summaryrefslogtreecommitdiffstats
path: root/tests
Commit message (Collapse)AuthorAgeFilesLines
* tests/badssl.sh: Drop sha1-intermediatePatrick McDermott2020-07-201-2/+1
| | | | | | This subdomain is defunct with an expired certificate: https://github.com/chromium/badssl.com/pull/445
* tests/badssl.sh: badssl.com certs are expiringPatrick McDermott2020-07-201-2/+6
|
* tests/badssl.sh: Organize outputPatrick McDermott2020-07-201-3/+5
|
* Rename package and executable to wolfutilPatrick McDermott2020-07-202-10/+10
|
* Update copyright noticesPatrick McDermott2019-09-052-2/+2
| | | | | | Copyrights in my contributions to this package were transferred to Libiquity LLC by a contract executed 2019-09-04. And as of this writing, this package has not yet been published.
* Rename executable to wolfsslPatrick McDermott2019-08-032-2/+2
|
* tests/aux/json.sh: Fix continue not in a loopPatrick McDermott2019-08-011-1/+1
| | | | | | | | | | | | Fixes the following error with Bash: [...]/tests/aux/json.sh: line 144: continue: only meaningful in a `for', `while', or `until' loop json.sh: syntax: /given_cipher_suites/1 json.sh: syntax: / json.sh: syntax: / Oddly, Dash treats continue outside a loop as return, which is undefined behavior.
* tests/howsmyssl.sh: New test scriptPatrick McDermott2019-08-012-1/+69
|
* tests/aux/json.sh: New filePatrick McDermott2019-08-012-1/+404
|
* Revert "tests/ocsp-stapling.sh: New test script"Patrick McDermott2019-07-302-39/+1
| | | | | | | | This reverts commit 990942046a013e4eab23499cd32218bf046791aa. Apparently, even with OCSP stapling, wolfSSL still performs CRL and OCSP lookups. Is there a way to disable CRL and OCSP when a stapled OCSP response is found in the handshake?
* tests/ocsp-stapling.sh: New test scriptPatrick McDermott2019-07-302-1/+39
|
* s_client: Verify hostPatrick McDermott2019-07-301-1/+1
| | | | wolfSSL doesn't do this automatically?!
* tests/badssl.sh: Drop Certificate Transparency testPatrick McDermott2019-07-301-3/+1
| | | | | | CT seems to be unsupported in wolfSSL, but the certificate for invalid-expected-sct.badssl.com is expired, so this is likely a false pass.
* tests/badssl.sh: Deprecate DH with 1024-bit groupPatrick McDermott2019-07-301-1/+1
|
* tests/badssl.sh: Deprecate AES-CBCPatrick McDermott2019-07-301-1/+1
|
* tests/badssl.sh: Mark expected failuresPatrick McDermott2019-07-301-45/+46
|
* tests/badssl.sh: Upgrade to HTTP/1.1Patrick McDermott2019-07-301-1/+3
|
* tests/badssl.sh: Print newline before TAP directivesPatrick McDermott2019-07-301-2/+9
|
* s_client: Disable SSLv3, TLSv1.0, and TLSv1.1Patrick McDermott2019-07-301-2/+2
| | | | And update tests/badssl.sh results.
* tests/badssl.sh: Fix Mozilla recommendation resultsPatrick McDermott2019-07-291-2/+2
|
* tests/badssl.sh: Update resultsPatrick McDermott2019-07-291-7/+6
| | | | | | HPKP is unimplemented, certificates without CN/subject are accepted, wolfSSL falls over with too many SANs, and 8192-bit RSA keys are unsupported by wolfSSL (which is probably a good thing anyway).
* tests/badssl.sh: Add "not " to test descriptionsPatrick McDermott2019-07-291-18/+19
|
* tests/badssl.sh: New test scriptPatrick McDermott2019-07-292-1/+108
|
* build: Add test frameworkPatrick McDermott2019-07-293-0/+242