summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/ssl/ssltest.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* ssltest: drop another use of CRYPTO_mem_leaks()tb2024-03-011-2/+1
|
* Remove last OPENSSL_NO_ENGINE from libssl regresstb2023-11-191-7/+1
|
* Avoid memcmp() with NULL pointer and 0 lengthtb2023-08-151-3/+3
|
* Prepare the ssltest for the upcoming bumptb2023-07-271-1/+8
| | | | | | | This is a hack. The test is in rather poor shape and it is hard to tell whether it still does what it is supposed to be doing. Hopefully somemone will rewrite this in a style that doesn't make me squeal on opening this file...
* Plug leak in the ssltesttb2023-07-041-1/+2
| | | | | | | | Removing -tls1 moved some tests from the legacy stack to the TLSv1.3 stack. On a HRR, the alpn callback would be called twice and allocate the global twice, thereby leaking. So free it up front. Joint suffering with bcook and beck
* Disable TLS 1.0 and TLS 1.1 in libsslbeck2023-07-021-8/+8
| | | | | | | | | | | | Their time has long since past, and they should not be used. This change restricts ssl to versions 1.2 and 1.3, and changes the regression tests to understand we no longer speak the legacy protocols. For the moment the magical "golden" byte for byte comparison tests of raw handshake values are disabled util jsing fixes them. ok jsing@ tb@
* ssltest: Drop more policy go from this test.tb2023-04-151-357/+21
| | | | Hopefully that is all. What an absolutely horrid mess.
* ssltest: initial pass of dropping proxy cert gootb2023-04-151-89/+1
|
* Sync function prototypes and declarations to satisfy clang 15.anton2023-02-021-3/+3
| | | | ok jsing@
* Make internal header file names consistenttb2022-11-261-2/+2
| | | | | | | | | | | | | | | | Libcrypto currently has a mess of *_lcl.h, *_locl.h, and *_local.h names used for internal headers. Move all these headers we inherited from OpenSSL to *_local.h, reserving the name *_internal.h for our own code. Similarly, move dtls_locl.h and ssl_locl.h to dtls_local and ssl_local.h. constant_time_locl.h is moved to constant_time.h since it's special. Adjust all .c files in libcrypto, libssl and regress. The diff is mechanical with the exception of tls13_quic.c, where #include <ssl_locl.h> was fixed manually. discussed with jsing, no objection bcook
* Make the ssltest security level aware.tb2022-07-071-1/+9
| | | | From beck
* Switch ssltest to using the newly generated certs that use SHA-256 insteadtb2022-07-071-5/+3
| | | | | | of SHA-1. This helps the switch to security-level aware ssltest. From jsing
* Prepare ssltest for opaque DHtb2021-11-211-18/+39
|
* Fix ssltest to work with opaque EVP_PKEY.tb2021-11-181-22/+33
|
* Make this test compile again after the damage done in libcryptotb2021-10-311-19/+20
|
* Pull in ssl_locl.h so that we can keep reaching into libssl internals.jsing2021-10-151-0/+2
|
* ssltest.c does not need param.htb2021-10-131-1/+0
| | | | From Jonas Termansen
* Garbage collect do_test_cipherlist().jsing2021-07-031-45/+0
| | | | | This code no longer compiles and the equivalent test coverage has been added to regress/lib/libssl/ciphers (and is actually run).
* Disable some code that reaches into libssl internals.jsing2021-06-301-0/+7
| | | | This should be moved to a dedicated regress test.
* Add a -tls1_2 option so we can force TLSv1.2 for testing.jsing2020-07-141-5/+9
|
* Remove temporary RSA keys/callbacks code.jsing2020-07-071-43/+0
| | | | This was removed from libssl a very long time ago...
* exitting -> exitingtb2019-04-071-1/+1
| | | | From Michael Scovetta, PR #108
* Add automatic threading initialization for libcrypto.bcook2018-11-111-56/+0
| | | | | | | | | | | | | | This implements automatic thread support initialization in libcrypto. This does not remove any functions from the ABI, but does turn them into no-ops. Stub implementations of pthread_mutex_(init|lock|unlock) are provided for ramdisks. This does not implement the new OpenSSL 1.1 thread API internally, keeping the original CRYTPO_lock / CRYPTO_add_lock functions for library locking. For -portable, crypto_lock.c can be reimplemented with OS-specific primitives as needed. ok beck@, tb@, looks sane guenther@
* Remove NPN test coverage.jsing2017-08-121-117/+1
|
* Treat "ERROR in STARTUP" as an actual error, rather than failing withoutjsing2017-03-041-2/+2
| | | | | | | exiting non-zero (which has been masking a DTLS related issue). Also make the message consistent with other errors. Spotted by inogochi@
* Remove commented out code and fix indentation of surrounding statements.jsing2017-03-041-12/+5
|
* Remove handling for SSLv2.jsing2017-03-041-14/+3
|
* Use prime256v1 for tests unless otherwise specified.jsing2017-01-241-4/+0
|
* remove e_os2.h includesbcook2015-09-131-1/+0
| | | | ok jsing@
* Remove SSLv3 support from LibreSSL regression tests.doug2015-08-271-22/+3
|
* Reject DH keys sent by a server if they are considered too small; inspiredmiod2015-03-081-38/+4
| | | | | by a similar BoringSSL change, but raising the limit to 1024 bits. ok jsing@ markus@ guenther@ deraadt@
* unifdef OPENSSL_NO_NEXTPROTONEGjsing2014-12-141-12/+0
|
* Add regress for ALPN.jsing2014-12-101-1/+161
| | | | Based on OpenSSL.
* The -ssl2 flag does nothing - remove the flag and any tests that werejsing2014-12-061-5/+3
| | | | using it.
* Remove _XOPEN_SOURCE_EXTENDED since we're not too concerned aboutjsing2014-10-131-9/+2
| | | | gethostname being declared properly on Compaq platforms that use DEC C...
* BIO_free() and SSL_CTX_free() have explicit NULL checks, so there is nojsing2014-10-131-29/+16
| | | | need to have additional checks here.
* Add NPN regress tests from OpenSSL. However, unlike OpenSSL, actually exitjsing2014-10-131-2/+133
| | | | with a failure if the NPN verification fails.
* More KNF.jsing2014-07-121-95/+108
|
* Remove #ifndefs for OPENSSL_NO_DH, OPENSSL_NO_ECDH andjsing2014-07-121-41/+0
| | | | | OPENSSL_NO_X509_VERIFY. We're not going to build with these and the same removal has already been done for libssl.
* Remove PSK from the ssl regress.jsing2014-07-111-118/+1
|
* Uncompress ssltest.jsing2014-07-101-50/+0
|
* Add DTLS support to ssltest and wire up some regress tests.jsing2014-06-211-7/+12
| | | | ok miod@
* Remove support for the `opaque PRF input' extension, which draft has expiredmiod2014-06-131-32/+0
| | | | | | | | 7 years ago and never made it into an RFC. That code wasn't compiled in anyway unless one would define the actual on-the-wire extension id bytes; crank libssl major. With help and enlightenment from Brendan MacDonell.
* Build with WARNINGS=Yes and Werror.miod2014-06-011-11/+1
|
* Move ssltest.c to a regress test.jsing2014-05-241-0/+2211