| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
This subdomain is defunct with an expired certificate:
https://github.com/chromium/badssl.com/pull/445
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
Copyrights in my contributions to this package were transferred to
Libiquity LLC by a contract executed 2019-09-04. And as of this
writing, this package has not yet been published.
|
| |
|
|
|
|
| |
No change to binary, just bumming one line of source code.
|
| |
|
| |
|
|
|
|
| |
They're apparently already enabled.
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
And drop --enable-opensslextra option recommendation in README.
Also, check SNI name, not host name.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fixes the following error with Bash:
[...]/tests/aux/json.sh: line 144: continue: only meaningful in a `for', `while', or `until' loop
json.sh: syntax: /given_cipher_suites/1
json.sh: syntax: /
json.sh: syntax: /
Oddly, Dash treats continue outside a loop as return, which is undefined
behavior.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
This reverts commit 0c9789c85ca4542697fbfae82f1ed412ab2b2dbe.
|
| |
|
|
|
|
|
| |
Use of installed CA root certificates can also be disabled entirely, but
that just breaks everything.
|
|
|
|
| |
I think this was a copy/paste accident.
|
| |
|
| |
|
|
|
|
| |
And not enabled at all by wolfssl-util.
|
| |
|
| |
|
|
|
|
|
|
|
| |
This reverts commit 6cd7b5568ce306de755bc8fff3488feedf161901.
It seems a call to either wolfSSL_Rehandshake() or
wolfSSL_SecureResume() is necessary, as in wolfSSL's example client.
|
|
|
|
|
|
|
|
| |
Although this causes a SIGSEGV in wolfSSL_X509_check_host():
#0 0x00007ffff7babca2 in wolfSSL_X509_check_host () from /usr/local/lib/libwolfssl.so.19
#1 0x0000555555555d3f in s_client (argc=0, argv=0x7fffffffe3b8) at src/s_client.c:382
#2 0x000055555555545a in main (argc=6, argv=0x7fffffffe388) at src/main.c:42
|
| |
|
|
|
|
|
|
|
|
| |
This reverts commit 990942046a013e4eab23499cd32218bf046791aa.
Apparently, even with OCSP stapling, wolfSSL still performs CRL and OCSP
lookups. Is there a way to disable CRL and OCSP when a stapled OCSP
response is found in the handshake?
|
| |
|
|
|
|
|
| |
Revocation methods are apparently used in the order in which they're
enabled.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
For some reason this causes the expiry test to fail:
FAIL: tests/badssl.sh 1 - not expired
PASS: tests/badssl.sh 2 - not wrong.host
PASS: tests/badssl.sh 3 - not self-signed
PASS: tests/badssl.sh 4 - not untrusted-root
PASS: tests/badssl.sh 5 - not revoked
PASS: tests/badssl.sh 6 - no-common-name
FAIL: tests/badssl.sh 7 - no-subject
PASS: tests/badssl.sh 8 - not incomplete-chain
XFAIL: tests/badssl.sh 9 - not sha1-intermediate # TODO
PASS: tests/badssl.sh 10 - sha256
PASS: tests/badssl.sh 11 - sha384
PASS: tests/badssl.sh 12 - sha512
PASS: tests/badssl.sh 13 - not 1000-sans
PASS: tests/badssl.sh 14 - not 10000-sans
PASS: tests/badssl.sh 15 - ecc256
PASS: tests/badssl.sh 16 - ecc384
PASS: tests/badssl.sh 17 - rsa2048
PASS: tests/badssl.sh 18 - rsa4096
PASS: tests/badssl.sh 19 - not rsa8192
PASS: tests/badssl.sh 20 - extended-validation
PASS: tests/badssl.sh 21 - not http
PASS: tests/badssl.sh 22 - not cbc
PASS: tests/badssl.sh 23 - not rc4-md5
PASS: tests/badssl.sh 24 - not rc4
PASS: tests/badssl.sh 25 - not 3des
PASS: tests/badssl.sh 26 - not null
XFAIL: tests/badssl.sh 27 - not mozilla-old # TODO
PASS: tests/badssl.sh 28 - mozilla-intermediate
PASS: tests/badssl.sh 29 - mozilla-modern
PASS: tests/badssl.sh 30 - not dh480
PASS: tests/badssl.sh 31 - not dh512
PASS: tests/badssl.sh 32 - not dh1024
PASS: tests/badssl.sh 33 - dh2048
XFAIL: tests/badssl.sh 34 - not dh-small-subgroup # TODO
PASS: tests/badssl.sh 35 - not dh-compsite
PASS: tests/badssl.sh 36 - not static-rsa
PASS: tests/badssl.sh 37 - not tls-v1-0
PASS: tests/badssl.sh 38 - not tls-v1-1
PASS: tests/badssl.sh 39 - tls-v1-2
============================================================================
Testsuite summary for Unofficial wolfSSL Utility 0.1.0
(33-gb52e29a-dirty)
============================================================================
# TOTAL: 39
# PASS: 34
# SKIP: 0
# XFAIL: 3
# FAIL: 2
# XPASS: 0
# ERROR: 0
============================================================================
See ./test-suite.log
Please report to mailto:patrick.mcdermott@libiquity.com
============================================================================
|