summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-01-08refactor tilde_expand_filename() and make it handle ~user paths with noDamien Miller
trailing slash; feedback/ok markus and jsg
2022-01-08x509_cpols.c will need to include x509_lcl.h soonTheo Buehler
2022-01-08Enable all supported hostkey algorithms (but no others). Allows hostbasedDarren Tucker
test to pass when built without OpenSSL.
2022-01-08Prep .c files for removing the #includes from */archdep.hPhilip Guenther
* replace #include "archdep.h" with #includes of what is used, pulling in "syscall.h", "util.h", and "archdep.h" as needed * delete #include <sys/syscall.h> from syscall.h * only pull in <sys/stat.h> to the three files that use _dl_fstat(), forward declare struct stat in syscall.h for the others * NBBY is for <sys/select.h> macros; just use '8' in dl_printf.c * <machine/vmparam.h> is only needed on i386; conditionalize it * stop using __LDPGSZ: use _MAX_PAGE_SHIFT (already used by malloc.c) where necessary * delete other bogus #includes, order legit per style: <sys/*> then <*/*>, then <*>, then "*" dir.c improvement from jsg@ ok and testing assistance deraadt@
2022-01-08Indicate current default cipherKinichiro Inoguchi
2022-01-08Remove verbose PCI and USB device info from BOOTVisa Hankala
BOOT kernels do not print kernel messages, and currently there is no way to change this at runtime. Remove the verbose device information to save some space.
2022-01-08Adjust debug printfs after pcitag_t type change.Visa Hankala
2022-01-08Apply mpsafe changes from dwge(4) to dwxe(4):Jonathan Matthew
Rework the tx path to use the consumer and producer positions to work out the number of slots available, and to put packets on the ring until fewer than DWXE_NTXSEGS slots are left, making dwxe_start() and dwxe_txeof() work independently. While here, only write to DWXE_TX_CTL1 once per call to dwxe_start() rather than once per packet. Adjust the rx interrupt path to check the number of slots in use and return slots once per interrupt. Add interrupt and ifq barriers before taking the interface down. With all of this done, we can mark dwxe(4) mpsafe. tested on arm64 (a64 sopine) by mlarkin@ and armv7 (h2+) by me ok dlg@
2022-01-07Add some workarounds to make build_addr_block_test_data const.Theo Buehler
2022-01-07Prepare to provide EVP_AEAD_CTX_{new,free}()Theo Buehler
ok jsing
2022-01-07Add code to initialize the PCIe host bridge hardware. We currently rely onMark Kettenis
U-Boot to initialize the hardware for us, but it is better if we can cope with this ourselves. ok patrick@
2022-01-07Revert previous accidental commitTheo Buehler
2022-01-07If no date could be parsed, bail out early and fix an error return thatOtto Moerbeek
leaked; ok florian@
2022-01-07Rename dh_tmp to dhe_params.Joel Sing
Support for non-ephemeral DH was removed a long time ago - as such, the dh_tmp and dh_tmp_cb are used for DHE parameters. Rename them to reflect reality. ok inoguchi@ tb@
2022-01-07SIOCSIFXFLAGS drops into the SIOCSIFFLAGS to perform auto-up of theTheo de Raadt
interface. If this operation fails (probably due to missing firmware), we must undo changes to the SIOCSIFXFLAGS xflags. ok stsp.
2022-01-07Stop attempting to duplicate the public and private key of dh_tmp.Joel Sing
Support for non-ephemeral DH was removed a very long time ago - the only way that dh_tmp is set is via DHparams_dup(), hence the public and private keys are always going to be NULL. ok inoguchi@ tb@
2022-01-07Convert legacy server to tls_key_share.Joel Sing
This requires a few more additions to the DHE key share code - we need to be able to either set the DHE parameters or specify the number of key bits for use with auto DHE parameters. Additionally, we need to be able to serialise the DHE parameters to send to the client. This removes the infamous 'tmp' struct from ssl3_state_internal_st. ok inoguchi@ tb@
2022-01-07.glue_7 is used for arm code calling thumb code, and .glue_7t is used forKevin Lo
thumb code calling arm code, no need to put these input sections at the text output section. ok jsg@ kettenis@
2022-01-07A few more files need asn1_locl.h.Theo Buehler
2022-01-07include asn1_locl.h where it will be needed for the bump.Theo Buehler
discussed with jsing
2022-01-07Add missing dependency.Visa Hankala
2022-01-07Somehow I always forget that the more global LC_ALL takes precedence overMartijn van Duren
the more specific LC_CTYPE. Things are weird that way. The problem here was that "eval" and "LC_ALL=" were swapped, not the priority of variables. pointed out by naddy@ OK tb@
2022-01-07Prepare to make RSA and RSA_METHOD opaque by including rsa_locl.hTheo Buehler
where it will be needed in the upcoming bump. discussed with jsing
2022-01-07Add an essentially empty ocsp_local.h and include it in the filesTheo Buehler
that will need it in the upcoming bump. discussed with jsing
2022-01-07gost needs to look into ecs_locl.hTheo Buehler
2022-01-07Prepare the move of DSA_SIG, DSA_METHOD and DSA to dsa_locl.h byTheo Buehler
including the local header where it will be needed. discussed with jsing
2022-01-07Add an essentially empty dh_local.h and include it in the files whereTheo Buehler
it will be needed in the upcoming bump. discussed with jsing
2022-01-07zap trailing whitespaceTheo Buehler
2022-01-07fix aac build after -Wno-uninitialized was removedJonathan Gray
2022-01-07Let dtlstest peek into bio_local.hTheo Buehler
2022-01-07Add a new, mostly empty, bio_local.h and include it in the filesTheo Buehler
that will need it in the upcoming bump. discussed with jsing
2022-01-07Sync EVP_MD_CTX to heap switch from npppd.Theo Buehler
ok millert
2022-01-07npppd: convert to EVP_MD_CTX on heapTheo Buehler
In the upcoming libcrypto bump, EVP_MD_CTX will become opaque, so all EVP_MD_CTX variables will need to be moved from the stack to the heap. This is a mechanical conversion which also switches from EVP_Digest{Init,Final}() to their _ex() versions as suggested by millert. We cannot do error checking since this code is structured in several layers of void functions. This will have to be fixed by someone else. ok millert
2022-01-07hibernate_clear_signature() is only used by hibernate_resume(), soPhilip Guenther
pass in the already read hibernate_info instead of reading it again. ok deraadt@
2022-01-07Extract the slice from the zeroth swap device instead of assumingPhilip Guenther
it's the 'b' slice and (sanity) check against the partition count. Also, make the "is union hibernate_info too large?" a compile time check. ok deraadt@
2022-01-07whitespaceAndrew Fresh
2022-01-07regenJonathan Gray
2022-01-07stop creating old drm device nodesJonathan Gray
2022-01-07mention radeondrm on riscv64Jonathan Gray
2022-01-06stop chowning old drm device nodesJonathan Gray
2022-01-06Don't explicitly set HostbasedAuthentication in sshd_config.Darren Tucker
It defaults to "no", and not explicitly setting it allows us to enable it for the (optional) hostbased test.
2022-01-06allow hostbased auth to select RSA keys when only RSA/SHA2 areDamien Miller
configured (this is the default case); ok markus@
2022-01-06add a helper function to match a key type to a list of signatureDamien Miller
algorithms. RSA keys can make signatures with multiple algorithms, so some special handling is required. ok markus@
2022-01-06log some details on hostkeys that ssh loads for hostbased authnDamien Miller
ok markus@
2022-01-06log signature algorithm during verification by monitor; ok markusDamien Miller
2022-01-06piece of UpdateHostkeys client strictification: when updating known_hostsDamien Miller
with new keys, ignore NULL keys (forgot to include in prior commit)
2022-01-06include rejected signature algorithm in error message and not theDamien Miller
(useless) key type; ok markus
2022-01-06make ssh-keysign use the requested signature algorithm and not theDamien Miller
default for the keytype. Part of unbreaking hostbased auth for RSA/SHA2 keys. ok markus@
2022-01-06stricter UpdateHostkey signature verification logic on the client-Damien Miller
side. Require RSA/SHA2 signatures for RSA hostkeys except when RSA/SHA1 was explicitly negotiated during initial KEX; bz3375 ok markus@
2022-01-06Fix signature algorithm selection logic for UpdateHostkeys on theDamien Miller
server side. The previous code tried to prefer RSA/SHA2 for hostkey proofs of RSA keys, but missed some cases. This will use RSA/SHA2 signatures for RSA keys if the client proposed these algorithms in initial KEX. bz3375 Mostly by Dmitry Belyavskiy with some tweaks by me. ok markus@