===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/73.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -r1.15 -r1.16
--- www/73.html 2023/04/03 03:40:32 1.15
+++ www/73.html 2023/04/03 04:02:09 1.16
@@ -370,7 +370,7 @@
driver for the Synopsis DesignWare Ethernet QoS controller used on the
NXP i.MX8MP, the Rockchip RK35xx series and Intel Elkhart Lake.
Worked around an issue on the StarFive JH7100 SoC to make dwge(4) ethernet work
+ href="https://man.openbsd.org/dwge.4">dwge(4) Ethernet work
reliably on the StarFive VisionFive 1 board.
In mvneta(4),
passed MII flags depending on the phy mode specified in the device
@@ -452,7 +452,7 @@
this feature.
Execute-Only permission on memory mappings. This uses hardware
support where possible and emulation where the hardware does not have
- seperate execute only features.
+ separate execute only features.
Stack permission on mappings: On every system call the stack
pointer is checked. It must point to a mapping that has MAP_STACK
permissions.
@@ -543,7 +543,7 @@
href="https://man.openbsd.org/bgplgd.8">bgplgd(8):
- Improved performance by optimising the output filters
-
- Add Autonomous System Provider Authorization (ASPA) validaton
+
- Add Autonomous System Provider Authorization (ASPA) validation
based on draft-ietf-sidrops-aspa-verification-12
- Introduce avs (ASPA validation state) filter and bgpctl
filter argument
@@ -600,7 +600,7 @@
(such as 'https://') in the SIA signedObject access method.
- Check that the KeyUsage extension is set to nothing but
digitalSignature on End-Entity certificates.
-
- Chect that the KeyUsage extension is set to nothing but keyCertSign
+
- Check that the KeyUsage extension is set to nothing but keyCertSign
and CRLSign on CA certificates.
- Check that the ExtendedKeyUsage extension is absent on CA
certificates.
@@ -883,7 +883,7 @@
of private keys as some systems are starting to disable RSA/SHA1
in libcrypto.
- sftp-server(8): fix a memory leak. GHPR363
-
- ssh(1), sshd(8), ssh-keyscan(1): remove vestigal protocol
+
- ssh(1), sshd(8), ssh-keyscan(1): remove vestigial protocol
compatibility code and simplify what's left.
- Fix a number of low-impact Coverity static analysis findings.
These include several reported via bz2687