OpenBSD/src 5NAaEDYlib/libcrypto/mlkem mlkem_internal.c

   mlkem: also zero the failure_key

   from logan
   https://github.com/libressl/openbsd/pull/154
VersionDeltaFile
1.9+2-1lib/libcrypto/mlkem/mlkem_internal.c
+2-11 files

OpenBSD/src pCu6f5Wsys/arch/arm64/dev agtimer.c, sys/arch/arm64/include armreg.h

   Pick the correct interrupt for the virtual timer if we're running in EL2.
   Based on a diff from Marc Zyngier.

   ok jsg@
VersionDeltaFile
1.30+17-3sys/arch/arm64/dev/agtimer.c
1.45+9-1sys/arch/arm64/include/armreg.h
+26-42 files

OpenBSD/src AzMCzSisys/arch/arm64/arm64 locore.S

   Handle HCR_EL2.E2H RES1 behaviour

   An implementation is allowed to make HCR_EL2.E2H RES1, which means
   that the CPU behaves as if this bit was 1, even if it reads as 0
   or can be written with 0.

   While the architecture advertises this via ID_AA64MMFR4_EL1.E2H0,
   hypervisors cannot always expose this to a guest if the hardware
   doesn't implemtn FEAT_FGT.

   Instead, detect the effects of HCR_EL2.E2H being RES1 by checking
   for the aliasing property between accessors targetting the same
   register (FAR_ELx in this case). This gives a reliable litmus test
   for CPUs that are stuck in VHE mode.

   From Marc Zyngier <maz at kernel.org>
VersionDeltaFile
1.50+17-4sys/arch/arm64/arm64/locore.S
+17-41 files

OpenBSD/src HhuCtDUsys/arch/arm64/arm64 locore.S

   When running in VHE host mode, HCR_EL2.TGE must be set, as otherwise
   a bunch of problems occur:

   - EL0 is guest EL0, not host, and the kernel will catch fire on the
     first ERET to EL0

   - EL1 TLB invalidations target the guest, and not the host

   Make sure that HCR_EL2.TGE is set, instead of relying on firmware
   to have set it (when booting with UEFI, only the first CPU is
   correctly configured).

   From Marc Zyngier <maz at kernel.org>
VersionDeltaFile
1.49+9-4sys/arch/arm64/arm64/locore.S
+9-41 files

OpenBSD/src cYb2quNshare/man/man4 rkotp.4 Makefile

   rkotp(4)
VersionDeltaFile
1.1+42-0share/man/man4/rkotp.4
1.877+2-2share/man/man4/Makefile
+44-22 files

OpenBSD/src jV5Rdg2regress/lib/libcrypto/wycheproof wycheproof.go

   wycheproof.go: simplfiy for loop
VersionDeltaFile
1.204+2-2regress/lib/libcrypto/wycheproof/wycheproof.go
+2-21 files

OpenBSD/src CElKduzregress/lib/libcrypto/wycheproof wycheproof.go

   wycheproof: go fmt
VersionDeltaFile
1.203+5-5regress/lib/libcrypto/wycheproof/wycheproof.go
+5-51 files

OpenBSD/src JVkzHSXusr.sbin/rpki-client ccr.c

   Explicitly check mostRecentUpdate on otherwise empty ManifestState

   OK tb@
VersionDeltaFile
1.36+7-1usr.sbin/rpki-client/ccr.c
+7-11 files

OpenBSD/src cSzdcZKusr.sbin/rpki-client print.c

   When printing a CCR's ManifestState, sort the entries by AKI

   Sorting this particular listing by AKI (instead of by hash of the
   Manifest object) makes diffs between CCRs much more readable.

   With & OK tb@
VersionDeltaFile
1.77+33-3usr.sbin/rpki-client/print.c
+33-31 files

OpenBSD/src cpeFK7Xsys/nfs nfs_serv.c

   Add checks for invalid dir count and max size for readdir/readdirplus.

   A zero count or max size value is now rejected early instead of
   relying on VOP_GETATTR to return an error.  Also verify that the
   max size after rounding up to a multiple of DIRBLKSIZ is positive.
   A negative value would turn into a large allocation, causing the
   malloc() to fail.

   From an LLM bug report.  With help from miod@ and kirill@.
VersionDeltaFile
1.133+34-23sys/nfs/nfs_serv.c
+34-231 files

OpenBSD/src FtgG4YXsys/dev/pci/drm drm_bridge.c, sys/dev/pci/drm/include/drm drm_bridge.h

   Unstub select_bus_fmt_recursive().  This fixes output on the HDMI port
   on my firefly-rk3399.

   ok jsg@
VersionDeltaFile
1.17+0-4sys/dev/pci/drm/drm_bridge.c
1.15+0-2sys/dev/pci/drm/include/drm/drm_bridge.h
+0-62 files

OpenBSD/src EwOumB6regress/lib/libcrypto/certs README

   certs/README: fix previous: 14b should fail to verify
VersionDeltaFile
1.4+1-1regress/lib/libcrypto/certs/README
+1-11 files

OpenBSD/src LBjUBUIlib/libcrypto/x509 x509_verify.c

   verifier: re-enable the callback override for depth

   kirill reported that his nginx reverse proxy setup stopped working
   with x509_verify.c r1.74 and r1.75. It turns out that nginx relies
   on a verify callback that always returns 1.

   In revision 1.74 we removed the possibility of the verify_cb() to
   override X509_V_ERR_CERT_CHAIN_TOO_LONG, which is what breaks the
   config in kirill's setup since it used to use the nginx default of
   setting the depth to 1. Re-enable this to make the new scenario
   "2a with depth 1 and depth callback" pass.

   As shown by the other new test scenario "14b with yolo calback"
   with a "just say yes" cb, the guard added in r1.74 still prevents
   the overwrite.

   This makes kirill's reproducer work as verified by kirill and myself.
   It was also tested by kirill in the real life setup.


    [2 lines not shown]
VersionDeltaFile
1.76+3-5lib/libcrypto/x509/x509_verify.c
+3-51 files

OpenBSD/src vc1AErqregress/lib/libcrypto/x509 verify.c callback.c

   libcrypto: extend verify and callback regress

   Add three more test variants for scenario 2a:

   1) verify that a chain of length 3 validates with depth 2.
   2) verify that a chain of length 3 fails to validate with depth 1.
   3) verify that a chain of length 3 validates with depth 1 if we
      allow the callback to override the depth.

   Variant 3) fails in -current and reproduces a scenario reported
   by kirill.

   Also add two test variants for the scenarios in 14:

   4): run the chain of length 32 with a yolo callback returning 1
   5): run the chain of length 33 with a yolo callback returning 1

   Test 5) fails because we currently bail out at the wrong depth.
   The verify callback should allow overriding the failure and will

    [7 lines not shown]
VersionDeltaFile
1.16+83-2regress/lib/libcrypto/x509/verify.c
1.8+22-2regress/lib/libcrypto/x509/callback.c
+105-42 files

OpenBSD/src rjQehI9regress/lib/libcrypto/x509 verify.c callback.c

   verify regress: allow setting verify depth and callback

   This is pretty ugly and probably the the vct should be handed down to
   the verify_cert*() functions, but this works and doesn't make these
   tests any uglier than they already are.

   The callback regress was modified with a least effort approach.
VersionDeltaFile
1.15+27-9regress/lib/libcrypto/x509/verify.c
1.7+11-4regress/lib/libcrypto/x509/callback.c
+38-132 files

OpenBSD/src X5ru97dsys/dev/fdt rkvop.c

   Also support DRM_FORMAT_XRGB8888; this gets rid of some warnings.

   ok jsg@
VersionDeltaFile
1.9+2-2sys/dev/fdt/rkvop.c
+2-21 files

OpenBSD/src vGwsUinregress/usr.bin/ssh kbdint.sh

   Fix skip message.
VersionDeltaFile
1.3+2-2regress/usr.bin/ssh/kbdint.sh
+2-21 files

OpenBSD/src U2NvfT6sys/dev/fdt rktemp.c

   Add RK3576 support.

   ok patrick@, dlg@
VersionDeltaFile
1.15+98-13sys/dev/fdt/rktemp.c
+98-131 files

OpenBSD/src x7t5Mxgsys/arch/arm64/conf GENERIC

   Enable rkotp(4).
VersionDeltaFile
1.314+2-1sys/arch/arm64/conf/GENERIC
+2-11 files

OpenBSD/src 644gE66sys/dev/fdt rkotp.c files.fdt

   Add rkotp(4), a driver for reading the OTP fuses on Rockchip SoCs.

   ok patrick@, dlg@
VersionDeltaFile
1.1+152-0sys/dev/fdt/rkotp.c
1.220+5-1sys/dev/fdt/files.fdt
+157-12 files

OpenBSD/src JALMo4Dsys/dev/fdt rkclock.c rkclock_clocks.h

   Add support for OTP related and temparature sensor related clocks and
   resets for the RK3576.

   ok patrick@, dlg@
VersionDeltaFile
1.98+48-1sys/dev/fdt/rkclock.c
1.70+8-0sys/dev/fdt/rkclock_clocks.h
+56-12 files

OpenBSD/src a8XL0yVsys/dev/fdt rkcomphy.c

   Add RK3576 support.

   ok jmatthew@, dlg@
VersionDeltaFile
1.4+136-6sys/dev/fdt/rkcomphy.c
+136-61 files

OpenBSD/src CwZo6cxsys/dev/fdt rkpmic.c

   The RK806 can be connected over I2C as well.

   ok dlg@, patrick@
VersionDeltaFile
1.21+2-1sys/dev/fdt/rkpmic.c
+2-11 files

OpenBSD/src Cbom8MQusr.bin/awk awk.1

   awk(1): the flush function was added to POSIX.1-2024

   Remove this function from the list of POSIX extensions.

   ok millert@
VersionDeltaFile
1.72+2-3usr.bin/awk/awk.1
+2-31 files

OpenBSD/src Ktxi42Hregress/lib/libcrypto/certs README

   cert regress: update README for tests 14a and 14b.
VersionDeltaFile
1.3+6-0regress/lib/libcrypto/certs/README
+6-01 files

OpenBSD/src Z0NcFZnsbin/dhcp6leased engine.c

   Prevent unsigned underflow leading to a crash.

   An IA_PD option contains one or more nested dhcp options.
   We first need to make sure that the length field of the option header
   does not point outside of the encapsulating option, which we did.

   When we then parse the nested options we need to make sure that nested
   option header length field is large enough for the nested option, not
   that the encapsulating option length is large enough for the
   encapsulated option.

   Otherwise opt_hdr.len - 2 can underflow, which strvisx(3) interprets
   as a size_t, i.e. a very large number, leading to a crash once we hit
   a guard.

   Underflow pointed out by an AI tool (sorry, don't know which one) in a
   somewhat convoluted way.  It also provided an reproducer for the issue
   which was more helpful.


    [6 lines not shown]
VersionDeltaFile
1.35+11-3sbin/dhcp6leased/engine.c
+11-31 files

OpenBSD/src QcZad08usr.bin/tmux window-tree.c tmux.1

   Allow the indicator in tree mode to be customized by two new options:
   tree-mode-preview-format and tree-mode-preview-style.
VersionDeltaFile
1.74+65-51usr.bin/tmux/window-tree.c
1.1052+24-13usr.bin/tmux/tmux.1
1.210+23-1usr.bin/tmux/options-table.c
+112-653 files

OpenBSD/src idNQVRqusr.bin/tmux control.c

   Fix control client hang on exit after toggling no-output, GitHub issue
   5049 from Aaron Campbell.
VersionDeltaFile
1.55+2-1usr.bin/tmux/control.c
+2-11 files

OpenBSD/src QeyqY6busr.bin/tmux window.c

   Do not check for NULL after dereferencing, from alexarama at yahoo dot
   com in GitHub issue 5051.
VersionDeltaFile
1.316+5-3usr.bin/tmux/window.c
+5-31 files

OpenBSD/src p8hx6fyusr.bin/tmux format.c

   Free working stuff when R formats fail.
VersionDeltaFile
1.363+6-2usr.bin/tmux/format.c
+6-21 files