aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssl
AgeCommit message (Collapse)Author
2019-07-25ssl: Add test for option supported_groupsPéter Dimitrov
2019-07-25ssl: Document option supported_groupsPéter Dimitrov
2019-07-25ssl: Fix ssl_api_SUITE:connection_informationPéter Dimitrov
This commit fixes the connection_information testcase with TLS 1.3 connections.
2019-07-25ssl: Fix property tests for SSLv3Péter Dimitrov
2019-07-25ssl: Update property tests with pre_shared_keyPéter Dimitrov
2019-07-25ssl: Implement pre_shared_key extensionPéter Dimitrov
Implement encode/decode of pre_shared_key.
2019-07-25ssl: Update property tests with psk_key_exchange_modesPéter Dimitrov
2019-07-25ssl: Implement psk_key_exchange_modes extensionPéter Dimitrov
Implement encode/decode of psk_key_exchange_modes.
2019-07-25ssl: Correct groupsIngela Anderton Andin
2019-07-25ssl: Avoid race in test codeIngela Anderton Andin
2019-07-25ssl: Remove duplicate suiteIngela Anderton Andin
The suite was renamed tls_1_3_versions_SUITE but apparently not via git, so the old file remained.
2019-07-25ssl: Continue moving test form basic_SUITE to more appropriate suitesIngela Anderton Andin
2019-07-25ssl: Add ssl_socket_SUITEIngela Anderton Andin
2019-07-24ssl: Old OpenSSL implementation does not ignore trailing client hello dataIngela Anderton Andin
Do not test TLS 1.0 with these old versions as we do send hello extensions for those implementations that will use them, and trailing unknown data should be ignored by RFC complient implementations.
2019-07-23ssl: Move alert test to own suiteIngela Anderton Andin
Also clean up code after previous test moves
2019-07-23ssl: Move der_input and rizzo testsIngela Anderton Andin
Also refactor Rizzo tests to minimize them to only test what actually can be tested. In practice this was already done but a lot of legacy code remained. In the past timing happened to make it look like it was possible to test Rizzo-Dungeon mitigation in more detail, but it was based on false assumptions that can not be applied to streams.
2019-07-22Merge branch 'peterdmv/ssl/fix-tls13-alpn' into maintPéter Dimitrov
* peterdmv/ssl/fix-tls13-alpn: ssl: Fix handling of ALPN in TLS 1.3
2019-07-22ssl: Add API suitesIngela Anderton Andin
This is also an effort to group test cases better. More such commits will follow.
2019-07-18ssl: Covered by property testsIngela Anderton Andin
2019-07-18ssl: Correct RSP/PSK and ALPN handlingIngela Anderton Andin
Extention handling need some fixes to work correctly for ALPN and SSL-3.0 only client/servers do not support extensions
2019-07-18ssl: Better grouping of testIngela Anderton Andin
Regroup testes after functionality making it easier to test all variants (all protocols, all cert types etc). Also extend OpenSSL interop
2019-07-17ssl: Fix handling of ALPN in TLS 1.3Péter Dimitrov
2019-07-16Merge branch 'raimo/test-cuddling' into maintRaimo Niskanen
* raimo/test-cuddling: Fix leaking SSL node
2019-07-12Merge branch 'maint-21' into maintRaimo Niskanen
* maint-21: Updated OTP version Prepare release # Conflicts: # OTP_VERSION # lib/ssl/doc/src/notes.xml # lib/ssl/vsn.mk # make/otp_version_tickets # otp_versions.table
2019-07-12Merge branch ↵Raimo Niskanen
'raimo/ssl/fix-zero-fragment-buffer-handling/ERIERL-379/OTP-15328' into maint * raimo/ssl/fix-zero-fragment-buffer-handling/ERIERL-379/OTP-15328: Do not call dist_ctrl_put_data with empty binaries Refine the queue code Fix extracting 0 bytes from queue
2019-07-11Fix leaking SSL nodeRaimo Niskanen
2019-07-11Prepare releaseErlang/OTP
2019-07-11Merge branch ↵Erlang/OTP
'raimo/ssl/fix-zero-fragment-buffer-handling/ERIERL-379/OTP-15328' into maint-21 * raimo/ssl/fix-zero-fragment-buffer-handling/ERIERL-379/OTP-15328: Do not call dist_ctrl_put_data with empty binaries Refine the queue code Fix extracting 0 bytes from queue
2019-07-10Merge branch 'maint-22' into maintJohn Högberg
* maint-22: Updated OTP version Prepare release # Conflicts: # make/otp_version_tickets
2019-07-09Prepare releaseErlang/OTP
2019-07-09Merge branch 'ingela/ssl/alert-error-enhancment/OTP-15943' into maint-22Erlang/OTP
* ingela/ssl/alert-error-enhancment/OTP-15943: ssl: Enhance error handling
2019-07-05Do not call dist_ctrl_put_data with empty binariesRaimo Niskanen
2019-07-03Refine the queue codeRaimo Niskanen
2019-07-03Merge branch 'maint-22' into maintJohn Högberg
* maint-22: Updated OTP version Prepare release # Conflicts: # make/otp_version_tickets
2019-07-03Merge branch 'maint-21' into maintJohn Högberg
* maint-21: Updated OTP version Prepare release # Conflicts: # OTP_VERSION # erts/doc/src/notes.xml # erts/vsn.mk # lib/ssl/doc/src/notes.xml # lib/ssl/vsn.mk # make/otp_version_tickets # otp_versions.table
2019-07-03Merge branch 'ingela/ssl/alert-error-enhancment/OTP-15943' into maintIngela Anderton Andin
* ingela/ssl/alert-error-enhancment/OTP-15943: ssl: Enhance error handling
2019-07-02Merge branch 'ingela/ssl/kill-openssl-zombie' into maintIngela Anderton Andin
* ingela/ssl/kill-openssl-zombie: ssl: Kill OpenSSL processes that survived test run
2019-07-02Fix extracting 0 bytes from queueRaimo Niskanen
2019-07-02Prepare releaseErlang/OTP
2019-07-02Merge branch 'ingela/ssl/TLS-hibernate-bug/OTP-15910' into maint-21Erlang/OTP
* ingela/ssl/TLS-hibernate-bug/OTP-15910: ssl: Fix hibernation bug # Conflicts: # lib/ssl/src/tls_connection.erl
2019-07-02Prepare releaseErlang/OTP
2019-07-02Merge branch 'peterdmv/ssl/fix-cert-error-handling/OTP-15900' into maint-22Erlang/OTP
* peterdmv/ssl/fix-cert-error-handling/OTP-15900: ssl: Fix handling of certificate decoding problems
2019-07-02Merge branch 'peterdmv/ssl/fix-sign-algs-cert/OTP-15913' into maint-22Erlang/OTP
* peterdmv/ssl/fix-sign-algs-cert/OTP-15913: ssl: Backport fix for signature_algorithms_cert
2019-07-02Merge branch 'ingela/ssl/TLS-hibernate-bug/OTP-15910' into maint-22Erlang/OTP
* ingela/ssl/TLS-hibernate-bug/OTP-15910: ssl: Fix hibernation bug # Conflicts: # lib/ssl/src/tls_connection.erl
2019-07-01ssl: Kill OpenSSL processes that survived test runIngela Anderton Andin
Should be zero such processes in the normal case
2019-07-01ssl: Enhance error handlingIngela Anderton Andin
Handle the ILLEGAL_PARAMETER alert that may be returned from ssl_alert:decode/3 for gracefull shutdown, try of ...catch will/should not handle this case it is only handles the case that TM should not happen!
2019-07-01Merge pull request #2286 from peterdmv/ssl/tls13-ecdsa/OTP-15854Péter Dimitrov
Implement support for ECDSA certificates in TLS 1.3
2019-06-28ssl: Update standards compliancePéter Dimitrov
2019-06-28Merge branch 'peterdmv/ssl/fix-peername-sockname' into maintPéter Dimitrov
* peterdmv/ssl/fix-peername-sockname: ssl: Update ssl_test_lib
2019-06-26ssl: Update ssl_test_libPéter Dimitrov
On some configurations the inet:peername/1 and inet:getaddr/2 functions return different loopback addresses, leading to testcase failures in the ssl_basic_SUITE (peername, sockname). This commit updates the node_to_hostip and check_result functions to tolerate different loopback addresses.