Juliusz Sosinowicz
|
d88f6f1156
DTLS test cases
|
4 years ago |
toddouska
|
29bdc7d8b5
Merge pull request #3015 from tmael/cov-fix
|
4 years ago |
David Garske
|
7879e83ae0
Fixes for building with `./configure --enable-tls13 --disable-rsa --disable-ecc --enable-psk`. Fix to properly detect if missing a asymmetric key algorithm (required by TLS v1.3).
|
4 years ago |
Tesfa Mael
|
d000ceb495
Resolve Warnings
|
4 years ago |
Tesfa Mael
|
d5241bbcc6
Coverity fix
|
4 years ago |
Sean Parkinson
|
2c6eb7cb39
Add Curve448, X448, Ed448 implementations
|
4 years ago |
Chris Conlon
|
45c5a2d39c
update copyright to 2020
|
5 years ago |
Jacob Barthelmeh
|
09a0859865
fix for fortress and no sha build with encrypted keys
|
5 years ago |
Jacob Barthelmeh
|
e24787c8e4
add ecc header for fp_ecc cache free
|
5 years ago |
Jacob Barthelmeh
|
ea45da5fa8
change add_all_* to be evp table init and fix valgrind report
|
5 years ago |
Jacob Barthelmeh
|
b4a3ad6e2d
fix test case for enckeys + des3 with md5 disabled
|
5 years ago |
kaleb-himes
|
306b280ccd
Add test cases and implement peer suggestions
|
5 years ago |
Sean Parkinson
|
a975ba9e97
Disallow SHA-2 ciphersuites from TLS 1.0 and 1.1 handshakes
|
5 years ago |
John Safranek
|
246c444b93
Updates for v4.0.0
|
5 years ago |
Sean Parkinson
|
8bb4e23f8d
Various improvements for testing
|
5 years ago |
David Garske
|
59a3b4a110
New tests for cert chains, alternate cert chains, trusted peer certs and DH prime cleanup:
|
6 years ago |
kaleb-himes
|
dc519e6a45
When no cert specified using default, do not return failure in suite tests
|
6 years ago |
David Garske
|
d7d102d90a
Added cipher suite unit tests for max fragment options 1-6 for TLS v1.2 and DTLS v1.2. Fix for client usage comment for max fragment.
|
6 years ago |
David Garske
|
bbdb17975c
Adds build option `WOLFSSL_EITHER_SIDE` for deferring the "side" of the TLS session until first connect or accept. Added the DTLS generic v1.0 and v1.2 methods for "either" side. Added "either" methods unit tests. Added "either" -v e support to example client/server. Fix to expose `wolfSSL_use_certificate_file` and `wolfSSL_use_PrivateKey_file` without `OPENSSL_EXTRA`. Cleanup of the methods for (void)heap and log messages. Spelling fixes.
|
6 years ago |
David Garske
|
dfec7f2263
Fix for TLS v1.3 async case with cipher suite `TLS_AES_128_GCM_SHA256` and RSA key type. Fix for issue with long cipher suite name test for TLS 1.3.
|
6 years ago |
David Garske
|
2c3475c1d6
Added new build option `--enable-memtest` or `WOLFSSL_FORCE_MALLOC_FAIL_TEST` which enables random malloc failures for testing. This test supresses the `abort()` calls to detect seg faults. A new script `./scripts/memtest.sh` starts the test. If an issue is found it can be reviewed with the `./scripts/memtest.txt` log and reproduced using the seed printed at top of unit test as `--- RNG MALLOC FAIL AT 295---` and rerun using `./tests/unit.test 295`.
|
6 years ago |
Sean Parkinson
|
6d3e145571
Changes to build with X25519 and Ed25519 only
|
6 years ago |
Sean Parkinson
|
4ac34b74bd
Fix test to work with configurations not including AES-GCM
|
6 years ago |
Sean Parkinson
|
ba8e441e53
Allow TLS 1.2 to be compiled out.
|
6 years ago |
David Garske
|
325402cf5a
Minor fix for the expected failure case use of `ssl` after free. Renamed `skipExit` to `exitWithRet`.
|
6 years ago |
David Garske
|
89a4c98670
* Added support for expected fail test cases with example client/server and suites unit test.
|
6 years ago |
David Garske
|
289a282183
Fixes to resolve issues with c99 compliance (building with `./configure CFLAGS="-std=c99"`).
|
6 years ago |
David Garske
|
5a46bdf6f6
Added unit test for using encrypted keys with TLS. Only works with `--enable-des3`, since the keys are all encrypted with DES3 (also requires either `--enable-opensslextra or --enable-enckeys`).
|
6 years ago |
David Garske
|
dbb34126f6
* Added support for not loading a private key for server or client when `HAVE_PK_CALLBACK` is defined and the private PK callback is set. Tested with all cipher suites, TLS 1.2/1.3, client/server certs, RSA/ECC/ED25519.
|
6 years ago |
David Garske
|
d5cc3ca198
Disable TLS v1.0 by default. Added new `--enable-tlsv10` option to force enable (only works if --enable-oldtls is set, which is on by default).
|
7 years ago |