tb
703668f369
Update to tlsfuzzer 20201121
2020-11-20 23:30:13 +00:00
tb
3874c83fd3
Update to tlsfuzzer 20201105
2020-11-06 09:31:31 +00:00
tb
77222096c9
Update to tlsfuzzer 20201030
2020-10-31 07:39:53 +00:00
tb
bf64171862
Update to tlsfuzzer 20201026
2020-10-28 19:19:40 +00:00
tb
9542c791e7
Update to tlsfuzzer 20201019
2020-10-21 10:00:13 +00:00
tb
276bb3642f
update to tlsfuzzer 20201015
2020-10-16 15:38:41 +00:00
tb
cfa0027f97
update to tlsfuzzer 20201013
2020-10-13 12:34:26 +00:00
tb
30a5350dec
fix typo in previous
2020-10-03 07:37:45 +00:00
tb
bf816fa533
update to tlsfuzzer 20201002
2020-10-03 07:36:08 +00:00
tb
3a72da8101
Update to tlsfuzzer 20200923
2020-09-23 20:48:23 +00:00
tb
7f59567f03
Update to tlsfuzzer 20200908
2020-09-09 10:31:03 +00:00
tb
902a90e4b9
Update to tlsfuzzer 20200828
...
jsing has upstreamed his zero content type test, which in turn found
bugs in GnuTLS and NSS - thanks!
2020-08-28 18:32:02 +00:00
tb
49cdbfdd15
Update to tlsfuzzer 20200825
2020-08-27 16:10:12 +00:00
tb
7b8ab3205f
Update to tlsfuzzer 20200812
2020-08-15 16:38:04 +00:00
tb
3a3b720046
Add a test for zero content type from jsing
...
This checks whether a TLSv1.3 server handles the case of a record
with all-zero plaintext correctly (i.e., by sending an unexpected
message alert) in various contexts. This would have caught a bug
where the LibreSSL TLSv1.3 record layer would call freezero() with
a size of -1.
What's missing is a test that sends a completely empty record. The
framework doesn't seem to permit that easily.
2020-08-13 17:16:05 +00:00
tb
628b21d886
Update to tlsfuzzer 20200805
2020-08-07 03:56:22 +00:00
tb
b2813769da
Update to tlsfuzzer 20200804
2020-08-05 09:58:28 +00:00
tb
0f35bab626
Update to tlsfuzzer 20200725
2020-07-30 11:23:55 +00:00
tb
3e39af0559
Update to tlsfuzzer 20200721
2020-07-22 12:57:23 +00:00
sthen
d9cfe4113e
bump REVISION; python 3 default changed to 3.8
2020-07-03 21:12:24 +00:00
tb
8950110063
update to tlsfuzzer 20200624
2020-06-26 05:46:11 +00:00
tb
10569d7ddb
Update to tlsfuzzer 20200623
2020-06-24 06:01:51 +00:00
tb
7795c6bccd
Update to tlsfuzzer 20200618
2020-06-21 07:24:20 +00:00
tb
8f82e84fa5
Update to tlsfuzzer 20200616 (local patch upstreamed)
2020-06-16 12:47:25 +00:00
tb
b28928b109
Update to tlsfuzzer 20200610.
2020-06-10 22:11:48 +00:00
tb
65e35e28ed
Update to py-tlsfuzzer-20200604
2020-06-06 19:30:00 +00:00
tb
ddd5c9a752
Undo a stupid thinko that broke the build.
...
reported by naddy
2020-05-21 22:23:34 +00:00
tb
3f4ec7fb7e
Update to py3-tlsfuzzer-20200513
2020-05-21 10:21:22 +00:00
tb
162d622f19
Update tlsfuzzer to HEAD. One new test. Drop RDEP on py-ecdsa since
...
it's only used indirectly via py-tlslite.
ok sthen
2020-03-15 05:45:03 +00:00
tb
f130b64fd3
Restrict byte-code compilation to SCRIPTS_DIR.
...
Fixes build failure with installed libproxy as seen by sthen.
2020-03-02 08:21:58 +00:00
tb
5422cb77c9
import py-tlsfuzzer
...
ok kmos
Fuzzer and test suite for TLS implementations (SSLv2-TLSv1.3). Provides
ready-to-use scripts testing for many vulnerabilities (ROBOT, DROWN, etc.)
and general standards conformity (RFC 5246, RFC 7627, RFC 7905, etc.)
Early alpha version - no API stability guarantees.
2020-02-29 07:57:47 +00:00