CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 22:14:07 Modified files: distrib/sets/lists/comp: mi Log message: sync

CVS: cvs.openbsd.org: src

2024-05-29 Thread Claudio Jeker
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2024/05/29 12:55:45 Modified files: sys/kern : kern_fork.c kern_lock.c sched_bsd.c sys/sys: sched.h Log message: Convert SCHED_LOCK from a recursive kernel lock to a mutex. Over the l

CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 11:23:06 Modified files: regress/lib/libcrypto/asn1: asn1object.c Log message: asn1object: zap trailing whitespace

CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 10:49:36 Modified files: regress/lib/libcrypto/asn1: asn1object.c Log message: Make it possible for the large OID test to fail failed was set to 0 at the top of the function, so failure and succe

CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 10:47:26 Modified files: regress/lib/libcrypto/asn1: asn1object.c Log message: Add regress coverage for some corner cases of i2d_ASN1_OBJECT()

CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 10:19:50 Modified files: regress/lib/libcrypto/asn1: asn1object.c Log message: Add regress coverage for i2d_ASN1_OBJECT() fixes

CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 10:14:38 Modified files: lib/libcrypto/asn1: a_object.c Log message: Fix i2d_ASN1_OBJECT() When called with a pointer to NULL as an output buffer, one would expect an i2d API to allocate the buff

CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 10:10:41 Modified files: lib/libcrypto/asn1: a_object.c Log message: Make i2d_ASN1_OBJECT() return -1 on error This is what the (not quite appropriately) referenced ASN1_item_i2d() page documents

CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 10:04:51 Modified files: lib/libcrypto/asn1: a_object.c Log message: Remove unnecessary parens from i2d_ASN1_OBJECT()

CVS: cvs.openbsd.org: src

2024-05-29 Thread Marcus Glocker
CVSROOT:/cvs Module name:src Changes by: mgloc...@cvs.openbsd.org2024/05/29 07:56:49 Modified files: sys/conf : files Log message: Set 'needs-flag' for ufshci(4) as preparation for some future hibernate code. Remove obsolete comment while here as pointed ou

CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 07:27:52 Modified files: usr.sbin/rpki-client: rpki-client.8 Log message: Clean up the list of standards a little No need to spell out RPKI and a few other things every time they appear in titles

CVS: cvs.openbsd.org: src

2024-05-29 Thread Theo Buehler
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2024/05/29 07:26:24 Modified files: usr.sbin/rpki-client: crl.c extern.h print.c x509.c Log message: rpki-client: rework CRL handling There is no benefit in parsing the CRLNumber in the RPKI. It is redundan

CVS: cvs.openbsd.org: src

2024-05-29 Thread Mark Kettenis
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2024/05/29 06:21:33 Modified files: sys/arch/amd64/amd64: acpi_machdep.c cpu.c intr.c sys/arch/amd64/include: cpu.h sys/arch/i386/i386: cpu.c sys/dev/acpi : acpi.c acpi_x86

CVS: cvs.openbsd.org: src

2024-05-29 Thread Claudio Jeker
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2024/05/29 04:41:12 Modified files: usr.sbin/bgpd : rde_update.c Log message: Handle IPvX only interfaces with IPvY sessions more gracefully. In up_get_nexthop() check that the local_vX_addr is actually va

CVS: cvs.openbsd.org: src

2024-05-29 Thread Claudio Jeker
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2024/05/29 04:38:24 Modified files: usr.sbin/bgpd : session.c Log message: Only fall back to the default IPv4 unicast mode if there was no MP capability neither from our side not the remote end. Also track

CVS: cvs.openbsd.org: src

2024-05-29 Thread Claudio Jeker
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2024/05/29 04:36:32 Modified files: usr.sbin/bgpd : rde.h Log message: Remove nexthop_compare() prototype. OK henning@ sthen@

CVS: cvs.openbsd.org: src

2024-05-29 Thread Claudio Jeker
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2024/05/29 04:34:56 Modified files: usr.sbin/bgpd : rde_rib.c Log message: Rename nexthop_compare to nexthop_cmp and make it static inline. OK henning@ sthen@

CVS: cvs.openbsd.org: src

2024-05-29 Thread Claudio Jeker
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2024/05/29 04:34:07 Modified files: usr.sbin/bgpd : util.c Log message: Introduce a ring buffer for log_sockaddr() this way log_addr() can be used more then once in a log message (e.g. log_peer_warnx + log_

CVS: cvs.openbsd.org: src

2024-05-29 Thread Stefan Sperling
CVSROOT:/cvs Module name:src Changes by: s...@cvs.openbsd.org2024/05/29 03:04:12 Modified files: share/man/man4 : qwx.4 Log message: document qwx(4) caveats and known bugs

CVS: cvs.openbsd.org: src

2024-05-29 Thread Stefan Sperling
CVSROOT:/cvs Module name:src Changes by: s...@cvs.openbsd.org2024/05/29 01:27:33 Modified files: sys/dev/usb: if_athn_usb.c Log message: fix WEP on athn(4) USB hostap Deferring installation of software crypto keys to a task context is not needed and results in ra

CVS: cvs.openbsd.org: src

2024-05-29 Thread Stefan Sperling
CVSROOT:/cvs Module name:src Changes by: s...@cvs.openbsd.org2024/05/29 01:24:27 Modified files: sys/dev/ic : qwx.c Log message: repair qwx(4) WEP and TKIP via software crypto It is difficult to make WEP and WPA1/TKIP work with hardware crypto. Add a comment whic