#
6699d7aa |
| 10-Feb-2022 |
robert <robert@openbsd.org> |
unveil _PATH_LOGIN_CONF_D
|
#
bc5a8259 |
| 12-Jul-2021 |
beck <beck@openbsd.org> |
Change the error reporting pattern throughout the tree when unveil fails to report the path that the failure occured on. Suggested by deraadt@ after some tech discussion.
Work done and verified by A
Change the error reporting pattern throughout the tree when unveil fails to report the path that the failure occured on. Suggested by deraadt@ after some tech discussion.
Work done and verified by Ashton Fagg <ashton@fagg.id.au>
ok deraadt@ semarie@ claudio@
show more ...
|
#
1d749625 |
| 14-Sep-2019 |
semarie <semarie@openbsd.org> |
correct some unveil(2) violations due to "login.conf.db" access (the .db version of "login.conf"), and stat(2) on _PATH_MASTERPASSWD_LOCK (via pw_mkdb(3)).
problem initially noted by myself for pass
correct some unveil(2) violations due to "login.conf.db" access (the .db version of "login.conf"), and stat(2) on _PATH_MASTERPASSWD_LOCK (via pw_mkdb(3)).
problem initially noted by myself for passwd(1) millert@ reported similar problem on chpass(1), su(1), doas(1) and encrypt(1) mestre@ noted chpass(1) too
ok mestre@ millert@
show more ...
|
#
feba4f1b |
| 03-Aug-2018 |
deraadt <deraadt@openbsd.org> |
The first unveil userland commit!
unveil _PATH_LOGIN_CONF (/etc/login.conf) which is used by login_getclass(3) and family before doing password encode. This is the only filename used by the program
The first unveil userland commit!
unveil _PATH_LOGIN_CONF (/etc/login.conf) which is used by login_getclass(3) and family before doing password encode. This is the only filename used by the program during runtime, everything else happens on stdin/stdout.
show more ...
|
#
f1094693 |
| 03-Aug-2018 |
deraadt <deraadt@openbsd.org> |
This does not need pledge "wpath"
|
#
e02741f9 |
| 24-May-2017 |
mestre <mestre@openbsd.org> |
Use freezero instead of explicit_bzero+free
OK tb@
|
#
3a7efd93 |
| 03-May-2017 |
mestre <mestre@openbsd.org> |
Use the safe idiom of cleaning sensitive data from memory with explicit_bzero, instead of relying on other methods, after readpassphrase. Some programs on this diff won't benefit that much since it h
Use the safe idiom of cleaning sensitive data from memory with explicit_bzero, instead of relying on other methods, after readpassphrase. Some programs on this diff won't benefit that much since it happens near the terminal path, but someone might copy the unsafe idiom to another program and place it where it may leak sensitive data.
Discussed aeons ago with tb@, OK deraadt@ and beck@
show more ...
|
#
f0b4c78b |
| 04-Sep-2016 |
tb <tb@openbsd.org> |
usage() is static and __dead; add prototype for print_passwd; return instead of exit from main
|
#
9ecde2d8 |
| 02-Sep-2016 |
tedu <tedu@openbsd.org> |
_PASSWORD_LEN is length that comes out of crypt(), not a meaningful length for user entered passwords. And the +1 is just superstitious nonsense inherited from getpass() guts. Switch to a pleasing fi
_PASSWORD_LEN is length that comes out of crypt(), not a meaningful length for user entered passwords. And the +1 is just superstitious nonsense inherited from getpass() guts. Switch to a pleasing fixed size of 1024. ok millert
show more ...
|
#
a18011af |
| 02-Sep-2016 |
tedu <tedu@openbsd.org> |
convert getpass to readpassphrase. from Dimitris Papastamos
|
#
a6252556 |
| 10-Oct-2015 |
doug <doug@openbsd.org> |
encrypt(1) also needs to pledge "wpath" for getpass().
getpass() opens /dev/tty RW so it can write the prompt.
ok deraadt@
|
#
57ae6891 |
| 10-Oct-2015 |
deraadt <deraadt@openbsd.org> |
pledge "stdio rpath tty". rpath for the configuration reading done by login* subsystem, tty for readpassphase() ok beck
|
#
231d8a0b |
| 26-Feb-2015 |
tedu <tedu@openbsd.org> |
Wrap a long line. Use explicit_bzero. Fix comment describing extra. From Andre Smagin Also, should be safe to print errno from newhash() now. ok millert
|
#
88a56c4f |
| 24-Feb-2015 |
tedu <tedu@openbsd.org> |
increase prefbuf size so that 'encrypt -b 000000000000000000000012' works. noticed by Andre Smagin. also check snprintf for overflow so we get better error messages if somebody decides to pad with ev
increase prefbuf size so that 'encrypt -b 000000000000000000000012' works. noticed by Andre Smagin. also check snprintf for overflow so we get better error messages if somebody decides to pad with even more zeroes, and avoid possible truncations.
show more ...
|
#
9a4f25e1 |
| 15-Jan-2015 |
chl <chl@openbsd.org> |
remove unused variable
ok tedu@
|
#
ea130701 |
| 05-Jan-2015 |
tedu <tedu@openbsd.org> |
encrypt can use the scrypt scaling code in libc now via crypt_newhash
|
#
260df0be |
| 04-Jan-2015 |
deraadt <deraadt@openbsd.org> |
fix -b a mode, spotted by rpe
|
#
5c20656f |
| 29-Dec-2014 |
tedu <tedu@openbsd.org> |
impose some limits on the ideal rounds so nothing too crazy happens when the clock results are weird
|
#
04b9d67f |
| 24-Dec-2014 |
tedu <tedu@openbsd.org> |
simplify. bcrypt only support and use newer libc APIs. no makekey emul. ok deraadt schwarze is a little sad to see the last 1/8 shared man page go, but we have a support program in place, called the
simplify. bcrypt only support and use newer libc APIs. no makekey emul. ok deraadt schwarze is a little sad to see the last 1/8 shared man page go, but we have a support program in place, called the attic.
show more ...
|
#
faae7280 |
| 03-Nov-2014 |
tedu <tedu@openbsd.org> |
hoist blowfish up and use bcrypt_newhash directly
|
#
9d7d50d1 |
| 03-Sep-2014 |
jmc <jmc@openbsd.org> |
remove -m from usage();
|
#
6d182795 |
| 03-Sep-2014 |
giovanni <giovanni@openbsd.org> |
kill md5 support, broken since May ok tedu@
|
#
43a6699f |
| 12-Nov-2013 |
deraadt <deraadt@openbsd.org> |
simpler prototype repairs
|
#
0eff2d95 |
| 23-May-2013 |
tedu <tedu@openbsd.org> |
allow auto scaling bcrypt rounds by CPU power. ok deraadt jmc sthen
|
#
da731e24 |
| 14-Jul-2007 |
krw <krw@openbsd.org> |
Don't trim whitespace from stdin. Encrypt it the same as other input sources. Feedback and fixes from ray@ and fgsch@.
ok millert@ (six years ago) ray@ fgsch@
|