summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/interop/cipher (follow)
Commit message (Collapse)AuthorAgeFilesLines
* 1) Move the interop tests to the end so we see tlsfuzzer firstbeck2020-09-211-1/+9
| | | | | | | | | | 2) Reorder the interop tests so the really slow "cert" test is at the end 3) Change the cert tests to use REGRESS_SLOW_TARGETS when testing combination of client and server that does not involve libressl. This way we can skip testing openssl to openssl11 when running these manually by setting REGRESS_SKIP_SLOW to "yet" in mk.conf ok jsing@
* If CPU does not support AES-NI, LibreSSL TLS 1.3 client prefersbluhm2020-09-121-9/+18
| | | | chacha-poly over aes-gcm. Expect both fallbacks for non 1.3 ciphers.
* Enable cert and cipher interop tests. cert just works. cipher hasbluhm2020-09-111-50/+31
| | | | | | | | been fixed to work with libressl TLS 1.3. Both libressl and openssl11 replace obsolete TLS 1.2 ciphers with AEAD-AES256-GCM-SHA384 or TLS_AES_256_GCM_SHA384 in TLS 1.3 respectively. The test expects that now. Currently GOST does not work with libressl and TLS 1.3 and is disabled.
* Enable GOST cipher selection test after libssl has been fixed.bluhm2019-03-281-6/+1
|
* Fix typo in usage and comment.bluhm2019-03-211-2/+2
|
* Test that all supported TLS ciphers actually work. Establishbluhm2019-02-211-0/+180
connections between client and server implemented with LibreSSL or OpenSSL with a fixed cipher on each side. Check the used cipher in the session print out.