{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":88439547,"defaultBranch":"trunk","name":"src","ownerLogin":"NetBSD","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2017-04-16T20:03:43.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/975554?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1719691511.0","currentOid":""},"activityList":{"items":[{"before":"de042433a9465fbeb920a68b918661b7ca91e22b","after":"2f76de8b9e6d8b5620c5a246613458e2e4bca96f","ref":"refs/heads/trunk","pushedAt":"2024-09-21T23:51:04.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"In !TINYPROG versions of sh, make the builtin \"shift\" builtin command\nperform a rotate instead or shift if given a numeric arg (which is\notherwise an error).\n\n\"set -- a b c; shift -1; echo $*\" will echo \"c a b\".\n\nWhile here, make the shift builtin comply with POSIX, and accept\n(and ignore) a '--' arg before the shift (or rotate) count.\n\nDocument the variant of shift in sh(1)\n\nAdapt the shell test for shift to not expect \"shift -1\" to be an\nerror, test that rotate works as expected, and include some tests\nthat use the (useless, but required) \"--\" arg.","shortMessageHtmlLink":"In !TINYPROG versions of sh, make the builtin \"shift\" builtin command"}},{"before":"ada015dd2958966d2bcaa11c00e0445f1abdcc73","after":"beedad9e04b440a78a69843b064cf28830115fab","ref":"refs/heads/netbsd-10","pushedAt":"2024-09-21T15:44:44.000Z","pushType":"push","commitsCount":12,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"Tickets #898 - #908","shortMessageHtmlLink":"Tickets #898 - #908"}},{"before":"83db55f8c996624b96a4ee44fad484fff5953547","after":"de042433a9465fbeb920a68b918661b7ca91e22b","ref":"refs/heads/trunk","pushedAt":"2024-09-21T09:50:54.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"enable DIAGNOSTIC by default for pmax GENERIC64 kernel config.\nremvoe extra ` symbol in comment.","shortMessageHtmlLink":"enable DIAGNOSTIC by default for pmax GENERIC64 kernel config."}},{"before":"128a0dcc9f07c775edbf83fd86b3b63da2ca3ad7","after":"83db55f8c996624b96a4ee44fad484fff5953547","ref":"refs/heads/trunk","pushedAt":"2024-09-21T06:54:16.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"i386/stand: Document NFSv3 support to {efi,pxe}boot/version","shortMessageHtmlLink":"i386/stand: Document NFSv3 support to {efi,pxe}boot/version"}},{"before":"cd44c804763adf61032ae20c6a2b55eb4e323c12","after":"128a0dcc9f07c775edbf83fd86b3b63da2ca3ad7","ref":"refs/heads/trunk","pushedAt":"2024-09-21T02:52:09.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"libm/remquo: Fix bug where remquo returned wrong sign of quo\n\nISO C requires that quo be congruent to the quotient mod 2^k and have\na particular sign. The current code can return 0 when it should be\nnegative.\n\nBecause the code chooses k=31 (for the requirement of congruence\nmodulo 2^k), the only value available (in ILP32 or LP64) that is\nnegative and congruent to 0 is 0x80000000. In the specific case of\nwanting \"-0\", return 0x80000000.\n\nResolves t_remquo test failure.\n\n\\todo pullups\n\\todo check/fix remquof and remquol","shortMessageHtmlLink":"libm/remquo: Fix bug where remquo returned wrong sign of quo"}},{"before":"851f32e4d8ee9363909e9414c373af146e5c7363","after":"cd44c804763adf61032ae20c6a2b55eb4e323c12","ref":"refs/heads/trunk","pushedAt":"2024-09-21T00:17:25.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"s/resister/register/ in comments.","shortMessageHtmlLink":"s/resister/register/ in comments."}},{"before":"b7c9ed514057e20212a775423b88b92cd518a78a","after":"851f32e4d8ee9363909e9414c373af146e5c7363","ref":"refs/heads/trunk","pushedAt":"2024-09-20T21:43:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"libm/remquo: Fix bug where wrong quotient was returned\n\nFix taken from FreeBSD:\n\n https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=166463\n https://cgit.freebsd.org/src/commit/lib/msun/src/s_remquo.c?id=1cbd288942b08217e99bf889e0967895d53af00c\n\nFreeBSD commit message:\n\n Fix a bug in remquo{,f,l}, in which the quotient didn't always have the\n correct sign when the remainder was 0.\n\n Fix a separate bug in remquo alone, in which the remainder and\n quotient were both off by a bit in certain cases involving subnormal\n remainders.\n\n The bugs affected all platforms except amd64 and i386, on which the\n routines are implemented in assembly.\n\n(On NetBSD, this bug manifests on amd64.)\n\n\\todo pullups\n\\todo check/fix remquof and remquol","shortMessageHtmlLink":"libm/remquo: Fix bug where wrong quotient was returned"}},{"before":"831a8fd2c629cd3466a4765634581f3ed6e10180","after":"b7c9ed514057e20212a775423b88b92cd518a78a","ref":"refs/heads/trunk","pushedAt":"2024-09-20T18:46:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"The gethostname() function is (from when it was added to POSIX)\na base function, not an XSI optional extension, so it should be\nmade visible whenever _POSIX_C_SOURCE is >= 200112 (Posix Issue 6),\nand not only for _XOPEN_SOURCE >= 600 (which would be for an XSI\nfunction added then).\n\nMove the prototype for gethostname() to the right section of the file.\n\nNote this makes the visibility of gethostname() wider, it will remain\nvisible everywhere it was visible before - the only conceivable issue\nwould be if someone was abusing the name in a context where they\nshouldn't be. (Some non NetBSD application, as all of NetBSD is\ncompiled with _NetBSD_SOURCE defined, everything tends to be visible,\nso no change at all for the NetBSD source tree).\n\nIssue pointed out by Thomas Klausner (wiz@)","shortMessageHtmlLink":"The gethostname() function is (from when it was added to POSIX)"}},{"before":"140e10fcd2b4b6500fde3706d8bb2d23bd45110f","after":"ada015dd2958966d2bcaa11c00e0445f1abdcc73","ref":"refs/heads/netbsd-10","pushedAt":"2024-09-20T14:44:36.000Z","pushType":"push","commitsCount":27,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"Pull up following revision(s) (requested by rin in ticket #880):\n\n\tsys/nfs/nfs_iod.c: revision 1.9\n\tsys/nfs/nfs_vfsops.c: revision 1.245\n\tsys/nfs/nfs_clntsubs.c: revision 1.7\n\nPR/57279: Izumi Tsutsui: Fix some {int,long} -> time_t. Still things will\nbreak eventually because parts of the nfs protocol assume time_t will fit\nin 32 bits.","shortMessageHtmlLink":"Pull up following revision(s) (requested by rin in ticket #880):"}},{"before":"368df3735753f8d6e38f8f1bbc23b61fbe674051","after":"831a8fd2c629cd3466a4765634581f3ed6e10180","ref":"refs/heads/trunk","pushedAt":"2024-09-20T11:48:14.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"distrib: Adjust for nawk/bin/awk to nawk/bin","shortMessageHtmlLink":"distrib: Adjust for nawk/bin/awk to nawk/bin"}},{"before":"cf9938ad3aa07cb249c1e1681fee771a5b65d17d","after":"368df3735753f8d6e38f8f1bbc23b61fbe674051","ref":"refs/heads/trunk","pushedAt":"2024-09-20T09:13:25.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"x86/boot: fill in a bunch of missed changes and bump some versions.\n\nmissed features included:\n- support for partition labels\n- recursive labels inside RAID partitions\n- booting a directory with kernel and modules\n- multiBoot 2\n- \"root\" command that changes default root\n- \"vesa\" command to control graphical modes\n- bi-endian support in disklabel, RAID and UFS\n- fixes for buggy ACPI implementations\n- fix PXE device path type\n- fixes for buggy ACPI implementations\n- serial console support with raw I/O accessors\n- ASCII art\n\nXXX: perhaps we could pullup some of these as minor version to release\n branches but it seems extreme for a largely cosmetic issue. the\n version across releases has a different build ID, so you can\n already tell the difference between versions that changed.","shortMessageHtmlLink":"x86/boot: fill in a bunch of missed changes and bump some versions."}},{"before":"d9c0982bb8dc3a2644bed9efa6c2d4101172b3fb","after":"cf9938ad3aa07cb249c1e1681fee771a5b65d17d","ref":"refs/heads/trunk","pushedAt":"2024-09-20T06:17:18.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"s/speficically/specifically/ in comment. (Sync with OpenBSD/luna88k)","shortMessageHtmlLink":"s/speficically/specifically/ in comment. (Sync with OpenBSD/luna88k)"}},{"before":"131535b764d26b34c8d1db4e36d4a503b9042637","after":"d9c0982bb8dc3a2644bed9efa6c2d4101172b3fb","ref":"refs/heads/trunk","pushedAt":"2024-09-20T02:58:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"PR lib/58674\n\nHopefully allow the tools gmake to build (everywhere).\n\nDon't use the system bsd_signal() function, even if one is\ndefined, use a locally defined one instead. Note that it\ncannot be declared static (which the code would do) as it\nis possible that system header files might define the function,\nif it exists on the host system, and that prototype would not\n(cannot) be static.\n\nThis is a horrible hack, feel free to do something better.\n\nNote: this version of gmake is (currently anyway) used only\nas part of the tools used for building NetBSD - apart from that\nit is used for nothing.","shortMessageHtmlLink":"PR lib/58674"}},{"before":"6d29ff8931972c8ce083321bae92133c57522139","after":"131535b764d26b34c8d1db4e36d4a503b9042637","ref":"refs/heads/trunk","pushedAt":"2024-09-20T00:23:54.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"tests: Add test for remquo\n\nThis test currently fails, because remquo has bugs. (A bugfix will be\ncommitted soon.) Test vectors derived from results from code by\nCharles Karney in GeodesicLib/proj, and manually inspected.","shortMessageHtmlLink":"tests: Add test for remquo"}},{"before":"ca9b8a4662a0c56562f0948c11d20a7b1dee8bc3","after":"6d29ff8931972c8ce083321bae92133c57522139","ref":"refs/heads/trunk","pushedAt":"2024-09-19T21:26:59.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"s/trafic/traffic/ and s/Crrently/Currently/ in comments.","shortMessageHtmlLink":"s/trafic/traffic/ and s/Crrently/Currently/ in comments."}},{"before":"6787f979e9c1bf29799f62864d383535e2a381e8","after":"ca9b8a4662a0c56562f0948c11d20a7b1dee8bc3","ref":"refs/heads/trunk","pushedAt":"2024-09-19T18:50:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"PR lib/58674 (not really so much any more)\n\nCorrect previous.\n\nbsd_signal should only be visible with _NETBSD_SOURCE - it isn't any kind of\nstandard function (despite also existing in other systems).\n\nTurns out that it used to be an XSI function, back in the dark ages\n('twas removed in POSIX issue 7, back in 2008, after being marked\nobsolete in issue 6 (2001)).\n\nSo, make it visible to any applications that request a suitable\nX/Open version (and of course, for _NETBSD_SOURCE).\n\nStill no effect on the issue for the PR.","shortMessageHtmlLink":"PR lib/58674 (not really so much any more)"}},{"before":"7141b3322106c1c0dc31fa4c133cdd7bc59db328","after":"6787f979e9c1bf29799f62864d383535e2a381e8","ref":"refs/heads/trunk","pushedAt":"2024-09-19T16:16:38.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"PR lib/58674\n\nbsd_signal should only be visible with _NETBSD_SOURCE - it isn't any kind of\nstandard function (despite also existing in other systems).\n\nThis change inspired by the PR, but doesn't fix it in any way, the tools\nconfig script for gmake doesn't care if the function is visible in any\nheader, merely if present in libc.","shortMessageHtmlLink":"PR lib/58674"}},{"before":"eec3e469a4b3a777c01e2aefb57f9955ac0059fa","after":"7141b3322106c1c0dc31fa4c133cdd7bc59db328","ref":"refs/heads/trunk","pushedAt":"2024-09-19T09:15:58.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"when freeing pages, pass page count instead of byte count.","shortMessageHtmlLink":"when freeing pages, pass page count instead of byte count."}},{"before":"6f3c935bc850133ac0a796e83aef7777c0a60eeb","after":"eec3e469a4b3a777c01e2aefb57f9955ac0059fa","ref":"refs/heads/trunk","pushedAt":"2024-09-19T05:13:29.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"evbarm/boards.plist: fix Olimex A20-OLinuXino-MICRO entry\n\n(Looks like a copy-and-paste error when the entry was added.)","shortMessageHtmlLink":"evbarm/boards.plist: fix Olimex A20-OLinuXino-MICRO entry"}},{"before":"9c5f9f54b6eccbb951edfbc060bd4d6dc08f64c9","after":"6f3c935bc850133ac0a796e83aef7777c0a60eeb","ref":"refs/heads/trunk","pushedAt":"2024-09-19T02:38:52.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"tun(4): Mark tunread_filtops `FILTEROP_MPSAFE`\n\nFilter handlers have already been MP-safe since 2018:\nhttps://mail-index.netbsd.org/source-changes/2018/08/06/msg097317.html\n\nNote that we do not expect deadlocks similar to bpf(4) (PR kern/58531),\nb/w KERNEL_LOCK and spin mutex for TX queue.\n\nFor tun(4), filt_tunread() acquires adaptive mutex. This is forbidden\nwhen spin mutex is already held.\n\nSuch a path must have already been detected if present.\n\nThanks ozaki-r@ for discussion.","shortMessageHtmlLink":"tun(4): Mark tunread_filtops FILTEROP_MPSAFE"}},{"before":"00cfb706367ed6c9c55f931b3d4b6073f78b1931","after":"9c5f9f54b6eccbb951edfbc060bd4d6dc08f64c9","ref":"refs/heads/trunk","pushedAt":"2024-09-18T23:42:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"Clean and invalidate the full data cache as the armv6_start.S code assumes\nthat the caches are disabled on entry which armv7_exec_kernel ensures.\nWhen caches are disabled armv6_start.S will invalidate (not clean) the\ncache and this can lose u-boot data for the u-boots that now don't\nperform their own cache maintenance.\n\nAn example of such a u-boot is the banana pro that chuq@ has tried which\nhas\n\n commit 8b5dea33584261cc5d600614970d1cbed6d99f91\n Author: Heinrich Schuchardt \n Date: Wed Mar 3 14:05:05 2021 +0100\n\n efi_loader: disable GRUB_ARM32_WORKAROUND on ARCH_SUNXI\n\napplied.\n\nImproving things so that the architected caches could remain on would be\nbetter, but that's a much bigger change / set of changes.","shortMessageHtmlLink":"Clean and invalidate the full data cache as the armv6_start.S code as…"}},{"before":"4fcc385c69b500841aac29a41f0d5f81946d27e2","after":"00cfb706367ed6c9c55f931b3d4b6073f78b1931","ref":"refs/heads/trunk","pushedAt":"2024-09-18T21:08:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"New BIND has released.","shortMessageHtmlLink":"New BIND has released."}},{"before":"cef9aba35c3a26409aad62cd5f0c1d43aca6f371","after":"044ab17bb948886ac05649ad9fd02c0a89b2a3f5","ref":"refs/heads/MALINEN","pushedAt":"2024-09-18T18:11:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"Import wpa_supplicant hand hostapd 2.11. Previous was 2.9\n\n1. Changes for hostapd:\n\n2024-07-20 - v2.11\n\t* Wi-Fi Easy Connect\n\t - add support for DPP release 3\n\t - allow Configurator parameters to be provided during config exchange\n\t* HE/IEEE 802.11ax/Wi-Fi 6\n\t - various fixes\n\t* EHT/IEEE 802.11be/Wi-Fi 7\n\t - add preliminary support\n\t* SAE: add support for fetching the password from a RADIUS server\n\t* support OpenSSL 3.0 API changes\n\t* support background radar detection and CAC with some additional\n\t drivers\n\t* support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3)\n\t* EAP-SIM/AKA: support IMSI privacy\n\t* improve 4-way handshake operations\n\t - use Secure=1 in message 3 during PTK rekeying\n\t* OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases\n\t to avoid interoperability issues\n\t* support new SAE AKM suites with variable length keys\n\t* support new AKM for 802.1X/EAP with SHA384\n\t* extend PASN support for secure ranging\n\t* FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)\n\t - this is based on additional details being added in the IEEE 802.11\n\t standard\n\t - the new implementation is not backwards compatible\n\t* improved ACS to cover additional channel types/bandwidths\n\t* extended Multiple BSSID support\n\t* fix beacon protection with FT protocol (incorrect BIGTK was provided)\n\t* support unsynchronized service discovery (USD)\n\t* add preliminary support for RADIUS/TLS\n\t* add support for explicit SSID protection in 4-way handshake\n\t (a mitigation for CVE-2023-52424; disabled by default for now, can be\n\t enabled with ssid_protection=1)\n\t* fix SAE H2E rejected groups validation to avoid downgrade attacks\n\t* use stricter validation for some RADIUS messages\n\t* a large number of other fixes, cleanup, and extensions\n\n2022-01-16 - v2.10\n\t* SAE changes\n\t - improved protection against side channel attacks\n\t [https://w1.fi/security/2022-1/]\n\t - added option send SAE Confirm immediately (sae_config_immediate=1)\n\t after SAE Commit\n\t - added support for the hash-to-element mechanism (sae_pwe=1 or\n\t sae_pwe=2)\n\t - fixed PMKSA caching with OKC\n\t - added support for SAE-PK\n\t* EAP-pwd changes\n\t - improved protection against side channel attacks\n\t [https://w1.fi/security/2022-1/]\n\t* fixed WPS UPnP SUBSCRIBE handling of invalid operations\n\t [https://w1.fi/security/2020-1/]\n\t* fixed PMF disconnection protection bypass\n\t [https://w1.fi/security/2019-7/]\n\t* added support for using OpenSSL 3.0\n\t* fixed various issues in experimental support for EAP-TEAP server\n\t* added configuration (max_auth_rounds, max_auth_rounds_short) to\n\t increase the maximum number of EAP message exchanges (mainly to\n\t support cases with very large certificates) for the EAP server\n\t* added support for DPP release 2 (Wi-Fi Device Provisioning Protocol)\n\t* extended HE (IEEE 802.11ax) support, including 6 GHz support\n\t* removed obsolete IAPP functionality\n\t* fixed EAP-FAST server with TLS GCM/CCM ciphers\n\t* dropped support for libnl 1.1\n\t* added support for nl80211 control port for EAPOL frame TX/RX\n\t* fixed OWE key derivation with groups 20 and 21; this breaks backwards\n\t compatibility for these groups while the default group 19 remains\n\t backwards compatible; owe_ptk_workaround=1 can be used to enabled a\n\t a workaround for the group 20/21 backwards compatibility\n\t* added support for Beacon protection\n\t* added support for Extended Key ID for pairwise keys\n\t* removed WEP support from the default build (CONFIG_WEP=y can be used\n\t to enable it, if really needed)\n\t* added a build option to remove TKIP support (CONFIG_NO_TKIP=y)\n\t* added support for Transition Disable mechanism to allow the AP to\n\t automatically disable transition mode to improve security\n\t* added support for PASN\n\t* added EAP-TLS server support for TLS 1.3 (disabled by default for now)\n\t* a large number of other fixes, cleanup, and extensions\n\n\n2. Changes for wpa_supplicant\n\n2024-07-20 - v2.11\n\t* Wi-Fi Easy Connect\n\t - add support for DPP release 3\n\t - allow Configurator parameters to be provided during config exchange\n\t* MACsec\n\t - add support for GCM-AES-256 cipher suite\n\t - remove incorrect EAP Session-Id length constraint\n\t - add hardware offload support for additional drivers\n\t* HE/IEEE 802.11ax/Wi-Fi 6\n\t - support BSS color updates\n\t - various fixes\n\t* EHT/IEEE 802.11be/Wi-Fi 7\n\t - add preliminary support\n\t* support OpenSSL 3.0 API changes\n\t* improve EAP-TLS support for TLSv1.3\n\t* EAP-SIM/AKA: support IMSI privacy\n\t* improve mitigation against DoS attacks when PMF is used\n\t* improve 4-way handshake operations\n\t - discard unencrypted EAPOL frames in additional cases\n\t - use Secure=1 in message 2 during PTK rekeying\n\t* OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases\n\t to avoid interoperability issues\n\t* support new SAE AKM suites with variable length keys\n\t* support new AKM for 802.1X/EAP with SHA384\n\t* improve cross-AKM roaming with driver-based SME/BSS selection\n\t* PASN\n\t - extend support for secure ranging\n\t - allow PASN implementation to be used with external programs for\n\t Wi-Fi Aware\n\t* FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)\n\t - this is based on additional details being added in the IEEE 802.11\n\t standard\n\t - the new implementation is not backwards compatible, but PMKSA\n\t caching with FT-EAP was, and still is, disabled by default\n\t* support a pregenerated MAC (mac_addr=3) as an alternative mechanism\n\t for using per-network random MAC addresses\n\t* EAP-PEAP: require Phase 2 authentication by default (phase2_auth=1)\n\t to improve security for still unfortunately common invalid\n\t configurations that do not set ca_cert\n\t* extend SCS support for QoS Characteristics\n\t* extend MSCS support\n\t* support unsynchronized service discovery (USD)\n\t* add support for explicit SSID protection in 4-way handshake\n\t (a mitigation for CVE-2023-52424; disabled by default for now, can be\n\t enabled with ssid_protection=1)\n\t - in addition, verify SSID after key setup when beacon protection is\n\t used\n\t* fix SAE H2E rejected groups validation to avoid downgrade attacks\n\t* a large number of other fixes, cleanup, and extensions\n\n2022-01-16 - v2.10\n\t* SAE changes\n\t - improved protection against side channel attacks\n\t [https://w1.fi/security/2022-1/]\n\t - added support for the hash-to-element mechanism (sae_pwe=1 or\n\t sae_pwe=2); this is currently disabled by default, but will likely\n\t get enabled by default in the future\n\t - fixed PMKSA caching with OKC\n\t - added support for SAE-PK\n\t* EAP-pwd changes\n\t - improved protection against side channel attacks\n\t [https://w1.fi/security/2022-1/]\n\t* fixed P2P provision discovery processing of a specially constructed\n\t invalid frame\n\t [https://w1.fi/security/2021-1/]\n\t* fixed P2P group information processing of a specially constructed\n\t invalid frame\n\t [https://w1.fi/security/2020-2/]\n\t* fixed PMF disconnection protection bypass in AP mode\n\t [https://w1.fi/security/2019-7/]\n\t* added support for using OpenSSL 3.0\n\t* increased the maximum number of EAP message exchanges (mainly to\n\t support cases with very large certificates)\n\t* fixed various issues in experimental support for EAP-TEAP peer\n\t* added support for DPP release 2 (Wi-Fi Device Provisioning Protocol)\n\t* a number of MKA/MACsec fixes and extensions\n\t* added support for SAE (WPA3-Personal) AP mode configuration\n\t* added P2P support for EDMG (IEEE 802.11ay) channels\n\t* fixed EAP-FAST peer with TLS GCM/CCM ciphers\n\t* improved throughput estimation and BSS selection\n\t* dropped support for libnl 1.1\n\t* added support for nl80211 control port for EAPOL frame TX/RX\n\t* fixed OWE key derivation with groups 20 and 21; this breaks backwards\n\t compatibility for these groups while the default group 19 remains\n\t backwards compatible\n\t* added support for Beacon protection\n\t* added support for Extended Key ID for pairwise keys\n\t* removed WEP support from the default build (CONFIG_WEP=y can be used\n\t to enable it, if really needed)\n\t* added a build option to remove TKIP support (CONFIG_NO_TKIP=y)\n\t* added support for Transition Disable mechanism to allow the AP to\n\t automatically disable transition mode to improve security\n\t* extended D-Bus interface\n\t* added support for PASN\n\t* added a file-based backend for external password storage to allow\n\t secret information to be moved away from the main configuration file\n\t without requiring external tools\n\t* added EAP-TLS peer support for TLS 1.3 (disabled by default for now)\n\t* added support for SCS, MSCS, DSCP policy\n\t* changed driver interface selection to default to automatic fallback\n\t to other compiled in options\n\t* a large number of other fixes, cleanup, and extensions","shortMessageHtmlLink":"Import wpa_supplicant hand hostapd 2.11. Previous was 2.9"}},{"before":"51c722813ef0446b3c2be68a1b2b2cb565d98d47","after":"4fcc385c69b500841aac29a41f0d5f81946d27e2","ref":"refs/heads/trunk","pushedAt":"2024-09-18T18:11:53.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"new wpa","shortMessageHtmlLink":"new wpa"}},{"before":"5ba7948dde72014892196cb46717fae4e291af4d","after":"51c722813ef0446b3c2be68a1b2b2cb565d98d47","ref":"refs/heads/trunk","pushedAt":"2024-09-18T14:09:03.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"risc-v: add reset support to the JH7110 SOC clock controller driver","shortMessageHtmlLink":"risc-v: add reset support to the JH7110 SOC clock controller driver"}},{"before":"eac10f6f121f6fe8f6732eae4f3b8fe7544e73c0","after":"5ba7948dde72014892196cb46717fae4e291af4d","ref":"refs/heads/trunk","pushedAt":"2024-09-18T11:33:58.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"#define consistency","shortMessageHtmlLink":"#define<space> consistency"}},{"before":"b324aceaab262551713cd9b1ad2c767cd96c86e9","after":"eac10f6f121f6fe8f6732eae4f3b8fe7544e73c0","ref":"refs/heads/trunk","pushedAt":"2024-09-18T06:23:07.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"The delay is only required for machines with built-in floppy drives.\n\nI doubt the vibration from an external drive on the Duos would affect adb\nbefore it attaches.","shortMessageHtmlLink":"The delay is only required for machines with built-in floppy drives."}},{"before":"5a5d821f81fc28cf006b39df4ccd4123e2afd82b","after":"b324aceaab262551713cd9b1ad2c767cd96c86e9","ref":"refs/heads/trunk","pushedAt":"2024-09-18T03:39:18.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"i386/stand: Remove XMS leftover from libi386.h, NFC\n\nPR port-i386/58624","shortMessageHtmlLink":"i386/stand: Remove XMS leftover from libi386.h, NFC"}},{"before":"6de246327d784d59b01394f36cf021c714998075","after":"5a5d821f81fc28cf006b39df4ccd4123e2afd82b","ref":"refs/heads/trunk","pushedAt":"2024-09-17T19:11:52.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"date(1) says:\n\nSTANDARDS\n The date utility is expected to be compatible with IEEE Std 1003.2\n (“POSIX.2”).\n\nyet the format used for the date string arg is:\n\n\t[[[[[[CC]yy]mm]dd]HH]MM[.SS]]\n\nwhereas POSIX demands\n\n\tmmddHHMM[[CC]yy]\n\nWhy anyone would ever want to use that archaic form is incomprehensible\nto me, yet, that is what is required.\n\nImplement support for the POSIX format if POSIXLY_CORRECT is set in\nthe environment (in the full date(1) build only) in a rather crude\nway that relies upon the user getting the format correct.\n\nTools builds are unaffected - setting the time is not supported there.\n(It could be made to work, half setting the time, using -j, is possible\nin tools builds, but pointless, and this cheap implementation uses\nstrptime() which is not necessarily available to a tools build.)\n\nMention this (very briefly) in the man page.","shortMessageHtmlLink":"date(1) says:"}},{"before":"a3e46970fa35a2931de520053f2a77443f13b039","after":"6de246327d784d59b01394f36cf021c714998075","ref":"refs/heads/trunk","pushedAt":"2024-09-17T16:31:51.000Z","pushType":"push","commitsCount":7,"pusher":{"login":"netbsd-srcmastr","name":null,"path":"/netbsd-srcmastr","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/27641251?s=80&v=4"},"commit":{"message":"PR lib/58674\n\nWhen building the tools version of sed, treat all wide characters\nas if they occupy just one column for the purposes of sed's 'l'\ncommand (which it is very unlikely to be used from the tools sed).\n\nwdwidth() is another XSI function, not necessarily available everywhere.","shortMessageHtmlLink":"PR lib/58674"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yMVQyMzo1MTowNC4wMDAwMDBazwAAAAS87kIO","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yMVQyMzo1MTowNC4wMDAwMDBazwAAAAS87kIO","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xN1QxNjozMTo1MS4wMDAwMDBazwAAAAS4w7bN"}},"title":"Activity · NetBSD/src"}