31 Commits

Author SHA1 Message Date
tb
703668f369 Update to tlsfuzzer 20201121 2020-11-20 23:30:13 +00:00
tb
3874c83fd3 Update to tlsfuzzer 20201105 2020-11-06 09:31:31 +00:00
tb
77222096c9 Update to tlsfuzzer 20201030 2020-10-31 07:39:53 +00:00
tb
bf64171862 Update to tlsfuzzer 20201026 2020-10-28 19:19:40 +00:00
tb
9542c791e7 Update to tlsfuzzer 20201019 2020-10-21 10:00:13 +00:00
tb
276bb3642f update to tlsfuzzer 20201015 2020-10-16 15:38:41 +00:00
tb
cfa0027f97 update to tlsfuzzer 20201013 2020-10-13 12:34:26 +00:00
tb
30a5350dec fix typo in previous 2020-10-03 07:37:45 +00:00
tb
bf816fa533 update to tlsfuzzer 20201002 2020-10-03 07:36:08 +00:00
tb
3a72da8101 Update to tlsfuzzer 20200923 2020-09-23 20:48:23 +00:00
tb
7f59567f03 Update to tlsfuzzer 20200908 2020-09-09 10:31:03 +00:00
tb
902a90e4b9 Update to tlsfuzzer 20200828
jsing has upstreamed his zero content type test, which in turn found
bugs in GnuTLS and NSS - thanks!
2020-08-28 18:32:02 +00:00
tb
49cdbfdd15 Update to tlsfuzzer 20200825 2020-08-27 16:10:12 +00:00
tb
7b8ab3205f Update to tlsfuzzer 20200812 2020-08-15 16:38:04 +00:00
tb
3a3b720046 Add a test for zero content type from jsing
This checks whether a TLSv1.3 server handles the case of a record
with all-zero plaintext correctly (i.e., by sending an unexpected
message alert) in various contexts.  This would have caught a bug
where the LibreSSL TLSv1.3 record layer would call freezero() with
a size of -1.

What's missing is a test that sends a completely empty record. The
framework doesn't seem to permit that easily.
2020-08-13 17:16:05 +00:00
tb
628b21d886 Update to tlsfuzzer 20200805 2020-08-07 03:56:22 +00:00
tb
b2813769da Update to tlsfuzzer 20200804 2020-08-05 09:58:28 +00:00
tb
0f35bab626 Update to tlsfuzzer 20200725 2020-07-30 11:23:55 +00:00
tb
3e39af0559 Update to tlsfuzzer 20200721 2020-07-22 12:57:23 +00:00
sthen
d9cfe4113e bump REVISION; python 3 default changed to 3.8 2020-07-03 21:12:24 +00:00
tb
8950110063 update to tlsfuzzer 20200624 2020-06-26 05:46:11 +00:00
tb
10569d7ddb Update to tlsfuzzer 20200623 2020-06-24 06:01:51 +00:00
tb
7795c6bccd Update to tlsfuzzer 20200618 2020-06-21 07:24:20 +00:00
tb
8f82e84fa5 Update to tlsfuzzer 20200616 (local patch upstreamed) 2020-06-16 12:47:25 +00:00
tb
b28928b109 Update to tlsfuzzer 20200610. 2020-06-10 22:11:48 +00:00
tb
65e35e28ed Update to py-tlsfuzzer-20200604 2020-06-06 19:30:00 +00:00
tb
ddd5c9a752 Undo a stupid thinko that broke the build.
reported by naddy
2020-05-21 22:23:34 +00:00
tb
3f4ec7fb7e Update to py3-tlsfuzzer-20200513 2020-05-21 10:21:22 +00:00
tb
162d622f19 Update tlsfuzzer to HEAD. One new test. Drop RDEP on py-ecdsa since
it's only used indirectly via py-tlslite.

ok sthen
2020-03-15 05:45:03 +00:00
tb
f130b64fd3 Restrict byte-code compilation to SCRIPTS_DIR.
Fixes build failure with installed libproxy as seen by sthen.
2020-03-02 08:21:58 +00:00
tb
5422cb77c9 import py-tlsfuzzer
ok kmos

Fuzzer and test suite for TLS implementations (SSLv2-TLSv1.3).  Provides
ready-to-use scripts testing for many vulnerabilities (ROBOT, DROWN, etc.)
and general standards conformity (RFC 5246, RFC 7627, RFC 7905, etc.)
Early alpha version - no API stability guarantees.
2020-02-29 07:57:47 +00:00