Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Plug leak coming from debug leftover | tb | 2024-12-17 | 2 | -4/+2 | |
| | | | | There's still CBS holding data in here. Yuck. | |||||
* | Stop reaching into libcrypto/bytestring | tb | 2024-12-14 | 1 | -2/+1 | |
| | ||||||
* | Normalize top of files | tb | 2024-12-14 | 15 | -109/+138 | |
| | | | | RCS marker, KNF for comment, fix and sort includes as usual. | |||||
* | Add ML-KEM 1024 from BoringSSL | beck | 2024-12-13 | 13 | -3/+5262 | |
| | | | | | | | | | | | | | | | Changes include conversion from C++, basic KNF, then adaptation to use our sha3 functions for sha3 and shake instead of the BorinSSL version. This Adds units tests to run against BoringSSL and NIST test vectors. The future public API is the same as Boring's - but is not yet exposed pending making bytestring.h public (which will happen separately) and a minor bump Currently this will just ensure we build and run regress. ok tb@ to get it into the tree and massage from there. | |||||
* | Add ML-KEM 768 from BoringSSL | beck | 2024-12-13 | 16 | -1/+5426 | |
| | | | | | | | | | | | | | | | Changes include conversion from C++, basic KNF, then adaptation to use our sha3 functions for sha3 and shake instead of the BorinSSL version. This Adds units tests to run against BoringSSL and NIST test vectors. The future public API is the same as Boring's - but is not yet exposed pending making bytesring.h public (which will happen separately) and a minor bump Currently this will just ensure we build and run regress. ok tb@ to get it into the tree and massage from there. | |||||
* | Add regress coverage for tls_peer_cert_common_name() | tb | 2024-12-10 | 2 | -0/+17 | |
| | ||||||
* | Mark four "struct *_st" types declared in evp.h as intentionally undocumented | schwarze | 2024-12-09 | 1 | -0/+2 | |
| | | | | | because they are intended as internal, and applications are supposed to use the documented aliases DH, DSA, EC_KEY, and RSA from ossl_typ.h instead. | |||||
* | Mark four EVP_PKEY_GOST* constants as intentionally undocumented | schwarze | 2024-12-09 | 1 | -0/+2 | |
| | | | | because they are completely unused by anything. | |||||
* | Mark two symbols as intentionally undocumented | schwarze | 2024-12-09 | 1 | -1/+3 | |
| | | | | that are obsolete after PBE was mostly removed from LibreSSL. | |||||
* | Mark four EVP control constants as intentionally undocumented | schwarze | 2024-12-09 | 1 | -2/+3 | |
| | | | | that are only used for GOST. | |||||
* | Mark EVP_CTRL constants for RC5 as intentionally undocumented | schwarze | 2024-12-09 | 1 | -0/+1 | |
| | | | | | because LibreSSL does not support RC5 and because these constants are almost unused in the wild. | |||||
* | Mark three EVP_PKEY control constants for CMS as intentionally undocumented | schwarze | 2024-12-05 | 1 | -0/+2 | |
| | | | | that are internal to the library and unused in the wild | |||||
* | mark three more EVP_PKEY control constants as intentionally undocumented | schwarze | 2024-12-05 | 1 | -0/+3 | |
| | | | | that are only intended for internal use and unused in the wild | |||||
* | ignore DECLARE_PKCS12_STACK_OF such that pkcs12.h can be parsed | schwarze | 2024-12-05 | 1 | -0/+1 | |
| | ||||||
* | Mark six EVP_PKEY control constants as intentionally undocumented | schwarze | 2024-11-29 | 1 | -0/+4 | |
| | | | | | that are only intended for internal use, do very little (only validity checking), are unused in the wild, and marked obsolete in OpenSSL 3. | |||||
* | Mark nine unused EVP constants as intentionally undocumented. | schwarze | 2024-11-29 | 1 | -5/+10 | |
| | | | | Fix related indentation while here. | |||||
* | Disable regression tests for small builtin curves | tb | 2024-11-24 | 4 | -5/+29 | |
| | ||||||
* | Add regress coverage for the size_t constant time comparisions. | jsing | 2024-11-08 | 1 | -26/+120 | |
| | ||||||
* | ec_asn1_test: remove extra parens | tb | 2024-11-08 | 1 | -4/+4 | |
| | ||||||
* | bn_convert: avoid a zero-sized allocation | tb | 2024-11-05 | 1 | -2/+2 | |
| | ||||||
* | ec_asn1_test: remove debug leftover that broke the build on Windows | tb | 2024-11-05 | 1 | -3/+1 | |
| | ||||||
* | ec tests: allow linking against eopenssl | tb | 2024-11-04 | 2 | -3/+16 | |
| | ||||||
* | Add regress coverage for BN_bn2binpad() and BN_bn2lebinpad(). | jsing | 2024-11-03 | 1 | -3/+137 | |
| | ||||||
* | Add some additional BN conversion test cases. | jsing | 2024-11-03 | 1 | -3/+21 | |
| | ||||||
* | ec_asn1_test: I somehow managed to commit the version without freezero... | tb | 2024-11-02 | 1 | -3/+4 | |
| | ||||||
* | ec_asn1_test: set compressed coordinates for the "simple" generator | tb | 2024-11-01 | 1 | -3/+3 | |
| | ||||||
* | Also exercise the "simple" version of the builtin curves, not only "mont" | tb | 2024-11-01 | 1 | -27/+124 | |
| | ||||||
* | Split ec_key_test_point_encoding() into chunks of saner size | tb | 2024-10-29 | 1 | -49/+172 | |
| | ||||||
* | ec_asn1_test: point doubling is fine, the leak is elsewhere | tb | 2024-10-29 | 1 | -3/+1 | |
| | | | | (will be fixed shortly). | |||||
* | Disable point doubling for now, it leaks due to a doc bug. | tb | 2024-10-29 | 1 | -1/+3 | |
| | | | | | Can't replace it with adding the point to itself since that also leaks (another doc bug). Who would've thought. | |||||
* | unifdef -m -DCORRECT_PRIV_KEY_PADDING=1 ec_asn1_test.c | tb | 2024-10-28 | 1 | -9/+1 | |
| | ||||||
* | Enable the tests that depend on correct private key padding | tb | 2024-10-28 | 1 | -2/+2 | |
| | ||||||
* | c2sp: run test against openssl/3.4 if it is installed | tb | 2024-10-28 | 1 | -2/+2 | |
| | ||||||
* | {d2i,i2d}_ECParameters() also want a bit of exercising | tb | 2024-10-26 | 1 | -1/+28 | |
| | ||||||
* | ec_asn1_test: play some silly games to cover a few more code paths | tb | 2024-10-26 | 1 | -1/+47 | |
| | ||||||
* | Add regress coverage for ec_print.c | tb | 2024-10-26 | 1 | -2/+889 | |
| | | | | | | | | | | | | | | | | | Of course the four stunning beauties in there aren't printing anything. the hex family converts an elliptic curve point's X9.62 encoding into a hex string (which kind of makes sense, you can print that if you want). Much more astounding is EC_POINT_point2bn() where the X9.62 octet string is interpreted as a BIGNUM. Yes, the bignum's hex digits are the point conversion form followed by the affine coordinate(s) of the elliptic curve point, and yes you can choose between compressed, uncompressed, and hybrid encoding, why do you ask? This doesn't really make any sense whatsoever but of course you can also print that if you really want to. Of course the beloved platinum members of the "gotta try every terrible OpenSSL interface" club had to use and expose this. | |||||
* | Use macros describing the intent rather than #if 0 | tb | 2024-10-25 | 1 | -8/+38 | |
| | ||||||
* | Add regress for {d2i,i2d}_ECPrivateKey() and {o2i,i2o}_ECPublicKey() | tb | 2024-10-25 | 1 | -1/+1003 | |
| | | | | Some test cases are disabled since they exercise an upcoming bug fix. | |||||
* | ec_point_conversion: cosmetics | tb | 2024-10-23 | 1 | -4/+4 | |
| | ||||||
* | ec_point_conversion: extend test coverage by translating back the | tb | 2024-10-23 | 1 | -2/+76 | |
| | | | | | | point to an octet string and match with the initial octet string. would have caught the regression found by anton | |||||
* | Suppress warning noise from deprecated OpenSSL API | tb | 2024-10-22 | 1 | -1/+2 | |
| | ||||||
* | ec_asn1_test: simplify previous | tb | 2024-10-18 | 1 | -7/+4 | |
| | ||||||
* | ec_asn1_test: call EC_GROUP_check() for the builtin curves | tb | 2024-10-18 | 2 | -59/+13 | |
| | | | | | This makes the internal curve test in ectest.c superfluous. Also fix a logic error. | |||||
* | ec_asn1_test: adjust for rejection of non-builtin curve parameters | tb | 2024-10-18 | 1 | -14/+2 | |
| | ||||||
* | ec_asn1_test: add secp256k1.m | tb | 2024-10-18 | 1 | -10/+81 | |
| | ||||||
* | ec_asn1_test: remove last hardcoded wei25519 remnant | tb | 2024-10-18 | 1 | -4/+3 | |
| | ||||||
* | ec_asn1_test: test Wei25519.2 and Wei25519.-3 as well | tb | 2024-10-18 | 1 | -37/+163 | |
| | | | | Covers a few more corner cases in the elliptic curve code. | |||||
* | ec_asn1_test: clean up & refactor; test Wei25519 with simple method | tb | 2024-10-18 | 1 | -109/+189 | |
| | ||||||
* | EC ASN.1: add reminder that the simple method might also want testing | tb | 2024-10-16 | 1 | -1/+5 | |
| | ||||||
* | Implement Wei25519 to exercise some more elliptic curve code | tb | 2024-10-16 | 1 | -1/+284 | |
| | | | | | | | | This provides a non-trivial non-builtin curve that is unlikely to ever become a builtin curve. This exercises the cofactor guessing code and and ensures that things work as far as they can with a custom OID. The main reason for adding it is to have a "real-world" example for an upcoming check that EC parameters represent a builtin curve. |