summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/interop/openssl (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Retire OpenSSL 1.0.2 interoptb2023-02-011-43/+0
| | | | | | Now that the OpenSSL 1.0.2 port is gone, there's no need to keep the interop tests anymore. anton's and bluhm's regress tests will switch to testing interoperability with OpenSSL 3.0.
* Tell testers which packages to install right away (and why)kn2021-12-021-1/+2
| | | | | | | Other regress tests do it differently; just fix/thouch those that did not mention any package name at all. This helps grepping logs for SKIPPED to find instructions for the next run.
* Remove echo headlines.bluhm2020-12-171-4/+1
|
* Do not fail with obscure error messages on 'make'tb2020-10-291-2/+4
| | | | | | | | | | | Fix some tests that fail with obscure error messages on 'make' if the required package (either version of OpenSSL or Botan 2) isn't installed. This can be avoided by doing 'make regress' instead. I'll try to adjust my finger memory for the many tests outside the LibreSSL tree that have the same "problem". The fix here is unintrusive and I've been wasting enough time with this to want to change it. ok bluhm
* Reorganize libssl interop tests. Move netcat tests into separatebluhm2018-11-111-14/+11
| | | | | directory. Keep all log files for easier debugging. Name regress target names consistently.
* Regress client and server can do session reuse now. Test this withbluhm2018-11-101-2/+2
| | | | | all combinations of LibreSSL, OpenSSL 1.0.2, and OpenSSL 1.1. It is currently disabled for TLS 1.3 as this needs more setup.
* The cert subdir is testing all combinations of certificate validation.bluhm2018-11-091-1/+8
| | | | | | Having the three libraries, client and server certificates, missing or invalid CA or certificates, and enforcing peer certificate results in 1944 new test cases.
* Add a self test for each SSL library by connecting client withbluhm2018-11-071-3/+10
| | | | | | server. Check that the highest available TLS version is selected. LibreSSL TLS 1.3 check is disabled until the feature becomes available.
* Print SSLeay, OpenSSL, and LibreSSL version strings. Make clientbluhm2018-11-071-1/+6
| | | | | and server compile with OpenSSL 1.1. Check runtime version string of SSL library.
* Test TLS interoperability between LibreSSL and OpenSSL.bluhm2018-11-071-0/+27
Implement simple SSL client and server in C. Create four binaries by linking them with LibreSSL or OpenSSL. This way API compatibility is tested. Connect and accept with netcat to test protocol compatibility with libtls. Currently OpenSSL 1.0.2p from ports is used. Plan is to move to OpenSSL 1.1 and and test TLS 1.3. idea from beck@; help from jsing@