material. Discourage general use of this API, but lock down this function name as the go-to for userland PRNG seeding. Improve documentation. ok miod matthew
2014-06-14Fix memory leaks in bootblock handling.Tobias Stoeckmann
ok krw@
2014-06-14Fix regression of 1.16: write fsinfo, not block into FSInfo region.Tobias Stoeckmann
ok krw@
2014-06-14Fix regression of 1.20 by properly incrementing pointer.Tobias Stoeckmann
2014-06-14Add more bounded attributes to the buffer and md5/sha headers in libsslAnil Madhavapeddy
ok miod@
2014-06-14Fix a couple systrace(4) nitsMatthew Dempsky
Mention SYSTRACE_POLICY_KILL again later as appropriate and document that STRIOCINJECT takes a pointer to a struct systrace_inject.
2014-06-14Update documentation for STRIOCGETCWD.Matthew Dempsky
Back in 2011, I changed it from taking a "pid_t *" to a "struct systrace_getcwd *" so that systrace(1) could resolve filenames passed to openat(2), etc, but apparently failed to document the change.
2014-06-13Remove support for "union wait" and WSTOPPED.Matthew Dempsky
union wait has been deprecated since 4.3BSD, and WSTOPPED means something else now in POSIX, that we don't yet support. Original diff by guenther, from 2.5 years ago. Ports tree cleanup and re-testing by naddy. ok deraadt, kettenis
2014-06-13Make run(4) attach to RT5572.Stefan Sperling
Tested with "MAC/BBP RT5592 (rev 0x0222), RF RT5592 (MIMO 2T2R)" device.
2014-06-13regenStefan Sperling
2014-06-13Add USB device ID of Ralink RT5572. Found in a TP-LINK TL-WDN3200 device.Stefan Sperling
2014-06-13Fix broken logic in sgec_rxintr() poorly duplicating some of ether_input()Miod Vallat
checks, causing the rx ring pointer to stall as soon as an irrelevant frame is received when the intergace is in bpf+promiscuous or `all multicast' mode. Problem spotted and tracked down to the use of bpf by sebastia@. Hair pulling by me.
2014-06-13fix duplicate entry for the eot extension; noted by ajacoutot@Robert Nagy
2014-06-13typoMiod Vallat
2014-06-13Type cleanup:Christian Weisgerber
* Move all off_t variables that don't look like file sizes to int64_t. * Switch blockswritten to int64_t, so it won't wrap at 2TB. * Same for blocksthisvol (from deraadt@). * Switch xferrate (from tedu@) and blocksperfile from long to uint64_t. * Since blocksperfile can be set with -B, move numarg() from long to long long and don't mark small integer constant arguments as long. ok deraadt@, tedu@
2014-06-13For now... assume success of getentropy() just like we assumed successTheo de Raadt
of sysctl(). Mark it with XXX while we consider.
2014-06-13Correctly calculate the key block length when using export ciphers.Joel Sing
2014-06-13Overhaul the keyblock handling in ssl3_change_cipher_state(). UseJoel Sing
meaningful variable names with use with pointer arithmitic rather than complex array indexing.
2014-06-13Correctly calculate the key block length when used with export ciphers.Joel Sing
While here, use meaningful variable names and simplify the calculation.
2014-06-13Remove deprecated RFC2292 ancillary data convenience functions.Christopher Zimmermann
They are obsoleted by the RFC3542 api. ok mpi@
2014-06-13use getgentropy() call. If it fails, things are pretty bad --Theo de Raadt
call abort(). this direction discussed at length with miod beck tedu matthew etc
2014-06-13use getentropy; from matthewTheo de Raadt
2014-06-13Use meaningful variable names, rather than i, j, k and cl.Joel Sing
2014-06-13Do not bother trying to work out of we can reuse a cipher context - justJoel Sing
throw it away and create a new one. This simplifies the code and also allows ASR to do its thing.
2014-06-13Separate the comression handling from the cipher/message digest handling inJoel Sing
ssl3_change_cipher_state().
2014-06-13Swap compress/expand around so they are in the correct order - these endedJoel Sing
up in the wrong order when the code was refactored.
2014-06-13The export_key/export_iv variables are only used in the is_export case.Joel Sing
Also use c rather than &c[0].
2014-06-13Rename a bunch of variables in ssl3_change_cipher_state() for readability.Joel Sing
This also brings it inline with tls1_change_cipher_state_cipher().
2014-06-13Add ChaCha20-Poly1305 based ciphersuites.Joel Sing
Based on Adam Langley's chromium patches. Tested by and ok sthen@
2014-06-13Switch the AES-GCM cipher suites to SSL_CIPHER_ALGORITHM2_AEAD.Joel Sing
2014-06-13Combine the MAC handling for both !EVP_CIPH_FLAG_AEAD_CIPHER andJoel Sing
EVP_CIPH_FLAG_AEAD_CIPHER into the same if/else block.
2014-06-13Use SSL3_SEQUENCE_SIZE and if we're going to preincrement we may as wellJoel Sing
do it properly.
2014-06-13Add support for handling SSL_CIPHER_ALGORITHM2_AEAD ciphers, which areJoel Sing
those that use EVP_AEAD instead ov EVP_CIPHER. This means being able to change cipher state with an EVP_AEAD and being able to encrypt/decrypt TLS using the EVP_AEAD. This has no change on existing non-SSL_CIPHER_ALGORITHM2_AEAD ciphers. Based on Adam Langley's chromium patches. Rides the recent libssl bump. Tested by sthen@
2014-06-13Add an SSL_AEAD_CTX to enable the use of EVP_AEAD with an SSL cipher.Joel Sing
Read and write contexts are also added to the SSL_CTX, along with supporting code. Based on Adam Langley's chromium diffs. Rides the recent SSL library bump.
2014-06-13delete a lie; replace with a truthTheo de Raadt
2014-06-13syncTheo de Raadt
2014-06-13permit SYS_getentropyTheo de Raadt
from matthew
2014-06-13Add new getentropy() system call. Code and pressure from matthew.Theo de Raadt
I accepted that he's right (again) to seperate this out from heavy sysctl API and this will simply a variety of things. Functionname is not used by anyone in the ports tree, so we guess we can use it. Shocking that no application has a function called this. ok matthew & others who pushed him to start this early on
2014-06-13Now that the water marks are updated on a per-pool basis indicate inMartin Pieuchot
the LIVELOCKS column if there is a pending (deferred) update. ok claudio@
2014-06-13Instead of updating all the cluster allocation water marks of all theMartin Pieuchot
interfaces when the kernel is livelocked, only do it for the current pool and defer the other updates. This allow us to get rid of an interface list iteration in a critical path. Ridding the libc crank since this change introduce an ABI break. ok claudio@
2014-06-13Add regress test for MAP_INHERIT_ZERO.Matthew Dempsky