aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--.github/workflows/coverity.yml97
-rw-r--r--.github/workflows/solaris.yml32
-rw-r--r--.github/workflows/solaris_test.yml28
-rw-r--r--.gitignore1
-rw-r--r--README.md1
-rw-r--r--crypto/CMakeLists.txt2
-rw-r--r--man/links2
-rw-r--r--tests/CMakeLists.txt5
-rw-r--r--tests/Makefile.am5
9 files changed, 92 insertions, 81 deletions
diff --git a/.github/workflows/coverity.yml b/.github/workflows/coverity.yml
index e1bfcb0..7b01aa4 100644
--- a/.github/workflows/coverity.yml
+++ b/.github/workflows/coverity.yml
@@ -1,48 +1,65 @@
1name: Coverity 1# GitHub Actions workflow to run Coverity scans.
2name: "Coverity"
2 3
3on: 4on:
4 workflow_dispatch: 5 workflow_dispatch:
5 schedule: 6 schedule:
6 - cron: "0 0 * * *" 7 - cron: "0 0 * * *" # At 00:00 daily.
7 8
8jobs: 9jobs:
9 scan: 10 scan:
10 runs-on: ubuntu-latest 11 name: "Scan"
11 if: ${{ github.repository_owner == 'libressl' }} 12 runs-on: "ubuntu-latest"
13 if: github.repository_owner == 'libressl' # Prevent running on forks
14 permissions:
15 contents: read
12 steps: 16 steps:
13 - uses: actions/checkout@main 17 - name: "Checkout repository"
14 - name: Install apt dependencies 18 uses: actions/checkout@v4
15 run: | 19
16 sudo apt-get update 20 - name: "Install dependencies"
17 sudo apt-get install -y cmake ninja-build 21 run: |
18 - name: Download Coverity build tool 22 sudo apt-get update
19 run: | 23 sudo apt-get install -y cmake ninja-build
20 wget -c -N https://scan.coverity.com/download/linux64 --post-data "token=${{ secrets.COVERITY_SCAN_TOKEN }}&project=libressl-portable%2Fportable" -O coverity_tool.tar.gz 24
21 mkdir coverity_tool 25 - name: "Download Coverity build tool"
22 tar xzf coverity_tool.tar.gz --strip 1 -C coverity_tool 26 env:
23 - name: Configure 27 PROJECT: "libressl-portable%2Fportable"
24 run: | 28 COVERITY_SCAN_TOKEN: "${{ secrets.COVERITY_SCAN_TOKEN }}"
25 ./autogen.sh 29 run: |
26 ./configure 30 wget -c -N https://scan.coverity.com/download/linux64 --post-data "token=$COVERITY_SCAN_TOKEN&project=$PROJECT" -O coverity_tool.tar.gz
27 make dist 31 mkdir coverity_tool
28 tar zxf libressl-*.tar.gz 32 tar xzf coverity_tool.tar.gz --strip 1 -C coverity_tool
29 rm libressl-*.tar.gz 33
30 cd libressl-* 34 - name: "Setup"
31 mkdir build-static 35 run: |
32 mkdir build-shared 36 ./autogen.sh
33 cmake -GNinja -DBUILD_SHARED_LIBS=ON .. 37 ./configure
34 - name: Build with Coverity build tool 38 make dist
35 run: | 39 tar zxf libressl-*.tar.gz
36 export PATH=`pwd`/coverity_tool/bin:$PATH 40 rm libressl-*.tar.gz
37 cd libressl-* 41 cd libressl-*
38 cov-build --dir cov-int ninja 42 mkdir build-static
39 - name: Submit build result to Coverity Scan 43 mkdir build-shared
40 run: | 44 cmake -GNinja -DBUILD_SHARED_LIBS=ON ..
41 cd libressl-* 45
42 tar czvf cov.tar.gz cov-int 46 - name: "Build with Coverity build tool"
43 curl --form token=${{ secrets.COVERITY_SCAN_TOKEN }} \ 47 run: |
44 --form email=libressl-security@openbsd.org \ 48 export PATH=`pwd`/coverity_tool/bin:$PATH
45 --form file=@cov.tar.gz \ 49 cd libressl-*
46 --form version="Commit $GITHUB_SHA" \ 50 cov-build --dir cov-int ninja
47 --form description="Build submitted via CI" \ 51
48 https://scan.coverity.com/builds?project=libressl-portable%2Fportable 52 - name: "Submit build result to Coverity Scan"
53 env:
54 EMAIL: "libressl-security@openbsd.org"
55 PROJECT: "libressl-portable%2Fportable"
56 COVERITY_SCAN_TOKEN: "${{ secrets.COVERITY_SCAN_TOKEN }}"
57 run: |
58 cd libressl-*
59 tar czvf cov.tar.gz cov-int
60 curl --form token=$COVERITY_SCAN_TOKEN \
61 --form email=$EMAIL \
62 --form file=@cov.tar.gz \
63 --form version="Commit $GITHUB_SHA" \
64 --form description="Build submitted via CI" \
65 https://scan.coverity.com/builds?project=$PROJECT
diff --git a/.github/workflows/solaris.yml b/.github/workflows/solaris.yml
new file mode 100644
index 0000000..2c6ee49
--- /dev/null
+++ b/.github/workflows/solaris.yml
@@ -0,0 +1,32 @@
1# GitHub Actions workflow to run tests on a Solaris VM.
2name: "Solaris"
3
4on:
5 workflow_dispatch:
6 schedule:
7 - cron: "0 0 * * *" # At 00:00 daily.
8
9jobs:
10 test:
11 name: "Solaris"
12 runs-on: ubuntu-latest
13 permissions:
14 contents: read
15 steps:
16 - name: "Checkout repository"
17 uses: actions/checkout@v4
18
19 - name: "Setup"
20 run: |
21 sudo apt-get update
22 sudo apt-get install -y automake autoconf libtool
23 ./autogen.sh
24
25 - name: "Build on VM"
26 uses: vmactions/solaris-vm@v1
27 with:
28 prepare: |
29 pkg install gcc make
30 run: |
31 MAKE=gmake ./configure
32 gmake -j2 check || (cat tests/test-suite.log && exit 1)
diff --git a/.github/workflows/solaris_test.yml b/.github/workflows/solaris_test.yml
deleted file mode 100644
index 6470278..0000000
--- a/.github/workflows/solaris_test.yml
+++ /dev/null
@@ -1,28 +0,0 @@
1name: solaris_ci
2
3on:
4 workflow_dispatch:
5
6jobs:
7 build-native:
8 strategy:
9 matrix:
10 release: [11.4]
11 runs-on: ubuntu-latest
12 continue-on-error: false
13 name: Solaris ${{ matrix.release }}
14 steps:
15 - name: Checkout source
16 uses: actions/checkout@main
17 - name: Configure source
18 run: |
19 brew install automake autoconf libtool
20 ./autogen.sh
21 - name: Build on VM
22 uses: vmactions/solaris-vm@v1
23 with:
24 prepare: |
25 pkg install gcc make
26 run: |
27 MAKE=gmake ./configure
28 gmake -j2 check || (cat tests/test-suite.log && exit 1)
diff --git a/.gitignore b/.gitignore
index bdae627..b061ae6 100644
--- a/.gitignore
+++ b/.gitignore
@@ -120,7 +120,6 @@ tests/ssl_methods*
120tests/ssl_set_alpn_protos* 120tests/ssl_set_alpn_protos*
121tests/ssl_verify_param* 121tests/ssl_verify_param*
122tests/ssl_versions* 122tests/ssl_versions*
123tests/string_table*
124tests/timingsafe* 123tests/timingsafe*
125tests/tls_ext_alpn* 124tests/tls_ext_alpn*
126tests/tls_prf* 125tests/tls_prf*
diff --git a/README.md b/README.md
index 009efd5..c623fe9 100644
--- a/README.md
+++ b/README.md
@@ -4,6 +4,7 @@
4[![Linux Build Status](https://github.com/libressl/portable/actions/workflows/linux.yml/badge.svg)](https://github.com/libressl/portable/actions/workflows/linux.yml) 4[![Linux Build Status](https://github.com/libressl/portable/actions/workflows/linux.yml/badge.svg)](https://github.com/libressl/portable/actions/workflows/linux.yml)
5[![macOS Build Status](https://github.com/libressl/portable/actions/workflows/macos.yml/badge.svg)](https://github.com/libressl/portable/actions/workflows/macos.yml) 5[![macOS Build Status](https://github.com/libressl/portable/actions/workflows/macos.yml/badge.svg)](https://github.com/libressl/portable/actions/workflows/macos.yml)
6[![Android Build Status](https://github.com/libressl/portable/actions/workflows/android.yml/badge.svg)](https://github.com/libressl/portable/actions/workflows/android.yml) 6[![Android Build Status](https://github.com/libressl/portable/actions/workflows/android.yml/badge.svg)](https://github.com/libressl/portable/actions/workflows/android.yml)
7[![Solaris Build Status](https://github.com/libressl/portable/actions/workflows/solaris.yml/badge.svg)](https://github.com/libressl/portable/actions/workflows/solaris.yml)
7[![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/libressl.svg)](https://bugs.chromium.org/p/oss-fuzz/issues/list?sort=-opened&can=1&q=proj:libressl) 8[![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/libressl.svg)](https://bugs.chromium.org/p/oss-fuzz/issues/list?sort=-opened&can=1&q=proj:libressl)
8 9
9LibreSSL is a fork of [OpenSSL](https://www.openssl.org) 1.0.1g developed by the 10LibreSSL is a fork of [OpenSSL](https://www.openssl.org) 1.0.1g developed by the
diff --git a/crypto/CMakeLists.txt b/crypto/CMakeLists.txt
index d545325..bf1e1c2 100644
--- a/crypto/CMakeLists.txt
+++ b/crypto/CMakeLists.txt
@@ -931,6 +931,8 @@ elseif(HOST_I386)
931 target_include_directories(crypto_obj PRIVATE bn/arch/i386/) 931 target_include_directories(crypto_obj PRIVATE bn/arch/i386/)
932elseif(HOST_MIPS64) 932elseif(HOST_MIPS64)
933 target_include_directories(crypto_obj PRIVATE bn/arch/mips64) 933 target_include_directories(crypto_obj PRIVATE bn/arch/mips64)
934elseif(HOST_MIPS)
935 target_include_directories(crypto_obj PRIVATE bn/arch/mips)
934elseif(HOST_POWERPC) 936elseif(HOST_POWERPC)
935 target_include_directories(crypto_obj PRIVATE bn/arch/powerpc) 937 target_include_directories(crypto_obj PRIVATE bn/arch/powerpc)
936elseif(HOST_POWERPC64) 938elseif(HOST_POWERPC64)
diff --git a/man/links b/man/links
index f5ea0cb..17f9087 100644
--- a/man/links
+++ b/man/links
@@ -29,8 +29,6 @@ ASN1_INTEGER_get.3,BN_to_ASN1_INTEGER.3
29ASN1_NULL_new.3,ASN1_NULL_free.3 29ASN1_NULL_new.3,ASN1_NULL_free.3
30ASN1_OBJECT_new.3,ASN1_OBJECT_create.3 30ASN1_OBJECT_new.3,ASN1_OBJECT_create.3
31ASN1_OBJECT_new.3,ASN1_OBJECT_free.3 31ASN1_OBJECT_new.3,ASN1_OBJECT_free.3
32ASN1_STRING_TABLE_add.3,ASN1_STRING_TABLE_cleanup.3
33ASN1_STRING_TABLE_add.3,ASN1_STRING_TABLE_get.3
34ASN1_STRING_length.3,ASN1_OCTET_STRING_cmp.3 32ASN1_STRING_length.3,ASN1_OCTET_STRING_cmp.3
35ASN1_STRING_length.3,ASN1_OCTET_STRING_dup.3 33ASN1_STRING_length.3,ASN1_OCTET_STRING_dup.3
36ASN1_STRING_length.3,ASN1_OCTET_STRING_set.3 34ASN1_STRING_length.3,ASN1_OCTET_STRING_set.3
diff --git a/tests/CMakeLists.txt b/tests/CMakeLists.txt
index aa00455..2beaa29 100644
--- a/tests/CMakeLists.txt
+++ b/tests/CMakeLists.txt
@@ -670,11 +670,6 @@ else()
670endif() 670endif()
671set_tests_properties(ssltest PROPERTIES ENVIRONMENT "srcdir=${TEST_SOURCE_DIR}") 671set_tests_properties(ssltest PROPERTIES ENVIRONMENT "srcdir=${TEST_SOURCE_DIR}")
672 672
673# string_table
674add_executable(string_table string_table.c)
675target_link_libraries(string_table ${OPENSSL_TEST_LIBS})
676add_test(string_table string_table)
677
678# testdsa 673# testdsa
679if(NOT MSVC) 674if(NOT MSVC)
680 add_test(NAME testdsa COMMAND ${CMAKE_CURRENT_SOURCE_DIR}/testdsa.sh) 675 add_test(NAME testdsa COMMAND ${CMAKE_CURRENT_SOURCE_DIR}/testdsa.sh)
diff --git a/tests/Makefile.am b/tests/Makefile.am
index 5d87bde..5ca0fe9 100644
--- a/tests/Makefile.am
+++ b/tests/Makefile.am
@@ -698,11 +698,6 @@ EXTRA_DIST += server2-ecdsa.pem server2-rsa-chain.pem server2-rsa.pem
698EXTRA_DIST += server3-ecdsa-chain.pem server3-ecdsa.pem server3-rsa-chain.pem 698EXTRA_DIST += server3-ecdsa-chain.pem server3-ecdsa.pem server3-rsa-chain.pem
699EXTRA_DIST += server3-rsa.pem 699EXTRA_DIST += server3-rsa.pem
700 700
701# string_table
702TESTS += string_table
703check_PROGRAMS += string_table
704string_table_SOURCES = string_table.c
705
706# testdsa 701# testdsa
707TESTS += testdsa.sh 702TESTS += testdsa.sh
708EXTRA_DIST += testdsa.sh testdsa.bat 703EXTRA_DIST += testdsa.sh testdsa.bat