1
0
mirror of https://github.com/openbsd/src.git synced 2025-01-10 06:47:55 -08:00
Commit Graph

7999 Commits

Author SHA1 Message Date
anton
c10b169721 favor hw.ncpuonline; ok bluhm@ 2023-07-04 19:01:46 +00:00
bluhm
c82a04dd18 Run Perl tests from our regress tree. It needs a Perl obj directory
with Makefile.  To create the test environment, use the
Makefile.bsd-wrapper in /usr/src/gnu/usr.bin/perl and build Perl
there if it does not exist.  This allows to test Perl easily and
in a consistent manner.  Do not link tests to regress tree due to
this reach around and the combination of build and test.
2023-07-04 11:27:13 +00:00
tb
df6ddd9b8f Plug leak in the ssltest
Removing -tls1 moved some tests from the legacy stack to the TLSv1.3 stack.
On a HRR, the alpn callback would be called twice and allocate the global
twice, thereby leaking. So free it up front.

Joint suffering with bcook and beck
2023-07-04 08:47:01 +00:00
anton
d3804626eb favor REGRESS_EXPECTED_FAILURES 2023-07-03 17:55:51 +00:00
jasper
03c8fe6abc add regress tests for the remainder of the function provided by our uuid.h 2023-07-03 13:51:55 +00:00
jasper
c367081c09 add a few tests related to --cflags and --libs in combination with Requires.private.
skipping one (currently failing) test which exhibits the behaviour described
by humm@ljabl.com on bugs@
2023-07-03 13:44:45 +00:00
beck
490f565b99 Stop caring about tls 1.0 and 1.1.
Syslogd is not a tls protocol tester in any case. These tests
should not care what version of tls they use
2023-07-03 05:45:53 +00:00
beck
dbacfe20a2 Stop testing tls 1.0 and 1.1
They have gone behind the barn.
2023-07-03 05:31:56 +00:00
beck
521ba2f2ab Disable TLS 1.0 and TLS 1.1 in libssl
Their time has long since past, and they should not be used.
This change restricts ssl to versions 1.2 and 1.3, and changes
the regression tests to understand we no longer speak the legacy
protocols.

For the moment the magical "golden" byte for byte comparison
tests of raw handshake values are disabled util jsing fixes them.

ok jsing@ tb@
2023-07-02 17:21:32 +00:00
beck
5c389b7954 Remove the ability to do tls 1.0 and 1.1 from libtls.
With this change any requests from configurations to request
versions of tls before tls 1.2 will use tls 1.2. This prepares
us to deprecate tls 1.0 and tls 1.1 support from libssl.

ok tb@
2023-07-02 06:37:27 +00:00
tb
03882fa966 update rpki-regress. log.c is no more. 2023-06-29 10:29:18 +00:00
guenther
ff51234218 On amd64, test whether PKU has been enabled and set our expectation
of the results based on that.  Also, the system now enforces
unreadability in copyin() of ld.so, libc, and application text,
even when PKU isn't enabled, so adjust those results to match.

ok deraadt@ anton@
2023-06-26 19:03:03 +00:00
job
7363246124 Update regress files to aspa-profile-15 format 2023-06-26 18:55:52 +00:00
claudio
628a100ddd Call notification_done() in the regress test so that the list
of deltas is adjusted to what the test expects.
2023-06-24 07:07:36 +00:00
tb
6230b67351 Codify BN_asc2bn(NULL, *) behavior in regress. 2023-06-23 10:50:47 +00:00
tb
284c014012 symbols: Tweak this test so it works with -j N 2023-06-22 19:23:27 +00:00
jsing
d1ac4eb253 Add tests for BN_sqr() corner cases.
Test BN_sqr() with a newly allocated BN, a BN explicitly set to zero and
small values that fit in a single BN_ULONG.
2023-06-21 07:18:10 +00:00
jsing
da50f9d581 Add BN_cmp()/BN_ucmp() tests with zero padded inputs.
Currently BN_hex2bn() removes the leading zeros, however this will not be
the case in the future.
2023-06-21 07:16:08 +00:00
jsing
36ba240090 Add a BN_num_bits() with zero padded input.
Currently BN_hex2bn() removes the leading zeros, however this will not be
the case in the future.
2023-06-21 07:15:38 +00:00
job
edf59932f8 Update regress to align with recent changes in rpki-client 2023-06-20 12:52:32 +00:00
tb
e1dd1f6b50 Fix copy-paste error 2023-06-20 06:46:07 +00:00
jsing
0d31acbab9 Add regress coverage for BN_num_bits() 2023-06-20 06:36:09 +00:00
tb
dff2ba7361 Make enginetest work with disabled engine support 2023-06-19 18:52:29 +00:00
tb
d9e70eaf9b Fix GOST test with disabled engine 2023-06-19 18:51:47 +00:00
claudio
00562ee792 Drop test for msgbuf_drain() since that function is no longer part of the
public API.
2023-06-19 17:22:46 +00:00
claudio
000e30a885 Add community tests for various ext-community * versions.
While there move one test down so that the numbering is consistent again
and make the error strings for counts clear.
2023-06-17 08:01:22 +00:00
espie
ea064d447e fix test after method name change 2023-06-14 07:52:37 +00:00
claudio
a7d38a0626 Link http regress test with -lz for content-encoding gzip support.
Noticed by anton@
2023-06-13 11:41:36 +00:00
tb
820acc68fb Some KNF nits 2023-06-13 10:39:46 +00:00
tb
d5abdd01d7 imsg test: simplify Makefile 2023-06-13 10:38:45 +00:00
anton
7f6870ef82 All hooked up regress directories must at least support make obj and clean in
order to not break the tree. Therefore make use of bsd.regress.mk.
2023-06-13 04:59:10 +00:00
millert
fafd6c403a Simple seq(1) regress. More tests are needed. 2023-06-12 20:19:45 +00:00
tb
ff0e7be1eb File new test-bleichenbacher-timing-pregenerate.py under failing tests
until someone finds time and motivation to figure out how to use this.
2023-06-10 05:00:58 +00:00
espie
5ce1ee8cb5 add tests related to --libs-only-l and the likes
remove extraneous spaces from reference output now that we're closer
to the original pkg-config
2023-06-08 08:57:02 +00:00
job
17feaa7543 Fix copy+paste error in x509 asn regress 2023-06-05 18:32:06 +00:00
tb
9a36959cd9 Make ruby-openssl cope with default ruby change 2023-06-04 11:33:45 +00:00
tb
b505647788 bn_mod_inverse tweaks
Provide prototype that is hidden behind LIBRESSL_INTERNAL for portable
and or in result for future extensibility.
2023-06-04 07:14:47 +00:00
otto
e78208e22e More thorough write-afetr-free checks.
On free, chunks (the pieces of a pages used for smaller allocations)
are junked and then validated after they leave the delayed free
list.  So after free, a chunk always contains junk bytes. This means
that if we start with the right contents for a new page of chunks,
we can *validate* instead of *write* junk bytes when (re)-using a
chunk.

With this, we can detect write-after-free when a chunk is recycled,
not justy when a chunk is in the delayed free list.  We do a little
bit more work on initial allocation of a page of chunks and when
re-using (as we validate now even on junk level 1).

Also: some extra consistency checks for recallocaray(3) and fixes
in error messages to make them more consistent, with man page bits.

Plus regress additions.
2023-06-04 06:58:33 +00:00
tb
99463a0c5d Add regress coverage for BN_mod_inverse()
This would detect the aliasing issue reported by Guido Vranken fixed
in bn_gcd.c r1.28. Most testcases are from BoringSSL's regress test.
2023-06-03 21:20:29 +00:00
tb
1f6bba93cb fix typo 2023-06-02 08:35:10 +00:00
tb
64a4e68961 Remove the speed test again
It takes too much time and we now know that all covered ciphers can cope
with unaligned input and output on all tested architectures.
2023-06-01 09:46:00 +00:00
job
e0b59cc71b Add json.c to linker instructions 2023-05-30 15:56:47 +00:00
krw
45a3c7e1ab sparc64 disklabel(8) must be compiled with SUN_CYLCHECK and SUN_AAT0.
sparc64 auto allocation during install does not use fdisk(8).

Add *.sparc64.ok files that reflect sparc64 reality.

Should fix disklabel(8) regression on sparc64.

Requested by & ok bluhm@
2023-05-30 15:10:39 +00:00
claudio
0876134d17 Revert commitid ANSBO0rBvIUtTi45:
Make rpki-client choose the verification time of the time it is invoked
   rather than always getting the current system time for every certificate
   verification. This will result in output that is not variable on run-time.

Using the time of invocation does not work well with fast publishing CAs. It
can take a few minutes to reach a repo and that CA may have issued certificates
that are not yet valid if that startup time of rpki-client is used to validate.

This still keeps the -P option to specify a fixed validation time.
OK beck@ job@ tb@
2023-05-30 12:14:48 +00:00
beck
5898fc2b25 Correct test that was pasto'ed incorrectly
This now tests what the comment says it does
2023-05-29 15:52:46 +00:00
beck
f5d1ae505e Make X509_NAME_get_text_by[NID|OBJ] safer.
This is an un-revert with nits of the previously landed change
to do this which broke libtls. libtls has now been changed to
not use this function.

This change ensures that if something is returned it is "text"
(UTF-8) and a C string not containing a NUL byte. Historically
callers to this function assume the result is text and a C string
however the OpenSSL version simply hands them the bytes from an
ASN1_STRING and expects them to know bad things can happen which
they almost universally do not check for. Partly inspired by
goings on in boringssl.

ok jsing@ tb@
2023-05-29 11:54:50 +00:00
beck
f23ec8ef09 Refactor tls_check_common_name to use lower level API.
X509_NAME_get_text_by_NID is kind of a bad interface that
we wish to make safer, and does not give us the visibility
we really want here to detect hostile things.

Instead call the lower level functions to do some better
checking that should be done by X509_NAME_get_text_by_NID,
but is not in the OpenSSL version. Specifically we will treat
the input as hostile and fail if:

1) The certificate contains more than one CN in the subject.
2) The CN does not decode as UTF-8
3) The CN is of invalid length (must be between 1 and 64 bytes)
4) The CN contains a 0 byte

4) matches the existing logic, 1 and 2, and 3 are new checks.

ok tb@
2023-05-28 09:02:01 +00:00
jsing
8a60fc3bc8 Add coverage for calling BN_{dec,hex}2bn() with NULL inputs. 2023-05-27 15:50:56 +00:00
bluhm
ce018c3c11 Skip tests if p5-BSD-Socket-Splice is not installed. 2023-05-24 20:31:49 +00:00
bluhm
d662361922 Default pf rule "block return; pass" interferes with test.
Use "block; pass" instead.
2023-05-24 11:52:30 +00:00