summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Initialize the mutex before making us of it from many threads. Preventsanton2022-04-031-28/+23
| | | | | | | | a race in which one thread is currently initializing the mutex which is not an atomic operation whereas another thread tries to use it too early. With and ok schwarze@
* Check EVPDigest* return values.tb2022-03-311-4/+7
| | | | CID 351293
* Add a simple test to ensure that pmeth->cleanup() can cope with NULLtb2022-03-302-2/+93
| | | | pkey_ctx->data.
* Remove double slash in path to test program.anton2022-03-301-9/+9
|
* Adjust the signer test to link statically and work with hidden tls_signertb2022-03-242-3/+7
| | | | API.
* Revise regress for ascii/text to ASN.1 object conversion rewrite.jsing2022-03-191-58/+10
|
* Add another invalid separator test case.jsing2022-03-191-1/+5
|
* Fix dependency to build bn_mod_sqrt.bluhm2022-03-161-2/+2
|
* Check BIO_reset() return value to make gcc happy.tb2022-03-151-2/+5
|
* Add a simple regress to verify that the infinite loop in BN_mod_sqrt()tb2022-03-152-1/+138
| | | | is fixed.
* Add a few regress test cases for name constraints.tb2022-03-143-5/+25
| | | | From Alex Wilson
* Simple regress for NULL deref reported by Guido Vranken and fixed intb2022-03-102-1/+51
| | | | bn_exp2.c r1.13.
* Some more c99 initializers for consistency and readabilitytb2022-03-081-23/+62
|
* Add test coverage for i2a_ASN1_OBJECT()jsing2022-03-051-3/+39
|
* Provide additional ASN1_OBJECT test coverage.jsing2022-03-021-16/+114
|
* Add regress coverage for ASN1_OBJECT public interfaces.jsing2022-02-262-1/+399
|
* Test OBJ_obj2txt() with NULL and short buffers.jsing2022-02-201-1/+12
|
* Add memory BIO small I/O tests.jsing2022-02-191-1/+72
|
* Add tests for memory BIO.jsing2022-02-171-2/+254
|
* Add test coverage for OBJ_txt2obj()/OBJ_obj2txt() with no_name == 0.jsing2022-02-121-4/+99
|
* Revise for OBJ_obj2txt() OID arc limits.jsing2022-02-121-4/+4
|
* Test OBJ_obj2nid() with an undefined (NID_undef) object.jsing2022-02-111-2/+2
|
* Add initial regress for objects.jsing2022-02-113-1/+449
|
* If running with ASAN, mark test_with{,out}_bzero() with thetb2022-02-101-3/+14
| | | | | | | | | | | | | no_sanitize_address attribute. ASAN doesn't seem to be able to understand these lowlevel gymnastics with sigaltstack() and segfaults in __intercept_memem(). This allows LibreSSL and other portable projects that use this test run tests with ASAN enabled. Issue reported and workaround suggested by Ilya Shipitsin Paraphrasing millert: it's a little ugly but it's only a regress.
* silence "function declaration isn't a prototype" warning by changingtb2022-02-091-6/+6
| | | | int foo() to int foo(void)
* Plug leaks reported by Ilya Shipitsintb2022-02-081-1/+5
|
* Plug a number of leaks reported by Ilya Shipitsintb2022-02-081-2/+9
|
* Garbage collect the unused hash and print kp->pubkey_hash instead of NULL.tb2022-02-081-7/+4
| | | | | | Make sure kp is freed also on error. ok jsing
* Fix memleaks reported by Ilya Shipitsintb2022-02-081-3/+5
|
* cope with recent S3I removal; ok tb@anton2022-02-061-2/+2
|
* Adapt appstest.sh for the new TLS_ names.tb2022-02-051-9/+5
|
* Add a workaround due to OpenSSL's limitation of SSL_CTX_set_cipher_listtb2022-02-051-1/+5
| | | | | | | | | | | | | | | | SSL_CTX_set_cipher_list() in OpenSSL 1.1 does not accept TLSv1.3 ciphers. This wasn't a problem until now since the AEAD- ciphers were counted as distinct from TLS_ ciphers by the regress test, so they were never used in the {run,check}-cipher-${cipher}-client-${clib}-server-${slib} tests With the renaming, the TLSv1.3 ciphers are now considered as common ciphers, so they're tested. With openssl11 this results in 0:error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher match:ssl/ssl_lib.c:2573: The design of these tests doesn't allow easily adding a call to SSL_CTX_set_ciphersuites (since they also need to work with openssl 1.0.2) so skip the TLS_* ciphers for the time being.
* Mechanically adjust from AEAD- to TLS_ to adjust to the new cipher names.tb2022-02-051-10/+5
|
* Adjust the ssl_get_shared_ciphers to the new names.tb2022-02-051-23/+23
|
* Revise for S3I removal.jsing2022-02-051-81/+81
|
* Use TLS_PADDING_* defines.jsing2022-02-011-4/+6
|
* Revise/simplify for signer interface change.jsing2022-02-011-20/+10
|
* Add test coverage for tls_signer when used with a TLS server.jsing2022-01-301-2/+189
| | | | | | In this configuration the tls_signer is provided with the server certificate and private key, while the TLS server is configured with a sign callback and is only provided with the certificate.
* Add initial regress for tls_signer.jsing2022-01-303-1/+305
|
* remove unused variable from all copies of _asr_strdname()naddy2022-01-202-6/+6
| | | | | | | | ... including those inlined into print_dname(). This also fixes -Wunused-but-set-variable warnings warnings in smtpd and smtpctl. The code was imported with asr and then copied around. ok deraadt@ guenther@
* Add ct.h and x509_vfy.hinoguchi2022-01-151-1/+3
|
* Undo static linking and other workarounds that are no longer neededtb2022-01-146-19/+15
| | | | after the bump
* Convert wycheproof.go for opaque EVP_AEAD_CTXtb2022-01-141-11/+18
|
* The cttest can link dynamically nowtb2022-01-141-2/+2
|
* Simplify BN_mont test slightly using a new accessor.tb2022-01-141-4/+2
|
* Only evp_pkey_check needs static linkingtb2022-01-121-2/+4
|
* Add a prototype for OBJ_bsearch_ so this test will keep workingtb2022-01-121-1/+6
| | | | | after the bump. Since this tests the public interfaces, we do not want to use LIBRESSL_INTERNAL/LIBRESSL_CRYPTO_INTERNAL here.
* Rework ecdsatest to build after the bump and link statically for nowtb2022-01-122-14/+26
|
* Rework dsatest to use accessors and link statically for nowtb2022-01-122-7/+7
|
* Rework dhtest to use accessors and link statically for nowtb2022-01-121-6/+6
| | | | For some reason CVS didn't want to commit this the first time around.