| Commit message (Collapse) | Author | Age | Files | Lines |
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Fixes GH #991
The problem with the current implementation of the chain validation code is that is runs from the end certificate to the trust cert.
@securitykernel and me tried to fix the pathLenConstraint validation within this reverse loop but we were not sure if we missed some edge cases.
So we felt safer to use the algorithm listed in RFC 5280 which executes from the top to the bottom. It's probably best to rewrite the code to use the whole algorithm from RFC 5280, i.e. validating the chain from the trust to the end cert.
Additionally, we wrote some tests including the one that raised this issue initially.
|
| | |
|
| |
| |
| |
| | |
Based on GH #807 and #808
|
|\ \ |
|
| |/
| |
| |
| |
| |
| | |
Extend EMSA_PKCS1v15_Raw to optionally take a hash function for which
the PKCS hash id is prefixed to the message as usual. This allows signing
a message using PKCSv1.5 padding where the hash is provided externally.
|
|\ \
| |/
|/| |
|
| |
| |
| |
| |
| |
| | |
Allow an empty nonce to mean "continue using the current cipher state".
GH #864
|
|/
|
|
| |
RSA_PrivateKey's constructor take p,q,e,d,n.
|
|\ |
|
| | |
|
| | |
|
| |
| |
| |
| | |
should be extended to revision 2.
|
|\ \ |
|
| |/ |
|
|\ \ |
|
| |/
| |
| |
| |
| | |
Implement RSA private key generation with RSA_generate_key_ex().
Make PK_Key_Generation_Test iterate over all providers.
|
| | |
|
|/ |
|
|
|
|
|
|
| |
Call ERR_load_crypto_strings() during test initialization if the
openssl provider is also tested. This gives human readable error
messages.
|
|\ |
|
| | |
|
|\ \ |
|
| | |
| | |
| | |
| | |
| | |
| | | |
Use the OpenSSL provider to implement AES CBC mode. Also pass down
the provider to the encryption layer if there is no matching OpenSSL
mode. Add a test with empty nonce.
|
|\ \ \ |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Hostname validation is used to make sure the certificate
hostname matches the hostname of the connected host.
RFC 6125 allows one wildcard in the left-most label of
a hostname. Up to now, we only supported only the wildcard
as the left-most label, e.g., www.example.com would
match *.example.com, but www.example.com would not
match www*.example.com, although it is permitted.
Also adds test vectors from RFC 6125 as well as the
OpenSSL test suite.
|
|\ \ \ \ |
|
| | |/ /
| |/| |
| | | |
| | | | |
This way we know if the buffer is insufficient.
|
|/ / /
| | |
| | |
| | |
| | |
| | |
| | | |
Curious test failure, HMAC(MD5) failing with "invalid IV length"
(HMAC doesn't support an IV), it turned out to be the IV was left
around from the previously run GMAC test. Just clear out all vars
if a new [algo] header is seen in the file.
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
The tests for block, hash, stream, pubkey, and mac loop over all
possible crypto providers. If a specific provider is given on the
botan-test command line, use only this one. If the provider to be
tested is restricted, skip text based tests that do not have a
possible provider.
|
|/ /
| |
| |
| |
| |
| |
| |
| | |
Currently botan runs the tests for all crypto providers it can find.
Add a --provider option for botan-test to specify exactly one
provider. This allows to see which parts of a specific implementation
have been tested. Pass down the given provider to a specific test
class.
|
|\ \ |
|
| | | |
|
| | |
| | |
| | |
| | |
| | |
| | | |
Was totally broken, when not encrypting in one shot. (GH #1003)
Enable the test, which had been commented out :(
|
|/ /
| |
| |
| |
| |
| | |
* Adds `botan_pubkey_load_elgamal' and `botan_privkey_load_elgamal'
functions to FFI interface.
* Adds test `ffi_test_elgamal'
|
|\ \
| |/
|/| |
|
| | |
|
|/ |
|
|
|
|
|
| |
Generated by OpenSSL, I needed this to help test
https://github.com/riboseinc/rnp/pull/48
|
|\ |
|
| | |
|
| | |
|
|\ \ |
|
| | |
| | |
| | |
| | | |
CVE-2017-2801
|
|\ \ \ |
|
| | | |
| | | |
| | | |
| | | | |
Signed-off-by: Nuno Goncalves <[email protected]>
|
| | | |
| | | |
| | | |
| | | | |
Signed-off-by: Nuno Goncalves <[email protected]>
|
| | | |
| | | |
| | | |
| | | | |
Signed-off-by: Nuno Goncalves <[email protected]>
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
X509_Certificate::raw_issuer_dn_sha256()
X509_Certificate::raw_subject_dn_sha256()
Signed-off-by: Nuno Goncalves <[email protected]>
|
| | |/
| |/|
| | |
| | | |
Signed-off-by: Nuno Goncalves <[email protected]>
|