Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Fix previous | tb | 2024-08-02 | 1 | -5/+3 |
| | | | | | Arguably the want_protocol entries in various of these tests are incorrect but I'll leave that for another day. | ||||
* | Adjust tls regress for protocol parsing fixes | tb | 2024-08-02 | 3 | -16/+22 |
| | | | | | This mostly reverts what was done by beck in Tallinn and adjust tlstest to add new test cases and now failing connection tests. | ||||
* | Use the new certificates/chains in regress. | jsing | 2024-03-20 | 3 | -10/+10 |
| | | | | | | | | | | The new certificates are more representative of the real world. The old certificates use weak algorithms and expire in the very near future. Most of our regress has already been switched over, this changes the remainder. Thanks to Bernhard M. Wiedemann for reminding us of the upcoming expiry. ok tb@ | ||||
* | Remove the ability to do tls 1.0 and 1.1 from libtls. | beck | 2023-07-02 | 3 | -20/+13 |
| | | | | | | | | With this change any requests from configurations to request versions of tls before tls 1.2 will use tls 1.2. This prepares us to deprecate tls 1.0 and tls 1.1 support from libssl. ok tb@ | ||||
* | Refactor tls_check_common_name to use lower level API. | beck | 2023-05-28 | 1 | -2/+4 |
| | | | | | | | | | | | | | | | | | | | | X509_NAME_get_text_by_NID is kind of a bad interface that we wish to make safer, and does not give us the visibility we really want here to detect hostile things. Instead call the lower level functions to do some better checking that should be done by X509_NAME_get_text_by_NID, but is not in the OpenSSL version. Specifically we will treat the input as hostile and fail if: 1) The certificate contains more than one CN in the subject. 2) The CN does not decode as UTF-8 3) The CN is of invalid length (must be between 1 and 64 bytes) 4) The CN contains a 0 byte 4) matches the existing logic, 1 and 2, and 3 are new checks. ok tb@ | ||||
* | Make the signertest work better with the portable test framework | tb | 2023-04-14 | 2 | -14/+12 |
| | |||||
* | Revert previous. The added includes were already there. Duh. | tb | 2022-07-16 | 1 | -4/+1 |
| | |||||
* | Explicitly include fcntl.h and unistd.h for pipe2 | tb | 2022-06-22 | 1 | -1/+4 |
| | |||||
* | Switch to using TLS_INT instead of handrolling it | tb | 2022-06-15 | 1 | -3/+2 |
| | |||||
* | Adjust the signer test to link statically and work with hidden tls_signer | tb | 2022-03-24 | 2 | -3/+7 |
| | | | | API. | ||||
* | Garbage collect the unused hash and print kp->pubkey_hash instead of NULL. | tb | 2022-02-08 | 1 | -7/+4 |
| | | | | | | Make sure kp is freed also on error. ok jsing | ||||
* | Use TLS_PADDING_* defines. | jsing | 2022-02-01 | 1 | -4/+6 |
| | |||||
* | Revise/simplify for signer interface change. | jsing | 2022-02-01 | 1 | -20/+10 |
| | |||||
* | Add test coverage for tls_signer when used with a TLS server. | jsing | 2022-01-30 | 1 | -2/+189 |
| | | | | | | In this configuration the tls_signer is provided with the server certificate and private key, while the TLS server is configured with a sign callback and is only provided with the certificate. | ||||
* | Add initial regress for tls_signer. | jsing | 2022-01-30 | 3 | -1/+305 |
| | |||||
* | Free cert, key and ocsp_staple on exit of do_keypair_test(). | tb | 2021-12-04 | 1 | -1/+4 |
| | | | | Reported by Ilya Shipitsine, discussed with jsing | ||||
* | Clean up client and server tls{,_config} contexts in tls_test(). | tb | 2021-04-04 | 1 | -2/+11 |
| | | | | Leaks reported by Ilya Shipitsin. | ||||
* | Make this test module aware so it passes with Go 1.16 | tb | 2021-02-23 | 1 | -0/+4 |
| | |||||
* | Add a missing circular_init() call in the TLS ordering test. | jsing | 2020-07-04 | 1 | -1/+3 |
| | | | | | | | This makes the regress work correctly again - this was previously masked by the fact that tls_close() (and hence SSL_shutdown()) was draining the circular buffer, whereas now we're leaving data behind from a previous test, resulting in the ordering test failing. | ||||
* | Add TLS versioning tests. | jsing | 2020-05-13 | 1 | -2/+96 |
| | | | | | This ensures that a TLSv1.0, TLSv1.1, TLSv1.2 or TLSv1.3 client can talk with an appropriately configured server and vice versa. | ||||
* | Use a larger (2048 bit) RSA test key. | jsing | 2020-05-04 | 1 | -1/+63 |
| | | | | Otherwise we fail to do PSS signatures since the key size is too small. | ||||
* | Update protocol version test to include TLSv1.3. | jsing | 2020-02-16 | 2 | -0/+3 |
| | |||||
* | Update libtls config regress to include TLSv1.3. | jsing | 2020-01-20 | 1 | -9/+16 |
| | |||||
* | Add tls_conn_cipher_strength() to gotls regress. | jsing | 2019-11-02 | 2 | -2/+20 |
| | |||||
* | Do not check for working go executable during make clean cleandir obj. | bluhm | 2019-04-24 | 1 | -1/+3 |
| | | | | reminded by jsing@ | ||||
* | Add subdirectires with SUBDIR += instead of a single assignment with | tb | 2018-11-09 | 1 | -7/+6 |
| | | | | line continuations. | ||||
* | Revise regress to match tls_keypair_clear() removal. | jsing | 2018-04-07 | 1 | -18/+3 |
| | |||||
* | Remove the now unnecessary tls_init() call. | jsing | 2018-03-19 | 1 | -4/+1 |
| | |||||
* | Fix a format string issue that Go 1.10 complains about. | jsing | 2018-03-15 | 1 | -1/+1 |
| | |||||
* | Update keypair regress to match revised keypair hash handling. | jsing | 2018-02-14 | 1 | -11/+10 |
| | | | | Apparently I failed to commit this when I committed the libtls change... | ||||
* | Update regress to match change to tls_keypair_pubkey_hash(). | jsing | 2018-02-08 | 1 | -3/+4 |
| | |||||
* | Add a regress test that covers libtls keypairs. | jsing | 2018-02-08 | 3 | -1/+248 |
| | |||||
* | Tweak compiler flags to include -DLIBRESSL_INTERNAL and make more warnings | jsing | 2018-02-08 | 1 | -2/+2 |
| | | | | fatal. | ||||
* | Add a regress test for tls_config_parse_protocols(). | jsing | 2017-12-09 | 3 | -1/+183 |
| | |||||
* | Add a (currently failing) call to tls_handshake() on a client context that | jsing | 2017-05-07 | 1 | -1/+8 |
| | | | | | has not yet been connected. We expect this to fail, but it should fail gracefully. | ||||
* | Also test calling tls_handshake() on a server connection context that has | jsing | 2017-05-07 | 1 | -1/+7 |
| | | | | already completed a TLS handshake. | ||||
* | Add a test that calls tls_handshake() on a connection that has already | jsing | 2017-05-07 | 1 | -1/+7 |
| | | | | | completed a TLS handshake. This should return a failure, but currently succeeds (hence the regress currently fails). | ||||
* | An an initial sequencing/ordering test for libtls. | jsing | 2017-05-07 | 1 | -1/+61 |
| | |||||
* | Split TLS client/server handshake and close code into separate functions | jsing | 2017-05-06 | 1 | -4/+27 |
| | | | | so that it can be reused. | ||||
* | Move TLS test code into a function that is called from main, making it | jsing | 2017-05-06 | 2 | -17/+33 |
| | | | | easier for new tests to be added. | ||||
* | Free tls_configs earlier now that we have refcounting. | jsing | 2017-05-06 | 1 | -4/+4 |
| | |||||
* | Add missing tls_init() and tls_free() calls. | jsing | 2017-04-30 | 1 | -1/+4 |
| | |||||
* | Rework and significantly extend TLS name verification tests to match | jsing | 2017-04-10 | 1 | -99/+377 |
| | | | | changes in libtls. | ||||
* | Improve unknown protocol version handling. | jsing | 2017-04-09 | 1 | -2/+3 |
| | |||||
* | In ssl.h TLS 1.0 is called TLSv1. Adapt name in test to make it pass. | bluhm | 2017-04-07 | 1 | -1/+1 |
| | | | | OK jsing@ | ||||
* | Add a test that covers a libtls client talking to a Go TLS server with | jsing | 2017-03-07 | 1 | -5/+107 |
| | | | | | varying minimum and maximum protocol versions. This gives us protocol version test coverage against an independent TLS stack. | ||||
* | Allow ciphers to be set on the TLS config. | jsing | 2017-03-07 | 1 | -0/+10 |
| | |||||
* | Provide support for libtls protocols and allow for protocols to be set on | jsing | 2017-03-07 | 1 | -3/+47 |
| | | | | | a TLS config. The ConnVersion function now also returns a protocol version instead of a string. | ||||
* | Add handling for errors on the TLS config and properly check/handle | jsing | 2017-03-07 | 2 | -6/+23 |
| | | | | failures when setting the CA file. | ||||
* | libtls errors are much more descriptive these days - return them directly | jsing | 2017-03-07 | 1 | -9/+8 |
| | | | | and avoid adding redundant/duplicate information. |