summaryrefslogtreecommitdiff
path: root/src (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-12-15bump for LibreSSL 2.8.3libressl-v2.8.3OPENBSD_6_4bcook1-3/+3
2018-12-15Backport getentropy changes from deraadt@ on MAINbcook5-144/+27
Saw a mention somewhere a while back that the gotdata() function in here could creates non-uniformity since very short fetches of 0 would be excluded. blocks of 0 are just as random as any other data, including blocks of 4 4 4.. This is a misguided attempt to identify errors from the entropy churn/gather code doesn't make sense, errors don't happen. ok bcook
2018-11-17Implement coordinate blinding for EC_POINT as an additional mitigationtb10-18/+113
for the portsmash vulnerability. OpenBSD 6.4 errata 003
2018-10-07whitespace cleanup and other minor things from gofmttb1-44/+39
2018-10-06make sure all CStrings are freedtb1-3/+7
2018-10-06plug a memory leaktb1-1/+2
2018-10-06wrap a few more overlong linestb1-14/+36
2018-10-06wrap some overlong fmt.Printfstb1-53/+106
2018-10-06It's slightly simpler to get the ECDH public key as an EC_POINT by usingtb1-16/+15
EC_KEY_set_public_key_affine_coordinates() and EC_KEY_get0_public_key() than using EC_POINT_set_affine_coordinates_GFp() directly.
2018-10-06free EC_POINT and EC_GROUPtb1-1/+4
2018-10-06Run Wycheproof ECDH Web Crypto test vectors against libcrypto.tb1-6/+155
2018-10-06merge runECDSAWebCryptoTest() into runECDSATest()tb1-53/+31
2018-10-06factor ECDSA signature extraction into its own functiontb1-24/+35
2018-10-06make allocate/use/defer dances more consistent in ECDSA sig extractiontb1-9/+8
2018-10-05Run Wycheproof ECDSA Web Crypto test vectors against libcrypto.tb1-7/+166
2018-10-04Better refer to RFC 8422 which obsoletes RFC 4492.tb1-2/+2
2018-10-04While we don't explicitly support curve secp256r1, we can run 1250 teststb1-11/+2
against its ANSI equivalent prime256v1 (compare RFC 4492, Appendix A).
2018-10-04Plug TLS context leak in nc(1) server and client mode. Movebluhm1-12/+10
tls_free(3) directly after close(2) to catch all cases. based on a patch from Nan Xiao; OK tb@ deraadt@
2018-10-01As per POSIX, when str{,r}chr is comparing it should convert c to a char.martijn4-8/+10
The C implementation of str{,r}chr are not linked to the build, because assembly implementations are used, but change to code for easier reference. At least the i386 and amd64 are checked and seem to do the correct thing. Found thanks to the csh any/strchr change. minor pointers and OK millert@
2018-09-30in ECDH, gather statistics where it makes more sensetb1-8/+5
2018-09-30bump for LibreSSL 2.8.2bcook1-3/+3
2018-09-25-T applies to ip6 too, apparently;jmc1-4/+4
from nan xiao
2018-09-23bump for LibreSSL 2.8.1libressl-v2.8.1bcook1-3/+3
2018-09-22Add a comment on the acceptable RSASSA cases.tb1-2/+3
2018-09-22gather statistics in checkAead{Open,Seal}() as well.tb1-1/+7
2018-09-22remove some unneeded checkstb1-15/+5
2018-09-22gather and print some statistics on the acceptable cases we need totb1-8/+60
look into
2018-09-22more flags printingtb1-23/+23
2018-09-22improve logic involving acceptableAudittb1-5/+5
2018-09-22Swap order of "action" and "wt.Flags" in a few fmt.Printfs.tb1-17/+17
2018-09-22Introduce a couple of convenience targets to help with auditing thetb2-5/+41
acceptable cases.
2018-09-21Print the flags field in INFO: and FAIL: messages. It's helpful intb1-17/+17
identifying the important failures while auditing.
2018-09-18fix order of arguments in fmt.Printf()tb1-2/+2
2018-09-17Simplify initialization of asn1_cb; use correct spelling of NULL.tb1-4/+2
2018-09-17Move tally mark printing out of the main benchmark loop; ok tb@cheloha1-14/+21
2018-09-16add missing default case to switchtb1-1/+3
2018-09-16EVP_aead_chacha20_poly1305() can't actually fail.tb1-4/+1
2018-09-16Rename *AesCcmOrGcm* into the slightly less ugly *AesAead*.tb1-9/+9
2018-09-15another typo. time to sleeptb1-2/+2
2018-09-15typostb1-3/+3
2018-09-15add a brief comment on the acceptable AES CCM and AES GCM casestb1-2/+8
2018-09-15Also exercise EVP_aead_aes_128_gcm() and EVP_aead_aes_256_gcm().tb1-6/+26
2018-09-15rename checkChaCha20Poly1305{Open,Seal}() into checkAead{Open,Seal}().tb1-5/+5
2018-09-15Merge AES CCM, AES GCM and ChaCha20 data structures intotb1-42/+21
single AEAD types. Will be used in upcoming commits.
2018-09-15Add missing conversion specifiertb1-2/+2
2018-09-15Modify regress appstest.sh for interoperability testing with OpenSSL 1.1.xinoguchi1-16/+40
- add sleep before s_client instead of removing -pause option - change check words for s_client output messages - replace CAfile to CApath for s_time - remove -prexit from s_client - confirm openssl command path is executable
2018-09-14Add interoperability test mode for regress appstest.shinoguchi1-35/+79
- test s_server and s_client between different version by option -i - indicate other version by defining OTHER_OPENSSL environment variable - fix "SSL/TLS" to "TLS/SSL", since TLS is correct as technical term - s/SKIPPNG/SKIPPING/
2018-09-12sync with mozilla-release (one removal, TURKTRUST, more details atsthen1-48/+1
https://bugzilla.mozilla.org/show_bug.cgi?id=1439127) ok danj guenther millert
2018-09-12tweak previous;jmc2-4/+4
2018-09-12crank to follow minor crank in libcrypto; ok tb@ jsing@djm2-2/+2