summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/ssl (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Sync function prototypes and declarations to satisfy clang 15.anton2023-02-021-3/+3
| | | | ok jsing@
* Make internal header file names consistenttb2022-11-261-2/+2
| | | | | | | | | | | | | | | | Libcrypto currently has a mess of *_lcl.h, *_locl.h, and *_local.h names used for internal headers. Move all these headers we inherited from OpenSSL to *_local.h, reserving the name *_internal.h for our own code. Similarly, move dtls_locl.h and ssl_locl.h to dtls_local and ssl_local.h. constant_time_locl.h is moved to constant_time.h since it's special. Adjust all .c files in libcrypto, libssl and regress. The diff is mechanical with the exception of tls13_quic.c, where #include <ssl_locl.h> was fixed manually. discussed with jsing, no objection bcook
* Use the security level knob in the test script.tb2022-07-071-2/+14
| | | | from beck
* Make the ssltest security level aware.tb2022-07-071-1/+9
| | | | From beck
* Switch ssltest to using the newly generated certs that use SHA-256 insteadtb2022-07-072-8/+6
| | | | | | of SHA-1. This helps the switch to security-level aware ssltest. From jsing
* Prepare ssltest for opaque DHtb2021-11-211-18/+39
|
* Fix ssltest to work with opaque EVP_PKEY.tb2021-11-181-22/+33
|
* Make this test compile again after the damage done in libcryptotb2021-10-311-19/+20
|
* Pull in ssl_locl.h so that we can keep reaching into libssl internals.jsing2021-10-152-1/+4
|
* ssltest.c does not need param.htb2021-10-131-1/+0
| | | | From Jonas Termansen
* Garbage collect do_test_cipherlist().jsing2021-07-031-45/+0
| | | | | This code no longer compiles and the equivalent test coverage has been added to regress/lib/libssl/ciphers (and is actually run).
* Disable some code that reaches into libssl internals.jsing2021-06-301-0/+7
| | | | This should be moved to a dedicated regress test.
* Force TLSv1.2 when testing SSLv3/TLSv1.2 cipher suites.jsing2020-07-141-1/+1
| | | | Otherwise we end up switching to TLSv1.3 and using a TLSv1.3 cipher suite.
* Add a -tls1_2 option so we can force TLSv1.2 for testing.jsing2020-07-141-5/+9
|
* Remove temporary RSA keys/callbacks code.jsing2020-07-071-43/+0
| | | | This was removed from libssl a very long time ago...
* Test TLSv1.3 ciphersuites now that TLS_method() supports TLSv1.3.jsing2020-07-071-0/+12
|
* Revise test to handle the fact that TLSv1.3 cipher suites are now beingjsing2020-04-091-2/+4
| | | | included in the output from `openssl ciphers`.
* Test both SSLv3 (aka pre-TLSv1.2) and TLSv1.2 cipher suites with TLS.jsing2020-04-091-1/+1
|
* exitting -> exitingtb2019-04-071-1/+1
| | | | From Michael Scovetta, PR #108
* Add automatic threading initialization for libcrypto.bcook2018-11-111-56/+0
| | | | | | | | | | | | | | This implements automatic thread support initialization in libcrypto. This does not remove any functions from the ABI, but does turn them into no-ops. Stub implementations of pthread_mutex_(init|lock|unlock) are provided for ramdisks. This does not implement the new OpenSSL 1.1 thread API internally, keeping the original CRYTPO_lock / CRYPTO_add_lock functions for library locking. For -portable, crypto_lock.c can be reimplemented with OS-specific primitives as needed. ok beck@, tb@, looks sane guenther@
* Remove NPN test coverage.jsing2017-08-122-129/+1
|
* Treat "ERROR in STARTUP" as an actual error, rather than failing withoutjsing2017-03-041-2/+2
| | | | | | | exiting non-zero (which has been masking a DTLS related issue). Also make the message consistent with other errors. Spotted by inogochi@
* Remove commented out code and fix indentation of surrounding statements.jsing2017-03-041-12/+5
|
* Remove handling for SSLv2.jsing2017-03-041-14/+3
|
* Use prime256v1 for tests unless otherwise specified.jsing2017-01-241-4/+0
|
* check if openssl(1) actually works before proceedingbcook2015-09-271-0/+2
| | | | | It was possible for this test to pass even if the openssl command itself was missing.
* remove e_os2.h includesbcook2015-09-131-1/+0
| | | | ok jsing@
* Remove SSLv3 support from LibreSSL regression tests.doug2015-08-272-52/+5
|
* Reject DH keys sent by a server if they are considered too small; inspiredmiod2015-03-081-38/+4
| | | | | by a similar BoringSSL change, but raising the limit to 1024 bits. ok jsing@ markus@ guenther@ deraadt@
* unifdef OPENSSL_NO_NEXTPROTONEGjsing2014-12-141-12/+0
|
* Increase cipher suite test coverage by including all cipher suites thatjsing2014-12-121-5/+5
| | | | use RSA authentication, rather than only those that use RSA key exchange.
* Add regress for ALPN.jsing2014-12-102-1/+180
| | | | Based on OpenSSL.
* The -ssl2 flag does nothing - remove the flag and any tests that werejsing2014-12-062-34/+4
| | | | using it.
* Allow overriding the path to the testssl and openssl binaries.bcook2014-12-031-9/+9
| | | | | | | This is needed by the portable tree to point directly to the newly-built binaries when running unit tests. discussed with jsing@ and others
* Remove _XOPEN_SOURCE_EXTENDED since we're not too concerned aboutjsing2014-10-131-9/+2
| | | | gethostname being declared properly on Compaq platforms that use DEC C...
* BIO_free() and SSL_CTX_free() have explicit NULL checks, so there is nojsing2014-10-131-29/+16
| | | | need to have additional checks here.
* Add NPN regress tests from OpenSSL. However, unlike OpenSSL, actually exitjsing2014-10-132-3/+146
| | | | with a failure if the NPN verification fails.
* More KNF.jsing2014-07-121-95/+108
|
* Remove #ifndefs for OPENSSL_NO_DH, OPENSSL_NO_ECDH andjsing2014-07-121-41/+0
| | | | | OPENSSL_NO_X509_VERIFY. We're not going to build with these and the same removal has already been done for libssl.
* Remove PSK from the ssl regress.jsing2014-07-112-134/+1
|
* Uncompress ssltest.jsing2014-07-101-50/+0
|
* Include -DLIBRESSL_INTERNAL in regress makefiles.jsing2014-07-081-2/+2
| | | | ok miod@
* Add DTLS support to ssltest and wire up some regress tests.jsing2014-06-212-8/+41
| | | | ok miod@
* Remove support for the `opaque PRF input' extension, which draft has expiredmiod2014-06-131-32/+0
| | | | | | | | 7 years ago and never made it into an RFC. That code wasn't compiled in anyway unless one would define the actual on-the-wire extension id bytes; crank libssl major. With help and enlightenment from Brendan MacDonell.
* Build with WARNINGS=Yes and Werror.miod2014-06-012-12/+4
|
* Move ssltest.c to a regress test.jsing2014-05-243-0/+2386