Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add basic tlsfuzzer tests #459

Merged
merged 4 commits into from
Nov 1, 2024
Merged

Add basic tlsfuzzer tests #459

merged 4 commits into from
Nov 1, 2024

Conversation

Jakuje
Copy link
Contributor

@Jakuje Jakuje commented Oct 30, 2024

Description

This integrates tlsfuzzer tests into the pkcs11-provider testsuite.

Right now, the coverage is limited to quite basic operations in the TLS session, but it can be easily extended with existing tlsfuzzer scripts that will add more coverage for various cryptographic algorithms.

So far, the tests did not find any issue.

Checklist

  • Test suite updated with functionality tests
  • Test suite updated with negative tests

Reviewer's checklist:

  • Any issues marked for closing are addressed
  • There is a test suite reasonably covering new functionality or modifications
  • This feature/change has adequate documentation added
  • Code conform to coding style that today cannot yet be enforced via the check style test
  • Commits have short titles and sensible commit messages
  • Coverity Scan has run if needed (code PR) and no new defects were found

@Jakuje Jakuje force-pushed the tlsfuzzer branch 10 times, most recently from 327b849 to 078fc6b Compare October 31, 2024 13:50
Signed-off-by: Jakub Jelen <[email protected]>
Copy link
Member

@simo5 simo5 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overall LGTM

tests/ttlsfuzzer Show resolved Hide resolved
tests/ttlsfuzzer Outdated Show resolved Hide resolved
Using latest and rawhide in different jobs caused different cache issues
where the rust built code did not work on consequent CI runs.

Using only fedora:latest container image should solve this issue.

Signed-off-by: Jakub Jelen <[email protected]>
@Jakuje
Copy link
Contributor Author

Jakuje commented Oct 31, 2024

I tried to make the test https://github.com/tlsfuzzer/tlsfuzzer/blob/master/scripts/test-tls13-rsapss-signatures.py working too, but got stumped by the RSA-PSS spki identifiers so its not yet done. I just pushed what worked so far. Feel free to merge or wait for follow-up changes hopefully tomorrow. I will also send this PR to Alicja for review.

@Jakuje Jakuje marked this pull request as ready for review November 1, 2024 09:20
@tomato42
Copy link

tomato42 commented Nov 1, 2024

apart from the small issue with the comment, LGTM

@simo5
Copy link
Member

simo5 commented Nov 1, 2024

Everything seems to be workin, let's merge this one and defer to a follow up (set of) PR(s) to fix the identified issue and add more test cases.

@simo5 simo5 merged commit e064032 into latchset:main Nov 1, 2024
37 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants