summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/stack/stack.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-09-02After libcrypto/ecdh/ech_key.c -r1.8 fixed the failing test cases, removetb1-13/+3
two noisy INFO and reorder things a bit.
2018-09-02Elliptic curve arithmetic only makes sense between points that belong totb1-1/+5
the same curve. Some Wycheproof tests violate this assumption, making ECDH_compute_key() compute and return garbage. Check that pub_key lies on the curve of the private key so that the calculations make sense. Most paths that get here have this checked (in particular those from OpenSSH and libssl), but one might get here after using d2i_* or manual computation. discussed with & ok jsing; "good catch!" markus
2018-09-02Run Wycheproof ECDH tests against libcrypto. Some tests currently fail,tb1-1/+154
will be fixed with the next commit to libcrypto.
2018-09-02Use a Boolean rather than repeated string comparison.tb1-3/+5
2018-09-01Tweak comment.tb1-5/+2
2018-09-01Remove RSA-PSS from todo-listtb1-2/+2
2018-09-01Run Wycheproof RSASSA-PSS testvectors against libcrypto.tb1-2/+144
2018-08-31Remove unused argument to tls1_change_cipher_state_cipher().jsing1-7/+4
2018-08-31Instead of enumerating the files to clean by hand, set PROGS=${TESTS}.tb2-5/+7
Suggested by jsing
2018-08-30Make sure to clean up the .d files with 'make clean'tb1-2/+2
2018-08-30Nuke ssl_pending/ssl_shutdown function pointers.jsing9-56/+14
ssl3_pending() is used for all protocols and dtls1_shutdown() just calls ssl3_shutdown(), so just call the appropriate function directly instead. ok beck@ inoguchi@ tb@
2018-08-29AES is now done also.tb1-3/+3
2018-08-29Pass algorithm as a string to all *TestGroup functions for consistency.tb1-22/+22
2018-08-29Run Wycheproof AES-GCM testvectors against libcrypto.tb1-42/+83
2018-08-29Calculate and check tag during AES-CCM encryption test.tb1-1/+25
2018-08-29typotb1-2/+2
2018-08-29Don't fatal on keys of invalid sice, just print an INFO.tb1-2/+3
2018-08-28Run Wycheproof AES-CMAC testvectors against libcrypto.tb1-2/+116
2018-08-28remove some extra parens and fix some other formatting issuestb1-17/+17
pointed out by gofmt (thanks anton)
2018-08-28Remove extra "and" in "These functions and have been available"tb1-3/+3
2018-08-28zap trailing whitespacetb1-7/+7
2018-08-28Drop SSLv2, SSLv3 support.cheloha1-6/+2
No need to check for SSLv2/3 sessions when printing the tally mark. Also do SSLv23_client_method -> TLS_client_method. ok jsing@
2018-08-28Check for SSL_write(3) error.cheloha1-3/+4
jsing@ notes that this is not a complete solution, as we don't account for retries or partial writes, but that this is a step in a right direction. May want to revisit this later to provide a complete solution. ok jsing@
2018-08-27tweak failure messagestb1-9/+9
2018-08-27dedup AES-CBC-PKCS5 encryption and decryption checkstb1-66/+24
2018-08-272x missing "..."tb1-3/+3
2018-08-27Run Wycheproof AES-CCM testvectors against libcrypto.tb1-2/+200
2018-08-27n2s and l2n3 finally bite the dust!jsing1-7/+1
2018-08-27Convert ssl3_get_cert_verify() to CBS and clean up somewhat.jsing1-74/+72
ok inoguchi@
2018-08-27Dedup DTLS header writing code and convert to CBB.jsing1-25/+35
There are three versions of the DTLS header writing code, which primarily differ by the fragment offset and fragment length values that differ. Rework dtls1_write_message_header() such that it can be used in all three cases and convert it to CBB in the process. ok inoguchi@ tb@
2018-08-27Add some missing statics.jsing2-5/+5
2018-08-27Simplify new session ticket encoding/generation.jsing3-84/+90
The original code did a crazy encode/malloc/encode/decode/modify/encode dance, in order to encode a session in the form needed to encrypt then add to a session ticket. By modifying the encoding functions slightly, we can do this entire dance as a single encode. Inspired by similar changes in BoringSSL. ok inoguchi@ tb@
2018-08-27Fix formatting and grammatical issues with the description of how to usejsing1-19/+17
i2d_SSL_SESSION. Also rework the example code so that it is clearer and uses more appropriate names. Input from and ok schwarze@, tb@
2018-08-27Add protocol and cipher patterns in regress appstest.shinoguchi1-18/+88
2018-08-26fix the same "an non" issue found by tb in EVP_EncryptInit.3;jmc1-3/+3
2018-08-26Check return value of EVP_CipherInit_ex()tb1-6/+15
2018-08-26Run Wycheproof AES-CBC-PKCS5 testvectors against libcrypto.tb1-1/+189
2018-08-26Remove some redundant info from log.Fatalftb1-2/+2
2018-08-26simplify returned valuetb1-2/+2
2018-08-26Some of the functions in this manual need <openssl/dsa.h>, otherstb1-3/+45
need <openssl/x509.h>. The functions {d2i,i2d}_DSA_params_{bio,fp}(3) were missing from the manual, so document them. The return values of the i2d_* functions are left undocumented, as these still need to be audited. ok schwarze (lots of input and help as usual)
2018-08-26typo: an nonce -> a noncetb1-3/+3
2018-08-26Stop s_server if error occurs in regress appstest.shinoguchi1-4/+13
2018-08-25Also run DSA tests with the PEM encoded public key.tb1-2/+22
2018-08-24update usage for pkcs8;jmc1-10/+9
ok tb
2018-08-24tweak previous;jmc1-3/+3
2018-08-24crank majors after symbol addition/modification/removaltb3-6/+6
2018-08-24Adjust documentation for SSL_copy_session_id()tb1-8/+7
ok jsing
2018-08-24Let SSL_copy_session_id() return an int for error checking.tb3-28/+31
Accordingly, add some error checking to SSL_copy_session_id(), BIO_ssl_copy_session_id(), and SSL_dup(). Prompted by OpenSSL commit 17dd65e6e1f Tested in a bulk build by sthen ok jsing
2018-08-24Add const to EVP_PKCS82PKEY().tb2-4/+4
tested in a bulk by sthen ok jsing
2018-08-24Add consts to EVP_PKEY_asn1_set_private()tb8-16/+16
Requires adding a const to the priv_decode() member of EVP_PKEY_ASN1_METHOD and adjusting all *_priv_decode() functions. All this is already documented this way. tested in a bulk build by sthen ok jsing