1
0
mirror of https://github.com/openbsd/src.git synced 2024-12-21 23:18:00 -08:00
Commit Graph

237195 Commits

Author SHA1 Message Date
jsg
55710df9c0 drm/amd/display: Don't refer to dc_sink in is_dsc_need_re_compute
From Wayne Lin
c7e65cab54a89f4df54110f0b44c4ade93d1a911 in linux-6.6.y/6.6.64
fcf6a49d79923a234844b8efe830a61f3f0584e4 in mainline linux
2024-12-10 02:21:31 +00:00
jsg
2afa3ebb4d drm/amd/display: Check null-initialized variables
From Alex Hung
c3a3b6d9a9383e3c1a4a08878ba5046e68647595 in linux-6.6.y/6.6.64
367cd9ceba1933b63bc1d87d967baf6d9fd241d2 in mainline linux
2024-12-10 02:18:57 +00:00
jsg
b4814eda15 drm/amd/display: Initialize denominators' default to 1
From Alex Hung
9f35cec5e4b9759b38c663d18eae4eaf30f36527 in linux-6.6.y/6.6.64
b995c0a6de6c74656a0c39cd57a0626351b13e3c in mainline linux
2024-12-10 02:15:48 +00:00
jsg
2e83af39b6 drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func
From Srinivasan Shanmugam
f38b09ba6a335c511eb27920bb9bb4a1b2c20084 in linux-6.6.y/6.6.64
28574b08c70e56d34d6f6379326a860b96749051 in mainline linux
2024-12-10 02:13:13 +00:00
jsg
26f32bf0db drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict
From Hans de Goede
82d0f099009e4446c87407c41abeae2a4ff0b6ad in linux-6.6.y/6.6.64
052ef642bd6c108a24f375f9ad174b97b425a50b in mainline linux
2024-12-10 02:10:59 +00:00
kirill
12880d00f8 sys/uvideo: skip uvideo_vs_set_alt for bulk endpoint
Section 2.4.3 of the UVC 1.5 class specification states that the bulk
endpoint only supports the alternative setting of zero, which is the
default stream, and which is switched at uvideo_attach_hook.

Inside uvideo_vs_close, the code uses the same switch to the alternative
setting of zero to turn off the cam LED.

The additional uvideo_vs_set_alt inside uvideo_vs_open turns off the cam
LED in the case of the bulk endpoint cam. I see this behavior on both
available bulk endpoint cams: it flashes the LED flashes after ffplay
starts, and looks like it was turned off.

OK mglocker@ kn@
2024-12-09 23:21:26 +00:00
deraadt
cead3da4df sync 2024-12-09 12:49:15 +00:00
schwarze
33885c3251 Mark four "struct *_st" types declared in evp.h as intentionally undocumented
because they are intended as internal, and applications are supposed to use
the documented aliases DH, DSA, EC_KEY, and RSA from ossl_typ.h instead.
2024-12-09 12:45:21 +00:00
schwarze
9fcb7baee2 Mark four EVP_PKEY_GOST* constants as intentionally undocumented
because they are completely unused by anything.
2024-12-09 12:30:23 +00:00
florian
407e22462b Implement RESINFO (RFC 9606)
This is more or less a copy of txt_16.c.

OK caspar
2024-12-09 12:24:01 +00:00
schwarze
6b76ac2e55 Mark two symbols as intentionally undocumented
that are obsolete after PBE was mostly removed from LibreSSL.
2024-12-09 12:18:38 +00:00
schwarze
f0955a9c84 insert a forgotten .Dv macro 2024-12-09 11:55:52 +00:00
schwarze
1b6b588e81 Mark four EVP control constants as intentionally undocumented
that are only used for GOST.
2024-12-09 11:41:44 +00:00
jmc
49f9fe9c73 increaded -> increased 2024-12-09 11:38:38 +00:00
schwarze
4594425fa5 Mark the constants EVP_PK_*, EVP_PKS_*, and EVP_PKT_* as intentionally
undocumented because they are only used by the function X509_certificate_type()
which is deprecated and will eventually be deleted.
2024-12-09 11:25:25 +00:00
claudio
03bc5c0e77 Extend maxattr regress to also check RFC8654 extended messages. 2024-12-09 10:53:54 +00:00
claudio
82293aeb2b Bits for the new extended message capability (RFC8654).
OK tb@
2024-12-09 10:52:27 +00:00
claudio
25cbba3a33 Add support for extended messages (RFC8654)
This extends the maximum message size of BGP from 4096 to 65535.

This mostly follows rfc8654 with the following differences:
- NOTIFICATIONS are always truncated to fit in 4096 bytes.
- There is no message reduction using "attribute discard" in case of overflow.
- Large messages are only sent if both sides announced extended message support.
OK tb@
2024-12-09 10:51:46 +00:00
schwarze
aea0cfdd31 Mark EVP_CTRL constants for RC5 as intentionally undocumented
because LibreSSL does not support RC5 and because these constants
are almost unused in the wild.
2024-12-09 10:50:43 +00:00
patrick
eb49c7f084 Further alignment with ath12k, including addition of bank profiles,
removal of shadow timer, cookie configuration, updates to WMI and
start of updates for buffer handling.  This brings us forward:

qwz0: wcn7850 hw2.0 fw 0x100301e1 address xx:xx:xx:xx:xx:xx
qwz_dp_htt_htc_t2h_msg_handler: htt event 48 not handled
2024-12-09 09:35:33 +00:00
patrick
ca79b5ce33 Fix regdb firmware load. So far the code placed the board data as the
regdb, which the firmware did not like.  This adjusts the way we load
and cache FW, and places the right data for the chip.  This allows the
WLAN FW to boot up properly.
2024-12-09 04:46:11 +00:00
patrick
09a673e5e2 Minor cleanup of qwx(4) supported chips, some renaming. 2024-12-09 04:43:15 +00:00
schwarze
380ecedd40 Move the algorithm-specific functions EVP_rc2_*(3) out of EVP_EncryptInit(3)
and document them properly in their own manual page, including the control
commands EVP_CTRL_SET_RC2_KEY_BITS and EVP_CTRL_GET_RC2_KEY_BITS that were
so far undocumented.

Arguably, the main benefit is another small step making the important,
but still obese EVP_EncryptInit(3) manual page more palatable.
2024-12-08 17:41:23 +00:00
patrick
7afc621a64 Implement two-level (indirect) Device Table support to increase the
range of DeviceIDs we can set up for translation.

Peripherals capable of doing DMA/MSIs are supposed to show up with
unique DeviceIDs.  The Device Table maps the DeviceID to a Interrupt
Translation Table.  So far we only used a single contiguous block for
the Device Table, but on some machines this does not cover the whole
range of physical devices.  Using the GIC's indirect mode allows to
move to a two-level setup to increase the range.

ok kettenis@
2024-12-07 21:12:22 +00:00
kettenis
18d3f3c5c3 MSIs don't work on the Qualcomm X1E machines in ACPI. So prevent
agintcmsi(4) from attaching in this case such that an upcoming change
to make it work (with DTB) on this hardware doesn't break the initial
install.

ok patrick@
2024-12-07 20:48:32 +00:00
schwarze
60c3061599 Document the low-level rc2.h API.
Not that this would be particularly important, but i had to look
at the code anyway while completing the EVP documentation.
2024-12-07 19:22:15 +00:00
kirill
33d389b584 sys/uvideo: add missed usbd_get_xfer_status
Without usbd_get_xfer_status the code is built on the assumption that
usbd_transfer always reads dwMaxPayloadTransferSize bytes from a device.
If this assumption doesn't hold, it produces broken frames which has
unexpected zeros.

OK mglocker@ kn@
2024-12-07 17:23:27 +00:00
tb
4ccb460550 ec_mult: forgot to make one helper static 2024-12-07 13:49:43 +00:00
tb
08f8d31902 Move initialization of sign out of the middle of bits handling 2024-12-07 13:32:07 +00:00
djm
84a2368111 replace bespoke logging of MaxSessions enforcement with new ratelimited
logging infrastructure.

Add ratelimits to logging of connections dropped by PerSourcePenalties

ok dtucker
2024-12-07 10:12:19 +00:00
djm
cc7fda5dc1 add infrastructure for ratelimited logging; feedback/ok dtucker 2024-12-07 10:05:36 +00:00
tb
28676b808b sync 2024-12-07 02:00:25 +00:00
yasuoka
f02897e8bf Embed scope-id when sending NA. Also, do it when the link state is up
because the routing entry to the mutlicast address is not ready yet
when the carp becomes master.

ok florian
2024-12-07 01:14:45 +00:00
djm
e6fc4d34cb use glob(3) wildcards in AuthorizedKeys/PrincipalsFile tests to
exercise this feature; ok dtucker
2024-12-06 16:25:58 +00:00
djm
747ebedabb allow glob(3) patterns for sshd_config AuthorizedKeysFile and
AuthorizedPrincipalsFile directives; bz2755 ok dtucker
2024-12-06 16:24:27 +00:00
djm
5b6bbb3d58 support VersionAddendum in the client, mirroring the option of
the same name in the server; bz2745 ok dtucker@
2024-12-06 16:21:48 +00:00
djm
581c1d79a7 clarify encoding of options/extensions; bz2389 2024-12-06 16:02:12 +00:00
tb
9d4c47a84d Rename ec_wNAF_mul() to ec_wnaf_mul()
discussed with jsing
2024-12-06 15:49:37 +00:00
tb
2380456e4c ec_mult: manage wNAF data in a struct
This refactors the wNAF multiplication further and introduces a small API
that manages the wNAF digits for bn and the multiples of digit * point in
a single struct that is initialized and freed in two API calls in the main
function, ec_wNAF_mul(). This way the main algorithm is no longer cluttered
with logic to keep various arrays in sync, helper functions calculating the
wNAF splitting of bn and multiples of the point do not need to deal with
memory management, and a pair of accessors obviates previously missing
bounds checking.

At this point we have reached a relatively clean and straightforward wNAF
implementation that fits precisely the purpose needed in libcrypto, i.e.,
ECDSA verification instead of being generalized and optimized to the max
for no good reason apart from endowing the author with an academic degree.

Popper's famous maxim "if you can't say it clearly, keep quiet, and keep
working until you can" very much applies to code as well. In other words,
shut up and hack (and don't pour too much energy into commit messages, tb).

ok jsing
2024-12-06 15:39:59 +00:00
djm
976a9bf1e5 ignore SIGPIPE here; some downstreams have had this for years... 2024-12-06 15:17:15 +00:00
djm
31527a040c sync -o option lists with ssh.1; requested jmc@ 2024-12-06 15:12:56 +00:00
schwarze
3f6360fc06 Adjust the return type and value of EVP_MD_CTX_init(3)
and EVP_CIPHER_CTX_init(3) after tb@ changed these to OpenSSL 1.1 semantics
in evp.h rev. 1.124 on March 2 this year.
2024-12-06 15:01:01 +00:00
schwarze
f1c41952de Delete the manual pages EVP_PKEY_meth_new(3) and EVP_PKEY_meth_get0_info(3)
because tb@ deleted almost all functions documented there from the API
in evp.h 1.127 on March 2 this year, but move the functions
EVP_PKEY_CTX_set_data(3) and EVP_PKEY_CTX_get_data(3) that we still
support to EVP_PKEY_keygen(3), because that page already documents
EVP_PKEY_CTX_set_app_data(3) and EVP_PKEY_CTX_get_app_data(3).
2024-12-06 14:27:49 +00:00
schwarze
cb0afab4d7 Delete the manual page EVP_PKEY_check(3).
All three functions documented in this page were deleted from the API
by tb@ in evp.h rev. 1.136 on August 31 this year.
2024-12-06 13:10:43 +00:00
schwarze
957fef74ea Delete the manual page EVP_PKEY_asn1_new(3).
All the functions documented in this page were deleted from the API
by tb@ in evp.h rev. 1.126 on March 2 this year.
2024-12-06 12:51:13 +00:00
jsing
90c5a28a23 Provide a SHA-1 assembly implementation for amd64 using SHA-NI.
This provides a SHA-1 assembly implementation for amd64, which uses
the Intel SHA Extensions (aka SHA New Instructions or SHA-NI). This
provides a 2-2.5x performance gain on some Intel CPUs and many AMD CPUs.

ok tb@
2024-12-06 11:57:17 +00:00
schwarze
0afdf00682 Explain what "EVP" is supposed to mean.
It's so non-obvious that even i had to do some research to find out.
Source: The file "doc/ssleay.doc" from SSLeay 0.8.1b,
see for example OpenSSL commit d02b48c6 on Dec 21, 1998.
2024-12-06 11:56:21 +00:00
djm
eb7387f660 implement attestation verification for ED25519 keys 2024-12-06 10:37:42 +00:00
nicm
95980d0818 Preserve modifiers on backspace. 2024-12-06 09:07:40 +00:00
nicm
a1f482fe91 Do not write bracketed paste keys themselves if the pane has not asked
for them.
2024-12-06 09:06:56 +00:00