Age | Commit message (Collapse) | Author |
|
ok jmc@, deraadt@, dlg@
|
|
|
|
in the past?) comment about FILEC
noted by Peter Brottveit Bock
|
|
who wants csh without FILEC??
from Peter Brottveit Bock, but redone using unifdef
|
|
Original diff from guenther@, adjusted by me.
OK guenther@
|
|
|
|
world uses them.
|
|
boundary, not to an u area boundary. Oops.
|
|
apparently a risk of spurious parity errors if we don't.
|
|
|
|
receiving interface in the packet header of every mbuf.
The interface pointer should now be retrieved when necessary with
if_get(). If a NULL pointer is returned by if_get(), the interface
has probably been destroy/removed and the mbuf should be freed.
Such mechanism will simplify garbage collection of mbufs and limit
problems with dangling ifp pointers.
Tested by jmatthew@ and krw@, discussed with many.
ok mikeb@, bluhm@, dlg@
|
|
bs_ber.c does not convert BER to DER. It's a hack to convert a DER-like
encoding with one violation (indefinite form) to strict DER. Rename
the functions to reflect this.
ok miod@ jsing@
|
|
|
|
Add some additional uslcom ids found in the Linux driver while here.
|
|
|
|
Add some additional uslcom ids found in the Linux driver while here.
|
|
ok jsing@
|
|
|
|
arguments. Add tests to check wether syslogd privsep works. This
is done for debug and foreground and daemon mode. Fstat is checked
for chroot and sockets. Ktrace dump is grepped for setting uid and
gid.
|
|
OK benno@; input millert@; no objections deraadt@
|
|
AuthorizedPrincipalsFile is not (or is set to "none"), authentication will
potentially fail due to key_cert_check_authority() failing to locate a
principal that matches the username, even though an authorized principal
has already been matched in the output of the subprocess. Fix this by using
the same logic to determine if pw->pw_name should be passed, as is used to
determine if a authorized principal must be matched earlier on.
ok djm@
|
|
match_principals_file(), by changing the last argument a
struct sshkey_cert * and dereferencing key->cert in the caller.
No functional change.
ok djm@
|
|
this is allowed in C11 and 3rd-party software is relying upon this to be
accepted by the compiler.
Nevertheless warn about this if -pedantic.
ok ajacoutot@ deraadt@ millert@
|
|
machine, each test kills any syslogd first. At the end the system's
syslogd gets restarted.
The test framework runs a client, and a server, and a syslogd. The
messages are passed via the log socket or via UDP from the client
to syslogd. From there UDP transport is used to reach the server.
All processes write log files where the message has to show up.
The test arguments are kept in the args-*.pl files.
The content of a log file, the data sent to a pipe process and what
the server received are checked. The invocation of the sendsyslog(2)
syscall is checked with ktrace, the open file descriptors of syslogd
are checked with fstat.
|
|
been found: it was a hardware failure.
When a bus is explored, do not probe the ports which status hasn't
changed. This saves a lot of I/O when attaching/detaching devices
and might help with some timing related problems.
|
|
in my case dhclient(8), races with ifconfig(8) to free the descriptors
of the joined multicast groups.
While here reduce the difference with carp(4).
ok dms@
|
|
This reduces differences between non-isoch and isoch transfers submissions,
makes the generic DMA buffer overrun check work with isoch transfers and
will allow some code simplifications in HC drivers.
Since short-transfers were never checked for isoch transfers, we now need to
pass the USBD_SHORT_XFER_OK flag to not change this behavior. This might be
revisited later.
ok ratchov@
|
|
|
|
do it in the caller.
|
|
|
|
|
|
|
|
from propos6 at gmail dot com.
|
|
|
|
|
|
which are the same binary). This is supposed to exercise all syscalls
paths through those tools and not a comprehensive regression test.
|
|
|
|
Linux is a moving target so these comments provide little value.
Discussed with kettenis and deraadt.
|
|
The bad news: Many laptops sold with iwm(4) cards don't have a wifi LED :-(
The good news: Laptops with LEDs and no wifi device white-list in BIOS
actually exist! Tested in one such machine.
ok kettenis@ deraadt@
|
|
CBS_get_any_asn1_element violates DER encoding by allowing indefinite
form. All callers except bs_ber.c expect DER encoding. The callers
must check to see if it was indefinite or not.
Rather than exposing all callers to this behavior,
cbs_get_any_asn1_element_internal() allows specifying whether you want to
allow the normally forbidden indefinite form. This is used by
CBS_get_any_asn1_element() for strict DER encoding and by a new static
function in bs_ber.c for the relaxed version.
While I was here, I added comments to differentiate between ASN.1
restrictions and CBS limitations.
ok miod@
|
|
|
|
This commit matches the OpenSSL removal in commit
3c33c6f6b10864355553961e638514a6d1bb00f6.
ok deraadt@
|
|
This was imported into OpenSSL from SSLeay. It was recently deleted
in OpenSSL commit 7a4dadc3a6a487db92619622b820eb4f7be512c9
|
|
This is a hack for an old version of SSLeay which predates OpenSSL.
|
|
|
|
|
|
|
|
|
|
|
|
|