mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 06:38:20 +00:00

With this commit, the entire Zeek test suite passes using spicy TLS. Tests that either use a SSLv2 handshake, or DTLS are skipped, as the parser currently does not support either. Similarly, tests that rely on behavior we cannot replicate (baseline, hooks, exact error messages) are passed. Other than that, all the TLS-based tests pass with 100% the exact same baseline results. This necessitated a couple of small tweaks to the spicy file - the testcases uncovered several small problems. This commit also enables cirrus tests for Spicy SSL/TLS.
25 lines
963 B
Text
25 lines
963 B
Text
# This tests the certificate_request message parsing
|
|
|
|
# Does not work in spicy version, due to missing DTLS support
|
|
# @TEST-REQUIRES: ! grep -q "#define ENABLE_SPICY_SSL" $BUILD/zeek-config.h
|
|
|
|
# @TEST-EXEC: zeek -b -r $TRACES/tls/client-certificate.pcap %INPUT > out
|
|
# @TEST-EXEC: zeek -C -b -r $TRACES/tls/certificate-request-failed.pcap %INPUT >> out
|
|
# @TEST-EXEC: zeek -C -b -r $TRACES/tls/webrtc-stun.pcap %INPUT >> out
|
|
# @TEST-EXEC: zeek -C -b -r $TRACES/mysql/encrypted.trace %INPUT >> out
|
|
# @TEST-EXEC: btest-diff out
|
|
|
|
@load base/protocols/ssl
|
|
@load base/protocols/mysql
|
|
|
|
event ssl_certificate_request(c: connection, is_client: bool, certificate_types: index_vec, supported_signature_algorithms: signature_and_hashalgorithm_vec, certificate_authorities: string_vec)
|
|
{
|
|
print certificate_types;
|
|
print supported_signature_algorithms;
|
|
for ( _, ca in certificate_authorities )
|
|
{
|
|
print ca;
|
|
print parse_distinguished_name(ca);
|
|
}
|
|
print "========";
|
|
}
|