Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Fix perl bugs that had me printing the wrong cert number for errors | beck | 2020-07-16 | 1 | -8/+9 | |
| | ||||||
* | The exit code from the perl matters here | beck | 2020-07-15 | 1 | -1/+3 | |
| | ||||||
* | Don't leak the X509_STORE | beck | 2020-07-15 | 1 | -1/+3 | |
| | ||||||
* | Add certificate validation tests generated using the tools from | beck | 2020-07-15 | 10945 | -0/+444760 | |
| | | | | | | | | bettertls.com, and a verification suite to try each certificate in the same manner as the web based tests do using X509_verify. This includes the list of "known" failures today in our validaion code so we can move forward without moving back. | |||||
* | Enter the certs regress directory. | jsing | 2020-07-14 | 1 | -1/+2 | |
| | ||||||
* | Add regress for X509_verify() using the new bundles. | jsing | 2020-07-14 | 2 | -3/+369 | |
| | | | | | A number of these tests are known to fail due to bugs/incorrect verification implementation. | |||||
* | Provide generated certificate bundles and roots for regress. | jsing | 2020-07-14 | 74 | -0/+3721 | |
| | | | | ok beck@ tb@ | |||||
* | Provide tools to build certificate changes for verify regress. | jsing | 2020-07-14 | 4 | -0/+636 | |
| | | | | | | | | | | This provides a script that generates a variety of certificate chains and assembles them into bundles containing various permutations, which can be used to test our X.509 verification. A Go program is included to verify each of these bundles. ok beck@ tb@ | |||||
* | When X509_ATTRIBUTE_create() receives an invalid NID (e.g., -1), return | schwarze | 2020-06-04 | 2 | -5/+115 | |
| | | | | | | | | | | | failure rather than silently constructing a broken X509_ATTRIBUTE object that might cause NULL pointer accesses later on. This matters because X509_ATTRIBUTE_create() is used by documented API functions like PKCS7_add_attribute(3) and the NID comes straight from the user. This fixes a bug found while working on documentation. OK tb@ and "thanks" bluhm@ | |||||
* | go fmt whitespace nit | tb | 2020-05-14 | 1 | -3/+3 | |
| | ||||||
* | reinstate an error check that was commented out while waiting for arm | tb | 2020-05-14 | 1 | -5/+4 | |
| | | | | packages to appear | |||||
* | Fix two bugs in the AES-CBC-PKCS5 tests that didn't hide failing tests: | tb | 2020-04-27 | 1 | -3/+3 | |
| | | | | | 1. Use the correct slice for comparing the cipher output 2. Fix logic error similar to the one in AES-GCM in the previous commit | |||||
* | Fix a logic error that hid the failing ZeroLengthIv tests. | tb | 2020-04-27 | 1 | -3/+3 | |
| | | | | This issue was fixed in lib/libcrypto/evp/e_aes.c r1.40. | |||||
* | Import openssl-1.1.1d test data to base64test.c | inoguchi | 2020-03-10 | 1 | -1/+97 | |
| | | | | ok bcook@ tb@ | |||||
* | Modify regress base64test.c | inoguchi | 2020-03-10 | 1 | -11/+14 | |
| | | | | | | | | | | | | | | | | | | | | | | | - Don't remove multi line CR/LF from bt->out when NL mode base64_encoding_test removes CR/LF from bt->out to compare with the encoding result. This is fine with NO NL mode, but it goes wrong with NL mode if encoding result is larger than 64 and multi line, like below. "eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4\neHh4eHh4eHh4eHh4\n" - Use memcpy instead of asprintf to avoid lost '\0' at the end of data This test data loses trailing '\0' if using asprintf. "\x61\x47\x56\x73\x62\x47\x38\x3d\x0a\x00" - Print original data if decoding result comparison fails This change is not for importing test data, but I just notice. It prints bt->out if fail to memcmp bt->in with decoding result. ok bcook@ tb@ | |||||
* | Some of the test vectors that were added in the upstream commit | tb | 2020-01-27 | 1 | -7/+9 | |
| | | | | | 4672ff74d68766e7785c2cac4c597effccef2c5c have a zero byte prepended. Run the secp224k1 ECDH tests and adjust this if needed. | |||||
* | Add back the tests that were deleted in previous but not contained | tb | 2020-01-26 | 1 | -1/+9 | |
| | | | | in OpenSSL's test suite. | |||||
* | Adjust tests to match the change in EVP_chacha20(). | tb | 2020-01-26 | 2 | -11/+22 | |
| | | | | Test vectors taken from OpenSSL 1.1.1d (under OpenSSL's old license). | |||||
* | whitespace from go fmt + update a comment | tb | 2019-12-14 | 1 | -4/+4 | |
| | ||||||
* | Run Wycheproof HMAC test vectors against libcrypto. | tb | 2019-12-14 | 1 | -1/+96 | |
| | ||||||
* | update to-do list | tb | 2019-12-09 | 1 | -2/+1 | |
| | ||||||
* | Run Wycheproof DSA P1363 test vectors against libcrypto. | tb | 2019-12-09 | 1 | -19/+71 | |
| | ||||||
* | update to-do list | tb | 2019-12-03 | 1 | -2/+2 | |
| | ||||||
* | Run Wycheproof ECDSA P1363 test vectors against libcrypto. | tb | 2019-12-03 | 1 | -8/+8 | |
| | ||||||
* | Add an EcPoint variant and pass it to the ECDH test runner. | tb | 2019-12-03 | 1 | -20/+31 | |
| | ||||||
* | Annotate test vector files with an enum which we can then pass to the | tb | 2019-12-03 | 1 | -27/+48 | |
| | | | | run*Test programs as needed. | |||||
* | Run additional 3004 ECDH and 1575 ECDSA test vectors against libcrypto. | tb | 2019-11-28 | 1 | -3/+12 | |
| | | | | For now, skip 96 ECDH tests for secp224k1. | |||||
* | move the HKDF tests up a bit | tb | 2019-11-28 | 1 | -68/+68 | |
| | ||||||
* | update to-do list | tb | 2019-11-28 | 1 | -2/+1 | |
| | ||||||
* | go fmt | tb | 2019-11-28 | 1 | -10/+10 | |
| | ||||||
* | no need for fallthrough | tb | 2019-11-28 | 1 | -19/+7 | |
| | ||||||
* | Run HKDF test vectors against libcrypto. | tb | 2019-11-28 | 1 | -1/+95 | |
| | ||||||
* | Run XChaCha20-Poly1305 test vectors against libcrypto. | tb | 2019-11-28 | 1 | -14/+43 | |
| | ||||||
* | typo | tb | 2019-11-28 | 1 | -2/+2 | |
| | ||||||
* | Add to do list. | tb | 2019-11-27 | 1 | -1/+7 | |
| | ||||||
* | Only run the test vectors from x25519_test.json for now. | tb | 2019-11-27 | 1 | -2/+6 | |
| | ||||||
* | RSASig now has the more specific name RSASSA-PKCS1-v1_5. | tb | 2019-11-27 | 1 | -10/+14 | |
| | ||||||
* | Only print the basename of skipped test files. | tb | 2019-11-27 | 1 | -2/+3 | |
| | ||||||
* | go fmt | tb | 2019-11-27 | 1 | -10/+9 | |
| | ||||||
* | Run RSAES-PKCS1-v1_5 test vectors against libcrypto. | tb | 2019-11-27 | 1 | -9/+104 | |
| | ||||||
* | Make error messages look like other test cases. | tb | 2019-11-27 | 1 | -4/+4 | |
| | ||||||
* | Add glue for new RSA-OAEP tests. | tb | 2019-11-27 | 1 | -2/+158 | |
| | ||||||
* | Skip tests with unsupported signature algorithm SHA512/224 as well. | tb | 2019-11-27 | 1 | -2/+2 | |
| | ||||||
* | The DSA test vectors were split up and more tests were added. | tb | 2019-11-27 | 1 | -2/+2 | |
| | | | | Enable them, as all of them pass. | |||||
* | New failure mode for AES-CCM: "very long nonce". | tb | 2019-11-27 | 1 | -2/+2 | |
| | ||||||
* | Prepare update of wycheproof-testvectors. Skip some tests for things | tb | 2019-11-27 | 1 | -2/+10 | |
| | | | | | we don't support in LibreSSL and make sure we run as many tests as possible. | |||||
* | Add regress for CMS sign and verify. | jsing | 2019-11-04 | 1 | -2/+125 | |
| | ||||||
* | Hook cms regress. | jsing | 2019-11-02 | 1 | -1/+2 | |
| | ||||||
* | Include cms.h. | jsing | 2019-11-02 | 1 | -1/+2 | |
| | ||||||
* | Initial regress for cms. | jsing | 2019-11-02 | 2 | -0/+199 | |
| |