-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add basic tlsfuzzer tests #459
Conversation
327b849
to
078fc6b
Compare
Signed-off-by: Jakub Jelen <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall LGTM
Using latest and rawhide in different jobs caused different cache issues where the rust built code did not work on consequent CI runs. Using only fedora:latest container image should solve this issue. Signed-off-by: Jakub Jelen <[email protected]>
Signed-off-by: Jakub Jelen <[email protected]>
Signed-off-by: Jakub Jelen <[email protected]>
I tried to make the test https://github.com/tlsfuzzer/tlsfuzzer/blob/master/scripts/test-tls13-rsapss-signatures.py working too, but got stumped by the RSA-PSS spki identifiers so its not yet done. I just pushed what worked so far. Feel free to merge or wait for follow-up changes hopefully tomorrow. I will also send this PR to Alicja for review. |
apart from the small issue with the comment, LGTM |
Everything seems to be workin, let's merge this one and defer to a follow up (set of) PR(s) to fix the identified issue and add more test cases. |
Description
This integrates tlsfuzzer tests into the pkcs11-provider testsuite.
Right now, the coverage is limited to quite basic operations in the TLS session, but it can be easily extended with existing tlsfuzzer scripts that will add more coverage for various cryptographic algorithms.
So far, the tests did not find any issue.
Checklist
Reviewer's checklist: