summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Replace macros with functionsjob2023-04-261-99/+115
| | | | Requested by tb@
* Some more EC2M cleanuptb2023-04-262-48/+4
|
* Garbage collect test using the nseq commandtb2023-04-261-7/+1
| | | | reminded by anton
* Rename dercache regress test to x509_asn1job2023-04-262-5/+5
| | | | Requested by jsing@
* Add regress test for invalidation of DER cache in select X509 setter functionsjob2023-04-252-2/+200
|
* bio_asn1: adjust for more recent churntb2023-04-252-2/+6
|
* Remove a couple of temporary hackstb2023-04-252-17/+2
|
* Update Wycheproof.go to exercise truncated SHA-2 and SHA-3tb2023-04-251-5/+27
|
* bn_mod_exp: temporarily add a prototype for BN_mod_exp_recp()tb2023-04-251-1/+4
|
* bn_test: temporarily add prototypes for reciprocal functionstb2023-04-251-1/+13
| | | | This is a hack needed until bn_local.h is updated
* bn_test: BN_one() will become void, so stop checking ittb2023-04-251-8/+8
|
* bn_primes: the NIST primes will go away, so remove their teststb2023-04-251-41/+1
|
* The bio_asn1 test will need to be linked statically after the bumptb2023-04-251-1/+3
|
* Remove CTS testtb2023-04-252-179/+0
|
* CTS support will go away, so unhook corresponding regresstb2023-04-251-2/+1
|
* Fix the client test and the tlsext test to work with randomizedtb2023-04-233-4/+21
| | | | | TLS extensions (this involves unrandomizing the extension order for the tests that rely on golden numbers.
* Link c2sp test to buildtb2023-04-231-1/+2
|
* Import C2SP/CCTV testtb2023-04-232-0/+247
| | | | | | | | | | | | | This currently only covers Ed25519 using the c2sp-testvectors package and checks that our Ed25519 implementation behaves as expected from a "ref10" implementation. This test has Go and c2sp-testvectors as a hard dependency. It will optionally pick up any OpenSSL package installed on the system and test that as well. https://github.com/C2SP/CCTV https://github.com/C2SP/CCTV/tree/main/ed25519
* Provide initial regress for BN_{asc,dec,hex}2bn()/BN_bn2{dec,hex}()jsing2023-04-222-1/+592
|
* Exercise d2i_IPAddrBlocks() and X509v3_addr_subset() a little bittb2023-04-201-9/+34
|
* interop: work around extreme REGRESS_SKIP_SLOW slownesstb2023-04-193-8/+31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | A few years back beck introduced REGRESS_SKIP_SLOW dances with the idea that this should speed up the interop tests for us devs because this also checked interop between opensslX and opensslY, which we don't particularly care about. This never really worked. On a mac m1 mini the result is this: REGRESS_SKIP_SLOW unset 9m56.69s real 3m42.24s user 3m00.70s system REGRESS_SKIP_SLOW=yes 11m04.61s real 7m29.61s user 1m40.29s system The problem is that REGRESS_SKIP_SLOW simply wasn't designed to handle the huge number of tests we have here. There are many nested .for loops resulting in several thousand tests. Each test has a name of length ~80. REGRESS_SKIP_SLOW concatenates them into a several hundred kilobytes long string in REGRESS_SKIP_TARGETS, iterates over all regress targets and tests with ".if ${REGRESS_SKIP_TARGETS:M${RT}}" if it should skip them. This means that during a regress run, make spends a lot of time linearly scanning a huge string. I ran into this when I added OpenSSL 3.0 tests to the already existing 1.0.2 and 1.1 tests with the result that with REGRESS_SLOW_TARGTS set it took the better part of an hour while without it it took about 15 min. The hack here is simply to avoid using REGRESS_SLOW_TARGTES here and handle the situation differently. patch, REGRESS_SKIP_SLOW=yes 5m42.32s real 2m09.98s user 1m45.21s system The real solution would be to fix this in bsd.regress.mk, which someone who understands make well is very welcome to do. For now, I'm happy with this. Debugged with jsing a few months ago
* remove duplicate includesjsg2023-04-191-2/+1
|
* ectest: Remove #if 1tb2023-04-181-3/+1
|
* Unifdef OPENSSL_NO_EC_NISTP_64_GCC_128tb2023-04-181-203/+1
|
* ectest: drop a broken #if 0 /* optional */ piece of codetb2023-04-181-20/+5
| | | | | This places a point at infinity and then fails. Fix some wacky indentation in the vicinity.
* ec_point_conversion: drop test for sect571k1tb2023-04-181-350/+2
| | | | Maybe it should be replaced by another test, although P-256 seems enough.
* ectest: drop some gross unused macrostb2023-04-181-49/+1
|
* ectest: unifdef OPENSSL_NO_EC2Mtb2023-04-181-418/+1
|
* Skip binary curves in ec_point_conversiontb2023-04-171-3/+14
|
* Switch all ec tests to using dynamic linkingtb2023-04-173-8/+14
| | | | | This only requires very minor changes and simplifies testing quite a bit. Some of the changes can be undone after the next bump.
* Simplify Makefiletb2023-04-171-12/+1
|
* Drop GF2m teststb2023-04-171-647/+1
| | | | The code they test will go away soon.
* Allow overriding the bc implementation used in run-bctb2023-04-171-2/+7
| | | | | | | | | | | | While base bc is great, it uses libcrypto's BIGNUM implementation. This implies that the independent verification of the bn_test isn't as independent as it should be. With this commit, run-bc picks up bn-gh if it is installed. This appears to work on amd64, arm64 and sparc64 (where gbc is busted). I will send PRs to the regress maintainers once I will have tested this a bit more thoroughly. Committing this early since I juggle way too many diffs already.
* Fix typotb2023-04-171-2/+2
|
* Skip sect* curve checkstb2023-04-171-2/+2
| | | | | GF2m curves will go away soon. This reduces the pile of diffs in my jungle a tiny little bit.
* ec_point_conversion: do not rely on ec.h pulling in bn.htb2023-04-151-1/+2
|
* ssltest: Drop more policy go from this test.tb2023-04-151-357/+21
| | | | Hopefully that is all. What an absolutely horrid mess.
* ssltest: initial pass of dropping proxy cert gootb2023-04-151-89/+1
|
* symbols test: drop LIBRESSL_INTERNALtb2023-04-151-2/+1
| | | | | | This tests the external API, so it should not have visibility to the inside. Silences two warnings since EC_{GROUP,POINT}_clear_free() are now wrapped in #ifndef LIBRESSL_INTERNAL.
* cttest: plug leak due to missing SCT_LIST_free()tb2023-04-141-1/+2
|
* Plug a memleak caused by an extra bump of a refcounttb2023-04-141-2/+1
| | | | SSL_set_session() should really be called SSL_set1_session()...
* Cast the uint64_t SCT timestamps to (unsigned long long) for printing.tb2023-04-141-3/+4
| | | | What a wonderful choice between this and that PRI ugliness...
* Make the signertest work better with the portable test frameworktb2023-04-142-14/+12
|
* Make the apitest work better with the portable tets frameworktb2023-04-142-13/+12
|
* Make cttest work better with the portable test harnesstb2023-04-142-9/+12
|
* Fix cttest to use public headertb2023-04-142-5/+3
|
* Fix compilation on sparc64.mbuhl2023-04-131-2/+3
|
* ectest: missing error checkingtb2023-04-131-5/+11
| | | | CID 452228
* bn_mod_sqrt: remove no longer necessary complications due to thetb2023-04-111-15/+5
| | | | non-deterministic nature of the old implementation.
* Correct benchmark result computation on 32 bit platforms.jsing2023-04-112-4/+4
|