summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Run Wycheproof ECDH tests against libcrypto. Some tests currently fail,tb2018-09-021-1/+154
| | | | will be fixed with the next commit to libcrypto.
* Use a Boolean rather than repeated string comparison.tb2018-09-021-3/+5
|
* Tweak comment.tb2018-09-011-5/+2
|
* Remove RSA-PSS from todo-listtb2018-09-011-2/+2
|
* Run Wycheproof RSASSA-PSS testvectors against libcrypto.tb2018-09-011-2/+144
|
* Remove unused argument to tls1_change_cipher_state_cipher().jsing2018-08-311-7/+4
|
* Instead of enumerating the files to clean by hand, set PROGS=${TESTS}.tb2018-08-312-5/+7
| | | | Suggested by jsing
* Make sure to clean up the .d files with 'make clean'tb2018-08-301-2/+2
|
* Nuke ssl_pending/ssl_shutdown function pointers.jsing2018-08-309-56/+14
| | | | | | | ssl3_pending() is used for all protocols and dtls1_shutdown() just calls ssl3_shutdown(), so just call the appropriate function directly instead. ok beck@ inoguchi@ tb@
* AES is now done also.tb2018-08-291-3/+3
|
* Pass algorithm as a string to all *TestGroup functions for consistency.tb2018-08-291-22/+22
|
* Run Wycheproof AES-GCM testvectors against libcrypto.tb2018-08-291-42/+83
|
* Calculate and check tag during AES-CCM encryption test.tb2018-08-291-1/+25
|
* typotb2018-08-291-2/+2
|
* Don't fatal on keys of invalid sice, just print an INFO.tb2018-08-291-2/+3
|
* Run Wycheproof AES-CMAC testvectors against libcrypto.tb2018-08-281-2/+116
|
* remove some extra parens and fix some other formatting issuestb2018-08-281-17/+17
| | | | pointed out by gofmt (thanks anton)
* Remove extra "and" in "These functions and have been available"tb2018-08-281-3/+3
|
* zap trailing whitespacetb2018-08-281-7/+7
|
* Drop SSLv2, SSLv3 support.cheloha2018-08-281-6/+2
| | | | | | | No need to check for SSLv2/3 sessions when printing the tally mark. Also do SSLv23_client_method -> TLS_client_method. ok jsing@
* Check for SSL_write(3) error.cheloha2018-08-281-3/+4
| | | | | | | | | | jsing@ notes that this is not a complete solution, as we don't account for retries or partial writes, but that this is a step in a right direction. May want to revisit this later to provide a complete solution. ok jsing@
* tweak failure messagestb2018-08-271-9/+9
|
* dedup AES-CBC-PKCS5 encryption and decryption checkstb2018-08-271-66/+24
|
* 2x missing "..."tb2018-08-271-3/+3
|
* Run Wycheproof AES-CCM testvectors against libcrypto.tb2018-08-271-2/+200
|
* n2s and l2n3 finally bite the dust!jsing2018-08-271-7/+1
|
* Convert ssl3_get_cert_verify() to CBS and clean up somewhat.jsing2018-08-271-74/+72
| | | | ok inoguchi@
* Dedup DTLS header writing code and convert to CBB.jsing2018-08-271-25/+35
| | | | | | | | | There are three versions of the DTLS header writing code, which primarily differ by the fragment offset and fragment length values that differ. Rework dtls1_write_message_header() such that it can be used in all three cases and convert it to CBB in the process. ok inoguchi@ tb@
* Add some missing statics.jsing2018-08-272-5/+5
|
* Simplify new session ticket encoding/generation.jsing2018-08-273-84/+90
| | | | | | | | | | | The original code did a crazy encode/malloc/encode/decode/modify/encode dance, in order to encode a session in the form needed to encrypt then add to a session ticket. By modifying the encoding functions slightly, we can do this entire dance as a single encode. Inspired by similar changes in BoringSSL. ok inoguchi@ tb@
* Fix formatting and grammatical issues with the description of how to usejsing2018-08-271-19/+17
| | | | | | | i2d_SSL_SESSION. Also rework the example code so that it is clearer and uses more appropriate names. Input from and ok schwarze@, tb@
* Add protocol and cipher patterns in regress appstest.shinoguchi2018-08-271-18/+88
|
* fix the same "an non" issue found by tb in EVP_EncryptInit.3;jmc2018-08-261-3/+3
|
* Check return value of EVP_CipherInit_ex()tb2018-08-261-6/+15
|
* Run Wycheproof AES-CBC-PKCS5 testvectors against libcrypto.tb2018-08-261-1/+189
|
* Remove some redundant info from log.Fatalftb2018-08-261-2/+2
|
* simplify returned valuetb2018-08-261-2/+2
|
* Some of the functions in this manual need <openssl/dsa.h>, otherstb2018-08-261-3/+45
| | | | | | | | | need <openssl/x509.h>. The functions {d2i,i2d}_DSA_params_{bio,fp}(3) were missing from the manual, so document them. The return values of the i2d_* functions are left undocumented, as these still need to be audited. ok schwarze (lots of input and help as usual)
* typo: an nonce -> a noncetb2018-08-261-3/+3
|
* Stop s_server if error occurs in regress appstest.shinoguchi2018-08-261-4/+13
|
* Also run DSA tests with the PEM encoded public key.tb2018-08-251-2/+22
|
* update usage for pkcs8;jmc2018-08-241-10/+9
| | | | ok tb
* tweak previous;jmc2018-08-241-3/+3
|
* crank majors after symbol addition/modification/removaltb2018-08-243-6/+6
|
* Adjust documentation for SSL_copy_session_id()tb2018-08-241-8/+7
| | | | ok jsing
* Let SSL_copy_session_id() return an int for error checking.tb2018-08-243-28/+31
| | | | | | | | | | Accordingly, add some error checking to SSL_copy_session_id(), BIO_ssl_copy_session_id(), and SSL_dup(). Prompted by OpenSSL commit 17dd65e6e1f Tested in a bulk build by sthen ok jsing
* Add const to EVP_PKCS82PKEY().tb2018-08-242-4/+4
| | | | | tested in a bulk by sthen ok jsing
* Add consts to EVP_PKEY_asn1_set_private()tb2018-08-248-16/+16
| | | | | | | | | Requires adding a const to the priv_decode() member of EVP_PKEY_ASN1_METHOD and adjusting all *_priv_decode() functions. All this is already documented this way. tested in a bulk build by sthen ok jsing
* After removing support for broken PKCS#8 formats (it was high time),tb2018-08-247-22/+19
| | | | | | | | we can add const to PKCS8_pkey_get0(). In order for this to work, we need to sprinkle a few consts here and there. tested in a bulk by sthen ok jsing
* The broken pkcs8 formats generated by openssl pkcs -{embed,nooct,nsdb}tb2018-08-241-22/+2
| | | | | | are no longer supported. Remove their documentation. ok jsing