summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* set the NEGOTIATED flag in the flags argument rather thantb2019-01-241-4/+4
| | | | squeezing it into the table.
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-241-6/+435
| | | | | | | | extensions for tls1.3. versions is currently defanged to ignore its result until tls13 server side wired in full, so that server side code still works today when we only support tls 1.2 ok bcook@ tb@ jsing@
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-242-31/+21
| | | | | Remove GOST based sigalgs from TLS 1.2 since they don't work with TLS 1.2. ok jsing@
* make whitespace inside curlies consistent; sort function prototypes.tb2019-01-231-24/+24
|
* Rename NUM_HANDSHAKE to handshake_count and make it a variabletb2019-01-232-10/+44
| | | | | | | | | so it can be used from regress. Update regress accordingly. Make sure the print target generates the entire table as it currently is in tls13_handshake.c discussed with beck and jsing ok jsing
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-232-25/+28
| | | | | | | | | | - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2. - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 from a 1.3 handshake. ok jsing@ tb@
* revert previous, accidentally contained another diff in additionbeck2019-01-232-28/+25
| | | | to the one I intended to commit
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-232-25/+28
| | | | | | | | | - Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2 - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 ok jsing@ tb@
* incorrrect spellingtb2019-01-231-2/+2
|
* do not print the command in the print: targettb2019-01-231-2/+2
|
* Add a regression test that builds up the handshake state tabletb2019-01-232-1/+399
| | | | | | | from graph information and cross-checks it against the state table in tls13_handshake.c. with help from jsing
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-223-3/+191
| | | | | | | xchacha is a chacha stream that allows for an extended nonce, which in turn makes it feasible to use random nonces. ok tb@
* Update record regress to match functionality changes.jsing2019-01-201-6/+37
|
* hook handshake testtb2019-01-201-1/+2
|
* Add a simple test that verifies that every valid handshaketb2019-01-202-0/+76
| | | | sets action->handshake_complete.
* Hook record regress.jsing2019-01-191-1/+3
|
* Add regress for TLSv1.3 record handling.jsing2019-01-192-0/+533
|
* initialize offset value so this passesbeck2019-01-181-0/+1
| | | | ok jsing@
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-181-1/+192
| | | | ok jsing@
* Removed unused struct members.jsing2019-01-181-2/+0
|
* Update regress following TLS extension renaming.jsing2019-01-182-379/+378
|
* Add regress for extensible buffer code.jsing2019-01-173-1/+169
|
* Add regress test for bugs in stdio/fread.c rev 1.13 and 1.17millert2018-12-163-2/+160
|
* add a -R option to set/unset resolver flags.libressl-v2.9.0eric2018-12-159-20/+101
| | | | use strcasecmp for reading args.
* This test does not terminate if malloc conf is preconfigured withbluhm2018-11-291-2/+6
| | | | | J. Clear that option to allow running full regress with paranoid malloc flags. This is the same fix as for malloc_ulimit1.
* We're manipulating malloc flags ourselves, start with restting them all.otto2018-11-291-1/+5
| | | | ok bluhm@
* This test does not terminate if malloc conf is preconfigured withbluhm2018-11-281-4/+8
| | | | | | J. Clear that option to allow running full regress with paranoid malloc flags. Also fix whitespace. OK otto@
* Just err if we can't create secretsbeck2018-11-131-2/+2
|
* Rework the sm3 regress based on a suggestion by jsing. Zap the weirdtb2018-11-121-30/+36
| | | | | | hex_encode() function and use byte arrays instead of strings to store the expected values. Snatch and tweak hexdump() from beck's key_schedule test to pretty-print data in case of failure.
* Fix a race in libssl interop regress. The success messages frombluhm2018-11-113-6/+9
| | | | | the server child could be delayed. In this case wait a second and check again.
* Hook up sm3 regress tests.tb2018-11-111-1/+2
|
* Add sm3 regress tests.tb2018-11-112-0/+101
|
* Add automatic threading initialization for libcrypto.bcook2018-11-111-56/+0
| | | | | | | | | | | | | | This implements automatic thread support initialization in libcrypto. This does not remove any functions from the ABI, but does turn them into no-ops. Stub implementations of pthread_mutex_(init|lock|unlock) are provided for ramdisks. This does not implement the new OpenSSL 1.1 thread API internally, keeping the original CRYTPO_lock / CRYPTO_add_lock functions for library locking. For -portable, crypto_lock.c can be reimplemented with OS-specific primitives as needed. ok beck@, tb@, looks sane guenther@
* Reorganize libssl interop tests. Move netcat tests into separatebluhm2018-11-119-148/+197
| | | | | directory. Keep all log files for easier debugging. Name regress target names consistently.
* Spelingbeck2018-11-101-2/+2
|
* Regress client and server can do session reuse now. Test this withbluhm2018-11-106-129/+220
| | | | | all combinations of LibreSSL, OpenSSL 1.0.2, and OpenSSL 1.1. It is currently disabled for TLS 1.3 as this needs more setup.
* Make sure the interop test happen last (since they take a long time)beck2018-11-102-8/+9
|
* Clean up and free objects at the completion of the regress test.jsing2018-11-101-1/+13
| | | | From Ben L <bobsayshilol at live dot co dot uk>.
* fix a leak reported by Ben L (bobsayshilol () live ! co ! uk)tb2018-11-101-1/+3
|
* Fix a leak reported by Ben L bobsayshilol () live ! co ! uk.tb2018-11-101-1/+3
|
* fix a leak pointed out by Ben L (bobsayshi () live ! co ! uk)tb2018-11-101-4/+8
|
* More regress all the way to exporter_masterbeck2018-11-101-4/+44
|
* Fix last of the empty hash nonsensebeck2018-11-101-6/+3
| | | | ok jsing@
* Update key schedule regress to match API changes.jsing2018-11-091-21/+12
|
* The Botan library from ports an be configured to use OpenSSL orbluhm2018-11-092-1/+22
| | | | | | | | LibreSSL as crypto provider. When we run their regression tests, we are actually testing our library. This is far from perfect. A lot of LibreSSL features have not been implemented as Botan provider. Even if provider openssl is specified, botan-test runs a lot of non-openssl tests. This can be improved later.
* remove the not yet implemented "handshake" subdirectorytb2018-11-091-2/+1
|
* Add subdirectires with SUBDIR += instead of a single assignment withtb2018-11-093-67/+65
| | | | line continuations.
* The cert subdir is testing all combinations of certificate validation.bluhm2018-11-0911-48/+244
| | | | | | Having the three libraries, client and server certificates, missing or invalid CA or certificates, and enforcing peer certificate results in 1944 new test cases.
* Add missing NULL checks on allocation, style(9) and consistently usejsing2018-11-081-35/+34
| | | | goto err instead of handrolling.
* Add missing BN_free() calls.jsing2018-11-081-1/+3
| | | | From Ben L <bobsayshilol at live dot co dot uk>.