anton
d6933ec7e0
Replace poor man's synchronization primitive (i.e. sleep) with a wait
...
until construct in the hopes of making these tests less flaky.
2024-12-21 07:49:03 +00:00
tb
c7c5643a71
mlkem regress: garbage collect two global variables
2024-12-20 15:47:26 +00:00
tb
6f65ec34f2
Fix whitespace in Makefile
2024-12-20 01:53:46 +00:00
tb
f3c21583ac
That works better with a G
2024-12-20 01:51:27 +00:00
tb
e9751d5483
cant't -> can't
...
(the mystery of spotting typos right after commit strikes again)
2024-12-20 00:32:15 +00:00
tb
8889493e35
Rework and fix the mlkem tests
...
Make proper use of CBB and CBS. If a CBS ever owns data, you're holding
it wrong. Ditch gross macros, sscanf, and globals. The use of fgets is
annoying here, so replace it with getline, which be provided by portable
if needed.
Most importantly, make the tests actually signal failure rather than
only printing an error. Fix the state machines in a few of them. Some
tests didn't parse the .txt file at all. Others mostly did but didn't
actually test what they were supposed to be testing. Such failures
were hidden by the way the tests were written.
This basically needed a complete revamp. It still isn't pretty and much
of it could be deduplicated, but I only have so much time alotted on this
blue planet.
2024-12-20 00:07:12 +00:00
tb
d65e817093
mlkem regress: reach around into bytestring again
2024-12-19 23:45:09 +00:00
tb
95be67e7d5
Close fp before exit since we clean up other stuff
...
From Kenjiro Nakayama
2024-12-17 07:20:10 +00:00
tb
c07f1519ba
Plug leak coming from debug leftover
...
There's still CBS holding data in here. Yuck.
2024-12-17 07:19:10 +00:00
tb
7266ec7026
Stop reaching into libcrypto/bytestring
2024-12-14 19:19:38 +00:00
tb
d4ed7533f1
Normalize top of files
...
RCS marker, KNF for comment, fix and sort includes as usual.
2024-12-14 19:16:24 +00:00
beck
08c63c712f
Add ML-KEM 1024 from BoringSSL
...
Changes include conversion from C++, basic KNF, then adaptation to
use our sha3 functions for sha3 and shake instead of the BorinSSL
version. This Adds units tests to run against BoringSSL and NIST test
vectors.
The future public API is the same as Boring's - but is not yet exposed
pending making bytestring.h public (which will happen separately) and
a minor bump
Currently this will just ensure we build and run regress.
ok tb@ to get it into the tree and massage from there.
2024-12-13 00:17:17 +00:00
beck
75c083a031
Add ML-KEM 768 from BoringSSL
...
Changes include conversion from C++, basic KNF, then adaptation to
use our sha3 functions for sha3 and shake instead of the BorinSSL
version. This Adds units tests to run against BoringSSL and NIST test
vectors.
The future public API is the same as Boring's - but is not yet exposed
pending making bytesring.h public (which will happen separately) and
a minor bump
Currently this will just ensure we build and run regress.
ok tb@ to get it into the tree and massage from there.
2024-12-13 00:03:57 +00:00
anton
ced57b23db
Cope with recent changes to sed "c" command.
2024-12-12 08:02:48 +00:00
tb
7f9db3f573
Add regress coverage for tls_peer_cert_common_name()
2024-12-10 08:43:17 +00:00
schwarze
33885c3251
Mark four "struct *_st" types declared in evp.h as intentionally undocumented
...
because they are intended as internal, and applications are supposed to use
the documented aliases DH, DSA, EC_KEY, and RSA from ossl_typ.h instead.
2024-12-09 12:45:21 +00:00
schwarze
9fcb7baee2
Mark four EVP_PKEY_GOST* constants as intentionally undocumented
...
because they are completely unused by anything.
2024-12-09 12:30:23 +00:00
schwarze
6b76ac2e55
Mark two symbols as intentionally undocumented
...
that are obsolete after PBE was mostly removed from LibreSSL.
2024-12-09 12:18:38 +00:00
schwarze
1b6b588e81
Mark four EVP control constants as intentionally undocumented
...
that are only used for GOST.
2024-12-09 11:41:44 +00:00
claudio
03bc5c0e77
Extend maxattr regress to also check RFC8654 extended messages.
2024-12-09 10:53:54 +00:00
schwarze
aea0cfdd31
Mark EVP_CTRL constants for RC5 as intentionally undocumented
...
because LibreSSL does not support RC5 and because these constants
are almost unused in the wild.
2024-12-09 10:50:43 +00:00
djm
e6fc4d34cb
use glob(3) wildcards in AuthorizedKeys/PrincipalsFile tests to
...
exercise this feature; ok dtucker
2024-12-06 16:25:58 +00:00
djm
eb7387f660
implement attestation verification for ED25519 keys
2024-12-06 10:37:42 +00:00
dtucker
f6b912702f
Expand $SSH to absolute path if it's not already. Prevents problem
...
later in increase_datafile_size if ssh is not in the path. Patch from
quaresmajose via GHPR#510.
2024-12-06 07:05:54 +00:00
dtucker
c9baf54040
Add key expiry test in the 64bit time_t range for additional coverage.
...
From Alexander Kanavin via bz#3684.
2024-12-05 14:28:39 +00:00
schwarze
10e3f8f482
Mark three EVP_PKEY control constants for CMS as intentionally undocumented
...
that are internal to the library and unused in the wild
2024-12-05 14:01:59 +00:00
schwarze
226533405b
mark three more EVP_PKEY control constants as intentionally undocumented
...
that are only intended for internal use and unused in the wild
2024-12-05 10:58:12 +00:00
schwarze
ca8f98200d
ignore DECLARE_PKCS12_STACK_OF such that pkcs12.h can be parsed
2024-12-05 10:52:45 +00:00
djm
a8b9d72961
add a work-in-progress tool to verify FIDO attestation blobs
...
that ssh-keygen can write when enrolling FIDO keys.
2024-12-04 16:42:49 +00:00
dtucker
960594bd76
Don't assume existence of SK provider in test.
...
Patch from balu.gajjala at gmail via bz#3402.
2024-12-04 10:51:13 +00:00
mpi
2896583250
Regression for multiple probes.
2024-12-04 09:35:21 +00:00
mpi
ffce2a5431
Disallows registering multiple probes of the same type.
...
If a bt(5) script uses the same probe multiple times (like interval:hz),
btrace(8) has currently no knowledge of which rule to execute when it
parses events read from the kernel.
Disable the funcitonnality until someone in need of such feature comes
up with a nice implementation.
From Christian Ludwig.
2024-12-04 09:33:41 +00:00
schwarze
a4f8957185
Mark six EVP_PKEY control constants as intentionally undocumented
...
that are only intended for internal use, do very little (only validity
checking), are unused in the wild, and marked obsolete in OpenSSL 3.
2024-11-29 10:19:37 +00:00
schwarze
11e77a131c
Mark nine unused EVP constants as intentionally undocumented.
...
Fix related indentation while here.
2024-11-29 10:09:10 +00:00
anton
e9be07d5e8
hook up ptrace xstate regress
2024-11-27 05:27:21 +00:00
anton
664d632d7e
Add ptrace xstate regress suite.
2024-11-27 05:26:58 +00:00
djm
e0982860d7
regression test for UpdateHostkeys with multiple keys backed by
...
ssh-agent. Patch from Maxime Rey.
2024-11-26 22:02:28 +00:00
tb
9565174c64
Disable regression tests for small builtin curves
2024-11-24 10:13:16 +00:00
claudio
268bb8d70c
Adjust test-http.c to the new ibuf world order.
...
Failure noticed by anton@
2024-11-22 07:16:12 +00:00
claudio
39e1fbec45
Adjust rpki-client regress to new msgbuf API
...
OK tb@
2024-11-21 13:30:43 +00:00
claudio
8f133f76df
Convert msgbuf_write() callers to the new return logic.
...
OK tb@
2024-11-21 13:12:35 +00:00
anton
3eea37a472
hook up ddb regress
2024-11-19 05:51:07 +00:00
anton
58dcf58eba
Add amd64 ddb regress suite allowing the disassembler to be tested from
...
userspace.
2024-11-19 05:50:41 +00:00
jsing
d7063ec040
Add regress coverage for the size_t constant time comparisions.
2024-11-08 14:06:34 +00:00
tb
12cba3bdc1
ec_asn1_test: remove extra parens
2024-11-08 12:35:26 +00:00
bluhm
6903e08e5b
Test callback is called immediately after TLS handshake completion.
2024-11-07 10:15:07 +00:00
mpi
3174595f5e
Regression for parsing multi-line strings with comments.
...
From Christian Ludwig
2024-11-07 09:22:18 +00:00
bluhm
17284f7e34
Remove vnd(4) diskimage after testing to avoid that running regress
...
fills up /usr/obj too quickly.
2024-11-06 18:42:54 +00:00
bluhm
bdac09ca76
Skip pf regress with proper error message if pf is disabled in
...
kernel or there is no regress anchor.
discussed with claudio@ sashan@
2024-11-06 17:53:23 +00:00
claudio
299828c2e1
Fix function declaration to be less arcane.
2024-11-06 17:43:53 +00:00