summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/tlsext (follow)
Commit message (Expand)AuthorAgeFilesLines
* Plug a number of leaks reported by Ilya Shipitsintb2022-02-081-2/+9
* Revise for S3I removal.jsing2022-02-051-81/+81
* Revise for changes to tls_key_share_peer_public()jsing2022-01-111-2/+4
* Revise for change to tls_key_share_peer_public()jsing2022-01-061-3/+2
* Revise for tls13_key_share rename.jsing2022-01-051-11/+11
* One more leak of the same kindtb2021-12-291-2/+2
* Plug memleaktb2021-12-291-3/+3
* Add regress that calls SSL_set_tlsext_host_name() with a NULL host name.jsing2021-11-021-1/+15
* Rework SNI hostname regress to be table driven.jsing2021-11-011-62/+147
* Free memory on text exit to make asan quieterbeck2021-10-261-53/+83
* Revise regress for removal of SSL_SESSION_INTERNAL.jsing2021-10-261-27/+27
* The server only sends a cookie during a HRR, not a SHtb2021-03-241-4/+4
* Update regress for new_cipher rename.jsing2021-03-241-4/+4
* Revise regress to match handshake struct changes.jsing2021-03-211-18/+18
* Revise TLS extension regress to match version handling changes.jsing2021-03-101-57/+25
* No longer need to cast away const in srtp_find_profile_by_name()tb2020-10-111-2/+2
* Unbreak regress following SRTP_PROTECTION_PROFILE const change.jsing2020-10-111-2/+2
* Update golden values to match P-521 being enabled by default in the client.jsing2020-08-091-10/+11
* tlsexttest: pass message type to the extension functionstb2020-07-031-144/+144
* adjust tlsexttest to new argument ordertb2020-07-031-5/+5
* Previous commit caught a few errx() cases by accident. undo them.tb2020-05-241-25/+25
* include newlines in FAIL messagestb2020-05-241-108/+108
* address some nits from jsingtb2020-05-241-7/+11
* Enforce that SNI hostnames be correct as per rfc 6066 and 5980.beck2020-05-231-1/+79
* Revise regress for TLSv1.3 server being enabled.jsing2020-05-111-5/+8
* Update key share regress to match previous change.jsing2020-04-171-4/+4
* Reset the key share so that we do not have an existing peer public key.jsing2020-02-051-1/+7
* Tweak regress to match change made to tls13_key_share_peer_public().jsing2020-02-011-2/+1
* Revise for TLSv1.3 key share changes.jsing2020-01-301-8/+27
* server sigalgs test is now bogus, disable for nowbeck2020-01-261-2/+3
* It has been called to my attention that the cookie monster ascii artbeck2019-11-101-17/+7
* Update regress following sigalgs changes.jsing2019-03-251-17/+1
* Use malloc() and memcpy() the test X25519 x25519_peer_public value.jsing2019-02-031-3/+6
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-241-6/+435
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-241-18/+10
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-231-10/+12
* revert previous, accidentally contained another diff in additionbeck2019-01-231-12/+10
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-231-10/+12
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-181-1/+192
* Update regress following TLS extension renaming.jsing2019-01-181-376/+375
* Make sure the interop test happen last (since they take a long time)beck2018-11-101-6/+6
* Unbreak regress following Supported Elliptic Curve extension rename.jsing2018-11-061-49/+49
* Initialise new_cipher in the serverhello TLS extensions test, to avoid ajsing2017-12-281-3/+14
* Add regress test coverage for building clienthello and serverhellojsing2017-11-281-4/+201
* When parsing extensions by calling the parse functions directly, ensurejsing2017-08-291-2/+82
* Rewrite SRTP extension using CBB/CBS and the new extension framework.doug2017-08-271-1/+402
* check return value from CBB_initbeck2017-08-271-2/+3
* Rewrite ALPN extension using CBB/CBS and the new extension framework.doug2017-08-261-1/+381
* Rewrite the TLS status request extension to use the new TLS extension framework.beck2017-08-121-1/+128
* Add regress coverage for the TLS signature algorithms extension.jsing2017-08-121-1/+163