summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-01-20Fix BN_is_prime_* calls in libcrypto, the API returns -1 on error.Theo Buehler
From BoringSSL's commit 53409ee3d7595ed37da472bc73b010cd2c8a5ffd by David Benjamin. ok djm, jsing
2019-01-20Handle link state change interrupts by issuing IXL_AQ_OP_PHY_LINK_STATUSJonathan Matthew
to the admin queue. We don't need to wait for or process the reply, because the existing admin reply queue processing already does it. ok dlg@
2019-01-20Serialize tc_windup() calls and modification of some timehands members.cheloha
If a user thread from e.g. clock_settime(2) is in the midst of changing the boottime or calling tc_windup() when it is interrupted by hardclock(9), the timehands could be left in a damaged state. So protect tc_windup() calls with a mutex, timecounter_mtx. hardclock(9) merely attempts to enter the mutex instead of spinning because it cannot afford to wait around. In practice hardclock(9) will skip tc_windup() very rarely, and when it does skip there aren't any negative effects because the skip indicates that a user thread is already calling, or about to call, tc_windup() anyway. Based on FreeBSD r303387 and NetBSD sys/kern/kern_tc.c,v1.30 Discussed with mpi@ and visa@. Tons of nice technical detail about lockless reads from visa@. OK visa@
2019-01-20DH-GEX min value is now specified in RFC8270. ok djm@Darren Tucker
2019-01-20Use rdmsr_safe in svm_handle_msrMike Larkin
Avoid reading possibly missing MSRs ok guenther@
2019-01-20Implement rdmsr_safeMike Larkin
rdmsr_safe is used when reading potentially missing MSRs, to avoid triggering #GPs in the kernel. ok guenther
2019-01-20fix SMALL_KERNEL build after changes in rev 1.361Jonathan Gray
reported by naddy@ ok deraadt@
2019-01-19fix error in refactor: use ssh_packet_disconnect() instead ofDamien Miller
sshpkt_error(). The first one logs the error and exits (what we want) instead of just logging and blundering on.
2019-01-19typo: "wsdisplay* at simlefb?" -> "wsdisplay* at simplefb?"Stuart Henderson
2019-01-19remove last traces of old packet API!Damien Miller
with & ok markus@
2019-01-19remove last references to active_stateDamien Miller
with & ok markus@
2019-01-19convert monitor.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert sshd.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert session.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert auth.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert serverloop.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert the remainder of sshconnect2.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert the remainder of clientloop.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert auth2.c to new packet APIDamien Miller
2019-01-19convert servconf.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert channels.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert sshconnect.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert ssh.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert mux.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert sshconnect2.c to new packet APIDamien Miller
with & ok markus@
2019-01-19convert clientloop.c to new packet APIDamien Miller
with & ok markus@
2019-01-19allow sshpkt_fatal() to take a varargs format; we'll use this to giveDamien Miller
packet-related fatal error messages more context (esp. the remote endpoint) ok markus@
2019-01-19begin landing remaining refactoring of packet parsing API, startedDamien Miller
almost exactly six years ago. This change stops including the old packet_* API by default and makes each file that requires the old API include it explicitly. We will commit file-by-file refactoring to remove the old API in consistent steps. with & ok markus@
2019-01-19Since there is no more exec()'ing, there is no need toKenneth R Westerback
save a copy of the original argv.
2019-01-19change the default digest used byJonathan Gray
openssl x509 -fingerprint openssl crl -fingerprint from sha1 to sha256 ok jsing@
2019-01-19Since dhclient no longer tries to clean up when exiting, there is noKenneth R Westerback
need to start a new copy when LLADDR or SSID changes. Just go back to S_PREBOOT and get a new lease. Fewer log messages, faster join'ing new networks, simpler code.
2019-01-19properly error out instead of only printing a warning when some join commandsPeter Hessler
failed OK deraadt@
2019-01-19document pwraction in the example fileTed Unangst
2019-01-19Add a pwraction sysctl that controls what the power button does on acpi.Ted Unangst
By default, nothing changes -- shutdown is initiated. But allows turning power button into a sleep button if desired. (grudging) ok from a few parties
2019-01-19spelling;Jason McIntyre
2019-01-19Change transfer schedule of split interrupt transfer,SASANO Takayoshi
to avoid confilicting with split isochronous transfer which use same TT. ok mpi@
2019-01-19remove mmap test for nowanton
2019-01-19backout previous; syzkaller did not cope well with this changeanton
2019-01-19In evp.h rev. 1.71, tb@ added EVP_ENCODE_CTX_new(3) andIngo Schwarze
EVP_ENCODE_CTX_free(3). Docomuent them, in part using text from OpenSSL that was still published under a free license.
2019-01-19tweak the previous ixl commit, and add an entry to pci;Jason McIntyre
2019-01-19virtio: Introduce defines for config(8) flagsStefan Fritsch
2019-01-19viomb: tweak feature negotiationStefan Fritsch
VIRTIO_F_RING_INDIRECT_DESC is always negotiated by the transport driver, no need to specify it explicitly. VIRTIO_BALLOON_F_MUST_TELL_HOST is not offered but is handled in the code. Offer it during negotiation, too.
2019-01-19Clean-up unused directoriesMatthieu Herrb
2019-01-19Use mnemonic PFCTL_SHOW_* macros, terminate string with null characterkn
Tweak spacing while here, no object change. Feedback and OK procter, OK sceloha
2019-01-19Print an \r in front of the password prompt so parts of a passwordTheo Buehler
that was entered too early are likely clobbered by the prompt. Idea from doas. from and ok djm "i like it" deraadt
2019-01-19enable myx(4) on the large ramdisk. has been enabled in GENERIC for a while.Peter Hessler
2019-01-19Sort HDRS/SRCS lists and use one line per source file for maintainability.Joel Sing
ok tb@
2019-01-19Finish randominzing remaining layers of pmap_kernelMike Larkin
An earlier diff moved the top level page, this diff finishes the lower layers. New pages are allocated for the existing hiererchy (which thus benefit from random placement from pmemrange/etc). Existing managed pages are returned to uvm (a small number of bootstrap pages are not returned as they are allocated in locore0 and thus aren't managed). ok deraadt
2019-01-19Add handshake message type checking and special case certificate requests.Joel Sing
Check that the handshake message type received matches that required by the state machine. However, thanks to poor state design in the TLSv1.3 RFC, there is no way to know if you're going to receive a certificate request message or not, hence we have to special case it and teach the receive handler how to handle this situation. Discussed at length with beck@ and tb@ during the hackathon. ok tb@
2019-01-19Tweak return value handling in the TLSv1.3 handshake code.Joel Sing
The I/O paths are from the tls13_handshake_send_action() and tls13_handshake_recv_action() functions - both of these need to propagate I/O conditions (EOF, failure, want poll in, want poll out) up the stack, so we need to capture and return values <= 0. Use an I/O condition to indicate successful handshake completion. Also, the various send/recv functions are currently unimplemented, so return 0 (failure) rather than 1 (success). ok tb@