CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: matth...@cvs.openbsd.org2021/09/14 23:49:43 Modified files: faq: current.html Log message: libdmx removal
CVS: cvs.openbsd.org: xenocara
CVSROOT:/cvs Module name:xenocara Changes by: matth...@cvs.openbsd.org2021/09/14 23:48:04 Modified files: app/xdpyinfo : Makefile.bsd-wrapper Log message: oops typo
CVS: cvs.openbsd.org: xenocara
CVSROOT:/cvs Module name:xenocara Changes by: matth...@cvs.openbsd.org2021/09/14 23:46:34 Modified files: app/xdpyinfo : Makefile.bsd-wrapper Log message: Explicitely disable dmx support
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: an...@cvs.openbsd.org 2021/09/14 22:59:26 Modified files: share/man/man4 : uhid.4 Log message: Improve the uhid(4) manual: * Include the relevant header in the synopsis * Document all supported ioctl commands * Emphasis that a pointer is required to all ioctl commands * Make the write(2) semantics a bit clearer * Add files section * Document errors ok jmc@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: an...@cvs.openbsd.org 2021/09/14 22:57:47 Modified files: sys/dev/usb: uhid.c Log message: Change the errno to ENOTTY when encountering an unknown ioctl command as opposed of using EINVAL which is ambiguous in this context. ok deraadt@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: inogu...@cvs.openbsd.org2021/09/14 17:07:18 Modified files: lib/libssl : ssl.h Log message: Avoid typedef redefinition "typedef struct ssl_st SSL;" is defined in ossl_typ.h. This reverts part of r1.204. ok tb@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: dera...@cvs.openbsd.org 2021/09/14 13:12:12 Modified files: distrib/sets/lists/comp: mi Log message: sync
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: be...@cvs.openbsd.org 2021/09/14 11:56:25 Added files: . : 70.html Log message: provide some boilerplate for the press
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2021/09/14 10:37:20 Modified files: usr.sbin/acme-client: http.c usr.sbin/ocspcheck: http.c Log message: Add missing void to definition of http_init(). ok deraadt florian
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2021/09/14 10:21:21 Modified files: sys/arch/riscv64/riscv64: pmap.c Log message: Cleanup some style issues and remove some unused code. In particular, remove the half-finished code to support the SV48 MMU page table layout. Currently there is no hardware that supports that model and I don't expect any hardware that does support it to show up anytime soon. ok mlarkin@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2021/09/14 10:18:57 Modified files: sys/arch/arm64/arm64: pmap.c Log message: Cleanup some style issues. ok mlarkin@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2021/09/14 10:16:51 Modified files: sys/arch/hppa/hppa: pmap.c Log message: Make pmap_extract() mpsafe by grabbing the kernel lock for userland pmaps while walking the page tables. ok deraadt@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2021/09/14 10:14:50 Modified files: sys/arch/amd64/amd64: pmap.c Log message: Make pmap_extract() mpsafe by grabbing the kernel lock for userland pmaps while walking the page tables. ok mpi@, deraadt@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2021/09/14 08:35:09 Modified files: lib/libssl : tls13_internal.h Log message: zap trailing white space
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2021/09/14 08:31:21 Modified files: lib/libssl : tls13_legacy.c tls13_internal.h Log message: Call the info cb on connect/accept exit in TLSv1.3 The p5-Net-SSLeay test expects the info callback to be called on connect exit. This is the behavior in the legacy stack but wasn't implemented in the TLSv1.3 stack. With this commit, p5-Net-SSLeay tests are happy again after the bump. ok bluhm inoguchi jsing
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2021/09/14 08:30:57 Modified files: lib/libssl/man : Makefile Added files: lib/libssl/man : SSL_set_psk_use_session_callback.3 Log message: provide a small manual page for the SSL_set_psk_use_session_callback(3) stub, written from scratch; OK tb@ on SSL_set_psk_use_session_callback.3
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: st...@cvs.openbsd.org 2021/09/14 08:09:21 Modified files: distrib/sets/lists/man: mi distrib/sets/lists/base: mi Log message: /usr/bin/timeout should not be in man sets
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2021/09/14 08:08:15 Modified files: lib/libssl/man : SSL_SESSION_new.3 Makefile Added files: lib/libssl/man : SSL_SESSION_is_resumable.3 Log message: Merge the stub SSL_SESSION_is_resumable(3) manual page from the OpenSSL 1.1.1 branch, which is still under a free license. A few tweaks to wording and structure by me. OK tb@ on SSL_SESSION_is_resumable.3
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2021/09/14 07:48:00 Modified files: lib/libcrypto/man: EC_GROUP_copy.3 Log message: As suggested by tb@, merge the description of OPENSSL_EC_NAMED_CURVE and OPENSSL_EC_EXPLICIT_CURVE from OpenSSL commit 146ca72c Feb 19 14:35:43 2015 + after tb@ changed the default from 0 to OPENSSL_EC_NAMED_CURVE in ec/ec_lib.c rev. 1.41, which is the same default that OpenSSL uses since 1.1.0. While merging, drop the description of the pre-1.1.0 behaviour. It seems irrelevant to me because tb@ found no application in Debian codesearch using OPENSSL_EC_EXPLICIT_CURVE. A former devious default that was probably never relied upon by anyone does not need to be documented.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2021/09/14 06:04:34 Modified files: distrib/sets/lists/comp: md.riscv64 Log message: Sync
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2021/09/14 06:03:49 Modified files: sys/arch/riscv64/riscv64: machdep.c Added files: sys/arch/riscv64/include: sysarch.h Log message: Provide instruction cache invalidation through sysarch(RISCV_ICACHE_SYNC) Modelled after the arm implementation. The first consumer would be __builtin___clear_cache() in libcompiler_rt. Input from kettenis@ and deraadt@, ok kettenis@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2021/09/14 05:38:45 Modified files: usr.sbin/rpki-client: rrdp_notification.c Log message: Do not download more than 300 deltas to sync a RRDP repo. Somewhere around 300 the time it takes to fetch and process all the deltas is higher than fetching just a snapshot. OK job@ sthen@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: mb...@cvs.openbsd.org 2021/09/14 05:04:21 Modified files: usr.bin/ssh: channels.c Log message: put back the mux_ctx memleak fix for SSH_CHANNEL_MUX_CLIENT OK mfriedl@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2021/09/14 03:52:12 Modified files: regress/usr.sbin/btrace: histempty.ok Log message: Fix regression test, prodded by bluhm@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2021/09/14 03:15:55 Modified files: sys/net: bfd.c rtsock.c Log message: Add missing kernel lock for Bi-directional Forwarding Detection data. Also bfdset() calls pool_get(9) with PR_WAITOK flag so it should be done before we check the existence of this `bfd', otherwise it could be added multiple times. We have BFD disabled in the default kernel so this diff is for consistency mostly. ok mpi@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2021/09/14 02:19:58 Modified files: sys/arch/amd64/conf: GENERIC Log message: Enable cy(4) on amd64. ok deraadt
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: flor...@cvs.openbsd.org 2021/09/14 01:51:51 Modified files: sbin/dhcpleased: frontend.c Log message: When the dhcp server is unreachable via unicast UDP retry broadcast. The only indication we get is sendto(2) failing, so if our UDP packet is silently dropped somewhere we won't notice. This has been observed in the wild with a dhcp server at the remote end of a VPN. The dhcp server is reachable via broadcast so we get an initial lease. However the server is not in the same subnet as the lease we are getting so to reach it unicast we depend on a default route being set. When the VPN goes down we lose the default route [*] and when dhcpleased then tries to renew the lease (unicast), sendto(2) fails with "network unreachable". [*] The exact mechanics on how this happens are unclear. I.e. why didn't dhcpleased(8) see a link-state change and transitioned to REBOOTING / INIT? Regardless, we shouldn't ignore sendto(2) errors. Reported by stsp, OK benno