Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Split ec_key_test_point_encoding() into chunks of saner size | tb | 2024-10-29 | 1 | -49/+172 |
| | |||||
* | ec_asn1_test: point doubling is fine, the leak is elsewhere | tb | 2024-10-29 | 1 | -3/+1 |
| | | | | (will be fixed shortly). | ||||
* | Disable point doubling for now, it leaks due to a doc bug. | tb | 2024-10-29 | 1 | -1/+3 |
| | | | | | Can't replace it with adding the point to itself since that also leaks (another doc bug). Who would've thought. | ||||
* | unifdef -m -DCORRECT_PRIV_KEY_PADDING=1 ec_asn1_test.c | tb | 2024-10-28 | 1 | -9/+1 |
| | |||||
* | Enable the tests that depend on correct private key padding | tb | 2024-10-28 | 1 | -2/+2 |
| | |||||
* | c2sp: run test against openssl/3.4 if it is installed | tb | 2024-10-28 | 1 | -2/+2 |
| | |||||
* | {d2i,i2d}_ECParameters() also want a bit of exercising | tb | 2024-10-26 | 1 | -1/+28 |
| | |||||
* | ec_asn1_test: play some silly games to cover a few more code paths | tb | 2024-10-26 | 1 | -1/+47 |
| | |||||
* | Add regress coverage for ec_print.c | tb | 2024-10-26 | 1 | -2/+889 |
| | | | | | | | | | | | | | | | | | Of course the four stunning beauties in there aren't printing anything. the hex family converts an elliptic curve point's X9.62 encoding into a hex string (which kind of makes sense, you can print that if you want). Much more astounding is EC_POINT_point2bn() where the X9.62 octet string is interpreted as a BIGNUM. Yes, the bignum's hex digits are the point conversion form followed by the affine coordinate(s) of the elliptic curve point, and yes you can choose between compressed, uncompressed, and hybrid encoding, why do you ask? This doesn't really make any sense whatsoever but of course you can also print that if you really want to. Of course the beloved platinum members of the "gotta try every terrible OpenSSL interface" club had to use and expose this. | ||||
* | Use macros describing the intent rather than #if 0 | tb | 2024-10-25 | 1 | -8/+38 |
| | |||||
* | Add regress for {d2i,i2d}_ECPrivateKey() and {o2i,i2o}_ECPublicKey() | tb | 2024-10-25 | 1 | -1/+1003 |
| | | | | Some test cases are disabled since they exercise an upcoming bug fix. | ||||
* | ec_point_conversion: cosmetics | tb | 2024-10-23 | 1 | -4/+4 |
| | |||||
* | ec_point_conversion: extend test coverage by translating back the | tb | 2024-10-23 | 1 | -2/+76 |
| | | | | | | point to an octet string and match with the initial octet string. would have caught the regression found by anton | ||||
* | Suppress warning noise from deprecated OpenSSL API | tb | 2024-10-22 | 1 | -1/+2 |
| | |||||
* | ec_asn1_test: simplify previous | tb | 2024-10-18 | 1 | -7/+4 |
| | |||||
* | ec_asn1_test: call EC_GROUP_check() for the builtin curves | tb | 2024-10-18 | 2 | -59/+13 |
| | | | | | This makes the internal curve test in ectest.c superfluous. Also fix a logic error. | ||||
* | ec_asn1_test: adjust for rejection of non-builtin curve parameters | tb | 2024-10-18 | 1 | -14/+2 |
| | |||||
* | ec_asn1_test: add secp256k1.m | tb | 2024-10-18 | 1 | -10/+81 |
| | |||||
* | ec_asn1_test: remove last hardcoded wei25519 remnant | tb | 2024-10-18 | 1 | -4/+3 |
| | |||||
* | ec_asn1_test: test Wei25519.2 and Wei25519.-3 as well | tb | 2024-10-18 | 1 | -37/+163 |
| | | | | Covers a few more corner cases in the elliptic curve code. | ||||
* | ec_asn1_test: clean up & refactor; test Wei25519 with simple method | tb | 2024-10-18 | 1 | -109/+189 |
| | |||||
* | EC ASN.1: add reminder that the simple method might also want testing | tb | 2024-10-16 | 1 | -1/+5 |
| | |||||
* | Implement Wei25519 to exercise some more elliptic curve code | tb | 2024-10-16 | 1 | -1/+284 |
| | | | | | | | | This provides a non-trivial non-builtin curve that is unlikely to ever become a builtin curve. This exercises the cofactor guessing code and and ensures that things work as far as they can with a custom OID. The main reason for adding it is to have a "real-world" example for an upcoming check that EC parameters represent a builtin curve. | ||||
* | rust-openssl: set resolver="2" for workspace | tb | 2024-10-15 | 1 | -0/+1 |
| | | | | silences an annoying warning | ||||
* | Extend ec_asn1_test to check for correct curve coefficient encoding | tb | 2024-10-14 | 1 | -5/+50 |
| | |||||
* | Exercise the EC parameters code a bit more | tb | 2024-10-12 | 1 | -1/+103 |
| | | | | | | Ensure all builtin curves can be roundtripped through DER as named curves, via explicit parameterization, using uncompressed, compressed and hybrid point formats. | ||||
* | Add error regress coverage for ERR_LIB_SYS. | jsing | 2024-10-11 | 1 | -1/+19 |
| | | | | These are dynamically populated based on strerror() values. | ||||
* | Hook up the err regress. | jsing | 2024-10-02 | 1 | -1/+2 |
| | |||||
* | Add initial regress for the error stack and ERR_* APIs. | jsing | 2024-10-02 | 2 | -0/+210 |
| | |||||
* | Enable additional CRYPTO_get_ex_new_index() tests. | jsing | 2024-10-02 | 1 | -6/+1 |
| | | | | | | | It was previously possible to call CRYPTO_get_ex_new_index() with either a negative index or a positive index that equaled or exceeded CRYPTO_EX_INDEX__COUNT. The reimplementation of exdata treats these as error cases. | ||||
* | Enable large number of extension tests and stop skippking QUIC transport | tb | 2024-09-18 | 1 | -8/+3 |
| | | | | parameter extension which we now know about | ||||
* | tlsfuzzer: add a start-server convenience target for interactive testing | tb | 2024-09-17 | 1 | -2/+6 |
| | |||||
* | Replace OpenSSL 3.1 (which no longer is in ports) with 3.3 | tb | 2024-09-17 | 1 | -2/+2 |
| | |||||
* | tlsfuzzer: grammar fix missed in previous | tb | 2024-09-14 | 1 | -2/+2 |
| | |||||
* | typo: troups -> groups | tb | 2024-09-13 | 1 | -2/+2 |
| | |||||
* | parametes -> parameters | tb | 2024-09-11 | 1 | -2/+2 |
| | |||||
* | Futhermore -> Furthermore | tb | 2024-09-07 | 1 | -2/+2 |
| | |||||
* | Prepare for an upcoming tlsfuzzer test that expects decode_error | tb | 2024-09-06 | 1 | -2/+5 |
| | | | | when we send illegal_parameter. Shrug. | ||||
* | symbols: remove special case for cpuid_setup and cpu_caps | tb | 2024-09-01 | 1 | -8/+1 |
| | | | | The former is gone and the latter is available in crypto.h. | ||||
* | Update for OPENSSL_cpu_caps() now being machine independent. | jsing | 2024-08-31 | 3 | -17/+5 |
| | |||||
* | Undo workaround for EVP_PKEY_*check() removal | tb | 2024-08-31 | 1 | -3/+2 |
| | |||||
* | Retire the whirlpool test | tb | 2024-08-31 | 2 | -251/+0 |
| | |||||
* | unhook whirlpool from the tree | tb | 2024-08-31 | 1 | -2/+1 |
| | |||||
* | Adjust freenull test for upcoming conf_api.h removal | tb | 2024-08-30 | 2 | -5/+2 |
| | |||||
* | Disable hmac and pkey_ec tests until after the bump | tb | 2024-08-29 | 1 | -2/+3 |
| | |||||
* | Remove evp_pkey_check test | tb | 2024-08-29 | 2 | -399/+1 |
| | | | | The API it tests will be removed shortly | ||||
* | Remove unwanted trailing newlines from err/warn format strings. | anton | 2024-08-23 | 8 | -19/+19 |
| | |||||
* | Drop OpenSSL 3.0 interop testing infrastructure | tb | 2024-08-18 | 8 | -75/+11 |
| | | | | | The openssl 3.0 port was removed nearly a year ago shortly after the 7.4 release. | ||||
* | Add support for openssl32 in interop test | tb | 2024-08-18 | 7 | -9/+70 |
| | |||||
* | t_recvmmsg and t_sendmmsg were enabled in 2022 | guenther | 2024-08-15 | 1 | -2/+0 |
| |