Page MenuHomeFreeBSD

Remove support for keyed MD5 and SHA1 authentication hashes.
ClosedPublic

Authored by jhb on May 8 2020, 6:43 PM.
Tags
None
Referenced Files
Unknown Object (File)
Nov 29 2025, 9:04 AM
Unknown Object (File)
Nov 20 2025, 11:45 PM
Unknown Object (File)
Nov 20 2025, 11:42 PM
Unknown Object (File)
Nov 20 2025, 11:41 PM
Unknown Object (File)
Nov 20 2025, 11:25 PM
Unknown Object (File)
Nov 18 2025, 10:44 PM
Unknown Object (File)
Nov 6 2025, 1:55 PM
Unknown Object (File)
Nov 4 2025, 11:35 PM
Subscribers

Details

Summary

They no longer have any in-tree consumers.

Test Plan
  • make tinderbox

Diff Detail

Repository
rS FreeBSD src repository - subversion
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

jhb requested review of this revision.May 8 2020, 6:43 PM
jhb created this revision.
cem added inline comments.
sys/opencrypto/cryptosoft.c
1343–1344 ↗(On Diff #71565)

Did Matt's zfree() get committed yet? It'd be a nice cleanup for this pattern.

This revision is now accepted and ready to land.May 9 2020, 3:23 PM
sys/opencrypto/cryptosoft.c
1343–1344 ↗(On Diff #71565)

Hmm, looks like it did.

There are many places in IPsec that don't use explicit_bzero either but use plain bzero. Many of those could likely use zfree() as well.