Please take it elsewhere until you have something more than words.
And when you have more than words, please put it on a a web site
and do nothing more than tell people once.
Ian, you are abusing these forums, and you know it. Show some damn
respect for the number of people on the receiving end o
On Mon, Oct 20, 2014 at 8:10 PM, Theo de Raadt wrote:
> You are off-topic for this mailing list. Please go discuss it
> elsewhere.
Theo,
Does this include my questions on tech? I still want to do this, even
of a hundred little pricks don't understand what it is.
I think I can make a very tidy
This looks correct and matches what svc_run() does.
- todd
On 2014/10/20 14:49, Stefan Sperling wrote:
> On Mon, Oct 20, 2014 at 01:22:05PM +0100, Stuart Henderson wrote:
> > Any comments on the diff in this?
>
> Not sure why you're singling out pppoe(4). Don't other interfaces
> that use sppp's IPv6CP have the same problem? Are there no others?
ah, good
Hi everyone,
I've tested this on my home setup and it seems to work.
Let me know if anything else needs working.
Cheers,
Dimitris
===
RCS file: /cvs/src/sbin/mountd/mountd.c,v
retrieving revision 1.76
diff -u -p -r1.76 mountd.c
---
On Mon, Oct 20, 2014 at 01:22:05PM +0100, Stuart Henderson wrote:
> Any comments on the diff in this?
Not sure why you're singling out pppoe(4). Don't other interfaces
that use sppp's IPv6CP have the same problem? Are there no others?
Generally, I think it would be better to keep IPv6 disabled by
Any comments on the diff in this?
On 2014/10/08 13:31, Stuart Henderson wrote:
> On 2014/10/08 11:10, Stefan Sperling wrote:
> > On Tue, Oct 07, 2014 at 11:42:10PM -0400, Brad Smith wrote:
> > > On 07/10/14 10:03 PM, Stuart Henderson wrote:
> > > >Since it's non-obvious how to setup pppoe for v6
On Mon, Oct 20, 2014 at 01:57:44PM +0400, Dmitry Eremin-Solenikov wrote:
> Hello,
>
> It took a while longer than I expected, but I think that
> the GOST ciphers implementation is complete now
> at https://github.com/libressl-portable/openbsd/pull/6
>
> I still expect issues when Windows GOST CSP
tested this with your other patch. i applied both patches to the kernel at the
same time, so test results the same as with the other patch (good for softraid
at least).
On Mon, 20 Oct 2014 10:49:35 +1000 David Gwynne wrote:
> pools lock themselves, we just gotta tell them how hard.
>
> can someo
> On 20 Oct 2014, at 9:15 pm, thev...@openmailbox.org wrote:
>
> i had a test install i could sacrifice, so i gave it a shot. this install had
> -current base installed. i booted the patched kernel, and installed
> comp56.tgz.
> everything seemed to work fine. rebooted into my non-test install,
i had a test install i could sacrifice, so i gave it a shot. this install had
-current base installed. i booted the patched kernel, and installed comp56.tgz.
everything seemed to work fine. rebooted into my non-test install, mounted the
test crypto partition, and sha1'd every hundredth file and com
On Thu, October 16, 2014 11:40 pm, Patrick Wildt wrote:
> I do believe that this is a pmap issue.
>
> I just got hands on an Allwinner A20 and suffered the same issues:
> pool_setlowat crashing randomly, same for ahci and so on.
>
> I believe we are not syncing the PTEs correctly.
>
> Here?s the sn
Hello,
It took a while longer than I expected, but I think that
the GOST ciphers implementation is complete now
at https://github.com/libressl-portable/openbsd/pull/6
I still expect issues when Windows GOST CSP vendors
will work on TLS 1.2 implementation (up to now they
only provide TLS 1.0). How
13 matches
Mail list logo