Build date: 1769814003 - Fri Jan 30 23:00:03 UTC 2026 Build cvs date: 1769792486 - Fri Jan 30 17:01:26 UTC 2026 Build id: 2026-01-31.1 Build tags: amd64-regress ports sysupgrade Applied the following diff(s): /home/anton/tmp/robsd/src-sys-em.diff /home/anton/tmp/robsd/src-sys-uhidev-sispm.diff /home/anton/tmp/robsd/src-sysupgrade.diff P distrib/sets/lists/comp/mi P lib/libcrypto/evp/p_legacy.c P lib/libcrypto/man/EVP_OpenInit.3 P lib/libcrypto/man/EVP_SealInit.3 P share/man/man4/Makefile U share/man/man4/qcuart.4 P sys/arch/arm64/conf/GENERIC P sys/arch/arm64/conf/RAMDISK P sys/dev/acpi/files.acpi U sys/dev/acpi/qcuart_acpi.c M sys/dev/usb/uhidev.c P sys/net80211/ieee80211_input.c P usr.bin/file/magdir/fonts M usr.sbin/bgpd/session.c commit j6yqOiEG5irVRmn3 Author: deraadt Date: 2026/01/30 17:01:26 sync distrib/sets/lists/comp/mi commit gnwxD6Jnx1qdHpNz Author: tb Date: 2026/01/30 14:33:33 EVP_SealInit.3: fix RETURN VALUES section While normal calls return 0 for error and npubk for success, there is a case where it returns the usual 1/0 thing. Make that explicit. Prompted by a report by Niels Dossche ok jsing kenjiro lib/libcrypto/man/EVP_SealInit.3 commit NOYhs7Jsl2esHrez Author: tb Date: 2026/01/30 14:26:04 EVP_OpenInit.3: fix RETURN VALUES section This has been incorrectly documented since forever. The function only ever returned 0/1. ok jsing kenjiro lib/libcrypto/man/EVP_OpenInit.3 commit Gpjadg6FNyQFGuGM Author: tb Date: 2026/01/30 13:57:13 EVP_SealInit(): clear random key on exit ok jsing kenjiro lib/libcrypto/evp/p_legacy.c commit 2Nop0uCiG8JZhtNV Author: tb Date: 2026/01/30 13:54:28 EVP_{Open,Seal}Init(): remove redundant EVP_CIPHER_CTX_reset() calls The subsequent EVP_{Decrypt,Encrypt}Init_ex() calls already do that. pointed out by jsing lib/libcrypto/evp/p_legacy.c commit iJUbESRlztaKRxW0 Author: tb Date: 2026/01/30 13:51:44 EVP_SealInit(): minor cleanup. Explicitly compare pointers against NULL, turn the function into single exit, add hint at why npubk <= 0 or pubk == NULL are a success path: The documentation briefly explains that EVP_OpenInit() and EVP_SealInit() is able to initialize the EVP_CIPHER_CTX in two steps exactly like the EVP_CipherInit_ex() API they wrap: the first call with non-NULL cipher (aka type) only sets the cipher on the ctx, then it returns to allow callers to customize the EVP_CIPHER_CTX, and a second call with cipher == NULL skips the initialization and finishes the ctx setup by setting key and iv. Prompted by a report by Niels Dossche. ok jsing kenjiro lib/libcrypto/evp/p_legacy.c commit 9KH46vB99Qw5kNdu Author: tb Date: 2026/01/30 13:47:22 EVP_SealInit: do not return -1 on error It is documented that EVP_SealInit() returns 0 on error. So -1 is wrong. Reported by Niels Dossche ok jsing kenjiro lib/libcrypto/evp/p_legacy.c commit CwCQXcwpiM2Krk39 Author: tb Date: 2026/01/30 13:42:46 EVP_OpenInit(): minor cleanup Explicitly compare pointers against NULL, turn the function into single exit and explain why priv == NULL is a success (hint: muppet API). Prompted by a report by Niels Dossche. ok jsing kenjiro lib/libcrypto/evp/p_legacy.c commit BS3tpPs6HQ7ArEQS Author: fcambus Date: 2026/01/30 11:22:40 file(1): add support for Web Open Font Format (WOFF) detection. From NetBSD. OK sthen@ usr.bin/file/magdir/fonts commit GcgzPRavv8P4JP1M Author: gnezdo Date: 2026/01/30 04:25:52 Update ni_rssi only with good rxi_rssi in ieee80211_inputm() Some drivers don't report rssi here. This causes good value from other places replaced with 0, leading to annoying UI oscillation. OK stsp@ phessler@ sys/net80211/ieee80211_input.c commit wUkPMlMkJuTvWjwq Author: kettenis Date: 2026/01/29 23:03:02 qcuart(4) share/man/man4/Makefile share/man/man4/qcuart.4 commit eupcfjer8vjuWLpF Author: kettenis Date: 2026/01/29 23:02:35 ACPI attachment for qcuart(4). ok dlg@ sys/arch/arm64/conf/GENERIC sys/arch/arm64/conf/RAMDISK sys/dev/acpi/files.acpi sys/dev/acpi/qcuart_acpi.c