Age | Commit message (Collapse) | Author |
|
ok marco@.
|
|
|
|
discussed with krw, kettenis & drahn
ok hshoexer
|
|
spotted by naddy@, ok and help djm@ dtucker@
|
|
better; ok grunk@
|
|
can slow things down and we never use the service info anyway. bz
#859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
deraadt@ djm@
djm belives that the reason for the "0" strings is to ensure that
it's not possible to call getaddrinfo with both host and port being
NULL. In the case of canohost.c host is a local array. In the
case of sshconnect.c, it's checked for null immediately before use.
In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
be non-null but it's not obvious, so I added a warning message in
case it is ever passed a null.
|
|
|
|
will cause trouble in some cases.
Also do a computation of -1 once, and not in a loop several times.
spotted by otto@
|
|
|
|
ok deraadt
|
|
indent-current-line utility functions for stripping leading/trailing
whitespace, and setting a fixed indent respectively.
|
|
found by ckuethe, help from otto.
|
|
|
|
spotted by naddy@
|
|
|
|
them in and sending to the adapter. Reduces probe of empty controller
from 15 minutes or so to 30 seconds or so. And probably fixes other
things too.
Also add a few more debug statements and tweak some comments.
From mjacob via FreeBSD.
ok deraadt@
|
|
|
|
been used in NetBSD and FreeBSD for years. Blade2002 with a 2200 still
boots. From mjacob via FreeBSD.
ok deraadt@
|
|
|
|
that is not how it was envisioned.
Also correct manpage saying that -v is needed along with -l for it to work.
spotted by naddy@
|
|
tested and ok hshoexer, grunk
|
|
requested and ok fgsch
|
|
would not display you the random art as intended, spotted by canacar@
|
|
|
|
instead of reloading the configuration for all sensordevs.
ok henning
|
|
|
|
graphical hash visualization schemes known as "random art", and by
Dan Kaminsky's musings on the subject during a BlackOp talk at the
23C3 in Berlin.
Scientific publication (original paper):
"Hash Visualization: a New Technique to improve Real-World Security",
Perrig A. and Song D., 1999, International Workshop on Cryptographic
Techniques and E-Commerce (CrypTEC '99)
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
The algorithm used here is a worm crawling over a discrete plane,
leaving a trace (augmenting the field) everywhere it goes.
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
makes the respective movement vector be ignored for this turn,
thus switching to the other color of the chessboard.
Graphs are not unambiguous for now, because circles in graphs can be
walked in either direction.
discussions with several people,
help, corrections and ok markus@ djm@
|
|
|
|
- make gamma an alias of lgamma
- on ieee, add tgamma, based on gamma from non-ieee
- fixes for tgamma/lgamma/exp/log, esp. special cases (some from
freebsd); properly raise invalid fp operations on vax
- also some general cleanup, ansification, man page (which was ok
jmc@)
- bump minor
this makes some ports using tgamma possible; also consistifies
behavior across openbsd/ieee and openbsd/non-ieee, and other operating
systems
much thanks sthen@, johan@, steven@, Simon Kuhnle, Wiktor Izdebski
for testing
ok millert@
|
|
ok henning
|
|
ok dlg@
|
|
|
|
ok dlg@
|
|
or output and then read the value from either the GPIO[x]_READ_BACK or
GPIO[x]_OUT_VAL register. This allows to read back LED (output) states
as well as input states (buttons).
Problem noticed by Rolf Sommerhalder, fix by me.
|
|
|
|
|
|
POOL_TAP5 is always 1 so unifdef it
no binary change
|
|
|
|
time we descend into another directory, leaves even less crap in /tmp
while running.
|
|
ok todd deraadt naddy bluhm
|
|
physmem. This should be more correct than earlier code.
Thank you to Markus Hennecke <markus-hennecke -at- markus-hennecke.de>
for reminding me.
|
|
hotplugging.
* Factor out some code from main() into a new create() procedure, to save
some memory and make the code tidier.
ok henning
|
|
relay will connect to the target host with its own ip address, but
this mode will let it use the address of the client that is connecting
from the other side. for example, there is no need to add the
X-Forwarded-For HTTP headers for internal webservers in this mode
anymore since they magically see the remote client ip address in the
connection. it also allows to build fully-transparent ssl
encapsulation for tcp sessions and many other things...
based on an initial idea from dlg@ and pascoe@ (dlg's talk at opencon)
using the new BINDANY and divert-reply interfaces from markus@ (since n2k8)
ok markus@ pyr@
|
|
as an aid to readability
ok and thinko-catching henning@
|
|
key1->reverse = key2; and key2->reverse = key1;
ok ryan
|
|
also fix the correction amount. This was only really visible on tcpdump,
as a "truncated-ip6 - 48 bytes missing" warning. The inner packet made
it into the stack just fine, minus a few sanity checks.
reported by and debuged together with and ok todd@
|
|
|
|
with sensors with the same name. The sensor name is now ever increasing
unless the reference count drops to zero, in which case the naming restarts
at zero as well.
|
|
placed in the public domain.
This means mg (minus theo.c) is once again a public domain
piece of code. Please try to keep it that way.
|
|
|