Displaying 1 50 of 5,666 commits (0.092s)

OpenBSD — usr.sbin/smtpd enqueue.c

Do not use the name returned by getlogin() when pw_uid from
getpwnam(getlogin()) doesn't match the real uid, unless the real
uid is 0.  This matches the behavior of sendmail and gives the
corrent sender for mail sent by daemons that got started by a
user who su'd or used sudo.  OK dlg@ gilles@
Delta File
+9 -4 usr.sbin/smtpd/enqueue.c
+9 -4 1 file

OpenBSD — usr.sbin/ldapd ber.c, usr.sbin/smtpd ber.c

ber_printf_elements should return NULL if any of its parts fail.

Leave the error handling up to its callers.

ok reyk

OpenBSD — sbin/iked parse.y, usr.sbin/httpd parse.y

Use AI_ADDRCONFIG when resolv hosts on startup.

OK henning@

OpenBSD — lib/libssl/man Makefile, lib/libssl/src/doc/ssl SSL_CTX_use_certificate.3

Rename SSL_CTX_use_certificate_chain() to SSL_CTX_use_certificate_chain_mem().

As discussed with beck@ jsing@ and others
OK beck@

NetBSD — doc 3RDPARTY, external/ibm-public/postfix/dist HISTORY makedefs

Pullup the following, requested by tron in ticket #459:

        doc/3RDPARTY                                        1.1195
        external/ibm-public/postfix/dist/HISTORY        patch
        external/ibm-public/postfix/dist/makedefs        patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup.h patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_message.c patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_milter.c patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_state.c patch
        external/ibm-public/postfix/dist/src/global/mail_version.h patch
        external/ibm-public/postfix/dist/src/milter/milter.c patch
        external/ibm-public/postfix/dist/src/milter/milter.h patch
        external/ibm-public/postfix/dist/src/milter/milter8.c patch
        external/ibm-public/postfix/dist/src/qmqpd/qmqpd.c patch
        external/ibm-public/postfix/dist/src/smtpd/smtpd.c patch
        external/ibm-public/postfix/dist/src/smtpd/smtpd_check.c patch

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter.
  The PREPEND access/policy action added headers ABOVE Postfix's own
  Received: header, exposing Postfix's own Received: header to Milters
  (protocol violation) and hiding the PREPENDed header from Milters.
  PREPENDed headers are now added BELOW Postfix's own Received: header
  and remain visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject

    [11 lines not shown]

NetBSD — doc 3RDPARTY, external/ibm-public/postfix/dist HISTORY makedefs

Pullup the following, requested by tron in ticket #459:

        doc/3RDPARTY                                        1.1195
        external/ibm-public/postfix/dist/HISTORY        patch
        external/ibm-public/postfix/dist/makedefs        patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup.h patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_message.c patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_milter.c patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_state.c patch
        external/ibm-public/postfix/dist/src/global/mail_version.h patch
        external/ibm-public/postfix/dist/src/milter/milter.c patch
        external/ibm-public/postfix/dist/src/milter/milter.h patch
        external/ibm-public/postfix/dist/src/milter/milter8.c patch
        external/ibm-public/postfix/dist/src/qmqpd/qmqpd.c patch
        external/ibm-public/postfix/dist/src/smtpd/smtpd.c patch
        external/ibm-public/postfix/dist/src/smtpd/smtpd_check.c patch

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter.
  The PREPEND access/policy action added headers ABOVE Postfix's own
  Received: header, exposing Postfix's own Received: header to Milters
  (protocol violation) and hiding the PREPENDed header from Milters.
  PREPENDed headers are now added BELOW Postfix's own Received: header
  and remain visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject

    [11 lines not shown]

EdgeBSD — doc 3RDPARTY, external/ibm-public/postfix/dist HISTORY makedefs

Pullup the following, requested by tron in ticket #459:

        doc/3RDPARTY                                        1.1195
        external/ibm-public/postfix/dist/HISTORY        patch
        external/ibm-public/postfix/dist/makedefs        patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup.h patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_message.c patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_milter.c patch
        external/ibm-public/postfix/dist/src/cleanup/cleanup_state.c patch
        external/ibm-public/postfix/dist/src/global/mail_version.h patch
        external/ibm-public/postfix/dist/src/milter/milter.c patch
        external/ibm-public/postfix/dist/src/milter/milter.h patch
        external/ibm-public/postfix/dist/src/milter/milter8.c patch
        external/ibm-public/postfix/dist/src/qmqpd/qmqpd.c patch
        external/ibm-public/postfix/dist/src/smtpd/smtpd.c patch
        external/ibm-public/postfix/dist/src/smtpd/smtpd_check.c patch

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter.
  The PREPEND access/policy action added headers ABOVE Postfix's own
  Received: header, exposing Postfix's own Received: header to Milters
  (protocol violation) and hiding the PREPENDed header from Milters.
  PREPENDed headers are now added BELOW Postfix's own Received: header
  and remain visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject

    [11 lines not shown]

NetBSD — external/ibm-public/postfix/dist makedefs, external/ibm-public/postfix/dist/src/cleanup cleanup.h

Resolve conflicts from last import.

NetBSD — external/ibm-public/postfix/dist makedefs, external/ibm-public/postfix/dist/src/cleanup cleanup.h

Resolve conflicts from last import.

NetBSD — external/ibm-public/postfix/dist makedefs, external/ibm-public/postfix/dist/src/cleanup cleanup.h

Resolve conflicts from last import.

NetBSD — external/ibm-public/postfix/dist HISTORY, external/ibm-public/postfix/dist/src/cleanup cleanup_message.c cleanup_state.c

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter. The
  PREPEND access/policy action added headers ABOVE Postfix's own Received:
  header, exposing Postfix's own Received: header to Milters (protocol
  violation) and hiding the PREPENDed header from Milters. PREPENDed
  headers are now added BELOW Postfix's own Received: header and remain
  visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject
  messages for check_reverse_client_hostname_access and
  check_reverse_client_hostname_{mx,ns}_access. They replied with the
  verified client name, instead of the name that was rejected.
- The TLS client logged that an anonymous TLS connection was "Untrusted",
  instead of "Anonymous".
- Fix for configurations that prepend message headers with Postfix access
  maps, policy servers or Milter applications. Postfix now hides its own
  Received: header from Milters and exposes prepended headers to Milters,
  regardless of the mechanism used to prepend a header. This fix reverts
  a partial solution that was released on October 13, 2014, and replaces
  it with a complete solution.

NetBSD — external/ibm-public/postfix/dist HISTORY, external/ibm-public/postfix/dist/src/cleanup cleanup_message.c cleanup_state.c

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter. The
  PREPEND access/policy action added headers ABOVE Postfix's own Received:
  header, exposing Postfix's own Received: header to Milters (protocol
  violation) and hiding the PREPENDed header from Milters. PREPENDed
  headers are now added BELOW Postfix's own Received: header and remain
  visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject
  messages for check_reverse_client_hostname_access and
  check_reverse_client_hostname_{mx,ns}_access. They replied with the
  verified client name, instead of the name that was rejected.
- The TLS client logged that an anonymous TLS connection was "Untrusted",
  instead of "Anonymous".
- Fix for configurations that prepend message headers with Postfix access
  maps, policy servers or Milter applications. Postfix now hides its own
  Received: header from Milters and exposes prepended headers to Milters,
  regardless of the mechanism used to prepend a header. This fix reverts
  a partial solution that was released on October 13, 2014, and replaces
  it with a complete solution.

NetBSD — external/ibm-public/postfix/dist HISTORY makedefs, external/ibm-public/postfix/dist/src/cleanup cleanup_message.c cleanup_state.c

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter. The
  PREPEND access/policy action added headers ABOVE Postfix's own Received:
  header, exposing Postfix's own Received: header to Milters (protocol
  violation) and hiding the PREPENDed header from Milters. PREPENDed
  headers are now added BELOW Postfix's own Received: header and remain
  visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject
  messages for check_reverse_client_hostname_access and
  check_reverse_client_hostname_{mx,ns}_access. They replied with the
  verified client name, instead of the name that was rejected.
- The TLS client logged that an anonymous TLS connection was "Untrusted",
  instead of "Anonymous".
- Fix for configurations that prepend message headers with Postfix access
  maps, policy servers or Milter applications. Postfix now hides its own
  Received: header from Milters and exposes prepended headers to Milters,
  regardless of the mechanism used to prepend a header. This fix reverts
  a partial solution that was released on October 13, 2014, and replaces
  it with a complete solution.

NetBSD — external/ibm-public/postfix/dist HISTORY, external/ibm-public/postfix/dist/src/cleanup cleanup_message.c cleanup_state.c

Import Postfix 2.11.3. Changes since version 2.11.1:
- Fix for DMARC implementations based on SPF policy plus DKIM Milter. The
  PREPEND access/policy action added headers ABOVE Postfix's own Received:
  header, exposing Postfix's own Received: header to Milters (protocol
  violation) and hiding the PREPENDed header from Milters. PREPENDed
  headers are now added BELOW Postfix's own Received: header and remain
  visible to Milters.
- The Postfix SMTP server logged an incorrect client name in reject
  messages for check_reverse_client_hostname_access and
  check_reverse_client_hostname_{mx,ns}_access. They replied with the
  verified client name, instead of the name that was rejected.
- The TLS client logged that an anonymous TLS connection was "Untrusted",
  instead of "Anonymous".
- Fix for configurations that prepend message headers with Postfix access
  maps, policy servers or Milter applications. Postfix now hides its own
  Received: header from Milters and exposes prepended headers to Milters,
  regardless of the mechanism used to prepend a header. This fix reverts
  a partial solution that was released on October 13, 2014, and replaces
  it with a complete solution.

OpenBSD — usr.sbin/relayd ssl_privsep.c relayd.h, usr.sbin/smtpd ssl_privsep.c ssl.h

LibreSSL now supports loading of CA certificates from memory, replace
the internal and long-serving ssl_ctx_load_verify_memory() function
with a call to the SSL_CTX_load_verify_mem() API function.  The
ssl_privsep.c file with hacks for using OpenSSL in privsep'ed
processes can now go away; portable versions of smtpd and relayd
should start depending on LibreSSL or they have to carry ssl_privsep.c
in openbsd-compat to work with legacy OpenSSL.  No functional change.

Based on previous discussions with gilles@ bluhm@ and many others
OK bluhm@ (as part of the libcrypto/libssl/libtls diff)

Bitrig — usr.sbin/relayd ssl_privsep.c relayd.h, usr.sbin/smtpd ssl_privsep.c ssl.h

LibreSSL now supports loading of CA certificates from memory, replace
the internal and long-serving ssl_ctx_load_verify_memory() function
with a call to the SSL_CTX_load_verify_mem() API function.  The
ssl_privsep.c file with hacks for using OpenSSL in privsep'ed
processes can now go away; portable versions of smtpd and relayd
should start depending on LibreSSL or they have to carry ssl_privsep.c
in openbsd-compat to work with legacy OpenSSL.  No functional change.

Based on previous discussions with gilles@ bluhm@ and many others
OK bluhm@ (as part of the libcrypto/libssl/libtls diff)

Bitrig — usr.sbin/relayd ssl_privsep.c relayd.h, usr.sbin/smtpd ssl_privsep.c ssl.h

LibreSSL now supports loading of CA certificates from memory, replace
the internal and long-serving ssl_ctx_load_verify_memory() function
with a call to the SSL_CTX_load_verify_mem() API function.  The
ssl_privsep.c file with hacks for using OpenSSL in privsep'ed
processes can now go away; portable versions of smtpd and relayd
should start depending on LibreSSL or they have to carry ssl_privsep.c
in openbsd-compat to work with legacy OpenSSL.  No functional change.

Based on previous discussions with gilles@ bluhm@ and many others
OK bluhm@ (as part of the libcrypto/libssl/libtls diff)

Bitrig — usr.sbin/smtpd smtpd.h queue_fs.c

use <limits.h> comprehensively.  For now try to push <> includes to
each .c file, and out of the .h files.  To avoid overinclude.
ok gilles, in principle.  If this has been done right, -portable should
become easier to maintain.
Delta File
+38 -38 usr.sbin/smtpd/smtpd.h
+16 -16 usr.sbin/smtpd/queue_fs.c
+14 -14 usr.sbin/smtpd/smtp_session.c
+10 -10 usr.sbin/smtpd/smtpd.c
+9 -7 usr.sbin/smtpd/table.c
+8 -8 usr.sbin/smtpd/mta.c
+198 -131 61 files not shown
+293 -224 67 files

OpenBSD — usr.sbin/smtpd smtpd.h queue_fs.c

use <limits.h> comprehensively.  For now try to push <> includes to
each .c file, and out of the .h files.  To avoid overinclude.
ok gilles, in principle.  If this has been done right, -portable should
become easier to maintain.
Delta File
+38 -38 usr.sbin/smtpd/smtpd.h
+16 -16 usr.sbin/smtpd/queue_fs.c
+14 -14 usr.sbin/smtpd/smtp_session.c
+10 -10 usr.sbin/smtpd/smtpd.c
+9 -7 usr.sbin/smtpd/table.c
+8 -8 usr.sbin/smtpd/mta.c
+198 -131 61 files not shown
+293 -224 67 files

Bitrig — usr.sbin/smtpd smtpd.h queue_fs.c

use <limits.h> comprehensively.  For now try to push <> includes to
each .c file, and out of the .h files.  To avoid overinclude.
ok gilles, in principle.  If this has been done right, -portable should
become easier to maintain.
Delta File
+38 -38 usr.sbin/smtpd/smtpd.h
+16 -16 usr.sbin/smtpd/queue_fs.c
+14 -14 usr.sbin/smtpd/smtp_session.c
+10 -10 usr.sbin/smtpd/smtpd.c
+9 -7 usr.sbin/smtpd/table.c
+8 -8 usr.sbin/smtpd/mta.c
+198 -131 61 files not shown
+293 -224 67 files

OpenBSD — usr.sbin/relayd ssl_privsep.c relay.c, usr.sbin/smtpd ssl_privsep.c ssl.c

SSL_CTX_use_certificate_chain() has been added to LibreSSL and there
is no need to keep a local copy in ssl_privsep.c.  This adds a little
burden on OpenSMTPD-portable because it will have to put it in
openbsd-compat for compatibility with legacy OpenSSL.

OK gilles@

Bitrig — usr.sbin/relayd ssl_privsep.c relay.c, usr.sbin/smtpd ssl_privsep.c ssl.c

SSL_CTX_use_certificate_chain() has been added to LibreSSL and there
is no need to keep a local copy in ssl_privsep.c.  This adds a little
burden on OpenSMTPD-portable because it will have to put it in
openbsd-compat for compatibility with legacy OpenSSL.

OK gilles@

Bitrig — usr.sbin/relayd ssl_privsep.c relay.c, usr.sbin/smtpd ssl_privsep.c ssl.c

SSL_CTX_use_certificate_chain() has been added to LibreSSL and there
is no need to keep a local copy in ssl_privsep.c.  This adds a little
burden on OpenSMTPD-portable because it will have to put it in
openbsd-compat for compatibility with legacy OpenSSL.

OK gilles@

Bitrig — lib/libtls tls_server.c, usr.sbin/relayd relay.c

The SSL/TLS session Id context is limited to 32 bytes.  Instead of
using the name of relayd relay or smtpd pki, use a 32 byte arc4random
buffer that should be unique for the context.  This fixes an issue in
OpenSMTPD when a long pki name could break the configuration.

OK gilles@ benno@

OpenBSD — lib/libtls tls_server.c, usr.sbin/relayd relay.c

The SSL/TLS session Id context is limited to 32 bytes.  Instead of
using the name of relayd relay or smtpd pki, use a 32 byte arc4random
buffer that should be unique for the context.  This fixes an issue in
OpenSMTPD when a long pki name could break the configuration.

OK gilles@ benno@

Bitrig — lib/libtls tls_server.c, usr.sbin/relayd relay.c

The SSL/TLS session Id context is limited to 32 bytes.  Instead of
using the name of relayd relay or smtpd pki, use a 32 byte arc4random
buffer that should be unique for the context.  This fixes an issue in
OpenSMTPD when a long pki name could break the configuration.

OK gilles@ benno@

Bitrig — bin/cat cat.c, bin/cp cp.c utils.c

Replace <sys/param.h> with <limits.h> and other less dirty headers where
possible.  Annotate <sys/param.h> lines with their current reasons.  Switch
to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc.  Change
MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where
sensible to avoid pulling in the pollution.  These are the files confirmed
through binary verification.
ok guenther, millert, doug (helped with the verification protocol)
Delta File
+18 -18 libexec/ftpd/ftpd.c
+18 -17 usr.sbin/crunchgen/crunchgen.c
+13 -15 usr.sbin/pppd/main.c
+15 -12 usr.bin/diff/diffreg.c
+13 -13 usr.bin/rdist/client.c
+13 -13 sbin/pfctl/pfctl.c
+1,795 -1,817 603 files not shown
+1,885 -1,905 609 files

OpenBSD — bin/cat cat.c, bin/cp cp.c utils.c

Replace <sys/param.h> with <limits.h> and other less dirty headers where
possible.  Annotate <sys/param.h> lines with their current reasons.  Switch
to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc.  Change
MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where
sensible to avoid pulling in the pollution.  These are the files confirmed
through binary verification.
ok guenther, millert, doug (helped with the verification protocol)
Delta File
+22 -22 usr.bin/cvs/client.c
+21 -21 usr.bin/cvs/file.c
+20 -20 usr.bin/cvs/server.c
+18 -18 libexec/ftpd/ftpd.c
+18 -17 usr.sbin/crunchgen/crunchgen.c
+16 -16 usr.bin/cvs/add.c
+2,090 -2,106 663 files not shown
+2,205 -2,220 669 files

Bitrig — bin/cat cat.c, bin/cp cp.c utils.c

Replace <sys/param.h> with <limits.h> and other less dirty headers where
possible.  Annotate <sys/param.h> lines with their current reasons.  Switch
to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc.  Change
MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where
sensible to avoid pulling in the pollution.  These are the files confirmed
through binary verification.
ok guenther, millert, doug (helped with the verification protocol)
Delta File
+18 -18 libexec/ftpd/ftpd.c
+18 -17 usr.sbin/crunchgen/crunchgen.c
+13 -15 usr.sbin/pppd/main.c
+15 -12 usr.bin/diff/diffreg.c
+13 -13 usr.bin/rdist/client.c
+13 -13 sbin/pfctl/pfctl.c
+1,795 -1,817 603 files not shown
+1,885 -1,905 609 files

Bitrig — usr.sbin/smtpd enqueue.c smtpd.c

when enqueueing offline mails from within the daemon session, we should not
rely on getlogin() otherwise mail will end up enqueued as coming from user
who started smtpd.

bug spotted by deraadt@, diff ok todd@

OpenBSD — usr.sbin/smtpd enqueue.c smtpd.c

when enqueueing offline mails from within the daemon session, we should not
rely on getlogin() otherwise mail will end up enqueued as coming from user
who started smtpd.

bug spotted by deraadt@, diff ok todd@

Bitrig — usr.sbin/smtpd enqueue.c smtpd.c

when enqueueing offline mails from within the daemon session, we should not
rely on getlogin() otherwise mail will end up enqueued as coming from user
who started smtpd.

bug spotted by deraadt@, diff ok todd@

Bitrig — usr.sbin/smtpd table.c

recipient and sender lists now support the user+TAG notation, allowing
among other things a secondary MX to filter recipients to be relayed to a
primary MX even if they are using tags. there are other nice things to do
with that feature, use your imagination.

tested and ok florian@, tested by several users for a few days too
Delta File
+17 -2 usr.sbin/smtpd/table.c
+17 -2 1 file

OpenBSD — usr.sbin/smtpd table.c

recipient and sender lists now support the user+TAG notation, allowing
among other things a secondary MX to filter recipients to be relayed to a
primary MX even if they are using tags. there are other nice things to do
with that feature, use your imagination.

tested and ok florian@, tested by several users for a few days too
Delta File
+17 -2 usr.sbin/smtpd/table.c
+17 -2 1 file

Bitrig — usr.sbin/smtpd table.c

recipient and sender lists now support the user+TAG notation, allowing
among other things a secondary MX to filter recipients to be relayed to a
primary MX even if they are using tags. there are other nice things to do
with that feature, use your imagination.

tested and ok florian@, tested by several users for a few days too
Delta File
+17 -2 usr.sbin/smtpd/table.c
+17 -2 1 file

Bitrig — usr.sbin/smtpd smtp_session.c

bring back reverted commits, the crash was unrelated
Delta File
+23 -17 usr.sbin/smtpd/smtp_session.c
+23 -17 1 file

Bitrig — usr.sbin/smtpd smtp_session.c

bring back reverted commits, the crash was unrelated
Delta File
+23 -17 usr.sbin/smtpd/smtp_session.c
+23 -17 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

bring back reverted commits, the crash was unrelated
Delta File
+23 -17 usr.sbin/smtpd/smtp_session.c
+23 -17 1 file

Bitrig — usr.sbin/smtpd smtp_session.c

revert two latest commits until a crash is fixed
Delta File
+17 -23 usr.sbin/smtpd/smtp_session.c
+17 -23 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

revert two latest commits until a crash is fixed
Delta File
+17 -23 usr.sbin/smtpd/smtp_session.c
+17 -23 1 file

Bitrig — usr.sbin/smtpd smtp_session.c

revert two latest commits until a crash is fixed
Delta File
+17 -23 usr.sbin/smtpd/smtp_session.c
+17 -23 1 file

OpenBSD — usr.sbin/smtpd smtp_session.c

revert two latest commits until a crash is fixed
Delta File
+17 -23 usr.sbin/smtpd/smtp_session.c
+17 -23 1 file

OpenBSD — usr.sbin/smtpd delivery_filename.c

unbreak the delivery_filename backend, now that it no longer prepends the
From separator line but gets it injected in its iobuf by the mda process,
we need to make sure not to escape the first 'From ' we receive.

spotted by deraadt@
Delta File
+10 -3 usr.sbin/smtpd/delivery_filename.c
+10 -3 1 file

Bitrig — usr.sbin/smtpd delivery_filename.c

unbreak the delivery_filename backend, now that it no longer prepends the
From separator line but gets it injected in its iobuf by the mda process,
we need to make sure not to escape the first 'From ' we receive.

spotted by deraadt@
Delta File
+10 -3 usr.sbin/smtpd/delivery_filename.c
+10 -3 1 file

Bitrig — usr.sbin/smtpd delivery_filename.c

unbreak the delivery_filename backend, now that it no longer prepends the
From separator line but gets it injected in its iobuf by the mda process,
we need to make sure not to escape the first 'From ' we receive.

spotted by deraadt@
Delta File
+10 -3 usr.sbin/smtpd/delivery_filename.c
+10 -3 1 file

OpenBSD — usr.sbin/smtpd delivery_filename.c

unbreak the delivery_filename backend, now that it no longer prepends the
From separator line but gets it injected in its iobuf by the mda process,
we need to make sure not to escape the first 'From ' we receive.

spotted by deraadt@
Delta File
+10 -3 usr.sbin/smtpd/delivery_filename.c
+10 -3 1 file

OpenBSD — usr.sbin/smtpd parser.c

rename a variable to avoid a warning

spotted by deraadt@
Delta File
+15 -15 usr.sbin/smtpd/parser.c
+15 -15 1 file

Bitrig — usr.sbin/smtpd parser.c

rename a variable to avoid a warning

spotted by deraadt@
Delta File
+15 -15 usr.sbin/smtpd/parser.c
+15 -15 1 file

Bitrig — usr.sbin/smtpd parser.c

rename a variable to avoid a warning

spotted by deraadt@
Delta File
+15 -15 usr.sbin/smtpd/parser.c
+15 -15 1 file

OpenBSD — usr.sbin/smtpd parser.c

rename a variable to avoid a warning

spotted by deraadt@
Delta File
+15 -15 usr.sbin/smtpd/parser.c
+15 -15 1 file