summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* While we don't explicitly support curve secp256r1, we can run 1250 teststb2018-10-041-11/+2
| | | | against its ANSI equivalent prime256v1 (compare RFC 4492, Appendix A).
* Plug TLS context leak in nc(1) server and client mode. Movebluhm2018-10-041-12/+10
| | | | | tls_free(3) directly after close(2) to catch all cases. based on a patch from Nan Xiao; OK tb@ deraadt@
* As per POSIX, when str{,r}chr is comparing it should convert c to a char.martijn2018-10-014-8/+10
| | | | | | | | | | The C implementation of str{,r}chr are not linked to the build, because assembly implementations are used, but change to code for easier reference. At least the i386 and amd64 are checked and seem to do the correct thing. Found thanks to the csh any/strchr change. minor pointers and OK millert@
* in ECDH, gather statistics where it makes more sensetb2018-09-301-8/+5
|
* bump for LibreSSL 2.8.2bcook2018-09-301-3/+3
|
* -T applies to ip6 too, apparently;jmc2018-09-251-4/+4
| | | | from nan xiao
* bump for LibreSSL 2.8.1libressl-v2.8.1bcook2018-09-231-3/+3
|
* Add a comment on the acceptable RSASSA cases.tb2018-09-221-2/+3
|
* gather statistics in checkAead{Open,Seal}() as well.tb2018-09-221-1/+7
|
* remove some unneeded checkstb2018-09-221-15/+5
|
* gather and print some statistics on the acceptable cases we need totb2018-09-221-8/+60
| | | | look into
* more flags printingtb2018-09-221-23/+23
|
* improve logic involving acceptableAudittb2018-09-221-5/+5
|
* Swap order of "action" and "wt.Flags" in a few fmt.Printfs.tb2018-09-221-17/+17
|
* Introduce a couple of convenience targets to help with auditing thetb2018-09-222-5/+41
| | | | acceptable cases.
* Print the flags field in INFO: and FAIL: messages. It's helpful intb2018-09-211-17/+17
| | | | identifying the important failures while auditing.
* fix order of arguments in fmt.Printf()tb2018-09-181-2/+2
|
* Simplify initialization of asn1_cb; use correct spelling of NULL.tb2018-09-171-4/+2
|
* Move tally mark printing out of the main benchmark loop; ok tb@cheloha2018-09-171-14/+21
|
* add missing default case to switchtb2018-09-161-1/+3
|
* EVP_aead_chacha20_poly1305() can't actually fail.tb2018-09-161-4/+1
|
* Rename *AesCcmOrGcm* into the slightly less ugly *AesAead*.tb2018-09-161-9/+9
|
* another typo. time to sleeptb2018-09-151-2/+2
|
* typostb2018-09-151-3/+3
|
* add a brief comment on the acceptable AES CCM and AES GCM casestb2018-09-151-2/+8
|
* Also exercise EVP_aead_aes_128_gcm() and EVP_aead_aes_256_gcm().tb2018-09-151-6/+26
|
* rename checkChaCha20Poly1305{Open,Seal}() into checkAead{Open,Seal}().tb2018-09-151-5/+5
|
* Merge AES CCM, AES GCM and ChaCha20 data structures intotb2018-09-151-42/+21
| | | | single AEAD types. Will be used in upcoming commits.
* Add missing conversion specifiertb2018-09-151-2/+2
|
* Modify regress appstest.sh for interoperability testing with OpenSSL 1.1.xinoguchi2018-09-151-16/+40
| | | | | | | | - add sleep before s_client instead of removing -pause option - change check words for s_client output messages - replace CAfile to CApath for s_time - remove -prexit from s_client - confirm openssl command path is executable
* Add interoperability test mode for regress appstest.shinoguchi2018-09-141-35/+79
| | | | | | | - test s_server and s_client between different version by option -i - indicate other version by defining OTHER_OPENSSL environment variable - fix "SSL/TLS" to "TLS/SSL", since TLS is correct as technical term - s/SKIPPNG/SKIPPING/
* sync with mozilla-release (one removal, TURKTRUST, more details atsthen2018-09-121-48/+1
| | | | | | https://bugzilla.mozilla.org/show_bug.cgi?id=1439127) ok danj guenther millert
* tweak previous;jmc2018-09-122-4/+4
|
* crank to follow minor crank in libcrypto; ok tb@ jsing@djm2018-09-122-2/+2
|
* Add some accessor functions:djm2018-09-128-17/+138
| | | | | | RSA_meth_get_finish() RSA_meth_set1_name() EVP_CIPHER_CTX_(get|set)_iv() feedback and ok jsing@ tb@
* Remove now unused code for EVP_CIPH_FLAG_AEAD_CIPHER and EVP_CIPH_GCM_MODE.jsing2018-09-084-77/+28
| | | | ok inoguchi@ tb@
* SSL_MAX_DIGEST is no longer needed.jsing2018-09-082-17/+10
|
* ASN1_OBJECTs should be freed with ASN1_OBJECT_free(3), not with free(3).tb2018-09-081-2/+2
| | | | ok inoguchi, jsing
* Fix indent and adjust line fit to 80 columns.inoguchi2018-09-081-930/+961
|
* indent labelstb2018-09-082-8/+8
|
* missing word & a couple of typostb2018-09-081-3/+3
|
* Split test blocks into a function. Test contents are not changed.inoguchi2018-09-081-62/+86
|
* Test more ciphers and randomize the order in regress appstest.shinoguchi2018-09-081-5/+9
| | | | | | - change test target ciphers - randomize the test ciphers order - display test cipher count
* tests all available TLSv1.2 ciphersinoguchi2018-09-071-11/+14
|
* Declare strings passed to local_listen() as const. This makes itbluhm2018-09-071-3/+3
| | | | | consistent to remote_connect() and getaddrinfo(3). from Nan Xiao
* Drop SSL_CIPHER_ALGORITHM2_AEAD flag.jsing2018-09-064-31/+25
| | | | | | | All of our algorithm_mac == SSL_AEAD cipher suites use EVP_AEAD, so we can condition on that rather than having a separate redundant flag. ok tb@
* Do not close the socket twice in netcat.bluhm2018-09-061-5/+6
| | | | from Nan Xiao; OK tb@
* Use the newer/more sensible names for EVP_MD_CTX_* functions.jsing2018-09-055-16/+16
| | | | | | | | | | EVP_MD_CTX_create -> EVP_MD_CTX_new EVP_MD_CTX_destroy -> EVP_MD_CTX_free This should make the intent more obvious and reduce head scratching during code reviews. Raised by tb@
* Correctly clear the current cipher state, when changing cipher state.jsing2018-09-053-41/+37
| | | | | | | | | | | | | | | | | When a renegotiation results in a change of cipher suite, the renegotation would fail if it switched from AEAD to non-AEAD or vice versa. This is due to the fact that the previous EVP_AEAD or EVP_CIPHER state remained, resulting in incorrect logic that caused MAC failures. Rename ssl_clear_cipher_ctx() to ssl_clear_cipher_state() and split it into separate read/write components, then call these functions from the appropriate places when a ChangeCipherSpec message is being processed. Also, remove the separate ssl_clear_hash_ctx() calls and fold these into the ssl_clear_cipher_{read,write}_state() functions. Issue reported by Bernard Spil, who also tested this diff. ok tb@
* use timing-safe compares for checking results in signature verificationdjm2018-09-054-9/+10
| | | | | | (there are no known attacks, this is just inexpensive prudence) feedback and ok tb@ jsing@