Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | revert previous. some of the keyupdate tests still fail occasionally | tb | 2021-04-14 | 1 | -2/+11 | |
| | ||||||
* | Enable test-tls13-keyupdate.py | tb | 2021-04-14 | 1 | -9/+2 | |
| | ||||||
* | move test-record-size-limit.py to unsupported | tb | 2021-04-14 | 1 | -4/+3 | |
| | ||||||
* | enable test-record-layer-fragmentation.py | tb | 2021-04-14 | 1 | -7/+2 | |
| | ||||||
* | factor argument to catch an alert mismatch into a helper function | tb | 2021-04-14 | 1 | -7/+8 | |
| | ||||||
* | enable test-tlsfuzzer-invalid-compression-methods.py | tb | 2021-04-13 | 1 | -5/+10 | |
| | ||||||
* | enable test-large-hello.py as a slow test | tb | 2021-04-13 | 1 | -3/+2 | |
| | ||||||
* | with new defaults, test-fuzzed-plaintext.py is no longer slow | tb | 2021-04-13 | 1 | -3/+2 | |
| | ||||||
* | move a few tests to the unsupported group and fix two comments | tb | 2021-04-13 | 1 | -15/+15 | |
| | ||||||
* | annotate test-ecdhe-rsa-key-exchange-with-bad-messages.py with expected | tb | 2021-04-13 | 1 | -2/+3 | |
| | | | | alerts and where to add them. | |||||
* | Update a stale comment and fix a typo. | tb | 2021-04-11 | 1 | -3/+3 | |
| | ||||||
* | An extra internal consistency check and a missing stats adjustment. ok tb@ | otto | 2021-04-09 | 1 | -1/+4 | |
| | ||||||
* | Cache implementation has changed, we do not hold on to an exact number | otto | 2021-04-09 | 1 | -3/+4 | |
| | | | | of pages anymore, but also cache larger regions; ok tb@ | |||||
* | Enable test-cve-2016-6309.py | tb | 2021-04-08 | 1 | -3/+2 | |
| | ||||||
* | Avoid clobbering the error code when sending an alert | tb | 2021-04-07 | 1 | -2/+3 | |
| | | | | | | | | | | | | In order to fail gracefully on encountering a self-signed cert, curl looks at the top-most error on the stack and needs specific SSL_R_ error codes. This mechanism was broken when the tls13_alert_sent_cb() was added after people complained about unhelpful unknown errors. Fix this by only setting the error code from a fatal alert if no error has been set previously. Issue reported by Christopher Reid ok jsing | |||||
* | Use ERR_print_error_fp() to avoid leaking a BIO in fatal() | tb | 2021-04-07 | 1 | -2/+2 | |
| | ||||||
* | Check function return value in openssl(1) x509.c | inoguchi | 2021-04-07 | 1 | -24/+71 | |
| | | | | input from bcook@, ok and comments from tb@ | |||||
* | Avoid leak in error path | inoguchi | 2021-04-07 | 1 | -3/+7 | |
| | | | | ok and input from tb@ | |||||
* | use errx() instead of err() | tb | 2021-04-06 | 1 | -8/+8 | |
| | ||||||
* | spaces -> tabs | tb | 2021-04-06 | 1 | -5/+5 | |
| | ||||||
* | minor style tweaks | tb | 2021-04-06 | 1 | -5/+6 | |
| | ||||||
* | Don't leak param->name in x509_verify_param_zero() | tb | 2021-04-05 | 1 | -1/+2 | |
| | | | | | | | | | For dynamically allocated verify parameters, param->name is only ever set in X509_VERIFY_set1_name() where the old one is freed and the new one is assigned via strdup(). Setting it to NULL without freeing it beforehand is a leak. looks correct to millert, ok inoguchi | |||||
* | Add missing error check for AES_unwrap_key(). | tb | 2021-04-04 | 1 | -1/+3 | |
| | ||||||
* | Fix two copy paste errors in error messages | tb | 2021-04-04 | 1 | -3/+3 | |
| | ||||||
* | Add tests for DTLSv1_2{,_client,_server}_method() | tb | 2021-04-04 | 1 | -1/+20 | |
| | ||||||
* | Use correct type for tmp in test_write_bytes() | tb | 2021-04-04 | 1 | -2/+2 | |
| | ||||||
* | Explicitly NULL pointers to avoid a double free. | tb | 2021-04-04 | 1 | -1/+3 | |
| | ||||||
* | Don't leak key and dh in the error path. | tb | 2021-04-04 | 1 | -4/+7 | |
| | ||||||
* | Clean up client and server tls{,_config} contexts in tls_test(). | tb | 2021-04-04 | 1 | -2/+11 | |
| | | | | Leaks reported by Ilya Shipitsin. | |||||
* | Run the CMAC tests through EVP_PKEY_new_CMAC_key(). | tb | 2021-04-03 | 1 | -10/+22 | |
| | ||||||
* | Two cases of BRE involving counts and backrefs that go wrong and | otto | 2021-04-02 | 1 | -1/+16 | |
| | | | | | similar that have no isssues. Reported by Michael Paoli. Failing cases commented out for now. | |||||
* | Show DTLS1.2 message with openssl(1) s_server and s_client | inoguchi | 2021-04-02 | 1 | -2/+6 | |
| | | | | ok jsing@ tb@ | |||||
* | Compare the pointer variable explicitly with NULL in if condition | inoguchi | 2021-04-01 | 1 | -18/+17 | |
| | ||||||
* | one of the examples needs an -N (and explanation); | jmc | 2021-03-31 | 1 | -4/+7 | |
| | | | | | | diff from robert scheck discussed with and tweaked by sthen | |||||
* | Update for DTLSv1.2 support. | tb | 2021-03-31 | 1 | -2/+4 | |
| | ||||||
* | Remove workarounds for SSL_is_dtls() | tb | 2021-03-31 | 2 | -11/+2 | |
| | | | | Reminded by inoguchi jsing | |||||
* | Remove workaround for missing d2i_DSAPrivateKey_fp prototype | tb | 2021-03-31 | 1 | -5/+1 | |
| | ||||||
* | Bump minors after symbol addition | tb | 2021-03-31 | 3 | -3/+3 | |
| | ||||||
* | Expose various DTLSv1.2 specific functions and defines | tb | 2021-03-31 | 5 | -27/+8 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Document SSL_set_hostflags(3) and SSL_get0_peername(3) | tb | 2021-03-31 | 1 | -18/+4 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Expose SSL_set_hostflags(3) and SSL_get0_peername(3) | tb | 2021-03-31 | 2 | -3/+3 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Document SSL_use_certificate_chain_file(3) | tb | 2021-03-31 | 1 | -11/+3 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Expose SSL_use_certificate_chain_file(3) | tb | 2021-03-31 | 2 | -3/+2 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Provide missing prototype for d2i_DSAPrivateKey_fp(3) | tb | 2021-03-31 | 1 | -1/+2 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Document EVP_PKEY_new_CMAC_key(3) | tb | 2021-03-31 | 1 | -16/+4 | |
| | | | | ok bcook inoguchi jsing | |||||
* | Provide EVP_PKEY_new_CMAC_key(3) | tb | 2021-03-31 | 2 | -5/+2 | |
| | | | | ok bcook inoguchi jsing | |||||
* | whitespace nits | tb | 2021-03-29 | 1 | -4/+4 | |
| | ||||||
* | Prepare documenting EVP_PKEY_new_CMAC_key(3) | tb | 2021-03-29 | 1 | -2/+54 | |
| | | | | Based on some text in OpenSSL 1.1.1's EVP_PKEY_new.pod. | |||||
* | Remove pointless assignment in SSL_get0_alpn_selected(). | jsing | 2021-03-29 | 1 | -4/+1 | |
| | | | | ok tb@ | |||||
* | Avoid transcript initialisation when sending a TLS HelloRequest. | jsing | 2021-03-29 | 1 | -4/+6 | |
| | | | | | | | | | | When server side renegotiation is triggered, the TLSv1.2 state machine sends a HelloRequest before going to ST_SW_FLUSH and ST_OK. In this case we do not need the transcript and currently hit the sanity check in ST_OK that ensures the transcript has been freed, breaking server initiated renegotiation. We do however need the transcript in the DTLS case. ok tb@ |