summaryrefslogtreecommitdiff
path: root/src/regress (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Implement Wei25519 to exercise some more elliptic curve codetb2024-10-161-1/+284
| | | | | | | | This provides a non-trivial non-builtin curve that is unlikely to ever become a builtin curve. This exercises the cofactor guessing code and and ensures that things work as far as they can with a custom OID. The main reason for adding it is to have a "real-world" example for an upcoming check that EC parameters represent a builtin curve.
* rust-openssl: set resolver="2" for workspacetb2024-10-151-0/+1
| | | | silences an annoying warning
* Extend ec_asn1_test to check for correct curve coefficient encodingtb2024-10-141-5/+50
|
* Exercise the EC parameters code a bit moretb2024-10-121-1/+103
| | | | | | Ensure all builtin curves can be roundtripped through DER as named curves, via explicit parameterization, using uncompressed, compressed and hybrid point formats.
* Add error regress coverage for ERR_LIB_SYS.jsing2024-10-111-1/+19
| | | | These are dynamically populated based on strerror() values.
* Hook up the err regress.jsing2024-10-021-1/+2
|
* Add initial regress for the error stack and ERR_* APIs.jsing2024-10-022-0/+210
|
* Enable additional CRYPTO_get_ex_new_index() tests.jsing2024-10-021-6/+1
| | | | | | | It was previously possible to call CRYPTO_get_ex_new_index() with either a negative index or a positive index that equaled or exceeded CRYPTO_EX_INDEX__COUNT. The reimplementation of exdata treats these as error cases.
* Enable large number of extension tests and stop skippking QUIC transporttb2024-09-181-8/+3
| | | | parameter extension which we now know about
* tlsfuzzer: add a start-server convenience target for interactive testingtb2024-09-171-2/+6
|
* Replace OpenSSL 3.1 (which no longer is in ports) with 3.3tb2024-09-171-2/+2
|
* tlsfuzzer: grammar fix missed in previoustb2024-09-141-2/+2
|
* typo: troups -> groupstb2024-09-131-2/+2
|
* parametes -> parameterstb2024-09-111-2/+2
|
* Futhermore -> Furthermoretb2024-09-071-2/+2
|
* Prepare for an upcoming tlsfuzzer test that expects decode_errortb2024-09-061-2/+5
| | | | when we send illegal_parameter. Shrug.
* symbols: remove special case for cpuid_setup and cpu_capstb2024-09-011-8/+1
| | | | The former is gone and the latter is available in crypto.h.
* Update for OPENSSL_cpu_caps() now being machine independent.jsing2024-08-313-17/+5
|
* Undo workaround for EVP_PKEY_*check() removaltb2024-08-311-3/+2
|
* Retire the whirlpool testtb2024-08-312-251/+0
|
* unhook whirlpool from the treetb2024-08-311-2/+1
|
* Adjust freenull test for upcoming conf_api.h removaltb2024-08-302-5/+2
|
* Disable hmac and pkey_ec tests until after the bumptb2024-08-291-2/+3
|
* Remove evp_pkey_check testtb2024-08-292-399/+1
| | | | The API it tests will be removed shortly
* Remove unwanted trailing newlines from err/warn format strings.anton2024-08-238-19/+19
|
* Remove use of CSP/LMK in pkcs12 create/verify teststb2024-08-231-3/+2
| | | | reminded by ... anton
* Drop OpenSSL 3.0 interop testing infrastructuretb2024-08-188-75/+11
| | | | | The openssl 3.0 port was removed nearly a year ago shortly after the 7.4 release.
* Add support for openssl32 in interop testtb2024-08-187-9/+70
|
* t_recvmmsg and t_sendmmsg were enabled in 2022guenther2024-08-151-2/+0
|
* Add include path for crypto_arch.h.jsing2024-08-111-1/+2
|
* check_complete: accept #errortb2024-08-081-0/+1
|
* check_complete: OBJ_bsearch_() and OBJ_bsearch_ex_() are gonetb2024-08-081-3/+0
|
* hmac test: fix build with gcctb2024-08-081-2/+8
| | | | | | | The bounded attribute leads to failing regress compilation with gcc due to a test passing a negative length to exercise a chck. noticed and fixed suggested by claudio
* adjust check_complete after recent-ish API and docs changestb2024-08-071-11/+2
|
* Fix previoustb2024-08-021-5/+3
| | | | | Arguably the want_protocol entries in various of these tests are incorrect but I'll leave that for another day.
* Adjust tls regress for protocol parsing fixestb2024-08-023-16/+22
| | | | | This mostly reverts what was done by beck in Tallinn and adjust tlstest to add new test cases and now failing connection tests.
* sched_yield() is not strong enough to overflow the recv buffer on someclaudio2024-07-301-2/+2
| | | | systems. Use a proper sleep using usleep(100) instead.
* Revise regress for ssl3_get_cipher() changes.jsing2024-07-231-8/+3
|
* Revise regress to match cipher suite values change.jsing2024-07-222-17/+13
|
* asn1time: indicate which comparison function failedtb2024-07-211-4/+7
| | | | extracted from a diff by Kenjiro Nakayama
* Fix golden numbers after beck broke it months agotb2024-07-202-23/+20
| | | | (why is it always me who gets to clean up this shit?)
* Add RCS idtb2024-07-171-0/+1
|
* Enable regress for SSL_CIPHER_get_handshake_digest()jsing2024-07-171-4/+0
| | | | Turns out this is already linked statically.
* Rework cipher find test to also provide coverage for SSL_CIPHER_*()jsing2024-07-171-8/+754
|
* Update regress for removal of SSL_HANDSHAKE_MAC_DEFAULT.jsing2024-07-161-25/+2
|
* fix signature of main()anton2024-07-151-4/+3
|
* enable warnings and apply a dash of knfmtanton2024-07-152-1/+2
|
* Add elf_aux_info(3)jca2024-07-143-1/+59
| | | | | | | | Designed to let userland peek at AT_HWCAP and AT_HWCAP2 using an already existing interface coming from FreeBSD. Headers bits were snatched from there. Input & ok kettenis@ libc bump and sets sync will follow soon
* Adjust regress to match changes in SSL_select_next_proto() argstb2024-07-111-123/+99
|
* Teach symbols test about the namespacetb2024-07-102-3/+9
| | | | | | This ensures that when adding public symbols, the magic is not omitted. with/ok beck