summaryrefslogtreecommitdiff
path: root/src/regress/lib (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove the now unnecessary tls_init() call.jsing2018-03-191-4/+1
|
* Add regress test ensuring autoinit stays pledge("stdio") safe.beck2018-03-193-1/+50
|
* Fix a format string issue that Go 1.10 complains about.jsing2018-03-151-1/+1
|
* Provide SSL_CTX_get_min_proto_version and SSL_CTX_get_max_proto_versionjca2018-03-151-13/+13
| | | | | | | | | We already provided the setters, so also provide the getters like OpenSSL does. Addition prompted by the use of those functions in recent openvpn releases. manpage diff from schwarze@ (thanks!) with input from jsing@, ok tb@ jsing@
* Update keypair regress to match revised keypair hash handling.jsing2018-02-141-11/+10
| | | | Apparently I failed to commit this when I committed the libtls change...
* Update regress to use tlsext_serverhello_parse().jsing2018-02-081-5/+3
|
* Update regress to match change to tls_keypair_pubkey_hash().jsing2018-02-081-3/+4
|
* Add a regress test that covers libtls keypairs.jsing2018-02-083-1/+248
|
* Tweak compiler flags to include -DLIBRESSL_INTERNAL and make more warningsjsing2018-02-081-2/+2
| | | | fatal.
* Add more free functions for NULL checks.jsing2018-02-071-16/+67
|
* Add more functions (based on those used in OpenSSH) to the free NULL test.jsing2018-02-071-1/+19
|
* typootto2018-01-281-2/+2
|
* add malloc_threaderrotto2018-01-281-1/+2
|
* Test for correct error when on thread allocates, and another does a double freeotto2018-01-282-0/+71
|
* Update regress to match removal of ssl_parse_clienthello_tlsext().jsing2018-01-271-5/+8
|
* Initialise new_cipher in the serverhello TLS extensions test, to avoid ajsing2017-12-281-3/+14
| | | | | | | | | | NULL pointer dereference in ssl_using_ecc_cipher(). Some compilers avoid triggering this, likely due to the EC formats list also being NULL. While here, setup the EC formats list so that we actually include the EC points format extension in the server hello extensions. Found the hard way by bcook@
* Add a regress test for tls_config_parse_protocols().jsing2017-12-093-1/+183
|
* Use a test value that fits into a long on both 32-bit and 64-bitjsing2017-12-091-9/+11
| | | | architectures, so that the regress passes on both.
* Add regress coverage for ASN1_TYPE_{get,set}_int_octetstring()jsing2017-11-282-2/+147
|
* Add regress test coverage for building clienthello and serverhellojsing2017-11-281-4/+201
| | | | | extensions, both with extensions being present and not present. The not present case currently fails.
* Add regress for CBB_discard_child().jsing2017-11-281-2/+56
| | | | Converted from BoringSSL.
* Add a regression test for ldexp(3).visa2017-10-153-2/+82
|
* Update regress now that ssl_cipher_list_to_bytes() takes a CBB.jsing2017-10-111-3/+9
| | | | Based on a diff from doug@
* Revise regress now that ssl_bytes_to_cipher_list() takes a CBS.jsing2017-10-101-20/+10
|
* When parsing extensions by calling the parse functions directly, ensurejsing2017-08-291-2/+82
| | | | | that we have consumed all of the extension data. This catches the ALPN extension handling issue that was just fixed.
* Some style(9).jsing2017-08-281-3/+6
|
* Remove chacha20-poly1305-old regress and test vectors.jsing2017-08-282-627/+0
|
* Use current chacha20-poly1305 cipher suite values.jsing2017-08-281-7/+7
|
* Update due to removal of original chacha20-poly1305 cipher suites.jsing2017-08-281-42/+39
|
* Rewrite SRTP extension using CBB/CBS and the new extension framework.doug2017-08-271-1/+402
| | | | input + ok beck@, jsing@
* check return value from CBB_initbeck2017-08-271-2/+3
|
* Rewrite ALPN extension using CBB/CBS and the new extension framework.doug2017-08-261-1/+381
| | | | | ok bcook@ beck@ input + ok jsing@
* test locale priorities and overridesschwarze2017-08-161-1/+36
|
* test isalpha_l(3), tolower_l(3), wctype_l(3), iswctype_l(3),schwarze2017-08-161-4/+149
| | | | | wctrans_l(3), towctrans_l(3), wcscasecmp_l(3), wcsncasecmp_l(3), and strerror_l(3)
* test nl_langinfo_l(3), iswalpha_l(3), towupper_l(3)schwarze2017-08-162-3/+44
|
* refactor in preparation for testing more functions; no functional changeschwarze2017-08-152-114/+117
|
* Rewrite the TLS status request extension to use the new TLS extension framework.beck2017-08-121-1/+128
| | | | ok jsing@
* Add regress coverage for the TLS signature algorithms extension.jsing2017-08-121-1/+163
|
* Rewrite session ticket TLS extension handling using CBB/CBS and the newdoug2017-08-121-1/+302
| | | | | | extension framework. ok jsing@ beck@
* Remove NPN test coverage.jsing2017-08-122-129/+1
|
* errant whitespacebeck2017-08-121-3/+3
|
* fix resource leaks, ok @guentherbcook2017-08-121-3/+7
|
* Update the TLSv1.2 Client Hello messages, due to the removal of DSAjsing2017-08-121-20/+18
| | | | sigalgs.
* Be consistent with goto labels, failure flag and use of FAIL macro.jsing2017-08-111-128/+105
|
* doug@ added code in here as well.jsing2017-08-111-1/+2
|
* Sort by extension/function name.jsing2017-08-111-577/+576
|
* Rewrite EllipticCurves TLS extension handling using CBB/CBS and the newdoug2017-08-111-1/+337
| | | | | | extension framework. input + ok jsing@
* Rewrite the ECPointFormats TLS extension handling using CBB/CBS and thedoug2017-08-111-1/+470
| | | | | | new extension framework. input + ok jsing@
* first draft of tests for newlocale(3), duplocale(3), uselocale(3)schwarze2017-08-102-0/+268
|
* Sort subdir, run getaddrinfo test, remove vax case.bluhm2017-07-271-13/+21
|