OpenBSD/src v6GD2Pyregress/usr.bin/openssl appstest.sh

   Make the openssh test pass after adding mlkem.

   This has a magic value looking for what happens when we HRR,
   more or less assuming it might never change. it now has.

   Commenting it out get us by it, unsure if we should change
   this or get rid of it.

   ok tb@
VersionDeltaFile
1.68+9-8regress/usr.bin/openssl/appstest.sh
+9-81 files

OpenBSD/src SXGFtJLlib/libssl t1_lib.c ssl_tlsext.c, regress/lib/libssl/client clienttest.c

   Hook up X25519MKLEM768 to the TLS 1.3 handshake

   This does the following:

   1) Adds a second key share prediction to the TLS 1.3 handshake.
      We only add one as we are unlikely to want to send more than
      one PQ one, and one classical one and are unlikely to waste
      bytes on a second PQ algorithm (anything that wants something
      else that we support can HRR to get it)

   2) Adds X25519MLKEM768 (4588) to our list of supported groups.
      We add this to our preferred client and server key shares for TLS 1.3
      and we now have a separate list for TLS 1.2 which does not do this,
      cleaning up the old "full list" from the comments.

   3) Updates the golden magic numbers in the regression tests to allow
      for the above two things changing the handshake, so the regress
      tests pass.


    [4 lines not shown]
VersionDeltaFile
1.46+333-27regress/lib/libssl/client/clienttest.c
1.207+30-34lib/libssl/t1_lib.c
1.159+49-2lib/libssl/ssl_tlsext.c
1.106+13-1lib/libssl/tls13_client.c
1.35+4-1lib/libssl/ssl_local.h
1.258+4-1lib/libssl/s3_lib.c
+433-666 files

OpenBSD/src KMdSaEDlib/libssl tls_key_share.c ssl_srvr.c, regress/lib/libssl/tlsext tlsexttest.c

   Add a MLKEM768_X25519 hybrid key share.

   This implements the currently in use MLKEM768_X25519 hybrid
   key share as outlined in

   https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/

   This commit does not yet wire this up to anything, that is done
   in follow on changes.

   ok tb@ jsing@ kenjiro@
VersionDeltaFile
1.9+323-4lib/libssl/tls_key_share.c
1.167+5-5lib/libssl/ssl_srvr.c
1.170+5-5lib/libssl/ssl_clnt.c
1.95+5-5regress/lib/libssl/tlsext/tlsexttest.c
1.11+6-3lib/libssl/tls_internal.h
1.158+4-4lib/libssl/ssl_tlsext.c
+348-262 files not shown
+353-318 files

OpenBSD/src rjrPciJusr.bin/tmux format.c format-draw.c

   Do not read over buffer if format is a single #, and do not loop forever
   if UTF-8 is unfinished in a format. Reported by Giorgi Kobakhia im
   GitHub issue 4735.
VersionDeltaFile
1.339+3-2usr.bin/tmux/format.c
1.30+1-3usr.bin/tmux/format-draw.c
+4-52 files

OpenBSD/src clL9zQSsys/dev/pci if_ixl.c

   Revert activation of SoftLRO by default on ixl(4)

   My ixl(4) are hanging when LRO is active.

   OK jan@ stsp@
VersionDeltaFile
1.114+4-1sys/dev/pci/if_ixl.c
+4-11 files

OpenBSD/src JcBt9A9usr.bin/tmux server-client.c screen-redraw.c

   Fix y offset of mouse if status at top. GitHub issue 4738 from Michael
   Grant.
VersionDeltaFile
1.438+6-2usr.bin/tmux/server-client.c
1.107+6-1usr.bin/tmux/screen-redraw.c
1.378+2-2usr.bin/tmux/window-copy.c
+14-53 files

OpenBSD/src lthuOzQusr.sbin/ldpd kroute.c

   kr_shutdown() and the functions called by it should not try to enqueue
   any imsgs. This code is called late in the parent before exit. There is
   no need to enqueue any imsgs since nothing will send them out and the
   childs are probably gone as well.

   Fixes a crash on shutdown.

   Reported by Alexander Mukhin alexander.i.mukhin (at) gmail.com
   OK tb@ deraadt@
VersionDeltaFile
1.72+8-7usr.sbin/ldpd/kroute.c
+8-71 files

OpenBSD/src 8BZ3iYousr.sbin/rpki-client ccr.c

   rpki-client: convert CCR to opaque ASN1_STRINGs as far as possible

   Add wrappers for hex encoding and copying an ASN.1 string similar to the
   already existing base64 encoding API. Make these and the rest of the file
   use accessors so that it keeps compiling with opaque ASN1_STRING.

   To complete the conversion of rpki-client, which needs to know and set
   unused bits in a BIT STRING, we will need to provide ASN1_BIT_STRING_set1()
   and ASN1_BIT_STRING_get_length() both in libcrypto and in the portable
   compat layer.

   looks good to claudio

   https://github.com/openssl/openssl/issues/29117
   https://github.com/openssl/openssl/issues/29184
   https://github.com/openssl/openssl/issues/29185
VersionDeltaFile
1.30+50-30usr.sbin/rpki-client/ccr.c
+50-301 files

OpenBSD/src Nd1Lgiesys/net80211 ieee80211_node.c

   Fold in support for sha256-psk in addition to psk when PMF is in use on a
   network that uses the default WPA settings in join.

   Fixes my home network and kirill@'s network

   OK stsp@
VersionDeltaFile
1.207+3-3sys/net80211/ieee80211_node.c
+3-31 files

OpenBSD/src K7dMS29usr.sbin/rpki-client ip.c

   rpki-client: zap extra blank line in ip.c
VersionDeltaFile
1.37+1-2usr.sbin/rpki-client/ip.c
+1-21 files

OpenBSD/src KJuJYasusr.bin/tmux utf8-combined.c

   Add a missing skin tone, from Jake Stewart in GitHub issue 4736.
VersionDeltaFile
1.8+2-1usr.bin/tmux/utf8-combined.c
+2-11 files

OpenBSD/src z0jrgYtusr.bin/tmux screen-write.c

   Allow characters to be combined in either order, reported by Jake
   Stewart in GitHub issue 4726.
VersionDeltaFile
1.241+3-1usr.bin/tmux/screen-write.c
+3-11 files

OpenBSD/src HncjlSasys/dev/pci/drm/amd/display/amdgpu_dm amdgpu_dm.c

   disable PSR on virtual connectors

   shouldn't have been part of the writeback connector ifdef
VersionDeltaFile
1.189+1-1sys/dev/pci/drm/amd/display/amdgpu_dm/amdgpu_dm.c
+1-11 files

OpenBSD/src LQqoqSblib/libc/sys getthrname.2, lib/libpthread/man pthread_set_name_np.3

   Update get/setthrname and pthread_get/set_name_np man pages to advise
   of what buffer sizes to use. After discussion with Theo, _MAXCOMLEN
   was the best value to use for these non-portable interfaces. Also update
   for setthrname(2) no longer failing with EINTVAL.

   ok deraadt@
VersionDeltaFile
1.3+9-20lib/libc/sys/getthrname.2
1.10+18-3lib/libpthread/man/pthread_set_name_np.3
+27-232 files

OpenBSD/src Bjb6o4Llib/librthread rthread_np.c

   Ensure that we always return a null terminated string if the user
   passed us a name buffer smaller than the thread name.

   ok deraadt@
VersionDeltaFile
1.26+5-2lib/librthread/rthread_np.c
+5-21 files

OpenBSD/src Aiw1WMWsys/kern kern_prot.c

   Instead of failing with EINVAL when setthrname(2) is passed a thread
   name longer then _MAXCOMLEN-1, truncate the name to fit. This is likely
   what the user wants and saves them from having to snprintf(3) into a
   buffer sized _MAXCOMLEN first. Man page update to follow.

   This makes pthread_set_name_np(3) succeed with long thread names
   instead of silently failing.

   ok deraadt@ miod@ sthen@ mpi@
VersionDeltaFile
1.84+5-3sys/kern/kern_prot.c
+5-31 files

OpenBSD/src YeVZBTrlibexec/ld.so library.c

   Use the correct start address for the initial immutable address range
   for a shared library.  The code used the load offset of the shared
   library instead of the start address of the mapped memory.  In most case
   that works because the first segment of a shared library typically starts
   at virtual address zero.  But on sparc64 (and possibly other architectures
   that still use ld.bfd) libicudata.so from ports has a non-zero virtual
   address (possibly because it is a data-only library).  So this fixes
   the bug reported by claudio@

   ok deraadt@, jca@, claudio@
VersionDeltaFile
1.97+2-2libexec/ld.so/library.c
+2-21 files

OpenBSD/src JlJzM7Susr.sbin/bgpd rde_filter.c

   This moves the code to lookup and set the pftable_id and rtlabel_id
   from rde_apply_set() to filterset_recv(). This was already done in the
   nexthop case.
   OK tb@
VersionDeltaFile
1.138+20-14usr.sbin/bgpd/rde_filter.c
+20-141 files

OpenBSD/src SbSwKdbusr.sbin/rpki-client ip.c

   rpki-client: convert most of ip.c to opaque ASN1_STRING

   There is still a flag access due to unused bits, fixing this will have to
   wait until we have an API everyone agrees on.

   ok claudio
VersionDeltaFile
1.36+15-12usr.sbin/rpki-client/ip.c
+15-121 files

OpenBSD/src V7VpZMLusr.sbin/bgpd rde_filter.c rde.c

   Factor out filterset_send() (simple rename) and filterset_recv() (common
   code) as a first step to optimise filter_set handling in the RDE.

   OK tb@
VersionDeltaFile
1.137+32-1usr.sbin/bgpd/rde_filter.c
1.673+3-27usr.sbin/bgpd/rde.c
1.286+6-19usr.sbin/bgpd/bgpd.c
1.524+6-4usr.sbin/bgpd/bgpd.h
+47-514 files

OpenBSD/src kRIinmddistrib/sets/lists/man mi

   sync
VersionDeltaFile
1.1756+1-0distrib/sets/lists/man/mi
+1-01 files

OpenBSD/src V6MgXA6sys/arch/loongson/include param.h

   The definition of PAGE_SHIFT should not be limited to defined(_KERNEL); this
   prevents userland from getting a valid PAGE_SIZE definition by including
   <machine/param.h>.

   Reported on bugs@
VersionDeltaFile
1.4+1-5sys/arch/loongson/include/param.h
+1-51 files

OpenBSD/src 8BIRkTcusr.sbin/rpki-client ip.c

   rpki-client: fix ip_addr_afi_parse()

   The somewhat weird length checks would nominally accept an octet string
   of length 1, in which case the subsequent memcpy() would perform a 1-byte
   overread (harmless since libcrypto 'helpfully' adds a trailing NUL) since
   ip.c r1.12.

   The only allowed length for an AFI are 2 and 3 per RFC 3779 and SAFI is
   out, so pull the check for presence of the SAfI up and reject other
   lengths != 2.

   Also convert this function to opaque ASN1_STRING.

   ok job
VersionDeltaFile
1.35+14-12usr.sbin/rpki-client/ip.c
+14-121 files

OpenBSD/src B4MAUIfusr.sbin/rpki-client ccr.c

   rpki-client: initialize a variable to appease stupid old gcc

   Somewhat surprisingly, gcc 15 grew the smarts to avoid a false positive
   here.

   ok job
VersionDeltaFile
1.29+2-2usr.sbin/rpki-client/ccr.c
+2-21 files

OpenBSD/src GoMHhbxsys/net80211 ieee80211_node.c ieee80211_ioctl.c

   enable 802.11 AKM SHA256-PSK by default if the driver supports PMF

   test + ok kevlo@
VersionDeltaFile
1.206+12-4sys/net80211/ieee80211_node.c
1.84+5-2sys/net80211/ieee80211_ioctl.c
1.81+3-1sys/net80211/ieee80211_crypto.c
+20-73 files

OpenBSD/src NL5MoUCusr.sbin/rpki-client cms.c

   rpki-client: convert cms.c to opaque ASN1_STRING

   Add length checks for the eContent to avoid malloc(0) and malloc(huge).
   Neither of these should be reachable, but who knows for sure...

   feedback/ok claudio
VersionDeltaFile
1.59+13-4usr.sbin/rpki-client/cms.c
+13-41 files

OpenBSD/src bPwEFSrsbin/ifconfig ifconfig.8 ifconfig.c

   add support for 802.11 AKM SHA256-PSK to ifconfig

   test + ok kevlo@
VersionDeltaFile
1.413+10-4sbin/ifconfig/ifconfig.8
1.480+12-1sbin/ifconfig/ifconfig.c
+22-52 files

OpenBSD/src M2KuvhFusr.sbin/bgpd rde_update.c

   Fix possible use-after-free in up_generate_addpath()

   adjout_prefix_withdraw() is too complex to be sure that there is never a
   case where the prefix is removed and freed. So use the safe idiom and fetch
   the next element before calling adjout_prefix_withdraw().

   Fix for CID 500335
   OK tb@
VersionDeltaFile
1.187+4-3usr.sbin/bgpd/rde_update.c
+4-31 files

OpenBSD/src rkmSJHtsys/uvm uvm_pdaemon.c uvm_aobj.c

   Let the page daemon recover when uao_set_swslot() returns ENOMEM.

   When all available pages have been exhausted it might not be possible for the
   aobj layer to allocate a new element for a hash table.  In that case simply
   skip the page.  The page daemon will likely find a page that can be added to
   the cluster without requiring any allocation in uao_set_swslot().

   Not that this edge case, reported by bluhm@, can be triggered because the
   aiodone daemon releases the memory reserved for the page daemon asynchronously.
   So there might always be a window where no page are available to write pages
   to disk.

   Tested by and ok bluhm@
VersionDeltaFile
1.139+118-41sys/uvm/uvm_pdaemon.c
1.120+14-21sys/uvm/uvm_aobj.c
+132-622 files

OpenBSD/src K447Nlnusr.bin/tmux colour.c

   Improve code readability in colour_palette_get and colour_palette_set.
   GitHub issue 4730 from Pavel Roskin.
VersionDeltaFile
1.31+14-15usr.bin/tmux/colour.c
+14-151 files