Age | Commit message (Collapse) | Author |
|
drahn@ but tweaked to use same scratch reg as PIC_PROLOGUE.
okay miod@ drahn@
|
|
|
|
This will allow us to escape the limitations of kmem_map.
At this moment, the per-type limits are still enforced for all sizes,
but we might loosen that limit in the future after some thinking.
Original diff from Mickey in kernel/5761 , I massaged it a little to
obey the per-type limits.
miod@ ok
|
|
|
|
stickyness with web applications that cannot do the clustering on
their own and require stickyness with HTTP to HTTPS migration. this
is required in many cases; it is a true fact that we cannot always fix
the backend application in the real world.
Tested and requested by many
|
|
learn new interfaces during runtime. This should solve the issue with
reloads failing when interfaces where created during runtime.
OK norby@
|
|
|
|
ioctls.
ok ratchov@
|
|
ok kettenis@
|
|
ok kettenis@
|
|
event. so don't use the word "before" .. and leave the mention ambigious
ok henning
|
|
ok claudio@
|
|
to prevent state key mismatches.
ok henning@
|
|
encapsulation. Decapitalise the 'v' in ICMPv6 whilst here.
ok henning@
|
|
|
|
pointed out by deraadt@, Markus Peloquin
sorry guys.
|
|
Tested & ok kettenis@
|
|
- spamd(8) configuration now lives in /etc/mail, too
- sort some items that were out of order
ok jmc@. no objections millert@
|
|
This will be required for future WPA-Enterprise support (802.1X).
Add ieee80211_needs_auth() function (not implemented yet) to
notify the userland 802.1X PACP machine when an 802.1X port
becomes enabled (that is after successfull 802.11 Open System
authentication).
Add SIOCS80211KEYRUN and SIOCS80211KEYAVAIL ioctls so that the
PACP state machine can kick the 802.11 key state machine and
install PMKs obtained from 802.1X (pre-)authentication.
Enable SHA-256 based AKMPs by default while I'm here (TGw).
This uses SHA-256 for key-derivation (instead of SHA1), AES-128-CMAC
for data integrity, and AES Key Wrap for data protection of EAPOL-Key
frames. An OpenBSD AP will always advertise this capability and an
OpenBSD STA will always prefer SHA-256 based AKMPs over SHA1 based
ones if both are supported by an AP.
|
|
header fields (Sequence Control, Address 4, QoS Control, +HTC) and
use them where appropriate.
Add ieee80211_get_qos() inline function to extract the QoS control
field of an 802.11 header instead of duplicating the same scary
code everywhere (the location of this field depends on the presence
of an Address 4 field).
Export ieee80211_up_to_ac() so that drivers can select the access
category to use based on the TID subfield of the QoS Control field.
Define more QoS-related bits for the RSN Capabilities field of RSN IE
(will be used later).
|
|
|
|
|
|
|
|
|
|
Tested on ASUS P5E-VM DO motherboard.
ok oga
|
|
|
|
Caught and ok kurt@
|
|
only (not even show commands). this allows to place a socket for
traps in another daemon's chroot.
(based on restricted socket support from bgpd)
|
|
adapted from a patch by nikns, with tweaks by millert.
took forever to test for real...
okay miod@, henning@, millert@
|
|
and JMicron JMP202/JMP211 Ethernet PHYs.
Written by Pyun YongHyeon for FreeBSD, ported to DragonFlyBSD
by Sepherosa Ziehau and then ported to OpenBSD by me.
Thanks once again to JMicron for supplying hardware and
information which made this possible.
Some cleanup still needs to be done, and checksum offload
needs to be sorted out, but the driver otherwise seems
to work great. Comitted over a JMC250 card.
|
|
|
|
|
|
From FreeBSD via kevlo@
|
|
Removed unused functions
ok marco@
|
|
Found by LLVM/Clang Static Analyzer.
ok jakemsr@
|
|
Found by LLVM/Clang Static Analyzer.
ok brad@
|
|
Found by LLVM/Clang Static Analyzer.
ok brad@ krw@
|
|
Found by LLVM/Clang Static Analyzer.
ok claudio@
|
|
when there are no files to recover as this flag is used by ex(1)
and view(1) too.
problem found by jsing@, Sven Verdoolaege did some suggestions
to improve its portability.
diff committed upstream.
ok jsing@
|
|
NULL at the point of test unless the device list is confused, but
be consistantly paranoid if we're going to be paranoid.
|
|
initialized. From NetBSD. "won't hurt" miod@.
|
|
|
|
Found by LLVM/Clang Static Analyzer.
ok henning@ brad@
|
|
Found by LLVM/Clang Static Analyzer.
ok ratchov@
|
|
from tobias@
ok otto@ tobias@
|
|
|
|
yes, I know, afs on vax, who would want this?
|
|
|
|
If the RX path runs into an out of mbuf scenario, the code
will leave the RX chain with a NULL'd mbuf-slot.
We now always reassign a valid mbuf, even if m_devget() fails.
OK brad@, thib@
|
|
from Daniel Roethlisberge, documentation/5936;
|