#
562d56f4 |
| 01-Feb-2023 |
tb <tb@openbsd.org> |
Retire OpenSSL 1.0.2 interop
Now that the OpenSSL 1.0.2 port is gone, there's no need to keep the interop tests anymore. anton's and bluhm's regress tests will switch to testing interoperability wit
Retire OpenSSL 1.0.2 interop
Now that the OpenSSL 1.0.2 port is gone, there's no need to keep the interop tests anymore. anton's and bluhm's regress tests will switch to testing interoperability with OpenSSL 3.0.
show more ...
|
#
96b8bb3e |
| 07-Jul-2022 |
tb <tb@openbsd.org> |
Only run tests against ciphers supported by the method.
|
#
5a9255e7 |
| 06-Jul-2021 |
bluhm <bluhm@openbsd.org> |
alarm(3) cannot fail, remove error handling. suggested by millert@
|
#
f9b27065 |
| 14-Sep-2020 |
bluhm <bluhm@openbsd.org> |
Connect a client to a server. Both can be current libressl, or openssl 1.0.2, or openssl 1.1. Pin client or server to a fixed TLS version number. Incompatible versions must fail. Check that clien
Connect a client to a server. Both can be current libressl, or openssl 1.0.2, or openssl 1.1. Pin client or server to a fixed TLS version number. Incompatible versions must fail. Check that client and server have used correct version by grepping in their session print out.
show more ...
|
#
31520b76 |
| 21-Mar-2019 |
bluhm <bluhm@openbsd.org> |
Fix typo in usage and comment.
|
#
1f83e6f0 |
| 21-Feb-2019 |
bluhm <bluhm@openbsd.org> |
Test that all supported TLS ciphers actually work. Establish connections between client and server implemented with LibreSSL or OpenSSL with a fixed cipher on each side. Check the used cipher in th
Test that all supported TLS ciphers actually work. Establish connections between client and server implemented with LibreSSL or OpenSSL with a fixed cipher on each side. Check the used cipher in the session print out.
show more ...
|
#
d59d2e41 |
| 11-Feb-2019 |
bluhm <bluhm@openbsd.org> |
getopt(3) returns int, not char. Fix type of ch variable to prevent sign error during arm regress.
|
#
7ca394ab |
| 10-Nov-2018 |
bluhm <bluhm@openbsd.org> |
Regress client and server can do session reuse now. Test this with all combinations of LibreSSL, OpenSSL 1.0.2, and OpenSSL 1.1. It is currently disabled for TLS 1.3 as this needs more setup.
|
#
a8d85e88 |
| 09-Nov-2018 |
bluhm <bluhm@openbsd.org> |
The cert subdir is testing all combinations of certificate validation. Having the three libraries, client and server certificates, missing or invalid CA or certificates, and enforcing peer certificat
The cert subdir is testing all combinations of certificate validation. Having the three libraries, client and server certificates, missing or invalid CA or certificates, and enforcing peer certificate results in 1944 new test cases.
show more ...
|
#
188261f9 |
| 07-Nov-2018 |
bluhm <bluhm@openbsd.org> |
Add interop test with OpenSSL 1.1. TLS 1.3 should be used automatically when it becomes available in LibreSSL. thanks to sthen@ for the new OpenSSL port
|
#
22303e31 |
| 07-Nov-2018 |
bluhm <bluhm@openbsd.org> |
Print SSLeay, OpenSSL, and LibreSSL version strings. Make client and server compile with OpenSSL 1.1. Check runtime version string of SSL library.
|
#
9231079c |
| 07-Nov-2018 |
bluhm <bluhm@openbsd.org> |
Test TLS interoperability between LibreSSL and OpenSSL.
Implement simple SSL client and server in C. Create four binaries by linking them with LibreSSL or OpenSSL. This way API compatibility is te
Test TLS interoperability between LibreSSL and OpenSSL.
Implement simple SSL client and server in C. Create four binaries by linking them with LibreSSL or OpenSSL. This way API compatibility is tested. Connect and accept with netcat to test protocol compatibility with libtls.
Currently OpenSSL 1.0.2p from ports is used. Plan is to move to OpenSSL 1.1 and and test TLS 1.3.
idea from beck@; help from jsing@
show more ...
|