Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Fix an error message left out in the mustDecodeHexString() conversion | tb | 2023-11-07 | 1 | -2/+2 |
| | |||||
* | Pull up the handling of the two webcrypto special snowflakes | tb | 2023-11-07 | 1 | -13/+9 |
| | |||||
* | Drop a useless line and bump copyright years | tb | 2023-11-07 | 1 | -4/+3 |
| | |||||
* | Unwrap a few lines | tb | 2023-11-07 | 1 | -72/+32 |
| | |||||
* | Wrap hex.DecodeString() into mustDecodeHexString() | tb | 2023-11-07 | 1 | -390/+78 |
| | | | | | | | | | | | | | The hex decoding is only done from the JSON files provided by the wycheproof-testvectors package. Failure is always fatal. So there is no need for repeated error checks, and we can use an ergonomic wrapper. Also rework the calculation of the message digest from input data this had a similar deficit. All in all this shaves off about 10% of the code and removes a lot of tedious repetition. | ||||
* | Use maps to retrieve various AES variants | tb | 2023-11-07 | 1 | -60/+72 |
| | |||||
* | Convert hashEvpMdFromString() to a map | tb | 2023-11-07 | 1 | -26/+19 |
| | |||||
* | Add stringer interfaces to the test groups | tb | 2023-11-07 | 1 | -102/+126 |
| | | | | This simplifies and unifies a lot of error messages. | ||||
* | Pull everything except the actual run call out of the closure | tb | 2023-11-06 | 1 | -11/+9 |
| | | | | | | | | The determination of the test group type and the JSON unmarshalling can be done before the closure without performance impact. This is more readable and eliminates the need of a temporary variable again. Suggested by jsing | ||||
* | Introduce testGroupFromAlgorithm() | tb | 2023-11-06 | 1 | -50/+54 |
| | | | | | This factors another ugly switch into a helper function. This should probably become a map eventually, but for now keep things straightforward. | ||||
* | Add a wycheproofTestGroupRunner interface | tb | 2023-11-06 | 1 | -72/+26 |
| | | | | | This allows us to use a simpler way of running the individual test groups and gets rid of an ugly mostly copy-pasted switch inside a closure. | ||||
* | Add aliases for AES AEAD constructions and ChaCha | tb | 2023-11-06 | 1 | -9/+12 |
| | | | | | These used the wycheproofTestGroupAead type but an upcoming change requires to change this. Introduce the aliases now to make the next diff cleaner. | ||||
* | Fix a for loop bug introduced in the concurrency refactor | tb | 2023-11-06 | 1 | -3/+4 |
| | | | | | | | | | | | | | Due to Go's idiosyncratic semantics of for loops, tests would only run some of the test groups in the JSON file because by the time the closure is called, the array index could be changed. For example, on fast 8 core machines, the CMAC tests would run the last test group with key size 320 eight times rather than each of the eight test groups once. Make a copy of the pointer before passing it to the closure to avoid this issue. Simpler version of my initial fix from jsing | ||||
* | Uncomment json webcrypto line. Packages will have caught up... | tb | 2023-11-06 | 1 | -3/+2 |
| | |||||
* | Provide prototype for X509_ALGOR_set_md() | tb | 2023-10-26 | 1 | -1/+3 |
| | | | | | | Once we remove X509_ALGOR_set_md() we can link this test statically and use X509_ALGOR_set_evp_md() but for now make sure the documented workaround for this garbage API works. | ||||
* | Add a few more test cases for mod_exp aliasing | tb | 2023-10-19 | 1 | -33/+78 |
| | |||||
* | The bn_mod_exp test is no longer an expected failure | tb | 2023-10-19 | 1 | -3/+1 |
| | |||||
* | Add test case checking aliasing of the result with other arguments | tb | 2023-10-19 | 2 | -2/+108 |
| | | | | | These are expected failures for BN_mod_exp_simple() and the internal BN_mod_exp_recp(), which will be fixed shortly. | ||||
* | x509_algor: fix error message | tb | 2023-10-12 | 1 | -7/+7 |
| | |||||
* | x509_algor: add a few missing includes | tb | 2023-10-12 | 1 | -1/+4 |
| | |||||
* | x509_algor: Turn expected failure into actual failure now that the API is | tb | 2023-10-11 | 1 | -3/+3 |
| | | | | fixed. | ||||
* | Add preallocation dance for X509_ALGOR_set_md() as documented | tb | 2023-10-11 | 1 | -1/+5 |
| | |||||
* | Add regress coverage for X509_ALGOR_* | tb | 2023-10-11 | 2 | -2/+377 |
| | | | | | | | | | This covers the setters and getters. Serialization and deserialization as well as comparison is already well covered by the pieces of regress using certs. There is currently one printf indicating failure. This will be fixed shortly. | ||||
* | Add regress coverage for ASN1_UTCTIME_cmp_time_t() | tb | 2023-10-05 | 1 | -5/+12 |
| | |||||
* | Add some coverage for ASN1_TIME_cmp_time_t() as well | tb | 2023-10-02 | 1 | -1/+14 |
| | | | | | ASN1_UTCTIME_cmp_tim_t() could be done similarly, but then I have to mess with LIBRESSL_INTERNAL. Let's do this after unlock. | ||||
* | Add regress coverage for ASN1_TIME_compare() | tb | 2023-10-02 | 1 | -1/+78 |
| | |||||
* | Minor asn1time tweaks | tb | 2023-10-02 | 1 | -26/+12 |
| | | | | Sprinkle some (static) const and garbage collect an unused struct. | ||||
* | Add an empty line | tb | 2023-10-01 | 1 | -1/+2 |
| | |||||
* | Allow IP addresses to be specified in a URI. | beck | 2023-09-29 | 1 | -4/+50 |
| | | | | | | | | | | | | Our checking here was a bit too aggressive, and did not permit an IP address in a URI. IP's in a URI are allowed for things like CRLdp's AIA, SAN URI's etc.). The check for this was also slightly flawed as we would permit an IP if memory allocation failed while checking for an IP. Correct both issues. ok tb@ | ||||
* | Appease coverity | tb | 2023-09-29 | 1 | -2/+4 |
| | | | | This is a static pointer, so it ain't ever NULL, but shrug | ||||
* | Fix error message | tb | 2023-09-28 | 1 | -2/+2 |
| | |||||
* | Don't leak ctx on failure | tb | 2023-09-28 | 1 | -3/+2 |
| | |||||
* | Add more regress coverage for EVP_CIPHER_CTX_iv_length() | tb | 2023-09-28 | 1 | -1/+268 |
| | | | | | | | Awesome: the IV length for GCM is only bounded by INT_MAX or malloc limits. In the absence of an overflowing issue tracker, I'm labeling this "good first issue", "help wanted" here. | ||||
* | Check that EVP_CIPHER_CTX_iv_length() matches what was set | tb | 2023-09-28 | 1 | -1/+9 |
| | | | | | | This really only covers AES-GCM. From beck | ||||
* | whitespace | tb | 2023-09-28 | 1 | -3/+3 |
| | |||||
* | Fix reference to x509v3.cnf(5) bis | tb | 2023-09-26 | 1 | -6/+6 |
| | |||||
* | Fix reference to x509v3.cnf(5) | tb | 2023-09-26 | 1 | -6/+6 |
| | |||||
* | Ensure no memory is leaked after passing NULL to ASN1_TIME_normalize() | job | 2023-08-30 | 1 | -1/+4 |
| | | | | OK tb@ | ||||
* | Make some global variables const | tb | 2023-08-20 | 1 | -14/+15 |
| | |||||
* | Bye bye to all people out there | tb | 2023-08-20 | 1 | -28/+1 |
| | |||||
* | Add some spaces after comma | tb | 2023-08-20 | 1 | -6/+6 |
| | |||||
* | unifdef -D FULL_TEST | tb | 2023-08-20 | 1 | -7/+1 |
| | |||||
* | knfmt(1) to the rescue | tb | 2023-08-20 | 1 | -139/+146 |
| | |||||
* | Another OPENSSL_NO_DEPRECATED hits the bit bucket | tb | 2023-08-20 | 1 | -7/+1 |
| | |||||
* | Drop unnecessary OPENSSL_NO_DEPRECATED dance | tb | 2023-08-20 | 1 | -7/+1 |
| | |||||
* | Use a separate flags variable for the error flags in DH_check() | tb | 2023-08-20 | 1 | -7/+8 |
| | |||||
* | Add regress coverage for ASN1_STRING_cmp() | tb | 2023-08-15 | 1 | -1/+147 |
| | |||||
* | Add some regress coverage for various ASN1_STRING types to codify some | tb | 2023-08-15 | 1 | -1/+229 |
| | | | | quirks and invariants. | ||||
* | first batch of intentionally undocumented EVP constants: | schwarze | 2023-08-12 | 1 | -1/+10 |
| | | | | some EVP_MD_CTRL_*, some EVP_MD_CTX_FLAG_*, and all of EVP_F_* and EVP_R_* | ||||
* | Now that the DH is sensibly called dh instead of a, we can also rename | tb | 2023-08-12 | 1 | -10/+10 |
| | | | | | abuf, alen and aout to names that make sense, such as buf, buf_len and secret_len. |