summaryrefslogtreecommitdiff
path: root/src (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Provide TLSEXT_TYPE_* aliases for TLS 1.3.jsing2020-01-021-1/+10
| | | | | | | | | | | OpenSSL decided to use their own names for two of the TLS 1.3 extensions, rather than using the names given in the RFC. Provide aliases for these so that code written to work with OpenSSL also works with LibreSSL (otherwise everyone gets to provide their own workarounds). Issue noted by d3x0r on github. ok inoguchi@ tb@
* drand48(3) returns values in [0.0, 1.0).tb2019-12-201-3/+3
| | | | | | From j@bitminer.ca with input from Andras Farkas, deraadt, joerg@netbsd "fix however you feel best!" jmc
* spelling; from bryan stensonjmc2019-12-191-3/+3
|
* use "Currently" in the doc for "openssl enc" when talking about defaultsthen2019-12-181-2/+2
| | | | | md, to hint that it might not always be the case (e.g. if dealing with files from a different version of the tool). ok tb@
* In January, the default digest used in the openssl enc command wastb2019-12-181-7/+4
| | | | | | | | changed from md5 to sha256. Update manual to reflect that. From Fabio Scotoni ok jmc
* whitespace from go fmt + update a commenttb2019-12-141-4/+4
|
* Run Wycheproof HMAC test vectors against libcrypto.tb2019-12-141-1/+96
|
* Fix documented signatures of HMAC(3) and HMAC_Update(3). The n and lentb2019-12-141-4/+4
| | | | | arguments were changed from int to size_t with the import of OpenSSL 0.9.8h in 2008.
* The file passed to realpath(3) must exists, adjust man page to newbluhm2019-12-111-3/+3
| | | | | behavior. noticed by hshoexer@; OK beck@
* update to-do listtb2019-12-091-2/+1
|
* Run Wycheproof DSA P1363 test vectors against libcrypto.tb2019-12-091-19/+71
|
* Document X509_STORE_CTX_set_flags() which is a handy way to change theclaudio2019-12-051-3/+18
| | | | | | | verification param flags of a context. While this function is marked as likely to be deprecated in OpenSSL it seems that this may not happen. This is why we decided to still document it. OK and input from ingo@ tb@
* update to-do listtb2019-12-031-2/+2
|
* Run Wycheproof ECDSA P1363 test vectors against libcrypto.tb2019-12-031-8/+8
|
* Add an EcPoint variant and pass it to the ECDH test runner.tb2019-12-031-20/+31
|
* Annotate test vector files with an enum which we can then pass to thetb2019-12-031-27/+48
| | | | run*Test programs as needed.
* Add missing RCS tag.tb2019-12-031-0/+1
|
* Fix typo: ECHD -> ECDH.tb2019-12-031-4/+4
| | | | From Michael Forney, thanks!
* Run additional 3004 ECDH and 1575 ECDSA test vectors against libcrypto.tb2019-11-281-3/+12
| | | | For now, skip 96 ECDH tests for secp224k1.
* move the HKDF tests up a bittb2019-11-281-68/+68
|
* update to-do listtb2019-11-281-2/+1
|
* go fmttb2019-11-281-10/+10
|
* no need for fallthroughtb2019-11-281-19/+7
|
* Run HKDF test vectors against libcrypto.tb2019-11-281-1/+95
|
* Run XChaCha20-Poly1305 test vectors against libcrypto.tb2019-11-281-14/+43
|
* Add manual for openssl(1) cmsinoguchi2019-11-281-2/+518
| | | | ok and comments jmc@
* typotb2019-11-281-2/+2
|
* Add to do list.tb2019-11-271-1/+7
|
* Only run the test vectors from x25519_test.json for now.tb2019-11-271-2/+6
|
* RSASig now has the more specific name RSASSA-PKCS1-v1_5.tb2019-11-271-10/+14
|
* Only print the basename of skipped test files.tb2019-11-271-2/+3
|
* go fmttb2019-11-271-10/+9
|
* Run RSAES-PKCS1-v1_5 test vectors against libcrypto.tb2019-11-271-9/+104
|
* Make error messages look like other test cases.tb2019-11-271-4/+4
|
* Add glue for new RSA-OAEP tests.tb2019-11-271-2/+158
|
* Skip tests with unsupported signature algorithm SHA512/224 as well.tb2019-11-271-2/+2
|
* The DSA test vectors were split up and more tests were added.tb2019-11-271-2/+2
| | | | Enable them, as all of them pass.
* New failure mode for AES-CCM: "very long nonce".tb2019-11-271-2/+2
|
* Prepare update of wycheproof-testvectors. Skip some tests for thingstb2019-11-271-2/+10
| | | | | we don't support in LibreSSL and make sure we run as many tests as possible.
* Add support for TLS 1.3 post handshake messages and key updating.beck2019-11-263-20/+217
| | | | | | tested against openssl 1.1's server. ok jsing@ tb@
* Nuke trailing whitespace that is annoying before changing things in herebeck2019-11-261-6/+6
|
* gcc3, like clang and unlike our gcc4, doesn't support redirecting builtinsguenther2019-11-251-6/+12
| | | | | | | like mem{set,cpy,move} or __stack_smash_handler using asm() renaming. So treat gcc3 like clang and mark such functions as protected instead. ok ayoma@
* Add option for cms test in appstest.shinoguchi2019-11-251-2/+2
|
* Add test for cms operations in appstest.shinoguchi2019-11-241-2/+100
|
* Sync tests with current NetBSD. Enable t_mkfifo test.bluhm2019-11-226-27/+44
| | | | from Moritz Buhl
* A touch of style(9)tim2019-11-211-6/+6
| | | | OK tb@ tedu@
* Use explicit_bzero() to clear key materialtim2019-11-211-1/+2
| | | | OK tb@ tedu@
* Add accessors to change the buffer in a handshake message.beck2019-11-203-3/+20
| | | | | | Needed for doing TLS 1.3 Post Handshake Handshake messages. ok jsing@
* Add test for cms -keyopt in appstest.shinoguchi2019-11-201-2/+4
|
* Fix rsa key output formatinoguchi2019-11-201-5/+12
| | | | | | This fixes openssl(1) rsa -text output format ok tb@