summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Add regress tests for max shared version code.jsing2017-01-031-2/+133
|
* Add regress coverage for enabled protocol version range.jsing2016-12-302-1/+146
|
* Extend regress to include a peer certificate in the session.jsing2016-12-261-58/+134
|
* Ensure that after an i2d_SSL_SESSION() call, the passed pointer now pointsjsing2016-12-261-8/+9
| | | | to the end of the buffer.
* Update regress for ECDHE with X25519.jsing2016-12-211-41/+41
|
* Update libcrypto regress to handle header and non-exported symbol changes.jsing2016-12-214-4/+10
|
* Ensure negative time/timeout are handled appropriately.jsing2016-12-211-1/+27
|
* Revise regress for changes to ssl_parse_serverhello_tlsext().jsing2016-12-181-3/+3
| | | | Same diff from inoguchi@
* Update regress test to handle change to ssl_cipher_list_to_bytes().jsing2016-12-041-10/+11
|
* Update regress for IDEA cipher suite removal.jsing2016-11-061-83/+83
|
* Add regress test script for openssl command.inoguchi2016-11-063-2/+966
| | | | ok beck@
* Add regress for X25519, converted from BoringSSL.jsing2016-11-053-1/+150
|
* Set PROG so that the binary correctly gets recompiled when the librariesmiod2016-11-051-11/+5
| | | | | | it is linked against change. ok beck@ jsing@
* Move pqueue regress from libcrypto to libssl, since that's where the pqueuejsing2016-11-045-5/+5
| | | | | code now lives. Also unbreak the regress following the symbol hiding changes in libssl.
* Some tests require internal symbols; have them link with the staticguenther2016-11-044-8/+10
| | | | | | | libssl or libtls so they can continue to see them after the shared library namespace is cleaned up ok jsing@
* Update client hello messages to follow the removal of fixed ECDH.jsing2016-10-191-89/+65
|
* Enable mbrtowc(3) and wcrtomb(3) tests now that mbsinit(3) works.schwarze2016-09-051-2/+2
| | | | Related to locale/multibyte_citrus.c rev. 1.7.
* test wcrtomb(3)schwarze2016-09-042-0/+93
|
* test mbrtowc(3) in conjunction with mbsinit(3)schwarze2016-09-032-0/+93
|
* import new BN tests from OpenSSLbcook2016-09-032-167/+434
| | | | | | | New tests that various BIGNUM methods behave correctly on zero/even inputs. from OpenSSL ok beck@
* remove unneeded reach-around includebcook2016-09-031-2/+2
|
* Print SKIPPED if a regress test cannot be executed for some reason.bluhm2016-09-021-2/+3
| | | | This allows to identify such tests by looking at their output.
* Fix build of regress after source movesbeck2016-09-021-2/+2
|
* Make this regress build againbeck2016-09-022-4/+4
|
* Enable ALPN regress now that it passes.jsing2016-08-271-4/+2
|
* Pull in <stdio.h> for NULLguenther2016-08-271-1/+2
| | | | ok deraadt@
* Fix usage() output and getopt sortingguenther2016-07-131-6/+6
|
* add ca cert error check and make the path configurablebcook2016-07-071-1/+9
| | | | from Kinichiro Inoguchi
* remove extra assignment of s from 1.11, fix regression testbcook2016-07-051-2/+1
|
* On systems where we do not have BN_ULLONG defined (most 64-bit systems),bcook2016-07-051-4/+24
| | | | | | | | | | | | | | BN_mod_word() can return incorrect results if the supplied modulus is too big, so we need to fall back to BN_div_word. Now that BN_mod_word may fail, handle errors properly update the man page. Thanks to Brian Smith for pointing out these fixes from BoringSSL: https://boringssl.googlesource.com/boringssl/+/67cb49d045f04973ddba0f92fe8a8ad483c7da89 https://boringssl.googlesource.com/boringssl/+/44bedc348d9491e63c7ed1438db100a4b8a830be ok beck@
* make less awful.. test against cloudflare toobeck2016-07-052-9/+19
|
* Add a nasty little ocsp regress test in the hope pedants will make it better.beck2016-07-043-1/+140
|
* Remove flags for disabling constant-time operations.bcook2016-06-302-70/+33
| | | | | | | | This removes support for DSA_FLAG_NO_EXP_CONSTTIME, DH_FLAG_NO_EXP_CONSTTIME, and RSA_FLAG_NO_CONSTTIME flags, making all of these operations unconditionally constant-time. Based on the original patch by César Pereid. ok beck@
* Gix misleading indent pointed out by GCC 6.1.libressl-v2.4.0bcook2016-05-301-4/+4
| | | | ok beck@ jsing@
* Nuke sigret.cbeck2016-05-292-198/+0
| | | | ok deraadt@ kettenis@
* We don't have sigreturn anymorebeck2016-05-291-2/+2
|
* tests for the two segfaults in backref() that were just fixedschwarze2016-05-261-1/+4
|
* Fix an oversight that caused the test program to segfault:schwarze2016-05-261-2/+2
| | | | Don't try to calculate strlen(NULL).
* systematically test all combinations of REG_STARTEND, REG_NEWLINE,schwarze2016-05-261-9/+85
| | | | and REG_NOTBOL with line and word anchors
* support for testing REG_STARTEND together with REG_NOTBOLschwarze2016-05-261-1/+4
|
* Update regress test to reflect changes in the cipher list.jsing2016-04-281-61/+62
|
* Update AEAD regress to match EVP_aead_chacha20_poly1305() changes.jsing2016-04-282-83/+83
|
* After opening an AEAD, ensure that the decrypted output matches thejsing2016-04-131-0/+5
| | | | plaintext for the regress test case.
* check return value for BN_hex2bn in regression testsbcook2016-03-131-4/+10
|
* Add a test for negated POSIX characer classes.millert2016-02-261-0/+1
|
* initialize pointer to avoid undefined free on failurebcook2015-12-281-2/+2
| | | | ok beck@
* Make sure we use a sigjmp_buf in the sigsetjmp() part of the test.miod2015-11-084-4/+7
|
* Add EVP_aead_chacha20_poly1305_ietf() - The informational RFC 7539,reyk2015-11-022-0/+42
| | | | | | | | | "ChaCha20 and Poly1305 for IETF Protocols", introduced a modified AEAD construction that is incompatible with the common style that has been already used in TLS with EVP_aead_chacha20_poly1305(). The IETF version also adds a constant (salt) that is prepended to the nonce. OK mikeb@ jsing@
* print unsigned ints with %u, not %d. Reported by Pascal Cuoq.miod2015-10-301-2/+2
|
* Add explicit LL suffixes to the numerical constants which do not fit in 32 bits.miod2015-10-301-8/+8
|