CVS: cvs.openbsd.org: src

2021-06-08 Thread David Gwynne
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2021/06/08 21:24:54 Modified files: sys/net: if_vlan.c Log message: whitespace tweak. no functional change.

CVS: cvs.openbsd.org: src

2021-06-08 Thread Jonathan Gray
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2021/06/08 20:56:45 Modified files: sys/dev/pci/drm/amd/amdgpu: amdgpu_ttm.c Log message: don't fatally error on failing to map visible VRAM Mapping VRAM here is an optimisation only attempted on 64 bit arc

CVS: cvs.openbsd.org: src

2021-06-08 Thread Dave Voutila
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2021/06/08 17:18:43 Modified files: sys/arch/amd64/amd64: vmm.c Log message: cleanup printf pattern to remove double 0x when printing pointer mlarkin: "sure"

CVS: cvs.openbsd.org: src

2021-06-08 Thread Damien Miller
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2021/06/08 16:30:27 Modified files: regress/usr.bin/ssh: cert-hostkey.sh Log message: test that UserKnownHostsFile correctly accepts multiple arguments; would have caught readconf.c r1.356 regression

CVS: cvs.openbsd.org: src

2021-06-08 Thread Damien Miller
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2021/06/08 16:06:12 Modified files: usr.bin/ssh: readconf.c Log message: fix regression in r1.356: for ssh_config options that accepted multiple string arguments, ssh was only recording the first. Report

CVS: cvs.openbsd.org: src

2021-06-08 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2021/06/08 13:34:44 Modified files: lib/libssl : ssl_tlsext.c Log message: Simplify tlsext_ecpf_parse() The default alert in the tlsext parsing code is a decode_error, so there's no need for an error pa

CVS: cvs.openbsd.org: src

2021-06-08 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2021/06/08 12:13:50 Modified files: lib/libssl : tls13_client.c Log message: Rewrap a comment to avoid an overlong line

CVS: cvs.openbsd.org: src

2021-06-08 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2021/06/08 12:05:47 Modified files: lib/libssl : tls13_record_layer.c Log message: Ignore the record version for early alerts On receiving the first flight from the peer, we do not yet know if we are us

CVS: cvs.openbsd.org: src

2021-06-08 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2021/06/08 11:41:52 Modified files: lib/libssl : tls13_server.c Log message: TLSv1.3 server: avoid sending alerts in legacy records As soon as we know that we're dealing with a TLSv1.3 client, set the l

CVS: cvs.openbsd.org: www

2021-06-08 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2021/06/08 11:30:26 Modified files: . : errata68.html errata69.html Log message: Release vmd errata.

CVS: cvs.openbsd.org: src

2021-06-08 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2021/06/08 11:22:00 Modified files: lib/libssl : ssl_tlsext.c Log message: Adjust alert for ECPF without uncompressed point format According to RFC 8422, we must send an illegal_parameter alert on recei

CVS: cvs.openbsd.org: src

2021-06-08 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/06/08 08:42:24 Modified files: usr.sbin/vmd : Tag: OPENBSD_6_8 dhcp.c Log message: vmd(8): malicious dhcp packets on local ifs can cause stack overflows A sufficiently large dhcp packet can cause a s

CVS: cvs.openbsd.org: src

2021-06-08 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/06/08 08:41:14 Modified files: usr.sbin/vmd : Tag: OPENBSD_6_9 dhcp.c Log message: vmd(8): malicious dhcp packets on local ifs can cause stack overflows A sufficiently large dhcp packet can cause a s

CVS: cvs.openbsd.org: src

2021-06-08 Thread Dave Voutila
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2021/06/08 08:37:48 Modified files: usr.sbin/vmd : dhcp.c Log message: vmd(8): malicious dhcp packets on local ifs can cause stack overflows A sufficiently large dhcp packet can cause a stack overflow in

CVS: cvs.openbsd.org: src

2021-06-08 Thread Inoguchi Kinichiro
CVSROOT:/cvs Module name:src Changes by: inogu...@cvs.openbsd.org2021/06/08 05:19:39 Modified files: lib/libcrypto : generate_pkgconfig.sh lib/libssl : generate_pkgconfig.sh Log message: Fix pkg-config .pc files with LibreSSL In libssl.pc, Libs: sho

CVS: cvs.openbsd.org: www

2021-06-08 Thread Anthony J . Bentley
CVSROOT:/cvs Module name:www Changes by: bent...@cvs.openbsd.org 2021/06/08 03:46:36 Modified files: . : plus69.html faq/pf : config.html Log message: Typo fixes from Stephane Huc.

CVS: cvs.openbsd.org: src

2021-06-08 Thread Damien Miller
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2021/06/08 01:40:12 Modified files: regress/usr.bin/ssh/unittests/misc: test_argv.c Log message: test argv_split() optional termination on comments

CVS: cvs.openbsd.org: src

2021-06-08 Thread Damien Miller
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2021/06/08 01:09:42 Modified files: usr.bin/ssh: servconf.c Log message: switch sshd_config parsing to argv_split() similar to the previous commit, this switches sshd_config parsing to the newer tokenis

CVS: cvs.openbsd.org: src

2021-06-08 Thread Damien Miller
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2021/06/08 01:07:15 Modified files: usr.bin/ssh: readconf.c ssh.c Log message: Switch ssh_config parsing to use argv_split() This fixes a couple of problems with the previous tokeniser, strdelim() 1. s

CVS: cvs.openbsd.org: src

2021-06-08 Thread Darren Tucker
CVSROOT:/cvs Module name:src Changes by: dtuc...@cvs.openbsd.org 2021/06/08 01:05:28 Modified files: regress/usr.bin/ssh: sshcfgparse.sh Log message: Add testcases from bz#3319 for IPQoS and TunnelDevice being overridden on the command line.

CVS: cvs.openbsd.org: src

2021-06-08 Thread Darren Tucker
CVSROOT:/cvs Module name:src Changes by: dtuc...@cvs.openbsd.org 2021/06/08 01:02:46 Modified files: usr.bin/ssh: readconf.c Log message: Check if IPQoS or TunnelDevice are already set before overriding. Prevents values in config files from overriding values supplied