-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extend tlsfuzzer coverage #488
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
Covscan not needed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
there are multiple scripts missing compared to instructions from openssl/openssl#25724
also, I think it would be nice to check that PKCS#11 can be used to delegate verification of signatures too...?
AFAIK this is implicitly tested by adding the propquery to the openssl cli in the second invocation of the tests: This should force the OpenSSL to import even public keys to the pkcs11 provider and do the operations on them. This already caught us some architectural issues in the past that have been fixed. |
For RSA, I added
The test |
if there are other cases that do pass, yes, modifying it with |
ok, but isn't the point of those tests to ensure end-to-end support for that, in the TLS context specifically? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Signed-off-by: Jakub Jelen <[email protected]>
Based on the OpenSSL coverage done in the following issue: openssl/openssl#25724 Signed-off-by: Jakub Jelen <[email protected]>
Follow up from latchset#488 Signed-off-by: Jakub Jelen <[email protected]>
Follow up from latchset#488 Signed-off-by: Jakub Jelen <[email protected]>
Follow up from latchset#488 Signed-off-by: Jakub Jelen <[email protected]>
Description
This mostly extends the test coverage for TLS 1.2 and ECDSA and EdDSA keys. I did not touch the RSA-PSS coverage, as it needs to use the special RSA-PSS keys and certificates to work correctly and pkcs11-provider can not use them. This will likely be handled in some follow-up PR.
Checklist
Reviewer's checklist: