summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Update regress test to reflect changes in the cipher list.jsing2016-04-281-61/+62
|
* Update AEAD regress to match EVP_aead_chacha20_poly1305() changes.jsing2016-04-282-83/+83
|
* After opening an AEAD, ensure that the decrypted output matches thejsing2016-04-131-0/+5
| | | | plaintext for the regress test case.
* check return value for BN_hex2bn in regression testsbcook2016-03-131-4/+10
|
* Add a test for negated POSIX characer classes.millert2016-02-261-0/+1
|
* initialize pointer to avoid undefined free on failurebcook2015-12-281-2/+2
| | | | ok beck@
* Make sure we use a sigjmp_buf in the sigsetjmp() part of the test.miod2015-11-084-4/+7
|
* Add EVP_aead_chacha20_poly1305_ietf() - The informational RFC 7539,reyk2015-11-022-0/+42
| | | | | | | | | "ChaCha20 and Poly1305 for IETF Protocols", introduced a modified AEAD construction that is incompatible with the common style that has been already used in TLS with EVP_aead_chacha20_poly1305(). The IETF version also adds a constant (salt) that is prepended to the nonce. OK mikeb@ jsing@
* print unsigned ints with %u, not %d. Reported by Pascal Cuoq.miod2015-10-301-2/+2
|
* Add explicit LL suffixes to the numerical constants which do not fit in 32 bits.miod2015-10-301-8/+8
|
* Pull in <sys/types.h> to get ssize_t or <stdint.h> to get uint32_t, instead ofmiod2015-10-302-0/+2
| | | | | relying upon previously included headers to do this, to enhance portability; from Pascal Cuoq, libressl github pull request #52
* Change test to use length 128 (shortest long-form encoding).libressl-v2.3.1doug2015-10-251-2/+2
| | | | From BoringSSL commit: d13a5e15d4e4eb51513be665306a2beba39869df
* Hide __atexit and __atexit_register_cleanup()guenther2015-10-251-2/+3
| | | | | | | | Wrap __cxa_{atexit,finalize}() so the call from exit() goes direct Switch regress/lib/libc/atexit/ to be built with -static so that it can still access __atexit* ok millert@ jca@
* Missing initializer; spotted by coverity.miod2015-10-251-2/+2
|
* Use dprintf() instead of fprintf() in the signal handlerguenther2015-10-251-3/+4
|
* Cast ctype functions' arguments to unsigned char.mmcc2015-10-231-5/+5
|
* Add ifnameindex to te libc regress testsclaudio2015-10-231-3/+3
|
* Add a regress test for if_indextoname() and if_nametoindex()claudio2015-10-222-0/+42
|
* Extend tests to call ASN1_{GENERALIZED,UTC,}TIME_set_string() with a NULLjsing2015-10-221-1/+19
| | | | | | | pointer - because, you know, you might want to set a string on a NULL object. The previous implementation apparently allowed this as a way of testing if the string was valid... probably because the *_check() functions are only useable after the string has already been set.
* Fix case where we wanted to test ASN1_TIME_set_string() but were testingjsing2015-10-222-6/+6
| | | | ASN1_UTCTIME_set_string() twice instead.
* Add a regress for libc handling of SIGTHRguenther2015-10-222-0/+71
|
* Change regress to not believe legacy times are validbeck2015-10-191-65/+4
|
* Need <string.h> for memset()guenther2015-10-181-1/+2
|
* Single byte read/write tests.jsing2015-10-131-0/+67
|
* Add test coverage for peer certificate info and connection info.jsing2015-10-132-6/+231
|
* Make regress work again post hackathon tls_handshake/tls_read/tls_writejsing2015-10-131-7/+42
| | | | changes.
* Add another invalid time, which is currently accepted.jsing2015-10-021-1/+4
|
* Fix a bug in the regress, and be much more pedantic about what is allowedbeck2015-09-301-22/+46
| | | | | | | per RFC 5380 in an X509. RFC 5280 states that all times before 2050 must be specified as a UTCtime, not a Generalized time, and all times after must be a UTC time. By extension this also means the smallest time allowed per RFC 5280 is 500101000000Z and the largest is 99991231235959Z..
* Add an rfc5280 test suite to test x509_cmp_time.beck2015-09-292-2/+362
| | | | | | Note some of these will yet fail with the current libcrypto as the current X509_cmp_time is not RFC5280 compliant ok jsing@
* Fix sha2 regression test for libcrypto.doug2015-09-291-2/+2
| | | | | | | | | By default, "openssl sha" used SHA-0. However, it was possible to use the form "openssl sha -sha256" to run SHA-256 instead. The regression test used this form. Since we removed SHA-0 support, the regress tests should now call "openssl <digest>". ok guenther@, bcook@
* check if openssl(1) actually works before proceedingbcook2015-09-271-0/+2
| | | | | It was possible for this test to pass even if the openssl command itself was missing.
* Add DER encoding/decoding coverage for ASN.1 GENERALIZEDTIME and UTCTIME.jsing2015-09-251-39/+158
|
* Add initial regress tests for ASN.1 times.jsing2015-09-253-1/+372
|
* Zap RANDFILE.lteo2015-09-162-5/+3
|
* Test the exported strsignal() API, not the (now hidden) internal APIguenther2015-09-141-8/+2
| | | | noted by daniel@
* Temporarily revive MD4 for MS CHAP support.doug2015-09-143-1/+136
|
* Remove MD4 support from LibreSSL.doug2015-09-133-136/+1
| | | | | | | | MD4 should have been removed a long time ago. Also, RFC 6150 moved it to historic in 2011. Rides the major crank from removing SHA-0. Discussed with many including beck@, millert@, djm@, sthen@ ok jsing@, input + ok bcook@
* Another style(9) grenade.jsing2015-09-131-550/+825
|
* Remove SHA-0 support.doug2015-09-134-176/+1
| | | | | | | SHA-0 was withdrawn shortly after publication 20 years ago and replaced with SHA-1. This will require a major crank. ok bcook@, jsing@
* Revise regression test so that it works correctly with AES taking priorityjsing2015-09-131-34/+191
| | | | if hardware acceleration is available.
* Remove explicit NULL checks before *_free() calls and tidy some code.jsing2015-09-131-28/+22
|
* Use ECDH_size() and do some other clean up.jsing2015-09-131-7/+6
|
* remove e_os2.h includesbcook2015-09-132-2/+0
| | | | ok jsing@
* Wrap long lines.jsing2015-09-131-16/+32
|
* style(9) grenade.jsing2015-09-131-153/+178
|
* Cleanup enginetest a bit.bcook2015-09-121-104/+84
| | | | | It was the only thing preventing -Werror from building on some systems due to the unchecked asprintf's.
* regress test that we do not allow a wildcard match for ".openbsd.org"beck2015-09-111-1/+6
| | | | against a wildcard of "*.openbsd.org"
* fix verify to allow for servername->namebeck2015-09-111-25/+25
| | | | ok jsing@
* Add an initial TLS client regress, which currently covers ClientHellojsing2015-09-013-1/+369
| | | | message generation.
* Remove SSLv3 support from LibreSSL regression tests.doug2015-08-273-56/+5
|