Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Hook up the the x509 policy regression tests to x509 regress. | beck | 2023-04-28 | 2 | -3/+4 |
| | | | | | | | | | These were adapted from BoringSSL's regress tests for x509 policy. They are currently marked as expected to fail as we have not enabled LIBRESSL_HAS_POLICY_DAG by default yet, and the old tree based policy code from OpenSSL is special. These tests pass when we build with LIBRESSL_HAS_POLICY_DAG. | ||||
* | Fix copyright, convert boringssl comments to C style | beck | 2023-04-28 | 1 | -30/+51 |
| | |||||
* | KNF | beck | 2023-04-28 | 1 | -17/+15 |
| | | | | ok knfmt | ||||
* | remove unused code. | beck | 2023-04-28 | 1 | -82/+7 |
| | |||||
* | remove debugging printf | beck | 2023-04-28 | 1 | -2/+1 |
| | |||||
* | This test should not have V_EXPLICIT_POLICY set. with this | beck | 2023-04-28 | 1 | -3/+1 |
| | | | | corrected we pass | ||||
* | Add the rest of the boringssl policy unit tests. | beck | 2023-04-28 | 1 | -4/+223 |
| | | | | | We currently still fail two of these, looks like one more bug in extracting the depth for require policy from the certificate.. | ||||
* | Convert size_t's used in conjuction with sk_X509_num back to int. | beck | 2023-04-27 | 1 | -12/+12 |
| | | | | | | | | | | | The lets the regress in x509/policy pass instead of infinite looping. The changes are necessry because our sk_num() returns an int with 0 for empty and -1 for NULL, wheras BoringSSL's returns a size_t with 0 for both an empty stack and a NULL stack. pair work with tb@ ok tb@ jsing@ | ||||
* | Also list the command constants not associated with any macros, | schwarze | 2023-04-27 | 1 | -3/+29 |
| | | | | and point to their documentation. | ||||
* | correct test cases to add expected errors. | beck | 2023-04-27 | 1 | -2/+30 |
| | |||||
* | Start of an x509 policy regress test. test cases from BoringSSL. | beck | 2023-04-27 | 29 | -0/+801 |
| | | | | | | Still a work in progress adapting tests from boringssl x509_test.cc but dropping in here for tb to be able to look at and run as well since the new stuff still has bugs. | ||||
* | tlsexttest: check additional logic in tlsext randomization | tb | 2023-04-27 | 1 | -1/+103 |
| | | | | | | | This verifies that we put PSK always last and that the Apache 2 special does what it is supposed to do. There is also some weak validation of the Fisher-Yates shuffle that will likely catch errors introduced in tlsext_randomize_build_order() | ||||
* | ssl_tlsext.c: Add an accessor for the tls extension type. | tb | 2023-04-27 | 1 | -1/+7 |
| | | | | | | Needed for the tlsexttest.c ok jsing | ||||
* | Somehow I managed not to bump LIBRESSL_VERSION_NUMBER | tb | 2023-04-27 | 1 | -2/+2 |
| | | | | reported by aja | ||||
* | EC_KEY_{get,insert}_key_method_data() are no longer available | tb | 2023-04-27 | 1 | -41/+2 |
| | |||||
* | One more reciprocal thing hid in here (yay for consistent naming) | tb | 2023-04-27 | 1 | -2/+1 |
| | |||||
* | Remove stale references to BN reciprocal stuff | tb | 2023-04-27 | 2 | -8/+5 |
| | |||||
* | Remove documentation of reciprocal BN which is now internal only | tb | 2023-04-27 | 2 | -276/+1 |
| | |||||
* | Remove documentation of GF2m point stuff | tb | 2023-04-27 | 1 | -47/+7 |
| | |||||
* | EC_GROUP_new() Strip out complications due to binary curves. | tb | 2023-04-27 | 1 | -79/+11 |
| | |||||
* | Remove stale reference to BN_GF2m_add() | tb | 2023-04-27 | 1 | -2/+1 |
| | |||||
* | Remove BN_GF2m_add.3 | tb | 2023-04-27 | 2 | -516/+1 |
| | |||||
* | Remove mention of EC_GFp_nist_method and add back a .Pp that was | tb | 2023-04-27 | 1 | -6/+2 |
| | | | | accidentally dropped | ||||
* | Remove braces around single lines statements using knfmt -s | tb | 2023-04-27 | 1 | -84/+49 |
| | | | | Pointed out by anton | ||||
* | Rework simple allocation and free functions in x509_policy.c | tb | 2023-04-27 | 1 | -32/+36 |
| | | | | | | | Use calloc() instead of malloc/memset and make free functions look the same as elsewhere in the tree. ok beck jsing | ||||
* | Remove dangling references to BN_get0_nist_prime_521(3) | tb | 2023-04-27 | 2 | -9/+6 |
| | |||||
* | Move EC_POINT_{get,set}_Jprojective_coordinates to ec_local.h | tb | 2023-04-27 | 2 | -10/+12 |
| | |||||
* | Nuke doxygen noise | tb | 2023-04-27 | 1 | -421/+37 |
| | |||||
* | Remove documentation of no longer supported EC methods | tb | 2023-04-27 | 1 | -46/+5 |
| | |||||
* | Remove NIST prime documentation | tb | 2023-04-27 | 2 | -202/+0 |
| | |||||
* | Stop installing NIST prime documentation | tb | 2023-04-27 | 1 | -3/+1 |
| | |||||
* | Remove a useless doxygen comment | tb | 2023-04-27 | 1 | -5/+1 |
| | |||||
* | Make x509_policy.c compile with gcc 4. | tb | 2023-04-26 | 1 | -17/+26 |
| | | | | ok beck | ||||
* | Add test for invalidation of DER cache for X509_CRL_* setter functions | job | 2023-04-26 | 1 | -15/+171 |
| | | | | | The program won't exit with a non-zero exit code if X509_CRL_set_* tests fail, as the relevant bits haven't been committed to libcrypto yet. | ||||
* | Allow compiling with -DHAS_DAG to enable the policy check with a DAG. | tb | 2023-04-26 | 1 | -1/+4 |
| | | | | ok beck | ||||
* | Turn C++ comments into C comments and minor KNF fixups | tb | 2023-04-26 | 1 | -170/+264 |
| | |||||
* | Clean up X509 memory before exit | job | 2023-04-26 | 1 | -1/+4 |
| | |||||
* | KNF according to knfmt(1) | tb | 2023-04-26 | 1 | -515/+600 |
| | |||||
* | Zap trailing whitespace | tb | 2023-04-26 | 1 | -3/+1 |
| | |||||
* | Add RCS tag | tb | 2023-04-26 | 1 | -0/+1 |
| | |||||
* | Take X509_POLICY_NODE_print() behind the barn | tb | 2023-04-26 | 4 | -100/+3 |
| | | | | | | | | This used to be public API but is now only used for debug code that has certainly never been used since it was released to the public. It drags that debug nonsense with it. ok beck | ||||
* | Add the new policy code to the build. | beck | 2023-04-26 | 1 | -1/+2 |
| | | | | ok tb@ jsing@ | ||||
* | Make the new policy code in x509_policy.c to be selectable at compile time. | beck | 2023-04-26 | 12 | -15/+106 |
| | | | | | | | The old policy codes remains the default, with the new policy code selectable by defining LIBRESSL_HAS_POLICY_DAG. ok tb@ jsing@ | ||||
* | Add a shim to mimic the BoringSSL sk_delete_if function. | beck | 2023-04-26 | 1 | -0/+23 |
| | | | | | | | We add this locally as a function to avoid delving into the unholy macro madness of STACK_OF(3). ok tb@ jsing@ | ||||
* | Add lookup name+function pointer table for improved diagnostics | job | 2023-04-26 | 1 | -4/+29 |
| | | | | OK tb@ | ||||
* | Adapt the sk_find calls from BoringSSL's api to ours. | beck | 2023-04-26 | 1 | -6/+5 |
| | | | | ok tb@ jsing@ | ||||
* | Add the STACK_OF declarations we require. | beck | 2023-04-26 | 1 | -2/+46 |
| | | | | ok tb@ jsing@ | ||||
* | Change OPENSSL_malloc|free|memset and friends to the normal versions. | beck | 2023-04-26 | 1 | -6/+6 |
| | | | | ok tb@ jsing@ | ||||
* | Fix error code goop | beck | 2023-04-26 | 1 | -5/+8 |
| | | | | ok tb@ jsing@ | ||||
* | Use the correct headers to compile with libressl | beck | 2023-04-26 | 1 | -5/+4 |
| |