Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Revise for changes to tls_key_share_peer_public() | jsing | 2022-01-11 | 1 | -2/+4 |
| | |||||
* | Revise for change to tls_key_share_peer_public() | jsing | 2022-01-06 | 1 | -3/+2 |
| | |||||
* | Revise for tls13_key_share rename. | jsing | 2022-01-05 | 1 | -11/+11 |
| | |||||
* | One more leak of the same kind | tb | 2021-12-29 | 1 | -2/+2 |
| | |||||
* | Plug memleak | tb | 2021-12-29 | 1 | -3/+3 |
| | | | | CID 345160 | ||||
* | Add regress that calls SSL_set_tlsext_host_name() with a NULL host name. | jsing | 2021-11-02 | 1 | -1/+15 |
| | |||||
* | Rework SNI hostname regress to be table driven. | jsing | 2021-11-01 | 1 | -62/+147 |
| | | | | | | | Also adjust for the changes to tlsext_sni_is_valid_hostname() and include tests for IPv4 and IPv6 literals. ok beck@ | ||||
* | Free memory on text exit to make asan quieter | beck | 2021-10-26 | 1 | -53/+83 |
| | | | | ok tb@ | ||||
* | Revise regress for removal of SSL_SESSION_INTERNAL. | jsing | 2021-10-26 | 1 | -27/+27 |
| | |||||
* | The server only sends a cookie during a HRR, not a SH | tb | 2021-03-24 | 1 | -4/+4 |
| | |||||
* | Update regress for new_cipher rename. | jsing | 2021-03-24 | 1 | -4/+4 |
| | |||||
* | Revise regress to match handshake struct changes. | jsing | 2021-03-21 | 1 | -18/+18 |
| | |||||
* | Revise TLS extension regress to match version handling changes. | jsing | 2021-03-10 | 1 | -57/+25 |
| | |||||
* | No longer need to cast away const in srtp_find_profile_by_name() | tb | 2020-10-11 | 1 | -2/+2 |
| | |||||
* | Unbreak regress following SRTP_PROTECTION_PROFILE const change. | jsing | 2020-10-11 | 1 | -2/+2 |
| | |||||
* | Update golden values to match P-521 being enabled by default in the client. | jsing | 2020-08-09 | 1 | -10/+11 |
| | |||||
* | tlsexttest: pass message type to the extension functions | tb | 2020-07-03 | 1 | -144/+144 |
| | | | | ok beck jsing | ||||
* | adjust tlsexttest to new argument order | tb | 2020-07-03 | 1 | -5/+5 |
| | |||||
* | Previous commit caught a few errx() cases by accident. undo them. | tb | 2020-05-24 | 1 | -25/+25 |
| | |||||
* | include newlines in FAIL messages | tb | 2020-05-24 | 1 | -108/+108 |
| | |||||
* | address some nits from jsing | tb | 2020-05-24 | 1 | -7/+11 |
| | |||||
* | Enforce that SNI hostnames be correct as per rfc 6066 and 5980. | beck | 2020-05-23 | 1 | -1/+79 |
| | | | | | | | Correct SNI alerts to differentiate between illegal parameter and an unknown name. ok tb@` | ||||
* | Revise regress for TLSv1.3 server being enabled. | jsing | 2020-05-11 | 1 | -5/+8 |
| | |||||
* | Update key share regress to match previous change. | jsing | 2020-04-17 | 1 | -4/+4 |
| | |||||
* | Reset the key share so that we do not have an existing peer public key. | jsing | 2020-02-05 | 1 | -1/+7 |
| | |||||
* | Tweak regress to match change made to tls13_key_share_peer_public(). | jsing | 2020-02-01 | 1 | -2/+1 |
| | |||||
* | Revise for TLSv1.3 key share changes. | jsing | 2020-01-30 | 1 | -8/+27 |
| | |||||
* | server sigalgs test is now bogus, disable for now | beck | 2020-01-26 | 1 | -2/+3 |
| | |||||
* | It has been called to my attention that the cookie monster ascii art | beck | 2019-11-10 | 1 | -17/+7 |
| | | | | | | | | | in this test which I had obtained from a site purporting it to be free for use with artist attribtion might not be. After looking at at some other muppett ascii art for inspiration I am replacing this with my own ascii art muppet to replace the previously used cookie monster. The copyright for the art is the same as my code. | ||||
* | Update regress following sigalgs changes. | jsing | 2019-03-25 | 1 | -17/+1 |
| | |||||
* | Use malloc() and memcpy() the test X25519 x25519_peer_public value. | jsing | 2019-02-03 | 1 | -3/+6 |
| | | | | | | | Otherwise, if tlsext_keyshare_server_build() fails we call free with a pointer to static memory and bad things happen. Reported by bcook@ | ||||
* | Add server side of versions, keyshare, and client and server of cookie | beck | 2019-01-24 | 1 | -6/+435 |
| | | | | | | | | extensions for tls1.3. versions is currently defanged to ignore its result until tls13 server side wired in full, so that server side code still works today when we only support tls 1.2 ok bcook@ tb@ jsing@ | ||||
* | Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated. | beck | 2019-01-24 | 1 | -18/+10 |
| | | | | | Remove GOST based sigalgs from TLS 1.2 since they don't work with TLS 1.2. ok jsing@ | ||||
* | Modify sigalgs extension processing to accomodate TLS 1.3. | beck | 2019-01-23 | 1 | -10/+12 |
| | | | | | | | | | | - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2. - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 from a 1.3 handshake. ok jsing@ tb@ | ||||
* | revert previous, accidentally contained another diff in addition | beck | 2019-01-23 | 1 | -12/+10 |
| | | | | to the one I intended to commit | ||||
* | Modify sigalgs extension processing for TLS 1.3. | beck | 2019-01-23 | 1 | -10/+12 |
| | | | | | | | | | - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2 - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 ok jsing@ tb@ | ||||
* | Add client side of supported versions and keyshare extensions with basic regress | beck | 2019-01-18 | 1 | -1/+192 |
| | | | | ok jsing@ | ||||
* | Update regress following TLS extension renaming. | jsing | 2019-01-18 | 1 | -376/+375 |
| | |||||
* | Make sure the interop test happen last (since they take a long time) | beck | 2018-11-10 | 1 | -6/+6 |
| | |||||
* | Unbreak regress following Supported Elliptic Curve extension rename. | jsing | 2018-11-06 | 1 | -49/+49 |
| | |||||
* | Initialise new_cipher in the serverhello TLS extensions test, to avoid a | jsing | 2017-12-28 | 1 | -3/+14 |
| | | | | | | | | | | NULL pointer dereference in ssl_using_ecc_cipher(). Some compilers avoid triggering this, likely due to the EC formats list also being NULL. While here, setup the EC formats list so that we actually include the EC points format extension in the server hello extensions. Found the hard way by bcook@ | ||||
* | Add regress test coverage for building clienthello and serverhello | jsing | 2017-11-28 | 1 | -4/+201 |
| | | | | | extensions, both with extensions being present and not present. The not present case currently fails. | ||||
* | When parsing extensions by calling the parse functions directly, ensure | jsing | 2017-08-29 | 1 | -2/+82 |
| | | | | | that we have consumed all of the extension data. This catches the ALPN extension handling issue that was just fixed. | ||||
* | Rewrite SRTP extension using CBB/CBS and the new extension framework. | doug | 2017-08-27 | 1 | -1/+402 |
| | | | | input + ok beck@, jsing@ | ||||
* | check return value from CBB_init | beck | 2017-08-27 | 1 | -2/+3 |
| | |||||
* | Rewrite ALPN extension using CBB/CBS and the new extension framework. | doug | 2017-08-26 | 1 | -1/+381 |
| | | | | | ok bcook@ beck@ input + ok jsing@ | ||||
* | Rewrite the TLS status request extension to use the new TLS extension framework. | beck | 2017-08-12 | 1 | -1/+128 |
| | | | | ok jsing@ | ||||
* | Add regress coverage for the TLS signature algorithms extension. | jsing | 2017-08-12 | 1 | -1/+163 |
| | |||||
* | Rewrite session ticket TLS extension handling using CBB/CBS and the new | doug | 2017-08-12 | 1 | -1/+302 |
| | | | | | | extension framework. ok jsing@ beck@ | ||||
* | errant whitespace | beck | 2017-08-12 | 1 | -3/+3 |
| |