Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Add a slow regress target that runs openssl speed with proper alignment | tb | 2023-05-20 | 1 | -2/+7 | |
| | | | | | and with an unaligned offset. Let's see if all ciphers on our strict alignment arches can deal with this. | |||||
* | ecdhtest: check malloc() return values | tb | 2023-05-16 | 1 | -4/+7 | |
| | | | | From Ilya Chipitsine | |||||
* | Assert that test->want != NULL at this point | tb | 2023-05-13 | 1 | -1/+3 | |
| | | | | Should make coverity happier | |||||
* | asn1oct: add a couple more tests | tb | 2023-05-12 | 1 | -1/+10 | |
| | ||||||
* | asn1oct: minor tweak in error message | tb | 2023-05-12 | 1 | -3/+3 | |
| | ||||||
* | Add regress coverage for {s2i,i2s}_ASN1_OCTET_STRING | tb | 2023-05-12 | 2 | -1/+271 | |
| | ||||||
* | Make malloc tests that set flags more robust against the user also | otto | 2023-05-09 | 2 | -15/+19 | |
| | | | | having flags set. | |||||
* | Add regress coverage for -1 modulus as well. | tb | 2023-05-09 | 1 | -25/+38 | |
| | ||||||
* | Enable malloc_errs test | otto | 2023-05-08 | 1 | -2/+2 | |
| | ||||||
* | Add a regress test to test various malloc API and heap mismanagement | otto | 2023-05-08 | 2 | -0/+291 | |
| | | | | | errors which should cause abort. A few are not enabled yet, they will be once the corresponding diffs in malloc are committed. | |||||
* | symbols.awk: Remove cfb dance | tb | 2023-05-04 | 1 | -4/+2 | |
| | | | | With e_old.c gone, we no longer need this. | |||||
* | sigh. typo | tb | 2023-05-04 | 1 | -2/+2 | |
| | ||||||
* | Let ecdsatest exercise ECParameters_dup() a bit | tb | 2023-05-04 | 1 | -2/+3 | |
| | | | | This currently leaks, which will fixed in a follow-on commit. | |||||
* | Remove x9_62_test_internal() | tb | 2023-05-04 | 1 | -72/+1 | |
| | | | | | | This test depends on RAND_set_rand_method() allowing stupid things like making ECDSA signatures deterministic. This was gutted a long time ago and the function should have followed its wrappers into the attic. | |||||
* | Revert utf-8 fix for X509_NAME_get_index_by_NID to avoid libtls | beck | 2023-05-03 | 1 | -77/+2 | |
| | | | | | | | regress for the moment. this will come back after we rethink the failure versus not there case. ok tb@ jsing@ | |||||
* | Change X509_NAME_get_index_by[NID|OBJ] to be safer. | beck | 2023-05-02 | 1 | -2/+77 | |
| | | | | | | | | | | | | | | | | | | | | | | Currently these functions return raw ASN1_STRING bytes as a C string and ignore the encoding in a "hold my beer I am a toolkit not a functioning API surely it's just for testing and you'd never send nasty bytes" kind of way. Sadly some callers seem to use them to fetch things liks subject name components for comparisons, and often just use the result as a C string. Instead, encode the resulting bytes as UTF-8 so it is something like "text", Add a failure case if the length provided is inadequate or if the resulting text would contain an nul byte. based on boringssl. nits by dlg@ ok tb@ | |||||
* | Mark the BIO_F_* function codes as intentionally undocumented | schwarze | 2023-05-02 | 1 | -1/+1 | |
| | | | | | | and for now, skip the the BIO_R_* reason codes. It looks like all public symbols in the BIO library are now documented or marked as intentionally undocumented. | |||||
* | Simplify slightly and use i2d_PKCS7_bio_stream() | tb | 2023-05-02 | 1 | -3/+3 | |
| | | | | | This is a wrapper of i2d_ASN1_bio_stream() that doesn't require us to pass in PKCS7_it. | |||||
* | Make warnings more precise | job | 2023-05-01 | 1 | -4/+4 | |
| | ||||||
* | x509_asn1: make this test pass again after reinstating DER preservation | tb | 2023-04-30 | 1 | -5/+5 | |
| | ||||||
* | check_complete.pl: update for recent changes in bn | tb | 2023-04-30 | 1 | -4/+3 | |
| | ||||||
* | Sort alphabetically | tb | 2023-04-30 | 1 | -2/+2 | |
| | ||||||
* | Remove unnecessary target | tb | 2023-04-30 | 1 | -4/+1 | |
| | ||||||
* | policy test: simplify Makefile | tb | 2023-04-30 | 1 | -9/+2 | |
| | ||||||
* | Free all libcrypto global state memory before returning | job | 2023-04-28 | 1 | -1/+3 | |
| | | | | Found with the help of Otto's malloc memory leak detector! | |||||
* | Return a non-zero error exit code on any DER cache discrepancies | job | 2023-04-28 | 1 | -3/+3 | |
| | ||||||
* | Fix leaks reported by ASAN | tb | 2023-04-28 | 1 | -5/+1 | |
| | | | | debugged with job | |||||
* | Mark the obsolete PROXY_PARAM and SOCKS BIO_ctrl(3) command constants | schwarze | 2023-04-28 | 1 | -0/+2 | |
| | | | | | as intentionally undocumented. Do that here because no related manual pages exist. | |||||
* | Enable policy checking by default now that we are DAG implementation based. | beck | 2023-04-28 | 1 | -1/+12 | |
| | | | | | | | This ensures that we will no longer silently ignore a certificate with a critical policy extention by default. ok tb@ | |||||
* | The policy test is no longer expected to fail | tb | 2023-04-28 | 1 | -2/+1 | |
| | ||||||
* | Rearrange freeing of memory in the regress test | job | 2023-04-28 | 1 | -13/+9 | |
| | ||||||
* | make the policy test compile on sparc64 | tb | 2023-04-28 | 1 | -5/+6 | |
| | ||||||
* | Add X509_REQ_add_extensions and to X509_REQ_add1_attr to DER cache test | job | 2023-04-28 | 1 | -1/+139 | |
| | | | | | These new tests won't bubble up a non-zero error exit code because other libcrypto bits still need to land first. | |||||
* | Hook up the the x509 policy regression tests to x509 regress. | beck | 2023-04-28 | 2 | -3/+4 | |
| | | | | | | | | | These were adapted from BoringSSL's regress tests for x509 policy. They are currently marked as expected to fail as we have not enabled LIBRESSL_HAS_POLICY_DAG by default yet, and the old tree based policy code from OpenSSL is special. These tests pass when we build with LIBRESSL_HAS_POLICY_DAG. | |||||
* | Fix copyright, convert boringssl comments to C style | beck | 2023-04-28 | 1 | -30/+51 | |
| | ||||||
* | KNF | beck | 2023-04-28 | 1 | -17/+15 | |
| | | | | ok knfmt | |||||
* | remove unused code. | beck | 2023-04-28 | 1 | -82/+7 | |
| | ||||||
* | remove debugging printf | beck | 2023-04-28 | 1 | -2/+1 | |
| | ||||||
* | This test should not have V_EXPLICIT_POLICY set. with this | beck | 2023-04-28 | 1 | -3/+1 | |
| | | | | corrected we pass | |||||
* | Add the rest of the boringssl policy unit tests. | beck | 2023-04-28 | 1 | -4/+223 | |
| | | | | | We currently still fail two of these, looks like one more bug in extracting the depth for require policy from the certificate.. | |||||
* | correct test cases to add expected errors. | beck | 2023-04-27 | 1 | -2/+30 | |
| | ||||||
* | Start of an x509 policy regress test. test cases from BoringSSL. | beck | 2023-04-27 | 29 | -0/+801 | |
| | | | | | | Still a work in progress adapting tests from boringssl x509_test.cc but dropping in here for tb to be able to look at and run as well since the new stuff still has bugs. | |||||
* | tlsexttest: check additional logic in tlsext randomization | tb | 2023-04-27 | 1 | -1/+103 | |
| | | | | | | | This verifies that we put PSK always last and that the Apache 2 special does what it is supposed to do. There is also some weak validation of the Fisher-Yates shuffle that will likely catch errors introduced in tlsext_randomize_build_order() | |||||
* | Add test for invalidation of DER cache for X509_CRL_* setter functions | job | 2023-04-26 | 1 | -15/+171 | |
| | | | | | The program won't exit with a non-zero exit code if X509_CRL_set_* tests fail, as the relevant bits haven't been committed to libcrypto yet. | |||||
* | Clean up X509 memory before exit | job | 2023-04-26 | 1 | -1/+4 | |
| | ||||||
* | Add lookup name+function pointer table for improved diagnostics | job | 2023-04-26 | 1 | -4/+29 | |
| | | | | OK tb@ | |||||
* | Parameter names are not needed | job | 2023-04-26 | 1 | -4/+4 | |
| | ||||||
* | Remove unneeded parentheses | job | 2023-04-26 | 1 | -4/+4 | |
| | ||||||
* | No need to pass around const pointer cpder2 | job | 2023-04-26 | 1 | -18/+16 | |
| | | | | Suggested by tb@ | |||||
* | Shrink signature as cpder is only needed as local variable | job | 2023-04-26 | 1 | -14/+15 | |
| | | | | Suggested by tb@ |