summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/client (follow)
Commit message (Collapse)AuthorAgeFilesLines
* I accidentally zeored out a few bytes of the TLSv1.0 session ID.tb2020-08-111-1/+1
| | | | Restore them to their previous values.
* Update golden values to match P-521 being enabled by default in the client.jsing2020-08-091-20/+21
| | | | Diff from tb@
* Minor code improvements.jsing2020-04-061-3/+3
|
* Add tests that cover TLSv1.2 and disable those that trigger TLSv1.3.jsing2020-04-061-3/+32
| | | | This allows the test to pass again.
* Zero the client random field in the TLSv1.2 golden value.jsing2020-04-061-5/+5
|
* Improve comparision with test data.jsing2020-04-061-7/+9
| | | | | | First check the client random against the zeroed value, then zero the client random in the client hello, before comparing with the golden value. This makes failures more obvious and the test code more readable.
* Dump the test data when the lengths differ in order to aid debugging.jsing2020-04-061-0/+3
|
* Use errx() if we fail to build the client hello.jsing2020-04-061-1/+1
|
* Nuke trailing whitespace that is annoying before changing things in herebeck2019-11-261-6/+6
|
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-241-13/+11
| | | | | Remove GOST based sigalgs from TLS 1.2 since they don't work with TLS 1.2. ok jsing@
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-231-15/+16
| | | | | | | | | | - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2. - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 from a 1.3 handshake. ok jsing@ tb@
* revert previous, accidentally contained another diff in additionbeck2019-01-231-16/+15
| | | | to the one I intended to commit
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-231-15/+16
| | | | | | | | | - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2 - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 ok jsing@ tb@
* Update regress for DES cipher suite removal.jsing2018-06-021-46/+40
|
* Zero the client random so that it is easier to spot unintended differences.jsing2018-06-021-0/+1
|
* Update due to removal of original chacha20-poly1305 cipher suites.jsing2017-08-281-42/+39
|
* Update the TLSv1.2 Client Hello messages, due to the removal of DSAjsing2017-08-121-20/+18
| | | | sigalgs.
* Revise cipher suites in regress to match DSS cipher suite removal.jsing2017-05-071-96/+82
|
* Update client tests for changes in default EC formats/curves.jsing2017-01-241-52/+31
|
* Update regress for ECDHE with X25519.jsing2016-12-211-41/+41
|
* Update regress for IDEA cipher suite removal.jsing2016-11-061-83/+83
|
* Update client hello messages to follow the removal of fixed ECDH.jsing2016-10-191-89/+65
|
* Update regress test to reflect changes in the cipher list.jsing2016-04-281-61/+62
|
* Revise regression test so that it works correctly with AES taking priorityjsing2015-09-131-34/+191
| | | | if hardware acceleration is available.
* Add an initial TLS client regress, which currently covers ClientHellojsing2015-09-012-0/+367
message generation.