-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GnuTLS/OpenSSL - signature_algorithms #15
base: master
Are you sure you want to change the base?
Conversation
593e31e
to
e4d9ec1
Compare
rlAssertGrep "Server Signature: ${S_NAME[$idx]}" "$rlRun_LOG" | ||
rlAssertGrep "Client Signature: ${S_NAME[$idx]}" "$rlRun_LOG" | ||
|
||
rlRun "kill $openssl_pid" 0,1 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what purpose has -verify_return_error
if we then ignore server crashing/exiting because of errors?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
-verify_return_error won't close/crash the server if the client certificate is invalid, but yes, it would be wise to check for potential segfault after a successful handshake
options+=(--x509certfile ${S_CLNT_CERT[$idx]}) | ||
options+=(--x509keyfile ${S_CLNT_KEY[$idx]}) | ||
|
||
rlRun -s "${options[*]} localhost < /dev/null" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why not a proper HTTP/1.1 request?
e4d9ec1
to
87e9960
Compare
Changes:
|
|
||
rlJournalStart | ||
rlPhaseStartSetup | ||
rlAssertRpm $PACKAGE |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When there's rlAssertRpm --all
(below) there's no need for rlAssertRpm $PACKAGE
We need to wait for 7.4 release |
This PR adds a new test, which tests signature_algorithms extension between GnuTLS and OpenSSL libraries. When client certificates are used, signature algorithms used for the client authentication are verified as well, even though they are not part of the signature_algorithms extension.
As this test requires TLSv1.2, whose implementation is not good enough in GnuTLS on RHEL 6, it's disabled by default on this OS version.
Unfortunately, it requires features from RHEL/CentOS 7.4, so it's going to fail until this version is released.