openbsd
14 months agoPerform the softhsm2 setup as discrete steps rather than as a long
djm [Fri, 6 Oct 2023 03:25:14 +0000 (03:25 +0000)]
Perform the softhsm2 setup as discrete steps rather than as a long
shell pipeline. Makes it easier to figure out what has happened when
it breaks.

14 months agoDo log output to stderr while running dhcpd(8) in foreground to make
mvs [Thu, 5 Oct 2023 18:46:14 +0000 (18:46 +0000)]
Do log output to stderr while running dhcpd(8) in foreground to make
behaviour in accordance with man page. Introduce '-v' option to make
output more verbose.

Do a little refactoring to make code more consistent with other daemons
like ospfd(8), httpd(8), relayd(8), etc.

Feedback from bluhm benno

ok bluhm

14 months agoMention the option to encrypt the root disk on supported architectures
kn [Thu, 5 Oct 2023 11:58:34 +0000 (11:58 +0000)]
Mention the option to encrypt the root disk on supported architectures

with miod

14 months agoProtect interface queues with read once and mutex.
bluhm [Thu, 5 Oct 2023 11:08:56 +0000 (11:08 +0000)]
Protect interface queues with read once and mutex.

Reading atomic values need at least read once and writing values
should have a mutex.  This is what mbuf queues already do.  Add
READ_ONCE() to ifq and ifiq macros for len and empty.  Convert
ifq_set_maxlen() to a function that grabs ifq_mtx.

OK mvs@

14 months agoAdd regress coverage for ASN1_UTCTIME_cmp_time_t()
tb [Thu, 5 Oct 2023 07:59:41 +0000 (07:59 +0000)]
Add regress coverage for ASN1_UTCTIME_cmp_time_t()

14 months agore-enable POOL_DEBUG
bluhm [Wed, 4 Oct 2023 18:07:13 +0000 (18:07 +0000)]
re-enable POOL_DEBUG
OK deraadt@

14 months agobase is unlocked, move to 7.4-current
bluhm [Wed, 4 Oct 2023 15:40:13 +0000 (15:40 +0000)]
base is unlocked, move to 7.4-current
OK deraadt@

14 months agospelling fix;
jmc [Wed, 4 Oct 2023 05:42:10 +0000 (05:42 +0000)]
spelling fix;

14 months agoopenssh-9.5
djm [Wed, 4 Oct 2023 04:04:09 +0000 (04:04 +0000)]
openssh-9.5

14 months agoadd some cautionary text about % token expansion and shell metacharacters;
djm [Wed, 4 Oct 2023 04:03:50 +0000 (04:03 +0000)]
add some cautionary text about % token expansion and shell metacharacters;
based on report from vinci AT protonmail.ch

14 months agofix link to agent draft; spotted by Jann Horn
djm [Tue, 3 Oct 2023 23:56:10 +0000 (23:56 +0000)]
fix link to agent draft; spotted by Jann Horn

14 months agoReinstate setting rtableid based on rdomain for pfsync,
sthen [Tue, 3 Oct 2023 10:22:10 +0000 (10:22 +0000)]
Reinstate setting rtableid based on rdomain for pfsync,
lost during the rewrite, reported by Mark Patruck.

ok phessler claudio sashan deraadt

14 months agoFix a typo and move a word
tb [Tue, 3 Oct 2023 09:58:06 +0000 (09:58 +0000)]
Fix a typo and move a word

14 months agoremove unused Pp macro;
jmc [Tue, 3 Oct 2023 05:20:38 +0000 (05:20 +0000)]
remove unused Pp macro;

14 months agoAdd 'host root port' information to hw.ucomnames.
krw [Mon, 2 Oct 2023 23:38:11 +0000 (23:38 +0000)]
Add 'host root port' information to hw.ucomnames.

usbN.X.Y becomes usbN.Z.X.Y

Display the usb<blah> string in ucom attach messages so grepping
dmesg can be used to find the path to a ucom.

More USB cluebats from kettenis@. Deep hub depths testing from
drahn@.

ok deraadt@ drahn@ kettenis@

14 months agoNow nearbyint_test-1 is passing on macppc, powerpc64, sparc64. Some
bluhm [Mon, 2 Oct 2023 16:11:09 +0000 (16:11 +0000)]
Now nearbyint_test-1 is passing on macppc, powerpc64, sparc64.  Some
recent fixes seem to help also there, not only on amd64.
OK deraadt@

14 months agoEnable cu(1) -l to accept the usb paths shown in hw.ucomnames.
krw [Mon, 2 Oct 2023 14:48:10 +0000 (14:48 +0000)]
Enable cu(1) -l to accept the usb paths shown in hw.ucomnames.

Usual man page tweaks from jmc@ and schwarze@.

Testing various iterations by deraadt@, nicm@, kettenis@, drahn@.

ok deraadt@

14 months agobump version
claudio [Mon, 2 Oct 2023 13:31:32 +0000 (13:31 +0000)]
bump version

14 months agomaybe a bit earlier
deraadt [Mon, 2 Oct 2023 13:26:04 +0000 (13:26 +0000)]
maybe a bit earlier

14 months agoAdd some coverage for ASN1_TIME_cmp_time_t() as well
tb [Mon, 2 Oct 2023 11:14:15 +0000 (11:14 +0000)]
Add some coverage for ASN1_TIME_cmp_time_t() as well

ASN1_UTCTIME_cmp_tim_t() could be done similarly, but then I have to mess
with LIBRESSL_INTERNAL. Let's do this after unlock.

14 months agoAdd regress coverage for ASN1_TIME_compare()
tb [Mon, 2 Oct 2023 10:40:43 +0000 (10:40 +0000)]
Add regress coverage for ASN1_TIME_compare()

14 months agoMinor asn1time tweaks
tb [Mon, 2 Oct 2023 09:42:58 +0000 (09:42 +0000)]
Minor asn1time tweaks

Sprinkle some (static) const and garbage collect an unused struct.

14 months agoDV -> Dv;
jmc [Mon, 2 Oct 2023 05:29:59 +0000 (05:29 +0000)]
DV -> Dv;

14 months agoExample code tweak: do not hardcode the size of array
tb [Sun, 1 Oct 2023 22:46:21 +0000 (22:46 +0000)]
Example code tweak: do not hardcode the size of array

14 months agoFix a copy-paste bug in ASN1_TIME_compare()
tb [Sun, 1 Oct 2023 22:14:36 +0000 (22:14 +0000)]
Fix a copy-paste bug in ASN1_TIME_compare()

ASN1_TIME_compare() compares two times t1 and t2. Due to a copy-paste
error, we would do ASN1_time_parse(t1->data, t2->length, &tm2, t2->type)

Now if t1 is a UTCTime (length 13) and t2 is a GeneralizedTime (length 15),
the worst that could happen is a 2-byte out-of-bounds read. Fortunately, t1
will already have parsed as a UTCTime, so it will have a Z where there
should be the first digit of the seconds for a GeneralizedTime and we will
error out.

Now if both t1 and t2 have the same type, we will parse t1's data twice
and we will return an incorrect comparison. This could have some security
impact if anything relied on this function for security purposes. It is
unused in our tree and unused in our ports tree ports and the only consumer
I could find was some MongoDB things doing OCSP, so this won't be too bad.

Then of course there's also the language bindings.

Issue reported by Duncan Thomson at esri dot com via libressl-security

ok beck deraadt

14 months agoshow fingerprint of freshly generated ssh host key on first boot
naddy [Sun, 1 Oct 2023 20:15:23 +0000 (20:15 +0000)]
show fingerprint of freshly generated ssh host key on first boot

Print to the console the fingerprint of a newly generated ssh host
key of the preferred type (currently ED25519), typically when booting
for the first time.  This simplifies a secure first ssh connection to
a freshly installed machine.

ok deraadt@ kn@, and various for earlier iterations

14 months agoDocument EVP_CIPHER_CTX_iv_length() return values
tb [Sun, 1 Oct 2023 18:23:50 +0000 (18:23 +0000)]
Document EVP_CIPHER_CTX_iv_length() return values

We aligned with upstream behavior. Let's document it properly.

Surprisingly, OpenSSL 1.1 half-assed the docs: two parts of the manual
contradict each other. The part getting EVP_CIPHER_CTX_iv_length() right,
incorrectly documents possible -1 return value to EVP_CIPHER_iv_length().

OpenSSL 3 documentation improvement efforts seem to have tried to address
this issue with the result that the manual is now entirely wrong when it
comes to the EVP_CIPHER_CTX_iv_length() replacement. Par for the course.

14 months agoAdd sysctl hw.ucomnames to list 'fixed' paths to USB serial
krw [Sun, 1 Oct 2023 15:58:11 +0000 (15:58 +0000)]
Add sysctl hw.ucomnames to list 'fixed' paths to USB serial
ports.

Suggested by deraadt@, USB route idea from kettenis@. Feedback
from anton@, man page improvements from deraadt@, jmc@,
schwarze@.

ok deraadt@ kettenis@

14 months agoThe colons separate the octets, not the digits; add missing link to
tb [Sun, 1 Oct 2023 10:51:19 +0000 (10:51 +0000)]
The colons separate the octets, not the digits; add missing link to
crypto(3)

14 months agoAtlantic 2 hardware has a different layout for the TPS_DATA_TCT registers
kettenis [Sun, 1 Oct 2023 09:03:14 +0000 (09:03 +0000)]
Atlantic 2 hardware has a different layout for the TPS_DATA_TCT registers
and uses different buffer sizes.  Fixes an issue where the card would
stop transmitting packets under load on the M2 Pro Mac mini.

ok jmatthew@

14 months agoPrint the correct SDHC spec version.
kettenis [Sun, 1 Oct 2023 08:56:24 +0000 (08:56 +0000)]
Print the correct SDHC spec version.

ok deraadt@

14 months agoImprove a code comment in the EXAMPLES section
tb [Sun, 1 Oct 2023 08:29:12 +0000 (08:29 +0000)]
Improve a code comment in the EXAMPLES section

14 months agoRefer to RFC 3779, 2.1.2 for encoding of ranges
tb [Sun, 1 Oct 2023 08:23:58 +0000 (08:23 +0000)]
Refer to RFC 3779, 2.1.2 for encoding of ranges

Mention sections 2.1.1 and 2.1.2 in STANDARDS

14 months agoPoint out that the result of IPAddressRange_new() is an invalid range
tb [Sun, 1 Oct 2023 08:17:52 +0000 (08:17 +0000)]
Point out that the result of IPAddressRange_new() is an invalid range
since it should be a prefix.

14 months agoencoding -> decoding for d2i
tb [Sun, 1 Oct 2023 05:20:41 +0000 (05:20 +0000)]
encoding -> decoding for d2i

14 months agoAdd an empty line
tb [Sun, 1 Oct 2023 04:48:39 +0000 (04:48 +0000)]
Add an empty line

14 months agoReorder list of additional validation checks needed
tb [Sat, 30 Sep 2023 19:07:38 +0000 (19:07 +0000)]
Reorder list of additional validation checks needed

14 months agoSwitch copyright year to 2023.
tb [Sat, 30 Sep 2023 18:16:44 +0000 (18:16 +0000)]
Switch copyright year to 2023.

Apparently I should have used 2023 despite sharing versions of these
files with several people under this license (and thus permitting them
to redistribute and share with the public). It makes no sense to me,
but shrug.

14 months agoUse addrblocks for .Fa
tb [Sat, 30 Sep 2023 16:01:18 +0000 (16:01 +0000)]
Use addrblocks for .Fa

14 months agoavoid using the string "a" without markup as a placeholder
schwarze [Sat, 30 Sep 2023 14:29:41 +0000 (14:29 +0000)]
avoid using the string "a" without markup as a placeholder
where that feels potentially confusing,
and add one missing .Pp macro; no change of meaning

14 months agoconsistently use "allow_inherit" for the argument name
schwarze [Sat, 30 Sep 2023 14:26:09 +0000 (14:26 +0000)]
consistently use "allow_inherit" for the argument name
and fix whitespace on one text line; no change of meaning

14 months agodrop one pair of needless parentheses
schwarze [Sat, 30 Sep 2023 14:24:00 +0000 (14:24 +0000)]
drop one pair of needless parentheses
and polish one wording; no change of meaning

14 months agoremove a useless repetition of a function name
schwarze [Sat, 30 Sep 2023 14:21:57 +0000 (14:21 +0000)]
remove a useless repetition of a function name
that was also followed by a bogus argument,
and fix one grammatical error; no change of meaning

14 months agopolish an awkward wording
schwarze [Sat, 30 Sep 2023 14:12:40 +0000 (14:12 +0000)]
polish an awkward wording
and capitalize "AFI" where is does not refer to the function argument;
no change of meaning

14 months agotwo instances of missing .Fa macros
schwarze [Sat, 30 Sep 2023 14:10:56 +0000 (14:10 +0000)]
two instances of missing .Fa macros
and some missing escaping of HYPHEN-MINUS; no text change

14 months agofix one copy and paste error: d2i_*() decode rather than encode;
schwarze [Sat, 30 Sep 2023 13:58:29 +0000 (13:58 +0000)]
fix one copy and paste error: d2i_*() decode rather than encode;
plus some minor markup and punctuation fixes

14 months agogarbage collect two stray words, no change of meaning
schwarze [Sat, 30 Sep 2023 13:51:00 +0000 (13:51 +0000)]
garbage collect two stray words, no change of meaning

14 months agolist tracepoints directly in kdump.1 instead of pointing to ktrace.1
naddy [Sat, 30 Sep 2023 13:03:40 +0000 (13:03 +0000)]
list tracepoints directly in kdump.1 instead of pointing to ktrace.1

Also add a note to the respective section in kdump.1, ktrace.1, and
ltrace.1 to keep in sync with each other; suggested by schwarze@.

ok deraadt@ schwarze@

15 months agoReplace kernel lock with mutex in ixl(4) media status.
bluhm [Fri, 29 Sep 2023 19:44:47 +0000 (19:44 +0000)]
Replace kernel lock with mutex in ixl(4) media status.

Witness found that sc_atq_mtx mutex is held when kernel lock is
acquired.  This might cause a deadlock.  Protect sc_media_status
and sc_media_active with the link state mutex instead.  Global
fields ifm->ifm_status and ifm->ifm_active are still protected by
kernel lock.

OK tobhe@

15 months agoMake sure pfkeyv2_parsemessage() only returns 0 if the message was
tobhe [Fri, 29 Sep 2023 18:45:42 +0000 (18:45 +0000)]
Make sure pfkeyv2_parsemessage() only returns 0 if the message was
successfully validated.  Decline all messages from userland that contain
errnos and remove unneeded special handling for type SADB_X_PROMISC.

ok bluhm@

15 months agoOnly forward validated pfkey messages to promiscuous listeners.
tobhe [Fri, 29 Sep 2023 18:40:08 +0000 (18:40 +0000)]
Only forward validated pfkey messages to promiscuous listeners.
Fixes a bunch of crashes with ipsecctl -m.

ok bluhm@

15 months agobump version to 7.4.0
op [Fri, 29 Sep 2023 18:30:14 +0000 (18:30 +0000)]
bump version to 7.4.0

15 months agosync
deraadt [Fri, 29 Sep 2023 18:29:35 +0000 (18:29 +0000)]
sync

15 months agoRevert previous commit; botched testing meant that I missed USB device no
kettenis [Fri, 29 Sep 2023 17:30:35 +0000 (17:30 +0000)]
Revert previous commit; botched testing meant that I missed USB device no
longer attach to the USB 2.0 ports.

15 months agoAllow IP addresses to be specified in a URI.
beck [Fri, 29 Sep 2023 15:53:59 +0000 (15:53 +0000)]
Allow IP addresses to be specified in a URI.

Our checking here was a bit too aggressive, and did not permit an
IP address in a URI. IP's in a URI are allowed for things like CRLdp's
AIA, SAN URI's etc.). The check for this was also slightly flawed as
we would permit an IP if memory allocation failed while checking for
an IP.

Correct both issues.

ok tb@

15 months agoNewer versions of U-Boot may disable the USB PHYs and gate their clocks.
kettenis [Fri, 29 Sep 2023 15:51:48 +0000 (15:51 +0000)]
Newer versions of U-Boot may disable the USB PHYs and gate their clocks.
Add support for the rk3399 to rkusbphy(4) and implement support for the
required clocks.

ok kevlo@

15 months agoSome wording tweaks to make things a bit more precise.
tb [Fri, 29 Sep 2023 15:41:06 +0000 (15:41 +0000)]
Some wording tweaks to make things a bit more precise.

15 months agoExtend single_thread_set() mode with additional flag attributes.
claudio [Fri, 29 Sep 2023 12:47:34 +0000 (12:47 +0000)]
Extend single_thread_set() mode with additional flag attributes.

The mode can now be or-ed with SINGLE_DEEP or SINGLE_NOWAIT to alter
the behaviour of single_thread_set(). This allows explicit control
of the SINGLE_DEEP behaviour.

If SINGLE_DEEP is set the deep flag is passed to the initial check call
and by that the check will error out instead of suspending (SINGLE_UNWIND)
or exiting (SINGLE_EXIT). The SINGLE_DEEP flag is required in calls to
single_thread_set() outside of userret. E.g. at the start of sys_execve
because the proc is not allowed to call exit1() in that location.

SINGLE_NOWAIT skips the wait at the end of single_thread_set() and therefor
returns BEFORE all threads have been parked. Currently this is only used by
the ptrace code and should not be used anywhere else. Not waiting for all
threads to settle is asking for trouble.

This solves an issue by using SINGLE_UNWIND in the coredump case where
the code should actually exit in case another thread crashed moments earlier.
Also the SINGLE_UNWIND in pledge_fail() is now marked SINGLE_DEEP since
the call to pledge_fail() is for sure not at the kernel boundary.

OK mpi@

15 months agoFix a wrong tag and work around an ugly linebreak
tb [Fri, 29 Sep 2023 09:28:21 +0000 (09:28 +0000)]
Fix a wrong tag and work around an ugly linebreak

15 months agosync
tb [Fri, 29 Sep 2023 08:59:04 +0000 (08:59 +0000)]
sync

15 months agoDocument X509v3_{addr,asid}_validate_{path,resource_set}(3)
tb [Fri, 29 Sep 2023 08:57:49 +0000 (08:57 +0000)]
Document X509v3_{addr,asid}_validate_{path,resource_set}(3)

These were the last four RFC 3779 things that check_complete.pl x509v3
complained about. I will surely tweak and try to improve a few things
in the coming days, but the pages should now be stable enough that
review efforts will likely not be wasted. Any feedback appreciated.

15 months agoAppease coverity
tb [Fri, 29 Sep 2023 06:53:05 +0000 (06:53 +0000)]
Appease coverity

This is a static pointer, so it ain't ever NULL, but shrug

15 months agoadd a missing .Fa macro
schwarze [Thu, 28 Sep 2023 17:00:21 +0000 (17:00 +0000)]
add a missing .Fa macro

15 months agofix two wrong function names in the description;
schwarze [Thu, 28 Sep 2023 16:41:36 +0000 (16:41 +0000)]
fix two wrong function names in the description;
from <Lucas at sexy dot is>

15 months agoFix error message
tb [Thu, 28 Sep 2023 14:55:48 +0000 (14:55 +0000)]
Fix error message

15 months agoDon't leak ctx on failure
tb [Thu, 28 Sep 2023 14:54:39 +0000 (14:54 +0000)]
Don't leak ctx on failure

15 months agosync
tb [Thu, 28 Sep 2023 12:37:21 +0000 (12:37 +0000)]
sync

15 months agoDocument X509v3_{addr,asid}_subset.3 take two (missed cvs add)
tb [Thu, 28 Sep 2023 12:36:36 +0000 (12:36 +0000)]
Document X509v3_{addr,asid}_subset.3 take two (missed cvs add)

First RFC 3779 page without a BUG section. It could have one, but I'm
in a lenient mood right now. Maybe it's just that this is bad but not
quite as bad as EVP.

15 months agoDocument X509v3_{addr,asid}_subset.3
tb [Thu, 28 Sep 2023 12:35:31 +0000 (12:35 +0000)]
Document X509v3_{addr,asid}_subset.3

First RFC 3779 page without a BUG section. It could have one, but I'm
in a lenient mood right now. Maybe it's just that this is bad but not
quite as bad as EVP.

15 months agoAdd more regress coverage for EVP_CIPHER_CTX_iv_length()
tb [Thu, 28 Sep 2023 11:39:35 +0000 (11:39 +0000)]
Add more regress coverage for EVP_CIPHER_CTX_iv_length()

Awesome: the IV length for GCM is only bounded by INT_MAX or malloc limits.

In the absence of an overflowing issue tracker, I'm labeling this
"good first issue", "help wanted" here.

15 months agoCheck that EVP_CIPHER_CTX_iv_length() matches what was set
tb [Thu, 28 Sep 2023 11:35:10 +0000 (11:35 +0000)]
Check that EVP_CIPHER_CTX_iv_length() matches what was set

This really only covers AES-GCM.

From beck

15 months agoFix EVP_CIPHER_CTX_iv_length()
tb [Thu, 28 Sep 2023 11:29:10 +0000 (11:29 +0000)]
Fix EVP_CIPHER_CTX_iv_length()

In today's episode of "curly nonsense from EVP land" we deal with a quite
harmless oversight and a not too bad suboptimal fix, relatively speaking.

At some point EVP_CIPHER_{CCM,GCM}_SET_IVLEN was added. It modified some
object hanging off of EVP_CIPHER. However, EVP_CIPHER_CTX_iv_length() wasn't
taught about this and kept returning the hardcoded default value on the
EVP_CIPHER. Once it transpired that a doc fix isn't going to cut it, this
was fixed. And of course it's easy to fix: you only have to dive through
about three layers of EVP, test and set a flag and handle a control in a
couple methods.

The upstream fix was done poorly and we begrudgingly have to match the API:
the caller is expected to pass a raw pointer next to a 0 length along with
EVP_CIPHER_GET_IV_LENGTH and the control handler goes *(int *)ptr = length
in full YOLO mode. That's never going to be an issue because of course the
caller will always pass a properly aligned pointer backing a sufficient
amount of memory. Yes, unlikely to be a real issue, but it could have been
done with proper semantics and checks without complicating the code. But
why do I even bother to complain? We're used to this.

Of note here is that there was some pushback painting other corners of a
bikeshed until the reviewer gave up with a resigned

  That kind of changes the semantics and is one extra complexity level,
  but [shrug] ok...

Anyway, the reason this matters now after so many years is that rust-openssl
has an assert, notably added in a +758 -84 commit with the awesome message
"Docs" that gets triggered by recent tests added to py-cryptography.

Thanks to Alex Gaynor for reporting this. Let me take the opportunity to
point out that pyca contributed to improve rust-openssl, in particular its
libressl support, quite a bit. That's much appreciated and very noticeable.

Regress coverage to follow in subsequent commits.

Based on OpenSSL PR #9499 and issue #8330.

ok beck jsing

PS: A few macros were kept internal for now to avoid impact on the release
cycle that is about to finish. They will be exposed after release.

15 months agowhitespace
tb [Thu, 28 Sep 2023 08:21:43 +0000 (08:21 +0000)]
whitespace

15 months agoPrep for OpenBGPD 8.2
claudio [Thu, 28 Sep 2023 07:02:50 +0000 (07:02 +0000)]
Prep for OpenBGPD 8.2

15 months agoEnforce NUL termination of the neighbor shutdown reason sent from
claudio [Thu, 28 Sep 2023 07:01:26 +0000 (07:01 +0000)]
Enforce NUL termination of the neighbor shutdown reason sent from
bgpctl before calling strlcpy() with that string.
OK tb@ some long time ago

15 months agoplaform -> platform
jsg [Thu, 28 Sep 2023 03:34:32 +0000 (03:34 +0000)]
plaform -> platform

15 months agodon't mention what language functions are implemented in
jsg [Thu, 28 Sep 2023 01:51:00 +0000 (01:51 +0000)]
don't mention what language functions are implemented in
remove a line relating to the 2BSD libNS
ok schwarze@

15 months agoDon't register firmware already in /var/db/pkg
afresh1 [Thu, 28 Sep 2023 01:18:52 +0000 (01:18 +0000)]
Don't register firmware already in /var/db/pkg

If installing firmware with `make install` from a port, it doesn't register
properly by adding "@option firmware" to the packing list, this means we ignore
that it is installed and reinstall it over and over with the registration
ending up in a tmpdir named directory inside the existing directory in
/var/db/pkg.

Unfortunately I don't know of a good way to automatically clean up from that,
so we just print a message after installing the actual firmware.

Reported by job@
No complaints about the patch on tech@ for several weeks.

15 months agoExit successfully at the end of fw_update
afresh1 [Thu, 28 Sep 2023 00:52:16 +0000 (00:52 +0000)]
Exit successfully at the end of fw_update

Otherwise the exit status depends on whether we kept any firmware.

Reported by Brian Conway <bconway () rcesoftware ! com>
The clean solution suggested by guenther@

15 months agoDownload firmware to LOCALSRC when using filenames
afresh1 [Thu, 28 Sep 2023 00:45:22 +0000 (00:45 +0000)]
Download firmware to LOCALSRC when using filenames

Previously if you did: fw_update otus-firmware-1.0p1.tgz
and that firmware didn't exist in the current directory,
we would download that firmware into the current directory.
Which is not the expected outcome.

15 months agoFull rewrite of lang/ruby port module documentation
jeremy [Wed, 27 Sep 2023 21:46:17 +0000 (21:46 +0000)]
Full rewrite of lang/ruby port module documentation

Restructure so that the most important information is first.
Describe how it modifies bsd.port.mk variables.
Document all public variables set by the module.

Rewrite prompted by feedback from schwarze@
Multiple rounds of review and many fixes from schwarze@
OK schwarze@

15 months agoUse a dynamically-allocated line buffer and resize as needed.
millert [Wed, 27 Sep 2023 21:06:33 +0000 (21:06 +0000)]
Use a dynamically-allocated line buffer and resize as needed.
Fixes a buffer overflow for lines over 2048 bytes.
Problem reported by Crystal Kolipe.  OK deraadt@

15 months agofix punctuation and formatting in AUTHORS;
jmc [Wed, 27 Sep 2023 20:30:19 +0000 (20:30 +0000)]
fix punctuation and formatting in AUTHORS;

15 months agoWe're not interested in the core dump, so prevent it. Also catch
otto [Wed, 27 Sep 2023 17:06:42 +0000 (17:06 +0000)]
We're not interested in the core dump, so prevent it.  Also catch
SIGABRT, to avoid the "Abort trap" message, which confuses me sometimes
until I realize it's the purpose of this test to abort.

15 months agodisable POOL_DEBUG for release
deraadt [Wed, 27 Sep 2023 15:18:31 +0000 (15:18 +0000)]
disable POOL_DEBUG for release

15 months agodocument the obvious
espie [Wed, 27 Sep 2023 12:24:22 +0000 (12:24 +0000)]
document the obvious

15 months agoRFC 3779: stop pretending we support AFIs other than IPv4 and IPv6
tb [Wed, 27 Sep 2023 11:29:22 +0000 (11:29 +0000)]
RFC 3779: stop pretending we support AFIs other than IPv4 and IPv6

This code is a complete bug fest and using it with any other AFI is
downright dangerous. Such don't arise in this context in practice.

ok claudio jsing

15 months agoMatch GRACEFUL_SHUTDOWN only from ebgp sessions as specified by
claudio [Wed, 27 Sep 2023 10:49:21 +0000 (10:49 +0000)]
Match GRACEFUL_SHUTDOWN only from ebgp sessions as specified by
RFC8326 Section 4.1.
OK sthen@ phessler@ job@

15 months agoVarious small tweaks in the RFC 3779 docs
tb [Wed, 27 Sep 2023 08:46:46 +0000 (08:46 +0000)]
Various small tweaks in the RFC 3779 docs

Mention a few more bugs and unify manpage descriptions

15 months agoextent USE_LLD to Yes/No/ports values.
semarie [Wed, 27 Sep 2023 08:20:50 +0000 (08:20 +0000)]
extent USE_LLD to Yes/No/ports values.

'ports' permits to force the use of ld.lld from lang/clang module.

ok landry@

15 months agosync
phessler [Wed, 27 Sep 2023 07:52:48 +0000 (07:52 +0000)]
sync

15 months agoadd a manpage for the qcrng(4) driver
phessler [Wed, 27 Sep 2023 07:50:46 +0000 (07:50 +0000)]
add a manpage for the qcrng(4) driver

reminded by pamela@

15 months agoCope with progname now being present in vmd errors messages.
anton [Wed, 27 Sep 2023 05:18:40 +0000 (05:18 +0000)]
Cope with progname now being present in vmd errors messages.

15 months agosync
tb [Wed, 27 Sep 2023 04:54:49 +0000 (04:54 +0000)]
sync

15 months agosync
deraadt [Wed, 27 Sep 2023 02:13:18 +0000 (02:13 +0000)]
sync

15 months agoFix reference to x509v3.cnf(5) bis
tb [Tue, 26 Sep 2023 21:18:01 +0000 (21:18 +0000)]
Fix reference to x509v3.cnf(5) bis

15 months agoFix reference to x509v3.cnf(5)
tb [Tue, 26 Sep 2023 21:17:03 +0000 (21:17 +0000)]
Fix reference to x509v3.cnf(5)

15 months agosync
tb [Tue, 26 Sep 2023 20:44:16 +0000 (20:44 +0000)]
sync

15 months agoDocument X509v3_{addr,asid}_inherits(3)
tb [Tue, 26 Sep 2023 20:42:45 +0000 (20:42 +0000)]
Document X509v3_{addr,asid}_inherits(3)

Also note another bug in X509v3_asid_{canonize,is_canonical}(3).

15 months agoUse existing `audio_lock' mutex(9) to make `midi{read,write}_filtops' MP
mvs [Tue, 26 Sep 2023 19:55:24 +0000 (19:55 +0000)]
Use existing `audio_lock' mutex(9) to make `midi{read,write}_filtops' MP
safe. knote_locked(9) will not grab kernel lock, so call it directly from
interrupt handlers instead of scheduling software interrupts.

feedback and ok ratchov