Re: rpki-client: emit object hash identifier in filemode

2022-04-23 Thread Theo Buehler
On Sat, Apr 23, 2022 at 07:10:06PM +, Job Snijders wrote: > Hi all, > > Since certificate mallebility no longer is a problem in the RPKI > ecosystem ... the SHA256 digest of a RPKI signed object input file is a > very stable identifier to associate to the decoded (validated) output > from

rpki-client: emit object hash identifier in filemode

2022-04-23 Thread Job Snijders
Hi all, Since certificate mallebility no longer is a problem in the RPKI ecosystem ... the SHA256 digest of a RPKI signed object input file is a very stable identifier to associate to the decoded (validated) output from filemode! Example: $ rpki-client -j -f rZWj66_V88W5B41mgMEm-TNr_EU.roa

Re: bwfm(4): show modulation type for the various chipsets

2022-04-23 Thread Ingo Schwarze
Hi Stuart, Stuart Henderson wrote on Sat, Apr 23, 2022 at 06:52:46PM +0100: > saves time if you want to ignore 11n-only devices. ok? Adding useful information is good in general, but i can't really comment on the content. If you add a column to a -column list, usually you also want to update

bwfm(4): show modulation type for the various chipsets

2022-04-23 Thread Stuart Henderson
saves time if you want to ignore 11n-only devices. ok? Index: share/man/man4/bwfm.4 === RCS file: /cvs/src/share/man/man4/bwfm.4,v retrieving revision 1.16 diff -u -p -r1.16 bwfm.4 --- share/man/man4/bwfm.4 5 Jan 2022 17:39:24

Syspatch retracted (OpenBSD Errata: April 22, 2022 (wifi))

2022-04-23 Thread Sebastian Benoit
Syspatch syspatch71-001_wifi has been retracted. A mistake was made in generating the syspatch(8) binary update syspatch71-001_wifi for this errata. This causes problems installing future binary updates and reverting the syspatch. Because of this, the syspatch has been retracted until the issue

Re: Compare pointer value with NULL in openssl(1) pkcs12

2022-04-23 Thread Theo Buehler
> > > @@ -1095,7 +1095,7 @@ hex_prin(BIO *out, unsigned char *buf, i > > > static int > > > set_pbe(BIO *err, int *ppbe, const char *str) > > > { > > > - if (!str) > > > + if (str == NULL) > > > return 0; > > > if (!strcmp(str, "NONE")) { > > > > if (strcmp(str, "NONE") != 0) {

Re: Compare pointer value with NULL in openssl(1) pkcs12

2022-04-23 Thread Kinichiro Inoguchi
On Sat, Apr 23, 2022 at 08:31:50AM +0200, Theo Buehler wrote: > On Sat, Apr 23, 2022 at 01:45:12PM +0900, Kinichiro Inoguchi wrote: > > > I would like to do some clean up for openssl(1) pkcs12. > > This diff changes pointer value checking to explicit comparison with NULL, > > and no functional

vers.c: make kernel date in UTC

2022-04-23 Thread Sebastien Marie
Hi, When I want to check if a particular commit is expected to be present in a particular kernel, I usually check the dates. $ what bsd.mp OpenBSD 7.1-current (GENERIC.MP) #481: Thu Apr 21 21:11:42 MDT 2022 $ cvs log dev/usb/if_ral.c [...] revision 1.149

Re: errata70.html - update the 7.1 link

2022-04-23 Thread Theo Buehler
On Sat, Apr 23, 2022 at 06:32:10AM +0200, Otto Moerbeek wrote: > On Fri, Apr 22, 2022 at 07:22:18PM -0400, Horia Racoviceanu wrote: > > > - change 7.1 link from errata70.html to errata71.html > > > Index: errata70.html > > === > >

Re: Compare pointer value with NULL in openssl(1) pkcs12

2022-04-23 Thread Theo Buehler
On Sat, Apr 23, 2022 at 01:45:12PM +0900, Kinichiro Inoguchi wrote: > I would like to do some clean up for openssl(1) pkcs12. > This diff changes pointer value checking to explicit comparison with NULL, > and no functional changes here. > This works fine for me on my local pc. > > ok? ok. Two