CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2013/02/15 01:28:08 Modified files: usr.sbin/lpr/lpr: lpr.c Log message: Add missing break, reported by Jared S. Candelaria.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2013/02/15 01:37:09 Modified files: sys/dev/ic : pckbc.c Log message: Do not loop forever if the keyboard send a BAT (Basic Assurance Test) fault code, but handle this code like ``Resend'' or ``BAT success'' instead. Fix a problem reported by Kent Fritz and analyzed by stsp@. ok shadchin@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2013/02/15 01:49:51 Modified files: sys/dev/ic : pckbc.c Log message: More DPRINTF use, no object change.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: ratc...@cvs.openbsd.org 2013/02/15 03:20:07 Modified files: sys/dev/pckbc : pckbd.c Log message: backout latest: audio keys can autorepeat. Autorepeated keys are not decoded by the wskbd layer, thus autorepeted audio keys end-up passed to userland in raw mode (ie to X), resulting in keyboard input corruption. Noticed (and debugged) by halex@, thanks.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: jas...@cvs.openbsd.org 2013/02/15 03:50:32 Modified files: lib/libssl/src/crypto/bn: Tag: OPENBSD_5_2 bn_word.c Log message: Fix a buffer overflow in BN_add_word which would occur when certain values are added to a single word bignum. from markus@ ok djm@
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: st...@cvs.openbsd.org 2013/02/15 04:36:50 Modified files: . : 53.html Log message: - no more Arla (from Arto Jonsson) - baby jumbos for vr / sis
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2013/02/15 05:15:12 Modified files: usr.sbin/relayd: relay_http.c Log message: Fix the toread check in the lateconnect case. This allows Content-Length: 0 in HTTP GET request when a request filter is used. This was broken by my previous commit. OK reyk@ benno@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: ratc...@cvs.openbsd.org 2013/02/15 07:26:24 Modified files: sys/dev/pci: envy.c Log message: Use uvm_km_kmemalloc_pla() to allocate dma memory below 2^28 limit, allowing ice1712-based cards to work on amd64. With help from kettenis@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2013/02/15 07:40:04 Modified files: sbin/dhclient : dhclient.c Log message: Unbreak DISCOVER by initializing xid from correct field.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2013/02/15 07:54:04 Modified files: sbin/dhclient : dhclient.c Log message: Even if no one uses it, record the seconds since we started in the correct field.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2013/02/15 08:00:17 Modified files: sbin/dhclient : dhclient.c Log message: Make code a tad less obscure by using sizeof() actual variable being zeroed, rather than some other variable that may be the same type.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: flor...@cvs.openbsd.org 2013/02/15 08:12:25 Modified files: usr.bin/mg : buffer.c Log message: cleanup undo history in revert-buffer problem spotted, initial diff and ok lum@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: es...@cvs.openbsd.org 2013/02/15 11:34:25 Modified files: usr.bin/make : var.c Log message: turns out if a line ends with a $, the var module will run off the cliff while expanding it. shows up very prominently with MALLOC_OPTIONS=S Problem found by jasper@ okay'd by jasper@ and kind-of duh'd by miod@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2013/02/15 12:52:38 Modified files: sbin/dhclient : dhclient.c Log message: Take more care to use the correct xid, rather than packet garbage. ok beck@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: guent...@cvs.openbsd.org2013/02/15 15:01:24 Modified files: lib/librthread : tcb.h rthread.c Log message: Revert previous diff: sparc and sparc64 don't set the TCB to NULL in exec, yet, and vax doesn't support symbols that are both weak and undefined (yet?). sparc issue diagnosed by kettenis@, vax problem found by todd@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: e...@cvs.openbsd.org2013/02/15 15:43:21 Modified files: usr.sbin/smtpd : mta_session.c smtpd.conf.5 smtpd.h to.c Log message: add missing bits for lmtp support (from Ashish SHUKLA). ok gilles@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2013/02/15 15:58:17 Modified files: sys/arch/sparc64/sparc64: machdep.c Log message: We deprecated returning to %g7 after a successful system call long ago. These days we use it as a thread register and want to have it initialized to zero for future thread local storage (TLS) support.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2013/02/15 23:08:45 Modified files: regress/usr.bin/ssh: integrity.sh Log message: make sure the fuzz offset is actually past the end of KEX for all KEX types. diffie-hellman-group-exchange-sha256 requires an offset around 2700. Noticed via test failures in portable OpenSSH on platforms that lack ECC and this the more byte-frugal ECDH KEX algorithms.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: ajacou...@cvs.openbsd.org 2013/02/16 00:13:03 Modified files: etc: services Log message: Add 106/tcp (pop3pw/poppasswd) to the unofficial services list. ok sthen@ deraadt@
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: es...@cvs.openbsd.org 2013/02/16 00:19:18 Modified files: . : 53.html Log message: document make and dpb rather large changes.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: ajacou...@cvs.openbsd.org 2013/02/16 00:25:54 Modified files: usr.sbin/user : user.c Log message: Fix unlocking on 32bits arch where it would fuck up the shell... Do not try to (un)lock system users; people wanting to do so (???) will know what they do and use vipw(8). unlocking issue reported by Andre Stobe on tech@ cluesticks and ok miod@, ok deraadt@