OpenBSD/src 39zJlOIusr.sbin/httpd httpd.h config.c

   usr.sbin/httpd: inherit gzip-static in locations

   Location configuration inherited most server level options but dropped
   gzip-static, so requests matching a location skipped static gzip lookup
   even when the parent server enabled it.

   Add an explicit no gzip-static state and inherit the gzip flag pair only
   when the location has not set either form, preserving location specific
   overrides.

   Reported by and OK: job@
VersionDeltaFile
1.170+4-3usr.sbin/httpd/httpd.h
1.70+5-1usr.sbin/httpd/config.c
1.132+3-1usr.sbin/httpd/parse.y
+12-53 files

OpenBSD/src ZxBqRQPlibexec/ld.so library.c library_mquery.c

   While technically allowed, shared libraries without PT_LOAD segments
   don't really make any sense.  Bail out early to avoid the bits of code
   that assume that we have a PT_LOAD sagment.  This avoids a NULL pointer
   dereference on i386 (which uses library_mquery.c) or bogus mmap calls
   on other architectures (which use library.c).

   The potential NULL pointer dereference in library_mquery.c was found by
   Frank Denis.

   ok guenther@
VersionDeltaFile
1.99+15-1libexec/ld.so/library.c
1.78+14-1libexec/ld.so/library_mquery.c
+29-22 files

OpenBSD/src Ug4NGZxsys/arch/riscv64/dev pci_machdep.c

   Initialize ih_intrpin for regular (non-vector) MSI interrupts as well.
   Fixes regular MSIs on the SpacemiT K1 SoC.

   ok jsg@
VersionDeltaFile
1.3+2-1sys/arch/riscv64/dev/pci_machdep.c
+2-11 files

OpenBSD/src cIKCHamusr.bin/openssl s_socket.c

   openssl s_socket: do not fail accept on reverse DNS lookup failure

   Found by Frank Denis
VersionDeltaFile
1.15+2-9usr.bin/openssl/s_socket.c
+2-91 files

OpenBSD/src bQgYvLmlib/libc/dlfcn init.c, lib/libc/gen elf_aux_info.c

   libc: declare _hwcap and related variables as hidden

   ok tb@ deraadt@
VersionDeltaFile
1.2+2-5lib/libc/gen/elf_aux_info.c
1.2+6-1lib/libc/hidden/sys/auxv.h
1.25+2-1lib/libc/dlfcn/init.c
+10-73 files

OpenBSD/src bAO6SNYusr.bin/mandoc main.c

   The regression fix in rev. 1.271 was still incomplete.

   While the fchdir(2) in main() is indeed needed such that the mparse_open()
   in process_onefile() finds local files, there is a second, smaller
   issue purely inside check_xr(): As the ultimate fallback, fs_search()
   looks for cross-referenced manual pages in the current directory,
   which is typically used for working on software under development
   that is not yet installed.  Consequently, a second fchdir(2) is needed
   inside check_xr() between mansearch(), which typically changes directory,
   and the subsequent fs_search().

   This makes sure that "mandoc -T lint" on a manual page that contains
   an .Xr link to another manual page that is not installed but present
   in the current directory does not complain about that link.
   Again reported by anton@.

   The fix is slightly awkward because the directory file descriptor
   needs to be passed down through multiple layer of subroutines, but i
   fear that cannot be helped because it is needed both in the main program
   and in the low-level function check_xr().
VersionDeltaFile
1.272+13-11usr.bin/mandoc/main.c
+13-111 files

OpenBSD/src k0zUXRPsys/arch/riscv64/include riscvreg.h, sys/arch/riscv64/riscv64 vector.c cpu.c

   Add kernel support for the vector extension on riscv64.

   The V extension (where supported) adds an additional 32 vector registers
   that are variable length (up to 65,536 bits, but more commonly 2048 bits).
   In order to support the use of the V extension (and additional vector
   extensions) we need to enable the vector extension and save/restore the
   vector registers.

   ok kettenis@
VersionDeltaFile
1.1+168-0sys/arch/riscv64/riscv64/vector.c
1.28+22-9sys/arch/riscv64/riscv64/cpu.c
1.13+22-4sys/arch/riscv64/riscv64/vm_machdep.c
1.43+15-8sys/arch/riscv64/riscv64/machdep.c
1.6+17-1sys/arch/riscv64/include/riscvreg.h
1.23+9-2sys/arch/riscv64/riscv64/trap.c
+253-246 files not shown
+284-3512 files

OpenBSD/src X8ai9I1usr.bin/openssl crl.c

   openssl crl: make verify failure result in "app" failure

   Found by Frank Denis
VersionDeltaFile
1.18+5-4usr.bin/openssl/crl.c
+5-41 files

OpenBSD/src t0p5oYKusr.bin/openssl ecparam.c

   openssl ecparam: make EC_GROUP_check() failure result in "app" failure

   Found by Frank Denis
VersionDeltaFile
1.26+4-3usr.bin/openssl/ecparam.c
+4-31 files

OpenBSD/src 0pZhiLGusr.bin/openssl s_client.c

   openssl s_client: avoid two out of bounds writes

   A NUL termination after an unchecked BIO_read() call in XMSS mode could
   lead to a write one byte before the start of sbuf or one past its end.
   Add an error check to avoid the former and read one byte less to avoid the
   latter.

   Found by Frank Denis
VersionDeltaFile
1.69+4-2usr.bin/openssl/s_client.c
+4-21 files

OpenBSD/src FcPkcGesys/dev/pci if_mwx.c if_mwxreg.h

   Simplify previous by shifting the rcpi value first then use a common mask.
   Also set ic_max_rssi = 0 since this driver will uses DBm reporting.
VersionDeltaFile
1.9+6-6sys/dev/pci/if_mwx.c
1.6+3-6sys/dev/pci/if_mwxreg.h
+9-122 files

OpenBSD/src Ze9aPy3sys/dev/pci if_mwx.c if_mwxreg.h

   Implement RSSI reporting for mwx(4).

   Diff provided by Benjamin Lee McQueen (mcq at disroot.org)
VersionDeltaFile
1.8+48-10sys/dev/pci/if_mwx.c
1.5+12-1sys/dev/pci/if_mwxreg.h
+60-112 files

OpenBSD/src bEdSI2Xlib/libssl ssl_tlsext.c

   libssl: record extension lengths in ClientHello hashing

   The ClientHello hash is intended to ensure that the second CH after an HRR
   only makes the allowed changes to the TLS extensiosn by recording message
   type followed by the raw extension data if it must remain unchanged.
   This makes it possible (in principle) that part of free form extension
   data is confused with type (and length) information of a subsequent
   extension.

   Recording the length after the type prevents such a confusion and fixes
   the framing of the extensions.

   Found by Frank Denis

   ok jsing
VersionDeltaFile
1.160+4-1lib/libssl/ssl_tlsext.c
+4-11 files

OpenBSD/src ik8dUKalib/libssl ssl_lib.c

   ssl_lib: trade two extra empty lines for a missing one
VersionDeltaFile
1.334+2-4lib/libssl/ssl_lib.c
+2-41 files

OpenBSD/src aOOketJsys/dev/sun sunkbd.c

   unifdef call into removed sparc-only tctrl(4)
VersionDeltaFile
1.29+1-16sys/dev/sun/sunkbd.c
+1-161 files

OpenBSD/src vf2g3TJlib/libcrypto/pkcs12 p12_npas.c

   PKCS#12: fix erroneous error check in PKCS12_newpass()

   This is an error I introduced in a refactoring two years ago in r1.20.
   This means that nothing uses this...

   From Frank Denis via logan
VersionDeltaFile
1.29+3-3lib/libcrypto/pkcs12/p12_npas.c
+3-31 files

OpenBSD/src 5uFYuYzsys/scsi cd.c sd.c

   remove unneeded ufs/ffs/fs.h includes

   added for BBSIZE and SBSIZE which are no longer used
VersionDeltaFile
1.268+1-4sys/scsi/cd.c
1.342+1-3sys/scsi/sd.c
+2-72 files

OpenBSD/src 151piwYlib/libcrypto/sha sha256.c

   Use uint32_t instead of SHA_LONG in the SHA-256 code.

   This is more readable and we already have a compile time assert that they
   are the same size.

   ok tb@
VersionDeltaFile
1.38+22-22lib/libcrypto/sha/sha256.c
+22-221 files

OpenBSD/src jWrNEQwlib/libcrypto/sha sha256.c

   Use W rather than X for the SHA-256 message schedule.

   This more closely matches the SHA-256 specification in FIPS 180-4.

   ok tb@
VersionDeltaFile
1.37+83-83lib/libcrypto/sha/sha256.c
+83-831 files

OpenBSD/src qRkcT75lib/libcrypto/sha sha256.c

   Use consistent variable names in the sha256 code.

   Use 'ctx' rather than 'c' for the SHA256_CTX and use data/len rather
   than d/n.

   ok kenjiro@ tb@
VersionDeltaFile
1.36+67-67lib/libcrypto/sha/sha256.c
+67-671 files

OpenBSD/src 8aTQrtalib/libcrypto/sha sha256.c

   Use crypto_add_u32dw_u64() to increment SHA-256 message bit counter.

   ok kenjiro@ tb@
VersionDeltaFile
1.35+3-9lib/libcrypto/sha/sha256.c
+3-91 files

OpenBSD/src vvEINHYlib/libcrypto/sha sha1_aarch64.c

   Correct argument type for SHA context.

   These are SHA_CTX not SHA256_CTX.
VersionDeltaFile
1.2+4-4lib/libcrypto/sha/sha1_aarch64.c
+4-41 files

OpenBSD/src 2IYHwqUlib/libcrypto/sha sha1_aarch64_ce.S sha1_amd64_shani.S

   Correct argument type in comments.
VersionDeltaFile
1.9+2-2lib/libcrypto/sha/sha1_aarch64_ce.S
1.8+2-2lib/libcrypto/sha/sha1_amd64_shani.S
+4-42 files

OpenBSD/src bbXUFapsys/net if_rport.c if_tun.c

   remove unneeded mpls.h includes
VersionDeltaFile
1.13+1-5sys/net/if_rport.c
1.258+1-5sys/net/if_tun.c
+2-102 files

OpenBSD/src gyRC9uRsys/dev/pci if_mwxreg.h

   MT_DMASHDL_SW_CONTROL is accessed via remapping.  Define it with
   the explicit address 0x7c026004 as Linux does to avoid confusion.

   While here, remove duplicate definitions of MT_PCIE_MAC_BASE and
   MT_PCIE_MAC_INT_ENABLE.

   ok claudio@
VersionDeltaFile
1.4+1-4sys/dev/pci/if_mwxreg.h
+1-41 files

OpenBSD/src prxJ2jAusr.bin/awk run.c

   split: allocate space for NUL terminator in CSV mode

   Found by Frank Denis
VersionDeltaFile
1.90+4-2usr.bin/awk/run.c
+4-21 files

OpenBSD/src zZPVUWylib/libc/asr getrrsetbyname_async.c

   Avoid recursive cleanup in getrrsetbyname()

   Instead of freeing struct dns_query and struct dns_rr by walking the
   linked lists recursively, use a simple loop. This avoids a possible
   stack exhaustion unlikely to be reachable with the limits modern
   resolvers impose.

   From Dhiraj Mishra

   ok djm
VersionDeltaFile
1.15+14-13lib/libc/asr/getrrsetbyname_async.c
+14-131 files

OpenBSD/src mroSkezsys/net if_tun.c

   avoid leaking memory when mbuf chain allocations fail in tun_dev_write()

   the mbufs built by tun_dev_write used to be limited to a single
   mbuf and cluster, but has grown in complexity now that it supports
   tun_hdr and tso, which required building mbuf chains. some of the
   error handling when allocating mbuf bits wasnt adapted to free the
   preceding chain when later allocaitons failed, resulting in a memory
   leak.

   reported by frank denis
VersionDeltaFile
1.257+3-3sys/net/if_tun.c
+3-31 files

OpenBSD/src EC4DoVtusr.sbin/rpki-client ip.c

   rpki-client: fix ip_addr_check_overlap()

   There is an off-by-one in the ip_addr_check_overlap() logic which allows
   a newly added interval to overlap in a common end point with an interval
   already in the list. Disallow equality in the two memcmp to avoid this.

   This bug dates back to the initial import of rpki-client where malformed
   certificates would be accepted. In modern rpki-client, the impact of this
   has been minimal ever since we started requiring that libcrypto support
   the RFC 3779 extensions in early 2022 by disallowing unknown critical
   extensions (rpki-client 7.6):

   For certificates this duplicates a check in the X.509 verifier (where it
   is correct). For TA constraints we have a canonicalization procedure that
   ensures the absence of overlaps. For ROAs no such check can be made since
   standards historically haven't required that addresses are canonical and
   still don't. The only remaining use of this API is from rsc.c where the
   overlap condition is indeed a small problem.


    [3 lines not shown]
VersionDeltaFile
1.40+3-3usr.sbin/rpki-client/ip.c
+3-31 files

OpenBSD/src XmLxHobusr.sbin/rpki-client main.c

   rpki-client: fix shortlist and skiplist checks

   Ensure that each le->fqdn is fully matched. If the the host in the SIA
   is short and matches a prefix of an FQDN in the shortlist or skiplist,
   the current checks in queue_add_from_cert() will incorrectly trigger.

   Compute the host length once and by checking it against the length of
   each le->fqdn ensure that it is an exact case sensitive match, rather
   than only a prefix.

   Found by Frank Denis

   ok claudio job
VersionDeltaFile
1.306+7-4usr.sbin/rpki-client/main.c
+7-41 files