OpenBSD/src 5b9zvc0sys/net80211 ieee80211_node.c

   sys/net80211: announce 160MHz channels only when driver supports it

   Support of 160Mhz window brings a regression for drivers which do not
   supprot 160MHz window which leads to the wrong channel center.

   It was tested on iwx with and without 160Mhz window support in the code
   agaisnt 2.4Ghz network with 20Mhz and 40Mhz, and 5Ghz with 40Mhz, 60Mhz,
   80Mhz and 160Mhz window.

   Reported as iwm issue by martijn@

   OK: stsp@
VersionDeltaFile
1.214+27-4sys/net80211/ieee80211_node.c
+27-41 files

OpenBSD/src 2GW21ijusr.bin/tmux window-copy.c

   When in copy mode with a large scroll offset and the window is resized
   so that history shrinks, data->oy can exceed screen_hsize causing an
   unsigned integer underflow in the py computation. Clamp data->oy in
   window_copy_resize and window_copy_cmd_refresh_from_pane before the
   subtraction. From futpib at gmail dot com in GitHub issue 4958.
VersionDeltaFile
1.392+5-1usr.bin/tmux/window-copy.c
+5-11 files

OpenBSD/src kJQffhsregress/usr.bin/ssh proxyjump.sh Makefile

   add a regression test for ProxyJump/-J; ok dtucker
VersionDeltaFile
1.1+102-0regress/usr.bin/ssh/proxyjump.sh
1.144+3-2regress/usr.bin/ssh/Makefile
+105-22 files

OpenBSD/src VVZEowEusr.bin/ssh readconf.c ssh.c

   apply the same validity rules to usernames and hostnames set for
   ProxyJump/-J on the commandline as we do for destination user/host
   names.

   Specifically, they are no longer allowed to contain most characters
   that have special meaning for common shells. Special characters are
   still allowed in ProxyJump commands that are specified in the config
   files.

   This _reduces_ the chance that shell characters from a hostile -J
   option from ending up in a shell execution context.

   Don't pass untrusted stuff to the ssh commandline, it's not intended
   to be a security boundary. We try to make it safe where we can, but
   we can't make guarantees, because we can't know the parsing rules
   and special characters for all the shells in the world, nor can we
   know what the user does with this data in their ssh_config wrt
   percent expansion, LocalCommand, match exec, etc.


    [4 lines not shown]
VersionDeltaFile
1.411+86-38usr.bin/ssh/readconf.c
1.629+7-43usr.bin/ssh/ssh.c
1.163+4-2usr.bin/ssh/readconf.h
+97-833 files

OpenBSD/src KqJAZduregress/lib/libssl/client clienttest.c, regress/lib/libssl/tlsext tlsexttest.c

   libssl regress: adjust golden numbers for RSASSA-PSS

   Add the three RSASSA-PSS SignatureScheme 0x080b, 0x080a, 0x0809 in the
   appropriate spots in (components of) the ClientHello and adjust various
   length octets by adding 6.
VersionDeltaFile
1.47+33-30regress/lib/libssl/client/clienttest.c
1.96+11-9regress/lib/libssl/tlsext/tlsexttest.c
+44-392 files

OpenBSD/src 0ueWZ2Rlib/libssl ssl_sigalgs.c

   libssl: announce support for RSASSA-PSS signature schemes

   Announce the signature schemes for RSASSA-PSS with pubkey OID RSASSA-PSS
   between RSASSA-PSS with pubkey OID rsaEncryption and RSASSA-PKCS1-v1_5.

   This is the last step in the everlasting saga for making these signature
   schemes and certificates with RSASSA-PSS OID work. Fortunately, these are
   rarely used since they are extremely complex and inefficient also due to
   the large size of the parameters. This addresses bug reports by Steffen
   Ullrich and Tom Lane.

   Tested by bluhm.

   ok djm jsing kenjiro
VersionDeltaFile
1.53+7-1lib/libssl/ssl_sigalgs.c
+7-11 files

OpenBSD/src XZZzxG9lib/libssl ssl_sigalgs.c

   ssl_sigalg_pkey_ok: allow RSASSA-PSS with pubkey OID RSASSA-PSS

   This fixes a long-standing logic error that hasn't been noticed because
   we never announced the rsa_pss_pss_sha{256,384,512} SignatureScheme. The
   EVP_PKEY_id() of a RSA-PSS pubkey is EVP_PKEY_RSA_PSS, not EVP_PKEY_RSA.

   Thanks to beck for helping me figure out how to fix this correctly. It
   drove me nuts for a very long time. Problem also noticed by Tom Lane
   due to some PostgreSQL regress failures.

   ok djm jsing kenjiro
VersionDeltaFile
1.52+6-5lib/libssl/ssl_sigalgs.c
+6-51 files

OpenBSD/src GDzAGkDlib/libssl ssl_sigalgs.c

   ssl_sigalgs: whitespace tweak
VersionDeltaFile
1.51+2-1lib/libssl/ssl_sigalgs.c
+2-11 files

OpenBSD/src kqqepaKgnu/usr.bin/perl/cpan/OpenBSD-Unveil/lib/OpenBSD Unveil.pm

   Improve OpenBSD::Unveil POD

   The choice of variable names made it somewhat unclear what arguments
   to pass and made it seem the interface might differ from unveil(2).

   ok dgl@
VersionDeltaFile
1.2+9-4gnu/usr.bin/perl/cpan/OpenBSD-Unveil/lib/OpenBSD/Unveil.pm
+9-41 files

OpenBSD/src US08OK0sys/dev/pci if_iwx.c

   sys/iwx: enable 160Mhz window at 5Ghz

   OK: kn@, phessler@, stsp@
VersionDeltaFile
1.226+75-6sys/dev/pci/if_iwx.c
+75-61 files

OpenBSD/src rpV4hDisys/net80211 ieee80211_node.c ieee80211.h

   sys/net80211: support of 160Mhz window at 5Ghz

   OK: kn@, phessler@, stsp@
VersionDeltaFile
1.213+63-11sys/net80211/ieee80211_node.c
1.66+6-2sys/net80211/ieee80211.h
1.101+6-2sys/net80211/ieee80211_node.h
+75-153 files

OpenBSD/src cEN5VdOsys/netinet igmp.c, sys/netinet6 mld6.c

   Remove useless memory barriers in igmp and mld6 timer.

   Multicast timers are protected by poper locks.  The shortcut that
   avoids locking when no timers are scheduled, does not need an
   additional membar.

   OK mvs@
VersionDeltaFile
1.98+12-13sys/netinet/igmp.c
1.75+9-13sys/netinet6/mld6.c
+21-262 files

OpenBSD/src xxnVONuinclude fnmatch.h

   FNM_CASEFOLD (and its synonym FNM_IGNORECASE) are now part of POSIX.1-2024

   Flagged by Sortix os-test.

   ok millert@, guenther@
VersionDeltaFile
1.9+6-2include/fnmatch.h
+6-21 files

OpenBSD/src 3iM0BWisys/tmpfs tmpfs_subr.c

   sys/tmpfs: use getnanotime() like FFS and MFS

   Editing files on tmpfs uses nanotime() to update mtime, and touch uses
   utimensat(UTIME_NOW) which uses getnanotime() which is cached and which
   can be smaller.

   So, sed ... A && touch B leads to mtime(A) > mtime(B) which isn't excted.

   "Yep" deraadt@
VersionDeltaFile
1.28+2-2sys/tmpfs/tmpfs_subr.c
+2-21 files

OpenBSD/src TjHPfoClib/libcrypto/mlkem mlkem_internal.c

   ML-KEM: ensure that key_768 is only dereferenced with 768-bit keys

   This looks like a NULL dereference that should crash, but for some reason
   it doesn't, even with -O0 with all compilers i tried.  At the very least it
   may result in compilers deducing that key_768 != NULL and lead to incorrect
   optimizations.

   ok claudio jsing kenjiro miod
VersionDeltaFile
1.8+7-3lib/libcrypto/mlkem/mlkem_internal.c
+7-31 files

OpenBSD/src IpzbTqDregress/lib/libcrypto/assembly Makefile

   Add missing include path required to reach newly added crypto_assembly.h
   include.
VersionDeltaFile
1.3+3-2regress/lib/libcrypto/assembly/Makefile
+3-21 files

OpenBSD/src yy24vB8sys/dev/ic qwx.c qwz.c

   Fix typo.
VersionDeltaFile
1.103+2-2sys/dev/ic/qwx.c
1.23+2-2sys/dev/ic/qwz.c
+4-42 files

OpenBSD/src GUMfoR1usr.bin/ssh progressmeter.c

   switch from int to long long for bandwidth calculations; fixes
   rate display when rate > 2GB/s; based on patch from Cyril Servant
   feedback/ok deraadt@
VersionDeltaFile
1.57+3-3usr.bin/ssh/progressmeter.c
+3-31 files

OpenBSD/src erKbJ16lib/libc/sys pledge.2

   After the kernel-writes-the-buffer changes to profil(2) a year ago, the
   profil(2) call only works for stop/restart of profiling.  So pledge no
   longer interferes and it is available in "stdio".
VersionDeltaFile
1.80+2-7lib/libc/sys/pledge.2
+2-71 files

OpenBSD/src oPRguaousr.sbin/vmd vioqcow2.c

   Remove pthread rwlocks from vmd(8)'s qcow code.

   The users of this code are single threaded today. The locks also
   don't look to fully protect key state in qcow images. If/when virtio
   block emulation ends up with multiple virtqueues, this will need
   to be revisited.

   ok mlarkin@, hshoexer@
VersionDeltaFile
1.27+2-12usr.sbin/vmd/vioqcow2.c
+2-121 files

OpenBSD/src GVnWRrGlib/libcrypto/md5 md5_amd64_generic.S, lib/libcrypto/sha sha1_amd64_generic.S sha1_amd64_shani.S

   Include crypto_assembly.h instead of manually ensuring _CET_ENDBR exists.

   ok kenjiro@ tb@
VersionDeltaFile
1.2+2-6lib/libcrypto/md5/md5_amd64_generic.S
1.5+2-6lib/libcrypto/sha/sha1_amd64_generic.S
1.4+2-6lib/libcrypto/sha/sha1_amd64_shani.S
1.6+2-6lib/libcrypto/sha/sha256_amd64_generic.S
1.4+2-6lib/libcrypto/sha/sha256_amd64_shani.S
1.4+2-6lib/libcrypto/sha/sha512_amd64_generic.S
+12-366 files

OpenBSD/src JSqHMZ9lib/libcrypto crypto_assembly.h

   Provide a crypto_assembly.h internal header.

   This will contain defines and macros that we need for assembly code,
   without polluting other headers that are primarily used for C code.

   For now, this just unconditionally provides _CET_ENDBR on amd64.

   ok kenjiro@ tb@
VersionDeltaFile
1.1+30-0lib/libcrypto/crypto_assembly.h
+30-01 files

OpenBSD/src hIObrY5lib/libtls tls_ocsp.c

   libtls: const workarounds for X509_NAME in OCSP for OpenSSL 4

   The API to look up a cert by subject or issuer name clearly only needs to
   do name comparisons in a collection of certs so should by all means take a
   const X509_NAME * as an argument. However, this isn't all that easy to do
   and hence it's only in OpenSSL 4 that this obvious step was reached.

   This means that there is no way around casting for older code. One could
   cast the return value of X509_get_issuer_name() or the argument passed to
   the two lookups by subject. jsing slightly prefers the second approach,
   so this is what we do here.

   ok djm jsing kenjiro
VersionDeltaFile
1.27+5-4lib/libtls/tls_ocsp.c
+5-41 files

OpenBSD/src uTH9Jerlib/libtls tls_conninfo.c tls_verify.c

   libtls: simple cases of const for X509_NAME *

   After the const sprinkling in OpenSSL 1.1, X509_get_{issuer,subject}_name()
   still returned a non-const pointer for unclear reasons. In OpenSSL 4,
   the return value also grew a const qualifier, so move the two "name" in
   tls_conninfo.c and the "subject_name" in tls_verify.c to const. They are
   only used for further processing by already const correct functions (at
   least as far as X509_NAME is concerned).

   ok djm jsing kenjiro
VersionDeltaFile
1.29+3-3lib/libtls/tls_conninfo.c
1.33+3-3lib/libtls/tls_verify.c
+6-62 files

OpenBSD/src dqBqidjregress/sys/kern/pledge/open open.c Makefile

   Test that __pledge_open can bypass unveil.
VersionDeltaFile
1.2+11-3regress/sys/kern/pledge/open/open.c
1.2+5-1regress/sys/kern/pledge/open/Makefile
+16-42 files

OpenBSD/src svsPpnYusr.bin/ssh channels.c

   ensure c->local_window doesn't underflow during updates;
   similar to checks performed elsewhere. From Renaud Allard
VersionDeltaFile
1.458+5-2usr.bin/ssh/channels.c
+5-21 files

OpenBSD/src TQttVmHusr.bin/ssh sshbuf-misc.c

   fix base16 parsing; currently unused. From Renaud Allard
VersionDeltaFile
1.23+2-2usr.bin/ssh/sshbuf-misc.c
+2-21 files

OpenBSD/src ciB6F3iusr.bin/ssh sshd_config.5

   mention that RevokedKeys is read by the server at each
   authentication time and should only ever be replaced
   atomically.
VersionDeltaFile
1.397+7-2usr.bin/ssh/sshd_config.5
+7-21 files

OpenBSD/src GFHSR4Jusr.bin/ssh monitor.c

   fix potential hang if /etc/moduli doesn't contain the requested
   DH group values; from 77c9ca, ok dtucker@, markus@
VersionDeltaFile
1.255+1-2usr.bin/ssh/monitor.c
+1-21 files

OpenBSD/src Vu0aW4Rlib/libc/sys open.2

   improve explanation of when it __pledge_open works
VersionDeltaFile
1.55+6-3lib/libc/sys/open.2
+6-31 files