253730 Commits

Author SHA1 Message Date
sevan
0759fcfcfc With the new version of OpenSSH, SSHv1 is no longer supported server-side.
Along with that rsa1 type keys are no longer supported.
Don't try to generate such keys on new systems.

ok christos
2017-10-07 21:41:51 +00:00
christos
96a83291ba remove recallocarray 2017-10-07 21:15:48 +00:00
christos
26b9f775ff define recallocarray locally. 2017-10-07 21:14:59 +00:00
jmcneill
14b75e9c23 add axp22x and pcf8563rtc 2017-10-07 20:32:20 +00:00
jmcneill
0030161a28 add direct config support 2017-10-07 20:31:48 +00:00
jmcneill
b4e8deecae Add FDT support 2017-10-07 20:18:16 +00:00
jmcneill
e12a7b5c37 Initialize TWI clock rate to 100kHz 2017-10-07 20:17:38 +00:00
jdolecek
46f3d27a6d adapt for NCQ branch merge too 2017-10-07 20:02:07 +00:00
jdolecek
ffc46dc0fe adapt the rest of wdc attachments for NCQ branch merge 2017-10-07 19:58:53 +00:00
jdolecek
166f05f2db adapt several more wdc attachments for NCQ branch merge 2017-10-07 19:52:11 +00:00
christos
3edb31c698 bump libssh 2017-10-07 19:44:22 +00:00
christos
04abe9db65 new openssh 2017-10-07 19:43:27 +00:00
jmcneill
dbb9a751a6 Support snps,reset-gpio property and deassert optional stmmaceth reset. 2017-10-07 19:42:45 +00:00
jmcneill
8b237f9d40 add dma and codec gates 2017-10-07 19:41:51 +00:00
christos
7a183406d0 merge conflicts. 2017-10-07 19:39:19 +00:00
christos
b7ac88e3e2 add recallocarray 2017-10-07 19:38:35 +00:00
christos
345c694682 add recallocarray (used by openssh-7.6) 2017-10-07 19:38:09 +00:00
christos
9340b371cb Potentially-incompatible changes
================================

This release includes a number of changes that may affect existing
configurations:

 * ssh(1): delete SSH protocol version 1 support, associated
   configuration options and documentation.

 * ssh(1)/sshd(8): remove support for the hmac-ripemd160 MAC.

 * ssh(1)/sshd(8): remove support for the arcfour, blowfish and CAST
   ciphers.

 * Refuse RSA keys <1024 bits in length and improve reporting for keys
   that do not meet this requirement.

 * ssh(1): do not offer CBC ciphers by default.

Changes since OpenSSH 7.5
=========================

This is primarily a bugfix release. It also contains substantial
internal refactoring.

Security
--------

 * sftp-server(8): in read-only mode, sftp-server was incorrectly
   permitting creation of zero-length files. Reported by Michal
   Zalewski.

New Features
------------

 * ssh(1): add RemoteCommand option to specify a command in the ssh
   config file instead of giving it on the client's command line. This
   allows the configuration file to specify the command that will be
   executed on the remote host.

 * sshd(8): add ExposeAuthInfo option that enables writing details of
   the authentication methods used (including public keys where
   applicable) to a file that is exposed via a $SSH_USER_AUTH
   environment variable in the subsequent session.

 * ssh(1): add support for reverse dynamic forwarding. In this mode,
   ssh will act as a SOCKS4/5 proxy and forward connections
   to destinations requested by the remote SOCKS client. This mode
   is requested using extended syntax for the -R and RemoteForward
   options and, because it is implemented solely at the client,
   does not require the server be updated to be supported.

 * sshd(8): allow LogLevel directive in sshd_config Match blocks;
   bz#2717

 * ssh-keygen(1): allow inclusion of arbitrary string or flag
   certificate extensions and critical options.

 * ssh-keygen(1): allow ssh-keygen to use a key held in ssh-agent as
   a CA when signing certificates. bz#2377

 * ssh(1)/sshd(8): allow IPQoS=none in ssh/sshd to not set an explicit
   ToS/DSCP value and just use the operating system default.

 * ssh-add(1): added -q option to make ssh-add quiet on success.

 * ssh(1): expand the StrictHostKeyChecking option with two new
   settings. The first "accept-new" will automatically accept
   hitherto-unseen keys but will refuse connections for changed or
   invalid hostkeys. This is a safer subset of the current behaviour
   of StrictHostKeyChecking=no. The second setting "off", is a synonym
   for the current behaviour of StrictHostKeyChecking=no: accept new
   host keys, and continue connection for hosts with incorrect
   hostkeys. A future release will change the meaning of
   StrictHostKeyChecking=no to the behaviour of "accept-new". bz#2400

 * ssh(1): add SyslogFacility option to ssh(1) matching the equivalent
   option in sshd(8). bz#2705

Bugfixes
--------

 * ssh(1): use HostKeyAlias if specified instead of hostname for
   matching host certificate principal names; bz#2728

 * sftp(1): implement sorting for globbed ls; bz#2649

 * ssh(1): add a user@host prefix to client's "Permission denied"
   messages, useful in particular when using "stacked" connections
   (e.g. ssh -J) where it's not clear which host is denying. bz#2720

 * ssh(1): accept unknown EXT_INFO extension values that contain \0
   characters. These are legal, but would previously cause fatal
   connection errors if received.

 * ssh(1)/sshd(8): repair compression statistics printed at
   connection exit

 * sftp(1): print '?' instead of incorrect link count (that the
   protocol doesn't provide) for remote listings. bz#2710

 * ssh(1): return failure rather than fatal() for more cases during
   session multiplexing negotiations. Causes the session to fall back
   to a non-mux connection if they occur. bz#2707

 * ssh(1): mention that the server may send debug messages to explain
   public key authentication problems under some circumstances; bz#2709

 * Translate OpenSSL error codes to better report incorrect passphrase
   errors when loading private keys; bz#2699

 * sshd(8): adjust compatibility patterns for WinSCP to correctly
   identify versions that implement only the legacy DH group exchange
   scheme. bz#2748

 * ssh(1): print the "Killed by signal 1" message only at LogLevel
   verbose so that it is not shown at the default level; prevents it
   from appearing during ssh -J and equivalent ProxyCommand configs.
   bz#1906, bz#2744

 * ssh-keygen(1): when generating all hostkeys (ssh-keygen -A), clobber
   existing keys if they exist but are zero length. zero-length keys
   could previously be made if ssh-keygen failed or was interrupted part
   way through generating them. bz#2561

 * ssh(1): fix pledge(2) violation in the escape sequence "~&" used to
   place the current session in the background.

 * ssh-keyscan(1): avoid double-close() on file descriptors; bz#2734

 * sshd(8): avoid reliance on shared use of pointers shared between
   monitor and child sshd processes. bz#2704

 * sshd_config(8): document available AuthenticationMethods; bz#2453

 * ssh(1): avoid truncation in some login prompts; bz#2768

 * sshd(8): Fix various compilations failures, inc bz#2767

 * ssh(1): make "--" before the hostname terminate argument processing
   after the hostname too.

 * ssh-keygen(1): switch from aes256-cbc to aes256-ctr for encrypting
   new-style private keys. Fixes problems related to private key
   handling for no-OpenSSL builds. bz#2754

 * ssh(1): warn and do not attempt to use keys when the public and
   private halves do not match. bz#2737

 * sftp(1): don't print verbose error message when ssh disconnects
   from under sftp. bz#2750

 * sshd(8): fix keepalive scheduling problem: activity on a forwarded
   port from preventing the keepalive from being sent; bz#2756

 * sshd(8): when started without root privileges, don't require the
   privilege separation user or path to exist. Makes running the
   regression tests easier without touching the filesystem.

 * Make integrity.sh regression tests more robust against timeouts.
   bz#2658

 * ssh(1)/sshd(8): correctness fix for channels implementation: accept
   channel IDs greater than 0x7FFFFFFF.

Portability
-----------

 * sshd(9): drop two more privileges in the Solaris sandbox:
   PRIV_DAX_ACCESS and PRIV_SYS_IB_INFO; bz#2723

 * sshd(8): expose list of completed authentication methods to PAM
   via the SSH_AUTH_INFO_0 PAM environment variable. bz#2408

 * ssh(1)/sshd(8): fix several problems in the tun/tap forwarding code,
   mostly to do with host/network byte order confusion. bz#2735

 * Add --with-cflags-after and --with-ldflags-after configure flags to
   allow setting CFLAGS/LDFLAGS after configure has completed. These
   are useful for setting sanitiser/fuzzing options that may interfere
   with configure's operation.

 * sshd(8): avoid Linux seccomp violations on ppc64le over the
   socketcall syscall.

 * Fix use of ldns when using ldns-config; bz#2697

 * configure: set cache variables when cross-compiling. The cross-
   compiling fallback message was saying it assumed the test passed,
   but it wasn't actually set the cache variables and this would
   cause later tests to fail.

 * Add clang libFuzzer harnesses for public key parsing and signature
   verification.
2017-10-07 19:36:11 +00:00
ryo
9f03e9b6d3 fix to compile without USE_PAM. (unused variables) 2017-10-07 19:23:02 +00:00
jmcneill
99c1e0e778 add axp20xreg 2017-10-07 18:22:23 +00:00
jmcneill
774ffdd63d Hook axp20x into fdt regulator api 2017-10-07 18:22:06 +00:00
jdolecek
8342fe3404 note NCQ support for ahcisata(4), mvsata(4), and siisata(4), and note enabled
ATAPI support for mvsata(4)
2017-10-07 17:42:43 +00:00
jdolecek
88a83e3f3e update to note NCQ support 2017-10-07 17:35:48 +00:00
kre
6618a9bf1f If we have SYSVMSG in kernel (test finds it) restore the signal handler
to its previous state, so any signals that occur during the rest of the
test gat handled just as they would (core dump) as if the handler was never
executed.   No need to bother if the SYSVMSG test fails, as in that case,
nothing else will be done anyway.
2017-10-07 17:15:44 +00:00
jmcneill
8864ea80d3 Add sun7i RTC support. 2017-10-07 17:03:49 +00:00
jmcneill
9f3abf7128 Add sun4i watchdog support. 2017-10-07 16:44:24 +00:00
jdolecek
26cf68556f Merge support for SATA NCQ (Native Command Queueing) from jdolecek-ncq branch
ATA subsystem was changed to support several outstanding commands, and use
NCQ xfers if supported by both the controller and the disk, including NCQ
error recovery. Set NCQ high priority for BPRIO_TIMECRITICAL xfers
if supported. Added FUA support.

Done some work towards MP-safe, all ATA code tsleep()/wakeup() replaced
by condvars, and switched most code from spl* to mutexes (separate
wd(4) and ata channel lock).

Introduced new option WD_CHAOS_MONKEY to facilitate testing of error
handling, fixed several uncovered issues. Also fixed several problems
with kernel dump to wd(4) disk.

Tested with ahcisata(4), mvsata(4), siisata(4), piixide(4) on amd64,
with and without port multiplier, both disk and ATAPI devices; other
drivers and archs mechanically adjusted and compile-tested. NCQ is
supported for ahcisata(4) and siisata(4) for any controller, for
mvsata(4) only Gen IIe ones for now. Also enabled ATAPI support in
mvsata(4).

Thanks to Matt Thomas for initial ATA infrastructure patch, and
Jonathan A.Kollasch for siisata(4) NCQ changes and general testing.

Also fixes PR kern/43169 (wd(4)); and PR kern/11811, PR kern/47041,
PR kern/51979 (kernel dump)
2017-10-07 16:05:31 +00:00
jmcneill
cebde97042 add ahcisata 2017-10-07 15:13:00 +00:00
jmcneill
ccbe7c4317 Add A10/A20 SATA support 2017-10-07 15:12:35 +00:00
roy
7e267d29cd Note import of dhcpcd-7.0.0-rc3 2017-10-07 14:16:34 +00:00
roy
3c389f9623 Remove mistakenly commited debug. 2017-10-07 14:14:40 +00:00
jmcneill
a2fff69b46 match allwinner,sun7i-a20-codec 2017-10-07 14:11:11 +00:00
roy
ec1306698f dhcpcd no longer needs hmac_md5.c 2017-10-07 14:11:07 +00:00
roy
d8819cfad2 Import dhcpcd-7.0.0-rc3 with the following noteable changes:
*  Fixed handling RA's from multiple routers
  *  Fixed changing to a better route based on gateway
  *  IPv6 default route is now deleted when config is not persistent
  *  Use hmac(3) if available in libc to reduce binary size

Fixes PR bin/52554
2017-10-07 14:05:36 +00:00
jmcneill
df2b6b3c70 add sunxigmacclk, awge, and rlphy 2017-10-07 13:29:28 +00:00
jmcneill
6c2b6ecfb0 Add support for sun6i/sun7i ethernet 2017-10-07 13:28:59 +00:00
jmcneill
ebb3c3a1c0 Add mmc sample and output phase clocks 2017-10-07 12:22:29 +00:00
jmcneill
7edc20883b Fix maximum xfer length for sun7i-a20 compatible controllers 2017-10-07 12:21:53 +00:00
maxv
d37438c8bb Bump bootloader version, support for booting KASLR amd64 kernels. 2017-10-07 10:32:56 +00:00
maxv
a8d8f69c27 Add a new option in libsa, to load dynamic binaries. A separate function
is used, and it does not break in any way the generic static loader. Then,
add a new "pkboot" command in the x86 bootloader, which boots a
GENERIC_KASLR kernel via the prekern. (See thread on tech-kern@.)
2017-10-07 10:26:38 +00:00
maxv
650b1fa4d5 Add GENERIC_KASLR, only toolchain parts for now. 2017-10-07 10:16:47 +00:00
kre
5067e4eb0f Actually bump lib versions, to match bump in sets files. 2017-10-07 00:06:11 +00:00
jmcneill
c32c97266b Add sun4i (A10) and sun7i (A20) USB PHY support 2017-10-06 22:25:05 +00:00
jmcneill
0b20af2a4c add A10 and A20 support 2017-10-06 21:21:22 +00:00
jmcneill
671537be4d Add sun4i (A10) and sun7i (A20) GPIO support. 2017-10-06 21:20:59 +00:00
jmcneill
cd50aa8726 add platform support for allwinner,sun4i-a10 and allwinner,sun7i-a20 2017-10-06 21:12:23 +00:00
kre
bd208c6933 Three fixes and a change to ~ expansions
1. A serious bug introduced 3 1/2 months ago (approx) (rev 1.116) which
   broke all but the simple cases of ~ expansions is fixed (amazingly,
   given the magnitude of this problem, no-one noticed!)

2. An ancient bug (probably from when ~ expansion was first addedin 1994, and
   certainly is in NetBSD-6 vintage shells) where ${UnSeT:-~} (and similar)
   does not expand the ~ is fixed (note that ${UnSeT:-~/} does expand,
   this should give a clue to the cause of the problem.

3. A fix/change to make the effects of ~ expansions on ${UnSeT:=whatever}
   identical to those in UnSeT=whatever   In particular, with HOME=/foo
   ${UnSeT:=~:~} now assigns, and expands to, /foo:/foo rather than ~:~
   just as VAR=~:~ assigns /foo:/foo to VAR.   Note this is even after the
   previous fix (ie: appending a '/' would not change the results here.)

   It is hard to call this one a bug fix for certain (though I believe it is)
   as many other shells also produce different results for the ${V:=...}
   expansions than  they do for V=... (though not all the same as we did).

   POSIX is not clear about this, expanding ~ after : in VAR=whatever
   assignments is clear, whether ${U:=whatever} assignments should be
   treated the same way is not stated, one way or the other.

4. Change to make ':' terminate the user name in a ~ expansion in all cases,
   not only in assignments.   This makes sense, as ':' is one character that
   cannot occur in user names, no matter how otherwise weird they become.
   bash (incl in posix mode) ksh93 and bosh all act this way, whereas most
   other shells (and POSIX) do not.   Because this is clearly an extension
   to POSIX, do this one only when not in posix mode (not set -o posix).
2017-10-06 21:09:45 +00:00
jmcneill
6dec99e3f1 Add driver for sun4i (A10) and sun7i (A20) clock controller. 2017-10-06 21:09:21 +00:00
christos
d98cfd15e6 bump libglapi, libGL libGLU because of the libstdc++ dual abi bump 2017-10-06 20:26:51 +00:00
christos
ebbd68dbd4 bump c++ libraries because of the libstdc++ dual abi bump 2017-10-06 20:24:46 +00:00