OpenBSD/src cppeX2Qusr.sbin/relayd relayd.c

   fix scan-build dead stores findings

   OK stsp
VersionDeltaFile
1.196+3-4usr.sbin/relayd/relayd.c
+3-41 files

OpenBSD/src TcBhlasusr.sbin/relayd relay_http.c

   fix missing initialisation

   It is possible that "request_method" is checked without having been
   initialised in line 439.

   OK kirill@ stsp@
VersionDeltaFile
1.92+2-2usr.sbin/relayd/relay_http.c
+2-21 files

OpenBSD/src CZfl9RWlib/libcrypto/mlkem mlkem_internal.c mlkem.c

   mlkem: clear a few (pointers to) secrets

   The ML-KEM code is doing a pretty poor job at cleaning up secrets it no
   longer needs. This commit clears a few stack-based arrays containing
   secrets or not obviously public information and stack-based structs
   containing pointers to secrets.

   ok jsing kenjiro
VersionDeltaFile
1.5+37-9lib/libcrypto/mlkem/mlkem_internal.c
1.6+10-4lib/libcrypto/mlkem/mlkem.c
+47-132 files

OpenBSD/src oXN8dwFlib/libcrypto/mlkem mlkem_internal.c mlkem_key.c, regress/lib/libcrypto/mlkem mlkem_tests.c mlkem_iteration_tests.c

   Rename RANK{768,1024} to MLKEM{768,1024}_RANK

   RANK768 and RANK1024 are awfully short and generic names for public
   constants. Before we make it worse with similarly named constants for
   ML-DSA, let's fix this. This follows the naming convention used by the
   other macros in the mlkem code.

   ok kenjiro jsing
VersionDeltaFile
1.4+19-19lib/libcrypto/mlkem/mlkem_internal.c
1.5+13-13lib/libcrypto/mlkem/mlkem_key.c
1.11+11-11regress/lib/libcrypto/mlkem/mlkem_tests.c
1.9+9-9lib/libcrypto/mlkem/mlkem.h
1.5+6-6lib/libcrypto/mlkem/mlkem.c
1.9+5-5regress/lib/libcrypto/mlkem/mlkem_iteration_tests.c
+63-633 files not shown
+72-729 files

OpenBSD/src ZdPkb4Fshare/man/man1 dpb.1

   document wipe-all
VersionDeltaFile
1.35+5-2share/man/man1/dpb.1
+5-21 files

OpenBSD/src Huuv7q4usr.sbin/relayd carp.c

   relayd: fix dead store and unindent carp_demote_init

   Found by scan-build:
   carp.c:64:7: warning: Although the value stored to 'c' is used in the
   enclosing expression, the value is never actually read from 'c'
   [deadcode.DeadSt ores]
      64 |         if ((c = carp_group_find(group)) == NULL)

   Feedback from Crystal Kolipe and tb@, OK tb@
VersionDeltaFile
1.13+20-21usr.sbin/relayd/carp.c
+20-211 files

OpenBSD/src Ip0l1nrsys/kern init_main.c

   copyright++;
VersionDeltaFile
1.331+2-2sys/kern/init_main.c
+2-21 files

OpenBSD/src Ygg3EZmlib/libcrypto/x509 x509.h

   x509.h: annotate why X509_PKEY cannot be made opaque
VersionDeltaFile
1.126+2-1lib/libcrypto/x509/x509.h
+2-11 files

OpenBSD/src kIFMD51sys/netinet tcp_output.c

   unifdef m_copypack() use

   These ifdefs date back to 1990 in CSRG (SCCS rev 7.20).
   m_copypack() never existed in CSRG releases as far as I can tell.

   ok deraadt@ mvs@
VersionDeltaFile
1.158+1-18sys/netinet/tcp_output.c
+1-181 files

OpenBSD/src Gz03Uvfbin/ksh ksh.1

   Correct POSIX ISBN.  1-55937-255-9 was mistakenly changed to
   1-55937-266-9 when the page was converted to mdoc in rev 1.15
   ok millert@
VersionDeltaFile
1.223+3-3bin/ksh/ksh.1
+3-31 files

OpenBSD/src 5n2VDGJregress/lib/libcrypto/x509 x509_extensions_test.c

   constaints -> constraints
VersionDeltaFile
1.4+2-2regress/lib/libcrypto/x509/x509_extensions_test.c
+2-21 files

OpenBSD/src Bs2shuYlib/libcrypto/asn1 asn1.h, lib/libcrypto/man ASN1_STRING_TABLE_get.3

   Remove STABLE_FLAGS_MALLOC

   Formerly used by ASN1_STRING_TABLE_{add,cleanup}() which were removed two
   years ago. Annotate why STABLE_NO_MASK stays: as usual, security/xca ends
   up being the sole consumer of some nonsense. Apparently it needs its own
   reimplementation of ASN1_STRING_set_by_NID(), another removable public API
   that should never have been exposed.

   ok kenjiro
VersionDeltaFile
1.6+2-3lib/libcrypto/man/ASN1_STRING_TABLE_get.3
1.94+3-2lib/libcrypto/asn1/asn1.h
+5-52 files

OpenBSD/src IRNVASiusr.sbin/rpki-client main.c

   rpki-client: clean up msgbufs when we no longer need them

   ok claudio
VersionDeltaFile
1.303+7-1usr.sbin/rpki-client/main.c
+7-11 files

OpenBSD/src Ve60VWdlib/libcrypto/modes gcm128_i386.c

   Require SSE in order to use gcm_{gmult,ghash}_4bit_mmx().

   Contrary to naming, the '"June" MMX version' of gcm_ghash_4bit_mmx() uses
   SSE, while the 'pure-MMX "May" version' does not. This detail got missed
   when I was untangling OPENSSL_IA32_SSE2.

   Found the hard way by Tate Baldwin and Dennis Camera.
VersionDeltaFile
1.2+2-2lib/libcrypto/modes/gcm128_i386.c
+2-21 files

OpenBSD/src Q0J8gWelib/libcrypto/arch/i386 crypto_cpu_caps.c crypto_arch.h

   Provide CRYPTO_CPU_CAPS_I386_SSE
VersionDeltaFile
1.7+4-2lib/libcrypto/arch/i386/crypto_cpu_caps.c
1.14+2-1lib/libcrypto/arch/i386/crypto_arch.h
+6-32 files

OpenBSD/src 2YhgoDrusr.sbin/rpki-client filemode.c

   rpki-client: plug a leak in filemode

   When displaying an rsync:// uri, filemode would load the file into the
   buf pointer which is never freed. Surprisingly, various static analysis
   tools fail to notice this.

   ok job
VersionDeltaFile
1.74+5-2usr.sbin/rpki-client/filemode.c
+5-21 files

OpenBSD/src 2tkkHxIsys/netinet6 ip6_var.h

   remove unused ip6_sendredirect extern
   the variable is ip6_sendredirects, which has another extern here
VersionDeltaFile
1.129+1-2sys/netinet6/ip6_var.h
+1-21 files

OpenBSD/src tW0Q4xRsys/netinet tcp_timer.h

   remove unused tcp_ttl extern, var replaced by ip_defttl in 1993
VersionDeltaFile
1.28+1-2sys/netinet/tcp_timer.h
+1-21 files

OpenBSD/src 9k9qdCsshare/man/man4 pci.4

   missing Xr; from Jesper Wallin
VersionDeltaFile
1.414+4-4share/man/man4/pci.4
+4-41 files

OpenBSD/src TlAHhb2sys/arch/octeon/include octeonvar.h

   remove unused ffs32() ffs64()
   ok miod@ mpi@ visa@
VersionDeltaFile
1.55+1-27sys/arch/octeon/include/octeonvar.h
+1-271 files

OpenBSD/src w8L7RvWsys/arch/i386/i386 pmap.c

   Introduce pmap_start_tlb_shoot() from amd64 to make the tlb shootdown
   code more similar because a fix is coming and we'd rather place it in
   that inline function than replicate it numerous times.
   ok kettenis
VersionDeltaFile
1.230+45-27sys/arch/i386/i386/pmap.c
+45-271 files

OpenBSD/src wYPsSkSsys/arch/amd64/amd64 lapic.c

   On Intel CPUs writes to the x2APIC MSRs are non-serializing.  This means
   that writes done before sending an IPI may not be visible to other CPUs
   because of out-of-order execution of the MSR write that triggers the IPI.
   Add a "mfence; lfence" barrier like Linux has to prevent this unexpected
   trap.

   ok deraadt@, mlarkin@, mpi@
VersionDeltaFile
1.77+2-1sys/arch/amd64/amd64/lapic.c
+2-11 files

OpenBSD/src IcBOuA5sys/arch/amd64/amd64 cpu.c

   remove unused Xsyscall32 extern, var removed in locore.S rev 1.146
VersionDeltaFile
1.203+2-2sys/arch/amd64/amd64/cpu.c
+2-21 files

OpenBSD/src aMS3QMbusr.sbin/rpki-client print.c ccr.c

   Print CCR hashes in the same way in filemode as elsewhere

   OK tb@
VersionDeltaFile
1.72+13-37usr.sbin/rpki-client/print.c
1.32+6-4usr.sbin/rpki-client/ccr.c
+19-412 files

OpenBSD/src nExbDQ5usr.bin/ssh packet.c

   test the right thing, doofus
VersionDeltaFile
1.331+2-2usr.bin/ssh/packet.c
+2-21 files

OpenBSD/src jDyaMTTusr.bin/ssh packet.c

   avoid possible NULL deref if ssh_packet_check_rekey_blocklimit()
   called before the encrypted transport is brought up.
VersionDeltaFile
1.330+4-1usr.bin/ssh/packet.c
+4-11 files

OpenBSD/src AbLhAXusys/arch/amd64/include cpufunc.h

   make rdpkru() return unsigned, PKRU is all access/write disable bits
   no change in behaviour for existing callers
   ok deraadt@ mlarkin@
VersionDeltaFile
1.47+2-2sys/arch/amd64/include/cpufunc.h
+2-21 files

OpenBSD/src Oz23NRrusr.bin/ssh packet.c sshconnect.c

   Remove bug compatibility for implementations that don't support
   rekeying. AFAIK this is only an ancient Sun SSH version.

   If such an implementation tries to interoperate with OpenSSH, it
   will eventually fail when the transport needs rekeying.

   This is probably long enough to use it to download a modern SSH
   implementation that lacks this problem :)

   ok markus@ deraadt@
VersionDeltaFile
1.329+3-9usr.bin/ssh/packet.c
1.378+7-1usr.bin/ssh/sshconnect.c
1.19+4-1usr.bin/ssh/sshd-session.c
+14-113 files

OpenBSD/src I5pARj6usr.bin/ssh packet.c

   Enforce maximum packet/block limit during pre-authentication phase

   OpenSSH doesn't support rekeying before authentication completes to
   minimise pre-auth attack surface.

   Given LoginGraceTime, MaxAuthTries and strict KEX, it would be
   difficult to send enough data or packets before authentication
   completes to reach a point where rekeying is required, but we'd
   prefer it to be completely impossible.

   So this applies the default volume/packet rekeying limits to the
   pre-auth phase. If these limits are exceeded the connection will
   simply be closed.

   ok dtucker markus
VersionDeltaFile
1.328+67-21usr.bin/ssh/packet.c
+67-211 files

OpenBSD/src 05F2gUJregress/usr.bin/ssh/unittests/sshbuf test_sshbuf.c

   unit tests for sshbuf_consume_upto_child()
VersionDeltaFile
1.3+37-2regress/usr.bin/ssh/unittests/sshbuf/test_sshbuf.c
+37-21 files