summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-11-18zap errant space in usage();Jason McIntyre
2022-11-18Add aspa-set config test.Claudio Jeker
2022-11-18Add plumbing for ASPA support. This implements the parser and part of theClaudio Jeker
logic in the rtr process. It does not implement the new RTR messages yet but it is possible to specify an aspa-set in the config. Also the validation code in the RDE is missing so this does not do anything. With this in it will be possible to extend rpki-client to publish an aspa-set as part of the openbgpd config file. OK tb@
2022-11-18group -> fieldTheo Buehler
discussed with schwarze
2022-11-18polynominal -> polynomialTheo Buehler
ok schwarze
2022-11-18cope with new getaddrinfo() error messageAnton Lindqvist
2022-11-18syncTheo de Raadt
2022-11-18mips64 code calls uvm_map_protect() directly, so needs to adapt:Theo de Raadt
stack growth from setrlimit was never updated to set UVM_ET_STACK on the entries, so the check-sp-at-system-call check failed. Quite strange it took this long to find this. ok kettenis
2022-11-18new manual page BN_GF2m_add(3)Ingo Schwarze
concerning arithmetic in Galois fields of power-of-2 order
2022-11-17With regret, place mutexes after struct vm_map fields which are inspectedTheo de Raadt
by libkvm and procmap(8). struct mutex can change based upon kernel compile options, and the fields were dancing around ok kettenis
2022-11-17Avoid a few unnecessary contortionsTheo Buehler
Turns out that after ~40 years of practice I still can't do addition with carry correctly :S
2022-11-17Use a fixed-size array for the message and simplify a few other curlyTheo Buehler
things.
2022-11-17Schedule cleanup of '-r' now useless getopt optionJob Snijders
OK tb@
2022-11-17Add shortlist functionality, a compagnion to the skiplistJob Snijders
If the operator specifies the '-H' option once (or more) followed by a FQDN, the utility will *only* connect to those hosts and skip all others. OK claudio@ tb@
2022-11-17Add initial Wycheproof EdDSA test coverageTheo Buehler
2022-11-17Add a regression test for curve25519.c r1.14Theo Buehler
Generate random signatures of random messages and verify them. Then check that the signature modified by adding the edwards25519 group order to the upper half are rejected. This would not always be accepted without the check in curve25519.c r1.14, but often enough that a few iterations suffice to expose the missing check.
2022-11-17Prevent Ed25519 signature malleabilityTheo Buehler
Add a check that ensures that the upper half s of an Ed25519 signature is bounded by the group order, i.e, 0 <= s < order. This is required by the Verify procedure in RFC 8032, section 5.1.7, step 1, and prevents simple modifications of signatures such as adding (a multiple of) the group order to the upper half of the signature. Found with EdDSA testcase 63 of project Wycheproof. ok beck jsing
2022-11-17stack growth from setrlimit was never updated to set UVM_ET_STACK onTheo de Raadt
the entries, so the check-sp-at-system-call check failed. Quite strange it took this long to find this. ok kettenis
2022-11-17style(9) fix. No functional change.Vitaliy Makkoveev
2022-11-17Restrict what getaddrinfo(3) is willing to try to resolve.Florian Obser
Programs assume that a successful call to getaddrinfo(3) validates the input as "safe", but that's not true. Characters like '$', '`', '\n' or '*' can traverse the DNS without problems, but have special meaning, for example a shell. There is a function res_hnok() already in libc, but it validates if a string is a host name, which is too strict in practice. For example foo-.example.com is not a valid host name, but is used on the Internet. Posix has this to say: "The getaddrinfo() function shall translate the name of a service location (for example, a host name)" It hints that the input should be a host name, but it does not restrict it to it. This introduces a function hnok_lenient() which restricts the input to getaddrinfo(3) to the set [A-z0-9-_.]. Additionally two consecutive dots ('.') are not allowed nor can the string start with - or '.'. glibc introduced a similar restriction years ago, so this should not cause problems. It has been known in the DNS community for years, probably decades that getaddrinfo(3) is too lenient what it accepts, but it has always been kicked down the road as "not a DNS problem". Unfortunately this information never made it out of the DNS community and no coordinated effort happened to have this addressed in operating systems. David Leadbeater recently demonstrated how ssh(1) and ftp(1) are too trusting with what getaddrinfo(3) accepts. Both have been fixed independently of this. Input deraadt, eric OK millert, deraadt
2022-11-17Add apple-boot firmware for Apple arm64 machines in fw_update(8) patterns.Tobias Heider
The pattern matches the printed CPU_IMPL_APPLE name as in: cpu0 at mainbus0 mpidr 0: Apple Icestorm Pro r2p0 cpu0 at mainbus0 mpidr 0: Apple Blizzard r1p0 ok deraadt@ afresh@ kettenis@
2022-11-17add .gnu.warning.SYMBOL support to ld.lld(1) to display the warnings inRobert Nagy
these sections like ld.bfd(1) e.g: add.c(add.o:(add)): warning: sprintf() is often misused, please use snprintf() add.c(add.o:(add)): warning: strcpy() is almost always misused, please use strlcpy() add.c(add.o:(add)): warning: strcat() is almost always misused, please use strlcat() ok deraadt@
2022-11-17whitespace fixes. no functional change.David Gwynne
2020-08-03Import LLVM 10.0.0 release including clang, lld and lldb.Patrick Wildt
ok hackroom tested by plenty
2022-11-17Revert "Check certificate extensions in trusted certificates"Bob Beck
There are some possible strange side effects noticed by the openssl cms regress tests that I missed. Backing this out until I untangle it ok tb@
2022-11-16syncTheo de Raadt
2022-11-16tolower(3) guarantees to return its argument unchanged if it's notFlorian Obser
uppercase. While here use the correct idiom of casting to unsigned char. OK millert, farewell to ultrix deraadt
2022-11-16mark BN_X931_derive_prime_ex, BN_X931_generate_prime_ex,Ingo Schwarze
and BN_X931_generate_Xpq as intentionally undocumented because they are unused outside OpenSSL/LibreSSL and deprecated in OpenSSL 3.0
2022-11-16expose the documentation of X509_STORE_CTX_verify_fn(3)Ingo Schwarze
and X509_STORE_set_verify(3) and document X509_STORE_get_verify(3) which tb@ all provided with x509_vfy.h revisions 1.48 and 1.49
2022-11-16document X509_STORE_CTX_verify_cb(3) and X509_STORE_get_verify_cb(3)Ingo Schwarze
which tb@ provided with x509_vfy.h revisions 1.48 and 1.49
2022-11-16Mark BN_mod_exp2_mont() as intentionally undocumented.Ingo Schwarze
It appears to be intended for internal use by DSA_do_verify(3) and using codesearch.debian.net, i found nothing outside OpenSSL/LibreSSL using it. In April 2018, jsing@ questioned whether the five related functions BN_mod_exp_mont() and friends should even be exposed by <openssl/bn.h>, so we decided to not document them. Now tb@ agrees that there is no reason to document BN_mod_exp2_mont() as long as we don't want to document BN_mod_exp_mont().
2022-11-16Align output to a more tabular viewJob Snijders
OK claudio@
2022-11-16Remove an outdated TODOTheo Buehler
2022-11-15style(9) fix. No functional change.Vitaliy Makkoveev
2022-11-15Not assigning a link local address by default breaks various things.Claudio Jeker
A lot of code depends on a eui64 address to be present. So revert this bit of the last commit. OK florian@
2022-11-15document BN_mod_sqrt(3)Ingo Schwarze
2022-11-15Take `vmobjlock' around uao_grow() and uao_shrink() calls to fix tmpfsVitaliy Makkoveev
panics [1]. 1. https://marc.info/?l=openbsd-bugs&m=165012301707403&w=2 from Leo Larnack <leo at pseven.xyz> ok kn@ mpi@
2022-11-15syncStuart Henderson
2022-11-14Unlock SIOCGIFG{MEMB,ATTR,LIST}Klemens Nanni
The global interface group list is also protected by the net lock and all access to it (all within if.c) take it accordingly. Getting all - members of a group (SIOCGIFGMEMB), - attributes of a group (SIOCGIFGATTR), - groups (SIOCGIFGLIST) are each read-only operations on the global interface group `ifg_head'. The global interface list `ifnetlist' or its per-interface group lists are not used in these ioctls. OK mvs
2022-11-14Unlock SIOCGIFCONFKlemens Nanni
As netintro(4) explains, this copies a bunch of data from the global interface list as well as its per-interface address lists. All of this is never written to by ifconf(), protected by the net lock and documented as such in the struct comments already. OK mvs
2022-11-14Document global interface group list lockingKlemens Nanni
The per-interface group list is protected by the net lock and already documented as such. The global interface group list `ifg_head' is also protected by the net lock and all access to it (all within if.c) take it accordingly. Feedback OK mvs
2022-11-14merge conflictsStuart Henderson
2022-11-14import NSD 4.6.1, ok florian@, thanks aoyama@ for checking autoconf C99 bitsStuart Henderson
2022-11-14document BN_kronecker(3)Ingo Schwarze
2022-11-14document BN_reciprocal(3)Ingo Schwarze
2022-11-14Hide public symbols in libcrypto/x509 .c filesBob Beck
ok tb@
2022-11-14Fix tag type and buffer limit in DT_TEXTREL lookup.Visa Hankala
OK deraadt@ kettenis@
2022-11-14With the commit to in6_ifattach mpe(4) now also works with IPv6Claudio Jeker
2022-11-14Add missing clock trigger to loongson_isa_splx().Visa Hankala
Fixes unexpected delays that have occurred with mips64 clock(4).
2022-11-14Relax the list of interfaces which support IPv6 a bit.Claudio Jeker
No longer require IFF_MULTICAST for all interfaces. It is save to skip this for interfaces that don't require a ND cache. Also do not assign a link-local address in such cases. This affects point-to-point interfaces and the NBMA / point-to-multipoint interfaces like mpe(4), mgre(4) and wg(4). The NBMA interfaces need some alternative way to figure out the address mapping. In the end this allows non-multicast interfaces to work with IPv6. OK dlg@ kn@