CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2019/08/12 21:18:38 Modified files: sys/dev/pci: pcidevs.h pcidevs_data.h Log message: regen
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2019/08/12 21:17:11 Modified files: sys/dev/pci: pcidevs Log message: add Union Memory NVMe
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2019/08/12 21:13:06 Modified files: sys/dev/pci/drm/include/drm: drm_drv.h sys/dev/pci/drm/amd/amdgpu: amdgpu_kms.c Log message: Don't match on amdgpu devices flagged as having experimental hardware support (AMD_EXP_HW_SUPPORT) in the amdgpu_pciidlist table. Prompted by a report from Charlie Burnett that display doesn't light up with a Radeon VII (VEGA20).
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: morti...@cvs.openbsd.org2019/08/12 17:43:03 Modified files: gnu/llvm/lib/CodeGen: LocalStackSlotAllocation.cpp Log message: Ensure stack protector slot access is resolved by PEI. On arm64, arm, and ppc it is possible that a large stack frame will cause the stack protector slot to be reallocated at the wrong end of the frame. Noticed by tj@. ok patrick@.
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: k...@cvs.openbsd.org2019/08/12 17:10:19 Modified files: . : events.html Log message: Add EuroBSDCon and vBSDCon to the future events along with the speaking developers and the titles of their talks. "Looks good" deraadt@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2019/08/12 15:29:43 Modified files: lib/libcrypto/man: CMS_add0_cert.3 Log message: some cleanup: * add missing STANDARDS section * avoid repetitions and jumping back and forth among functions * describe the difference between 0 and 1 more precisely and more concisely * mark up the ASN.1 type and field names
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2019/08/12 14:57:31 Modified files: usr.sbin/smtpd : smtpd.conf.5 Log message: Mark up no-verify with Cm; OK jmc@ gilles@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2019/08/12 14:56:23 Modified files: usr.sbin/smtpd : mail.lmtp.c Log message: Prepend a dot to every line that starts with a dot -- not merely the ones that consist of a single dot. OK gilles@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: r...@cvs.openbsd.org2019/08/12 14:32:39 Modified files: usr.sbin/ospfd : packet.c Log message: On broadcast and point-to-point interfaces only accept hello packets when the destination is 224.0.0.5 (AllSPFRouters). RFC 2328 sys in "9.5. Sending Hello packets" that hello packets are sent to the multicast address AllSPFRouters on broadcast and physical point-to-point networks. With this new check the test for AllDRouters is not needed anymore. ok benno@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: r...@cvs.openbsd.org2019/08/12 14:21:58 Modified files: usr.sbin/ospfd : hello.c Log message: Warn when a neighbor changes its source IP address. Either it is because of a planned change or something bad is happening in the network. ok benno@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2019/08/12 14:06:02 Modified files: sys/dev/fdt: axppmic.c Log message: Fix typo; spotted by Krystian Lewandowski.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2019/08/12 14:04:31 Modified files: sys/arch/arm64/stand/efiboot: efiboot.c Log message: Remove spurious newline. Spotted by patrick@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: mill...@cvs.openbsd.org 2019/08/12 14:03:28 Modified files: usr.bin/calendar: day.c Log message: In isnow(), always validate the value of the month variable before using it as an index into the cumdays[] array. Found with American Fuzzy Lop. Original diff by and OK fcambus@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2019/08/12 13:49:14 Modified files: share/man/man8 : starttls.8 Log message: instructions for replacing cert.pem are probably more harmful than helpful. noticed by freda_bundchen. ok gilles millert
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2019/08/12 13:17:35 Modified files: sys/arch/arm64/stand/efiboot: Makefile conf.c efiboot.c efiboot.h Log message: Make it possible to switch to framebuffer "glass" console in case it isn't the default already. ok patrick@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: js...@cvs.openbsd.org 2019/08/12 12:13:13 Modified files: lib/libcrypto/cms: cms_lib.c Log message: Provide a local version of X509_get0_subject_key_id() It seems that the CMS code is currently the only code in existence that uses this function.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: js...@cvs.openbsd.org 2019/08/12 12:04:57 Modified files: lib/libcrypto/cms: cms_pwri.c Log message: Inline the equivalent of ASN1_TYPE_unpack_sequence().
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: js...@cvs.openbsd.org 2019/08/12 12:03:17 Modified files: usr.sbin/rpki-client: Makefile main.c regress/usr.sbin/rpki-client: Makefile test-cert.c test-ip.c test-mft.c test-roa.c test-tal.c Log message: Stop pulling libssl into rpki-client. None of this code actually does TLS, hence libssl is not needed. Instead, pull in the correct headers and call the appropriate libcrypto initialisation functions (even this is only necessary to support OpenSSL prior to 1.1). While here also remove libssl/libcrypto initialisation/uninitialisation from main() - it should only be necessary in proc_parser(). ok deraadt@ job@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: be...@cvs.openbsd.org 2019/08/12 12:01:44 Modified files: usr.sbin/acme-client: chngproc.c Log message: Do not exit with error if the challenge file already exists, instead truncate it and write the challenge again. We can get asked to supply the same challenge multiple times. bug found and patch tested by jmc@ patch discussed with, mangled and okayed by florian@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2019/08/12 10:17:50 Modified files: lib/libcrypto/man: CMS_sign.3 Log message: correct a misspelled page name in an .Xr; it looks like this was the last bad .Xr in *CMS*(3)
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2019/08/12 10:00:05 Modified files: lib/libcrypto/man: SMIME_read_CMS.3 Log message: correct misspelled page name in an .Xr
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2019/08/12 09:34:42 Modified files: lib/libcrypto/man: CMS_decrypt.3 Log message: Fix .Xrs to non-existant pages by correcting the misspelled function names and documenting these two functions, CMS_decrypt_set1_pkey(3) and CMS_decrypt_set1_key(3) right here in this same page. While here, simplify and improve some wording.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/08/12 09:02:05 Modified files: usr.sbin/bgpd : control.c Log message: Reset the IdleHoldTime and the session error count when doing a admin command that clears or starts a neighbor. This way an admin reset does what people expect since it makes the session behave like a brand new one. OK job@ deraadt@ sthen@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2019/08/12 08:24:38 Added files: lib/libcrypto/man: CMS_ContentInfo_new.3 d2i_CMS_ContentInfo.3 Log message: These public functions are listed in the OpenSSL manuals but not actually documented, so write the documentation from scratch.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/08/12 08:15:27 Modified files: usr.sbin/bgpd : session.c Log message: Change the way IdleHoldTime is reset once the session is up and stable. The implemented reverse exponential backoff results in very long times until a session gets back to the initial hold values. Instead just wait for the timer to fire once and reset the settings then. In most cases the timer is double the IdleHold time (because of the way the backoff is implemented) which is enough to ensure that fast flapping sessions are punished. OK benno@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/08/12 07:28:15 Modified files: etc: changelist Log message: Add the rpki TAL files to the changelist including arin.tal (which is not shipeed by default). OK job@ sthen@ deraadt@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/08/12 05:54:32 Modified files: usr.bin/vmstat : vmstat.c Log message: Add the CP_SPIN time to the sum of system time reported. OK kettenis@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2019/08/12 05:36:12 Modified files: lib/libcrypto/man: PEM_read_bio_PrivateKey.3 Log message: merge a few minor improvements from the OpenSSL 1.1.1 branch, which is still under a free license: * mention pem_password_cb in NAME and SYNOPSIS * recommend -1 as pem_password_cb error return for OpenSSL compat * minor improvements to the pass_cb() example code * mention that the pass phrase is just a byte sequence * and minor wording and markup improvements
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2019/08/12 03:56:47 Modified files: sys/dev: ipmi.c ipmivar.h Log message: Remlve command mutex. It is unnecessary since commands are already serialized by the use of a taskq and it prevents sendmsg/endmsg from being able to sleep. This hurts when implementing SSIF since some i2c controllers sleep while waiting for transactions on the i2c bus to complete. ok jmatthew@, deraadt@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/08/12 03:49:21 Modified files: etc: Makefile Log message: There is no reason why the TAL files are installed only readable by root these are public files. Agreed by deraadt@ (and florian@)
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: an...@cvs.openbsd.org 2019/08/12 02:19:09 Modified files: sys/kern : init_sysent.c syscalls.c sys/sys: syscall.h syscallargs.h Log message: regen
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: an...@cvs.openbsd.org 2019/08/12 02:17:05 Modified files: sys/kern : syscalls.master vfs_vnops.c Log message: Unlock lseek(2) since the file offset is MP-safe by now. Calling VOP_GETATTR() must still be serialized using the kernel lock since the underlying file system implementation is not MP-safe. no objection from deraadt@ and ok mpi@ visa@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: to...@cvs.openbsd.org 2019/08/12 01:40:45 Modified files: sbin/iked : iked.h ikev2.c ikev2_msg.c ikev2_pld.c policy.c Log message: Prepend SPI to send and recv log messages to see which line belongs to which SA. Use IKE specific terms peer and local instead of to and from. ok reyk@ patrick@