summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add regress tests for the EVP_aes_*_wrap() API. Based on the tests intb2019-03-172-4/+19
* link sm4 regress to the buildtb2019-03-171-1/+2
* Add a regress test for the SM4 block cipher from the Chinese standardtb2019-03-172-0/+117
* Test that all supported TLS ciphers actually work. Establishbluhm2019-02-218-26/+308
* Add tests for pkeyutlinoguchi2019-02-161-6/+46
* one more error message that should go to stderrtb2019-02-131-2/+3
* getopt(3) returns int, not char. Fix type of ch variable to preventbluhm2019-02-112-6/+6
* Use malloc() and memcpy() the test X25519 x25519_peer_public value.jsing2019-02-031-3/+6
* zap a commented out line. 0RTT will need more thought thantb2019-01-271-2/+1
* refactor and clean up the code generating dot output.tb2019-01-271-53/+76
* print errors to stderrtb2019-01-251-19/+21
* sort output suffixestb2019-01-251-2/+2
* I am retiring my old email address; replace it with my OpenBSD one.millert2019-01-259-16/+16
* Add code to visualize the state machine. Both the state machine and thetb2019-01-242-5/+79
* set the NEGOTIATED flag in the flags argument rather thantb2019-01-241-4/+4
* Add server side of versions, keyshare, and client and server of cookiebeck2019-01-241-6/+435
* Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.beck2019-01-242-31/+21
* make whitespace inside curlies consistent; sort function prototypes.tb2019-01-231-24/+24
* Rename NUM_HANDSHAKE to handshake_count and make it a variabletb2019-01-232-10/+44
* Modify sigalgs extension processing to accomodate TLS 1.3.beck2019-01-232-25/+28
* revert previous, accidentally contained another diff in additionbeck2019-01-232-28/+25
* Modify sigalgs extension processing for TLS 1.3.beck2019-01-232-25/+28
* incorrrect spellingtb2019-01-231-2/+2
* do not print the command in the print: targettb2019-01-231-2/+2
* Add a regression test that builds up the handshake state tabletb2019-01-232-1/+399
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-223-3/+191
* Update record regress to match functionality changes.jsing2019-01-201-6/+37
* hook handshake testtb2019-01-201-1/+2
* Add a simple test that verifies that every valid handshaketb2019-01-202-0/+76
* Hook record regress.jsing2019-01-191-1/+3
* Add regress for TLSv1.3 record handling.jsing2019-01-192-0/+533
* initialize offset value so this passesbeck2019-01-181-0/+1
* Add client side of supported versions and keyshare extensions with basic regressbeck2019-01-181-1/+192
* Removed unused struct members.jsing2019-01-181-2/+0
* Update regress following TLS extension renaming.jsing2019-01-182-379/+378
* Add regress for extensible buffer code.jsing2019-01-173-1/+169
* Add regress test for bugs in stdio/fread.c rev 1.13 and 1.17millert2018-12-163-2/+160
* add a -R option to set/unset resolver flags.libressl-v2.9.0eric2018-12-159-20/+101
* This test does not terminate if malloc conf is preconfigured withbluhm2018-11-291-2/+6
* We're manipulating malloc flags ourselves, start with restting them all.otto2018-11-291-1/+5
* This test does not terminate if malloc conf is preconfigured withbluhm2018-11-281-4/+8
* Just err if we can't create secretsbeck2018-11-131-2/+2
* Rework the sm3 regress based on a suggestion by jsing. Zap the weirdtb2018-11-121-30/+36
* Fix a race in libssl interop regress. The success messages frombluhm2018-11-113-6/+9
* Hook up sm3 regress tests.tb2018-11-111-1/+2
* Add sm3 regress tests.tb2018-11-112-0/+101
* Add automatic threading initialization for libcrypto.bcook2018-11-111-56/+0
* Reorganize libssl interop tests. Move netcat tests into separatebluhm2018-11-119-148/+197
* Spelingbeck2018-11-101-2/+2
* Regress client and server can do session reuse now. Test this withbluhm2018-11-106-129/+220