1
0
mirror of https://github.com/openbsd/src.git synced 2024-12-21 23:18:00 -08:00
Commit Graph

8678 Commits

Author SHA1 Message Date
anton
d6933ec7e0 Replace poor man's synchronization primitive (i.e. sleep) with a wait
until construct in the hopes of making these tests less flaky.
2024-12-21 07:49:03 +00:00
tb
c7c5643a71 mlkem regress: garbage collect two global variables 2024-12-20 15:47:26 +00:00
tb
6f65ec34f2 Fix whitespace in Makefile 2024-12-20 01:53:46 +00:00
tb
f3c21583ac That works better with a G 2024-12-20 01:51:27 +00:00
tb
e9751d5483 cant't -> can't
(the mystery of spotting typos right after commit strikes again)
2024-12-20 00:32:15 +00:00
tb
8889493e35 Rework and fix the mlkem tests
Make proper use of CBB and CBS. If a CBS ever owns data, you're holding
it wrong. Ditch gross macros, sscanf, and globals. The use of fgets is
annoying here, so replace it with getline, which be provided by portable
if needed.

Most importantly, make the tests actually signal failure rather than
only printing an error. Fix the state machines in a few of them. Some
tests didn't parse the .txt file at all. Others mostly did but didn't
actually test what they were supposed to be testing. Such failures
were hidden by the way the tests were written.

This basically needed a complete revamp. It still isn't pretty and much
of it could be deduplicated, but I only have so much time alotted on this
blue planet.
2024-12-20 00:07:12 +00:00
tb
d65e817093 mlkem regress: reach around into bytestring again 2024-12-19 23:45:09 +00:00
tb
95be67e7d5 Close fp before exit since we clean up other stuff
From Kenjiro Nakayama
2024-12-17 07:20:10 +00:00
tb
c07f1519ba Plug leak coming from debug leftover
There's still CBS holding data in here. Yuck.
2024-12-17 07:19:10 +00:00
tb
7266ec7026 Stop reaching into libcrypto/bytestring 2024-12-14 19:19:38 +00:00
tb
d4ed7533f1 Normalize top of files
RCS marker, KNF for comment, fix and sort includes as usual.
2024-12-14 19:16:24 +00:00
beck
08c63c712f Add ML-KEM 1024 from BoringSSL
Changes include conversion from C++, basic KNF, then adaptation to
use our sha3 functions for sha3 and shake instead of the BorinSSL
version. This Adds units tests to run against BoringSSL and NIST test
vectors.

The future public API is the same as Boring's - but is not yet exposed
pending making bytestring.h public (which will happen separately) and
a minor bump

Currently this will just ensure we build and run regress.

ok tb@ to get it into the tree and massage from there.
2024-12-13 00:17:17 +00:00
beck
75c083a031 Add ML-KEM 768 from BoringSSL
Changes include conversion from C++, basic KNF, then adaptation to
use our sha3 functions for sha3 and shake instead of the BorinSSL
version. This Adds units tests to run against BoringSSL and NIST test
vectors.

The future public API is the same as Boring's - but is not yet exposed
pending making bytesring.h public (which will happen separately) and
a minor bump

Currently this will just ensure we build and run regress.

ok tb@ to get it into the tree and massage from there.
2024-12-13 00:03:57 +00:00
anton
ced57b23db Cope with recent changes to sed "c" command. 2024-12-12 08:02:48 +00:00
tb
7f9db3f573 Add regress coverage for tls_peer_cert_common_name() 2024-12-10 08:43:17 +00:00
schwarze
33885c3251 Mark four "struct *_st" types declared in evp.h as intentionally undocumented
because they are intended as internal, and applications are supposed to use
the documented aliases DH, DSA, EC_KEY, and RSA from ossl_typ.h instead.
2024-12-09 12:45:21 +00:00
schwarze
9fcb7baee2 Mark four EVP_PKEY_GOST* constants as intentionally undocumented
because they are completely unused by anything.
2024-12-09 12:30:23 +00:00
schwarze
6b76ac2e55 Mark two symbols as intentionally undocumented
that are obsolete after PBE was mostly removed from LibreSSL.
2024-12-09 12:18:38 +00:00
schwarze
1b6b588e81 Mark four EVP control constants as intentionally undocumented
that are only used for GOST.
2024-12-09 11:41:44 +00:00
claudio
03bc5c0e77 Extend maxattr regress to also check RFC8654 extended messages. 2024-12-09 10:53:54 +00:00
schwarze
aea0cfdd31 Mark EVP_CTRL constants for RC5 as intentionally undocumented
because LibreSSL does not support RC5 and because these constants
are almost unused in the wild.
2024-12-09 10:50:43 +00:00
djm
e6fc4d34cb use glob(3) wildcards in AuthorizedKeys/PrincipalsFile tests to
exercise this feature; ok dtucker
2024-12-06 16:25:58 +00:00
djm
eb7387f660 implement attestation verification for ED25519 keys 2024-12-06 10:37:42 +00:00
dtucker
f6b912702f Expand $SSH to absolute path if it's not already. Prevents problem
later in increase_datafile_size if ssh is not in the path.  Patch from
quaresmajose via GHPR#510.
2024-12-06 07:05:54 +00:00
dtucker
c9baf54040 Add key expiry test in the 64bit time_t range for additional coverage.
From Alexander Kanavin via bz#3684.
2024-12-05 14:28:39 +00:00
schwarze
10e3f8f482 Mark three EVP_PKEY control constants for CMS as intentionally undocumented
that are internal to the library and unused in the wild
2024-12-05 14:01:59 +00:00
schwarze
226533405b mark three more EVP_PKEY control constants as intentionally undocumented
that are only intended for internal use and unused in the wild
2024-12-05 10:58:12 +00:00
schwarze
ca8f98200d ignore DECLARE_PKCS12_STACK_OF such that pkcs12.h can be parsed 2024-12-05 10:52:45 +00:00
djm
a8b9d72961 add a work-in-progress tool to verify FIDO attestation blobs
that ssh-keygen can write when enrolling FIDO keys.
2024-12-04 16:42:49 +00:00
dtucker
960594bd76 Don't assume existence of SK provider in test.
Patch from balu.gajjala at gmail via bz#3402.
2024-12-04 10:51:13 +00:00
mpi
2896583250 Regression for multiple probes. 2024-12-04 09:35:21 +00:00
mpi
ffce2a5431 Disallows registering multiple probes of the same type.
If a bt(5) script uses the same probe multiple times (like interval:hz),
btrace(8) has currently no knowledge of which rule to execute when it
parses events read from the kernel.

Disable the funcitonnality until someone in need of such feature comes
up with a nice implementation.

From Christian Ludwig.
2024-12-04 09:33:41 +00:00
schwarze
a4f8957185 Mark six EVP_PKEY control constants as intentionally undocumented
that are only intended for internal use, do very little (only validity
checking), are unused in the wild, and marked obsolete in OpenSSL 3.
2024-11-29 10:19:37 +00:00
schwarze
11e77a131c Mark nine unused EVP constants as intentionally undocumented.
Fix related indentation while here.
2024-11-29 10:09:10 +00:00
anton
e9be07d5e8 hook up ptrace xstate regress 2024-11-27 05:27:21 +00:00
anton
664d632d7e Add ptrace xstate regress suite. 2024-11-27 05:26:58 +00:00
djm
e0982860d7 regression test for UpdateHostkeys with multiple keys backed by
ssh-agent. Patch from Maxime Rey.
2024-11-26 22:02:28 +00:00
tb
9565174c64 Disable regression tests for small builtin curves 2024-11-24 10:13:16 +00:00
claudio
268bb8d70c Adjust test-http.c to the new ibuf world order.
Failure noticed by anton@
2024-11-22 07:16:12 +00:00
claudio
39e1fbec45 Adjust rpki-client regress to new msgbuf API
OK tb@
2024-11-21 13:30:43 +00:00
claudio
8f133f76df Convert msgbuf_write() callers to the new return logic.
OK tb@
2024-11-21 13:12:35 +00:00
anton
3eea37a472 hook up ddb regress 2024-11-19 05:51:07 +00:00
anton
58dcf58eba Add amd64 ddb regress suite allowing the disassembler to be tested from
userspace.
2024-11-19 05:50:41 +00:00
jsing
d7063ec040 Add regress coverage for the size_t constant time comparisions. 2024-11-08 14:06:34 +00:00
tb
12cba3bdc1 ec_asn1_test: remove extra parens 2024-11-08 12:35:26 +00:00
bluhm
6903e08e5b Test callback is called immediately after TLS handshake completion. 2024-11-07 10:15:07 +00:00
mpi
3174595f5e Regression for parsing multi-line strings with comments.
From Christian Ludwig
2024-11-07 09:22:18 +00:00
bluhm
17284f7e34 Remove vnd(4) diskimage after testing to avoid that running regress
fills up /usr/obj too quickly.
2024-11-06 18:42:54 +00:00
bluhm
bdac09ca76 Skip pf regress with proper error message if pf is disabled in
kernel or there is no regress anchor.

discussed with claudio@ sashan@
2024-11-06 17:53:23 +00:00
claudio
299828c2e1 Fix function declaration to be less arcane. 2024-11-06 17:43:53 +00:00