summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Update record regress to match functionality changes.jsing2019-01-201-6/+37
* hook handshake testtb2019-01-201-1/+2
* Add a simple test that verifies that every valid handshaketb2019-01-202-0/+76
* Hook record regress.jsing2019-01-191-1/+3
* Add regress for TLSv1.3 record handling.jsing2019-01-192-0/+533
* initialize offset value so this passesbeck2019-01-181-0/+1
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-181-1/+192
* Removed unused struct members.jsing2019-01-181-2/+0
* Update regress following TLS extension renaming.jsing2019-01-182-379/+378
* Add regress for extensible buffer code.jsing2019-01-173-1/+169
* Just err if we can't create secretsbeck2018-11-131-2/+2
* Fix a race in libssl interop regress. The success messages frombluhm2018-11-113-6/+9
* Add automatic threading initialization for libcrypto.bcook2018-11-111-56/+0
* Reorganize libssl interop tests. Move netcat tests into separatebluhm2018-11-119-148/+197
* Spelingbeck2018-11-101-2/+2
* Regress client and server can do session reuse now. Test this withbluhm2018-11-106-129/+220
* Make sure the interop test happen last (since they take a long time)beck2018-11-102-8/+9
* fix a leak reported by Ben L (bobsayshilol () live ! co ! uk)tb2018-11-101-1/+3
* More regress all the way to exporter_masterbeck2018-11-101-4/+44
* Fix last of the empty hash nonsensebeck2018-11-101-6/+3
* Update key schedule regress to match API changes.jsing2018-11-091-21/+12
* remove the not yet implemented "handshake" subdirectorytb2018-11-091-2/+1
* Add subdirectires with SUBDIR += instead of a single assignment withtb2018-11-091-13/+13
* The cert subdir is testing all combinations of certificate validation.bluhm2018-11-0911-48/+244
* Add in key_schedule regress tests to regress buildbeck2018-11-071-1/+2
* Add a self test for each SSL library by connecting client withbluhm2018-11-075-23/+88
* Add initial TLS 1.3 key schedule support with basic regress testsbeck2018-11-072-0/+249
* Add interop test with OpenSSL 1.1. TLS 1.3 should be used automaticallybluhm2018-11-075-10/+55
* Print SSLeay, OpenSSL, and LibreSSL version strings. Make clientbluhm2018-11-077-12/+71
* +interopbluhm2018-11-071-1/+2
* Test TLS interoperability between LibreSSL and OpenSSL.bluhm2018-11-0710-0/+549
* Add TLSv1.3 to version regress tests.jsing2018-11-061-4/+80
* Unbreak regress following Supported Elliptic Curve extension rename.jsing2018-11-061-49/+49
* Add regress coverage for CBB_add_u32().jsing2018-08-161-3/+4
* Update regress for DES cipher suite removal.jsing2018-06-022-49/+41
* Zero the client random so that it is easier to spot unintended differences.jsing2018-06-021-0/+1
* Provide SSL_CTX_get_min_proto_version and SSL_CTX_get_max_proto_versionjca2018-03-151-13/+13
* Update regress to use tlsext_serverhello_parse().jsing2018-02-081-5/+3
* Update regress to match removal of ssl_parse_clienthello_tlsext().jsing2018-01-271-5/+8
* Initialise new_cipher in the serverhello TLS extensions test, to avoid ajsing2017-12-281-3/+14
* Add regress test coverage for building clienthello and serverhellojsing2017-11-281-4/+201
* Add regress for CBB_discard_child().jsing2017-11-281-2/+56
* Update regress now that ssl_cipher_list_to_bytes() takes a CBB.jsing2017-10-111-3/+9
* Revise regress now that ssl_bytes_to_cipher_list() takes a CBS.jsing2017-10-101-20/+10
* When parsing extensions by calling the parse functions directly, ensurejsing2017-08-291-2/+82
* Use current chacha20-poly1305 cipher suite values.jsing2017-08-281-7/+7
* Update due to removal of original chacha20-poly1305 cipher suites.jsing2017-08-281-42/+39
* Rewrite SRTP extension using CBB/CBS and the new extension framework.doug2017-08-271-1/+402
* check return value from CBB_initbeck2017-08-271-2/+3
* Rewrite ALPN extension using CBB/CBS and the new extension framework.doug2017-08-261-1/+381