1. 17 1月, 2018 1 次提交
  2. 13 1月, 2018 1 次提交
  3. 14 12月, 2017 1 次提交
  4. 07 11月, 2017 1 次提交
    • M
      Fix race condition in TLSProxy · 018632ae
      Matt Caswell 提交于
      Normally TLSProxy waits for the s_server process to finish before
      continuing. However in cases where serverconnects > 1 we need to keep the
      s_server process around for a later test so we continue immediately. This
      means that TAP test output can end up being printed to stdout at the same
      time as s_server is printing stuff. This confuses the test runner and can
      cause spurious test failures. This commit introduces a small delay in cases
      where serverconnects > 1 in order to give s_server enough time to finish
      what it was doing before we continue to the next test.
      
      Fixes #4129
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/4660)
      018632ae
  5. 01 9月, 2017 1 次提交
  6. 15 8月, 2017 1 次提交
  7. 31 5月, 2017 1 次提交
  8. 27 5月, 2017 1 次提交
    • M
      Fix a Proxy race condition · b72668a0
      Matt Caswell 提交于
      Issue #3562 describes a problem where a race condition can occur in the
      Proxy such that a test "ok" line can appear in the middle of other text
      causing the test harness to miss it. The issue is that we do not wait for
      the client process to finish after the test is complete, so that process may
      continue to write data to stdout/stderr at the same time that the test
      harness does.
      
      This commit fixes TLSProxy so that we always wait for the client process to
      finish before continuing.
      
      Fixes #3562
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/3567)
      b72668a0
  9. 28 4月, 2017 1 次提交
  10. 15 3月, 2017 1 次提交
  11. 14 2月, 2017 1 次提交
  12. 30 1月, 2017 1 次提交
    • M
      Add a capability for TLSProxy to wait for a session before killing s_client · 1c361b4a
      Matt Caswell 提交于
      TLSProxy normally fires off s_client, which creates a connection to the
      server. TLSProxy also pipes some data to send to the process and s_client
      automatically exits when the pipe hits eof. Unfortunately this means that
      it sends the data and closes before it has processed the NewSessionTicket
      returned from the server in TLSv1.3. This commits adds an option for
      s_client to stay loaded until the sesion has been processed. A side effect
      of this is that s_client never sends a close_notify in this mode, so we
      count success as seeing that data has been transferred.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/2259)
      1c361b4a
  13. 23 1月, 2017 1 次提交
  14. 11 1月, 2017 1 次提交
  15. 06 1月, 2017 1 次提交
  16. 29 12月, 2016 1 次提交
  17. 09 12月, 2016 3 次提交
  18. 06 12月, 2016 1 次提交
  19. 23 11月, 2016 1 次提交
    • M
      Fix some TLSProxy warnings · 20b65c7b
      Matt Caswell 提交于
      After the client processes the server's initial flight in TLS1.3 it may
      respond with either an encrypted, or an unencrypted alert. We needed to
      teach TLSProxy about this so that it didn't issue spurious warnings.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      20b65c7b
  20. 02 11月, 2016 2 次提交
  21. 27 9月, 2016 1 次提交
  22. 16 6月, 2016 1 次提交
    • M
      Skip the TLSProxy tests if environmental problems are an issue · b02b5743
      Matt Caswell 提交于
      On some platforms we can't startup the TLSProxy due to environmental
      problems (e.g. network set up on the build machine). These aren't OpenSSL
      problems so we shouldn't treat them as test failures. Just visibly
      indicate that we are skipping the test.
      
      We only skip the first time we attempt to start up the proxy. If that works
      then everything else should do...if not we should probably investigate and
      so report as a failure.
      
      This also removes test_networking...there is a danger that this turns into
      a test of user's environmental set up rather than OpenSSL.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      b02b5743
  23. 17 5月, 2016 1 次提交
    • M
      Workaround an IO::Socket::IP bug · 6ae54524
      Matt Caswell 提交于
      Workaround an apparent IO:Socket::IP bug where a seemingly valid
      server socket is being returned even though a valid connection does not
      exist. This causes the tests to intermittently hang. We additionally check
      that the peerport looks ok to verify that the returned socket looks usable.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      6ae54524
  24. 12 5月, 2016 1 次提交
  25. 20 4月, 2016 1 次提交
  26. 16 3月, 2016 1 次提交
    • M
      Fix a TLSProxy race condition · 5427976d
      Matt Caswell 提交于
      TLSProxy starts s_server and specifies the number of client connects
      it should expect. After that s_server is supposed to close down
      automatically. However, if another test is then run then TLSProxy
      will start a new instance of s_server. If the previous instance
      hasn't closed down yet then the new instance can fail to bind to
      the socket.
      Reviewed-by: NRichard Levitte <levitte@openssl.org>
      5427976d
  27. 21 2月, 2016 1 次提交
  28. 18 2月, 2016 1 次提交
  29. 14 2月, 2016 1 次提交
    • R
      Prefer IO::Socket::INET6 over IO::Socket::IP · 98ac876f
      Richard Levitte 提交于
      While IO::Socket::IP is a core perl module (since Perl v5.19.8, or so
      says corelist), IO::Socket::INET6 has been around longer, is said to
      be more widely deployed, and most importantly, seems to have less bugs
      hitting us.  We therefore prefer IO::Socket::INET6, and only fall back
      to IO::Socket::IP if the former doesn't exist on the local system.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      98ac876f
  30. 06 2月, 2016 1 次提交
  31. 04 2月, 2016 4 次提交
  32. 30 12月, 2015 1 次提交
  33. 28 9月, 2015 2 次提交