Page MenuHomeFreeBSD

Remove support for keyed MD5 and SHA1 authentication hashes.
ClosedPublic

Authored by jhb on May 8 2020, 6:43 PM.
Tags
None
Referenced Files
Unknown Object (File)
Sun, Apr 7, 1:29 PM
Unknown Object (File)
Feb 23 2024, 4:37 AM
Unknown Object (File)
Feb 10 2024, 12:55 PM
Unknown Object (File)
Dec 27 2023, 10:19 PM
Unknown Object (File)
Dec 27 2023, 10:19 PM
Unknown Object (File)
Dec 27 2023, 10:19 PM
Unknown Object (File)
Dec 27 2023, 9:19 PM
Unknown Object (File)
Dec 20 2023, 5:11 AM
Subscribers

Details

Summary

They no longer have any in-tree consumers.

Test Plan
  • make tinderbox

Diff Detail

Repository
rS FreeBSD src repository - subversion
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

jhb requested review of this revision.May 8 2020, 6:43 PM
jhb created this revision.
cem added inline comments.
sys/opencrypto/cryptosoft.c
1343–1344 ↗(On Diff #71565)

Did Matt's zfree() get committed yet? It'd be a nice cleanup for this pattern.

This revision is now accepted and ready to land.May 9 2020, 3:23 PM
sys/opencrypto/cryptosoft.c
1343–1344 ↗(On Diff #71565)

Hmm, looks like it did.

There are many places in IPsec that don't use explicit_bzero either but use plain bzero. Many of those could likely use zfree() as well.