summaryrefslogtreecommitdiff
path: root/regress
AgeCommit message (Collapse)Author
2015-02-17hook up hostkeys unittest to portable MakefilesDamien Miller
2015-02-17upstream commitdjm@openbsd.org
enable hostkeys unit tests
2015-02-17upstream commitdjm@openbsd.org
check string/memory compare arguments aren't NULL
2015-02-17upstream commitdjm@openbsd.org
unit tests for hostfile.c code, just hostkeys_foreach so far
2015-02-17upstream commitmarkus@openbsd.org
test server rekey limit
2015-01-30upstream commitdjm@openbsd.org
regression test for 'wildcard CA' serial/key ID revocations
2015-01-27compile on systems without TCP_MD5SIG (e.g. OSX)Damien Miller
2015-01-27use ssh-keygen under test rather than system'sDamien Miller
2015-01-27these need active_state defined to link on OSXDamien Miller
temporary measure until active_state goes away entirely
2015-01-27upstream commitdjm@openbsd.org
use printf instead of echo -n to reduce diff against -portable
2015-01-27upstream commitdjm@openbsd.org
regression test for host key rotation
2015-01-27upstream commitdjm@openbsd.org
adapt to sshkey API tweaks
2015-01-27upstream commitmiod@openbsd.org
Move -lz late in the linker commandline for things to build on static arches.
2015-01-27upstream commitmiod@openbsd.org
-Wpointer-sign is supported by gcc 4 only.
2015-01-27upstream commitdjm@openbsd.org
use SUBDIR to recuse into unit tests; makes "make obj" actually work
2015-01-20upstream commitdjm@openbsd.org
this test would accidentally delete agent.sh if run without obj/
2015-01-20fix kex testDamien Miller
2015-01-20upstream commitmarkus@openbsd.org
finally enable the KEX tests I wrote some years ago...
2015-01-20upstream commitmarkus@openbsd.org
adapt to new error message (SSH_ERR_MAC_INVALID)
2015-01-20upstream commitdjm@openbsd.org
this test was broken in at least two ways, such that it wasn't checking that a KRL was not excluding valid keys
2015-01-20upstream commitdjm@openbsd.org
be a bit more careful in these tests to ensure that known_hosts is clean
2015-01-20upstream commitdjm@openbsd.org
regression test for known_host file editing using ssh-keygen (-H / -R / -F) after hostkeys_foreach() change; feedback and ok markus@
2015-01-20upstream commitdjm@openbsd.org
more and better key tests test signatures and verification test certificate generation flesh out nested cert test removes most of the XXX todo markers
2015-01-20upstream commitdjm@openbsd.org
make the signature fuzzing test much more rigorous: ensure that the fuzzed input cases do not match the original (using new fuzz_matches_original() function) and check that the verification fails in each case
2015-01-20upstream commitdjm@openbsd.org
add a fuzz_matches_original() function to the fuzzer to detect fuzz cases that are identical to the original data. Hacky implementation, but very useful when you need the fuzz to be different, e.g. when verifying signature
2015-01-20upstream commitdjm@openbsd.org
better dumps from the fuzzer (shown on errors) - include the original data as well as the fuzzed copy.
2015-01-20upstream commitdjm@openbsd.org
enable hostkey-agent.sh test
2015-01-20upstream commitdjm@openbsd.org
unit test for hostkeys in ssh-agent
2015-01-20upstream commitmarkus@openbsd.org
add kex unit tests
2015-01-15make bitmap test compileDamien Miller
2015-01-15upstream commitdjm@openbsd.org
unit tests for KRL bitmap
2015-01-15upstream commitmarkus@openbsd.org
re-add comment about full path
2015-01-15upstream commitmarkus@openbsd.org
don't reset to the installed sshd; connect before reconfigure, too
2015-01-15upstream commitdjm@openbsd.org
implement a SIGINFO handler so we can discern a stuck fuzz test from a merely glacial one; prompted by and ok markus
2015-01-15upstream commitdjm@openbsd.org
use $SSH instead of installed ssh to allow override; spotted by markus@
2015-01-15upstream commitdjm@openbsd.org
regress test for PubkeyAcceptedKeyTypes; ok markus@
2015-01-15upstream commitmarkus@openbsd.org
unbreak parsing of pubkey comments; with gerhard; ok djm/deraadt
2015-01-15upstream commitdjm@openbsd.org
fatal if soft-PKCS11 library is missing rather (rather than continue and fail with a more cryptic error)
2015-01-15upstream commitdjm@openbsd.org
let this test all supporte key types; pointed out/ok markus@
2015-01-15some systems lack SO_REUSEPORTDamien Miller
2015-01-09upstream commitdjm@openbsd.org
adjust for sshkey_load_file() API change
2014-12-23include and use OpenBSD netcat in regress/Damien Miller
2014-12-22upstream commitdjm@openbsd.org
regression test for multiple required pubkey authentication; ok markus@
2014-12-22upstream commitdjm@openbsd.org
make this slightly easier to diff against portable
2014-12-22add missing regress output fileDamien Miller
2014-12-22upstream commitdjm@openbsd.org
adjust for new SHA256 key fingerprints and slightly-different MD5 hex fingerprint format
2014-12-22upstream commitdjm@openbsd.org
poll changes to netcat (usr.bin/netcat.c r1.125) broke this test; fix it by ensuring more stdio fds are sent to devnull
2014-12-05upstream commitdjm@openbsd.org
add tests for new client RevokedHostKeys option; refactor to make it a bit more readable
2014-12-05upstream commitkrw@openbsd.org
Nuke yet more obvious #include duplications. ok deraadt@
2014-11-19upstream commitdjm@openbsd.org
fix KRL generation when multiple CAs are in use We would generate an invalid KRL when revoking certs by serial number for multiple CA keys due to a section being written out twice. Also extend the regress test to catch this case by having it produce a multi-CA KRL. Reported by peter AT pean.org