<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test/contrib/sendmail, branch main</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test/atom?h=main</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test/atom?h=main'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/'/>
<updated>2020-10-26T17:52:28Z</updated>
<entry>
<title>Key decleration of union semun on src version</title>
<updated>2020-10-26T17:52:28Z</updated>
<author>
<name>Brooks Davis</name>
<email>brooks@FreeBSD.org</email>
</author>
<published>2020-10-26T17:52:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=f61a22193c0d088da51b411bb79e3d6f8a73765d'/>
<id>urn:sha1:f61a22193c0d088da51b411bb79e3d6f8a73765d</id>
<content type='text'>
__FreeBSD__ is defined by the compiler derived from the triple. When
building FreeBSD 11 on a FreeBSD 12 with a CROSS_TOOLCHAIN=llvm10,
__FreeBSD__ was set to 12 when building lib32 (for some reason no triple
is being passed which seems to mean that we're taking default values
from the build system).  This in turn meant we end up with a double
decleration of union semun which is a build error.

Reviewed by:	gshapiro, dim
Differential Revision:	https://reviews.freebsd.org/D26902
</content>
</entry>
<entry>
<title>Merge sendmail 8.16.1 to HEAD: See contrib/sendmail/RELEASE_NOTES for details</title>
<updated>2020-07-15T18:28:54Z</updated>
<author>
<name>Gregory Neil Shapiro</name>
<email>gshapiro@FreeBSD.org</email>
</author>
<published>2020-07-15T18:28:54Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=5b0945b57059d1cde0831d3afea7ec56c7d79508'/>
<id>urn:sha1:5b0945b57059d1cde0831d3afea7ec56c7d79508</id>
<content type='text'>
Includes build infrastructure &amp; config updates required for changes in 8.16.1

MFC after:	5 days
</content>
</entry>
<entry>
<title>Plug possible memory leaks in the previous patch.</title>
<updated>2020-02-27T23:06:12Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2020-02-27T23:06:12Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=8c9735fbe00283210203b3a9de8858c468b7521a'/>
<id>urn:sha1:8c9735fbe00283210203b3a9de8858c468b7521a</id>
<content type='text'>
Two DH_free() calls were accidentally removed.

Pointyhat to:	jkim
</content>
</entry>
<entry>
<title>Do not free p and g parameters after calling DH_set0_pqg(3).</title>
<updated>2020-02-27T22:36:16Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2020-02-27T22:36:16Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=a5f8e6f658eb2b50b1ec165a4ed4a48b85b3ccce'/>
<id>urn:sha1:a5f8e6f658eb2b50b1ec165a4ed4a48b85b3ccce</id>
<content type='text'>
It is specifically mentioned in the manual page.  Note it has no functional
change in reality because DH_set0_pqg() cannot fail when both p and g are
not NULL.
</content>
</entry>
<entry>
<title>Fix style inconsistencies near our OpenSSL 1.1.x patch.</title>
<updated>2020-02-27T22:02:00Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2020-02-27T22:02:00Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=a33b3343362411cd0ccdd9476322cc4662469232'/>
<id>urn:sha1:a33b3343362411cd0ccdd9476322cc4662469232</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix a white space.</title>
<updated>2020-02-27T20:46:30Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2020-02-27T20:46:30Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=3ab9782ad3e826f6c6adbbc08f6dfb14b724a426'/>
<id>urn:sha1:3ab9782ad3e826f6c6adbbc08f6dfb14b724a426</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix broken STARTTLS when SharedMemoryKey is enabled.</title>
<updated>2020-02-27T19:40:29Z</updated>
<author>
<name>Hiroki Sato</name>
<email>hrs@FreeBSD.org</email>
</author>
<published>2020-02-27T19:40:29Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=9b429e21925ced960a7e00af637aa82faafac93a'/>
<id>urn:sha1:9b429e21925ced960a7e00af637aa82faafac93a</id>
<content type='text'>
OpenSSL 1.1 API patch for sendmail had a bug which
prevented sm_RSA_generate_key() function from working.
This function is used to generate a temporary RSA key
for a shared memory region used for TLS processing.
Note that 12.0 and 12.1-RELEASE include this bug.

This affects only if SM_CONF_SHM compile-time
option (enabled by default) and SharedMemoryKey
run-time option (not enabled by default) in a .cf file are
specified.  The latter corresponds to confSHARED_MEMORY_KEY in
a .mc file.

PR:		242861
MFC after:	3 days
Differential Revision:	https://reviews.freebsd.org/D23734
</content>
</entry>
<entry>
<title>Fix various -Wpointer-compare warnings</title>
<updated>2019-10-08T21:14:09Z</updated>
<author>
<name>Brooks Davis</name>
<email>brooks@FreeBSD.org</email>
</author>
<published>2019-10-08T21:14:09Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=f18976136625a7d016e97bfd9eabddf640b3e06d'/>
<id>urn:sha1:f18976136625a7d016e97bfd9eabddf640b3e06d</id>
<content type='text'>
This warning (comparing a pointer against a zero character literal
rather than NULL) has existed since GCC 7.1.0, and was recently added to
Clang trunk.

Almost all of these are harmless, except for fwcontrol's str2node, which
needs to both guard against dereferencing a NULL pointer (though in
practice it appears none of the callers will ever pass one in), as well
as ensure it doesn't parse the empty string as node 0 due to strtol's
awkward interface.

Submitted by:	James Clarke &lt;jtrc27@jrtc27.com&gt;
Obtained from:	CheriBSD
Sponsored by:	DARPA, AFRL
Differential Revision:	https://reviews.freebsd.org/D21914
</content>
</entry>
<entry>
<title>MFV r351553:</title>
<updated>2019-08-27T20:11:45Z</updated>
<author>
<name>Hiroki Sato</name>
<email>hrs@FreeBSD.org</email>
</author>
<published>2019-08-27T20:11:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=76d46bbb0efc05fa0d2250ba8b32d4c70e3f4f16'/>
<id>urn:sha1:76d46bbb0efc05fa0d2250ba8b32d4c70e3f4f16</id>
<content type='text'>
Fix a problem which prevented -OServerSSLOptions or -OClientSSLOptions
specified in the command-line option from working.

This patch has been accepted by the upstream.

Reviewed by and discussed with:	gshapiro
</content>
</entry>
<entry>
<title>Make sendmail work with OpenSSL 1.1 API.  Taken from the ports tree.</title>
<updated>2018-10-01T20:55:01Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2018-10-01T20:55:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test/commit/?id=41451aa34ffc978593a637903c7287bc92ce99bb'/>
<id>urn:sha1:41451aa34ffc978593a637903c7287bc92ce99bb</id>
<content type='text'>
https://svnweb.freebsd.org/ports/head/mail/sendmail/files/patch-tls.c?revision=466240

Requested by:	gshapiro
</content>
</entry>
</feed>
