Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Add explicit LL suffixes to large constants to appease some compilers on | miod | 2023-01-01 | 1 | -3/+3 | |
| | | | | 32-bit systems. | |||||
* | Revise cipher list regress coverage of SSL_set_security_level(). | jsing | 2022-12-17 | 1 | -21/+43 | |
| | | | | | | | A SSL_set_security_level() call was added to the cipher list regress, which expects a failure - however, it should succeed and fails for a completely unrelated reason. Rework this regress so that it actually passes and tests for the expected behaviour. | |||||
* | Unbreak rust-openssl-tests on sparc64 | tb | 2022-12-05 | 1 | -8/+4 | |
| | | | | | For the test compilation using the CC crate, base clang is good enough, so we don't need to pull in another heavy dependency just for this test. | |||||
* | zap weird spaces $EDITOR added in previous | tb | 2022-12-04 | 1 | -2/+2 | |
| | ||||||
* | skip rust-openssl-tests on sparc64 | tb | 2022-12-03 | 1 | -3/+17 | |
| | | | | | | | | The issue is likely that the build is trying to compile some generated C code with the prehistoric gcc from base, so add a tentative workaround for that. Since I don't currently have access to a sparc64 box where I could validate this easily and check if the workaround is enough, let's not waste lots of cycles on this. | |||||
* | regres/libssl/unit: simplify Makefile | tb | 2022-12-02 | 1 | -20/+10 | |
| | ||||||
* | Use regress framework rather than handrolling it | tb | 2022-12-02 | 1 | -12/+1 | |
| | ||||||
* | Refrain from printing SUCCESS in some of my tests | tb | 2022-12-01 | 2 | -8/+2 | |
| | | | | Silence is good. On failure, the regress framework will make it clear. | |||||
* | Make internal header file names consistent | tb | 2022-11-26 | 11 | -22/+22 | |
| | | | | | | | | | | | | | | | | Libcrypto currently has a mess of *_lcl.h, *_locl.h, and *_local.h names used for internal headers. Move all these headers we inherited from OpenSSL to *_local.h, reserving the name *_internal.h for our own code. Similarly, move dtls_locl.h and ssl_locl.h to dtls_local and ssl_local.h. constant_time_locl.h is moved to constant_time.h since it's special. Adjust all .c files in libcrypto, libssl and regress. The diff is mechanical with the exception of tls13_quic.c, where #include <ssl_locl.h> was fixed manually. discussed with jsing, no objection bcook | |||||
* | Add regress coverage for TLS exporters. | jsing | 2022-11-05 | 3 | -1/+677 | |
| | ||||||
* | dtlstest: Ensure the timeouts are at least 10 ms. This makes these tests | tb | 2022-10-26 | 1 | -1/+7 | |
| | | | | | | a bit less flaky if the machine is otherwise under load. from jsing | |||||
* | tlsexttest.c: make various static structs const | tb | 2022-10-21 | 1 | -19/+19 | |
| | ||||||
* | quic tlsext tests: use byte vector in place of string | tb | 2022-10-21 | 1 | -10/+8 | |
| | | | | | | | While this doesn't actually change anything, it should appease Coverity. CID 358678 CID 358679 | |||||
* | Link rust-openssl to regress | tb | 2022-10-20 | 1 | -1/+2 | |
| | ||||||
* | Provide a harness driving rust-openssl's regress tests | tb | 2022-10-20 | 3 | -0/+62 | |
| | | | | | | | | | | | | | | | rust-openssl is an integral part of the Rust ecosystem and more than a dozen ports, including lang/rust itself, depend on it. We need to ensure that it keeps working with LibreSSL. If the rust and rust-openssl-tests packages are installed, create a cargo workspace under obj/ that compiles and runs the rust-openssl regress tests much like what is done for the openssl-ruby tests. This expands our regress coverage: for instance, this would have caught the broken ASN.1 indefinite length encoding caused by asn1/tasn_enc.c r1.25. Positive feedback beck jsing semarie Testing and ok anton | |||||
* | Dynamically link libssl for QUIC regress. | jsing | 2022-10-02 | 1 | -2/+2 | |
| | | | | Now that the QUIC API is public, we can stop linking this statically. | |||||
* | Remove unused headers. | jsing | 2022-10-02 | 1 | -5/+1 | |
| | ||||||
* | Revise for SSL_CTX_INTERNAL and SSL_INTERNAL removal. | jsing | 2022-10-02 | 5 | -68/+66 | |
| | ||||||
* | Wire up QUIC regress. | jsing | 2022-08-27 | 1 | -1/+2 | |
| | ||||||
* | Add regress for QUIC. | jsing | 2022-08-27 | 2 | -0/+358 | |
| | | | | | This exercises the libssl QUIC implementation and completes a TLS handshake using the SSL_QUIC_METHOD interface. | |||||
* | Revise regress now that SSL_QUIC_METHOD exists. | jsing | 2022-08-21 | 1 | -4/+6 | |
| | ||||||
* | fix error message | tb | 2022-08-05 | 1 | -2/+2 | |
| | ||||||
* | Use the FAIL macro instead of fprintf(stderr, "FAIL: ...\n"); | tb | 2022-08-05 | 1 | -10/+10 | |
| | ||||||
* | Make the bogokey[] global static const. | tb | 2022-08-05 | 1 | -7/+8 | |
| | ||||||
* | Move CBB_init() to a consistent place. | tb | 2022-08-05 | 1 | -10/+10 | |
| | ||||||
* | Consistently initialize failure to 1 at the top of the function and | tb | 2022-08-05 | 1 | -76/+62 | |
| | | | | clear it right before the done label. | |||||
* | Consistently check for CBB_init() failure. | tb | 2022-08-05 | 1 | -45/+89 | |
| | ||||||
* | Remove most of the indirection introduced in previous and instead fetch | tb | 2022-08-05 | 1 | -400/+339 | |
| | | | | | | | the appropriate tls_extension_funcs pointers for client and server from libssl and reach into them directly. ok jsing | |||||
* | Add some glue to fetch the tlsext functions from the tls_extensions[] | tb | 2022-08-04 | 1 | -190/+440 | |
| | | | | table rather than calling the functions directly. | |||||
* | Extend TLS buffer regress to cover read/write usage. | jsing | 2022-07-22 | 1 | -13/+219 | |
| | ||||||
* | Make test table based, extend it a little | tb | 2022-07-21 | 1 | -69/+117 | |
| | ||||||
* | link ssl_set_alpn_protos to regress | tb | 2022-07-20 | 1 | -1/+2 | |
| | ||||||
* | Add a quick and dirty regress for SSL{_CTX,}_set_alpn_protos() | tb | 2022-07-20 | 1 | -0/+156 | |
| | ||||||
* | zap trailing spaces | tb | 2022-07-19 | 1 | -2/+2 | |
| | ||||||
* | Regenerate golden numbers due to RC4-MD5 now being disabled by default. | tb | 2022-07-19 | 1 | -61/+58 | |
| | ||||||
* | Revert accidental commit | tb | 2022-07-18 | 1 | -2/+2 | |
| | ||||||
* | Add comments to explain the magic numbers 57 and 58 | tb | 2022-07-18 | 2 | -3/+6 | |
| | ||||||
* | Avoid sending the QUIC transport parameters extension now that we | tb | 2022-07-18 | 1 | -4/+4 | |
| | | | | | | send an unsupported extension alert. Noted by anton | |||||
* | Revise regress for QUIC transport parameters TLS extension. | jsing | 2022-07-17 | 1 | -15/+32 | |
| | ||||||
* | Use the security level knob in the test script. | tb | 2022-07-07 | 1 | -2/+14 | |
| | | | | from beck | |||||
* | Only run tests against ciphers supported by the method. | tb | 2022-07-07 | 2 | -4/+28 | |
| | ||||||
* | Add some minimal regress coverage for the security level. | tb | 2022-07-07 | 1 | -1/+6 | |
| | | | | From beck | |||||
* | Make the ssltest security level aware. | tb | 2022-07-07 | 1 | -1/+9 | |
| | | | | From beck | |||||
* | Switch ssltest to using the newly generated certs that use SHA-256 instead | tb | 2022-07-07 | 2 | -8/+6 | |
| | | | | | | of SHA-1. This helps the switch to security-level aware ssltest. From jsing | |||||
* | Adjust to new tls1_ec_nid2group_id API. | tb | 2022-07-02 | 1 | -7/+13 | |
| | ||||||
* | Add support for sending QUIC transport parameters | beck | 2022-06-29 | 1 | -1/+257 | |
| | | | | | | | | | | This is the start of adding the boringssl API for QUIC support, and the TLS extensions necessary to send and receive QUIC transport data. Inspired by boringssl's https://boringssl-review.googlesource.com/24464 ok jsing@ tb@ | |||||
* | Use relative paths so beck can run regress in his git tree and have | tb | 2022-06-29 | 4 | -8/+12 | |
| | | | | the correct ssl_local.h etc be picked up. | |||||
* | More %i vs %d cleanup | tb | 2022-06-10 | 7 | -20/+20 | |
| | ||||||
* | Fix format strings: change %i, %li, %lli to %d, %ld, %lld and switch to | tb | 2022-06-07 | 1 | -18/+18 | |
| | | | | | %zu for master_key_length, session_id_length and sid_ctx_length, which are now size_t. | |||||
* | Minor tweaks to psk modes regress | tb | 2022-06-06 | 1 | -3/+3 | |
| |