summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Increment a few more sequence numbers where the carry is close totb2020-03-131-1/+41
* Add regress for TLSv1.3 sequence number handling.jsing2020-03-133-1/+135
* Add missing $OpenBSD$ tag.jsing2020-03-131-0/+1
* Add regress for CBB_add_space().jsing2020-03-131-1/+41
* Update to follow handshake enum removal.jsing2020-03-101-7/+1
* Reset the key share so that we do not have an existing peer public key.jsing2020-02-051-1/+7
* Tweak regress to match change made to tls13_key_share_peer_public().jsing2020-02-011-2/+1
* Revise for TLSv1.3 key share changes.jsing2020-01-301-8/+27
* server sigalgs test is now bogus, disable for nowbeck2020-01-261-2/+3
* Disable cert interop tests for now.jsing2020-01-251-2/+2
* Actually disable cipher interop tests.jsing2020-01-251-3/+3
* Disable the cipher interop tests.jsing2020-01-251-3/+4
* Accept both TLSv1.2 and TLSv1.3 protocols for netcat.jsing2020-01-251-4/+3
* Disable session regress for libressl client talking to openssl11 server.jsing2020-01-251-1/+2
* Disable the client hello message regress test for now.jsing2020-01-251-2/+2
* Ensure that TLSv1.0 and TLSv1.1 are enabled before running SSLv2 clientjsing2020-01-251-5/+10
* Nuke trailing whitespace that is annoying before changing things in herebeck2019-11-261-6/+6
* fix printing of client app secretbeck2019-11-181-2/+2
* Add regress for the updating of sever and client application secretsbeck2019-11-181-2/+47
* It has been called to my attention that the cookie monster ascii artbeck2019-11-101-17/+7
* use curly braces for consistencytb2019-11-061-2/+2
* Proper prototype for main(). Make sparc64 happier.claudio2019-05-091-2/+4
* exitting -> exitingtb2019-04-071-1/+1
* whitespace consistencytb2019-04-051-1/+2
* Add SERVER_HELLO_RETRY statetb2019-04-051-1/+7
* I forgot to mark some targets as .PHONYtb2019-04-041-1/+5
* Use correct define.jsing2019-04-041-2/+2
* Enable GOST cipher selection test after libssl has been fixed.bluhm2019-03-281-6/+1
* Update regress following sigalgs changes.jsing2019-03-251-17/+1
* Fix typo in usage and comment.bluhm2019-03-213-6/+6
* Test that all supported TLS ciphers actually work. Establishbluhm2019-02-218-26/+308
* one more error message that should go to stderrtb2019-02-131-2/+3
* getopt(3) returns int, not char. Fix type of ch variable to preventbluhm2019-02-112-6/+6
* Use malloc() and memcpy() the test X25519 x25519_peer_public value.jsing2019-02-031-3/+6
* zap a commented out line. 0RTT will need more thought thantb2019-01-271-2/+1
* refactor and clean up the code generating dot output.tb2019-01-271-53/+76
* print errors to stderrtb2019-01-251-19/+21
* sort output suffixestb2019-01-251-2/+2
* Add code to visualize the state machine. Both the state machine and thetb2019-01-242-5/+79
* set the NEGOTIATED flag in the flags argument rather thantb2019-01-241-4/+4
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-241-6/+435
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-242-31/+21
* make whitespace inside curlies consistent; sort function prototypes.tb2019-01-231-24/+24
* Rename NUM_HANDSHAKE to handshake_count and make it a variabletb2019-01-232-10/+44
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-232-25/+28
* revert previous, accidentally contained another diff in additionbeck2019-01-232-28/+25
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-232-25/+28
* incorrrect spellingtb2019-01-231-2/+2
* do not print the command in the print: targettb2019-01-231-2/+2
* Add a regression test that builds up the handshake state tabletb2019-01-232-1/+399