Page MenuHomeFreeBSD

Remove support for keyed MD5 and SHA1 authentication hashes.
ClosedPublic

Authored by jhb on May 8 2020, 6:43 PM.
Tags
None
Referenced Files
Unknown Object (File)
Thu, Jan 30, 3:34 PM
Unknown Object (File)
Dec 13 2024, 4:29 AM
Unknown Object (File)
Dec 8 2024, 9:37 AM
Unknown Object (File)
Dec 3 2024, 5:26 AM
Unknown Object (File)
Nov 27 2024, 1:47 PM
Unknown Object (File)
Sep 23 2024, 1:17 AM
Unknown Object (File)
Sep 21 2024, 4:47 AM
Unknown Object (File)
Sep 20 2024, 2:04 PM
Subscribers

Details

Summary

They no longer have any in-tree consumers.

Test Plan
  • make tinderbox

Diff Detail

Repository
rS FreeBSD src repository - subversion
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

jhb requested review of this revision.May 8 2020, 6:43 PM
jhb created this revision.
cem added inline comments.
sys/opencrypto/cryptosoft.c
1343–1344 ↗(On Diff #71565)

Did Matt's zfree() get committed yet? It'd be a nice cleanup for this pattern.

This revision is now accepted and ready to land.May 9 2020, 3:23 PM
sys/opencrypto/cryptosoft.c
1343–1344 ↗(On Diff #71565)

Hmm, looks like it did.

There are many places in IPsec that don't use explicit_bzero either but use plain bzero. Many of those could likely use zfree() as well.