summaryrefslogtreecommitdiffstats
path: root/usr.bin/diff/diff.h (unfollow)
Commit message (Collapse)AuthorFilesLines
2020-02-07syncderaadt2-1/+27
2020-02-07sync the description of the $SSH_SK_PROVIDER environment variable withdjm2-6/+10
that of the SecurityKeyProvider ssh/sshd_config(5) directive, as the latter was more descriptive.
2020-02-07Add ssh -Q key-sig for all key and signature types. Teach ssh -Q to acceptdtucker4-17/+34
ssh_config(5) and sshd_config(5) algorithm keywords as an alias for the corresponding query. Man page help jmc@, ok djm@.
2020-02-07fix two PIN entry bugs on FIDO keygen: 1) it would allow more than thedjm1-6/+12
intended number of prompts (3) and 2) it would SEGV too many incorrect PINs were entered; based on patch by Gabriel Kihlman
2020-02-07Remove backward compatibility for obsolete -H flag.millert1-14/+5
The -H flag was deprecated in 1998. OK jung@
2020-02-07update to upstream libfido2 780ad3c25 (20120123)djm63-1063/+1800
install manual pages crank major feedback & ok jmc@ and naddy@
2020-02-06When using HostkeyAlgorithms to merely append or remove algorithmsdjm1-15/+26
from the default set (i.e. HostkeyAlgorithms=+/-...), retain the default behaviour of preferring those algorithms that have existing keys in known_hosts; ok markus
2020-02-06expand HostkeyAlgorithms prior to config dump, matching otherdjm1-3/+15
algorithm lists; ok markus@
2020-02-06Add Include to the list of permitted keywords after a Match keyword.naddy1-2/+3
ok markus@
2020-02-06Replace "security key" with "authenticator" in program messages.naddy8-39/+40
This replaces "security key" in error/usage/verbose messages and distinguishes between "authenticator" and "authenticator-hosted key". ok djm@
2020-02-06Try to reduce the lying, hyperbolic or obsolete commentary onkrw1-26/+12
the relationships between various scsi structs.
2020-02-06Make sure that -l always causes -w to be ignored, as documentedschwarze1-3/+14
in the man(1) manual page. This bugfix is needed to prevent the command "man -lw" from dereferencing a NULL pointer.
2020-02-06Remove pointless intermediate scsi_adapter field of softc by pointingkrw2-7/+3
sc_link.adapter at trm_switch directly.
2020-02-06Delete unused scsi_adapter fields of softc's.krw2-5/+3
2020-02-06Re-enable the TLSv1.3 client since the known issues have been addressed.jsing1-3/+1
ok tb@
2020-02-06Eliminate use of 'migration aids' #define scsipi_<blah> and just usekrw3-20/+13
the real names.
2020-02-06Add a workaround to make SSL_set_session() work with TLSv1.3.jsing1-1/+9
While we do not currently do session resumption, just return the TLS_client_method() or TLS_server_method() when asked for a method that does TLSv1.3. ok tb@ (who also arrived at the same diff)
2020-02-06Soooooo much eye-searing trailing whitespace.krw1-196/+196
2020-02-06So much eye-searing trailing whitespace.krw1-12/+12
2020-02-06Whitespace tweak.krw2-6/+4
2020-02-06Add support for handling hello retry requests in the TLSv1.3 client.jsing1-5/+100
In the case of a hello retry request, we need to replace the client hello with a synthetic handshake message, switch key share to that selected by the server, build and send a new client hello, then process the resulting server hello. ok tb@
2020-02-06Correctly handle key share extensions in a hello retry request.jsing2-4/+11
In a hello retry request the server will only send the selected group and not actually provide a key exchange. In this case we need to store the server selected group for further processing. ok tb@
2020-02-06mention cbor fido llvm and llvm-c top level include directoriesjsg1-2/+11
2020-02-06Instead of opting in to futexes on archs with atomics opt out on archsjsg2-18/+12
without atomics, a smaller list. ok mpi@ visa@
2020-02-05Ooops. Missed a file in nuke of scsi_minphys. mpath_minphys() needs tokrw1-2/+3
check dev_minphys for NULL before calling it.
2020-02-05Reset the key share so that we do not have an existing peer public key.jsing1-1/+7
2020-02-05Refactor the server hello processing code in the TLSv1.3 client.jsing2-22/+46
Use flags to signal the need to switch to the legacy client and to identify a hello retry request. This allows the caller to take appropriate action, rather than trying to do this in the parsing/processing code. Split the key deriviation and record protection engagement code into a separate function, both for readability and reuse. Change handshake states outside of the processing code. ok tb@
2020-02-05Move kernel locking inside knote_fdclose() from finishdup() andvisa2-15/+8
fdrelease(). This makes the upper layer of file descriptor closing free of KERNEL_LOCK() when the process does not use kqueue. The kernel locking around fdremove() and knote_fdclose() is no longer needed because kqueue_register() checks if there has been a race with file descriptor close. Moreover, the locking became ineffective against these races when filterops callbacks were allowed to sleep. OK anton@, mpi@
2020-02-05Remove the hello retry request processing code that was previously added.jsing2-65/+16
This got added to the wrong functions (server side, not client) - swap the now unimplemented send/recv functions between client and server. ok tb@
2020-02-05Provide tls1_transcript_unfreeze() to avoid the need for manual flagsjsing2-3/+10
mangling. ok tb@
2020-02-05Pull the handshake message transcript code into its own function.jsing2-7/+14
This is soon going to be used in the TLSv1.3 client code. ok tb@
2020-02-05Nuke unnecessary abstraction 'scsi_minphys()' which just callskrw29-77/+66
'minphys()'. Just use & check for NULL instead, since 'minphys()' is always called on the code path ([cd|sd|st]minphys) that calls physio().
2020-02-05Very old firmware umsm devices don't work as umb(4), so I made them workderaadt1-2/+1
as umsm(4). But the discrimination in the driver match functions is obviously weak in some way, so skip this for now. We need to figure out how to identify the retrogrades better.
2020-02-05regenpatrick2-2/+12
2020-02-05Add some more Apollo Lake PCI IDs.patrick1-1/+3
2020-02-05Fix confusion between minimum and maximum samples-per-frame.ratchov1-2/+2
This may fix rare stuttering caused by underruns in case device clock drifts with respect to the bus clock.
2020-02-05Make list-keys description clearer in tmux.1 and remove an unused variable.nicm2-23/+23
2020-02-05More precision regarding the openlog(3) *ident argument;schwarze1-21/+61
direction suggested by Laurence Tratt <laurie at tratt dot net>, part of the wording from deraadt@. While here, add the missing STANDARDS section, correct HISTORY, drop redundant verbiage from RETURN VALUES, and garbage collect .Tn. OK sthen@ jmc@ millert@ and Laurence Tratt, and deraadt@ likes one line of the patch in particular.
2020-02-05regenpatrick2-2/+22
2020-02-05Add some more Apollo Lake PCI IDs.patrick1-1/+5
2020-02-05Mention AUDIO_MIXER_{DEVINFO,READ,WRITE} in the "audio" sectionratchov1-3/+6
2020-02-05Allow programs with the "audio" promise to use the AUDIO_MIXER_xxx ioctls.ratchov1-1/+4
ok semarie, deraadt
2020-02-05regenpatrick2-2/+7
2020-02-05Add Pericom PI7C9X2G404EL PCIe Packet Switchpatrick1-1/+2
2020-02-05Detach timeouts and the softint handler before freeing memory.mpi1-5/+5
As more and more teardown functions include barriers, or any kind of context change, it is unsafe to continue to assume that such code paths are atomic. So a good practise is to only free descriptor when we're sure that no other context can access them. Found while looking at visa@'s ttkqflush() replacement diff. The same pattern is present in many USB drivers as found with Peter Stuge. ok visa@
2020-02-05regenpatrick2-0/+155
2020-02-05Add some more Gemini Lake IDs.patrick1-1/+32
from James Hastings
2020-02-05Remove dead store, from Amit Kulkarni.mpi1-2/+1
2020-02-05Replace atoi with strtonum for stricter and safer integer parsing.florian1-9/+15
-N ndots: 0, INT_MAX The upper limit is a bit silly, everything bigger than a small number will force domain names to be interpretet as relative. -R retries INT_MIN, INT_MAX - 1 Specifically documented to accept negative numbers. -W wait 0, INT_MAX One could interpret the documentation as meaning that it accepts negative numbers but that failes later on with an error message from the timer code.. with deraadt, OK kn, input & OK tedu
2020-02-05Rework tls13_legacy_handshake_message_{recv,sent}_cb() to usetb3-16/+22
their own CBS as a preparation for upcoming HRR diffs. ok jsing