summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
* move test-tls13-finished.py from slow tests to normal tests.tb2020-09-251-27/+26
* test-tls13-finished.py has 70 failing tests that expect a "decode_error"tb2020-09-251-6/+94
* delete a stale commenttb2020-09-251-5/+1
* 1) Move the interop tests to the end so we see tlsfuzzer firstbeck2020-09-215-9/+35
* Add cipher set tests with empty SSL_set_ciphersuites().jsing2020-09-161-0/+22
* Correct cipher_set_test() when run on a machine without AES acceleration.jsing2020-09-161-1/+19
* Make cipher_set_test() log failures and continue, rather than aborting.jsing2020-09-161-11/+3
* Test botan TLS client with libressl, openssl, openssl11 server.bluhm2020-09-154-6/+305
* Connect a client to a server. Both can be current libressl, orbluhm2020-09-145-10/+193
* Add regress for SSL_{CTX_,}set_ciphersuites().jsing2020-09-132-7/+318
* If CPU does not support AES-NI, LibreSSL TLS 1.3 client prefersbluhm2020-09-121-9/+18
* Enable cert and cipher interop tests. cert just works. cipher hasbluhm2020-09-113-55/+35
* Enable test-tls13-large-number-of-extensions.pytb2020-09-101-2/+7
* Also print a list of missing scripts in summarytb2020-08-171-5/+10
* Avoid test failures due to outdated packagestb2020-08-171-1/+6
* enable jsing's zero content type testtb2020-08-151-1/+2
* I accidentally zeored out a few bytes of the TLSv1.0 session ID.tb2020-08-111-1/+1
* Update TLS versions to match TLSv1.3 being enabled for TLS_method().jsing2020-08-091-8/+8
* Fix regress test so that it exits non-zero for failure cases.jsing2020-08-091-1/+11
* Update golden values to match P-521 being enabled by default in the client.jsing2020-08-091-20/+21
* Update golden values to match P-521 being enabled by default in the client.jsing2020-08-091-10/+11
* Session resumption is not currently supported for TLSv1.3.tb2020-08-081-4/+4
* Enable P-521 and run the tests that use it.tb2020-08-081-5/+3
* Force TLSv1.2 when testing SSLv3/TLSv1.2 cipher suites.jsing2020-07-141-1/+1
* Add a -tls1_2 option so we can force TLSv1.2 for testing.jsing2020-07-141-5/+9
* Remove temporary RSA keys/callbacks code.jsing2020-07-071-43/+0
* Test TLSv1.3 ciphersuites now that TLS_method() supports TLSv1.3.jsing2020-07-071-0/+12
* tlsexttest: pass message type to the extension functionstb2020-07-031-144/+144
* adjust alpn extension test to new argument ordertb2020-07-031-3/+3
* adjust tlsexttest to new argument ordertb2020-07-031-5/+5
* enable test-tls13-keyshare-omitted.pytb2020-06-241-5/+2
* Add test-ffdhe-expected-params.pytb2020-06-241-1/+2
* Enable lucky 13 test.tb2020-06-191-5/+2
* Add lucky13 and bleichenbacher-timing teststb2020-06-101-1/+7
* Implement a rolling hash of the ClientHello message, Enforce RFC 8446beck2020-06-061-2/+2
* Enable the record layer limits test and mark two finished test cases astb2020-06-031-5/+8
* Enable the test-tls13-zero-length-data.py test, skipping thetb2020-06-011-8/+10
* Enable test-dhe-rsa-key-exchange-with-bad-messages.pytb2020-06-011-4/+2
* Previous commit caught a few errx() cases by accident. undo them.tb2020-05-241-25/+25
* include newlines in FAIL messagestb2020-05-241-108/+108
* address some nits from jsingtb2020-05-241-7/+11
* The version detection doesn't work on bluhm's test machine, causingtb2020-05-241-3/+3
* Define REGRESS_TARGETS explicitly.tb2020-05-231-2/+4
* Enforce that SNI hostnames be correct as per rfc 6066 and 5980.beck2020-05-231-1/+79
* beck fixed most of the keyupdate tests. update annotationtb2020-05-211-3/+8
* hook tlsfuzzer to regresstb2020-05-211-1/+2
* Add a harness that runs tests from tlsfuzzertb2020-05-212-0/+781
* move a #define after the last #include linetb2020-05-141-3/+3
* Revise regress for TLSv1.3 server being enabled.jsing2020-05-114-14/+17
* Use tls_legacy_server_method() for SSLv2 record tests.jsing2020-05-112-5/+7