Commit Graph

301746 Commits

Author SHA1 Message Date
rin 8fcaa3fb5f nc(1): Declare and initialize ``on'' ifdef SO_BINDANY. NFC yet for us. 2023-06-20 08:51:24 +00:00
rin 3827b167b3 ``int i'' is used only for SUPPORT_NFS || SUPPORT_TFTP. 2023-06-20 07:46:03 +00:00
mrg 6913120ff0 re-fix the previous - i had only fixed one case, not the general one.
guard the .BEGIN: rule with:

   .if !make(clean) && !make(cleandir) && !make(distclean) && !make(obj)

so that it doesn't trigger in cases where we don't expect the objdir
to exist already, or we don't want to be adding things while we're
cleaning them out.
2023-06-20 07:17:11 +00:00
mrg 1a2bd47ea1 don't try to setup things in objdir before it exists. 2023-06-20 05:06:04 +00:00
nat 816dd7c3bd Manual page fixups.
Fix EXAMPLES section.

Use correct flags when used with pad(4).
Use correct encoding format (sinear_le).

XXX pullup-10.
2023-06-20 03:24:08 +00:00
mrg 32f4e6acb7 update for fontconfig 2.14.2. 2023-06-20 02:25:19 +00:00
gutteridge 8960a02553 npflog.4: add a man page for the npflog device
Addresses PR misc/57441 from Taylor R Campbell. (Not yet hooked into
source sets, will be done separately.)

(Borrows heavily from the equivalent pflog.4 man page already in tree,
and so retains the original copyright attribution as well.)
2023-06-20 01:02:46 +00:00
mrg 02952e8c1c XXX stop gap to fix the builds in a way that doesn't make them useless.
it does build "ui.c" a large number of times into individual places.
in the libraries, they're force to local symbols, and in the binaries
it doesn't really matter.
2023-06-20 00:30:16 +00:00
mrg a4ccfd02eb fix missing header issues.
might seems to have an undef symbol issue in libkrb5.so:
hc_UI_UTIL_read_pw_string
2023-06-19 23:56:55 +00:00
christos e2a3a913a6 Adjust the build to include ui.c from hcrypto. 2023-06-19 23:11:43 +00:00
christos 3120d7d64c need the hcrypto/ui.h header for UI_UTIL_read_pw_string/UI_UTIL_FLAG_VERIFY* 2023-06-19 23:10:48 +00:00
christos 342b5ab386 new Heimdal 2023-06-19 21:44:37 +00:00
christos afab4e300d Merge differences between 7.7.0 and 7.8.0 2023-06-19 21:41:38 +00:00
christos dd75ac5b44 Import heimdal-7.8.0 (previous was 7.7.0)
This release includes both the Heimdal 7.7.1 Security Vulnerability
fixes and non-Security bug fixes/improvements.

Security Vulnerabilities:
- CVE-2022-42898 PAC parse integer overflows
- CVE-2022-3437 Overflows and non-constant time leaks in DES{,3} and arcfour
- CVE-2022-41916 Fix Unicode normalization read of 1 bytes past end of array
- CVE-2021-44758 A null pointer de-reference DoS in SPNEGO acceptors
- CVE-2021-3671 A null pointer de-reference when handling missing sname
  in TGS-REQ
- CVE-2022-44640 Heimdal KDC: invalid free in ASN.1 codec
  Note that CVE-2022-44640 is a severe vulnerability, possibly a 10.0
  on the Common Vulnerability Scoring System (CVSS) v3, as we believe
  it should be possible to get an RCE on a KDC, which means that
  credentials can be compromised that can be used to impersonate
  anyone in a realm or forest of realms.

  Heimdal's ASN.1 compiler generates code that allows specially
  crafted DER encodings of CHOICEs to invoke the wrong free function
  on the decoded structure upon decode error. This is known to impact
  the Heimdal KDC, leading to an invalid free() of an address partly
  or wholly under the control of the attacker, in turn leading to a
  potential remote code execution (RCE) vulnerability.

  This error affects the DER codec for all extensible CHOICE types
  used in Heimdal, though not all cases will be exploitable. We have
  not completed a thorough analysis of all the Heimdal components
  affected, thus the Kerberos client, the X.509 library, and other
  parts, may be affected as well.

  This bug has been in Heimdal's ASN.1 compiler since 2005, but it may
  only affect Heimdal 1.6 and up. It was first reported by Douglas
  Bagnall, though it had been found independently by the Heimdal
  maintainers via fuzzing a few weeks earlier.

  While no zero-day exploit is known, such an exploit will likely be
  available soon after public disclosure.
- CVE-2019-14870: Validate client attributes in protocol-transition
- CVE-2019-14870: Apply forwardable policy in protocol-transition
- CVE-2019-14870: Always lookup impersonate client in DB

Other changes:
- Bugs found by UBSAN (including the incorrect encoding of unconstrained
  INTEGER value -1).
- Errors found by the LLVM scan-build static analyzer.
- Errors found by the valgrind memory debugger.
- Work around GCC Bug 95189 (memcmp wrongly stripped like strcmp).
- Correct ASN.1 OID typo for SHA-384
- Fix a deadlock in in the MEMORY ccache type.
- TGS: strip forwardable and proxiable flags if the server is
  disallowed.
- CVE-2019-14870: Validate client attributes in protocol-transition
- CVE-2019-14870: Apply forwardable policy in protocol-transition
- CVE-2019-14870: Always lookup impersonate client in DB
- Incremental HDB propagation improvements
  Refactor send_diffs making it progressive
  Handle partial writes on non-blocking sockets
  Disable Nagle in iprop master and slave
  Use async I/O
  Don't send I_HAVE in response to AYT
  Do not recover log in kadm5_get_principal()
  Don't send diffs to slaves with not yet known version
  Don't stutter in send_diffs
- Optional backwards-compatible anon-pkinit behavior
2023-06-19 21:33:04 +00:00
rillig 12c71db15f tests/make: test triple negation in '.ifndef' 2023-06-19 20:44:06 +00:00
rillig 2c31888746 make: sort files in coverage report alphabetically 2023-06-19 20:14:45 +00:00
rillig f015d63135 make: add tests for full code coverage of multiple-inclusion guards 2023-06-19 20:07:35 +00:00
rillig 9bda8c7f54 make: clean up code for skipping files with multiple-inclusion guard
No functional change.
2023-06-19 17:30:56 +00:00
sjg 527fafef92 Test that .undef of readOnly variable fails 2023-06-19 15:37:48 +00:00
rillig 389a96d8da make: if a makefile is protected by a guard, only include it once
"looks reasonable" sjg@
2023-06-19 12:53:57 +00:00
rillig 69d93118ce tests/lint: comma operators are not allowed in constant expressions 2023-06-19 12:33:43 +00:00
msaitoh 4e7cd69809 Fix typo. unknwon -> unknown 2023-06-19 08:40:29 +00:00
mrg 0bab990a32 updates for xf86-video-ati 22.0.0. 2023-06-19 08:32:39 +00:00
knakahara 8d5cb09c67 Repair test coverage. I revert by proxy as the committer seems too busy to even reply mail.
TODO:
Provide some way for small machines to run subset test so that they get
shorter run time at the expense of test coverage.
2023-06-19 08:28:09 +00:00
msaitoh 305f6951ac Fix typo in the document. From FreeBSD. 2023-06-19 08:24:21 +00:00
msaitoh 56145654c2 s/value value/value/ in comment. No functional change. 2023-06-19 08:23:35 +00:00
mrg db82de2e4a use xorg-pkg-ver.mk to get PACKAGE_STRING defined. 2023-06-19 07:40:59 +00:00
mrg 85bead47ff transform XFILESEARCHPATHDEFAULT in the pkg-config file. 2023-06-19 07:21:17 +00:00
rin 262edfae4a whitespace -> tab, blank line, no binary changes. 2023-06-19 04:30:27 +00:00
nisimura a4ea86e72d unbreak the previous change. 2023-06-19 03:52:50 +00:00
rin e500184dfa Cherry-pick upstream fix for LibreSSL. NFC for us at the moment.
883630f76c

 Don't define BIO_get_init() for LibreSSL 3.5+

 BIO_get_init() is available in LibreSSL 3.5 and later. The BIO type
 will become opaque, so the existing macro will break the build.
2023-06-19 03:21:14 +00:00
rin 0517e95fd0 Silence wrong maybe-uninitialized raised by GCC/x86_64 10.4.0 -Os. 2023-06-19 03:03:11 +00:00
rillig 567c8efbdb strspn: fix typo in comment 2023-06-18 22:18:13 +00:00
rillig 199bee0a0b tests/make: clean up test for multiple-inclusion guards 2023-06-18 20:43:52 +00:00
rillig d82fc76045 tests/make: align variable name in test for multiple-inclusion guards 2023-06-18 19:30:31 +00:00
rillig 8f928ced6c tests/make: extend test for multiple-inclusion guards 2023-06-18 19:16:51 +00:00
gutteridge c18fdfe09e ixp425-fw.README: fix spelling: s/Cypto/Crypto/ 2023-06-18 19:08:18 +00:00
riastradh 6a95326040 sysctl(7): Note nodev,nosuid requirement for user-mounted fs.
While here, tidy up language and markup a smidge.
2023-06-18 18:16:40 +00:00
rillig c4d462617d indent: only add blank lines before actual block comments 2023-06-18 07:32:33 +00:00
rillig 62ff1c97a7 indent: test block comments and the -bbb option 2023-06-18 07:29:36 +00:00
rillig 926f8bd544 indent: remove support for backspace in code and comments
The C code in the whole tree does not contain a single literal
backspace.
2023-06-18 07:10:24 +00:00
rillig 5af61aec35 indent: untangle code for handling the statement indentation
The expression 'psyms.level-- - 2' did too much in a single line, so
extract the '--' to a separate statement, to highlight the symmetry
between the 'sym' and 'ind_level' code.

No functional change.
2023-06-18 06:56:32 +00:00
rillig 519ec34df3 indent: clean up
Extract duplicate code for handling line continuations.

Prevent theoretic undefined behavior in strspn, as inp.s is not
null-terminated.

Remove adding extra space characters when processing comments, as these
are not necessary to force a line of output.

No functional change.
2023-06-17 23:03:20 +00:00
rillig 8e0980dcd7 indent: miscellaneous cleanups
No binary change.
2023-06-17 22:28:49 +00:00
rillig 65e3242c1e tests/indent: add miscellaneous test cases found during clean up 2023-06-17 22:09:24 +00:00
christos 85e497af98 Include the OpenSSL Makefile fragment so that build_install works on each
OpenSSL subdirectory.
2023-06-17 15:47:31 +00:00
christos 4ff621cc11 Split the SUBDIR variable into a separate Makefile so it can be used
by /usr/src/lib/Makefile
2023-06-17 15:45:51 +00:00
rin 96159ac76f Fix typo... 2023-06-17 12:09:36 +00:00
rin 2cdcef7194 Rework microcode for IXP425 npe(4).
Instead of using objcopy(1), which cannot handle EABI version
embedded in e_flags of ELF header, add a dedicated asm file.

If proprietary microcode binary is present, it is incbin'ed
from that asm file.
2023-06-17 11:57:49 +00:00
rin 1316e0ed2b Relocate FFS_NO_SNAPSHOT to where it should be... 2023-06-17 11:41:11 +00:00