Hi,
Revision 1.29 to usr.bin/telnet/sys_bsd.c breaks telnet for me.
The issue is that return is not sent when entering a password, when
connected by telnet to a device[1]. The patch below [3] reverts the
change and telnet then works again.
This change does not solve the problem [2] that brou
Hi all,
Following the 'a' -> 'b' default Blowfish hash change[0], some examples
got updated[1], while others remained with the older minor 'a'.
Diffs below bring the remaining ones up to date.
I had also increased the rounds from old default of 6 to current 8
(where appropriate) and brought a co
On Fri, 20 Mar 2015 10:35:07 -0600
"Todd C. Miller" wrote:
> We do not typically document the historic usage. However, in this
> case we might make an exception since the old and new syntax are
> semantically different (absolute vs. increment).
Up to you... The only thing i would push for, is
In
We do not typically document the historic usage. However, in this
case we might make an exception since the old and new syntax are
semantically different (absolute vs. increment). I've adapted your
diff as follows.
- todd
Index: renice.c
Hello tech@,
this bugs me for a while now, so I'm sendig this diff in for consideration.
Brings renice(8) manpage and code and POSIX definition more in sync by:
- makeing the code increment the priority instead of setting it when -n is used.
- documenting the backwards compatible "set priority" opt
OK
> On 20.03.2015, at 17:40, Stefan Sperling wrote:
>
> At EuroBSDCon last year Mike Larkin gave me an AR5211 ath(4) device
> which fails at WEP/WPA. For every encrypted frame it sends, a decryption
> failure shows up in netstat -W on the AP.
>
> This diff ports a chunk from the AR5212 code wh
At EuroBSDCon last year Mike Larkin gave me an AR5211 ath(4) device
which fails at WEP/WPA. For every encrypted frame it sends, a decryption
failure shows up in netstat -W on the AP.
This diff ports a chunk from the AR5212 code which disables hardware
WEP key table entries. This fixes the issue fo