Typo in Tetris

2014-08-03 Thread Sam Hart
Absolutely trivial, but none the less ... --- tetris-orig/shapes.c2014-08-03 14:12:09.0 +0100 +++ tetris/shapes.c 2014-08-03 14:12:26.0 +0100 @@ -76,7 +76,7 @@ }; /* - * Return true iff the given shape fits in the given position, + * Return true if the given shape fi

Re: LibreSSL 2.0.4 released

2014-08-03 Thread Jan Engelhardt
On Monday 2014-08-04 01:36, Bob Beck wrote: >We have released LibreSSL 2.0.4, which should be arriving n the >LibreSSL directory of an OpenBSD mirror near you very soon. > >This version includes more portability changes, as well as other work. >most noticable may be the deletion of the of the SRP

Re: LibreSSL: why is support for CMS disabled?

2014-08-03 Thread Bob Beck
Oops. Derp derp... On 3 Aug 2014 17:53, "Philip Guenther" wrote: > On Sun, Aug 3, 2014 at 11:07 AM, Bob Beck wrote: > >> Security problems: CRIME, BREACH, and other crud. Compression was >> slapped into TLS without any thought to the consequences or side >> effects. - effecively doing this in TL

Re: LibreSSL: why is support for CMS disabled?

2014-08-03 Thread Philip Guenther
On Sun, Aug 3, 2014 at 11:07 AM, Bob Beck wrote: > Security problems: CRIME, BREACH, and other crud. Compression was > slapped into TLS without any thought to the consequences or side > effects. - effecively doing this in TLS should not be considered a > mature protocol, and nobody who takes secu

LibreSSL 2.0.4 released

2014-08-03 Thread Bob Beck
We have released LibreSSL 2.0.4, which should be arriving n the LibreSSL directory of an OpenBSD mirror near you very soon. This version includes more portability changes, as well as other work. most noticable may be the deletion of the of the SRP code (which has not been enabled in any LibreSSL r

Re: LibreSSL: why is support for CMS disabled?

2014-08-03 Thread Bob Beck
Security problems: CRIME, BREACH, and other crud. Compression was slapped into TLS without any thought to the consequences or side effects. - effecively doing this in TLS should not be considered a mature protocol, and nobody who takes security seriously should use that until it is - if ever. On

[PATCH] rcs: don't use lock and unlock in the same command

2014-08-03 Thread Fritjof Bornebusch
Hi tech, the OpenRCS rcs command produces the following output if -l and -u is used in the same command: $ rcs -l1.1 -u1.1 foo.txt RCS file: foo.txt,v 1.1 locked 1.1 unlocked $ rcs -u1.1 -l1.1 foo.txt RCS file: foo.txt,v 1.1 locked 1.1 unlocked I've looked at GnuRCS and it has another way to

LibreSSL: why is support for CMS disabled?

2014-08-03 Thread Dmitry Eremin-Solenikov
Hello, One of RFCs defines GOST usage with CMS messages. While testing, I noticed that CMS is disabled in LibreSSL. Is it just 'not cleaned' or is there another reason to have it disabled? -- With best wishes Dmitry -- With best wishes Dmitry

[PATCH]delete xfree() from sndiod

2014-08-03 Thread Fritjof Bornebusch
Hi tech, during my search after other xfree() implementations, I saw that xfree() in sndiod is just a wrapper for free() without any other conditions, like NULL check. fritjof Index: abuf.c === RCS file: /cvs/src/usr.bin/sndiod/ab

Re: [PATCH] Better overflow handling in rcstime.c

2014-08-03 Thread Dimitris Papastamos
On Sat, Aug 02, 2014 at 11:07:30PM +0200, Fritjof Bornebusch wrote: > On Wed, Jul 30, 2014 at 09:26:54PM +0100, Dimitris Papastamos wrote: > > On Wed, Jul 30, 2014 at 10:19:19PM +0200, Fritjof Bornebusch wrote: > > > + tzone = (int)strtonum(h, -23, 23, &errstr); > > > > The explicit cast i