summaryrefslogtreecommitdiff
path: root/src/regress/lib/libc/regex/debug.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-11-10Clean up and free objects at the completion of the regress test.jsing1-1/+13
From Ben L <bobsayshilol at live dot co dot uk>.
2018-11-10fix a leak reported by Ben L (bobsayshilol () live ! co ! uk)tb1-1/+3
2018-11-10Fix a leak reported by Ben L bobsayshilol () live ! co ! uk.tb1-1/+3
2018-11-10fix a leak pointed out by Ben L (bobsayshi () live ! co ! uk)tb1-4/+8
2018-11-10Avoid a double allocation and memory leak.jsing1-4/+2
Reported by Ben L <bobsayshilol at live dot co dot uk>
2018-11-10Stop keeping track of sigalgs by guessing it from digest and pkey,beck8-92/+102
just keep the sigalg around so we can remember what we actually decided to use. ok jsing@
2018-11-10More regress all the way to exporter_masterbeck1-4/+44
2018-11-10Use TLS13_HS_{CLIENT,SERVER} instead of using a redundant _SEND{,S}.tb1-30/+28
ok jsing
2018-11-10Fix last of the empty hash nonsensebeck2-32/+6
ok jsing@
2018-11-09Update key schedule regress to match API changes.jsing1-21/+12
2018-11-09Fix the TLSv1.3 key schedule implementation.jsing2-66/+95
When the RFC refers to ("") for key derivation, it is referring to the transcript hash of an empty string, not an empty string. Rename tls13_secrets_new() to tls13_secrets_create(), make it take an EVP_MD * and calculate the hash of an empty string so that we have it available for the "derived" and other steps. Merge tls13_secrets_init() into the same function, remove the EVP_MD * from other functions and use the empty string hash at the appropriate places. ok beck@ tb@
2018-11-09Use "send" and "recv" consistently instead of mixing them with "read"tb1-98/+108
and "write". Use self-documenting C99 initializers. ok bcook, jsing
2018-11-09Initialize priv_key and pub_key on first use instead of at the top.tb1-6/+4
While there, eliminate a flag that was only used once. ok beck jsing mestre
2018-11-09Initialize priv_key and pub_key on first use instead of at the top.tb1-4/+4
ok beck jsing mestre
2018-11-09The Botan library from ports an be configured to use OpenSSL orbluhm2-1/+22
LibreSSL as crypto provider. When we run their regression tests, we are actually testing our library. This is far from perfect. A lot of LibreSSL features have not been implemented as Botan provider. Even if provider openssl is specified, botan-test runs a lot of non-openssl tests. This can be improved later.
2018-11-09Avoid dereferencing eckey before checking it for NULL.tb1-5/+6
CID 184282 ok beck jsing mestre
2018-11-09remove the not yet implemented "handshake" subdirectorytb1-2/+1
2018-11-09Add subdirectires with SUBDIR += instead of a single assignment withtb3-67/+65
line continuations.
2018-11-09Remove ethers(5) YP support bits from libc as it makes it difficult tobrynet2-70/+8
effectively use pledge(2) in some programs. approval from many, thanks! idea by & ok deraadt@
2018-11-09Ensure we free the handshake transcript upon session resumption.jsing1-1/+4
Found the hard way by jmc@ ok tb@
2018-11-09The cert subdir is testing all combinations of certificate validation.bluhm11-48/+244
Having the three libraries, client and server certificates, missing or invalid CA or certificates, and enforcing peer certificate results in 1944 new test cases.
2018-11-09Ensure we only choose sigalgs from our prefernce list, not the whole listbeck4-10/+19
ok jsing@
2018-11-09Add the ability to have a separate priority list for sigalgs.beck4-12/+43
Add a priority list for tls 1.2 ok jsing@
2018-11-09Correct defines for writer tests in connect/accept loops.jsing1-3/+3
ok tb@
2018-11-09Correct function naming for tls13_handshake_advance_state_machine().jsing1-4/+2
ok tb@
2018-11-09Avoid leak: free existing SRTP connection profiles beforetb1-1/+2
setting it. From Ben L <bobsayshilol () live ! co ! uk>.
2018-11-09Avoid leaking memory that was already allocated in ASN1_item_new().tb1-5/+1
From Ben L <bobsayshilol () live ! co ! uk>
2018-11-09Fix a buffer overrun in asn1_parse2().tb1-4/+7
From Ben L bobsayshilol () live ! co ! uk Similar fixes in BoringSSL and OpensSSL.
2018-11-09In verbose mode netcat reports to stderr when the listen systembluhm1-16/+29
call has finished. This allows to write race free scripts as they can check that the server is up and running. OK sthen@ tb@
2018-11-09Add const to the data argument of ASN1_set{,_int}_octetstring().tb2-6/+6
From Ben L bobsayshilol () live ! co ! uk ok jsing
2018-11-09Add header guards and hidden declarations.jsing2-2/+19
2018-11-09Add header guards and hidden declarations.jsing1-1/+10
2018-11-09Reimplement the sigalgs processing code into a new implementationbeck9-253/+340
that will be usable with TLS 1.3 with less eye bleed. ok jsing@ tb@
2018-11-08First skeleton of the TLS 1.3 state machine. Based on RFC 8446 andtb3-4/+607
inspired by s2n's state machine. Lots of help and input from jsing. ok beck, jsing
2018-11-08KNFbeck1-3/+4
2018-11-08Clean up and simplify the handshake transcript code.jsing10-166/+144
This provides a cleaner, simpler and more readable API, with code that uses a BUF_MEM instead of a BIO. ok beck@ ("hurry up") and tb@.
2018-11-08Add missing NULL checks on allocation, style(9) and consistently usejsing1-35/+34
goto err instead of handrolling.
2018-11-08Add missing BN_free() calls.jsing1-1/+3
From Ben L <bobsayshilol at live dot co dot uk>.
2018-11-08Use ASN1_TYPE_new()/ASN1_TYPE_free() to avoid leaking memory.jsing1-12/+17
From Ben L <bobsayshilol at live dot co dot uk>.
2018-11-08Stop pretending that a cert member in a SSL and SSL_CTX can be NULL.jsing8-121/+18
ok beck@ tb@
2018-11-08Move #include <openssl/evp.h> to the header.tb2-3/+4
discussed with beck and jsing
2018-11-08Ensure the handshake transcript is cleaned up.jsing2-3/+20
Add a check at the completion of the client/server handshake to ensure that the handshake transcript has been freed. Fix the case where a server asks the client for a certificate, but it does not have one, resulting in the handshake transcript being left around post-handshake. ok bcook@ tb@
2018-11-08Remove some function prototypes that should have been removed in thejsing1-10/+2
previous clean up. Spotted by bcook@
2018-11-08LibreSSL 2.9.0bcook1-3/+3
2018-11-08zap last remains of malloc.conf; prompted by and ok jmc@otto1-6/+6
2018-11-07Use in-place (un)wrapping in the keywrap tests.tb1-5/+8
2018-11-07Add in key_schedule regress tests to regress buildbeck1-1/+2
2018-11-07Add a self test for each SSL library by connecting client withbluhm5-23/+88
server. Check that the highest available TLS version is selected. LibreSSL TLS 1.3 check is disabled until the feature becomes available.
2018-11-07Add initial TLS 1.3 key schedule support with basic regress testsbeck5-2/+685
ok jsing@ tb@
2018-11-07Add interop test with OpenSSL 1.1. TLS 1.3 should be used automaticallybluhm5-10/+55
when it becomes available in LibreSSL. thanks to sthen@ for the new OpenSSL port