mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 06:38:20 +00:00

With this commit, the entire Zeek test suite passes using spicy TLS. Tests that either use a SSLv2 handshake, or DTLS are skipped, as the parser currently does not support either. Similarly, tests that rely on behavior we cannot replicate (baseline, hooks, exact error messages) are passed. Other than that, all the TLS-based tests pass with 100% the exact same baseline results. This necessitated a couple of small tweaks to the spicy file - the testcases uncovered several small problems. This commit also enables cirrus tests for Spicy SSL/TLS.
31 lines
1.2 KiB
Text
31 lines
1.2 KiB
Text
# This tests a normal SSL connection and the log it outputs.
|
|
|
|
# @TEST-REQUIRES: ! grep -q "#define ENABLE_SPICY_SSL" $BUILD/zeek-config.h
|
|
# @TEST-EXEC: zeek -C -r $TRACES/tls/dtls13-wolfssl.pcap %INPUT
|
|
# @TEST-EXEC: cp ssl.log ssl-all.log
|
|
# @TEST-EXEC: echo "start CID test"
|
|
# @TEST-EXEC: zeek -C -r $TRACES/tls/dtls13-cid.pcap %INPUT
|
|
# @TEST-EXEC: cat ssl.log >> ssl-all.log
|
|
# @TEST-EXEC: btest-diff ssl-all.log
|
|
# @TEST-EXEC: btest-diff .stdout
|
|
# @TEST-EXEC: test ! -f dpd.log
|
|
|
|
event ssl_client_hello(c: connection, version: count, record_version: count, possible_ts: time, client_random: string, session_id: string, ciphers: index_vec, comp_methods: index_vec)
|
|
{
|
|
print "CH", c$id, version, record_version;
|
|
}
|
|
|
|
event ssl_server_hello(c: connection, version: count, record_version: count, possible_ts: time, server_random: string, session_id: string, cipher: count, comp_method: count)
|
|
{
|
|
print "SH", c$id, version, record_version;
|
|
}
|
|
|
|
event ssl_extension_connection_id(c: connection, is_client: bool, cid: string)
|
|
{
|
|
print "CID", c$id, is_client, cid;
|
|
}
|
|
|
|
event ssl_encrypted_data(c: connection, is_client: bool, record_version: count, content_type: count, length: count)
|
|
{
|
|
print "Encrypted", c$id, is_client, record_version, content_type, length;
|
|
}
|