index
:
src
cvs/HEAD
kms/intel
kms/radeon
master
OpenBSD base system
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
usr.sbin
Age
Commit message (
Expand
)
Author
2014-04-21
The OpenSSL engine passes a "const u_char *" to the callback but
Reyk Floeter
2014-04-21
The OpenSSL engine passes a "const u_char *" to the callback but
Reyk Floeter
2014-04-21
Revert 1.101 as it breaks source port selection. This needs more
Florian Obser
2014-04-21
Handle EAGAIN, ENOBUFS and EINTR a bit better. Ignore them one layer above
Claudio Jeker
2014-04-21
It is possible that we can't burst all of the data in the immediate data
Claudio Jeker
2014-04-21
add support for reading/writing long paths and linkpaths as extended
Marc Espie
2014-04-21
Now that we properly negotiate the session params we can enable sending
Claudio Jeker
2014-04-21
th_code is in network byte order
David Gwynne
2014-04-20
tweak previous;
Jason McIntyre
2014-04-20
Prevent lpd(8) from looking into hosts.equiv.
Antoine Jacoutot
2014-04-20
Add iscsictl bits to show the vscsi stats.
Claudio Jeker
2014-04-20
Introduce some basic stats for the vscsi layer. Just counting the commands
Claudio Jeker
2014-04-20
After doing all of the loging dance to get the target's params it makes
Claudio Jeker
2014-04-20
Use only one style for "return foo;"
Claudio Jeker
2014-04-20
Add a few more overflow checks for strlc* functions in parse.y
Reyk Floeter
2014-04-20
clarify a bit about hosts.lpd
Ted Unangst
2014-04-20
Move session params initialization to when we start a session and not
Claudio Jeker
2014-04-20
Fix conn_gen_kvp and its caller to fill the kvp array properly (including
Claudio Jeker
2014-04-20
Check another strlcpy overflow that is very unlikely to happen.
Reyk Floeter
2014-04-20
Check for strlcpy overflow when expanding the HTTP input value.
Reyk Floeter
2014-04-20
Check strlcpy of the script path names for overflow and use the size of the
Reyk Floeter
2014-04-20
Just to be pedantic, fail if strlcpy managed to overflow the socket path.
Reyk Floeter
2014-04-20
Reimplement the multi-dimensional arrays that are used to set up the
Reyk Floeter
2014-04-20
Cleanup a bit, switch on bcopy to memcpy and move a function a bit up
Claudio Jeker
2014-04-20
Partially revert the previous: snmp_agentx_ping() didn't leak the pdu
Reyk Floeter
2014-04-20
Fix a small leak in the error path.
Reyk Floeter
2014-04-19
remove hosts.equiv xr
Ted Unangst
2014-04-19
COnveret the bcopy() to memcpy()
Claudio Jeker
2014-04-19
Replace a magic number.
Claudio Jeker
2014-04-19
these snprintf() calls can't possibly truncate because they copy data from
Gilles Chehade
2014-04-19
(void) cast snprintf() that cannot truncate
Gilles Chehade
2014-04-19
(void) cast snprintf() call used to craft fatalx() message from within
Gilles Chehade
2014-04-19
(void) cast snprintf calls that cannot truncate or for which earlier checks
Gilles Chehade
2014-04-19
(void) cast snprintf() calls that cannot truncate (and would be harmless
Gilles Chehade
2014-04-19
remove dead code ... in code that's not plugged in yet ;-)
Gilles Chehade
2014-04-19
(void) cast snprintf that cannot truncate
Gilles Chehade
2014-04-19
(void) cast snprintf calls that cannot truncate
Gilles Chehade
2014-04-19
(void) cast snprintf call that cannot truncate
Gilles Chehade
2014-04-19
(void) cast snprintf() calls that cannot truncate
Gilles Chehade
2014-04-19
replace warnx message
Gilles Chehade
2014-04-19
add missing strlcpy() check in create_filter_chain() that would cause smtpd
Gilles Chehade
2014-04-19
add missing strlcpy() checks in create_filter() that would cause smtpd to
Gilles Chehade
2014-04-19
add missing strlcpy() check in is_if_in_group() to detect and warn about
Gilles Chehade
2014-04-19
add missing strlcpy() check when parsing "backup hostname" in smtpd.conf,
Gilles Chehade
2014-04-19
(void) cast strlcpy() calls that cannot truncate
Gilles Chehade
2014-04-19
certs are looked up by hostname, the size of the buffer should use the
Gilles Chehade
2014-04-19
knf
Gilles Chehade
2014-04-19
add a missing strlcpy() check in MAIL FROM's DSN parameters parsing, the
Gilles Chehade
2014-04-19
(void) cast strlcpy() calls that cannot truncate (copies between buffers of
Gilles Chehade
2014-04-19
(void) cast a strlcpy() that cannot truncate because lka.c ensures the
Gilles Chehade
[next]