On Fri, May 19, 2017 at 08:39:09AM +0200, Anton Lindqvist wrote:
> Ping
>
morning.
please be patient!
jmc
> On Mon, May 15, 2017 at 07:41:56PM +0200, Anton Lindqvist wrote:
> > Hi,
> > The bufferevent_setwatermark function is not mentioned in event(3).
> > Maybe the function deserves to be doc
On Fri, May 19, 2017 at 08:34:54AM +0200, Michal Mazurek wrote:
> Now that it was commited, what remains is to convert tabs to spaces inside a
> literal block:
>
morning.
what's the reason for wanting this?
jmc
> Index: share/man/man5/pf.conf.5
> ===
Hi,
I did submit this problem[1] earlier but with an incomplete analysis and
fix. Here's a second attempt.
This does only occur when running ksh with emacs mode under tmux. How to
re-produce:
1. Run ksh under tmux.
2. Input the following characters, without spaces:
a (any character) ^B (back
Ping
On Mon, May 15, 2017 at 07:41:56PM +0200, Anton Lindqvist wrote:
> Hi,
> The bufferevent_setwatermark function is not mentioned in event(3).
> Maybe the function deserves to be documented under the "BUFFERED EVENTS"
> section but I know too little about the API to determine if that would
> be
Now that it was commited, what remains is to convert tabs to spaces inside a
literal block:
Index: share/man/man5/pf.conf.5
===
RCS file: /cvs/src/share/man/man5/pf.conf.5,v
retrieving revision 1.561
diff -u -p -r1.561 pf.conf.5
---
While making the last patch, I noticed ikectl uses getpass. Use
readpassphrase instead and explicit_bzero the buffers.
- Matthew Martin
diff --git ikeca.c ikeca.c
index 69ca076407b..2ec010a5831 100644
--- ikeca.c
+++ ikeca.c
@@ -22,6 +22,7 @@
#include
#include
#include
+#include
#includ
ikectl errors in a number of situations where shell special characters
are used. For example:
% doas ikectl ca test create password \'
[...]
subject=/C=DE/ST=Lower Saxony/L=Hanover/O=OpenBSD/OU=iked/CN=VPN
CA/emailAddress=r...@openbsd.org
Getting Private key
sh: no closing quote
This is because
Hello,
I would like to propose adding a ulptread call to the ulpt(4).
This diff adds ulptread and ulpt_do_read functions, similar to
ultpwrite and ulpt_do_write (essentially copy/paste/edit), as well
as looking at ugen_do_read (for BULK).
One thing to note is the current ultp driver runs two co
> Date: Wed, 17 May 2017 14:08:12 +1000
> From: David Gwynne
>
> this simplifies the asm in spllower.
>
> the trap that break forces to run reads the new cpl value out of
> arg0 (r26) and puts the old valud in r28 (ret0). the current asm
> is convoluted in how it gets the compiler to avoid those
On Wed, 17 May 2017 19:15:45 +0200, Ingo Schwarze wrote:
> For the record, this commit changes worst-case stack space requirements
> from O(n) to O(log n). The following are unchanged:
>
> - average stack space: O(log n)
> - average run time: O(n log n)
> - worst case run time: O(n^2)
>
> Date: Thu, 18 May 2017 13:58:30 +
> From: Visa Hankala
>
> OK?
Thanks. Looks good to me. ok kettenis@
> Index: arch/mips64/mips64/lcore_access.S
> ===
> RCS file: src/sys/arch/mips64/mips64/lcore_access.S,v
> retrieving rev
On Thursday 18 May 2017 07:03:31 Kyle J. McKay wrote:
> Some services are still provided using TLS 1.0 and older ciphers.
> It is possible to use the nc command to connect to these services
> using the "-T tlsall" option, but that also enables legacy and
> insecure ciphers and is not desirable.
>
Some services are still provided using TLS 1.0 and older ciphers.
It is possible to use the nc command to connect to these services
using the "-T tlsall" option, but that also enables legacy and
insecure ciphers and is not desirable.
Instead add a new "-T tlscompat" option that can be used to acce
Older IPv6 implementations may not have an IPV6_TCLASS
option. Tolerate this situation by simply returning an
error if an attempt is made to use IPV6_TCLASS on such
a system.
Signed-off-by: Kyle J. McKay
---
For those using the libressl-2.5.4.tar.gz distribution, an equivalent
patch that update
Here is a copyin32(9) for mips64. With futex(2) using it, the regress
tests pass on loongson, octeon and sgi. Source addresses with wrong
alignment are handled by the on-fault logic in itsa() trap handler.
OK?
Index: arch/mips64/mips64/lcore_access.S
==
RFC 5280 section 4.1.2.5 states:
To indicate that a certificate has no well-defined expiration date,
the notAfter SHOULD be assigned the GeneralizedTime value of
1231235959Z.
Unfortunately, if sizeof(time_t) == 4, -12-31T23:59:59Z cannot be
represented as a time_t value causin
The value of DEFAULT_CA_FILE is hard-coded to "/etc/ssl/cert.pem"
in the ocpscheck/http.c file.
This may not always be the desired default location. Allow the
default to be changed with a command-line define via CPPFLAGS the
same way the same-named value can be changed for nc/netcat.c.
Instead o
Even though it isn't clear that we'll use the futex-based futex
implementation on hppa anytime soon, here is a diff that implements
copyin32(9) for hppa.
ok?
P.S. I'm also looking at alpha right now. It would be nice if other
people could take care of mips64 (visa@?) and m88k as that would
On 10/03/17(Fri) 15:27, Martin Pieuchot wrote:
> In polling mode, finished transfers are processed by the waiting thread.
> This happens inside usbd_dopoll(). That means it's unsafe to dereference
> ``xfer'' after calling it:
>
> 352: usbd_dopoll(pipe->device);
> 353: if (xfer-
19 matches
Mail list logo