summaryrefslogtreecommitdiff
path: root/src/regress/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Make this regress build againbeck2016-09-022-4/+4
|
* add ca cert error check and make the path configurablebcook2016-07-071-1/+9
| | | | from Kinichiro Inoguchi
* remove extra assignment of s from 1.11, fix regression testbcook2016-07-051-2/+1
|
* On systems where we do not have BN_ULLONG defined (most 64-bit systems),bcook2016-07-051-4/+24
| | | | | | | | | | | | | | BN_mod_word() can return incorrect results if the supplied modulus is too big, so we need to fall back to BN_div_word. Now that BN_mod_word may fail, handle errors properly update the man page. Thanks to Brian Smith for pointing out these fixes from BoringSSL: https://boringssl.googlesource.com/boringssl/+/67cb49d045f04973ddba0f92fe8a8ad483c7da89 https://boringssl.googlesource.com/boringssl/+/44bedc348d9491e63c7ed1438db100a4b8a830be ok beck@
* make less awful.. test against cloudflare toobeck2016-07-052-9/+19
|
* Add a nasty little ocsp regress test in the hope pedants will make it better.beck2016-07-043-1/+140
|
* Remove flags for disabling constant-time operations.bcook2016-06-302-70/+33
| | | | | | | | This removes support for DSA_FLAG_NO_EXP_CONSTTIME, DH_FLAG_NO_EXP_CONSTTIME, and RSA_FLAG_NO_CONSTTIME flags, making all of these operations unconditionally constant-time. Based on the original patch by César Pereid. ok beck@
* Gix misleading indent pointed out by GCC 6.1.libressl-v2.4.0bcook2016-05-301-4/+4
| | | | ok beck@ jsing@
* Update AEAD regress to match EVP_aead_chacha20_poly1305() changes.jsing2016-04-282-83/+83
|
* After opening an AEAD, ensure that the decrypted output matches thejsing2016-04-131-0/+5
| | | | plaintext for the regress test case.
* check return value for BN_hex2bn in regression testsbcook2016-03-131-4/+10
|
* initialize pointer to avoid undefined free on failurebcook2015-12-281-2/+2
| | | | ok beck@
* Add EVP_aead_chacha20_poly1305_ietf() - The informational RFC 7539,reyk2015-11-022-0/+42
| | | | | | | | | "ChaCha20 and Poly1305 for IETF Protocols", introduced a modified AEAD construction that is incompatible with the common style that has been already used in TLS with EVP_aead_chacha20_poly1305(). The IETF version also adds a constant (salt) that is prepended to the nonce. OK mikeb@ jsing@
* print unsigned ints with %u, not %d. Reported by Pascal Cuoq.miod2015-10-301-2/+2
|
* Add explicit LL suffixes to the numerical constants which do not fit in 32 bits.miod2015-10-301-8/+8
|
* Pull in <sys/types.h> to get ssize_t or <stdint.h> to get uint32_t, instead ofmiod2015-10-301-0/+1
| | | | | relying upon previously included headers to do this, to enhance portability; from Pascal Cuoq, libressl github pull request #52
* Missing initializer; spotted by coverity.miod2015-10-251-2/+2
|
* Extend tests to call ASN1_{GENERALIZED,UTC,}TIME_set_string() with a NULLjsing2015-10-221-1/+19
| | | | | | | pointer - because, you know, you might want to set a string on a NULL object. The previous implementation apparently allowed this as a way of testing if the string was valid... probably because the *_check() functions are only useable after the string has already been set.
* Fix case where we wanted to test ASN1_TIME_set_string() but were testingjsing2015-10-222-6/+6
| | | | ASN1_UTCTIME_set_string() twice instead.
* Change regress to not believe legacy times are validbeck2015-10-191-65/+4
|
* Add another invalid time, which is currently accepted.jsing2015-10-021-1/+4
|
* Fix a bug in the regress, and be much more pedantic about what is allowedbeck2015-09-301-22/+46
| | | | | | | per RFC 5380 in an X509. RFC 5280 states that all times before 2050 must be specified as a UTCtime, not a Generalized time, and all times after must be a UTC time. By extension this also means the smallest time allowed per RFC 5280 is 500101000000Z and the largest is 99991231235959Z..
* Add an rfc5280 test suite to test x509_cmp_time.beck2015-09-292-2/+362
| | | | | | Note some of these will yet fail with the current libcrypto as the current X509_cmp_time is not RFC5280 compliant ok jsing@
* Fix sha2 regression test for libcrypto.doug2015-09-291-2/+2
| | | | | | | | | By default, "openssl sha" used SHA-0. However, it was possible to use the form "openssl sha -sha256" to run SHA-256 instead. The regression test used this form. Since we removed SHA-0 support, the regress tests should now call "openssl <digest>". ok guenther@, bcook@
* Add DER encoding/decoding coverage for ASN.1 GENERALIZEDTIME and UTCTIME.jsing2015-09-251-39/+158
|
* Add initial regress tests for ASN.1 times.jsing2015-09-253-1/+372
|
* Temporarily revive MD4 for MS CHAP support.doug2015-09-143-1/+136
|
* Remove MD4 support from LibreSSL.doug2015-09-133-136/+1
| | | | | | | | MD4 should have been removed a long time ago. Also, RFC 6150 moved it to historic in 2011. Rides the major crank from removing SHA-0. Discussed with many including beck@, millert@, djm@, sthen@ ok jsing@, input + ok bcook@
* Another style(9) grenade.jsing2015-09-131-550/+825
|
* Remove SHA-0 support.doug2015-09-134-176/+1
| | | | | | | SHA-0 was withdrawn shortly after publication 20 years ago and replaced with SHA-1. This will require a major crank. ok bcook@, jsing@
* Remove explicit NULL checks before *_free() calls and tidy some code.jsing2015-09-131-28/+22
|
* Use ECDH_size() and do some other clean up.jsing2015-09-131-7/+6
|
* remove e_os2.h includesbcook2015-09-131-1/+0
| | | | ok jsing@
* Wrap long lines.jsing2015-09-131-16/+32
|
* style(9) grenade.jsing2015-09-131-153/+178
|
* Cleanup enginetest a bit.bcook2015-09-121-104/+84
| | | | | It was the only thing preventing -Werror from building on some systems due to the unchecked asprintf's.
* remove mysterious, decorative comment blockletsbcook2015-07-181-21/+21
|
* Explicitly mark ignored BN_* return vals in tests.bcook2015-07-181-6/+6
| | | | | The tests will fail all the same. Fixes Coverity 78811 21659 21658 21657. Discussed with beck@
* check sscanf conversion, fixes Coverity 21666bcook2015-07-181-2/+6
| | | | ok doug@, miod@, guenther@
* Remove obsolete MDC-2DES from libcrypto.doug2015-06-203-134/+1
| | | | ok deraadt@ jsing@ miod@
* Make this run on strict alignment architectures.miod2015-05-081-6/+9
|
* Fix CVE-2014-3570: properly calculate the square of a BIGNUM value.bcook2015-02-251-23/+66
| | | | | | | | | | | See https://www.openssl.org/news/secadv_20150108.txt for a more detailed discussion. Original OpenSSL patch here: https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0 The regression test is modified a little for KNF. ok miod@
* Trivial fix for test progress output.bcook2015-02-251-4/+7
| | | | Remove unneeded dangling else, compound statements on a single line.
* BN_free() has its own NULL check.jsing2015-02-191-14/+7
|
* KNF.jsing2015-02-191-766/+834
|
* Fix various memory leaks by not exiting so abruptly from failed tests.miod2015-02-151-579/+507
|
* Remove ancient gcc workaround on mips.miod2015-02-151-3/+2
|
* Memory leak. Coverity CID 78865miod2015-02-151-2/+3
|
* Wrong logic; Coverity CID 78894miod2015-02-151-1/+1
|
* Do not rely upon malloc(0) not returning NULL. Not all malloc implementationsmiod2015-02-111-6/+10
| | | | | | have this property. Instead, skip the malloc and memcmp if their size is zero. Per bcook@ request in order to run on AIX