summaryrefslogtreecommitdiff
path: root/regress/lib/libcrypto
AgeCommit message (Collapse)Author
2017-01-25link in rsa testBob Beck
2017-01-25Add rsa test from openssl, since it has a license nowBob Beck
2017-01-21Make explicit _ct and _nonct versions of bn_mod_exp funcitons thatBob Beck
matter for constant time, and make the public interface only used external to the library. This moves us to a model where the important things are constant time versions unless you ask for them not to be, rather than the opposite. I'll continue with this method by method. Add regress tests for same. ok jsing@
2017-01-18unhook ocsp test from the default since it currently requires network access andBob Beck
therefore appears to break in bluhm's test setup
2016-12-21Update libcrypto regress to handle header and non-exported symbol changes.Joel Sing
2016-11-05Add regress for X25519, converted from BoringSSL.Joel Sing
2016-11-05Set PROG so that the binary correctly gets recompiled when the librariesMiod Vallat
it is linked against change. ok beck@ jsing@
2016-11-04Move pqueue regress from libcrypto to libssl, since that's where the pqueueJoel Sing
code now lives. Also unbreak the regress following the symbol hiding changes in libssl.
2016-09-03import new BN tests from OpenSSLBrent Cook
New tests that various BIGNUM methods behave correctly on zero/even inputs. from OpenSSL ok beck@
2016-09-02Make this regress build againBob Beck
2016-07-07add ca cert error check and make the path configurableBrent Cook
from Kinichiro Inoguchi
2016-07-05remove extra assignment of s from 1.11, fix regression testBrent Cook
2016-07-05On systems where we do not have BN_ULLONG defined (most 64-bit systems),Brent Cook
BN_mod_word() can return incorrect results if the supplied modulus is too big, so we need to fall back to BN_div_word. Now that BN_mod_word may fail, handle errors properly update the man page. Thanks to Brian Smith for pointing out these fixes from BoringSSL: https://boringssl.googlesource.com/boringssl/+/67cb49d045f04973ddba0f92fe8a8ad483c7da89 https://boringssl.googlesource.com/boringssl/+/44bedc348d9491e63c7ed1438db100a4b8a830be ok beck@
2016-07-05make less awful.. test against cloudflare tooBob Beck
2016-07-04Add a nasty little ocsp regress test in the hope pedants will make it better.Bob Beck
2016-06-30Remove flags for disabling constant-time operations.Brent Cook
This removes support for DSA_FLAG_NO_EXP_CONSTTIME, DH_FLAG_NO_EXP_CONSTTIME, and RSA_FLAG_NO_CONSTTIME flags, making all of these operations unconditionally constant-time. Based on the original patch by César Pereid. ok beck@
2016-05-30Gix misleading indent pointed out by GCC 6.1.Brent Cook
ok beck@ jsing@
2016-04-28Update AEAD regress to match EVP_aead_chacha20_poly1305() changes.Joel Sing
2016-04-13After opening an AEAD, ensure that the decrypted output matches theJoel Sing
plaintext for the regress test case.
2016-03-13check return value for BN_hex2bn in regression testsBrent Cook
2015-12-28initialize pointer to avoid undefined free on failureBrent Cook
ok beck@
2015-11-02Add EVP_aead_chacha20_poly1305_ietf() - The informational RFC 7539,Reyk Floeter
"ChaCha20 and Poly1305 for IETF Protocols", introduced a modified AEAD construction that is incompatible with the common style that has been already used in TLS with EVP_aead_chacha20_poly1305(). The IETF version also adds a constant (salt) that is prepended to the nonce. OK mikeb@ jsing@
2015-10-30print unsigned ints with %u, not %d. Reported by Pascal Cuoq.Miod Vallat
2015-10-30Add explicit LL suffixes to the numerical constants which do not fit in 32 bits.Miod Vallat
2015-10-30Pull in <sys/types.h> to get ssize_t or <stdint.h> to get uint32_t, instead ofMiod Vallat
relying upon previously included headers to do this, to enhance portability; from Pascal Cuoq, libressl github pull request #52
2015-10-25Missing initializer; spotted by coverity.Miod Vallat
2015-10-22Extend tests to call ASN1_{GENERALIZED,UTC,}TIME_set_string() with a NULLJoel Sing
pointer - because, you know, you might want to set a string on a NULL object. The previous implementation apparently allowed this as a way of testing if the string was valid... probably because the *_check() functions are only useable after the string has already been set.
2015-10-22Fix case where we wanted to test ASN1_TIME_set_string() but were testingJoel Sing
ASN1_UTCTIME_set_string() twice instead.
2015-10-22Fix case where we wanted to test ASN1_TIME_set_string() but were testingJoel Sing
ASN1_UTCTIME_set_string() twice instead.
2015-10-19Change regress to not believe legacy times are validBob Beck
2015-10-02Add another invalid time, which is currently accepted.Joel Sing
2015-09-30Fix a bug in the regress, and be much more pedantic about what is allowedBob Beck
per RFC 5380 in an X509. RFC 5280 states that all times before 2050 must be specified as a UTCtime, not a Generalized time, and all times after must be a UTC time. By extension this also means the smallest time allowed per RFC 5280 is 500101000000Z and the largest is 99991231235959Z..
2015-09-29Add an rfc5280 test suite to test x509_cmp_time.Bob Beck
Note some of these will yet fail with the current libcrypto as the current X509_cmp_time is not RFC5280 compliant ok jsing@
2015-09-29Fix sha2 regression test for libcrypto.Doug Hogan
By default, "openssl sha" used SHA-0. However, it was possible to use the form "openssl sha -sha256" to run SHA-256 instead. The regression test used this form. Since we removed SHA-0 support, the regress tests should now call "openssl <digest>". ok guenther@, bcook@
2015-09-25Add DER encoding/decoding coverage for ASN.1 GENERALIZEDTIME and UTCTIME.Joel Sing
2015-09-25Add initial regress tests for ASN.1 times.Joel Sing
2015-09-14Temporarily revive MD4 for MS CHAP support.Doug Hogan
2015-09-13Remove MD4 support from LibreSSL.Doug Hogan
MD4 should have been removed a long time ago. Also, RFC 6150 moved it to historic in 2011. Rides the major crank from removing SHA-0. Discussed with many including beck@, millert@, djm@, sthen@ ok jsing@, input + ok bcook@
2015-09-13Another style(9) grenade.Joel Sing
2015-09-13Remove SHA-0 support.Doug Hogan
SHA-0 was withdrawn shortly after publication 20 years ago and replaced with SHA-1. This will require a major crank. ok bcook@, jsing@
2015-09-13Remove explicit NULL checks before *_free() calls and tidy some code.Joel Sing
2015-09-13Use ECDH_size() and do some other clean up.Joel Sing
2015-09-13remove e_os2.h includesBrent Cook
ok jsing@
2015-09-13Wrap long lines.Joel Sing
2015-09-13style(9) grenade.Joel Sing
2015-09-12Cleanup enginetest a bit.Brent Cook
It was the only thing preventing -Werror from building on some systems due to the unchecked asprintf's.
2015-07-18remove mysterious, decorative comment blockletsBrent Cook
2015-07-18Explicitly mark ignored BN_* return vals in tests.Brent Cook
The tests will fail all the same. Fixes Coverity 78811 21659 21658 21657. Discussed with beck@
2015-07-18check sscanf conversion, fixes Coverity 21666Brent Cook
ok doug@, miod@, guenther@
2015-06-20Remove obsolete MDC-2DES from libcrypto.Doug Hogan
ok deraadt@ jsing@ miod@