wolfssl/scripts
Sean Parkinson 94157634e1 TLS 1.3 fixes/improvements
Support Draft 28: able to compile code to return BAD_BINDER if no PSKs
match and certificates not to be used.
Change key share implementation to use server preference - server now
checks each client key share's group is in supported_groups extension.
Client and server examples modified to support server preference.
Application can set client's and server's supported groups by rank.
Server's supported groups is sent back in encrypted_extensions if
preferred group is not in client's list - able to be turned off at
compile time.
Application can query server's preferred group from client.
Able to compile using 0x0304 as version instead of draft version.
Fix state machine in TLS 1.3 to support unexpected hello_retry_request.
Also fixes non-blocking.
Fix resumption to use the named group from session.
Fix named group in session structure to be a 2-byte field.
Better detection of errors in message flow.
Fix DoTls13ClientHello when downgrading - don't do TLS 1.3 things.
Not downgrading on client fixed.
Downgrade protocol version from TLS 1.3 when not TLS 1.3 ciphersuite.
Get downgrading from TLS 1.3 and resumption working.
Change earlyData value to an enum.
Support no extensions data (as opposed to zero length extension data) in
TLS 1.3 ClientHello.
Check PSK cipher suite is available to both client and server before
using.
Check first PSK identity chosen when server says it is using early data
at client.
Check PSK extension is last in client_hello on server.
Check the PSK cipher suite to use is supported on client.
Check the returned cipher suite for pre-shared keys is the same as
client expects.
Send alert decrypt_error when verification fails in certificate_verify
or finished message doesn't match calculated value.
Fail when certificate messages recieved in handshake when using PSK.
Validate on the server that EndOfEarlyData message has been recieved
before finished message when server sent EarlyData extension.
2018-04-20 09:44:02 +10:00
..
benchmark.test Replaced == with -eq to fix benchmark.test scripting error 2016-05-20 09:43:30 -06:00
crl-revoked.test minor typo corrections 2015-12-23 13:28:45 -07:00
external.test check return value of ping.test 2016-04-14 14:42:01 -06:00
google.test check return value of ping.test 2016-04-14 14:42:01 -06:00
include.am Testing improvements for cert gen and TLS cert validation: 2017-10-19 16:17:51 -07:00
ocsp-stapling-with-ca-as-responder.test adds a call to wolfSSL_CTX_EnableOCSPStapling() on client.c to fix ocspstapling2 tests and removes unnecessary 'kill ' from the test scripts 2017-12-26 22:32:21 -03:00
ocsp-stapling.test adds a call to wolfSSL_CTX_EnableOCSPStapling() on client.c to fix ocspstapling2 tests and removes unnecessary 'kill ' from the test scripts 2017-12-26 22:32:21 -03:00
ocsp-stapling2.test adds a call to wolfSSL_CTX_EnableOCSPStapling() on client.c to fix ocspstapling2 tests and removes unnecessary 'kill ' from the test scripts 2017-12-26 22:32:21 -03:00
ocsp.test Fix for handling OCSP with non-blocking. The HashInput function was being called on the re-entry, which produced a bad mac response from server. Also cleanup for some of the WC_PENDING_E logic for the non-async cases to reduce code size. 2018-03-16 12:05:07 -07:00
openssl.test Testing improvements for cert gen and TLS cert validation: 2017-10-19 16:17:51 -07:00
ping.test check return value of ping.test 2016-04-14 14:42:01 -06:00
pkcallbacks.test do_cleanup on pkcallbacks.test 2016-12-06 13:04:12 -08:00
psk.test add psk.test script for testing 2016-02-11 09:15:04 -07:00
resume.test Add `USE_SLOW_SHA256` and `USE_SLOW_SHA512` options for reduced code size of SHA. Existing `USE_SLOW_SHA2` applies for SHA512 only. Cleanup formatting of the sha256.c and sha512.c code. Added new `./configure --lowresource` option, which defines the memory reduction defines. Fix for `make check` resume.test scipt with `NO_SESSION_CACHE` defined. 2017-11-09 11:05:28 -08:00
sniffer-testsuite.test
testsuite.pcap
tls-cert-fail.test Testing improvements for cert gen and TLS cert validation: 2017-10-19 16:17:51 -07:00
tls13.test TLS 1.3 fixes/improvements 2018-04-20 09:44:02 +10:00
trusted_peer.test update test script, fall back to cert name search, fix der free 2016-03-12 09:37:32 -07:00