summaryrefslogtreecommitdiff
path: root/tests/suite/tls-fuzzer
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2018-07-03 08:49:06 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2018-07-07 08:26:47 +0200
commit805f14d44805ec8070334e24ad87539d5f0b33dd (patch)
tree74b60c340298d902b0d3c97cf3629142feec5cf2 /tests/suite/tls-fuzzer
parent6ca5787e2027a163eee5f85b36e8e0fe24fd6a53 (diff)
downloadgnutls-805f14d44805ec8070334e24ad87539d5f0b33dd.tar.gz
configure: added option --enable-tls13-support
The new option enables TLS1.3 draft-28 support unconditionally. Updated the test suite to run when TLS1.3 is enabled by default, and added a CI run with TLS1.3 enabled. Resolves #424 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'tests/suite/tls-fuzzer')
-rw-r--r--tests/suite/tls-fuzzer/gnutls-nocert.json3
-rwxr-xr-xtests/suite/tls-fuzzer/tls-fuzzer-nocert.sh5
m---------tests/suite/tls-fuzzer/tlslite-ng0
3 files changed, 5 insertions, 3 deletions
diff --git a/tests/suite/tls-fuzzer/gnutls-nocert.json b/tests/suite/tls-fuzzer/gnutls-nocert.json
index 6784511bf2..8019db5af1 100644
--- a/tests/suite/tls-fuzzer/gnutls-nocert.json
+++ b/tests/suite/tls-fuzzer/gnutls-nocert.json
@@ -102,7 +102,8 @@
"comment" : "gnutls does not allow switching from EMS to no EMS, and w/ECDHE test is incomplete",
"arguments" : ["-e", "renegotiate without EMS in session with EMS",
"-e", "EMS with session resume without extension"]},
- {"name" : "test-fallback-scsv.py"},
+ {"name" : "test-fallback-scsv.py",
+ "arguments" : ["--tls-1.3"]},
{"name" : "test-fuzzed-ciphertext.py"},
{"name" : "test-fuzzed-finished.py"},
{"name" : "test-fuzzed-MAC.py"},
diff --git a/tests/suite/tls-fuzzer/tls-fuzzer-nocert.sh b/tests/suite/tls-fuzzer/tls-fuzzer-nocert.sh
index b4b7c10883..f577f71249 100755
--- a/tests/suite/tls-fuzzer/tls-fuzzer-nocert.sh
+++ b/tests/suite/tls-fuzzer/tls-fuzzer-nocert.sh
@@ -49,10 +49,11 @@ wait_for_free_port $PORT
retval=0
-PRIORITY="NORMAL:%VERIFY_ALLOW_SIGN_WITH_SHA1:+ARCFOUR-128:+3DES-CBC:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:-CURVE-SECP192R1:+VERS-SSL3.0:+SHA256"
+VERSIONS="-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0:+VERS-SSL3.0"
+PRIORITY="NORMAL:%VERIFY_ALLOW_SIGN_WITH_SHA1:+ARCFOUR-128:+3DES-CBC:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:-CURVE-SECP192R1:${VERSIONS}:+SHA256"
${CLI} --list --priority "${PRIORITY}" >/dev/null 2>&1
if test $? != 0;then
- PRIORITY="NORMAL:%VERIFY_ALLOW_SIGN_WITH_SHA1:+ARCFOUR-128:+3DES-CBC:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:+VERS-SSL3.0:+SHA256"
+ PRIORITY="NORMAL:%VERIFY_ALLOW_SIGN_WITH_SHA1:+ARCFOUR-128:+3DES-CBC:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:${VERSIONS}:+SHA256"
fi
TLS_PY=./tlslite-ng/scripts/tls.py
diff --git a/tests/suite/tls-fuzzer/tlslite-ng b/tests/suite/tls-fuzzer/tlslite-ng
-Subproject ac9c99a59c3c51abbd6909e76415c6306c3e45d
+Subproject d976188fe7fd7466dc5cf0818a4ef87e3738189