The process of using 40/50 row vga text modes is pretty cumbersome now:
wsfontload -h 8 -e ibm /usr/share/misc/pcvtfonts/vt220l.808
wsconscfg -dF 1
wsconscfg -t 80x50 1
I just reported a bug and a fix with font corruption, but I want to
propose a
few usability improvements that I am interested
On Thu, May 14, 2020 at 01:48:05AM +0200, Robert Scheck wrote:
> Following claudio@'s recent change from "-rlt" to "-rt" in rpki-client [1],
> I would like to propose this minor change to rpki-client.8 hereby:
>
> diff --git a/src/usr.sbin/rpki-client/rpki-client.8
>
Hi,
I have done the work to implement ospfctl json support, but as
discussed i will provide it in two diffs.
This first one externalises the output aspect of ospfctl and there are
some things like tail that are not needed specifically for straight
standard output, but are required for json
On Sun, Apr 05, 2020 at 12:10:08PM +0200, Matthieu Herrb wrote:
> On Sun, Mar 22, 2020 at 08:13:11PM +0100, Matthieu Herrb wrote:
> > Hi,
> >
> > the patch below updates XCB (xcb-proto and libxcb) to version 1.14.0.
> >
> > I've been running this on amd64 for a while. Comments ? ok ?
> >
> >
Please provide a properly formatted diff.
On Thu, May 14, 2020 at 07:16:31AM +0100, Richard Chivers wrote:
> Hi,
>
> I have done the work to implement ospfctl json support, but as
> discussed i will provide it in two diffs.
>
> This first one externalises the output aspect of ospfctl and there
Hi,
Sure I will check it out.
Much of the code came directly from ospfctl, so spaces were maintained for
example, I wasn't sure if I should change all lines effectively changing
the original code.
The code originally didn't seem to fully match what I initially read in
style(9).
I will have a
On Thu, May 14, 2020 at 10:07:30PM +0200, Tobias Heider wrote:
> Hi,
>
> currently iked(8) supports AES-GCM only for ESP.
> The diff below adds the ENCR_AES_GCM_16 and ENCR_AES_GCM_12 variants for IKE.
> (for more information see [1] and [2]).
> Both variants support the 128, 196, and 256 bit key
On Thu, May 14, 2020 at 07:15:41PM +0100, Richard Chivers wrote:
> Shall I effectively fix issues in the original code at this stage, or only
> where I have moved and refactored?
>
Thanks. Limit the changes to what is relative to json support. The diff is
already big enough :)
Hi,
currently iked(8) supports AES-GCM only for ESP.
The diff below adds the ENCR_AES_GCM_16 and ENCR_AES_GCM_12 variants for IKE.
(for more information see [1] and [2]).
Both variants support the 128, 196, and 256 bit key lengths.
The new new ciphers can be configured with:
- aes-128-gcm,
Following https://marc.info/?l=openbsd-tech=158946552515632=2, when
IMSG_IFADD is removed, IMSG_IFDELETE becomes useless...
Index: kroute.c
===
RCS file: /home/denis/dev/cvs/src/usr.sbin/ospf6d/kroute.c,v
retrieving revision 1.62
Hi Solene,
Robert is also seeing this on one of his systems. I am currently
investigating this and will come back with a fix.
Thank you for the report,
Paul
On 2020-05-14 12:31, Solene Rapenne wrote:
Le Wed, 13 May 2020 17:03:01 +0300,
Paul Irofti a écrit :
Hi,
By far one of the most
Le Wed, 13 May 2020 17:03:01 +0300,
Paul Irofti a écrit :
> Hi,
>
> By far one of the most popular and frequently used system calls is
> clock_gettime(2). As a result the cost of kernel-userland transitions
> out weight the actual work, thus I am proposing we make the data
> available directly
On Wed, May 13, 2020 at 07:55:02PM -0400, sven falempin wrote:
> 'good news'
>
> I build a custom kernel with the DEBUG flag for the driver
> I 'works' ,
This means that the driver is doing something too fast on your hardware,
and some miscommunication happens with the card as a result.
One
On Thu, May 14, 2020 at 10:47:52PM +0200, Tobias Heider wrote:
> On Thu, May 14, 2020 at 10:07:30PM +0200, Tobias Heider wrote:
> > Hi,
> >
> > currently iked(8) supports AES-GCM only for ESP.
> > The diff below adds the ENCR_AES_GCM_16 and ENCR_AES_GCM_12 variants for
> > IKE.
> > (for more
On Thu, May 14, 2020 at 10:47:52PM +0200, Tobias Heider wrote:
> On Thu, May 14, 2020 at 10:07:30PM +0200, Tobias Heider wrote:
> > Hi,
> >
> > currently iked(8) supports AES-GCM only for ESP.
> > The diff below adds the ENCR_AES_GCM_16 and ENCR_AES_GCM_12 variants for
> > IKE.
> > (for more
Looks like you are missing the previous commit:
https://marc.info/?l=openbsd-cvs=158946893417378=2
The capablities info field in an association request contains an ESS bit
which is set if the sender is an access point (there are other cases but
they don't matter for us; see 802.11-2012 8.4.1.4 if you are interested).
This bit is set when OpenBSD clients send an association request to an AP.
IMSG_IFADD is never used, wipe it.
Index: ospf6d.h
===
RCS file: /cvs/src/usr.sbin/ospf6d/ospf6d.h,v
retrieving revision 1.46
diff -u -p -r1.46 ospf6d.h
--- ospf6d.h5 Apr 2020 18:19:04 - 1.46
+++ ospf6d.h14 May 2020
Hi,
Sorry I thought I had done it correctly, I sent it to a colleague
first to apply, but we were
using the git mirror, just because we use git a lot generally.
I have now set-up cvs and run:
cvs diff -Nu usr.sbin/ospfctl/output.c usr.sbin/ospfctl/ospfctl.c
usr.sbin/ospfctl/ospfctl.h
Each `struct pppx_if' holds it's own `pipex_session' and this session is
used directly within ifnet's related handlers pppx_if_start() and
pppx_if_output().
pppx_if_destroy() at first destroys `pipex_session' and calls
if_deatch() which can cause context switch. Hypothetically,
pppx_if_start() or
This implements a way to add a limit for bgpctl show rib output.
When a limit is set then the output will include a token (at the end)
that can be used to get the next batch of output. These two things allow
to build a frontend that puts the output onto multiple pages.
Both regular output and JSON
On Thu, May 14, 2020 at 05:51:58PM +0100, Richard Chivers wrote:
> Let me know if this now works for you.
>
This is better, I can apply it :)
However, there are many style(9) issues. Can you fix them please before I review
the changes ?
Thank you.
22 matches
Mail list logo