summaryrefslogtreecommitdiff
path: root/src/regress/lib (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* fix printing of client app secretbeck2019-11-181-2/+2
|
* Add regress for the updating of sever and client application secretsbeck2019-11-181-2/+47
|
* It has been called to my attention that the cookie monster ascii artbeck2019-11-101-17/+7
| | | | | | | | | in this test which I had obtained from a site purporting it to be free for use with artist attribtion might not be. After looking at at some other muppett ascii art for inspiration I am replacing this with my own ascii art muppet to replace the previously used cookie monster. The copyright for the art is the same as my code.
* use curly braces for consistencytb2019-11-061-2/+2
|
* Add regress for CMS sign and verify.jsing2019-11-041-2/+125
|
* Hook cms regress.jsing2019-11-021-1/+2
|
* Include cms.h.jsing2019-11-021-1/+2
|
* Initial regress for cms.jsing2019-11-022-0/+199
|
* Add tls_conn_cipher_strength() to gotls regress.jsing2019-11-022-2/+20
|
* Feed the bntest output to bc(1). This checks the result of the bigbluhm2019-09-052-13/+16
| | | | | | num calculations and avoids lots of ugly output to stdout. Remove fflush(3) of stderr, it is unbuffered anyway. with Moritz Buhl
* check for asprintf failing allocationderaadt2019-06-271-1/+4
|
* Set malloc_options in global scope with an initializer.bluhm2019-06-122-10/+8
| | | | recommended by otto@
* Disable junking with malloc options. If set, the test hangs on lowbluhm2019-06-111-2/+5
| | | | | memory arm64 machines. found by patrick@; OK otto@
* Move to env var, likelky the possibility to set malloc options fromotto2019-06-042-19/+8
| | | | main is going away.
* Throw malloc_conceal and freezero into the mix.otto2019-05-231-3/+8
|
* Use propper regress target to integrate better into test framework.bluhm2019-05-141-2/+4
|
* The call to fseek(fp, -1, SEEK_END) also sets the reported size tobluhm2019-05-131-10/+10
| | | | | | this value. To match the expectation of the test again, move this line before the the code that sets the final position. OK yasuoka@
* Add a test vector for Streebog 512 from Guido Vrankentb2019-05-091-1/+2
|
* Proper prototype for main(). Make sparc64 happier.claudio2019-05-091-2/+4
|
* Add test fseek(,-1) works properly.yasuoka2019-05-021-3/+8
|
* Do not check for working go executable during make clean cleandir obj.bluhm2019-04-241-1/+3
| | | | reminded by jsing@
* Do not check for working go executable during make clean cleandir obj.bluhm2019-04-241-1/+3
|
* Add a test for the bn_to_string() function introduced in v3_utl.c r1.32.tb2019-04-132-6/+133
|
* exitting -> exitingtb2019-04-071-1/+1
| | | | From Michael Scovetta, PR #108
* whitespace consistencytb2019-04-051-1/+2
|
* Add SERVER_HELLO_RETRY statetb2019-04-051-1/+7
|
* I forgot to mark some targets as .PHONYtb2019-04-041-1/+5
|
* Use correct define.jsing2019-04-041-2/+2
|
* Enable GOST cipher selection test after libssl has been fixed.bluhm2019-03-281-6/+1
|
* Update regress following sigalgs changes.jsing2019-03-251-17/+1
|
* Fix typo in usage and comment.bluhm2019-03-213-6/+6
|
* Add regress tests for the EVP_aes_*_wrap() API. Based on the tests intb2019-03-172-4/+19
| | | | OpenSSL 1.0.2r which is still freely licenced with a tweak by jsing.
* link sm4 regress to the buildtb2019-03-171-1/+2
|
* Add a regress test for the SM4 block cipher from the Chinese standardtb2019-03-172-0/+117
| | | | | | | GB/T 32907-2016. Patch from Daniel Wyatt ok inoguchi, jsing
* Test that all supported TLS ciphers actually work. Establishbluhm2019-02-218-26/+308
| | | | | | connections between client and server implemented with LibreSSL or OpenSSL with a fixed cipher on each side. Check the used cipher in the session print out.
* one more error message that should go to stderrtb2019-02-131-2/+3
|
* getopt(3) returns int, not char. Fix type of ch variable to preventbluhm2019-02-112-6/+6
| | | | sign error during arm regress.
* Use malloc() and memcpy() the test X25519 x25519_peer_public value.jsing2019-02-031-3/+6
| | | | | | | Otherwise, if tlsext_keyshare_server_build() fails we call free with a pointer to static memory and bad things happen. Reported by bcook@
* zap a commented out line. 0RTT will need more thought thantb2019-01-271-2/+1
| | | | just uncommenting this.
* refactor and clean up the code generating dot output.tb2019-01-271-53/+76
|
* print errors to stderrtb2019-01-251-19/+21
|
* sort output suffixestb2019-01-251-2/+2
|
* I am retiring my old email address; replace it with my OpenBSD one.millert2019-01-259-16/+16
|
* Add code to visualize the state machine. Both the state machine and thetb2019-01-242-5/+79
| | | | | | | output will have to be tweaked, but this may as well happen in-tree. To try it, pkg_add graphviz and run 'make handshake.svg' in this directory. Committing early so Bob's followers can play.
* set the NEGOTIATED flag in the flags argument rather thantb2019-01-241-4/+4
| | | | squeezing it into the table.
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-241-6/+435
| | | | | | | | extensions for tls1.3. versions is currently defanged to ignore its result until tls13 server side wired in full, so that server side code still works today when we only support tls 1.2 ok bcook@ tb@ jsing@
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-242-31/+21
| | | | | Remove GOST based sigalgs from TLS 1.2 since they don't work with TLS 1.2. ok jsing@
* make whitespace inside curlies consistent; sort function prototypes.tb2019-01-231-24/+24
|
* Rename NUM_HANDSHAKE to handshake_count and make it a variabletb2019-01-232-10/+44
| | | | | | | | | so it can be used from regress. Update regress accordingly. Make sure the print target generates the entire table as it currently is in tls13_handshake.c discussed with beck and jsing ok jsing
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-232-25/+28
| | | | | | | | | | - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2. - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 from a 1.3 handshake. ok jsing@ tb@