summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2024-07-20Unlock udp(4) somove().Vitaliy Makkoveev
Socket splicing belongs to sockets buffers. udp(4) sockets are fully switched to fine-grained buffers locks, so use them instead of exclusive solock(). Always schedule somove() thread to run as we do for tcp(4) case. This brings delay to packet processing, but it is comparable wit non splicing case where soreceive() threads are always scheduled. So, now spliced udp(4) sockets rely on sb_lock() of `so_rcv' buffer together with `sb_mtx' mutexes of both buffers. Shared solock() only required around pru_send() call, so the most of somove() thread runs simultaneously with network stack. Also document 'sosplice' structure locking. Feedback, tests and OK from bluhm.
2024-07-20UVIDEO_DEBUG needs fcntl.hJonathan Gray
reported by Peter J. Philipp
2024-07-20Fix regression introduced in previous causing HEAD requests to beAnton Lindqvist
erroneously rejected as malformed. ok chrisz@
2024-07-20Remove cipher from SSL_SESSION.Joel Sing
For a long time SSL_SESSION has had both a cipher ID and a pointer to an SSL_CIPHER (and not both are guaranteed to be populated). There is also a pointer to an SSL_CIPHER in the SSL_HANDSHAKE that denotes the cipher being used for this connection. Some code has been using the cipher from SSL_SESSION and some code has been using the cipher from SSL_HANDSHAKE. Remove cipher from SSL_SESSION and use the version in SSL_HANDSHAKE everywhere. If resuming from a session then we need to use the SSL_SESSION cipher ID to set the SSL_HANDSHAKE cipher. And we still need to ensure that we update the cipher ID in the SSL_SESSION whenever the SSL_HANDSHAKE cipher changes (this only occurs in a few places). ok tb@
2024-07-19Unlock sysctl net.inet.ip.redirect and net.inet6.ip6.redirect.Alexander Bluhm
Variable ip and ip6 sendredirects is only read once during packet processing. Use atomic_load_int() to access the value in exactly one read instruction. No memory barriers needed as there is no correlation with other values. Sort the ip and ip6 checks, so the difference is easier to see. Move access to global variable to the end. OK mvs@
2024-07-19Relax socket lock assertion in UDP input and send.Alexander Bluhm
OK mvs@
2024-07-19unveil(2) /etc/gettytab.db in getty(8) to avoid possible violation.Alexander Bluhm
OK deraadt@
2024-07-19syncTheo de Raadt
2024-07-19Annotate issues with tls_session_secret_cb() related code.Joel Sing
2024-07-19Move client ciphers from SSL_SESSION to SSL_HANDSHAKE.Joel Sing
SSL_SESSION has a 'ciphers' member which contains a list of ciphers that were advertised by the client. Move this from SSL_SESSION to SSL_HANDSHAKE and rename it to match reality. ok tb@
2024-07-19test transfers in mux proxy mode tooDamien Miller
2024-07-19Keep Content-length header in HEAD responses.Christopher Zimmermann
ok millert@
2024-07-18Send Access-Reject when the authentication is not handled or the userYASUOKA Masahiko
is not found.
2024-07-18unveil .db is needed. Also move pledge() earlier.YASUOKA Masahiko
2024-07-18Fix typos in previous commit spotted by naddy@Mark Kettenis
2024-07-18The source of a link (name1) may not be a directory.Todd C. Miller
POSIX says this is implementation-dependent; OpenBSD does not allow it. OK guenther@
2024-07-18In pfattach() pass malloc type instead of flags to cpumem_malloc().Alexander Bluhm
from markus@
2024-07-18syncTheo de Raadt
2024-07-18Fix memory leaks and improve id handling of iked_radserver_req.YASUOKA Masahiko
original diff from markus ok tobhe
2024-07-18remove extra punctuation; from alexander archJason McIntyre
2024-07-18Since libcrypto is used to calc message authenticator, use libcryptoYASUOKA Masahiko
md5 also in other places instead libc md5. ok millert
2024-07-18mention mux proxy modeDamien Miller
2024-07-18Add a link to radiud_file(8)YASUOKA Masahiko
2024-07-17sed: use warn()/err() where appropriateTodd C. Miller
Use warn()/err() instead of sed's homegrown warning()/error() for things other than parser problems. The warning()/error() functions display the file and line number in addition to the error message. This also removes of the COMPILE/FATAL argument to error() since now all calls to error() are for compilation/parsing issues. OK op@ espie@
2024-07-17Add Message-Authenticator attriubte when sending Access-Request.YASUOKA Masahiko
ok millert
2024-07-17Add RCS idTheo Buehler
2024-07-17Clean up the cpi_id_aa64xxx variables at the end of autoconf such thatMark Kettenis
sysclt(2) and ID register access emulation can share the variables. ok jca@
2024-07-17Enable regress for SSL_CIPHER_get_handshake_digest()Joel Sing
Turns out this is already linked statically.
2024-07-17syncTheo de Raadt
2024-07-17Rework cipher find test to also provide coverage for SSL_CIPHER_*()Joel Sing
2024-07-17Be clear that RUSAGE_CHILDREN only works for terminated children that haveClaudio Jeker
been waited for. If you SIG_IGN SIGCHLD or don't call any of the wait functions then RUSAGE_CHILDREN wont report anything. OK deraadt@ millert@
2024-07-17Fix some gcc warningsYASUOKA Masahiko
2024-07-17minor repairsTheo de Raadt
2024-07-17Error if config parameter is unknown. This also fixes a gcc warning.YASUOKA Masahiko
spotted by deraadt
2024-07-17Document "authentication-filter".YASUOKA Masahiko
2024-07-17Decrypt "Password" attribute always before passing the packet toYASUOKA Masahiko
modules. Also, don't assume the authenticator of the packet from the module that has no secret is valid.
2024-07-17Delete log_info() line for debug.YASUOKA Masahiko
2024-07-17Sync struct proc P_BITS with reality.Claudio Jeker
Remove "\027XX" (old systrace flag) and "\035SOFTDEP". OK jsg@
2024-07-17Fix indentYASUOKA Masahiko
2024-07-17Display an error message for "sed -i" if the file is unwritableTodd C. Miller
Previously, sed would fail silently if it was unable to move the temporary file into place. Also allow "sed -i" on symbolic link--the link will be broken but this matches GNU sed behavior. From espie@ OK op@
2024-07-16Update regress for removal of SSL_HANDSHAKE_MAC_DEFAULT.Joel Sing
2024-07-16Clean up SSL_HANDSHAKE_MAC_DEFAULT.Joel Sing
The handshake MAC needs to be upgraded when TLSv1.0 and TLSv1.1 ciphersuites are used with TLSv1.2. Since we no longer support TLSv1.0 and TLSv1.1, we can simply upgrade the handshake MAC in the ciphersuite table and remove the various defines/macros/code that existed to handle the upgrade. ok tb@
2024-07-16Fix .Ox for SSL_CIPHER_get_handshake_digest()Theo Buehler
2024-07-16syncTheo de Raadt
2024-07-16Only perform the static_assert checks in C>=11 environment; unbreaks buildMiod Vallat
on platforms using gcc.
2024-07-16Fix the SIGHUP signal race. ed's "event loop" operates a getchar(); checkTheo de Raadt
the hup flag before and after that call, when the buffer structures are stable for write_file() to work. Remove the hup handling from the SPL0() macro, because this is run in at least one place during structure instability. The SIGINT handler, which uses siglongjmp(), is also trusting the SPL1/SPL0 dance more than it should. ok millert
2024-07-16match on Atom C3000Jonathan Gray
from and tested by Brendan Shanks
2024-07-15Switch the EVP_PKEY_*attr* API to LCRYPTO_UNUSED()Theo Buehler
This would have prevented the PKCS12 oopsie.
2024-07-15Fix PKCS12_create()Theo Buehler
This tries to copy some microsoft attributes which are not usually present and chokes on the now disabled EVP_PKEY_*attr* API. Instead of reviving about four layers of traps and indirection, just inline the two functions in a way that should be more obvious. found by anton via the ruby-openssl tests ok jsing
2024-07-15Make the touchpad on the Samsung Galaxy Book4 Edge work.Marcus Glocker
ok patrick@