git.openssl.org Git - openssl.git/atom - test/recipes/30-test_evp_data/evppkey.txt history Unnamed repository; edit this file 'description' to name the repository. https://git.openssl.org/?p=openssl.git OpenSSL static/git-favicon.png static/git-logo.png 2020-08-07T04:29:00Z gitweb Add evp_test fixes. 2020-08-07T04:29:00Z Shane Lontis shane.lontis@oracle.com Shane Lontis shane.lontis@oracle.com 2020-08-07T04:29:00Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=5ccada09aae0cf846d3381a161d3eb20d4d9abfd
Add evp_test fixes.

Changed many tests so they also test fips (and removed 'availablein = default' from some tests).
Seperated the monolithic evppkey.txt file into smaller maintainable groups.
Changed the availablein option so it must be first - this then skips the entire test before any fetching happens.
Changed the code so that all the OPENSSL_NO_XXXX tests are done in code via methods such as is_cipher_disabled(alg),
before the fetch happens.
Added missing libctx's found by adding a libctx to test_evp.
Broke up large data files for cipher, kdf's and mac's into smaller pieces so they no longer need 'AvailableIn = default'
Added missing algorithm aliases for cipher/digests to the providers.

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/12236)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Add RSA SHA512 truncated digest support 2020-04-30T03:41:05Z Shane Lontis shane.lontis@oracle.com Shane Lontis shane.lontis@oracle.com 2020-04-30T03:41:05Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=45c236ad1f1c881281017941a0e7126735a190e8
Add RSA SHA512 truncated digest support

Partial Fix for #11648.

Some additional work still needs to be done to support RSA-PSS mode.

RSA legacy digests will be addressed in another PR.

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11681)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Update copyright year 2020-04-23T12:55:52Z Matt Caswell matt@openssl.org Matt Caswell matt@openssl.org 2020-04-23T12:55:52Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=33388b44b67145af2181b1e9528c381c8ea0d1b6
Update copyright year

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/11616)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
evp_test: the tests using MDC2 need the legacy provider 2020-03-17T13:41:59Z Richard Levitte levitte@openssl.org Richard Levitte levitte@openssl.org 2020-03-17T13:41:59Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=d3b2f8760a56da3e70c30e5614181f3798e4ad54
evp_test: the tests using MDC2 need the legacy provider

This was always a potential, we just haven't seen this need before now.

Reviewed-by: Paul Yang <kaishen.yy@antfin.com>
(Merged from https://github.com/openssl/openssl/pull/11343)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Add ECDSA to providers 2020-03-15T11:34:29Z Shane Lontis shane.lontis@oracle.com Shane Lontis shane.lontis@oracle.com 2020-03-15T11:34:29Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=edd3b7a309f8767fc7d8a5c4f7d350b53e144c1b
Add ECDSA to providers

Added ECDSA support for OSSL_SIGNATURE_PARAM_ALGORITHM_ID

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/10968)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
test/recipes/30-test_evp_data/evppkey.txt: Change an expected KeyGen result 2020-02-18T14:37:08Z Richard Levitte levitte@openssl.org Richard Levitte levitte@openssl.org 2020-02-18T14:37:08Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=f11a74ef79d3944844593d8d76d43f048bdb709d
test/recipes/30-test_evp_data/evppkey.txt: Change an expected KeyGen result

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/10289)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
test/recipes/30-test_evp_data/evppkey.txt 2019-12-03T10:02:58Z Richard Levitte levitte@openssl.org Richard Levitte levitte@openssl.org 2019-12-03T10:02:58Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=ae9e0698df7672977f0c7c88f3b3c2b695c14611
test/recipes/30-test_evp_data/evppkey.txt

Tests that go through provider cannot recognise PKEY_CTRL_INVALID from
PKEY_CTRL_ERROR any more, because provided implementations' param
setting functions return 0 or 1.

Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/10557)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Add Asymmetric RSA cipher tests in FIPS provider 2020-01-17T15:54:09Z Matt Caswell matt@openssl.org Matt Caswell matt@openssl.org 2020-01-17T15:54:09Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=06e62984c1e7cee5e50211dfb9a89d5095799133
Add Asymmetric RSA cipher tests in FIPS provider

We also add some DSA tests for code that is already in the FIPS provider.

Reviewed-by: Richard Levitte <levitte@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/10881)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Add self-generated test vector for x448 non-canonical values 2019-11-02T23:01:20Z Patrick Steuer patrick.steuer@de.ibm.com Patrick Steuer patrick.steuer@de.ibm.com 2019-11-02T23:01:20Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6376c229c44a355248db17e9f0bb2e4567a16d0d
Add self-generated test vector for x448 non-canonical values

x25519 has such a test vector obtained from wycheproof but wycheproof
does not have a corresponding x448 test vector.
So add a self-generated test vector for that case.

Signed-off-by: Patrick Steuer <patrick.steuer@de.ibm.com>

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/10339)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Remove function name from errors 2019-05-31T17:52:45Z Rich Salz rsalz@akamai.com Richard Levitte levitte@openssl.org 2019-05-31T17:52:45Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=aac96e2797c34a6b2a839eb58c30ab3328a0cee8
Remove function name from errors

Deprecate all xxx_F_ defines.
Removed some places that tested for a specific function.
Use empty field for the function names in output.
Update documentation.

Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/9058)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Add an Ed448 malleability test 2018-12-03T16:36:50Z Matt Caswell matt@openssl.org Matt Caswell matt@openssl.org 2018-12-03T16:36:50Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=6de98b4fb6265f8a4b2e5b599d6714ff937dca6b
Add an Ed448 malleability test

Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
(Merged from https://github.com/openssl/openssl/pull/7748)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Following the license change, modify the boilerplates in test/ 2018-12-06T12:05:25Z Richard Levitte levitte@openssl.org Richard Levitte levitte@openssl.org 2018-12-06T12:05:25Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=909f1a2e510bb2909dc78efead432460c6ab50d2
Following the license change, modify the boilerplates in test/

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7767)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Add an Ed25519 signature maleability test 2018-11-23T14:24:17Z Matt Caswell matt@openssl.org Matt Caswell matt@openssl.org 2018-11-23T14:24:17Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=e65a79d2aae76c27d68587ff66cb6b65a3283e50
Add an Ed25519 signature maleability test

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/7697)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
[test] throw error from wrapper function instead of an EC_METHOD specific one 2018-08-22T09:27:34Z Billy Brumley bbrumley@gmail.com Richard Levitte levitte@openssl.org 2018-08-22T09:27:34Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=bfb10b975818d1887d676d309fcc21a765611f6d
[test] throw error from wrapper function instead of an EC_METHOD specific one

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7028)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
[test] ECC: make sure negative tests pass for the right reasons 2018-08-22T06:50:43Z Billy Brumley bbrumley@gmail.com Richard Levitte levitte@openssl.org 2018-08-22T06:50:43Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=30c41bfb158c0f595809d0eaf032926a3c2cf236
[test] ECC: make sure negative tests pass for the right reasons

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7028)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
test/recipes/30-test_evp_data: fix two typos 2018-08-18T04:57:42Z Dr. Matthias St. Pierre Matthias.St.Pierre@ncp-e.com Dr. Matthias St. Pierre Matthias.St.Pierre@ncp-e.com 2018-08-18T04:57:42Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=95c91cb3fc85a50969358e579793a73726f6e483
test/recipes/30-test_evp_data: fix two typos

Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7001)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
test/.../evppkey.txt: X25519 regression test vectors. 2018-07-11T20:22:52Z Andy Polyakov appro@openssl.org Andy Polyakov appro@openssl.org 2018-07-11T20:22:52Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=dfd5fb09500d5800b37b3aec05884fc7409032d7
test/.../evppkey.txt: X25519 regression test vectors.

Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6699)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
[crypto/ec] don't assume points are of order group->order 2018-06-20T07:56:37Z Billy Brumley bbrumley@gmail.com Richard Levitte levitte@openssl.org 2018-06-20T07:56:37Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=a766aab93a282774e63ba918d0bb1c6680a5f292
[crypto/ec] don't assume points are of order group->order

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6535)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
Move SM2 algos to SM2 specific PKEY method 2018-06-18T19:51:56Z Jack Lloyd jack.lloyd@ribose.com Matt Caswell matt@openssl.org 2018-06-18T19:51:56Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=ddb634fe6f9aeea34fe036cf804903b4240d38ac
Move SM2 algos to SM2 specific PKEY method

Use EVP_PKEY_set_alias_type to access

Reviewed-by: Andy Polyakov <appro@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6443)
  • [D] test/recipes/30-test_evp_data/evppkey.txt
[SM2_sign] add minimal EVP_PKEY functionality testing 2018-04-10T00:53:01Z Nicola Tuveri nic.tuv@gmail.com Matt Caswell matt@openssl.org 2018-04-10T00:53:01Z https://git.openssl.org/?p=openssl.git;a=commitdiff;h=22f0c72b928604cc42c16bf59b9d31f92e4c4be9
[SM2_sign] add minimal EVP_PKEY functionality testing

The actual functionality of generating signatures through the `EVP_PKEY`
API is completely untested.
Current tests under the `EVP_PKEY` API
(`test/recipes/30-test_evp_data/evppkey.txt`) only cover `Verify` and
`Decrypt`, while encryption and signature generation are tested with
ad-hoc clients (`test/sm2crypttest.c`, `test/sm2signtest.c`) that do not
call the `EVP_PKEY` interface at all but soon-to-be private functions
that bypass it (cf. PR#5895 ).

It is my opinion that an ideal solution for the future would consist on
enhancing the `test/evp_pkey` facility and syntax to allow tests to take
control of the PRNG to inject known nonces and validate the results of
`EVP_PKEY` implementations against deterministic known answer tests, but
it is probably too late to work on this feature in time for next release.

Given that commit b5a85f70d8 highlights some critical bugs in the hook
between the `EVP_PKEY` interface and SM2 signature generation and that
these defects escaped testing and code review, I think that at least for
now it is beneficial to at least add the kind of "bogus" testing
provided by this patch:
this is a "fake" test as it does only verify that the SM2 `EVP_PKEY`
interface is capable of creating a signature without failing, but it
does not say anything about the generated signature being valid, nor
does it test the functional correctness of the cryptosystem.

Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6066)
  • [D] test/recipes/30-test_evp_data/evppkey.txt