summaryrefslogtreecommitdiffstats
path: root/lib/libcxx/src/algorithm.cpp (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-06-17A bit more KNF no binary changeclaudio2-7/+11
2019-06-17setusercontext resets PATH (which we want). but then it becomestedu3-5/+19
impossible to access the old PATH. save a copy in case we need it later. bug report from espie.
2019-06-17add code to check stack pointer is within MAP_STACKderaadt1-1/+7
from miod
2019-06-17mention environment resetting here as well. ok millerttedu1-2/+19
2019-06-17syncpatrick1-0/+1
2019-06-17Add aplgpio(4) a driver for the gpio controllers found on Intel's Apollopatrick7-7/+370
Lake SoC. From James Hastings ok kettenis@
2019-06-17add REGRESS_EXPECTED_FAILURES variable,espie3-6/+20
for those tests that are expected to fail because they're not yet implemented. okay bluhm@
2019-06-17Make BN_num_bits_word() constant time.tb1-48/+18
Previously, this function would leak the most significant word of its argument due to branching and memory access pattern. This patch is enough to fix the use of BN_num_bits() on RSA prime factors in the library. The diff is a simplified and more readable (but perhaps less efficient) version of https://github.com/openssl/openssl/commit/972c87df by Andy Polyakov and David Benjamin (pre license change). Consult that commit message for details. Subsequent fixes to follow in the near future. Issue pointed out by David Schrammel and Samuel Weiser as part of a larger report. tests & ok inoguchi, ok jsing
2019-06-17Fix Makefilejob1-2/+2
2019-06-17always reset the "su" variables, which is more consistent and predictable.tedu2-16/+22
ok martijn millert
2019-06-17It's enough to allocate the EC key once.florian1-6/+3
OK tb
2019-06-17rpk-client.8 -> rpki-client.8jsg1-2/+2
2019-06-17One NULL-check before EVP_MD_CTX_free() was left in previous.tb1-4/+2
2019-06-17free(9) sizes.mpi1-7/+8
ok reyk@
2019-06-17whitespacederaadt1-2/+2
2019-06-17system includes first, always.deraadt5-10/+10
2019-06-17Use bsd.prog.mk style for buildingderaadt1-70/+8
2019-06-17We do not need for the -portable stubs here.deraadt1-1236/+0
2019-06-17Don't do -portable in base. It is better done outside the tree.deraadt21-1251/+20
Imagine if we did it throughout the tree, how many copies of strlcpy would we have, and how much time would all the configure shell scripts and includes take? It would be ludicrous.
2019-06-17 Use non-deprecated API; from Renaud Allard, thanks!florian1-9/+7
OK tb
2019-06-17This portable code knocking out pledge or unveil is better donederaadt1-8/+1
as a C stub, rather than #define. Anyways, this "-portable by default" approach is not the OpenBSD way.
2019-06-17this file is not neededderaadt1-14/+0
2019-06-17should be rpki-client(8)deraadt1-1/+1
2019-06-17../../../logmessagejob33-0/+10362
2019-06-17Replace spaces with tab for text indentclaudio1-5/+5
2019-06-17Cleanup some spaces here as well. Again no binary change.claudio3-18/+18
2019-06-17Cleanup, remove some unneded spaces add some other where needed.claudio8-35/+34
No binary change according to clang
2019-06-17Too much spaceclaudio2-5/+5
2019-06-17Add unit test for new community functions. Should cover the basics.claudio3-1/+760
2019-06-17Adjust test since the community rewrite changed order of communities in sets.claudio1-2/+2
2019-06-17 Implement elliptic curve account keys.florian7-39/+259
OK benno Input & OK tb
2019-06-17The copyfault handler is supposed to store the old handler in the pcb.patrick1-2/+2
ok kettenis@
2019-06-17Adjust comment.claudio1-2/+4
2019-06-17From Leonid Bobrov: add a condition to {beginning,end}-of-buffer tolum3-6/+11
push mark only if it's not pushed already.
2019-06-17Make pci_intr_map_msix(9) assign an address to the BAR used by the MSI-Xkettenis1-3/+10
tables if no address has been assigned yet to prevent a panic in pci_intr_establish(9) later. ok patrick@
2019-06-17Split out the code that assigns addresses to BARs into its own function.kettenis2-7/+28
ok patrick@
2019-06-17Adjust and sync the code with the new struct community code from bgpd.claudio3-142/+266
OK benno@
2019-06-17Completley rewrite the community matching and handling code. All communityclaudio12-1137/+1253
attributes are put into a new data structure when parsing the UPDATE. The filter code can quickly lookup and modify this data structure. When creating an UPDATE the data is put back into wire format. Setups using a lot of communities benefit a lot from this. Input and OK benno@
2019-06-17s/get1/get0/ in commentsflorian1-3/+3
2019-06-17Mention EM_PPC64; from jsg@kevlo1-1/+3
2019-06-17improve clock_gettime regress:anton2-4/+7
* fix compilation error due to missing cast * do not run sysctl during make clean and the other common regress cleanup targets * make it work using a separate object directory
2019-06-17When reloading station address via TWSI is timed out, try to reloadkevlo1-1/+3
station address from EEPROM. From Brad.
2019-06-17Mention the ELF machine type EM_AARCH64.kevlo1-2/+4
ok jmc@
2019-06-17Allow setting of retransmission intervasl via _res.retrans. Ugly API butotto1-1/+4
it's all we got. ok jca@
2019-06-17We do support "options edns0"; ok jca@otto1-5/+2
2019-06-17Remove old realpath(3), and the userland-vs-kernel realpath verificationderaadt1-334/+44
code. We now user the simple userland wrapper on top of __realpath(2). The non-POSIX behaviour still remains, that is the next component to fix. From a diff by beck, but I managed to chainsaw it a bit further. Tested in snaps for a couple of days. ok beck
2019-06-17Add -c option for passing LOG_CONS to syslog(3).guenther2-7/+14
(Option choice matches NetBSD) ok deraadt@ jmc@ benno@ kn@
2019-06-17dosendsyslog() must only pass ktrgenio(9) userspace buffers that it canguenther1-15/+8
use copyin() on. While here: just put the struct iovec for ktrace on the stack instead of mallocing and freeing it. problem debugged by patrick@ ok deraadt@ mpi@
2019-06-16SYS___realpath is legitimately PLEDGE_STDIO, because the other pledgederaadt1-2/+2
feature bits checked in namei()
2019-06-16Trade unveil(2) for chroot(2).florian5-91/+70
This uses less code and unveil(2) seems to be the better tool here. The directory one chroots into needs to be carefully setup (they are not) and comon wisedom is that root can break out of chroots. There is probably nothing wrong with the chroot code because of pledge but it still makes me feel uneasy. input & OK on previous version mestre OK on previous version deraadt bug found, input & OK benno