Displaying 1 50 of 804,102 commits (0.033s)

NetBSD — crypto/external/bsd/openssh/dist myproposal.h sshconnect2.c

re-enable the none cipher, now that it has been tested.

NetBSD — doc CHANGES

    add some recent Allwinner changes -- PMU (axp20x, axp22x), A31 SoC changes, P2WI 
driver, OTG support for A10/A20.
Delta File
+14 -1 doc/CHANGES
+14 -1 1 file

NetBSD — doc CHANGES

AllWinner -> Allwinner
Delta File
+4 -4 doc/CHANGES
+4 -4 1 file

NetBSD — sys/arch/evbarm/conf HUMMINGBIRD_A31

get rid of VERBOSE_INIT_ARM

NetBSD — sys/arch/arm/allwinner awin_reg.h

add AWIN_A31_AHB_GATING0_GMAC and A31 SDMMC pinsets
Delta File
+5 -0 sys/arch/arm/allwinner/awin_reg.h
+5 -0 1 file

NetBSD — distrib/sets/lists/debug mi, distrib/sets/lists/tests mi

t_mcast is not a rump test (but should be).

NetBSD — sbin/ifconfig ifconfig.8 af_inet6.c, sys/netinet6 in6.c

Remove the ability for userland to toggle IN6_IFF_TENTATIVE.
Preserve IN6_IFF_TENTATIVE when updating address flags.

NetBSD — sys/compat/common vfs_syscalls_30.c

simplify

NetBSD — sys/ufs/chfs chfs_vfsops.c

simplify.
Delta File
+5 -6 sys/ufs/chfs/chfs_vfsops.c
+5 -6 1 file

NetBSD — crypto/external/bsd/openssh/dist umac.c

Try to make this buildable on big endian machines.

NetBSD — sys/compat/svr4 svr4_stat.c, sys/dev/dm dm_target_snapshot.c

Pullup the following revisions, requested by maxv in ticket #148:

sys/compat/svr4/svr4_stat.c                     1.70
sys/dev/dm/dm_target_snapshot.c                 1.17
sys/dev/if_ndis/if_ndis_pci.c                   1.20
sys/fs/smbfs/smbfs_smb.c                        1.45
sys/ufs/ext2fs/ext2fs_readwrite.c               1.65

Various fixes: two memory leaks, a typo, a dead compiler condition and
unused macros, respectively in if_ndis and dm, smbfs, svr4 and ext2fs.

NetBSD — doc 3RDPARTY CHANGES

Note import of openresolv-3.6.0
Delta File
+3 -3 doc/3RDPARTY
+2 -1 doc/CHANGES
+5 -4 2 files

NetBSD — external/bsd/openresolv/dist resolvconf.conf.5.in resolvconf.8.in

Sync

NetBSD — external/bsd/openresolv/dist resolvconf.in resolvconf.conf.5.in

Import openresolv-3.6.0 with the following changes:

  *  dnsmasq subscriber no longer moans if it hasn't written a pidfile
  *  Ensure that name_server_blacklist works for more than one option.
     Thanks to Frederic Barthelery.
  *  unbound_insecure can disable DNSSEC for all domains processed.
  *  local_nameservers now defaults to
     127.* 0.0.0.0 255.255.255.255 ::1
     and is used instead of a hard coded list.
  *  Allow the disabling of resolvconf or optionally an individual
     subscriber.
  *  Don't wait around trying to create a lock if we don't have
     permission.
  *  resolv_conf_passthrough=NULL will update resolv.conf to match
     only what is configured in resolvconf.conf and ignore any
     interface configuration.

NetBSD — external/bsd/openresolv/dist resolvconf.in libc.in

Import openresolv-3.6.0 with the following changes:

  *  dnsmasq subscriber no longer moans if it hasn't written a pidfile
  *  Ensure that name_server_blacklist works for more than one option.
     Thanks to Frederic Barthelery.
  *  unbound_insecure can disable DNSSEC for all domains processed.
  *  local_nameservers now defaults to
     127.* 0.0.0.0 255.255.255.255 ::1
     and is used instead of a hard coded list.
  *  Allow the disabling of resolvconf or optionally an individual
     subscriber.
  *  Don't wait around trying to create a lock if we don't have
     permission.
  *  resolv_conf_passthrough=NULL will update resolv.conf to match
     only what is configured in resolvconf.conf and ignore any
     interface configuration.

NetBSD — tools/gcc gcc-version.mk

Note new date for version - this is the import date.
Delta File
+2 -2 tools/gcc/gcc-version.mk
+2 -2 1 file

NetBSD — sys/kern kern_prot.c

The userland namelen is size_t, but the kernel holds it in an int. The
sizeof(login) test implicitly interprets 'namelen' as unsigned, which
means that negative values get kicked anyway. Still this is fragile, so:
        int -> size_t
Delta File
+3 -3 sys/kern/kern_prot.c
+3 -3 1 file

NetBSD — sys/arch/arm/arm32 pmap.c

Reduce code a little. Reviewed by gimpy.
Delta File
+6 -19 sys/arch/arm/arm32/pmap.c
+6 -19 1 file

NetBSD — sys/compat/common vfs_syscalls_30.c

Memory leak, triggerable from root only.

Found by my code scanner.

ok christos@

NetBSD — sys/ufs/chfs chfs_vfsops.c

Memory leak.

Found by my code scanner.

ok christos@
Delta File
+5 -2 sys/ufs/chfs/chfs_vfsops.c
+5 -2 1 file

NetBSD — crypto/external/bsd/openssh/dist monitor_wrap.c sshconnect2.c, crypto/external/bsd/openssh/lib Makefile

- remove some more jpake remnants.
- try to fix umac; probably still broken on hosts that require strict
  alignment, but it is still a start.

NetBSD — sys/arch/arm/allwinner awin_io.c

add SDMMC1 SDMMC2 and SDMM3 for A31
Delta File
+4 -1 sys/arch/arm/allwinner/awin_io.c
+4 -1 1 file

NetBSD — sys/arch/evbarm/conf HUMMINGBIRD_A31

enable awge

NetBSD — sys/arch/evbarm/awin awin_machdep.c

add some hummingbird A31 motg pins

NetBSD — sys/arch/evbarm/awin awin_machdep.c

    allow awge mac address to be overriden by uEnv bootargs; set 
awge0.mac-address=XX:XX:XX:XX:XX:XX
Delta File
+20 -2 sys/arch/evbarm/awin/awin_machdep.c
+20 -2 1 file

NetBSD — sys/dev/ic dwc_gmac.c

if we read an insane mac address from the chip, dont attach
Delta File
+8 -1 sys/dev/ic/dwc_gmac.c
+8 -1 1 file

NetBSD — doc CHANGES-5.2.3

1927
Delta File
+62 -1 doc/CHANGES-5.2.3
+62 -1 1 file

NetBSD — crypto/dist/openssl/apps s_client.c, crypto/dist/openssl/crypto constant_time_test.c constant_time_locl.h

Apply patch (requested by spz in ticket #1927):
Apply OpenSSL security fixes derived from the diff between
OpenSSL 1.0.0n and 1.0.0o, fixing CVE-2014-3567, CVE-2014-3568,
and adding POODLE mitigation via support for TLS_FALLBACK_SCSV.

NetBSD — doc CHANGES-5.1.5

1927
Delta File
+62 -1 doc/CHANGES-5.1.5
+62 -1 1 file

NetBSD — crypto/dist/openssl/apps s_client.c, crypto/dist/openssl/crypto constant_time_test.c constant_time_locl.h

Apply patch (requested by spz in ticket #1927):
Apply OpenSSL security fixes derived from the diff between
OpenSSL 1.0.0n and 1.0.0o, fixing CVE-2014-3567, CVE-2014-3568,
and adding POODLE mitigation via support for TLS_FALLBACK_SCSV.

NetBSD — doc CHANGES-5.3

1927
Delta File
+62 -1 doc/CHANGES-5.3
+62 -1 1 file

NetBSD — crypto/dist/openssl/apps s_client.c, crypto/dist/openssl/crypto constant_time_test.c constant_time_locl.h

Apply patch (requested by spz in ticket #1927):
Apply OpenSSL security fixes derived from the diff between
OpenSSL 1.0.0n and 1.0.0o, fixing CVE-2014-3567, CVE-2014-3568,
and adding POODLE mitigation via support for TLS_FALLBACK_SCSV.

NetBSD — doc CHANGES-6.1.6

ticket 1168
Delta File
+7 -1 doc/CHANGES-6.1.6
+7 -1 1 file

NetBSD — doc CHANGES-6.0.7

ticket 1168
Delta File
+8 -2 doc/CHANGES-6.0.7
+8 -2 1 file

NetBSD — doc CHANGES-6.2

ticket 1168
Delta File
+8 -1 doc/CHANGES-6.2
+8 -1 1 file

NetBSD — sys/compat/freebsd freebsd_sysctl.c

Pull up following revision(s) (requested by maxv in ticket #1168):
        sys/compat/freebsd/freebsd_sysctl.c: revision 1.17
I'm not sure reading from an unsanitized userland pointer is a good idea.
Some users might be tempted to give 0x01, in which case the kernel will
crash.
Delta File
+11 -6 sys/compat/freebsd/freebsd_sysctl.c
+11 -6 1 file

NetBSD — sys/compat/freebsd freebsd_sysctl.c

Pull up following revision(s) (requested by maxv in ticket #1168):
        sys/compat/freebsd/freebsd_sysctl.c: revision 1.17
I'm not sure reading from an unsanitized userland pointer is a good idea.
Some users might be tempted to give 0x01, in which case the kernel will
crash.
Delta File
+11 -6 sys/compat/freebsd/freebsd_sysctl.c
+11 -6 1 file

NetBSD — sys/compat/freebsd freebsd_sysctl.c

Pull up following revision(s) (requested by maxv in ticket #1168):
        sys/compat/freebsd/freebsd_sysctl.c: revision 1.17
I'm not sure reading from an unsanitized userland pointer is a good idea.
Some users might be tempted to give 0x01, in which case the kernel will
crash.
Delta File
+11 -6 sys/compat/freebsd/freebsd_sysctl.c
+11 -6 1 file

NetBSD — sys/compat/linux/common linux_uselib.c

Resource leak.

Found by my code scanner.

Tested by njoly@; ok njoly@ rmind@ on tech-kern@.
Delta File
+11 -10 sys/compat/linux/common/linux_uselib.c
+11 -10 1 file

NetBSD — sys/arch/arm/allwinner awin_gige.c

use correct gating reg on A31

NetBSD — lib/libc/gen utime.3

Do not use hard-coded values with ENAMETOOLONG, use symbolic constants
instead.
Delta File
+7 -3 lib/libc/gen/utime.3
+7 -3 1 file

NetBSD — doc 3RDPARTY CHANGES

new OpenSSH
Delta File
+3 -3 doc/3RDPARTY
+2 -1 doc/CHANGES
+5 -4 2 files

NetBSD — distrib/sets/lists/base ad.aarch64 ad.mips, distrib/sets/lists/debug ad.aarch64 ad.mips

bump libssh

NetBSD — etc/rc.d sshd

Add new keytype, replace duplicated code with loop
Delta File
+26 -38 etc/rc.d/sshd
+26 -38 1 file

NetBSD — crypto/external/bsd/openssh/dist blowfish.c bcrypt_pbkdf.c

add new files

NetBSD — crypto/external/bsd/openssh Makefile.inc, crypto/external/bsd/openssh/bin Makefile.inc

merge openssh-6.7

NetBSD — crypto/external/bsd/openssh/dist/moduli-gen moduli moduli.1024

Changes since OpenSSH 6.6
=========================

Potentially-incompatible changes

 * sshd(8): The default set of ciphers and MACs has been altered to
   remove unsafe algorithms. In particular, CBC ciphers and arcfour*
   are disabled by default.

   The full set of algorithms remains available if configured
   explicitly via the Ciphers and MACs sshd_config options.

 * sshd(8): Support for tcpwrappers/libwrap has been removed.

 * OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
   using the curve25519-sha256 at libssh.org KEX exchange method to fail
   when connecting with something that implements the specification
   correctly. OpenSSH 6.7 disables this KEX method when speaking to
   one of the affected versions.

New Features

 * Major internal refactoring to begin to make part of OpenSSH usable
   as a library. So far the wire parsing, key handling and KRL code
   has been refactored. Please note that we do not consider the API

    [335 lines not shown]

NetBSD — crypto/external/bsd/openssh/dist xmalloc.c version.h

Changes since OpenSSH 6.6
=========================

Potentially-incompatible changes

 * sshd(8): The default set of ciphers and MACs has been altered to
   remove unsafe algorithms. In particular, CBC ciphers and arcfour*
   are disabled by default.

   The full set of algorithms remains available if configured
   explicitly via the Ciphers and MACs sshd_config options.

 * sshd(8): Support for tcpwrappers/libwrap has been removed.

 * OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
   using the curve25519-sha256 at libssh.org KEX exchange method to fail
   when connecting with something that implements the specification
   correctly. OpenSSH 6.7 disables this KEX method when speaking to
   one of the affected versions.

New Features

 * Major internal refactoring to begin to make part of OpenSSH usable
   as a library. So far the wire parsing, key handling and KRL code
   has been refactored. Please note that we do not consider the API

    [335 lines not shown]

NetBSD — crypto/external/bsd/openssh/dist ssh-keygen.1 ssh-gss.h

Changes since OpenSSH 6.6
=========================

Potentially-incompatible changes

 * sshd(8): The default set of ciphers and MACs has been altered to
   remove unsafe algorithms. In particular, CBC ciphers and arcfour*
   are disabled by default.

   The full set of algorithms remains available if configured
   explicitly via the Ciphers and MACs sshd_config options.

 * sshd(8): Support for tcpwrappers/libwrap has been removed.

 * OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
   using the curve25519-sha256 at libssh.org KEX exchange method to fail
   when connecting with something that implements the specification
   correctly. OpenSSH 6.7 disables this KEX method when speaking to
   one of the affected versions.

New Features

 * Major internal refactoring to begin to make part of OpenSSH usable
   as a library. So far the wire parsing, key handling and KRL code
   has been refactored. Please note that we do not consider the API

    [335 lines not shown]

NetBSD — crypto/external/bsd/openssh/dist sshkey.c sshkey.h

Changes since OpenSSH 6.6
=========================

Potentially-incompatible changes

 * sshd(8): The default set of ciphers and MACs has been altered to
   remove unsafe algorithms. In particular, CBC ciphers and arcfour*
   are disabled by default.

   The full set of algorithms remains available if configured
   explicitly via the Ciphers and MACs sshd_config options.

 * sshd(8): Support for tcpwrappers/libwrap has been removed.

 * OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
   using the curve25519-sha256 at libssh.org KEX exchange method to fail
   when connecting with something that implements the specification
   correctly. OpenSSH 6.7 disables this KEX method when speaking to
   one of the affected versions.

New Features

 * Major internal refactoring to begin to make part of OpenSSH usable
   as a library. So far the wire parsing, key handling and KRL code
   has been refactored. Please note that we do not consider the API

    [335 lines not shown]