summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/interop/cert (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Retire OpenSSL 1.0.2 interoptb2023-02-011-5/+2
| | | | | | Now that the OpenSSL 1.0.2 port is gone, there's no need to keep the interop tests anymore. anton's and bluhm's regress tests will switch to testing interoperability with OpenSSL 3.0.
* Add openssl 3.0 interop teststb2023-01-271-2/+5
| | | | | | | | | | The plan is to retire the 1.0.2 interop tests soon so as to be able to drop the dead and dangerous OpenSSL 1.0.2 port. The cert part is extremely slow on arm64: the whole interop test on an m1 is about 10x slower (~45 min!) than on a modern amd64 laptop, so people running regress may want to wait a bit with adding OpenSSL 3 to their test boxes until this is sorted out.
* Make Bob happy.bluhm2021-09-031-1/+5
|
* Remove echo headlines.bluhm2020-12-171-2/+1
|
* 1) Move the interop tests to the end so we see tlsfuzzer firstbeck2020-09-211-1/+5
| | | | | | | | | | 2) Reorder the interop tests so the really slow "cert" test is at the end 3) Change the cert tests to use REGRESS_SLOW_TARGETS when testing combination of client and server that does not involve libressl. This way we can skip testing openssl to openssl11 when running these manually by setting REGRESS_SKIP_SLOW to "yet" in mk.conf ok jsing@
* Test that all supported TLS ciphers actually work. Establishbluhm2019-02-211-1/+7
| | | | | | connections between client and server implemented with LibreSSL or OpenSSL with a fixed cipher on each side. Check the used cipher in the session print out.
* Fix a race in libssl interop regress. The success messages frombluhm2018-11-111-2/+3
| | | | | the server child could be delayed. In this case wait a second and check again.
* Reorganize libssl interop tests. Move netcat tests into separatebluhm2018-11-111-18/+25
| | | | | directory. Keep all log files for easier debugging. Name regress target names consistently.
* The cert subdir is testing all combinations of certificate validation.bluhm2018-11-091-0/+70
Having the three libraries, client and server certificates, missing or invalid CA or certificates, and enforcing peer certificate results in 1944 new test cases.