summaryrefslogtreecommitdiff
path: root/src/regress/lib/libc/stdio_threading/fgets (unfollow)
Commit message (Collapse)AuthorFilesLines
30 hoursasn_moid: move inclusion of err_local.h to the proper placetb1-2/+2
35 hoursSort FOOerror() in ASCII ordertb1-18/+18
35 hoursSimplify the remaining FOOerror()tb1-26/+28
Redirect through an additional macro that adds the repeated function, file and line macros. Reduces the eyesore and makes the whole thing much more redable. similar to a suggestion by jsing a while back
35 hoursRemove unused internal FOOerror()tb1-11/+1
pointed out by djm a while back
35 hoursRemove error macros except PEMerr(), RSAerr() and SSLerr()tb1-37/+4
These three are still used in about half a dozen ports. All the others are unused. ok jsing
35 hoursssl_local.h: stop guarding SYSerror() with an #ifdeftb1-3/+1
35 hoursMove the internal FOOerror() to err_local.htb2-40/+38
These are now only used in libcrypto. They should never have been in a public header in the first place. ok jsing
36 hoursUse err_local.h rather than err.h in most placestb222-456/+454
ok jsing
36 hoursssl_local: provide an SSL-internal version of SYSerror()tb1-1/+4
36 hoursSSL_error_internal: remove a superfluous pair of parenstb1-3/+2
36 hoursssl_local.h: adjust some whitespacetb1-3/+3
36 hoursconst correct SSL_error_internal()tb2-4/+4
36 hourscms: disallow AEAD ciphers and AES XTStb1-3/+21
The CMS code doesn't support RFC 5083/5084 authenticated enveloped data and outputs garbage that even itself can't decrypt for a reason that I have not tried to pinpoint. So refuse using AEAD ciphers and AES XTS for enveloped data from the cms "app" and throw an error pointing out that this isn't supported. OpenSSL have since added incorrect support for AuthEnvelopedData (ASN.1 and code review are hard), so doing this right will need both correct and interoperable code, which I doubt anyone will bother to write anytime soon. Reported by Ben Cooper in https://github.com/libressl/portable/issues/1157 ok beck jsing
2 daysGarbage collect docs of BIO_dump{,_indent}_{cb,fp}()tb1-35/+3
The _cb() variants were only documented as intentionally undocumented. Be that as it may, they left the building more than a year ago.
2 daysbss_log.c: don't rely on err.h pulling in bio.htb1-2/+2
ok jsing
2 daysopenssl ocsp: switch from X509V3error() to perror()tb1-6/+6
ok jsing
6 daysmerge the x509name test into x509_name_test.ctb4-73/+125
Remove the old x509name test and its Makefile rule. Its logic has been fully integrated into x509_name_test.c using a new table-driven approach. Each x509 name entry is added and validated step by step, checking both the string representation produced by X509_NAME_print_ex() and the internal RDN set structure. This makes the test easier to extend and maintain, and eliminates the need for an external .expected file or output diff. From Kenjiro Nakayama (with tiny tweaks)
7 daysFix up two markup mistakes with .Fn and .Xrtb1-4/+4
7 daysImprove the pqueue testtb3-48/+57
This simplifies the test in portable and makes the whole thing a bit less ugly overall. From Kenjiro Nakayama with minor tweaks by me
7 dayssigh. pqueue_find() also needs a const treatmenttb2-4/+4
7 dayspqueue.h: zap trailing whitespacetb1-3/+3
7 daysconst correct first argument of pitem_new()tb2-4/+4
Makes upcoming changes in regress less ugly.
8 daysRemove the X9.62 prime239v{1,2,3} curvestb1-179/+1
While RFC 3279 allows these curves for use in X.509 certificates (*), no one actually does this. Certs using these curves cannot be used for TLS and the curves aren't accepted by FIPS either. codesearch shows no actual uses of these curves, only their OIDs are listed. At this point these have become useless historical baggage. ok jsing (*) Of the 27 curves listed in RFC 3279 the only one that seems to have seen actual use in certificates is P-256.
8 daysRemove the three test cases covering prime239v*tb1-121/+1
8 daysMove P-256 where it belongstb1-67/+67
ok jsing
8 daysFix typo in curve comment: P224r2 -> P224t1tb1-2/+2
8 daysCTASSERT that internal pub/priv keys match the sizes exposed in mlkem.htb2-2/+10
This will need reworking (especially deduplicating) anyway, but it doesn't hurt now. From Kenjiro Nakayama
8 daysVerify that the selected key share is indeed group 29tb1-1/+6
From Kenjiro Nakayama
8 daysmlkem_unittest: check return value of decap()tb1-5/+11
From Kenjiro Nakayama
8 daysmlkem_tests: add an empty line for consistencytb1-1/+2
10 daysMore space around .Dl + a typo on toptb2-5/+11
11 dayslhash: add missing spaces before assignment operatortb1-4/+4
11 daystlsext: stop sending SNI before ALPN in clientstb1-24/+1
All supported releases of LibreSSL ensure that the corresponding callbacks are called in a predefined order rather than honoring the order in which a client sends its extensions. Therefore the ALPN callback for apache-httpd's virtual host setups can rely on SNI information being available and we no longer need to work around this on hte client side. Cuts the amount of code needed for tlsext randomization in half. ok jsing
11 daystlsexttest: remove check that clients receive SNI before ALPNtb1-33/+3
The next commit will remove the kludge for compatibility of Apache with older libressl, so remove the corresponding regress coverage and only check that PSK is the last extension.
13 daysEC_GROUP_check.3: rephrase a sentence to avoid a word repetitiontb1-4/+4
13 daysEC_GROUP_new_by_curve_name.3: escape a - in code.tb1-3/+3
2025-04-27c2sp: drop OpenSSL 1.1 and 3.2, add 3.5tb1-2/+2
2025-04-26EC_POINT_point2oct: remove in_ prefix in RETURN VALUEStb1-5/+5
2025-04-26EC_GROUP_new_curve_GFp: some fixes in the RETURN VALUE sectiontb1-9/+12
2025-04-26Fix markup for EC_GROUP_set_point_conversion_formtb1-4/+5
2025-04-25Fix up a few dangling referencestb4-13/+12
2025-04-25Rework EC documentationtb13-1242/+1998
This replaces the giant, poor quality and outdated EC_GROUP_copy.3, EC_GROUP_new.3, and EC_POINT_new.3 manuals with seven new manuals written from scratch. * EC_GROUP_new_by_curve_name() is the entry point for builtin curves, * EC_GROUP_new_curve_GFp() describes lower level API that should not usually be needed apart from a handful of accessors. * EC_GROUP_check() contains two functions that applications should not need because either you know for certain something is an elliptic curve (so these checks are pointless) or you should not use it. * EC_GROUP_get_curve_name() describes some low level ASN.1 footguns and corresponding getters. * EC_POINT_new() contains the simple EC_POINT allocation and freeing API * EC_POINT_get_affine_coordinates() contains the coordinate accessors * EC_POINT_point2oct() is about encoding elliptic curve points While all this is quite far from perfect, the diff is getting too big and it will be easier to improve this in tree. It is definitely more repetitive than I would like it to be. Reviews, tweaks and general feedback are of course welcome. discussed with jsing
2025-04-25BN_new: zap an anachronistic admonitiontb1-4/+2
-This type should be considered opaque and fields should not be modified -or accessed directly. The type has long been opaque and reasonable people will not do things that permit them to access the fields of opaque types directly. Of course, in the vicinity of OpenSSL code and API all sorts of insanity actually exist.
2025-04-25Restore two #if defined(GHASH) that were incorrectly removed.jsing1-5/+5
Also condition on defined(GHASH_CHUNK) since this is used within these blocks. This makes the conditionals consistent with other usage. Fixes build with TABLE_BITS == 1.
2025-04-25Unifdef OPENSSL_SMALL_FOOTPRINT.jsing1-13/+5
ok tb@
2025-04-25Use the OPENSSL_SMALL_FOOTPRINT code in gcm_init_4bit().jsing1-32/+2
A modern compiler will unroll these loops - LLVM produces identical code (at least on arm64). Drop the manually unrolled version and have code that is more readable and maintainable. ok tb@
2025-04-23Mop up all of the GETU32/BSWAP4/BSWAP8 macros since they're now unused.jsing2-44/+2
ok beck@ tb@
2025-04-23Rewrite gcm_gmult_1bit() to avoid sizeof(long) hacks.jsing1-22/+8
We're already using 64 bit variables, so just continue to do so and let the compiler deal with code generation. While here, use unsigned right shifts instead of relying on signed right shifts and implementation-defined behaviour (which the original code did). Feedback from lucas@ ok beck@ tb@
2025-04-23Fix CRYPTO_gcm128_decrypt() when compiled with TABLE_BITS == 1.jsing1-3/+3
This appears to have been broken since 2013 when OpenSSL commit 3b4be0018b5 landed. This added in_t and out_t variables, but continued to use in and out instead. Yet another reason why untested conditional code is a bad thing. ok beck@ tb@
2025-04-23Unifdef OPENSSL_SMALL_FOOTPRINT.jsing5-23/+5
We do not build with OPENSSL_SMALL_FOOTPRINT and it removes more untested code paths. Request by tb@ (and it was already on my TODO list!)