aboutsummaryrefslogtreecommitdiff
path: root/openssl/src/ssl/test.rs
Commit message (Collapse)AuthorAgeFilesLines
* Support the client hello callbackSteven Fackler2018-09-151-0/+46
|
* Fix lookup errors with SNI callback.Steven Fackler2018-08-311-1/+40
| | | | | | | | | | | | | | | | | The job of an SNI callback is typically to swap out the context associated with an SSL depending on the domain the client is trying to talk to. Typically, only the callbacks associated with the current context are used, but this is not the case for the SNI callback. If SNI is run for a second time on a connection (i.e. in a renegotiation) and the context was replaced with one that didn't itself register an SNI callback, the old callback would run but wouldn't be able to find its state in the context's ex data. To work around this, we pass the pointer to the callback data directly to the callback to make sure it's always available. It still lives in ex data to handle the lifetime management. Closes #979
* SRTP cleanupSteven Fackler2018-08-191-16/+26
|
* Add methods for DTLS/SRTP key handshakeAron Wieck2018-08-141-0/+114
|
* Add get_shutdown and set_shutdownSteven Fackler2018-08-081-2/+9
|
* Support builds of OpenSSL from vendored source (take 2)Alex Crichton2018-07-301-0/+6
| | | | | | This is a revival of #684 to see if I can help push it across the finish line! Closes #580
* Merge pull request #943 from lolzballs/masterSteven Fackler2018-06-171-0/+49
|\ | | | | Add wrapper for SSL_CTX_set_psk_server_callback
| * Disable TLSv1.3 for psk_ciphers testBenjamin Cheng2018-06-171-0/+7
| |
| * Ensure psk test callbacks are calledBenjamin Cheng2018-06-021-0/+6
| |
| * Change psk test cipher to PSK-AES128-CBC-SHABenjamin Cheng2018-06-021-2/+3
| | | | | | | | Hopefully it works on CI servers now
| * add test for psk; deprecated set_psk_callbackBenjamin Cheng2018-06-021-0/+35
| |
* | Update to 1.1.1-pre7Steven Fackler2018-06-021-42/+74
|/ | | | | | | | | The initial session ticket is now sent as part of SSL_accept, so some tests need to write a single byte through the stream to make sure that both ends have fully completed to avoid test flakes. TLSv1.3 cipher suite control has been extracted from the normal cipher list into a separate method: SslContextBuilder::set_ciphersuites.
* Rename X509Ref::fingerprint to X509Ref::digest and avoid allocatingSteven Fackler2018-05-241-6/+6
|
* Support ALPN on libresslSteven Fackler2018-05-201-5/+5
| | | | Closes #690
* Overhaul openssl cfgsSteven Fackler2018-05-201-2/+2
| | | | Also expose hostname verification on libressl
* Support min/max version in LibreSSLSteven Fackler2018-05-191-4/+4
| | | | | Their implementations of the accessors don't behave expected with no bounds, so we ignore those bits of the tests.
* Disable tests that talk to Google on LibreSSL 2.5.0Steven Fackler2018-05-121-0/+4
| | | | | They're flickering, and I'm assuming it's just because that version is so old.
* Fix base version for min/max proto accessorsSteven Fackler2018-05-091-3/+8
| | | | Closes #911
* Some misc cleanupSteven Fackler2018-04-271-60/+81
|
* Add test for stateless connectionBenjamin Saunders2018-03-281-2/+119
|
* Remove version-specific featuresSteven Fackler2018-03-191-36/+27
| | | | Closes #852
* Generic custom extension add fn return typeBenjamin Saunders2018-03-101-2/+2
|
* High-level API for OpenSSL 1.1.1 custom extension supportBenjamin Saunders2018-03-091-0/+38
|
* Add min/max protocol version supportSteven Fackler2018-02-251-0/+33
|
* Add RFC 5705 supportSteven Fackler2018-02-231-0/+42
|
* SSL session callbacks have always been aroundSteven Fackler2018-02-161-4/+1
|
* Add more session cache supportSteven Fackler2018-02-151-0/+36
|
* Tweak featuresSteven Fackler2018-02-141-13/+25
| | | | We should keep the version features totally separate for now.
* Fix tests for TLS 1.3Steven Fackler2018-02-141-2/+5
| | | | | Google yells at you when using TLS 1.3 without SNI by sending a bogus self-signed cert!
* OpenSSL 1.1.1 supportSteven Fackler2018-02-131-1/+15
|
* tests: if server failed to start, print exit code instead of timing outStepan Koltsov2018-01-241-1/+4
| | | | | | | | | | | | | | | | | | | | | | | ``` % cargo +stable test --lib ssl::test::test_connect_with_alpn_successful_single_match --features=v102 Finished dev [unoptimized + debuginfo] target(s) in 0.0 secs Running /Users/nga/devel/left/rust-openssl/target/debug/deps/openssl-a38e12a3527f6932 running 1 test test ssl::test::test_connect_with_alpn_successful_single_match ... FAILED failures: ---- ssl::test::test_connect_with_alpn_successful_single_match stdout ---- thread 'ssl::test::test_connect_with_alpn_successful_single_match' panicked at 'server exited: exit code: 1', src/ssl/test.rs:91:24 note: Run with `RUST_BACKTRACE=1` for a backtrace. failures: ssl::test::test_connect_with_alpn_successful_single_match test result: FAILED. 0 passed; 1 failed; 0 ignored; 0 measured; 159 filtered out ```
* Rename key serialization/deserialization methodsSteven Fackler2018-01-061-2/+2
| | | | | | Also document their specific formats. Closes #502
* Move X509Filetype to SslFiletypeSteven Fackler2018-01-011-22/+22
| | | | | | These constants have the same values, but X509_FILETYPE_DEFAULT doesn't work in the Ssl methods and using the SSL_* names is a bit less confusing.
* Add a parameter to servernameSteven Fackler2017-12-281-1/+1
|
* Overhaul ALPNSteven Fackler2017-12-271-99/+23
| | | | | | | | There was previously a lot of behind the scenes magic. We now bind much more directly to the relevant functions. Also remove APN support. That protocol is supersceded by ALPN - let's see if anyone actually needs to use it.
* Overhaul ssl errorSteven Fackler2017-12-261-0/+1298