summaryrefslogtreecommitdiff
path: root/regress
AgeCommit message (Collapse)Author
2019-02-20Add a test that catches problems of tcp md5 signatures, like the oneSebastian Benoit
fixed in bgpd/pfkey.c rev 1.54 by claudio.
2019-02-19Use $CC instead of gcc, the latter does not exist on arm64.Alexander Bluhm
found by Moritz Buhl
2019-02-19With new Perl we have add .OBJDIR to @INC.Alexander Bluhm
2019-02-16Add tests for pkeyutlKinichiro Inoguchi
2019-02-13one more error message that should go to stderrTheo Buehler
2019-02-13Forgot a return in previous commit to actually skip the test.Alexander Bluhm
noticed by Moritz Buhl
2019-02-12Skip tests for wscons devices that do not exist on the local machine.Alexander Bluhm
from Moritz Buhl
2019-02-12Skip test if disk type is not in /etc/disktab. There is no floppyAlexander Bluhm
on arm. from Moritz Buhl
2019-02-12Skip the gcc tests on aarch64, the compiler does not exist there.Alexander Bluhm
2019-02-12rdomain is no more, change this test to validate the vpn statement now.Claudio Jeker
2019-02-11getopt(3) returns int, not char. Fix type of ch variable to preventAlexander Bluhm
sign error during arm regress.
2019-02-10"non-existant" is one of those words that don't exist, so use "non-existent"Peter Hessler
instead From Pamela Mosiejczuk, many thanks! OK phessler@ deraadt@
2019-02-06Let roff_getname() end the roff identifier at a tab characterIngo Schwarze
and audit all its callers whether termination is handled correctly. Resulting improvements: * An escape or tab ending the macro name in a macro invocation is discarded, and argument processing is started after it. * An escape or tab ending a name in ".if d" and ".if r" is preserved. * An escape ending a name in ".ds" causes the whole request to be ignored. * A tab ending a name in ".ds" becomes part of the string. * An escape or tab ending a name in ".rm" causes the rest of the line to be ignored. * An escape or tab ending the first name in ".als", ".rn", or ".nr" causes the whole request to be ignored. Kurt Jaeger <pi at FreeBSD> made me aware of https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=235456#c0 and in that bug report, comment 0 item (3) is a special case of this class of issues. Yes, the "mh" manual pages are no doubt among the worst on the planet.
2019-02-04add tests for PKG_CONFIG_$PACKAGE_$VARIABLEJasper Lievisse Adriaanse
2019-02-04add tests for recently added --validateJasper Lievisse Adriaanse
2019-02-03Use malloc() and memcpy() the test X25519 x25519_peer_public value.Joel Sing
Otherwise, if tlsext_keyshare_server_build() fails we call free with a pointer to static memory and bad things happen. Reported by bcook@
2019-02-02An extra test that is known to trigger problems with some versions ofOtto Moerbeek
clang using -O0
2019-02-01make it easier to ignore incompatible device and test case combinationsanton
2019-01-31Instead of skipping the text mmap test, do a non fixed mmap in thisAlexander Bluhm
case. This gives us another test case. Make error messages more verbose. Fix white spaces.
2019-01-31Since resetting of offsets works quite differently in man(7) and mdoc(7),Ingo Schwarze
test table centering in an mdoc(7) document as well. Related to tbl_term.c rev. 1.55.
2015-01-29reorg tbl(7) test suiteIngo Schwarze
2019-01-29Skip vmd(8) tests on non amd64 machines.Alexander Bluhm
2019-01-29Tests to verify that the special case for Friday is not applied whenTodd C. Miller
the -A and -B options are used. From Andy Bradford.
2017-10-11Add regression tests for vmd(8) config parsing.Alexander Bluhm
from Carlos Cardenas; OK mlarkin@
2019-01-28The test sshd_config in in $OBJ.Darren Tucker
2019-01-28Remove leftover debugging.Darren Tucker
2019-01-28Enable ssh-dss for the agent test. Disable it for the certificateDarren Tucker
test.
2019-01-28Count the number of key types instead of assuming there are only two.Darren Tucker
2019-01-27Generate all key supported key types and enable for keyscan test.Darren Tucker
2019-01-27zap a commented out line. 0RTT will need more thought thanTheo Buehler
just uncommenting this.
2019-01-27refactor and clean up the code generating dot output.Theo Buehler
2019-01-25print errors to stderrTheo Buehler
2019-01-25sort output suffixesTheo Buehler
2019-01-25I am retiring my old email address; replace it with my OpenBSD one.Todd C. Miller
2019-01-24Add code to visualize the state machine. Both the state machine and theTheo Buehler
output will have to be tweaked, but this may as well happen in-tree. To try it, pkg_add graphviz and run 'make handshake.svg' in this directory. Committing early so Bob's followers can play.
2019-01-24set the NEGOTIATED flag in the flags argument rather thanTheo Buehler
squeezing it into the table.
2019-01-24Add server side of versions, keyshare, and client and server of cookieBob Beck
extensions for tls1.3. versions is currently defanged to ignore its result until tls13 server side wired in full, so that server side code still works today when we only support tls 1.2 ok bcook@ tb@ jsing@
2019-01-24Remove SHA224 based sigalgs from use in TLS 1.2 as SHA224 is deprecated.Bob Beck
Remove GOST based sigalgs from TLS 1.2 since they don't work with TLS 1.2. ok jsing@
2019-01-23make whitespace inside curlies consistent; sort function prototypes.Theo Buehler
2019-01-23Rename NUM_HANDSHAKE to handshake_count and make it a variableTheo Buehler
so it can be used from regress. Update regress accordingly. Make sure the print target generates the entire table as it currently is in tls13_handshake.c discussed with beck and jsing ok jsing
2019-01-23fix dumping of trace cmp coverageanton
2019-01-23Modify sigalgs extension processing to accomodate TLS 1.3.Bob Beck
- Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2. - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 from a 1.3 handshake. ok jsing@ tb@
2019-01-23revert previous, accidentally contained another diff in additionBob Beck
to the one I intended to commit
2019-01-23Modify sigalgs extension processing for TLS 1.3.Bob Beck
- Make a separate sigalgs list for TLS 1.3 including only modern algorithm choices which we use when the handshake will not negotiate TLS 1.2 - Modify the legacy sigalgs for TLS 1.2 to include the RSA PSS algorithms as mandated by RFC8446 when the handshake will permit negotiation of TLS 1.2 ok jsing@ tb@
2019-01-23incorrrect spellingTheo Buehler
2019-01-23do not print the command in the print: targetTheo Buehler
2019-01-23Add a regression test that builds up the handshake state tableTheo Buehler
from graph information and cross-checks it against the state table in tls13_handshake.c. with help from jsing
2019-01-22add support for xchacha20 and xchacha20-poly1305David Gwynne
xchacha is a chacha stream that allows for an extended nonce, which in turn makes it feasible to use random nonces. ok tb@
2019-01-21adapt to changes in KEX APIs and file removalsDamien Miller
2019-01-21adapt to changes in KEX API and file removalsDamien Miller