#
e9e666f7 |
|
03-Nov-2023 |
Elyes Haouas <ehaouas@noos.fr> |
keyserv: Remove return statement at the end of void functions Signed-off-by: Elyes Haouas <ehaouas@noos.fr>
|
#
eba230af |
|
25-Sep-2023 |
John Baldwin <jhb@FreeBSD.org> |
Purge more stray embedded $FreeBSD$ strings These do not use __FBSDID but instead use bare char arrays. Reviewed by: imp, emaste Differential Revision: https://reviews.freebsd.org/D41957
|
#
35a624c5 |
|
18-Apr-2023 |
John Baldwin <jhb@FreeBSD.org> |
keyserv: Use C89 function definitions. Also use more accurate function pointer types, and trim some duplicate (but incomplete) function prototypes. Reviewed by: zlei Differential Revision: https://reviews.freebsd.org/D39533
|
#
d5b9e63c |
|
30-May-2016 |
Pedro F. Giffuni <pfg@FreeBSD.org> |
keyserv(1): drop useless comparison. Comparing a character array against NULL serves no purpose. In any case we are always asigning a value just before using the value so obviate the comparison altogether. Reviewed by: ngie Differential Revision: https://reviews.freebsd.org/D6651 CID: 1008422
|
#
740885817 |
|
17-Dec-2011 |
Dimitry Andric <dim@FreeBSD.org> |
In usr.sbin/keyserv, fix some implicit enum conversions, and use the correct printf length modifiers for uid_t. MFC after: 1 week
|
#
a7d5f7eb |
|
19-Oct-2010 |
Jamie Gritton <jamie@FreeBSD.org> |
A new jail(8) with a configuration file, to replace the work currently done by /etc/rc.d/jail.
|
#
fe0506d7 |
|
09-Mar-2010 |
Marcel Moolenaar <marcel@FreeBSD.org> |
Create the altix project branch. The altix project will add support for the SGI Altix 350 to FreeBSD/ia64. The hardware used for porting is a two-module system, consisting of a base compute module and a CPU expansion module. SGI's NUMAFlex architecture can be an excellent platform to test CPU affinity and NUMA-aware features in FreeBSD.
|
#
d7f03759 |
|
19-Oct-2008 |
Ulf Lilleengen <lulf@FreeBSD.org> |
- Import the HEAD csup code which is the basis for the cvsmode work.
|
#
66422f5b |
|
16-Sep-2002 |
Peter Wemm <peter@FreeBSD.org> |
Initiate deorbit burn for the i386-only a.out related support. Moves are under way to move the remnants of the a.out toolchain to ports. As the comment in src/Makefile said, this stuff is deprecated and one should not expect this to remain beyond 4.0-REL. It has already lasted WAY beyond that. Notable exceptions: gcc - I have not touched the a.out generation stuff there. ldd/ldconfig - still have some code to interface with a.out rtld. old as/ld/etc - I have not removed these yet, pending their move to ports. some includes - necessary for ldd/ldconfig for now. Tested on: i386 (extensively), alpha
|
#
2421887c |
|
09-Jul-2002 |
Juli Mallett <jmallett@FreeBSD.org> |
Use libcrypto.so.2 instead of .1, since we have it now. It should enable DES for keyserv again. Submitted by: mbr Kill a stray __P while I'm here.
|
#
7309915e |
|
24-Jun-2001 |
Dima Dorfman <dd@FreeBSD.org> |
Nuke unused variables.
|
#
512182f3 |
|
24-Feb-2000 |
Mark Murray <markm@FreeBSD.org> |
Use libcrypto instead of libdes.
|
#
97d92980 |
|
27-Aug-1999 |
Peter Wemm <peter@FreeBSD.org> |
$Id$ -> $FreeBSD$
|
#
4b692ba7 |
|
15-Sep-1998 |
Bill Paul <wpaul@FreeBSD.org> |
Apply patch from Stefan Esser to close PR #7941: add code to handle dynamic loading of libdes on ELF systems. The patch looks correct to me.
|
#
ecdf56e7 |
|
23-Sep-1997 |
Philippe Charnier <charnier@FreeBSD.org> |
Use err(3). Put includes in alphabetical order. Rewrote man page in mdoc format. Document -v and -p flags.
|
#
80a53c98 |
|
17-Jun-1997 |
Bill Paul <wpaul@FreeBSD.org> |
Work around a bug (deficiency?) in the libdes Secure RPC compat interface. The way Secure RPC is set up, the ecb_crypt() routine is expected to be able to encrypt a buffer of any size up to 8192 bytes. However, the des_ecb_encrypt() routine in libdes only encrypts 8 bytes (64 bits) at a time. The rpc_enc.c module should compensate for this by calling des_ecb_encrypt() repeatedly until it has encrypted the entire supplied buffer, but it does not do this. As a workaround, keyserv now handles this itself: if we're using DES encryption, and the caller requested ECB mode, keyserv will do the right thing. Also changed all references to 'rc4' into 'arcfour' just in case some litigious bastard from RSA is watching. Note that I discovered and fixed this problem while trying to get a part of NIS+ working: rpc.nisd signs directory objects with a 16-byte MD5 digest that is encrypted with ecb_crypt(). Previously, only the first 8 bytes of the digest were being properly encrypted, which caused the Sun nis_cachemgr to reject the signatures as invalid. I failed to notice this before since Secure RPC usually never has to encrypt more than 8 bytes of data during normal operations.
|
#
51251b2b |
|
28-May-1997 |
Bill Paul <wpaul@FreeBSD.org> |
Import of the keyserv daemon needed for Secure RPC. This version supports both the keyserv v1 and v2 protocols. It uses the new AF_LOCAL transport so that only local processes can use it for storing/retrieving keys, and it uses the SCM_CREDS kernel hack for authentication. With these two modifications, we don't need the keyenvoy program normally used with RPC 4.0. Note that if libdes.so.3.x is present on the system when keyserv is started, Secure RPC will run with normal DES encryption. If not, everything falls back to RC4 with a 40 bit key.
|