Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | tests/aux/json.sh: Fix continue not in a loop | Patrick McDermott | 2019-08-01 | 1 | -1/+1 |
| | | | | | | | | | | | | Fixes the following error with Bash: [...]/tests/aux/json.sh: line 144: continue: only meaningful in a `for', `while', or `until' loop json.sh: syntax: /given_cipher_suites/1 json.sh: syntax: / json.sh: syntax: / Oddly, Dash treats continue outside a loop as return, which is undefined behavior. | ||||
* | tests/howsmyssl.sh: New test script | Patrick McDermott | 2019-08-01 | 2 | -1/+69 |
| | |||||
* | tests/aux/json.sh: New file | Patrick McDermott | 2019-08-01 | 2 | -1/+404 |
| | |||||
* | Revert "tests/ocsp-stapling.sh: New test script" | Patrick McDermott | 2019-07-30 | 2 | -39/+1 |
| | | | | | | | | This reverts commit 990942046a013e4eab23499cd32218bf046791aa. Apparently, even with OCSP stapling, wolfSSL still performs CRL and OCSP lookups. Is there a way to disable CRL and OCSP when a stapled OCSP response is found in the handshake? | ||||
* | tests/ocsp-stapling.sh: New test script | Patrick McDermott | 2019-07-30 | 2 | -1/+39 |
| | |||||
* | s_client: Verify host | Patrick McDermott | 2019-07-30 | 1 | -1/+1 |
| | | | | wolfSSL doesn't do this automatically?! | ||||
* | tests/badssl.sh: Drop Certificate Transparency test | Patrick McDermott | 2019-07-30 | 1 | -3/+1 |
| | | | | | | CT seems to be unsupported in wolfSSL, but the certificate for invalid-expected-sct.badssl.com is expired, so this is likely a false pass. | ||||
* | tests/badssl.sh: Deprecate DH with 1024-bit group | Patrick McDermott | 2019-07-30 | 1 | -1/+1 |
| | |||||
* | tests/badssl.sh: Deprecate AES-CBC | Patrick McDermott | 2019-07-30 | 1 | -1/+1 |
| | |||||
* | tests/badssl.sh: Mark expected failures | Patrick McDermott | 2019-07-30 | 1 | -45/+46 |
| | |||||
* | tests/badssl.sh: Upgrade to HTTP/1.1 | Patrick McDermott | 2019-07-30 | 1 | -1/+3 |
| | |||||
* | tests/badssl.sh: Print newline before TAP directives | Patrick McDermott | 2019-07-30 | 1 | -2/+9 |
| | |||||
* | s_client: Disable SSLv3, TLSv1.0, and TLSv1.1 | Patrick McDermott | 2019-07-30 | 1 | -2/+2 |
| | | | | And update tests/badssl.sh results. | ||||
* | tests/badssl.sh: Fix Mozilla recommendation results | Patrick McDermott | 2019-07-29 | 1 | -2/+2 |
| | |||||
* | tests/badssl.sh: Update results | Patrick McDermott | 2019-07-29 | 1 | -7/+6 |
| | | | | | | HPKP is unimplemented, certificates without CN/subject are accepted, wolfSSL falls over with too many SANs, and 8192-bit RSA keys are unsupported by wolfSSL (which is probably a good thing anyway). | ||||
* | tests/badssl.sh: Add "not " to test descriptions | Patrick McDermott | 2019-07-29 | 1 | -18/+19 |
| | |||||
* | tests/badssl.sh: New test script | Patrick McDermott | 2019-07-29 | 2 | -1/+108 |
| | |||||
* | build: Add test framework | Patrick McDermott | 2019-07-29 | 3 | -0/+242 |