Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | bump for LibreSSL 2.8.3libressl-v2.8.3OPENBSD_6_4 | bcook | 2018-12-15 | 1 | -3/+3 |
| | |||||
* | Backport getentropy changes from deraadt@ on MAIN | bcook | 2018-12-15 | 5 | -144/+27 |
| | | | | | | | | | Saw a mention somewhere a while back that the gotdata() function in here could creates non-uniformity since very short fetches of 0 would be excluded. blocks of 0 are just as random as any other data, including blocks of 4 4 4.. This is a misguided attempt to identify errors from the entropy churn/gather code doesn't make sense, errors don't happen. ok bcook | ||||
* | Implement coordinate blinding for EC_POINT as an additional mitigation | tb | 2018-11-17 | 10 | -18/+113 |
| | | | | | | for the portsmash vulnerability. OpenBSD 6.4 errata 003 | ||||
* | This commit was manufactured by cvs2git to create branch 'OPENBSD_6_4'.libressl-v2.8.2 | cvs2svn | 2018-10-07 | 0 | -0/+0 |
| | |||||
* | whitespace cleanup and other minor things from gofmt | tb | 2018-10-07 | 1 | -44/+39 |
| | |||||
* | make sure all CStrings are freed | tb | 2018-10-06 | 1 | -3/+7 |
| | |||||
* | plug a memory leak | tb | 2018-10-06 | 1 | -1/+2 |
| | |||||
* | wrap a few more overlong lines | tb | 2018-10-06 | 1 | -14/+36 |
| | |||||
* | wrap some overlong fmt.Printfs | tb | 2018-10-06 | 1 | -53/+106 |
| | |||||
* | It's slightly simpler to get the ECDH public key as an EC_POINT by using | tb | 2018-10-06 | 1 | -16/+15 |
| | | | | | EC_KEY_set_public_key_affine_coordinates() and EC_KEY_get0_public_key() than using EC_POINT_set_affine_coordinates_GFp() directly. | ||||
* | free EC_POINT and EC_GROUP | tb | 2018-10-06 | 1 | -1/+4 |
| | |||||
* | Run Wycheproof ECDH Web Crypto test vectors against libcrypto. | tb | 2018-10-06 | 1 | -6/+155 |
| | |||||
* | merge runECDSAWebCryptoTest() into runECDSATest() | tb | 2018-10-06 | 1 | -53/+31 |
| | |||||
* | factor ECDSA signature extraction into its own function | tb | 2018-10-06 | 1 | -24/+35 |
| | |||||
* | make allocate/use/defer dances more consistent in ECDSA sig extraction | tb | 2018-10-06 | 1 | -9/+8 |
| | |||||
* | Run Wycheproof ECDSA Web Crypto test vectors against libcrypto. | tb | 2018-10-05 | 1 | -7/+166 |
| | |||||
* | Better refer to RFC 8422 which obsoletes RFC 4492. | tb | 2018-10-04 | 1 | -2/+2 |
| | |||||
* | While we don't explicitly support curve secp256r1, we can run 1250 tests | tb | 2018-10-04 | 1 | -11/+2 |
| | | | | against its ANSI equivalent prime256v1 (compare RFC 4492, Appendix A). | ||||
* | Plug TLS context leak in nc(1) server and client mode. Move | bluhm | 2018-10-04 | 1 | -12/+10 |
| | | | | | tls_free(3) directly after close(2) to catch all cases. based on a patch from Nan Xiao; OK tb@ deraadt@ | ||||
* | As per POSIX, when str{,r}chr is comparing it should convert c to a char. | martijn | 2018-10-01 | 4 | -8/+10 |
| | | | | | | | | | | The C implementation of str{,r}chr are not linked to the build, because assembly implementations are used, but change to code for easier reference. At least the i386 and amd64 are checked and seem to do the correct thing. Found thanks to the csh any/strchr change. minor pointers and OK millert@ | ||||
* | in ECDH, gather statistics where it makes more sense | tb | 2018-09-30 | 1 | -8/+5 |
| | |||||
* | bump for LibreSSL 2.8.2 | bcook | 2018-09-30 | 1 | -3/+3 |
| | |||||
* | -T applies to ip6 too, apparently; | jmc | 2018-09-25 | 1 | -4/+4 |
| | | | | from nan xiao | ||||
* | bump for LibreSSL 2.8.1libressl-v2.8.1 | bcook | 2018-09-23 | 1 | -3/+3 |
| | |||||
* | Add a comment on the acceptable RSASSA cases. | tb | 2018-09-22 | 1 | -2/+3 |
| | |||||
* | gather statistics in checkAead{Open,Seal}() as well. | tb | 2018-09-22 | 1 | -1/+7 |
| | |||||
* | remove some unneeded checks | tb | 2018-09-22 | 1 | -15/+5 |
| | |||||
* | gather and print some statistics on the acceptable cases we need to | tb | 2018-09-22 | 1 | -8/+60 |
| | | | | look into | ||||
* | more flags printing | tb | 2018-09-22 | 1 | -23/+23 |
| | |||||
* | improve logic involving acceptableAudit | tb | 2018-09-22 | 1 | -5/+5 |
| | |||||
* | Swap order of "action" and "wt.Flags" in a few fmt.Printfs. | tb | 2018-09-22 | 1 | -17/+17 |
| | |||||
* | Introduce a couple of convenience targets to help with auditing the | tb | 2018-09-22 | 2 | -5/+41 |
| | | | | acceptable cases. | ||||
* | Print the flags field in INFO: and FAIL: messages. It's helpful in | tb | 2018-09-21 | 1 | -17/+17 |
| | | | | identifying the important failures while auditing. | ||||
* | fix order of arguments in fmt.Printf() | tb | 2018-09-18 | 1 | -2/+2 |
| | |||||
* | Simplify initialization of asn1_cb; use correct spelling of NULL. | tb | 2018-09-17 | 1 | -4/+2 |
| | |||||
* | Move tally mark printing out of the main benchmark loop; ok tb@ | cheloha | 2018-09-17 | 1 | -14/+21 |
| | |||||
* | add missing default case to switch | tb | 2018-09-16 | 1 | -1/+3 |
| | |||||
* | EVP_aead_chacha20_poly1305() can't actually fail. | tb | 2018-09-16 | 1 | -4/+1 |
| | |||||
* | Rename *AesCcmOrGcm* into the slightly less ugly *AesAead*. | tb | 2018-09-16 | 1 | -9/+9 |
| | |||||
* | another typo. time to sleep | tb | 2018-09-15 | 1 | -2/+2 |
| | |||||
* | typos | tb | 2018-09-15 | 1 | -3/+3 |
| | |||||
* | add a brief comment on the acceptable AES CCM and AES GCM cases | tb | 2018-09-15 | 1 | -2/+8 |
| | |||||
* | Also exercise EVP_aead_aes_128_gcm() and EVP_aead_aes_256_gcm(). | tb | 2018-09-15 | 1 | -6/+26 |
| | |||||
* | rename checkChaCha20Poly1305{Open,Seal}() into checkAead{Open,Seal}(). | tb | 2018-09-15 | 1 | -5/+5 |
| | |||||
* | Merge AES CCM, AES GCM and ChaCha20 data structures into | tb | 2018-09-15 | 1 | -42/+21 |
| | | | | single AEAD types. Will be used in upcoming commits. | ||||
* | Add missing conversion specifier | tb | 2018-09-15 | 1 | -2/+2 |
| | |||||
* | Modify regress appstest.sh for interoperability testing with OpenSSL 1.1.x | inoguchi | 2018-09-15 | 1 | -16/+40 |
| | | | | | | | | - add sleep before s_client instead of removing -pause option - change check words for s_client output messages - replace CAfile to CApath for s_time - remove -prexit from s_client - confirm openssl command path is executable | ||||
* | Add interoperability test mode for regress appstest.sh | inoguchi | 2018-09-14 | 1 | -35/+79 |
| | | | | | | | - test s_server and s_client between different version by option -i - indicate other version by defining OTHER_OPENSSL environment variable - fix "SSL/TLS" to "TLS/SSL", since TLS is correct as technical term - s/SKIPPNG/SKIPPING/ | ||||
* | sync with mozilla-release (one removal, TURKTRUST, more details at | sthen | 2018-09-12 | 1 | -48/+1 |
| | | | | | | https://bugzilla.mozilla.org/show_bug.cgi?id=1439127) ok danj guenther millert | ||||
* | tweak previous; | jmc | 2018-09-12 | 2 | -4/+4 |
| |