<feed xmlns='http://www.w3.org/2005/Atom'>
<title>wireguard-openbsd/sys/lib/libsa, branch master</title>
<subtitle>WireGuard implementation for the OpenBSD kernel</subtitle>
<id>https://git.zx2c4.com/wireguard-openbsd/atom/sys/lib/libsa?h=master</id>
<link rel='self' href='https://git.zx2c4.com/wireguard-openbsd/atom/sys/lib/libsa?h=master'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/'/>
<updated>2021-03-12T10:22:46Z</updated>
<entry>
<title>spelling</title>
<updated>2021-03-12T10:22:46Z</updated>
<author>
<name>jsg</name>
<email>jsg@openbsd.org</email>
</author>
<published>2021-03-12T10:22:46Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=84f3acfde2a7e7d22afae1b5e404e34b9403abc7'/>
<id>urn:sha1:84f3acfde2a7e7d22afae1b5e404e34b9403abc7</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Use daddr_t and not daddr32_t in boot media.</title>
<updated>2020-12-09T18:10:17Z</updated>
<author>
<name>krw</name>
<email>krw@openbsd.org</email>
</author>
<published>2020-12-09T18:10:17Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=3e58d19e89b8645264ea84c2f797d77942ef298e'/>
<id>urn:sha1:3e58d19e89b8645264ea84c2f797d77942ef298e</id>
<content type='text'>
At a minimum, amd64/i386 should now boot from 4TB GPT formatted disks.

More daddr32_t terminations with extreme prejudice to follow.

Tested by various, in snaps for a few days.

ok deraadt@
</content>
</entry>
<entry>
<title>Remove an unneeded variable.</title>
<updated>2020-10-26T04:04:31Z</updated>
<author>
<name>visa</name>
<email>visa@openbsd.org</email>
</author>
<published>2020-10-26T04:04:31Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=174697beef01c2f6add49ad98dbc1dc953740c31'/>
<id>urn:sha1:174697beef01c2f6add49ad98dbc1dc953740c31</id>
<content type='text'>
OK kettenis@
</content>
</entry>
<entry>
<title>Fix a warning false positive from clang 10.</title>
<updated>2020-07-09T19:17:19Z</updated>
<author>
<name>millert</name>
<email>millert@openbsd.org</email>
</author>
<published>2020-07-09T19:17:19Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=04a2240bd8f465bcae6b595d912af3e2965856de'/>
<id>urn:sha1:04a2240bd8f465bcae6b595d912af3e2965856de</id>
<content type='text'>
blf_enc() takes a number of 64-bit blocks to encrypt, but using
sizeof(uint64_t) in the calculation triggers a warning from clang
10 because the actual data type is uint32_t.  Pass BCRYPT_WORDS / 2
for the number of blocks like libc bcrypt(3) does.  OK kettenis@
</content>
</entry>
<entry>
<title>If we pass a packet length larger than 2^16, we should panic() instead</title>
<updated>2020-05-19T12:54:37Z</updated>
<author>
<name>patrick</name>
<email>patrick@openbsd.org</email>
</author>
<published>2020-05-19T12:54:37Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=396ee6d6b62cd4725fd412b6e857e55aee684d35'/>
<id>urn:sha1:396ee6d6b62cd4725fd412b6e857e55aee684d35</id>
<content type='text'>
of returning -1.  With a return type of u_int16_t, -1 is not different
to a valid checksum.  For incoming packets, the header lengths don't
exceed that size anyway, but for outgoing packets it's better to see
if our bootloader crafts a broken one.

Discussed with gerhard@
ok deraadt@ procter@
</content>
</entry>
<entry>
<title>Sync in_cksum.c to the same version ospfd has.  This fixes problems</title>
<updated>2020-05-18T17:01:02Z</updated>
<author>
<name>patrick</name>
<email>patrick@openbsd.org</email>
</author>
<published>2020-05-18T17:01:02Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=419596d7e7d9396d7ff0a802278e9a2db9b17f1e'/>
<id>urn:sha1:419596d7e7d9396d7ff0a802278e9a2db9b17f1e</id>
<content type='text'>
with odd packet lengths, which can happen when using TFTP to load
a file with an odd length.  ospfd actually took dvmrpd's version
in 2006 to fix the same issue, and both daemons implementations are
the same.  For the bootloader we keep the consts from the previous
version and replace the fatal with a print and return.

ok deraadt@
</content>
</entry>
<entry>
<title>Next step in prepping for ffs2 installs: introduce a new install script var</title>
<updated>2020-02-29T07:31:34Z</updated>
<author>
<name>otto</name>
<email>otto@openbsd.org</email>
</author>
<published>2020-02-29T07:31:34Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=6221c7eaa9bd32362d70d40c1870fbf4a4bf81cf'/>
<id>urn:sha1:6221c7eaa9bd32362d70d40c1870fbf4a4bf81cf</id>
<content type='text'>
MDFSOPT and add a missing prototype.
</content>
</entry>
<entry>
<title>Add an element to the marks array to store the virtual address of the</title>
<updated>2019-11-29T20:53:13Z</updated>
<author>
<name>kettenis</name>
<email>kettenis@openbsd.org</email>
</author>
<published>2019-11-29T20:53:13Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=934484026c7a2904fb164ecd78330ff78899d549'/>
<id>urn:sha1:934484026c7a2904fb164ecd78330ff78899d549</id>
<content type='text'>
entry point.

ok mlarkin@, deraadt@
</content>
</entry>
<entry>
<title>Implement a hexdump command in the boot loader.  This helps to</title>
<updated>2019-11-28T00:17:10Z</updated>
<author>
<name>bluhm</name>
<email>bluhm@openbsd.org</email>
</author>
<published>2019-11-28T00:17:10Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=3fbdbb315f0b99e633dc16e3d2b7a673b2569d3d'/>
<id>urn:sha1:3fbdbb315f0b99e633dc16e3d2b7a673b2569d3d</id>
<content type='text'>
inspect the memory layout that the firmware has created.  It is
especially useful for UEFI debugging.
OK deraadt@ kettenis@
</content>
</entry>
<entry>
<title>Reduce BOOTRANDOM_MAX to 256.  naddy pointed out there's no point having</title>
<updated>2019-11-01T20:54:52Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2019-11-01T20:54:52Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=b4bcf6304410501bfbe0df1a65ef5b432faa8426'/>
<id>urn:sha1:b4bcf6304410501bfbe0df1a65ef5b432faa8426</id>
<content type='text'>
it larger than RC4STATE.  A long discussion ensued. In conclusion all
entropy inputs are either satisfactory enough, or just as shitty at 512.
</content>
</entry>
</feed>
