<feed xmlns='http://www.w3.org/2005/Atom'>
<title>wireguard-openbsd/sys/lib/libsa/softraid.c, branch jd/queueboosts</title>
<subtitle>WireGuard implementation for the OpenBSD kernel</subtitle>
<id>https://git.zx2c4.com/wireguard-openbsd/atom/sys/lib/libsa/softraid.c?h=jd%2Fqueueboosts</id>
<link rel='self' href='https://git.zx2c4.com/wireguard-openbsd/atom/sys/lib/libsa/softraid.c?h=jd%2Fqueueboosts'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/'/>
<updated>2018-08-10T16:41:35Z</updated>
<entry>
<title>Retry on incorrect passphrase for softraid crypto boot.</title>
<updated>2018-08-10T16:41:35Z</updated>
<author>
<name>jsing</name>
<email>jsing@openbsd.org</email>
</author>
<published>2018-08-10T16:41:35Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=27bea9a3c7fdba43cfa7c5fb6f268efe98f7720b'/>
<id>urn:sha1:27bea9a3c7fdba43cfa7c5fb6f268efe98f7720b</id>
<content type='text'>
Historically, the softraid crypto support in the boot loaders has only
given one attempt to provide the correct passphrase. There were a
few reasons for this, including the fact that pkcs5_pbkdf2() allows an
empty passphrase and that returning EPERM allowed for another attempt.

With the event of KARL and the need for bsd.booted with hibernate resumption,
this becomes much more of an issue - if you get the passphrase wrong you
fail to resume. There are also other situations like using /etc/boot.conf
to switch serial console, but an incorrect passphrase results in the config
not being read. Also, bcrypt_pbkdf() does not permit empty passphrases.

This reworks the softraid crypto support in the boot loaders so that it
loops requesting a valid passphrase until one is provided, or an empty
passphrase is entered (at which point it will abort).

ok mortimer@ tb@
</content>
</entry>
<entry>
<title>"unknown KDF type 2" -&gt; "keydisk not found".</title>
<updated>2017-11-10T16:50:59Z</updated>
<author>
<name>sunil</name>
<email>sunil@openbsd.org</email>
</author>
<published>2017-11-10T16:50:59Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=c5a202708cc86e06652bf6f5152bbc63c6d6fffb'/>
<id>urn:sha1:c5a202708cc86e06652bf6f5152bbc63c6d6fffb</id>
<content type='text'>
Inputs and ok jsing@.
</content>
</entry>
<entry>
<title>Add bcrypt pbkdf support to the softraid crypto boot loader code.</title>
<updated>2016-09-18T16:34:59Z</updated>
<author>
<name>jsing</name>
<email>jsing@openbsd.org</email>
</author>
<published>2016-09-18T16:34:59Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=df1890a2d2078c7e4514e8b74146e8390b916a92'/>
<id>urn:sha1:df1890a2d2078c7e4514e8b74146e8390b916a92</id>
<content type='text'>
Based on a diff from djm@
</content>
</entry>
<entry>
<title>Provide initial libsa softraid - this is currently just the data structures</title>
<updated>2016-09-11T17:49:36Z</updated>
<author>
<name>jsing</name>
<email>jsing@openbsd.org</email>
</author>
<published>2016-09-11T17:49:36Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=94e1d41593133729fe996c9476ea70a0cc82c399'/>
<id>urn:sha1:94e1d41593133729fe996c9476ea70a0cc82c399</id>
<content type='text'>
and softraid crypto key handling code.
</content>
</entry>
</feed>
