Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | make this test compile and pass on sparc64 | tb | 2020-10-16 | 1 | -2/+2 | |
| | | | | | Two functions missed (void) in their declaration which made gcc whine "warning: function declaration isn't a prototype". | |||||
* | Add an explicit cast to make this test compile and pass with gcc. | tb | 2020-10-16 | 1 | -2/+2 | |
| | | | | | gcc emits a signed vs unsigned comparison warning which breaks the build due to -Werror. | |||||
* | Test DTLS timeouts and retransmissions by dropping specific messages. | jsing | 2020-10-15 | 1 | -5/+299 | |
| | | | | | | | | | Provide a BIO that can drop specific messages in order to trigger and test DTLS timeouts and retransmissions. Note that the SSL buffering BIO (bbio) has to be removed to ensure that handshake messages are sent individually. This would have detected the recent DTLS breakage with retransmissions for a flight that includes a CCS. | |||||
* | Improve poll and event handling. | jsing | 2020-10-15 | 1 | -8/+27 | |
| | | | | | In particular, ensure we clear events when the client or server side has completed and fix timeouts to ensure we use a non-zero timeout if present. | |||||
* | Hook up dtls regress. | jsing | 2020-10-14 | 1 | -1/+2 | |
| | ||||||
* | Add regress tests for DTLS. | jsing | 2020-10-14 | 2 | -0/+411 | |
| | | | | | | | | Test the operation of a DTLS client and server, with and without cookies, using the default MTU and a specifically lowered MTU. Further regress tests will be built on this to exercise other parts of the DTLS code base (such as retransmission, fragmentation and reassembly). | |||||
* | No longer need to cast away const in srtp_find_profile_by_name() | tb | 2020-10-11 | 1 | -2/+2 | |
| | ||||||
* | Update regress for method changes. | jsing | 2020-10-11 | 1 | -4/+4 | |
| | ||||||
* | Unbreak regress following SRTP_PROTECTION_PROFILE const change. | jsing | 2020-10-11 | 1 | -2/+2 | |
| | ||||||
* | zap trailing whitespace | tb | 2020-10-07 | 1 | -21/+21 | |
| | ||||||
* | add arguments to skip a bunch of x448 tests | tb | 2020-10-07 | 1 | -3/+18 | |
| | ||||||
* | Hook up tlslegacy regress. | jsing | 2020-10-07 | 1 | -1/+2 | |
| | ||||||
* | Add regress tests for switching from the new TLS stack to the legacy stack. | jsing | 2020-10-07 | 2 | -0/+642 | |
| | | | | | | This includes a test where the server response includes multiple handhshake messages in the single TLS plaintext record (which would have caught the bug just fixed in tls13_legacy.c). | |||||
* | move test-tls13-finished.py from slow tests to normal tests. | tb | 2020-09-25 | 1 | -27/+26 | |
| | ||||||
* | test-tls13-finished.py has 70 failing tests that expect a "decode_error" | tb | 2020-09-25 | 1 | -6/+94 | |
| | | | | | | instead of the "decrypt_error" sent by tls13_server_finished_recv(). Both alerts appear to be reasonable in this context, so enable the tests while working around this. | |||||
* | delete a stale comment | tb | 2020-09-25 | 1 | -5/+1 | |
| | ||||||
* | 1) Move the interop tests to the end so we see tlsfuzzer first | beck | 2020-09-21 | 5 | -9/+35 | |
| | | | | | | | | | | 2) Reorder the interop tests so the really slow "cert" test is at the end 3) Change the cert tests to use REGRESS_SLOW_TARGETS when testing combination of client and server that does not involve libressl. This way we can skip testing openssl to openssl11 when running these manually by setting REGRESS_SKIP_SLOW to "yet" in mk.conf ok jsing@ | |||||
* | Add cipher set tests with empty SSL_set_ciphersuites(). | jsing | 2020-09-16 | 1 | -0/+22 | |
| | ||||||
* | Correct cipher_set_test() when run on a machine without AES acceleration. | jsing | 2020-09-16 | 1 | -1/+19 | |
| | | | | Noted by bcook@ and inoguchi@ while working on portable. | |||||
* | Make cipher_set_test() log failures and continue, rather than aborting. | jsing | 2020-09-16 | 1 | -11/+3 | |
| | ||||||
* | Test botan TLS client with libressl, openssl, openssl11 server. | bluhm | 2020-09-15 | 4 | -6/+305 | |
| | ||||||
* | Connect a client to a server. Both can be current libressl, or | bluhm | 2020-09-14 | 5 | -10/+193 | |
| | | | | | | | openssl 1.0.2, or openssl 1.1. Pin client or server to a fixed TLS version number. Incompatible versions must fail. Check that client and server have used correct version by grepping in their session print out. | |||||
* | Add regress for SSL_{CTX_,}set_ciphersuites(). | jsing | 2020-09-13 | 2 | -7/+318 | |
| | ||||||
* | If CPU does not support AES-NI, LibreSSL TLS 1.3 client prefers | bluhm | 2020-09-12 | 1 | -9/+18 | |
| | | | | chacha-poly over aes-gcm. Expect both fallbacks for non 1.3 ciphers. | |||||
* | Enable cert and cipher interop tests. cert just works. cipher has | bluhm | 2020-09-11 | 3 | -55/+35 | |
| | | | | | | | | been fixed to work with libressl TLS 1.3. Both libressl and openssl11 replace obsolete TLS 1.2 ciphers with AEAD-AES256-GCM-SHA384 or TLS_AES_256_GCM_SHA384 in TLS 1.3 respectively. The test expects that now. Currently GOST does not work with libressl and TLS 1.3 and is disabled. | |||||
* | Enable test-tls13-large-number-of-extensions.py | tb | 2020-09-10 | 1 | -2/+7 | |
| | | | | | | Skip sending an empty ECPF extension for now: we don't accept it since according to RFC 4492 and 8422 it needs to advertise uncompressed point formats. | |||||
* | Also print a list of missing scripts in summary | tb | 2020-08-17 | 1 | -5/+10 | |
| | ||||||
* | Avoid test failures due to outdated packages | tb | 2020-08-17 | 1 | -1/+6 | |
| | | | | | Indicate missing test scripts prominently in the result but do not count them as an error. | |||||
* | enable jsing's zero content type test | tb | 2020-08-15 | 1 | -1/+2 | |
| | ||||||
* | I accidentally zeored out a few bytes of the TLSv1.0 session ID. | tb | 2020-08-11 | 1 | -1/+1 | |
| | | | | Restore them to their previous values. | |||||
* | Update TLS versions to match TLSv1.3 being enabled for TLS_method(). | jsing | 2020-08-09 | 1 | -8/+8 | |
| | ||||||
* | Fix regress test so that it exits non-zero for failure cases. | jsing | 2020-08-09 | 1 | -1/+11 | |
| | ||||||
* | Update golden values to match P-521 being enabled by default in the client. | jsing | 2020-08-09 | 1 | -20/+21 | |
| | | | | Diff from tb@ | |||||
* | Update golden values to match P-521 being enabled by default in the client. | jsing | 2020-08-09 | 1 | -10/+11 | |
| | ||||||
* | Session resumption is not currently supported for TLSv1.3. | tb | 2020-08-08 | 1 | -4/+4 | |
| | ||||||
* | Enable P-521 and run the tests that use it. | tb | 2020-08-08 | 1 | -5/+3 | |
| | ||||||
* | Force TLSv1.2 when testing SSLv3/TLSv1.2 cipher suites. | jsing | 2020-07-14 | 1 | -1/+1 | |
| | | | | Otherwise we end up switching to TLSv1.3 and using a TLSv1.3 cipher suite. | |||||
* | Add a -tls1_2 option so we can force TLSv1.2 for testing. | jsing | 2020-07-14 | 1 | -5/+9 | |
| | ||||||
* | Remove temporary RSA keys/callbacks code. | jsing | 2020-07-07 | 1 | -43/+0 | |
| | | | | This was removed from libssl a very long time ago... | |||||
* | Test TLSv1.3 ciphersuites now that TLS_method() supports TLSv1.3. | jsing | 2020-07-07 | 1 | -0/+12 | |
| | ||||||
* | tlsexttest: pass message type to the extension functions | tb | 2020-07-03 | 1 | -144/+144 | |
| | | | | ok beck jsing | |||||
* | adjust alpn extension test to new argument order | tb | 2020-07-03 | 1 | -3/+3 | |
| | ||||||
* | adjust tlsexttest to new argument order | tb | 2020-07-03 | 1 | -5/+5 | |
| | ||||||
* | enable test-tls13-keyshare-omitted.py | tb | 2020-06-24 | 1 | -5/+2 | |
| | ||||||
* | Add test-ffdhe-expected-params.py | tb | 2020-06-24 | 1 | -1/+2 | |
| | ||||||
* | Enable lucky 13 test. | tb | 2020-06-19 | 1 | -5/+2 | |
| | ||||||
* | Add lucky13 and bleichenbacher-timing tests | tb | 2020-06-10 | 1 | -1/+7 | |
| | ||||||
* | Implement a rolling hash of the ClientHello message, Enforce RFC 8446 | beck | 2020-06-06 | 1 | -2/+2 | |
| | | | | | | | | section 4.1.2 to ensure subsequent ClientHello messages after a HelloRetryRequest messages must be unchanged from the initial ClientHello. ok tb@ jsing@ | |||||
* | Enable the record layer limits test and mark two finished test cases as | tb | 2020-06-03 | 1 | -5/+8 | |
| | | | | | xfail for now. Arguably, the expected decode_error is more appropriate than the decrypt_error that we send at the moment. | |||||
* | Enable the test-tls13-zero-length-data.py test, skipping the | tb | 2020-06-01 | 1 | -8/+10 | |
| | | | | three tests that fail due to a BIO_gets() bug. |