Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Sync function prototypes and declarations to satisfy clang 15. | anton | 2023-02-02 | 1 | -3/+3 |
| | | | | ok jsing@ | ||||
* | Don't run session tests with openssl 3.0 - these tests aren't TLSv1.3 ready | tb | 2023-02-01 | 1 | -2/+2 |
| | |||||
* | Hopefully the last one. | tb | 2023-02-01 | 1 | -4/+4 |
| | |||||
* | One more openssl 1.0.2 thing missed. | tb | 2023-02-01 | 1 | -4/+4 |
| | |||||
* | Switch from eopenssl to eopenssl30. Missed in both previous commits | tb | 2023-02-01 | 1 | -4/+4 |
| | | | | for some reason. | ||||
* | Retire OpenSSL 1.0.2 interop | tb | 2023-02-01 | 7 | -93/+13 |
| | | | | | | Now that the OpenSSL 1.0.2 port is gone, there's no need to keep the interop tests anymore. anton's and bluhm's regress tests will switch to testing interoperability with OpenSSL 3.0. | ||||
* | Add openssl 3.0 interop tests | tb | 2023-01-27 | 5 | -12/+70 |
| | | | | | | | | | | The plan is to retire the 1.0.2 interop tests soon so as to be able to drop the dead and dangerous OpenSSL 1.0.2 port. The cert part is extremely slow on arm64: the whole interop test on an m1 is about 10x slower (~45 min!) than on a modern amd64 laptop, so people running regress may want to wait a bit with adding OpenSSL 3 to their test boxes until this is sorted out. | ||||
* | tlsfuzzer: hook up new connection abort tests while skipping the NST | tb | 2023-01-06 | 1 | -1/+5 |
| | | | | tests for TLSv1.3 since that's not currently handled. | ||||
* | Add explicit LL suffixes to large constants to appease some compilers on | miod | 2023-01-01 | 1 | -3/+3 |
| | | | | 32-bit systems. | ||||
* | Revise cipher list regress coverage of SSL_set_security_level(). | jsing | 2022-12-17 | 1 | -21/+43 |
| | | | | | | | A SSL_set_security_level() call was added to the cipher list regress, which expects a failure - however, it should succeed and fails for a completely unrelated reason. Rework this regress so that it actually passes and tests for the expected behaviour. | ||||
* | Unbreak rust-openssl-tests on sparc64 | tb | 2022-12-05 | 1 | -8/+4 |
| | | | | | For the test compilation using the CC crate, base clang is good enough, so we don't need to pull in another heavy dependency just for this test. | ||||
* | zap weird spaces $EDITOR added in previous | tb | 2022-12-04 | 1 | -2/+2 |
| | |||||
* | skip rust-openssl-tests on sparc64 | tb | 2022-12-03 | 1 | -3/+17 |
| | | | | | | | | The issue is likely that the build is trying to compile some generated C code with the prehistoric gcc from base, so add a tentative workaround for that. Since I don't currently have access to a sparc64 box where I could validate this easily and check if the workaround is enough, let's not waste lots of cycles on this. | ||||
* | regres/libssl/unit: simplify Makefile | tb | 2022-12-02 | 1 | -20/+10 |
| | |||||
* | Use regress framework rather than handrolling it | tb | 2022-12-02 | 1 | -12/+1 |
| | |||||
* | Refrain from printing SUCCESS in some of my tests | tb | 2022-12-01 | 2 | -8/+2 |
| | | | | Silence is good. On failure, the regress framework will make it clear. | ||||
* | Make internal header file names consistent | tb | 2022-11-26 | 11 | -22/+22 |
| | | | | | | | | | | | | | | | | Libcrypto currently has a mess of *_lcl.h, *_locl.h, and *_local.h names used for internal headers. Move all these headers we inherited from OpenSSL to *_local.h, reserving the name *_internal.h for our own code. Similarly, move dtls_locl.h and ssl_locl.h to dtls_local and ssl_local.h. constant_time_locl.h is moved to constant_time.h since it's special. Adjust all .c files in libcrypto, libssl and regress. The diff is mechanical with the exception of tls13_quic.c, where #include <ssl_locl.h> was fixed manually. discussed with jsing, no objection bcook | ||||
* | Add regress coverage for TLS exporters. | jsing | 2022-11-05 | 3 | -1/+677 |
| | |||||
* | dtlstest: Ensure the timeouts are at least 10 ms. This makes these tests | tb | 2022-10-26 | 1 | -1/+7 |
| | | | | | | a bit less flaky if the machine is otherwise under load. from jsing | ||||
* | tlsexttest.c: make various static structs const | tb | 2022-10-21 | 1 | -19/+19 |
| | |||||
* | quic tlsext tests: use byte vector in place of string | tb | 2022-10-21 | 1 | -10/+8 |
| | | | | | | | While this doesn't actually change anything, it should appease Coverity. CID 358678 CID 358679 | ||||
* | Link rust-openssl to regress | tb | 2022-10-20 | 1 | -1/+2 |
| | |||||
* | Provide a harness driving rust-openssl's regress tests | tb | 2022-10-20 | 3 | -0/+62 |
| | | | | | | | | | | | | | | | rust-openssl is an integral part of the Rust ecosystem and more than a dozen ports, including lang/rust itself, depend on it. We need to ensure that it keeps working with LibreSSL. If the rust and rust-openssl-tests packages are installed, create a cargo workspace under obj/ that compiles and runs the rust-openssl regress tests much like what is done for the openssl-ruby tests. This expands our regress coverage: for instance, this would have caught the broken ASN.1 indefinite length encoding caused by asn1/tasn_enc.c r1.25. Positive feedback beck jsing semarie Testing and ok anton | ||||
* | Dynamically link libssl for QUIC regress. | jsing | 2022-10-02 | 1 | -2/+2 |
| | | | | Now that the QUIC API is public, we can stop linking this statically. | ||||
* | Remove unused headers. | jsing | 2022-10-02 | 1 | -5/+1 |
| | |||||
* | Revise for SSL_CTX_INTERNAL and SSL_INTERNAL removal. | jsing | 2022-10-02 | 5 | -68/+66 |
| | |||||
* | Wire up QUIC regress. | jsing | 2022-08-27 | 1 | -1/+2 |
| | |||||
* | Add regress for QUIC. | jsing | 2022-08-27 | 2 | -0/+358 |
| | | | | | This exercises the libssl QUIC implementation and completes a TLS handshake using the SSL_QUIC_METHOD interface. | ||||
* | Revise regress now that SSL_QUIC_METHOD exists. | jsing | 2022-08-21 | 1 | -4/+6 |
| | |||||
* | fix error message | tb | 2022-08-05 | 1 | -2/+2 |
| | |||||
* | Use the FAIL macro instead of fprintf(stderr, "FAIL: ...\n"); | tb | 2022-08-05 | 1 | -10/+10 |
| | |||||
* | Make the bogokey[] global static const. | tb | 2022-08-05 | 1 | -7/+8 |
| | |||||
* | Move CBB_init() to a consistent place. | tb | 2022-08-05 | 1 | -10/+10 |
| | |||||
* | Consistently initialize failure to 1 at the top of the function and | tb | 2022-08-05 | 1 | -76/+62 |
| | | | | clear it right before the done label. | ||||
* | Consistently check for CBB_init() failure. | tb | 2022-08-05 | 1 | -45/+89 |
| | |||||
* | Remove most of the indirection introduced in previous and instead fetch | tb | 2022-08-05 | 1 | -400/+339 |
| | | | | | | | the appropriate tls_extension_funcs pointers for client and server from libssl and reach into them directly. ok jsing | ||||
* | Add some glue to fetch the tlsext functions from the tls_extensions[] | tb | 2022-08-04 | 1 | -190/+440 |
| | | | | table rather than calling the functions directly. | ||||
* | Extend TLS buffer regress to cover read/write usage. | jsing | 2022-07-22 | 1 | -13/+219 |
| | |||||
* | Make test table based, extend it a little | tb | 2022-07-21 | 1 | -69/+117 |
| | |||||
* | link ssl_set_alpn_protos to regress | tb | 2022-07-20 | 1 | -1/+2 |
| | |||||
* | Add a quick and dirty regress for SSL{_CTX,}_set_alpn_protos() | tb | 2022-07-20 | 1 | -0/+156 |
| | |||||
* | zap trailing spaces | tb | 2022-07-19 | 1 | -2/+2 |
| | |||||
* | Regenerate golden numbers due to RC4-MD5 now being disabled by default. | tb | 2022-07-19 | 1 | -61/+58 |
| | |||||
* | Revert accidental commit | tb | 2022-07-18 | 1 | -2/+2 |
| | |||||
* | Add comments to explain the magic numbers 57 and 58 | tb | 2022-07-18 | 2 | -3/+6 |
| | |||||
* | Avoid sending the QUIC transport parameters extension now that we | tb | 2022-07-18 | 1 | -4/+4 |
| | | | | | | send an unsupported extension alert. Noted by anton | ||||
* | Revise regress for QUIC transport parameters TLS extension. | jsing | 2022-07-17 | 1 | -15/+32 |
| | |||||
* | Use the security level knob in the test script. | tb | 2022-07-07 | 1 | -2/+14 |
| | | | | from beck | ||||
* | Only run tests against ciphers supported by the method. | tb | 2022-07-07 | 2 | -4/+28 |
| | |||||
* | Add some minimal regress coverage for the security level. | tb | 2022-07-07 | 1 | -1/+6 |
| | | | | From beck |