aboutsummaryrefslogtreecommitdiffstats
path: root/src/tests
Commit message (Collapse)AuthorAgeFilesLines
* Remove support for Visual C++ 2013Jack Lloyd2018-10-013-4/+4
| | | | Closes GH #1557
* Handle PPC crypto bit in tests [ci skip]Jack Lloyd2018-10-011-1/+1
|
* Fix more MSVC warningsJack Lloyd2018-10-014-7/+5
|
* Merge GH #1696 Fix bugs in UUID classJack Lloyd2018-09-301-0/+73
|\
| * Move UUID to utils, test it, and fix bugs.Jack Lloyd2018-09-301-0/+73
| | | | | | | | Fixes #1695
* | Add some tests of the versioning functionsJack Lloyd2018-09-301-0/+46
|/
* Add more tests for CBC, CFB, OFB, CTR and GCMJack Lloyd2018-09-296-2/+635
| | | | From NIST CAVP, OpenSSL test data, and elsewhere
* Refactor mode tests, and correct bugs foundJack Lloyd2018-09-293-119/+168
| | | | | | | | | | | | | | | | | | | Several problems in CBC found by adding tests - If you set a key, then set a nonce, then set a new key, you could encrypt without setting a new nonce. - It was possible to call CBC finish without setting a nonce, which would crash. - If you had an CBC decryption object, set a key, set a nonce, then reset message state, it should throw because no nonce is set. Instead it would carry on using an all-zero nonce. Disable CommonCrypto with PKCS7 padding as it seems to have some problem that I cannot figure out from the build logs. This work sponsored by Ribose Inc
* Avoid null pointer write in FFIJack Lloyd2018-09-281-0/+3
| | | | | | | | If a function returning variable length output was called with a null output buffer but a non-zero output buffer length, FFI layer would call memset(nullptr, 0, buffer_len) and crash. Caught by Coverity.
* Spell check the documentationJack Lloyd2018-09-281-1/+1
|
* Merge GH #1692 Fix test failure when http_util disabledJack Lloyd2018-09-261-1/+1
|\
| * Fix x509_path_x509test failing when http_util module was not enabledJose Pereira2018-09-251-1/+1
| |
* | Fix a crash in the mode padding fuzzerJack Lloyd2018-09-231-0/+3
| | | | | | | | | | | | The reference version of 1and0 padding would crash on an all-zero input. OSS-Fuzz 10628
* | Add fuzzer for mode unpadding, and fix bugs found therebyJack Lloyd2018-09-221-0/+89
| | | | | | | | | | | | | | Both PKCS7 and X9.23 padding modes did not examine the first byte of the purported padding if the padding took an entire block. So for example for a 64-bit cipher, PKCS7 would accept XX08080808080808 as a valid padding for any byte value.
* | Simplify BigInt::get_substring a bitJack Lloyd2018-09-151-0/+29
| | | | | | | | And forbid 0 length substrings, which did not work correctly anyway.
* | Merge GH #1670 New password hashing interfaceJack Lloyd2018-09-132-9/+129
|\ \
| * | Test Scrypt private key encryptionJack Lloyd2018-09-101-3/+18
| | |
| * | Add testsJack Lloyd2018-09-102-6/+111
| | | | | | | | | | | | This is a contribution of Ribose Inc (@riboseinc)
* | | Create proper KATs for cryptobox functionJack Lloyd2018-09-122-42/+134
| | |
* | | Fix certstore testsJack Lloyd2018-09-111-2/+3
| | | | | | | | | | | | Accidentally disabled in 643a4041bedc
* | | Add FFI functions for creating and getting X25519 dataJack Lloyd2018-09-101-0/+58
|/ / | | | | | | See GH #1680
* | Support SM2 raw signaturesJack Lloyd2018-09-092-0/+11
| | | | | | | | | | | | Where SM2 signs a hash input provided by the application. This is a contribution by Ribose Inc (@riboseinc)
* | Merge GH #1678 Add read_kv utility functionJack Lloyd2018-09-092-0/+127
|\ \
| * | Add read_kv for parsing strings with key/value pairsJack Lloyd2018-09-092-0/+127
| |/ | | | | | | This is a contribution by Ribose Inc (@riboseinc)
* | Guard certstore tests with BOTAN_HAS_X509Jack Lloyd2018-09-071-9/+12
| | | | | | | | Otherwise very minimal build fails.
* | Fix in-memory certificate store tests not runningJose Pereira2018-09-071-11/+9
| | | | | | | | If sqlite dependency is not used, tests should still be able to run
* | Increase minimum Blowfish key length to 64 bitsJack Lloyd2018-09-073-6/+32
| | | | | | | | | | | | See #1673 Also, skip tests if the provider doesn't support the given key length.
* | Add RandomNumberGenerator::accepts_inputJack Lloyd2018-09-063-0/+12
|/
* Add support for hashing with CommonCryptoJose Pereira2018-09-031-2/+2
|
* Check PSS salt length during verificationJack Lloyd2018-08-301-1/+1
| | | | Fixes #1665
* Correct order of CPUID bit clearingsJack Lloyd2018-08-265-5/+5
| | | | | | These are done from left to right, so should end with most widely implement extensions. Noticed because adding AVX2 ChaCha caused SSE2 ChaCha to be no longer tested.
* Merge GH #1662 Add AVX2 ChaChaJack Lloyd2018-08-261-1/+1
|\
| * Add AVX2 version of ChaChaJack Lloyd2018-08-261-1/+1
| |
* | Report CPUID flags in test runnerJack Lloyd2018-08-261-0/+4
|/ | | | | Sometimes useful for debugging especially from remote build logs like Travis or Debian.
* Add avx2 tag to Serpent test dataJack Lloyd2018-08-241-1/+1
|
* If cert extension parsing fails, replace the object with UnknownJack Lloyd2018-08-231-1/+1
| | | | | | Allows the parse to complete and even allows examining the extension. GH #1652
* Add PBES2 as alias for PBE-PKCS5v20Jack Lloyd2018-08-231-1/+1
| | | | Easier to remember and type.
* Merge GH #1651 Default disable TLS v1.0/v1.1 and CBC+CCM suitesJack Lloyd2018-08-232-4/+4
|\
| * Default disable support for TLS v1.0/v1.1 and all CBC and CCM suitesJack Lloyd2018-08-222-4/+4
| |
* | Simplify exception messagesJack Lloyd2018-08-2219-60/+60
|/ | | | Remove "Invalid argument" and "Decoding Error" prefixes
* Regenerate xchacha20poly1305-testvectorsSimon Warta2018-08-191-676/+676
| | | | | vector sets of size >= 2 now ensure to include messages and ADs of length 1024 (2^10) and 577 (prime)
* Have cipher modes also verify that the nonce is set prior to useJack Lloyd2018-08-171-1/+15
|
* Add a test that processing without a nonce set failsJack Lloyd2018-08-171-3/+18
|
* Fix an EAX bug in reset()Jack Lloyd2018-08-171-7/+4
| | | | | | | | | | | | | | It failed to reset any data that had been fed into CMAC so far, so a sequence with eax->set_key(key); eax->start(nonce); eax->process(discarded_bits); eax->reset(); eax->start(second_nonce); eax->process(second_msg); would produce incorrect results
* Add botan_cipher_reset to FFIJack Lloyd2018-08-171-0/+5
|
* Add some tests of HMAC with SHA-3Jack Lloyd2018-08-171-0/+134
|
* Add args for botan FFI cert verification for hostname and timeJack Lloyd2018-08-161-4/+4
|
* Add botan_x509_cert_dupJack Lloyd2018-08-161-0/+6
|
* Fix bug introduced in 15e149acJack Lloyd2018-08-161-0/+10
| | | | | This caused get_field, when called with a non-existing field, to return success and set the field to a small negative integer.
* Add TOTP to FFIJack Lloyd2018-08-161-1/+36
|