summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* bump for LibreSSL 2.8.3libressl-v2.8.3OPENBSD_6_4bcook2018-12-151-3/+3
|
* Backport getentropy changes from deraadt@ on MAINbcook2018-12-155-144/+27
| | | | | | | | | Saw a mention somewhere a while back that the gotdata() function in here could creates non-uniformity since very short fetches of 0 would be excluded. blocks of 0 are just as random as any other data, including blocks of 4 4 4.. This is a misguided attempt to identify errors from the entropy churn/gather code doesn't make sense, errors don't happen. ok bcook
* Implement coordinate blinding for EC_POINT as an additional mitigationtb2018-11-1710-18/+113
| | | | | | for the portsmash vulnerability. OpenBSD 6.4 errata 003
* This commit was manufactured by cvs2git to create branch 'OPENBSD_6_4'.libressl-v2.8.2cvs2svn2018-10-070-0/+0
|
* whitespace cleanup and other minor things from gofmttb2018-10-071-44/+39
|
* make sure all CStrings are freedtb2018-10-061-3/+7
|
* plug a memory leaktb2018-10-061-1/+2
|
* wrap a few more overlong linestb2018-10-061-14/+36
|
* wrap some overlong fmt.Printfstb2018-10-061-53/+106
|
* It's slightly simpler to get the ECDH public key as an EC_POINT by usingtb2018-10-061-16/+15
| | | | | EC_KEY_set_public_key_affine_coordinates() and EC_KEY_get0_public_key() than using EC_POINT_set_affine_coordinates_GFp() directly.
* free EC_POINT and EC_GROUPtb2018-10-061-1/+4
|
* Run Wycheproof ECDH Web Crypto test vectors against libcrypto.tb2018-10-061-6/+155
|
* merge runECDSAWebCryptoTest() into runECDSATest()tb2018-10-061-53/+31
|
* factor ECDSA signature extraction into its own functiontb2018-10-061-24/+35
|
* make allocate/use/defer dances more consistent in ECDSA sig extractiontb2018-10-061-9/+8
|
* Run Wycheproof ECDSA Web Crypto test vectors against libcrypto.tb2018-10-051-7/+166
|
* Better refer to RFC 8422 which obsoletes RFC 4492.tb2018-10-041-2/+2
|
* While we don't explicitly support curve secp256r1, we can run 1250 teststb2018-10-041-11/+2
| | | | against its ANSI equivalent prime256v1 (compare RFC 4492, Appendix A).
* Plug TLS context leak in nc(1) server and client mode. Movebluhm2018-10-041-12/+10
| | | | | tls_free(3) directly after close(2) to catch all cases. based on a patch from Nan Xiao; OK tb@ deraadt@
* As per POSIX, when str{,r}chr is comparing it should convert c to a char.martijn2018-10-014-8/+10
| | | | | | | | | | The C implementation of str{,r}chr are not linked to the build, because assembly implementations are used, but change to code for easier reference. At least the i386 and amd64 are checked and seem to do the correct thing. Found thanks to the csh any/strchr change. minor pointers and OK millert@
* in ECDH, gather statistics where it makes more sensetb2018-09-301-8/+5
|
* bump for LibreSSL 2.8.2bcook2018-09-301-3/+3
|
* -T applies to ip6 too, apparently;jmc2018-09-251-4/+4
| | | | from nan xiao
* bump for LibreSSL 2.8.1libressl-v2.8.1bcook2018-09-231-3/+3
|
* Add a comment on the acceptable RSASSA cases.tb2018-09-221-2/+3
|
* gather statistics in checkAead{Open,Seal}() as well.tb2018-09-221-1/+7
|
* remove some unneeded checkstb2018-09-221-15/+5
|
* gather and print some statistics on the acceptable cases we need totb2018-09-221-8/+60
| | | | look into
* more flags printingtb2018-09-221-23/+23
|
* improve logic involving acceptableAudittb2018-09-221-5/+5
|
* Swap order of "action" and "wt.Flags" in a few fmt.Printfs.tb2018-09-221-17/+17
|
* Introduce a couple of convenience targets to help with auditing thetb2018-09-222-5/+41
| | | | acceptable cases.
* Print the flags field in INFO: and FAIL: messages. It's helpful intb2018-09-211-17/+17
| | | | identifying the important failures while auditing.
* fix order of arguments in fmt.Printf()tb2018-09-181-2/+2
|
* Simplify initialization of asn1_cb; use correct spelling of NULL.tb2018-09-171-4/+2
|
* Move tally mark printing out of the main benchmark loop; ok tb@cheloha2018-09-171-14/+21
|
* add missing default case to switchtb2018-09-161-1/+3
|
* EVP_aead_chacha20_poly1305() can't actually fail.tb2018-09-161-4/+1
|
* Rename *AesCcmOrGcm* into the slightly less ugly *AesAead*.tb2018-09-161-9/+9
|
* another typo. time to sleeptb2018-09-151-2/+2
|
* typostb2018-09-151-3/+3
|
* add a brief comment on the acceptable AES CCM and AES GCM casestb2018-09-151-2/+8
|
* Also exercise EVP_aead_aes_128_gcm() and EVP_aead_aes_256_gcm().tb2018-09-151-6/+26
|
* rename checkChaCha20Poly1305{Open,Seal}() into checkAead{Open,Seal}().tb2018-09-151-5/+5
|
* Merge AES CCM, AES GCM and ChaCha20 data structures intotb2018-09-151-42/+21
| | | | single AEAD types. Will be used in upcoming commits.
* Add missing conversion specifiertb2018-09-151-2/+2
|
* Modify regress appstest.sh for interoperability testing with OpenSSL 1.1.xinoguchi2018-09-151-16/+40
| | | | | | | | - add sleep before s_client instead of removing -pause option - change check words for s_client output messages - replace CAfile to CApath for s_time - remove -prexit from s_client - confirm openssl command path is executable
* Add interoperability test mode for regress appstest.shinoguchi2018-09-141-35/+79
| | | | | | | - test s_server and s_client between different version by option -i - indicate other version by defining OTHER_OPENSSL environment variable - fix "SSL/TLS" to "TLS/SSL", since TLS is correct as technical term - s/SKIPPNG/SKIPPING/
* sync with mozilla-release (one removal, TURKTRUST, more details atsthen2018-09-121-48/+1
| | | | | | https://bugzilla.mozilla.org/show_bug.cgi?id=1439127) ok danj guenther millert
* tweak previous;jmc2018-09-122-4/+4
|