summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/client (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Update for OPENSSL_cpu_caps() now being machine independent.jsing2024-08-311-6/+2
|
* Fix golden numbers after beck broke it months agotb2024-07-202-23/+20
| | | | (why is it always me who gets to clean up this shit?)
* Instead of unhooking libssl/client regress tests, flag them as expectedanton2024-04-221-1/+4
| | | | | | to fail. ok tb@
* Remove GOST and STREEBOG support from libssl.beck2024-02-031-116/+110
| | | | | | | | | | | | | | | | | | This version of GOST is old and not anywhere close to compliant with modern GOST standards. It is also very intrusive in libssl and makes a mess everywhere. Efforts to entice a suitably minded anyone to care about it have been unsuccessful. At this point it is probably best to remove this, and if someone ever showed up who truly needed a working version, it should be a clean implementation from scratch, and have it use something closer to the typical API in libcrypto so it would integrate less painfully here. This removes it from libssl in preparation for it's removal from libcrypto with a future major bump ok tb@
* Fix last bit of the clienttest, needs ssl_pkt.c r1.66tb2023-07-111-2/+2
|
* Fix most of the clienttest. With this only test cases 9 and 13 fail.tb2023-07-111-23/+39
|
* Fix the client test and the tlsext test to work with randomizedtb2023-04-232-3/+10
| | | | | TLS extensions (this involves unrandomizing the extension order for the tests that rely on golden numbers.
* zap trailing spacestb2022-07-191-2/+2
|
* Regenerate golden numbers due to RC4-MD5 now being disabled by default.tb2022-07-191-61/+58
|
* More %i vs %d cleanuptb2022-06-101-3/+3
|
* Use BIO_up_ref() instead of adjusting refcounts manuallytb2021-11-201-9/+3
|
* Revert accidental committb2021-08-302-4/+4
|
* link verify regress tests to buildtb2021-08-302-4/+4
|
* Add test coverage for TLSv1.3 client hellos.jsing2021-06-271-13/+166
| | | | | | This is a little bit clunky due to the number of things that vary (largely thanks to middlebox compatibility mode, along with the versions and key share extensions), however it works and can be improved at a later date.
* Add test coverage for DTLSv1.2 client hellos.jsing2021-06-271-7/+102
|
* Teach hexdump() how to identify differing bytes.jsing2021-06-271-9/+13
| | | | | This allows differences between the received data and the test data to be more readily identified.
* More appropriately set cipher_list_len when AES acceleration is available.jsing2021-06-271-5/+6
|
* Tweak some data types and sprinkle some const.jsing2021-06-271-15/+15
|
* Update DTLS client hello due to ECC changes.jsing2021-02-081-5/+8
|
* Avoid NULL deref on BIO_new{_mem_buf,}() failure.tb2021-01-221-3/+5
|
* $OpenBSD$tb2020-11-191-0/+1
|
* I accidentally zeored out a few bytes of the TLSv1.0 session ID.tb2020-08-111-1/+1
| | | | Restore them to their previous values.
* Update golden values to match P-521 being enabled by default in the client.jsing2020-08-091-20/+21
| | | | Diff from tb@
* Minor code improvements.jsing2020-04-061-3/+3
|
* Add tests that cover TLSv1.2 and disable those that trigger TLSv1.3.jsing2020-04-061-3/+32
| | | | This allows the test to pass again.
* Zero the client random field in the TLSv1.2 golden value.jsing2020-04-061-5/+5
|
* Improve comparision with test data.jsing2020-04-061-7/+9
| | | | | | First check the client random against the zeroed value, then zero the client random in the client hello, before comparing with the golden value. This makes failures more obvious and the test code more readable.
* Dump the test data when the lengths differ in order to aid debugging.jsing2020-04-061-0/+3
|
* Use errx() if we fail to build the client hello.jsing2020-04-061-1/+1
|
* Nuke trailing whitespace that is annoying before changing things in herebeck2019-11-261-6/+6
|
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-241-13/+11
| | | | | Remove GOST based sigalgs from TLS 1.2 since they don't work with TLS 1.2. ok jsing@
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-231-15/+16
| | | | | | | | | | - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2. - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 from a 1.3 handshake. ok jsing@ tb@
* revert previous, accidentally contained another diff in additionbeck2019-01-231-16/+15
| | | | to the one I intended to commit
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-231-15/+16
| | | | | | | | | - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2 - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 ok jsing@ tb@
* Update regress for DES cipher suite removal.jsing2018-06-021-46/+40
|
* Zero the client random so that it is easier to spot unintended differences.jsing2018-06-021-0/+1
|
* Update due to removal of original chacha20-poly1305 cipher suites.jsing2017-08-281-42/+39
|
* Update the TLSv1.2 Client Hello messages, due to the removal of DSAjsing2017-08-121-20/+18
| | | | sigalgs.
* Revise cipher suites in regress to match DSS cipher suite removal.jsing2017-05-071-96/+82
|
* Update client tests for changes in default EC formats/curves.jsing2017-01-241-52/+31
|
* Update regress for ECDHE with X25519.jsing2016-12-211-41/+41
|
* Update regress for IDEA cipher suite removal.jsing2016-11-061-83/+83
|
* Update client hello messages to follow the removal of fixed ECDH.jsing2016-10-191-89/+65
|
* Update regress test to reflect changes in the cipher list.jsing2016-04-281-61/+62
|
* Revise regression test so that it works correctly with AES taking priorityjsing2015-09-131-34/+191
| | | | if hardware acceleration is available.
* Add an initial TLS client regress, which currently covers ClientHellojsing2015-09-012-0/+367
message generation.