Go to file
Richard Levitte 90aeaf6bce Add a more versatile test chooser
So far, the test runner (test/run_tests.pl) could get a list of tests
to run, and if non were given, it assumes all available tests should
be performed.

However, that makes skipping just one or two tests a bit of a pain.
This change makes the possibilities more versatile, run_checker.pl
takes these arguments and will process them in the given order,
starting with an empty set of tests to perform:

    alltests            The current set becomes the whole set of
                        available tests.
    test_xxx            Adds 'test_xxx' to the current set.
    -test_xxx           Removes 'test_xxx' from the current set.  If
                        nothing has been added to the set before this
                        argument, the current set is first initialised
                        to the whole set of available tests, then
                        'test_xxx' is removed from the current set.
    list                Display all available tests, then stop.

If no arguments are given, 'alltests' is assumed.

Reviewed-by: Emilia Käsper <emilia@openssl.org>
2016-09-01 20:58:40 +02:00
apps Windows: UTF-8 opt-in for command-line arguments and console input. 2016-08-25 11:56:28 +01:00
Configurations Have Configure's HASH or TABLE produce complete lists 2016-08-31 19:47:35 +02:00
crypto crypto/bn/*: x86[_64] division instruction doesn't handle constants, change constraint from 'g' to 'r'. 2016-08-31 16:45:00 +02:00
demos
doc Un-delete still documented X509_STORE_CTX_set_verify 2016-08-24 20:30:45 +01:00
engines dasync is an internal testing engine, so don't install it 2016-08-17 10:50:31 +02:00
external/perl
fuzz Update fuzz corpora 2016-08-23 20:01:54 +01:00
include Update CHANGES, NEWS, README and opensslv.h on master 2016-08-25 19:07:17 +02:00
ms
os-dep
ssl Ensure the CertStatus message adds a DTLS message header where needed 2016-08-30 11:32:49 +01:00
test Add a more versatile test chooser 2016-09-01 20:58:40 +02:00
tools
util Un-delete still documented X509_STORE_CTX_set_verify 2016-08-24 20:30:45 +01:00
VMS dasync is an internal testing engine, so don't install it 2016-08-17 10:50:31 +02:00
.gitattributes crypto/pkcs12: facilitate accessing data with non-interoperable password. 2016-08-22 13:52:59 +02:00
.gitignore
.travis-create-release.sh
.travis.yml Add a "config" for verbosity and use it with Travis 2016-08-16 10:38:45 +02:00
ACKNOWLEDGEMENTS
appveyor.yml
AUTHORS
build.info
CHANGES Remove note from CHANGES about EC DRBG 2016-08-25 21:55:02 +01:00
config Add a "config" for verbosity and use it with Travis 2016-08-16 10:38:45 +02:00
config.com VMS: no ENDIF on one line IF statements, in config.com 2016-08-17 10:48:43 +02:00
Configure Have Configure's HASH or TABLE produce complete lists 2016-08-31 19:47:35 +02:00
CONTRIBUTING
e_os.h
FAQ
INSTALL INSTALL: add information on option no-fuzz-test 2016-08-31 21:19:19 +02:00
LICENSE
Makefile.shared
NEWS Update CHANGES, NEWS, README and opensslv.h on master 2016-08-25 19:07:17 +02:00
NOTES.DJGPP
NOTES.PERL
NOTES.VMS
NOTES.WIN
README Update CHANGES, NEWS, README and opensslv.h on master 2016-08-25 19:07:17 +02:00
README.ECC
README.ENGINE
README.FIPS

 OpenSSL 1.1.1-dev

 Copyright (c) 1998-2016 The OpenSSL Project
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 All rights reserved.

 DESCRIPTION
 -----------

 The OpenSSL Project is a collaborative effort to develop a robust,
 commercial-grade, fully featured, and Open Source toolkit implementing the
 Transport Layer Security (TLS) protocols (including SSLv3) as well as a
 full-strength general purpose cryptographic library.

 OpenSSL is descended from the SSLeay library developed by Eric A. Young
 and Tim J. Hudson.  The OpenSSL toolkit is licensed under a dual-license (the
 OpenSSL license plus the SSLeay license), which means that you are free to
 get and use it for commercial and non-commercial purposes as long as you
 fulfill the conditions of both licenses.

 OVERVIEW
 --------

 The OpenSSL toolkit includes:

 libssl (with platform specific naming):
     Provides the client and server-side implementations for SSLv3 and TLS.

 libcrypto (with platform specific naming):
     Provides general cryptographic and X.509 support needed by SSL/TLS but
     not logically part of it.

 openssl:
     A command line tool that can be used for:
        Creation of key parameters
        Creation of X.509 certificates, CSRs and CRLs
        Calculation of message digests
        Encryption and decryption
        SSL/TLS client and server tests
        Handling of S/MIME signed or encrypted mail
        And more...

 INSTALLATION
 ------------

 See the appropriate file:
        INSTALL         Linux, Unix, Windows, OpenVMS, ...
        NOTES.*         INSTALL addendums for different platforms

 SUPPORT
 -------

 See the OpenSSL website www.openssl.org for details on how to obtain
 commercial technical support. Free community support is available through the
 openssl-users email list (see
 https://www.openssl.org/community/mailinglists.html for further details).

 If you have any problems with OpenSSL then please take the following steps
 first:

    - Download the current snapshot from ftp://ftp.openssl.org/snapshot/
      to see if the problem has already been addressed
    - Remove ASM versions of libraries
    - Remove compiler optimisation flags

 If you wish to report a bug then please include the following information in
 any bug report:

    - OpenSSL version: output of 'openssl version -a'
    - Any "Configure" options that you selected during compilation of the
      library if applicable (see INSTALL)
    - OS Name, Version, Hardware platform
    - Compiler Details (name, version)
    - Application Details (name, version)
    - Problem Description (steps that will reproduce the problem, if known)
    - Stack Traceback (if the application dumps core)

 Email the report to:

    rt@openssl.org

 In order to avoid spam, this is a moderated mailing list, and it might
 take a couple of days for the ticket to show up.  (We also scan posts to make
 sure that security disclosures aren't publicly posted by mistake.) Mail
 to this address is recorded in the public RT (request tracker) database
 (see https://www.openssl.org/community/index.html#bugs for details) and
 also forwarded the public openssl-dev mailing list.  Confidential mail
 may be sent to openssl-security@openssl.org (PGP key available from the
 key servers).

 Please do NOT use this for general assistance or support queries.
 Just because something doesn't work the way you expect does not mean it
 is necessarily a bug in OpenSSL. Use the openssl-users email list for this type
 of query.

 You can also make GitHub pull requests. See the CONTRIBUTING file for more
 details.

 HOW TO CONTRIBUTE TO OpenSSL
 ----------------------------

 See CONTRIBUTING

 LEGALITIES
 ----------

 A number of nations, in particular the U.S., restrict the use or export
 of cryptography. If you are potentially subject to such restrictions
 you should seek competent professional legal advice before attempting to
 develop or distribute cryptographic code.