Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Regress client and server can do session reuse now. Test this with | bluhm | 2018-11-10 | 6 | -129/+220 | |
| | | | | | all combinations of LibreSSL, OpenSSL 1.0.2, and OpenSSL 1.1. It is currently disabled for TLS 1.3 as this needs more setup. | |||||
* | Make sure the interop test happen last (since they take a long time) | beck | 2018-11-10 | 2 | -8/+9 | |
| | ||||||
* | Clean up and free objects at the completion of the regress test. | jsing | 2018-11-10 | 1 | -1/+13 | |
| | | | | From Ben L <bobsayshilol at live dot co dot uk>. | |||||
* | fix a leak reported by Ben L (bobsayshilol () live ! co ! uk) | tb | 2018-11-10 | 1 | -1/+3 | |
| | ||||||
* | Fix a leak reported by Ben L bobsayshilol () live ! co ! uk. | tb | 2018-11-10 | 1 | -1/+3 | |
| | ||||||
* | fix a leak pointed out by Ben L (bobsayshi () live ! co ! uk) | tb | 2018-11-10 | 1 | -4/+8 | |
| | ||||||
* | More regress all the way to exporter_master | beck | 2018-11-10 | 1 | -4/+44 | |
| | ||||||
* | Fix last of the empty hash nonsense | beck | 2018-11-10 | 1 | -6/+3 | |
| | | | | ok jsing@ | |||||
* | Update key schedule regress to match API changes. | jsing | 2018-11-09 | 1 | -21/+12 | |
| | ||||||
* | The Botan library from ports an be configured to use OpenSSL or | bluhm | 2018-11-09 | 2 | -1/+22 | |
| | | | | | | | | LibreSSL as crypto provider. When we run their regression tests, we are actually testing our library. This is far from perfect. A lot of LibreSSL features have not been implemented as Botan provider. Even if provider openssl is specified, botan-test runs a lot of non-openssl tests. This can be improved later. | |||||
* | remove the not yet implemented "handshake" subdirectory | tb | 2018-11-09 | 1 | -2/+1 | |
| | ||||||
* | Add subdirectires with SUBDIR += instead of a single assignment with | tb | 2018-11-09 | 3 | -67/+65 | |
| | | | | line continuations. | |||||
* | The cert subdir is testing all combinations of certificate validation. | bluhm | 2018-11-09 | 11 | -48/+244 | |
| | | | | | | Having the three libraries, client and server certificates, missing or invalid CA or certificates, and enforcing peer certificate results in 1944 new test cases. | |||||
* | Add missing NULL checks on allocation, style(9) and consistently use | jsing | 2018-11-08 | 1 | -35/+34 | |
| | | | | goto err instead of handrolling. | |||||
* | Add missing BN_free() calls. | jsing | 2018-11-08 | 1 | -1/+3 | |
| | | | | From Ben L <bobsayshilol at live dot co dot uk>. | |||||
* | Use ASN1_TYPE_new()/ASN1_TYPE_free() to avoid leaking memory. | jsing | 2018-11-08 | 1 | -12/+17 | |
| | | | | From Ben L <bobsayshilol at live dot co dot uk>. | |||||
* | Use in-place (un)wrapping in the keywrap tests. | tb | 2018-11-07 | 1 | -5/+8 | |
| | ||||||
* | Add in key_schedule regress tests to regress build | beck | 2018-11-07 | 1 | -1/+2 | |
| | ||||||
* | Add a self test for each SSL library by connecting client with | bluhm | 2018-11-07 | 5 | -23/+88 | |
| | | | | | | server. Check that the highest available TLS version is selected. LibreSSL TLS 1.3 check is disabled until the feature becomes available. | |||||
* | Add initial TLS 1.3 key schedule support with basic regress tests | beck | 2018-11-07 | 2 | -0/+249 | |
| | | | | ok jsing@ tb@ | |||||
* | Add interop test with OpenSSL 1.1. TLS 1.3 should be used automatically | bluhm | 2018-11-07 | 5 | -10/+55 | |
| | | | | | when it becomes available in LibreSSL. thanks to sthen@ for the new OpenSSL port | |||||
* | Print SSLeay, OpenSSL, and LibreSSL version strings. Make client | bluhm | 2018-11-07 | 7 | -12/+71 | |
| | | | | | and server compile with OpenSSL 1.1. Check runtime version string of SSL library. | |||||
* | +interop | bluhm | 2018-11-07 | 1 | -1/+2 | |
| | ||||||
* | Test TLS interoperability between LibreSSL and OpenSSL. | bluhm | 2018-11-07 | 10 | -0/+549 | |
| | | | | | | | | | | | | Implement simple SSL client and server in C. Create four binaries by linking them with LibreSSL or OpenSSL. This way API compatibility is tested. Connect and accept with netcat to test protocol compatibility with libtls. Currently OpenSSL 1.0.2p from ports is used. Plan is to move to OpenSSL 1.1 and and test TLS 1.3. idea from beck@; help from jsing@ | |||||
* | better failure printing, add more checks | tb | 2018-11-06 | 1 | -9/+35 | |
| | ||||||
* | link rand/ to build | tb | 2018-11-06 | 1 | -2/+4 | |
| | ||||||
* | add a regression test for bn_rand_interval() | tb | 2018-11-06 | 2 | -0/+98 | |
| | ||||||
* | Add TLSv1.3 to version regress tests. | jsing | 2018-11-06 | 1 | -4/+80 | |
| | ||||||
* | Unbreak regress following Supported Elliptic Curve extension rename. | jsing | 2018-11-06 | 1 | -49/+49 | |
| | ||||||
* | With the fixed length checks in aes_wrap.c 1.11, we can remove the ugly | tb | 2018-10-20 | 1 | -11/+3 | |
| | | | | length checks here. | |||||
* | Run Wycheproof testvectors for AES Key Wrap without padding (RFC 3394) | tb | 2018-10-19 | 1 | -4/+144 | |
| | | | | | | against libcrypto. Currently contains caller-side length checks that should really be done in the library. This will be fixed after an upcoming commit to libcrypto. | |||||
* | truncate long comments in audit summary | tb | 2018-10-19 | 1 | -2/+7 | |
| | ||||||
* | simplify BN_bin2bn() calls; no need to pre-declare the variable. | tb | 2018-10-18 | 1 | -11/+6 | |
| | ||||||
* | Avoid a bad out of bounds access that caused intermittent crashes. | tb | 2018-10-18 | 1 | -2/+2 | |
| | ||||||
* | whitespace cleanup and other minor things from gofmt | tb | 2018-10-07 | 1 | -44/+39 | |
| | ||||||
* | make sure all CStrings are freed | tb | 2018-10-06 | 1 | -3/+7 | |
| | ||||||
* | plug a memory leak | tb | 2018-10-06 | 1 | -1/+2 | |
| | ||||||
* | wrap a few more overlong lines | tb | 2018-10-06 | 1 | -14/+36 | |
| | ||||||
* | wrap some overlong fmt.Printfs | tb | 2018-10-06 | 1 | -53/+106 | |
| | ||||||
* | It's slightly simpler to get the ECDH public key as an EC_POINT by using | tb | 2018-10-06 | 1 | -16/+15 | |
| | | | | | EC_KEY_set_public_key_affine_coordinates() and EC_KEY_get0_public_key() than using EC_POINT_set_affine_coordinates_GFp() directly. | |||||
* | free EC_POINT and EC_GROUP | tb | 2018-10-06 | 1 | -1/+4 | |
| | ||||||
* | Run Wycheproof ECDH Web Crypto test vectors against libcrypto. | tb | 2018-10-06 | 1 | -6/+155 | |
| | ||||||
* | merge runECDSAWebCryptoTest() into runECDSATest() | tb | 2018-10-06 | 1 | -53/+31 | |
| | ||||||
* | factor ECDSA signature extraction into its own function | tb | 2018-10-06 | 1 | -24/+35 | |
| | ||||||
* | make allocate/use/defer dances more consistent in ECDSA sig extraction | tb | 2018-10-06 | 1 | -9/+8 | |
| | ||||||
* | Run Wycheproof ECDSA Web Crypto test vectors against libcrypto. | tb | 2018-10-05 | 1 | -7/+166 | |
| | ||||||
* | Better refer to RFC 8422 which obsoletes RFC 4492. | tb | 2018-10-04 | 1 | -2/+2 | |
| | ||||||
* | While we don't explicitly support curve secp256r1, we can run 1250 tests | tb | 2018-10-04 | 1 | -11/+2 | |
| | | | | against its ANSI equivalent prime256v1 (compare RFC 4492, Appendix A). | |||||
* | in ECDH, gather statistics where it makes more sense | tb | 2018-09-30 | 1 | -8/+5 | |
| | ||||||
* | Add a comment on the acceptable RSASSA cases. | tb | 2018-09-22 | 1 | -2/+3 | |
| |